Next Article in Journal
Mathematical Model for Economic Optimization of Tower-Type Solar Thermal Power Generation Systems via Coupled Monte Carlo Ray-Tracing and Multi-Mechanism Heat Loss Equations
Previous Article in Journal
Terminal Voltage and Load Frequency Regulation in a Nonlinear Four-Area Multi-Source Interconnected Power System via Arithmetic Optimization Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Experimental Study of Transfer Functions and Binarization Strategies in Binary Arithmetic Optimization Algorithms for the Set Covering Problem

by
Broderick Crawford
1,*,
Ricardo Soto
1,
Hugo Caballero
1,
Gino Astorga
2,
Felipe Cisternas-Caneo
1,
Fabián Solís-Piñones
1 and
Giovanni Giachetti
3
1
Escuela de Ingeniería Informática, Pontificia Universidad Católica de Valparaíso, Avenida Brasil 2241, Valparaíso 2362807, Chile
2
Escuela de Negocios Internacionales, Universidad de Valparaíso, Alcalde Prieto Nieto 452, Viña del Mar 2572048, Chile
3
Facultad de Ingeniería, Universidad Andres Bello, Antonio Varas 880, Providencia, Santiago 7591538, Chile
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(19), 3129; https://doi.org/10.3390/math13193129
Submission received: 2 August 2025 / Revised: 22 September 2025 / Accepted: 27 September 2025 / Published: 30 September 2025

Abstract

Metaheuristics have proven to be effective in solving large-scale combinatorial problems by combining global exploration with local exploitation, all within a reasonably short time. The balance between these phases is crucial to avoid slow or premature convergence. We propose binary variants of the Arithmetic Optimization Algorithm for the set cover problem, integrating a two-step binarization scheme based on transfer functions with binarization rules and a greedy repair operator to ensure feasibility. We evaluate the proposed solution using forty-five instances from OR-Beasley and compare it with representative approaches, including genetic algorithms, path-relinking strategies, and Lagrangian-based heuristics. The quality of the solution is evaluated using relative percentage deviation and stability with the coefficient of variation. The results show competitive deviations and consistently low variation, confirming that our approach is a robust alternative with a solid balance between exploration and exploitation.

1. Introduction

The Set Covering Problem [1,2] is a widely studied NP-hard combinatorial optimization problem of great industrial relevance, including applications in service planning, facility location, and network optimization [3]. Despite its straightforward formulation, its computational complexity has led to the development of numerous exact and approximate methods, including metaheuristics such as genetic algorithms, ant colony optimization, GRASP, and chemical reaction algorithms. However, no metaheuristic consistently outperforms others across all instances, highlighting the need for tailored approaches.
In this context, we selected the Arithmetic Optimization Algorithm [4] due to its simplicity, strong balance between exploration and exploitation, and recent success in continuous optimization tasks. Although originally designed for continuous domains, its potential for discrete problems such as SCPs remains largely unexplored. This study presents an adaptation of the AOA to the SCP, incorporating a two-step binarization [5] process that preserves the fundamental structure of the original algorithm while integrating well-established transfer functions and binarization rules used in previous SCP research.
The rest of this article is organized as follows: Section 2 presents the Set Covering Problem (SCP) along with its state of the art and formalization; Section 3 describes the Arithmetic Optimization Algorithm (AOA) metaheuristic, including its main parameters, exploration and exploitation components, and original algorithm; Section 4 introduces the two-step binarization mechanism, transfer functions, and binarization rules along with the reasons for their selection; Section 5 details our proposal, specifically, adaptation of the AOA to a binary version that incorporates a mechanism for validating and repairing candidate solutions; Section 6 reports the experimental results as evaluated using Relative Percentage Deviation (RPD) and Coefficient of Variation (CV), presents comparative analyses with reference techniques, and discusses the effect of different combinations of transfer functions and binarization rules and the statistical analysis of the results; Section 7 reports the computational overhead along with our method’s limitations; Section 8 presents the novel elements and main achievements of our proposal; finally, Section 9 presents the conclusions along with future work that could be developed based on the results of this study.

2. Set Covering Problem

The Set Covering Problem is a classical NP-complete combinatorial optimization problem with broad applications in areas such as facility location, scheduling, and resource allocation. A notable case is crew scheduling, where the goal is to select a cost-efficient set of crews to cover all required trips [6]. Due to its computational complexity, the problem is commonly addressed using exact methods for small instances and heuristic or metaheuristic approaches for larger ones [7].
In recent years, nature-inspired metaheuristics such as genetic algorithms, ACO, and hybrid methods have shown strong performance on this problem [8,9]. However, most of these approaches rely on well-established binary frameworks, leaving room to explore newer algorithms that have not yet been fully adapted to discrete spaces.
Formally, the SCP can be defined as follows. Let A = ( a i j ) be a binary matrix of size m × n , where a i j { 0 , 1 } , and let C = ( c 1 , c 2 , , c n ) be a non-negative cost vector associated with the n columns. Define I = { 1 , 2 , , m } as the set of rows and J = { 1 , 2 , , n } as the set of columns. Each c j > 0 for j J represents the cost of selecting column j, which covers row i if a i j = 1 . The objective is to find a subset S J such that every row i I is covered by at least one column j S and the total cost of the selected columns is minimized. This formulation is commonly referred to as the column-based representation.
Minimize   Z = j = 1 n c j x j ,
subject to
j = 1 n a i j x j 1 ,   i I ,
x j { 0 , 1 } ,   j J .
where x j is a binary decision variable such that x j = 1 if column j is selected in the solution and x j = 0 otherwise. The constraints [10] ensure that each row i is covered by at least one selected column j.
Equations (1)–(3) describe the column-based representation of the SCP, where the solution is encoded as a binary string of length n corresponding to the number of columns. The objective is to find a minimum-cost subset S J such that every row i I is covered by at least one column j S .

3. Arithmetic Optimization Algorithm

The Arithmetic Optimization Algorithm (AOA) is a population-based metaheuristic introduced by Abualigah et al. [4], which was designed to solve complex optimization problems using a mathematical framework based on the fundamental arithmetic operations: addition, subtraction, multiplication, and division. Unlike many metaheuristics inspired by biological or physical phenomena, the AOA relies exclusively on these operators, which are applied probabilistically to update candidate solutions and balance the exploration and exploitation phases [11].

3.1. Core Components of the Arithmetic Optimization Algorithm

3.1.1. Random Population Initialization

X 0 = x 1 , 1 x 1 , 2 x 1 , n x 2 , 1 x 2 , 2 x 2 , n x m , 1 x m , 2 x m , n
The initial population matrix is defined as X 0 R m × n , where m is the number of solutions and n is the number of variables. It is initialized randomly and updated in each iteration according to the exploration and exploitation mechanisms of the Arithmetic Optimization Algorithm.

3.1.2. Math Optimizer Accelerated

The Math Optimizer Accelerated (MOA) is an adaptive parameter that controls the balance between exploration and exploitation during the execution of the AOA algorithm, which is recalculated in each iteration. This parameter is typically set high enough to ensure exploration when starting the process, then decreases to ensure exploitation. The MOA is defined by Equation (5). The parameters Min and Max are defined in Table 1.
M O A ( C _ I t e r ) = M i n + C _ I t e r × M a x M i n M _ I t e r

3.1.3. Exploration Phase

The exploration phase is responsible for searching for solutions in different regions of the search space, with the goal of avoiding becoming trapped in local optima. This is accomplished using the multiplication and division operators, according to Equation (6) and conditioned on the MOA value:
x i , j ( C _ I t e r + 1 ) = best ( x j ) ÷ ( M O P + ε ) × ( ( U B j L B j ) × μ + L B j ) , if   r 2 < 0.5 best ( x j ) × M O P × ( ( U B j L B j ) × μ + L B j ) , otherwise .

3.1.4. Mathematical Optimizer Probability

The Mathematical Optimizer Probability (MP) coefficient is adaptive, being defined in terms of C _ I t e r , and works as a control factor that regulates the transition between the exploration and exploitation stages of the optimization process.
M O P ( C _ I t e r ) = 1 C _ I t e r 1 / α M _ I t e r 1 / α

3.1.5. Exploitation Phase

The exploitation phase is activated when a random number r 1 MOA , marking the transition from global exploration to local improvement. In this stage, the AOA applies the Subtraction and Addition operators using Equation (8) in order to intensify the search around the current optimum, while a stochastic component is introduced in each iteration to preserve some exploration, especially at the beginning and end:
x i , j ( C _ I t e r + 1 ) = best ( x j ) M O P × ( ( U B j L B j ) × μ + L B j ) , r 3 < 0.5 best ( x j ) + M O P × ( ( U B j L B j ) × μ + L B j ) , otherwise
where best ( x j ) denotes the j-th component of the current best solution, while U B j , L B j denote the upper and lower bounds of dimension j. For each dimension j, U B j , L B j are defined as constant values before the optimization process begins. These bounds delimit the feasible search space for each variable x j , ensuring that the generated solutions remain within problem-specific limits.

