Next Article in Journal
Towards Biomimetic Robotic Rehabilitation: Pilot Study of an Upper-Limb Cable-Driven Exoskeleton in Post-Stroke Patients
Next Article in Special Issue
Multi-Strategy Improved Pelican Optimization Algorithm for Engineering Optimization Problems and 3D UAV Path Planning
Previous Article in Journal
Quantifying Nature’s Bistability: Simulation of Earwig Fan Folding
Previous Article in Special Issue
IBKA-MSM: A Novel Multimodal Fake News Detection Model Based on Improved Swarm Intelligence Optimization Algorithm, Loop-Verified Semantic Alignment and Confidence-Aware Fusion
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Binary Pufferfish Optimization Algorithm for Combinatorial Problems

by
Broderick Crawford
1,*,
Álex Paz
2,
Ricardo Soto
1,
Álvaro Peña Fritz
2,
Gino Astorga
3,
Felipe Cisternas-Caneo
1,
Claudio Patricio Toledo Mac-lean
1,
Fabián Solís-Piñones
1,
José Lara Arce
1 and
Giovanni Giachetti
4
1
Escuela de Ingeniería Informática, Pontificia Universidad Católica de Valparaíso, Avenida Brasil 2241, Valparaíso 2362807, Chile
2
Escuela de Ingeniería de Construcción y Transporte, Pontificia Universidad Católica de Valparaíso, Avenida Brasil 2147, Valparaíso 2362804, Chile
3
Escuela de Negocios Internacionales, Universidad de Valparaíso, Alcalde Prieto Nieto 452, Viña del Mar 2572048, Chile
4
Facultad de Ingeniería, Universidad Andres Bello, Antonio Varas 880, Providencia, Santiago 7591538, Chile
*
Author to whom correspondence should be addressed.
Biomimetics 2026, 11(1), 10; https://doi.org/10.3390/biomimetics11010010
Submission received: 27 October 2025 / Revised: 12 December 2025 / Accepted: 17 December 2025 / Published: 25 December 2025
(This article belongs to the Special Issue Advances in Biological and Bio-Inspired Algorithms)

Abstract

Metaheuristics are a fundament pillar of Industry 4.0, as they allow for complex optimization problems to be solved by finding good solutions in a reasonable amount of computational time. One category of important problems in modern industry is that of binary problems, where decision variables can take values of zero or one. In this work, we propose a binary version of the Pufferfish optimization algorithm (BPOA), which was originally created to solve continuous problems. The binary mapping follows a two-step technique, first transforming using transfer functions and then discretizing using binarization rules. We study representative pairings of transfer functions and binarization rules, comparing our algorithm with Particle Swarm Optimization, Secretary Bird Optimization Algorithm, and Arithmetic Optimization Algorithm with identical computational budgets. To validate its correct functioning, we solved binary problems present in industry, such as the Set Covering Problem together with its Unicost variant, as well as the Knapsack Problem. The results we achieved with regard to these problems were promising and statistically validated. The tests performed on the executions indicate that many pair differences are not statistically significant when both methods are already close to the optimal level, and significance arises precisely where the descriptive gaps widen, underscoring that transfer–rule pairing is the main performance factor. BPOA is a competitive and flexible framework whose effectiveness is mainly governed by the discretization design.
MSC:
68T20; 68W25; 90C27; 90C59; 68Q25

Graphical Abstract

1. Introduction

In today’s industry, there are significant combinatorial optimization problems such as the following: parameter optimization for cost prediction [1] (the optimization of reaction processes is crucial for the green, efficient, and sustainable development of the chemical industry [2]), optimization and robot path planning [3], and the optimization of parameters for monitoring in mining [4]. In these cases, metaheuristics are a tool for solving these problems, applying different algorithms as alternatives to exact methods. Methaheuristics are a real alternative when the problem is at a large scale, as their time is usually polynomial, achieving good solutions in a reasonable amount of time [5]. In general, metaheuristics can be applied to a wide variety of problems and have the flexibility to adapt to dynamic environments, making them suitable for different domains. These features make them highly appealing for solving real-world problems across multiple fields, including logistics [6,7], manufacturing [8,9], transportation [10,11], healthcare [12,13], and mining [14,15], among others.
However, there are another types of problems called binary problems, where the choice is to activate or deactivate a process, assign or not assign a task, or turn a machine on or off, among others. In general, these types of problems are NP-hard, which means that for large instances there are no efficient exact algorithms, meaning metaheuristics are a good-quality alternative solution with reasonable processing time. Binary metaheuristics have made contributions in a variety of industrial fields: in the logistics chain in general; in logistics in particular with regard to the allocation of routes and vehicles; in production planning when deciding which product to manufacture in different periods [16]; in the selection of financial asset portfolios under restrictions [17]; in the Crew Scheduling Problem in different areas such as maritime, land, and air where pilots, flight attendants, and drivers are assigned, taking into account a series of restrictions with the aim of minimizing costs and ensuring operations [18]; in the Workflow Scheduling in cloud computing data centers, with the aim of minimizing execution cost, execution time, and energy consumption [19]; in the security audit trail analysis problem where metaheuristics are used to improve the quality of intrusion detection [20]; in [21], a Z-shaped transfer function was used to solve the Knapsack Problem present in the industry; in [22], where a clustering-based binarization mechanism is explored to solve the Set Covering Problem, which allows modeling real-world problems where the goal is to minimize costs and maximize coverage; and in [23], where a robust Crow Search Algorithm (CSA) is proposed to solve both the optimal location of PMUs and the optimal static estimation for the entire electrical power system.
Exact algorithms (Branch and Bound or formulations based on mixed integer programming) can guarantee global optimality when the gap is zero, indicating that there is no better solution. However, these methods can have exponential behavior in the worst case for NP-complete problems, allowing metaheuristics to be an alternative solution at a lower computational cost, using exact solutions as a reference when they are available.
Within this landscape, the 0–1 Knapsack Problem (KP), the Set Covering Problem (SCP), and its unicost variant (USCP) are canonical NP-hard problems and are present in various industries [24]; notably, KP and SCP (and thus USCP) are among the 21 problems mentioned by Karp [25], and widely used as benchmarks due to their prevalence in real decision-making settings (KP) in resource selection under capacity constraints, and (SCP/USCP) in coverage- and facility-type decisions.
The use of metaheuristics to solve the KP and SCP includes algorithms such as Genetic Algorithms [26], Particle Swarm Optimization [27], the Secretary Bird Optimization Algorithm [28], the Whale Optimization Algorithm [29], the Grey Wolf Optimizer [30], the Arithmetic Optimization Algorithm [31], and the Fuzzy Hunter Optimizer [32], among others. In particular, binarization techniques have been explored to adapt metaheuristics designed for continuous optimization problems to the binary domain.
The presence of binary optimization problems in industry [33] and the use of metaheuristics leads us to take two practical approaches: on the one hand, it leads us to use algorithms created to work natively on these problems and, on the other hand, to use algorithms that were originally created to work in continuous spaces and to adapt them to work in binary spaces. Our work focuses on the second alternative, as we aim to offer a wider range of solutions for algorithms that were originally built for continuous spaces, allowing them to work in discrete environments. This is justified in order not to waste the maturity acquired by operators, such as the balance between exploration and exploitation, where POA achieves an effective balance [34,35].
The Pufferfish Optimization Algorithm (POA) is a recent bio-inspired metaheuristic that models exploration and exploitation via predator–prey dynamics and a defensive mechanism, showing competitive performance on continuous optimization tasks [36]. To apply POA (and, more generally, continuous metaheuristics) in binary combinatorial spaces such as KP and SCP, a binarization stage is required. A widely adopted approach is the two-step scheme: (i) a transfer function maps the continuous search outputs into [ 0 , 1 ] , and (ii) a binarization rule discretizes them into { 0 , 1 } [37,38]. Transfer functions are commonly grouped into two families with distinct behaviors: S-shaped (probabilistic switching) and V-shaped (bit-flip likelihood tied to movement magnitude) [37,38]. When coupled with standard discretization rules (e.g., probabilistic STD and elitist ELIT), these functions induce distinct exploration–exploitation trade-offs within the binary search space. To provide context and comparison, PSO, AOA, and SBOA serve as standard baselines due to their well-documented behavior and established binary adaptations [27].
This work investigates how the transfer function family (S-shaped vs. V-shaped) affects the performance of a binary POA (BPOA) across maximization and minimization problem classes. For KP (maximization), we compare S1-STD versus V1-STD; for SCP and USCP (minimization), we contrast S3-ELIT versus V3-ELIT.
Our study provides a controlled comparison that clarifies the algorithmic implications of S- vs. V-shaped dynamics in BPOA and offers practical guidance for selecting transfer–rule pairs according to problem type. Concretely, our contributions are as follows: a systematic S vs. V assessment of BPOA on KP and SCP/USCP using transfer–rule combinations grounded in the prior binarization literature [37,38], and an empirical analysis against a standard baseline (PSO, AOA, and SBOA) to contextualize the performance patterns [27].
This article is organized as follows. Section 2 presents the 0–1 Knapsack Problem and Set Covering Problem. Section 3 discusses how to resolve combinatorial problems with continuos metaheuristics. Section 4 reviews the Pufferfish Optimization Algorithm. Section 5 describes explains how and make the binary version of POA. Finally, we present our results, discussions, conclusions, and possible future lines of research in Section 6, Section 7 and Section 8.

2. Combinatorial Problems

In this section, we present the combinatorial problems used in our work: the 0–1 KnapSack Problem, Set Covering Problem, and Unicost Set Covering Problem. Solving these problems in the context of Industry 4.0 is very important, as they constitute a basic abstraction of problems present in the industry, such as: efficient resource allocation, the efficient planning of process activities, optimal supply chain management, the optimization of sensor placement and key actions in smart industry, and route planning to ensure customer coverage, among others. Consequently, these problems define a path to practical solutions in the new industrial revolution, the study and understanding of which facilitates real-time decision-making, a key element for competitiveness in today’s world.
The Industry 4.0, which is associated with the fourth industrial revolution, constantly challenges us to improve [39,40]. Its essence lies in automated and interconnected industrial production, where technology plays a central role. Its main objective is to create highly connected, flexible, and autonomous smart industries. Industry 4.0 aims to achieve maximum production efficiency alongside agile and flexible processes with a high capacity for adaptation, optimizing the use of resources at the lowest possible cost while maintaining quality [41]. Among its fundamental pillars are the following:
  • The Internet of Things (IoT). This allows different devices such as machines, sensors, tools, and products to be connected for the purpose of obtaining real-time data [42].
  • Big Data and Analytics. This allows you to store and analyze large volumes of collected data, enabling you to make preventive decisions. [43].
  • Automation and Advanced Robotics. These facilitate or replace repetitive tasks performed by humans [44].
  • Cloud computing. This enables cloud storage and processing, allowing fast and secure access [45].
  • Cybersecurity. Given the current state of digital interconnection, it is necessary to protect data to avoid risks to the industry [46].
  • Additive Manufacturing. This allows objects to be created digitally before being transferred to physical form, thereby preventing errors and losses [47].
  • Augmented Reality. Allows you to simulate scenarios for staff training or product improvements under special conditions [48].
Optimization is fundamental in Industry 4.0, as the data generated allows for the improvement of different industrial processes, reducing waste and improving quality and efficiency [40,49,50]. In this sense, metaheuristics are a key tool for tackling real industrial problems, by finding efficient solutions in a timely manner [51,52].

2.1. 0–1 Knapsack Problem

The Knapsack Problem (KP) is a classic binary combinatorial optimization problem that falls into the category of NP-hard problems. Its primary objective is to select a subset of items that maximizes the total value without exceeding a predefined maximum capacity.

2.1.1. Formal Mathematical Formulation

Formally, let O = { o 1 , o 2 , , o n } be a set of n available items, where each item o i has an associated value v i and weight w i . Additionally, let W be the maximum weight capacity that the knapsack can hold. The problem consists of identifying an optimal subset of items that maximizes the total value without exceeding the maximum capacity W.
To model and computationally solve this problem, the formal set-based definition translates into a mathematical formulation using binary variables. We introduce the binary variable x i , which takes the value of one if the item o i is selected to be included in the knapsack, and the value of zero otherwise.
Thus, the primary objective is to maximize the total value of the selected items, summing only the values of the included items, as indicated by Equation (1).
max i = 1 n v i x i
The main constraint of the problem is the weight constraint, which ensures that the sum of the weights of the selected items does not exceed the maximum capacity W. This is represented by the following equation:
i = 1 n w i x i W
Additionally, it must be ensured that the decision variable is binary:
x i { 0 , 1 } , i = 1 , , n

2.1.2. KP Practical Example

Suppose a process plant has a planned shutdown window of W = 10 h to service a bottleneck machine. Each maintenance task o i requires a certain duration (hours) and yields an expected benefit (e.g., avoided downtime or cost savings). The decision is binary: execute the task ( x i = 1 ) or skip it ( x i = 0 ). The goal is to maximize the total benefit without exceeding W.

2.1.3. How the Optimal Set Is Obtained

To compute an optimal selection under the shutdown limit W = 10 h, we can use the classical dynamic programming (DP) scheme for the 0–1 Knapsack. Let w i and v i denote the duration (hours) and the benefit of task i, respectively. Define
DP [ i , t ] = max { total value using the first i tasks within t hours } ,
with base cases DP [ 0 , t ] = 0 for all t [ 0 , W ] . The recurrence is
DP [ i , t ] = max DP [ i 1 , t ] , v i + DP [ i 1 , t w i ] , if w i t , DP [ i 1 , t ] , if w i > t .
After filling the table up to DP [ n , W ] , the selected tasks are recovered by backtracking; if DP [ i , t ] DP [ i 1 , t ] , then task i is chosen ( x i = 1 ) and we set t t w i ; otherwise task i is skipped ( x i = 0 ). This yields an optimal set in O ( n W ) time.
Multiple Optimal Solutions in This Instance
For the maintenance data in Table 1 (Section 2), the optimal value is DP [ 6 , 10 ] = 160 . There are several optimal sets achieving this value, such as the following examples:
  • Backup motor replacement (5 h, 80);
  • Shaft alignment (3 h, 50);
  • Advanced lubrication (2 h, 30);
  • Backup motor replacement (5 h, 80);
  • Belt replacement (4 h, 65);
  • PLC update (1 h, 15);
  • Shaft alignment (3 h, 50);
  • Belt replacement (4 h, 65);
  • Advanced lubrication (2 h, 30);
  • PLC update (1 h, 15).
In the example shown previously we reported one of these optimal sets.

2.1.4. Sanity Check

To make the optimum “visible” at a glance, Table 2 lists the top feasible combinations (by value) not exceeding W = 10 h. No feasible combination improves upon value 160.
Codes:
  • SA = Shaft alignment;
  • BR = Belt replacement;
  • AL = Advanced lubrication;
  • SC = Sensor calibration;
  • PLC = PLC software update;
  • BMR = Backup motor replacement.
This subsection clarifies both how the optimal solution is computed (DP with backtracking) and what it looks like (there can be multiple optimal sets with the same maximum value).

2.2. Set Covering Problem

The Set Covering Problem (SCP) is a classical NP-hard combinatorial optimization problem. Given a universe of requirements and a collection of candidate subsets (each with an associated cost), the goal is to select a minimum-cost family of subsets that collectively covers every requirement at least once.

2.2.1. Formal Mathematical Formulation

Let U = { u 1 , , u m } be the set of requirements and S = { S 1 , , S n } be a family of subsets S j U , with cost c j 0 . A binary matrix A { 0 , 1 } m × n encodes coverage, where a i j = 1 if u i S j and a i j = 0 otherwise. Using binary decision variables x j { 0 , 1 } to indicate whether subset S j is chosen, the SCP can be stated as follows:
min j = 1 n c j x j s . t . j = 1 n a i j x j 1 i = 1 , , m , x j { 0 , 1 } j .

2.2.2. SCP Practical Example

Consider a pipeline network divided into five critical inspection zones, U = { Z 1 , , Z 5 } . The maintenance team has predefined mobile inspection routes R 1 , , R 6 ; each route covers a subset of zones and has an execution time (cost). The objective is to choose the set of routes that covers all zones in the least total time as shown in Table 3.
Routes and Costs
We denote the cost in hours in parentheses:
R 1 ( 4   h ) , R 2 ( 4   h ) , R 3 ( 5   h ) , R 4 ( 3   h ) , R 5 ( 3   h ) , R 6 ( 2   h ) .

2.2.3. Instance Formulation

Let x j = 1 if route R j is selected, and 0 otherwise. The model becomes
min 4 x 1 + 4 x 2 + 5 x 3 + 3 x 4 + 3 x 5 + 2 x 6
s . t . x 1 + x 3 + x 5 1 ( cover Z 1 ) x 1 + x 2 1 ( cover Z 2 ) x 2 + x 3 1 ( cover Z 3 ) x 2 + x 4 + x 5 1 ( cover Z 4 ) x 3 + x 4 + x 6 1 ( cover Z 5 ) x j { 0 , 1 } j = 1 , , 6 .

2.2.4. Optimal Solution

One optimal solution is to select routes { R 2 , R 3 } with total cost 4 + 5 = 9 h. These two routes jointly cover all zones:
R 2 : { Z 2 , Z 3 , Z 4 } , R 3 : { Z 1 , Z 3 , Z 5 } { Z 1 , , Z 5 } covered .
No single route covers all zones, and any selection of two routes with total cost < 9 is infeasible (for completeness, another minimum-cost solution is { R 2 , R 5 , R 6 } with the same cost 4 + 3 + 2 = 9 h).

2.3. Unicost Set Covering Problem

The unicost variant of the Set Covering Problem (SCP) assumes identical column costs (i.e., c j = 1 for all j J ). Consequently, the objective becomes selecting the fewest columns such that every row is covered at least once. This specialization emphasizes the structural aspect of coverage, abstracting away heterogeneous cost effects.
Mathematically, the model is as follows:
Minimize j J x j
subject to
j J a i j x j 1 for all i I ,
x j { 0 , 1 } for all j J ,
where a i j indicates whether column j covers row i, x j is a binary decision variable (1 if column j is selected; 0 otherwise), I is the set of rows, and J is the set of columns.
As with the general SCP, the unicost case is NP-hard and is widely encountered in applications such as scheduling, logistics, and resource allocation.

3. Continuous Metaheuristics Solving Combinatorial Problems

To deploy the Pufferfish Optimization Algorithm (POA) across multiple binary combinatorial problems, specifically the 0–1 Knapsack Problem (KP), the Set Covering Problem (SCP), and its unicost variant (USCP) the original continuous domain search dynamics must be coupled to a unified binarization layer so that POA operates in { 0 , 1 } n while preserving each problem’s feasibility structure (capacity in KP; coverage in SCP/USCP). As discussed in Section 1, widely used continuous metaheuristics such as the Secretary Bird Optimization Algorithm [28], Arithmetic Optimization Algorithm [31], Grey Wolf Optimizer [30], and Particle Swarm Optimization [53] follow the same adaptation path: a two-step scheme in which (i) a transfer function (e.g., S-shaped or V-shaped) maps real-valued updates to {0,1}, and (ii) a binarization rule (e.g., standard, complement, or elitist) discretizes them into 0/1 decisions. In this work, we adopt that paradigm to endow POA with a common binary search interface and apply it, unchanged, across KP, SCP, and USCP, with only the objective and constraint handling being problem specific.

3.1. Two-Step Technique

In the literature, there are different ways to binarize continuous metaheuristics [38], but the most widely used is the two-step technique [37]. as its name implies, it carries out the binarization process in two phases. In the first phase, a transfer function is applied to convert continuous solutions into the real-valued domain [0,1]. Then, in the second phase, a binarization rule is used to discretize the transferred value, thereby completing the binarization process. Figure 1 provides a general overview of this technique.

3.2. Transfer and Binary Functions

In the literature [38], several transfer functions have been introduced to transform continuous outputs into binary decisions. These are typically divided into two principal categories according to their profile and operational behavior: the S-shaped family and the V-shaped family. Both groups are widely recognized as standard mechanisms for translating a continuous search domain into a discrete one.
  • S-Shaped Functions: Characterized by a sigmoidal curve, these functions output values in the interval [ 0 , 1 ] , which can be interpreted as the likelihood of assigning a ‘1’ to a given component of the solution. Values near zero tend to yield probabilities close to 0.5, whereas large positive or negative inputs drive the probability towards 1 or 0, respectively. This behavior mimics a probabilistic switching process.
  • V-Shaped Functions: Unlike the previous type, these functions link the probability of flipping a bit to the absolute magnitude of the continuous input, regardless of its sign. Small magnitudes lead to a low probability of change, while larger magnitudes increase that probability. This approach is conceptually related to the notion of movement intensity in swarm-based methods, where greater displacement is more likely to modify the current state of the solution.
Table 4 and Figure 2 summarize the representative transfer functions from both families that are frequently adopted in binary optimization studies. In these expressions, d j i denotes the continuous value at the j-th dimension of the i-th candidate, obtained after applying the perturbation defined by the continuous metaheuristic.
Additionally, in the literature [38], we can find five different binarization rules, of which we highlight the following:
  • Standard (STD): If the condition is satisfied, the standard binarization rule returns the value of 1; otherwise, it returns 0. Mathematically, it is defined as follows:
    X new j = 1 if rand T ( d i j ) , 0 else .
  • Elitist (ELIT): The best value is assigned if a random value is within the probability; otherwise, a zero value is assigned. Mathematically, it is defined as follows:
    X new k = X Best k if rand < T ( d i k ) , 0 else .

4. Pufferfish Optimization Algorithm

The Pufferfish Optimization Algorithm (POA) is a bio-inspired metaheuristic proposed in 2024 by Al-Baik et al. [36], based on the natural defensive behavior of the pufferfish against its predators. This algorithm was originally designed to solve continuous optimization problems, using two main phases: exploration (predator attack) and exploitation (defense mechanism), aiming to efficiently find optimal solutions.
The algorithm operates in two primary phases that mimic the natural behavior of the pufferfish:

4.1. Exploration Phase

This phase models the predator attack on the pufferfish, driving a global exploration of the search space. The process is defined as follows:
  • Candidate Prey Selection: Each member of the population acts as a predator. For each predator, the candidate prey (other pufferfish) are randomly selected among those individuals with better objective function values. The candidate prey set C P i for predator i is defined as follows:
    C P i = { X k : F k < F i and k i } , i = 1 , 2 , , N and k { 1 , 2 , , N }
    where
    C P i : The set of candidate prey for the i-th predator;
    X k : The k-th population member, potential prey;
    F k : The objective function value of the k-th population member;
    F i : The objective function value of the i-th predator.
  • Predator Movement Towards Prey: A new position for each predator is calculated in the solution space, simulating movement toward a randomly selected prey from the candidate set. This exploration strategy enables the discovery of promising regions in the search space. The movement is modeled by the following equation:
    x i , j P 1 = x i , j + r i , j · ( S P i , j I i , j · x i , j )
    where
    x i , j P 1 : New position of predator i in dimension j;
    S P i , j : Prey randomly selected from the set C P i ;
    r i , j : A random number uniformly distributed in [ 0 , 1 ] ;
    I i , j : A value randomly chosen as one or two, introducing variability in the movement.
In the implementation of the movement equations (Equations (11) and (12)), the random numbers r i , j are generated from a uniform distribution U ( 0 , 1 ) . The variability parameter I in Phase 1 is randomly selected from a discrete set { 1 , 2 } .

4.2. Exploitation Phase

This phase captures the pufferfish’s defense mechanism against its predators, supporting a refined local search around promising regions:
  • Predator Escape from Inflated Pufferfish: When attacked, the pufferfish inflates into a spiny ball, causing the predator to flee. This escape movement is translated into a local search strategy that helps to refine and exploit promising regions of the search space. The movement is modeled as follows:
    x i , j P 2 = x i , j + ( 1 2 · r i , j ) · u b j l b j t
    where
    x i , j P 2 : New position of predator i in dimension j;
    u b j , l b j : Upper and lower bounds for dimension j;
    t: Current iteration counter;
    r i , j : A random number uniformly distributed in [ 0 , 1 ] .

4.3. Solution Selection

A key aspect of POA is its greedy selection mechanism, similar to those used by other metaheuristics, which ensures continuous improvement or at least the preservation of solutions’ quality.
The quality of each solution is evaluated using the objective function F. After generating a candidate solution (in either the exploration or exploitation phase), the algorithm compares the fitness value F ( X i new ) of the new position X i new with the current value F ( X i ) .
The new solution is accepted only if it offers a better fitness value (i.e., a lower cost in a minimization problem). Otherwise, the current solution is retained. Formally, this is defined with the following update equation:
X i = X i new , if F ( X i new ) F ( X i ) X i , otherwise
where X i new represents a solution generated either by the predator movement or by the pufferfish’s defense mechanism. This update strategy ensures that the global quality of the population improves or at least remains stable in each iteration, thus guiding the search toward optimal solutions.
The pseudocode of POA is detailed in the pseudocode of Algorithm 1.
Algorithm 1 Pseudocode of Pufferfish Optimization Algorithm
Input: Input problem information: variables, objective function, and constraints.
Output: Best solution
1:
Initialize the population randomly.
2:
for  t = 1 T  do
3:
    for  i = 1 N  do
4:
        Exploration Phase:
5:
        Determine the candidate Pufferfish set for the i-th POA member Equation (10).
6:
        Select the target pufferfish for the ith POA member at random.
7:
        Calculate new position of ith POA member using Equation (11)
8:
        Update the i-th Pufferfish using Update Equation (13).
9:
        Exploitation Phase:
10:
        Calculate new position of ith POA member using Equation (12).
11:
        Update the i-th Pufferfish using Update Equation (13).
12:
    end for
13:
    Output the best quasi-optimal solution obtained with the POA.
14:
    Save the best candidate solution so far.
15:
end for
16:
Output the best quasi-optimal solution obtained with the POA.

5. Binary Pufferfish Optimization Algorithm

As explained in Section 4, the Pufferfish Optimization Algorithm (POA) is a metaheuristic originally designed to solve continuous optimization problems. To address combinatorial problems such as KP, SCP, and USCP, it is necessary to transform the solutions into the binary domain.
In this work, following Section 3, the two-step technique is employed, which is one of the most widely used approaches for binarizing continuous metaheuristics [37,38]. In this scheme, the first step corresponds to the application of transfer functions that map continuous values into the interval [ 0 , 1 ] . For this purpose, S-shaped and V-shaped transfer functions are considered, as they provide a good balance between exploration and exploitation.
The second step corresponds to applying binarization rules that discretize the transferred values into zero or one. In this study, two well-known rules are considered: the standard rule (STD), which assigns a binary value based on a probabilistic threshold, and the elitist rule (ELIT), which favors the incorporation of the best solution found in the population.
By combining S-shaped and V-shaped transfer functions with the STD and ELIT binarization rules, we analyze the effect of these configurations on the performance of the algorithm. As reported in the literature [38], the choice of the transfer function and the binarization rule can significantly influence the quality of the solutions obtained.
With these configurations, the Binary Pufferfish Optimization Algorithm (BPOA) is constructed. The process begins with the initialization of binary solutions, which are updated in each iteration using Equations (10)–(13), which represent the specific movement equations of POA. After perturbation, the solutions temporarily leave the binary domain; therefore, the binarization process is applied using the selected combinations of S/V-shaped transfer functions and STD/ELIT rules. This cycle is repeated until the defined number of iterations is completed.
The pseudocode of BPOA is detailed in the pseudocode of Algorithm 2.
Algorithm 2 Pseudocode of Binary Pufferfish Optimization Algorithm
Input: Input problem information: variables, objective function, and constraints.
Output: Best solution
1:
Initialize the population randomly.
2:
for  t = 1 T   do
3:
    for  i = 1 N  do
4:
        Exploration Phase:
5:
        Determine the candidate Pufferfish set for the i-th POA member Equation (10).
6:
        Select the target pufferfish for the i-th POA member at random.
7:
        Calculate new position of i-th POA member using Equation (11)
8:
        Update the i-th Pufferfish using Update Equation (13).
9:
        Exploitation Phase:
10:
        Calculate new position of i-th POA member using Equation (12).
11:
        Update the i-th Pufferfish using Update Equation (13).
12:
        Binarization of population X
13:
    end for
14:
    Output the best quasi-optimal solution obtained with the POA.
15:
    Save the best candidate solution so far.
16:
end for
17:
Output the best quasi-optimal solution obtained with the POA.

5.1. Theoretical Justification of Binarization

A fundamental criticism of many binary adaptations is the lack of “algorithmic specificity”, as binarization often acts as a generic wrapper. We contend that our selection of the binarization scheme is intrinsically linked to POA’s core exploration and exploitation mechanics.
POA’s mechanics rely on two phases with distinct movement magnitudes:
  • Phase 1 (Exploration): Equation (11) generates large-magnitude movements in the search space, designed to jump to new, promising regions.
  • Phase 2 (Exploitation): Equation (12) generates decreasing-magnitude movements, as the ( t + 1 ) term in the denominator shrinks the step size as iterations increase.
The suitability of the transfer function families (S-shaped vs. V-shaped) depends on their interaction with this mechanic:
  • V-Shaped Functions (for SCP/USCP): These functions (e.g., V3) link the probability of flipping a bit (changing zero to one) to the magnitude of the movement. This couples perfectly with POA: in early iterations, the *large* movements from Phase 1 result in a *high* bit-flip probability, fostering exploration. In late iterations, the *small* movements from Phase 2 result in a *low* bit-flip probability, allowing the solution to stabilize (the “defense mechanism”).
  • S-Shaped Functions (for KP): These functions (e.g., S1) interpret the continuous value as the probability of a bit being ’1’. This aligns conceptually with the nature of the KP, which is an “item selection” problem (deciding whether to include or not). POA’s movement generates a “desirability” vector, and the S-shaped function translates this into a selection probability.

5.2. Feasibility Handling

Once a continuous solution is binarized, it is likely to violate problem-specific constraints. Therefore, a problem-dependent heuristic repair mechanism is applied before its fitness is evaluated to ensure all solutions are feasible.
  • For the Knapsack Problem (KP): The KP has a capacity constraint (2). For infeasible solutions (overweight), a greedy repair heuristic based on the profit-to-weight ratio ( profits i / weights i ) is applied.
    • Removal Phase: If the solution exceeds capacity, the algorithm iterates over included items in ascending order of their ratio (worst to best), removing them (setting to zero) until the solution becomes feasible.
    • Addition Phase: Once feasible, the algorithm iterates over non-included items in descending order of their ratio (best to worst), adding them (setting to one) as long as the solution remains feasible. The final addition that causes infeasibility is reverted.
  • For the Set Covering Problem (SCP/USCP): The SCP has coverage constraints (Equation (4)). For infeasible solutions (uncovered rows), a greedy trade-off heuristic is applied:
    While the solution is infeasible, the algorithm identifies all uncovered rows. It then calculates a ratio (cost/number of newly covered rows) for every available column. The column with the most efficient (lowest) ratio is added to the solution (set to one). This process repeats until all rows are covered, ensuring feasibility.

5.3. Computational Complexity Analysis

To evaluate the computational overhead, we analyze the complexity per iteration. Let N be the population size, n the dimensionality (items/columns), m the number of constraints (rows, for SCP), and R ( n , m ) the cost of the repair function.
  • BPOA Complexity: The total complexity per iteration is O ( N 2 + N · R ( n , m ) ) . The O ( N 2 ) term arises from the candidate prey search (Phase 1), and the O ( N · R ( n , m ) ) term arises from applying binarization, repair, and evaluation to each individual.
  • BPSO Complexity: The complexity is O ( N · R ( n , m ) ) , as it lacks the O ( N 2 ) prey search.
The repair cost R ( n , m ) is problem dependent:
  • For KP: The repair R ( n ) is O ( n log n ) , dominated by the ratio sorting. The total BPOA complexity is O ( N 2 + N · n log n ) .
  • For SCP/USCP: The greedy repair R ( m , n ) iterates k r e p times (where k r e p is the number of columns needed to repair). Each step involves recalculating coverage and ratios, taking O ( m · n ) (or O ( nnz ) for sparse matrices). The repair complexity is R ( m , n ) = O ( k r e p · m · n ) . The total BPOA complexity is O ( N 2 + N · k r e p · m · n ) .
In all cases, the polynomial overhead O ( N 2 ) explains the slightly higher computation times for BPOA observed in Section 7.

6. Experimental Results

To validate our proposal, we used benchmark instances from the OR-Library [55] covering the 0–1 Knapsack Problem (KP) [56], the Set Covering Problem (SCP) [57], and the Unicost Set Covering Problem (USCP) [58]. Our approach was compared against widely used metaheuristics: the Pufferfish Optimization Algorithm (POA) [36], Secretary Bird Optimization Algorithm (SBOA) [28], Arithmetic Optimization Algorithm (AOA) [31], and Particle Swarm Optimization (PSO) [27].

6.1. Experimental Methodology

Before performing the main experimentation, we conducted internal tests for parameter configuration across the three problem classes (KP, SCP, and USCP). Specifically, we explored the population size in the range [ 10 ,   100 ] with steps of ten, and probed iteration budgets I { 50 , 100 , 200 , 500 } .
Table 5 shows the subset of instances used for parameter configuration. We chose these instances because they are representative of small/medium/large cases in the OR-Library portfolio. The table lists the following: the instance name, the problem type, the instance size (KP: number of items; SCP/USCP: M rows, N columns, and density of ones), and the known optimum. This experiment was conducted in a team using a Windows 10 operating system, an Intel Core i9-10900 K 3.70 GHz Processor, and 64 GB of RAM. The algorithm implementation was developed in the Python (v3.11.9) programming language, utilizing libraries such as NumPy and SciPy. All experiments were executed in serial mode. To ensure statistical independence across the 31 executions, a fixed random seed was not used; instead, each run was initialized with a different seed to capture varied stochastic behavior.
Table 6 shows the pilot evidence supporting the choice of a population size of ten and an iteration budget of 100 for the subsequent experiments. For each selected instance, we report (over 31 runs) the best, worst, and average objective value together with the average runtime in seconds and minutes. These results indicate fast convergence and diminishing returns beyond 100 iterations, while keeping the runtime reasonable and comparable across methods/configurations.
To further substantiate the choice of transfer functions and binarization rules under this budget, Table 7 compares, for each selected instance, an S-shaped versus a V-shaped configuration with their customary discretization rules. We report the average objective value, the percentage gap to the known optimum, and the average runtime (31 runs; 100 iterations). In KP, S1-STD attains the smallest gaps (quality first) while V1-STD is markedly faster (speed first). In SCP/USCP, V3-ELIT systematically improves both cost and time against S3-ELIT, especially as the instance size grows.

6.2. Conclusion of the Pilot

With a population of ten, 100 iterations form a robust knee point across KP, SCP, and USCP, balancing solutions’ quality and the runtime. Under this budget, S1-STD (quality first) and V1-STD (speed first) are the recommended pairings for KP, while V3-ELIT clearly dominates S3-ELIT for SCP/USCP in both cost and time, justifying their use in the main experiments.
Table 8 shows the final experimental configuration. The global settings used by all metaheuristics (All MH), the method, and problem-specific parameters are highlighted.

6.3. KP, SCP, and USCP Instances Resolved

Table 9 presents the KP instances, indicating for each case the instance name (Instance), the number of items (Number of Items), and the known optimal value (Optimum).
Table 10 and Table 11 show the instances used for the SCP and USCP, respectively. Each record in these tables includes the instance name (Instance), the number of constraints (M), the number of decision variables (N), the density of ones in the matrix described in Section 2 (Density (%)), and the known optimal value (Optimum).
It should be noted that the optimal values highlighted in bold and underlined do not correspond to global optima, but rather to the best results reported in the literature.

