<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Neuroinform.</journal-id>
<journal-title>Frontiers in Neuroinformatics</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Neuroinform.</abbrev-journal-title>
<issn pub-type="epub">1662-5196</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fninf.2022.1041799</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Neuroinformatics</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Multi-threshold image segmentation for melanoma based on Kapur&#x2019;s entropy using enhanced ant colony optimization</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Yang</surname> <given-names>Xiao</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Ye</surname> <given-names>Xiaojia</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Zhao</surname> <given-names>Dong</given-names></name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<xref ref-type="corresp" rid="c002"><sup>&#x002A;</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Heidari</surname> <given-names>Ali Asghar</given-names></name>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Xu</surname> <given-names>Zhangze</given-names></name>
<xref ref-type="aff" rid="aff5"><sup>5</sup></xref>
</contrib>
<contrib contrib-type="author">
<name><surname>Chen</surname> <given-names>Huiling</given-names></name>
<xref ref-type="aff" rid="aff5"><sup>5</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1418127/overview"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Li</surname> <given-names>Yangyang</given-names></name>
<xref ref-type="aff" rid="aff6"><sup>6</sup></xref>
<xref ref-type="corresp" rid="c003"><sup>&#x002A;</sup></xref>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>School of Computer Science and Technology, Changchun University of Science and Technology</institution>, <addr-line>Changchun</addr-line>, <country>China</country></aff>
<aff id="aff2"><sup>2</sup><institution>School of Statistics and Mathematics, Shanghai Lixin University of Accounting and Finance</institution>, <addr-line>Shanghai</addr-line>, <country>China</country></aff>
<aff id="aff3"><sup>3</sup><institution>College of Computer Science and Technology, Changchun Normal University</institution>, <addr-line>Changchun</addr-line>, <country>China</country></aff>
<aff id="aff4"><sup>4</sup><institution>School of Surveying and Geospatial Engineering, College of Engineering, University of Tehran</institution>, <addr-line>Tehran</addr-line>, <country>Iran</country></aff>
<aff id="aff5"><sup>5</sup><institution>College of Computer Science and Artificial Intelligence, Wenzhou University</institution>, <addr-line>Wenzhou</addr-line>, <country>China</country></aff>
<aff id="aff6"><sup>6</sup><institution>Department of Pathology, The First Affiliated Hospital of Wenzhou Medical University</institution>, <addr-line>Wenzhou</addr-line>, <country>China</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Antonio Fern&#x00E1;ndez-Caballero, University of Castilla-La Mancha, Spain</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Shuqiang Wang, Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences (CAS), China; Zhou Tao, North Minzu University, China</p></fn>
<corresp id="c001">&#x002A;Correspondence: Xiaojia Ye, <email>yxj@lixin.edu.cn</email></corresp>
<corresp id="c002">Dong Zhao, <email>zd-hy@163.com</email></corresp>
<corresp id="c003">Yangyang Li, <email>yangyangli19860819@163.com</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>01</day>
<month>11</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>16</volume>
<elocation-id>1041799</elocation-id>
<history>
<date date-type="received">
<day>11</day>
<month>09</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>10</day>
<month>10</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2022 Yang, Ye, Zhao, Heidari, Xu, Chen and Li.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Yang, Ye, Zhao, Heidari, Xu, Chen and Li</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract>
<p>Melanoma is a malignant tumor formed by the cancerous transformation of melanocytes, and its medical images contain much information. However, the percentage of the critical information in the image is small, and the noise is non-uniformly distributed. We propose a new multi-threshold image segmentation model based on the two-dimensional histogram approach to the above problem. We present an enhanced ant colony optimization for continuous domains (EACOR) in the proposed model based on the soft besiege and chase strategies. Further, EACOR is combined with two-dimensional Kapur&#x2019;s entropy to search for the optimal thresholds. An experiment on the IEEE CEC2014 benchmark function was conducted to measure the reliable global search capability of the EACOR algorithm in the proposed model. Moreover, we have also conducted several sets of experiments to test the validity of the image segmentation model proposed in this paper. The experimental results show that the segmented images from the proposed model outperform the comparison method in several evaluation metrics. Ultimately, the model proposed in this paper can provide high-quality samples for subsequent analysis of melanoma pathology images.</p>
</abstract>
<kwd-group>
<kwd>melanoma</kwd>
<kwd>multi-threshold image segmentation</kwd>
<kwd>Kapur&#x2019;s entropy</kwd>
<kwd>swarm intelligence</kwd>
<kwd>ant colony algorithm</kwd>
</kwd-group>
<counts>
<fig-count count="19"/>
<table-count count="8"/>
<equation-count count="20"/>
<ref-count count="108"/>
<page-count count="27"/>
<word-count count="12794"/>
</counts>
</article-meta>
</front>
<body>
<sec id="S1" sec-type="intro">
<title>Introduction</title>
<p>Melanoma is a malignant tumor arising from the malignant transformation of melanocytes. While melanoma is less common than other skin cancers, it is responsible for nearly 10,000 deaths in the United States each year alone (<xref ref-type="bibr" rid="B5">Albittar et al., 2020</xref>). Due to the similarity of cutaneous melanoma to benign nevi can easily be overlooked and misdiagnosed in the pathological diagnosis. Accurate pathological diagnosis plays an important role in the therapy of melanoma (<xref ref-type="bibr" rid="B4">Ahn et al., 2017</xref>; <xref ref-type="bibr" rid="B7">Bi et al., 2017</xref>; <xref ref-type="bibr" rid="B6">Al-Masni et al., 2018</xref>). To improve the diagnostic accuracy, the concept of computer-assisted pathological diagnosis of initial malignant melanoma has been intensively investigated in recent years. <xref ref-type="bibr" rid="B47">Lee et al. (2018)</xref> proposed a computer-aided diagnostic process that effectively differentiated melanoma images from non-melanoma images through feature extraction, selection, and classification. <xref ref-type="bibr" rid="B80">Song et al. (2020)</xref> designed an end-to-end multitasking deep learning framework for automated analysis of melanoma diagnosis. <xref ref-type="bibr" rid="B15">Chen W. et al. (2020)</xref> used logistic regression and the Newton-Raphson method to effectively discriminate between melanoma and benign nevus. In general, computer-aided diagnosis can be divided into image acquisition (<xref ref-type="bibr" rid="B46">Lafci et al., 2022</xref>), pre-processing (<xref ref-type="bibr" rid="B39">Ilesanmi et al., 2021</xref>), image segmentation (<xref ref-type="bibr" rid="B88">Wang S. et al., 2022</xref>), feature extraction (<xref ref-type="bibr" rid="B99">You et al., 2022</xref>) and classification (<xref ref-type="bibr" rid="B34">Hu et al., 2021</xref>; <xref ref-type="bibr" rid="B102">Yu et al., 2021</xref>). The image segmentation technique is key to further analysis of melanoma pathology images, which can provide quality image samples for subsequent image analysis and ultimately improve the accuracy of melanoma diagnosis (<xref ref-type="bibr" rid="B70">Pennisi et al., 2016</xref>; <xref ref-type="bibr" rid="B43">Kassem et al., 2021</xref>).</p>
<p>In order to be able to provide quality material for subsequent image processing, we employed an image segmentation method with the advanced threshold optimization technique. In this study, an enhanced ant colony algorithm (EACOR) based on the soft besiege strategy and the chase strategy is proposed to obtain a more reasonable threshold segmentation scheme. Furthermore, to obtain a more reasonable solution that retains the maximum amount of information between the target and the background, Kapur&#x2019;s entropy is used as the objective function for EACOR to evaluate the threshold sets. In addition, the non-local mean two-dimensional histogram method is used to exploit the spatial information of the image to reduce noise interference. The threshold optimization ability and segmentation ability of the proposed model are verified in this paper. A series of global optimization experiments on the IEEE CEC2014 benchmark test function (<xref ref-type="bibr" rid="B56">Liang et al., 2013</xref>) is used to validate whether EACOR is a suitable threshold search method. To test the image segmentation model, we set up segmentation experiments on the melanoma dataset at five threshold levels of 4, 8, 12, 16, and 20. Feature similarity index (FSIM) (<xref ref-type="bibr" rid="B104">Zhang et al., 2011</xref>), structural similarity index method (SSIM) (<xref ref-type="bibr" rid="B89">Wang et al., 2014</xref>), and peak signal to noise ratio (PSNR) (<xref ref-type="bibr" rid="B38">Huynh-Thu and Ghanbari, 2008</xref>) is used to evaluate the segmentation experiments to feedback on a more comprehensive and objective result. The experimental results show that the model proposed in this paper can perform the task of image segmentation excellently. It provides high-quality samples for subsequent melanoma pathology image segmentation. In summary, the contributions of this paper are as follows:</p>
<list list-type="simple">
<list-item>
<label>&#x2666;</label>
<p>A novel ant colony algorithm with the soft besiege and chase strategies is proposed. Its powerful optimization capability is applied to the segmentation of melanoma pathology images, and segmentation results of high quality are obtained.</p>
</list-item>
<list-item>
<label>&#x2666;</label>
<p>The performance of EACOR is compared with some excellent peers and variants.</p>
</list-item>
<list-item>
<label>&#x2666;</label>
<p>EACOR improves the original ant colony algorithm&#x2019;s convergence speed, accuracy, and ability to jump out of the local optimum on complex functions.</p>
</list-item>
<list-item>
<label>&#x2666;</label>
<p>The quality of the segmented images is evaluated comprehensively, and the proposed threshold optimization method can improve the efficiency of threshold search.</p>
</list-item>
</list>
<p>The remainder of the paper is organized as follows: related works are discussed in Section &#x201C;Related works.&#x201D; Section &#x201C;Overview of relevant methods&#x201D; reviews the multi-threshold segmentation method and the original ant colony algorithm. Section &#x201C;EACOR-based segmentation model&#x201D; introduces the EACOR-based multilevel threshold segmentation method. Section &#x201C;Experiments and results analysis&#x201D; shows and analyzes the experimental results of the benchmark function and image segmentation. The model proposed in this paper is discussed in Section &#x201C;Discussions.&#x201D; In Section &#x201C;Conclusion and future works,&#x201D; the work of the paper and the next research plan are summarized.</p>
</sec>
<sec id="S2">
<title>Related works</title>
<sec id="S2.SS1">
<title>Threshold segmentation method</title>
<p>As one of the most common image segmentation methods, threshold segmentation usually determines the gray scale range of the segmented image based on pixel gray scale or other ordered metrics. The segmentation is then completed based on a histogram of the grayscale, mean grayscale, non-local mean, etc. According to the objective function, threshold segmentation can be divided into minimum error, maximum between-class variance (Otsu), maximum entropy, etc. The most widely used of these is the maximum entropy method and Otsu. Threshold segmentation does not rely on <italic>a priori</italic> knowledge of the image and has low computational complexity. In addition, threshold segmentation is suitable for processing some images where the gray scale reflects the target of interest. Therefore, this method is often applied to the problem of processing medical images. However, the increase in threshold level according to the medical diagnosis requirements make the objective function complex and increases computational cost. Recently, some researchers have found that taking advantage of swarm intelligence algorithms can reduce computational consumption. As a result, the multi-level threshold image segmentation method with swarm intelligence optimization has attracted more attention.</p>
<p>For example, <xref ref-type="bibr" rid="B78">Siri et al. (2020)</xref> proposed a novel multi-threshold liver segmentation model based on the &#x2018;Slope Difference Distribution&#x2019; of image histogram, and the segmentation of the CT images of the liver is satisfactory. The Jaccard Coefficient results with the popular method demonstrated that this model could be more accurate for lung CT images. <xref ref-type="bibr" rid="B53">Li W. et al. (2020)</xref> presented a multi-threshold segmentation-based genetic algorithm for fine segmentation of medical images. The experimental results show that the feature extraction model based on the segmentation method had a higher region recognition rate. <xref ref-type="bibr" rid="B76">Renugambal and Selva Bhuvaneswari (2021)</xref> used Kapur&#x2019;s entropy and a modified moth flame optimization algorithm to differentiate between gray matter, white matter, and cerebrospinal fluid. The objective function values, the PSNR, and the computational cost were all satisfactory. <xref ref-type="bibr" rid="B69">Patra et al. (2021)</xref> used a multilayer threshold segmentation method based on a student psychology-based optimizer for lesion detection on breast dynamic contrast-enhanced magnetic resonance imaging. The accuracy of the segmented image after feature extraction was 99.44%. <xref ref-type="bibr" rid="B16">Chen et al. (2022)</xref> designed an enhanced shuffled frog leaping algorithm for multi-threshold image segmentation of breast cancer. The method was used for multi-threshold image segmentation of breast invasive ductal carcinoma, and the images obtained by the method performed well in terms of FSIM, PSNR, and SSIM. As a result, swarm intelligence optimization has been widely used for solving multi-threshold image segmentation problems.</p>
<p>Analysis of previous literature shows that the multi-threshold image segmentation method based on the optimization algorithm is an image segmentation method with excellent segmentation performance, which is suitable for segmenting medical images. Furthermore, such segmentation methods still have great potential due to the performance of threshold optimization methods.</p>
</sec>
<sec id="S2.SS2">
<title>Optimization method</title>
<p>The swarm intelligence algorithm is a flexible, gradient-independent method. Solving for the optimal threshold reduces the risk of obtaining sub-optimal or inferior solutions. The field of optimization of swarm intelligence algorithms is not restricted to a specific problem, and there are no special requirements for the objective function. Based on these advantages, it has become one of the most popular optimization methods. Common swarm intelligence include: differential evolution algorithm (DE) (<xref ref-type="bibr" rid="B82">Storn and Price, 1997</xref>), stochastic fractal search (SFS) (<xref ref-type="bibr" rid="B77">Salimi, 2015</xref>), ant colony algorithm for continuous domain problems (ACOR) (<xref ref-type="bibr" rid="B79">Socha and Dorigo, 2008</xref>), grey wolf optimizer (GWO) (<xref ref-type="bibr" rid="B65">Mirjalili et al., 2014</xref>), moth-flame optimization (MFO) (<xref ref-type="bibr" rid="B62">Mirjalili, 2015</xref>), whale optimization algorithm (WOA) (<xref ref-type="bibr" rid="B64">Mirjalili and Lewis, 2016</xref>), Runge Kutta optimizer (RUN) (<xref ref-type="bibr" rid="B2">Ahmadianfar et al., 2021</xref>), tree-seed algorithm (TSA) (<xref ref-type="bibr" rid="B45">Kiran, 2015</xref>), firefly algorithm (FA) (<xref ref-type="bibr" rid="B94">Yang, 2010</xref>), hunger games search (HGS) (<xref ref-type="bibr" rid="B96">Yang et al., 2021</xref>), Harris hawks optimization (HHO) (<xref ref-type="bibr" rid="B31">Heidari et al., 2019b</xref>), sine cosine algorithm (SCA) (<xref ref-type="bibr" rid="B63">Mirjalili, 2016</xref>), slime mould algorithm (SMA) (<xref ref-type="bibr" rid="B52">Li S. et al., 2020</xref>), colony predation algorithm (CPA) (<xref ref-type="bibr" rid="B85">Tu et al., 2021</xref>), weighted mean of vectors (INFO) (<xref ref-type="bibr" rid="B3">Ahmadianfar et al., 2022</xref>), and cuckoo search algorithm (CS) (<xref ref-type="bibr" rid="B95">Yang and Deb, 2010</xref>). The above methods have been applied to a particular area with excellent performance. However, the increase in dimensionality and complexity leads to low convergence accuracy and a higher probability of obtaining a locally optimal solution. Therefore, improving existing algorithms is one of the most common ways to enhance their optimization performance.</p>
<p>For example, a boosted bat algorithm (CDLOBA) (<xref ref-type="bibr" rid="B98">Yong et al., 2018</xref>), the chaotic bat algorithm (CBA) (<xref ref-type="bibr" rid="B1">Adarsh et al., 2016</xref>), the hybridizing grey wolf optimization with differential evolution (HGWO) (<xref ref-type="bibr" rid="B106">Zhu et al., 2015</xref>), the hybrid algorithm (ASCA-PSO) that combines SCA with PSO (<xref ref-type="bibr" rid="B40">Issa et al., 2018</xref>), the hybridizing sine cosine algorithm with differential evolution (SCADE) (<xref ref-type="bibr" rid="B66">Nenavath and Jatoth, 2018</xref>), the modified SCA based on neighborhood search and greedy L&#x00E9;vy mutation (m_SCA) (<xref ref-type="bibr" rid="B74">Qu et al., 2018</xref>), the improved GWO algorithm (IGWO) exploits the powerful exploratory power of the hierarchical mechanism (<xref ref-type="bibr" rid="B10">Cai et al., 2019</xref>), the efficient boosted grey wolf optimizers (OBLGWO) (<xref ref-type="bibr" rid="B30">Heidari et al., 2019a</xref>), the A-C parametric whale optimization Algorithm (ACWOA) (<xref ref-type="bibr" rid="B44">Khashan et al., 2018</xref>), the mutative whale-inspired optimization methods with multi-strategy (BMWOA) (<xref ref-type="bibr" rid="B59">Luo et al., 2019</xref>), the multi-population and DE assisted Harris hawks optimization (CMDHHO) (<xref ref-type="bibr" rid="B13">Chen H. et al., 2020</xref>). Therefore, based on an analysis of previous literature, we believe that focused improvement of the original algorithm is a viable option. These methods have excellent performance in dealing with some optimization problems, such as economic emission dispatch problem (<xref ref-type="bibr" rid="B22">Dong et al., 2021</xref>), image segmentation (<xref ref-type="bibr" rid="B37">Hussien et al., 2022</xref>; <xref ref-type="bibr" rid="B101">Yu et al., 2022b</xref>), feature selection (<xref ref-type="bibr" rid="B32">Hu J. et al., 2022</xref>; <xref ref-type="bibr" rid="B58">Liu et al., 2022</xref>), robust optimization (<xref ref-type="bibr" rid="B29">He et al., 2019</xref>, <xref ref-type="bibr" rid="B28">2020</xref>), scheduling problems (<xref ref-type="bibr" rid="B23">Gao et al., 2020</xref>; <xref ref-type="bibr" rid="B27">Han et al., 2021</xref>; <xref ref-type="bibr" rid="B86">Wang G. G. et al., 2022</xref>), multi-objective problem (<xref ref-type="bibr" rid="B35">Hua et al., 2021</xref>; <xref ref-type="bibr" rid="B20">Deng et al., 2022d</xref>), plant disease recognition (<xref ref-type="bibr" rid="B100">Yu et al., 2022a</xref>), complex optimization problem (<xref ref-type="bibr" rid="B18">Deng et al., 2022b</xref>), train scheduling (<xref ref-type="bibr" rid="B81">Song et al., 2023</xref>), resource allocation (<xref ref-type="bibr" rid="B17">Deng et al., 2022a</xref>), airport taxiway planning (<xref ref-type="bibr" rid="B19">Deng et al., 2022c</xref>), optimization of machine learning model (<xref ref-type="bibr" rid="B57">ling Chen et al., 2014</xref>), medical diagnosis (<xref ref-type="bibr" rid="B14">Chen et al., 2016</xref>; <xref ref-type="bibr" rid="B87">Wang et al., 2017</xref>), and solar cell parameter identification (<xref ref-type="bibr" rid="B97">Ye et al., 2021</xref>). But there are still some issues to be considered in these methods. For example, <xref ref-type="bibr" rid="B67">Niu et al. (2019)</xref> found after repeated experiments that GWO was uncertain when dealing with optimization problems. The optimization capability of GWO is significantly better than other methods only when the optimal solution of the optimization problem is zero. When the optimal value is far from zero, the performance of GWO gradually decreased. It means that the algorithm performance is unstable for real-world applications. Furthermore, a series of studies based on algorithm structure and core ideas question the innovativeness of some popular algorithms including intelligent water drops algorithm, firefly algorithm, black holes optimization algorithm, whale optimization algorithm and sine cosine algorithm. Some of these studies have argued that these methods are simply a novel modification of previous methods, confusing the researcher&#x2019;s understanding of the nature of the algorithm (<xref ref-type="bibr" rid="B71">Piotrowski et al., 2014</xref>; <xref ref-type="bibr" rid="B12">Camacho-Villal&#x00F3;n et al., 2018</xref>; <xref ref-type="bibr" rid="B11">Camacho Villal&#x00F3;n et al., 2020</xref>).</p>
<p>Based on the above factors, the originality of the ant colony optimization algorithm (ACO) is supported by a scientifically complete theory. The traditional ACO is mainly applied to solve discrete problems. Subsequently, <xref ref-type="bibr" rid="B79">Socha and Dorigo (2008)</xref> proposed ACOR for continuous domains, known as ACOR. ACOR and its variants are widely used in various fields. ACOR is a classical swarm intelligence algorithm with a simple structure and high robustness. ACOR and its variants are widely used in various fields. <xref ref-type="bibr" rid="B42">Juang and Chang (2011)</xref> applied the improved ACOR algorithm (ECACOR) to the field of dynamic plant control. <xref ref-type="bibr" rid="B103">Zhang et al. (2013)</xref> proposed applying the homogenous continuous ant colony optimization algorithm (HACOR) to the one-dimensional coupled radiation and thermal conductivity heat transfer inverse problem. <xref ref-type="bibr" rid="B24">Gao (2014)</xref> solved the landslide forecasting problem by combining the artificial immune system with ACOR. <xref ref-type="bibr" rid="B41">Jero et al. (2016)</xref> applied ACOR to Electrocardiography steganography. <xref ref-type="bibr" rid="B60">Ma et al. (2019)</xref> proposed an adaptive hybrid ACO for the classification problem. <xref ref-type="bibr" rid="B68">Omran and Al-Sharhan (2019)</xref> applied two variants of his proposed ACOR to practical engineering optimization problems.</p>
<p>Based on an analysis of previous literature, ACOR can obtain better result when dealing with different optimization tasks. However, ACOR still has potential for improvement. When solving high-dimensional problems or complex multi-peaked problems, the convergence accuracy of ACOR may appear insufficient, and the probability of obtaining a locally optimal solution increase. If ACOR is used as a thresholding search method for segmentation models, it may reduce the effectiveness of image segmentation. Based on the above literature analysis, it can be concluded that a multi-threshold segmentation method with excellent performance is still necessary. Therefore, this study proposes an enhanced ACOR method (EACOR) based on the soft besiege and chase strategies.</p>
</sec>
</sec>
<sec id="S3">
<title>Overview of relevant methods</title>
<sec id="S3.SS1">
<title>Multi-threshold image segmentation</title>
<sec id="S3.SS1.SSS1">
<title>Two-dimensional histogram</title>
<p>The non-local means (NLM) two-dimensional histogram (<xref ref-type="bibr" rid="B8">Buades et al., 2005</xref>) is an essential method for image denoising. The basic principle of NLM filtering is like that of means filtering. They both achieve denoising by averaging the pixels around the current pixel point, except that a weighting strategy is added to the NLM filtering. NML method can achieve denoising and preserve the details of the image edges. The value of NLM <italic>O</italic>(<italic>p</italic>) can be obtained according to Eq. 1.</p>
<disp-formula id="S3.E1"><label>(1)</label><mml:math id="M1"><mml:mrow><mml:mrow><mml:mi>O</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mo largeop="true" symmetric="true">&#x2211;</mml:mo><mml:mrow><mml:mi>q</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>I</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mi>X</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mn>&#x03C9;</mml:mn><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>p</mml:mi><mml:mo>,</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mrow><mml:msub><mml:mo largeop="true" symmetric="true">&#x2211;</mml:mo><mml:mrow><mml:mi>q</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi>I</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mn>&#x03C9;</mml:mn><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>p</mml:mi><mml:mo>,</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where <italic>p</italic> and <italic>q</italic> are two pixels in image <italic>I</italic>, respectively. <italic>X</italic>(<italic>p</italic>) and <italic>X</italic>(<italic>q</italic>) represent the values of <italic>p</italic> and <italic>q</italic>, respectively. The Gaussian weighting function &#x03C9;(<italic>p, q</italic>) is defined as shown in Eq. 2.</p>
<disp-formula id="S3.E2"><label>(2)</label><mml:math id="M2"><mml:mrow><mml:mrow><mml:mn>&#x03C9;</mml:mn><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>p</mml:mi><mml:mo>,</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mi>e</mml:mi><mml:mi>x</mml:mi><mml:msup><mml:mi>p</mml:mi><mml:mrow><mml:mo>-</mml:mo><mml:mfrac><mml:msup><mml:mrow><mml:mo stretchy="false">&#x007C;</mml:mo><mml:mrow><mml:mrow><mml:mi mathvariant="normal">&#x03BC;</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>q</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mo>-</mml:mo><mml:mrow><mml:mi mathvariant="normal">&#x03BC;</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>p</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mo stretchy="false">&#x007C;</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup><mml:msup><mml:mi mathvariant="normal">&#x03C3;</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mfrac></mml:mrow></mml:msup></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where &#x03C3; is the standard deviation of the Gaussian weighting function. &#x03BC;(<italic>p</italic>), &#x03BC;(<italic>q</italic>) denote the local means of <italic>p, q</italic> pixels, respectively, obtained from Eq. 3.</p>
<disp-formula id="S3.E3"><label>(3)</label><mml:math id="M3"><mml:mrow><mml:mrow><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>n</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">&#x00D7;</mml:mo><mml:mi>n</mml:mi></mml:mrow></mml:mfrac><mml:mrow><mml:munder><mml:mo largeop="true" movablelimits="false" symmetric="true">&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mi>S</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:munder><mml:mrow><mml:mi>I</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>i</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <italic>x</italic> is a pixel in the image <italic>I, S</italic>(<italic>x</italic>) is a square filter of size <italic>n</italic> &#x00D7; <italic>n</italic> around pixel <italic>x</italic>.</p>
<p>Suppose an image <italic>I</italic>(<italic>x</italic>, <italic>y</italic>) with gray level <italic>L</italic> and size <italic>M</italic> &#x00D7; <italic>N, x</italic> &#x2208; [1, <italic>M</italic>], <italic>y</italic>&#x2208; [1, <italic>N</italic>]. For each pixel in <italic>I</italic>, the corresponding grayscale value <italic>f</italic>(<italic>x</italic>, <italic>y</italic>) and NLM <italic>g</italic>(<italic>x</italic>, <italic>y</italic>) can be calculated. Therefore, each pixel in the original image <italic>I</italic>(<italic>x</italic>, <italic>y</italic>) will be associated with two dimensions: grayscale and NLM. Moreover, we can also obtain the number of <italic>h</italic>(<italic>i</italic>, <italic>j</italic>) pixels with the same grayscale and NLM in (<italic>s</italic>, <italic>t</italic>), which is calculated by Eq. 4.</p>
<disp-formula id="S3.E4"><label>(4)</label><mml:math id="M4"><mml:mrow><mml:mrow><mml:mi>h</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo lspace="2.8pt" rspace="2.8pt">)</mml:mo></mml:mrow></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:msub><mml:mi>c</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:math></disp-formula>
<p>where <italic>i, j</italic> denote the grayscale value <italic>f</italic>(<italic>x</italic>, <italic>y</italic>) and the nonlocal mean <italic>g</italic>(<italic>x</italic>, <italic>y</italic>) of (<italic>x</italic>, <italic>y</italic>) pixels. Both <italic>i</italic> and <italic>j</italic> are in the range of 0 to <italic>L</italic>1. <italic>c</italic><sub><italic>i,j</italic></sub> is the number of pixels with grayscale value and NLM of (<italic>i</italic>, <italic>j</italic>). Two-dimensional histogram of the image is obtained by normalizing Eq. (5) according to <italic>h</italic>(<italic>i</italic>, <italic>j</italic>).</p>
<disp-formula id="S3.E5"><label>(5)</label><mml:math id="M5"><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mfrac><mml:mrow><mml:mi>h</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>M</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">&#x00D7;</mml:mo><mml:mi>N</mml:mi></mml:mrow></mml:mfrac><mml:mo rspace="2.8pt">,</mml:mo><mml:mi>i</mml:mi></mml:mrow></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>j</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mn>0</mml:mn><mml:mo>,</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mn>&#x2026;</mml:mn><mml:mo rspace="2.8pt">,</mml:mo><mml:mrow><mml:mi>L</mml:mi><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mrow></mml:mrow><mml:mo rspace="2.8pt">,</mml:mo><mml:mrow><mml:mrow><mml:munderover><mml:mo largeop="true" movablelimits="false" symmetric="true">&#x2211;</mml:mo><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>i</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi>L</mml:mi><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:munderover><mml:mrow><mml:munderover><mml:mo largeop="true" movablelimits="false" symmetric="true">&#x2211;</mml:mo><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>j</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:mi>L</mml:mi><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:munderover><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mpadded></mml:mrow></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>The grayscale and NLM values are used as the horizontal and longitude axes of the two-dimensional histogram. The number of normalized pixels is used as the vertical axis of the two-dimensional histogram, as shown in <xref ref-type="fig" rid="F1">Figure 1</xref>.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption><p>Three-dimensional view of a 2D histogram.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g001.tif"/>
</fig>
</sec>
<sec id="S3.SS1.SSS2">
<title>Kapur&#x2019;s entropy</title>
<p>Entropy is a physical quantity that measures a certain distribution, and a higher entropy value means that the distribution is more uniform. In order to fully consider the source independence and be able to well extract the feature signal in the picture, Kapur&#x2019;s entropy is selected to measure the amount of information in the target region and background region. The larger Kapur&#x2019;s entropy indicates the higher quality of image segmentation. The method of MTIS using Kapur&#x2019;s entropy can be described as follows: &#x007B;<italic>t</italic><sub>1</sub>, <italic>t</italic><sub>2</sub> &#x2026;, <italic>t</italic><sub><italic>T</italic></sub>&#x007D; represents the grayscale values of the grayscale image and &#x007B;<italic>s</italic><sub>1</sub>, <italic>s</italic><sub>2</sub> &#x2026;, <italic>s</italic><sub><italic>T</italic></sub>&#x007D; characterizes the grayscale values of the non-local mean image. The objective function is expressed as calculating the entropy of <italic>T</italic> + 1 image segmentations and then summing them. The expression for the objective function <italic>F</italic> of Kapur&#x2019;s entropy is shown in Eqs. 6, 7.</p>
<disp-formula id="S3.E6"><label>(6)</label><mml:math id="M6"><mml:mrow><mml:mrow><mml:mi>F</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:msub><mml:mi>h</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:msub><mml:mi>h</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo>,</mml:mo><mml:mn>&#x2026;</mml:mn><mml:mo lspace="2.8pt" rspace="2.8pt">,</mml:mo><mml:mrow><mml:mi>t</mml:mi><mml:msub><mml:mi>h</mml:mi><mml:mi>T</mml:mi></mml:msub></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">)</mml:mo></mml:mrow></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>H</mml:mi><mml:mn>0</mml:mn></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">+</mml:mo><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>H</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">+</mml:mo><mml:mn>&#x2026;</mml:mn><mml:mo lspace="2.8pt" rspace="2.8pt">+</mml:mo><mml:msub><mml:mi>H</mml:mi><mml:mi>T</mml:mi></mml:msub></mml:mrow></mml:mrow></mml:math></disp-formula>
<disp-formula id="S3.E7"><label>(7)</label><mml:math id="M7"><mml:mrow><mml:mo>&#x007B;</mml:mo><mml:mtable displaystyle="true" rowspacing="0pt"><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>H</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mpadded><mml:mo>=</mml:mo><mml:mrow><mml:mo>-</mml:mo><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:msubsup></mml:mstyle><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:msubsup></mml:mstyle><mml:mrow><mml:mfrac><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mn>&#x03C9;</mml:mn><mml:mn>0</mml:mn></mml:msub></mml:mfrac><mml:mrow><mml:mi>ln</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mn>&#x03C9;</mml:mn><mml:mn>0</mml:mn></mml:msub></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mpadded lspace="36pt" width="+36pt"><mml:mn>&#x03C9;</mml:mn></mml:mpadded><mml:mn>0</mml:mn></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:msubsup></mml:mstyle><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow></mml:msubsup></mml:mstyle><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>H</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mpadded><mml:mo>=</mml:mo><mml:mrow><mml:mo>-</mml:mo><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>s</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:msubsup></mml:mstyle><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:msubsup></mml:mstyle><mml:mrow><mml:mfrac><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mn>&#x03C9;</mml:mn><mml:mn>1</mml:mn></mml:msub></mml:mfrac><mml:mrow><mml:mi>ln</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mn>&#x03C9;</mml:mn><mml:mn>1</mml:mn></mml:msub></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mpadded lspace="36pt" width="+36pt"><mml:mn>&#x03C9;</mml:mn></mml:mpadded><mml:mn>1</mml:mn></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>s</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:msubsup></mml:mstyle><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:msubsup></mml:mstyle><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>H</mml:mi><mml:mi>T</mml:mi></mml:msub></mml:mpadded><mml:mo>=</mml:mo><mml:mrow><mml:mo>-</mml:mo><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>s</mml:mi><mml:mrow><mml:mn>T</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mi>T</mml:mi></mml:msub></mml:mrow></mml:msubsup><mml:mrow></mml:mrow></mml:mstyle><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>T</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>T</mml:mi></mml:msub></mml:mrow></mml:msubsup><mml:mrow></mml:mrow></mml:mstyle><mml:mrow><mml:mfrac><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mn>&#x03C9;</mml:mn><mml:mi>T</mml:mi></mml:msub></mml:mfrac><mml:mrow><mml:mi>ln</mml:mi><mml:mo>&#x2061;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mn>&#x03C9;</mml:mn><mml:mi>T</mml:mi></mml:msub></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mpadded lspace="36pt" width="+36pt"><mml:mn>&#x03C9;</mml:mn></mml:mpadded><mml:mi>T</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>s</mml:mi><mml:mrow><mml:mn>T</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>s</mml:mi><mml:mi>T</mml:mi></mml:msub></mml:mrow></mml:msubsup><mml:mrow></mml:mrow></mml:mstyle><mml:mrow><mml:mstyle displaystyle='true'><mml:msubsup><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>T</mml:mi><mml:mo>&#x2212;</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>T</mml:mi></mml:msub></mml:mrow></mml:msubsup><mml:mrow></mml:mrow></mml:mstyle><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mo>,</mml:mo><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mi/></mml:mrow></mml:math></disp-formula>
<p>where <italic>H<sub>i</sub></italic> denotes the entropy of the <italic>i-th</italic> image segmentation. &#x007B;&#x03C9;<sub>1</sub>, &#x03C9;<sub>2</sub>, &#x2026;, &#x03C9;<sub><italic>T</italic></sub>&#x007D; are the sum of the grayscale levels in the threshold interval.</p>
</sec>
</sec>
<sec id="S3.SS2">
<title>Ant colony algorithm for continuous domains</title>
<p>The original ACO algorithm could only deal with discrete optimization problems. <xref ref-type="bibr" rid="B79">Socha and Dorigo (2008)</xref> extended ACO to a continuous domain (ACOR). ACOR has excellent performance and has great potential for improvement. Meanwhile, the ACOR has a robust theoretical framework. Therefore, this study optimizes the optimal threshold based on ACOR. The traditional ACOR is as follows.</p>
<p>The archive mechanism is a significant feature of ACOR. The essence of the archive of solutions mechanism is to simulate the pheromone model. The total number of individuals is <italic>N</italic>, dimension is <italic>dim</italic>. The population is denoted as <italic>X</italic> = &#x007B;<italic>X</italic><sub>1</sub>, &#x2026;, <italic>X</italic><sub><italic>k</italic></sub>&#x007D;, and the <italic>i-th</italic> individual is denoted as <inline-formula><mml:math id="INEQ1"><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>X</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:msubsup><mml:mo>,</mml:mo><mml:mrow><mml:mpadded width="+6.7pt"><mml:mn>&#x2026;</mml:mn></mml:mpadded><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mi>d</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi></mml:mrow></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo rspace="2.8pt">,</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo stretchy="false">[</mml:mo><mml:mn>1</mml:mn><mml:mo rspace="2.8pt">,</mml:mo><mml:mi>N</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:math></inline-formula>. The size of the solution archive is set to <italic>k</italic>. At each iteration, the mechanism keeps <italic>k</italic> solutions with the best fitness values from <italic>k</italic> + <italic>N</italic> search individuals (the <italic>k</italic> best search agents in the previous iteration and the <italic>N</italic> search agents in the population of the current iteration), and stores them in the solution archive. The solution archive is denoted by S = &#x007B;<italic>S</italic><sub>1</sub>, &#x2026;, <italic>S</italic><sub><italic>k</italic></sub>&#x007D;, and individuals in the solution archive are represented as <inline-formula><mml:math id="INEQ2"><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>S</mml:mi><mml:mi>m</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>s</mml:mi><mml:mi>m</mml:mi><mml:mn>1</mml:mn></mml:msubsup><mml:mo>,</mml:mo><mml:mrow><mml:mpadded width="+6.7pt"><mml:mn>&#x2026;</mml:mn></mml:mpadded><mml:msubsup><mml:mi>s</mml:mi><mml:mi>m</mml:mi><mml:mrow><mml:mi>d</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi></mml:mrow></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo rspace="2.8pt">,</mml:mo><mml:mrow><mml:mi>m</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo stretchy="false">[</mml:mo><mml:mn>1</mml:mn><mml:mo rspace="2.8pt">,</mml:mo><mml:mi>k</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:math></inline-formula>. In the archive, each search agent <italic>S<sub>m</sub></italic> corresponds to a weighting factor &#x03C9;<sub><italic>m</italic></sub> and a probability <italic>p<sub>m</sub></italic>. &#x03C9;<sub><italic>m</italic></sub> and <italic>p<sub>m</sub></italic> are calculated from Eqs. 8, 9, respectively.</p>
<disp-formula id="S3.E8"><label>(8)</label><mml:math id="M8"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mn>&#x03C9;</mml:mn><mml:mi>m</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mi>q</mml:mi><mml:mi>k</mml:mi><mml:msqrt><mml:mrow><mml:mn>2</mml:mn><mml:mi mathvariant="normal">&#x03C0;</mml:mi></mml:mrow></mml:msqrt></mml:mrow></mml:mfrac><mml:mpadded width="+3.3pt"><mml:mtext>exp</mml:mtext></mml:mpadded><mml:mrow><mml:mo stretchy="false">[</mml:mo><mml:mrow><mml:mo>-</mml:mo><mml:mfrac><mml:msup><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>m</mml:mi><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mn>2</mml:mn></mml:msup><mml:mrow><mml:mn>2</mml:mn><mml:msup><mml:mi>q</mml:mi><mml:mn>2</mml:mn></mml:msup><mml:msup><mml:mi>k</mml:mi><mml:mn>2</mml:mn></mml:msup></mml:mrow></mml:mfrac></mml:mrow><mml:mo stretchy="false">]</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<disp-formula id="S3.E9"><label>(9)</label><mml:math id="M9"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>p</mml:mi><mml:mi>m</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mfrac><mml:msub><mml:mn>&#x03C9;</mml:mn><mml:mi>m</mml:mi></mml:msub><mml:mrow><mml:msubsup><mml:mo largeop="true" symmetric="true">&#x2211;</mml:mo><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>r</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>k</mml:mi></mml:msubsup><mml:msub><mml:mn>&#x03C9;</mml:mn><mml:mi>r</mml:mi></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>where <italic>q</italic> is a parameter that is used to reconcile the local search with the global search.</p>
<p>The guide solution <italic>S<sub>g</sub></italic> is selected from the solution archive based on the roulette selection method and probability <italic>P</italic>. The &#x03BC; and &#x03C3; required to update the population can be derived from the information on each dimension of <italic>S<sub>g</sub></italic> and <italic>S</italic>. &#x03BC; and &#x03C3; are calculated from Eqs. 10&#x2013;12, respectively.</p>
<disp-formula id="S3.E10"><label>(10)</label><mml:math id="M10"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi mathvariant="normal">&#x03BC;</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:msubsup><mml:mi>s</mml:mi><mml:mi>g</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow></mml:math></disp-formula>
<disp-formula id="S3.E11"><label>(11)</label><mml:math id="M11"><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi mathvariant="normal">&#x03C3;</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mi>&#x03BE;</mml:mi><mml:msub><mml:mi>D</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo rspace="2.8pt">,</mml:mo><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>j</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>&#x2026;</mml:mn><mml:mo rspace="2.8pt">,</mml:mo><mml:mrow><mml:mi>d</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi></mml:mrow></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<disp-formula id="S3.E12"><label>(12)</label><mml:math id="M12"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>D</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:munderover><mml:mo largeop="true" movablelimits="false" symmetric="true">&#x2211;</mml:mo><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>r</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>k</mml:mi></mml:munderover><mml:mfrac><mml:mrow><mml:mo stretchy="false">&#x007C;</mml:mo><mml:mrow><mml:msubsup><mml:mi>s</mml:mi><mml:mi>r</mml:mi><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:msubsup><mml:mi>s</mml:mi><mml:mi>g</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo stretchy="false">&#x007C;</mml:mo></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:mfrac></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <italic>&#x03BE;</italic> is used to replace the pheromone evaporation rate. <italic>D<sub>j</sub></italic> is the Manhattan distance. <inline-formula><mml:math id="INEQ3"><mml:mrow><mml:mo stretchy="false">&#x007C;</mml:mo><mml:mrow><mml:msubsup><mml:mi>s</mml:mi><mml:mi>r</mml:mi><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:msubsup><mml:mi>s</mml:mi><mml:mi>g</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo stretchy="false">&#x007C;</mml:mo></mml:mrow></mml:math></inline-formula> denotes the distance from each solution to the reference individual in the archive.</p>
<p>The update formula for the current search agent <italic>X<sub>i</sub></italic> is shown in Eq. 13.</p>
<disp-formula id="S3.E13"><label>(13)</label><mml:math id="M13"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mi>n</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>m</mml:mi><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo rspace="2.8pt">,</mml:mo><mml:msub><mml:mi mathvariant="normal">&#x03C3;</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <italic>normrnd</italic>(&#x03BC;, &#x03C3;) is the normal distribution function, &#x03BC; denotes the mean vector, and &#x03C3; denotes the standard deviation vector.</p>
</sec>
</sec>
<sec id="S4">
<title>Enhanced ant colony optimization for continuous domains-based segmentation model</title>
<p>This section details the proposed EACOR and the EACOR-based thresholding image segmentation model.</p>
<sec id="S4.SS1">
<title>The proposed enhanced ant colony optimization for continuous domains</title>
<sec id="S4.SS1.SSS1">
<title>Motivation</title>
<p>In order to increase the convergence speed while improving the accuracy. This study introduced the soft besiege strategy. The soft besiege strategy is inspired by HHO (<xref ref-type="bibr" rid="B31">Heidari et al., 2019b</xref>). The soft besiege strategy ensures a more reasonable ratio of global exploration and local exploitation of the algorithm, which is conducive to searching for higher quality solution. At the beginning of the optimization process, the algorithm tends to explore the entire search space more globally, which accelerates convergence and reduces the local optimum risk. Toward the end of the optimization process, the algorithm focuses more on further exploitation around the current optimal solution, improving the convergence accuracy of the algorithm. The pursuit strategy can enhance the local exploitation performance of the algorithm.</p>
</sec>
<sec id="S4.SS1.SSS2">
<title>The soft besiege strategy</title>
<p>The adaptive step size facilitates to coordinate the exploration and exploitation of the proposed method. The exploration phase enables the search agents to conduct a global search with a big step size. In the exploitation phase, the search agent performs the local search with a small step size. <italic>E</italic> is calculated from Eq. 14.</p>
<disp-formula id="S4.E14"><label>(14)</label><mml:math id="M14"><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>E</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mn>2</mml:mn><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>-</mml:mo><mml:mfrac><mml:mrow><mml:mi>F</mml:mi><mml:mi>E</mml:mi><mml:mi>s</mml:mi></mml:mrow><mml:mrow><mml:mi>M</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi><mml:mi>F</mml:mi><mml:mi>E</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:mfrac></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:msub><mml:mi>r</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo>-</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <italic>FEs</italic> is the number of current function evaluation. <italic>MaxFEs</italic> is the maximum number of function evaluation. <italic>r<sub>1</sub></italic> is a randomly generated number between 0 and 1. From Eq. 14, as the number of iterations rises, we know that &#x007C;<italic>E</italic>&#x007C; drops from 2 to 0. The variation of <italic>E</italic> with the increasing number of iterations is shown in <xref ref-type="fig" rid="F2">Figure 2</xref>.</p>
<fig id="F2" position="float">
<label>FIGURE 2</label>
<caption><p>The change curve of <bold>E</bold> in 1000 iterations based on <xref ref-type="bibr" rid="B31">Heidari et al. (2019b)</xref>.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g002.tif"/>
</fig><p>The soft besiege strategy uses the average position of all ants in the colony, the random ant position, and the food position (global optimal solution) to influence the current ant movement. The soft besiege strategy consists of two phases according to the optimization process.</p>
<p>When the current number of iterations is 1, the update formula for the current individual <inline-formula><mml:math id="INEQ4"><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>X</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mn>1</mml:mn></mml:msubsup><mml:mo>,</mml:mo><mml:mrow><mml:mpadded width="+6.7pt"><mml:mn>&#x2026;</mml:mn></mml:mpadded><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:mi>d</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi></mml:mrow></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo rspace="2.8pt">,</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mrow><mml:mo stretchy="false">[</mml:mo><mml:mn>1</mml:mn><mml:mo rspace="2.8pt">,</mml:mo><mml:mi>N</mml:mi><mml:mo stretchy="false">]</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:math></inline-formula> is shown in Eq. 15.</p>
<disp-formula id="S4.E15"><label>(15)</label><mml:math id="M15"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mo>&#x007B;</mml:mo><mml:mtable displaystyle="true" rowspacing="0pt"><mml:mtr><mml:mtd columnalign="center"><mml:mrow><mml:mrow><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>r</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">&#x00D7;</mml:mo><mml:mrow><mml:mo>&#x007C;</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>r</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:mpadded></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">&#x00D7;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow></mml:mrow><mml:mo>&#x007C;</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mo>,</mml:mo><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>r</mml:mi><mml:mn>6</mml:mn></mml:msub></mml:mpadded></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">&gt;</mml:mo><mml:mn>0.5</mml:mn></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="center"><mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>e</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>-</mml:mo><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mn>4</mml:mn></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mn>5</mml:mn></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mrow><mml:mi>u</mml:mi><mml:msub><mml:mi>b</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo>-</mml:mo><mml:mrow><mml:mi>l</mml:mi><mml:msub><mml:mi>b</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mi>l</mml:mi><mml:msub><mml:mi>b</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mo>,</mml:mo><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>r</mml:mi><mml:mn>6</mml:mn></mml:msub></mml:mpadded></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">&#x2264;</mml:mo><mml:mn>0.5</mml:mn></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mi/></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <inline-formula><mml:math id="INEQ5"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula>, <inline-formula><mml:math id="INEQ6"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula>, and <inline-formula><mml:math id="INEQ7"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>e</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula> denote the <italic>j-th</italic> component of the random individual, optimal individual and average individual in the population, respectively. <italic>r</italic><sub>2</sub>, <italic>r</italic><sub>3</sub>, <italic>r</italic><sub>4</sub>, <italic>r</italic><sub>5</sub>, and <italic>r</italic><sub>6</sub> are randomly generated between 0 and 1. <italic>ub</italic><sub><italic>j</italic></sub> and <italic>lb</italic><sub><italic>j</italic></sub> denote the maximum and minimum values of the <italic>j-th</italic> component, respectively. When <italic>r<sub>6</sub></italic> &#x003E; 0.5, <inline-formula><mml:math id="INEQ8"><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula> is updated according to the position of other individual. When <italic>r</italic><sub>6</sub> &#x2264; 0.5, <inline-formula><mml:math id="INEQ9"><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula> updates its position based on the current best individual ant and the mean value of the population. This stage ensures that the colony can explore the search space more extensively and find the global optimal solution more easily.</p>
<p>When the number of iterations is greater than one, the main factor affecting the update of individual position is the current optimal individual. In addition, to improve the convergence accuracy and prevent falling into local optimum, random step <italic>J</italic> and L&#x00E9;vy flight are introduced. The updated formula for <italic>J</italic> is shown in Eq. 16.</p>
<disp-formula id="S4.E16"><label>(16)</label><mml:math id="M16"><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>J</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mn>2</mml:mn><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>-</mml:mo><mml:msub><mml:mi>r</mml:mi><mml:mn>7</mml:mn></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <italic>r<sub>7</sub></italic> means random numbers between 0 and 1.</p>
<p><italic>J</italic> and L&#x00E9;vy flight ensures that an individual can search locally at the current position and jump out of the local optimum by the feature of L&#x00E9;vy flight between long and short steps. At the next iteration, the individual <italic>X</italic><sub><italic>temp</italic></sub> that may replace the current <italic>X<sub>i</sub></italic> is generated by Eqs. 17, 18.</p>
<disp-formula id="S4.Ex17"><mml:math display="block" id="M17"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mo>&#x007B;</mml:mo><mml:mtable displaystyle="true" rowspacing="0pt"><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>-</mml:mo><mml:mrow><mml:mi>E</mml:mi><mml:mrow><mml:mo>&#x007C;</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>J</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">&#x00D7;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>-</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>&#x007C;</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mo>,</mml:mo><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>r</mml:mi><mml:mn>8</mml:mn></mml:msub></mml:mpadded></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">&#x2265;</mml:mo><mml:mn>0.5</mml:mn></mml:mrow><mml:mo separator="true">&#x2003;</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mn>17</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:mrow><mml:mi>E</mml:mi><mml:mrow><mml:mo>&#x007C;</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>J</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">&#x00D7;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>-</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>&#x007C;</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mo>,</mml:mo><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>r</mml:mi><mml:mn>8</mml:mn></mml:msub></mml:mpadded></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">&lt;</mml:mo><mml:mn>0.5</mml:mn></mml:mrow><mml:mo separator="true">&#x2003;&#x2003;&#x2003;&#x2003;</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mn>18</mml:mn><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mi/></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <inline-formula><mml:math id="INEQ11a"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula> denotes the <italic>j-th</italic> component of <italic>X</italic><sub><italic>temp</italic></sub>. <italic>r<sub>8</sub></italic> is randomly generated between 0 and 1.</p>
<p>In addition, when <italic>r</italic><sub>8</sub> &#x003C; 0.5, the current individual&#x2019;s position is further developed based on local information to obtain a better solution. If the fitness value of <italic>X</italic><sub><italic>temp</italic></sub> is better, the next search step is performed according to Eq. 19. Otherwise, the original position is retained.</p>
<disp-formula id="S4.E18"><label>(19)</label><mml:math id="M18"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:mrow><mml:mi>E</mml:mi><mml:mrow><mml:mo>&#x007C;</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>J</mml:mi></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">&#x00D7;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>-</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>&#x007C;</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>r</mml:mi><mml:mn>9</mml:mn></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">&#x00D7;</mml:mo><mml:mi>L</mml:mi></mml:mrow><mml:mi>e</mml:mi><mml:mi>v</mml:mi><mml:mi>y</mml:mi></mml:mrow></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <italic>Levy</italic> denotes L&#x00E9;vy flight. <italic>r<sub>9</sub></italic> denotes a random number between 0 and 1.</p>
<p>As a result, the individual with the best fitness value of <italic>X</italic><sub><italic>temp</italic></sub> and <italic>X<sub>i</sub></italic> is retained for the next iteration based on the current individual. The pseudo-code of the soft besiege strategy is shown in <xref ref-type="table" rid="A1">Algorithm 1</xref>.</p>
<table-wrap position="float" id="A1">
<label>Algorithm 1</label>
<caption><p>Pseudo-code of the soft besiege strategy.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<tbody>
<tr>
<td valign="top" align="left"><monospace>&#x00A0;&#x00A0;<bold>Input:</bold> <italic>N, dim, ub, lb, MaxFEs</italic>, object</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;function <italic>fobj</italic>, current iteration</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;number <italic>t</italic>,</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;population <italic>X</italic>(<italic>t</italic>) = &#x007B;<italic>X</italic><sub>1</sub>, &#x2026;, <italic>X</italic><sub><italic>N</italic></sub>&#x007D;.</monospace><break/>
<monospace>&#x00A0;&#x00A0;<bold>Output:</bold> Updated population</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;<italic>X</italic>(<italic>t</italic> + 1) = &#x007B;<italic>X</italic><sub>1</sub>, &#x2026;, <italic>X</italic><sub><italic>N</italic></sub>&#x007D; and its function</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;value.</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;Find the optimal individual <italic>X</italic><sub><italic>best</italic></sub></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;according to the function value;</monospace><break/>
<monospace>&#x00A0;&#x00A0;<bold>For</bold> <italic>i</italic> = 1: <italic>N</italic></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;Calculate <italic>E</italic> according to Eq. 14;</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>For</bold> <italic>j</italic> = 1: <italic>dim</italic></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>If</bold> <italic>t</italic> equals 1</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Update current individual <inline-formula><mml:math id="INEQ10"><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula> by</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Eq. 15;</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>Else then</bold></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Update <italic>J</italic> by Eq. 16;</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>If</bold> <italic>r</italic><sub>8</sub> &#x2265; 0.5</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Update the individual <inline-formula><mml:math id="INEQ11"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula> by</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Eq. 17;</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>Else then</bold></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Update the individual <inline-formula><mml:math id="INEQ12"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula> by</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Eq. 18;</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>If</bold><italic>fobj</italic>(<italic>X</italic><sub><italic>temp</italic></sub>) better than <italic>fobj</italic>(<italic>X</italic><sub><italic>i</italic></sub>)</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Update the individual <inline-formula><mml:math id="INEQ13"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula> by</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Eq. 19;</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>End</bold></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>End</bold></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>End</bold></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Update <italic>X<sub>i</sub></italic> according to the fitness</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;function values of <italic>X</italic><sub><italic>temp</italic></sub> and <italic>X<sub>i</sub></italic>;</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>End</bold></monospace><break/>
<monospace>&#x00A0;&#x00A0;<bold>End</bold></monospace></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="S4.SS1.SSS3">
<title>The chase strategy</title>
<p>The chase strategy mainly updates the current individual&#x2019;s position based on the guided individual <inline-formula><mml:math id="INEQ14"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msub><mml:mi>S</mml:mi><mml:mi>g</mml:mi></mml:msub></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:msubsup><mml:mi>s</mml:mi><mml:mi>g</mml:mi><mml:mn>1</mml:mn></mml:msubsup><mml:mo>,</mml:mo><mml:mrow><mml:mpadded width="+6.7pt"><mml:mn>&#x2026;</mml:mn></mml:mpadded><mml:msubsup><mml:mi>s</mml:mi><mml:mi>g</mml:mi><mml:mrow><mml:mi>d</mml:mi><mml:mi>i</mml:mi><mml:mi>m</mml:mi></mml:mrow></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:math></inline-formula> and the global optimal <italic>X</italic><sub><italic>best</italic></sub>. Since the two best individuals influence the current position, the strategy gradually devotes more computing resources to local location exploitation. The chase strategy is divided into two cases as shown in Eq. 20, by comparing the function value of <italic>S<sub>g</sub></italic> and <italic>X<sub>i</sub></italic>.</p>
<disp-formula id="S4.E19"><label>(20)</label><mml:math id="M19"><mml:mrow><mml:mpadded width="+3.3pt"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:mpadded><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mrow><mml:mo>&#x007B;</mml:mo><mml:mtable displaystyle="true" rowspacing="0pt"><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mrow><mml:msubsup><mml:mi>s</mml:mi><mml:mi>g</mml:mi><mml:mi>j</mml:mi></mml:msubsup><mml:mo>+</mml:mo><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mn>10</mml:mn></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>s</mml:mi><mml:mi>g</mml:mi><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mn>11</mml:mn></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:msubsup><mml:mi>s</mml:mi><mml:mi>g</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mo>,</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mi>f</mml:mi><mml:mi>o</mml:mi><mml:mi>b</mml:mi><mml:mi>j</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>S</mml:mi><mml:mi>g</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mpadded width="+3.3pt"><mml:mi>better</mml:mi></mml:mpadded><mml:mpadded width="+3.3pt"><mml:mi>than</mml:mi></mml:mpadded><mml:mi>fobj</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi mathvariant="normal">X</mml:mi><mml:mi mathvariant="normal">i</mml:mi></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup><mml:mo>+</mml:mo><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mn>12</mml:mn></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:msubsup><mml:mi>s</mml:mi><mml:mi>g</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mn>13</mml:mn></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup><mml:mo>-</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:msubsup></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mo>,</mml:mo><mml:mrow><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>w</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mi/></mml:mrow></mml:mrow></mml:math></disp-formula>
<p>where <italic>r</italic><sub>10</sub>, <italic>r</italic><sub>11</sub>, <italic>r</italic><sub>12</sub>, <italic>r</italic><sub>13</sub> denote the random numbers between 0 and 1. The pseudo-code of the chase strategy is shown in <xref ref-type="table" rid="A2">Algorithm 2</xref>.</p>
<table-wrap position="float" id="A2">
<label>Algorithm 2</label>
<caption><p>Pseudo-code of the chase strategy.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<tbody>
<tr>
<td valign="top" align="left">
<monospace>&#x00A0;&#x00A0;<bold>Input:</bold> <italic>N, dim</italic>, object function <italic>fobj</italic>,</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;population <italic>X</italic>(<italic>t</italic>) = &#x007B;<italic>X</italic><sub>1</sub>, &#x2026;, <italic>X</italic><sub><italic>N</italic></sub>&#x007D;.</monospace><break/>
<monospace>&#x00A0;&#x00A0;<bold>Output:</bold> Updated population</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;X(<italic>t</italic> + 1) = &#x007B;<italic>X</italic><sub>1</sub>, &#x2026;, <italic>X</italic><sub><italic>N</italic></sub>&#x007D; and its function</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;value.</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;Find the optimal individual <italic>X</italic><sub><italic>best</italic></sub></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;according to the function value;</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>For</bold> <italic>i</italic> = 1: <italic>N</italic></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>For</bold> <italic>j</italic> = 1: <italic>dim</italic></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Update the individual <inline-formula><mml:math id="INEQ15"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>e</mml:mi><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow><mml:mi>j</mml:mi></mml:msubsup></mml:math></inline-formula> by</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;&#x00A0;Eq. 20;</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;<bold>End</bold></monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;Update <italic>X<sub>i</sub></italic> according to the fitness</monospace><break/>
<monospace>&#x00A0;&#x00A0;&#x00A0;&#x00A0;function values of <italic>X</italic><sub><italic>temp</italic></sub> and <italic>X<sub>i</sub></italic>;</monospace><break/>
<monospace>&#x00A0;&#x00A0;<bold>End</bold></monospace></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="S4.SS1.SSS4">
<title>Implementation of enhanced ant colony optimization for continuous domains</title>
<p>This subsection describes the process of implementing EACOR. Step 1: the parameters of the algorithm are defined. Step 2: the archive is initialized and the fitness value is calculated. Step 3: ACOR&#x2019;s core update formula of is executed. Step 4: the chase strategy is used to further exploit the population position. Step 5: update the population according to the soft besiege strategy. Step 6: remove <italic>N</italic> bad solutions from <italic>k</italic> + <italic>N</italic> individuals in this iteration. Step 7: the optimal individuals are output. The flow chart of EACOR is shown in <xref ref-type="fig" rid="F3">Figure 3</xref>.</p>
<fig id="F3" position="float">
<label>FIGURE 3</label>
<caption><p>Flowchart of EACOR.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g003.tif"/>
</fig>
</sec>
</sec>
<sec id="S4.SS2">
<title>Implementation of the image segmentation model</title>
<p>In this study, a multi-level threshold segmentation method based on EACOR and Kapur&#x2019;s entropy is used to achieve high-quality segmentation of melanoma images. According to the above method description, multi-threshold image segmentation is achieved according to the following steps.</p>
<p>Step 1: The original image is transformed into grayscale and NLM filtering images.</p>
<p>Step 2: The grayscale and NLM filtering images are mapped in an NLM two-dimensional histogram.</p>
<p>Step 3: Kapur&#x2019;s entropy is used as the fitness function for the image information. According to the observation in <xref ref-type="fig" rid="F4">Figure 4</xref>, the most useful image information is distributed in the sub-regions of the main diagonal of the 2D histogram, so we only compute these regions. The objective function is optimized using the EACOR algorithm proposed in this paper. The final optimal value is used as the optimal threshold for this image.</p>
<fig id="F4" position="float">
<label>FIGURE 4</label>
<caption><p>Flowchart of image segmentation.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g004.tif"/>
</fig>
<p>Step 4: The segmented gray image and the color jet colormap image are obtained according to the optimal solution information.</p>
<p>The details of the proposed segmentation model are shown in <xref ref-type="fig" rid="F4">Figure 4</xref>.</p>
</sec>
</sec>
<sec id="S5" sec-type="results">
<title>Experiments and results analysis</title>
<p>In this section, the algorithm&#x2019;s performance was verified in two main aspects: the benchmark function experiment and the image segmentation experiment. For the benchmark function experiments, all experiments were tested on the IEEE CEC2014 benchmark function. In addition, the global optimization performance of EACOR is verified by objective comparison experiments with some advanced methods. The EACOR-based multi-threshold image segmentation method segmented nine melanomas at different thresholds for the image segmentation experiments. Three segmentation quality assessment criteria were used to test the above results. To test whether the obtained data were statistically significant, the Wilcoxon signed-rank test (WSRT) (<xref ref-type="bibr" rid="B25">Garcia et al., 2010</xref>) and the Friedman test (FT) (<xref ref-type="bibr" rid="B21">Derrac et al., 2011</xref>) were used as statistical criteria for the data in this paper.</p>
<p>It is worth noting that &#x2018;+,&#x2019; &#x2018;&#x2212;,&#x2019; and &#x2018;=&#x2019; results appear in the comparison between the baseline function experiment and the image segmentation experiment. &#x2018;+&#x2019; Indicates that the difference between the two results is significant and that the results of the proposed method are better. &#x2018;&#x2212;&#x2019; Indicates that the difference between the two results is significant and that the proposed method results are worse. &#x2018;=&#x2019; Means that the difference between the two results is insignificant, and the performance of the two algorithms can be considered similar.</p>
<p>Moreover, all experiments were performed on a computer with Intel(R) Xeon(R) CPU E5-2620 v4 @ 2.10GHz processor and 16GB RAM, using MATLAB R2018b.</p>
<sec id="S5.SS1">
<title>Experiments on benchmark functions</title>
<sec id="S5.SS1.SSS1">
<title>Experimental conditions and environmental settings</title>
<p>The benchmark function experiments in subsection &#x201C;Experiments on benchmark functions&#x201D; focused on testing the global optimization performance of EACOR. IEEE CEC2014 test suite consists of unimodal, multimodal, hybrid, and composition functions that effectively validate the exploration and exploitation capabilities of the algorithms. Details of all IEEE CEC2014 benchmark functions can be referred to <xref ref-type="bibr" rid="B56">Liang et al. (2013)</xref>. In order to ensure the fairness of the algorithm, all common parameters were standardized, as shown in <xref ref-type="table" rid="T1">Table 1</xref>. In addition, <xref ref-type="table" rid="T2">Table 2</xref> shows the average ranking of the key parameters tested on the 30 functions. It was finally determined that <italic>&#x03BE;</italic> was set to 1, <italic>k</italic> was set to 10, and <italic>q</italic> was set to 0.5.</p>
<table-wrap position="float" id="T1">
<label>TABLE 1</label>
<caption><p>Details of the public parameters.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left">Name</td>
<td valign="top" align="left">Remark</td>
<td valign="top" align="center">Value</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left"><italic>N</italic></td>
<td valign="top" align="left">The population size</td>
<td valign="top" align="center">30</td>
</tr>
<tr>
<td valign="top" align="left"><italic>dim</italic></td>
<td valign="top" align="left">Objective function dimension</td>
<td valign="top" align="center">30</td>
</tr>
<tr>
<td valign="top" align="left"><italic>MaxFEs</italic></td>
<td valign="top" align="left">The maximum number of evaluations</td>
<td valign="top" align="center">300,000</td>
</tr>
<tr>
<td valign="top" align="left"><italic>ub</italic></td>
<td valign="top" align="left">Maximum value available in the search space</td>
<td valign="top" align="center">100</td>
</tr>
<tr>
<td valign="top" align="left"><italic>lb</italic></td>
<td valign="top" align="left">Minimum value available in the search space</td>
<td valign="top" align="center">&#x2212;100</td>
</tr>
<tr>
<td valign="top" align="left"><italic>Flod</italic></td>
<td valign="top" align="left">Number of independent experiments</td>
<td valign="top" align="center">30</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap position="float" id="T2">
<label>TABLE 2</label>
<caption><p>Values of important parameters in EACOR.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left"><italic>&#x03BE;</italic></td>
<td valign="top" align="center">Average rank</td>
<td valign="top" align="center"><italic>k</italic></td>
<td valign="top" align="center">Average rank</td>
<td valign="top" align="center"><italic>q</italic></td>
<td valign="top" align="center">Average rank</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left"><italic>&#x03BE;</italic>(0.5)</td>
<td valign="top" align="center">2.87</td>
<td valign="top" align="center"><italic>k</italic>(5)</td>
<td valign="top" align="center">3.17</td>
<td valign="top" align="center"><italic>q</italic>(0.1)</td>
<td valign="top" align="center">4.17</td>
</tr>
<tr>
<td valign="top" align="left"><italic>&#x03BE;</italic>(0.75)</td>
<td valign="top" align="center">2.73</td>
<td valign="top" align="center"><italic>k</italic>(8)</td>
<td valign="top" align="center">3.13</td>
<td valign="top" align="center"><italic>q</italic>(0.3)</td>
<td valign="top" align="center">3.30</td>
</tr>
<tr>
<td valign="top" align="left"><italic>&#x03BE;</italic>(1)</td>
<td valign="top" align="center"><bold>2.40</bold></td>
<td valign="top" align="center"><italic>k</italic>(10)</td>
<td valign="top" align="center"><bold>2.60</bold></td>
<td valign="top" align="center"><italic>q</italic>(0.5)</td>
<td valign="top" align="center"><bold>2.40</bold></td>
</tr>
<tr>
<td valign="top" align="left"><italic>&#x03BE;</italic>(1.25)</td>
<td valign="top" align="center">2.70</td>
<td valign="top" align="center"><italic>k</italic>(12)</td>
<td valign="top" align="center">2.93</td>
<td valign="top" align="center"><italic>q</italic>(0.7)</td>
<td valign="top" align="center">2.50</td>
</tr>
<tr>
<td valign="top" align="left"><italic>&#x03BE;</italic>(1.5)</td>
<td valign="top" align="center">2.97</td>
<td valign="top" align="center"><italic>k</italic>(15)</td>
<td valign="top" align="center">3.17</td>
<td valign="top" align="center"><italic>q</italic>(0.9)</td>
<td valign="top" align="center">2.63</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>In addition, bold in the table indicates the best data.</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="S5.SS1.SSS2">
<title>The strategy combination comparison test</title>
<p>Enhanced ant colony optimization for continuous domains introduced the soft besiege strategy and the chase strategy. In order to verify whether the two enhanced strategies can improve EACOR&#x2019;s optimization capabilities, a strategy comparison experiment was set up in this subsection. The four combinations of the two strategies are shown in <xref ref-type="table" rid="T3">Table 3</xref>, where &#x2018;1&#x2019; means that the strategy was used and &#x2018;0&#x2019; means that the strategy was not used.</p>
<table-wrap position="float" id="T3">
<label>TABLE 3</label>
<caption><p>Four combinations of two strategies in EACOR.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left">Methods</td>
<td valign="top" align="center">Soft besiege strategy</td>
<td valign="top" align="center">Chase strategy</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">EACOR</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">ACOR_S</td>
<td valign="top" align="center">1</td>
<td valign="top" align="center">0</td>
</tr>
<tr>
<td valign="top" align="left">ACOR_C</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">1</td>
</tr>
<tr>
<td valign="top" align="left">ACOR</td>
<td valign="top" align="center">0</td>
<td valign="top" align="center">0</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="T4">Table 4</xref> shows the rankings of WSRT and FT and the comparison results. For WSRT, EACOR ranked the best of the four algorithms with an average ranking of 1.93 on the 30 benchmark functions. For FT, EACOR ranked first, and its average ranking was 1.98. In the last column of <xref ref-type="table" rid="T4">Table 4</xref>, EACOR had six results that were better than ACOR_S, four results that were worse than ACOR_S, and other results that were like ACOR_S. Compared to ACOR without both strategies, EACOR won in 27 functions and failed in only 2 functions.</p>
<table-wrap position="float" id="T4">
<label>TABLE 4</label>
<caption><p>Comparative results of strategy combination comparison experiment.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left">Methods</td>
<td valign="top" align="center">WSRT</td>
<td valign="top" align="center">FT</td>
<td valign="top" align="center">+/&#x2212;/=</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">EACOR</td>
<td valign="top" align="center"><bold>1 (1.93)</bold></td>
<td valign="top" align="center"><bold>1 (1.98)</bold></td>
<td valign="top" align="center"><bold>&#x223C;</bold></td>
</tr>
<tr>
<td valign="top" align="left">ACOR_S</td>
<td valign="top" align="center">2 (2.07)</td>
<td valign="top" align="center">2 (2.07)</td>
<td valign="top" align="center">6/4/20</td>
</tr>
<tr>
<td valign="top" align="left">ACOR_C</td>
<td valign="top" align="center">3 (2.14)</td>
<td valign="top" align="center">3 (2.21)</td>
<td valign="top" align="center">9/2/19</td>
</tr>
<tr>
<td valign="top" align="left">ACOR</td>
<td valign="top" align="center">4 (3.74)</td>
<td valign="top" align="center">4 (3.76)</td>
<td valign="top" align="center">27/2/1</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>In addition, bold in the table indicates the best data.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>The convergence curves for the four different combinations of the two techniques are shown in <xref ref-type="fig" rid="F5">Figure 5</xref> and <xref ref-type="supplementary-material" rid="DS1">Supplementary Figures B.1</xref>, <xref ref-type="supplementary-material" rid="DS1">B.2</xref>. From the convergence curves, we can see that EACOR has better convergence accuracy than the other three algorithms. Furthermore, it can be seen at F11, F29, and F30 that there was a rapid downward trend in the curves of EACOR and ACOR_S for evaluation numbers between 250,000 and 300,000. It is due to the process of EACOR escaping from the local optimum solution when dealing with some multi-peaked functions. It shows that the soft besiege strategy introduced by the algorithm improved the ability of the algorithm to avoid falling into the local optimum solution.</p>
<fig id="F5" position="float">
<label>FIGURE 5</label>
<caption><p>The convergence curve of the EACOR strategy combination.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g005.tif"/>
</fig>
<p>According to the above analysis, only the ACOR algorithm with both the soft besiege strategy and the chase strategy can reach the optimal state.</p>
</sec>
<sec id="S5.SS1.SSS3">
<title>The qualitative analysis</title>
<p>To analyze the impact of the introduced strategy on ACOR, the search process of EACOR and ACOR was analyzed through 1000 iterations. <xref ref-type="fig" rid="F6">Figure 6</xref> shows the search process of some functions of EACOR on IEEE CEC2014. <xref ref-type="fig" rid="F6">Figure 6A</xref> shows the 3-D search space of the global optimization problems. <xref ref-type="fig" rid="F6">Figure 6B</xref> shows all exploration trajectories in the search space, where the red dot indicates the optimal positions. <xref ref-type="fig" rid="F6">Figure 6C</xref> depicts the algorithm&#x2019;s search trajectory in the first dimension. EACOR&#x2019;s average fitness value is seen in <xref ref-type="fig" rid="F6">Figure 6D</xref>.</p>
<fig id="F6" position="float">
<label>FIGURE 6</label>
<caption><p><bold>(A)</bold> Three-dimensional location distribution of EACOR. <bold>(B)</bold> Distribution of historical search tracks of EACOR. <bold>(C)</bold> Historical trajectory of EACOR&#x2019;s component. <bold>(D)</bold> Average fitness of EACOR.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g006.tif"/>
</fig>
<p><xref ref-type="fig" rid="F6">Figure 6B</xref> demonstrates that most search agents focus their efforts on a local search around the global optimal solution, whereas only a tiny number of search agents conduct a global search for the optimal solution. This shows that EACOR has not only local but also global search capability. <xref ref-type="fig" rid="F6">Figure 6C</xref> shows that EACOR has a sharp oscillation in the search trajectory curve in the early stage of the search, and then the curve becomes smooth. This change ensures that the algorithm improves both the convergence accuracy and the speed of convergence. <xref ref-type="fig" rid="F6">Figure 6D</xref> shows that EACOR has a variety of search agents during the preliminary iterations. The diversity of search agents, on the other hand, decreases as the number of iterations increases. This confirms the transformation of the algorithm from the exploration phase to the exploitation phase.</p>
<p>To further analyze how the introduction mechanism improves the ACOR search capability. We have conducted balanced experiments on the Exploration phase and Exploitation phase of EACOR and ACOR based on 30 functions of IEEE CEC2014. In addition, experiments on the diversity of the two algorithms were conducted. The experimental result is shown in <xref ref-type="fig" rid="F7">Figure 7</xref> and <xref ref-type="supplementary-material" rid="DS1">Supplementary Figures B.3</xref>&#x2013;<xref ref-type="supplementary-material" rid="DS1">B.7</xref>. The red and blue lines in <xref ref-type="fig" rid="F7">Figures 7A,B</xref> represent the Exploration and Exploitation phases, respectively. The first and second column images show the balance test results for EACOR and ACOR, respectively. From the first two columns of test results, it can be seen that the exploitation phase of EACOR and ACOR dominates and facilitates the algorithm to explore the known solutions further. By comparing the exploration and exploitation phases of the two methods, it can be seen that EACOR enhances the algorithm&#x2019;s exploration of the search space and improves the probability of obtaining an optimal solution. A comparison of <xref ref-type="fig" rid="F7">Figures 7A,B</xref> in the same row shows that the search ratio of EACOR in the Exploration phase is significantly higher than that of ACOR. This leads to the situation shown in <xref ref-type="fig" rid="F7">Figure 7C</xref>, where the population diversity of EACOR is significantly larger than that of ACOR at the beginning of the iteration and gradually decreases at the end of the iteration. From the above analysis, we can conclude that EACOR can jump out of the local optimal solution and achieve better convergence accuracy because the global search capability is stronger than that of ACOR.</p>
<fig id="F7" position="float">
<label>FIGURE 7</label>
<caption><p><bold>(A)</bold> The balance tests of EACOR. <bold>(B)</bold> The balance tests of ACOR. <bold>(C)</bold> The diversity tests of EACOR and ACOR.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g007.tif"/>
</fig>
</sec>
<sec id="S5.SS1.SSS4">
<title>The stability experiment of enhanced ant colony optimization for continuous domains</title>
<p>To verify the effect of the real problem dimension component on the EACOR optimization performance (<xref ref-type="bibr" rid="B107">Zhu B. et al., 2018</xref>), this subsection analyzed the experimental results of the EACOR algorithm for 30 benchmark functions in high dimensions (<italic>dim</italic> was set to 50 and 100).</p>
<p><xref ref-type="table" rid="T5">Table 5</xref> shows the ranking of EACOR and ACOR for WSRT and FT in dealing with high dimensional problems and the comparison results. From the table, EACOR was the best in both the WSRT and FT statistical tests in both 50 and 100 dimensions. Furthermore, EACOR achieved stronger optimization results than ACOR for 26 functions in both dimensions, indicating that EACOR can still show excellent optimization performance when dealing with high-dimensional complex problems.</p>
<table-wrap position="float" id="T5">
<label>TABLE 5</label>
<caption><p>Comparative results of stability analysis.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left"></td>
<td valign="top" align="center" colspan="2">dim = 50<hr/></td>
<td valign="top" align="center" colspan="2">dim = 100<hr/></td>
</tr>
<tr>
<td/>
<td valign="top" align="center">EACOR</td>
<td valign="top" align="center">ACOR</td>
<td valign="top" align="center">EACOR</td>
<td valign="top" align="center">ACOR</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">WSRT</td>
<td valign="top" align="center"><bold>1 (1.10)</bold></td>
<td valign="top" align="center">2 (1.90)</td>
<td valign="top" align="center"><bold>1 (1.13)</bold></td>
<td valign="top" align="center">2 (1.87)</td>
</tr>
<tr>
<td valign="top" align="left">FT</td>
<td valign="top" align="center"><bold>1 (1.10)</bold></td>
<td valign="top" align="center">2 (1.90)</td>
<td valign="top" align="center"><bold>1 (1.11)</bold></td>
<td valign="top" align="center">2 (1.89)</td>
</tr>
<tr>
<td valign="top" align="left">+/&#x2212;/=</td>
<td valign="top" align="center"><bold>&#x223C;</bold></td>
<td valign="top" align="center">26/2/2</td>
<td valign="top" align="center"><bold>&#x223C;</bold></td>
<td valign="top" align="center">26/3/1</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>In addition, bold in the table indicates the best data.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>In addition, <xref ref-type="fig" rid="F8">Figures 8</xref>, <xref ref-type="fig" rid="F9">9</xref> show the convergence curve of the algorithm in dealing with high-dimensional problems. Although the algorithm&#x2019;s convergence accuracy was reduced due to the increase in problem dimensionality, EACOR was less affected than the original algorithm. It is worth noting that the convergence curves for F9, F10, F29, and F30 can be observed; EACOR can still jump out of the local optimal solution at the late stage of the iteration in the high dimension. As a result, EACOR was superior in terms of convergence performance and escape from local optimum solutions.</p>
<fig id="F8" position="float">
<label>FIGURE 8</label>
<caption><p>Convergence curves of EACOR and ACOR at 50 dimensions.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g008.tif"/>
</fig>
<fig id="F9" position="float">
<label>FIGURE 9</label>
<caption><p>Convergence curves of EACOR and ACOR at 100 dimensions.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g009.tif"/>
</fig>
</sec>
<sec id="S5.SS1.SSS5">
<title>Comparison experiment with the original algorithms</title>
<p>To enable a more objective evaluation of EACOR&#x2019;s performance, it was compared to ten well-known competitors in this subsection. These algorithms included ACOR, DE, FA, GWO, WOA, HHO, MFO, SCA, SFS, and TSA.</p>
<p><xref ref-type="table" rid="T6">Table 6</xref> shows the average ranking of the optimization results for the 30 benchmark functions. Among the 11 methods, EACOR ranked first in both WSRT and FT, with an average ranking of 2.37 and 2.77, respectively. The suboptimal method is DE, which has an average ranking of 2.97 and 3.2 for WSRT and FT, respectively. Furthermore, EACOR can beat DE on 18 functions, while DE outperformed EACOR on only 10 functions, and the other two results were considered equal. It is noteworthy that the worst-performing method of both statistical methods was ACOR, which shows that the improvement strategy proposed in this study can adequately improve the algorithm&#x2019;s performance.</p>
<table-wrap position="float" id="T6">
<label>TABLE 6</label>
<caption><p>Comparative results of EACOR with ten original algorithms.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left">Methods</td>
<td valign="top" align="center" colspan="2">WSRT<hr/></td>
<td valign="top" align="center" colspan="2">FT<hr/></td>
<td valign="top" align="center">+/&#x2212;/=</td>
</tr>
<tr>
<td/>
<td valign="top" align="center">Avg.</td>
<td valign="top" align="center">Rank</td>
<td valign="top" align="center">Avg.</td>
<td valign="top" align="center">Rank</td>
<td/>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">EACOR</td>
<td valign="top" align="center"><bold>2.37</bold></td>
<td valign="top" align="center"><bold>1</bold></td>
<td valign="top" align="center"><bold>2.77</bold></td>
<td valign="top" align="center"><bold>1</bold></td>
<td valign="top" align="center"><bold>&#x223C;</bold></td>
</tr>
<tr>
<td valign="top" align="left">ACOR</td>
<td valign="top" align="center">9.53</td>
<td valign="top" align="center">11</td>
<td valign="top" align="center">9.31</td>
<td valign="top" align="center">11</td>
<td valign="top" align="center">26/2/2</td>
</tr>
<tr>
<td valign="top" align="left">DE</td>
<td valign="top" align="center">2.97</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">3.2</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">18/10/2</td>
</tr>
<tr>
<td valign="top" align="left">FA</td>
<td valign="top" align="center">9.37</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">9.21</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">27/1/2</td>
</tr>
<tr>
<td valign="top" align="left">GWO</td>
<td valign="top" align="center">5.17</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">5.14</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">23/3/4</td>
</tr>
<tr>
<td valign="top" align="left">HHO</td>
<td valign="top" align="center">4.03</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">4.28</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">18/3/9</td>
</tr>
<tr>
<td valign="top" align="left">MFO</td>
<td valign="top" align="center">7.2</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">6.96</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">26/3/1</td>
</tr>
<tr>
<td valign="top" align="left">SCA</td>
<td valign="top" align="center">8.7</td>
<td valign="top" align="center">9</td>
<td valign="top" align="center">8.71</td>
<td valign="top" align="center">9</td>
<td valign="top" align="center">27/1/2</td>
</tr>
<tr>
<td valign="top" align="left">WOA</td>
<td valign="top" align="center">6.63</td>
<td valign="top" align="center">7</td>
<td valign="top" align="center">6.43</td>
<td valign="top" align="center">7</td>
<td valign="top" align="center">25/3/2</td>
</tr>
<tr>
<td valign="top" align="left">SFS</td>
<td valign="top" align="center">4.67</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">4.82</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">20/3/7</td>
</tr>
<tr>
<td valign="top" align="left">TSA</td>
<td valign="top" align="center">4.97</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">5.19</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">24/3/3</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>In addition, bold in the table indicates the best data.</p></fn>
</table-wrap-foot>
</table-wrap>
<p><xref ref-type="fig" rid="F10">Figure 10</xref> and <xref ref-type="supplementary-material" rid="DS1">Supplementary Figures B.12</xref>, <xref ref-type="supplementary-material" rid="DS1">B.13</xref> show the convergence of the 11 algorithms on 30 benchmark functions. We can see that EACOR is at the bottom of the convergence curve. In F1, F6, F9, F21, F30, and EACOR finds better solutions and converges faster than the other algorithms. In F1, F9, F17, F20, F21, F30, and EACOR still finds better solutions at the end of the iterations, especially in F21, EACOR converges at the beginning of the iteration with accuracy second to that of DE, but EACOR&#x2019;s advantage of jumping out of the local optimum at the end of the iteration makes the result better than DE&#x2019;s result.</p>
<fig id="F10" position="float">
<label>FIGURE 10</label>
<caption><p>Convergence curves of EACOR with ten original algorithms.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g010.tif"/>
</fig>
<p>The means and standard deviations of 30 independent runs of the experiments indicate that the algorithm can obtain excellent and stable optimization results. WSRT and FT demonstrate the statistical significance of the experimental results. Overall, EACOR is more competitive than some advanced and original algorithms.</p>
</sec>
<sec id="S5.SS1.SSS6">
<title>Comparison experiments with the peers</title>
<p>To further demonstrate the superiority of the EACOR algorithm in terms of performance, EACOR was compared with ten other excellent improved algorithms. These peers were CDLOBA, CBA, HGWO, ASCA_PSO, SCADE, m_SCA, IGWO, OBLGWO, ACWOA, and BMWOA.</p>
<p><xref ref-type="table" rid="T7">Table 7</xref> shows the ranking of EACOR with these ten peers for both statistical methods. EACOR performed best in WSRT and FT, with an average ranking of 2.17 and 2.62, respectively. In addition, EACOR can beat the second-ranked IGWO on 23 functions and be disadvantaged on only 4 functions. The various comparisons in <xref ref-type="table" rid="T7">Table 7</xref> show that EACOR has better optimization performance and can handle different optimization problems better.</p>
<table-wrap position="float" id="T7">
<label>TABLE 7</label>
<caption><p>Comparative results of EACOR with ten peers.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left">Methods</td>
<td valign="top" align="center" colspan="2">WSRT<hr/></td>
<td valign="top" align="center" colspan="2">FT<hr/></td>
<td valign="top" align="center">+/&#x2212;/=</td>
</tr>
<tr>
<td/>
<td valign="top" align="center">Avg.</td>
<td valign="top" align="center">Rank</td>
<td valign="top" align="center">Avg.</td>
<td valign="top" align="center">Rank</td>
<td/>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">EACOR</td>
<td valign="top" align="center"><bold>2.17</bold></td>
<td valign="top" align="center"><bold>1</bold></td>
<td valign="top" align="center"><bold>2.62</bold></td>
<td valign="top" align="center"><bold>1</bold></td>
<td valign="top" align="center"><bold>&#x223C;</bold></td>
</tr>
<tr>
<td valign="top" align="left">CDLOBA</td>
<td valign="top" align="center">6.67</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">6.31</td>
<td valign="top" align="center">7</td>
<td valign="top" align="center">22/3/5</td>
</tr>
<tr>
<td valign="top" align="left">CBA</td>
<td valign="top" align="center">5.93</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">5.71</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">21/3/6</td>
</tr>
<tr>
<td valign="top" align="left">HGWO</td>
<td valign="top" align="center">7.57</td>
<td valign="top" align="center">9</td>
<td valign="top" align="center">7.45</td>
<td valign="top" align="center">9</td>
<td valign="top" align="center">24/3/3</td>
</tr>
<tr>
<td valign="top" align="left">ASCA_PSO</td>
<td valign="top" align="center">6.33</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">6.19</td>
<td valign="top" align="center">6</td>
<td valign="top" align="center">26/1/3</td>
</tr>
<tr>
<td valign="top" align="left">SCADE</td>
<td valign="top" align="center">8.93</td>
<td valign="top" align="center">11</td>
<td valign="top" align="center">8.97</td>
<td valign="top" align="center">11</td>
<td valign="top" align="center">24/2/4</td>
</tr>
<tr>
<td valign="top" align="left">m_SCA</td>
<td valign="top" align="center">5.93</td>
<td valign="top" align="center">4</td>
<td valign="top" align="center">5.93</td>
<td valign="top" align="center">5</td>
<td valign="top" align="center">25/3/2</td>
</tr>
<tr>
<td valign="top" align="left">IGWO</td>
<td valign="top" align="center">3.73</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">4.12</td>
<td valign="top" align="center">2</td>
<td valign="top" align="center">23/4/3</td>
</tr>
<tr>
<td valign="top" align="left">OBLGWO</td>
<td valign="top" align="center">4.27</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">4.57</td>
<td valign="top" align="center">3</td>
<td valign="top" align="center">24/2/4</td>
</tr>
<tr>
<td valign="top" align="left">ACWOA</td>
<td valign="top" align="center">7.63</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">7.54</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">23/3/4</td>
</tr>
<tr>
<td valign="top" align="left">BMWOA</td>
<td valign="top" align="center">6.43</td>
<td valign="top" align="center">7</td>
<td valign="top" align="center">6.59</td>
<td valign="top" align="center">8</td>
<td valign="top" align="center">28/1/1</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn><p>In addition, bold in the table indicates the best data.</p></fn>
</table-wrap-foot>
</table-wrap>
<p><xref ref-type="fig" rid="F11">Figure 11</xref> and <xref ref-type="supplementary-material" rid="DS1">Supplementary Figures B.14</xref>, <xref ref-type="supplementary-material" rid="DS1">B.15</xref> show the convergence of EACOR with ten advanced peer methods on IEEE CEC2014, and it can be seen that EACOR can achieve better optimization results in most functions compared to other methods. In addition, by looking at F3, F16, and F29, we can see that the convergence curves of EACOR are still significantly skewed in the late iterations, which indicates that EACOR has an excellent ability to jump out of the local optimal solution.</p>
<fig id="F11" position="float">
<label>FIGURE 11</label>
<caption><p>Convergence curves of EACOR with ten peers.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g011.tif"/>
</fig>
<p>Based on the above analysis, we can conclude that EACOR still has significant advantages not only compared with the original algorithm but also compared with the improved algorithm in terms of convergence accuracy, convergence speed, and prevention of premature convergence.</p>
</sec>
</sec>
<sec id="S5.SS2">
<title>Experiments on image segmentation</title>
<p>To validate the performance of the EACOR-based multi-level threshold image segmentation model proposed in this paper, we used image segmentation on nine real melanoma pathology images and compared them with some well-known algorithms. The original pathology images and the non-local mean two-dimensional histogram are shown in <xref ref-type="supplementary-material" rid="DS1">Supplementary Figure B.16</xref>. Notably, we conducted experiments at different thresholds to investigate the competitive performance of the proposed segmentation method at different thresholds. Then, the obtained segmentation results were analyzed.</p>
<sec id="S5.SS2.SSS1">
<title>Validation criteria for image quality</title>
<p>In order to judge the quality of the segmented image, three methods, PSNR, SSIM, and FSIM, were used to evaluate the segmentation results. <xref ref-type="table" rid="T8">Table 8</xref> describes the evaluation methods PSNR, SSIM, and FSIM.</p>
<table-wrap position="float" id="T8">
<label>TABLE 8</label>
<caption><p>Image quality evaluation index.</p></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left">Name</td>
<td valign="top" align="left">Formula</td>
<td valign="top" align="left">Remark</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">PSNR (<xref ref-type="bibr" rid="B38">Huynh-Thu and Ghanbari, 2008</xref>)</td>
<td valign="top" align="left"><italic>PSNR</italic> = 10&#x22C5;<italic>log</italic><sub>10</sub>(<italic>peak</italic><sup>2</sup>)/<italic>MSE</italic></td>
<td valign="top" align="left">The larger PSNR value between the two images indicates that the image has less distortion after compression.</td>
</tr>
<tr>
<td valign="top" align="left">FSIM (<xref ref-type="bibr" rid="B104">Zhang et al., 2011</xref>)</td>
<td valign="top" align="left"><bold><inline-formula><mml:math id="INEQ16"><mml:mrow><mml:mrow><mml:mi>F</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mpadded width="+3.3pt"><mml:mi>M</mml:mi></mml:mpadded></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mfrac><mml:mrow><mml:mstyle displaystyle="false"><mml:msub><mml:mo largeop="true" symmetric="true">&#x2211;</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi mathvariant="normal">&#x03A9;</mml:mi></mml:mrow></mml:msub></mml:mstyle><mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>S</mml:mi><mml:mi>L</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mo>&#x22C5;</mml:mo><mml:mi>P</mml:mi></mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mi>m</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow><mml:mrow><mml:mstyle displaystyle="false"><mml:msub><mml:mo largeop="true" symmetric="true">&#x2211;</mml:mo><mml:mrow><mml:mi>x</mml:mi><mml:mo>&#x2208;</mml:mo><mml:mi mathvariant="normal">&#x03A9;</mml:mi></mml:mrow></mml:msub></mml:mstyle><mml:mrow><mml:mi>P</mml:mi><mml:msub><mml:mi>C</mml:mi><mml:mi>m</mml:mi></mml:msub><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mi>x</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula></bold></td>
<td valign="top" align="left">The larger the FSIM value obtained, the better the segmentation effect.</td>
</tr>
<tr>
<td valign="top" align="left">SSIM (<xref ref-type="bibr" rid="B89">Wang et al., 2014</xref>)</td>
<td valign="top" align="left"><inline-formula><mml:math id="INEQ17"><mml:mrow><mml:mrow><mml:mi>S</mml:mi><mml:mi>S</mml:mi><mml:mi>I</mml:mi><mml:mpadded width="+3.3pt"><mml:mi>M</mml:mi></mml:mpadded></mml:mrow><mml:mo lspace="2.8pt" rspace="2.8pt">=</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>I</mml:mi></mml:msub><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mi>K</mml:mi></mml:msub></mml:mrow><mml:mo>+</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:msub><mml:mi mathvariant="normal">&#x03C3;</mml:mi><mml:mrow><mml:mi>I</mml:mi><mml:mi>K</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>-</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msubsup><mml:mi>&#x03BC;</mml:mi><mml:mi>I</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi>&#x03BC;</mml:mi><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mn>1</mml:mn></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msubsup><mml:mi mathvariant="normal">&#x03C3;</mml:mi><mml:mi>I</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msubsup><mml:mi mathvariant="normal">&#x03C3;</mml:mi><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msubsup><mml:mo>+</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:math></inline-formula></td>
<td valign="top" align="left">The larger the SSIM value between two images, the smaller the image distortion, and its value range is [0, 1].</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>After obtaining the above three criteria, the evaluation data were statistically analyzed using the mean, standard deviation, WSRT, and FT. The final evaluation data of the image segmentation effect were obtained.</p>
</sec>
<sec id="S5.SS2.SSS2">
<title>Melanoma image segmentation experiment</title>
<p>Since melanoma can be easily confused with a pigmented nevus, there are some mistakes in the process of pathological image detection. To segment melanoma effectively, we use the MTIS technique to segment melanoma pathological images. To see more clearly the value of EACOR in melanoma image segmentation, 9 pathological images of melanoma were segmented at 5 thresholds by EACOR with 9 similar algorithms, namely ACOR, CS, GWO, HHO, SCA, ACWOA, IGWO, m_SCA, and SCADE, according to the evaluation method in subsection &#x201C;Validation criteria for image quality.&#x201D;</p>
<p><xref ref-type="fig" rid="F12">Figure 12</xref> shows the jet colormap and gray images obtained after segmentation of nine melanoma images by each method. It is easy to observe that the image segmentation obtained by SCA and IGWO was inferior to the other methods. However, EACOR, ACOR, and CS were visually difficult to distinguish the segmentation quality. Therefore, in subsequent experiments, the performance of the methods was compared more visually through the three evaluation methods.</p>
<fig id="F12" position="float">
<label>FIGURE 12</label>
<caption><p>Segmentation results of all algorithms.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g012.tif"/>
</fig>
<p><xref ref-type="supplementary-material" rid="DS1">Supplementary Tables A.1</xref>&#x2013;<xref ref-type="supplementary-material" rid="DS1">A.3</xref> compare FSIM, PSNR, and SSIM at different thresholds. As can be seen from the table, EACOR ranked first for all thresholds. Furthermore, the difference between EACOR and ACOR for segmentation of 9 images was small at thresholds 4, 8, and 12. However, at 16 and 20 thresholds, most images segmented using EACOR were significantly better than those obtained with ACOR. <xref ref-type="fig" rid="F13">Figures 13</xref>&#x2013;<xref ref-type="fig" rid="F15">15</xref> show the three image evaluation metric scores at each threshold. The mean values of FSIM, PSNR, and SSIM were the highest for EACOR, indicating that the EACOR-based image segmentation method can achieve high-quality segmentation of melanoma images. And by comparing the thresholding results of the five levels of thresholding an increase in the threshold level between the experimentally set threshold levels is beneficial in improving the segmentation results. To further verify the significance of the obtained results, the experimental results were further analyzed by the Friedman test. <xref ref-type="fig" rid="F16">Figures 16</xref>&#x2013;<xref ref-type="fig" rid="F18">18</xref> show the FT results of the three evaluation criteria. The three FT results show that EACOR was the best compared to the other algorithms with the same conditions. The combination of FSIM, PSNR, and SSIM shows that the melanoma images obtained by this method retain more useful image features and have less image distortion.</p>
<fig id="F13" position="float">
<label>FIGURE 13</label>
<caption><p>FSIM results at different thresholds for nine melanoma images.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g013.tif"/>
</fig>
<fig id="F14" position="float">
<label>FIGURE 14</label>
<caption><p>PSNR results at different thresholds for nine melanoma images.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g014.tif"/>
</fig>
<fig id="F15" position="float">
<label>FIGURE 15</label>
<caption><p>SSIM results at different thresholds for nine melanoma images.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g015.tif"/>
</fig>
<fig id="F16" position="float">
<label>FIGURE 16</label>
<caption><p>FT result of FSIM evaluation at different thresholds for nine melanoma images.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g016.tif"/>
</fig>
<fig id="F17" position="float">
<label>FIGURE 17</label>
<caption><p>FT result of PSNR evaluation at different thresholds for nine melanoma images.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g017.tif"/>
</fig>
<fig id="F18" position="float">
<label>FIGURE 18</label>
<caption><p>FT result of SSIM evaluation at different thresholds for nine melanoma images.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g018.tif"/>
</fig>
<p>As the proposed image segmentation framework used Kapur&#x2019;s entropy as the objective function of the segmentation threshold. Therefore, the larger Kapur&#x2019;s entropy value indicates that the maximum amount of information is retained between the background and the target, which is more conducive to improving image segmentation quality. <xref ref-type="supplementary-material" rid="DS1">Supplementary Table A.4</xref> shows that the maximum of Kapur&#x2019;s entropy is obtained for different thresholds, and EACOR can still obtain the optimal Kapur&#x2019;s entropy value in most cases. <xref ref-type="fig" rid="F19">Figure 19</xref> shows the convergence curves for each algorithm for nine images at 20 levels of thresholding. Based on the above analysis of Kapur&#x2019;s entropy, the most reasonable solution was obtained by EACOR, followed by ACOR. Finally, <xref ref-type="supplementary-material" rid="DS1">Supplementary Figures B.17</xref>&#x2013;<xref ref-type="supplementary-material" rid="DS1">B.25</xref> show the optimal set of thresholds for the 9 images at 8 levels of thresholding.</p>
<fig id="F19" position="float">
<label>FIGURE 19</label>
<caption><p>The convergence curve of 20-level threshold segmentation.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fninf-16-1041799-g019.tif"/>
</fig>
</sec>
</sec>
</sec>
<sec id="S6" sec-type="discussion">
<title>Discussion</title>
<p>We can draw the following conclusions based on the experimental results in subsection &#x201C;Experiments on benchmark functions.&#x201D; First, when EACOR is compared with ACOR in a higher dimension of the same function, the convergence of EACOR becomes faster, and the convergence accuracy is higher. It shows that EACOR has a better and more stable optimization performance than ACOR in different dimensions. Second, in analyzing the effect of the soft besiege strategy and the chase strategy on ACOR, the soft besiege strategy balances the exploration and development phases so that the global search ability of EACOR becomes weaker with increasing iterations. The local search ability becomes more robust with increasing iterations, effectively solving the problem of insufficient convergence accuracy of ACOR. Moreover, by observing the EACOR search process, we can conclude that EACOR can still perform the global search while performing the local search at the end. The chase strategy can increase the local search capability of EACOR. Thirdly, comparing EACOR with some peers and variants further demonstrates the strong optimization capability of EACOR. As a result, EACOR can cope with different complex optimization problems.</p>
<p>In subsection &#x201C;Experiments on image segmentation,&#x201D; the results of FSIM, PSNR, and SSIM are evaluated by analyzing 4, 8, 12, 16, and 20 thresholds. Then the convergence curves of mean, standard deviation, WSRT, FT, and optimal threshold combinations are used to verify the segmentation effectiveness of the EACOR-based multi-threshold segmentation method. Firstly, based on the results of 30 experimental means and standard deviations, it can be concluded that the experimental results are not coincidental, and EACOR shows excellent stability and segmentation ability. Secondly, based on the comparison results of WSRT and FT at 5 different thresholds, EACOR outperforms other segmentation methods at all thresholds, and as the threshold level increases, EACOR&#x2019;s WSRT and FT results become better. This indicates that the higher the threshold value within a certain threshold range, the better EACOR&#x2019;s segmentation results become. Thirdly, combining the optimal threshold combinations and the adaptation convergence curves of each method shows that EACOR can find the optimal threshold combination in the shortest time. The segmentation efficiency of the model is improved. It can be obtained through global optimization and image segmentation experiments that the EACOR-based multi-threshold Kapur&#x2019;s entropy segmentation method is an excellent segmentation tool for melanoma images, which can provide samples with less redundant information for subsequent computer-aided diagnosis.</p>
<p>Because it is based on an improvement of the original algorithm, it inevitably makes the EACOR calculation more complex. The significant improvement in optimization performance makes the increased computational cost acceptable. Moreover, this problem can be overcome in subsequent work by introducing parallel computing techniques and high arithmetic devices. The superior optimization performance of EACOR ensures efficient image segmentation models, and provide greater possibilities for application to other fields in the future, such as disease prediction (<xref ref-type="bibr" rid="B84">Su et al., 2019</xref>; <xref ref-type="bibr" rid="B51">Li L. et al., 2021</xref>), recommender system (<xref ref-type="bibr" rid="B50">Li et al., 2014</xref>, <xref ref-type="bibr" rid="B49">2017</xref>), information retrieval services (<xref ref-type="bibr" rid="B91">Wu et al., 2020a</xref>, <xref ref-type="bibr" rid="B92">2021b</xref>), human activity recognition (<xref ref-type="bibr" rid="B73">Qiu et al., 2022</xref>), colorectal polyp region extraction (<xref ref-type="bibr" rid="B33">Hu K. et al., 2022</xref>), location-based services (<xref ref-type="bibr" rid="B93">Wu et al., 2020b</xref>, <xref ref-type="bibr" rid="B90">2021a</xref>), text clustering (<xref ref-type="bibr" rid="B26">Guan et al., 2020</xref>), essay recommendation (<xref ref-type="bibr" rid="B55">Liang et al., 2021</xref>), image denoising (<xref ref-type="bibr" rid="B105">Zhang et al., 2020</xref>), drug-disease associations prediction (<xref ref-type="bibr" rid="B9">Cai et al., 2021</xref>), other disease image segmentation (<xref ref-type="bibr" rid="B72">Qi et al., 2022</xref>; <xref ref-type="bibr" rid="B75">Ren et al., 2022</xref>; <xref ref-type="bibr" rid="B83">Su et al., 2022</xref>), dynamic module detection (<xref ref-type="bibr" rid="B61">Ma et al., 2020</xref>; <xref ref-type="bibr" rid="B48">Li D. et al., 2021</xref>), drug discovery (<xref ref-type="bibr" rid="B108">Zhu F. et al., 2018</xref>; <xref ref-type="bibr" rid="B54">Li Y. et al., 2020</xref>), and road network planning (<xref ref-type="bibr" rid="B36">Huang et al., 2022</xref>).</p>
</sec>
<sec id="S7" sec-type="conclusion">
<title>Conclusion and future works</title>
<p>To obtain higher quality segmentation results of pathological images in melanoma, this paper proposes a high-quality improvement algorithm EACOR based on ACOR. We also propose an MTIS method based on EACOR and Kapur&#x2019;s entropy. EACOR introduces the soft besiege strategy and the chase strategy based on ACOR. In addition to addressing ACOR&#x2019;s convergence speed and accuracy shortcomings, it enhances the ability of global search to keep the algorithm from falling into a local optimum. The following experiments were conducted to evaluate the usefulness of EACOR in practical applications. The first step is to assess EACOR&#x2019;s ability to optimize its performance. On 30 benchmark functions from IEEE CEC2014, we tested EACOR and used the WSRT and the FT to analyze the results of our experiments statistically. We performed quantitative and qualitative analysis of the new strategy by a series of experiments, and the results showed that the soft besiege strategy and the chase strategy could enhance the optimization capability of EACOR. The stability of EACOR is demonstrated through high-dimensional experiments. To further validate the optimization performance of EACOR, we compare EACOR with 10 peers with excellent performance and 10 variants of the algorithm. The experimental results show that EACOR has the best optimization performance among these 20 similar algorithms. In the second step, we validate the segmentation effect of EACOR on melanoma images. For nine genuine melanoma pathology images, we used EACOR to conduct MTIS with EACOR. The NLM and two-dimensional histogram at the heart of MTIS is used in conjunction with the EACOR method to determine the best threshold for Kapur&#x2019;s entropy. To fully demonstrate the segmentation capability of EACOR, we evaluate the segmentation results obtained by EACOR at 4, 8, 12, 16, 20 thresholds using FSIM, PSNR, SSIM as segmentation criteria. In the image segmentation experiments, we added 9 similar algorithms to compare with EACOR. The experimental results show that EACOR can perform effective MTIS for more complex melanoma images.</p>
<p>In future work, we will apply the powerful optimization capabilities of EACOR to other areas. For example, engineering optimization problems, feature selection, photovoltaic parameter identification and bankruptcy prediction are among the practical problems. In addition, the main area of EACOR is the segmentation of pathological images so we will use EACOR for more segmentation of melanoma pathological images. It is hoped that the quality of segmentation of pathological images from other diseases, including HE staining or immunohistochemical (IHC) staining can be applied to practice and improved.</p>
</sec>
<sec id="S8" sec-type="data-availability">
<title>Data availability statement</title>
<p>The original contributions presented in this study are included in the article/<xref ref-type="supplementary-material" rid="DS1">Supplementary materials</xref>, further inquiries can be directed to the corresponding authors.</p>
</sec>
<sec id="S9">
<title>Author contributions</title>
<p>XYa, XYe, AH, and ZX contributed to writing&#x2014;original draft, writing&#x2014;review and editing, software, visualization, and investigation. DZ, HC, and YL contributed to conceptualization, methodology, formal analysis, investigation, writing&#x2014;review and editing, funding acquisition, and supervision. All authors contributed to the article and approved the submitted version.</p>
</sec>
</body>
<back>
<sec id="S10" sec-type="funding-information">
<title>Funding</title>
<p>The patients&#x2019; data and the pathological sections were evaluated and provided by the Department of Pathology, The First Affiliated Hospital of Wenzhou Medical University, Wenzhou, Zhejiang, China. This work was supported by the Wenzhou Scientific and Technological Project (Y20180656) and the Natural Science Foundation of Jilin Provincial (No. 20200201053JC), &#x201C;Thirteenth Five-Year&#x201D; Science and Technology Project of Jilin Provincial Department of Education (JJKH20200829KJ), Changchun Normal University Ph.D. Research Startup Funding Project (BS [2020]), and the National Natural Science Foundation of China (62076185 and U1809209).</p>
</sec>
<sec id="S11" sec-type="COI-statement">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="S12" sec-type="disclaimer">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<sec id="S13" sec-type="supplementary-material">
<title>Supplementary material</title>
<p>The Supplementary Material for this article can be found online at: <ext-link ext-link-type="uri" xlink:href="https://www.frontiersin.org/articles/10.3389/fninf.2022.1041799/full#supplementary-material">https://www.frontiersin.org/articles/10.3389/fninf.2022.1041799/full#supplementary-material</ext-link></p>
<supplementary-material xlink:href="Data_Sheet_1.PDF" id="DS1" mimetype="application/pdf" xmlns:xlink="http://www.w3.org/1999/xlink"/>
</sec>
<ref-list>
<title>References</title>
<ref id="B1"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Adarsh</surname> <given-names>B. R.</given-names></name> <name><surname>Raghunathan</surname> <given-names>T.</given-names></name> <name><surname>Jayabarathi</surname> <given-names>T.</given-names></name> <name><surname>Yang</surname> <given-names>X.-S.</given-names></name></person-group> (<year>2016</year>). <article-title>Economic dispatch using chaotic bat algorithm.</article-title> <source><italic>Energy</italic></source> <volume>96</volume> <fpage>666</fpage>&#x2013;<lpage>675</lpage>. <pub-id pub-id-type="doi">10.1016/j.energy.2015.12.096</pub-id></citation></ref>
<ref id="B2"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ahmadianfar</surname> <given-names>I.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Gandomi</surname> <given-names>A. H.</given-names></name> <name><surname>Chu</surname> <given-names>X.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name></person-group> (<year>2021</year>). <article-title>RUN beyond the metaphor: An efficient optimization algorithm based on runge kutta method.</article-title> <source><italic>Exp. Syst. Appl.</italic></source> <volume>181</volume>:<fpage>115079</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2021.115079</pub-id></citation></ref>
<ref id="B3"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ahmadianfar</surname> <given-names>I.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Noshadian</surname> <given-names>S.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Gandomi</surname> <given-names>A. H.</given-names></name></person-group> (<year>2022</year>). <article-title>INFO: An efficient optimization algorithm based on weighted mean of vectors.</article-title> <source><italic>Exp. Syst. Appl.</italic></source> <volume>195</volume>:<fpage>116516</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2022.116516</pub-id></citation></ref>
<ref id="B4"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ahn</surname> <given-names>E.</given-names></name> <name><surname>Kim</surname> <given-names>J.</given-names></name> <name><surname>Bi</surname> <given-names>L.</given-names></name> <name><surname>Kumar</surname> <given-names>A.</given-names></name> <name><surname>Li</surname> <given-names>C.</given-names></name> <name><surname>Fulham</surname> <given-names>M.</given-names></name><etal/></person-group> (<year>2017</year>). <article-title>Saliency-based lesion segmentation via background detection in dermoscopic images.</article-title> <source><italic>IEEE J. Biomed. Health Inform.</italic></source> <volume>21</volume> <fpage>1685</fpage>&#x2013;<lpage>1693</lpage>. <pub-id pub-id-type="doi">10.1109/JBHI.2017.2653179</pub-id> <pub-id pub-id-type="pmid">28092585</pub-id></citation></ref>
<ref id="B5"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Albittar</surname> <given-names>A. A.</given-names></name> <name><surname>Alhalabi</surname> <given-names>O.</given-names></name> <name><surname>Glitza Oliva</surname> <given-names>I. C.</given-names></name></person-group> (<year>2020</year>). <article-title>Immunotherapy for Melanoma.</article-title> <source><italic>Adv. Exp. Med. Biol.</italic></source> <volume>1244</volume> <fpage>51</fpage>&#x2013;<lpage>68</lpage>. <pub-id pub-id-type="doi">10.1007/978-3-030-41008-7_3</pub-id></citation></ref>
<ref id="B6"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Al-Masni</surname> <given-names>M. A.</given-names></name> <name><surname>Al-Antari</surname> <given-names>M. A.</given-names></name> <name><surname>Choi</surname> <given-names>M. T.</given-names></name> <name><surname>Han</surname> <given-names>S. M.</given-names></name> <name><surname>Kim</surname> <given-names>T. S.</given-names></name></person-group> (<year>2018</year>). <article-title>Skin lesion segmentation in dermoscopy images via deep full resolution convolutional networks.</article-title> <source><italic>Comp. Methods Prog. Biomed.</italic></source> <volume>162</volume> <fpage>221</fpage>&#x2013;<lpage>231</lpage>. <pub-id pub-id-type="doi">10.1016/j.cmpb.2018.05.027</pub-id> <pub-id pub-id-type="pmid">29903489</pub-id></citation></ref>
<ref id="B7"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bi</surname> <given-names>L.</given-names></name> <name><surname>Kim</surname> <given-names>J.</given-names></name> <name><surname>Ahn</surname> <given-names>E.</given-names></name> <name><surname>Kumar</surname> <given-names>A.</given-names></name> <name><surname>Fulham</surname> <given-names>M.</given-names></name> <name><surname>Feng</surname> <given-names>D.</given-names></name></person-group> (<year>2017</year>). <article-title>Dermoscopic image segmentation via multistage fully convolutional networks.</article-title> <source><italic>IEEE Trans. Biomed. Eng.</italic></source> <volume>64</volume> <fpage>2065</fpage>&#x2013;<lpage>2074</lpage>. <pub-id pub-id-type="doi">10.1109/TBME.2017.2712771</pub-id> <pub-id pub-id-type="pmid">28600236</pub-id></citation></ref>
<ref id="B8"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Buades</surname> <given-names>A.</given-names></name> <name><surname>Coll</surname> <given-names>B.</given-names></name> <name><surname>Morel</surname> <given-names>J.</given-names></name></person-group> (<year>2005</year>). &#x201C;<article-title>A non-local algorithm for image denoising</article-title>,&#x201D; in <source><italic>Proceedings of the 2005 IEEE computer society conference on computer vision and pattern recognition (CVPR&#x2019;05)</italic></source> (<publisher-loc>San Diego, CA</publisher-loc>: <publisher-name>IEEE</publisher-name>).</citation></ref>
<ref id="B9"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cai</surname> <given-names>L.</given-names></name> <name><surname>Lu</surname> <given-names>C.</given-names></name> <name><surname>Xu</surname> <given-names>J.</given-names></name> <name><surname>Meng</surname> <given-names>Y.</given-names></name> <name><surname>Wang</surname> <given-names>P.</given-names></name> <name><surname>Fu</surname> <given-names>X.</given-names></name><etal/></person-group> (<year>2021</year>). <article-title>Drug repositioning based on the heterogeneous information fusion graph convolutional network.</article-title> <source><italic>Brief. Bioinform.</italic></source> <volume>22</volume>:<fpage>bbab319</fpage>. <pub-id pub-id-type="doi">10.1093/bib/bbab319</pub-id> <pub-id pub-id-type="pmid">34378011</pub-id></citation></ref>
<ref id="B10"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cai</surname> <given-names>Z.</given-names></name> <name><surname>Gu</surname> <given-names>J.</given-names></name> <name><surname>Luo</surname> <given-names>J.</given-names></name> <name><surname>Zhang</surname> <given-names>Q.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Pan</surname> <given-names>Z.</given-names></name><etal/></person-group> (<year>2019</year>). <article-title>Evolving an optimal kernel extreme learning machine by using an enhanced grey wolf optimization strategy.</article-title> <source><italic>Exp. Syst. Appl.</italic></source> <volume>138</volume>:<fpage>112814</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2019.07.031</pub-id></citation></ref>
<ref id="B11"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Camacho Villal&#x00F3;n</surname> <given-names>C. L.</given-names></name> <name><surname>St&#x00FC;tzle</surname> <given-names>T.</given-names></name> <name><surname>Dorigo</surname> <given-names>M.</given-names></name></person-group> (<year>2020</year>). &#x201C;<article-title>Grey wolf, firefly and bat algorithms: Three widespread algorithms that do not contain any novelty</article-title>,&#x201D; in <source><italic>Proceedings of the international conference on swarm intelligence</italic></source> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>). <pub-id pub-id-type="doi">10.1007/978-3-030-60376-2_10</pub-id></citation></ref>
<ref id="B12"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Camacho-Villal&#x00F3;n</surname> <given-names>C. L.</given-names></name> <name><surname>Dorigo</surname> <given-names>M.</given-names></name> <name><surname>St&#x00FC;tzle</surname> <given-names>T.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>Why the intelligent water drops cannot be considered as a novel algorithm</article-title>,&#x201D; in <source><italic>Proceedings of the international conference on swarm intelligence</italic></source> (<publisher-loc>Berlin</publisher-loc>: <publisher-name>Springer</publisher-name>). <pub-id pub-id-type="doi">10.1007/978-3-030-00533-7_24</pub-id></citation></ref>
<ref id="B13"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Wang</surname> <given-names>M.</given-names></name> <name><surname>Pan</surname> <given-names>Z.</given-names></name> <name><surname>Gandomi</surname> <given-names>A. H.</given-names></name></person-group> (<year>2020</year>). <article-title>Multi-population differential evolution-assisted Harris hawks optimization: Framework and case studies.</article-title> <source><italic>Future Gener. Comput. Syst.</italic></source> <volume>111</volume> <fpage>175</fpage>&#x2013;<lpage>198</lpage>. <pub-id pub-id-type="doi">10.1016/j.future.2020.04.008</pub-id></citation></ref>
<ref id="B14"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>H.-L.</given-names></name> <name><surname>Wang</surname> <given-names>G.</given-names></name> <name><surname>Ma</surname> <given-names>C.</given-names></name> <name><surname>Cai</surname> <given-names>Z. N.</given-names></name> <name><surname>Liu</surname> <given-names>W. B.</given-names></name> <name><surname>Wang</surname> <given-names>S. J.</given-names></name></person-group> (<year>2016</year>). <article-title>An efficient hybrid kernel extreme learning machine approach for early diagnosis of Parkinson&#x2019;s disease.</article-title> <source><italic>Neurocomputing</italic></source> <volume>184</volume> <fpage>131</fpage>&#x2013;<lpage>144</lpage>. <pub-id pub-id-type="doi">10.1016/j.neucom.2015.07.138</pub-id></citation></ref>
<ref id="B15"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>W.</given-names></name> <name><surname>Chai</surname> <given-names>Y.</given-names></name> <name><surname>Chai</surname> <given-names>G.</given-names></name> <name><surname>Hu</surname> <given-names>Y.</given-names></name> <name><surname>Chen</surname> <given-names>M.</given-names></name> <name><surname>Xu</surname> <given-names>H.</given-names></name><etal/></person-group> (<year>2020</year>). <article-title>Automated lesion segmentation and quantitative analysis of nevus in whole-face images.</article-title> <source><italic>J. Craniofac. Surg.</italic></source> <volume>31</volume> <fpage>360</fpage>&#x2013;<lpage>363</lpage>. <pub-id pub-id-type="doi">10.1097/SCS.0000000000006017</pub-id> <pub-id pub-id-type="pmid">31725506</pub-id></citation></ref>
<ref id="B16"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname> <given-names>Y.</given-names></name> <name><surname>Wang</surname> <given-names>M.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Shi</surname> <given-names>B.</given-names></name> <name><surname>Hu</surname> <given-names>Z.</given-names></name> <name><surname>Zhang</surname> <given-names>Q.</given-names></name><etal/></person-group> (<year>2022</year>). <article-title>Multi-threshold image segmentation using a multi-strategy shuffled frog leaping algorithm.</article-title> <source><italic>Exp. Syst. Appl.</italic></source> <volume>194</volume>:<fpage>116511</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2022.116511</pub-id></citation></ref>
<ref id="B17"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Deng</surname> <given-names>W.</given-names></name> <name><surname>Ni</surname> <given-names>H.</given-names></name> <name><surname>Liu</surname> <given-names>Y.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Zhao</surname> <given-names>H.</given-names></name></person-group> (<year>2022a</year>). <article-title>An adaptive differential evolution algorithm based on belief space and generalized opposition-based learning for resource allocation.</article-title> <source><italic>Appl. Soft Comput.</italic></source> <volume>127</volume>:<fpage>109419</fpage>. <pub-id pub-id-type="doi">10.1016/j.asoc.2022.109419</pub-id></citation></ref>
<ref id="B18"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Deng</surname> <given-names>W.</given-names></name> <name><surname>Xu</surname> <given-names>J.</given-names></name> <name><surname>Gao</surname> <given-names>X.</given-names></name> <name><surname>Zhao</surname> <given-names>H.</given-names></name></person-group> (<year>2022b</year>). <article-title>An enhanced MSIQDE algorithm with novel multiple strategies for global optimization problems.</article-title> <source><italic>IEEE Trans. Syst. Man Cybern. Syst.</italic></source> <volume>52</volume> <fpage>1578</fpage>&#x2013;<lpage>1587</lpage>. <pub-id pub-id-type="doi">10.1109/TSMC.2020.3030792</pub-id></citation></ref>
<ref id="B19"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Deng</surname> <given-names>W.</given-names></name> <name><surname>Zhang</surname> <given-names>L.</given-names></name> <name><surname>Zhou</surname> <given-names>X.</given-names></name> <name><surname>Zhou</surname> <given-names>Y.</given-names></name> <name><surname>Sun</surname> <given-names>Y.</given-names></name> <name><surname>Zhu</surname> <given-names>W.</given-names></name><etal/></person-group> (<year>2022c</year>). <article-title>Multi-strategy particle swarm and ant colony hybrid optimization for airport taxiway planning problem.</article-title> <source><italic>Inform. Sci.</italic></source> <volume>612</volume> <fpage>576</fpage>&#x2013;<lpage>593</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2022.08.115</pub-id></citation></ref>
<ref id="B20"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Deng</surname> <given-names>W.</given-names></name> <name><surname>Zhang</surname> <given-names>X.</given-names></name> <name><surname>Zhou</surname> <given-names>Y.</given-names></name> <name><surname>Liu</surname> <given-names>Y.</given-names></name> <name><surname>Zhou</surname> <given-names>X.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name><etal/></person-group> (<year>2022d</year>). <article-title>An enhanced fast non-dominated solution sorting genetic algorithm for multi-objective problems.</article-title> <source><italic>Inform. Sci.</italic></source> <volume>585</volume> <fpage>441</fpage>&#x2013;<lpage>453</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2021.11.052</pub-id></citation></ref>
<ref id="B21"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Derrac</surname> <given-names>J.</given-names></name> <name><surname>Garc&#x00ED;a</surname> <given-names>S.</given-names></name> <name><surname>Molina</surname> <given-names>D.</given-names></name> <name><surname>Herrera</surname> <given-names>F.</given-names></name></person-group> (<year>2011</year>). <article-title>A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms.</article-title> <source><italic>Swarm Evol. Comput.</italic></source> <volume>1</volume> <fpage>3</fpage>&#x2013;<lpage>18</lpage>. <pub-id pub-id-type="doi">10.1016/j.swevo.2011.02.002</pub-id></citation></ref>
<ref id="B22"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dong</surname> <given-names>R.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Turabieh</surname> <given-names>H.</given-names></name> <name><surname>Mafarja</surname> <given-names>M.</given-names></name> <name><surname>Wang</surname> <given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>Boosted kernel search: Framework, analysis and case studies on the economic emission dispatch problem.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>233</volume>:<fpage>107529</fpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2021.107529</pub-id></citation></ref>
<ref id="B23"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gao</surname> <given-names>D.</given-names></name> <name><surname>Wang</surname> <given-names>G.-G.</given-names></name> <name><surname>Pedrycz</surname> <given-names>W.</given-names></name></person-group> (<year>2020</year>). <article-title>Solving fuzzy job-shop scheduling problem using DE algorithm improved by a selection mechanism.</article-title> <source><italic>IEEE Trans. Fuzzy Syst.</italic></source> <volume>28</volume> <fpage>3265</fpage>&#x2013;<lpage>3275</lpage>. <pub-id pub-id-type="doi">10.1109/TFUZZ.2020.3003506</pub-id></citation></ref>
<ref id="B24"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gao</surname> <given-names>W.</given-names></name></person-group> (<year>2014</year>). <article-title>Forecasting of landslide disasters based on bionics algorithm (Part 1: Critical slip surface searching).</article-title> <source><italic>Comput. Geotech.</italic></source> <volume>61</volume> <fpage>370</fpage>&#x2013;<lpage>377</lpage>. <pub-id pub-id-type="doi">10.1016/j.compgeo.2014.06.007</pub-id></citation></ref>
<ref id="B25"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Garcia</surname> <given-names>S.</given-names></name> <name><surname>Fern&#x00E1;ndez</surname> <given-names>A.</given-names></name> <name><surname>Luengo</surname> <given-names>J.</given-names></name> <name><surname>Herrera</surname> <given-names>F.</given-names></name></person-group> (<year>2010</year>). <article-title>Advanced nonparametric tests for multiple comparisons in the design of experiments in computational intelligence and data mining: Experimental analysis of power.</article-title> <source><italic>Inform. Sci.</italic></source> <volume>180</volume> <fpage>2044</fpage>&#x2013;<lpage>2064</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2009.12.010</pub-id></citation></ref>
<ref id="B26"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Guan</surname> <given-names>R.</given-names></name> <name><surname>Zhang</surname> <given-names>H.</given-names></name> <name><surname>Liang</surname> <given-names>Y.</given-names></name> <name><surname>Giunchiglia</surname> <given-names>F.</given-names></name> <name><surname>Huang</surname> <given-names>L.</given-names></name> <name><surname>Feng</surname> <given-names>X.</given-names></name></person-group> (<year>2020</year>). <article-title>Deep feature-based text clustering and its explanation.</article-title> <source><italic>IEEE Trans. Knowl. Data Eng.</italic></source> <volume>34</volume>:<fpage>1</fpage>. <pub-id pub-id-type="doi">10.1109/TKDE.2020.3028943</pub-id></citation></ref>
<ref id="B27"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Han</surname> <given-names>X.</given-names></name> <name><surname>Han</surname> <given-names>Y.</given-names></name> <name><surname>Chen</surname> <given-names>Q.</given-names></name> <name><surname>Li</surname> <given-names>J.</given-names></name> <name><surname>Sang</surname> <given-names>H.</given-names></name> <name><surname>Liu</surname> <given-names>Y.</given-names></name><etal/></person-group> (<year>2021</year>). <article-title>Distributed flow shop scheduling with sequence-dependent setup times using an improved iterated greedy algorithm.</article-title> <source><italic>Complex Syst. Model. Simul.</italic></source> <volume>1</volume> <fpage>198</fpage>&#x2013;<lpage>217</lpage>. <pub-id pub-id-type="doi">10.23919/CSMS.2021.0018</pub-id></citation></ref>
<ref id="B28"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>He</surname> <given-names>Z.</given-names></name> <name><surname>Yen</surname> <given-names>G. G.</given-names></name> <name><surname>Ding</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). <article-title>Knee-based decision making and visualization in many-objective optimization.</article-title> <source><italic>IEEE Trans. Evol. Comput.</italic></source> <volume>25</volume> <fpage>292</fpage>&#x2013;<lpage>306</lpage>. <pub-id pub-id-type="doi">10.1109/TEVC.2020.3027620</pub-id></citation></ref>
<ref id="B29"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>He</surname> <given-names>Z.</given-names></name> <name><surname>Yen</surname> <given-names>G. G.</given-names></name> <name><surname>Lv</surname> <given-names>J.</given-names></name></person-group> (<year>2019</year>). <article-title>Evolutionary multiobjective optimization with robustness enhancement.</article-title> <source><italic>IEEE Trans. Evol. Comput.</italic></source> <volume>24</volume> <fpage>494</fpage>&#x2013;<lpage>507</lpage>. <pub-id pub-id-type="doi">10.1109/TEVC.2019.2933444</pub-id></citation></ref>
<ref id="B30"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Abbaspour</surname> <given-names>R. A.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name></person-group> (<year>2019a</year>). <article-title>Efficient boosted grey wolf optimizers for global search and kernel extreme learning machine training.</article-title> <source><italic>Appl. Soft Comput.</italic></source> <volume>81</volume>:<fpage>105521</fpage>. <pub-id pub-id-type="doi">10.1016/j.asoc.2019.105521</pub-id></citation></ref>
<ref id="B31"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Mirjalili</surname> <given-names>S.</given-names></name> <name><surname>Faris</surname> <given-names>H.</given-names></name> <name><surname>Aljarah</surname> <given-names>I.</given-names></name> <name><surname>Mafarja</surname> <given-names>M.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name></person-group> (<year>2019b</year>). <article-title>Harris hawks optimization: Algorithm and applications.</article-title> <source><italic>Future Gener. Comput. Syst.</italic></source> <volume>97</volume> <fpage>849</fpage>&#x2013;<lpage>872</lpage>. <pub-id pub-id-type="doi">10.1016/j.future.2019.02.028</pub-id></citation></ref>
<ref id="B32"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hu</surname> <given-names>J.</given-names></name> <name><surname>Gui</surname> <given-names>W. Y.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Cai</surname> <given-names>Z. N.</given-names></name> <name><surname>Liang</surname> <given-names>G. X.</given-names></name> <name><surname>Chen</surname> <given-names>H. L.</given-names></name><etal/></person-group> (<year>2022</year>). <article-title>Dispersed foraging slime mould algorithm: Continuous and binary variants for global optimization and wrapper-based feature selection.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>237</volume>:<fpage>107761</fpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2021.107761</pub-id></citation></ref>
<ref id="B33"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hu</surname> <given-names>K.</given-names></name> <name><surname>Zhao</surname> <given-names>L.</given-names></name> <name><surname>Li</surname> <given-names>D.</given-names></name> <name><surname>Qi</surname> <given-names>X.</given-names></name> <name><surname>Guan</surname> <given-names>K.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name><etal/></person-group> (<year>2022</year>). <article-title>Colorectal polyp region extraction using saliency detection network with neutrosophic enhancement.</article-title> <source><italic>Comput. Biol. Med.</italic></source> <volume>147</volume>:<fpage>105760</fpage>. <pub-id pub-id-type="doi">10.1016/j.compbiomed.2022.105760</pub-id> <pub-id pub-id-type="pmid">35803078</pub-id></citation></ref>
<ref id="B34"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hu</surname> <given-names>S.</given-names></name> <name><surname>Lei</surname> <given-names>B.</given-names></name> <name><surname>Wang</surname> <given-names>S.</given-names></name> <name><surname>Wang</surname> <given-names>Y.</given-names></name> <name><surname>Feng</surname> <given-names>Z.</given-names></name> <name><surname>Shen</surname> <given-names>Y.</given-names></name></person-group> (<year>2021</year>). <article-title>Bidirectional mapping generative adversarial networks for brain MR to PET synthesis.</article-title> <source><italic>IEEE Trans. Med. Imag.</italic></source> <volume>41</volume> <fpage>145</fpage>&#x2013;<lpage>157</lpage>. <pub-id pub-id-type="doi">10.1109/TMI.2021.3107013</pub-id> <pub-id pub-id-type="pmid">34428138</pub-id></citation></ref>
<ref id="B35"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hua</surname> <given-names>Y.</given-names></name> <name><surname>Liu</surname> <given-names>Q.</given-names></name> <name><surname>Hao</surname> <given-names>K.</given-names></name> <name><surname>Jin</surname> <given-names>Y.</given-names></name></person-group> (<year>2021</year>). <article-title>A survey of evolutionary algorithms for multi-objective optimization problems with irregular pareto fronts.</article-title> <source><italic>IEEE CAA J. Autom. Sin.</italic></source> <volume>8</volume> <fpage>303</fpage>&#x2013;<lpage>318</lpage>. <pub-id pub-id-type="doi">10.1109/JAS.2021.1003817</pub-id></citation></ref>
<ref id="B36"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname> <given-names>L.</given-names></name> <name><surname>Yang</surname> <given-names>Y.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Zhang</surname> <given-names>Y.</given-names></name> <name><surname>Wang</surname> <given-names>Z.</given-names></name> <name><surname>He</surname> <given-names>L.</given-names></name></person-group> (<year>2022</year>). <article-title>Context-aware road travel time estimation by coupled tensor decomposition based on trajectory data.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>245</volume>:<fpage>108596</fpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2022.108596</pub-id></citation></ref>
<ref id="B37"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hussien</surname> <given-names>A. G.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Ye</surname> <given-names>X. J.</given-names></name> <name><surname>Liang</surname> <given-names>G. X.</given-names></name> <name><surname>Chen</surname> <given-names>H. L.</given-names></name> <name><surname>Pan</surname> <given-names>Z. F.</given-names></name></person-group> (<year>2022</year>). <article-title>Boosting whale optimization with evolution strategy and Gaussian random walks: An image segmentation method</article-title> . <source><italic>Eng. Comput.</italic></source> <fpage>1</fpage>&#x2013;<lpage>45</lpage>. <pub-id pub-id-type="doi">10.1007/s00366-021-01542-0</pub-id></citation></ref>
<ref id="B38"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Huynh-Thu</surname> <given-names>Q.</given-names></name> <name><surname>Ghanbari</surname> <given-names>M.</given-names></name></person-group> (<year>2008</year>). <article-title>Scope of validity of PSNR in image/video quality assessment.</article-title> <source><italic>J. Electron. Lett.</italic></source> <volume>44</volume>:<fpage>800</fpage>. <pub-id pub-id-type="doi">10.1049/el:20080522</pub-id></citation></ref>
<ref id="B39"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ilesanmi</surname> <given-names>A. E.</given-names></name> <name><surname>Idowu</surname> <given-names>O. P.</given-names></name> <name><surname>Chaumrattanakul</surname> <given-names>U.</given-names></name> <name><surname>Makhanov</surname> <given-names>S. S.</given-names></name></person-group> (<year>2021</year>). <article-title>Multiscale hybrid algorithm for pre-processing of ultrasound images.</article-title> <source><italic>Biomed. Signal Process. Control</italic></source> <volume>66</volume>:<fpage>102396</fpage>. <pub-id pub-id-type="doi">10.1016/j.bspc.2020.102396</pub-id></citation></ref>
<ref id="B40"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Issa</surname> <given-names>M.</given-names></name> <name><surname>Hassanien</surname> <given-names>A. E.</given-names></name> <name><surname>Oliva</surname> <given-names>D.</given-names></name> <name><surname>Helmi</surname> <given-names>A.</given-names></name> <name><surname>Ziedan</surname> <given-names>I.</given-names></name> <name><surname>Alzohairy</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <article-title>ASCA-PSO: Adaptive sine cosine optimization algorithm integrated with particle swarm for pairwise local sequence alignment.</article-title> <source><italic>Exp. Syst. Appl.</italic></source> <volume>99</volume> <fpage>56</fpage>&#x2013;<lpage>70</lpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2018.01.019</pub-id></citation></ref>
<ref id="B41"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Jero</surname> <given-names>E. S.</given-names></name> <name><surname>Ramu</surname> <given-names>P.</given-names></name> <name><surname>Swaminathan</surname> <given-names>R.</given-names></name></person-group> (<year>2016</year>). <article-title>Imperceptibility&#x2014;robustness tradeoff studies for ECG steganography using continuous ant colony optimization.</article-title> <source><italic>Exp. Syst. Appl.</italic></source> <volume>49</volume> <fpage>123</fpage>&#x2013;<lpage>135</lpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2015.12.010</pub-id></citation></ref>
<ref id="B42"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Juang</surname> <given-names>C. F.</given-names></name> <name><surname>Chang</surname> <given-names>P. H.</given-names></name></person-group> (<year>2011</year>). <article-title>Recurrent fuzzy system design using elite-guided continuous ant colony optimization.</article-title> <source><italic>Appl. Soft Comput.</italic></source> <volume>11</volume> <fpage>2687</fpage>&#x2013;<lpage>2697</lpage>. <pub-id pub-id-type="doi">10.1016/j.asoc.2010.11.001</pub-id></citation></ref>
<ref id="B43"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kassem</surname> <given-names>M. A.</given-names></name> <name><surname>Hosny</surname> <given-names>K. M.</given-names></name> <name><surname>Dama&#x0161;evi&#x00E8;ius</surname> <given-names>R.</given-names></name> <name><surname>Eltoukhy</surname> <given-names>M. M.</given-names></name></person-group> (<year>2021</year>). <article-title>Machine learning and deep learning methods for skin lesion classification and diagnosis: A systematic review.</article-title> <source><italic>Diagnostics</italic></source> <volume>11</volume>:<fpage>1390</fpage>. <pub-id pub-id-type="doi">10.3390/diagnostics11081390</pub-id> <pub-id pub-id-type="pmid">34441324</pub-id></citation></ref>
<ref id="B44"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Khashan</surname> <given-names>N.</given-names></name> <name><surname>Elhosseini</surname> <given-names>M. A.</given-names></name> <name><surname>Haikal</surname> <given-names>A. Y.</given-names></name> <name><surname>Badawy</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Biped robot stability based on an A-C parametric whale optimization algorithm.</article-title> <source><italic>J. Comput. Sci.</italic></source> <volume>31</volume> <fpage>17</fpage>&#x2013;<lpage>32</lpage>. <pub-id pub-id-type="doi">10.1016/j.jocs.2018.12.005</pub-id></citation></ref>
<ref id="B45"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kiran</surname> <given-names>M. S.</given-names></name></person-group> (<year>2015</year>). <article-title>TSA: Tree-seed algorithm for continuous optimization.</article-title> <source><italic>Exp. Syst. Appl.</italic></source> <volume>42</volume> <fpage>6686</fpage>&#x2013;<lpage>6698</lpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2015.04.055</pub-id></citation></ref>
<ref id="B46"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lafci</surname> <given-names>B.</given-names></name> <name><surname>Robin</surname> <given-names>J.</given-names></name> <name><surname>Dean-Ben</surname> <given-names>X. L.</given-names></name> <name><surname>Razansky</surname> <given-names>D.</given-names></name></person-group> (<year>2022</year>). <article-title>Expediting image acquisition in reflection ultrasound computed tomography.</article-title> <source><italic>IEEE Trans. Ultrason. Ferroelectr. Freq. Control</italic></source> <volume>69</volume> <fpage>2837</fpage>&#x2013;<lpage>2848</lpage>. <pub-id pub-id-type="doi">10.1109/TUFFC.2022.3172713</pub-id> <pub-id pub-id-type="pmid">35507610</pub-id></citation></ref>
<ref id="B47"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lee</surname> <given-names>H. D.</given-names></name> <name><surname>Mendes</surname> <given-names>A. I.</given-names></name> <name><surname>Spola&#x00F4;r</surname> <given-names>N.</given-names></name> <name><surname>Oliva</surname> <given-names>J. T.</given-names></name> <name><surname>Parmezan</surname> <given-names>A. R. S.</given-names></name> <name><surname>Wu</surname> <given-names>F. C.</given-names></name><etal/></person-group> (<year>2018</year>). <article-title>Dermoscopic assisted diagnosis in melanoma: Reviewing results, optimizing methodologies and quantifying empirical guidelines.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>158</volume> <fpage>9</fpage>&#x2013;<lpage>24</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2018.05.016</pub-id></citation></ref>
<ref id="B48"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>D.</given-names></name> <name><surname>Zhang</surname> <given-names>S.</given-names></name> <name><surname>Ma</surname> <given-names>X.</given-names></name></person-group> (<year>2021</year>). <article-title>Dynamic module detection in temporal attributed networks of cancers.</article-title> <source><italic>IEEE ACM Trans. Comput. Biol. Bioinform.</italic></source> <volume>19</volume> <fpage>2219</fpage>&#x2013;<lpage>2230</lpage>. <pub-id pub-id-type="doi">10.1109/TCBB.2021.3069441</pub-id> <pub-id pub-id-type="pmid">33780342</pub-id></citation></ref>
<ref id="B49"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>J.</given-names></name> <name><surname>Chen</surname> <given-names>C.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Tong</surname> <given-names>T.</given-names></name></person-group> (<year>2017</year>). <article-title>Towards context-aware social recommendation via individual trust.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>127</volume> <fpage>58</fpage>&#x2013;<lpage>66</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2017.02.032</pub-id></citation></ref>
<ref id="B50"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>J.</given-names></name> <name><surname>Zheng</surname> <given-names>X.</given-names></name> <name><surname>Chen</surname> <given-names>S.</given-names></name> <name><surname>Song</surname> <given-names>W.</given-names></name> <name><surname>Chen</surname> <given-names>D.</given-names></name></person-group> (<year>2014</year>). <article-title>An efficient and reliable approach for quality-of-service-aware service composition.</article-title> <source><italic>Inform. Sci.</italic></source> <volume>269</volume> <fpage>238</fpage>&#x2013;<lpage>254</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2013.12.015</pub-id></citation></ref>
<ref id="B51"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>L.</given-names></name> <name><surname>Gao</surname> <given-names>Z.</given-names></name> <name><surname>Wang</surname> <given-names>Y. T.</given-names></name> <name><surname>Zhang</surname> <given-names>M. W.</given-names></name> <name><surname>Ni</surname> <given-names>J. C.</given-names></name> <name><surname>Zheng</surname> <given-names>C. H.</given-names></name><etal/></person-group> (<year>2021</year>). <article-title>SCMFMDA: Predicting microRNA-disease associations based on similarity constrained matrix factorization.</article-title> <source><italic>PLoS Comput. Biol.</italic></source> <volume>17</volume>:<fpage>e1009165</fpage>. <pub-id pub-id-type="doi">10.1371/journal.pcbi.1009165</pub-id> <pub-id pub-id-type="pmid">34252084</pub-id></citation></ref>
<ref id="B52"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>S.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Wang</surname> <given-names>M.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Mirjalili</surname> <given-names>S.</given-names></name></person-group> (<year>2020</year>). <article-title>Slime mould algorithm: A new method for stochastic optimization.</article-title> <source><italic>Future Gener. Comput. Syst.</italic></source> <volume>111</volume> <fpage>300</fpage>&#x2013;<lpage>323</lpage>. <pub-id pub-id-type="doi">10.1016/j.future.2020.03.055</pub-id></citation></ref>
<ref id="B53"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>W.</given-names></name> <name><surname>Huang</surname> <given-names>Q.</given-names></name> <name><surname>Srivastava</surname> <given-names>G.</given-names></name></person-group> (<year>2020</year>). <article-title>Contour feature extraction of medical image based on multi-threshold optimization.</article-title> <source><italic>Mobile Netw. Appl.</italic></source> <volume>2020</volume> <fpage>1</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1007/s11036-020-01674-5</pub-id></citation></ref>
<ref id="B54"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>Y.</given-names></name> <name><surname>Li</surname> <given-names>X. X.</given-names></name> <name><surname>Hong</surname> <given-names>J. J.</given-names></name> <name><surname>Wang</surname> <given-names>Y. X.</given-names></name> <name><surname>Fu</surname> <given-names>J. B.</given-names></name> <name><surname>Yang</surname> <given-names>H.</given-names></name><etal/></person-group> (<year>2020</year>). <article-title>Clinical trials, progression-speed differentiating features and swiftness rule of the innovative targets of first-in-class drugs.</article-title> <source><italic>Brief. Bioinform.</italic></source> <volume>21</volume> <fpage>649</fpage>&#x2013;<lpage>662</lpage>. <pub-id pub-id-type="doi">10.1093/bib/bby130</pub-id> <pub-id pub-id-type="pmid">30689717</pub-id></citation></ref>
<ref id="B55"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liang</surname> <given-names>G.</given-names></name> <name><surname>On</surname> <given-names>B. W.</given-names></name> <name><surname>Jeong</surname> <given-names>D.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Kim</surname> <given-names>H. C.</given-names></name> <name><surname>Choi</surname> <given-names>G. S.</given-names></name><etal/></person-group> (<year>2021</year>). <article-title>A text GAN framework for creative essay recommendation.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>232</volume>:<fpage>107501</fpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2021.107501</pub-id></citation></ref>
<ref id="B56"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liang</surname> <given-names>J. J.</given-names></name> <name><surname>Qu</surname> <given-names>B. Y.</given-names></name> <name><surname>Suganthan</surname> <given-names>P. N.</given-names></name></person-group> (<year>2013</year>). <source><italic>Problem definitions and evaluation criteria for the CEC 2014 special session and competition on single objective real-parameter numerical optimization. Technical Report 201311, Computational Intelligence Laboratory.</italic></source> <publisher-loc>Singapore</publisher-loc>: <publisher-name>Zhengzhou University and Nanyang Technological University</publisher-name>.</citation></ref>
<ref id="B57"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>ling Chen</surname> <given-names>H.</given-names></name> <name><surname>Yang</surname> <given-names>B.</given-names></name> <name><surname>Wang</surname> <given-names>S. J.</given-names></name> <name><surname>Wang</surname> <given-names>G.</given-names></name> <name><surname>Li</surname> <given-names>H. Z.</given-names></name> <name><surname>Liu</surname> <given-names>W. B.</given-names></name></person-group> (<year>2014</year>). <article-title>Towards an optimal support vector machine classifier using a parallel particle swarm optimization strategy.</article-title> <source><italic>Appl. Math. Comput.</italic></source> <volume>239</volume> <fpage>180</fpage>&#x2013;<lpage>197</lpage>. <pub-id pub-id-type="doi">10.1016/j.amc.2014.04.039</pub-id></citation></ref>
<ref id="B58"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>Y.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Cai</surname> <given-names>Z.</given-names></name> <name><surname>Liang</surname> <given-names>G.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Pan</surname> <given-names>Z.</given-names></name><etal/></person-group> (<year>2022</year>). <article-title>Simulated annealing-based dynamic step shuffled frog leaping algorithm: Optimal performance design and feature selection.</article-title> <source><italic>Neurocomputing</italic></source> <volume>503</volume> <fpage>325</fpage>&#x2013;<lpage>362</lpage>. <pub-id pub-id-type="doi">10.1016/j.neucom.2022.06.075</pub-id></citation></ref>
<ref id="B59"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Luo</surname> <given-names>J.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Xu</surname> <given-names>Y.</given-names></name> <name><surname>Zhang</surname> <given-names>Q.</given-names></name> <name><surname>Li</surname> <given-names>C.</given-names></name></person-group> (<year>2019</year>). <article-title>Multi-strategy boosted mutative whale-inspired optimization approaches.</article-title> <source><italic>Appl. Math. Model.</italic></source> <volume>73</volume> <fpage>109</fpage>&#x2013;<lpage>123</lpage>. <pub-id pub-id-type="doi">10.1016/j.apm.2019.03.046</pub-id></citation></ref>
<ref id="B60"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ma</surname> <given-names>A.</given-names></name> <name><surname>Zhang</surname> <given-names>X.</given-names></name> <name><surname>Zhang</surname> <given-names>C.</given-names></name> <name><surname>Zhang</surname> <given-names>B.</given-names></name></person-group> (<year>2019</year>). <article-title>An adaptive hybrid ant colony optimization algorithm for the classification problem.</article-title> <source><italic>Inform. Technol. Control</italic></source> <volume>48</volume> <fpage>590</fpage>&#x2013;<lpage>601</lpage>. <pub-id pub-id-type="doi">10.5755/j01.itc.48.4.22330</pub-id></citation></ref>
<ref id="B61"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ma</surname> <given-names>X.</given-names></name> <name><surname>Sun</surname> <given-names>P. G.</given-names></name> <name><surname>Gong</surname> <given-names>M.</given-names></name></person-group> (<year>2020</year>). <article-title>An integrative framework of heterogeneous genomic data for cancer dynamic modules based on matrix decomposition.</article-title> <source><italic>IEEE ACM Trans. Comput. Biol. Bioinform.</italic></source> <volume>19</volume> <fpage>305</fpage>&#x2013;<lpage>316</lpage>. <pub-id pub-id-type="doi">10.1109/TCBB.2020.3004808</pub-id> <pub-id pub-id-type="pmid">32750874</pub-id></citation></ref>
<ref id="B62"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mirjalili</surname> <given-names>S.</given-names></name></person-group> (<year>2015</year>). <article-title>Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>89</volume> <fpage>228</fpage>&#x2013;<lpage>249</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2015.07.006</pub-id></citation></ref>
<ref id="B63"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mirjalili</surname> <given-names>S.</given-names></name></person-group> (<year>2016</year>). <article-title>SCA: A sine cosine algorithm for solving optimization problems.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>96</volume> <fpage>120</fpage>&#x2013;<lpage>133</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2015.12.022</pub-id></citation></ref>
<ref id="B64"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mirjalili</surname> <given-names>S.</given-names></name> <name><surname>Lewis</surname> <given-names>A.</given-names></name></person-group> (<year>2016</year>). <article-title>The whale optimization algorithm.</article-title> <source><italic>Adv. Eng. Softw.</italic></source> <volume>95</volume> <fpage>51</fpage>&#x2013;<lpage>67</lpage>. <pub-id pub-id-type="doi">10.1016/j.advengsoft.2016.01.008</pub-id></citation></ref>
<ref id="B65"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mirjalili</surname> <given-names>S.</given-names></name> <name><surname>Mirjalili</surname> <given-names>S. M.</given-names></name> <name><surname>Lewis</surname> <given-names>A.</given-names></name></person-group> (<year>2014</year>). <article-title>Grey wolf optimizer.</article-title> <source><italic>Adv. Eng. Softw.</italic></source> <volume>69</volume> <fpage>46</fpage>&#x2013;<lpage>61</lpage>. <pub-id pub-id-type="doi">10.1016/j.advengsoft.2013.12.007</pub-id></citation></ref>
<ref id="B66"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Nenavath</surname> <given-names>H.</given-names></name> <name><surname>Jatoth</surname> <given-names>R. K.</given-names></name></person-group> (<year>2018</year>). <article-title>Hybridizing sine cosine algorithm with differential evolution for global optimization and object tracking.</article-title> <source><italic>Appl. Soft Comput.</italic></source> <volume>62</volume> <fpage>1019</fpage>&#x2013;<lpage>1043</lpage>. <pub-id pub-id-type="doi">10.1016/j.asoc.2017.09.039</pub-id></citation></ref>
<ref id="B67"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Niu</surname> <given-names>P.</given-names></name> <name><surname>Niu</surname> <given-names>S.</given-names></name> <name><surname>Liu</surname> <given-names>N.</given-names></name> <name><surname>Chang</surname> <given-names>L.</given-names></name></person-group> (<year>2019</year>). <article-title>The defect of the grey wolf optimization algorithm and its verification method.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>171</volume> <fpage>37</fpage>&#x2013;<lpage>43</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2019.01.018</pub-id></citation></ref>
<ref id="B68"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Omran</surname> <given-names>M. G. H.</given-names></name> <name><surname>Al-Sharhan</surname> <given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>Improved continuous ant colony optimization algorithms for real-world engineering optimization problems.</article-title> <source><italic>Eng. Appl. Artif. Intell.</italic></source> <volume>85</volume> <fpage>818</fpage>&#x2013;<lpage>829</lpage>. <pub-id pub-id-type="doi">10.1016/j.engappai.2019.08.009</pub-id></citation></ref>
<ref id="B69"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Patra</surname> <given-names>D. K.</given-names></name> <name><surname>Si</surname> <given-names>T.</given-names></name> <name><surname>Mondal</surname> <given-names>S.</given-names></name> <name><surname>Mukherjee</surname> <given-names>P.</given-names></name></person-group> (<year>2021</year>). <article-title>Breast DCE-MRI segmentation for lesion detection by multi-level thresholding using student psychological based optimization.</article-title> <source><italic>Biomed. Signal Process. Control</italic></source> <volume>69</volume>:<fpage>102925</fpage>. <pub-id pub-id-type="doi">10.1016/j.bspc.2021.102925</pub-id></citation></ref>
<ref id="B70"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pennisi</surname> <given-names>A.</given-names></name> <name><surname>Bloisi</surname> <given-names>D. D.</given-names></name> <name><surname>Nardi</surname> <given-names>D.</given-names></name> <name><surname>Giampetruzzi</surname> <given-names>A. R.</given-names></name> <name><surname>Mondino</surname> <given-names>C.</given-names></name> <name><surname>Facchiano</surname> <given-names>A.</given-names></name></person-group> (<year>2016</year>). <article-title>Skin lesion image segmentation using delaunay triangulation for melanoma detection.</article-title> <source><italic>Comput. Med. Imaging Graph.</italic></source> <volume>52</volume> <fpage>89</fpage>&#x2013;<lpage>103</lpage>. <pub-id pub-id-type="doi">10.1016/j.compmedimag.2016.05.002</pub-id> <pub-id pub-id-type="pmid">27215953</pub-id></citation></ref>
<ref id="B71"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Piotrowski</surname> <given-names>A. P.</given-names></name> <name><surname>Napiorkowski</surname> <given-names>J. J.</given-names></name> <name><surname>Rowinski</surname> <given-names>P. M.</given-names></name></person-group> (<year>2014</year>). <article-title>How novel is the &#x201C;novel&#x201D; black hole optimization approach?</article-title> <source><italic>Inform. Sci.</italic></source> <volume>267</volume> <fpage>191</fpage>&#x2013;<lpage>200</lpage>. <pub-id pub-id-type="doi">10.1016/j.ins.2014.01.026</pub-id></citation></ref>
<ref id="B72"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Qi</surname> <given-names>A.</given-names></name> <name><surname>Zhao</surname> <given-names>D.</given-names></name> <name><surname>Yu</surname> <given-names>F.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Wu</surname> <given-names>Z.</given-names></name> <name><surname>Cai</surname> <given-names>Z.</given-names></name><etal/></person-group> (<year>2022</year>). <article-title>Directional mutation and crossover boosted ant colony optimization with application to COVID-19 X-ray image segmentation.</article-title> <source><italic>Comput. Biol. Med.</italic></source> <volume>148</volume>:<fpage>105810</fpage>. <pub-id pub-id-type="doi">10.1016/j.compbiomed.2022.105810</pub-id> <pub-id pub-id-type="pmid">35868049</pub-id></citation></ref>
<ref id="B73"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Qiu</surname> <given-names>S.</given-names></name> <name><surname>Zhao</surname> <given-names>H.</given-names></name> <name><surname>Jiang</surname> <given-names>N.</given-names></name> <name><surname>Wang</surname> <given-names>Z.</given-names></name> <name><surname>Liu</surname> <given-names>L.</given-names></name> <name><surname>An</surname> <given-names>Y.</given-names></name><etal/></person-group> (<year>2022</year>). <article-title>Multi-sensor information fusion based on machine learning for real applications in human activity recognition: State-of-the-art and research challenges.</article-title> <source><italic>Inform. Fusion</italic></source> <volume>80</volume> <fpage>241</fpage>&#x2013;<lpage>265</lpage>. <pub-id pub-id-type="doi">10.1016/j.inffus.2021.11.006</pub-id></citation></ref>
<ref id="B74"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Qu</surname> <given-names>C.</given-names></name> <name><surname>Zeng</surname> <given-names>Z.</given-names></name> <name><surname>Dai</surname> <given-names>J.</given-names></name> <name><surname>Yi</surname> <given-names>Z.</given-names></name> <name><surname>He</surname> <given-names>W.</given-names></name></person-group> (<year>2018</year>). <article-title>A modified sine-cosine algorithm based on neighborhood search and greedy levy mutation.</article-title> <source><italic>Comput. Intell. Neurosci.</italic></source> <volume>2018</volume> <fpage>1</fpage>&#x2013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1155/2018/4231647</pub-id> <pub-id pub-id-type="pmid">30073023</pub-id></citation></ref>
<ref id="B75"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ren</surname> <given-names>L.</given-names></name> <name><surname>Zhao</surname> <given-names>D.</given-names></name> <name><surname>Zhao</surname> <given-names>X.</given-names></name> <name><surname>Chen</surname> <given-names>W.</given-names></name> <name><surname>Li</surname> <given-names>L.</given-names></name> <name><surname>Wu</surname> <given-names>T.</given-names></name><etal/></person-group> (<year>2022</year>). <article-title>Multi-level thresholding segmentation for pathological images: Optimal performance design of a new modified differential evolution.</article-title> <source><italic>Comput. Biol. Med.</italic></source> <volume>148</volume>:<fpage>105910</fpage>. <pub-id pub-id-type="doi">10.1016/j.compbiomed.2022.105910</pub-id> <pub-id pub-id-type="pmid">35961088</pub-id></citation></ref>
<ref id="B76"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Renugambal</surname> <given-names>A.</given-names></name> <name><surname>Selva Bhuvaneswari</surname> <given-names>K.</given-names></name></person-group> (<year>2021</year>). <article-title>Kapur&#x2019;s entropy based hybridised WCMFO algorithm for brain MR image segmentation.</article-title> <source><italic>IETE J. Res.</italic></source> <fpage>1</fpage>&#x2013;<lpage>20</lpage>. <pub-id pub-id-type="doi">10.1080/03772063.2021.1906765</pub-id></citation></ref>
<ref id="B77"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Salimi</surname> <given-names>H.</given-names></name></person-group> (<year>2015</year>). <article-title>Stochastic fractal search: A powerful metaheuristic algorithm.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>75</volume> <fpage>1</fpage>&#x2013;<lpage>18</lpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2014.07.025</pub-id></citation></ref>
<ref id="B78"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Siri</surname> <given-names>S. K.</given-names></name> <name><surname>Kumar</surname> <given-names>S. P.</given-names></name> <name><surname>Latte</surname> <given-names>M. V.</given-names></name></person-group> (<year>2020</year>). <article-title>Threshold-based new segmentation model to separate the liver from CT scan images.</article-title> <source><italic>IETE J. Res.</italic></source> <fpage>1</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1080/03772063.2020.1795938</pub-id></citation></ref>
<ref id="B79"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Socha</surname> <given-names>K.</given-names></name> <name><surname>Dorigo</surname> <given-names>M.</given-names></name></person-group> (<year>2008</year>). <article-title>Ant colony optimization for continuous domains.</article-title> <source><italic>Eur. J. Oper. Res.</italic></source> <volume>185</volume> <fpage>1155</fpage>&#x2013;<lpage>1173</lpage>. <pub-id pub-id-type="doi">10.1016/j.ejor.2006.06.046</pub-id></citation></ref>
<ref id="B80"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Song</surname> <given-names>L.</given-names></name> <name><surname>Lin</surname> <given-names>J.</given-names></name> <name><surname>Wang</surname> <given-names>Z. J.</given-names></name> <name><surname>Wang</surname> <given-names>H.</given-names></name></person-group> (<year>2020</year>). <article-title>An end-to-end multi-task deep learning framework for skin lesion analysis.</article-title> <source><italic>IEEE J. Biomed. Health Inform.</italic></source> <volume>24</volume> <fpage>2912</fpage>&#x2013;<lpage>2921</lpage>. <pub-id pub-id-type="doi">10.1109/JBHI.2020.2973614</pub-id> <pub-id pub-id-type="pmid">32071016</pub-id></citation></ref>
<ref id="B81"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Song</surname> <given-names>Y.</given-names></name> <name><surname>Cai</surname> <given-names>X.</given-names></name> <name><surname>Zhou</surname> <given-names>X.</given-names></name> <name><surname>Zhang</surname> <given-names>B.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Li</surname> <given-names>Y.</given-names></name><etal/></person-group> (<year>2023</year>). <article-title>Dynamic hybrid mechanism-based differential evolution algorithm and its application.</article-title> <source><italic>Exp. Syst. Appl.</italic></source> <volume>213</volume>:<fpage>118834</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2022.118834</pub-id></citation></ref>
<ref id="B82"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Storn</surname> <given-names>R.</given-names></name> <name><surname>Price</surname> <given-names>K.</given-names></name></person-group> (<year>1997</year>). <article-title>Differential evolution-a simple and efficient heuristic for global optimization over continuous space.</article-title> <source><italic>J. Glob. Optim.</italic></source> <volume>11</volume> <fpage>341</fpage>&#x2013;<lpage>359</lpage>. <pub-id pub-id-type="doi">10.1023/A:1008202821328</pub-id></citation></ref>
<ref id="B83"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Su</surname> <given-names>H.</given-names></name> <name><surname>Zhao</surname> <given-names>D.</given-names></name> <name><surname>Elmannai</surname> <given-names>H.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Bourouis</surname> <given-names>S.</given-names></name> <name><surname>Wu</surname> <given-names>Z.</given-names></name><etal/></person-group> (<year>2022</year>). <article-title>Multilevel threshold image segmentation for COVID-19 chest radiography: A framework using horizontal and vertical multiverse optimization.</article-title> <source><italic>Comput. Biol. Med.</italic></source> <volume>146</volume>:<fpage>105618</fpage>. <pub-id pub-id-type="doi">10.1016/j.compbiomed.2022.105618</pub-id> <pub-id pub-id-type="pmid">35690477</pub-id></citation></ref>
<ref id="B84"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Su</surname> <given-names>Y.</given-names></name> <name><surname>Li</surname> <given-names>S.</given-names></name> <name><surname>Zheng</surname> <given-names>C.</given-names></name> <name><surname>Zhang</surname> <given-names>X.</given-names></name></person-group> (<year>2019</year>). <article-title>A heuristic algorithm for identifying molecular signatures in cancer.</article-title> <source><italic>IEEE Trans. Nanobioscience</italic></source> <volume>19</volume> <fpage>132</fpage>&#x2013;<lpage>141</lpage>. <pub-id pub-id-type="doi">10.1109/TNB.2019.2930647</pub-id> <pub-id pub-id-type="pmid">31352348</pub-id></citation></ref>
<ref id="B85"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Tu</surname> <given-names>J.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Wang</surname> <given-names>M.</given-names></name> <name><surname>Gandomi</surname> <given-names>A. H.</given-names></name></person-group> (<year>2021</year>). <article-title>The colony predation algorithm.</article-title> <source><italic>J. Bionic Eng.</italic></source> <volume>18</volume> <fpage>674</fpage>&#x2013;<lpage>710</lpage>. <pub-id pub-id-type="doi">10.1007/s42235-021-0050-y</pub-id></citation></ref>
<ref id="B86"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>G.-G.</given-names></name> <name><surname>Gao</surname> <given-names>D.</given-names></name> <name><surname>Pedrycz</surname> <given-names>W.</given-names></name></person-group> (<year>2022</year>). <article-title>Solving multi-objective fuzzy job-shop scheduling problem by a hybrid adaptive differential evolution algorithm.</article-title> <source><italic>IEEE Trans. Industr. Inform.</italic></source> <volume>18</volume> <fpage>8519</fpage>&#x2013;<lpage>8528</lpage>. <pub-id pub-id-type="doi">10.1109/TII.2022.3165636</pub-id></citation></ref>
<ref id="B87"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>M. J.</given-names></name> <name><surname>Chen</surname> <given-names>H. L.</given-names></name> <name><surname>Yang</surname> <given-names>B.</given-names></name> <name><surname>Zhao</surname> <given-names>X. H.</given-names></name> <name><surname>Hu</surname> <given-names>L. F.</given-names></name> <name><surname>Cai</surname> <given-names>Z. N.</given-names></name><etal/></person-group> (<year>2017</year>). <article-title>Toward an optimal kernel extreme learning machine using a chaotic moth-flame optimization strategy with applications in medical diagnoses.</article-title> <source><italic>Neurocomputing</italic></source> <volume>267</volume> <fpage>69</fpage>&#x2013;<lpage>84</lpage>. <pub-id pub-id-type="doi">10.1016/j.neucom.2017.04.060</pub-id></citation></ref>
<ref id="B88"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>S.</given-names></name> <name><surname>Chen</surname> <given-names>Z.</given-names></name> <name><surname>You</surname> <given-names>S.</given-names></name> <name><surname>Wang</surname> <given-names>B.</given-names></name> <name><surname>Shen</surname> <given-names>Y.</given-names></name> <name><surname>Lei</surname> <given-names>B.</given-names></name></person-group> (<year>2022</year>). <article-title>Brain stroke lesion segmentation using consistent perception generative adversarial network.</article-title> <source><italic>Neural Comput. Appl.</italic></source> <volume>34</volume> <fpage>8657</fpage>&#x2013;<lpage>8669</lpage>. <pub-id pub-id-type="doi">10.1007/s00521-021-06816-8</pub-id></citation></ref>
<ref id="B89"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Z.</given-names></name> <name><surname>Bovik</surname> <given-names>A. C.</given-names></name> <name><surname>Sheikh</surname> <given-names>H. R.</given-names></name> <name><surname>Simoncelli</surname> <given-names>E. P.</given-names></name></person-group> (<year>2014</year>). <article-title>Image quality assessment: From error visibility to structural similarity.</article-title> <source><italic>IEEE Trans. Image Process.</italic></source> <volume>13</volume> <fpage>600</fpage>&#x2013;<lpage>612</lpage>. <pub-id pub-id-type="doi">10.1109/TIP.2003.819861</pub-id> <pub-id pub-id-type="pmid">15376593</pub-id></citation></ref>
<ref id="B90"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>Z.</given-names></name> <name><surname>Li</surname> <given-names>G.</given-names></name> <name><surname>Shen</surname> <given-names>S.</given-names></name> <name><surname>Lian</surname> <given-names>X.</given-names></name> <name><surname>Chen</surname> <given-names>E.</given-names></name> <name><surname>Xu</surname> <given-names>G.</given-names></name></person-group> (<year>2021a</year>). <article-title>Constructing dummy query sequences to protect location privacy and query privacy in location-based services.</article-title> <source><italic>World Wide Web</italic></source> <volume>24</volume> <fpage>25</fpage>&#x2013;<lpage>49</lpage>. <pub-id pub-id-type="doi">10.1007/s11280-020-00830-x</pub-id></citation></ref>
<ref id="B91"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>Z.</given-names></name> <name><surname>Li</surname> <given-names>R.</given-names></name> <name><surname>Zhou</surname> <given-names>Z.</given-names></name> <name><surname>Guo</surname> <given-names>J.</given-names></name> <name><surname>Jiang</surname> <given-names>J.</given-names></name> <name><surname>Su</surname> <given-names>X.</given-names></name></person-group> (<year>2020a</year>). <article-title>A user sensitive subject protection approach for book search service.</article-title> <source><italic>J. Assoc. Inf. Sci. Technol.</italic></source> <volume>71</volume> <fpage>183</fpage>&#x2013;<lpage>195</lpage>. <pub-id pub-id-type="doi">10.1002/asi.24227</pub-id></citation></ref>
<ref id="B92"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>Z.</given-names></name> <name><surname>Shen</surname> <given-names>S.</given-names></name> <name><surname>Zhou</surname> <given-names>H.</given-names></name> <name><surname>Li</surname> <given-names>H.</given-names></name> <name><surname>Lu</surname> <given-names>C.</given-names></name> <name><surname>Zou</surname> <given-names>D.</given-names></name></person-group> (<year>2021b</year>). <article-title>An effective approach for the protection of user commodity viewing privacy in e-commerce website.</article-title> <source><italic>Knowl. Based Syst.</italic></source> <volume>220</volume>:<fpage>106952</fpage>. <pub-id pub-id-type="doi">10.1016/j.knosys.2021.106952</pub-id></citation></ref>
<ref id="B93"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wu</surname> <given-names>Z.</given-names></name> <name><surname>Wang</surname> <given-names>R.</given-names></name> <name><surname>Li</surname> <given-names>Q.</given-names></name> <name><surname>Lian</surname> <given-names>X.</given-names></name> <name><surname>Xu</surname> <given-names>G.</given-names></name> <name><surname>Chen</surname> <given-names>E.</given-names></name><etal/></person-group> (<year>2020b</year>). <article-title>A location privacy-preserving system based on query range cover-up for location-based services.</article-title> <source><italic>IEEE Trans. Veh. Technol.</italic></source> <volume>69</volume> <fpage>5244</fpage>&#x2013;<lpage>5254</lpage>. <pub-id pub-id-type="doi">10.1109/TVT.2020.2981633</pub-id></citation></ref>
<ref id="B94"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>X.</given-names></name></person-group> (<year>2010</year>). <article-title>Firefly algorithm stochastic test functions and design optimization.</article-title> <source><italic>Int. J. Bio-Inspired Comput.</italic></source> <volume>2</volume> <fpage>78</fpage>&#x2013;<lpage>84</lpage>. <pub-id pub-id-type="doi">10.1504/IJBIC.2010.032124</pub-id> <pub-id pub-id-type="pmid">35009967</pub-id></citation></ref>
<ref id="B95"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>X. S.</given-names></name> <name><surname>Deb</surname> <given-names>S.</given-names></name></person-group> (<year>2010</year>). &#x201C;<article-title>Cuckoo search via l&#x00E9;vy flights</article-title>,&#x201D; in <source><italic>Proceedings of the 2009 world congress on nature &#x0026; biologically inspired computing</italic></source> (<publisher-loc>Coimbatore</publisher-loc>: <publisher-name>IEEE</publisher-name>). <pub-id pub-id-type="doi">10.1109/NABIC.2009.5393690</pub-id></citation></ref>
<ref id="B96"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>Y.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Gandomi</surname> <given-names>A. H.</given-names></name></person-group> (<year>2021</year>). <article-title>Hunger games search: Visions, conception, implementation, deep analysis, perspectives, and towards performance shifts.</article-title> <source><italic>Exp. Syst. Appl.</italic></source> <volume>177</volume>:<fpage>114864</fpage>. <pub-id pub-id-type="doi">10.1016/j.eswa.2021.114864</pub-id></citation></ref>
<ref id="B97"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ye</surname> <given-names>X.</given-names></name> <name><surname>Liu</surname> <given-names>W.</given-names></name> <name><surname>Li</surname> <given-names>H.</given-names></name> <name><surname>Wang</surname> <given-names>M.</given-names></name> <name><surname>Chi</surname> <given-names>C.</given-names></name> <name><surname>Liang</surname> <given-names>G.</given-names></name><etal/></person-group> (<year>2021</year>). <article-title>Modified whale optimization algorithm for solar cell and pv module parameter identification.</article-title> <source><italic>Complexity</italic></source> <volume>2021</volume>:<fpage>8878686</fpage>. <pub-id pub-id-type="doi">10.1155/2021/8878686</pub-id></citation></ref>
<ref id="B98"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yong</surname> <given-names>J.</given-names></name> <name><surname>He</surname> <given-names>F.</given-names></name> <name><surname>Li</surname> <given-names>H.</given-names></name> <name><surname>Weiqing</surname> <given-names>Z.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>A novel bat algorithm based on collaborative and dynamic learning of opposite population</article-title>,&#x201D; in <source><italic>Proceedings of the 2018 IEEE 22nd international conference on computer supported cooperative work in design (CSCWD)</italic></source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>IEEE</publisher-name>). <pub-id pub-id-type="doi">10.1109/CSCWD.2018.8464759</pub-id></citation></ref>
<ref id="B99"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>You</surname> <given-names>S.</given-names></name> <name><surname>Lei</surname> <given-names>B.</given-names></name> <name><surname>Wang</surname> <given-names>S.</given-names></name> <name><surname>Chui</surname> <given-names>C. K.</given-names></name> <name><surname>Cheung</surname> <given-names>A. C.</given-names></name> <name><surname>Liu</surname> <given-names>Y.</given-names></name><etal/></person-group> (<year>2022</year>). <article-title>Fine perceptive gans for brain mr image super-resolution in wavelet domain.</article-title> <source><italic>IEEE Trans. Neural Netw. Learn. Syst.</italic></source> <fpage>1</fpage>&#x2013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1109/TNNLS.2022.3153088</pub-id> <pub-id pub-id-type="pmid">35254996</pub-id></citation></ref>
<ref id="B100"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yu</surname> <given-names>H.</given-names></name> <name><surname>Cheng</surname> <given-names>X.</given-names></name> <name><surname>Chen</surname> <given-names>C.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Liu</surname> <given-names>J.</given-names></name> <name><surname>Cai</surname> <given-names>Z.</given-names></name><etal/></person-group> (<year>2022a</year>). <article-title>Apple leaf disease recognition method with improved residual network.</article-title> <source><italic>Multimed. Tools Appl.</italic></source> <volume>81</volume> <fpage>7759</fpage>&#x2013;<lpage>7782</lpage>. <pub-id pub-id-type="doi">10.1007/s11042-022-11915-2</pub-id></citation></ref>
<ref id="B101"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yu</surname> <given-names>H.</given-names></name> <name><surname>Song</surname> <given-names>J.</given-names></name> <name><surname>Chen</surname> <given-names>C.</given-names></name> <name><surname>Heidari</surname> <given-names>A. A.</given-names></name> <name><surname>Liu</surname> <given-names>J.</given-names></name> <name><surname>Chen</surname> <given-names>H.</given-names></name><etal/></person-group> (<year>2022b</year>). <article-title>Image segmentation of leaf spot diseases on maize using multi-stage cauchy-enabled grey wolf algorithm.</article-title> <source><italic>Eng. Appl. Artif. Intell.</italic></source> <volume>109</volume>:<fpage>104653</fpage>. <pub-id pub-id-type="doi">10.1016/j.engappai.2021.104653</pub-id></citation></ref>
<ref id="B102"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yu</surname> <given-names>W.</given-names></name> <name><surname>Lei</surname> <given-names>B.</given-names></name> <name><surname>Ng</surname> <given-names>M. K.</given-names></name> <name><surname>Cheung</surname> <given-names>A. C.</given-names></name> <name><surname>Shen</surname> <given-names>Y.</given-names></name> <name><surname>Wang</surname> <given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>Tensorizing GAN with high-order pooling for Alzheimer&#x2019;s disease assessment.</article-title> <source><italic>IEEE Trans. Neural Netw. Learn. Syst.</italic></source> <volume>33</volume> <fpage>4945</fpage>&#x2013;<lpage>4959</lpage>. <pub-id pub-id-type="doi">10.1109/TNNLS.2021.3063516</pub-id> <pub-id pub-id-type="pmid">33729958</pub-id></citation></ref>
<ref id="B103"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>B.</given-names></name> <name><surname>Qi</surname> <given-names>H.</given-names></name> <name><surname>Ren</surname> <given-names>Y. T.</given-names></name> <name><surname>Sun</surname> <given-names>S. C.</given-names></name> <name><surname>Ruan</surname> <given-names>L. M.</given-names></name></person-group> (<year>2013</year>). <article-title>Application of homogenous continuous ant colony optimization algorithm to inverse problem of one-dimensional coupled radiation and conduction heat transfer.</article-title> <source><italic>Int. J. Heat Mass Transf.</italic></source> <volume>66</volume> <fpage>507</fpage>&#x2013;<lpage>516</lpage>. <pub-id pub-id-type="doi">10.1016/j.ijheatmasstransfer.2013.07.054</pub-id></citation></ref>
<ref id="B104"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>L.</given-names></name> <name><surname>Zhang</surname> <given-names>L.</given-names></name> <name><surname>Mou</surname> <given-names>X.</given-names></name> <name><surname>Zhang</surname> <given-names>D.</given-names></name></person-group> (<year>2011</year>). <article-title>FSIM: A feature similarity index for image quality assessment.</article-title> <source><italic>IEEE Trans. Image Process.</italic></source> <volume>20</volume> <fpage>2378</fpage>&#x2013;<lpage>2386</lpage>. <pub-id pub-id-type="doi">10.1109/TIP.2011.2109730</pub-id> <pub-id pub-id-type="pmid">21292594</pub-id></citation></ref>
<ref id="B105"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>X.</given-names></name> <name><surname>Zheng</surname> <given-names>J.</given-names></name> <name><surname>Wang</surname> <given-names>D.</given-names></name> <name><surname>Zhao</surname> <given-names>L.</given-names></name></person-group> (<year>2020</year>). <article-title>Exemplar-based denoising: A Unified low-rank recovery framework.</article-title> <source><italic>IEEE Trans. Circuits Syst. Video Technol.</italic></source> <volume>30</volume> <fpage>2538</fpage>&#x2013;<lpage>2549</lpage>. <pub-id pub-id-type="doi">10.1109/TCSVT.2019.2927603</pub-id></citation></ref>
<ref id="B106"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhu</surname> <given-names>A.</given-names></name> <name><surname>Xu</surname> <given-names>C.</given-names></name> <name><surname>Li</surname> <given-names>Z.</given-names></name> <name><surname>Wu</surname> <given-names>J.</given-names></name> <name><surname>Liu</surname> <given-names>Z.</given-names></name></person-group> (<year>2015</year>). <article-title>Hybridizing grey wolf optimization with differential evolution for global optimization and test scheduling for 3D stacked SoC.</article-title> <source><italic>J. Syst. Eng. Electron.</italic></source> <volume>26</volume> <fpage>317</fpage>&#x2013;<lpage>328</lpage>. <pub-id pub-id-type="doi">10.1109/JSEE.2015.00037</pub-id></citation></ref>
<ref id="B107"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhu</surname> <given-names>B.</given-names></name> <name><surname>Ma</surname> <given-names>S.</given-names></name> <name><surname>Xie</surname> <given-names>R.</given-names></name> <name><surname>Chevallier</surname> <given-names>J.</given-names></name> <name><surname>Wei</surname> <given-names>Y. M.</given-names></name></person-group> (<year>2018</year>). <article-title>Hilbert Spectra and empirical mode decomposition: A multiscale event analysis method to detect the impact of economic crises on the european carbon market.</article-title> <source><italic>Comput. Econ.</italic></source> <volume>52</volume> <fpage>105</fpage>&#x2013;<lpage>121</lpage>. <pub-id pub-id-type="doi">10.1007/s10614-017-9664-x</pub-id></citation></ref>
<ref id="B108"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zhu</surname> <given-names>F.</given-names></name> <name><surname>Li</surname> <given-names>X. X.</given-names></name> <name><surname>Yang</surname> <given-names>S. Y.</given-names></name> <name><surname>Chen</surname> <given-names>Y. Z.</given-names></name></person-group> (<year>2018</year>). <article-title>Clinical success of drug targets prospectively predicted by in silico study.</article-title> <source><italic>Trends Pharmacol. Sci.</italic></source> <volume>39</volume> <fpage>229</fpage>&#x2013;<lpage>231</lpage>. <pub-id pub-id-type="doi">10.1016/j.tips.2017.12.002</pub-id> <pub-id pub-id-type="pmid">29295742</pub-id></citation></ref>
</ref-list>
</back>
</article>