3.1.6. Pseudocode of the Original Arithmetic Optimization Algorithm

The AOA Algorithm 1 is presented below. In the exploratory stage, the algorithm applies multiplication and division operations. In the exploitation phase, it employs addition and subtraction to focus the search around the most promising solutions, gradually improving the quality of the results. This balanced dynamic enables the AOA to effectively guide the optimization process, combining global diversification and local convergence within a numerically simple yet highly efficient framework.
Algorithm 1 Arithmetic Optimization Algorithm.
1:
Initialize the AOA parameters in Table 1
2:
Initialize positions of all ( n ) randomly (Solutions: i = 1 , , m ), in Equation (4))
3:
while   C I t e r < M I t e r   do
4:
    Calculate the objective function for the given solutions
5:
    find best ( b e s t ) solution
6:
    Update M O A using Equation (5)
7:
    Update M O P using Equation (7)
8:
    for  i = 1 to N do
9:
        for  j = 1 to d do
10:
           Generate random numbers r 1 , r 2 , r 3 [ 0 , 1 ]
11:
           if  r 1 > M O A  then
12:
               if  r 2 > 0.5  then
13:
                   Apply Division operator (÷).
14:
                   Update position using Equation (6), Rule 1
15:
               else
16:
                   Apply Multiplication operator (×).
17:
                   Update position using Equation (6), Rule 2
18:
               end if
19:
           else
20:
               if  r 3 > 0.5  then
21:
                   Apply Subtraction operator (−).
22:
                   Update position using Equation (8), Rule 1
23:
               else
24:
                   Apply Addition operator (+).
25:
                   Update position using Equation (8), Rule 2
26:
               end if
27:
           end if
28:
        end for
29:
    end for
30:
     C I t e r C I t e r + 1
31:
end while
32:
return Best solution x

4. Two-Step Binarization Scheme

This process consists of two main phases:
(a)
Transfer phase: The transformation of a real-valued variable into a value within the range [ 0 , 1 ] . These functions are shown in Table 2
(b)
Binarization phase: The mapping of this probabilistic value into a binary value in { 0 , 1 } . These functions are shown in Table 3 and Table 4.
Though structurally simple, these two components play a critical role in shaping the exploration and exploitation behavior of a binary metaheuristic, and as such have a significant impact on the overall performance of the algorithm [12].
Here, we adopt S-shaped and V-shaped transfer functions together with the binarization rules STD, COM, PS, ELIT and ELITR. This is because they capture two key behaviors: cases where mapping continuous values to binary decisions cases where changing the sign should flip the decision (S-shaped, with T ( 0 ) 0.5 ), and cases where the magnitude matters regardless of the sign (V-shaped, as a function of | d | ). Here, d denotes the continuous value prior to binarization in the current iteration t; applying T ( · ) yields a probability in [ 0 , 1 ] of the binarization rules mapping to a binary decision (0/1). These families are monotone, smooth, bounded, and computationally efficient, allowing the exploration–exploitation balance to be adjusted gradually over iterations. For the SCP, the results of the OR-Library instances support these choices; comparative analyses show that the choice of binarization is crucial to performance [13], while systematic studies report that the binarization rule explains more performance variability than the transfer function family.
b j new = 1 , if   rand T   d w   j , 0 , otherwise .
b j new = comp   b w   j , if   rand T   d w   j , 0 , otherwise ,   with   comp ( 0 ) = 1 ,   comp ( 1 ) = 0 .
b j new = 0 , if   T   d w   j α , b w   j , if   α < T   d w   j 1 + α 2 , 1 , if   T   d w   j > 1 + α 2 .
b j new = b best   j , if   rand < T   d w   j , 0 , otherwise .
b j new = b s   j , if   rand T   d w   j , 0 , otherwise ,   Pr ( s ) = f ( s ) u Ω σ f ( u ) ,   s Ω σ .
where:
b new j Resulting bit at position j
b w j Current bit of individual w at position j
b best j Bit j of the best-known individual
d w j Continuous value (input to T) associated with ( w , j )
T ( · ) Transfer function [   ·   ]   [ 0 , 1 ] returning a probability
rand U ( 0 , 1 ) Uniform random number in [ 0 , 1 ]
α [ 0 , 1 ] Threshold used in PS
Ω σ Elite set of size σ , with s Ω σ the selected elite index, b s j bit j of elite s, and f ( s ) its fitness

5. Binary AOA

In this section, we present the Binary Arithmetic Optimization Algorithm (BAOA), an adaptation of the AOA to the binary domain in order to solve the SCP. This design keeps the operation, structure, and parameters of the original algorithm intact, on which basis we incorporate a two-step binarization scheme consisting of transfer functions and binarization rules to transform continuous positions into { 0 , 1 } vectors. In addition, a greedy repair operator guarantees the feasibility of the solutions and eliminates redundancies without altering the logic of the base method. We detail the execution flow by iterations, the alternation between exploration and exploitation, the notation used, and the inputs and outputs of the procedure. This structure allows us to use the search dynamics of the arithmetic algorithm and makes it operational in discrete spaces, preserving its essence and producing viable solutions for the SCP.
The algorithm description is as follows: the BAOA operates in iterations in which the arithmetic core (kept intact) updates the continuous population, determining the degree of exploration or exploitation through its adaptive control. The parameters are the same as in the original algorithm; see Table 1. Then, the binarization procedure transforms these positions into { 0 , 1 } candidates using the Algorithm 2, while the repair operator ensures feasibility and eliminates redundancies using Algorithm 3.
Algorithm 2 Two-Step Binarization Scheme with Specific Rule.
1:
Input: Continuous vector d w = [ d w 1 , d w 2 , , d w n ]
2:
Output: Binary vector b new = [ b new 1 , b new 2 , , b new n ]
3:
for   j = 1 to n do
4:
    Compute T ( d w j ) using the selected transfer function
5:
    Apply the binarization rule specified
6:
    Assign the result to b new j
7:
end for
8:
return   b new
Where:
jIndex of the dimension (loop variable), j = 1 , , n
wIndex of the individual (solution) in the population
d w Continuous solution vector d w = [ d w 1 , d w 2 , , d w n ] R n
T ( d w j ) Transfer function that converts the continuous value d w j into a probability
b new Resulting binary vector b new = [ b new 1 , , b new n ] { 0 , 1 } n
Algorithm 3 Greedy Repair Operator for the SCP.
1:
Input: Binary vector b , matrix A, cost vector c
2:
for each row i not covered by b  do
3:
    Select j * with a i j = 1 and minimal c j
4:
    Set b j * 1
5:
end for
6:
for each j with b j = 1  do
7:
    Set b j 0
8:
    if any row becomes uncovered then
9:
        Restore b j 1
10:
    end if
11:
end for
12:
return repaired vector b
Finally, the cost is evaluated and the best found solution is updated. The inputs to the procedure are the cost and coverage matrix, the population size, the stopping criterion, and the parameters of the original arithmetic algorithm along with the choice of transfer function and binarization rule (outer layers); the output is the best feasible binary solution and its cost. The complete process is presented in Algorithm 4.
Algorithm 4 Binary Arithmetic Optimization Algorithm with Greedy Repair.
1:
Initialize AOA parameters and positions of all solutions randomly ( i = 1 , , N )
2:
Apply Two-Step Binarization Scheme to initial positions, using Algorithm 2
3:
Apply Greedy Repair Operator to all solutions, using Algorithm 3
4:
while   C iter < M iter   do
5:
    Evaluate fitness for all solutions
6:
    Identify the best solution found so far
7:
    Update M O A
8:
    Update M O P
9:
    for  i = 1 to N do
10:
        for  j = 1 to d do
11:
           Generate r 1 , r 2 , r 3 [ 0 , 1 ]
12:
           if  r 1 > M O A  then
13:
               if  r 2 > 0.5  then
14:
                   Apply Division operator ( ÷ )
15:
                   Update position using Equation (6), Rule 1
16:
               else
17:
                   Apply Multiplication operator ( × )
18:
                   Update position using Equation (6), Rule 2
19:
               end if
20:
           else
21:
               if  r 3 > 0.5  then
22:
                   Apply Subtraction operator ( )
23:
                   Update position using Equation (8), Rule 1
24:
               else
25:
                   Apply Addition operator ( + )
26:
                   Update position using Equation (8), Rule 2
27:
               end if
28:
           end if
29:
        end for
30:
        Apply Two-Step Binarization Scheme to x i , using Algorithm 2
31:
        Apply Greedy Repair Operator to b i , using Algorithm 3
32:
    end for
33:
     C iter C iter + 1
34:
end while
35:
return Best repaired binary solution

