[go: up one dir, main page]

Next Article in Journal
A Cross-Day Analysis of EMG Features, Classifiers, and Regressors for Swallowing Events Detection and Fluid Intake Volume Estimation
Previous Article in Journal
Multi-Classification and Tree-Based Ensemble Network for the Intrusion Detection System in the Internet of Vehicles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Enhanced RIME Optimizer with Horizontal and Vertical Crossover for Discriminating Microseismic and Blasting Signals in Deep Mines

1
School of Resources and Safety Engineering, Central South University, Changsha 410083, China
2
School of Surveying and Geospatial Engineering, College of Engineering, University of Tehran, Tehran 1417466191, Iran
3
Department of Biological Sciences, Xi’an Jiaotong-Liverpool University, Suzhou 215123, China
4
School of Computing and Mathematical Sciences, University of Leicester, Leicester LE1 7RH, UK
5
Key Laboratory of Intelligent Informatics for Safety & Emergency of Zhejiang Province, Wenzhou University, Wenzhou 325035, China
*
Authors to whom correspondence should be addressed.
Sensors 2023, 23(21), 8787; https://doi.org/10.3390/s23218787
Submission received: 25 July 2023 / Revised: 20 October 2023 / Accepted: 24 October 2023 / Published: 28 October 2023
(This article belongs to the Section Navigation and Positioning)

Abstract

:
Real-time monitoring of rock stability during the mining process is critical. This paper first proposed a RIME algorithm (CCRIME) based on vertical and horizontal crossover search strategies to improve the quality of the solutions obtained by the RIME algorithm and further enhance its search capabilities. Then, by constructing a binary version of CCRIME, the key parameters of FKNN were optimized using a binary conversion method. Finally, a discrete CCRIME-based BCCRIME was developed, which uses an S-shaped function transformation approach to address the feature selection issue by converting the search result into a real number that can only be zero or one. The performance of CCRIME was examined in this study from various perspectives, utilizing 30 benchmark functions from IEEE CEC2017. Basic algorithm comparison tests and sophisticated variant algorithm comparison experiments were also carried out. In addition, this paper also used collected microseismic and blasting data for classification prediction to verify the ability of the BCCRIME-FKNN model to process real data. This paper provides new ideas and methods for real-time monitoring of rock mass stability during deep well mineral resource mining.

1. Introduction

Many challenges arise as mineral resources are extracted at greater depths, including elevated ground stress, increased well depth, and heightened subsurface temperature, rendering the mining environment increasingly intricate. Engineering disturbances, such as rock drilling and blasting, can influence the stress distribution of deep well rock masses [1]. The rock mass exhibits heterogeneity due to the presence of diverse joints and cracks [2]. When subjected to external pressures, the rock mass experiences a disturbance, resulting in the fracturing of fissures within the rock mass. These fractures subsequently propagate and enlarge until the accumulated energy is released as elastic waves. In instances of significant severity, this phenomenon can result in the destabilization of rock masses, the collapse of regions that have been mined out, the occurrence of roof falls and rock bursts, and several other calamities related to rock masses. Implementing advanced and precise preventative and control methods poses challenges to the safe and effective recovery of deep mineral resources [3]. Hence, the pressing issue at hand pertains to effectively monitoring the real-time stability of rock masses during deep well natural resource mining, appropriately managing areas of pressure concentration, and guaranteeing the safety of humans and equipment.
The primary purpose of microseismic monitoring equipment is to observe and analyze the vibrational signals that arise from the fracturing of rock masses during excavation activities. The stability of the rock mass is evaluated by evaluating and processing the signals, solving the source parameters, and studying the spatiotemporal evolution law of microseismic events. Microseismic monitoring technology’s efficacy is contingent upon the precision of microseismic signal detection [4]. The signals obtained from the existing microseismic monitoring system are frequently contaminated with significant levels of noise, including disturbances caused by blasting and rock drilling activities. This interference significantly hampers the effectiveness of microseismic monitoring technology in analyzing the stability of rock masses and issuing timely warnings for potential disasters. Historically, operators at the site have relied on their personal expertise to categorize microseismic and blasting data, a process that has been both time-consuming and demanding in terms of labor. Moreover, this approach has been prone to subjective interpretation. Consequently, to address this issue, a growing body of scholars has been investigating it.
Although previous studies [5,6] have achieved outstanding results in the field of microseismic and blasting evaluation, most of them were still insufficient in efficiently identifying the two types of signals due to the complex on-site production environment, multiple and mixed noise sources, and large blasting impact. This resulted in a lot of background noise and useless data mixed with adequate microseismic information. In addition, there was a large overlap between the frequency distribution and other source parameters of microseismic and blasting events. In order to address this issue, this paper attempted to develop a model with strong identification capabilities based on fuzzy k-nearest neighbor (FKNN). FKNN is an excellent classification model with no prior data distribution assumptions, no training needs, and simple thinking. As a result, it is widely used and has a wide range of applications. There have also been many related studies in recent years.
Zhao et al. [7] introduced the DPC-FWSN algorithm, which uses fuzzy and weighted shared neighbor methods for clustering uneven density datasets. By employing an improved binary salp swarm algorithm-based FKNN approach (IBSSA-FKNN) to differentiate between patients with mild cognitive impairment, Alzheimer’s disease, and healthy controls, Lu et al. [8] created an early diagnostic method for Alzheimer’s disease (AD). To diagnose epileptic EEGs, Liu et al. [9] suggested a modified binary grey wolf optimization-based fuzzy KNN method. A GSHHO-FKNN machine learning model was created by Zhang et al. [10] by combining an enhanced Harris hawk’s optimization (GSHHO) based on the Gaussian mutation mechanism and a simulated annealing approach with a fuzzy KNN. Using a machine learning technique that combines an enhanced binary mutant quantum grey wolf optimizer (MQGWO) with FKNN, Hu et al. [11] examined 3069 data points from 314 HD patients. Ahmad et al. [9] offered an ensemble classifier composed of FKNN, random forest, k-nearest neighbor, and support vector machine to enhance prediction outcomes further. In order to concurrently execute feature selection and parameter optimization, Wu et al.’s [12] enhanced sine cosine algorithm-based optimization approach was used to create an FKNN model. In order to generate the membership matrix, Wan et al. [13] used FKNN to combine the intraclass and interclass weighted matrices.
However, two important parameters affect FKNN’s classification accuracy and are also extremely important for feature extraction of microseismic and blasting images in deep areas. Therefore, optimizing FKNN’s parameters is key to establishing strong identification capabilities. Parameter optimization methods have unique advantages in finding the best parameters of a classifier or regressor, or solutions for a certain goal selected from many sub-optimal solutions [14,15,16]. By monitoring and mimicking the behavioral traits of natural occurrences like biological foraging and nesting, swarm intelligence optimization approaches have offered several innovative and effective optimization strategies. They provide fresh approaches and methods for resolving several complicated issues and have high parallelism and autonomous exploration capabilities. They exhibit remarkable performance across various domains such as feature selection [17,18], image segmentation [19,20], economic scheduling [21,22], multi-objective problems [23,24], expensive optimization problems [25,26], multi-attribute decision making [27,28,29,30], and disease diagnosis [31,32].
Numerous swarm intelligence optimization techniques have been presented in recent years, such as the RIME [33], multi-verse optimizer (MVO) [34], bat-inspired algorithm (BA) [35], Harris hawks optimization (HHO) [36], particle swarm optimization (PSO) [37], salp swarm algorithm (SSA) [38], whale optimization algorithm (WOA) [39], weighted mean of vectors (INFO) [40], Runge Kutta optimizer (RUN) [41], colony predation algorithm (CPA) [42], stochastic fractal search (SFS) [43], slime mold algorithm (SMA) [44,45], and hunger games search (HGS) [46]. In addition, in order to further improve the performance of swarm intelligence optimization algorithms, many variant algorithms have been proposed, such as the bat algorithm based on collaborative and dynamic learning (CDLOBA) [47], the ant colony optimizer with grade-based search (GACO) [48], hybridizing grey wolf optimization with differential evolution (HGWO) [49], evolutionary biogeography-based whale optimization (EWOA) [50], the chaotic mutative moth-flame-inspired optimizer (CLSGMFO) [51], the moth-flame optimizer with mutation strategy (LGCMFO) [52], Cauchy and Gaussian sine cosine optimization (CGSCA) [53], and the double adaptive random spare reinforced whale optimization algorithm (RDWOA) [54], the A–C parametric whale optimization algorithm (ACWOA) [55], Harris hawks optimization with Gaussian mutation (GCHHO) [56], an enhanced sine cosine algorithm (LSCA) [57], and the Gaussian kernel probability-driven slime mold algorithm with new movement mechanism (MGSMA) [58]. Among them, RIME is a recently proposed optimization algorithm with strong optimization performance [33]. Therefore, this paper proposes a RIME based on vertical and horizontal cross-cross search through the study of RIME to enhance the performance of FKNN and improve the identification ability of microseismic and blasting.
The main contributions and innovations of this paper are as follows:
  • Through examining and analyzing the RIME algorithm, this paper proposes a novel method called CCRIME, which is based on vertical and horizontal crossover. The introduction of CCRIME not only enhances the quality of the solutions found but also improves the overall search capabilities.
  • To enhance the classification capabilities of the FKNN model, a binary version of CCRIME was created through the use of the binary transformation method. This approach aimed to optimize the important parameters inside the FKNN model. The CCRIME-FKNN model, which is optimized for CCRIME, is an abbreviation for the CCRIME-optimized FKNN model.
  • The performance of CCRIME, an optimization method based on swarm intelligence, was evaluated using 30 benchmark functions from IEEE CEC2017. The results of this study demonstrated that CCRIME exhibits exceptional performance across several perspectives, establishing it as a highly effective algorithm.
  • This study utilized microseismic and blasting images to extract and select appropriate features. Through the application of CCRIME-FKNN, the identification of microseismic and blasting events was successfully achieved, resulting in a high level of accuracy.
The remaining content of this paper is arranged as follows: Section 2 describes the collected microseismic and blasting data. Section 3 elaborates on the details of the proposed CCRIME. Section 4 explains how to use CCRIME to optimize FKNN. Section 5 analyzes the performance of CCRIME using benchmark functions and identifies microseismic and blasting signals using CCRIME-FKNN. Section 6 summarizes the research work carried out in this paper and points out future research directions.

2. Related Work

2.1. Data Description

Linglong Gold Mine is one of the gold mines with the longest mining history and the deepest mining depth in China. The surface elevation of the Daikoutou mining section in the Jiuqu mining area is +255, and the current mining depth has reached below 900 m underground. Due to the simple, early mining methods and the failure to fill the mined-out areas, a large number of mined-out areas have been left under the ground. Within an area affected by a mined-out area, secondary stress is highly concentrated, and the surrounding rock of the ore body is granite with a strong tendency toward rock burst. When carrying out tunnel excavation and other production activities in this area, blasting disturbance causes stress redistribution, quickly forming stress concentration areas and thus triggering geological disasters such as rock bursts. Significant rock burst phenomena have occurred during the development of the −620 m, −670 m, and −694 m levels, causing injuries to underground personnel and loss of mine property.
As the mining depth continues to increase, the ground stress also increases, and the risk of geological disasters such as rock bursts gradually increases. To this end, Linglong Gold Mine has carried out scientific research in cooperation with Central South University to build an online microseismic monitoring system for ground pressure in the Daikoutou mining area for real-time and long-term monitoring of deep areas. The waveform information collected by the IMS microseismic monitoring system automatically picks up the arrival time of P-waves and S-waves through its own software, TRACE. The software lists the number, code, and order of sensors triggered by microseismic monitoring signals, displays the moment when signals trigger the sensors, and collects waveform images from each sensor, as shown in Figure 1.
The monitoring technician screens the blasts and microseismic events by comparing the source trigger time with the source waveforms. Accurate source localization is ensured by calibrating the P-wave arrival time based on the waveform onset time. Due to the difference in the generation mechanisms of the blasts and microseismic events, the two waveforms have their own characteristics. For example, the energy of the blast waveform is concentrated in the front end of the rapid decay without an obvious S-wave, and the energy of the microseismic events waveforms is evenly distributed in the window with an obvious S-wave. The amplitudes of the blast waveforms are generally larger than that of the microseismic event waveforms. The microseismic monitoring database of the Linglong Gold Mine was constructed from the artificially screened blasts and microseismic events waveforms to analyze the microseismic activities and evaluate the engineering health of the rock mass. Therefore, the original data source for this study is the waveform images collected in the Linglong Gold Mine microseismic monitoring system database.

2.2. Microseismicity and Blasting

Since microseismicity and blasting have different characteristics and effects, understanding the differences between them can help us better understand and respond to earthquakes and blasting activities. For example, recognizing microseismic activity can better predict possible large earthquakes and facilitate appropriate preventive measures. As for blasting, we can minimize the negative impact on the environment by understanding its characteristics and impacts and taking the necessary measures. Computer-aided technology can improve the accuracy of identifying microseisms and blasting by automating the analysis of large amounts of data. Compared with traditional manual identification methods, computer-aided technology can eliminate the influence of human factors and reduce the possibility of misjudgment and omission.
For example, Jiang et al. [59] suggested a time-frequency discrimination approach to automatically detect these signals and produce more trustworthy data for mass spectrometry monitoring analysis. Singular value decomposition is used to decrease the amount of data while obtaining distinctive characteristics. Random Forest (RF) is employed to accomplish automated identification, and the essential characteristics are determined based on changes in the classification error and Gini coefficient. Dai et al. [60] developed a technique for automatically recognizing MS signals in the presence of blasting signal interference. Improved adaptive noise with full integrated empirical mode decomposition, singular value decomposition, and the k-nearest neighbor algorithm are all part of this technique. The original multi-frequency signal is decomposed into many single-frequency signal subcomponents using integrated empirical mode decomposition, and singular values are extracted from the matrix generated by the decomposition results using SVD.
In order to distinguish between coal mine microseismic signals and blasting signals, Li et al. [61] studied the differences between them by analyzing their main frequency, signal duration, waveform after peak attenuation, and multiple fractal parameters, laying a foundation for automatic identification of mine-used MS signals and blasting signals recorded underground in coal mines. Li et al. [62] analyzed the fractal characteristics of microseismic waves and blasting waves in a certain mine based on the nonlinear characteristics of waveforms using simple fractal and multiple fractal theory. This method can more clearly and significantly identify mine MS and blasting waves, thereby monitoring coal rock fracture more accurately. Peng et al. [63] proposed an automatic classification method for microseismic signals based on the Gaussian mixture model-hidden Markov model. This method only uses the signal’s extracted Mel frequency cepstral coefficient (MFCC) features for training and testing. The results show that the classification accuracy of this method reaches 92.46%, verifying its effectiveness in the automatic classification of underground microseismic data.

3. The Proposed CCRIME

3.1. An Overview of RIME

RIME is a new and efficient optimization algorithm proposed by Su et al. [33]. It mainly simulates the peculiar physical phenomenon of uncondensed water vapor in the air condensing on branches or objects and freezing when encountering low temperatures. The RIME algorithm consists of 4 main stages: the initial rime ice crystal cluster formation, soft RIME search strategy, hard RIME puncture mechanism, and greedy selection mechanism for the optimal solution.
In the initial stage of rime formation, each search agent in the population is treated as a RIME agent of the RIME algorithm. All RIME agents are combined into a whole as the initial population of the algorithm. First, each agent in the population is initialized within a given search space through Equation (1):
R i = B m i n + r i × ( B m a x B m i n )
where R i represents each search agent, B m a x and B m i n represent the upper and lower boundaries, respectively, and r i is a pseudo-random sequence between [0, 1].
The soft RIME search strategy mainly simulates that when free particles move near the soft rime, they will be captured and condensed by the particles in the soft rime and change the stability of the soft rime. When the distance between the particles and the soft rime particles is far, they will not be captured and continue to be in a free state. As free particles are gradually captured and condensed by the soft rime, the coverage area of the soft rime will gradually increase, and its probability of capturing particles will also increase. However, due to environmental factors, the coverage area of the soft rime will not increase indefinitely and will gradually show a steady state. By simulating the movement rules of free particles and soft rime, the specific mathematical model is as follows:
R i j n e w = R b e s t , j + R f × h × B max ( i , j ) B min ( i , j ) + B min ( i , j ) , r 2 < E
R f = r 1 × cos θ × β
θ = π · t 10 · T
β = 1 w · t T / w
E = ( t / T )
where R i j n e w is the position of the free particle after moving and R b e s t , j is the best RIME agent in the RIME population. r 1 is a random number between [−1, 1]. cos θ will change as the algorithm iterates. β represents the environmental factors in rime and changes as the algorithm iterates, controlling the algorithm’s convergence. h is a random value between [0, 1], simulating the distance between free particles. t and T represent the current number of iterations of the algorithm and the upper limit of the number of iterations, respectively. w controls the number of segments of the step function, with a default value of 5. E represents the probability of free particles being captured. It will change as the algorithm iterates and generally shows an increasing trend.
The hard RIME puncture mechanism mainly simulates that in a stronger wind environment, the movement of particles will be affected by the wind direction, and due to the same growth direction, it is easy for a cross phenomenon called hard rime puncture to occur between each hard rime. In addition, as the hard rime grows, the phenomenon of hard rime puncture will become more frequent. Therefore, the hard rime puncture mechanism can be used for position updates between rime agents, allowing rime agents to exchange particles and improve the convergence ability of the algorithm to help jump out of local optima. The mathematical model of the hard RIME puncture strategy is as follows:
R i j n e w = R b e s t , j , r 3 < F n o r m r ( S i )
where R i j n e w is the jth particle of the best rime agent in the population and R b e s t , j new is the updated particle location. The fitness value of the current agent is normalized to produce F n o r m r ( S i ) , which represents the likelihood that the agent will experience a hard rime puncture. A number at random between [0, 1] makes up r 3 .

3.2. Horizontal and Vertical Crossover Search

In order to perform the horizontal crossing operation, two different rime agents are generally used. The ability of distinct agents to communicate with and learn from one another as a consequence of the horizontal crossover search significantly increases the agents’ capacity for exploration and accelerates algorithm convergence. Assume that the parent agents x i and x j experience a horizontal crossover operation, which may be described by Equations (8) and (9):
M S i n = ε 1 × x i n + 1 ε 1 × x j n + c 1 × x i n x j n
M S j n = ε 2 × x j n + 1 ε 2 × x i n + c 2 × x j n x i n
where the given equation involves the use of random variables ε 1 and ε 2 , which are uniformly distributed within the interval [0, 1]. Additionally, the variables c 1 and c 2 are also uniformly distributed within the interval [−1, 1]. The variables x i n and x j n represent the nth dimension of the ith and jth agents, respectively. The offspring of the nth position vectors, denoted by M S i n and M S j n , are generated through the horizontal crisscross operation of the agents x i and x j .
The vertical crossover operator is a computational procedure that involves the manipulation of two discrete position vectors belonging to individual agents within a given population. This approach potentially enables certain position vectors that are confined to a local optimum to persist in their search while simultaneously minimizing alterations to the position vectors that are typically explored. Consequently, in the latter phases of the exploration process, ants frequently encounter a local optimum due to the stagnation of specific position vectors. Implementing a vertical crisscross search technique can facilitate inter-agent learning of position vectors, thereby enhancing their capacity to evade a local optimum. Assuming the vertical crossover operation is performed on the mth and nth position vectors of agent i , as described in Equation (10):
M S i m = ε × x i m + ( 1 ε ) × x i n
where ε represents a random number between [0, 1] and M S i m represents the mth position vector of the offspring generated by the vertical crisscross operation between the mth agent nth position vectors of agent i .

3.3. The Proposed CCRIME

Since the original research on RIME was only an optimization algorithm proposed by simulating the changing shape of rime, no further research or analysis was conducted on the algorithm’s performance. Further, in this paper, we have found that it has a greater advantage in convergence through benchmark function experiments, and it has further room for improvement. In addition, when solving the feature selection problem, through experiments, we also have found that it has a greater advantage than the general traditional algorithms in finding high-quality individuals for solving practical problems. Therefore, in order to further study the performance of the RIME algorithm and improve its performance, this paper compared RIME with some similar algorithms from multiple angles and found that there is still room for improvement in the quality of the solutions obtained by RIME and its search capabilities need to be further enhanced to avoid falling into local optima.
Based on these facts, this paper found through the study of vertical and horizontal cross-search strategies that it has a high ability to improve the performance of algorithms, and some studies have also used this method to enhance the performance of some optimization algorithms [40,41,42]. Inspired by this, in order to improve RIME’s search capabilities, enhance the quality of the solutions obtained, and avoid falling into local optima during the search process, this paper enhanced the original RIME by using horizontal and vertical crossover search strategies. In the enhancement process, the horizontal and vertical crossover search strategies mainly act after the hard RIME puncture mechanism. By improving the search capabilities of RIME, CCRIME can obtain higher-quality solutions and effectively improve its optimization capabilities in practical applications. The pseudocode is shown in Algorithm 1.
Algorithm 1 Pseudocode of CCRIME
Initialize the population of rime R
Calculate the fitness of each agent
Select the optimal agent
While  t < T
 Update the particle capture probability E
If  r 2 < E
  Update rime agent location by Equation (10)
End If
If  r 3 < F n o r m r ( S i )
  Cross-updating between agents by Equation (14)
End If
If  f R i n e w < f ( R i )
  Replace R i with R i n e w
  If  f R i n e w < f ( R b e s t )
   Replace R b e s t with R i n e w
  End If
End If
 Perform horizontal crossover search and vertical crossover search
t = t + 1
End While

4. The Proposed CCRIME-FKNN Model

4.1. Binary Transformation Method

The goal of feature selection is to select sample features with obvious distinctiveness, and feature selection based on swarm intelligence algorithms selects the main attributes representing the dataset. Suppose the given feature set is F , represented as F i = f i , 1 , f i , 2 , , f i , j , , f i , t , where t represents the number of features after preprocessing and i represents the original number of datasets. F S is the new feature subset selected by the feature selection algorithm, represented as F S i = f s i , 1 , f s i , 2 , f s i , j , , f s i , m , where m is the length of the selected features and f s i , j 1,0 , j = 1,2 , , m . If f s i , j = 1 , this indicates that the selected feature j in the dataset is a high-quality feature. If f s i , j = 0 , this indicates that the selected feature j in the dataset is useless. In the process of using a binary RIME algorithm to select features, each position of a rime individual represents a subset of a feature dataset. The rime population includes a set of positions of rime individuals, where the position set is represented by binary 0 or 1. The binary representation of the solution space is shown in Equation (11):
X d ( t + 1 ) = 1 ,   sigmoid   X d ( t )   rand   0 ,   otherwise  
The variable r a n d denotes a uniformly distributed random number within the interval [0, 1]. The notation X d ( t + 1 ) refers to the updated binary solution at time t + 1 . The mathematical expression for the Sigmoid function is presented in Equation (12) herein, where the variable x represents the solution produced during the CCRIME iteration.
s i g m o i d ( x ) = 1 1 + e 2 x

4.2. Feature Extraction Method

The process of obtaining a “non-image” representation or description of an image, such as numerical values, vectors, and symbols, in order to derive useful data or information, is referred to as feature extraction. The resulting features are the extracted “non-image” representations or descriptions. The present study employed color moments, gray-level co-occurrence matrices, and Local Binary Patterns (LBP) as feature extraction techniques. Subsequently, we derived distinctive attributes from the intrinsic shape properties of microseismic and blasting images. These attributes encompass the area, bounding box, major axis, minor axis, eccentricity, orientation, Euler number, equivalent circle diameter, fullness, expansion degree, and perimeter.
The mathematical theory of color matrixes is that all colors in an image can be described using matrix methods. At the same time, because the color distribution of the image is concentrated in low-order matrixes, the distribution of image colors can be described by first-order and second-order colors. This is most effective when it only contains a single target picture. The retrieval results are very effective when using three color coordinate axes, each including color moments axes. In this paper, we used color moments to extract 3 grayscale color features from the microseismic and blasting images, 12 RGB (RGB stands for red, green, and blue channels) color features, and 12 HSI (perceived colors based on three basic characteristics: hue, saturation, and brightness) color features.
As per previous works, the gray-level co-occurrence matrix stands as one of the well-established approaches to statistical texture feature extraction from images. This method mainly obtains features such as energy and inertia of the image gray-level co-occurrence matrix. In terms of statistics, one commonly used method is to use the autocorrelation function of the image to extract texture features of the image. By processing the energy spectrum function of the image, a good extraction of related texture parameters can be achieved. In this paper, for texture features, we extracted 20 gray-level co-occurrence matrix texture features, 6 gray-level co-occurrence smooth matrix texture features, and 15 gray-level co-occurrence gradient matrix texture features.
The LBP operator recognizes the central pixel based on the combined difference distribution between adjacent pixels and the central one. Essentially, it calculates the first derivative of the binary gradient direction between neighboring pixels on a circle and center pixels. Therefore, it also calculates the gradient relationship in local neighborhoods of images. The encoding outcome from the LBP operator reveals certain discernible local attributes in the original images, such as boundaries, corners, flat areas, and feature points. Additionally, histogram statistics can establish a somewhat unique vector to express the image features.
In this paper, for local texture features, we used the basic LBP equivalent LBP rotation invariant to extract 36 features.

4.3. Fuzzy k-Nearest Neighbor

The k-nearest neighbor (KNN) algorithm functions as a classification method influenced by neighboring elements. This straightforward, efficient, and non-parametric form of supervised learning hinges on providing a training set equipped with class labels or numerical attributes. For a sample to be classified or predicted, find k nearest training samples to it and then determine its output based on the neighbors’ information. The output is the most common category among neighbors.
The incorporation of fuzzy logic into the KNN algorithm has been proposed to enhance the flexibility and interpretability of the model in the context of classification tasks. This has led to the development of FKNN. In contrast to a solitary KNN class, the process of conducting FKNN classification involves determining the appropriate values for the number of neighbors ( k ) and the fuzzy strength coefficient ( m ), as well as selecting an optimization strategy to enhance the k and m values. These factors are crucial in influencing the outcomes of the classification. Consequently, various optimization algorithms can be employed in experimental settings to optimize diverse k and m values and attain the optimal solution for k and m . The formula for determining the degree of membership of data in a fuzzy set is expressed as follows:
u i ( x ) = j = 1 k     u i j 1 / x x j 2 / ( m 1 ) j = 1 k     1 / x x j 2 / ( m 1 )
where u i ( x ) represents the specific membership of vector x . i [ 1 : C ] represents the number of classes. j [ 1 : k ] represents the number of nearest neighbors. In addition, the fuzzy strength m parameter is used to determine the distance weight. m represents the degree of distance weighting when calculating the contribution of each neighbor to the membership value.

4.4. The Proposed CCRIME-FKNN Model

Feature selection technology is a binary optimization approach, whereas the CCRIME algorithm is specifically developed to address real continuous optimization problems. Consequently, it is not feasible to employ the CCRIME algorithm for directly resolving feature selection issues. During the optimization process, executing a binary operator is necessary to convert real values to binary values. The present study introduces a discrete iteration of CCRIME, namely BCCRIME, which was derived from the continuous CCRIME. The BCCRIME methodology establishes a bounded search range for the solution, specifically between 0 and 1. This approach treats the feature selection problem as a constrained optimization problem. Subsequently, the outcome of the search process is subjected to a Sigmoid function transformation technique, resulting in a binary numerical representation consisting solely of 0 and 1. In this representation, a value of 1 indicates that the model has selected the corresponding feature, while a value of 0 indicates that it has not been selected. A comprehensive flowchart is presented herein (Figure 2).
The evaluation function of the combined use of BCCRIME and the FKNN classifier is deemed overly simplistic and lacks universality. When utilizing the CCRIME algorithm for feature selection, it becomes imperative to reevaluate the approach to establishing the evaluation function. As a preliminary step in data analysis, feature selection necessitates two primary prerequisites. The feature subset acquired exhibits a notable degree of classification accuracy, indicating a robust correlation between the feature subset and the respective category. It is advisable to minimize the number of features in the selected feature subset to mitigate the effects of the curse of dimensionality. Hence, the present study redefined an evaluation function that is appropriate for the BCCRIME-FKNN hybrid model, as depicted in Equation (14):
F itness = α   error   + β | R | | D |
where the formula provided denotes the relationship between the error rate of a classifier model, the dimensionality of a dataset, and the number of attributes in the resulting subset. Specifically, the variable e r r o r represents the error rate of the classifier model, while the variable | D | represents the dimensionality of the dataset, which refers to the total number of attributes. Lastly, the variable | R | represents the number of attributes in the resulting subset. The variable α is utilized as a metric for assessing the significance of the classification error rate, whereas β denotes the extent of the chosen characteristics. Consistent with prior literature, the present study employs α = 0.99 and β = 0.01 .

5. Experiments, Results, and Analysis

This section primarily focused on two aspects and utilized experimental validation to implement the proposed methodology. Initially, a set of benchmark function experiments were carried out to authenticate the efficacy of CCRIME. Subsequently, the CCRIME-FKNN approach was utilized in various feature selection-related classification prediction tasks, successfully showcasing its robust classification prediction abilities. The CCRIME-FKNN method was effectively utilized in the investigation of deep mine microseismic and blasting identification, resulting in outstanding outcomes.

5.1. Benchmark Function Validation

In this section, based on the IEEE CEC2017 benchmark function experiment, not only were CCRIME and 11 basic algorithms compared experimentally, but CCRIME was also compared experimentally with 11 advanced variant algorithms, fully demonstrating the core advantages of CCRIME’s strong convergence performance and resistance to falling into local optima.

5.1.1. Experimental Setup

Benchmark datasets are a commonly used tool for evaluating various computational characteristics, using a set of recognized criteria to determine which technology performs best overall [64,65]. The experimental foundation for the benchmark function experiment consisted of 30 benchmark functions from IEEE CEC2017, as presented in Table 1. Throughout the experiment, the primary focus was on comparing basic and advanced variant algorithms. The experiment on algorithm comparison involved several algorithms, namely RIME [33], MVO [34], BA [35], HHO [36], PSO [37], SSA [38], WOA [39], JAYA [66], PO [67], SFS [43], SMA [45], and HGS [46]. The superior performance of the subject has been adequately demonstrated in prior original research, thereby rendering the comparative outcomes with said research compelling. As RIME is categorized as a variant algorithm, it is imperative to conduct a comparative analysis with other advanced variant algorithms such as CDLOBA [47], GACO [48], HGWO [49], EWOA [50], CLSGMFO [51], LGCMFO [52], CGSCA [53], RDWOA [54], ACWOA [55], GCHHO [56], LSCA [57], and MGSMA [58]. The variant algorithms that are involved in the participation not only exhibit commendable performance but have also demonstrated successful application across various domains. In order to guarantee equity and precision in the experimental procedure, all algorithms utilized in the comparison were executed under identical circumstances. This study established a population size of 30 and uniformly designated a maximum evaluation number of 300,000 iterations. Furthermore, the algorithms underwent 30 independent tests in order to mitigate the influence of stochastic variables. Comprehensive statistical analyses were conducted on the experimental outcomes of the benchmark functions, utilizing measures such as the mean, variance, Wilcoxon signed-rank test, and Friedman test.

5.1.2. Comparison with Basic Algorithms

This section presents a comparison between CCRIME and 11 fundamental algorithms in IEEE CEC2017. This study conducted a comparison of various algorithms, namely RIME [33], MVO [34], BA [35], HHO [36], PSO [37], SSA [38], WOA [39], JAYA [66], PO [67], SFS [43], SMA [45], and HGS [46]. Table A1 displays the statistical measures of the central tendency and variability, specifically the mean and standard deviation, respectively. The “AVG” column denotes the arithmetic mean, while the “STD” column represents the standard deviation. These values were obtained as a result of the conducted experiment. Upon examination of the mean and standard deviation, it has been determined that CCRIME achieved the lowest mean on 21 functions, while SSA achieved the lowest mean on 3 functions. Additionally, RIME, BA, and PSO each achieved the lowest mean on 2 functions. An analysis of the mean revealed that CCRIME exhibited superior performance on over two-thirds of the functions, thus implying its robust optimization capabilities and ability to yield solutions of high quality. Furthermore, it is evident that CCRIME exhibited favorable performance with respect to the standard deviation, implying its commendable stability.
Moreover, Table 2 presents the performance hierarchy of all algorithms across individual benchmark functions, as well as the comprehensive ranking across 30 benchmark functions. Through empirical observation, it is evident that CCRIME achieved the highest ranking in all categories of functions within IEEE CEC2017, as well as securing the top position in the overall ranking across 30 functions. This serves as a comprehensive demonstration of the exceptional performance of CCRIME. Furthermore, for the purpose of enhancing the dependability of the experimental outcomes, Table 2 furnishes the analysis outcomes of the Wilcoxon signed-rank test. The symbols “+” and “−” are employed to denote that CCRIME outperformed and underperformed the comparison algorithm, respectively, while “=” signifies that CCRIME and the comparison algorithm exhibited comparable performance. The analysis results indicated that CCRIME outperformed other algorithms on 21 out of 30 functions, thereby providing substantial evidence to support the superior performance of CCRIME.
Following the Wilcoxon signed-rank test analysis, the ranking results subsequent to the Friedman test analysis are presented in Figure 3. These results indicate that CCRIME holds the top rank with a score of 2.55, followed by RIME at No. 2 with a score of 4.22, and MVO at No.3 with a score of 4.65. Consequently, upon conducting an analysis, it can be deduced that CCRIME exhibited a noteworthy edge over RIME, which is ranked second, and MVO, which is ranked third. This observation further implies that CCRIME holds a superior position in comparison to other algorithms. Figure 4 illustrates the convergence behavior of various functions to showcase the efficacy of CCRIME. The results indicate that CCRIME outperformed other fundamental algorithms in terms of convergence, and it exhibited robust search capabilities.
Consequently, the experimental analysis presented above provides evidence that CCRIME exhibited strong convergence performance and a robust ability to avoid local optima in the basic algorithm comparison experiment.

5.1.3. Comparison with State-of-the-Art Variants

This section presents a comparative analysis between CCRIME and 11 advanced variant algorithms, whereby CCRIME is a derivative algorithm that incorporates the horizontal and vertical crossover strategy into RIME. Table A2 presents the mean and standard deviation values for each function. The results indicate that CCRIME achieved the highest mean value across 17 functions, while CDLOBA and LSCA obtained the highest mean value across 3 functions. Additionally, GCHHO, LGCMFO, and MGSMA demonstrated strong performance on 2 functions, while GACO performed well on 1 function. An analysis of the average performance indicates that CCRIME exhibited a distinct superiority in comparison to alternative algorithms. Furthermore, the performance of CCRIME in relation to sexually transmitted diseases is noteworthy, indicating a level of stability.
Table 3 presents the ranking of all algorithms on each of the 30 benchmark functions, with the aim of conducting a more in-depth analysis of CCRIME’s performance. The results demonstrate CCRIME’s clear advantage over other comparable algorithms, both in terms of its performance on individual functions and its overall performance. The findings of the Wilcoxon signed-rank test confirm the superior performance of CCRIME. Specifically, CCRIME outperformed other comparable algorithms on 20 benchmark functions.
Subsequently, the Friedman test was employed to evaluate the efficacy of the algorithms. The ranking results of each algorithm are presented in Figure 5 according to the Friedman test. Upon examination of the ranking outcomes, it is evident that CCRIME attained the topmost position with a score of 2.59, while MGSMA secured the second position with a score of 4.10. This outcome effectively signifies that CCRIME outperformed MGSMA and establishes its superiority over other analogous algorithms. Figure 6 displays the convergence curves of various algorithms on certain functions. It is evident that CCRIME outperformed other comparable variant algorithms in terms of convergence performance.
The core performance of CCRIME, an optimization algorithm based on swarm intelligence, was demonstrated through a comparative experiment with advanced variant algorithms. The results effectively indicate that CCRIME is an outstanding algorithm in this field. Owing to its formidable optimization capabilities, the proposed CCRIME exhibits versatility suitable for various applications, including but not limited to the resolution of the blocking flowtops problem [68], object tracking [69,70], plant disease recognition [71], and constrained optimization [72,73,74].

5.2. Feature Selection Experiments

This section first describes the evaluation criteria for the earthquake data prediction experiment. Then, the proposed BCCRIME-FKNN model is compared with other similar classic prediction models, such as BP, CART, RandomF, etc. Further, BCCRIME-FKNN is compared with other BCCRIME-based models, such as KNN, KELM, MLP, etc. Next, BCCRIME-FKNN is compared with other swarm intelligence-based FKNN prediction models, such as BPSO, BCS, etc. Finally, the key features selected by BCCRIME-FKNN are shown.

5.2.1. Experimental Setup

Since the original source of raw data for this paper is the waveform images acquired by each sensor, color moments, gray-level covariance matrices, and local binary patterns (LBP) were mainly used as feature extraction techniques in the preprocessing stage of the data. Subsequently, we extracted some shape attributes from the microseismic and blast images, including the area, bounding box, major axis, minor axis, eccentricity, orientation, Euler number, equivalent circle diameter, fullness, expansion, and perimeter. The experiments mainly used the ten-fold cross-validation approach to train, test, and validate the proposed algorithms. The experiment on feature selection was conducted using the benchmark function’s experimental environment, focusing on incorporating five distinct feature selection evaluation metrics. The content in question is as follows.
A confusion matrix is a visual representation that documents the outcomes of classification predictions within the pattern recognition domain. The assessment of a classification models’ performance is a crucial task, and a key indicator of this is the correlation between the predicted class and the true class attributes of the sample data. A confusion matrix can be utilized to derive evaluation metrics such as accuracy, specificity, and sensitivity. Binary classification problems involve categorizing samples into two distinct groups, namely positive and negative. The classification evaluation tool known as the confusion matrix comprises four distinct categories: true positives (TP), true negatives (TN), false positives (FP), and false negatives (FN).
The Accuracy (ACC) metric is a widely employed classification evaluation measure that assesses a classifier’s capacity to accurately recognize samples. The accuracy range is bounded by the interval [0, 1]. A higher accuracy value, closer to 1, indicates superior classification performance of the classifier. The methodology for computing accuracy is as follows:
A c c u r a c y = T P + T N T P + F P + F N + T N
The term “specificity” (SPE) pertains to the likelihood of correctly identifying an individual who is truly negative as negative. The metric assesses the proficiency of a classifier in identifying negative samples, thereby indicating its efficacy in identifying negative individuals. The method for calculating specificity is as follows:
S p e c i f i c i t y = T N T N + F P
The MCC metric quantifies the degree of association between diagnostic outcomes and true outcomes. In the context of balanced data, an increase in both the ACC and MCC scores indicates an improvement in the quality of predictions. However, in the case of unbalanced data, MCC serves as a more precise indicator of the predictor’s quality compared to ACC. The procedure for computing MCC is as follows:
M C C = T P × T N F P × F N ( T P + F P ) × ( T P + F N ) × ( T N + F P ) × ( T N + F N )
F-Measure is the weighted average of precision (P) and recall (R). Precision refers to the proportion of actual positives among those classified as positive; recall is an indicator of coverage, that is, the number of cases classified as positive:
P = T P T P + F P
R = T P T P + F N
F = α 2 + 1 P R α 2 ( P + R ) , α = 1
Next, the swarm intelligence optimization algorithms used in the feature selection experiment include BCCRIME, BRIME, BPSO, bMFO, bALO, BSSA, bMVO, and bCS. Table 4 shows the parameter values set for each algorithm, which are no different from the original values of the algorithm. Furthermore, owing to the characteristics of the feature selection technique, the algorithm’s dimensionality is consistently established as the number of features present in the dataset, while the algorithm’s population size is consistently established as 20. Two of the optimization algorithms among the set of eight, namely bCS and BMFO, are discretized based on the original algorithm. Algorithms such as BSSA and bALO have been referenced in the literature by other scholars. Furthermore, the experiment was conducted on a Windows Server 2008R2 operating system in order to ensure uniformity of conditions across all experiments. The fundamental components of this apparatus comprise an Intel Xeon (R) CPUE5-2660v3 (2.60 GHz) and 16 GB of RAM, in conjunction with Matlab2017b to execute the code.

5.2.2. Microseismic and Blast Dataset Experiment

This section aimed to assess the efficacy of the BCCRIME-FKNN model in practical earthquake prediction by utilizing real-world microseismic and blasting data for classification prediction. This study aimed to evaluate the efficacy of the BCCRIME and FKNN combination by comparing it with three alternative predictors, namely KELM, KNN, and MLP. The comparison was conducted using microseismic and blasting datasets. The experiment aimed to demonstrate the performance disparity between BCCRIME-FKNN and conventional methods. To achieve this, a comparative analysis was conducted between BCCRIME and four classical methods, namely CART and RandomF, among others.
We executed all tests in this paper in accordance with fair comparison principles, aligned with rules employed in previous research [75,76]. A fair comparison involves using consistent metrics, datasets, and evaluation criteria throughout all methods or models being assessed to guarantee impartial results. Hence, the algorithmic configurations and code were sourced from the MATLAB defaults. Furthermore, to demonstrate the superiority of BCCRIME in comparison to other analogous algorithms, the present study conducted a comparative analysis between BCCRIME and seven other swarm intelligence algorithms, namely BRIME, BPSO, bMFO, bALO, BSSA, bMVO, and bCS. In order to comprehensively demonstrate the dependability of the prediction outcomes, this section employed four evaluation techniques, namely, accuracy, specificity, MCC, and F-value, to more precisely assess the processing capability of the BCCRIME-FKNN model on actual data.
Using various classifiers in conjunction with BCCRIME is likely to yield varying classification outcomes. In order to evaluate the efficacy of the BCCRIME and FKNN combination, the former was integrated with three additional classifiers and subjected to a comparative experiment. The findings are illustrated in Figure 7. The superior performance of BCCRIME-FKNN in terms of accuracy, specificity, MCC, and F-value is evident when compared to other predictors. Additionally, the stability of the FKNN model is discernible through the utilization of box plots. On the contrary, the amalgamation of BCCRIME with KELM and MLP exhibits inadequate precision and lacks robustness. Thus, it can be inferred that the amalgamation of BCCRIME and FKNN is highly appropriate.
This paper conducted a comparative experiment between BCCRIME-FKNN and classical classification methods to demonstrate the performance advantage of the former. Figure 8 displays the box plot outcomes of the conducted experiment. Evidently, BCCRIME-FKNN exhibited a substantial edge over alternative classification techniques. Within the set of algorithms considered, RandomF exhibited sporadic instances of favorable outcomes, yet its consistency was notably inferior to that of BCCRIME-FKNN. Conversely, the overall efficacies of CART and ELMforFS were generally subpar. The experimental findings indicate that BCCRIME-FKNN exhibited a significant advantage over traditional classification techniques.
The aforementioned experiments provide evidence that the amalgamation of FKNN and swarm intelligence algorithms yields superior performance. This study aimed to evaluate the efficacy of the BCCRIME-FKNN classification prediction model in comparison to other well-known swarm intelligence algorithms, such as BRIME, BPSO, bMFO, bALO, BSSA, bMVO, and bCS. The objective was to determine whether BCCRIME-FKNN outperforms these algorithms in terms of classification performance. A graphical representation of the comparison experiment’s outcomes is depicted in Figure 9 through the utilization of a box plot. The data from BCCRIME exhibited the highest values across all four classification evaluation indicators, suggesting that the BCCRIME-FKNN model possesses robust predictive capabilities relative to similar algorithms and is well-suited for forecasting microseismic and blasting issues. In contrast to the original MFO algorithm, ICCRIME-FKNN exhibited superior accuracy and enhanced stability. The BCCRIME model-based comprehensive classification effect exhibited superior accuracy and stability in relation to precision and error. The BCCRIME model-based selection exhibited superior accuracy for both negative and positive cases, particularly in terms of specificity. Regarding Matthew’s Correlation Coefficient (MCC), the BCCRIME model exhibited the highest correlation between the predicted and true values. The BCCRIME model exhibited a stronger comprehensive classification performance as indicated by its F-value.
In order to bolster the legitimacy of the comparative study, the present paper employed the Friedman test technique to authenticate and order the findings obtained from the experiment, which are presented in Table 5. Upon examination of the testing methodology, it can be concluded that BCCRIME-FKNN exhibited a high degree of stability, ranking first among the tested methods. Thus, based on the aforementioned experiments, it can be demonstrated that the BCCRIME-FKNN model is highly appropriate for aiding in the prediction of microseismic and blasting topics and is capable of efficiently categorizing microseismic and blasting datasets.
The experimental data from the CCI dataset based on the BCCRIME-FKNN model are presented in Table 6. The initial column denotes the label of ten-fold cross-validation, while the second column represents the count of selected features (SSFS). The remaining columns indicate the accuracy, sensitivity, MCC, and F-value employed in the aforementioned analysis. The results of the ten-fold cross-validation indicate an accuracy value of 90.91%, a specificity value of 0.9286, an MCC value of 0.8147, and an F-value of 0.8819. This finding demonstrates the efficacy of integrating BCCRIME and FKNN as a microseismic and blasting classifier model.

6. Conclusions and Future Directions

This paper proposed a RIME algorithm based on a vertical and horizontal cross-search strategy (CCRIME) to improve the quality of the solution obtained by the RIME algorithm and further enhance its search capability. By constructing a binary version of CCRIME, the key parameters in FKNN were optimized using binary conversion methods. In addition, this paper also proposed a BCCRIME based on discrete CCRIME, which converts the solution after searching into real numbers containing only 0 and 1 through the S-shaped function conversion method for solving feature selection problems. This paper studied the performance of CCRIME from multiple angles using 30 benchmark functions in IEEE CEC2017, mainly by conducting basic algorithm comparison experiments and advanced variant algorithm comparison experiments. Then, this paper also used collected microseismic and blasting data for classification prediction to verify the ability of the BCCRIME-FKNN model to handle real data, using four evaluation methods (the accuracy, specificity, MCC, and F-value) to display the reliability of the prediction results comprehensively, and it conducted ten-fold cross-validation on the experimental results. In summary, this paper proposed an effective method to solve the real-time rock mass stability monitoring problem during deep well mineral resource exploitation. By using the CCRIME algorithm combined with the FKNN model, this paper successfully identified microseismic and blasting signals and achieved high recognition accuracy. This research provides new ideas and methods for real-time monitoring of rock mass stability during deep well mineral resource exploitation.
In future research, it is possible to try to combine CCRIME with other optimization algorithms to improve its performance. It is also possible to explore the use of other evaluation methods to evaluate the reliability of the prediction results and conduct a more in-depth analysis of the experimental results.

Author Contributions

Conceptualization, W.Z.; Data curation, Z.L. and A.A.H.; Formal analysis, Z.L., A.A.H., S.W. and Y.Z.; Funding acquisition, S.W. and Y.Z.; Investigation, Z.L., A.A.H., H.C. and Y.Z.; Methodology, S.W. and H.C.; Resources, Z.L.; Software, W.Z.; Supervision, H.C.; Validation, W.Z. and H.C.; Writing—original draft, W.Z. and A.A.H.; Writing—review and editing, S.W. and Y.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (52204263), Natural Science Foundation of Zhejiang Province (LZ22F020005); MRC (MC_PC_17171); Royal Society (RP202G0230); BHF (AA/18/3/34220); Hope Foundation for Cancer Research (RM60G0680); GCRF (P202PF11); Sino-UK Industrial Fund (RP202G0289); LIAS (P202ED10, P202RE969); Data Science Enhancement Fund (P202RE237); Fight for Sight (24NN201); Sino-UK Education Fund (OP202006); and BBSRC (RM32G0178B8).

Data Availability Statement

The data involved in this study are all public data, which can be downloaded through public channels.

Acknowledgments

This work was supported in part by the: National Natural Science Foundation of China (52204263), Natural Science Foundation of Zhejiang Province (LZ22F020005); MRC (MC_PC_17171); Royal Society (RP202G0230); BHF (AA/18/3/34220); Hope Foundation for Cancer Research (RM60G0680); GCRF (P202PF11); Sino-UK Industrial Fund (RP202G0289); LIAS (P202ED10, P202RE969); Data Science Enhancement Fund (P202RE237); Fight for Sight (24NN201); Sino-UK Education Fund (OP202006); and BBSRC (RM32G0178B8).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. The means and standard deviations obtained during the experiment.
Table A1. The means and standard deviations obtained during the experiment.
F1 F2 F3
AVGSTDAVGSTDAVGSTD
CCRIME4.2352 × 1034.7608 × 1032.1640 × 1023.5195 × 1013.0911 × 1025.3019 × 100
RIME8.9768 × 1035.8909 × 1031.1918 × 1031.6094 × 1033.0186 × 1029.5716 × 10−1
MVO1.2080 × 1046.8991 × 1039.2436 × 1021.2608 × 1033.0037 × 1021.5597 × 10−1
BA5.3849 × 1053.6639 × 1052.0000 × 1021.3410 × 10−43.0009 × 1028.3596 × 10−2
HHO1.0454 × 1072.0591 × 1066.3435 × 10111.0304 × 10124.9178 × 1031.8832 × 103
PSO1.3465 × 1081.7454 × 1074.2792 × 10134.5075 × 10136.4025 × 1025.2610 × 101
SSA3.9871 × 1034.9271 × 1032.0535 × 1021.8872 × 1013.0000 × 1021.0612 × 10−8
WOA3.3518 × 1062.2122 × 1066.8389 × 10212.8707 × 10221.6825 × 1055.5436 × 104
JAYA5.4373 × 1091.0080 × 1092.7325 × 10311.2670 × 10324.2467 × 1048.1926 × 103
PO3.7297 × 1078.5935 × 1072.2738 × 10381.0759 × 10395.1376 × 1041.1204 × 104
SFS2.4036 × 1082.9173 × 1081.1897 × 10246.4968 × 10242.5396 × 1047.9311 × 103
SMA7.7115 × 1037.9786 × 1032.0000 × 1024.5202 × 10−33.0002 × 1021.7494 × 10−2
HGS5.9547 × 1033.7800 × 1032.4649 × 1021.1641 × 1011.5381 × 1033.5435 × 103
F4 F5 F6
AVGSTDAVGSTDAVGSTD
CCRIME4.8159 × 1022.2211 × 1015.6016 × 1021.5706 × 1016.0000 × 1024.5903 × 10−7
RIME4.9089 × 1022.3365 × 1015.8617 × 1022.0042 × 1016.0031 × 1022.3598 × 10−1
MVO4.8857 × 1023.6765 × 1005.8572 × 1022.8558 × 1016.0790 × 1026.4185 × 100
BA4.7796 × 1023.2553 × 1018.0505 × 1024.8012 × 1016.7252 × 1028.1846 × 100
HHO5.2696 × 1023.7392 × 1017.2639 × 1023.9574 × 1016.6215 × 1025.2602 × 100
PSO4.7087 × 1022.9010 × 1017.2702 × 1023.5931 × 1016.5308 × 1021.5342 × 101
SSA4.8848 × 1022.3276 × 1016.1671 × 1023.6354 × 1016.2735 × 1027.2336 × 100
WOA5.5205 × 1023.8969 × 1017.6790 × 1025.3069 × 1016.6996 × 1028.9938 × 100
JAYA7.6986 × 1025.6320 × 1017.3242 × 1021.4973 × 1016.2064 × 1022.0354 × 100
PO5.1868 × 1021.5551 × 1025.8202 × 1025.0596 × 1016.1731 × 1022.1509 × 101
SFS6.2382 × 1028.9232 × 1016.8124 × 1024.0719 × 1016.2350 × 1029.7230 × 100
SMA4.8708 × 1025.3709 × 1005.9261 × 1022.7473 × 1016.0108 × 1027.0865 × 10−1
HGS4.8118 × 1022.1795 × 1016.1429 × 1023.0497 × 1016.0159 × 1023.0552 × 100
F7 F8 F9
AVGSTDAVGSTDAVGSTD
CCRIME7.8480 × 1021.5077 × 1018.6683 × 1021.7838 × 1019.1086 × 1022.7764 × 101
RIME8.1285 × 1021.9469 × 1018.8054 × 1022.6002 × 1011.3026 × 1034.1007 × 102
MVO8.3459 × 1023.6224 × 1018.9459 × 1022.8450 × 1011.8553 × 1031.8613 × 103
BA1.6226 × 1031.7681 × 1021.0674 × 1035.5317 × 1011.4521 × 1044.7355 × 103
HHO1.2007 × 1037.4765 × 1019.5793 × 1022.0453 × 1016.4783 × 1037.8248 × 102
PSO9.1867 × 1021.6189 × 1019.9796 × 1022.2256 × 1015.4552 × 1032.4482 × 103
SSA8.6523 × 1023.9952 × 1019.0912 × 1022.7688 × 1012.6213 × 1031.0113 × 103
WOA1.2327 × 1037.4548 × 1011.0119 × 1034.3306 × 1018.2725 × 1032.9747 × 103
JAYA1.0282 × 1031.7143 × 1011.0290 × 1031.3246 × 1012.9391 × 1035.2085 × 102
PO8.1384 × 1021.8313 × 1019.2549 × 1026.5905 × 1013.4627 × 1031.1328 × 103
SFS9.4721 × 1024.9220 × 1019.4509 × 1022.9632 × 1013.4738 × 1031.1552 × 103
SMA8.3175 × 1022.8146 × 1018.9092 × 1022.9294 × 1012.3501 × 1031.3994 × 103
HGS8.8299 × 1023.4544 × 1019.2650 × 1022.1175 × 1013.6304 × 1031.0597 × 103
F10 F11 F12
AVGSTDAVGSTDAVGSTD
CCRIME4.1045 × 1035.9985 × 1021.1552 × 1032.1785 × 1013.6782 × 1052.8825 × 105
RIME3.6573 × 1034.5199 × 1021.1735 × 1033.4298 × 1012.4857 × 1062.1008 × 106
MVO4.3025 × 1036.7601 × 1021.2623 × 1035.5179 × 1013.5501 × 1062.8495 × 106
BA5.6097 × 1037.4497 × 1021.3274 × 1038.3832 × 1011.8731 × 1061.4604 × 106
HHO5.4742 × 1037.5731 × 1021.2357 × 1034.0220 × 1018.9462 × 1065.1257 × 106
PSO5.9792 × 1035.0901 × 1021.2867 × 1033.5054 × 1012.7076 × 1071.0591 × 107
SSA4.6895 × 1036.4525 × 1021.2572 × 1035.0625 × 1012.1004 × 1061.7153 × 106
WOA6.3111 × 1038.8011 × 1021.4670 × 1038.4714 × 1013.7797 × 1072.7709 × 107
JAYA8.0555 × 1032.6052 × 1021.9427 × 1031.6547 × 1021.5809 × 1085.0242 × 107
PO4.4613 × 1031.1401 × 1031.3041 × 1034.7553 × 1022.5781 × 1085.5878 × 108
SFS5.6953 × 1036.0136 × 1021.3524 × 1036.1781 × 1012.3275 × 1071.6640 × 107
SMA4.2151 × 1036.4265 × 1021.2266 × 1035.0459 × 1011.0666 × 1068.7671 × 105
HGS3.8801 × 1033.7826 × 1021.2254 × 1033.3054 × 1017.1680 × 1056.1027 × 105
F13 F14 F15
AVGSTDAVGSTDAVGSTD
CCRIME1.5556 × 1041.4199 × 1041.5925 × 1041.6541 × 1045.0471 × 1035.0119 × 103
RIME1.5035 × 1041.7138 × 1041.2460 × 1049.4411 × 1031.0450 × 1049.6709 × 103
MVO9.4989 × 1046.0163 × 1047.5535 × 1035.5593 × 1031.4348 × 1041.3115 × 104
BA3.4185 × 1051.0445 × 1055.9855 × 1033.1012 × 1031.0087 × 1055.8172 × 104
HHO3.4512 × 1051.6145 × 1053.8293 × 1045.4199 × 1045.2613 × 1043.1858 × 104
PSO4.2939 × 1061.4517 × 1069.7861 × 1035.8728 × 1034.7090 × 1052.1419 × 105
SSA1.3604 × 1051.0059 × 1055.3642 × 1033.9091 × 1036.4894 × 1043.9840 × 104
WOA1.4138 × 1059.5296 × 1048.6245 × 1058.7017 × 1057.9425 × 1045.8177 × 104
JAYA6.4069 × 1064.6682 × 1067.2025 × 1043.3109 × 1044.0494 × 1063.1648 × 106
PO2.4867 × 1084.1083 × 1084.2708 × 1054.0938 × 1051.2277 × 1056.1289 × 105
SFS4.9386 × 1052.8899 × 1054.6489 × 1043.8792 × 1042.0956 × 1041.1440 × 104
SMA4.0304 × 1042.7035 × 1043.5754 × 1041.1732 × 1043.0833 × 1041.3257 × 104
HGS2.7342 × 1042.6194 × 1044.5396 × 1043.4197 × 1042.0004 × 1041.5963 × 104
F16 F17 F18
AVGSTDAVGSTDAVGSTD
CCRIME2.2136 × 1032.5078 × 1021.8206 × 1035.9286 × 1011.0194 × 1057.4067 × 104
RIME2.3114 × 1032.6071 × 1022.0797 × 1031.6901 × 1022.5958 × 1051.9356 × 105
MVO2.4394 × 1032.5265 × 1022.0807 × 1031.7179 × 1021.5999 × 1051.0959 × 105
BA3.5780 × 1034.0794 × 1022.9109 × 1033.6237 × 1021.7767 × 1051.4956 × 105
HHO3.1501 × 1034.2626 × 1022.4808 × 1032.9478 × 1021.0207 × 1061.1682 × 106
PSO2.8850 × 1032.6918 × 1022.2511 × 1031.8126 × 1021.8792 × 1051.1956 × 105
SSA2.4204 × 1032.7047 × 1022.0334 × 1031.6308 × 1021.5527 × 1059.9610 × 104
WOA3.6317 × 1034.7076 × 1022.4345 × 1032.2944 × 1022.9139 × 1062.9975 × 106
JAYA3.4847 × 1031.4418 × 1022.3268 × 1039.4815 × 1011.6687 × 1067.4539 × 105
PO3.1960 × 1036.9761 × 1022.7776 × 1032.1281 × 1024.4167 × 1066.9188 × 106
SFS2.6619 × 1033.5815 × 1022.0352 × 1031.2525 × 1028.2484 × 1056.7687 × 105
SMA2.4119 × 1033.1437 × 1022.1563 × 1031.9440 × 1023.6249 × 1053.5788 × 105
HGS2.7071 × 1032.8874 × 1022.2062 × 1032.1884 × 1021.9029 × 1051.6169 × 105
F19 F20 F21
AVGSTDAVGSTDAVGSTD
CCRIME9.5736 × 1031.0082 × 1042.1692 × 1031.0123 × 1022.3578 × 1031.3366 × 101
RIME1.5689 × 1041.3709 × 1042.3715 × 1031.4845 × 1022.3895 × 1032.2081 × 101
MVO2.0597 × 1041.7907 × 1042.3264 × 1031.3923 × 1022.3893 × 1032.3475 × 101
BA6.5008 × 1051.9533 × 1052.8926 × 1031.9027 × 1022.6432 × 1036.9212 × 101
HHO2.6299 × 1051.8066 × 1052.6595 × 1031.7370 × 1022.5271 × 1034.6083 × 101
PSO1.4020 × 1067.3947 × 1052.6821 × 1031.4144 × 1022.5329 × 1033.7926 × 101
SSA2.8477 × 1051.2392 × 1052.3643 × 1031.1834 × 1022.4076 × 1032.8586 × 101
WOA2.4239 × 1062.0654 × 1062.7622 × 1031.8807 × 1022.5863 × 1036.6913 × 101
JAYA9.1962 × 1051.0108 × 1062.5928 × 1038.4174 × 1012.5196 × 1031.2270 × 101
PO2.3313 × 1073.6420 × 1072.7411 × 1031.7903 × 1022.3656 × 1032.1137 × 101
SFS3.0252 × 1042.4268 × 1042.3835 × 1031.3154 × 1022.4383 × 1032.6660 × 101
SMA4.0426 × 1041.9482 × 1042.4319 × 1031.9788 × 1022.3835 × 1032.2863 × 101
HGS1.3613 × 1041.3642 × 1042.5060 × 1031.9690 × 1022.4220 × 1033.6591 × 101
F22 F23 F24
AVGSTDAVGSTDAVGSTD
CCRIME2.3000 × 1032.9252 × 10−132.7118 × 1031.5448 × 1012.8903 × 1032.3188 × 101
RIME4.1442 × 1031.4998 × 1032.7371 × 1032.3874 × 1012.9404 × 1033.0717 × 101
MVO5.3506 × 1031.2360 × 1032.7356 × 1032.7037 × 1012.8965 × 1032.1527 × 101
BA7.1667 × 1036.4661 × 1023.3318 × 1031.6747 × 1023.3301 × 1031.4862 × 102
HHO5.8838 × 1032.4256 × 1033.1616 × 1031.1375 × 1023.4562 × 1031.3046 × 102
PSO5.6505 × 1032.5817 × 1033.1309 × 1031.3014 × 1023.1925 × 1038.7834 × 101
SSA4.2964 × 1032.0629 × 1032.7496 × 1032.3815 × 1012.9154 × 1033.3122 × 101
WOA6.4126 × 1032.0489 × 1033.0203 × 1038.6712 × 1013.1479 × 1038.8336 × 101
JAYA2.7871 × 1037.7640 × 1012.9759 × 1032.7951 × 1013.1246 × 1032.3540 × 101
PO4.2630 × 1031.3865 × 1032.8868 × 1031.2524 × 1023.2995 × 1038.3349 × 101
SFS2.4666 × 1031.0963 × 1022.8647 × 1034.6289 × 1013.0356 × 1034.5109 × 101
SMA5.8160 × 1038.7287 × 1022.7456 × 1032.5447 × 1012.9211 × 1032.4033 × 101
HGS5.2952 × 1031.1299 × 1032.7719 × 1033.8856 × 1013.0209 × 1034.8575 × 101
F25 F26 F27
AVGSTDAVGSTDAVGSTD
CCRIME2.8871 × 1031.9408 × 1004.1816 × 1033.0686 × 1023.2146 × 1037.6152 × 100
RIME2.8927 × 1031.5237 × 1014.5570 × 1035.3615 × 1023.2242 × 1031.2182 × 101
MVO2.8887 × 1031.0184 × 1014.5202 × 1034.1884 × 1023.2133 × 1031.2663 × 101
BA2.9108 × 1032.2000 × 1019.0807 × 1032.8195 × 1033.4683 × 1031.6138 × 102
HHO2.9114 × 1032.1235 × 1016.6312 × 1031.8435 × 1033.3578 × 1031.5524 × 102
PSO2.8996 × 1032.1281 × 1014.8801 × 1031.9824 × 1033.2021 × 1031.0908 × 102
SSA2.8972 × 1032.1530 × 1014.5765 × 1037.5915 × 1023.2319 × 1031.4168 × 101
WOA2.9527 × 1033.2256 × 1017.4628 × 1031.4801 × 1033.3319 × 1036.3936 × 101
JAYA2.9703 × 1032.4551 × 1016.4704 × 1031.0823 × 1033.3443 × 1032.6258 × 101
PO2.8954 × 1031.1156 × 1015.7900 × 1031.4064 × 1033.3742 × 1037.0381 × 101
SFS2.9618 × 1032.3297 × 1015.1548 × 1031.2769 × 1033.3221 × 1033.2351 × 101
SMA2.8882 × 1036.9775 × 1004.5521 × 1032.3921 × 1023.2142 × 1031.1031 × 101
HGS2.8893 × 1031.1222 × 1014.8307 × 1036.3208 × 1023.2267 × 1031.3656 × 101
F28 F29 F30
AVGSTDAVGSTDAVGSTD
CCRIME3.1889 × 1034.3821 × 1013.5239 × 1031.3486 × 1028.1509 × 1033.1391 × 103
RIME3.2232 × 1033.1430 × 1013.6854 × 1031.5061 × 1021.7204 × 1041.1755 × 104
MVO3.2059 × 1034.2508 × 1013.7721 × 1031.8749 × 1028.9953 × 1057.5090 × 105
BA3.1333 × 1035.1445 × 1014.8474 × 1033.8282 × 1021.3214 × 1069.9215 × 105
HHO3.2534 × 1032.8765 × 1014.4460 × 1033.1369 × 1021.7637 × 1068.4530 × 105
PSO3.2477 × 1032.1766 × 1014.2880 × 1032.5551 × 1023.0728 × 1061.0512 × 106
SSA3.1958 × 1036.5395 × 1013.8934 × 1032.3205 × 1021.2307 × 1067.7586 × 105
WOA3.2992 × 1033.0927 × 1014.7666 × 1033.9102 × 1028.9236 × 1066.4166 × 106
JAYA3.5656 × 1035.4568 × 1014.5121 × 1031.3845 × 1021.3755 × 1074.3802 × 106
PO3.8115 × 1035.3452 × 1024.5510 × 1033.5897 × 1024.4642 × 1077.7357 × 107
SFS3.3704 × 1034.8728 × 1014.0549 × 1032.4728 × 1027.6159 × 1055.3012 × 105
SMA3.2411 × 1034.1023 × 1013.7588 × 1031.5385 × 1021.5936 × 1044.8792 × 103
HGS3.2060 × 1033.9670 × 1013.7887 × 1032.1151 × 1025.3275 × 1049.6043 × 104
Table A2. The mean and standard deviation obtained on each function.
Table A2. The mean and standard deviation obtained on each function.
F1 F2 F3
AVGSTDAVGSTDAVGSTD
CCRMIME2.9771 × 1033.8917 × 1032.5406 × 1021.9078 × 1023.0759 × 1024.0478 × 100
CDLOBA5.5074 × 1035.6453 × 1033.8938 × 10132.1254 × 10148.1427 × 1021.2827 × 103
GACO8.3026 × 1037.2579 × 1036.8740 × 10112.1754 × 10121.0466 × 1039.7701 × 102
HGWO7.9888 × 1091.5486 × 1091.1912 × 10344.0275 × 10347.8849 × 1045.8962 × 103
EWOA4.7411 × 1035.9455 × 1031.4645 × 10136.7222 × 10132.8210 × 1031.9165 × 103
CLSGMFO6.0602 × 1036.6649 × 1037.8325 × 10122.6801 × 10133.6090 × 1032.5337 × 103
LGCMFO7.7790 × 1037.6606 × 1033.6873 × 10127.8929 × 10127.3198 × 1033.1921 × 103
CGSCA1.4432 × 10102.4865 × 1093.2546 × 10351.0980 × 10364.2376 × 1047.5248 × 103
RDWOA7.1219 × 1061.1871 × 1071.1044 × 10163.2277 × 10162.0186 × 1048.1217 × 103
ACWOA5.9692 × 1092.4554 × 1095.2797 × 10331.5160 × 10344.9167 × 1041.0378 × 104
GCHHO2.7602 × 1033.4855 × 1032.2403 × 1071.0442 × 1085.7462 × 1022.3346 × 102
LSCA7.8562 × 1071.1356 × 1085.5566 × 10232.1222 × 10246.1157 × 1032.5955 × 103
MGSMA5.9801 × 1035.7166 × 1032.8944 × 1022.8045 × 1023.0006 × 1022.2915 × 10−2
F4 F5 F6
AVGSTDAVGSTDAVGSTD
CCRMIME4.8076 × 1022.5159 × 1015.6346 × 1021.7012 × 1016.0000 × 1023.1492 × 10−4
CDLOBA4.7172 × 1023.7479 × 1018.6452 × 1027.2789 × 1016.6989 × 1028.7201 × 100
GACO4.8384 × 1021.7228 × 1016.1940 × 1026.7666 × 1016.0055 × 1027.1058 × 10−1
HGWO9.1588 × 1027.9238 × 1017.4874 × 1021.5709 × 1016.3615 × 1023.3548 × 100
EWOA4.9190 × 1023.5247 × 1016.7997 × 1024.2813 × 1016.1813 × 1028.3166 × 100
CLSGMFO4.9381 × 1023.0035 × 1016.6178 × 1023.1982 × 1016.1748 × 1027.9104 × 100
LGCMFO4.9227 × 1022.6894 × 1016.4510 × 1023.7981 × 1016.1269 × 1028.5660 × 100
CGSCA1.6769 × 1032.9093 × 1027.9477 × 1021.7393 × 1016.5242 × 1026.9915 × 100
RDWOA5.1466 × 1022.3748 × 1017.0341 × 1025.7872 × 1016.1446 × 1026.1420 × 100
ACWOA1.2930 × 1035.6474 × 1027.9527 × 1022.5487 × 1016.6905 × 1026.6192 × 100
GCHHO4.9563 × 1022.6817 × 1017.0812 × 1023.2537 × 1016.5106 × 1026.7242 × 100
LSCA5.1775 × 1022.9188 × 1015.6561 × 1021.6692 × 1016.0525 × 1021.0405 × 100
MGSMA4.9273 × 1021.2200 × 1015.7690 × 1021.9233 × 1016.0234 × 1021.2835 × 100
F7 F8 F9
AVGSTDAVGSTDAVGSTD
CCRMIME7.8507 × 1021.4574 × 1018.6245 × 1021.5059 × 1019.0321 × 1024.8120 × 100
CDLOBA2.6311 × 1032.8591 × 1021.1049 × 1035.7198 × 1019.7052 × 1032.2021 × 103
GACO9.0893 × 1023.4676 × 1018.7577 × 1026.0635 × 1019.3424 × 1024.6311 × 101
HGWO1.0481 × 1032.0918 × 1019.9848 × 1021.4387 × 1013.4898 × 1034.5305 × 102
EWOA9.6225 × 1028.1269 × 1019.5290 × 1022.8131 × 1014.9629 × 1031.5459 × 103
CLSGMFO9.0992 × 1026.7021 × 1019.3012 × 1022.9225 × 1013.4950 × 1031.1974 × 103
LGCMFO8.8148 × 1025.0390 × 1019.1856 × 1022.6165 × 1013.3518 × 1031.2290 × 103
CGSCA1.1520 × 1033.5148 × 1011.0593 × 1031.7754 × 1016.2451 × 1031.3031 × 103
RDWOA9.7258 × 1026.3834 × 1019.8154 × 1024.0161 × 1014.8079 × 1031.6862 × 103
ACWOA1.2478 × 1035.2664 × 1011.0078 × 1032.3374 × 1017.4632 × 1031.1871 × 103
GCHHO1.1016 × 1039.2047 × 1019.5053 × 1022.6860 × 1014.7696 × 1036.6516 × 102
LSCA8.3007 × 1021.8972 × 1018.7683 × 1021.5135 × 1011.1749 × 1031.9735 × 102
MGSMA8.2578 × 1023.3544 × 1018.8091 × 1022.0732 × 1011.1461 × 1036.7840 × 102
F10 F11 F12
AVGSTDAVGSTDAVGSTD
CCRMIME3.8117 × 1035.2835 × 1021.1633 × 1032.8766 × 1012.7691 × 1051.9984 × 105
CDLOBA5.5379 × 1035.7501 × 1021.3083 × 1035.8515 × 1014.4602 × 1053.1554 × 105
GACO6.5253 × 1031.9945 × 1031.2229 × 1034.8555 × 1013.0329 × 1051.0720 × 106
HGWO6.6390 × 1034.2684 × 1024.6482 × 1031.2339 × 1035.6026 × 1081.6895 × 108
EWOA4.8231 × 1034.7699 × 1021.2233 × 1034.1341 × 1012.1335 × 1061.4432 × 106
CLSGMFO4.8368 × 1035.6463 × 1021.2365 × 1037.6741 × 1017.0704 × 1057.4305 × 105
LGCMFO4.6106 × 1036.0161 × 1021.2460 × 1036.7025 × 1017.8606 × 1056.2101 × 105
CGSCA8.0676 × 1032.9599 × 1022.3249 × 1033.1854 × 1021.4256 × 1093.0369 × 108
RDWOA5.0815 × 1033.8035 × 1021.2469 × 1033.7450 × 1013.3508 × 1061.8090 × 106
ACWOA6.4246 × 1031.0186 × 1033.1402 × 1037.5725 × 1027.2940 × 1086.5601 × 108
GCHHO5.1476 × 1036.7906 × 1021.2513 × 1035.6921 × 1018.8002 × 1056.4579 × 105
LSCA4.2380 × 1035.4411 × 1021.2222 × 1032.9309 × 1017.7729 × 1061.1618 × 107
MGSMA3.9371 × 1036.7970 × 1021.2016 × 1034.2831 × 1012.8029 × 1061.9721 × 106
F13 F14 F15
AVGSTDAVGSTDAVGSTD
CCRMIME1.9203 × 1041.8060 × 1041.8427 × 1041.7300 × 1046.5933 × 1039.1034 × 103
CDLOBA1.4924 × 1051.2217 × 1055.4402 × 1033.6314 × 1031.3205 × 1057.8172 × 104
GACO2.8287 × 1042.2608 × 1044.2342 × 1043.0497 × 1041.8187 × 1041.4375 × 104
HGWO2.9173 × 1081.4361 × 1088.9393 × 1056.3664 × 1051.2588 × 1071.4146 × 107
EWOA1.8263 × 1041.8810 × 1044.7627 × 1043.5783 × 1041.4240 × 1041.2351 × 104
CLSGMFO2.0590 × 1058.1130 × 1054.7557 × 1044.4149 × 1049.9112 × 1031.1563 × 104
LGCMFO4.8387 × 1043.7624 × 1043.3747 × 1043.3235 × 1046.3294 × 1036.0796 × 103
CGSCA4.8903 × 1081.6879 × 1081.7939 × 1051.3243 × 1058.9434 × 1067.9523 × 106
RDWOA1.1308 × 1041.0248 × 1041.5974 × 1051.9727 × 1051.1445 × 1041.0108 × 104
ACWOA3.0391 × 1072.2999 × 1078.7553 × 1057.0608 × 1055.4222 × 1063.7688 × 106
GCHHO1.0167 × 1041.1361 × 1043.6069 × 1042.8784 × 1046.4598 × 1038.2371 × 103
LSCA2.2019 × 1053.1553 × 1054.3856 × 1042.8626 × 1045.2436 × 1042.5261 × 104
MGSMA4.8976 × 1042.3486 × 1049.5905 × 1035.9505 × 1031.2512 × 1041.2589 × 104
F16 F17 F18
AVGSTDAVGSTDAVGSTD
CCRMIME2.1716 × 1032.3029 × 1021.8274 × 1038.4514 × 1011.2741 × 1057.8150 × 104
CDLOBA3.4241 × 1035.0212 × 1022.8982 × 1033.7417 × 1021.2717 × 1056.9361 × 104
GACO2.3329 × 1034.8979 × 1022.0020 × 1031.7979 × 1024.2048 × 1053.1105 × 105
HGWO3.4609 × 1031.7020 × 1022.4012 × 1031.5799 × 1021.8729 × 1061.7400 × 106
EWOA2.7465 × 1032.1533 × 1022.2874 × 1031.8493 × 1025.2977 × 1055.0531 × 105
CLSGMFO2.7489 × 1033.0724 × 1022.2256 × 1032.5319 × 1022.8972 × 1053.4577 × 105
LGCMFO2.7294 × 1033.3492 × 1022.2124 × 1032.2146 × 1022.1992 × 1051.6580 × 105
CGSCA3.7311 × 1032.3719 × 1022.5298 × 1031.4165 × 1023.4331 × 1062.0187 × 106
RDWOA2.7950 × 1033.4434 × 1022.2498 × 1032.0527 × 1025.5457 × 1054.0176 × 105
ACWOA3.9732 × 1033.7958 × 1022.5963 × 1032.5811 × 1022.2597 × 1062.3980 × 106
GCHHO2.7611 × 1032.5749 × 1022.3727 × 1032.6181 × 1023.0817 × 1053.8868 × 105
LSCA2.1555 × 1032.0794 × 1021.8621 × 1037.9278 × 1013.4819 × 1052.0724 × 105
MGSMA2.2591 × 1032.8176 × 1022.0462 × 1031.9448 × 1022.6570 × 1052.0806 × 105
F19 F20 F21
AVGSTDAVGSTDAVGSTD
CCRMIME5.7654 × 1033.6009 × 1032.1974 × 1039.0494 × 1012.3608 × 1031.6479 × 101
CDLOBA6.4713 × 1041.9239 × 1042.9308 × 1032.0193 × 1022.6199 × 1036.5362 × 101
GACO2.1033 × 1041.9265 × 1042.2878 × 1031.7765 × 1022.3864 × 1036.2962 × 101
HGWO1.1124 × 1071.3201 × 1072.6869 × 1031.2288 × 1022.5142 × 1031.3690 × 101
EWOA1.2400 × 1041.3969 × 1042.5675 × 1032.0623 × 1022.4683 × 1033.3169 × 101
CLSGMFO8.8112 × 1031.0998 × 1042.5395 × 1031.9434 × 1022.4174 × 1033.0286 × 101
LGCMFO6.3336 × 1034.2901 × 1032.4549 × 1031.8338 × 1022.4048 × 1034.9898 × 101
CGSCA2.4060 × 1071.4414 × 1072.6037 × 1031.4489 × 1022.5680 × 1031.4304 × 101
RDWOA1.2841 × 1041.5447 × 1042.4676 × 1031.6746 × 1022.4996 × 1035.3795 × 101
ACWOA1.3257 × 1072.2435 × 1072.6273 × 1031.6787 × 1022.5858 × 1033.5601 × 101
GCHHO6.4727 × 1033.6347 × 1032.5354 × 1031.7368 × 1022.4884 × 1033.1171 × 101
LSCA9.9915 × 1041.8824 × 1052.2952 × 1031.2181 × 1022.3628 × 1031.2373 × 101
MGSMA1.8252 × 1041.8883 × 1042.3078 × 1031.6238 × 1022.3828 × 1032.3238 × 101
F22 F23 F24
AVGSTDAVGSTDAVGSTD
CCRMIME2.3002 × 1037.5765 × 10−12.7146 × 1031.8745 × 1012.8912 × 1032.1952 × 101
CDLOBA7.2180 × 1031.5423 × 1033.2169 × 1031.1733 × 1023.2950 × 1031.3644 × 102
GACO6.8353 × 1032.6363 × 1032.7251 × 1034.8884 × 1012.9666 × 1036.5059 × 101
HGWO3.2650 × 1032.7913 × 1022.9044 × 1031.3808 × 1013.0679 × 1032.3411 × 101
EWOA5.3100 × 1031.7810 × 1032.8449 × 1035.3846 × 1013.0390 × 1034.4861 × 101
CLSGMFO2.3005 × 1031.3387 × 1002.7926 × 1034.1302 × 1012.9565 × 1033.6295 × 101
LGCMFO2.3008 × 1031.3722 × 1002.7723 × 1033.7745 × 1012.9293 × 1032.4733 × 101
CGSCA3.8366 × 1032.2173 × 1022.9923 × 1032.8842 × 1013.1492 × 1032.9612 × 101
RDWOA6.1073 × 1031.3758 × 1032.8667 × 1034.8515 × 1013.1539 × 1039.6235 × 101
ACWOA5.0314 × 1032.3208 × 1033.0489 × 1038.3863 × 1013.2190 × 1037.8071 × 101
GCHHO3.9292 × 1032.0856 × 1032.9362 × 1036.4931 × 1013.0966 × 1038.5676 × 101
LSCA5.4429 × 1037.5623 × 1022.7116 × 1031.4187 × 1012.8746 × 1039.7497 × 100
MGSMA4.1048 × 1031.6632 × 1032.7269 × 1032.1013 × 1012.8979 × 1032.0308 × 101
F25 F26 F27
AVGSTDAVGSTDAVGSTD
CCRMIME2.8908 × 1031.0318 × 1014.2227 × 1034.0093 × 1023.2139 × 1038.3073 × 100
CDLOBA2.9245 × 1033.4812 × 1019.9323 × 1031.3851 × 1033.4762 × 1031.2027 × 102
GACO2.8877 × 1031.5572 × 1004.4404 × 1035.0299 × 1023.2215 × 1031.1659 × 101
HGWO3.0841 × 1033.1846 × 1016.0578 × 1031.9583 × 1023.3109 × 1032.4109 × 101
EWOA2.9056 × 1032.2671 × 1015.3412 × 1038.7735 × 1023.2479 × 1032.2766 × 101
CLSGMFO2.8937 × 1031.7510 × 1014.0969 × 1031.3376 × 1033.3108 × 1037.3289 × 101
LGCMFO2.8944 × 1031.6987 × 1013.8900 × 1031.3627 × 1033.2882 × 1033.0538 × 101
CGSCA3.2842 × 1031.2604 × 1026.8564 × 1039.9596 × 1023.3889 × 1034.4544 × 101
RDWOA2.9097 × 1031.9742 × 1015.6800 × 1031.0261 × 1033.2432 × 1031.8363 × 101
ACWOA3.1722 × 1031.0847 × 1027.4175 × 1031.0116 × 1033.4468 × 1039.1493 × 101
GCHHO2.8994 × 1031.7365 × 1015.5697 × 1031.3955 × 1033.2581 × 1032.4280 × 101
LSCA2.9172 × 1031.6585 × 1014.3309 × 1031.4284 × 1023.2098 × 1035.6140 × 100
MGSMA2.8886 × 1031.0030 × 1014.2849 × 1034.5094 × 1023.2096 × 1031.0493 × 101
F28 F29 F30
AVGSTDAVGSTDAVGSTD
CCRMIME3.1902 × 1035.4065 × 1013.4875 × 1031.2193 × 1028.5378 × 1033.7952 × 103
CDLOBA3.2266 × 1037.5174 × 1015.1292 × 1036.2273 × 1021.9462 × 1051.3876 × 105
GACO3.2140 × 1034.6149 × 1013.6432 × 1031.8583 × 1021.2848 × 1047.6514 × 103
HGWO3.6098 × 1033.5984 × 1014.4660 × 1031.5490 × 1027.0910 × 1073.7095 × 107
EWOA3.2222 × 1032.5979 × 1014.0159 × 1032.4819 × 1022.4362 × 1041.9051 × 104
CLSGMFO3.2272 × 1034.2567 × 1013.8841 × 1032.3364 × 1027.9959 × 1041.4662 × 105
LGCMFO3.2173 × 1032.5110 × 1013.8060 × 1032.4541 × 1023.1086 × 1047.0755 × 104
CGSCA3.9139 × 1031.4622 × 1024.8157 × 1032.1270 × 1028.0984 × 1072.5901 × 107
RDWOA3.2605 × 1032.4724 × 1013.9396 × 1032.3394 × 1022.2020 × 1042.0967 × 104
ACWOA3.7377 × 1031.9915 × 1024.7696 × 1033.5580 × 1025.1487 × 1072.7099 × 107
GCHHO3.2150 × 1032.1697 × 1014.0339 × 1032.3675 × 1021.2335 × 1045.3795 × 103
LSCA3.2587 × 1033.6188 × 1013.5809 × 1038.9066 × 1019.9897 × 1057.5200 × 105
MGSMA3.2219 × 1031.8604 × 1013.5900 × 1031.4622 × 1023.9460 × 1042.6819 × 104

References

  1. Liu, W.; Zhou, H.; Zhang, S.; Zhao, C. Variable Parameter Creep Model Based on the Separation of Viscoelastic and Viscoplastic Deformations. Rock Mech. Rock Eng. 2023, 56, 4629–4645. [Google Scholar] [CrossRef]
  2. Xu, Z.; Li, X.; Li, J.; Xue, Y.; Jiang, S.; Liu, L.; Luo, Q.; Wu, K.; Zhang, N.; Feng, Y. Characteristics of source rocks and genetic origins of natural gas in deep formations, Gudian Depression, Songliao Basin, NE China. ACS Earth Space Chem. 2022, 6, 1750–1771. [Google Scholar] [CrossRef]
  3. Li, B.; Li, N.; Wang, E.; Li, X.; Zhang, Z.; Zhang, X.; Niu, Y. Discriminant Model of Coal Mining Microseismic and Blasting Signals Based on Waveform Characteristics. Shock Vib. 2017, 2017, 6059239. [Google Scholar] [CrossRef]
  4. Yin, H.; Zhang, G.; Wu, Q.; Yin, S.; Soltanian, M.R.; Thanh, H.V.; Dai, Z. A Deep Learning-Based Data-Driven Approach for Predicting Mining Water Inrush From Coal Seam Floor Using Microseismic Monitoring Data. IEEE Trans. Geosci. Remote Sens. 2023, 61, 4504815. [Google Scholar] [CrossRef]
  5. Kan, J.; Dou, L.; Li, J.; Song, S.; Zhou, K.; Cao, J.; Bai, J. Discrimination of microseismic events in coal mine using multifractal method and moment tensor inversion. Fractal Fract. 2022, 6, 361. [Google Scholar] [CrossRef]
  6. Xiong, H.; Zhang, Z.; Yang, J.; Yin, Z.Y.; Chen, X. Role of inherent anisotropy in infiltration mechanism of suffusion with irregular granular skeletons. Comput. Geotech. 2023, 162, 105692. [Google Scholar] [CrossRef]
  7. Zhao, J.; Wang, G.; Pan, J.-S.; Fan, T.; Lee, I. Density peaks clustering algorithm based on fuzzy and weighted shared neighbor for uneven density datasets. Pattern Recognit. 2023, 139, 109406. [Google Scholar] [CrossRef]
  8. Lu, D.; Yue, Y.; Hu, Z.; Xu, M.; Tong, Y.; Ma, H. Effective detection of Alzheimer’s disease by optimizing fuzzy K-nearest neighbors based on salp swarm algorithm. Comput. Biol. Med. 2023, 159, 106930. [Google Scholar] [CrossRef]
  9. Liu, C.; Chen, W.; Zhang, T. Wavelet-Hilbert transform based bidirectional least squares grey transform and modified binary grey wolf optimization for the identification of epileptic EEGs. Biocybern. Biomed. Eng. 2023, 43, 442–462. [Google Scholar] [CrossRef]
  10. Zhang, Q.; Huang, A.; Shao, L.; Wu, P.; Heidari, A.A.; Cai, Z.; Liang, G.; Chen, H.; Alotaibi, F.S.; Mafarja, M.; et al. A machine learning framework for identifying influenza pneumonia from bacterial pneumonia for medical decision making. J. Comput. Sci. 2022, 65, 101871. [Google Scholar] [CrossRef]
  11. Hu, J.; Liu, Y.; Heidari, A.A.; Bano, Y.; Ibrohimov, A.; Liang, G.; Chen, H.; Chen, X.; Zaguia, A.; Turabieh, H. An effective model for predicting serum albumin level in hemodialysis patients. Comput. Biol. Med. 2022, 140, 105054. [Google Scholar] [CrossRef] [PubMed]
  12. Xu, X.; Ding, S.; Wang, Y.; Wang, L.; Jia, W. A fast density peaks clustering algorithm with sparse search. Inf. Sci. 2021, 554, 61–83. [Google Scholar] [CrossRef]
  13. Wan, M.; Chen, X.; Zhan, T.; Xu, C.; Yang, G.; Zhou, H. Sparse fuzzy two-dimensional discriminant local preserving projection (SF2DDLPP) for robust image feature extraction. Inf. Sci. 2021, 563, 1–15. [Google Scholar] [CrossRef]
  14. Mohapatra, S.; Mohapatra, P. Fast random opposition-based learning Golden Jackal Optimization algorithm. Knowl.-Based Syst. 2023, 275, 110679. [Google Scholar] [CrossRef]
  15. Li, S.; Chen, H.; Chen, Y.; Xiong, Y.; Song, Z. Hybrid Method with Parallel-Factor Theory, a Support Vector Machine, and Particle Filter Optimization for Intelligent Machinery Failure Identification. Machines 2023, 11, 837. [Google Scholar] [CrossRef]
  16. Zhang, K.; Wang, Z.; Chen, G.; Zhang, L.; Yang, Y.; Yao, C.; Wang, J.; Yao, J. Training effective deep reinforcement learning agents for real-time life-cycle production optimization. J. Pet. Sci. Eng. 2022, 208, 109766. [Google Scholar] [CrossRef]
  17. Xing, J.; Zhao, H.; Chen, H.; Deng, R.; Xiao, L. Boosting Whale Optimizer with Quasi-Oppositional Learning and Gaussian Barebone for Feature Selection and COVID-19 Image Segmentation. J. Bionic Eng. 2023, 20, 797–818. [Google Scholar] [CrossRef]
  18. Yang, X.; Zhao, D.; Yu, F.; Heidari, A.A.; Bano, Y.; Ibrohimov, A.; Liu, Y.; Cai, Z.; Chen, H.; Chen, X. Boosted machine learning model for predicting intradialytic hypotension using serum biomarkers of nutrition. Comput. Biol. Med. 2022, 147, 105752. [Google Scholar] [CrossRef]
  19. Chen, J.; Cai, Z.; Chen, H.; Chen, X.; Escorcia-Gutierrez, J.; Mansour, R.F.; Ragab, M. Renal Pathology Images Segmentation Based on Improved Cuckoo Search with Diffusion Mechanism and Adaptive Beta-Hill Climbing. J. Bionic Eng. 2023, 20, 2240–2275. [Google Scholar] [CrossRef]
  20. Qi, A.; Zhao, D.; Yu, F.; Heidari, A.A.; Wu, Z.; Cai, Z.; Alenezi, F.; Mansour, R.F.; Chen, H.; Chen, M. Directional mutation and crossover boosted ant colony optimization with application to COVID-19 X-ray image segmentation. Comput. Biol. Med. 2022, 148, 105810. [Google Scholar] [CrossRef]
  21. Dong, R.; Sun, L.; Ma, L.; Heidari, A.A.; Zhou, X.; Chen, H. Boosting Kernel Search Optimizer with Slime Mould Foraging Behavior for Combined Economic Emission Dispatch Problems. J. Bionic Eng. 2023, 1–33. [Google Scholar] [CrossRef]
  22. Dong, R.; Chen, H.; Heidari, A.A.; Turabieh, H.; Mafarja, M.; Wang, S. Boosted kernel search: Framework, analysis and case studies on the economic emission dispatch problem. Knowl.-Based Syst. 2021, 233, 107529. [Google Scholar] [CrossRef]
  23. Deng, W.; Zhang, X.; Zhou, Y.; Liu, Y.; Zhou, X.; Chen, H.; Zhao, H. An enhanced fast non-dominated solution sorting genetic algorithm for multi-objective problems. Inf. Sci. 2022, 585, 441–453. [Google Scholar] [CrossRef]
  24. Hua, Y.; Liu, Q.; Hao, K.; Jin, Y. A Survey of Evolutionary Algorithms for Multi-Objective Optimization Problems With Irregular Pareto Fronts. IEEE/CAA J. Autom. Sin. 2021, 8, 303–318. [Google Scholar] [CrossRef]
  25. Wu, S.-H.; Zhan, Z.-H.; Zhang, J. SAFE: Scale-adaptive fitness evaluation method for expensive optimization problems. IEEE Trans. Evol. Comput. 2021, 25, 478–491. [Google Scholar] [CrossRef]
  26. Li, J.-Y.; Zhan, Z.-H.; Wang, C.; Jin, H.; Zhang, J. Boosting data-driven evolutionary algorithm with localized data generation. IEEE Trans. Evol. Comput. 2020, 24, 923–937. [Google Scholar] [CrossRef]
  27. Fan, C.; Hu, K.; Feng, S.; Ye, J.; Fan, E. Heronian mean operators of linguistic neutrosophic multisets and their multiple attribute decision-making methods. Int. J. Distrib. Sens. Netw. 2019, 15, 1550147719843059. [Google Scholar] [CrossRef]
  28. Cui, W.-H.; Ye, J. Logarithmic similarity measure of dynamic neutrosophic cubic sets and its application in medical diagnosis. Comput. Ind. 2019, 111, 198–206. [Google Scholar] [CrossRef]
  29. Fan, C.; Fan, E.; Hu, K. New form of single valued neutrosophic uncertain linguistic variables aggregation operators for decision-making. Cogn. Syst. Res. 2018, 52, 1045–1055. [Google Scholar] [CrossRef]
  30. Ye, J.; Cui, W. Modeling and stability analysis methods of neutrosophic transfer functions. Soft Comput. 2020, 24, 9039–9048. [Google Scholar] [CrossRef]
  31. Liu, J.; Wei, J.; Heidari, A.A.; Kuang, F.; Zhang, S.; Gui, W.; Chen, H.; Pan, Z. Chaotic simulated annealing multi-verse optimization enhanced kernel extreme learning machine for medical diagnosis. Comput. Biol. Med. 2022, 144, 105356. [Google Scholar] [CrossRef] [PubMed]
  32. Hu, J.; Han, z.; Heidari, A.A.; Shou, Y.; Ye, H.; Wang, L.; Huang, X.; Chen, H.; Chen, Y.; Wu, P. Detection of COVID-19 severity using blood gas analysis parameters and Harris hawks optimized extreme learning machine. Comput. Biol. Med. 2022, 142, 105166. [Google Scholar] [CrossRef] [PubMed]
  33. Su, H.; Zhao, D.; Heidari, A.A.; Liu, L.; Zhang, X.; Mafarja, M.; Chen, H. RIME: A physics-based optimization. Neurocomputing 2023, 532, 183–214. [Google Scholar] [CrossRef]
  34. Mirjalili, S.; Mirjalili, S.M.; Hatamlou, A. Multi-Verse Optimizer: A nature-inspired algorithm for global optimization. Neural Comput. Appl. 2016, 27, 495–513. [Google Scholar] [CrossRef]
  35. Yang, X.-S. A new metaheuristic bat-inspired algorithm. In Nature Inspired Cooperative Strategies for Optimization (NICSO 2010); Springer: Berlin/Heidelberg, Germany, 2010; pp. 65–74. [Google Scholar]
  36. Heidari, A.A.; Mirjalili, S.; Faris, H.; Aljarah, I.; Mafarja, M.; Chen, H. Harris hawks optimization: Algorithm and applications. Future Gener. Comput. Syst. 2019, 97, 849–872. [Google Scholar] [CrossRef]
  37. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95—International Conference on Neural Networks, Perth, WA, Australia, 27 November–1 December 1995; Volume1944, pp. 1942–1948. [Google Scholar]
  38. Mirjalili, S.; Gandomi, A.H.; Mirjalili, S.Z.; Saremi, S.; Faris, H.; Mirjalili, S.M. Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar] [CrossRef]
  39. Mirjalili, S.; Lewis, A. The Whale Optimization Algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  40. Ahmadianfar, I.; Asghar Heidari, A.; Noshadian, S.; Chen, H.; Gandomi, A.H. INFO: An Efficient Optimization Algorithm based on Weighted Mean of Vectors. Expert Syst. Appl. 2022, 195, 116516. [Google Scholar] [CrossRef]
  41. Ahmadianfar, I.; Asghar Heidari, A.; Gandomi, A.H.; Chu, X.; Chen, H. RUN Beyond the Metaphor: An Efficient Optimization Algorithm Based on Runge Kutta Method. Expert Syst. Appl. 2021, 181, 115079. [Google Scholar] [CrossRef]
  42. Tu, J.; Chen, H.; Wang, M.; Gandomi, A.H. The Colony Predation Algorithm. J. Bionic Eng. 2021, 18, 674–710. [Google Scholar] [CrossRef]
  43. Salimi, H. Stochastic Fractal Search: A powerful metaheuristic algorithm. Knowl.-Based Syst. 2015, 75, 1–18. [Google Scholar] [CrossRef]
  44. Chen, H.; Li, C.; Mafarja, M.; Heidari, A.A.; Chen, Y.; Cai, Z. Slime mould algorithm: A comprehensive review of recent variants and applications. Int. J. Syst. Sci. 2022, 54, 204–235. [Google Scholar] [CrossRef]
  45. Li, S.; Chen, H.; Wang, M.; Heidari, A.A.; Mirjalili, S. Slime mould algorithm: A new method for stochastic optimization. Future Gener. Comput. Syst. 2020, 111, 300–323. [Google Scholar] [CrossRef]
  46. Yang, Y.; Chen, H.; Heidari, A.A.; Gandomi, A.H. Hunger games search: Visions, conception, implementation, deep analysis, perspectives, and towards performance shifts. Expert Syst. Appl. 2021, 177, 114864. [Google Scholar] [CrossRef]
  47. Yong, J.; He, F.; Li, H.; Zhou, W. A Novel Bat Algorithm based on Collaborative and Dynamic Learning of Opposite Population. In Proceedings of the 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design (CSCWD), Nanjing, China, 9–11 May 2018; pp. 541–546. [Google Scholar]
  48. Li, C.; Hou, L.; Pan, J.; Chen, H.; Cai, X.; Liang, G. Tuberculous pleural effusion prediction using ant colony optimizer with grade-based search assisted support vector machine. Front. Neuroinform. 2022, 16, 1078685. [Google Scholar] [CrossRef]
  49. Zhu, A.; Xu, C.; Li, Z.; Wu, J.; Liu, Z. Hybridizing grey wolf optimization with differential evolution for global optimization and test scheduling for 3D stacked SoC. J. Syst. Eng. Electron. 2015, 26, 317–328. [Google Scholar] [CrossRef]
  50. Tu, J.; Chen, H.; Liu, J.; Heidari, A.A.; Zhang, X.; Wang, M.; Ruby, R.; Pham, Q.-V. Evolutionary biogeography-based whale optimization methods with communication structure: Towards measuring the balance. Knowl.-Based Syst. 2021, 212, 106642. [Google Scholar] [CrossRef]
  51. Xu, Y.; Chen, H.; Heidari, A.A.; Luo, J.; Zhang, Q.; Zhao, X.; Li, C. An Efficient Chaotic Mutative Moth-flame-inspired Optimizer for Global Optimization Tasks. Expert Syst. Appl. 2019, 129, 135–155. [Google Scholar] [CrossRef]
  52. Xu, Y.; Chen, H.; Luo, J.; Zhang, Q.; Jiao, S.; Zhang, X. Enhanced Moth-flame optimizer with mutation strategy for global optimization. Inf. Sci. 2019, 492, 181–203. [Google Scholar] [CrossRef]
  53. Kumar, N.; Hussain, I.; Singh, B.; Panigrahi, B.K. Single sensor-based MPPT of partially shaded PV system for battery charging by using cauchy and gaussian sine cosine optimization. IEEE Trans. Energy Convers. 2017, 32, 983–992. [Google Scholar] [CrossRef]
  54. Chen, H.; Yang, C.; Heidari, A.A.; Zhao, X. An efficient double adaptive random spare reinforced whale optimization algorithm. Expert Syst. Appl. 2020, 154, 113018. [Google Scholar] [CrossRef]
  55. Elhosseini, M.A.; Haikal, A.Y.; Badawy, M.; Khashan, N. Biped robot stability based on an A–C parametric Whale Optimization Algorithm. J. Comput. Sci. 2019, 31, 17–32. [Google Scholar] [CrossRef]
  56. Song, S.; Wang, P.; Heidari, A.A.; Wang, M.; Zhao, X.; Chen, H.; He, W.; Xu, S. Dimension decided Harris hawks optimization with Gaussian mutation: Balance analysis and diversity patterns. Knowl.-Based Syst. 2021, 215, 106425. [Google Scholar] [CrossRef]
  57. Wu, S.; Mao, P.; Li, R.; Cai, Z.; Heidari, A.A.; Xia, J.; Chen, H.; Mafarja, M.; Turabieh, H.; Chen, X. Evolving fuzzy k-nearest neighbors using an enhanced sine cosine algorithm: Case study of lupus nephritis. Comput. Biol. Med. 2021, 135, 104582. [Google Scholar] [CrossRef]
  58. Ren, L.; Heidari, A.A.; Cai, Z.; Shao, Q.; Liang, G.; Chen, H.-L.; Pan, Z. Gaussian kernel probability-driven slime mould algorithm with new movement mechanism for multi-level image segmentation. Measurement 2022, 192, 110884. [Google Scholar] [CrossRef]
  59. Jiang, R.; Dai, F.; Liu, Y.; Li, A. A novel method for automatic identification of rock fracture signals in microseismic monitoring. Measurement 2021, 175, 109129. [Google Scholar] [CrossRef]
  60. Jiang, R.; Dai, F.; Liu, Y.; Wei, M. An automatic classification method for microseismic events and blasts during rock excavation of underground caverns. Tunn. Undergr. Space Technol. 2020, 101, 103425. [Google Scholar] [CrossRef]
  61. Li, B.; Li, N.; Wang, E.; Li, X.; Niu, Y.; Zhang, X. Characteristics of coal mining microseismic and blasting signals at Qianqiu coal mine. Environ. Earth Sci. 2017, 76, 722. [Google Scholar] [CrossRef]
  62. Li, X.; Li, Z.; Wang, E.; Liang, Y.; Li, B.; Chen, P.; Liu, Y. Pattern recognition of mine microseismic and blasting events based on wave fractal features. Fractals-Complex Geom. Patterns Scaling Nat. Soc. 2018, 26, 1850029. [Google Scholar] [CrossRef]
  63. Peng, P.; He, Z.; Wang, L. Automatic Classification of Microseismic Signals Based on MFCC and GMM-HMM in Underground Mines. Shock Vib. 2019, 2019, 5803184. [Google Scholar] [CrossRef]
  64. Shan, W.; Qiao, Z.; Heidari, A.A.; Gui, W.; Chen, H.; Teng, Y.; Liang, Y.; Lv, T. An efficient rotational direction heap-based optimization with orthogonal structure for medical diagnosis. Comput. Biol. Med. 2022, 146, 105563. [Google Scholar] [CrossRef] [PubMed]
  65. Hu, J.; Heidari, A.A.; Zhang, L.; Xue, X.; Gui, W.; Chen, H.; Pan, Z. Chaotic diffusion-limited aggregation enhanced grey wolf optimizer: Insights, analysis, binarization, and feature selection (Intelligent Systems, impact factor:8.709). Int. J. Intell. Syst. 2021, 37, 4864–4927. [Google Scholar] [CrossRef]
  66. Venkata Rao, R. Jaya: A simple and new optimization algorithm for solving constrained and unconstrained optimization problems. Int. J. Ind. Eng. Comput. 2016, 7, 19–34. [Google Scholar] [CrossRef]
  67. Askari, Q.; Younas, I.; Saeed, M. Political Optimizer: A novel socio-inspired meta-heuristic for global optimization. Knowl.-Based Syst. 2020, 195, 105709. [Google Scholar] [CrossRef]
  68. Eddaly, M.; Jarboui, B.; Siarry, P. Combinatorial particle swarm optimization for solving blocking flowshop scheduling problem. J. Comput. Des. Eng. 2016, 3, 295–311. [Google Scholar] [CrossRef]
  69. Hu, K.; Ye, J.; Fan, E.; Shen, S.; Huang, L.; Pi, J. A novel object tracking algorithm by fusing color and depth information based on single valued neutrosophic cross-entropy. J. Intell. Fuzzy Syst. 2017, 32, 1775–1786. [Google Scholar] [CrossRef]
  70. Liang, Z.; Zhang, J.; Feng, L.; Zhu, Z. A hybrid of genetic transform and hyper-rectangle search strategies for evolutionary multi-tasking. Expert Syst. Appl. 2019, 138, 112798. [Google Scholar] [CrossRef]
  71. Yu, H.; Cheng, X.; Chen, C.; Heidari, A.A.; Liu, J.; Cai, Z.; Chen, H. Apple leaf disease recognition method with improved residual network. Multimed. Tools Appl. 2022, 81, 7759–7782. [Google Scholar] [CrossRef]
  72. Zhang, H.; Liu, T.; Ye, X.; Heidari, A.A.; Liang, G.; Chen, H.; Pan, Z. Differential evolution-assisted salp swarm algorithm with chaotic structure for real-world problems. Eng. Comput. 2022, 39, 1735–1769. [Google Scholar] [CrossRef]
  73. Qiao, K.; Liang, J.; Yu, K.; Yuan, M.; Qu, B.; Yue, C. Self-adaptive resources allocation-based differential evolution for constrained evolutionary optimization. Knowl.-Based Syst. 2022, 235, 107653. [Google Scholar] [CrossRef]
  74. Liang, J.; Ban, X.; Yu, K.; Qu, B.; Qiao, K. Differential evolution with rankings-based fitness function for constrained optimization problems. Appl. Soft Comput. 2021, 113, 108016. [Google Scholar] [CrossRef]
  75. Liu, Q.Y.; Li, D.Q.; Tang, X.S.; Du, W. Predictive Models for Seismic Source Parameters Based on Machine Learning and General Orthogonal Regression Approaches. Bull. Seismol. Soc. Am. 2023. [Google Scholar] [CrossRef]
  76. Tie, Y.; Rui, X.; Shi-Hui, S.; Zhao-Kai, H.; Jin-Yu, F. A real-time intelligent lithology identification method based on a dynamic felling strategy weighted random forest algorithm. Pet. Sci. 2023, in press. [CrossRef]
Figure 1. Monitoring and control interface of the Linglong Gold Mine microseismic system software.
Figure 1. Monitoring and control interface of the Linglong Gold Mine microseismic system software.
Sensors 23 08787 g001
Figure 2. The flowchart of the developed CCRIME-FKNN model.
Figure 2. The flowchart of the developed CCRIME-FKNN model.
Sensors 23 08787 g002
Figure 3. The ranking results after the Friedman test analysis.
Figure 3. The ranking results after the Friedman test analysis.
Sensors 23 08787 g003
Figure 4. The convergence curves of some functions.
Figure 4. The convergence curves of some functions.
Sensors 23 08787 g004
Figure 5. The Friedman ranking results of each algorithm.
Figure 5. The Friedman ranking results of each algorithm.
Sensors 23 08787 g005
Figure 6. The convergence curves of all algorithms on some functions.
Figure 6. The convergence curves of all algorithms on some functions.
Sensors 23 08787 g006
Figure 7. Results of five different classifiers based on BCCRIME.
Figure 7. Results of five different classifiers based on BCCRIME.
Sensors 23 08787 g007
Figure 8. Comparison results of BCCRIME−FKNN with other classical methods.
Figure 8. Comparison results of BCCRIME−FKNN with other classical methods.
Sensors 23 08787 g008
Figure 9. Comparison of BCCRIME and seven algorithms on four evaluation criteria.
Figure 9. Comparison of BCCRIME and seven algorithms on four evaluation criteria.
Sensors 23 08787 g009
Table 1. The description of 30 benchmark functions.
Table 1. The description of 30 benchmark functions.
ItemThe Function ClassThe Function NameSearch SpaceThe Optimal Fitness
F1Unimodal FunctionsShifted and Rotated Bent Cigar Function[−100, 100]100
F2Shifted and Rotated Sum of Different Power Function[−100, 100]200
F3Shifted and Rotated Zakharov Function[−100, 100]300
F4Multimodal FunctionsShifted and Rotated Rosenbrocks Function[−100, 100]400
F5Shifted and Rotated Rastrigins Function[−100, 100]500
F6Shifted and Rotated Expanded Scaffers F6 Function[−100, 100]600
F7Shifted and Rotated Lunacek Bi_Rastrigin Function[−100, 100]700
F8Shifted and Rotated Non-Continuous Rastrigins Function[−100, 100]800
F9Shifted and Rotated Levy Function[−100, 100]900
F10Shifted and Rotated Schwefels Function[−100, 100]1000
F11Hybrid FunctionsHybrid Function 1 (N = 3)[−100, 100]1100
F12Hybrid Function 2 (N = 3)[−100, 100]1200
F13Hybrid Function 3 (N = 3)[−100, 100]1300
F14Hybrid Function 4 (N = 4)[−100, 100]1400
F15Hybrid Function 5 (N = 4)[−100, 100]1500
F16Hybrid Function 6 (N = 4)[−100, 100]1600
F17Hybrid Function 6 (N = 5)[−100, 100]1700
F18Hybrid Function 6 (N = 5)[−100, 100]1800
F19Hybrid Function 6 (N = 5)[−100, 100]1900
F20Hybrid Function 6 (N = 6)[−100, 100]2000
F21Composition FunctionsComposition Function 1 (N = 3)[−100, 100]2100
F22Composition Function 2 (N = 3)[−100, 100]2200
F23Composition Function 3 (N = 4)[−100, 100]2300
F24Composition Function 4 (N = 4)[−100, 100]2400
F25Composition Function 5 (N = 5)[−100, 100]2500
F26Composition Function 6 (N = 5)[−100, 100]2600
F27Composition Function 7 (N = 6)[−100, 100]2700
F28Composition Function 8 (N = 6)[−100, 100]2800
F29Composition Function 9 (N = 3)[−100, 100]2900
F30Composition Function 10 (N = 3)[−100, 100]3000
Table 2. The performance ranking of all algorithms on each benchmark function.
Table 2. The performance ranking of all algorithms on each benchmark function.
F1F2F3F4F5F6F7F8F9F10F11
CCRIME24641111131
RIME57584222212
MVO66473554357
BA71321313131313910
HHO989109111191185
PSO11971101081010118
SSA13167965576
WOA810131112121211121212
JAYA13121113117101261313
PO10131292636769
SFS12111012889881011
SMA42255343444
HGS35836477923
F12F13F14F15F16F17F18F19F20F21F22
CCRIME12611111111
RIME61522473454
MVO75335534248
BA48210121349131313
HHO898791110791011
PSO10114128851110119
SSA56184228366
WOA11713913101212121212
JAYA121211131191110893
PO13131211101213131125
SFS9101056395582
SMA347636866310
HGS23947762777
F23F24F25F26F27F28F29F30+/−/=MeanRank
CCRIME11114211N/A1.81
RIME3554562321/2/73.872
MVO2232244622/2/64.33
BA131291313113825/4/19.339
HHO121310111199929/0/19.4311
PSO1110871881025/1/48.578
SSA5375736723/3/455
WOA1091112910121130/0/011.0713
JAYA9813101012101230/0/010.4712
PO811691213111327/0/39.3710
SFS771288117530/0/08.137
SMA4423373223/2/54.334
HGS6646655424/0/65.336
Table 3. The ranking of all algorithms on each function.
Table 3. The ranking of all algorithms on each function.
F1F2F3F4F5F6F7F8F9F10F11
CCRIME21221111111
CDLOBA48411313131313910
GACO845342522114
HGWO1212131110991061213
EWOA376478781055
CLSGMFO66776766766
LGCMFO75955545547
CGSCA1313111311111112111311
RDWOA991098689978
ACWOA1111121212121211121012
GCHHO1338910107889
LSCA10108102433433
MGSMA52163324322
F12F13F14F15F16F17F18F19F20F21F22
CCRIME14332121111
CDLOBA38110101319131313
GACO256843882412
HGWO111213131110111112104
EWOA73976895979
CLSGMFO49847654862
LGCMFO56415532553
CGSCA131311121211131310115
RDWOA92105971066911
ACWOA121112111312121211128
GCHHO61528963786
LSCA101079127103210
MGSMA87263447437
F23F24F25F26F27F28F29F30+/−/=MeanRank
CCRIME22333111N/A1.671
CDLOBA1313101313713924/1/59.5310
GACO3616424320/0/104.73
HGWO9811101011101230/0/010.5311
EWOA7777668526/0/46.738
CLSGMFO6542986824/0/66.036
LGCMFO5451845625/0/54.774
CGSCA111013111113121330/0/011.613
RDWOA811895107428/0/27.939
ACWOA121212121212111130/0/011.5712
GCHHO10968739224/1/56.377
LSCA11952921022/1/75.675
MGSMA4324153721/3/63.92
Table 4. Parameter settings for the optimization algorithms.
Table 4. Parameter settings for the optimization algorithms.
AlgorithmsBCCRIMEbMFOBSSAbMFO
ValuesW = 5W = 5~a = 2; b = 1
AlgorithmsbALObMVOBPSObCS
Values~Max = 1;
Min = 0.2
wMax = 0.9;
wMin = 0.2
pa = 0.25
Table 5. Verification of the experimental results by using the Friedman test method.
Table 5. Verification of the experimental results by using the Friedman test method.
Method BCCRIMEBRIMEBPSObMFObALOBSSAbMVObCS
AccuracyAvg3.654.64.54.44.654.454.45.35
Rank16527428
SpecificityAvg3.554.84.354.653.754.15.85
Rank16457238
MCCAvg3.754.64.554.24.74.64.45.2
Rank15427538
F-measureAvg3.54.54.54.554.554.654.65.15
Rank12244768
Table 6. Detailed results obtained by BCCRIME.
Table 6. Detailed results obtained by BCCRIME.
FoldSSFSAccuracySpecificityMCCF-Measure
#1910.909 0.923 0.812 0.889
#2810.909 1.000 0.821 0.875
#3830.955 1.000 0.909 0.941
#4570.909 0.923 0.812 0.889
#5820.957 0.929 0.914 0.947
#6890.818 0.769 0.647 0.800
#7790.833 0.929 0.657 0.778
#8630.913 0.929 0.818 0.889
#9870.783 0.786 0.555 0.737
#10800.909 1.000 0.821 0.875
AVG~0.9090.9290.8150.882
STD~0.0580.0820.1180.069
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhu, W.; Li, Z.; Heidari, A.A.; Wang, S.; Chen, H.; Zhang, Y. An Enhanced RIME Optimizer with Horizontal and Vertical Crossover for Discriminating Microseismic and Blasting Signals in Deep Mines. Sensors 2023, 23, 8787. https://doi.org/10.3390/s23218787

AMA Style

Zhu W, Li Z, Heidari AA, Wang S, Chen H, Zhang Y. An Enhanced RIME Optimizer with Horizontal and Vertical Crossover for Discriminating Microseismic and Blasting Signals in Deep Mines. Sensors. 2023; 23(21):8787. https://doi.org/10.3390/s23218787

Chicago/Turabian Style

Zhu, Wei, Zhihui Li, Ali Asghar Heidari, Shuihua Wang, Huiling Chen, and Yudong Zhang. 2023. "An Enhanced RIME Optimizer with Horizontal and Vertical Crossover for Discriminating Microseismic and Blasting Signals in Deep Mines" Sensors 23, no. 21: 8787. https://doi.org/10.3390/s23218787

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop