<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">62469</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2025.062469</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking</article-title>
<alt-title alt-title-type="left-running-head">Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking</alt-title>
<alt-title alt-title-type="right-running-head">Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Chu</surname><given-names>Shu-Chuan</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Fu</surname><given-names>Libin</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Pan</surname><given-names>Jeng-Shyang</given-names></name><xref ref-type="aff" rid="aff-2">2</xref><xref ref-type="aff" rid="aff-3">3</xref></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Xue</surname><given-names>Xingsi</given-names></name><xref ref-type="aff" rid="aff-4">4</xref></contrib>
<contrib id="author-5" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Liu</surname><given-names>Min</given-names></name><xref ref-type="aff" rid="aff-5">5</xref><email>min.liu@nuist.edu.cn</email></contrib>
<aff id="aff-1"><label>1</label><institution>School of Artificial Intelligence, Nanjing University of Information Science and Technology</institution>, <addr-line>Nanjing, 210000</addr-line>, <country>China</country></aff>
<aff id="aff-2"><label>2</label><institution>College of Computer Science and Engineering, Shandong University of Science and Technology</institution>, <addr-line>Qingdao, 266000</addr-line>, <country>China</country></aff>
<aff id="aff-3"><label>3</label><institution>Department of Information Management, Chaoyang University of Technology</institution>, <addr-line>Taichung, 40601</addr-line>, <country>Taiwan</country></aff>
<aff id="aff-4"><label>4</label><institution>School of Information Science and Engineering, Fujian University of Technology</institution>, <addr-line>Fuzhou, 350000</addr-line>, <country>China</country></aff>
<aff id="aff-5"><label>5</label><institution>Key Laboratory of Hydrometeorological Disaster Mechanism and Warning of Ministry of Water Resource, Nanjing University of Information Science and Technology</institution>, <addr-line>Nanjing, 210000</addr-line>, <country>China</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Min Liu. Email: <email>min.liu@nuist.edu.cn</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2025</year>
</pub-date>
<pub-date date-type="pub" publication-format="electronic">
<day>16</day><month>04</month><year>2025</year>
</pub-date>
<volume>83</volume>
<issue>2</issue>
<fpage>3135</fpage>
<lpage>3163</lpage>
<history>
<date date-type="received">
<day>18</day>
<month>12</month>
<year>2024</year>
</date>
<date date-type="accepted">
<day>10</day>
<month>2</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2025 The Authors.</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Published by Tech Science Press.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_62469.pdf"></self-uri>
<abstract>
<p>Evolutionary algorithms have been extensively utilized in practical applications. However, manually designed population updating formulas are inherently prone to the subjective influence of the designer. Genetic programming (GP), characterized by its tree-based solution structure, is a widely adopted technique for optimizing the structure of mathematical models tailored to real-world problems. This paper introduces a GP-based framework (GP-EAs) for the autonomous generation of update formulas, aiming to reduce human intervention. Partial modifications to tree-based GP have been instigated, encompassing adjustments to its initialization process and fundamental update operations such as crossover and mutation within the algorithm. By designing suitable function sets and terminal sets tailored to the selected evolutionary algorithm, and ultimately derive an improved update formula. The Cat Swarm Optimization Algorithm (CSO) is chosen as a case study, and the GP-EAs is employed to regenerate the speed update formulas of the CSO. To validate the feasibility of the GP-EAs, the comprehensive performance of the enhanced algorithm (GP-CSO) was evaluated on the CEC2017 benchmark suite. Furthermore, GP-CSO is applied to deduce suitable embedding factors, thereby improving the robustness of the digital watermarking process. The experimental results indicate that the update formulas generated through training with GP-EAs possess excellent performance scalability and practical application proficiency.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Cat swarm algorithm</kwd>
<kwd>genetic programming</kwd>
<kwd>digital watermarking</kwd>
<kwd>update mode</kwd>
<kwd>mode generation framework</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>With the widespread application of artificial intelligence (AI) technologies in real-world domains, the solutions to numerous problems in various fields have become increasingly diverse [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>]. As researchers gradually delve deeper into problem models, they have recognized that the majority of practical problem models are nonlinear and exhibit non-differentiable characteristics [<xref ref-type="bibr" rid="ref-3">3</xref>]. Evolutionary Algorithms (EAs), a robust stochastic approach, iteratively refine a population until an optimal solution to the problem is found [<xref ref-type="bibr" rid="ref-4">4</xref>]. In recent years, EAs have garnered significant attention and application. They have been implemented in various fields, such as medical imaging [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-6">6</xref>], unmanned aerial vehicle (UAV) path planning [<xref ref-type="bibr" rid="ref-7">7</xref>,<xref ref-type="bibr" rid="ref-8">8</xref>], information hiding and encryption [<xref ref-type="bibr" rid="ref-9">9</xref>,<xref ref-type="bibr" rid="ref-10">10</xref>], industrial production [<xref ref-type="bibr" rid="ref-11">11</xref>], and many others.</p>
<p>Due to the exceptional feasibility of EAs in addressing real-world issues, a growing contingent of scholars has embarked on research endeavors focusing on EAs. Consequently, novel forms of EAs have been continually developed. Furthermore, EAs are classified as meta-heuristic algorithms, drawing inspiration from natural phenomena [<xref ref-type="bibr" rid="ref-12">12</xref>]. Classical EAs include Genetic Algorithm (GA) [<xref ref-type="bibr" rid="ref-13">13</xref>], which are inspired by the evolutionary processes observed in nature. Particle Swarm Optimization (PSO) draws its inspiration from the social behavior of bird flocks [<xref ref-type="bibr" rid="ref-14">14</xref>]. Furthermore, numerous EAs have been inspired by certain behaviors of insects or animals, such as reproduction, predation, and others. Examples of these include the Grey Wolf Optimizer (GWO) [<xref ref-type="bibr" rid="ref-15">15</xref>], Cat Swarm Optimization (CSO) [<xref ref-type="bibr" rid="ref-16">16</xref>], Ant Colony Optimization (ACO) [<xref ref-type="bibr" rid="ref-17">17</xref>], Northern Goshawk Optimization (NGO) [<xref ref-type="bibr" rid="ref-18">18</xref>], and Whale Optimization Algorithm (WOA) [<xref ref-type="bibr" rid="ref-19">19</xref>]. Additionally, many algorithms are derived from human society, such as the Teaching-Learning-Based Optimization (TLBO) [<xref ref-type="bibr" rid="ref-20">20</xref>], Love Evolution Algorithm (LEA) [<xref ref-type="bibr" rid="ref-21">21</xref>], and Tabu Search (TS) [<xref ref-type="bibr" rid="ref-22">22</xref>]. Besides, Genetic Programming (GP) [<xref ref-type="bibr" rid="ref-23">23</xref>], which represents problem solutions as trees, such as binary trees, is widely applied to symbolic regression problems [<xref ref-type="bibr" rid="ref-24">24</xref>].</p>
<p>Currently, most evolutionary frameworks of EAs are inspired by certain laws in nature or human behaviors. The artificial construction of an evolutionary framework is a feasible undertaking. Researchers have established such frameworks through repeated studies, in-depth contemplation, and proficiency in understanding the relevant phenomena. This aspect is challenging for machines to achieve. The particular evolutionary formulations, or update schemes, incorporated into these frameworks are typically devised manually by scholars. By studying previous EAs update schemes and gaining an understanding of the chosen evolutionary framework, scholars combine and map specific characteristics of the population using mathematical methods, thereby designing appropriate update schemes. However, the No Free Lunch Theorem states that no single EAs can solve all practical problems [<xref ref-type="bibr" rid="ref-25">25</xref>]. Researchers are prone to neglecting specific characteristics of the designed evolutionary framework due to the influence of the forms of evolutionary formulas in previous EAs. This leads to the underutilization of certain population traits within specific evolutionary frameworks, and consequently, the comprehensive performance of the designed algorithms has not been fully explored.</p>
<p>To address the issues above within the field of computer technology, this paper proposes a viable framework, which has been named GP-EAs. Given the black-box nature of GP and its extensive application in symbolic regression. This paper aims to optimize GP to enhance its suitability for EAs. GP-EAs maintain GP&#x2019;s evolutionary framework and solution paradigm, thereby enabling it to derive more comprehensive and superior evolutionary formulations for specific EAs based on a given set of terminals and functions. When utilizing GP-EAs to design or improve evolutionary formulas for EAs, it is necessary to devise the objective function, terminal set, and function set. The objective function is contingent upon the problem that the algorithm seeks to resolve. With the initial objective of enhancing the algorithm&#x2019;s overall performance, the objective function designed in this paper is intended to test the comprehensive performance of the newly evolved formula. The variables within the terminal set and function set can originate from certain variables that have been widely used in EAs, as well as from newly introduced variables manually added by researchers based on a profound understanding of the characteristics of the selected algorithm.</p>
<p>The main contributions of the GP-EAs are as follows:
<list list-type="simple">
<list-item><label>(1)</label><p>Reducing human intervention in the design process of evolutionary formulas. The GP-EAs framework continuously generates new evolutionary formulas by combining and ordering the variables in the set.</p></list-item>
<list-item><label>(2)</label><p>Reducing the time expenditure for designing evolutionary formulas for EAs. GP-EAs substitute for the researchers&#x2019; manual and iterative process of designing, testing, and eliminating evolutionary formulas. The training process using GP-EAs belongs to the offline design state, wherein researchers are only required to select the more appropriate evolutionary formula from the results presented after the program termination.</p></list-item>
</list></p>
<p>To validate the effectiveness of the proposed GP-based framework, this paper selects the CSO algorithm as a case study. The CSO algorithm was first introduced in 2006 and draws inspiration from the natural behavior of cats. Since its inception, numerous variants of CSO have emerged. Sharafi et al. proposed an extension of CSO to a binary form, namely Binary Cat Swarm Optimization (BCSO) [<xref ref-type="bibr" rid="ref-26">26</xref>]. Pradhan et al. enhanced CSO to address multi-objective problems (MOCSO) [<xref ref-type="bibr" rid="ref-27">27</xref>]. Zhao et al. enhanced CSO using a compact strategy, designated as CCSO [<xref ref-type="bibr" rid="ref-28">28</xref>]. In contrast to CCSO, Pan et al. employed a parallel strategy, whereby sub-populations were divided to optimize CSO (PCSO) [<xref ref-type="bibr" rid="ref-29">29</xref>]. Building on PCSO, Tsai et al. combined it with the Artificial Bee Colony (ABC) algorithm, resulting in a hybrid CSO algorithm (PCSOABC) [<xref ref-type="bibr" rid="ref-30">30</xref>]. Furthermore, hybrid versions of CSO have been proposed, including CSO-CS [<xref ref-type="bibr" rid="ref-31">31</xref>]. This paper employs GP-EAs and CEC2017 as a foundation for regenerating a velocity update formula for CSO, designated GP-CSO. The comprehensive performance of GP-CSO was evaluated using CEC2017, and its performance was compared with that of several competitive algorithms with dimensions of 30D and 50D.</p>
<p>Furthermore, GP-CSO was applied to digital watermarking to assess the real-world application capability of the GP-EAs framework. In the context of the information age, as people&#x2019;s awareness of copyright protection gradually intensifies, digital watermarking technology has been widely applied to copyright protection [<xref ref-type="bibr" rid="ref-32">32</xref>]. The essential processes of digital watermarking can be broadly classified into two categories: watermark embedding and watermark extraction. A successful digital watermark should not impair the regular usage of the original image [<xref ref-type="bibr" rid="ref-33">33</xref>]. This implies that it must be embedded in an appropriate location and possess the requisite level of invisibility. Consequently, for the watermark to serve its purpose of verifying the authenticity of the image, it is essential that it can be successfully extracted from the watermarked image. The most commonly utilized methodologies include the Discrete Wavelet Transform (DWT) [<xref ref-type="bibr" rid="ref-34">34</xref>], Least Significant Bit (LSB) replacement [<xref ref-type="bibr" rid="ref-35">35</xref>], Discrete Cosine Transform [<xref ref-type="bibr" rid="ref-36">36</xref>], and Fourier Transform (DFT) [<xref ref-type="bibr" rid="ref-37">37</xref>]. The embedding and extraction operations are typically inverse processes of each other. To date, there have been many studies on the application of EAs to digital watermarking. The process of watermark embedding and extraction is influenced by an embedding factor, which must, therefore, be identified to ensure the robustness of the watermark. Dey et al. designed a medical image verification system using the cuckoo search algorithm (CS) and DWT technique to embed hospital logos in the form of watermarks into ECG images [<xref ref-type="bibr" rid="ref-38">38</xref>]. The CS algorithm searched for suitable embedding factors in the solution space. Cui et al. used the DWT-SVD algorithm to embed watermarks into the four sub-bands of the bright component of a color image [<xref ref-type="bibr" rid="ref-39">39</xref>]. An embedding factor with four dimensions corresponding to the four sub-bands was solved using the DE algorithm. Sharma et al. proposed an adaptive color image watermarking method based on the artificial bee colony (ABC) algorithm and RDWT-SVD, embedding the watermark into the low-frequency sub-bands of the host image [<xref ref-type="bibr" rid="ref-40">40</xref>]. Zhang et al. proposed a dual-embedded watermarking algorithm using the PSO algorithm to solve the watermark embedding factor [<xref ref-type="bibr" rid="ref-41">41</xref>]. The watermark is embedded into the low-frequency sub-bands and high-frequency sub-bands of the image using the DWT-DCT-SVD [<xref ref-type="bibr" rid="ref-42">42</xref>,<xref ref-type="bibr" rid="ref-43">43</xref>]. Pan et al. improved the states of matter search algorithm (SMS) using adaptive parameters and co-evolutionary strategies [<xref ref-type="bibr" rid="ref-10">10</xref>]. After solving the embedding factor, the watermark is embedded into the color QR code image using the DWT-SVD algorithm. Most of the above studies solve for single-scale embedding factors, i.e., each image sub-band corresponds to a single-dimension embedding factor. This paper employs GP-CSO to search for the multi-scale embedding factor with 64 dimensions, corresponding to each dimension of the image sub-bands, and selects DWT-DCT-SVD for watermark embedding and extraction.</p>
<p>The principal contributions of this paper are outlined below:
<list list-type="simple">
<list-item><label>(1)</label><p>A novel framework, designated GP-EAs, is proposed to autonomously generate evolutionary formulas for EAs.</p></list-item>
<list-item><label>(2)</label><p>The GP-EAs is applied to the CSO algorithm, which has been designated as GP-CSO. The velocity update formula of the tracking mode in GP-CSO is autonomously trained using this framework. The objective is to validate the effectiveness of the GP-EAs framework for generating update formulas for EAs.</p></list-item>
<list-item><label>(3)</label><p>The performance of GP-CSO was evaluated in comparison with several classical EAs, as well as a selection of popular EAs, on the CEC2017 test set.</p></list-item>
<list-item><label>(4)</label><p>Applying the improved GP-CSO to digital watermarking.</p></list-item>
</list></p>
<p>The following paragraphs set out the key points concerning the content of other sections in this paper. <xref ref-type="sec" rid="s2">Section 2</xref> comprehensively explains the essential technologies, including CSO, GP, and digital watermarking. <xref ref-type="sec" rid="s3">Section 3</xref> provides a comprehensive introduction to the GP-based framework (GP-EAs) proposed in this paper, along with the newly derived velocity update formula. <xref ref-type="sec" rid="s4">Section 4</xref> presents a comparative analysis of GP-CSO with other algorithms and applies GP-CSO to digital watermarking, with the presentation and analysis of the experimental results. <xref ref-type="sec" rid="s5">Section 5</xref> provides a summary of the content of this paper and an analysis of potential avenues for future research.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Technologies</title>
<p>The primary work of this research is to modify tree-based GP. Autonomous training of evolutionary formulas in EAs using improved GP. A framework is a structure encompassing predefined modules and methods to simplify the training and evaluation processes. The enhanced GP presented in this study is named the Genetic Programming-based Framework for Evolutionary Algorithms (GP-EAs). GP-EAs aim to minimize human intervention in the design process of evolutionary formulas, thereby enabling programs to train evolutionary formulas offline autonomously. The subsequent sections of this paper discuss the relevant techniques and applications.</p>
<sec id="s2_1">
<label>2.1</label>
<title>Cat Swarm Optimization</title>
<p>The evolutionary process of the CSO algorithm is based on the emulation of the search and observation behaviors observed in cat colonies. Before the commencement of the evolutionary process, the population must be initialized. This is typically achieved through random initialization within the problem&#x2019;s search space. Once the initialization process is complete, the cat colony is comprised of <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi>N</mml:mi></mml:math></inline-formula> individuals, which are denoted as <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. The dimensions of <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> vary depending on the specific problem under consideration. The CSO algorithm can be classified into two distinct modes: tracking mode and seeking mode. The algorithm comprises a total of five parameters, with the following descriptions of their specific meanings:
<list list-type="bullet">
<list-item>
<p><bold>Proportion of the two modes (MR):</bold> The proportion of individuals engaged in the seeking mode within the entire population is represented by the value of MR, while the remaining individuals perform the tracking mode.</p></list-item>
<list-item>
<p><bold>Size of the search pool (SMP):</bold> It is necessary for each <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> executing the search mode to replicate SMP copies, thereby forming a search pool corresponding to the <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. Each individual within the search pool is represented by the symbol <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</p></list-item>
<list-item>
<p><bold>Whether the current position is stored (SPC):</bold> SPC is employed to ascertain whether the present <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> will be incorporated directly into the search pool without any modification. In particular, SPC is a random boolean value.</p></list-item>
<list-item>
<p><bold>Dimensional change quantity (CDC):</bold> In the seeking mode, the proportion of dimensions that undergo changes among the <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> in the search pool of <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is represented by the CDC.</p></list-item>
<list-item>
<p><bold>Seeking range of the selected dimension (SRD):</bold> The range of variation for each dimension of <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> in the search pool is <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mo stretchy="false">[</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:mtext>SRD</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:mrow><mml:mtext>SRD</mml:mtext></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>, where <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:msub><mml:mi>x</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represents the specific value of the <italic>j</italic>-th dimension.</p></list-item>
</list></p>
<sec id="s2_1_1">
<label>2.1.1</label>
<title>Seeking Mode</title>
<p>When individuals in the population engage in this mode of behavior, they emulate the actions of cats in a state of repose in the natural environment. Cats will determine their subsequent actions based on the circumstances of the moment. The precise methodology is as follows:
<list list-type="simple">
<list-item><label>(1)</label><p>By the magnitude of the SMP values, <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is replicated to form a search pool. It is worthy of note that if SPC is indicated as true, <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is retained as an individual within the search pool without any modification.</p></list-item>
<list-item><label>(2)</label><p>The following operations should be performed on the samples in the search pool (with the exception of the <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, which should be retained): a random selection of certain dimensions should be made for mutation, with the proportion of these dimensions to the total being CDC, and the mutation range should conform to SRD.</p></list-item>
<list-item><label>(3)</label><p>Evaluate the mutated samples using the fitness function: <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</p></list-item>
<list-item><label>(4)</label><p>Calculate the probability using <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>: <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</p></list-item>
<list-item><label>(5)</label><p>Based on <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, randomly select a sample to replace <inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> in the population.</p></list-item>
</list></p>
<p><disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mi>o</mml:mi><mml:mi>o</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>b</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>w</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>In cases where a minimum value is sought, <inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mi>o</mml:mi><mml:mi>o</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represents the minimum fitness value observed among the samples within the search pool. In contrast, for problems seeking a maximum value, the situation is reversed. The values <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>b</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>w</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represent the highest and lowest fitness values, respectively, among the samples in the pool.</p>
</sec>
<sec id="s2_1_2">
<label>2.1.2</label>
<title>Tracing Mode</title>
<p>This mode has been developed with the objective of enhancing the developmental performance of CSO. The approach is inspired by the tracking behavior of cats and can be mathematically represented as a process of convergence towards the current optimal solution, as demonstrated in <xref ref-type="disp-formula" rid="eqn-2">Eqs. (2)</xref> and <xref ref-type="disp-formula" rid="eqn-3">(3)</xref>.</p>
<p><disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msubsup><mml:mi>V</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:msubsup><mml:mi>V</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msubsup><mml:mo>+</mml:mo><mml:mi>R</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>C</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msubsup><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msubsup><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p><disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:mtable columnalign="right left right left right left right left right left right left" rowspacing="3pt" columnspacing="0em 2em 0em 2em 0em 2em 0em 2em 0em 2em 0em" displaystyle="true"><mml:mtr><mml:mtd /><mml:mtd><mml:msubsup><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:msubsup><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>V</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula></p>
<p>In this context, the variable <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:mi>T</mml:mi></mml:math></inline-formula> represents the current iteration number. <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represents the best individual within the population. In this context, the symbols <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:mi>R</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:mi>C</mml:mi></mml:math></inline-formula> represent, respectively, a random number and a learning constant (<inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:mi>R</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>]</mml:mo></mml:mrow><mml:mo>,</mml:mo><mml:mi>C</mml:mi><mml:mo>=</mml:mo><mml:mn>2.05</mml:mn></mml:math></inline-formula>). The term <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is used to indicate the velocity of movement for a given sample. <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref> is employed to update an individual&#x2019;s future movement speed and direction. With <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> as the guiding factor, the individual moves towards <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> based on the disparity between <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, while being regulated by parameters <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:mi>R</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mi>C</mml:mi></mml:math></inline-formula>. Subsequently, <xref ref-type="disp-formula" rid="eqn-3">Eq. (3)</xref> is used to determine the individual&#x2019;s new position.</p>
</sec>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Genetic Programming</title>
<p>The GP algorithm was first proposed by researchers in 1998. The advantage of GP lies in its minimal requirement for manual intervention, enabling it to autonomously address target problems. It has been extensively applied in areas such as optimizing algorithm parameters, symbolic regression, and optimizing parameters for target problems. Since its inception, GP has evolved into various types of variants. For instance, there are tree-based GP, stack-based GP, and linear-structure-based GP, among others.</p>
<p>Among the numerous types, the most classic is the tree-based GP. The GP-EAs framework proposed in this paper utilizes a binary tree structure. In this type of GP, each individual in the population, i.e., each solution, is represented by a tree. Initialization in GP is conducted under the given conditions of a function set and a terminal set. Following the attributes of the tree structure, a hybrid initialization approach is typically employed, whereby half of the individuals in the population are initialized using a depth-first method and the remaining half are initialized using a breadth-first method. Moreover, each tree in the population must satisfy the specified depth requirement. After the initialization phase, the genetic programming process is conducted sequentially, comprising three distinct steps: selection, crossover, and mutation.</p>
<p><bold>Selection:</bold> The specific process entails the selection of distinct individuals from the extant population for modification to facilitate their evolution into the subsequent generation. This process can be classified into three distinct categories. The initial method entails the selection of a subset of superior individuals, who are then retained in the subsequent generation without undergoing any modifications. The second type comprises the selection of parent individuals for crossover operations. The third method entails the selection of individuals that require mutation. The most commonly employed selection methods are random selection, roulette wheel selection, and tournament selection [<xref ref-type="bibr" rid="ref-44">44</xref>].</p>
<p><bold>Crossover:</bold> In this process, a node is randomly selected from among the two parent individuals, and the subtree of that node is then exchanged. As illustrated in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Sample diagram of crossover operation</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-1.tif"/>
</fig>
<p><bold>Mutation:</bold> Mutation can be classified into two principal categories: single-point mutation and growth mutation. Single-point mutation involves the random selection of either a terminal node or a non-terminal node for mutation. The specific process is illustrated in the left half of <xref ref-type="fig" rid="fig-2">Fig. 2</xref>. In this process, a randomly chosen element from the function set replaces a non-terminal node, or a randomly selected element from the terminal set replaces a terminal node. Growth mutation, on the other hand, involves the replacement of a node with a new subtree, as shown in the right half of <xref ref-type="fig" rid="fig-2">Fig. 2</xref>.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Sample diagram of mutation operation</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-2.tif"/>
</fig>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Digital Watermarking</title>
<p>This section introduces the brief process of digital watermarking and how DWT-DCT-SVD is applied to watermarking.</p>
<p>Before the insertion of the watermark into the designated host image, the watermark image must undergo a series of processing steps. This step is analogous to the further encryption of the watermark, which serves to enhance the invisibility of the secret information and improve its security performance. The Arnold transform [<xref ref-type="bibr" rid="ref-45">45</xref>] is a frequently employed technique for such a transformation, which essentially entails stretching, compressing, and reordering pixel values to encrypt the image information. However, this method exhibits a distinctive characteristic, namely periodicity. This implies that after a certain number of consecutive transformations, the encrypted information can be cracked. The encryption method employed in this paper is based on the generation of a chaotic sequence through the use of Logistic mapping [<xref ref-type="bibr" rid="ref-46">46</xref>], binarizing it according to the pixel values, and performing a bitwise AND or OR with the watermarked image to achieve encryption.</p>
<p>DWT facilitates multi-scale image decomposition, allowing for the insertion of watermark information across various scales. Post-DWT processing, an image is segmented into multiple sub-bands, each characterized by unique frequency properties. Notably, the LL sub-band comprises low-frequency content, encapsulating the primary image information, whereas the LH, HL, and HH sub-bands encompass high-frequency details [<xref ref-type="bibr" rid="ref-47">47</xref>]. The DCT shifts an image from the spatial domain to the frequency domain, thereby facilitating the extraction of features conducive to watermark embedding within the frequency spectrum. The SVD, a matrix decomposition technique, breaks down a matrix into a product of three distinctive matrices (<inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:mi>L</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:mi>S</mml:mi></mml:math></inline-formula>, <inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:mi>R</mml:mi></mml:math></inline-formula>), thereby aiding in the extraction of crucial image information for watermark embedding. This process is illustrated in <xref ref-type="disp-formula" rid="eqn-4">Eq. (4)</xref>. <inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:mi>L</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:mi>R</mml:mi></mml:math></inline-formula> are orthogonal matrices, and <inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:mi>t</mml:mi></mml:math></inline-formula> denotes the transpose operation. Notably, the singular value matrix <inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:mi>S</mml:mi></mml:math></inline-formula> demonstrates robustness, implying that minor image disturbances do not significantly alter its singular values.</p>
<p><disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:mi>G</mml:mi><mml:mo>=</mml:mo><mml:mi>L</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mi>S</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:msup><mml:mi>R</mml:mi><mml:mrow><mml:mi>t</mml:mi></mml:mrow></mml:msup></mml:math></disp-formula></p>
<p>Among the various watermarking techniques, DWT-DCT-SVD stands out as a commonly utilized method. The method combines three key technologies related to digital watermarking, which are divided broadly into three phases. In the initial phase, the target image is subjected to a DWT, which may be applied either once or on multiple occasions. The primary objective of this algorithm is to insert the watermark into the designated sub-band, which can be either a single sub-band or multiple sub-bands. The second phase comprises the further refinement of the selected sub-band through the application of DCT, with the objective of extracting its image characteristics. The third phase entails the utilization of SVD for the processing of the matrix derived from the preceding phase, in conjunction with the watermark image. Subsequently, an embedding coefficient (<inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mi>Q</mml:mi></mml:math></inline-formula>) is employed for the integration of the singular value matrix <inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>w</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> of the watermark image with the singular value matrix <inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> of the selected sub-band, thereby embedding the watermark into the image. This process is depicted in <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref>. Ultimately, by applying the inverse processes to all aforementioned operations, an image with the embedded watermark can be derived.</p>
<p><disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>+</mml:mo><mml:mi>Q</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>w</mml:mi></mml:mrow></mml:msub></mml:math></disp-formula></p>
<p>The present research employs the DWT-DCT-SVD algorithm for the embedding of watermarks, with the DWT stage being applied consecutively on three occasions to obtain three-level sub-bands. The CSO algorithm, augmented by GP-EAs, is utilized to identify suitable embedding factors. A bespoke objective function is employed to achieve a balance between invisibility and robustness. In contradistinction to the watermarking embedding factors of previous studies, the embedding factors in this study possess multiple dimensions. The performance scalability of the algorithm improved by GP-EAs in practical high-dimensional problems can be indirectly verified.</p>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>CSO Algorithm Based on the GP-EAs Framework</title>
<p>This chapter presents the GP-EAs framework. It covers the framework&#x2019;s structure and the design of its associated parameters. Additionally, it introduces the application of GP-EAs to CSO and analyses the update formulas developed explicitly for CSO.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Overall Structure</title>
<p><xref ref-type="fig" rid="fig-3">Fig. 3</xref> illustrates the overall structure of this study, with red lines indicating the data flow. Before commencing, it is necessary to determine which evolutionary algorithm will be improved using the GP-EAs framework; here, the CSO is taken as an example. The initial phase involves researchers manually designing the function set, terminal set, and objective function. Step &#x2460; represents the input of these designed parameters into the GP-EAs. Subsequently, GP-EAs perform iterative selection, where formulas with better performance are gradually retained while those with poorer performance are eliminated during the iterations. The iterative training process is an offline operation, and after a new formula has been designed for the EAs, the new evolutionary formula can be used directly in different real-world applications without re-training it separately. The evaluation process for individuals within the GP population is as follows: the individual, representing a newly evolved formula, replaces the original formula in CSO. Then, the algorithm&#x2019;s performance, assessed using the objective function, is taken as a proxy for the performance of the new formula. Step &#x2461; signifies the replacement of the optimal formula trained by GP-EAs into CSO, and the CSO algorithm using this new formula is named GP-CSO. When validating the practical application capabilities of GP-CSO, the algorithm is applied to digital watermarking to solve for the embedding factor. The performance of GP-CSO in practical applications is verified by evaluating the invisibility and robustness of the watermark.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Overall structure diagram</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-3.tif"/>
</fig>
<p>The time complexity volatility of the manual design of evolutionary formulas is high and different to evaluate. Researchers often need to debug parameters and pair variables multiple times, followed by performance testing. The GP-EAs framework replaces manual design patterns and reduces human intervention, with variable matching and performance testing continuously performed by the program. During the operation of the GP-EAs framework, each individual can be considered a variant of the CSO algorithm when combined with the CSO. It means that the variants with poor performance are eliminated, while the variants with superior performance are retained and continuously learned. Compared with manual design, the time cost and complexity of GP-EAs will be relatively low because they do not have too much human intervention.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>The GP-EAs Framework</title>
<p>This paper aims to enhance the capabilities of tree-based GP and enable its utilization in the autonomous generation of specific evolutionary formulas for EAs. <xref ref-type="table" rid="table-1">Table 1</xref> provides a comprehensive overview of the specific parameters associated with GP-EAs.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Parameters for the GP-EAs framework</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Parametric</th>
<th>Setting</th>
</tr>
</thead>
<tbody>
<tr>
<td>Population size (PS)</td>
<td>100</td>
</tr>
<tr>
<td>Initialization approach</td>
<td>Half in depth and half in breadth</td>
</tr>
<tr>
<td>Iteration limit (MT)</td>
<td>100</td>
</tr>
<tr>
<td>Maximum depth/minimum depth of the tree (MAXD/MIND)</td>
<td>3/5</td>
</tr>
<tr>
<td>Percentage of good samples retained</td>
<td>0.2</td>
</tr>
<tr>
<td>Probability of crossover/mutation</td>
<td>0.8/0.2</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The specific process of GP-EAs is as follows:
<list list-type="simple">
<list-item><label>(1)</label><p>The population is randomly initialized based on the set of functions and the set of terminals, and half of the individuals in the population are generated using a depth-first strategy. In contrast, the other half is generated using a breadth-first strategy.</p></list-item>
<list-item><label>(2)</label><p>Individuals in the population are used to generate new evolutionary formulas using mid-order traversal, and fitness is assessed (using the new evolutionary formulas to replace the old evolutionary formulas in the goal evolutionary algorithm and subsequently evaluating the algorithm&#x2019;s performance using the objective function).</p></list-item>
<list-item><label>(3)</label><p>Select a portion of the top individuals for direct deposit into the next generation.</p></list-item>
<list-item><label>(4)</label><p>Use a roulette wheel to select individuals for the cross-mutation operation.</p></list-item>
<list-item><label>(5)</label><p>Evaluate the fitness of individuals in the new population.</p></list-item>
<list-item><label>(6)</label><p>Cycle through the above steps until the algorithm termination condition is met.</p></list-item>
</list></p>
<p>Algorithm 1 presents the pseudo-code for GP-EAs. Based on previous research on evolutionary formulas in EAs, it has been observed that most of these formulas can be represented by binary trees with depths ranging from 3 to 5. Accordingly, in GP-EAs, the depth of individuals is set within this range of 3 to 5. At the outset of the process, a depth is randomly selected for each individual within the specified limits. To efficiently find suitable formulas in a shorter period and accelerate convergence, the top 20% of individuals from the previous generation are directly carried over to the next generation. In the next generation, 80% of the individuals are generated through crossover and mutation operations. To enhance population diversity, one of the methods is randomly chosen for individuals selected to undergo mutation: terminal node mutation, non-terminal node mutation, or growth mutation.</p>
<fig id="fig-10">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-10.tif"/>
</fig>
<p>This paper specifically designs an evaluation function (<inline-formula id="ieqn-63"><mml:math id="mml-ieqn-63"><mml:mi>F</mml:mi></mml:math></inline-formula>) for the GP-EAs framework to evaluate the newly generated formulas within a population. The CEC2017 introduced four categories of test functions, ranging from simple to complex in their difficulty. Similar to these functions, various practical problems or applications also exhibit differing levels of complexity. Therefore, to enhance the overall performance of the formulas produced by GP-EAs, this paper decides to randomly select one function from each of the four categories in CEC2017, collectively forming the final evaluation function. The detailed evaluation process involves substituting the newly evolved formula (individuals within the GP-EAs population) into the algorithm that necessitates enhancement, followed by the algorithm&#x2019;s execution. For the sake of simplicity, the algorithm under improvement that employs the newly evolved formula during the evaluation process is referred to as new-EAs in the following text. <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref> defines an individual&#x2019;s fitness. In this context, <inline-formula id="ieqn-64"><mml:math id="mml-ieqn-64"><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup></mml:math></inline-formula> represents the theoretical optimal value of the <italic>j</italic>th test function, whereas <inline-formula id="ieqn-65"><mml:math id="mml-ieqn-65"><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> denotes the mean result obtained from five independent runs of new-EAs on the jth test function. By combining four objective functions of varying complexities through a product operation, the objective is to evaluate the comprehensive ability of new-EAs to handle different problems, thereby indirectly proving the effectiveness of the newly evolved formula.</p>
<p><disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:mi>F</mml:mi><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:munderover><mml:mo>&#x220F;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:munderover><mml:mfrac><mml:mrow><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:msubsup><mml:mi>t</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>The GP-CSO Algorithm</title>
<p>The objective of this paper is to optimize the CSO algorithm using GP-EAs, resulting in the creation of a new algorithm, GP-CSO. The GP-EAs is used to autonomously generate the velocity update formula, which is <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref> introduced above. The problem dimension for <inline-formula id="ieqn-66"><mml:math id="mml-ieqn-66"><mml:mi>F</mml:mi></mml:math></inline-formula> is set to 10. As previously stated, F1, F10, F18, and F28 are selected to constitute the evaluation functions. Furthermore, the terminal set and function set&#x2019;s design is paramount for GP. Based on the research on CSO variants and EAs, the terminal set and function set designed for CSO are presented as follows:</p>
<p><disp-formula id="ueqn-7"><mml:math id="mml-ueqn-7" display="block"><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mtable columnalign="left" rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:mi>T</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>m</mml:mi><mml:mi>i</mml:mi><mml:mi>n</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mo>:</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mi>&#x03C9;</mml:mi><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mi>c</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>c</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>V</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mi>R</mml:mi><mml:mo>,</mml:mo><mml:mi>C</mml:mi></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:mi>F</mml:mi><mml:mi>u</mml:mi><mml:mi>n</mml:mi><mml:mi>c</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mo>:</mml:mo><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:mo>+</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x00D7;</mml:mo><mml:mo>,</mml:mo><mml:mo>&#x00F7;</mml:mo></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>The value of <inline-formula id="ieqn-67"><mml:math id="mml-ieqn-67"><mml:mi>&#x03C9;</mml:mi></mml:math></inline-formula> represents a rational number that decreases with the number of iterations, from 0.8 to 0.2. The value of <inline-formula id="ieqn-68"><mml:math id="mml-ieqn-68"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represents the centroid of individuals within a cat population, while <inline-formula id="ieqn-69"><mml:math id="mml-ieqn-69"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represents the velocity centroid. The four classes of operators in the function set are widely used in numerous evolutionary formulas. Since EAs are stochastic methods, the random numbers denoted by <inline-formula id="ieqn-70"><mml:math id="mml-ieqn-70"><mml:mi>R</mml:mi></mml:math></inline-formula> are necessary to be added to the terminal set. <inline-formula id="ieqn-71"><mml:math id="mml-ieqn-71"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-72"><mml:math id="mml-ieqn-72"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> typically involve the process of learning from the current best individual, which is closely related to the core characteristics of EAs and has the effect of accelerating convergence. In addition to this, <inline-formula id="ieqn-73"><mml:math id="mml-ieqn-73"><mml:mi>&#x03C9;</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-74"><mml:math id="mml-ieqn-74"><mml:mi>C</mml:mi></mml:math></inline-formula> are inspired by PSO and DE and their variant algorithms, and have the effect of preventing too fast convergence leading to a fall into a local optimum, as well as controlling the degree of learning between individuals, respectively. Under the influence of these two types of parameters, EAs usually have a certain balance between convergence and exploitation. The rationale for adding <inline-formula id="ieqn-75"><mml:math id="mml-ieqn-75"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-76"><mml:math id="mml-ieqn-76"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> to the terminal set is that the centroid of the relevant data in the population is theoretically smoother and less prone to extremes compared to single data. Also, the terminal set can be further enriched. The resulting equations from the GP-EAs are presented in <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref>.</p>
<p><disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:msubsup><mml:mi>V</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mfrac><mml:mi>R</mml:mi><mml:msubsup><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msubsup></mml:mfrac><mml:mo>&#x22C5;</mml:mo><mml:msubsup><mml:mi>V</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msubsup><mml:mo>+</mml:mo><mml:mi>&#x03C9;</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mi>C</mml:mi><mml:mo>&#x22C5;</mml:mo><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msubsup><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msubsup><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>In comparison to <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref>, in <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> autonomously generated by GP-EAs, an individual&#x2019;s velocity is primarily determined by <inline-formula id="ieqn-77"><mml:math id="mml-ieqn-77"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. After performance testing and screening of various formulas using GP-EAs, it was ultimately determined that during the process of updating the velocity, a coefficient is required to scale <inline-formula id="ieqn-78"><mml:math id="mml-ieqn-78"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. This coefficient is jointly determined by <inline-formula id="ieqn-79"><mml:math id="mml-ieqn-79"><mml:mi>R</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-80"><mml:math id="mml-ieqn-80"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. Similar to the evolutionary formulas of most EAs, <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> also contains a component that reflects the gradual approximation of <inline-formula id="ieqn-81"><mml:math id="mml-ieqn-81"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> towards <inline-formula id="ieqn-82"><mml:math id="mml-ieqn-82"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> during the evolutionary process, specifically manifested through using <inline-formula id="ieqn-83"><mml:math id="mml-ieqn-83"><mml:mi>C</mml:mi></mml:math></inline-formula> to learn from <inline-formula id="ieqn-84"><mml:math id="mml-ieqn-84"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. Unlike previous EAs, which use <inline-formula id="ieqn-85"><mml:math id="mml-ieqn-85"><mml:mi>R</mml:mi></mml:math></inline-formula> to control the learning degree, <xref ref-type="disp-formula" rid="eqn-7">Eq. (7)</xref> employs <inline-formula id="ieqn-86"><mml:math id="mml-ieqn-86"><mml:mi>&#x03C9;</mml:mi></mml:math></inline-formula> to regulate this learning extent. As <inline-formula id="ieqn-87"><mml:math id="mml-ieqn-87"><mml:mi>&#x03C9;</mml:mi></mml:math></inline-formula> gradually decreases with the number of iterations, this implies that as the iterations increase, the degree of learning towards <inline-formula id="ieqn-88"><mml:math id="mml-ieqn-88"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> diminishes. This helps to prevent the algorithm from becoming trapped in a local optimum. When dealing with complex problems, <inline-formula id="ieqn-89"><mml:math id="mml-ieqn-89"><mml:mi>&#x03C9;</mml:mi></mml:math></inline-formula> is more reasonable and exhibits superior performance compared to <inline-formula id="ieqn-90"><mml:math id="mml-ieqn-90"><mml:mi>R</mml:mi></mml:math></inline-formula>.</p>
<p>The pseudo-code of GP-CSO is presented in Algorithm 2.</p>
<fig id="fig-11">
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-11.tif"/>
</fig>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Results</title>
<p>This chapter analyzes the comprehensive performance of GP-CSO through simulation experiments. GP-CSO is a CSO algorithm that employs evolutionary formulas autonomously generated by GP-EAs. The practical effects of optimizing EAs using GP-EAs are verified. Furthermore, it indirectly validates the practical application effects of GP-EAs by applying GP-CSO to digital watermarking.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Experimental Settings for Benchmark Function Testing</title>
<p>The simulation experiments were conducted using the MATLAB 2018b software environment. To assess the overall performance of the GP-CSO, the CEC2017 benchmark suite was selected, with problem dimensions of 30D and 50D employed. CEC2017 contains a total of 30 functions, divided into four categories. F1 to F3 are unimodal functions, used to test the convergence speed and accuracy of algorithms. F4 to F10 are simple multimodal functions, designed to evaluate the search capability of algorithms in scenarios where multiple local optima exist. F11 to F20 are hybrid functions, which are combinations of different types of functions that simulate more complex optimization problems and are used to test the performance of optimization algorithms on complex problems. F21 to F30 are composition functions, formed by combining different types of functions through weighted sums, products, and other forms, aimed at assessing the balance between the global search capability and local exploitation ability of optimization algorithms.</p>
<p>Uniformly setting the basic parameters for each optimization algorithm to ensure the fairness of the experiment. The population size is configured to be 50, the number of iterations is set to 500, and the search range from &#x2212;100 to 100. To ensure the validity of the experimental data, each algorithm was run independently 20 times. This paper employs three distinct metrics to evaluate the performance discrepancies between algorithms: the best value (B) among the 20 runs, the mean (M) of all final results, and the standard deviation (Z) of the final results. The aim is to provide a comprehensive assessment of both the stability and the true performance of the algorithms. Different optimization algorithms possess unique parameters, with specific settings detailed in <xref ref-type="table" rid="table-2">Table 2</xref>. <inline-formula id="ieqn-116"><mml:math id="mml-ieqn-116"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-117"><mml:math id="mml-ieqn-117"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> represent the two learning constants in the PSO algorithm, while wp denotes the weight factor. <inline-formula id="ieqn-118"><mml:math id="mml-ieqn-118"><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>p</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-119"><mml:math id="mml-ieqn-119"><mml:mi>C</mml:mi><mml:mi>R</mml:mi></mml:math></inline-formula> stand for the scaling factor and crossover rate, respectively. <inline-formula id="ieqn-120"><mml:math id="mml-ieqn-120"><mml:mi>a</mml:mi></mml:math></inline-formula> and <inline-formula id="ieqn-121"><mml:math id="mml-ieqn-121"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> linearly decrease from 2 to 0 during the iteration process, while <inline-formula id="ieqn-122"><mml:math id="mml-ieqn-122"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub></mml:math></inline-formula> decreases from &#x2212;1 to &#x2212;2.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Setting of parameters within the algorithm</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Algorithm</th>
<th>Parameter settings</th>
</tr>
</thead>
<tbody>
<tr>
<td>GP-CSO</td>
<td><inline-formula id="ieqn-123"><mml:math id="mml-ieqn-123"><mml:mi>&#x03C9;</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mn>0.2</mml:mn><mml:mo>,</mml:mo><mml:mn>0.8</mml:mn><mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x003A;</mml:mo><mml:mn>0.8</mml:mn><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mn>0.2</mml:mn><mml:mo>,</mml:mo><mml:mi>C</mml:mi><mml:mo>=</mml:mo><mml:mn>2.05</mml:mn><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mi>M</mml:mi><mml:mi>P</mml:mi><mml:mo>=</mml:mo><mml:mn>10</mml:mn><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mi>R</mml:mi><mml:mi>D</mml:mi><mml:mo>=</mml:mo><mml:mn>0.2</mml:mn><mml:mo>,</mml:mo><mml:mi>M</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>0.4</mml:mn><mml:mo>,</mml:mo><mml:mi>C</mml:mi><mml:mi>D</mml:mi><mml:mi>C</mml:mi><mml:mo>=</mml:mo><mml:mn>0.8</mml:mn></mml:math></inline-formula>.</td>
</tr>
<tr>
<td>CSO</td>
<td><inline-formula id="ieqn-124"><mml:math id="mml-ieqn-124"><mml:mi>C</mml:mi><mml:mo>=</mml:mo><mml:mn>2.05</mml:mn><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mi>M</mml:mi><mml:mi>P</mml:mi><mml:mo>=</mml:mo><mml:mn>10</mml:mn><mml:mo>,</mml:mo><mml:mi>S</mml:mi><mml:mi>R</mml:mi><mml:mi>D</mml:mi><mml:mo>=</mml:mo><mml:mn>0.2</mml:mn><mml:mo>,</mml:mo><mml:mi>M</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>0.4</mml:mn><mml:mo>,</mml:mo><mml:mi>C</mml:mi><mml:mi>D</mml:mi><mml:mi>C</mml:mi><mml:mo>=</mml:mo><mml:mn>0.8</mml:mn></mml:math></inline-formula>.</td>
</tr>
<tr>
<td>GWO</td>
<td><inline-formula id="ieqn-125"><mml:math id="mml-ieqn-125"><mml:mi>a</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x003A;</mml:mo><mml:mn>2</mml:mn><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>.</td>
</tr>
<tr>
<td>DE</td>
<td><inline-formula id="ieqn-126"><mml:math id="mml-ieqn-126"><mml:msub><mml:mi>F</mml:mi><mml:mrow><mml:mi>p</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0.5</mml:mn><mml:mo>,</mml:mo><mml:mi>C</mml:mi><mml:mi>R</mml:mi><mml:mo>=</mml:mo><mml:mn>0.2.</mml:mn></mml:math></inline-formula></td>
</tr>
<tr>
<td>PSO</td>
<td><inline-formula id="ieqn-127"><mml:math id="mml-ieqn-127"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>2.05</mml:mn><mml:mo>,</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>p</mml:mi><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>2.05</mml:mn><mml:mo>,</mml:mo><mml:msub><mml:mi>&#x03C9;</mml:mi><mml:mrow><mml:mi>p</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0.8</mml:mn></mml:math></inline-formula>.</td>
</tr>
<tr>
<td>WOA</td>
<td><inline-formula id="ieqn-128"><mml:math id="mml-ieqn-128"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>1</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x003A;</mml:mo><mml:mn>2</mml:mn><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>]</mml:mo></mml:mrow><mml:mo>&#x003A;</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">&#x2192;</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>2.</mml:mn></mml:math></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Analysis of Experimental Results of Each Algorithm on CEC2017 (30-Dimensions)</title>
<p>This paper employs the CEC2017 test suite for 30-dimensional (30D) problems to assess the comprehensive capability of the GP-CSO in addressing low- to mid-dimensional issues. As GP-EAs are typically trained with 10D problems as the foundation for evolving iterative update formulas, this paper does not assess the performance of GP-CSO on 10D problems. To more effectively assess the scalability of the self-trained formulas, 30D is selected as the representative of low- to mid-dimensional problems. Under the same operational environment, GP-CSO and its competing algorithms were independently run 20 times, yielding results as presented in <xref ref-type="table" rid="table-3">Tables 3</xref>&#x2013;<xref ref-type="table" rid="table-5">5</xref>. Data in black and bold represent the best value in the same data. The definition and purpose of the symbols (&#x002B;, &#x2212;, &#x003D;) in the tables are explained in <xref ref-type="sec" rid="s4_4">Section 4.4</xref>.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Test results on a simple benchmark function in 30-dimensions</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th colspan="2">Algorithm</th>
<th align="center" rowspan="2">GP-CSO</th>
<th align="center" rowspan="2">CSO</th>
<th align="center" rowspan="2">GWO</th>
<th align="center" rowspan="2">DE</th>
<th align="center" rowspan="2">PSO</th>
<th align="center" rowspan="2">WOA</th>
</tr>
<tr>
<th>F-Num</th>
<th>Items</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">1</td>
<td>B</td>
<td><bold>2.4125E&#x002B;05</bold></td>
<td>1.4562E&#x002B;09</td>
<td>5.5426E&#x002B;08</td>
<td>4.3983E&#x002B;05</td>
<td>1.5843E&#x002B;09</td>
<td>8.7517E&#x002B;08</td>
</tr>
<tr>
<td>M</td>
<td><bold>9.3308E&#x002B;05</bold></td>
<td>1.6280E&#x002B;09(&#x002B;)</td>
<td>1.7987E&#x002B;09(&#x002B;)</td>
<td>1.0927E&#x002B;06(&#x003D;)</td>
<td>1.9047E&#x002B;09(&#x002B;)</td>
<td>2.1986E&#x002B;09(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>6.7543E&#x002B;05</td>
<td>1.9226E&#x002B;08</td>
<td>7.8496E&#x002B;08</td>
<td><bold>3.6307E&#x002B;05</bold></td>
<td>2.1278E&#x002B;08</td>
<td>6.2534E&#x002B;08</td>
</tr>
<tr>
<td rowspan="3">2</td>
<td>B</td>
<td><bold>4.1593E&#x002B;11</bold></td>
<td>9.3989E&#x002B;21</td>
<td>4.0099E&#x002B;18</td>
<td>6.5157E&#x002B;28</td>
<td>1.0534E&#x002B;23</td>
<td>6.0622E&#x002B;26</td>
</tr>
<tr>
<td>M</td>
<td><bold>2.0579E&#x002B;16</bold></td>
<td>3.5133E&#x002B;23(&#x002B;)</td>
<td>2.6669E&#x002B;29(&#x002B;)</td>
<td>8.4806E&#x002B;30(&#x002B;)</td>
<td>6.0959E&#x002B;30(&#x002B;)</td>
<td>6.7112E&#x002B;33(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>3.8111E&#x002B;16</bold></td>
<td>3.3652E&#x002B;23</td>
<td>8.0010E&#x002B;29</td>
<td>1.1683E&#x002B;31</td>
<td>1.9277E&#x002B;31</td>
<td>1.7078E&#x002B;34</td>
</tr>
<tr>
<td rowspan="3">3</td>
<td>B</td>
<td><bold>1.1442E&#x002B;03</bold></td>
<td>8.8857E&#x002B;03</td>
<td>3.7325E&#x002B;04</td>
<td>1.2070E&#x002B;05</td>
<td>1.9123E&#x002B;04</td>
<td>1.2632E&#x002B;05</td>
</tr>
<tr>
<td>M</td>
<td><bold>4.0346E&#x002B;03</bold></td>
<td>1.1827E&#x002B;04(&#x002B;)</td>
<td>5.5246E&#x002B;04(&#x002B;)</td>
<td>1.5195E&#x002B;05(&#x002B;)</td>
<td>3.7207E&#x002B;04(&#x002B;)</td>
<td>2.5707E&#x002B;05(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>2.0822E&#x002B;03</bold></td>
<td>2.1408E&#x002B;03</td>
<td>1.1389E&#x002B;04</td>
<td>2.5404E&#x002B;04</td>
<td>1.2452E&#x002B;04</td>
<td>6.4225E&#x002B;04</td>
</tr>
<tr>
<td rowspan="3">4</td>
<td>B</td>
<td><bold>4.3524E&#x002B;02</bold></td>
<td>5.4115E&#x002B;02</td>
<td>4.9660E&#x002B;02</td>
<td>5.0294E&#x002B;02</td>
<td>5.4906E&#x002B;02</td>
<td>7.8881E&#x002B;02</td>
</tr>
<tr>
<td>M</td>
<td><bold>5.0331E&#x002B;02</bold></td>
<td>6.0341E&#x002B;02(&#x002B;)</td>
<td>5.6137E&#x002B;02(&#x002B;)</td>
<td>5.1164E&#x002B;02(&#x003D;)</td>
<td>5.9607E&#x002B;02(&#x002B;)</td>
<td>9.0340E&#x002B;02(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>4.1064E&#x002B;01</td>
<td>4.2745E&#x002B;01</td>
<td>4.2993E&#x002B;01</td>
<td><bold>8.3678E&#x002B;00</bold></td>
<td>5.7994E&#x002B;01</td>
<td>9.7616E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">5</td>
<td>B</td>
<td>5.9412E&#x002B;02</td>
<td>7.1240E&#x002B;02</td>
<td><bold>5.8338E&#x002B;02</bold></td>
<td>6.6129E&#x002B;02</td>
<td>7.0869E&#x002B;02</td>
<td>7.7014E&#x002B;02</td>
</tr>
<tr>
<td>M</td>
<td><bold>6.2511E&#x002B;02</bold></td>
<td>7.3850E&#x002B;02(&#x002B;)</td>
<td>6.1544E&#x002B;02(&#x002B;)</td>
<td>6.8635E&#x002B;02(&#x002B;)</td>
<td>7.3732E&#x002B;02(&#x002B;)</td>
<td>8.3527E&#x002B;02(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.5866E&#x002B;01</td>
<td>1.8147E&#x002B;01</td>
<td>2.6391E&#x002B;01</td>
<td><bold>1.1046E&#x002B;01</bold></td>
<td>1.8750E&#x002B;01</td>
<td>4.4500E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">6</td>
<td>B</td>
<td>6.3428E&#x002B;02</td>
<td>6.1813E&#x002B;02</td>
<td>6.0407E&#x002B;02</td>
<td><bold>6.0014E&#x002B;02</bold></td>
<td>6.1673E&#x002B;02</td>
<td>6.6552E&#x002B;02</td>
</tr>
<tr>
<td>M</td>
<td>6.4185E&#x002B;02</td>
<td>6.3445E&#x002B;02(&#x2212;)</td>
<td>6.0811E&#x002B;02(&#x2212;)</td>
<td><bold>6.0019E&#x002B;02(&#x2212;)</bold></td>
<td>6.2705E&#x002B;02(&#x2212;)</td>
<td>6.8054E&#x002B;02(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>5.5946E&#x002B;00</td>
<td>8.5409E&#x002B;00</td>
<td>3.0125E&#x002B;00</td>
<td><bold>4.5121E&#x2212;02</bold></td>
<td>6.2391E&#x002B;00</td>
<td>1.2433E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">7</td>
<td>B</td>
<td><bold>8.3351E&#x002B;02</bold></td>
<td>9.7131E&#x002B;02</td>
<td>8.3845E&#x002B;02</td>
<td>8.9928E&#x002B;02</td>
<td>9.9299E&#x002B;02</td>
<td>1.1406E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>8.7106E&#x002B;02</bold></td>
<td>9.9331E&#x002B;02(&#x002B;)</td>
<td>8.7259E&#x002B;02(&#x002B;)</td>
<td>9.1856E&#x002B;02(&#x002B;)</td>
<td>1.0154E&#x002B;03(&#x002B;)</td>
<td>1.3052E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>3.3097E&#x002B;01</td>
<td>1.9503E&#x002B;01</td>
<td>3.8595E&#x002B;01</td>
<td><bold>1.2436E&#x002B;01</bold></td>
<td>1.4876E&#x002B;01</td>
<td>8.5205E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">8</td>
<td>B</td>
<td>8.8327E&#x002B;02</td>
<td>1.0077E&#x002B;03</td>
<td><bold>8.7484E&#x002B;02</bold></td>
<td>9.4523E&#x002B;02</td>
<td>1.0047E&#x002B;03</td>
<td>9.6310E&#x002B;02(&#x002B;)</td>
</tr>
<tr>
<td>M</td>
<td>9.1680E&#x002B;02</td>
<td>1.0320E&#x002B;03(&#x002B;)</td>
<td><bold>8.9302E&#x002B;02(&#x2212;)</bold></td>
<td>9.8747E&#x002B;02(&#x002B;)</td>
<td>1.0276E&#x002B;03(&#x002B;)</td>
<td>1.0264E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>3.7081E&#x002B;01</td>
<td>2.1704E&#x002B;01</td>
<td><bold>1.7416E&#x002B;01</bold></td>
<td>1.7923E&#x002B;01</td>
<td>2.4224E&#x002B;01</td>
<td>4.4911E&#x002B;01(&#x002B;)</td>
</tr>
<tr>
<td rowspan="3">9</td>
<td>B</td>
<td>1.8034E&#x002B;03</td>
<td>1.7003E&#x002B;03</td>
<td><bold>1.2422E&#x002B;03</bold></td>
<td>1.4690E&#x002B;03</td>
<td>1.4598E&#x002B;03</td>
<td>5.8724E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>3.0421E&#x002B;03</td>
<td>2.1815E&#x002B;03(&#x2212;)</td>
<td>2.4224E&#x002B;03(&#x003D;)</td>
<td>1.9851E&#x002B;03(&#x2212;)</td>
<td><bold>1.7118E&#x002B;03(&#x2212;)</bold></td>
<td>1.0192E&#x002B;04(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>6.6352E&#x002B;02</td>
<td>4.2305E&#x002B;02</td>
<td>1.1017E&#x002B;03</td>
<td>3.6442E&#x002B;02</td>
<td><bold>2.3548E&#x002B;02</bold></td>
<td>3.3941E&#x002B;03</td>
</tr>
<tr>
<td rowspan="3">10</td>
<td>B</td>
<td><bold>4.1485E&#x002B;03</bold></td>
<td>6.7700E&#x002B;03</td>
<td>4.3507E&#x002B;03</td>
<td>7.1236E&#x002B;03</td>
<td>7.9816E&#x002B;03</td>
<td>6.3041E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>4.6188E&#x002B;03</bold></td>
<td>7.7863E&#x002B;03(&#x002B;)</td>
<td>5.1270E&#x002B;03(&#x002B;)</td>
<td>7.5297E&#x002B;03(&#x002B;)</td>
<td>8.3675E&#x002B;03(&#x002B;)</td>
<td>6.9846E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>4.1073E&#x002B;02</td>
<td>4.6165E&#x002B;02</td>
<td>8.7763E&#x002B;02</td>
<td><bold>2.5053E&#x002B;02</bold></td>
<td>4.1256E&#x002B;02</td>
<td>4.4457E&#x002B;02</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-4">
<label>Table 4</label>
<caption>
<title>Test results on 30-dimensional hybrid functions</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th colspan="2">Algorithm</th>
<th align="center" rowspan="2">GP-CSO</th>
<th align="center" rowspan="2">CSO</th>
<th align="center" rowspan="2">GWO</th>
<th align="center" rowspan="2">DE</th>
<th align="center" rowspan="2">PSO</th>
<th align="center" rowspan="2">WOA</th>
</tr>
<tr>
<th>F-Num</th>
<th>Items</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">11</td>
<td>B</td>
<td><bold>1.2263E&#x002B;03</bold></td>
<td>1.4699E&#x002B;03</td>
<td>1.3677E&#x002B;03</td>
<td>1.4314E&#x002B;03</td>
<td>1.4091E&#x002B;03</td>
<td>3.8186E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>1.2777E&#x002B;03</bold></td>
<td>1.5468E&#x002B;03(&#x002B;)</td>
<td>1.7773E&#x002B;03(&#x002B;)</td>
<td>1.6946E&#x002B;03(&#x002B;)</td>
<td>1.6198E&#x002B;03(&#x002B;)</td>
<td>7.7145E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>3.9194E&#x002B;01</bold></td>
<td>6.3738E&#x002B;01</td>
<td>7.2337E&#x002B;02</td>
<td>1.5350E&#x002B;02</td>
<td>1.0052E&#x002B;02</td>
<td>3.1980E&#x002B;03</td>
</tr>
<tr>
<td rowspan="3">12</td>
<td>B</td>
<td><bold>5.1820E&#x002B;05</bold></td>
<td>1.1979E&#x002B;08</td>
<td>3.1207E&#x002B;06</td>
<td>2.3074E&#x002B;07</td>
<td>1.5041E&#x002B;08</td>
<td>6.5354E&#x002B;07</td>
</tr>
<tr>
<td>M</td>
<td><bold>1.1903E&#x002B;07</bold></td>
<td>1.6993E&#x002B;08(&#x002B;)</td>
<td>1.0272E&#x002B;08(&#x002B;)</td>
<td>3.4003E&#x002B;07(&#x002B;)</td>
<td>2.2615E&#x002B;08(&#x002B;)</td>
<td>3.6565E&#x002B;08(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>7.8210E&#x002B;06</td>
<td>3.8177E&#x002B;07</td>
<td>1.5219E&#x002B;08</td>
<td><bold>7.5212E&#x002B;06</bold></td>
<td>5.9702E&#x002B;07</td>
<td>2.8498E&#x002B;08</td>
</tr>
<tr>
<td rowspan="3">13</td>
<td>B</td>
<td><bold>2.3262E&#x002B;04</bold></td>
<td>2.8308E&#x002B;07</td>
<td>9.6153E&#x002B;04</td>
<td>1.3109E&#x002B;06</td>
<td>4.5165E&#x002B;07</td>
<td>5.7071E&#x002B;05</td>
</tr>
<tr>
<td>M</td>
<td><bold>5.3877E&#x002B;04</bold></td>
<td>5.7953E&#x002B;07(&#x002B;)</td>
<td>2.5907E&#x002B;07(&#x002B;)</td>
<td>2.9307E&#x002B;06(&#x002B;)</td>
<td>8.7273E&#x002B;07(&#x002B;)</td>
<td>2.0002E&#x002B;06(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>2.9477E&#x002B;04</bold></td>
<td>1.9725E&#x002B;07</td>
<td>8.0221E&#x002B;07</td>
<td>1.6154E&#x002B;06</td>
<td>2.6440E&#x002B;07</td>
<td>1.6782E&#x002B;06</td>
</tr>
<tr>
<td rowspan="3">14</td>
<td>B</td>
<td><bold>2.8594E&#x002B;03</bold></td>
<td>1.1740E&#x002B;04</td>
<td>1.2203E&#x002B;04</td>
<td>1.2866E&#x002B;05</td>
<td>1.8641E&#x002B;04</td>
<td>1.4896E&#x002B;05</td>
</tr>
<tr>
<td>M</td>
<td><bold>5.0113E&#x002B;04</bold></td>
<td>6.0759E&#x002B;04(&#x002B;)</td>
<td>7.3103E&#x002B;05(&#x002B;)</td>
<td>3.1962E&#x002B;05(&#x002B;)</td>
<td>1.0141E&#x002B;05(&#x002B;)</td>
<td>3.8070E&#x002B;06(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>6.6414E&#x002B;04</td>
<td><bold>5.6676E&#x002B;04</bold></td>
<td>7.7648E&#x002B;05</td>
<td>1.2253E&#x002B;05</td>
<td>9.0386E&#x002B;04</td>
<td>5.6269E&#x002B;06</td>
</tr>
<tr>
<td rowspan="3">15</td>
<td>B</td>
<td><bold>1.2115E&#x002B;04</bold></td>
<td>1.4245E&#x002B;06</td>
<td>2.3202E&#x002B;04</td>
<td>3.8451E&#x002B;04</td>
<td>7.4844E&#x002B;06</td>
<td>2.3219E&#x002B;05</td>
</tr>
<tr>
<td>M</td>
<td><bold>2.9586E&#x002B;04</bold></td>
<td>3.1052E&#x002B;06(&#x002B;)</td>
<td>4.5682E&#x002B;06(&#x002B;)</td>
<td>4.3215E&#x002B;05(&#x002B;)</td>
<td>1.2989E&#x002B;07(&#x002B;)</td>
<td>6.9948E&#x002B;05(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>1.5498E&#x002B;04</bold></td>
<td>1.8716E&#x002B;06</td>
<td>1.1458E&#x002B;07</td>
<td>5.0378E&#x002B;05</td>
<td>6.4303E&#x002B;06</td>
<td>5.1292E&#x002B;05</td>
</tr>
<tr>
<td rowspan="3">16</td>
<td>B</td>
<td>2.3685E&#x002B;03</td>
<td>2.9764E&#x002B;03</td>
<td><bold>1.9945E&#x002B;03</bold></td>
<td>2.6658E&#x002B;03</td>
<td>2.6216E&#x002B;03</td>
<td>3.3186E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>2.6573E&#x002B;03</bold></td>
<td>3.2456E&#x002B;03(&#x002B;)</td>
<td>2.6892E&#x002B;03(&#x002B;)</td>
<td>2.9421E&#x002B;03(&#x002B;)</td>
<td>3.3266E&#x002B;03(&#x002B;)</td>
<td>4.0198E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.0168E&#x002B;02</td>
<td>2.2003E&#x002B;02</td>
<td>3.3671E&#x002B;02</td>
<td><bold>1.6735E&#x002B;02</bold></td>
<td>2.8289E&#x002B;02</td>
<td>5.3732E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">17</td>
<td>B</td>
<td><bold>1.8062E&#x002B;03</bold></td>
<td>2.0698E&#x002B;03</td>
<td>1.8286E&#x002B;03</td>
<td>1.9674E&#x002B;03</td>
<td>2.0635E&#x002B;03</td>
<td>2.2199E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>2.0496E&#x002B;03</bold></td>
<td>2.1360E&#x002B;03(&#x002B;)</td>
<td>2.0894E&#x002B;03(&#x002B;)</td>
<td>2.1267E&#x002B;03(&#x002B;)</td>
<td>2.2814E&#x002B;03(&#x002B;)</td>
<td>2.8759E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.6020E&#x002B;02</td>
<td><bold>4.6220E&#x002B;01</bold></td>
<td>2.2180E&#x002B;02</td>
<td>1.2156E&#x002B;02</td>
<td>1.5055E&#x002B;02</td>
<td>4.0387E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">18</td>
<td>B</td>
<td><bold>6.0189E&#x002B;04</bold></td>
<td>2.1282E&#x002B;05</td>
<td>1.9426E&#x002B;05</td>
<td>1.2143E&#x002B;06</td>
<td>7.3491E&#x002B;05</td>
<td>1.1811E&#x002B;06</td>
</tr>
<tr>
<td>M</td>
<td><bold>2.6506E&#x002B;05</bold></td>
<td>5.4125E&#x002B;05(&#x002B;)</td>
<td>9.5143E&#x002B;05(&#x002B;)</td>
<td>3.3054E&#x002B;06(&#x002B;)</td>
<td>1.6552E&#x002B;06(&#x002B;)</td>
<td>6.8266E&#x002B;06(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>2.1109E&#x002B;05</bold></td>
<td>2.5025E&#x002B;05</td>
<td>7.9248E&#x002B;05</td>
<td>1.3501E&#x002B;06</td>
<td>7.7656E&#x002B;05</td>
<td>6.7431E&#x002B;06</td>
</tr>
<tr>
<td rowspan="3">19</td>
<td>B</td>
<td>1.2117E&#x002B;04</td>
<td>1.6766E&#x002B;06</td>
<td><bold>3.9666E&#x002B;03</bold></td>
<td>1.2305E&#x002B;04</td>
<td>1.2693E&#x002B;07</td>
<td>2.3770E&#x002B;06</td>
</tr>
<tr>
<td>M</td>
<td><bold>1.8588E&#x002B;05</bold></td>
<td>4.5752E&#x002B;06(&#x002B;)</td>
<td>1.9204E&#x002B;06(&#x002B;)</td>
<td>3.2854E&#x002B;05(&#x002B;)</td>
<td>2.2793E&#x002B;07(&#x002B;)</td>
<td>1.5357E&#x002B;07(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>2.8962E&#x002B;05</bold></td>
<td>2.0977E&#x002B;06</td>
<td>3.9773E&#x002B;06</td>
<td>3.6658E&#x002B;05</td>
<td>1.0451E&#x002B;07</td>
<td>1.3292E&#x002B;07</td>
</tr>
<tr>
<td rowspan="3">20</td>
<td>B</td>
<td><bold>2.1922E&#x002B;03</bold></td>
<td>2.4217E&#x002B;03</td>
<td>2.3589E&#x002B;03</td>
<td>2.3855E&#x002B;03</td>
<td>2.4973E&#x002B;03</td>
<td>2.6424E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>2.4631E&#x002B;03</bold></td>
<td>2.5177E&#x002B;03(&#x002B;)</td>
<td>2.5417E&#x002B;03(&#x002B;)</td>
<td>2.4858E&#x002B;03(&#x002B;)</td>
<td>2.6806E&#x002B;03(&#x002B;)</td>
<td>2.9276E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.2575E&#x002B;02</td>
<td><bold>5.6754E&#x002B;01</bold></td>
<td>1.7815E&#x002B;02</td>
<td>5.8234E&#x002B;01</td>
<td>1.3539E&#x002B;02</td>
<td>1.8601E&#x002B;02</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-5">
<label>Table 5</label>
<caption>
<title>Test results on 30-dimensional composite functions</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th colspan="2">Algorithm</th>
<th align="center" rowspan="2">GP-CSO</th>
<th align="center" rowspan="2">CSO</th>
<th align="center" rowspan="2">GWO</th>
<th align="center" rowspan="2">DE</th>
<th align="center" rowspan="2">PSO</th>
<th align="center" rowspan="2">WOA</th>
</tr>
<tr>
<th>F-Num</th>
<th>Items</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">21</td>
<td>B</td>
<td>2.3842E&#x002B;03</td>
<td>2.4917E&#x002B;03</td>
<td><bold>2.3664E&#x002B;03</bold></td>
<td>2.4736E&#x002B;03</td>
<td>2.4821E&#x002B;03</td>
<td>2.5665E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>2.4081E&#x002B;03</td>
<td>2.5104E&#x002B;03(&#x002B;)</td>
<td><bold>2.3900E&#x002B;03(&#x2212;)</bold></td>
<td>2.4942E&#x002B;03(&#x002B;)</td>
<td>2.5094E&#x002B;03(&#x002B;)</td>
<td>2.6483E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>1.5612E&#x002B;01</td>
<td>1.5290E&#x002B;01</td>
<td>2.1858E&#x002B;01</td>
<td><bold>1.1187E&#x002B;01</bold></td>
<td>1.9169E&#x002B;01</td>
<td>6.6954E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">22</td>
<td>B</td>
<td><bold>2.3069E&#x002B;03</bold></td>
<td>2.5382E&#x002B;03</td>
<td>2.4482E&#x002B;03</td>
<td>3.3650E&#x002B;03</td>
<td>2.5717E&#x002B;03</td>
<td>2.6684E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>3.3097E&#x002B;03</bold></td>
<td>5.9314E&#x002B;03(&#x002B;)</td>
<td>5.4480E&#x002B;03(&#x002B;)</td>
<td>5.1598E&#x002B;03(&#x002B;)</td>
<td>4.9834E&#x002B;03(&#x002B;)</td>
<td>7.4073E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.1097E&#x002B;03</td>
<td>3.5459E&#x002B;03</td>
<td>2.0251E&#x002B;03</td>
<td><bold>1.0419E&#x002B;03</bold></td>
<td>3.5709E&#x002B;03</td>
<td>2.8567E&#x002B;03</td>
</tr>
<tr>
<td rowspan="3">23</td>
<td>B</td>
<td>2.7961E&#x002B;03</td>
<td>2.8566E&#x002B;03</td>
<td><bold>2.7375E&#x002B;03</bold></td>
<td>2.8166E&#x002B;03</td>
<td>2.8674E&#x002B;03</td>
<td>3.0527E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>2.8637E&#x002B;03</td>
<td>2.8851E&#x002B;03(&#x003D;)</td>
<td><bold>2.7697E&#x002B;03(&#x2212;)</bold></td>
<td>2.8312E&#x002B;03(&#x003D;)</td>
<td>2.9280E&#x002B;03(&#x002B;)</td>
<td>3.1628E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>5.9182E&#x002B;01</td>
<td>2.1396E&#x002B;01</td>
<td>2.1235E&#x002B;01</td>
<td><bold>9.7359E&#x002B;00</bold></td>
<td>5.1478E&#x002B;01</td>
<td>7.9578E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">24</td>
<td>B</td>
<td>2.9291E&#x002B;03</td>
<td>3.0269E&#x002B;03</td>
<td><bold>2.8872E&#x002B;03</bold></td>
<td>3.0164E&#x002B;03</td>
<td>3.0152E&#x002B;03</td>
<td>3.1251E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>2.9964E&#x002B;03</td>
<td>3.0378E&#x002B;03(&#x002B;)</td>
<td><bold>2.9267E&#x002B;03(&#x2212;)</bold></td>
<td>3.0398E&#x002B;03(&#x002B;)</td>
<td>3.0953E&#x002B;03(&#x002B;)</td>
<td>3.2296E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>4.1774E&#x002B;01</td>
<td>8.0479E&#x002B;00</td>
<td>4.4783E&#x002B;01</td>
<td><bold>1.1001E&#x002B;01</bold></td>
<td>1.0333E&#x002B;02</td>
<td>8.6702E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">25</td>
<td>B</td>
<td><bold>2.8909E&#x002B;03</bold></td>
<td>2.9375E&#x002B;03</td>
<td>2.9278E&#x002B;03</td>
<td>2.8931E&#x002B;03</td>
<td>2.9814E&#x002B;03</td>
<td>3.0233E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>2.9291E&#x002B;03</td>
<td>2.9930E&#x002B;03(&#x002B;)</td>
<td>2.9697E&#x002B;03(&#x002B;)</td>
<td><bold>2.8992E&#x002B;03(&#x2212;)</bold></td>
<td>3.0370E&#x002B;03(&#x002B;)</td>
<td>3.1044E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.5932E&#x002B;01</td>
<td>3.9169E&#x002B;01</td>
<td>4.2837E&#x002B;01</td>
<td><bold>4.1110E&#x002B;00</bold></td>
<td>4.2230E&#x002B;01</td>
<td>4.0877E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">26</td>
<td>B</td>
<td><bold>2.8301E&#x002B;03</bold></td>
<td>3.5179E&#x002B;03</td>
<td>4.3792E&#x002B;03</td>
<td>5.3727E&#x002B;03</td>
<td>3.5241E&#x002B;03</td>
<td>4.3337E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>4.2017E&#x002B;03</bold></td>
<td>5.6159E&#x002B;03(&#x002B;)</td>
<td>4.8014E&#x002B;03(&#x002B;)</td>
<td>5.5510E&#x002B;03(&#x002B;)</td>
<td>4.8501E&#x002B;03(&#x002B;)</td>
<td>7.8964E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>1.6453E&#x002B;03</td>
<td>1.1014E&#x002B;03</td>
<td>3.4977E&#x002B;02</td>
<td><bold>1.0572E&#x002B;02</bold></td>
<td>1.1633E&#x002B;03</td>
<td>1.7276E&#x002B;03</td>
</tr>
<tr>
<td rowspan="3">27</td>
<td>B</td>
<td><bold>3.2177E&#x002B;03</bold></td>
<td>3.2492E&#x002B;03</td>
<td>3.2502E&#x002B;03</td>
<td>3.2312E&#x002B;03</td>
<td>3.2456E&#x002B;03</td>
<td>3.3519E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>3.2447E&#x002B;03</td>
<td>3.2606E&#x002B;03(&#x002B;)</td>
<td>3.2680E&#x002B;03(&#x002B;)</td>
<td><bold>3.2333E&#x002B;03(&#x2212;)</bold></td>
<td>3.2695E&#x002B;03(&#x003D;)</td>
<td>3.5299E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>1.7185E&#x002B;01</td>
<td>7.2234E&#x002B;00</td>
<td>1.6949E&#x002B;01</td>
<td><bold>2.6172E&#x002B;00</bold></td>
<td>2.8049E&#x002B;01</td>
<td>1.4477E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">28</td>
<td>B</td>
<td><bold>3.2168E&#x002B;03</bold></td>
<td>3.3219E&#x002B;03</td>
<td>3.3490E&#x002B;03</td>
<td>3.2739E&#x002B;03</td>
<td>3.3496E&#x002B;03</td>
<td>3.3834E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>3.2535E&#x002B;03</bold></td>
<td>3.3580E&#x002B;03(&#x002B;)</td>
<td>3.4703E&#x002B;03(&#x002B;)</td>
<td>3.2968E&#x002B;03(&#x002B;)</td>
<td>3.3847E&#x002B;03(&#x002B;)</td>
<td>3.5563E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.7151E&#x002B;01</td>
<td>2.9375E&#x002B;01</td>
<td>2.3586E&#x002B;02</td>
<td><bold>1.5709E&#x002B;01</bold></td>
<td>2.0153E&#x002B;01</td>
<td>1.3747E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">29</td>
<td>B</td>
<td>3.6958E&#x002B;03</td>
<td>3.8414E&#x002B;03</td>
<td><bold>3.6800E&#x002B;03</bold></td>
<td>3.9395E&#x002B;03</td>
<td>4.0684E&#x002B;03</td>
<td>4.2778E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>4.1105E&#x002B;03</td>
<td>4.1502E&#x002B;03(&#x003D;)</td>
<td><bold>3.8564E&#x002B;03(&#x2212;)</bold></td>
<td>4.1250E&#x002B;03(&#x003D;)</td>
<td>4.2797E&#x002B;03(&#x003D;)</td>
<td>5.2160E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.2847E&#x002B;02</td>
<td>2.0329E&#x002B;02</td>
<td>1.7517E&#x002B;02</td>
<td><bold>1.2559E&#x002B;02</bold></td>
<td>1.6700E&#x002B;02</td>
<td>5.4524E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">30</td>
<td>B</td>
<td>8.3410E&#x002B;05</td>
<td>9.4854E&#x002B;06</td>
<td>4.1356E&#x002B;06</td>
<td><bold>1.7527E&#x002B;05</bold></td>
<td>8.9341E&#x002B;06</td>
<td>5.9045E&#x002B;06</td>
</tr>
<tr>
<td>M</td>
<td>2.0788E&#x002B;06</td>
<td>1.8358E&#x002B;07(&#x002B;)</td>
<td>9.0291E&#x002B;06(&#x002B;)</td>
<td><bold>4.7807E&#x002B;05(&#x2212;)</bold></td>
<td>2.2316E&#x002B;07(&#x002B;)</td>
<td>5.0115E&#x002B;07(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>1.6031E&#x002B;06</td>
<td>5.8704E&#x002B;06</td>
<td>3.6305E&#x002B;06</td>
<td><bold>2.3732E&#x002B;05</bold></td>
<td>7.8740E&#x002B;06</td>
<td>4.1388E&#x002B;07</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="table-3">Table 3</xref> presents the operational results for both simple problems and simple multimodal problems. GP-CSO demonstrates a more pronounced advantage compared to the original CSO algorithm, with GP-CSO only performing inferior to CSO on F6 and F9. However, GP-CSO exhibits a lower standard deviation on these two problems, indicating superior robustness. This result suggests that GP-CSO possesses stronger convergence performance than CSO, which is attributed to the fact that the velocity update process of GP-CSO is influenced by the velocity of the entire population rather than being dependent on individual velocities. Additionally, when compared to novel algorithms such as GWO and classical algorithms like PSO, GP-CSO demonstrates superior convergence when dealing with simple problems. <xref ref-type="table" rid="table-4">Table 4</xref> presents the operational results of hybrid functions, which typically exhibit complex modalities and have the potential to trap algorithms into local optima. Across the ten hybrid functions from F11 to F20, GP-CSO outperforms all competing algorithms, indicating that GP-CSO is more capable of avoiding the influence of local optimal solutions. This advantage stems from the fact that, as the number of iterations increases, the movement velocity of individuals in the GP-CSO population becomes increasingly less influenced by the current optimal solution. GP-CSO demonstrates higher solution accuracy. After 20 independent runs, GP-CSO exhibits a smaller standard deviation, with notably higher values only on F17 and F20 compared to the CSO algorithm. This implies that GP-CSO possesses better stability when solving complex problems. <xref ref-type="table" rid="table-5">Table 5</xref> displays the performance metrics of different algorithms on composite functions, which pose greater complexity than hybrid functions. Analysis of the data in <xref ref-type="table" rid="table-5">Table 5</xref> reveals that GP-CSO surpasses CSO on most composite functions, with the underlying reasons aligning with prior explanations. In comparison to PSO and WOA, GP-CSO shows superiority based on both average and standard deviation metrics. Only in a few instances does GP-CSO lag behind GWO and DE, where GWO excels in convergence and DE instability.</p>

<p><xref ref-type="fig" rid="fig-4">Fig. 4</xref> exhibits the convergence curves of various algorithms on 30-dimensional benchmark functions. Owing to space limitations, only a portion of the convergence plots are displayed, with the sub-figure titles representing the identification numbers of the benchmark functions. Upon comprehensive analysis of these plots, it is apparent that GP-CSO exhibits outstanding performance on most benchmark functions, surpassing nearly all competing algorithms in terms of final results. The performance on F6 is relatively poor, which is related to the characteristics of the benchmark function. There are also functions similar to F6, such as F9. In the F6 and F9 functions, the peaks and troughs are unevenly and not densely distributed. Populations using the velocity update dominated by <inline-formula id="ieqn-129"><mml:math id="mml-ieqn-129"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> tend to explore the search space more gradually and stably, maintaining a degree of exploration while retaining the exploitation of the surrounding landscape around individuals. In contrast, populations using the velocity update dominated by <inline-formula id="ieqn-130"><mml:math id="mml-ieqn-130"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> exhibit a broader search range but lack detailed exploitation of the surrounding function landscape. They have a higher potential to discover superior values in unevenly distributed function spaces. Therefore, the original CSO algorithm using <inline-formula id="ieqn-131"><mml:math id="mml-ieqn-131"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is more likely to solve better solutions on such functions but is less stable. Additionally, GP-CSO demonstrates a substantial improvement in early-stage convergence speed compared to CSO, indicating its ability to derive superior solutions with limited computational resources. In later iterations, its capacity to escape local optima has also been significantly enhanced. The convergence ability of the algorithm is most evident when solving problems of low to medium dimensions. In EAs, the convergence phenomenon is shown as the individuals in the population move closer to <inline-formula id="ieqn-132"><mml:math id="mml-ieqn-132"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. When <inline-formula id="ieqn-133"><mml:math id="mml-ieqn-133"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is in the local optimum, too much reliance on learning <inline-formula id="ieqn-134"><mml:math id="mml-ieqn-134"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> will easily cause the population to fall into the wrong zone. In GP-CSO, the degree of learning is controlled by the parameter <inline-formula id="ieqn-135"><mml:math id="mml-ieqn-135"><mml:mi>&#x03C9;</mml:mi></mml:math></inline-formula>. As the number of iterations continues to increase, the degree of learning from <inline-formula id="ieqn-136"><mml:math id="mml-ieqn-136"><mml:msub><mml:mi>X</mml:mi><mml:mrow><mml:mi>g</mml:mi><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> by individuals in the population gradually decreases. This allows GP-CSO to remain somewhat exploratory in the later stages of the algorithm. As shown in <xref ref-type="fig" rid="fig-4">Fig. 4a</xref>,<xref ref-type="fig" rid="fig-4">d</xref>,<xref ref-type="fig" rid="fig-4">g</xref>, GP-CSO is still able to further explore the function space when other algorithms stagnate.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Convergence plot of each competing algorithm on 30-dimensions</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-4.tif"/>
</fig>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Analysis of Experimental Results of Each Algorithm on CEC2017 (50-Dimensions)</title>
<p>In order to evaluate the comprehensive capability of the GP-CSO algorithm in addressing complex problems, this paper conducts tests on the algorithm using a 50D benchmark function. The statistical results after 20 independent runs are presented in <xref ref-type="table" rid="table-6">Tables 6</xref>&#x2013;<xref ref-type="table" rid="table-8">8</xref>. In order to minimize redundancy, the definitions of the relevant data labels in these tables are consistent with those used when the dimension was 30.</p>
<table-wrap id="table-6">
<label>Table 6</label>
<caption>
<title>Test results on a simple benchmark function in 50-dimensions</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th colspan="2">Algorithm</th>
<th align="center" rowspan="2">GP-CSO</th>
<th align="center" rowspan="2">CSO</th>
<th align="center" rowspan="2">GWO</th>
<th align="center" rowspan="2">DE</th>
<th align="center" rowspan="2">PSO</th>
<th align="center" rowspan="2">WOA</th>
</tr>
<tr>
<th>F-Num</th>
<th>Items</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">1</td>
<td>B</td>
<td><bold>1.0009E&#x002B;07</bold></td>
<td>4.3124E&#x002B;09</td>
<td>3.1179E&#x002B;09</td>
<td>4.7642E&#x002B;07</td>
<td>5.8337E&#x002B;09</td>
<td>4.8267E&#x002B;09</td>
</tr>
<tr>
<td>M</td>
<td><bold>5.5084E&#x002B;07</bold></td>
<td>5.6823E&#x002B;09(&#x002B;)</td>
<td>5.8287E&#x002B;09(&#x002B;)</td>
<td>1.2997E&#x002B;08(&#x002B;)</td>
<td>6.7583E&#x002B;09(&#x002B;)</td>
<td>1.1156E&#x002B;10(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>5.0228E&#x002B;07</bold></td>
<td>1.0178E&#x002B;09</td>
<td>1.9085E&#x002B;09</td>
<td>6.7606E&#x002B;07</td>
<td>1.1820E&#x002B;09</td>
<td>4.4226E&#x002B;09</td>
</tr>
<tr>
<td rowspan="3">2</td>
<td>B</td>
<td><bold>1.3171E&#x002B;30</bold></td>
<td>7.5734E&#x002B;42</td>
<td>1.3245E&#x002B;45</td>
<td>1.2763E&#x002B;62</td>
<td>3.1813E&#x002B;49</td>
<td>2.0435E&#x002B;60</td>
</tr>
<tr>
<td>M</td>
<td><bold>6.2580E&#x002B;40</bold></td>
<td>3.5200E&#x002B;49(&#x002B;)</td>
<td>4.5333E&#x002B;51(&#x002B;)</td>
<td>5.8385E&#x002B;65(&#x002B;)</td>
<td>2.5356E&#x002B;51(&#x002B;)</td>
<td>9.0848E&#x002B;71(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>1.9768E&#x002B;41</bold></td>
<td>1.0750E&#x002B;50</td>
<td>9.6701E&#x002B;51</td>
<td>1.0031E&#x002B;66</td>
<td>4.2165E&#x002B;51</td>
<td>2.8664E&#x002B;72</td>
</tr>
<tr>
<td rowspan="3">3</td>
<td>B</td>
<td><bold>1.7723E&#x002B;04</bold></td>
<td>3.6264E&#x002B;04</td>
<td>9.9483E&#x002B;04</td>
<td>2.4062E&#x002B;05</td>
<td>1.0687E&#x002B;05</td>
<td>1.5738E&#x002B;05</td>
</tr>
<tr>
<td>M</td>
<td><bold>3.0124E&#x002B;04</bold></td>
<td>4.6022E&#x002B;04(&#x002B;)</td>
<td>1.4635E&#x002B;05(&#x002B;)</td>
<td>3.2489E&#x002B;05(&#x002B;)</td>
<td>1.4841E&#x002B;05(&#x002B;)</td>
<td>2.2142E&#x002B;05(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>7.1922E&#x002B;03</td>
<td><bold>4.9628E&#x002B;03</bold></td>
<td>3.2905E&#x002B;04</td>
<td>5.7729E&#x002B;04</td>
<td>2.6204E&#x002B;04</td>
<td>6.3250E&#x002B;04</td>
</tr>
<tr>
<td rowspan="3">4</td>
<td>B</td>
<td><bold>5.1671E&#x002B;02</bold></td>
<td>9.0797E&#x002B;02</td>
<td>6.7043E&#x002B;02</td>
<td>7.0959E&#x002B;02</td>
<td>8.7044E&#x002B;02</td>
<td>2.1581E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>6.0578E&#x002B;02</bold></td>
<td>1.0077E&#x002B;03(&#x002B;)</td>
<td>1.1436E&#x002B;03(&#x002B;)</td>
<td>7.3484E&#x002B;02(&#x002B;)</td>
<td>1.1168E&#x002B;03(&#x002B;)</td>
<td>2.8915E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>6.4491E&#x002B;01</td>
<td>8.4143E&#x002B;01</td>
<td>4.0808E&#x002B;02</td>
<td><bold>2.0177E&#x002B;01</bold></td>
<td>2.0634E&#x002B;02</td>
<td>6.9726E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">5</td>
<td>B</td>
<td>6.7986E&#x002B;02</td>
<td>9.5420E&#x002B;02</td>
<td>7.0694E&#x002B;02</td>
<td>9.0623E&#x002B;02</td>
<td>9.4160E&#x002B;02</td>
<td>9.3736E&#x002B;02</td>
</tr>
<tr>
<td>M</td>
<td>7.6032E&#x002B;02</td>
<td>9.9624E&#x002B;02(&#x002B;)</td>
<td>7.9092E&#x002B;02(&#x003D;)</td>
<td>9.2951E&#x002B;02(&#x002B;)</td>
<td>1.0051E&#x002B;03(&#x002B;)</td>
<td>1.0312E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>3.8262E&#x002B;01</td>
<td>3.6516E&#x002B;01</td>
<td>1.0573E&#x002B;02</td>
<td><bold>1.4808E&#x002B;01</bold></td>
<td>4.4925E&#x002B;01</td>
<td>5.5667E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">6</td>
<td>B</td>
<td>6.3395E&#x002B;02</td>
<td>6.4054E&#x002B;02</td>
<td>6.1472E&#x002B;02</td>
<td><bold>6.0237E&#x002B;02</bold></td>
<td>6.2513E&#x002B;02</td>
<td>6.8508E&#x002B;02</td>
</tr>
<tr>
<td>M</td>
<td>6.5185E&#x002B;02</td>
<td>6.5351E&#x002B;02(&#x003D;)</td>
<td>6.2022E&#x002B;02(&#x2212;)</td>
<td><bold>6.0287E&#x002B;02(&#x2212;)</bold></td>
<td>6.3850E&#x002B;02(&#x2212;)</td>
<td>6.9939E&#x002B;02(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>1.1075E&#x002B;01</td>
<td>1.2256E&#x002B;01</td>
<td>3.8710E&#x002B;00</td>
<td><bold>4.8246E&#x2212;01</bold></td>
<td>8.9490E&#x002B;00</td>
<td>1.0802E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">7</td>
<td>B</td>
<td><bold>9.9300E&#x002B;02</bold></td>
<td>1.3069E&#x002B;03</td>
<td>1.0728E&#x002B;03</td>
<td>1.1693E&#x002B;03</td>
<td>1.3148E&#x002B;03</td>
<td>1.5507E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>1.0461E&#x002B;03</bold></td>
<td>1.3495E&#x002B;03(&#x002B;)</td>
<td>1.1267E&#x002B;03(&#x002B;)</td>
<td>1.2003E&#x002B;03(&#x002B;)</td>
<td>1.3523E&#x002B;03(&#x002B;)</td>
<td>1.8001E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>5.8313E&#x002B;01</td>
<td>3.7079E&#x002B;01</td>
<td>4.9359E&#x002B;01</td>
<td><bold>1.6722E&#x002B;01</bold></td>
<td>2.6331E&#x002B;01</td>
<td>1.1427E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">8</td>
<td>B</td>
<td>1.0005E&#x002B;03</td>
<td>1.2483E&#x002B;03</td>
<td><bold>9.7489E&#x002B;02</bold></td>
<td>1.1919E&#x002B;03</td>
<td>1.2238E&#x002B;03</td>
<td>1.2502E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>1.1042E&#x002B;03</td>
<td>1.2961E&#x002B;03(&#x002B;)</td>
<td><bold>1.0544E&#x002B;03(&#x003D;)</bold></td>
<td>1.2338E&#x002B;03(&#x002B;)</td>
<td>1.2678E&#x002B;03(&#x002B;)</td>
<td>1.3257E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>5.6993E&#x002B;01</td>
<td>3.3752E&#x002B;01</td>
<td>6.2034E&#x002B;01</td>
<td><bold>2.0548E&#x002B;01</bold></td>
<td>2.8044E&#x002B;01</td>
<td>7.8218E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">9</td>
<td>B</td>
<td>7.7518E&#x002B;03</td>
<td>6.7536E&#x002B;03</td>
<td>5.2232E&#x002B;03</td>
<td>6.6133E&#x002B;03</td>
<td><bold>3.3780E&#x002B;03</bold></td>
<td>2.2176E&#x002B;04</td>
</tr>
<tr>
<td>M</td>
<td>1.1970E&#x002B;04</td>
<td>1.3206E&#x002B;04(&#x003D;)</td>
<td>9.2307E&#x002B;03(&#x003D;)</td>
<td>9.0610E&#x002B;03(&#x2212;)</td>
<td><bold>7.3767E&#x002B;03(&#x2212;)</bold></td>
<td>4.4026E&#x002B;04(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>3.0117E&#x002B;03</td>
<td>6.2803E&#x002B;03</td>
<td>3.9242E&#x002B;03</td>
<td><bold>1.4366E&#x002B;03</bold></td>
<td>3.7635E&#x002B;03</td>
<td>1.3182E&#x002B;04</td>
</tr>
<tr>
<td rowspan="3">10</td>
<td>B</td>
<td>6.8833E&#x002B;03</td>
<td>1.3219E&#x002B;04</td>
<td><bold>6.4321E&#x002B;03</bold></td>
<td>1.3180E&#x002B;04</td>
<td>1.3718E&#x002B;04</td>
<td>1.0191E&#x002B;04</td>
</tr>
<tr>
<td>M</td>
<td><bold>8.7090E&#x002B;03</bold></td>
<td>1.3990E&#x002B;04(&#x002B;)</td>
<td>9.5355E&#x002B;03(&#x002B;)</td>
<td>1.3862E&#x002B;04(&#x002B;)</td>
<td>1.4518E&#x002B;04(&#x002B;)</td>
<td>1.2284E&#x002B;04(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>1.3893E&#x002B;03</td>
<td>5.3082E&#x002B;02</td>
<td>3.9933E&#x002B;03</td>
<td>4.6915E&#x002B;02</td>
<td><bold>4.4952E&#x002B;02</bold></td>
<td>1.3024E&#x002B;03</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-7">
<label>Table 7</label>
<caption>
<title>Test results on 50-dimensional hybrid functions</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th colspan="2">Algorithm</th>
<th align="center" rowspan="2">GP-CSO</th>
<th align="center" rowspan="2">CSO</th>
<th align="center" rowspan="2">GWO</th>
<th align="center" rowspan="2">DE</th>
<th align="center" rowspan="2">PSO</th>
<th align="center" rowspan="2">WOA</th>
</tr>
<tr>
<th>F-Num</th>
<th>Items</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">11</td>
<td>B</td>
<td><bold>1.4300E&#x002B;03</bold></td>
<td>2.4100E&#x002B;03</td>
<td>2.8278E&#x002B;03</td>
<td>3.3010E&#x002B;03</td>
<td>2.5599E&#x002B;03</td>
<td>3.4340E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>1.5164E&#x002B;03</bold></td>
<td>2.6595E&#x002B;03(&#x002B;)</td>
<td>5.6229E&#x002B;03(&#x002B;)</td>
<td>5.3485E&#x002B;03(&#x002B;)</td>
<td>2.9352E&#x002B;03(&#x002B;)</td>
<td>5.2009E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>6.7804E&#x002B;01</bold></td>
<td>1.8935E&#x002B;02</td>
<td>2.0585E&#x002B;03</td>
<td>1.5427E&#x002B;03</td>
<td>3.5709E&#x002B;02</td>
<td>1.3220E&#x002B;03</td>
</tr>
<tr>
<td rowspan="3">12</td>
<td>B</td>
<td><bold>6.8502E&#x002B;06</bold></td>
<td>8.6894E&#x002B;08</td>
<td>2.0347E&#x002B;08</td>
<td>3.8041E&#x002B;08</td>
<td>1.2351E&#x002B;09</td>
<td>7.9272E&#x002B;08</td>
</tr>
<tr>
<td>M</td>
<td><bold>1.0872E&#x002B;08</bold></td>
<td>1.4490E&#x002B;09(&#x002B;)</td>
<td>7.4606E&#x002B;08(&#x002B;)</td>
<td>5.4433E&#x002B;08(&#x002B;)</td>
<td>2.6145E&#x002B;09(&#x002B;)</td>
<td>2.3247E&#x002B;09(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>1.5448E&#x002B;08</td>
<td>3.4831E&#x002B;08</td>
<td>7.1964E&#x002B;08</td>
<td><bold>1.2738E&#x002B;08</bold></td>
<td>1.2191E&#x002B;09</td>
<td>1.0469E&#x002B;09</td>
</tr>
<tr>
<td rowspan="3">13</td>
<td>B</td>
<td><bold>4.4522E&#x002B;04</bold></td>
<td>2.5519E&#x002B;08</td>
<td>3.7800E&#x002B;06</td>
<td>3.5972E&#x002B;06</td>
<td>2.7347E&#x002B;08</td>
<td>7.3172E&#x002B;07</td>
</tr>
<tr>
<td>M</td>
<td><bold>1.0419E&#x002B;05</bold></td>
<td>3.8839E&#x002B;08(&#x002B;)</td>
<td>1.1772E&#x002B;08(&#x002B;)</td>
<td>1.1618E&#x002B;07(&#x002B;)</td>
<td>5.7215E&#x002B;08(&#x002B;)</td>
<td>2.2093E&#x002B;08(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>5.3119E&#x002B;04</bold></td>
<td>1.2941E&#x002B;08</td>
<td>1.1410E&#x002B;08</td>
<td>8.6571E&#x002B;06</td>
<td>1.7457E&#x002B;08</td>
<td>1.7658E&#x002B;08</td>
</tr>
<tr>
<td rowspan="3">14</td>
<td>B</td>
<td><bold>3.0030E&#x002B;04</bold></td>
<td>2.8840E&#x002B;05</td>
<td>4.6695E&#x002B;05</td>
<td>1.0044E&#x002B;06</td>
<td>3.2510E&#x002B;05</td>
<td>6.1702E&#x002B;05</td>
</tr>
<tr>
<td>M</td>
<td><bold>1.8778E&#x002B;05</bold></td>
<td>6.1454E&#x002B;05(&#x002B;)</td>
<td>1.3587E&#x002B;06(&#x002B;)</td>
<td>2.3674E&#x002B;06(&#x002B;)</td>
<td>9.4546E&#x002B;05(&#x002B;)</td>
<td>4.4085E&#x002B;06(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>9.6525E&#x002B;04</bold></td>
<td>3.0708E&#x002B;05</td>
<td>6.6787E&#x002B;05</td>
<td>8.3225E&#x002B;05</td>
<td>5.4212E&#x002B;05</td>
<td>2.9340E&#x002B;06</td>
</tr>
<tr>
<td rowspan="3">15</td>
<td>B</td>
<td><bold>9.2566E&#x002B;03</bold></td>
<td>1.6392E&#x002B;07</td>
<td>4.7528E&#x002B;04</td>
<td>3.1128E&#x002B;05</td>
<td>6.4412E&#x002B;07</td>
<td>1.1433E&#x002B;06</td>
</tr>
<tr>
<td>M</td>
<td><bold>3.4222E&#x002B;04</bold></td>
<td>4.9920E&#x002B;07(&#x002B;)</td>
<td>7.9786E&#x002B;06(&#x002B;)</td>
<td>1.2070E&#x002B;06(&#x002B;)</td>
<td>1.4392E&#x002B;08(&#x002B;)</td>
<td>2.5489E&#x002B;07(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>1.3134E&#x002B;04</bold></td>
<td>1.6282E&#x002B;07</td>
<td>1.7825E&#x002B;07</td>
<td>6.8895E&#x002B;05</td>
<td>4.4370E&#x002B;07</td>
<td>2.8344E&#x002B;07</td>
</tr>
<tr>
<td rowspan="3">16</td>
<td>B</td>
<td><bold>2.5029E&#x002B;03</bold></td>
<td>3.8210E&#x002B;03</td>
<td>2.5372E&#x002B;03</td>
<td>4.7591E&#x002B;03</td>
<td>4.3111E&#x002B;03</td>
<td>5.0859E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>3.2426E&#x002B;03</bold></td>
<td>4.4815E&#x002B;03(&#x002B;)</td>
<td>3.3151E&#x002B;03(&#x003D;)</td>
<td>5.0212E&#x002B;03(&#x002B;)</td>
<td>4.7139E&#x002B;03(&#x002B;)</td>
<td>6.2939E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>6.3294E&#x002B;02</td>
<td>4.0924E&#x002B;02</td>
<td>7.0090E&#x002B;02</td>
<td><bold>1.7693E&#x002B;02</bold></td>
<td>3.1556E&#x002B;02</td>
<td>8.6365E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">17</td>
<td>B</td>
<td><bold>2.5686E&#x002B;03</bold></td>
<td>3.2844E&#x002B;03</td>
<td>2.7564E&#x002B;03</td>
<td>3.2496E&#x002B;03</td>
<td>3.6641E&#x002B;03</td>
<td>3.7134E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>3.0915E&#x002B;03</bold></td>
<td>3.8859E&#x002B;03(&#x002B;)</td>
<td>3.4761E&#x002B;03(&#x003D;)</td>
<td>3.5239E&#x002B;03(&#x002B;)</td>
<td>3.9524E&#x002B;03(&#x002B;)</td>
<td>4.3794E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.9160E&#x002B;02</td>
<td>2.6136E&#x002B;02</td>
<td>5.4060E&#x002B;02</td>
<td><bold>1.5931E&#x002B;02</bold></td>
<td>2.1696E&#x002B;02</td>
<td>6.2641E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">18</td>
<td>B</td>
<td><bold>3.6445E&#x002B;05</bold></td>
<td>6.4120E&#x002B;05</td>
<td>8.3854E&#x002B;05</td>
<td>4.7327E&#x002B;06</td>
<td>2.8146E&#x002B;06</td>
<td>7.9480E&#x002B;06</td>
</tr>
<tr>
<td>M</td>
<td><bold>1.3887E&#x002B;06</bold></td>
<td>3.4877E&#x002B;06(&#x002B;)</td>
<td>9.6278E&#x002B;06(&#x002B;)</td>
<td>1.4601E&#x002B;07(&#x002B;)</td>
<td>7.5858E&#x002B;06(&#x002B;)</td>
<td>6.1526E&#x002B;07(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>8.0284E&#x002B;05</bold></td>
<td>1.4386E&#x002B;06</td>
<td>6.8782E&#x002B;06</td>
<td>6.5229E&#x002B;06</td>
<td>3.3298E&#x002B;06</td>
<td>3.8105E&#x002B;07</td>
</tr>
<tr>
<td rowspan="3">19</td>
<td>B</td>
<td>2.2451E&#x002B;05</td>
<td>2.8841E&#x002B;07</td>
<td>2.9777E&#x002B;05</td>
<td><bold>1.6585E&#x002B;05</bold></td>
<td>4.6911E&#x002B;07</td>
<td>3.9561E&#x002B;05</td>
</tr>
<tr>
<td>M</td>
<td>6.5900E&#x002B;05</td>
<td>4.9749E&#x002B;07(&#x002B;)</td>
<td>2.2035E&#x002B;07(&#x002B;)</td>
<td><bold>4.9165E&#x002B;05(&#x003D;)</bold></td>
<td>6.3819E&#x002B;07(&#x002B;)</td>
<td>6.9120E&#x002B;06(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>3.5631E&#x002B;05</td>
<td>2.0824E&#x002B;07</td>
<td>4.0980E&#x002B;07</td>
<td><bold>2.1245E&#x002B;05</bold></td>
<td>1.2134E&#x002B;07</td>
<td>6.0675E&#x002B;06</td>
</tr>
<tr>
<td rowspan="3">20</td>
<td>B</td>
<td>2.6940E&#x002B;03</td>
<td>3.3590E&#x002B;03</td>
<td><bold>2.6166E&#x002B;03</bold></td>
<td>3.3632E&#x002B;03</td>
<td>3.4803E&#x002B;03</td>
<td>3.2364E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>3.1809E&#x002B;03</bold></td>
<td>3.6122E&#x002B;03(&#x002B;)</td>
<td>3.2370E&#x002B;03(&#x002B;)</td>
<td>3.6823E&#x002B;03(&#x002B;)</td>
<td>3.8385E&#x002B;03(&#x002B;)</td>
<td>3.8193E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.9763E&#x002B;02</td>
<td>1.8818E&#x002B;02</td>
<td>5.5416E&#x002B;02</td>
<td><bold>1.3204E&#x002B;02</bold></td>
<td>2.1073E&#x002B;02</td>
<td>3.1462E&#x002B;02</td>
</tr>
</tbody>
</table>
</table-wrap><table-wrap id="table-8">
<label>Table 8</label>
<caption>
<title>Test results on 50-dimensional composite functions</title>
</caption>
<table>
<colgroup>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th colspan="2">Algorithm</th>
<th align="center" rowspan="2">GP-CSO</th>
<th align="center" rowspan="2">CSO</th>
<th align="center" rowspan="2">GWO</th>
<th align="center" rowspan="2">DE</th>
<th align="center" rowspan="2">PSO</th>
<th align="center" rowspan="2">WOA</th>
</tr>
<tr>
<th>F-Num</th>
<th>Items</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">21</td>
<td>B</td>
<td>2.5215E&#x002B;03</td>
<td>2.7265E&#x002B;03</td>
<td><bold>2.4417E&#x002B;03</bold></td>
<td>2.7170E&#x002B;03</td>
<td>2.6901E&#x002B;03</td>
<td>3.0327E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>2.5862E&#x002B;03</td>
<td>2.7781E&#x002B;03(&#x002B;)</td>
<td><bold>2.5021E&#x002B;03(&#x2212;)</bold></td>
<td>2.7297E&#x002B;03(&#x002B;)</td>
<td>2.7587E&#x002B;03(&#x002B;)</td>
<td>3.1217E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>5.6299E&#x002B;01</td>
<td>4.3855E&#x002B;01</td>
<td>4.4117E&#x002B;01</td>
<td><bold>1.2474E&#x002B;01</bold></td>
<td>3.7322E&#x002B;01</td>
<td>8.1670E&#x002B;01</td>
</tr>
<tr>
<td rowspan="3">22</td>
<td>B</td>
<td><bold>2.3480E&#x002B;03</bold></td>
<td>3.1628E&#x002B;03</td>
<td>8.2037E&#x002B;03</td>
<td>1.3636E&#x002B;04</td>
<td>3.2274E&#x002B;03</td>
<td>1.2213E&#x002B;04</td>
</tr>
<tr>
<td>M</td>
<td><bold>9.2896E&#x002B;03</bold></td>
<td>1.4682E&#x002B;04(&#x002B;)</td>
<td>9.8217E&#x002B;03(&#x002B;)</td>
<td>1.5645E&#x002B;04(&#x002B;)</td>
<td>1.3657E&#x002B;04(&#x002B;)</td>
<td>1.4085E&#x002B;04(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.6065E&#x002B;03</td>
<td>2.7943E&#x002B;03</td>
<td>1.6048E&#x002B;03</td>
<td><bold>6.1379E&#x002B;02</bold></td>
<td>5.2257E&#x002B;03</td>
<td>1.2009E&#x002B;03</td>
</tr>
<tr>
<td rowspan="3">23</td>
<td>B</td>
<td>3.0527E&#x002B;03</td>
<td>3.1515E&#x002B;03</td>
<td><bold>2.8971E&#x002B;03</bold></td>
<td>3.1205E&#x002B;03</td>
<td>3.2061E&#x002B;03</td>
<td>3.4123E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>3.2175E&#x002B;03</td>
<td>3.2406E&#x002B;03(&#x003D;)</td>
<td><bold>3.0144E&#x002B;03(&#x2212;)</bold></td>
<td>3.1535E&#x002B;03(&#x2212;)</td>
<td>3.3128E&#x002B;03(&#x002B;)</td>
<td>3.7925E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>8.5412E&#x002B;01</td>
<td>5.0485E&#x002B;01</td>
<td>1.0463E&#x002B;02</td>
<td><bold>1.4729E&#x002B;01</bold></td>
<td>8.7259E&#x002B;01</td>
<td>1.6693E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">24</td>
<td>B</td>
<td>3.1271E&#x002B;03</td>
<td>3.3387E&#x002B;03</td>
<td><bold>3.0556E&#x002B;03</bold></td>
<td>3.3054E&#x002B;03</td>
<td>3.3837E&#x002B;03</td>
<td>3.5330E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>3.2705E&#x002B;03</td>
<td>3.3875E&#x002B;03(&#x002B;)</td>
<td><bold>3.1569E&#x002B;03(&#x2212;)</bold></td>
<td>3.3435E&#x002B;03(&#x002B;)</td>
<td>3.5220E&#x002B;03(&#x002B;)</td>
<td>3.8010E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>8.2691E&#x002B;01</td>
<td>3.5638E&#x002B;01</td>
<td>7.5784E&#x002B;01</td>
<td><bold>1.6046E&#x002B;01</bold></td>
<td>1.0542E&#x002B;02</td>
<td>1.5220E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">25</td>
<td>B</td>
<td><bold>3.0881E&#x002B;03</bold></td>
<td>3.2876E&#x002B;03</td>
<td>3.2074E&#x002B;03</td>
<td>3.1346E&#x002B;03</td>
<td>3.2860E&#x002B;03</td>
<td>3.6180E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>3.1475E&#x002B;03</bold></td>
<td>3.4942E&#x002B;03(&#x002B;)</td>
<td>3.6548E&#x002B;03(&#x002B;)</td>
<td>3.1706E&#x002B;03(&#x002B;)</td>
<td>3.4611E&#x002B;03(&#x002B;)</td>
<td>4.5350E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>5.0126E&#x002B;01</td>
<td>1.1710E&#x002B;02</td>
<td>2.6039E&#x002B;02</td>
<td><bold>2.1879E&#x002B;01</bold></td>
<td>1.3684E&#x002B;02</td>
<td>5.5903E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">26</td>
<td>B</td>
<td><bold>2.9526E&#x002B;03</bold></td>
<td>4.3104E&#x002B;03</td>
<td>5.5110E&#x002B;03</td>
<td>7.4020E&#x002B;03</td>
<td>4.3498E&#x002B;03</td>
<td>1.2771E&#x002B;04</td>
</tr>
<tr>
<td>M</td>
<td><bold>6.0391E&#x002B;03</bold></td>
<td>7.4911E&#x002B;03(&#x002B;)</td>
<td>6.6907E&#x002B;03(&#x002B;)</td>
<td>7.9464E&#x002B;03(&#x002B;)</td>
<td>7.3802E&#x002B;03(&#x002B;)</td>
<td>1.5514E&#x002B;04(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.8301E&#x002B;03</td>
<td>2.2515E&#x002B;03</td>
<td>8.2574E&#x002B;02</td>
<td><bold>1.9153E&#x002B;02</bold></td>
<td>2.1233E&#x002B;03</td>
<td>1.4677E&#x002B;03</td>
</tr>
<tr>
<td rowspan="3">27</td>
<td>B</td>
<td>3.4567E&#x002B;03</td>
<td><bold>3.3388E&#x002B;03</bold></td>
<td>3.5525E&#x002B;03</td>
<td>3.5025E&#x002B;03</td>
<td>3.4072E&#x002B;03</td>
<td>3.8525E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>3.7729E&#x002B;03</td>
<td><bold>3.4557E&#x002B;03(&#x2212;)</bold></td>
<td>3.6477E&#x002B;03(&#x2212;)</td>
<td>3.5777E&#x002B;03(&#x2212;)</td>
<td>3.6353E&#x002B;03(&#x2212;)</td>
<td>4.7255E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>2.4883E&#x002B;02</td>
<td>9.6235E&#x002B;01</td>
<td>5.3385E&#x002B;01</td>
<td><bold>4.3371E&#x002B;01</bold></td>
<td>1.8136E&#x002B;02</td>
<td>4.9729E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">28</td>
<td>B</td>
<td><bold>3.3312E&#x002B;03</bold></td>
<td>3.5259E&#x002B;03</td>
<td>3.6779E&#x002B;03</td>
<td>3.5151E&#x002B;03</td>
<td>3.4884E&#x002B;03</td>
<td>4.4324E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td><bold>3.4284E&#x002B;03</bold></td>
<td>3.6871E&#x002B;03(&#x002B;)</td>
<td>4.3419E&#x002B;03(&#x002B;)</td>
<td>3.6198E&#x002B;03(&#x002B;)</td>
<td>3.7382E&#x002B;03(&#x002B;)</td>
<td>5.3601E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td><bold>7.2409E&#x002B;01</bold></td>
<td>1.2123E&#x002B;02</td>
<td>3.7072E&#x002B;02</td>
<td>7.6674E&#x002B;01</td>
<td>2.8369E&#x002B;02</td>
<td>4.4803E&#x002B;02</td>
</tr>
<tr>
<td rowspan="3">29</td>
<td>B</td>
<td>4.3786E&#x002B;03</td>
<td>4.7295E&#x002B;03</td>
<td><bold>4.1235E&#x002B;03</bold></td>
<td>5.2547E&#x002B;03</td>
<td>5.4779E&#x002B;03</td>
<td>7.3431E&#x002B;03</td>
</tr>
<tr>
<td>M</td>
<td>5.0864E&#x002B;03</td>
<td>5.7147E&#x002B;03(&#x002B;)</td>
<td><bold>4.7494E&#x002B;03(&#x2212;)</bold></td>
<td>5.5645E&#x002B;03(&#x002B;)</td>
<td>5.8782E&#x002B;03(&#x002B;)</td>
<td>9.7188E&#x002B;03(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>3.6006E&#x002B;02</td>
<td>3.8176E&#x002B;02</td>
<td>4.2337E&#x002B;02</td>
<td><bold>1.8651E&#x002B;02</bold></td>
<td>2.8457E&#x002B;02</td>
<td>1.3486E&#x002B;03</td>
</tr>
<tr>
<td rowspan="3">30</td>
<td>B</td>
<td>3.3778E&#x002B;07</td>
<td>1.3029E&#x002B;08</td>
<td>7.3797E&#x002B;07</td>
<td><bold>1.3814E&#x002B;07</bold></td>
<td>1.8020E&#x002B;08</td>
<td>8.9515E&#x002B;07</td>
</tr>
<tr>
<td>M</td>
<td>5.5505E&#x002B;07</td>
<td>2.0148E&#x002B;08(&#x002B;)</td>
<td>1.2543E&#x002B;08(&#x002B;)</td>
<td><bold>3.2826E&#x002B;07(&#x2212;)</bold></td>
<td>2.6695E&#x002B;08(&#x002B;)</td>
<td>2.4467E&#x002B;08(&#x002B;)</td>
</tr>
<tr>
<td>Z</td>
<td>1.9314E&#x002B;07</td>
<td>4.2259E&#x002B;07</td>
<td>3.4605E&#x002B;07</td>
<td><bold>1.2061E&#x002B;07</bold></td>
<td>5.6297E&#x002B;07</td>
<td>8.3918E&#x002B;07</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The data presented in <xref ref-type="table" rid="table-6">Table 6</xref> are derived from the results of the testing of the selected algorithms on unimodal and multimodal functions with 50 dimensions. A comparative analysis with the CSO reveals that as the dimensionality increases to 50, the advantage of the update formulas autonomously generated by GP-EAs becomes more pronounced. Although GP-CSO demonstrated inferior performance relative to CSO on the F6 and F9 functions at 30 dimensions, as the dimensionality increased, its mean performance leveled off with CSO, while exhibiting a lower standard deviation, indicating superior stability for GP-CSO. A comparison of GP-CSO with other competing algorithms revealed that it demonstrated enhanced performance in addressing simpler problems of higher dimensionality, essentially surpassing all rival approaches. This underscores the conclusion that utilizing the population velocity centroid as the dominant force for updates aligns more closely with the update logic of CSO than relying on the velocity of individual particles themselves. <xref ref-type="table" rid="table-7">Table 7</xref> summarizes the final data for all algorithms that address the 50D hybrid function. Similarly to the 30D condition, GP-CSO outperforms the majority of competing algorithms, with only a slight difference from DE on F19. Notably, GP-CSO is able to solve better solutions within a fixed limit on the number of iterations, which is demonstrated by the data results in the table, where GP-CSO&#x2019;s optimal results after 20 independent runs are the best of all the algorithms on the vast majority of problem functions. <xref ref-type="table" rid="table-8">Table 8</xref> presents the final data for various algorithms processing composite functions under 50D conditions. GP-CSO is only underperformed by CSO on F27, indicating its stronger ability to escape from local optima. When compared with PSO, DE, and WOA, GP-CSO achieves superior results in the majority of cases. Although it outperforms GWO on only half of the composite functions, GP-CSO demonstrates higher stability.</p>

<p><xref ref-type="fig" rid="fig-5">Fig. 5</xref> illustrates a portion of the convergence graphs for the 50D benchmark functions. GP-CSO demonstrates a high level of convergence speed in the initial stages. The results displayed in the chart indicate that GP-CSO exhibits significant advantages compared to other competing algorithms. In complex high-dimensional problems, GP-CSO retains robust exploration capabilities throughout the entire iteration process. This is closely related to the utilization of <inline-formula id="ieqn-137"><mml:math id="mml-ieqn-137"><mml:mi>&#x03C9;</mml:mi></mml:math></inline-formula> to control the degree of learning from the optimal individual. In hybrid and composite functions, where the function space has many similar numerical troughs, the use of <inline-formula id="ieqn-138"><mml:math id="mml-ieqn-138"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> to dominate the velocity update is prone to excessive speed, leading to insufficient exploitation of the landscape around the individual. Using a velocity update formula that is jointly dominated by <inline-formula id="ieqn-139"><mml:math id="mml-ieqn-139"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-140"><mml:math id="mml-ieqn-140"><mml:mi>&#x03C9;</mml:mi></mml:math></inline-formula> is more able to balance the exploitation of the local area as well as the exploratory nature of the global area. Therefore, the performance advantage of GP-CSO in dealing with complex problems becomes more obvious as the dimensionality rises.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Convergence plot of each competing algorithm on 50-dimensions</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-5.tif"/>
</fig>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Mathematical and Statistical Analyses</title>
<p>This chapter conducts a statistical analysis on the data results introduced in the previous chapter, aiming to visually compare the performance of GP-CSO with competitive algorithms. The analysis results are presented in <xref ref-type="table" rid="table-9">Table 9</xref>. The first statistical test employed is the Friedman test, which calculates the average ranking of each algorithm across all functions. The parameter <italic>p</italic>, in this context, signifies that a smaller <italic>p</italic>-value indicates a higher reliability of the statistical results. Following computation, the <italic>p</italic>-values under two distinct dimensionality conditions were found to be 3.3821E&#x2212;16 and 3.3938E&#x2212;14, respectively. Both values are sufficiently small, approaching zero, thereby rendering the statistical results credible. GP-CSO achieved an average ranking of 1.6 and ranked first under both dimensionality conditions, indicating that GP-CSO possesses superior comprehensive capabilities when dealing with unknown problems.</p>
<table-wrap id="table-9">
<label>Table 9</label>
<caption>
<title>Mathematical and statistical results for each competing algorithm</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th colspan="2">Algorithm</th>
<th rowspan="2">GP-CSO</th>
<th rowspan="2">CSO</th>
<th rowspan="2">GWO</th>
<th rowspan="2">DE</th>
<th rowspan="2">PSO</th>
<th rowspan="2">WOA</th>
</tr>
<tr>
<th>D</th>
<th>Test-Name</th>
</tr>
</thead>
<tbody>
<tr>
<td rowspan="3">30</td>
<td rowspan="2">Friedman (avg-rank)</td>
<td><bold>1.6000</bold></td>
<td>3.7667</td>
<td>2.9000</td>
<td>2.8000</td>
<td>4.3667</td>
<td>5.667</td>
</tr>
<tr>
<td colspan="6"><italic>p</italic>: 3.3821E&#x2212;16</td>
</tr>
<tr>
<td>Wilcoxon (&#x002B;/&#x003D;/&#x2212;)</td>
<td>-/-/-</td>
<td>26/2/2</td>
<td>23/1/6</td>
<td>21/4/5</td>
<td>26/2/2</td>
<td>30/0/0</td>
</tr>
<tr>
<td rowspan="3">50</td>
<td rowspan="2">Friedman (avg-rank)</td>
<td><bold>1.6000</bold></td>
<td>3.7000</td>
<td>2.8667</td>
<td>3.1333</td>
<td>4.3000</td>
<td>5.4000</td>
</tr>
<tr>
<td colspan="6"><italic>p</italic>: 3.3938E&#x2212;14</td>
</tr>
<tr>
<td>Wilcoxon (&#x002B;/&#x003D;/&#x2212;)</td>
<td>-/-/-</td>
<td>26/3/1</td>
<td>19/5/6</td>
<td>24/1/5</td>
<td>27/0/3</td>
<td>30/0/0</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Additionally, this paper conducted a Wilcoxon rank-sum test with a significance level set at 0.05. The symbol &#x2018;&#x002B;&#x2019; indicates that GP-CSO significantly outperforms the competitive algorithm, &#x2018;&#x003D;&#x2019; suggests no significant difference between GP-CSO and the competitive algorithm, and &#x2018;&#x2212;&#x2019; implies that GP-CSO&#x2019;s performance is significantly inferior to that of the competitive algorithm. According to the data from this statistical test method presented in the table, when the dimensionality is 30D, the GP-CSO algorithm improved by GP-EAs demonstrates superior performance compared to the original algorithm. The fact that it won on 26 functions and lost on only 2 functions demonstrates this point. In comparison to other competitive algorithms, GP-CSO also demonstrates superior performance on the majority of functions. In the case of 50D, GP-CSO&#x2019;s performance is only inferior to the original CSO algorithm on one benchmark function. Nevertheless, in comparison to GWO, the advantage of the algorithm is diminished as the dimensionality increases.</p>
<p><xref ref-type="fig" rid="fig-6">Fig. 6</xref> is a radar chart plotted by taking the mean data for each algorithm and ranking them. The representation provides an intuitive understanding of the ranking order of the competing algorithms across different functions. The concentric circles, commencing at the center and extending in an outward direction, represent the ranking levels. The proximity of a given circle to the center indicates a higher ranking. Each vector emanating from the center represents a benchmark function. Observing the phenomena presented in <xref ref-type="fig" rid="fig-6">Fig. 6</xref>, regardless of whether it is for 30D or 50D, the red data points are concentrated heavily towards the central part, implying that GP-CSO has a higher ranking and exhibits superior overall performance. Following GP-CSO are DE and GWO, which are ranked second. In third place is the CSO algorithm. The PSO algorithm ranks fourth, while WOA performs the worst.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Radar charts for algorithmic ranking (<bold>a</bold>) Ranking in the 30D situation; (<bold>b</bold>) Ranking in the 50D situation</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-6.tif"/>
</fig>
<p>The time complexity of the velocity update formula grows from <inline-formula id="ieqn-141"><mml:math id="mml-ieqn-141"><mml:mi>O</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> to <inline-formula id="ieqn-142"><mml:math id="mml-ieqn-142"><mml:mi>O</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>n</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> for GP-CSO compared to CSO. This is because the calculation of <inline-formula id="ieqn-143"><mml:math id="mml-ieqn-143"><mml:msub><mml:mi>V</mml:mi><mml:mrow><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> necessitates the involvement of the entire population. With identical population parameter settings, the average computation times for GP-CSO and CSO in solving 30 benchmark functions with a dimension of 50 were recorded as 7.2853 and 7.3353, respectively. The data results indicate that the difference in runtime is insignificant, yet there is a notable improvement in performance. Therefore, it can be concluded that the increase in computational cost is substantially smaller than the magnitude of performance enhancement.</p>
</sec>
<sec id="s4_5">
<label>4.5</label>
<title>Simulation Experiments of GP-CSO in Digital Watermarking</title>
<p>Two-dimensional code is extensively utilized in commerce and people&#x2019;s daily lives. They possess a unique encoding format that stores information through the arrangement of geometric patterns in black and white colors. QR codes represent a specific type of two-dimensional barcode, featuring an overall square shape composed of alternating black and white squares [<xref ref-type="bibr" rid="ref-48">48</xref>]. These codes are capable of storing substantial amounts of information and responding rapidly, which has led to their widespread adoption in practical domains such as mobile payments, information verification, and commercial promotion.</p>
<p>In this paper, a beautified color QR code image is selected as the carrier image (<inline-formula id="ieqn-144"><mml:math id="mml-ieqn-144"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>) for embedding the watermark, as illustrated in <xref ref-type="fig" rid="fig-7">Fig. 7a</xref>, with dimensions of <inline-formula id="ieqn-145"><mml:math id="mml-ieqn-145"><mml:mn>512</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mn>512</mml:mn></mml:math></inline-formula>. The information stored within the QR code is the title of this paper, which can be extracted by scanning with a QR code scanning device. The original watermark image (<inline-formula id="ieqn-146"><mml:math id="mml-ieqn-146"><mml:msubsup><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup></mml:math></inline-formula>), presented in <xref ref-type="fig" rid="fig-7">Fig. 7b</xref>, is a <inline-formula id="ieqn-147"><mml:math id="mml-ieqn-147"><mml:mn>128</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mn>128</mml:mn></mml:math></inline-formula> black-and-white image. To further enhance the secrecy of the watermark image, Logistic chaotic mapping is utilized to encrypt <inline-formula id="ieqn-148"><mml:math id="mml-ieqn-148"><mml:msubsup><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mo>&#x2217;</mml:mo></mml:mrow></mml:msubsup></mml:math></inline-formula>, thereby reducing the correlation between adjacent pixels. The resulting encrypted watermark image (<inline-formula id="ieqn-149"><mml:math id="mml-ieqn-149"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>) is shown in <xref ref-type="fig" rid="fig-7">Fig. 7c</xref>. Despite the error correction capability of QR codes, improper watermark embedding processes can still result in failure to decode the correct information when reading. Accordingly, this paper utilizes EAs to ascertain suitable embedding factors (<inline-formula id="ieqn-150"><mml:math id="mml-ieqn-150"><mml:mi>Q</mml:mi></mml:math></inline-formula>) for the watermark, with a common <inline-formula id="ieqn-151"><mml:math id="mml-ieqn-151"><mml:mi>Q</mml:mi></mml:math></inline-formula> utilized across the embedding processes in four distinct frequency sub-bands. Due to the size of the singular value matrix being <inline-formula id="ieqn-152"><mml:math id="mml-ieqn-152"><mml:mn>64</mml:mn><mml:mo>&#x00D7;</mml:mo><mml:mn>64</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-153"><mml:math id="mml-ieqn-153"><mml:mi>Q</mml:mi></mml:math></inline-formula> thus has 64 dimensions. To enhance fairness in solving for <inline-formula id="ieqn-154"><mml:math id="mml-ieqn-154"><mml:mi>Q</mml:mi></mml:math></inline-formula> among diverse algorithms, the population size of each algorithm is uniformly set to 20, the number of iterations is uniformly set to 20, the search range for each dimension is constrained to the interval <inline-formula id="ieqn-155"><mml:math id="mml-ieqn-155"><mml:mo stretchy="false">[</mml:mo><mml:mn>0.01</mml:mn><mml:mo>,</mml:mo><mml:mn>20</mml:mn><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>. The hyperparameter settings for GP-CSO, CSO, PSO, GWO, and DE are consistent with those described in <xref ref-type="sec" rid="s4_1">Section 4.1</xref>. The parameter settings for other competing algorithms are shown in <xref ref-type="table" rid="table-10">Table 10</xref>.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>Images involved in the experiment</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-7.tif"/>
</fig><table-wrap id="table-10">
<label>Table 10</label>
<caption>
<title>Algorithm parameter settings in watermarking test experiments</title>
</caption>
<table>
<colgroup>
<col/>
<col align="center"/>
</colgroup>
<thead>
<tr>
<th>Algorithm</th>
<th>Parameter settings</th>
</tr>
</thead>
<tbody>
<tr>
<td>ABC</td>
<td>Honey bees: <inline-formula id="ieqn-156"><mml:math id="mml-ieqn-156"><mml:mn>50</mml:mn><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>, scout bees: <inline-formula id="ieqn-157"><mml:math id="mml-ieqn-157"><mml:mn>50</mml:mn><mml:mi mathvariant="normal">&#x0025;</mml:mi></mml:math></inline-formula>, bee colony renewal limit: 25.</td>
</tr>
<tr>
<td>QUATRE [<xref ref-type="bibr" rid="ref-49">49</xref>]</td>
<td>Scaling factor: 0.7.</td>
</tr>
<tr>
<td>CS</td>
<td>Probability of randomly generated solutions: <inline-formula id="ieqn-158"><mml:math id="mml-ieqn-158"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>a</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0.25</mml:mn><mml:mo>,</mml:mo></mml:math></inline-formula><break/>step scaling factor: <inline-formula id="ieqn-159"><mml:math id="mml-ieqn-159"><mml:mi>&#x03B1;</mml:mi><mml:mo>=</mml:mo><mml:mn>0.1</mml:mn></mml:math></inline-formula>, parameter of L&#x00E9;vy flight: <inline-formula id="ieqn-160"><mml:math id="mml-ieqn-160"><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mo>=</mml:mo><mml:mn>1.5</mml:mn></mml:math></inline-formula>.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The watermark embedding process described in this paper is as follows:
<list list-type="simple">
<list-item><label>(1)</label><p>Apply a three-level DWT to the G channel of <inline-formula id="ieqn-161"><mml:math id="mml-ieqn-161"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, resulting in the extraction of four sub-bands.</p></list-item>
<list-item><label>(2)</label><p>Further feature extraction is conducted by applying DCT on these four sub-bands.</p></list-item>
<list-item><label>(3)</label><p>Perform DWT and DCT operations on <inline-formula id="ieqn-162"><mml:math id="mml-ieqn-162"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> processed by the encryption operation.</p></list-item>
<list-item><label>(4)</label><p>SVD is employed to decompose each sub-band of both <inline-formula id="ieqn-163"><mml:math id="mml-ieqn-163"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-164"><mml:math id="mml-ieqn-164"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, yielding their corresponding singular value matrices.</p></list-item>
<list-item><label>(5)</label><p>The singular value matrices of the corresponding frequency sub-bands from <inline-formula id="ieqn-165"><mml:math id="mml-ieqn-165"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-166"><mml:math id="mml-ieqn-166"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> are combined using <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref>, thereby embedding the watermark information into the respective sub-bands of <inline-formula id="ieqn-167"><mml:math id="mml-ieqn-167"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</p></list-item>
<list-item><label>(6)</label><p>By sequentially performing inverse SVD, inverse DCT, and three levels of inverse DWT, the watermarked image <inline-formula id="ieqn-168"><mml:math id="mml-ieqn-168"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is obtained.</p></list-item>
</list></p>
<p>The extraction process of the watermark is as follows: after performing the inverse operation of step 6 on <inline-formula id="ieqn-169"><mml:math id="mml-ieqn-169"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, the singular value matrix of each sub-band of the watermark is extracted by <inline-formula id="ieqn-170"><mml:math id="mml-ieqn-170"><mml:msubsup><mml:mi>S</mml:mi><mml:mrow><mml:mi>w</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mi>Q</mml:mi></mml:mfrac></mml:math></inline-formula>. The watermark information is obtained after the inverse operation of each operation, and finally, the extracted watermark image is obtained by using chaotic sequence decryption. The objective function used in solving the appropriate embedding factor <inline-formula id="ieqn-171"><mml:math id="mml-ieqn-171"><mml:mi>Q</mml:mi></mml:math></inline-formula> using EAs is shown in <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref>.</p>
<p><disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:mi>f</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>Q</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mi>P</mml:mi><mml:mi>S</mml:mi><mml:mi>N</mml:mi><mml:mi>R</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x00D7;</mml:mo><mml:mfrac><mml:mrow><mml:msubsup><mml:mo movablelimits="false">&#x2211;</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>n</mml:mi></mml:mrow></mml:msubsup><mml:mo stretchy="false">(</mml:mo><mml:mi>N</mml:mi><mml:mi>C</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msubsup><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msubsup><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mi>n</mml:mi></mml:mfrac></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p>In this context, the variable &#x201C;<inline-formula id="ieqn-172"><mml:math id="mml-ieqn-172"><mml:msubsup><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula>&#x201D; represents the watermark that has been extracted from the image in which it has been embedded. PSNR can be employed to evaluate the discrepancy between images prior to and following watermark embedding. The unit of PSNR is decibel (dB), with a higher PSNR value indicating reduced image distortion. Evaluating the PSNR between <inline-formula id="ieqn-173"><mml:math id="mml-ieqn-173"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-174"><mml:math id="mml-ieqn-174"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> serves as an indicator of the invisibility of the embedded watermark, with higher values indicating a higher level of invisibility. The NC is an index that measures the similarity between two images, with a value range of <inline-formula id="ieqn-175"><mml:math id="mml-ieqn-175"><mml:mo stretchy="false">[</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo stretchy="false">]</mml:mo></mml:math></inline-formula>. The closer the NC value between <inline-formula id="ieqn-176"><mml:math id="mml-ieqn-176"><mml:msub><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and <inline-formula id="ieqn-177"><mml:math id="mml-ieqn-177"><mml:msubsup><mml:mi>W</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x2032;</mml:mi></mml:mrow></mml:msubsup></mml:math></inline-formula> is to 1, the higher the similarity between them. In this experiment, six of the nine common image attacks (<italic>n</italic> &#x003D; 6) were randomly selected for analysis. The nine attacks are: histogram equalization attack, image rotation attack, Gaussian noise, multiplicative noise, contrast reduction, contrast increase, image brightening, image darkening, and image cropping. Following the attacks, the watermarks were extracted individually, and the NC values between the watermarked images after the attacks were calculated. These NC values were then normalized and averaged. A smaller <inline-formula id="ieqn-178"><mml:math id="mml-ieqn-178"><mml:mi>f</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>Q</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> value indicates a higher fitness level of <inline-formula id="ieqn-179"><mml:math id="mml-ieqn-179"><mml:mi>Q</mml:mi></mml:math></inline-formula>.</p>
<p>This paper utilizes GP-CSO, alongside several competitive algorithms, to search for embedding factors for watermark images. The objective is to assess the viability of utilizing EAs enhanced by the GP-EAs framework in practical applications. The embedding and extraction methods outlined above are employed, with <xref ref-type="disp-formula" rid="eqn-8">Eq. (8)</xref> serving as the objective function. During the execution of each algorithm, a population comprising 20 individuals is utilized. <xref ref-type="fig" rid="fig-8">Fig. 8</xref> exhibits the results of watermark embedding using the values of <inline-formula id="ieqn-180"><mml:math id="mml-ieqn-180"><mml:mi>Q</mml:mi></mml:math></inline-formula> obtained through various algorithms. <xref ref-type="fig" rid="fig-9">Fig. 9</xref> shows the extraction of the watermarks in the absence of any attacks, with each corresponding to a respective sub-figure in <xref ref-type="fig" rid="fig-8">Fig. 8</xref>. It is evident that the watermarks embedded using DWT-DCT-SVD do not impair the normal usage of the original images, and that valid watermarks can be successfully extracted from all of <inline-formula id="ieqn-181"><mml:math id="mml-ieqn-181"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. Scanning each of the result images in <xref ref-type="fig" rid="fig-8">Fig. 8</xref> to retrieve the information stored in the QR codes yields correct information consistently.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Resulting graph of watermark embedding using different algorithms</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-8.tif"/>
</fig><fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Watermark extracted from <inline-formula id="ieqn-186"><mml:math id="mml-ieqn-186"><mml:msub><mml:mi mathvariant="bold-italic">C</mml:mi><mml:mrow><mml:mi mathvariant="bold-italic">i</mml:mi><mml:mi mathvariant="bold-italic">w</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula></title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_62469-fig-9.tif"/>
</fig>
<p><xref ref-type="table" rid="table-11">Table 11</xref> presents the data results obtained under different algorithm conditions, which were acquired through image-based comparisons between the final embedded result images and the original images. Bolded data represents the best value in the same category. When <inline-formula id="ieqn-182"><mml:math id="mml-ieqn-182"><mml:mi>Q</mml:mi></mml:math></inline-formula> solved using different algorithms is used for watermarking algorithm, the final NC value obtained was 1.0000. This outcome indicates that the extracted watermarked image is highly analogous to the original watermarked image. Moreover, the embedding watermarking process guided by <inline-formula id="ieqn-183"><mml:math id="mml-ieqn-183"><mml:mi>Q</mml:mi></mml:math></inline-formula>, which is solved using GP-CSO, results in the highest PSNR value, indicating the smallest degree of difference from <inline-formula id="ieqn-184"><mml:math id="mml-ieqn-184"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> and thus achieving the lowest distortion rate. A comprehensive analysis demonstrates that the embedded digital watermark utilizing GP-CSO exhibits enhanced imperceptibility and superior stability. Therefore, the practical performance of the CSO algorithm improved by GP-EAs in the field of digital watermarking is relatively good. Moreover, <inline-formula id="ieqn-185"><mml:math id="mml-ieqn-185"><mml:mi>Q</mml:mi></mml:math></inline-formula> has 64 dimensions, which belong to the middle and high dimensions. Therefore, compared with CSOs, the GP-CSOs generated by training with the 10D benchmark function also show a good performance improvement in real-world problems with medium and high dimensions. This validates the performance scalability of GP-CSO for real-world problems.</p>
<table-wrap id="table-11">
<label>Table 11</label>
<caption>
<title>Data results for embedding and extracting digital watermarks</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Algorithm</th>
<th>PSNR</th>
<th>NC</th>
<th>Algorithm</th>
<th>PSNR</th>
<th>NC</th>
</tr>
</thead>
<tbody>
<tr>
<td>GP-CSO</td>
<td><bold>52.8096</bold></td>
<td>1.0000</td>
<td>QUATRE</td>
<td>49.6211</td>
<td>1.0000</td>
</tr>
<tr>
<td>CSO</td>
<td>50.9452</td>
<td>1.0000</td>
<td>PSO</td>
<td>49.5495</td>
<td>1.0000</td>
</tr>
<tr>
<td>DE</td>
<td>48.5104</td>
<td>1.0000</td>
<td>CS</td>
<td>49.6413</td>
<td>1.0000</td>
</tr>
<tr>
<td>ABC</td>
<td>49.5411</td>
<td>1.0000</td>
<td>GWO</td>
<td>51.3020</td>
<td>1.0000</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusions and Outlook</title>
<p>Based on the GP algorithm, this paper proposes a framework for autonomously generating evolutionary update patterns for EAs. GP-EAs autonomously generate evolutionary formulas without much human intervention, which belongs to the category of offline training. Researchers only need to design the terminal set, function set, and evaluation function. The computer program continuously matches the variables and evaluates the performance of the evolutionary formulas. GP-EAs replace the iterative process of researchers continuously designing formulas, testing them, retaining those with superior performance, and discarding those with inferior performance. Reduce the time overhead of designing evolutionary formulas for EAs. Evolutionary formulas generated using GP-EAs exhibit excellent performance scalability, meaning that formulas trained on low-dimensional problems can still maintain efficient performance when applied to solve high-dimensional problems. Utilizing GP-EAs to generate more reasonable velocity update formulas for CSO, the improved algorithm is named GP-CSO. The scalability of GP-CSO performance is then tested using medium-to-high-dimensional problem functions. GP-CSO is employed in the field of digital watermarking to validate the effectiveness of the algorithm improved by GP-EAs in practical applications. Specifically, GP-CSO is used to solve for the embedding factors of the watermark, which are then embedded into different frequency sub-bands of the image in combination with the DWT-DCT-SVD algorithm, further enhancing the robustness of the watermarking process.</p>
<p>However, GP-EAs are still partially flawed. Dependent on the researcher-designed terminal set and function set, it cannot be completely free from human intervention. It cannot continuously generate many different types of evolutionary formulas. The efficiency of generating formulas still has room for improvement. Attention should be paid to the protection of division operation in the initialization and mutation stages to avoid the situation where the divisor is zero. Therefore, the main directions for future research are as follows: firstly, a library of operation symbols for EAs can be constructed. In the subsequent use of GP-EAs, it is not necessary to design terminal sets and function sets for specific EAs, and it is possible to selectively and directly extract them from the operation symbol library. Secondly, the concept of multi-tree GP can be introduced, so that GP-EAs can generate different stages of evolutionary formulas for EAs at the same time. Reverse learning theory is introduced to accelerate the training process. Furthermore, the objective function within the algorithm for digital watermarking will be optimized, enabling EAs to determine more reasonable embedding factors.</p>
</sec>
</body>
<back>
<ack>
<p>The authors would like to thank the anonymous reviewers and the editor for their valuable suggestions, which greatly contributed to the improved quality of this article.</p>
</ack>
<sec>
<title>Funding Statement</title>
<p>The authors received no specific funding for this study.</p>
</sec>
<sec>
<title>Author Contributions</title>
<p>The authors confirm contribution to the paper as follows: study conception and design: Shu-Chuan Chu, Libin Fu, Jeng-Shyang Pan, Xingsi Xue, Min Liu; data collection: Libin Fu, Jeng-Shyang Pan; analysis and interpretation of results: Shu-Chuan Chu, Libin Fu, Xingsi Xue; draft manuscript preparation: Shu-Chuan Chu, Libin Fu, Jeng-Shyang Pan, Min Liu. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability">
<title>Availability of Data and Materials</title>
<p>Not applicable.</p>
</sec>
<sec>
<title>Ethics Approval</title>
<p>Not applicable.</p>
</sec>
<sec sec-type="COI-statement">
<title>Conflicts of Interest</title>
<p>The authors declare no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>C</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>Study on artificial intelligence: the state of the art and future prospects</article-title>. <source>J Ind Inf Integr</source>. <year>2021</year>;<volume>23</volume>(<issue>1</issue>):<fpage>100224</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jii.2021.100224</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Chaka</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Fourth industrial revolution&#x2014;a review of applications, prospects, and challenges for artificial intelligence, robotics and blockchain in higher education</article-title>. <source>Res Pract Technol Enhanc Learn</source>. <year>2022</year>;<volume>18</volume>:<fpage>2</fpage>. doi:<pub-id pub-id-type="doi">10.58459/rptel.2023.18002</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Deng</surname> <given-names>W</given-names></string-name>, <string-name><surname>Shang</surname> <given-names>S</given-names></string-name>, <string-name><surname>Cai</surname> <given-names>X</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>H</given-names></string-name>, <string-name><surname>Song</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>J</given-names></string-name></person-group>. <article-title>An improved differential evolution algorithm and its application in optimization problem</article-title>. <source>Soft Comput</source>. <year>2021</year>;<volume>25</volume>(<issue>7</issue>):<fpage>5277</fpage>&#x2013;<lpage>98</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s00500-020-05527-x</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>D</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Lu</surname> <given-names>M</given-names></string-name>, <string-name><surname>Li</surname> <given-names>R</given-names></string-name></person-group>. <article-title>EGNN: graph structure learning based on evolutionary computation helps more in graph neural networks</article-title>. <source>Appl Soft Comput</source>. <year>2023</year>;<volume>135</volume>(<issue>1</issue>):<fpage>110040</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.asoc.2023.110040</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abualigah</surname> <given-names>L</given-names></string-name>, <string-name><surname>Habash</surname> <given-names>M</given-names></string-name>, <string-name><surname>Hanandeh</surname> <given-names>ES</given-names></string-name>, <string-name><surname>Hussein</surname> <given-names>AM</given-names></string-name>, <string-name><surname>Shinwan</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Zitar</surname> <given-names>RA</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Improved reptile search algorithm by salp swarm algorithm for medical image segmentation</article-title>. <source>J Bionic Eng</source>. <year>2023</year>;<volume>20</volume>(<issue>4</issue>):<fpage>1766</fpage>&#x2013;<lpage>90</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s42235-023-00332-2</pub-id>; <pub-id pub-id-type="pmid">36777369</pub-id></mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ren</surname> <given-names>L</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>D</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>X</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>W</given-names></string-name>, <string-name><surname>Li</surname> <given-names>L</given-names></string-name>, <string-name><surname>Wu</surname> <given-names>T</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Multi-level thresholding segmentation for pathological images: optimal performance design of a new modified differential evolution</article-title>. <source>Comput Biol Med</source>. <year>2022</year>;<volume>148</volume>(<issue>11</issue>):<fpage>105910</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.compbiomed.2022.105910</pub-id>; <pub-id pub-id-type="pmid">35961088</pub-id></mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Jiang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>XX</given-names></string-name>, <string-name><surname>Zheng</surname> <given-names>MY</given-names></string-name>, <string-name><surname>Zhan</surname> <given-names>ZH</given-names></string-name></person-group>. <article-title>Evolutionary computation for unmanned aerial vehicle path planning: a survey</article-title>. <source>Artif Intell Rev</source>. <year>2024</year>;<volume>57</volume>(<issue>10</issue>):<fpage>267</fpage>. doi:<pub-id pub-id-type="doi">10.1007/s10462-024-10913-0</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>M</given-names></string-name>, <string-name><surname>Han</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>S</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>M</given-names></string-name>, <string-name><surname>He</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>N</given-names></string-name></person-group>. <article-title>A Multi-strategy improved differential evolution algorithm for UAV 3D trajectory planning in complex mountainous environments</article-title>. <source>Eng Appl Artif Intell</source>. <year>2023</year>;<volume>125</volume>(<issue>6568</issue>):<fpage>106672</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.engappai.2023.106672</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rezaei</surname> <given-names>B</given-names></string-name>, <string-name><surname>Ghanbari</surname> <given-names>H</given-names></string-name>, <string-name><surname>Enayatifar</surname> <given-names>R</given-names></string-name></person-group>. <article-title>An image encryption approach using tuned Henon chaotic map and evolutionary algorithm</article-title>. <source>Nonlinear Dyn</source>. <year>2023</year>;<volume>111</volume>(<issue>10</issue>):<fpage>9629</fpage>&#x2013;<lpage>47</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11071-023-08331-y</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pan</surname> <given-names>JS</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>XX</given-names></string-name>, <string-name><surname>Chu</surname> <given-names>SC</given-names></string-name>, <string-name><surname>Abraham</surname> <given-names>A</given-names></string-name>, <string-name><surname>Yan</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Digital watermarking with improved SMS applied for QR code</article-title>. <source>Eng Appl Artif Intell</source>. <year>2021</year>;<volume>97</volume>(<issue>5</issue>):<fpage>104049</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.engappai.2020.104049</pub-id>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ji</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>S</given-names></string-name>, <string-name><surname>Zhou</surname> <given-names>M</given-names></string-name>, <string-name><surname>Zhao</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Guo</surname> <given-names>X</given-names></string-name>, <string-name><surname>Qi</surname> <given-names>L</given-names></string-name></person-group>. <article-title>A machine learning and genetic algorithm-based method for predicting width deviation of hot-rolled strip in steel production systems</article-title>. <source>Inf Sci</source>. <year>2022</year>;<volume>589</volume>(<issue>2</issue>):<fpage>360</fpage>&#x2013;<lpage>75</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.ins.2021.12.063</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Darvishpoor</surname> <given-names>S</given-names></string-name>, <string-name><surname>Darvishpour</surname> <given-names>A</given-names></string-name>, <string-name><surname>Escarcega</surname> <given-names>M</given-names></string-name>, <string-name><surname>Hassanalian</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Nature-inspired algorithms from oceans to space: a comprehensive review of heuristic and meta-heuristic optimization algorithms and their potential applications in drones</article-title>. <source>Drones</source>. <year>2023</year>;<volume>7</volume>(<issue>7</issue>):<fpage>427</fpage>. doi:<pub-id pub-id-type="doi">10.3390/drones7070427</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Katoch</surname> <given-names>S</given-names></string-name>, <string-name><surname>Chauhan</surname> <given-names>SS</given-names></string-name>, <string-name><surname>Kumar</surname> <given-names>V</given-names></string-name></person-group>. <article-title>A review on genetic algorithm: past, present, and future</article-title>. <source>Multimed Tools Appl</source>. <year>2021</year>;<volume>80</volume>(<issue>5</issue>):<fpage>8091</fpage>&#x2013;<lpage>126</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-020-10139-6</pub-id>; <pub-id pub-id-type="pmid">33162782</pub-id></mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gad</surname> <given-names>AG</given-names></string-name></person-group>. <article-title>Particle swarm optimization algorithm and its applications: a systematic review</article-title>. <source>Arch Comput Meth Eng</source>. <year>2022</year>;<volume>29</volume>(<issue>5</issue>):<fpage>2531</fpage>&#x2013;<lpage>61</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11831-021-09694-4</pub-id>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Makhadmeh</surname> <given-names>SN</given-names></string-name>, <string-name><surname>Al-Betar</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Doush</surname> <given-names>IA</given-names></string-name>, <string-name><surname>Awadallah</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Kassaymeh</surname> <given-names>S</given-names></string-name>, <string-name><surname>Mirjalili</surname> <given-names>S</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Recent advances in grey wolf optimizer, its versions and applications</article-title>. <source>IEEE Access</source>. <year>2023</year>;<volume>12</volume>(<issue>3</issue>):<fpage>22991</fpage>&#x2013;<lpage>3028</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2023.3304889</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Chu</surname> <given-names>SC</given-names></string-name>, <string-name><surname>Tsai</surname> <given-names>PW</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>JS</given-names></string-name></person-group>. <article-title>Cat swarm optimization</article-title>. In: <conf-name>PRICAI 2006: Trends in Artificial Intelligence: 9th Pacific Rim International Conference on Artificial Intelligence</conf-name>; <year>2006 Aug 7&#x2013;11</year>; <publisher-loc>Guilin, China. Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>. p. <fpage>854</fpage>&#x2013;<lpage>8</lpage>. doi:<pub-id pub-id-type="doi">10.1007/978-3-540-36668-3_94</pub-id>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Morin</surname> <given-names>M</given-names></string-name>, <string-name><surname>Abi-Zeid</surname> <given-names>I</given-names></string-name>, <string-name><surname>Quimper</surname> <given-names>CG</given-names></string-name></person-group>. <article-title>Ant colony optimization for path planning in search and rescue operations</article-title>. <source>Eur J Oper Res</source>. <year>2023</year>;<volume>305</volume>(<issue>1</issue>):<fpage>53</fpage>&#x2013;<lpage>63</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.ejor.2022.06.019</pub-id>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dehghani</surname> <given-names>M</given-names></string-name>, <string-name><surname>Hub&#x00E1;lovsk&#x00FD;</surname> <given-names>&#x0160;</given-names></string-name>, <string-name><surname>Trojovsk&#x00FD;</surname> <given-names>P</given-names></string-name></person-group>. <article-title>Northern goshawk optimization: a new swarm-based algorithm for solving optimization problems</article-title>. <source>IEEE Access</source>. <year>2021</year>;<volume>9</volume>:<fpage>162059</fpage>&#x2013;<lpage>80</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ACCESS.2021.3133286</pub-id>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mirjalili</surname> <given-names>S</given-names></string-name>, <string-name><surname>Lewis</surname> <given-names>A</given-names></string-name></person-group>. <article-title>The whale optimization algorithm</article-title>. <source>Adv Eng Softw</source>. <year>2016</year>;<volume>95</volume>(<issue>12</issue>):<fpage>51</fpage>&#x2013;<lpage>67</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.advengsoft.2016.01.008</pub-id>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zou</surname> <given-names>F</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>D</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>Q</given-names></string-name></person-group>. <article-title>A survey of teaching-learning-based optimization</article-title>. <source>Neurocomputing</source>. <year>2019</year>;<volume>335</volume>(<issue>7-9</issue>):<fpage>366</fpage>&#x2013;<lpage>83</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.neucom.2018.06.076</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Gao</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Qin</surname> <given-names>L</given-names></string-name></person-group>. <article-title>Love evolution algorithm: a stimulus-value&#x2013;role theory-inspired evolutionary algorithm for global optimization</article-title>. <source>J Supercomput</source>. <year>2024</year>;<volume>80</volume>(<issue>9</issue>):<fpage>12346</fpage>&#x2013;<lpage>407</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11227-024-05905-4</pub-id>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Xie</surname> <given-names>J</given-names></string-name>, <string-name><surname>Li</surname> <given-names>X</given-names></string-name>, <string-name><surname>Gao</surname> <given-names>L</given-names></string-name>, <string-name><surname>Gui</surname> <given-names>L</given-names></string-name></person-group>. <article-title>A hybrid genetic tabu search algorithm for distributed flexible job shop scheduling problems</article-title>. <source>J Manuf Syst</source>. <year>2023</year>;<volume>71</volume>(<issue>5</issue>):<fpage>82</fpage>&#x2013;<lpage>94</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.jmsy.2023.09.002</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mei</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>Q</given-names></string-name>, <string-name><surname>Lensen</surname> <given-names>A</given-names></string-name>, <string-name><surname>Xue</surname> <given-names>B</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Explainable artificial intelligence by genetic programming: a survey</article-title>. <source>IEEE Trans Evol Comput</source>. <year>2023</year>;<volume>27</volume>(<issue>3</issue>):<fpage>621</fpage>&#x2013;<lpage>41</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TEVC.2022.3225509</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Huang</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Mei</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zhong</surname> <given-names>J</given-names></string-name></person-group>. <article-title>Semantic linear genetic programming for symbolic regression</article-title>. <source>IEEE Trans Cybern</source>. <year>2024</year>;<volume>54</volume>(<issue>2</issue>):<fpage>1321</fpage>&#x2013;<lpage>34</lpage>. doi:<pub-id pub-id-type="doi">10.1109/TCYB.2022.3181461</pub-id>; <pub-id pub-id-type="pmid">35767504</pub-id></mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Joyce</surname> <given-names>T</given-names></string-name>, <string-name><surname>Herrmann</surname> <given-names>JM</given-names></string-name></person-group>. <chapter-title>A review of no free lunch theorems, and their implications for metaheuristic optimization</chapter-title>. In: <source>Nature-inspired algorithms and applied optimization</source>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>2018</year>. p. <fpage>27</fpage>&#x2013;<lpage>51</lpage>. doi:<pub-id pub-id-type="doi">10.1007/978-3-319-67669-2_2</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Sharafi</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Khanesar</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Teshnehlab</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Discrete binary cat swarm optimization algorithm</article-title>. In: <conf-name>2013 3rd IEEE International Conference on Computer, Control and Communication (IC4)</conf-name>; <year>2013 Sep 25&#x2013;26</year>; <publisher-loc>Karachi, Pakistan</publisher-loc>. p. <fpage>1</fpage>&#x2013;<lpage>6</lpage>. doi:<pub-id pub-id-type="doi">10.1109/IC4.2013.6653754</pub-id>.</mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Pradhan</surname> <given-names>PM</given-names></string-name>, <string-name><surname>Panda</surname> <given-names>G</given-names></string-name></person-group>. <article-title>Solving multiobjective problems using cat swarm optimization</article-title>. <source>Expert Syst Appl</source>. <year>2012</year>;<volume>39</volume>(<issue>3</issue>):<fpage>2956</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.eswa.2011.08.157</pub-id>.</mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Zhao</surname> <given-names>M</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>JS</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>ST</given-names></string-name></person-group>. <chapter-title>Compact cat swarm optimization algorithm</chapter-title>. In: <source>Security with intelligent computing and big-data services</source>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>2018</year>. p. <fpage>33</fpage>&#x2013;<lpage>43</lpage>. doi:<pub-id pub-id-type="doi">10.1007/978-3-319-76451-1_4</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Tsai</surname> <given-names>PW</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>JS</given-names></string-name>, <string-name><surname>Chen</surname> <given-names>SM</given-names></string-name>, <string-name><surname>Liao</surname> <given-names>BY</given-names></string-name>, <string-name><surname>Hao</surname> <given-names>SP</given-names></string-name></person-group>. <article-title>Parallel cat swarm optimization</article-title>. In: <conf-name>2008 International Conference on Machine Learning and Cybernetics</conf-name>; <year>2008 Jul 12&#x2013;15</year>; <publisher-loc>Kunming, China</publisher-loc>. p. <fpage>3328</fpage>&#x2013;<lpage>33</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ICMLC.2008.4620980</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Tsai</surname> <given-names>PW</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>JS</given-names></string-name>, <string-name><surname>Shi</surname> <given-names>P</given-names></string-name>, <string-name><surname>Liao</surname> <given-names>BY</given-names></string-name></person-group>. <chapter-title>A new framework for optimization based-on hybrid swarm intelligence</chapter-title>. In: <source>Handbook of swarm intelligence: concepts, principles and applications</source>. <publisher-loc>Berlin/Heidelberg, Germany</publisher-loc>: <publisher-name>Springer</publisher-name>; <year>2011</year>. p. <fpage>421</fpage>&#x2013;<lpage>49</lpage>. doi:<pub-id pub-id-type="doi">10.1007/978-3-642-17390-5_18</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Pratiwi</surname> <given-names>AB</given-names></string-name></person-group>. <article-title>A hybrid cat swarm optimization-crow search algorithm for vehicle routing problem with time windows</article-title>. In: <conf-name>2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE)</conf-name>; <year>2017 Nov 1&#x2013;2</year>; <publisher-loc>Yogyakarta, Indonesia</publisher-loc>. p. <fpage>364</fpage>&#x2013;<lpage>8</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ICITISEE.2017.8285529</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kadian</surname> <given-names>P</given-names></string-name>, <string-name><surname>Arora</surname> <given-names>SM</given-names></string-name>, <string-name><surname>Arora</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Robust digital watermarking techniques for copyright protection of digital data: a survey</article-title>. <source>Wirel Pers Commun</source>. <year>2021</year>;<volume>118</volume>(<issue>4</issue>):<fpage>3225</fpage>&#x2013;<lpage>49</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11277-021-08177-w</pub-id>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wan</surname> <given-names>W</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>J</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Li</surname> <given-names>J</given-names></string-name>, <string-name><surname>Yu</surname> <given-names>H</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>J</given-names></string-name></person-group>. <article-title>A comprehensive survey on robust image watermarking</article-title>. <source>Neurocomputing</source>. <year>2022</year>;<volume>488</volume>:<fpage>226</fpage>&#x2013;<lpage>47</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.neucom.2022.02.083</pub-id>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Muslim</surname> <given-names>MA</given-names></string-name>, <string-name><surname>Dasril</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Khusniati</surname> <given-names>M</given-names></string-name>, <string-name><surname>Subhan</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Analysis of image watermarking with a discrete wavelet transform for digital data security</article-title>. <source>J Phys: Conf Ser</source>. <year>2021</year>;<volume>1918</volume>(<issue>4</issue>):<fpage>042014</fpage>. doi:<pub-id pub-id-type="doi">10.1088/1742-6596/1918/4/042014</pub-id>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Singh</surname> <given-names>RK</given-names></string-name>, <string-name><surname>Dube</surname> <given-names>AP</given-names></string-name>, <string-name><surname>Singh</surname> <given-names>R</given-names></string-name></person-group>. <article-title>Least significant bit-based image watermarking mechanism</article-title>. <source>Int J Soc Ecol Sustain Dev</source>. <year>2022</year>;<volume>13</volume>(<issue>1</issue>):<fpage>1</fpage>&#x2013;<lpage>9</lpage>. doi:<pub-id pub-id-type="doi">10.4018/IJSESD</pub-id>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Alomoush</surname> <given-names>W</given-names></string-name>, <string-name><surname>Khashan</surname> <given-names>OA</given-names></string-name>, <string-name><surname>Alrosan</surname> <given-names>A</given-names></string-name>, <string-name><surname>Attar</surname> <given-names>HH</given-names></string-name>, <string-name><surname>Almomani</surname> <given-names>A</given-names></string-name>, <string-name><surname>Alhosban</surname> <given-names>F</given-names></string-name>, <etal>et al</etal></person-group>. <article-title>Digital image watermarking using discrete cosine transformation based linear modulation</article-title>. <source>J Cloud Comput</source>. <year>2023</year>;<volume>12</volume>(<issue>1</issue>):<fpage>96</fpage>. doi:<pub-id pub-id-type="doi">10.1186/s13677-023-00468-w</pub-id>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ma</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Sun</surname> <given-names>W</given-names></string-name>, <string-name><surname>Zhang</surname> <given-names>P</given-names></string-name>, <string-name><surname>Wang</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Frequency domain digital watermarking algorithm based on arnold transform and quaternion fourier transform</article-title>. <source>Autom Mach Learn</source>. <year>2022</year>;<volume>3</volume>(<issue>1</issue>):<fpage>58</fpage>&#x2013;<lpage>64</lpage>. doi:<pub-id pub-id-type="doi">10.23977/autml.2022.030109</pub-id>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Dey</surname> <given-names>N</given-names></string-name>, <string-name><surname>Samanta</surname> <given-names>S</given-names></string-name>, <string-name><surname>Yang</surname> <given-names>XS</given-names></string-name>, <string-name><surname>Das</surname> <given-names>A</given-names></string-name>, <string-name><surname>Chaudhuri</surname> <given-names>SS</given-names></string-name></person-group>. <article-title>Optimisation of scaling factors in electrocardiogram signal watermarking using cuckoo search</article-title>. <source>Int J Bio Inspired Comput</source>. <year>2013</year>;<volume>5</volume>(<issue>5</issue>):<fpage>315</fpage>. doi:<pub-id pub-id-type="doi">10.1504/IJBIC.2013.057193</pub-id>.</mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Cui</surname> <given-names>X</given-names></string-name>, <string-name><surname>Niu</surname> <given-names>Y</given-names></string-name>, <string-name><surname>Zheng</surname> <given-names>X</given-names></string-name>, <string-name><surname>Han</surname> <given-names>Y</given-names></string-name></person-group>. <article-title>An optimized digital watermarking algorithm in wavelet domain based on differential evolution for color image</article-title>. <source>PLoS One</source>. <year>2018</year>;<volume>13</volume>(<issue>5</issue>):<fpage>e0196306</fpage>. doi:<pub-id pub-id-type="doi">10.1371/journal.pone.0196306</pub-id>; <pub-id pub-id-type="pmid">29782490</pub-id></mixed-citation></ref>
<ref id="ref-40"><label>[40]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sharma</surname> <given-names>S</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>H</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>JB</given-names></string-name></person-group>. <article-title>An adaptive color image watermarking using RDWT-SVD and artificial bee colony based quality metric strength factor optimization</article-title>. <source>Appl Soft Comput</source>. <year>2019</year>;<volume>84</volume>(<issue>17</issue>):<fpage>105696</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.asoc.2019.105696</pub-id>.</mixed-citation></ref>
<ref id="ref-41"><label>[41]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Zhang</surname> <given-names>L</given-names></string-name>, <string-name><surname>Wei</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Dual DCT-DWT-SVD digital watermarking algorithm based on particle swarm optimization</article-title>. <source>Multimed Tools Appl</source>. <year>2019</year>;<volume>78</volume>(<issue>19</issue>):<fpage>28003</fpage>&#x2013;<lpage>23</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-019-07902-9</pub-id>.</mixed-citation></ref>
<ref id="ref-42"><label>[42]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Devi</surname> <given-names>HS</given-names></string-name>, <string-name><surname>Mohapatra</surname> <given-names>H</given-names></string-name></person-group>. <article-title>A novel robust blind medical image watermarking using GWO optimized DWT-DCT-SVD</article-title>. <source>Multimed Tools Appl</source>. <year>2023</year>;<volume>82</volume>(<issue>26</issue>):<fpage>41267</fpage>&#x2013;<lpage>86</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-023-15158-7</pub-id>.</mixed-citation></ref>
<ref id="ref-43"><label>[43]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Sun</surname> <given-names>XX</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>JS</given-names></string-name>, <string-name><surname>Weng</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hu</surname> <given-names>CC</given-names></string-name>, <string-name><surname>Chu</surname> <given-names>SC</given-names></string-name></person-group>. <article-title>Optimization of MSFs for watermarking using DWT-DCT-SVD and fish migration optimization with QUATRE</article-title>. <source>Multimed Tools Appl</source>. <year>2023</year>;<volume>82</volume>(<issue>2</issue>):<fpage>2255</fpage>&#x2013;<lpage>76</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-022-13173-8</pub-id>.</mixed-citation></ref>
<ref id="ref-44"><label>[44]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hussain</surname> <given-names>A</given-names></string-name>, <string-name><surname>Riaz</surname> <given-names>S</given-names></string-name>, <string-name><surname>Amjad</surname> <given-names>MS</given-names></string-name>, <string-name><surname>Haq</surname> <given-names>EU</given-names></string-name></person-group>. <article-title>Genetic algorithm with a new round-robin based tournament selection: statistical properties analysis</article-title>. <source>PLoS One</source>. <year>2022</year>;<volume>17</volume>(<issue>9</issue>):<fpage>e0274456</fpage>. doi:<pub-id pub-id-type="doi">10.1371/journal.pone.0274456</pub-id>; <pub-id pub-id-type="pmid">36083869</pub-id></mixed-citation></ref>
<ref id="ref-45"><label>[45]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Liu</surname> <given-names>X</given-names></string-name>, <string-name><surname>Xiao</surname> <given-names>D</given-names></string-name>, <string-name><surname>Liu</surname> <given-names>C</given-names></string-name></person-group>. <article-title>Three-level quantum image encryption based on Arnold transform and logistic map</article-title>. <source>Quantum Inf Process</source>. <year>2021</year>;<volume>20</volume>(<issue>1</issue>):<fpage>23</fpage>. doi:<pub-id pub-id-type="doi">10.1007/s11128-020-02952-7</pub-id>.</mixed-citation></ref>
<ref id="ref-46"><label>[46]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><surname>Rohith</surname> <given-names>S</given-names></string-name>, <string-name><surname>Hari Bhat</surname> <given-names>KN</given-names></string-name>, <string-name><surname>Sharma</surname> <given-names>AN</given-names></string-name></person-group>. <article-title>Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register</article-title>. In: <conf-name>2014 International Conference on Advances in Electronics Computers and Communications</conf-name>; <year>2014 Oct 10&#x2013;11</year>; <publisher-loc>Bangalore, India</publisher-loc>. p. <fpage>1</fpage>&#x2013;<lpage>6</lpage>. doi:<pub-id pub-id-type="doi">10.1109/ICAECC.2014.7002404</pub-id>.</mixed-citation></ref>
<ref id="ref-47"><label>[47]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hosseini</surname> <given-names>SA</given-names></string-name>, <string-name><surname>Farahmand</surname> <given-names>P</given-names></string-name></person-group>. <article-title>An attack resistant hybrid blind image watermarking scheme based on combination of DWT, DCT and PCA</article-title>. <source>Multimed Tools Appl</source>. <year>2024</year>;<volume>83</volume>(<issue>7</issue>):<fpage>18829</fpage>&#x2013;<lpage>52</lpage>. doi:<pub-id pub-id-type="doi">10.1007/s11042-023-16202-2</pub-id>.</mixed-citation></ref>
<ref id="ref-48"><label>[48]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Tsai</surname> <given-names>MJ</given-names></string-name>, <string-name><surname>Peng</surname> <given-names>SL</given-names></string-name></person-group>. <article-title>QR code beautification by instance segmentation (IS-QR)</article-title>. <source>Digit Signal Process</source>. <year>2023</year>;<volume>133</volume>(<issue>9</issue>):<fpage>103887</fpage>. doi:<pub-id pub-id-type="doi">10.1016/j.dsp.2022.103887</pub-id>.</mixed-citation></ref>
<ref id="ref-49"><label>[49]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Meng</surname> <given-names>Z</given-names></string-name>, <string-name><surname>Pan</surname> <given-names>JS</given-names></string-name>, <string-name><surname>Xu</surname> <given-names>H</given-names></string-name></person-group>. <article-title>QUasi-affine TRansformation evolutionary (QUATRE) algorithm: a cooperative swarm based algorithm for global optimization</article-title>. <source>Knowl Based Syst</source>. <year>2016</year>;<volume>109</volume>(<issue>2</issue>):<fpage>104</fpage>&#x2013;<lpage>21</lpage>. doi:<pub-id pub-id-type="doi">10.1016/j.knosys.2016.06.029</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>