Computational Complexity Analysis

The computational complexity of the BAOA for the SCP is estimated as O ( T · P · m · n ) , where T is the maximum number of iterations, P is the population size, and m × n are the dimensions of the coverage matrix. This estimate encompasses the full procedure: the arithmetic updates over n variables drive the search, binarization is applied to each individual with a per-iteration cost on the order of O ( P · n ) , and feasibility is evaluated with greedy repair on the problem matrix with a per-iteration cost on the order of O ( P · m · n ) . The latter term becomes dominant in combinatorial covering settings, meaning that the binarization cost is absorbed into the final order. Presenting the complexity in this way aligns with metaheuristic studies that explicitly analyze runtime using Big-O notation and detail the dependence on population size, problem dimensionality, and iteration count [14].

6. Experiments Results

In this section, we discuss both the experimental method and the obtained experimental results.
The experiments were executed on a MacBook Pro (15-inch, 2019) with the following specifications:
  • Processor: 2.3 GHz 8-core Intel Core i9
  • Graphics: Radeon Pro 560X 4 GB + Intel UHD Graphics 630 1536 MB
  • Memory: 16 GB DDR4 at 2400 MHz
  • Operating System: macOS Sequoia 15.5

6.1. Experimental Methodology

The experimental analysis of the BAOA was conducted using SCP instances from the OR-Library, which are widely used for their diversity in terms of size and complexity. Table 5 presents the considered set of instances, detailing the number of instances, dimensions of the problem (m rows and n columns), cost range, density of the coverage matrix, and availability of optimal solutions. These instances allow us to evaluate the algorithm’s performance in heterogeneous scenarios, from cases with known optimal solutions (sets 4, 5, 6, A, B, C, D, NRE, and NRF) to more challenging problems for which only the best historical solution is available (NRG, NRH, and unicost).
For each instance and experimental configuration, 30 independent runs were performed; this number is considered sufficient to draw reliable statistical conclusions in metaheuristic studies. The BAOA parameters were established according to a previous limited study, with the results shown in Table 5. The evaluation metrics considered here were the value of the best found solution, the RPD (Relative Percentage Deviation) from the known optimum or best historical solution, the total execution time, and the Coefficient of Variation (CV) as a measure of stability [15].
The stopping criterion was identical across all instances, and was defined by the number of evaluations. This approach ensures fairness compared to alternatives such as elapsed time, which are highly dependent on machine performance.
Finally, the obtained results were analyzed using descriptive statistics and compared using nonparametric tests according to the methodology from [9,13], as shown in Figure 1.

6.2. Parameter Setting

The Table 6 shows the bounded execution of the BAOA on a sample of one instance per set. The execution parameters of the BAOA are the same as in the original version. The results were of good quality when considering RPD as a quality measure; thus, we used them in our experiments while only increasing the population size and number of iterations. The parameter settings are shown in Table 7.

6.3. Statistical Indicators for Performance Evaluation

In this section, we present the indicators used to measure the quality of our solutions.
(a)
Relative Percentage Deviation (RPD). As a quality indicator, we use the average Relative Percentage Deviation (RPD), which measures the proximity of a candidate solution to the known optimum:
R P D = Z alg Z ref Z ref × 100
where Z alg is the objective function value returned by the algorithm under evaluation [16] and Z ref is the best known or optimal value for the problem instance.
(b)
Coefficient of Variation (CV). The CV evaluates the stability of the algorithm over multiple independent runs [16]. It is defined as the ratio between the standard deviation and the mean of the results. A lower CV indicates greater consistency. The equation for CV is
CV = σ μ × 100 .
The CV, defined as the ratio between the standard deviation ( σ ) and the mean ( μ ), enables a relative assessment of stability across instances.

6.4. Performance Analysis of the BAOA

This section presents a comprehensive summary of our BAOA’s performance in all benchmark instances. The statistical analysis is shown in Table 8 and Table 9 (Min, Max, Avg, CV, RPD), while Figure 2, Figure 3, Figure 4 and Figure 5 show the most effective combinations of instance-based binarization.
We have used heatmaps to evaluate the results of different combinations between transfer functions and binarization rules; the results are as follows.
Figure 2, Figure 3, Figure 4 and Figure 5 show heatmaps of the RPD values obtained from different combinations of transfer functions and binarization strategies for all SCP instance families; we have selected the best RPD results, in this case those below 5%. Lighter shades correspond to lower RPD values, i.e., solutions closer to the optimum.
The results reveal a clear trend, with the S1+elitist, V1+dynamic, and V2+elitist configurations achieving the lowest RPD values in most instances. In general, combinations with V transfer functions perform best. This indicates that elitist strategies are especially effective when combined with transfer functions that properly balance exploration and exploitation.
The results presented in Table 10 and Table 11 show the average RPD, 95% confidence intervals [17], and Coefficient of Variation (CV) obtained by the V3-elitist combination across various SCP instances. Overall, the performance of this configuration shows stable convergence, with RPD values close to the known optima for each instance. The confidence intervals are narrow, indicating consistency across runs, and the CV is low in most instances.
In Table 12, considering the density of the OR-Library instances (low/medium in the SCP series (e.g., scp41, scp51, scp61) and high in the SCPA–SCPD series), the data show an increase in average execution time as density grows, from low values in scp61 (2.345 s) and scp51 (5.374 s) to the maximum observed in scpd1 (64.522 s). In contrast, the stagnation indicators display heterogeneous variation across families and do not follow a monotonic pattern with respect to density.
The boxplots in Figure 6 show the distribution of the final RPD values in groups of ten instances. In most cases, the runs exhibit low variability and consistently converge toward near-optimal solutions, although some instances show greater dispersion, reflecting sensitivity to the problem structure. The Figure 7 and Figure 8 show the performance metrics in terms of iteration time and convergence characteristics.

6.5. Benchmarking the BAOA with Competing Approaches

We compared our BAOA against recent competitive metaheuristics selected for their strong results in combinatorial optimization, namely, SCA, PSA, GWO, and BGO [18]. SCA provides a simple design with an effective exploration–exploitation balance [19], PSA is physics-inspired and performs well on discrete tasks [20], GWO is widely used in binary settings with robust convergence, and BGO is a recent variant tailored to binary spaces that attains high-quality solutions [21]. The evaluation consistently compared the best cost achieved by each method on standard SCP instances, ensuring fairness and reproducibility. The experimental data were taken from [18]; the data are reported in Table 13 and Table 14.
Figure 9 presents a comparative performance analysis of the evaluated metaheuristics. It should be noted that this table does not represent a statistical significance test but rather a descriptive comparison of results across problem instances. Three indicators are reported for each algorithm.
The results show that the BAOA exhibits the most competitive overall performance among the evaluated metaheuristics. In terms of solution quality, the BAOA achieves the lowest average minimum RPD (1.51), indicating solutions consistently closer to the optimal values. Regarding consistency, the BAOA also obtains the highest number of best instances (21), outperforming SCA (15), PSA (6), GWO (2), and BGO (1). Although its average rank (2.36) is not the lowest, the BAOA maintains a strong relative position across all instances. These findings highlight the BAOA’s ability to combine high-quality solutions with robustness and reliability, positioning it as a competitive alternative to other state-of-the-art approaches.