6.4. Results of KP, SCP, and USCP

This subsection presents the results obtained by BPOA using the parameters established in Section 6.1. The performance of BPOA is compared against three other metaheuristics: Particle Swarm Optimization (PSO), Secretary Bird Optimization Algorithm (SBOA), and Arithmetic Optimization Algorithm (AOA). Table 12 and Table 13 present the detailed results for the Knapsack Problem (KP) using the S1-STD binarization scheme. For each algorithm and instance, we report the optimal value (Opt), the best value achieved (Best), the average fitness (Avg. fitness), the worst value (Worst), the standard deviation (Std. fitness), and the relative percentage deviation (RPD) over 31 independent executions [59].
The RPD allows us to know how close a solution is to the known optimum.
R P D = Z alg Z ref Z ref × 100
where Z alg is the objective function value returned by the algorithm under evaluation and Z ref is the best known or optimal value for the problem instance.
Convergence plots trace how the metaheuristic progressively discovers higher-quality solutions as the iteration count grows. Because practical applications demand good answers within a reasonable time, the goal is to reach strong solutions without an excessive number of iterations or computational overhead. Following Crawford et al. [60] and Lemus-Romani et al. [61], we document the search process with graphs that plot fitness against iteration. Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8 and Figure 9 present this relationship—with iterations on the x-axis and fitness on the y-axis—and they indicate the sound convergence behavior, with no evidence that the algorithm becomes trapped in a local optimum [62].
Table 14 and Table 15 summarizes runtime statistics for KP under S1–STD: minimum, maximum, average, and standard deviation (in seconds) over 31 runs for BPOA, SBOA, AOA, and PSO.
Figure 10, Figure 11, Figure 12, Figure 13, Figure 14, Figure 15 and Figure 16 show how the runtime analysis for the S1-STD configuration confirms that PSO consistently achieves the most efficient and stable execution times across all problem sizes. AOA follows as a competitive alternative, generally faster than SBOA and BPOA but with moderate variability. Conversely, BPOA and SBOA exhibit the highest computational overhead; specifically, BPOA displays noticeable spikes in large-scale instances, reflecting the intensive computational effort required to sustain its superior convergence accuracy.
Table 16 and Table 17 shows the KP solution quality when using the V1–STD binarization. The columns mirror those of Table 12 to enable a direct comparison of best/worst/mean performance and variability between BPOA, SBOA, AOA, and PSO.
Figure 17, Figure 18, Figure 19, Figure 20, Figure 21, Figure 22 and Figure 23 show that BPOA and SBOA exhibit robust step-wise convergence, consistently reaching superior fitness levels compared to the stagnant performance of AOA. While PSO occasionally achieves top results in specific instances, BPOA demonstrates the most reliable trajectory, securing high-quality solutions with minimal fluctuation across the dataset.
Table 18 and Table 19 lists the runtime statistics for KP with V1–STD, allowing a time efficiency comparison against S1–STD and between the metaheuristics.
Figure 24, Figure 25, Figure 26, Figure 27, Figure 28, Figure 29 and Figure 30 show the runtime distributions, demonstrating that PSO consistently maintains the lowest and most stable execution times. In contrast, AOA exhibits significant computational instability, characterized by frequent high-magnitude spikes that increase the overall cost. BPOA and SBOA occupy an intermediate position; notably, BPOA demonstrates a steady and predictable timing behavior, effectively balancing the overhead compared to the erratic fluctuations observed in AOA.
Table 20 reports the solution costs for the Set Covering Problem (SCP) using the V3–ELIT configuration. For each instance, we include the reference optimum, best/worst value, mean over 31 runs, and standard deviation.
Figure 31, Figure 32, Figure 33 and Figure 34 plot the convergence curves for SCP under V-shaped binarization, comparing POA, PSO, SBOA, and AOA. The results demonstrate that POA, PSO, and SBOA exhibit strong convergence behaviors and reach competitive final costs, whereas AOA tends to stabilize at higher values, yielding less effective solutions in most instances.
Table 21 presents the runtime statistics (min/max/avg/std, in seconds) for SCP under V3–ELIT, comparing the time performance of POA, PSO, SBOA, and AOA.
Figure 35, Figure 36, Figure 37 and Figure 38 report the runtime distributions for SCP with V-shaped binarization, comparing POA, PSO, SBOA, and AOA; the results indicate that PSO is generally the most time efficient, while SBOA and AOA exhibit significantly higher computational overheads, particularly in the larger instances.
Table 22 summarizes SCP solution quality with the S3–ELIT binarization, using the same metrics as in V3–ELIT to contrast S-shaped versus V-shaped behaviors.
Figure 39, Figure 40, Figure 41 and Figure 42 display convergence trajectories for SCP under S-shaped binarization, contrasting POA, PSO, SBOA, and AOA; the curves are nearly indistinguishable, with a similar early descent and virtually identical terminal costs.
Table 23 provides the SCP runtime summary with S3–ELIT, facilitating a time efficiency comparison against V3–ELIT and between the evaluated metaheuristics.
Figure 43, Figure 44, Figure 45 and Figure 46 illustrate the runtime behavior per iteration for SCP instances using the S3-ELIT binarization scheme. As observed in the plots, AOA consistently exhibits the lowest computational times, demonstrating superior efficiency. PSO follows as the second fastest algorithm, maintaining a stable performance. In contrast, POA and SBOA display significantly higher runtimes and greater variability across the iterations, indicating the higher computational cost of these methods in this specific configuration.
Table 24 compiles the solution quality for the Unicost Set Covering Problem (USCP) using V3-ELIT. We report the best values, the worst values, the mean, and dispersion over 31 runs, relative to the known optimum.
Figure 47, Figure 48, Figure 49 and Figure 50 show the convergence curves for USCP under V-shaped binarization across multiple instances and runs. As illustrated, POA and PSO exhibit the most rapid convergence rates, settling at nearly identical optimal costs. Notably, in complex instances such as ucyc08, both algorithms clearly outperform AOA and SBOA, demonstrating their superior scalability and search capability.
Table 25 shows the runtime statistics (min, max, average, and standard deviation, in seconds) for USCP with V3–ELIT, comparing BPOA, PSO, AOA, and SBOA.
Figure 51, Figure 52, Figure 53 and Figure 54 compare the runtime distributions for USCP with V-shaped binarization. PSO generally exhibits the lowest runtimes, demonstrating high speeds across most instances, although it shows instability in larger datasets (e.g., unrg1 and unrh1). Conversely, SBOA displays the highest computational overhead and variability. POA and AOA maintain stable, intermediate execution times, positioning themselves between the rapid performance of PSO and the higher costs of SBOA.
Table 26 presents USCP solution quality using S3-ELIT, with the same performance metrics as those used for V3-ELIT to highlight the impact of switching from V-shaped to S-shaped transfers.
Figure 55, Figure 56, Figure 57 and Figure 58 present the convergence profiles for USCP under S-shaped binarization; the trajectories overlap closely throughout, with matching early improvement and final costs that are effectively the same.
Table 27 reports the runtime statistics for USCP with S3–ELIT, enabling a direct time comparison with V3–ELIT and between BPOA, PSO, AOA, and SBOA.
Figure 59, Figure 60, Figure 61 and Figure 62 report the runtime outcomes for USCP with S-shaped binarization across instances and repetitions. AOA consistently achieves the lowest execution times, establishing itself as the most efficient method in this configuration. While PSO is competitive in smaller instances, it exhibits significant instability and high runtimes on larger datasets (e.g., unrg1 and unrh1), whereas POA maintains a stable, albeit higher, computational cost.
In the Knapsack Problem (KP), the S1-STD binarization scheme yields near-optimal and highly stable results across all algorithms, although POA and PSO maintain a slight consistency edge over AOA and SBOA; conversely, the V1-STD scheme drastically reduces the runtimes at the expense of solution quality, where AOA stands out for its speed but exhibits larger optimality gaps in large-scale instances. Regarding the Set Covering Problems (SCP and USCP), the V3-ELIT approach clearly outperforms S3-ELIT, delivering superior costs and execution times, whereas S3-ELIT demonstrates poor scalability, particularly with SBOA, which exhibits the highest computational overhead and variability. In terms of comparative performance, AOA consistently ranks as the fastest method, achieving the lowest execution times in most scenarios, although it is occasionally outperformed in terms of solution quality by POA and PSO in complex instances; PSO offers a strong balance, being rapid on smaller instances yet showing runtime instability on larger datasets, and POA demonstrates the highest stability and search capability in difficult scenarios, justifying its intermediate computational cost with high-quality solutions, while SBOA proves to be the least time efficient. Overall, the results suggest employing S1-STD for KP when quality is paramount and V1-STD for speed, and choosing V3-ELIT for SCP/USCP, selecting AOA for maximum speed or POA/PSO for an optimal trade-off between solution quality and stability.

6.5. Statistical Test

To statistically validate our work, we considered the POA and PSO executions for the KP, SCP, and USCP problems. Our statistical analysis is based on two stages, according to [57]. The first stage consists of determining whether the data behaves normally, for which we use the Shapiro–Wilk test [63], as shown in Table 28, Table 29, Table 30, Table 31 and Table 32, where W represents the Shapiro–Wilk statistic, whose value is between [0,1], and the p-value is the probability of obtaining the observed data. As can be seen, the data does not follow a normal trend. To apply the test, we use the scipy.stats function in Python.
In the second stage of our analysis, given that our data does not follow a normal distribution, we used a nonparametric test, which in this case is the Mann–Whitney test. This test is used when two samples are independent and the validity of one of them cannot be assumed. We considered the following hypotheses:
H0: 
Algorithm AAlgorithm B,
H1: 
Algorithm A < Algorithm B,
where Algorithm A and Algorithm B represent the average value delivered by algorithms A and B. In two independent and uncorrelated data sets, we use the p-value to determine whether they are significantly different. In this sense, we consider that if the p-value is less than 0.05, the null hypothesis H 0 will be rejected, and the alternative hypothesis H 1 will be accepted. To apply the test, we use the scipy.stats function in Python. The application of the Mann–Whitney test is shown in Table 33, Table 34 and Table 35.
The Mann–Whitney test applied to the different problems with the selected pairs of techniques did not reveal statistically significant differences between the metaheuristics, as most of the p-values were greater than 0.05. Therefore, the null hypothesis could not be rejected.

7. Discussion

The empirical results validate our theoretical hypothesis (Section 5.1) regarding the synergy between POA’s mechanics and the chosen binarization scheme. For SCP/USCP, the superiority of V3–ELIT is not coincidental: POA’s Phase 1 (Exploration) generates high-magnitude movements, which the V-shaped function translates into a high bit-flip probability, fostering diversity. Conversely, Phase 2 (Exploitation) generates decreasing-magnitude movements, which the V-shaped function translates into solution stabilization, enabling convergence. S3–ELIT, lacking this coupling to movement magnitude, fails to achieve this dynamic translation.
This study investigated a binary instantiation of the Pufferfish Optimization Algorithm (BPOA) on three canonical 0–1 problems, KP, SCP, and USCP, via the two-step technique using representative S-shaped and V-shaped transfer functions combined with STD and ELIT binarization rules, benchmarking against PSO under a common budget (Table 8). The empirical evidence in Table 12, Table 13, Table 14, Table 15, Table 16, Table 17, Table 18, Table 19, Table 20, Table 21, Table 22, Table 23, Table 24, Table 25, Table 26 and Table 27 reveals several robust patterns that we summarize below.
For KP, S1–STD delivers near-optimal, low-variance solutions over a wide range of sizes, while V1–STD yields markedly shorter runtimes at the expense of larger optimality gaps and variability (cf. Table 12 and Table 14 vs. Table 16 and Table 18). This establishes a clear quality–speed trade-off: S1–STD is the quality-first option; V1–STD is a pragmatic choice when tight wall-time constraints prevail.
For coverage minimization (SCP/USCP), V3–ELIT consistently outperforms S3–ELIT in terms of solutions’ cost, robustness, and scalability, with especially clear advantages in large/dense instances, where S3–ELIT’s runtime escalates sharply (cf. Table 20, Table 21, Table 22, Table 23, Table 24, Table 25, Table 26 and Table 27). Thus, for coverage problems, the V-shaped transfer with an elitist rule provides the most favorable quality–efficiency balance.
Once an effective transfer–rule pairing is fixed, the search engine plays a secondary role: PSO is generally faster, while BPOA is occasionally more stable or slightly tighter in terms of the best/mean cost in the hardest instances, framing a time–stability trade-off. Complementarily, Wilcoxon–Mann–Whitney tests over 31 runs mostly return p > 0.05 when the methods are already near optimum (e.g., KP with S1–STD; several SCP/USCP cases under V3–ELIT) and show significance precisely where descriptive gaps are large, reinforcing that discretization design is the principal performance driver and the choice between BPOA and PSO mainly modulates runtime and stability.
Mechanistically, these results align with bit-flip dynamics: S-shaped transfers with STD behave as probability thresholds that stabilize packing decisions in KP’s profit–weight landscape (hence S1–STD’s low variance), whereas V-shaped transfers increase flip probability with movement magnitude, promoting faster but less predictable exploration (V1–STD). For coverage problems, ELIT’s guidance from the incumbent best is crucial in order to propagate structural improvements under constraints, and V3’s smooth, saturating map supplies moderated but persistent flips, explaining V3–ELIT’s superior quality–efficiency trade-off. The limitations of this study include its reliance on OR-Library benchmarks and fixed budgets (Table 8), exploration of a restricted subset of transfers/rules (S1/S3 and V1/V3; STD/ELIT), standard repair/feasibility checks that could interact with pairings, and and per-instance Wilcoxon tests without multiple comparison control or effect sizes; nevertheless, across the problems and sizes, the picture remains internally consistent and practically actionable, yielding clear guidance regarding when to favor quality-first vs. speed-first settings.

8. Conclusions

Within the context of the importance of optimization for Industry 4.0, we presented a unified binary adaptation of POA and evaluated its effectiveness on KP, SCP, and USCP under representative transfer-–rule designs, contrasting it with PSO, AOA, and SBOA under identical computational budgets. Three main conclusions follow from the experimental evidence.
For KP, S1–STD is the most reliable configuration, delivering near-optimal, low-variance solutions across sizes while V1–STD offers a compelling speed-first regime with a predictable trade-off in optimality gap and variability. Practitioners should select between these regimes based on the wall-time constraints and acceptable deviation from the optimum.
For SCP/USCP, the discretization pairing dominates performance: V3–ELIT consistently surpasses S3–ELIT in cost, robustness, and scalability, especially in large/dense instances. This indicates that moderated flip dynamics guided by elitism are better suited to coverage minimization than S-shaped thresholds.
Between BPOA and the other algorithms, once a good combination has been chosen, the solvers achieve comparable quality. AOA is usually faster, while BPOA can be slightly more accurate or stable in difficult cases with higher computational cost; therefore, the choice of method mainly adjusts the speed–stability profile rather than determining absolute performance. Therefore, the practical recommendations are as follows: use S1–STD for KP when quality is paramount and V1–STD with strict time budgets; prefer V3–ELIT for SCP/USCP to obtain better costs with manageable execution times; select the other algorithms for performance-oriented scenarios; and select BPOA when incremental gains or stability justify additional computation. Future work will expand the design space (additional S/V transfers and rules), develop adaptive/hybrid schedules that alternate transfer and rule during execution, integrate problem-aware repairs and lightweight local improvements for coverage, adopt dynamic population/budget allocation, strengthen inference with multiple comparison procedures and effect sizes, and validate on larger and more heterogeneous industrial instances to assess generalization and cost–quality scalability.

Author Contributions

Conceptualization, B.C., Á.P. and R.S.; methodology, B.C., Á.P., Á.P.F., C.P.T.M.-l., J.L.A. and F.S.-P.; software, F.C.-C., C.P.T.M.-l., J.L.A. and F.S.-P.; validation, B.C., Á.P., F.C.-C., R.S., Á.P.F., G.A. and G.G.; formal analysis, C.P.T.M.-l., J.L.A. and F.S.-P.; investigation, B.C., F.C.-C., R.S., C.P.T.M.-l., J.L.A., F.S.-P., G.A., Á.P.F. and G.G.; resources, C.P.T.M.-l., J.L.A., F.S.-P. and G.A.; writing—original draft, C.P.T.M.-l., J.L.A., F.S.-P. and G.A.; writing—review and editing, B.C., Á.P., R.S., Á.P.F. and G.A.; supervision, B.C., Á.P., Á.P.F. and R.S.; and funding acquisition, B.C. and R.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The benchmark instances (KP, SCP, and USCP) used in this study were obtained from the public OR-Library [55] and were used without modification. The source code for the BPOA implementation and experimental scripts is publicly available at https://github.com/ZtockHD123/Solver-For-BPOA, accessed on 23 december 2025.

Acknowledgments

Felipe Cisternas-Caneo was supported by the National Agency for Research and Development ANID BECAS/DOCTORADO NACIONAL 21230203.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
POAPufferfish Optimization Algorithm
BPOABinary Pufferfish Optimization Algorithm
PSOParticle Swarm Optimization
GWOGrey Wolf Optimizer
FHFirefly Algorithm
BSMABinary Slime Mould Algorithm
WOAWhale Optimization Algorithm
KPKnapsack Problem
SCPSet Covering Problem
USCPUnicost Set Covering Problem
STDStandard
ELITElitist

References

  1. Elmasry, N.H.; Elshaarawy, M.K. Hybrid metaheuristic optimized Catboost models for construction cost estimation of concrete solid slabs. Sci. Rep. 2025, 15, 21612. [Google Scholar] [CrossRef]
  2. Zhang, D.; Ouyang, B.; Luo, Z.H. Reaction process optimization based on interpretable machine learning and metaheuristic optimization algorithms. Chin. J. Chem. Eng. 2025, 84, 77–85. [Google Scholar] [CrossRef]
  3. García, E.; Villar, J.R.; Sedano, J.; Chira, C.; de la Cal, E.; Sánchez, L. Slime Mould Metaheuristic for optimization and robot path planning. Neurocomputing 2025, 647, 130551. [Google Scholar] [CrossRef]
  4. Laayati, O.; El Hadraoui, H.; El Maghraoui, A.; Guennouni, N.; Mekhfioui, M.; Chebak, A. Metaheuristic-Optimized Forecasting in a Smart Edge—Fog—Cloud Energy Management Framework: An Industrial Mining Case Study. Results Eng. 2025, 28, 107303. [Google Scholar] [CrossRef]
  5. Mechaacha, A.; Belkaid, F.; Brahimi, N. Multi-objective multi-product process planning with reconfigurable machines: Exact and metaheuristic approaches. Expert Syst. Appl. 2025, 298, 129591. [Google Scholar] [CrossRef]
  6. Ghotb, S.; Sowlati, T.; Mortyn, J. Scheduling of log logistics using a metaheuristic approach. Expert Syst. Appl. 2024, 238, 122008. [Google Scholar] [CrossRef]
  7. Núñez-López, J.M.; Segovia-Hernández, J.G.; Sánchez-Ramírez, E.; Ponce-Ortega, J.M. Integrating metaheuristic methods and deterministic strategies for optimizing supply chain equipment design in process engineering. Chem. Eng. Res. Des. 2025, 214, 93–104. [Google Scholar] [CrossRef]
  8. Dhouib, S.; Zouari, A. Adaptive iterated stochastic metaheuristic to optimize holes drilling path in manufacturing industry: The Adaptive-Dhouib-Matrix-3 (A-DM3). Eng. Appl. Artif. Intell. 2023, 120, 105898. [Google Scholar] [CrossRef]
  9. Yang, C.L.; Yilma, A.A.; Sutrisno, H.; Woldegiorgis, B.H.; Nguyen, T.P.Q. LSTMbased framework with metaheuristic optimizer for manufacturing process monitoring. Alex. Eng. J. 2023, 83, 43–52. [Google Scholar] [CrossRef]
  10. Huang, B.; Tang, L.; Baldacci, R.; Wang, G.; Sun, D. A metaheuristic algorithm for a locomotive routing problem arising in the steel industry. Eur. J. Oper. Res. 2023, 308, 385–399. [Google Scholar] [CrossRef]
  11. Zuhanda, M.K.; Hasibuan, S.A.R.S.; Napitupulu, Y.Y. An exact and metaheuristic optimization framework for solving Vehicle Routing Problems with Shipment Consolidation using population-based and Swarm Intelligence. Decis. Anal. J. 2024, 13, 100517. [Google Scholar] [CrossRef]
  12. Lopes, J.; Guimarães, T.; Duarte, J.; Santos, M. Enhancing Surgery Scheduling in Health Care Settings With Metaheuristic Optimization Models: Algorithm Validation Study. JMIR Med. Inform. 2025, 13, e57231. [Google Scholar] [CrossRef] [PubMed]
  13. Mzili, T.; Mzili, I.; Riffi, M.E.; Kurdi, M.; Ali, A.H.; Pamucar, D.; Abualigah, L. Enhancing COVID-19 vaccination and medication distribution routing strategies in rural regions of Morocco: A comparative metaheuristics analysis. Inform. Med. Unlocked 2024, 46, 101467. [Google Scholar] [CrossRef]
  14. Mostafaei, K.; Yousefi, M.; Kreuzer, O.; Kianpour, M.N. Simulation-based mineral prospectivity modeling and Gray Wolf optimization algorithm for delimiting exploration targets. Ore Geol. Rev. 2025, 177, 106458. [Google Scholar] [CrossRef]
  15. Canales Bustos, L.; Santibañez González, E.; Candia Véjar, A. A multi objective optimization model for the design of an effective decarbonized supply chain in mining. Int. J. Prod. Econ. 2017, 193(449), 464. [Google Scholar] [CrossRef]
  16. Elyasi, M.; Altan, B.; Ekici, A.; Özener, O.Ö.; Yanıkoğlu, İ.; Dolgui, A. Production planning with flexible manufacturing systems under demand uncertainty. Int. J. Prod. Res. 2024, 62, 157–170. [Google Scholar] [CrossRef]
  17. Chou, J.S.; Chen, K.E. Optimizing investment portfolios with a sequential ensemble of decision tree-based models and the FBI algorithm for efficient financial analysis. Appl. Soft Comput. 2024, 158, 111550. [Google Scholar] [CrossRef]
  18. García, J.; Moraga, P.; Valenzuela, M.; Crawford, B.; Soto, R.; Pinto, H.; Peña, A.; Altimiras, F.; Astorga, G. A Db-Scan Binarization Algorithm Applied to Matrix Covering Problems. Comput. Intell. Neurosci. 2019, 2019, 3238574. [Google Scholar] [CrossRef]
  19. Mohammadzadeh, A.; Masdari, M.; Gharehchopogh, F.S.; Jafarian, A. Improved chaotic binary grey wolf optimization algorithm for workflow scheduling in green cloud computing. Evol. Intell. 2021, 14, 1997–2025. [Google Scholar] [CrossRef]
  20. Guendouzi, W.; Boukra, A. A Manhattan distance-based binary bat algorithm vs. integer ant colony optimisation for intrusion detection in the audit trails. Int. J. Comput. Sci. Eng. 2019, 18, 424–437. [Google Scholar] [CrossRef]
  21. Sun, W.Z.; Zhang, M.; Wang, J.S.; Guo, S.S.; Wang, M.; Hao, W.K. Binary Particle Swarm Optimization Algorithm Based on Z-shaped Probability Transfer Function to Solve 0–1 Knapsack Problem. IAENG Int. J. Comput. Sci. 2021, 48, 294. [Google Scholar]
  22. Villavicencio, G.; Valenzuela, M.; Causa, L.; Moraga, P.; Pinto, H. A Machine Learning Firefly Algorithm Applied to the Matrix Covering Problem. In Artificial Intelligence in Intelligent Systems; Computer Science On-line Conference; Springer: Berlin/Heidelberg, Germany, 2021; pp. 316–325. [Google Scholar]
  23. Andic, C.; Ozturk, A.; Turkay, B. Power system state estimation using a robust crow search algorithm based on PMUs with limited number of channels. Electr. Power Syst. Res. 2023, 217, 109126. [Google Scholar] [CrossRef]
  24. Moradi, N.; Mafakheri, F.; Wang, C. Set covering routing problems: A review and classification scheme. Comput. Ind. Eng. 2024, 198, 110730. [Google Scholar] [CrossRef]
  25. Karp, R.M. On the computational complexity of combinatorial problems. Networks 1975, 5, 45–68. [Google Scholar] [CrossRef]
  26. Wang, R.L.; Okazaki, K. An improved genetic algorithm with conditional genetic operators and its application to set-covering problem. Soft Comput. 2007, 11, 687–694. [Google Scholar] [CrossRef]
  27. Crawford, B.; Soto, R.; Monfroy, E.; Palma, W.; Castro, C.; Paredes, F. Parameter tuning of a choice-function based hyperheuristic using particle swarm optimization. Expert Syst. Appl. 2013, 40, 1690–1695. [Google Scholar] [CrossRef]
  28. Fu, Y.; Liu, D.; Chen, J.; He, L. Secretary bird optimization algorithm: A new metaheuristic for solving global optimization problems. Artif. Intell. Rev. 2024, 57, 123. [Google Scholar] [CrossRef]
  29. Mirjalili, S.; Lewis, A. The whale optimization algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  30. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey wolf optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef]
  31. Abualigah, L.; Diabat, A.; Mirjalili, S.; Abd Elaziz, M.; Gandomi, A.H. The arithmetic optimization algorithm. Comput. Methods Appl. Mech. Eng. 2021, 376, 113609. [Google Scholar] [CrossRef]
  32. Rodríguez, M.E.H. Fuzzy Hunter Optimizer: An Bio-Metaheuristic Algorithm Inspired by L∖’evy Walks. arXiv 2023, arXiv:2309.13829. [Google Scholar]
  33. Pan, J.S.; Hu, P.; Snášel, V.; Chu, S.C. A survey on binary metaheuristic algorithms and their engineering applications. Artif. Intell. Rev. 2023, 56, 6101–6167. [Google Scholar] [CrossRef] [PubMed]
  34. Rajaram, K.; Kannan, R. Design and implementation of adaptive pufferfish optimization algorithm based efficient MPPT and DC-DC boost converter for agriculture applications under partial shading conditions. Intell. Decis. Technol. 2025, 19, 1074–1090. [Google Scholar] [CrossRef]
  35. Koyalil, A.; Rajalingam, S. Enhanced Multi-level K-means Clustering and Cluster Head Selection Using a Modernized Pufferfish Optimization Algorithm for Lifetime Maximization in Wireless Sensor Networks. Results Eng. 2025, 27, 105836. [Google Scholar] [CrossRef]
  36. Al-Baik, O.; Alomari, S.; Alssayed, O.; Gochhait, S.; Leonova, I.; Dutta, U.; Malik, O.P.; Montazeri, Z.; Dehghani, M. Pufferfish optimization algorithm: A new bio-inspired metaheuristic algorithm for solving optimization problems. Biomimetics 2024, 9, 65. [Google Scholar] [CrossRef]
  37. Crawford, B.; Soto, R.; Astorga, G.; García, J.; Castro, C.; Paredes, F. Putting continuous metaheuristics to work in binary search spaces. Complexity 2017, 2017, 8404231. [Google Scholar] [CrossRef]
  38. Becerra-Rozas, M.; Lemus-Romani, J.; Cisternas-Caneo, F.; Crawford, B.; Soto, R.; Astorga, G.; Castro, C.; García, J. Continuous metaheuristics for binary optimization problems: An updated systematic literature review. Mathematics 2022, 11, 129. [Google Scholar] [CrossRef]
  39. Vijayakumar, S. Optimization of friction stir welding parameters for dissimilar aluminium alloys using RSM-GRA and RSM-TOPSIS: Towards sustainable manufacturing in industry 4.0. Results Eng. 2025, 27, 107054. [Google Scholar] [CrossRef]
  40. Seraj, M.; Parvez, M.; Khan, O.; Yahya, Z. Optimizing smart building energy management systems through industry 4.0: A response surface methodology approach. Green Technol. Sustain. 2024, 2, 100079. [Google Scholar] [CrossRef]
  41. Yu, X.; Wang, Z.; Gao, Z.; Lang, H.; Shao, X.; Liu, Z. Applications, Challenges, and Prospects of AI-Driven Intelligent Packaging Technologies in the Food Supply Chain under Industry 4.0. Trends Food Sci. Technol. 2025, 165, 105367. [Google Scholar] [CrossRef]
  42. Shamim Ahsan, M.; Islam, S.; Shatabda, S. A Systematic Review of Metaheuristics-Based and Machine Learning-Driven Intrusion Detection Systems in IoT. arXiv 2025, arXiv:2506.00377v1. [Google Scholar]
  43. Koçer, H.G.; Türkoğlu, B.; Uymaz, S.A. Chaotic golden ratio guided local search for big data optimization. Eng. Sci. Technol. Int. J. 2023, 41, 101388. [Google Scholar] [CrossRef]
  44. Alqudsi, Y. An injected multi-objective metaheuristic approach for optimizing aerial-robot swarm guidance in cluttered environments. Applied Soft Computing 2025, 181, 113379. [Google Scholar] [CrossRef]
  45. Kumar, A.; Kumar, S. Metaheuristic-Enhanced Feature Selection for High-Accuracy Intrusion Detection in Cloud Computing. Procedia Comput. Sci. 2025, 259, 640–649. [Google Scholar] [CrossRef]
  46. Alkhonaini, M.A.; Aljaffan, N.; Said, Y.; Alsamri, J.; Nemri, N.; Obayya, M.; Alzubaidi, A.A.; Alsariera, Y.A.; Alnfiai, M.M. Leveraging osprey optimization algorithm with deep ensemble learning for cybersecurity in CPS environment. Ain Shams Eng. J. 2025, 16, 103612. [Google Scholar] [CrossRef]
  47. Liu, W.; Chen, L.; Mai, G.; Song, L. Toolpath planning for additive manufacturing using sliced model decomposition and metaheuristic algorithms. Adv. Eng. Softw. 2020, 149, 102906. [Google Scholar] [CrossRef]
  48. Soundararaj, A.J.; Winster, G. Optimized Task Offloading with Energy Efficient Communication and Optimal Offloading Network: A Mobility and Energy-Efficient Approach for Augmented Reality in Mobile Edge Computing. Knowl.-Based Syst. 2025, 330, 114431. [Google Scholar] [CrossRef]
  49. Capacho, J.W.V.; Pérez-Zuñiga, G.; Rodriguez-Urrego, L. Diagnostic analysis and performance optimization of scalable computing systems in the context of industry 4.0. Sustain. Comput. Inform. Syst. 2025, 45, 101067. [Google Scholar] [CrossRef]
  50. Ghasemi, A.; Farajzadeh, F.; Heavey, C.; Fowler, J.; Papadopoulos, C.T. Simulation optimization applied to production scheduling in the era of industry 4.0: A review and future roadmap. J. Ind. Inf. Integr. 2024, 39, 100599. [Google Scholar] [CrossRef]
  51. Rishabh, R.; Das, K.N. A decomposed fuzzy based fusion of decision-making and metaheuristic algorithm to select best unmanned aerial vehicle in agriculture 4.0 era. Eng. Appl. Artif. Intell. 2025, 159, 111491. [Google Scholar] [CrossRef]
  52. Goli, A. Efficient optimization of robust project scheduling for industry 4.0: A hybrid approach based on machine learning and meta-heuristic algorithms. Int. J. Prod. Econ. 2024, 278, 109427. [Google Scholar] [CrossRef]
  53. Shami, T.M.; El-Saleh, A.A.; Alswaitti, M.; Al-Tashi, Q.; Summakieh, M.A.; Mirjalili, S. Particle swarm optimization: A comprehensive survey. Ieee Access 2022, 10, 10031–10061. [Google Scholar] [CrossRef]
  54. Cisternas-Caneo, F.; Crawford, B.; Soto, R.; Giachetti, G.; Paz, Á.; Peña Fritz, A. Chaotic binarization schemes for solving combinatorial optimization problems using continuous metaheuristics. Mathematics 2024, 12, 262. [Google Scholar] [CrossRef]
  55. Beasley, J.E.; Jörnsten, K. Enhancing an algorithm for set covering problems. Eur. J. Oper. Res. 1992, 58, 293–300. [Google Scholar] [CrossRef]
  56. Pisinger, D. Where are the hard knapsack problems? Comput. Oper. Res. 2005, 32, 2271–2284. [Google Scholar] [CrossRef]
  57. Lanza-Gutierrez, J.M.; Crawford, B.; Soto, R.; Berrios, N.; Gomez-Pulido, J.A.; Paredes, F. Analyzing the effects of binarization techniques when solving the set covering problem through swarm optimization. Expert Syst. Appl. 2017, 70, 67–82. [Google Scholar] [CrossRef]
  58. Wang, Y.; Pan, S.; Al-Shihabi, S.; Zhou, J.; Yang, N.; Yin, M. An improved configuration checking-based algorithm for the unicost set covering problem. Eur. J. Oper. Res. 2021, 294, 476–491. [Google Scholar] [CrossRef]
  59. Houssein, E.H.; Saeed, M.K.; Hu, G.; Al-Sayed, M.M. Metaheuristics for solving global and engineering optimization problems: Review, applications, open issues and challenges. Arch. Comput. Methods Eng. 2024, 31, 4485–4519. [Google Scholar] [CrossRef]
  60. Crawford, B.; Soto, R.; Lemus-Romani, J.; Becerra-Rozas, M.; Lanza-Gutiérrez, J.M.; Caballé, N.; Castillo, M.; Tapia, D.; Cisternas-Caneo, F.; García, J.; et al. Q-learnheuristics: Towards data-driven balanced metaheuristics. Mathematics 2021, 9, 1839. [Google Scholar] [CrossRef]
  61. Lemus-Romani, J.; Becerra-Rozas, M.; Crawford, B.; Soto, R.; Cisternas-Caneo, F.; Vega, E.; Castillo, M.; Tapia, D.; Astorga, G.; Palma, W.; et al. A novel learning-based binarization scheme selector for swarm algorithms solving combinatorial problems. Mathematics 2021, 9, 2887. [Google Scholar] [CrossRef]
  62. Singh, P. The Fast Forward Quantum Optimization Algorithm: A study of convergence and novel unconstrained optimization. Comput. Methods Appl. Mech. Eng. 2025, 443, 118039. [Google Scholar] [CrossRef]
  63. Shapiro, S.S.; Wilk, M.B. An analysis of variance test for normality (complete samples). Biometrika 1965, 52, 591–611. [Google Scholar] [CrossRef]
Figure 1. Two-Step Technique [54].
Figure 1. Two-Step Technique [54].
Biomimetics 11 00010 g001
Figure 2. S-shaped and V-shaped transfer functions.
Figure 2. S-shaped and V-shaped transfer functions.
Biomimetics 11 00010 g002
Figure 3. Convergence analysis of the instances Kp KnapPI_1_100_1000_1, Kp KnapPI_1_200_1000_1, and Kp KnapPI_1_500_1000_1.
Figure 3. Convergence analysis of the instances Kp KnapPI_1_100_1000_1, Kp KnapPI_1_200_1000_1, and Kp KnapPI_1_500_1000_1.
Biomimetics 11 00010 g003
Figure 4. Convergence analysis of the instances Kp KnapPI_1_1000_1000_1, Kp KnapPI_1_2000_1000_1, and Kp KnapPI_1_5000_1000_1.
Figure 4. Convergence analysis of the instances Kp KnapPI_1_1000_1000_1, Kp KnapPI_1_2000_1000_1, and Kp KnapPI_1_5000_1000_1.
Biomimetics 11 00010 g004
Figure 5. Convergence analysis of the instances Kp KnapPI_1_10000_1000_1, Kp KnapPI_2_100_1000_1, and Kp KnapPI_2_200_1000_1.
Figure 5. Convergence analysis of the instances Kp KnapPI_1_10000_1000_1, Kp KnapPI_2_100_1000_1, and Kp KnapPI_2_200_1000_1.
Biomimetics 11 00010 g005
Figure 6. Convergence analysis of the instances Kp KnapPI_2_500_1000_1, Kp KnapPI_2_1000_1000_1, and Kp KnapPI_2_2000_1000_1.
Figure 6. Convergence analysis of the instances Kp KnapPI_2_500_1000_1, Kp KnapPI_2_1000_1000_1, and Kp KnapPI_2_2000_1000_1.
Biomimetics 11 00010 g006
Figure 7. Convergence analysis of the instances Kp KnapPI_2_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Figure 7. Convergence analysis of the instances Kp KnapPI_2_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Biomimetics 11 00010 g007
Figure 8. Convergence analysis of the instances Kp KnapPI_3_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Figure 8. Convergence analysis of the instances Kp KnapPI_3_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Biomimetics 11 00010 g008
Figure 9. Convergence analysis of the instances Kp KnapPI_3_2000_1000_1, Kp KnapPI_3_5000_1000_1, and Kp KnapPI_3_10000_1000_1.
Figure 9. Convergence analysis of the instances Kp KnapPI_3_2000_1000_1, Kp KnapPI_3_5000_1000_1, and Kp KnapPI_3_10000_1000_1.
Biomimetics 11 00010 g009
Figure 10. Time analysis of the instances Kp KnapPI_1_100_1000_1, Kp KnapPI_1_200_1000_1, and Kp KnapPI_1_500_1000_1.
Figure 10. Time analysis of the instances Kp KnapPI_1_100_1000_1, Kp KnapPI_1_200_1000_1, and Kp KnapPI_1_500_1000_1.
Biomimetics 11 00010 g010
Figure 11. Time analysis of the instances Kp KnapPI_1_1000_1000_1, Kp KnapPI_1_2000_1000_1, and Kp KnapPI_1_5000_1000_1.
Figure 11. Time analysis of the instances Kp KnapPI_1_1000_1000_1, Kp KnapPI_1_2000_1000_1, and Kp KnapPI_1_5000_1000_1.
Biomimetics 11 00010 g011
Figure 12. Time analysis of the instances Kp KnapPI_1_10000_1000_1, Kp KnapPI_2_100_1000_1, and Kp KnapPI_2_200_1000_1.
Figure 12. Time analysis of the instances Kp KnapPI_1_10000_1000_1, Kp KnapPI_2_100_1000_1, and Kp KnapPI_2_200_1000_1.
Biomimetics 11 00010 g012
Figure 13. Time analysis of the instances Kp KnapPI_2_500_1000_1, Kp KnapPI_2_1000_1000_1, and Kp KnapPI_2_2000_1000_1.
Figure 13. Time analysis of the instances Kp KnapPI_2_500_1000_1, Kp KnapPI_2_1000_1000_1, and Kp KnapPI_2_2000_1000_1.
Biomimetics 11 00010 g013
Figure 14. Time analysis of the instances Kp KnapPI_2_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Figure 14. Time analysis of the instances Kp KnapPI_2_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Biomimetics 11 00010 g014
Figure 15. Time analysis of the instances Kp KnapPI_3_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Figure 15. Time analysis of the instances Kp KnapPI_3_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Biomimetics 11 00010 g015
Figure 16. Time analysis of the instances Kp KnapPI_3_2000_1000_1, Kp KnapPI_3_5000_1000_1, and Kp KnapPI_3_10000_1000_1.
Figure 16. Time analysis of the instances Kp KnapPI_3_2000_1000_1, Kp KnapPI_3_5000_1000_1, and Kp KnapPI_3_10000_1000_1.
Biomimetics 11 00010 g016
Figure 17. Convergence analysis of the instances Kp KnapPI_1_100_1000_1, Kp KnapPI_1_200_1000_1, and Kp KnapPI_1_500_1000_1.
Figure 17. Convergence analysis of the instances Kp KnapPI_1_100_1000_1, Kp KnapPI_1_200_1000_1, and Kp KnapPI_1_500_1000_1.
Biomimetics 11 00010 g017
Figure 18. Convergence analysis of the instances Kp KnapPI_1_1000_1000_1, Kp KnapPI_1_2000_1000_1, and Kp KnapPI_1_5000_1000_1.
Figure 18. Convergence analysis of the instances Kp KnapPI_1_1000_1000_1, Kp KnapPI_1_2000_1000_1, and Kp KnapPI_1_5000_1000_1.
Biomimetics 11 00010 g018
Figure 19. Convergence analysis of the instances Kp KnapPI_1_10000_1000_1, Kp KnapPI_2_100_1000_1, and Kp KnapPI_2_200_1000_1.
Figure 19. Convergence analysis of the instances Kp KnapPI_1_10000_1000_1, Kp KnapPI_2_100_1000_1, and Kp KnapPI_2_200_1000_1.
Biomimetics 11 00010 g019
Figure 20. Convergence analysis of the instances Kp KnapPI_2_500_1000_1, Kp KnapPI_2_1000_1000_1, and Kp KnapPI_2_2000_1000_1.
Figure 20. Convergence analysis of the instances Kp KnapPI_2_500_1000_1, Kp KnapPI_2_1000_1000_1, and Kp KnapPI_2_2000_1000_1.
Biomimetics 11 00010 g020
Figure 21. Convergence analysis of the instances Kp KnapPI_2_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Figure 21. Convergence analysis of the instances Kp KnapPI_2_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Biomimetics 11 00010 g021
Figure 22. Convergence analysis of the instances Kp KnapPI_3_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Figure 22. Convergence analysis of the instances Kp KnapPI_3_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Biomimetics 11 00010 g022
Figure 23. Convergence analysis of the instances Kp KnapPI_3_2000_1000_1, Kp KnapPI_3_5000_1000_1, and Kp KnapPI_3_10000_1000_1.
Figure 23. Convergence analysis of the instances Kp KnapPI_3_2000_1000_1, Kp KnapPI_3_5000_1000_1, and Kp KnapPI_3_10000_1000_1.
Biomimetics 11 00010 g023
Figure 24. Time analysis of the instances Kp KnapPI_1_100_1000_1, Kp KnapPI_1_200_1000_1, and Kp KnapPI_1_500_1000_1.
Figure 24. Time analysis of the instances Kp KnapPI_1_100_1000_1, Kp KnapPI_1_200_1000_1, and Kp KnapPI_1_500_1000_1.
Biomimetics 11 00010 g024
Figure 25. Time analysis of the instances Kp KnapPI_1_1000_1000_1, Kp KnapPI_1_2000_1000_1, and Kp KnapPI_1_5000_1000_1.
Figure 25. Time analysis of the instances Kp KnapPI_1_1000_1000_1, Kp KnapPI_1_2000_1000_1, and Kp KnapPI_1_5000_1000_1.
Biomimetics 11 00010 g025
Figure 26. Time analysis of the instances Kp KnapPI_1_10000_1000_1, Kp KnapPI_2_100_1000_1, and Kp KnapPI_2_200_1000_1.
Figure 26. Time analysis of the instances Kp KnapPI_1_10000_1000_1, Kp KnapPI_2_100_1000_1, and Kp KnapPI_2_200_1000_1.
Biomimetics 11 00010 g026
Figure 27. Time analysis of the instances Kp KnapPI_2_500_1000_1, Kp KnapPI_2_1000_1000_1, and Kp KnapPI_2_2000_1000_1.
Figure 27. Time analysis of the instances Kp KnapPI_2_500_1000_1, Kp KnapPI_2_1000_1000_1, and Kp KnapPI_2_2000_1000_1.
Biomimetics 11 00010 g027
Figure 28. Time analysis of the instances Kp KnapPI_2_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Figure 28. Time analysis of the instances Kp KnapPI_2_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Biomimetics 11 00010 g028
Figure 29. Time analysis of the instances Kp KnapPI_3_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Figure 29. Time analysis of the instances Kp KnapPI_3_5000_1000_1, Kp KnapPI_2_10000_1000_1, and Kp KnapPI_3_100_1000_1.
Biomimetics 11 00010 g029
Figure 30. Time analysis of the instances Kp KnapPI_3_2000_1000_1, Kp KnapPI_3_5000_1000_1, and Kp KnapPI_3_10000_1000_1.
Figure 30. Time analysis of the instances Kp KnapPI_3_2000_1000_1, Kp KnapPI_3_5000_1000_1, and Kp KnapPI_3_10000_1000_1.
Biomimetics 11 00010 g030
Figure 31. Convergence analysis of the instances Scp 41, Scp 51, and Scp 61.
Figure 31. Convergence analysis of the instances Scp 41, Scp 51, and Scp 61.
Biomimetics 11 00010 g031
Figure 32. Convergence analysis of the instances Scp a1, Scp b1, and Scp c1.
Figure 32. Convergence analysis of the instances Scp a1, Scp b1, and Scp c1.
Biomimetics 11 00010 g032
Figure 33. Convergence analysis of the instances Scp d1, Scp nre1, and Scp nrf1.
Figure 33. Convergence analysis of the instances Scp d1, Scp nre1, and Scp nrf1.
Biomimetics 11 00010 g033
Figure 34. Convergence analysis of the instances Scp nrg1 and Scp nrh1.
Figure 34. Convergence analysis of the instances Scp nrg1 and Scp nrh1.
Biomimetics 11 00010 g034
Figure 35. Time analysis of the instances Scp 41, Scp 51, and Scp 61.
Figure 35. Time analysis of the instances Scp 41, Scp 51, and Scp 61.
Biomimetics 11 00010 g035
Figure 36. Time analysis of the instances Scp a1, Scp b1, and Scp c1.
Figure 36. Time analysis of the instances Scp a1, Scp b1, and Scp c1.
Biomimetics 11 00010 g036
Figure 37. Time analysis of the instances Scp d1, Scp nre1, and Scp nrf1.
Figure 37. Time analysis of the instances Scp d1, Scp nre1, and Scp nrf1.
Biomimetics 11 00010 g037
Figure 38. Time analysis of the instances Scp nrg1 and Scp nrh1.
Figure 38. Time analysis of the instances Scp nrg1 and Scp nrh1.
Biomimetics 11 00010 g038
Figure 39. Convergence analysis of the instances Scp 41, Scp 51, and Scp 61.
Figure 39. Convergence analysis of the instances Scp 41, Scp 51, and Scp 61.
Biomimetics 11 00010 g039
Figure 40. Convergence analysis of the instances Scp a1, Scp b1, and Scp c1.
Figure 40. Convergence analysis of the instances Scp a1, Scp b1, and Scp c1.
Biomimetics 11 00010 g040
Figure 41. Convergence analysis of the instances Scp d1, Scp nre1, and Scp nrf1.
Figure 41. Convergence analysis of the instances Scp d1, Scp nre1, and Scp nrf1.
Biomimetics 11 00010 g041
Figure 42. Convergence analysis of the instances Scp nrg1 and Scp nrh1.
Figure 42. Convergence analysis of the instances Scp nrg1 and Scp nrh1.
Biomimetics 11 00010 g042
Figure 43. Time analysis of the instances Scp 41, Scp 51, and Scp 61.
Figure 43. Time analysis of the instances Scp 41, Scp 51, and Scp 61.
Biomimetics 11 00010 g043
Figure 44. Time analysis of the instances Scp a1, Scp b1, and Scp c1.
Figure 44. Time analysis of the instances Scp a1, Scp b1, and Scp c1.
Biomimetics 11 00010 g044
Figure 45. Time analysis of the instances Scp d1, Scp nre1, and Scp nrf1.
Figure 45. Time analysis of the instances Scp d1, Scp nre1, and Scp nrf1.
Biomimetics 11 00010 g045
Figure 46. Time analysis of the instances Scp nrg1 and Scp nrh1.
Figure 46. Time analysis of the instances Scp nrg1 and Scp nrh1.
Biomimetics 11 00010 g046
Figure 47. Convergence analysis of the instances Uscp 41, Uscp 51, and Uscp ua1.
Figure 47. Convergence analysis of the instances Uscp 41, Uscp 51, and Uscp ua1.
Biomimetics 11 00010 g047
Figure 48. Convergence analysis of the instances Uscp ub1, Uscp uc1, and Uscp ud1.
Figure 48. Convergence analysis of the instances Uscp ub1, Uscp uc1, and Uscp ud1.
Biomimetics 11 00010 g048
Figure 49. Convergence analysis of the instances Uscp unre1, Uscp unrf1, and Uscp unrg1.
Figure 49. Convergence analysis of the instances Uscp unre1, Uscp unrf1, and Uscp unrg1.
Biomimetics 11 00010 g049
Figure 50. Convergence analysis of the instances Uscp unrh1, Uscp uclr10, and Uscp ucyc08.
Figure 50. Convergence analysis of the instances Uscp unrh1, Uscp uclr10, and Uscp ucyc08.
Biomimetics 11 00010 g050
Figure 51. Time analysis of the instances Uscp 41, Uscp 51, and Uscp ua1.
Figure 51. Time analysis of the instances Uscp 41, Uscp 51, and Uscp ua1.
Biomimetics 11 00010 g051
Figure 52. Time analysis of the instances Uscp ub1, Uscp uc1, and Uscp ud1.
Figure 52. Time analysis of the instances Uscp ub1, Uscp uc1, and Uscp ud1.
Biomimetics 11 00010 g052
Figure 53. Time analysis of the instances Uscp unre1, Uscp unrf1, and Uscp unrg1.
Figure 53. Time analysis of the instances Uscp unre1, Uscp unrf1, and Uscp unrg1.
Biomimetics 11 00010 g053
Figure 54. Time analysis of the instances Uscp unrh1, Uscp uclr10, and Uscp ucyc08.
Figure 54. Time analysis of the instances Uscp unrh1, Uscp uclr10, and Uscp ucyc08.
Biomimetics 11 00010 g054
Figure 55. Convergence analysis of the instances Uscp 41, Uscp 51, and Uscp ua1.
Figure 55. Convergence analysis of the instances Uscp 41, Uscp 51, and Uscp ua1.
Biomimetics 11 00010 g055
Figure 56. Convergence analysis of the instances Uscp ub1, Uscp uc1, and Uscp ud1.
Figure 56. Convergence analysis of the instances Uscp ub1, Uscp uc1, and Uscp ud1.
Biomimetics 11 00010 g056
Figure 57. Convergence analysis of the instances Uscp unre1, Uscp unrf1, and Uscp unrg1.
Figure 57. Convergence analysis of the instances Uscp unre1, Uscp unrf1, and Uscp unrg1.
Biomimetics 11 00010 g057
Figure 58. Convergence analysis of the instances Uscp unrh1, Uscp uclr10, and Uscp ucyc08.
Figure 58. Convergence analysis of the instances Uscp unrh1, Uscp uclr10, and Uscp ucyc08.
Biomimetics 11 00010 g058
Figure 59. Time analysis of the instances Uscp 41, Uscp 51, and Uscp ua1.
Figure 59. Time analysis of the instances Uscp 41, Uscp 51, and Uscp ua1.
Biomimetics 11 00010 g059
Figure 60. Time analysis of the instances Uscp ub1, Uscp uc1, and Uscp ud1.
Figure 60. Time analysis of the instances Uscp ub1, Uscp uc1, and Uscp ud1.
Biomimetics 11 00010 g060
Figure 61. Time analysis of the instances Uscp unre1, Uscp unrf1, and Uscp unrg1.
Figure 61. Time analysis of the instances Uscp unre1, Uscp unrf1, and Uscp unrg1.
Biomimetics 11 00010 g061
Figure 62. Time analysis of the instances Uscp unrh1, Uscp uclr10, and Uscp ucyc08.
Figure 62. Time analysis of the instances Uscp unrh1, Uscp uclr10, and Uscp ucyc08.
Biomimetics 11 00010 g062
Table 1. Task data (KP maintenance example).
Table 1. Task data (KP maintenance example).
TaskTime (h)Value (Benefit Units)
Shaft alignment350
Belt replacement465
Advanced lubrication230
Sensor calibration340
PLC software update115
Backup motor replacement580
Table 2. Best feasible combinations (KP maintenance example).
Table 2. Best feasible combinations (KP maintenance example).
Tasks (Codes)Total Time (h)Total Value
BR + PLC + BMR10160
SA + AL + BMR10160
SA + BR + AL + PLC10160
SA + BR + SC10155
AL + SC + BMR10150
BR + AL + SC + PLC10150
BR + BMR9145
SA + BR + AL9145
SA + PLC + BMR9145
Table 3. Coverage matrix A: a i j = 1 if route R j covers zone Z i .
Table 3. Coverage matrix A: a i j = 1 if route R j covers zone Z i .
R 1 (4 h) R 2 (4 h) R 3 (5 h) R 4 (3 h) R 5 (3 h) R 6 (2 h)
Z 1 101010
Z 2 110000
Z 3 011000
Z 4 010110
Z 5 001101
Table 4. S-shaped and V-shaped transfer functions.
Table 4. S-shaped and V-shaped transfer functions.
S-ShapedV-Shaped
NameEquation NameEquation
S1 T ( d j i ) = 1 1 + e 2 d j i V1 T ( d j i ) = erf π 2 d j i
S2 T ( d j i ) = 1 1 + e d j i V2 T ( d j i ) = tanh ( d j i )
S3 T ( d j i ) = 1 1 + e d j i / 2 V3 T ( d j i ) = d j i 1 + ( d j i ) 2
S4 T ( d j i ) = 1 1 + e d j i / 3 V4 T ( d j i ) = 2 π arctan π 2 d j i
Table 5. Instances used for parameter configuration (subset for KP, SCP, and USCP).
Table 5. Instances used for parameter configuration (subset for KP, SCP, and USCP).
InstanceTypeItems (KP)MNDensity (%)Optimum
knapPI_1_500_1000_1KP50028,857
knapPI_1_1000_1000_1KP100054,503
knapPI_1_5000_1000_1KP5000276,457
b1SCP30030005.0069
c1SCP40040002.00227
nre1SCP500500010.0029
u41USCP20010002.0038
uc1USCP40040002.0043
unrf1USCP500500020.0010
Table 6. Parameter selection at 100 iterations (population size = ten; averages over 31 runs).
Table 6. Parameter selection at 100 iterations (population size = ten; averages over 31 runs).
PopIterInstanceBestWorstAverageTime (s)Time (min)
KP (S1–STD, maximization)
10100knapPI_1_500_1000_128,85728,83428,848.0972.7140.05
10100knapPI_1_1000_1000_154,45154,06454,303.7105.8630.10
10100knapPI_1_5000_1000_1267,200263,802265,321.58152.3760.87
SCP (V3–ELIT, minimization)
10100b1697170.00063.1401.05
10100c1232236233.516215.8963.60
10100nre1292929.00056.8670.95
USCP (V3–ELIT, minimization)
10100u41384139.77410.2290.17
10100uc1444644.64571.3311.19
10100unrf1101110.452135.3142.26
Table 7. S vs. V with binarization at 100 iterations (averages over 31 runs).
Table 7. S vs. V with binarization at 100 iterations (averages over 31 runs).
ProblemInstanceTransferRuleOptimumAvg. ValueGap (%)/Time (s)
KP (maximization; Gap% = (Opt− Avg)/Opt × 100 )
KPknapPI_1_500_1000_1S1STD28,85728,848.0970.03%/2.714
KPknapPI_1_500_1000_1V1STD28,85727,976.6133.05%/0.727
KPknapPI_1_1000_1000_1S1STD54,50354,303.7100.37%/5.863
KPknapPI_1_1000_1000_1V1STD54,50350,257.6137.80%/1.328
KPknapPI_1_5000_1000_1S1STD276,457265,321.5814.03%/52.376
KPknapPI_1_5000_1000_1V1STD276,457237,092.67714.23%/7.010
SCP (minimization; Gap% = (Avg−Opt)/Opt × 100 )
SCPb1S3ELIT6970.0651.54%/73.290
SCPb1V3ELIT6970.0001.45%/63.140
SCPc1S3ELIT227234.6773.38%/249.704
SCPc1V3ELIT227233.5162.87%/215.896
SCPnre1S3ELIT2929.0650.22%/204.980
SCPnre1V3ELIT2929.0000.00%/56.867
USCP (minimization; Gap% = (Avg−Opt)/Opt × 100 )
USCPu41S3ELIT3841.1948.41%/14.809
USCPu41V3ELIT3839.7744.67%/10.229
USCPuc1S3ELIT4347.48410.42%/143.564
USCPuc1V3ELIT4344.6453.83%/71.331
USCPunrf1S3ELIT1010.8068.06%/184.001
USCPunrf1V3ELIT1010.4524.52%/135.314
Table 8. Configuration of parameters.
Table 8. Configuration of parameters.
ParameterValue
All MHPopulation size10
Iterations100
Independent runs31
KPTransfer functionsS1 – V1
Method of discretizationSTD
SCP – USCPTransfer functionsS3 – V3
Method of discretizationELIT
PSO w m i n 0.1
w m a x 0.9
c 1 2
c 2 2
SBOACFpotentially decreases at 0
AOA M O P m i n 0.2
M O P m a x 1.0
α 5
μ 0.499
Table 9. Instances used for KP.
Table 9. Instances used for KP.
InstanceNumber of ItemsOptimum
knapPI_1_100_1000_11009147
knapPI_1_200_1000_120011,238
knapPI_1_500_1000_150028,857
knapPI_1_1000_1000_1100054,503
knapPI_1_2000_1000_12000110,625
knapPI_1_5000_1000_15000276,457
knapPI_1_10000_1000_110,000563,647
knapPI_2_100_1000_11001514
knapPI_2_200_1000_12001634
knapPI_2_500_1000_15004566
knapPI_2_1000_1000_110009052
knapPI_2_2000_1000_1200018,051
knapPI_2_5000_1000_1500044,356
knapPI_2_10000_1000_110,00090,204
knapPI_3_100_1000_11002397
knapPI_3_200_1000_12002697
knapPI_3_500_1000_15007117
knapPI_3_1000_1000_1100014,390
knapPI_3_2000_1000_1200028,919
knapPI_3_5000_1000_1500072,505
knapPI_3_10000_1000_110,000146,919
Table 10. Instances used for SCP.
Table 10. Instances used for SCP.
InstanceMNDensity (%)Optimum
4120010002.00429
5120020002.00253
6120010005.00138
A130030002.00253
B130030005.0069
C140040002.00227
D140040005.0060
NRE1500500010.0029
NRF1500500020.0014
NRG1100010,0002.00176
NRH1100010,0005.0063
Table 11. Instances used for USCP.
Table 11. Instances used for USCP.
InstanceMNDensity (%)Optimum
U4120010002.0038
U5120020002.0034
U6120010005.0021
UA130030002.0039
UB130030005.0022
UC140040002.0043
UD140040005.0024
UNRE1500500010.0017
UNRF1500500020.0010
UNRG1100010,0002.0061
UNRH1100010,0005.0034
CLR1051121012.3025
CYC08179210240.40344
Table 12. Fitness results per KP instance using S1-STD binarization.
Table 12. Fitness results per KP instance using S1-STD binarization.
MHInstanceOpt.BestWorstAvg. FitnessStd. FitnessRPD
POAknapPI_1_100_1000_191479147.0009147.0009147.0000.0000.000
PSO9147.0009147.0009147.0000.0000.000
SBOA9147.0009147.0009147.0000.0000.000
AOA9147.0009147.0009147.0000.0000.000
POAknapPI_1_200_1000_111,23811,238.00011,238.00011,238.0000.0000.000
PSO11,238.00011,238.00011,238.0000.0000.000
SBOA11,238.00011,238.00011,238.0000.0000.000
AOA11,238.00011,238.00011,238.0000.0000.000
POAknapPI_1_500_1000_128,85728,857.00028,834.00028,848.09711.3880.031
PSO28,857.00028,834.00028,846.61311.6300.036
SBOA28,857.00028,834.00028,849.54810.9980.026
AOA28,834.00028,360.00028,599.452133.4730.893
POAknapPI_1_1000_1000_154,50354,451.00054,064.00054,303.71083.3970.366
PSO54,481.00053,945.00054,225.581119.1340.509
SBOA54,503.00054,102.00054,286.839111.4310.397
AOA53,197.00051,786.00052,317.581371.4394.010
POAknapPI_1_2000_1000_1110,625109,619.000108,005.000108,681.355391.0451.757
PSO109,676.000107,805.000108,486.968517.3451.933
SBOA109,474.000108,032.000108,611.903308.2031.820
AOA104,085.000100,624.000102,140.452928.6187.670
POAknapPI_1_5000_1000_1276,457267,200.000263,802.000265,321.581871.7814.028
PSO266,224.000263,666.000264,813.480712.7814.211
SBOA268,586.000264,142.000265,636.0001011.6213.914
AOA247,200.000242,275.000244,586.2581192.17611.528
POAknapPI_1_10000_1000_1563,647535,652.000528,828.000531,830.7421805.2025.644
PSO534,108.000528,154.000530,036.7741290.3935.962
SBOA536,441.000529,071.000531,588.5811781.9965.688
AOA485,986.000477,145.000481,075.8392125.04414.651
POAknapPI_2_100_1000_115141512.0001512.0001512.0000.0000.000
PSO1512.0001512.0001512.0000.0000.000
SBOA1512.0001512.0001512.0000.0000.132
AOA1512.0001512.0001512.0000.0000.132
POAknapPI_2_200_1000_116341634.0001634.0001634.0000.0000.000
PSO1634.0001634.0001634.0000.0000.000
SBOA1634.0001634.0001634.0000.0000.000
AOA1634.0001634.0001634.0000.0000.000
POAknapPI_2_500_1000_145664566.0004553.0004560.3234.8050.031
PSO4566.0004552.0004558.2264.6170.036
SBOA4566.0004554.0004559.8714.4250.134
AOA4566.0004547.0004552.7423.4210.290
POAknapPI_2_1000_1000_190529051.0009026.0009046.1944.0860.067
PSO9051.0009033.0009044.5164.7740.084
SBOA9051.0009039.0009047.0323.2970.055
AOA9015.0008913.0008963.51623.4750.978
POAknapPI_2_2000_1000_118,05118,012.00017,911.00017,957.25824.2230.519
PSO17,971.00017,900.00017,932.38721.7500.657
SBOA18,026.00017,886.00017,958.06534.7120.515
AOA17,681.00017,472.00017,567.06552.4842.681
POAknapPI_2_5000_1000_144,35643,889.00043,592.00043,757.80061.2921.348
PSO43,872.00043,596.000226.20074.7171.446
SBOA43,868.00043,612.00043,745.45244.9691.376
AOA42,630.00042,265.00042,421.87184.4464.360
POAknapPI_2_10000_1000_190,20488,613.00088,002.00088275.290149.2882.138
PSO88,403.00087,854.00088,134.387135.9422.294
SBOA88,484.00088,112.00088,263.161108.1022.152
AOA85,108.00084,646.00084,850.323140.9865.935
Table 13. Fitness results per KP instance using S1-STD binarization.
Table 13. Fitness results per KP instance using S1-STD binarization.
MHInstanceOpt.BestWorstAvg. FitnessStd. FitnessRPD
POAknapPI_3_100_1000_123972397.0002397.0002397.0000.0000.000
PSO2397.0002396.0002396.9350.2500.002
SBOA2397.0002397.0002397.0000.0000.000
AOA2397.0002396.0002396.9680.1770.001
POAknapPI_3_200_1000_126972697.0002697.0002697.0000.0000.000
PSO2697.0002697.0002697.0000.0000.000
SBOA2697.0002697.0002697.0000.0000.000
AOA2697.0002697.0002697.0000.0000.000
POAknapPI_3_500_1000_171177117.0007116.0007116.9680.1800.000
PSO7117.0007117.0007117.0000.0000.000
SBOA7117.0007117.0007117.0000.0000.000
AOA7115.0007012.0007021.87123.9891.337
POAknapPI_3_1000_1000_114,39014,388.00014,287.00014,298.61328.6590.632
PSO14,387.00014,275.00014,294.22624.7090.664
SBOA14,390.00014,287.00014,305.48436.3840.587
AOA14,087.00013,877.00013,938.96865.5433.134
POAknapPI_3_2000_1000_128,91928,704.00028,418.00028,555.29063.3451.258
PSO28,718.00028,318.00028,473.71084.3281.540
SBOA28,814.00028,417.00028,534.38776.6431.330
AOA27,606.00027,109.00027,245.871113.7775.786
POAknapPI_3_5000_1000_172,50570,593.00070,099.00070,360.258126.8732.959
PSO70,603.00069,905.00070,231.419159.1883.135
SBOA70,694.00070,199.00070,377.129133.9002.935
AOA67,701.00065,996.00066,383.323322.2188.443
POAknapPI_3_10000_1000_1146,919141,818.000140,618.000141,075.548266.5293.977
PSO141,215.000140,507.000140,827.323211.7124.146
SBOA141,317.000140,716.000141,052.226165.6253.993
AOA132,716.000131,313.000132,050.871320.99010.120
Table 14. Times per KP instance (S1-STD).
Table 14. Times per KP instance (S1-STD).
MHInstanceMin. Time (s)Max. Time (s)Avg. Time (s)Std. Time (s)
POAknapPI_1_100_1000_10.5310.7500.6200.059
PSO0.1410.2810.2040.035
SBOA0.4530.6720.5150.051
AOA0.4370.6090.5090.040
POAknapPI_1_200_1000_10.9841.3751.1420.103
PSO0.3280.5000.4040.045
SBOA0.8591.2181.0280.088
AOA0.8281.1560.9750.088
POAknapPI_1_500_1000_12.2033.5302.7140.389
PSO0.7651.1720.9080.108
SBOA2.2493.0462.5360.215
AOA2.1252.7962.3610.177
POAknapPI_1_1000_1000_14.9056.6235.8630.457
PSO1.5312.3281.8770.199
SBOA5.0616.6085.6420.380
AOA4.3275.2644.7960.229
POAknapPI_1_2000_1000_111.48216.05913.8551.352
PSO3.2024.5613.8140.371
SBOA12.24713.95012.9690.496
AOA9.71610.91910.1580.334
POAknapPI_1_5000_1000_143.45966.50052.3765.814
PSO8.87313.15310.8411.150
SBOA48.98952.75350.8401.039
AOA29.82132.94531.2140.816
POAknapPI_1_10000_1000_1137.686197.750166.98413.539
PSO22.19735.95227.5933.218
SBOA152.371163.685160.2792.062
AOA78.40485.96480.7411.391
POAknapPI_2_100_1000_10.4840.7340.5870.067
PSO0.1410.2190.1750.024
SBOA0.4840.6870.5630.056
AOA0.4530.6250.5140.053
POAknapPI_2_200_1000_10.9061.5001.1540.147
PSO0.3120.4690.3810.047
SBOA0.9061.2651.0480.088
AOA0.8281.2030.9830.101
POAknapPI_2_500_1000_12.2653.6402.7620.392
PSO0.7341.1560.8850.113
SBOA2.2343.0772.5540.218
AOA2.1252.9372.3850.187
POAknapPI_2_1000_1000_14.9837.3585.9310.764
PSO1.5002.2181.8380.208
SBOA5.0936.5925.7230.352
AOA4.5305.3584.8410.226
POAknapPI_2_2000_1000_111.54417.41814.2481.618
PSO3.1245.0773.7800.459
SBOA12.29414.48113.3970.532
AOA9.27911.04410.3050.419
POAknapPI_2_5000_1000_144.92768.40654.7935.535
PSO8.92013.46610.8721.199
SBOA51.11356.20652.7541.074
AOA30.47734.35132.0140.913
POAknapPI_2_10000_1000_1141.201213.872173.62317.640
PSO22.57337.42927.5343.419
SBOA159.369169.898163.7862.620
AOA80.20088.26183.0101.671
Table 15. Times per KP instance (S1-STD).
Table 15. Times per KP instance (S1-STD).
MHInstanceMin. Time (s)Max. Time (s)Avg. Time (s)Std. Time (s)
POAknapPI_3_100_1000_10.4690.7340.5980.072
PSO0.1410.2030.1680.017
SBOA0.4530.6720.5430.053
AOA0.4220.6250.5110.049
POAknapPI_3_200_1000_10.9221.4531.1110.123
PSO0.2970.4530.3730.040
SBOA0.8751.2811.0190.097
AOA0.8441.2500.9640.084
POAknapPI_3_500_1000_12.2962.9372.5650.164
PSO0.7190.9530.8060.064
SBOA2.2812.8902.5160.161
AOA1.9212.6562.3040.202
POAknapPI_3_1000_1000_14.7967.4835.7950.737
PSO1.4372.4211.7740.291
SBOA5.0466.3745.6580.316
AOA4.4685.2024.7780.181
POAknapPI_3_2000_1000_111.24717.15213.5471.544
PSO3.0935.1713.7470.498
SBOA12.06013.71612.8060.488
AOA9.46710.60710.1130.311
POAknapPI_3_5000_1000_147.53651.81649.7050.991
PSO8.67013.63710.7641.205
SBOA48.28653.97250.2991.232
AOA29.44633.32031.1240.798
POAknapPI_3_10000_1000_1135.046198.672163.97416.361
PSO21.97932.77426.9133.364
SBOA152.683164.227157.7802.722
AOA76.88883.94979.8551.498
Table 16. Fitness results per KP instance using V1-STD binarization.
Table 16. Fitness results per KP instance using V1-STD binarization.
MHInstanceOpt.BestWorstAvg. FitnessStd. FitnessRPD
POAknapPI_1_100_1000_191479147.0008817.0009012.935140.4211.466
PSO9147.0008382.0008806.355211.1943.723
SBOA9147.0008817.0009004.161159.0631.562
AOA9147.0008259.0008769.613219.0354.126
POAknapPI_1_200_1000_111,23811,238.00011,227.00011,227.7102.7470.094
PSO11,238.0009996.00010,781.935303.3754.058
SBOA11,238.00011,227.00011,227.3551.9440.095
AOA11,223.00010,049.00010,689.710327.5924.879
POAknapPI_1_500_1000_128,85728,834.00027,191.00027,976.613384.6203.051
PSO26,826.00024,015.00025,755.484642.63210.747
SBOA28,834.00027,563.00028,005.903342.9112.949
AOA27,434.00023,935.00025,686.355770.76410.987
POAknapPI_1_1000_1000_154,50352,068.00049,104.00050,257.613745.5107.790
PSO48,194.00043,592.00045,806.5161265.73515.955
SBOA52,032.00049,203.00050,175.387708.9087.940
AOA47,866.00043,653.00045,646.7741097.03416.249
POAknapPI_1_2000_1000_1110,625100,075.00096,693.00098,328.258920.65911.116
PSO92,932.00085,064.00089,699.9681907.71918.916
SBOA100,160.00096,088.00098,177.6771053.37611.252
AOA92,339.00087,116.00089,570.1291436.59519.033
POAknapPI_1_5000_1000_1276,457244,096.000232,686.000237,092.6772242.51014.239
PSO220,459.000209,969.000214,835.7742635.13922.290
SBOA240,936.000234,072.000236,346.7741577.16914.509
AOA218,553.000210,698.000215,019.2582209.59422.223
POAknapPI_1_10000_1000_1563,647478,675.000467,908.000470,893.1942429.43916.455
PSO432,686.000417,866.000424,146.6773800.35824.749
SBOA480,921.000464,959.000471,139.5813564.16216.412
AOA435,222.000415,563.000425,328.3874867.36224.540
POAknapPI_2_100_1000_115141512.0001496.0001505.4526.6470.564
PSO1512.0001449.0001493.67713.8501.343
SBOA1512.0001481.0001504.6137.2100.620
AOA1512.0001430.0001489.51616.0081.617
POAknapPI_2_200_1000_116341634.0001610.0001624.4846.8550.583
PSO1634.0001585.0001610.41914.0561.443
SBOA1634.0001604.0001621.7107.7510.752
AOA1633.0001560.0001608.09717.7131.585
POAknapPI_2_500_1000_145664551.0004465.0004534.19426.5130.698
PSO4497.0004286.000 61.9273.815
SBOA4566.0004400.0004520.87144.6600.988
AOA4484.0004241.000 62.9504.232
POAknapPI_2_1000_1000_190528934.0008448.0008649.806108.2194.443
PSO8708.0008382.0008518.48485.4285.893
SBOA8808.0008459.0008627.61384.0774.688
AOA8672.0008375.0008527.41964.5385.795
POAknapPI_2_2000_1000_118,05116,877.00016,428.00016,627.710111.2417.884
PSO17,184.00016,323.00016,674.355216.3257.626
SBOA17,013.00016,351.00016,666.226140.8647.671
AOA17,015.00016,325.00016,664.903176.9937.679
POAknapPI_2_5000_1000_144,35640,583.00039,900.00040,295.129188.2279.155
PSO40,900.00039,781.00040,331.806259.4069.072
SBOA40,893.00040,015.00040,372.290209.5458.981
AOA40,916.00039,963.00040,374.129235.3138.977
POAknapPI_2_10000_1000_190,20481,559.00080,194.00080,812.774325.68310.412
PSO81,916.00080,070.00080,954.355438.73210.254
SBOA81,785.00080,073.00080,734.677374.70910.498
AOA81,873.00079,881.00080,857.387476.80510.362
Table 17. Fitness results per KP instance using V1-STD binarization.
Table 17. Fitness results per KP instance using V1-STD binarization.
MHInstanceOpt.BestWorstAvg. FitnessStd. FitnessRPD
POAknapPI_3_100_1000_123972397.0002375.0002391.2266.5660.240
PSO2390.0002265.0002302.90337.6693.925
SBOA2397.0002375.0002388.4847.1520.355
AOA2396.0002237.0002297.16136.9294.165
POAknapPI_3_200_1000_126972697.0002672.0002688.9037.4450.301
PSO2696.0002487.0002633.19455.4042.366
SBOA2697.0002649.0002679.16112.3470.661
AOA2697.0002573.0002629.12948.1222.517
POAknapPI_3_500_1000_171176989.0006661.0006823.74283.3494.122
PSO6913.0006495.0006649.935109.1756.563
SBOA6938.0006614.0006758.03277.1425.044
AOA6808.0006410.0006593.484101.3487.356
POAknapPI_3_1000_1000_114,39013,564.00012,881.00013,187.323162.6408.358
PSO13,190.00012,586.00012,899.129183.28110.361
SBOA13,589.00012,879.00013,142.839190.8148.667
AOA13,385.00012,582.00012,946.484192.58610.031
POAknapPI_3_2000_1000_128,91926,072.00025,132.00025,537.097240.07711.695
PSO25,618.00024,618.00025,107.355238.30813.180
SBOA26,468.00025,015.00025,433.290292.36912.053
AOA25,510.00024,417.00025,078.129271.89913.281
POAknapPI_3_5000_1000_172,50562,807.00061,104.00061,690.129405.20914.916
PSO62,603.00061,000.00061,484.516436.34315.200
SBOA62,700.00060,697.00061,683.290396.87114.925
AOA63,601.00060,701.00061,677.581529.03714.933
POAknapPI_3_10000_1000_1146,919124,419.000121,715.000122,723.645541.98816.469
PSO124,216.000121,516.000122,845.258677.18916.386
SBOA125,019.000121,716.000122,749.742726.67616.451
AOA123,519.000121,218.000122,412.968481.21016.680
Table 18. Times per KP instance (V1-STD).
Table 18. Times per KP instance (V1-STD).
MHInstanceMin. Time (s)Max. Time (s)Avg. Time (s)Std. Time (s)
POAknapPI_1_100_1000_10.2140.2970.2480.017
PSO0.0710.1040.0780.009
SBOA0.1720.2660.2220.027
AOA0.3120.5160.3900.047
POAknapPI_1_200_1000_10.3320.4450.3700.028
PSO0.1270.1820.1500.018
SBOA0.2500.4220.3150.045
AOA0.5940.8590.7190.076
POAknapPI_1_500_1000_10.6340.8280.7270.045
PSO0.3130.4350.3690.031
SBOA0.5000.8120.6670.071
AOA1.4531.9371.7170.124
POAknapPI_1_1000_1000_11.1881.4451.3280.069
PSO0.6420.8560.7150.051
SBOA1.0001.4221.1730.099
AOA2.9373.7183.2530.199
POAknapPI_1_2000_1000_12.4602.8112.5890.087
PSO1.2641.6301.4100.093
SBOA2.0462.7342.3340.150
AOA5.8427.2016.3420.366
POAknapPI_1_5000_1000_16.6017.5487.0100.220
PSO3.2374.0173.4810.192
SBOA5.9676.9206.3600.261
AOA14.84017.24615.7960.533
POAknapPI_1_10000_1000_115.69117.66216.4440.447
PSO6.6327.8127.0800.266
SBOA14.12515.67214.8380.351
AOA30.46233.36731.9350.892
POAknapPI_2_100_1000_10.2080.2690.2340.015
PSO0.0710.1000.0790.009
SBOA0.1560.2810.2110.032
AOA0.3440.5000.4020.039
POAknapPI_2_200_1000_10.3070.4070.3450.026
PSO0.1240.1820.1450.017
SBOA0.2340.3750.3100.034
AOA0.5941.0150.7310.081
POAknapPI_2_500_1000_10.6490.7850.7190.033
PSO0.3510.5020.4080.038
SBOA0.5310.8120.6370.065
AOA1.5312.0311.6760.126
POAknapPI_2_1000_1000_11.2051.4611.3120.077
PSO0.6230.8170.7110.051
SBOA0.9531.3591.1470.100
AOA2.9063.7493.2550.210
POAknapPI_2_2000_1000_12.3082.7982.5060.107
PSO1.2691.7481.3980.078
SBOA1.8902.5622.1420.148
AOA5.8426.9676.3590.295
POAknapPI_2_5000_1000_16.2147.0916.5490.187
PSO3.2174.0053.4830.179
SBOA5.3116.2175.6590.249
AOA14.45017.10515.7050.660
POAknapPI_2_10000_1000_114.89216.55215.5680.420
PSO6.6597.7037.1210.225
SBOA12.29413.68413.0630.362
AOA29.99333.60131.7170.858
Table 19. Times per KP instance (V1-STD).
Table 19. Times per KP instance (V1-STD).
MHInstanceMin. Time (s)Max. Time (s)Avg. Time (s)Std. Time (s)
POAknapPI_3_100_1000_10.2190.3070.2560.021
PSO0.0710.0970.0760.007
SBOA0.1720.2810.2230.025
AOA0.3440.5000.3890.036
POAknapPI_3_200_1000_10.3190.3980.3580.021
PSO0.1250.1780.1430.014
SBOA0.2500.4060.3260.035
AOA0.5940.9370.7340.091
POAknapPI_3_500_1000_10.6540.8870.7390.052
PSO0.3300.4470.3740.031
SBOA0.5470.8280.6530.068
AOA1.5311.9681.6940.099
POAknapPI_3_1000_1000_11.1731.4621.3460.069
PSO0.6400.8240.7110.044
SBOA1.0621.6401.2350.124
AOA2.9063.6553.2530.194
POAknapPI_3_2000_1000_12.4202.7792.6060.099
PSO1.2331.5311.3920.069
SBOA2.1252.8272.3880.152
AOA5.8277.0146.3320.290
POAknapPI_3_5000_1000_16.6557.5717.0670.263
PSO3.1533.7873.4870.171
SBOA6.0147.1236.5250.297
AOA14.66817.24615.8910.527
POAknapPI_3_10000_1000_116.41017.77216.8940.322
PSO6.7307.6537.0900.248
SBOA14.88716.54315.6500.490
AOA30.02434.10131.5400.878
Table 20. Fitness results per SCP instance using V3-ELIT binarization.
Table 20. Fitness results per SCP instance using V3-ELIT binarization.
MHInstanceOpt.BestWorstAvg. FitnessStd. FitnessRPD
POA41429433.000433.000433.0000.0000.930
PSO433.000433.000433.0000.0000.930
SBOA433.000434.000433.1940.3950.978
AOA435.000439.000437.1940.8581.910
POA51253267.000269.000267.4190.5645.697
PSO267.000269.000267.4190.7655.696
SBOA263.000269.000267.0970.8935.572
AOA261.000271.000269.1611.6876.388
POA61138141.000145.000141.9351.6322.849
PSO141.000145.000142.0321.6632.919
SBOA141.000144.000141.2900.6322.384
AOA141.000147.000142.8391.6283.506
POAa1253257.000257.000257.0000.0001.580
PSO257.000258.000257.0970.3011.619
SBOA257.000259.000257.5160.6151.785
AOA259.000266.000262.4191.7373.723
POAb16969.00071.00070.0000.9661.450
PSO69.00072.00070.4521.0282.105
SBOA69.00071.00070.0000.6221.449
AOA69.00072.00070.2900.8111.870
POAc1227232.000236.000233.5160.7692.867
PSO231.000236.000233.8710.9223.023
SBOA234.000236.000234.7740.5513.425
AOA237.000242.000239.4191.2125.471
POAd16060.00063.00061.8710.8853.118
PSO61.00065.00062.0321.0483.388
SBOA61.00062.00061.6450.4782.742
AOA61.00064.00062.2580.8793.763
POAnre12929.00029.00029.0000.0000.000
PSO29.00029.00029.0000.0000.000
SBOA29.00029.00029.0000.0000.000
AOA29.00029.00029.0000.0000.000
POAnrf11414.00015.00014.0320.1800.230
PSO14.00015.00014.1610.3741.152
SBOA14.00014.00014.0000.0000.000
AOA14.00015.00014.0320.1770.230
POAnrg1176179.000186.000181.9681.6023.391
PSO179.000185.000181.8391.5513.318
SBOA180.000184.000181.7421.0153.262
AOA183.000189.000186.6451.5146.048
POAnrh16364.00068.00065.6131.0224.146
PSO64.00068.00065.6131.1744.147
SBOA64.00067.00064.9030.8933.021
AOA65.00069.00066.7420.8795.940
Table 21. Times per SCP instance (V3-ELIT).
Table 21. Times per SCP instance (V3-ELIT).
MHInstanceMin. Time (s)Max. Time (s)Avg. Time (s)Std. Time (s)
POA4118.88620.99520.0500.533
PSO15.07515.40315.2800.087
SBOA16.48120.55818.2760.942
AOA13.32516.61014.5880.750
POA5131.44635.63233.2331.075
PSO21.87022.74522.2380.199
SBOA28.13443.52132.7142.750
AOA21.44827.80624.1291.757
POA6112.74715.85614.3620.819
PSO9.77910.82610.2600.247
SBOA12.07516.60513.8451.103
AOA9.09213.49710.4031.001
POAa185.90298.74293.4122.839
PSO47.37948.67647.8800.275
SBOA84.886109.17895.7185.624
AOA54.51866.37559.7373.258
POAb157.06567.62563.1402.380
PSO29.71232.08630.6660.588
r59.37773.71766.3403.130
AOA35.21145.69239.0952.461
POAc1200.484228.774215.8966.847
PSO89.74493.80691.7440.875
SBOA199.719235.429216.8548.214
AOA121.597147.590136.6986.073
POAd1128.407144.872137.6084.022
PSO60.77264.02362.2140.727
SBOA131.375155.385140.6165.884
AOA73.42095.57182.5264.730
POAnre154.33159.56456.8671.462
PSO8.7799.1238.9640.083
SBOA179.161214.090194.2427.053
AOA94.572111.552104.0094.155
POAnrf181.73190.10484.9372.060
PSO8.5149.3578.9690.195
SBOA179.146215.949203.1029.491
AOA82.871110.72490.2785.577
POAnrg1124.814136.874132.2883.018
PSO110.989113.958112.3980.822
SBOA1689.5641802.6591743.97227.850
AOA1046.5361123.4011085.38519.897
POAnrh1141.217143.060142.0190.437
PSO75.70176.29575.9860.134
SBOA1085.9751200.7941147.70729.547
AOA609.077666.186635.27913.771
Table 22. Fitness results per SCP instance using S3-ELIT binarization.
Table 22. Fitness results per SCP instance using S3-ELIT binarization.
MHInstanceOpt.BestWorstAvg. FitnessStd. FitnessRPD
POA41429433.000438.000434.3231.7591.241
PSO433.000437.000434.0001.3171.165
SBOA434.000437.000435.0320.7821.406
AOA433.000438.000434.7101.3001.331
POA51253256.000269.000267.3232.2275.659
PSO257.000275.000267.7102.5595.813
SBOA267.000270.000268.6770.7366.197
AOA267.000269.000267.6450.6505.789
POA61138141.000145.000143.2581.8793.808
PSO141.000146.000143.9031.6804.276
SBOA141.000143.000141.8710.4912.805
AOA140.000146.000142.9681.9263.600
POAa1253257.000263.000258.0971.3002.015
PSO257.000263.000258.3551.6842.117
SBOA257.000262.000259.7741.0382.678
AOA257.000262.000258.6451.1512.231
POAb16969.00072.00070.0651.1241.544
PSO69.00072.00070.4521.0602.105
SBOA69.00071.00070.3550.6981.964
AOA69.00072.00070.2901.0531.870
POAc1227232.000237.000234.6771.1073.378
PSO232.000237.000234.5811.2593.336
SBOA235.000239.000236.8390.9544.334
AOA234.000238.000235.6131.1273.794
POAd16060.00064.00061.8390.8983.064
PSO60.00065.00062.0001.1253.333
SBOA61.00063.00062.0320.5383.387
AOA60.00066.00062.1291.1003.548
POAnre12929.00030.00029.0650.2500.223
PSO29.00030.00029.0320.1800.111
SBOA29.00029.00029.0000.0000.000
AOA29.00030.00029.1610.3680.556
POAnrf11414.00015.00014.1940.4021.382
PSO14.00015.00014.1610.3741.152
SBOA14.00014.00014.0000.0000.000
AOA14.00015.00014.1610.3681.152
POAnrg1176180.000186.000182.4521.7103.666
PSO180.000186.000182.8711.6073.905
SBOA181.000186.000184.2901.0834.710
AOA181.000189.000183.5481.7574.289
POAnrh16364.00069.00066.2901.2165.222
PSO64.00068.00066.3870.9895.376
SBOA64.00068.00066.2260.9065.120
AOA64.00069.00066.3551.0945.325
Table 23. Times per SCP instance (S3-ELIT).
Table 23. Times per SCP instance (S3-ELIT).
MHInstanceMin. Time (s)Max. Time (s)Avg. Time (s)Std. Time (s)
POA4119.09326.77422.3552.202
PSO18.37019.98019.1110.427
SBOA19.46023.21420.9661.059
AOA10.37313.27811.5540.699
POA5132.48544.23937.3692.973
PSO27.89129.23828.4840.354
SBOA31.94643.80236.4242.616
AOA16.48121.35418.8001.473
POA6113.54018.83815.8111.418
PSO11.84712.77112.4090.219
SBOA13.35619.30814.9601.253
AOA7.52910.4358.6010.721
POAa196.136131.866111.9998.634
PSO60.41362.84061.5990.616
SBOA97.774117.894107.3625.107
AOA36.97652.42543.5383.925
POAb164.97884.45773.2904.733
PSO36.27338.04937.0780.361
SBOA61.81479.91972.8853.885
AOA26.11934.24230.3652.080
POAc1223.648282.106249.70412.555
PSO114.098117.440115.6430.896
SBOA228.337257.940243.5207.216
AOA85.886107.27295.0055.114
POAd1139.768174.884156.2848.726
PSO68.12071.81369.9930.848
SBOA140.202170.382152.4856.623
AOA54.48766.46960.2053.187
POAnre1186.188232.270204.98010.529
PSO82.61286.09384.1210.726
SBOA194.736219.964210.2016.276
AOA72.04693.38480.2465.155
POAnrf1184.183212.649199.1087.736
PSO71.91075.82074.0200.918
SBOA182.270219.121202.4817.891
AOA65.86082.12173.6643.556
POAnrg11810.8102070.8191959.45963.847
PSO5665.1845890.2455781.63557.955
SBOA1889.9031994.0131946.35426.387
AOA711.511777.449742.67218.612
POAnrh11114.9311273.8901211.60139.025
PSO3047.7623234.0573134.41344.761
SBOA1175.1101265.3251212.90423.259
AOA373.846480.090438.87225.540
Table 24. Fitness results per USCP instance using V3-ELIT binarization.
Table 24. Fitness results per USCP instance using V3-ELIT binarization.
MHInstanceOpt.BestWorstAvg. FitnessStd. FitnessRPD
POAu413838.00041.00039.7740.7624.666
PSO39.00041.00039.7420.6824.581
SBOA39.00041.00039.7740.5514.669
AOA38.00041.00040.0320.7825.348
POAu513435.00037.00035.9350.6805.690
PSO35.00037.00036.0000.5775.880
SBOA35.00036.00035.5810.4934.649
AOA35.00037.00035.9350.4355.693
POAua13840.00041.00040.3870.4956.278
PSO40.00042.00040.9030.5397.636
SBOA40.00041.00040.0970.2965.518
AOA39.00042.00040.8060.7377.385
POAub12222.00023.00022.8060.4023.669
PSO22.00024.00022.8390.5233.815
SBOA22.00023.00022.2900.4541.320
AOA22.00024.00023.0650.3534.839
POAuc14344.00046.00044.6450.6083.827
PSO44.00047.00045.1290.6704.952
SBOA43.00045.00044.2580.5662.926
AOA44.00046.00045.4840.5615.776
POAud12425.00026.00025.3230.4755.512
PSO25.00026.00025.6450.4866.854
SBOA25.00026.00025.0320.1774.301
AOA25.00026.00025.6450.4786.855
POAunre11617.00018.00017.0970.3016.855
PSO17.00018.00017.1610.3747.258
SBOA17.00017.00017.0000.0006.250
AOA17.00018.00017.1290.3357.056
POAunrf11010.00011.00010.4520.5064.516
PSO10.00011.00010.3550.4863.548
SBOA10.00011.00010.0320.1770.323
AOA10.00011.00010.3550.4783.548
POAunrg16062.00063.00062.7100.4614.515
PSO62.00065.00063.8710.7186.453
SBOA62.00063.00062.7420.4384.570
AOA63.00066.00065.0650.8018.441
POAunrh13334.00035.00034.5810.5024.789
PSO34.00036.00034.9350.4425.865
SBOA34.00035.00034.0970.2963.324
AOA35.00036.00035.3870.4877.234
POAuclr102525.00028.00025.5480.9952.194
PSO25.00028.00025.7421.0322.968
SBOA25.00027.00025.7740.7913.097
AOA25.00028.00026.7740.9407.097
POAucyc08342360.000369.000363.3552.2146.245
PSO361.000370.000365.2902.3556.811
SBOA361.000370.000365.9352.1096.999
AOA373.000383.000377.6452.16310.423
Table 25. Times per USCP instance (V3-ELIT).
Table 25. Times per USCP instance (V3-ELIT).
MHInstanceMin. Time (s)Max. Time (s)Avg. Time (s)Std. Time (s)
POAu419.46911.46910.2290.582
PSO7.3119.2488.2560.427
SBOA11.11317.58713.1391.618
AOA8.47411.3739.8660.747
POAu5114.66816.85515.5040.626
PSO10.37511.85911.0610.391
SBOA20.42927.69023.1721.681
AOA14.59718.94316.3951.116
POAua133.94538.88135.8811.438
PSO22.27626.65024.1911.111
SBOA55.20376.56966.5924.502
AOA31.99240.53035.9482.184
POAub127.54036.63229.8221.895
PSO16.12118.80817.2230.733
SBOA44.25865.84953.5975.436
AOA24.62732.38727.8852.121
POAuc166.62576.95171.3312.740
PSO39.47546.83342.2631.989
SBOA119.232165.134138.78512.173
AOA66.07780.96672.9723.549
POAud155.25390.11960.6487.718
PSO28.54033.83630.6521.351
SBOA99.773135.640116.10410.127
AOA47.50462.98753.5733.385
POAunre192.010162.368103.62618.944
PSO43.63055.08147.7543.193
SBOA180.083215.996196.1428.632
AOA71.79682.41877.4302.822
POAunrf1107.928166.008135.31425.211
PSO44.55255.01849.1862.951
SBOA192.111228.696207.94810.212
AOA68.96884.76178.1803.936
POAunrg1576.927657.158611.56018.445
PSO1513.6441930.7491642.96690.250
SBOA1110.8651545.1071321.991122.878
AOA597.266666.813629.75915.849
POAunrh1431.273695.414472.87750.751
PSO932.7491204.0761015.29863.790
SBOA779.4271180.6301014.579107.684
AOA396.032435.913415.09410.154
POAuclr108.13910.9829.0420.698
PSO3.4524.3583.8290.277
SBOA10.44314.62112.1421.090
AOA5.2527.7526.0880.614
POAucyc08496.836538.904517.4379.296
PSO489.822521.377504.0069.205
SBOA819.7131042.744942.28746.942
AOA514.873601.580557.38721.330
Table 26. Fitness results per USCP instance using S3-ELIT binarization.
Table 26. Fitness results per USCP instance using S3-ELIT binarization.
MHInstanceOpt.BestWorstAvg. FitnessStd. FitnessRPD
POAu413839.00043.00041.1940.9108.402
PSO39.00043.00041.2901.0398.658
SBOA39.00042.00040.4190.6106.367
AOA40.00043.00041.1610.8078.319
POAu513436.00039.00037.2580.6829.579
PSO36.00040.00037.4840.85110.243
SBOA35.00037.00036.4840.6157.306
AOA35.00038.00037.1610.7239.298
POAua13841.00044.00042.5160.92611.886
PSO41.00044.00042.4520.76811.717
SBOA40.00043.00041.7420.6709.847
AOA41.00044.00042.5480.91011.969
POAub12223.00025.00024.0970.7469.533
PSO22.00025.00024.1290.7189.678
SBOA22.00024.00023.3230.5906.012
AOA22.00025.00023.5480.6147.038
POAuc14346.00049.00047.4840.85110.427
PSO45.00050.00047.4191.14810.277
SBOA44.00048.00046.6770.9638.552
AOA46.00049.00047.3230.85710.053
POAud12425.00028.00026.8710.61911.962
PSO26.00028.00027.0650.57412.769
SBOA26.00027.00026.4190.49310.081
AOA26.00028.00026.6770.53211.156
POAunre11617.00019.00017.9350.35912.097
PSO17.00019.00018.0000.36512.500
SBOA17.00018.00017.9680.17712.298
AOA17.00018.00017.9030.29611.895
POAunrf11010.00011.00010.8060.4028.065
PSO10.00011.00010.8710.3418.710
SBOA10.00011.00010.7740.4187.742
AOA10.00011.00010.8710.3358.710
POAunrg16066.00070.00068.4520.99514.086
PSO66.00071.00068.5811.23213.978
SBOA66.00070.00068.3550.93513.925
AOA67.00070.00068.0970.99513.495
POAunrh13336.00038.00037.0650.68012.315
PSO36.00039.00037.1940.60112.706
SBOA36.00038.00037.2900.57913.001
AOA36.00038.00036.9680.40012.023
POAuclr102525.00028.00026.0001.2384.000
PSO25.00029.00026.3871.3085.548
SBOA25.00029.00027.3551.0029.419
AOA25.00028.00026.2261.2374.903
POAucyc08342364.000379.000372.1613.7348.809
PSO367.000385.000373.1613.6529.111
SBOA374.000380.000377.4521.73810.366
AOA369.000381.000375.7103.0829.857
Table 27. Times per USCP instance (S3-ELIT).
Table 27. Times per USCP instance (S3-ELIT).
MHInstanceMin. Time (s)Max. Time (s)Avg. Time (s)Std. Time (s)
POAu4112.34118.09114.8091.526
PSO11.38812.68111.9130.320
SBOA12.59116.95514.7541.100
AOA7.13910.9158.3740.868
POAu5120.05628.58124.0512.457
PSO16.73018.03017.4660.355
SBOA21.44827.15923.8641.788
AOA12.21115.96314.1301.023
POAua159.34281.30167.3544.806
PSO36.85540.43138.5580.861
SBOA60.29382.80869.0155.740
AOA24.95335.27028.9002.478
POAub146.58762.61953.1833.611
PSO24.91627.92026.9040.680
SBOA47.17760.42153.8763.160
AOA20.32828.26223.6711.752
POAuc1127.451166.076143.5649.934
PSO65.11371.66568.2501.753
SBOA125.734157.806145.9176.370
AOA44.65363.25353.5744.412
POAud193.843118.145107.5356.089
PSO47.68451.40049.0211.039
SBOA98.385120.690111.4965.507
AOA39.28846.45843.1141.751
POAunre1146.656180.531163.0978.177
PSO66.08470.98568.2961.107
SBOA151.839184.004171.7047.065
AOA57.29972.99963.7024.101
POAunrf1167.776202.200184.0019.880
PSO66.72370.47668.1930.872
SBOA169.257201.062187.7507.150
AOA62.31476.81068.1562.874
POAunrg11153.2201315.8021247.23439.331
PSO3429.7203754.6303604.15282.391
SBOA1266.1561335.2031303.01617.494
AOA437.382487.136462.75010.857
POAunrh1759.715823.730793.47819.220
PSO2054.2142213.7382120.83539.675
SBOA876.685956.104907.60918.836
AOA183.417337.811297.43937.552
POAuclr109.42214.42211.4231.240
PSO4.1026.3164.8360.602
SBOA9.69513.36111.1600.920
AOA4.2325.6564.7320.325
POAucyc08914.7911125.1091026.49050.527
PSO734.819783.830754.58711.110
SBOA965.0161107.2641028.28842.350
AOA351.558426.135382.28014.015
Table 28. Shapiro–Wilk test for KP.
Table 28. Shapiro–Wilk test for KP.
Inst MHSS1-STDV1-STD
Wp-ValueWp-Value
knapPI_1_100_1000_1 POA1.00001.00000.77010.0000
knapPI_1_100_1000_1 SBOA1.00001.00000.66400.0000
knapPI_1_100_1000_1 AOA1.00001.00000.94590.1206
knapPI_1_100_1000_1 PSO1.00001.00000.94870.1441
knapPI_1_200_1000_1 POA1.00001.00000.26980.0000
knapPI_1_200_1000_1 SBOA1.00001.00000.17560.0000
knapPI_1_200_1000_1 AOA1.00001.00000.93390.0559
knapPI_1_200_1000_1 PSO1.00001.00000.96190.3275
knapPI_1_500_1000_1 POA0.61930.00000.98730.9658
knapPI_1_500_1000_1 SBOA0.59070.00000.92830.0394
knapPI_1_500_1000_1 AOA0.96890.49000.92680.0360
knapPI_1_500_1000_1 PSO0.63470.00000.95140.1702
knapPI_1_1000_1000_1 POA0.93550.06200.94820.1389
knapPI_1_1000_1000_1 SBOA0.96920.49650.91930.0226
knapPI_1_1000_1000_1 AOA0.96100.30950.96790.4633
knapPI_1_1000_1000_1 PSO0.97670.71580.97090.5447
knapPI_1_2000_1000_1 POA0.95380.19850.96540.4014
knapPI_1_2000_1000_1 SBOA0.97490.66320.96310.3515
knapPI_1_2000_1000_1 AOA0.97110.55090.96910.4955
knapPI_1_2000_1000_1 PSO0.92140.02570.97480.6599
knapPI_1_5000_1000_1 POA0.96710.44340.90660.0106
knapPI_1_5000_1000_1 SBOA0.91750.02030.90090.0076
knapPI_1_5000_1000_1 AOA0.97270.59600.95520.2173
knapPI_1_5000_1000_1 PSO0.96490.39070.98410.9145
knapPI_1_10000_1000_1 POA0.96890.48960.90900.0122
knapPI_1_10000_1000_1 SBOA0.92310.02860.93930.0787
knapPI_1_10000_1000_1 AOA0.97820.76090.97630.7029
knapPI_1_10000_1000_1 PSO0.94050.08490.97260.5943
Table 29. Shapiro–Wilk test for KP.
Table 29. Shapiro–Wilk test for KP.
Inst MHSS1-STDV1-STD
Wp-ValueWp-Value
knapPI_2_100_1000_1 POA1.00001.00000.75220.0000
knapPI_2_100_1000_1 SBOA1.00001.00000.76440.0000
knapPI_2_100_1000_1 AOA1.00001.00000.79210.0000
knapPI_2_100_1000_1 PSO1.00001.00000.89960.0070
knapPI_2_200_1000_1 POA1.00001.00000.94500.1134
knapPI_2_200_1000_1 SBOA1.00001.00000.95770.2533
knapPI_2_200_1000_1 AOA1.00001.00000.88780.0036
knapPI_2_200_1000_1 PSO1.00001.00000.94480.1122
knapPI_2_500_1000_1 POA0.80560.00010.66950.0000
knapPI_2_500_1000_1 SBOA0.73150.00000.78840.0000
knapPI_2_500_1000_1 AOA0.87220.00160.96340.3578
knapPI_2_500_1000_1 PSO0.81440.00010.95710.2439
knapPI_2_1000_1000_1 POA0.44920.00000.96950.5063
knapPI_2_1000_1000_1 SBOA0.80630.00010.96810.4671
knapPI_2_1000_1000_1 AOA0.95370.19710.97380.6300
knapPI_2_1000_1000_1 PSO0.82870.00020.97360.6236
knapPI_2_2000_1000_1 POA0.97280.59960.97950.7983
knapPI_2_2000_1000_1 SBOA0.97960.80080.97660.7125
knapPI_2_2000_1000_1 AOA0.96950.50520.97850.7687
knapPI_2_2000_1000_1 PSO0.93780.07170.96280.3453
knapPI_2_5000_1000_1 POA0.97020.52420.94730.1312
knapPI_2_5000_1000_1 SBOA0.94970.15290.96520.3982
knapPI_2_5000_1000_1 AOA0.94870.14330.97650.7110
knapPI_2_5000_1000_1 PSO0.94150.09100.98830.9770
knapPI_2_10000_1000_1 POA0.98670.95910.98530.9364
knapPI_2_10000_1000_1 SBOA0.93970.08100.96620.4214
knapPI_2_10000_1000_1 AOA0.94530.11540.97780.7481
knapPI_2_10000_1000_1 PSO0.97180.56940.97060.5363
Table 30. Shapiro–Wilk test for KP.
Table 30. Shapiro–Wilk test for KP.
Inst MHSS1-STDV1-STD
Wp-ValueWp-Value
knapPI_3_100_1000_1 POA1.00001.00000.78550.0000
knapPI_3_100_1000_1 SBOA1.00001.00000.85860.0008
knapPI_3_100_1000_1 AOA0.17560.00000.71890.0000
knapPI_3_100_1000_1 PSO0.26980.00000.66090.0000
knapPI_3_200_1000_1 POA1.00001.00000.88690.0034
knapPI_3_200_1000_1 SBOA1.00001.00000.95600.2284
knapPI_3_200_1000_1 AOA1.00001.00000.75910.0000
knapPI_3_200_1000_1 PSO1.00001.00000.84010.0003
knapPI_3_500_1000 POA0.17560.00000.97430.6431
knapPI_3_500_1000 SBOA1.00001.00000.95850.2663
knapPI_3_500_1000 AOA0.32650.00000.88850.0038
knapPI_3_500_1000 PSO1.00001.00000.92240.0273
knapPI_3_1000_1000_1 POA0.36940.00000.97750.7390
knapPI_3_1000_1000_1 SBOA0.46450.00000.92390.0299
knapPI_3_1000_1000_1 AOA0.78480.00000.97670.7149
knapPI_3_1000_1000_1 PSO0.37220.00000.93810.0733
knapPI_3_2000_1000_1 POA0.86710.00120.97370.6261
knapPI_3_2000_1000_1 SBOA0.82280.00010.86490.0011
knapPI_3_2000_1000_1 AOA0.85290.00060.93110.0470
knapPI_3_2000_1000_1 PSO0.84200.00030.97460.6534
knapPI_3_5000_1000_1 POA0.94120.08890.90210.0082
knapPI_3_5000_1000_1 SBOA0.92520.03250.98590.9459
knapPI_3_5000_1000_1 AOA0.80780.00010.88210.0027
knapPI_3_5000_1000_1 PSO0.97110.55050.90570.0100
knapPI_3_10000_1000_1 POA0.94110.08830.95500.2147
knapPI_3_10000_1000_1 SBOA0.94860.14300.89400.0051
knapPI_3_10000_1000_1 AOA0.98070.83220.97600.6949
knapPI_3_10000_1000_1 PSO0.92830.03950.98070.8328
Table 31. Shapiro–Wilk test for SCP.
Table 31. Shapiro–Wilk test for SCP.
Inst MHSS3-ELITV3-ELIT
Wp-ValueWp-Value
41 POA0.70620.00001.00001.0000
41 SBOA0.85030.00050.48480.0000
41 AOA0.84450.00040.88280.0028
41 PSO0.71370.00001.00001.0000
51 POA0.44350.00000.67910.0000
51 SBOA0.83640.00030.52240.0000
51 AOA0.76610.00000.58520.0000
51 PSO0.63660.00000.57180.0000
61 POA0.71170.00000.57410.0000
61 SBOA0.67170.00000.50490.0000
61 AOA0.79840.00000.69560.0000
61 PSO0.70810.00000.60670.0000
a1 POA0.76800.00001.00001.0000
a1 SBOA0.88630.00330.72510.0000
a1 AOA0.89410.00520.95680.2389
a1 PSO0.74860.00000.34020.0000
b1 POA0.76700.00000.69610.0000
b1 SBOA0.76510.00000.78190.0000
b1 AOA0.79930.00010.84530.0004
b1 PSO0.73080.00000.77190.0000
c1 POA0.91750.02020.78940.0000
c1 SBOA0.86610.00110.72880.0000
c1 AOA0.87720.00200.94270.0978
c1 PSO0.93390.05590.79940.0001
d1 POA0.89560.00560.86720.0012
d1 SBOA0.72080.00000.60680.0000
d1 AOA0.84380.00040.87070.0014
d1 PSO0.90370.00890.80040.0001
nre1 POA0.26980.00001.00001.0000
nre1 SBOA1.00001.00001.00001.0000
nre1 AOA0.44480.00001.00001.0000
nre1 PSO0.17560.00001.00001.0000
nrf1 POA0.48480.00000.17560.0000
nrf1 SBOA1.00001.00001.00001.0000
nrf1 AOA0.44480.00000.17560.0000
nrf1 PSO0.44480.00000.44480.0000
nrg1 POA0.90870.01190.94320.1011
nrg1 SBOA0.88760.00360.82280.0001
nrg1 AOA0.84510.00040.92540.0330
nrg1 PSO0.94170.09200.92670.0356
nrh1 POA0.93230.05050.90340.0088
nrh1 SBOA0.85680.00070.81960.0001
nrh1 AOA0.88550.00320.87010.0014
nrh1 PSO0.87540.00180.87770.0021
Table 32. Shapiro–Wilk test for USCP.
Table 32. Shapiro–Wilk test for USCP.
Inst MHSS3-ELITV3-ELIT
Wp-ValueWp-Value
U41 POA0.86970.00140.82750.0002
U41 SBOA0.78080.00000.72880.0000
U41 AOA0.85850.00080.84280.0004
U41 PSO0.91490.01730.78660.0000
U51 POA0.81630.00010.80110.0001
U51 SBOA0.72510.00000.62860.0000
U51 AOA0.79550.00000.60660.0000
U51 PSO0.85240.00060.74620.0000
ua1 POA0.88180.00260.61930.0000
ua1 SBOA0.81630.00010.34020.0000
ua1 AOA0.88400.00290.84790.0005
ua1 PSO0.83800.00030.71280.0000
ub1 POA0.80900.00010.48480.0000
ub1 SBOA0.75110.00000.57090.0000
ub1 AOA0.78720.00000.48660.0000
ub1 PSO0.79040.00000.69530.0000
uc1 POA0.86800.00130.75200.0000
uc1 SBOA0.88220.00270.73970.0000
uc1 AOA0.87350.00170.71230.0000
uc1 PSO0.93040.04490.79070.0000
ud1 POA0.73430.00000.59070.0000
ud1 SBOA0.62860.00000.17560.0000
ud1 AOA0.70510.00000.60680.0000
ud1 PSO0.74300.00000.60680.0000
unre1 POA0.48660.00000.34020.0000
unre1 SBOA0.17560.000010.00010.000
unre1 AOA0.34020.00000.39740.0000
unre1 PSO0.50480.00000.44480.0000
unrf1 POA0.48480.00000.63470.0000
unrf1 SBOA0.51850.00000.17560.0000
unrf1 AOA0.39740.00000.60680.0000
unrf1 PSO0.39740.00000.60680.0000
unrg1 POA0.90290.00850.57090.0000
unrg1 SBOA0.87750.00210.54700.0000
unrg1 AOA0.85040.00050.84140.0003
unrg1 PSO0.92640.03500.82770.0002
unrh1 POA0.80110.00010.62860.0000
unrh1 SBOA0.74700.00000.34020.0000
unrh1 AOA0.56180.00000.61930.0000
unrh1 PSO0.72290.00000.60660.0000
uclr10 POA0.73490.00000.60450.0000
uclr10 SBOA0.91280.01530.77670.0000
uclr10 AOA0.78240.00000.87430.0018
uclr10 PSO0.81620.00010.70780.0000
ucyc08 POA0.97560.68260.95070.1636
ucyc08 SBOA0.90990.01290.94740.1326
ucyc08 AOA0.97720.73090.97470.6559
ucyc08 PSO0.93920.07860.96860.4805
Table 33. Wilcoxon–Mann–Whitney KP.
Table 33. Wilcoxon–Mann–Whitney KP.
InstanceS1-STDV1-STD
PSOAOASBOAPSOAOASBOA
knapPI_1_100_1000_11.01.01.00.00010.00.7402
knapPI_1_200_1000_11.01.01.00.00.00.57
knapPI_1_500_1000_10.61540.00.60440.00.00.9719
knapPI_1_1000_1000_10.00490.00.35270.00.00.5927
knapPI_1_2000_1000_10.03240.00.92150.00.00.7039
knapPI_1_5000_1000_10.02020.00.30740.00.00.132
knapPI_1_10000_1000_10.00010.00.41420.00.00.8327
knapPI_2_100_1000_11.01.01.00.00010.00.9088
knapPI_2_200_1000_11.01.01.00.00.00.1288
knapPI_2_500_1000_10.06930.00.99410.00.00.437
knapPI_2_1000_1000_10.14340.00.26730.00.00.2721
knapPI_2_2000_1000_10.00020.00.80530.49920.40620.1613
knapPI_2_5000_1000_10.01130.00.52630.68820.26910.3278
knapPI_2_10000_1000_10.00070.00.83270.1510.79450.2287
knapPI_3_100_1000_10.16060.33321.00.00.00.1217
knapPI_3_200_1000_11.01.01.00.00.00.0015
knapPI_3_500_1000_10.33320.00.33320.00.00.01
knapPI_3_1000_1000_10.03740.00.45940.00.00.181
knapPI_3_2000_1000_10.00040.00.23360.00.00.0329
knapPI_3_5000_1000_10.00180.00.5080.02090.96630.683
knapPI_3_10000_1000_10.00050.01.00.45130.01350.6372
Table 34. Wilcoxon–Mann–Whitney SCP.
Table 34. Wilcoxon–Mann–Whitney SCP.
Instance S3-ELIT V3-ELIT
PSOAOASBOAPSOAOASBOA
410.62410.03110.00061.00.00000.0110
510.67270.95710.00000.54350.00000.0837
610.23900.52720.03260.82200.00010.4361
a10.75610.02920.00000.08150.00000.0000
b10.17670.42090.24040.07700.26151.0
c10.86120.00380.00000.03110.00000.0000
d10.50560.26270.29520.72230.13180.1911
nre10.57000.23750.16061.01.01.0
nrf10.74960.74960.01100.09091.00.3332
nrg10.28350.01150.00000.91430.00000.6285
nrh10.70640.93550.84140.91210.00010.0073
Table 35. Wilcoxon–Mann–Whitney USCP.
Table 35. Wilcoxon–Mann–Whitney USCP.
Instance S3-ELIT V3-ELIT
PSOAOASBOAPSOAOASBOA
u410.66490.95170.00020.6630.19450.8392
u510.26240.79390.00010.67950.95230.0368
ua10.75720.87640.00090.00040.01290.0083
ub10.81070.00480.00010.8650.01170.0001
uc10.73850.47490.00230.00510.00000.0202
ud10.24580.13240.00170.01200.01200.0031
unre10.49060.72910.64380.45970.70010.0815
unrf10.50030.50030.76460.44600.44600.0001
unrg10.75760.13480.73760.0000.00000.7846
unrh10.54420.48800.18840.00600.00000.0001
uclr100.27580.47500.00010.42120.00000.1061
ucyc080.36940.00030.0000.00200.00000.0000
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Crawford, B.; Paz, Á.; Soto, R.; Peña Fritz, Á.; Astorga, G.; Cisternas-Caneo, F.; Toledo Mac-lean, C.P.; Solís-Piñones, F.; Arce, J.L.; Giachetti, G. Binary Pufferfish Optimization Algorithm for Combinatorial Problems. Biomimetics 2026, 11, 10. https://doi.org/10.3390/biomimetics11010010

AMA Style

Crawford B, Paz Á, Soto R, Peña Fritz Á, Astorga G, Cisternas-Caneo F, Toledo Mac-lean CP, Solís-Piñones F, Arce JL, Giachetti G. Binary Pufferfish Optimization Algorithm for Combinatorial Problems. Biomimetics. 2026; 11(1):10. https://doi.org/10.3390/biomimetics11010010

Chicago/Turabian Style

Crawford, Broderick, Álex Paz, Ricardo Soto, Álvaro Peña Fritz, Gino Astorga, Felipe Cisternas-Caneo, Claudio Patricio Toledo Mac-lean, Fabián Solís-Piñones, José Lara Arce, and Giovanni Giachetti. 2026. "Binary Pufferfish Optimization Algorithm for Combinatorial Problems" Biomimetics 11, no. 1: 10. https://doi.org/10.3390/biomimetics11010010

APA Style

Crawford, B., Paz, Á., Soto, R., Peña Fritz, Á., Astorga, G., Cisternas-Caneo, F., Toledo Mac-lean, C. P., Solís-Piñones, F., Arce, J. L., & Giachetti, G. (2026). Binary Pufferfish Optimization Algorithm for Combinatorial Problems. Biomimetics, 11(1), 10. https://doi.org/10.3390/biomimetics11010010

Article Metrics

Back to TopTop