6.6. Statistical Analysis

In this study, we used the RPD for the statistical analysis instead of absolute cost values. This indicator allows for fair comparisons between problem instances with different cost scales and provides a more consistent and impartial evaluation. Furthermore, the use of the RPD is well established in the optimization and metaheuristic literature, and is suitable for normality assessments such as the Shapiro–Wilk test [22].
We first assessed normality (Shapiro–Wilk and KS–Lilliefors) [23,24] on the paired differences between the BAOA and each metaheuristic. The hypotheses were as follows: H 0 , “the data are normal”; and H 1 , “the data are not normal”. In most cases p < 0.05 ; thus, H 0 was rejected. The results of this test are shown in Table 15.
We then proceeded to the second stage, as the normality assumption was rejected in most cases according to the Shapiro–Wilk and Kolmogorov–Smirnov–Lilliefors tests. Therefore, following the methodological flow presented in Figure 1 and considering that the samples were paired across the same problem instances, we applied the Wilcoxon signed-rank [25] test as the appropriate non-parametric alternative to evaluate the significance of performance differences between our BAOA and the competing algorithms. The hypotheses were as follows: H 0 , “there are no statistically significant differences between the compared metaheuristics” (that is, both exhibit similar performance in terms of the minimum RPD value); and H 1 , “there are statistically significant differences between at least one pair of metaheuristics” (indicating differences in performance in terms of the minimum RPD value).
No statistically significant differences were found between any pair of algorithms, as all p-values were greater than 0.05 the results are show in Table 16. Therefore, the null hypothesis is accepted in all comparisons, indicating statistically comparable performance. These results suggest that additional evaluation criteria such as convergence speed or robustness could provide further insights into the algorithms’ relative effectiveness.

6.7. Conclusions from the Statistical Tests

The Shapiro–Wilk test showed that most RPD distributions were non-normal, justifying the use of non-parametric methods. The Wilcoxon signed-rank test revealed no statistically significant differences between the metaheuristics, as all p-values were above 0.05. Therefore, the null hypothesis could not be rejected. These results suggest that the algorithms have comparable performance based on minimum RPD; thus, further analysis using additional performance metrics is recommended.

7. Analysis of Computational Overhead and Methodological Limitations

We chose V3-ELIT to develop this section due to its ability to balance exploration and exploitation. The V3 (hyperbolic V-shaped) transfer function introduces smooth and controlled transitions in the binarization, while the ELIT rule preserves the best solutions, which in our experiments translated into low RPDs and practically zero variability (mean = best value; deviation around 0) in most instances. On this basis, Figure 10 shows the time per iteration of BAOA V3-ELIT across several SCP instances, revealing two clear phases: a rapid initial overhead, and a subsequent stabilization phase in which times remain nearly constant. The largest instances, such as scpc1 (400 × 4000) and scpd1 (400 × 4000), reach the highest costs, with 30.0 s and 19.0 s per iteration, respectively, while scpa1 (300 × 3000) and scpb1 (300 × 3000) fall in an intermediate range, with 15.0 s and 11.0 s. In contrast, smaller instances such as scp61 (200 × 1000) and scp51 (200 × 2000) require only 4.5 s and 3.3 s per iteration. This pattern confirms that the computational cost increases with problem size; however, once past the initial phase, the time remains stable, reflecting temporal consistency of the algorithm across instances of different scales.
Across the hardest SCP cases, BAOA V3-ELIT exhibits a short transient followed by stable timing and a strongly exploitative regime. As shown in Figure 11, the iteration time settles ∼18–19 s after the early iterations. In Figure 12, exploration quickly collapses to about 2.12% while exploitation stabilizes near 97.88%, evidencing minimal search volatility and a persistent bias toward exploitation once the algorithm stabilizes.
Table 17 presents the theoretical computational complexity of the BAOA algorithm expressed in terms of population size (P), number of iterations (T), and dimensions of the coverage matrix (m rows and n columns) for the Set Covering Problem (SCP). As discussed previously, this complexity is represented as O ( P · T · m · n ) , which reflects how the expected execution time increases with the size of the problem instances.

8. Novelty and Contributions

In this paper, we have presented the first binary adaptation of the AOA to solve an important industry problem. In addition, we have introduced a new index that is complementary to the RPD for measuring stability across runs to quantify solution stability; Figure 2 shows this information. The joint analysis of RPD versus CV shows that 35 instances fall into the high quality zone and 27 are distributed across moderate zones, with only three instances falling into the low quality zone. These results reinforce the robustness of our BAOA in terms of solution quality and stability (see Figure 13).
Following the statistical methodology (normality → nonparametric test for paired samples), the applied tests show that the proposed version is competitive with state-of-the-art techniques (SCA, PSA, GWO, BGO), with no statistically significant unfavorable differences.
In terms of computational efficiency, the results show that our BAOA achieves high-quality solutions with reduced execution times. Table 6 reports total times in the range of 3 s to 19 s per iteration, depending on the instance (e.g., ∼3.3 s on scp51 and ∼18–19 s on scpd1). Furthermore, the dynamic analysis of Figure 8 and Figure 9 reveals stable behavior; after an initial overload phase, the time per iteration remains virtually constant throughout the execution.

9. Conclusions and Future Work

In this work, we have presented a new version for solving the SCP based on the Arithmetic Optimization Algorithm metaheuristic and coverage problems in general. Our design preserves the core mechanisms of the original algorithm while introducing a two-step binarization scheme (transfer functions and binarization rules) and a conventional greedy repair operator to ensure feasibility in discrete spaces. We propose the Coefficient of Variation (CV) as an index of stability across runs, enabling comparisons between configurations with similar averages, which complements the RPD index and allows for a precise evaluation of the solution’s performance across quality zones formed by graphically plotting RPD versus CV. Our BAOA exhibits competitive performance across 45 benchmark instances from the OR-Library when compared to state-of-the-art metaheuristics SCA, PSA, GWO, and BGO, achieving a minimum average RPD (1.51%) and a high number of optimal solutions (21 out of 25 in the subset where the optima are known). After using multiple statistical analyses (the Shapiro-Wilk and KS-Lilliefors tests as well as the unpaired Wilcoxon signed-rank test), no statistically significant differences were revealed, with all results yielding p > 0.05. Therefore, there are no significant differences between our BAOA and the aforementioned metaheuristics. While the results of these tests and descriptive comparisons were good, additional improvements can still be applied. Future research could explore alternative combinations of transfer functions and binarization rules, principle-based hybridization, adaptive parameter control, lightweight intensification strategies, and population diversity mechanisms to better balance exploration and exploitation. These guidelines could further improve the quality and efficiency of the solution.

Author Contributions

Conceptualization, H.C., B.C., and F.C.-C.; methodology, B.C., F.C.-C., and G.A.; software, H.C., G.G., F.S.-P., and F.C.-C.; validation, B.C., R.S., F.C.-C., and G.A.; formal analysis, B.C., R.S., and H.C.; investigation, B.C. and G.A.; resources, H.C., F.C.-C., and G.A.; writing—original draft, H.C., F.S.-P., and G.A.; writing—review and editing, B.C., R.S., G.A., G.G., and F.C.-C.; supervision, B.C., R.S., and F.C.-C.; funding acquisition, B.C. All authors have read and agreed to the published version of the manuscript.

Funding

Felipe Cisternas-Caneo is supported by National Agency for Research and Development (ANID)/Scholarship Program/DOCTORADO NACIONAL/2023-21230203.

Data Availability Statement

The original contributions presented in the study are included in the article; further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AOAArithmetic Optimization Algorithm
BAOABinary Arithmetic Optimization Algorithm
SCPSet Covering Problem
MOAMathematical Optimizer Accelerated
RPDRelative Percentage Deviation
SCASine Cosine Algorithm
PSAPendulum Search Algorithm
GWOGrey Wolf Optimizer
BGOBinary Growth Optimizer
ACOAnt Colony Optimization
MOPMathematical Optimizer Probability

References

  1. Karp, R.M. Reducibility among Combinatorial Problems. In Complexity of Computer Computations; Miller, R.E., Thatcher, J.W., Eds.; Springer: Berlin/Heidelberg, Germany, 1972; pp. 85–103. [Google Scholar] [CrossRef]
  2. Garey, M.R.; Johnson, D.S. Computers and Intractability: A Guide to the Theory of NP-Completeness; W. H. Freeman: New York, NY, USA, 1979. [Google Scholar] [CrossRef]
  3. Suh, W.H.; Oh, S.; Ahn, C.W. Metaheuristic-based time series clustering for anomaly detection in manufacturing industry. Appl. Intell. 2023, 53, 21723–21742. [Google Scholar] [CrossRef]
  4. Abualigah, L.; Diabat, A.; Mirjalili, S.; Abd Elaziz, M.; Gandomi, A.H. The arithmetic optimization algorithm. Comput. Methods Appl. Mech. Eng. 2021, 376, 113609. [Google Scholar] [CrossRef]
  5. Crawford, B.; Soto, R.; Astorga, G.; García, J.; Castro, C.; Paredes, F. Putting Continuous Metaheuristics to Work in Binary Search Spaces. Complexity 2017, 2017, 8404231. [Google Scholar] [CrossRef]
  6. Wen, X.; Chung, S.H.; Ma, H.L.; Khan, W.A. Airline crew scheduling with sustainability enhancement by data analytics under circular economy. Ann. Oper. Res. 2023, 342, 959–985. [Google Scholar] [CrossRef]
  7. Beasley, J.E. OR-library: Distributing test problems by electronic mail. J. Oper. Res. Soc. 1990, 41, 1069–1072. [Google Scholar] [CrossRef]
  8. Blum, C.; Roli, A. Metaheuristics in combinatorial optimization: Overview and conceptual comparison. ACM Comput. Surv. (CSUR) 2003, 35, 268–308. [Google Scholar] [CrossRef]
  9. Lanza-Gutiérrez, J.M.; Caballé, N.C.; Crawford, B.; Soto, R.; Gómez-Púlido, J.A.; Paredes, F. Exploring Further Advantages in an Alternative Formulation for the Set Covering Problem. Math. Probl. Eng. 2020, 2020, 5473501. [Google Scholar] [CrossRef]
  10. Carrabs, F.; Cerulli, R.; Mansini, R.; Moreschini, L.; Serra, D. Solving the Set Covering Problem with Conflicts on Sets: A new parallel GRASP. Comput. Oper. Res. 2024, 166, 106620. [Google Scholar] [CrossRef]
  11. Al-Himyari, B.; Al-khafaji, H. Exploration-Exploitation Tradeoffs in Metaheuristics: A Review. Asian J. Appl. Sci. 2024, 12, 1–27. [Google Scholar] [CrossRef]
  12. Saremi, S.; Mirjalili, S.; Lewis, A. How important is a transfer function in discrete heuristic algorithms. Neural Comput. Appl. 2014, 26, 625–640. [Google Scholar] [CrossRef]
  13. Lanza-Gutiérrez, J.M.; Crawford, B.; Soto, R.; Berrios, N.; Gomez-Pulido, J.A.; Paredes, F. Analyzing the effects of binarization techniques when solving the set covering problem through swarm optimization. Expert Syst. Appl. 2017, 70, 67–82. [Google Scholar] [CrossRef]
  14. Arora, S.; Barak, B. Computational Complexity: A Modern Approach; Cambridge University Press: New York, NY, USA, 2009. [Google Scholar] [CrossRef]
  15. Ospina, R.; Marmolejo-Ramos, F.; Medina, M. Performance of Some Estimators of Relative Variability. Front. Appl. Math. Stat. 2019, 5, 43. [Google Scholar] [CrossRef]
  16. Cook, W.J.; Applegate, D.; Bixby, R.E.; Bixby, R.E.; Chvátal, V. The Traveling Salesman Problem: A Computational Study; Princeton University Press: Princeton, NJ, USA, 2007. [Google Scholar] [CrossRef]
  17. Hazra, A. Using the confidence interval confidently. J. Thorac. Dis. 2017, 9, 4125–4130. [Google Scholar] [CrossRef] [PubMed]
  18. Leiva, D.; Ramos-Tapia, B.; Crawford, B.; Soto, R.; Cisternas-Caneo, F. A Novel Approach to Combinatorial Problems: Binary Growth Optimizer Algorithm. Biomimetics 2024, 9, 283. [Google Scholar] [CrossRef]
  19. Mirjalili, S. SCA: A sine cosine algorithm for solving optimization problems. Knowl.-Based Syst. 2016, 96, 120–133. [Google Scholar] [CrossRef]
  20. Ab. Aziz, N.A.; Ab. Aziz, K. Pendulum Search Algorithm: An Optimization Algorithm Based on Simple Harmonic Motion and Its Application for a Vaccine Distribution Problem. Algorithms 2022, 15, 214. [Google Scholar] [CrossRef]
  21. Martín-Santamaría, R.; López-Ibáñez, M.; Stützle, T.; Colmenar, J.M. On the automatic generation of metaheuristic algorithms for combinatorial optimization problems. Eur. J. Oper. Res. 2024, 318, 740–751. [Google Scholar] [CrossRef]
  22. Yap, B.W.; Sim, C.H. Comparisons of various types of normality tests. J. Stat. Comput. Simul. 2011, 81, 2141–2155. [Google Scholar] [CrossRef]
  23. Shapiro, S.S.; Wilk, M.B. An analysis of variance test for normality (complete samples). Biometrika 1965, 52, 591–611. [Google Scholar] [CrossRef]
  24. Lilliefors, H.W. On the Kolmogorov-Smirnov test for normality with mean and variance unknown. J. Am. Stat. Assoc. 1967, 62, 399–402. [Google Scholar] [CrossRef]
  25. Wilcoxon, F. Individual Comparisons by Ranking Methods. Biom. Bull. 1945, 1, 80–83. [Google Scholar] [CrossRef]
Figure 1. Statistical decision flow used for test selection.
Figure 1. Statistical decision flow used for test selection.
Mathematics 13 03129 g001
Figure 2. RPD heatmap for TF–binarization combinations; lighter cells indicate lower RPD.
Figure 2. RPD heatmap for TF–binarization combinations; lighter cells indicate lower RPD.
Mathematics 13 03129 g002
Figure 3. RPD heatmap for TF–binarization combinations; lighter cells indicate lower RPD.
Figure 3. RPD heatmap for TF–binarization combinations; lighter cells indicate lower RPD.
Mathematics 13 03129 g003
Figure 4. RPD heatmap for TF–binarization combinations; lighter cells indicate lower RPD.
Figure 4. RPD heatmap for TF–binarization combinations; lighter cells indicate lower RPD.
Mathematics 13 03129 g004
Figure 5. RPD heatmap for TF–binarization combinations; lighter cells indicate lower RPD.
Figure 5. RPD heatmap for TF–binarization combinations; lighter cells indicate lower RPD.
Mathematics 13 03129 g005
Figure 6. Boxplots RPD distribution for the elitist rule with the V3 transfer function (scpnrh2–scpnrh5). The blue box shows the interquartile range, the black line the median, the green whiskers the 1.5×IQR limits, and the white circles the outliers.
Figure 6. Boxplots RPD distribution for the elitist rule with the V3 transfer function (scpnrh2–scpnrh5). The blue box shows the interquartile range, the black line the median, the green whiskers the 1.5×IQR limits, and the white circles the outliers.
Mathematics 13 03129 g006
Figure 7. BAOA on (V3–ELIT): Time per iteration, XPL–XPT balance (averages), and convergence curve indicating the point from which the fitness no longer improves.
Figure 7. BAOA on (V3–ELIT): Time per iteration, XPL–XPT balance (averages), and convergence curve indicating the point from which the fitness no longer improves.
Mathematics 13 03129 g007
Figure 8. BAOA on (V3–ELIT): Time per iteration, XPL–XPT balance (averages), and convergence curve indicating the point from which the fitness no longer improves.
Figure 8. BAOA on (V3–ELIT): Time per iteration, XPL–XPT balance (averages), and convergence curve indicating the point from which the fitness no longer improves.
Mathematics 13 03129 g008
Figure 9. Barchart comparison of the metaheuristics based on three performance indicators.
Figure 9. Barchart comparison of the metaheuristics based on three performance indicators.
Mathematics 13 03129 g009
Figure 10. Summary of iteration times of AOA V3-ELIT across different SCP instances. Two stages can be observed: an initial overhead, and a stabilization phase with nearly constant time.
Figure 10. Summary of iteration times of AOA V3-ELIT across different SCP instances. Two stages can be observed: an initial overhead, and a stabilization phase with nearly constant time.
Mathematics 13 03129 g010
Figure 11. Iteration time per iteration for instance SCPd1 under the AOA V3-ELIT configuration. The curve shows two phases: an initial overhead where computation time increases sharply, followed by a stabilization phase where the iteration time remains nearly constant around 18–19 s.
Figure 11. Iteration time per iteration for instance SCPd1 under the AOA V3-ELIT configuration. The curve shows two phases: an initial overhead where computation time increases sharply, followed by a stabilization phase where the iteration time remains nearly constant around 18–19 s.
Mathematics 13 03129 g011
Figure 12. Exploration (XPL%) and exploitation (XPT%) dynamics for BAOA V3-ELIT in the scpd1 instance. The curves show a sharp decline in exploration during the first iterations, stabilizing below 2.12%, while exploitation dominates above 97.88%.
Figure 12. Exploration (XPL%) and exploitation (XPT%) dynamics for BAOA V3-ELIT in the scpd1 instance. The curves show a sharp decline in exploration during the first iterations, stabilizing below 2.12%, while exploitation dominates above 97.88%.
Mathematics 13 03129 g012
Figure 13. Summary of the high-quality zone from the RPD vs. CV analysis.
Figure 13. Summary of the high-quality zone from the RPD vs. CV analysis.
Mathematics 13 03129 g013
Table 1. Parameters used in the AOA.
Table 1. Parameters used in the AOA.
ParameterDescription
L B Lower Bound. Minimum value that a decision variable can take. Defines the lower limit of the search space.
U B Upper Bound. Maximum value that a decision variable can take. Defines the upper limit of the search space.
C _ I t e r Current iteration number. Indicates the current generation in the optimization process.
M _ I t e r Maximum number of iterations. Determines when the algorithm stops.
M i n Predefined constant value, typically 0.2
M a x Predefined constant value, typically 1.0
α Curvature control parameter used in the computation of M O P . It controls the rate at which M O P decreases. Typical value: α = 5
r 1 A random number in [ 0 , 1 ] to decide whether to perform exploration or exploitation.
r 2 A random number in [ 0 , 1 ] used in exploration phase to select between division and multiplication.
r 3 A random number in [ 0 , 1 ] used in exploitation phase to select between subtraction and addition.
μ Parameter random in [ 0 , 1 ] . It is used as a stochastic scaling factor to alter the size of the change applied to each variable during the update process.
ε Small positive value to avoid division by zero, typically 10 8 .
X best The best solution found so far. Used to guide the update of current solutions.
Table 2. Transfer functions (S-shaped and V-shaped); T ( x ) [ 0 , 1 ] is a probability, while x is the individual’s continuous position.
Table 2. Transfer functions (S-shaped and V-shaped); T ( x ) [ 0 , 1 ] is a probability, while x is the individual’s continuous position.
NameFormulaRationale (Reason/Justification)
S1 T ( x ) = 1 1 + e 2 x Steeper logistic: More decisive mapping of the sign and magnitude of x; yields higher flip probabilities for moderate | x | and accelerates early exploration without saturating too quickly.
S2 T ( x ) = 1 1 + e x Standard logistic: Balanced and stable mapping commonly used as a baseline; provides moderate flip probabilities across a wide range of | x | and promotes steady convergence.
S3 T ( x ) = 1 1 + e x / 2 Smoother logistic: Gentler slope that damps abrupt changes in probability; reduces over-correction and oscillations, which helps to avoid spurious bit flips in noisy updates.
S4 T ( x ) = 1 1 + e x / 3 More conservative: Slower growth that delays bit fixing and mitigates premature convergence; favors exploitation in later stages while keeping low probability for small | x | .
V1 T ( x ) = erf 2 π   x Very smooth in | x | : Near-linear response around the origin with gradual saturation; allows fine-grained probability modulation for small and medium | x | .
V2 T ( x ) = | tanh ( x ) | Fast rise and saturation: Probability increases quickly once | x | grows and then plateaus; useful for decisive updates and rapid transitions from exploration to exploitation.
V3 T ( x ) = | x |   1 + x 2   Controlled monotone growth: Strictly increasing with horizontal asymptote at 1; avoids early saturation while keeping a smooth derivative, yielding stable adjustments.
V4 T ( x ) = 2 π arctan   π 2   | x | Intermediate curvature: Compromise between the speed of V2 and the smoothness of V1; the monotone bounded slope provides a good tradeoff for general-purpose use.
Table 3. Summary of binarization rules (STD, COM, PS, ELIT, ELITR). Transfer function T ( x ) [ 0 , 1 ] ; random variate rand U ( 0 , 1 ) .
Table 3. Summary of binarization rules (STD, COM, PS, ELIT, ELITR). Transfer function T ( x ) [ 0 , 1 ] ; random variate rand U ( 0 , 1 ) .
Rule (Acronym)EquationAdvantages
Standard (STD)(9)Simple and unbiased; flip probability controlled directly by T ( x ) ; stable baseline and easy to tune.
Complement (COM)(10)Adds diversity by flipping current bit under control of T ( ) ˙ ; helps to escape local minima.
Static Probability (PS)(11)Noise-robust thresholds; preserves bit in a middle band; α tunes conservativeness.
Elitist (ELIT)(12)Bias towards current best; faster convergence and fewer late random oscillations.
Elitist Roulette (ELITR)(13)Uses elite set via fitness-proportional sampling; balances exploitation and diversity.
Table 4. Binarization rules. Transfer function T ( x ) [ 0 , 1 ] ; rand U ( 0 , 1 ) .
Table 4. Binarization rules. Transfer function T ( x ) [ 0 , 1 ] ; rand U ( 0 , 1 ) .
Binarization Functions.
(a)
Standard (STD). Equation (9)
(b)
Complement (COM). Equation (10)
(c)
Probability (PS). Equation (11)
(d)
Elitist (ELIT). Equation (12)
(e)
Elitist Roulette (ELITR). Equation (13)
Table 5. Description of the OR-Library SCP benchmark sets, including the number of instances, problem size, cost range, density, and optimal solution status.
Table 5. Description of the OR-Library SCP benchmark sets, including the number of instances, problem size, cost range, density, and optimal solution status.
Instance FamilyNumber of InstancesmnCost RangeDensity (%)Optimal Solution
4102001000[1, 100]2.00known
5102002000[1, 100]2.00known
652001000[1, 100]5.00known
A53003000[1, 100]2.00known
B53003000[1, 100]5.00known
C54004000[1, 100]2.00known
D54004000[1, 100]5.00known
NRE55005000[1, 100]10.00known
NRF55005000[1, 100]20.00known
NRG5100010,000[1, 100]2.00unknown
NRH5100010,000[1, 100]5.00unknown
Table 6. Comprehensive summary of BAOA results per SCP instance set (V3–ELIT) over 100 iterations, as used in the parameter-setting experiments.
Table 6. Comprehensive summary of BAOA results per SCP instance set (V3–ELIT) over 100 iterations, as used in the parameter-setting experiments.
InstancemnDensity (%)OptMinMaxAvgBest RPD (%)Total Time (min)
scp4120010002.0429433463444.750.937.62
scp5120020002.0512524563535.092.3412.53
scp6120010005.0138141151144.252.175.61
scpa130030002.0253267278269.475.5325.52
scpb130030005.0279284306294.351.7917.88
scpc140040002.0146160152150.589.5948.12
scpd140040005.060606562.470.0030.87
scpnre1500500010.029293129.460.0039.74
scpnrf1500500020.014151514.287.1435.66
scpnrg11000100002.063646966.641.59326.13
scpnrh11000100005.055556057.550.00197.25
Table 7. BAOA parameter settings.
Table 7. BAOA parameter settings.
ParameterValue
L B 1
U B −1
M _ I t e r 100 for Setting Parameter/500 for experiments
PPopulation size: 150 for Setting Parameter/200 for experiments
Number of executions31
M i n 0.2
M a x 1.0.
α α = 5 .
r 1 , r 2 , r 3 , μ A random number in [ 0 , 1 ]
ε 10 8
Table 8. BAOA results on SCP (Group 1). Columns: Opt, Min (best), Max, Avg, CV, and RPD.
Table 8. BAOA results on SCP (Group 1). Columns: Opt, Min (best), Max, Avg, CV, and RPD.
InstOptMinMaxAvgCVRPD
scp41429433463444.752.440.93
scp42512524563535.091.812.34
scp43516520567528.252.160.78
scp44494500543519.822.591.21
scp45512518563537.293.401.17
scp46560565615585.162.930.89
scp47430432472447.283.150.47
scp48492493533510.223.090.20
scp49641653705673.991.711.87
scp410514517556536.922.370.58
scp51253267278269.470.965.53
scp52302315332322.941.294.30
scp53226232246237.682.292.65
scp54242244265255.462.530.83
scp55211212232221.483.410.47
scp56213216234225.211.951.41
scp57293297322309.342.461.37
scp58288290316302.252.390.69
scp59279284306294.352.481.79
scp510265273291280.162.113.02
scp61138141151144.251.652.17
scp62146148160152.581.871.37
scp63145148159150.681.682.07
scp64131135144138.362.143.05
scp65161168177174.201.114.35
scpa1253257278263.982.821.58
scpa2252258277264.161.212.38
scpa3232238255243.871.282.59
scpa4234236257241.282.220.85
scpa5236237259246.142.980.42
scpb169697571.772.650.00
scpb276768378.543.700.00
scpb380808782.642.380.00
Table 9. BAOA results on SCP (Group 2). Columns: Opt, Min (best), Max, Avg, CV, and RPD.
Table 9. BAOA results on SCP (Group 2). Columns: Opt, Min (best), Max, Avg, CV, and RPD.
InstOptMinMaxAvgCVRPD
scpb479798682.001.980.00
scpb572727874.593.050.00
scpc1227231249237.531.591.76
scpc2219221240228.102.200.91
scpc3243245267252.882.150.82
scpc4219224240230.241.732.28
scpc5215216233225.892.580.47
scpd160606562.472.200.00
scpd266677269.172.421.52
scpd372737976.121.781.39
scpd462626864.503.180.00
scpd561626763.731.741.64
scpnre129293129.461.700.00
scpnre230303231.332.440.00
scpnre327272928.131.470.00
scpnre428283028.992.390.00
scpnre528283028.712.620.00
scpnrf114141514.283.130.00
scpnrf215151615.493.230.00
scpnrf314141514.882.190.00
scpnrf414141514.573.400.00
scpnrf513131414.000.470.00
scpnrg1176178193185.241.931.14
scpnrg2154158169162.711.462.60
scpnrg3166170182176.421.772.41
scpnrg4168172184178.271.402.38
scpnrg5168169184177.781.750.60
scpnrh163646966.642.351.59
scpnrh263646966.642.001.59
scpnrh359606462.311.551.69
scpnrh458596361.521.651.72
scpnrh555556057.552.470.00
Table 10. Average RPD results, 95% confidence intervals, and Coefficient of Variation (CV) (Group 1).
Table 10. Average RPD results, 95% confidence intervals, and Coefficient of Variation (CV) (Group 1).
InstanceRPD MeanRPD 95% CICV
scp412.6107[2.2333, 2.9881]0.1164
scp4102.5292[2.0167, 3.0416]0.1632
scp426.3281[5.8252, 6.8310]0.0640
scp432.9845[2.5154, 3.4536]0.1266
scp444.4534[3.4963, 5.4105]0.1731
scp455.6250[4.7439, 6.5061]0.1262
scp462.4643[2.1000, 2.8286]0.1191
scp472.8837[2.1035, 3.6639]0.2179
scp482.4390[2.0821, 2.7959]0.1179
scp495.9594[5.4219, 6.4970]0.0726
scp517.1146[6.5135, 7.7157]0.0680
scp5105.3585[4.9665, 5.7505]0.0589
scp528.2781[7.7746, 8.7817]0.0490
scp533.8938[3.4341, 4.3535]0.0951
scp544.2975[3.8386, 4.7564]0.0860
scp554.2654[3.5447, 4.9861]0.1361
scp564.6948[3.0984, 6.2913]0.2739
scp575.1877[4.9982, 5.3772]0.0294
scp584.0278[2.6441, 5.4114]0.2767
scp594.1577[3.4828, 4.8326]0.1307
scp613.6232[2.5212, 4.7252]0.2449
scp625.3425[4.4108, 6.2741]0.1404
scp632.7586[2.7586, 2.7586]0.0000
scp645.4962[4.2604, 6.7320]0.1811
scp6510.0621[9.4169, 10.7074]0.0516
scpa14.5059[3.8475, 5.1644]0.1177
scpa24.8413[4.4290, 5.2535]0.0686
scpa35.5172[4.6378, 6.3967]0.1284
scpa44.8718[3.4381, 6.3055]0.2370
scpa54.4915[3.8916, 5.0914]0.1076
scpb12.3188[1.3332, 3.3045]0.3423
scpb20.7895[−0.1054, 1.6843]0.9129
Table 11. Average RPD results, 95% confidence intervals, and Coefficient of Variation (CV) (Group 2).
Table 11. Average RPD results, 95% confidence intervals, and Coefficient of Variation (CV) (Group 2).
InstanceRPD MeanRPD 95% CICV
scpb31.2500[1.2500, 1.2500]0.0000
scpb43.5443[2.2293, 4.8593]0.2988
scpb50.8333[−0.1112, 1.7779]0.9129
scpc16.2555[5.7979, 6.7132]0.0589
scpc26.5753[5.7155, 7.4352]0.1053
scpc33.3745[2.7083, 4.0407]0.1590
scpc47.1233[6.8127, 7.4338]0.0351
scpc54.0930[3.6098, 4.5762]0.0951
scpd16.0000[4.1490, 7.8510]0.2485
scpd21.5152[1.5152, 1.5152]0.0000
scpd36.6667[4.7775, 8.5558]0.2282
scpd40.6452[−0.4518, 1.7421]1.3693
scpd54.2623[3.1474, 5.3772]0.2107
scpnre10.0000[0.0000, 0.0000]nan
scpnre24.0000[−0.5339, 8.5339]0.9129
scpnre33.7037[3.7037, 3.7037]0.0000
scpnre40.7143[−1.2689, 2.6975]2.2361
scpnre50.0000[0.0000, 0.0000]nan
scpnrf10.0000[0.0000, 0.0000]nan
scpnrf20.0000[0.0000, 0.0000]nan
scpnrf31.4286[−2.5378, 5.3949]2.2361
scpnrf40.0000[0.0000, 0.0000]nan
scpnrf57.6923[7.6923, 7.6923]0.0000
scpnrg17.2727[6.3529, 8.1926]0.1019
scpnrg26.1039[5.6623, 6.5455]0.0583
scpnrg37.8313[6.2446, 9.4181]0.1632
scpnrg47.8571[7.0475, 8.6668]0.0830
scpnrg57.2619[6.4523, 8.0715]0.0898
scpnrh26.3492[4.9556, 7.7428]0.1768
scpnrh35.0847[5.0847, 5.0847]0.0000
scpnrh45.8621[4.6895, 7.0346]0.1611
scpnrh52.5455[1.3089, 3.7820]0.3912
Table 12. Average time: Average seconds per iteration. No-progress iteration: The iteration at which fitness shows no improvement. Stagnation ratio: No-progress iteration/total iterations.
Table 12. Average time: Average seconds per iteration. No-progress iteration: The iteration at which fitness shows no improvement. Stagnation ratio: No-progress iteration/total iterations.
InstanceAvg. Time (s)No-Progress IterationStagnation Ratio
scp413.30216032%
scp515.374015030%
scp612.3456112.2%
scpa110.819459%
scpb110.129275.4%
scpc127.11320140.2%
scpd164.522142.8%
Table 13. Comparative performance analysis of the evaluated metaheuristics.
Table 13. Comparative performance analysis of the evaluated metaheuristics.
MHAvg Min RPDBest InstancesAvg Rank
BAOA1.51212.36
SCA2.25151.67
PSA1.8361.84
GWO2.1321.80
BGO2.1511.93
Table 14. Performance comparison between the BAOA and recent metaheuristics (SCA, PSA, GWO, BGO) on benchmark SCP instances. The table reports the best cost and the RPD (%) for each method; lower values are better for both metrics, highlighting the BAOA’s competitiveness across instances.
Table 14. Performance comparison between the BAOA and recent metaheuristics (SCA, PSA, GWO, BGO) on benchmark SCP instances. The table reports the best cost and the RPD (%) for each method; lower values are better for both metrics, highlighting the BAOA’s competitiveness across instances.
InstOptBAOASCAPSAGWOBGO
MinAvgRPDMinAvgRPDMinAvgRPDMinAvgRPDMinAvgRPD
41429433444.750.93431433.750.466431433.780.466433434.00.932433433.030.932
42512517536.920.58523527.021.48517528.290.977518526.5511.72518525.1011.72
43516524535.092.34520521.060.775520521.470.775520520.880.775520520.410.775
44494520528.250.78496504.454.049496506.582.142499505.421.012499504.481.012
45512500519.821.21514518.290.391518519.681.172518518.131.172518518.131.172
46560518537.291.17564567.810.714565569.00.893565567.770.714567567.181.250
47430505585.160.89432434.290.465433434.260.698432434.00.465433433.970.698
48492432447.280.47493494.060.203493493.840.203492493.840.203492493.840.203
49641493510.220.20655663.7721.84656667.5223.40654662.7720.28653662.1018.72
410514653673.991.87517522.680.584517523.420.973517523.420.973517524.060.584
51253267269.475.53267267.775.53257267.031.58267267.485.53267267.485.53
52302315322.944.30315319.504.30313319.123.64315319.094.30315319.094.30
53226232237.682.65230232.031.77229231.841.33232232.002.652322322.65
54242244255.460.83244248.320.83244247.900.83244248.100.83244248.090.82
55211212221.480.47212214.450.47212213.420.47212213.060.47212213.060.47
56213216225.211.41216223.351.41216223.351.41216221.901.41216221.901.40
57293297309.341.37296302.191.02297301.811.37299301.292.05299301.292.04
58288290302.250.69290297.520.69290297.610.69290297.390.69290297.380.69
59279284294.351.79284288.131.79284288.261.79284286.231.79284286.221.79
510265273280.163.02272274.422.64272273.872.64273274.033.02273274.033.01
61138141143.392.17141144.102.17141143.032.17141142.232.17141142.232.17
62146148150.481.37148151.061.37148150.101.37148150.421.37148150.421.37
63145148149.232.07148150.032.07147149.231.38148148.612.07148148.612.07
64131134135.392.29135135.393.05135135.133.05134135.232.29134135.232.29
65161172174.876.83165174.812.48172174.526.83171174.486.21171174.486.21
a1253257263.981.58257257.541.58257257.671.58257257.671.58257257.061.58
a2252258264.162.38258262.252.38258263.122.38258261.382.38258261.122.38
a3232238243.872.592352411.29236241.771.72237240.832.15235240.321.29
a2234236241.280.85236237.480.85236237.060.85236236.740.85236236.610.85
a5236237246.140.42237239.320.42237238.670.42237238.770.42237238.450.42
b1697678.540.16970.4806970.6406970.2506970.220
b2768082.640.057676.5807677.1607676.3507676.190
b3808082.00.08081.2208081.2508081.1208181.161.25
b4797974.590.07981.0907981.8007980.5807980.510
b5727274.590.07272.3807272.5407272.2907272.540
c1227231237.531.76232234.092.20231234.351.76232233.512.20232233.412.20
c2219221228.100.91221224.510.91221225.000.91221224.160.91221223.740.91
c3243245252.880.82245249.770.82247252.251.64245248.030.82245247.770.82
c4219224230.242.28224226.962.28224228.832.28221226.580.91222225.511.36
c5215216225.890.47217219.610.93216219.510.46216218.830.46216219.060.46
d1606062.4700.00060619.3550.00060618.0650.0006062.1290.00060621.6131.6667
d2666769.1701.52067682.2581.515267680.9681.51526768.1291.515267677.7421.5152
d3727376.1201.39073758.0651.388974762.9031.388974756.7742.777874758.3872.7778
d4626264.5000.00062630.9680.00062636.7740.00062632.5810.00062628.3870.000
d5616263.7301.64063631.6133.278763632.9031.639363632.9033.278763630.3233.2787
Table 15. Normality tests (Shapiro–Wilk and Kolmogorov–Smirnov–Lilliefors) applied to the differences between the BAOA and other algorithms (RPD); p < 0.05 indicates rejection of normality.
Table 15. Normality tests (Shapiro–Wilk and Kolmogorov–Smirnov–Lilliefors) applied to the differences between the BAOA and other algorithms (RPD); p < 0.05 indicates rejection of normality.
SetTestSCAPSAGWOBGO
scp4xShapiroW = 0.704, p = 0.011W = 0.995, p = 0.994W = 0.674, p = 0.005W = 0.674, p = 0.005
Lilliestat = 0.342, p = 0.052stat = 0.155, p = 0.960stat = 0.430, p = 0.002stat = 0.430, p = 0.002
scp5xShapiroW = 0.552, p = 0.0001W = 0.806, p = 0.091W = 1.000, p = 1.000W = 0.552, p = 0.0001
Lilliestat = 0.473, p = 0.001stat = 0.267, p = 0.308stat = 0.473, p = 0.001
scp6xShapiroW = 0.682, p = 0.006W = 0.882, p = 0.320W = 0.552, p = 0.0001W = 0.552, p = 0.0001
Lilliestat = 0.436, p = 0.001stat = 0.311, p = 0.129stat = 0.473, p = 0.001stat = 0.473, p = 0.001
scpaShapiroW = 0.552, p = 0.0001W = 0.552, p = 0.0001W = 0.552, p = 0.0001W = 0.552, p = 0.0001
Lilliestat = 0.473, p = 0.001stat = 0.473, p = 0.001stat = 0.473, p = 0.001stat = 0.473, p = 0.001
scpbShapiroW = 0.771, p = 0.046W = 0.771, p = 0.046W = 0.771, p = 0.046W = 0.620, p = 0.001
Lilliestat = 0.349, p = 0.044stat = 0.349, p = 0.044stat = 0.349, p = 0.044stat = 0.448, p = 0.001
scpcShapiroW = 0.698, p = 0.009W = 0.562, p = 0.0002W = 0.767, p = 0.043W = 0.828, p = 0.134
Lilliestat = 0.367, p = 0.025stat = 0.470, p = 0.001stat = 0.402, p = 0.008stat = 0.370, p = 0.024
scpdShapiroW = 0.555, p = 0.0001W = 0.745, p = 0.027W = 0.731, p = 0.020W = 0.758, p = 0.035
Lilliestat = 0.472, p = 0.001stat = 0.344, p = 0.049stat = 0.366, p = 0.027stat = 0.299, p = 0.174
Table 16. Wilcoxon signed-rank test p-values for the BAOA compared with other algorithms (RPD); a value of ns indicates p 0.05 (no significant difference).
Table 16. Wilcoxon signed-rank test p-values for the BAOA compared with other algorithms (RPD); a value of ns indicates p 0.05 (no significant difference).
SetSCAPSAGWOBGO
scp4x0.812 (ns)0.812 (ns)0.812 (ns)0.812 (ns)
scp5x0.317 (ns)0.109 (ns)NA0.317 (ns)
scp6x0.655 (ns)0.655 (ns)0.317 (ns)0.317 (ns)
scpa0.317 (ns)0.317 (ns)0.317 (ns)0.317 (ns)
scpb0.180 (ns)0.180 (ns)0.180 (ns)1.000 (ns)
scpc0.180 (ns)0.655 (ns)0.593 (ns)0.593 (ns)
scpd1.000 (ns)0.109 (ns)0.285 (ns)0.144 (ns)
Table 17. Computational complexity of the BAOA per SCP instance set. The general complexity is O ( T · P · m · n ) , with T = 100 iterations and P = 200 individuals.
Table 17. Computational complexity of the BAOA per SCP instance set. The general complexity is O ( T · P · m · n ) , with T = 100 iterations and P = 200 individuals.
Instance SetmnBig-OComplexity (Numerical)
scp412001000 O ( m n ) 4.0 × 10 9
scp512002000 O ( m n ) 8.0 × 10 9
scp612001000 O ( m n ) 4.0 × 10 9
scpa13003000 O ( m n ) 1.8 × 10 10
scpb13003000 O ( m n ) 1.8 × 10 10
scpc14004000 O ( m n ) 3.2 × 10 10
scpd14004000 O ( m n ) 3.2 × 10 10
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Crawford, B.; Soto, R.; Caballero, H.; Astorga, G.; Cisternas-Caneo, F.; Solís-Piñones, F.; Giachetti, G. An Experimental Study of Transfer Functions and Binarization Strategies in Binary Arithmetic Optimization Algorithms for the Set Covering Problem. Mathematics 2025, 13, 3129. https://doi.org/10.3390/math13193129

AMA Style

Crawford B, Soto R, Caballero H, Astorga G, Cisternas-Caneo F, Solís-Piñones F, Giachetti G. An Experimental Study of Transfer Functions and Binarization Strategies in Binary Arithmetic Optimization Algorithms for the Set Covering Problem. Mathematics. 2025; 13(19):3129. https://doi.org/10.3390/math13193129

Chicago/Turabian Style

Crawford, Broderick, Ricardo Soto, Hugo Caballero, Gino Astorga, Felipe Cisternas-Caneo, Fabián Solís-Piñones, and Giovanni Giachetti. 2025. "An Experimental Study of Transfer Functions and Binarization Strategies in Binary Arithmetic Optimization Algorithms for the Set Covering Problem" Mathematics 13, no. 19: 3129. https://doi.org/10.3390/math13193129

APA Style

Crawford, B., Soto, R., Caballero, H., Astorga, G., Cisternas-Caneo, F., Solís-Piñones, F., & Giachetti, G. (2025). An Experimental Study of Transfer Functions and Binarization Strategies in Binary Arithmetic Optimization Algorithms for the Set Covering Problem. Mathematics, 13(19), 3129. https://doi.org/10.3390/math13193129

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop