Advances in Recent NatureInspired Algorithms for Neural Engineering
View this Special IssueResearch Article  Open Access
José García, Paola Moraga, Matias Valenzuela, Broderick Crawford, Ricardo Soto, Hernan Pinto, Alvaro Peña, Francisco Altimiras, Gino Astorga, "A DbScan Binarization Algorithm Applied to Matrix Covering Problems", Computational Intelligence and Neuroscience, vol. 2019, Article ID 3238574, 16 pages, 2019. https://doi.org/10.1155/2019/3238574
A DbScan Binarization Algorithm Applied to Matrix Covering Problems
Abstract
The integration of machine learning techniques and metaheuristic algorithms is an area of interest due to the great potential for applications. In particular, using these hybrid techniques to solve combinatorial optimization problems (COPs) to improve the quality of the solutions and convergence times is of great interest in operations research. In this article, the dbscan unsupervised learning technique is explored with the goal of using it in the binarization process of continuous swarm intelligence metaheuristic algorithms. The contribution of the dbscan operator to the binarization process is analyzed systematically through the design of random operators. Additionally, the behavior of this algorithm is studied and compared with other binarization methods based on clusters and transfer functions (TFs). To verify the results, the wellknown set covering problem is addressed, and a realworld problem is solved. The results show that the integration of the dbscan technique produces consistently better results in terms of computation time and quality of the solutions when compared with TFs and random operators. Furthermore, when it is compared with other clustering techniques, we see that it achieves significantly improved convergence times.
1. Introduction
In recent years, different optimization methods based on evolutionary concepts have been explored. These methods have been used to solve complex problems, therein obtaining interesting levels of performance [1–3], and many such methods have been inspired by concepts extracted from abstractions of natural or social phenomena. These abstractions can be interpreted as search strategies according to an optimization perspective [4]. These algorithms are inspired, for example, by the collective behavior of birds, e.g., the cuckoo search algorithm [5]; the movement of fish, e.g., the artificial fish swarm algorithm (AFSA) [6]; particle movement, e.g., particle swarm optimization (PSO) [7]; the social interactions of bees (ABC) [8]; and the process of musical creation, as in the search for harmony (HS) [9] and in genetic algorithms (GA) [10], among others. Many of these algorithms work naturally in continuous spaces.
On the other hand, lines of research that allow robust algorithms associated with the solution of combinatorial optimization problems (COPs) to be obtained are of great interest in the areas of computer science and operations research. This interest is currently mainly related to decision making in complex systems. Many of these decisions require the evaluation of a very large combination of elements in addition to having to solve a COP to find a feasible and satisfactory result. Examples of COPs can be found in the areas of logistics, finance, transportation, biology, and many others. Depending on the definition of the problem, many COPs can be classified as NPhard. Among the most successful ways to address such problems, one common method is to simplify the model to attempt to solve instances of small to medium size using exact techniques. Large problems are usually addressed by heuristic or metaheuristic algorithms.
The idea of hybridization between metaheuristic techniques and methods from other areas aims to obtain more robust algorithms in terms of solution quality and convergence times. Stateoftheart proposals for hybridization mainly include the following: (i) mateheuristics, which combines heuristics or metaheuristics with mathematical programming [11]; (ii) hybrid heuristics, which corresponds to the integration of different heuristic or metaheuristic methods [12]; (iii) simheurístics, which combines simulation and metaheuristics [13]; and (iv) the hybridization between metaheuristics and machine learning [14]. Machine learning can be considered as a set of algorithms that enable the identification of significant, potentially useful information and learning through the use of data. In this work, useful information will be obtained using the data generated by a continuous metaheuristic algorithm through the use of the dbscan unsupervised learning technique to obtain robust binarizations of this algorithm.
Within the lines of this discussion, we aim to provide the following contributions:(i)A novel automatic learning binarization algorithm is proposed to allow metaheuristics commonly defined and used in continuous optimization to efficiently address COPs. This algorithm uses the dbscan unsupervised learning technique to perform the binarization process. The selected metaheuristics are particle swarm optimization (PSO) and cuckoo search (CS). Their selection is based on the fact that they are commonly used in continuous optimization and enable a method for adjusting their parameters in continuous spaces.(ii)These hybrid metaheuristics are applied to the wellknown set covering problem (SCP). This problem has been studied extensively in the literature, and therefore, there known instances where we can clearly evaluate the contribution of the dbscan binarization operator. On the other hand, the SCP has numerous practical realworld applications such as vehicle routing, railways, airline crew scheduling, microbial communities, and pattern finding [15–18].(iii)Random operators are designed to study the contribution of the dbscan binarization algorithm in the binarization process. Additionally, the behavior of dbscan binarization is studied, comparing it with binarization methods that use kmeans and transfer functions (TFs). Finally, the binarizations obtained by dbscan are used to solve a realworld problem.
The remainder of this article is structured as follows. Section 2 describes the SCP and some of its applications. In Section 3, a stateoftheart hybridization between the areas of machine learning and metaheuristics is provided, and the main binarization methods are described. Later, in Section 4, the proposed dbscan algorithm is detailed. The contributions of the dbscan operator are provided in Section 5. Additionally, in this section, the dbscan technique is studied by comparing it with other binarization techniques that use kmeans and TFs as a binarization mechanism. In Section 6, a realworld application problem is solved. Finally, in Section 7, conclusions and some future lines of research are given.
2. Set Covering Problem
SCP is one of the oldest and moststudied optimization problems and is well known to be NPhard [19]. Nevertheless, different solution algorithms have been developed. There exist exact algorithms that generally rely on the branchandbound and branchandcut methods to obtain optimal solutions [20, 21]. These methods, however, struggle to solve SCP instances that grow exponentially with the problem size. Even mediumsized problem instances often become intractable and can no longer be solved using exact algorithms. To overcome this issue, different heuristics have been proposed [22, 23].
For example, [22] presented a number of greedy algorithms based on a Lagrangian relaxation (called Lagrangian heuristics). Caprara et al. [24] introduced relaxationbased Lagrangian heuristics applied to the SCP. Metaheuristics, e.g., genetic algorithms [25], simulated annealing [26], and ant colony optimization [27], have also been applied to solve the SCP. More recently, swarmbased metaheuristics, such as the cat swarm [28], cuckoo search [29], artificial bee colony [8], and black hole [30] metaheuristics, have also been proposed.
The SCP has many practical applications in engineering, e.g., vehicle routing, railways, airline crew scheduling, microbial communities, and pattern finding [15, 16, 18, 31].
The SCP can be formally defined as follows. Let be an zeroone matrix, where a column j covers a row i if , and a column j is associated with a nonnegative real cost . Let and be the row and column set of A, respectively. The SCP consists of searching a minimum cost subset for which every row is covered by at least one column , i.e.,where if and , otherwise.
3. Related Work
3.1. Related Binarization Work
A series of metaheuristic algorithms designed to work in continuous spaces have been developed. Particle swarm optimization (PSO) and cuckoo search (CS) are two of the most commonly used metaheuristic algorithms. On the other hand, the existence of a large number of hard combinatorial problems motivates the investigation of robust mechanisms that allow these continuous algorithms to be adapted to discrete versions.
In a review of the stateoftheart binarization techniques [32], two approximations were identified. The first approach considers general methods of binarization. In those general methods, there is a mechanism that allows the transformation of any continuous metaheuristic into a binary one without altering the metaheuristic operators. In this approach, the main frameworks used are TFs and angle modulation. The second approach corresponds to binarizations in which the method of operating metaheuristics is specifically altered. Under this second approach, notable techniques include quantum binary and setbased approaches.
3.1.1. Transfer Functions
The simplest and most widely used binarization method corresponds to TFs. TFs were introduced by [33] to generate binary versions of PSO. This algorithm considers each solution as a particle. The particle has a position given by a solution in an iteration and a velocity that corresponds to the vector obtained from the difference of the particle position between two consecutive iterations. The TF is a very simple operator and relates the velocity of the particles in PSO with a transition probability. The TF takes values from and generates transition probability values in . The TFs force the particles to move in a binary space. Depending on the function’s shape, they are usually classified as Sshape [34] and Vshape functions [1]. Once the function produces a value between 0 and 1, the next step is to use a rule that allows obtaining 0 or 1. For this, welldefined rules are applied that use the concepts of complement, elite, and random, among others.
3.1.2. Angle Modulation
This method is based on the family of trigonometric functions shown in equation (3). These functions have four parameters responsible for controlling the frequency and displacement of the trigonometric function:
The first time this method was applied to binarizations was in PSO. In this case, binary PSO was applied to benchmark functions. Assume a given binary problem of dimension n, and let be a solution. We start with a fourdimensional search space. Each dimension represents a coefficient of equation (3). Then, every solution is associated with a trigonometric function . For each element , the following rule is applied:
Then, for each initial solution of 4 dimensions , the function , which is shown in equation (3), is applied and then equation (4) is utilized. As a result, a binary solution of dimension n, , is obtained. This is a feasible solution for our nbinary problem. The angle modulation method has been applied to network reconfiguration problems [35] using a binary PSO method, to an antenna position problem using an angle modulation binary bat algorithm [36], and to a multiuser detection technique [37] using a binary adaptive evolutionary algorithm.
3.1.3. Quantum Binary Approach
There are three main types of algorithms in research that integrates the areas of evolutionary computation (EC) and quantum computation [38].(1)Quantum evolutionary algorithms: these methods correspond to the design of EC algorithms to be applied in a quantum computing environment(2)Evolutionarybased quantum algorithms: these algorithms attempt to automate the generation of new quantum algorithms using evolutionary algorithms(3)Quantuminspired evolutionary algorithms: this category uses quantum computing concepts to strengthen EC algorithms
In particular, the quantum binary approach is a type of quantuminspired evolutionary algorithm. Specifically, this approach adapts the concepts of qbits and superposition used in quantum computing applied to traditional computers.
In the quantum binary approach, each feasible solution has a position and a quantum qbit vector . Q represents the probability of taking the value 1. For each dimension j, a random number between [0, 1] is generated and compared with : if , then ; otherwise, . The upgrade mechanism of the Q vector is specific for each metaheuristic.
The main difficulty that general binarization frameworks face is related to the concept of spatial disconnect [39]. A spatial disconnect originates when nearby solutions generated by metaheuristics in the continuous space are not transformed into nearby solutions when applying the binarization process. Roughly speaking, we can think of a loss of the continuity of the framework. The spatial disconnect phenomenon consequently alters the properties of exploration and exploitation, and therefore the precision and convergence of the metaheuristics decrease. A study was conducted on how the TFs affect the exploration and exploitation properties in [40]. For angle modulation, a study was conducted in [39].
On the other hand, specific binarization algorithms that modify the operators of the metaheuristic are susceptible to problems such as Hamming cliffs, loss of precision, search space discretization, and the curse of dimensionality [39]. This was studied by [41] and for the particular case of PSO by [42]. In the latter, the authors observed that the parameters of the Binary PSO change the speed behavior of the original metaheuristic.
3.2. Hybridizing Metaheuristics with Machine Learning
Machine learning concerns algorithms that are capable of learning from a dataset [43]. This learning can be supervised, unsupervised, or semisupervised. Usually, these algorithms are used in problems of regression, classification, transformation, dimensionality reduction, time series, anomaly detection, and computational vision [44], among others. On the other hand, metaheuristics correspond to a broad family of algorithms designed to solve complex problems without the need for a deep adaptation of their mechanism when changing problems. They are incomplete techniques and generally have a set of parameters that must be adjusted for proper operation.
When a stateoftheart integration between metaheuristic and machine learning algorithms is developed, the integration is considered bidirectional. This means that there are studies whereby metaheuristic algorithms contribute to improving the performance of machine learning algorithms, and there are investigations where machine learning algorithms improve the convergence and quality of metaheuristic algorithms. In the case of metaheuristics that improve the performance of machine learning algorithms, we see that integration is found in all areas. In classification problems, we find that such algorithms have been used mainly in feature selection, feature extraction, and the tuning of parameters. In [45], a geneticSVM algorithm was developed to improve the recognition of breast cancer through image analysis. In this algorithm, genetic algorithms were used for the extraction of characteristics. A multiverse optimizer algorithm was used in [46] to perform the feature selection and parameter tuning of SVM on a robust system architecture. The training of feedforward neural networks was addressed using an improved monarch butterfly algorithm in [47]. In [48], a geotechnical problem was addressed by integrating a firefly algorithm with the least squares support vector machine technique. For the case of regression problems, we found in [49] an application in the prediction of the compressive strength of highperformance concrete using metaheuristicoptimized least squares support vector regression. The improved prediction of stock prices was addressed in [50], therein integrating metaheuristics and artificial neural networks. Additionally, in [51], a stock price prediction technique was developed using a slidingwindow metaheuristicoptimized machine learning regression applied to Taiwan’s construction companies. In [52], using a firefly version, the least squares vector regression parameters were optimized with the aim of improving the accuracy of the prediction in engineering design. In the case of unsupervised learning techniques, we find that metaheuristics have contributed significantly to clustering techniques. For example, in [53], an evolutionarybased clustering algorithm that combines a metaheuristic with a kernel intuitionistic fuzzy cmeans method was proposed with the aim of designing clustering solutions to apply them to different types of datasets. Also in clustering, centroid search is a problem type that suffers a large algorithmic complexity. This problem consists of the search for centroids with the objective of grouping the set of objects studied in an improved manner. Because this problem is NPhard, approximation methods have been proposed. For example, an improved artificial bee colony algorithm was developed in [54] with the goal of solving the energy efficiency clustering problem in a wireless sensor network. In [55], a mathematical model and a clustering search metaheuristic were developed for addressing the helicopter transportation planning of oil and gas production platform employees.
On the other hand, when looking for the contributions of machine learning techniques in metaheuristic algorithms, two main lines of research can be distinguished. The first line of research corresponds to specific integrations. In these integrations, machine learning techniques are integrated through a specific operator in one of the modules that establish the metaheuristic. The second line of research explores general integrations, where the machine learning techniques work as a selector of different metaheuristic algorithms, therein choosing the most appropriate for each instance. A metaheuristic, in addition to its evolution mechanism, usually uses solution initiation operators, solution perturbation, population management, binarization, the tuning of parameters, and local search operators, among others. The specific integrations explore the machine learning application on some of these operators. For the case of parameter tuning in [56], the parameter tuning of a chess rating system was implemented. Based on decision trees and using fuzzy logic, a semiautomatic parameter tuning algorithm was designed in [57]. Another relevant area of research is related to the design of binary versions of algorithms that work naturally in continuous spaces. This line of research aims to apply these binary versions in combinatorial problems. In this area, we find in [2] the application of unsupervised learning techniques to perform the binarization process. In [29], the percentile concept was explored in the process of generating binary algorithms. Additionally, in [17], the big data Apache spark framework was applied to manage the size of the solution population to improve the convergence times and quality of results. The randomness mechanism is frequently used for the initialization of the solutions of a metaheuristic. However, machine learning has been used to improve the solution initialization stage. In [58], casebased reasoning was used to initialize a genetic algorithm and apply it to the weightedcircle design problem. Hopfield neural networks were used in [59] to initiate solutions of a genetic algorithm that was used to solve an economic dispatch problem.
When analyzing the methods found in the literature addressing general integrations of machine learning algorithms on metaheuristics, we find three main groups: algorithm selection, hyperheuristics, and cooperative strategies. The objective of algorithm selection is to choose from a set of algorithms and a group of associated characteristics for each instance of the problem an algorithm that performs best for similar instances. In the hyperheuristics strategy, the goal is to automate the design of heuristics or metaheuristic methods to address a wide range of problems. Finally, cooperative strategies consist of combining algorithms in a parallel or sequential manner to obtain more robust methods. The cooperation can be completed by sharing the complete solution or partially when only part of the solution is shared. In [60], the berth scheduling problem at bulk terminals was addressed by algorithm selection techniques. The problem of nurse rostering through a tensorbased hyperheuristic algorithm was addressed in [61]. Finally, a distributed framework based on agents was proposed in [62]. In this case, each agent corresponds to a metaheuristic, and it has the ability to adapt through direct cooperation. This framework was applied to the problem of permutation flow stores.
4. Binary DbScan Algorithm
The binary dbscan algorithm is composed of five operators. The first operator, which will be detailed in Section 4.1, initializes the solutions. After the solutions are started, the next step is to verify if the maximum iteration criterion is met. When the criterion has not been met, the binary dbscan operator is executed. This operator continuously executes the metaheuristics and then clusters the solutions considering the absolute value of the velocity of the solutions. The details of this operator are described in Section 4.2. Subsequently, using the clusters generated by the dbscan operator, the transition operator will proceed to binarize the solutions generated by the continuous metaheuristics. When points are identified by dbscan as outliers, a transition operator for outliers is applied. The transition operator and the outlier operator are described in Section 4.3. Finally, when the obtained solutions do not satisfy all the restrictions, the repair operator described in Section 4.4 is applied. Additionally, a heuristic operator is used in the initiation and repair of the solutions. This operator is detailed in Section 4.5. The flow diagram of the binary dbscan algorithm is shown in Figure 1.
4.1. Initiation Operator
This operator attempts to initiate the solutions that the binary dbscan algorithm will use. The first step, the SelectRandomColumn() function select a column randomly. Then, the operator asks if the row coverage constraint is fulfilled. When the constraint is not met, the initiating operator calls the heuristic operator. This heuristic operator receives the list of columns that currently has the solution and returns a new column to be incorporated. The details of the heuristic operator are described in Section 4.5. The call to the heuristic operator is executed until all rows are covered. The procedure for initiating the solutions is shown in Algorithm 1.

4.2. Binary DbScan Operator
The goal of the binary dbscan operator is to group the different solutions obtained by the execution of the continuous metaheuristics. When considering solutions as particles, we will understand the position of the particle as the location of the solution in the search space. On the other hand, the velocity represents the transition vector of the particle from iteration t to iteration .
To perform the clustering, the densitybased spatial clustering of applications with noise (dbscan) algorithm is used. Dbscan is a data grouping algorithm proposed in 1996 by [63]. Dbscan uses the concept of density to perform the clustering: given a set of S points in a metric space, dbscan groups the points with many nearby neighbors, marking as outliers those that are alone in lowdensity regions. Dbscan requires two parameters: a radius ϵ and a minimum number of neighbors δ. The dbscan algorithm can be divided into the following steps:(i)Find the points in the ϵ neighborhood of every point and identify the core points with more than δ neighbors(ii)Find the connected components of core points on the neighbor graph, ignoring all noncore points(iii)Assign each noncore point to a nearby cluster if the cluster is an ϵ neighbor; otherwise, assign it to noise
Let be a swarm intelligence continuous metaheuristic and be the position list of the solutions given by at iteration t. The binary dbscan operator has input parameters and and aims to cluster the solutions given by . The first step of the operator is to iterate the list using to obtain the list of positions at iteration . Subsequently, using and , we obtain the list with transition velocities .
Let be the velocity vector in the transition between t and corresponding to particle p. This vector has n dimensions, where n depends on the number of columns that the problem possesses. Let be the value for dimension i of the vector . Then, corresponds to the list of absolute values of . Next, we apply dbscan to the list , thereby obtaining the number of clusters and the cluster to which each belongs , where . The procedure for the binary dbscan operator is shown in Algorithm 2.

4.3. Transition Operator
The dbscan operator returns the number of clusters and a list with the cluster identifier to which each element belongs: . The purpose of the transition operator is to binarize the solutions generated by and clustered by the binary dbscan operator. To perform the binarization, we must consider that the identifier of the clusters will be assigned in the following manner: a value of 0 will be assigned to the cluster that has with the lowest absolute value. Let and be elements of clusters J and I, respectively, and ; then, . The value of Id will be consecutive integers and . Finally, for the cases identified by dbscan as outliers, we have (). Then, each cluster will be assigned a transition probability given by equation (5). In this equation, α corresponds to the initial transition coefficient, and β corresponds to the transition probability coefficient.where T is the total number of clusters not considering outliers.
Finally, to execute the binarization process, consider as the position of a particle in iteration t. Let be the value of the dimension i for the particle , and let be the velocity of the particle in the i dimension to transform from iteration t to iteration . Additionally, consider that , where J is one of the clusters identified by the binary dbscan operator. Then, we use equation (6) to generate the binary position of the particles in iteration .
When , the procedure is as follows: From the complete list of outliers, the are ordered, starting with the solution with the best fitness and proceeding to those with the worst performance. The top 20% of solutions in terms of fitness is chosen, and a transition value of α is applied. For the remaining elements, a transition value of is applied. Finally, once the transition operator is applied, a repair operator is used, as described in Section 4.4 for solutions that do not satisfy some of the restrictions. The details of the transition operator are shown in Algorithm 3.
4.4. Repair Operator
The repair operator is executed after the execution of the transition operator. In the event that the coverage condition of the rows is not met, the repair operator uses the heuristic operator to add new columns. After all the rows are covered, we verify that there are no groups of columns that cover the same rows. The details of the repair operator are shown in Algorithm 4.

4.5. Heuristic Operator
When a solution needs to be started or repaired, a heuristic operator is used that selects a new element. As an input parameter, the operator considers the solution , which needs to be completed. In the case of being a new solution, . With the list of columns belonging to , we obtain the set of rows R not covered by the solution. With the set of rows not covered and using equation (7), we obtain in line 4 the best 10 rows to be covered. With this list of rows () online 5, we obtain the list of the best columns according to the heuristic shown in equation (8). Finally, in line 6, we randomly obtain the column to incorporate. The details of the heuristic operator are shown in Algorithm 5.where L_{i} is the sum of all ones in row i.where M_{j} is the set of rows covered by Colj.

5. Results
To determine the contribution of the dbscan algorithm to the binarization process, three groups of experiments are performed. The first group compares the dbscan algorithm with two random operators, as detailed in Section 5.2. The second group considers comparing dbscan with the kmeans clustering technique. The results are shown in Section 5.3, and the details of the kmeans technique can be found in [1]. Finally, the third group is shown in Section 5.4 and compares the binarization performed by dbscan with the binarization using TFs. The latter is a technique widely used in the binarization of continuous algorithms. Additionally, in Section 5.1, we describe the methodology used to define the parameters of the utilized algorithms.
CS [5] and PSO [7] were the selected algorithms. These algorithms are chosen for three reasons. Both algorithms are quite simple to parameterize; thus, the study can focus on the binarization technique rather than the parameterization. On the other hand, both algorithms have satisfactorily resolved nonlinear optimization problems [17, 32, 64–66]. Finally, simplified theoretical convergence models for both PSO [39] and CS [67] have been developed.
For the evaluation of the dbscan algorithm, instances E, F, G, and H, which correspond to the most difficult instances from Beasley’s OR library, were used. For the execution of the instances, we used a PC with Windows 10 and an Intel Core i78550U processor with 16 GB of RAM. The algorithm was programmed in Python 3.7. To perform the statistical analysis in this study, the nonparametric Wilcoxon signedrank test and violin charts were used. The analysis was performed by comparing the dispersion, median, and interquartile ranges of the distributions.
5.1. Parameter Settings
To obtain the parameters necessary to generate the binary algorithms dbscanPSO and dbscanCS, the methodology proposed in [1, 2] was selected. This methodology uses 4 measures defined in equations (9) to (12) to determine the best configuration. To be able to compare the different configurations, there are 4 measures, which are located on a radar chart, and the area under the curve is calculated for each configuration. The configuration with the largest area is selected.(1)The percentage deviation of the best value obtained in the ten executions compared with the best known value (see equation (9))(2)The percentage deviation of the worst value obtained in the ten executions compared with the best known value (see equation (10))(3)The percentage deviation of the average value obtained in the ten executions compared with the best known value (see equation (11))(4)The convergence time for the best value in each experiment normalized according to equation (12)
For PSO, the coefficients and are set to 2. ω is linearly decreased from 0.9 to 0.4. For the parameters used by dbscan, the minimum number of neighbors () is estimated as a percentage of the number of particles (N). Specifically, if and , then the minimum number of neighbors for the point to be considered within a cluster is 5. To select the parameters, problems E.1, F.1, G.1, and H.1 were chosen. The parameter settings are shown in Tables 1 and 2. In both tables, the column labeled Value represents the selected value, and the column labeled Range corresponds to the set of scanned values.


5.2. Contribution of DbScan Binary Operator
This section attempts to understand the contribution of the dbscan operator when compared with two random operators. The random operator models the situation whereby the transition probability does not depend on the velocity of the particle, unlike the dbscan operator, where the velocity strongly influences the cluster in which it will be located. Two random operators were considered. The first case (naive) is whereby each point has the same probability of transition and therefore is independent of the velocity. In the experiment, two conditions were considered for the random operator. First, the operator 0.25 has a fixed probability of 0.25; second, the operator 0.5 uses a fixed transition probability of 0.5. To make the comparison, CS was used. The second random operator, 5, additionally includes the concept of clusters. In this second operator, 5 clusters are defined, where 5 corresponds to, on average, the clusters obtained by dbscan when executing the different instances. Subsequent to each cluster, a transition probability of the set is assigned without repetitions. Finally, each particle randomly assigns a cluster.
The results obtained using the operator are shown in Table 3 and Figure 2. When we analyzed the best and average indicators shown in the table, the superiority of the results obtained by  over those obtained by the 0.5 and 0.25 operators was observed. This difference is consistent in all instances. The Wilcoxon test indicates that the difference is significant. When analyzing the violin charts, we see that the dispersion, interquartile range, and median are substantially more robust when using the  operator. This experiment is a strong indicator that, in the binarization process, i.e., the assignment of a transition probability to a particle, it is critical to consider the behavior of the particle in the search space. This allows us to obtain better behaving methods.

For the operator, the results are shown in Table 4 and Figure 3. In this experiment, the PSO and CS algorithms were used. When we analyzed the results of the table, it is observed that  has a better behavior than in both algorithms. When analyzing Figure 3, it is observed that the median, interquartile range, and dispersion measures obtain better results with the  operator. Additionally, we should note that achieves a better performance than , which suggests that assigning random transition probabilities by groups is more appropriate than assigning them randomly.

5.3. KMeans Algorithm Comparison
Kmeans is another clustering technique that was used in [2] to binarize continuous swarm intelligence algorithms and applied to the knapsack problem. The objective of this section is to compare the behavior of the binarization used by dbscan with that used by kmeans. The kmeans technique, unlike dbscan, is necessary to define the number of clusters. On the other hand, the computational complexity of kmeans once the number of clusters (k) and the dimension (d) of the points are fixed is , where n is the number of points to be clustered. The computational complexity of dbscan is . In this experiment, the quality of the solutions and their execution times are compared. For the case of kmeans, k = 5. In the case of dbscan, the number of clusters is variable. For comparison, the same dataset as in the previous experiment is used. In Table 5, the results of the binarization for CS and PSO are shown using the kmeans and dbscan operators. When we observe the best and average indicators, we see that their values are very similar for both the implementation with kmeans and the implementation with dbscan. Moreover, when we use the Wilcoxon test, we see that the small differences are not significant. However, when we analyze the execution times, we see that dbscan improves the times obtained by kmeans. When we compare the interquartile range and the dispersion shown in Figure 4, we see that the results are very similar. Considering that kmeans handles a fixed number of clusters and given that, in the case of dbscan, this can be variable, the quality of the solutions is not affected significantly.

5.4. Transfer Function Comparison
In this section, we detail the experiments that allow us to evaluate the behavior of binarization using dbscan with respect to the TF. The TF is a general binarization mechanism that, instead of using the cluster concept to assign a transition probability, uses functions that map in the space . Usually, two families of functions are used: vshape () and sshape () functions. For more details about TFs, we recommended [32].
In our case, we used the vshape function with the parameter for both the CS and PSO algorithms. The methodology used to determine the family and the parameter τ corresponds to the same detailed in Section 5.1. The results are shown in Table 6 and Figure 5. For the TFs, 2000 iterations were considered for the experiment. From Table 6, it is observed when analyzing the best and average indicators that the binary algorithms obtained through dbscan achieve better performance than those obtained with the TF. When performing the Wilcoxon test, the obtained differences are significant. When we look at Figure 5, we see that the dispersion and interquartile ranges are considerably improved when using dbscan. We should note that the TF assigns a particular value of the transition probability to each solution based on a function, unlike dbscan, uses assignment by groups of solutions.

6. RealWorld Application
The crew scheduling problem (CSP) is related to building the work schedules of crews necessary to cover a planned timetable. The CSP is studied in operations research and is usually related to the airline industry, transit companies, and railways, among others. In this section, we are interested in using the binarizations obtained from applying the dbscan algorithm to the CSP.
The CSP, due to its difficulty, needs to be decomposed in several stages, where each stage has a given computational complexity. The literature contains variations of the CSP. These variations consider integration with other problems or the inclusion of new restrictions. For example, in the CPS in [68], attendance rates were studied. A CSP integration with the vehicle scheduling problem was developed in [69]. In [70], an application of the CSP with fairness preferences was explored. The crew pairing and fleet assignment problems were studied in [71].
The CSP starts with a timetable of services that must be executed with a certain frequency. On the other hand, the service needs to be executed in a certain time window. A service consists of a sequence of trips, where a trip has the following attributes: a start time, an end time, a departure station, an arrival station, and a crew that delivers the service. In terms of the above attributes, each trip is assigned a cost. When we consider a period of time and a crew, a roster must be generated. Then, the CSP consists of finding a subset of rosters that covers all trips at the minimum cost. The problem can be divided into two phases. The first phase corresponds to the generation of a pairing. A pairing is defined as a set of trips that are assigned to a single crew in a short period of time. In this pairing phase, a large number of pairings is generated that satisfy the constraints of the problem. A match must start and end at the same depot, and a cost must be associated. The second phase corresponds to the pairing optimization. At this stage, a selection is made of the best subset of all generated pairings to ensure that all trips are covered at a minimum cost. The modeling of this phase follows an approach based on the solution to set covering or set partitioning problems. In this work, we use a dataset on which the pairs were generated; therefore, we focus our efforts on performing the pairing optimization phase. To verify our algorithm, 7 datasets associated with realworld crew scheduling problems were used. These datasets come from an application from the Italian railways and have been provided by Ceria et al. [72]. Table 7 shows the datasets and their results. When we analyzed the table, we observed that although the problems were larger than the previous problems, the performances of the — and — binarizations were adequate. In the case of —, the gap for the best value was 0.52%, and, on average, it was 1.17%. For —, the gap for the best value was 0.52%, and, on average, it was 1.08%.

7. Conclusions
In this article, an algorithm was proposed that uses the dbscan technique with the goal of binarizing continuous swarm intelligence metaheuristics. To evaluate the proposed algorithm, as a first step, two random operators were designed with the objective of identifying the contribution of dbscan to the binarization process. Subsequently, the proposed dbscan algorithm was compared with two binarization techniques. The first technique is based on the clustering concept and uses the kmeans technique, where the number of clusters is fixed. The second technique uses TFs as a binarization mechanism. In the comparison with the binarization technique that uses the concept of imeans, the results were very similar. Those results were confirmed with the Wilcoxon test, which showed no significant differences between the two techniques. However, we must emphasize that the execution times of dbscan were shorter than those of kmeans. One point to consider is that the different methods of generating the clusters do not affect the quality of the solutions. In the case of kmeans, a fixed number of clusters, generated based on the proximity of the points, is defined. For dbscan, the number of clusters is variable and is generated based on the proximity and density of points. In comparison with the TFs, we observed that there is a significant difference in favor of dbscan. This suggests that it is more efficient in the binarization process to assign transition probabilities to groups than to assign them individually. The application of machine learning to metaheuristic algorithms is a line of research that has several aspects. We see that machine learning techniques can learn and help to understand under which conditions a metaheuristic algorithm performs efficiently. However, these techniques can be applied to other operators, such as perturbation operators, when a metaheuristic algorithm is trapped in a local minimum, and operators that control the population of a swarm intelligence algorithm to improve the intensification and diversification properties. Additionally, appealing to the nofreelunch theorem, it would be interesting to evaluate these algorithms when including machine learning tuning applied to other combinatorial problems.
Data Availability
The data used to support the findings of this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
José García was supported by the grant CONICYT/FONDECYT/INICIACION/11180056, Broderick Crawford was supported by the grant CONICYT/FONDECYT/REGULAR/1171243, and Ricardo Soto was supported by the grant CONICYT/FONDECYT/REGULAR/1190129.
References
 J. García, B. Crawford, R. Soto, and G. Astorga, “A clustering algorithm applied to the binarization of swarm intelligence continuous metaheuristics,” Swarm and Evolutionary Computation, vol. 44, pp. 646–664, 2019. View at: Publisher Site  Google Scholar
 J. García, B. Crawford, R. Soto, C. Castro, and F. Paredes, “A kmeans binarization framework applied to multidimensional knapsack problem,” Applied Intelligence, vol. 48, no. 2, pp. 357–380, 2018. View at: Publisher Site  Google Scholar
 R. Munoz, R. Olivares, C. Taramasco et al., “Using black hole algorithm to improve eegbased emotion recognition,” Computational Intelligence and Neuroscience, vol. 2018, Article ID 3050214, 21 pages, 2018. View at: Publisher Site  Google Scholar
 S. J. Nanda and G. Panda, “A survey on nature inspired metaheuristic algorithms for partitional clustering,” Swarm and Evolutionary Computation, vol. 16, pp. 1–18, 2014. View at: Publisher Site  Google Scholar
 X.S. Yang and S. Deb, “Cuckoo search via lévy flights,” in Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing, NaBIC 2009, pp. 210–214, IEEE, Coimbatore, India, December 2009. View at: Google Scholar
 M. Neshat, G. Sepidnam, M. Sargolzaei, and A. N. Toosi, “Artificial fish swarm algorithm: a survey of the stateoftheart, hybridization, combinatorial and indicative applications,” Artificial Intelligence Review, vol. 42, no. 4, pp. 965–997, 2014. View at: Publisher Site  Google Scholar
 R. Eberhart and J. Kennedy, “A new optimizer using particle swarm theory,” in Proceedings of the Micro Machine and Human Science MHS’95, pp. 39–43, IEEE, Nagoya, Japan, October 1995. View at: Google Scholar
 D. Karaboga, An Idea Based on Honey Bee Swarm for Numerical Optimization, Erciyes University, Engineering Faculty,” Computer Engineering Department, Kayseri, Turkey, 2005.
 Z. W. Geem, J. H. Kim, and G. V. Loganathan, “A new heuristic optimization algorithm: harmony search,” Simulation, vol. 76, no. 2, pp. 60–68, 2001. View at: Publisher Site  Google Scholar
 D. E. Golberg, Genetic Algorithms in Search, Optimization, and Machine Learning, Addion Wesley, Boston, MA, USA, 1989.
 M. Caserta and S. Voß, “Matheuristics: hybridizing metaheuristics and mathematical programming,” in Metaheuristics: Intelligent Problem Solving, Springer, Berlin, 2009. View at: Google Scholar
 E.G. Talbi, “Combining metaheuristics with mathematical programming, constraint programming and machine learning,” Annals of Operations Research, vol. 240, no. 1, pp. 171–215, 2016. View at: Publisher Site  Google Scholar
 A. A. Juan, J. Faulin, S. E. Grasman, M. Rabe, and G. Figueira, “A review of simheuristics: extending metaheuristics to deal with stochastic combinatorial optimization problems,” Operations Research Perspectives, vol. 2, pp. 62–72, 2015. View at: Publisher Site  Google Scholar
 L. Calvet, J. de Armas, D. Masip, and A. A. Juan, “Learnheuristics: hybridizing metaheuristics with machine learning for optimization with dynamic inputs,” Open Mathematics, vol. 15, no. 1, pp. 261–280, 2017. View at: Publisher Site  Google Scholar
 E. Balas and M. W. Padberg, “Set partitioning: a survey,” SIAM Review, vol. 18, no. 4, pp. 710–760, 1976. View at: Publisher Site  Google Scholar
 J. Borneman, M. Chrobak, G. Della Vedova, A. Figueroa, and T. Jiang, “Probe selection algorithms with applications in the analysis of microbial communities,” Bioinformatics, vol. 17, no. 1, pp. S39–S48, 2001. View at: Publisher Site  Google Scholar
 J. García, F. Altimiras, A. Peña, G. Astorga, and O. Peredo, “A binary cuckoo search big data algorithm applied to largescale crew scheduling problems,” Complexity, vol. 2018, Article ID 8395193, 15 pages, 2018. View at: Publisher Site  Google Scholar
 E. Boros, P. L. Hammer, T. Ibaraki, and A. Kogan, “Logical analysis of numerical data,” Mathematical Programming, vol. 79, no. 1–3, pp. 163–190, 1997. View at: Publisher Site  Google Scholar
 M. R. Gary and D. S. Johnson, “Computers and intractability,” in A Guide to the Theory of NPCompleteness, W. H. Freeman, New York, NY, USA, 1979. View at: Google Scholar
 E. Balas and M. C. Carrera, “A dynamic subgradientbased branchandbound procedure for set covering,” Operations Research, vol. 44, no. 6, pp. 875–890, 1996. View at: Publisher Site  Google Scholar
 J. E. Beasley, “An algorithm for set covering problem,” European Journal of Operational Research, vol. 31, no. 1, pp. 85–93, 1987. View at: Publisher Site  Google Scholar
 J. E. Beasley, “A Lagrangian heuristic for setcovering problems,” Naval Research Logistics, vol. 37, no. 1, pp. 151–164, 1990. View at: Publisher Site  Google Scholar
 J. E. Beasley and P. C. Chu, “A genetic algorithm for the set covering problem,” European Journal of Operational Research, vol. 94, no. 2, pp. 392–404, 1996. View at: Publisher Site  Google Scholar
 A. Caprara, M. Fischetti, and P. Toth, “A heuristic method for the set covering problem,” Operations Research, vol. 47, no. 5, pp. 730–743, 1999. View at: Publisher Site  Google Scholar
 B. Yelbay, Ş. İ. Birbil, and K. Bülbül, “The set covering problem revisited: an empirical study of the value of dual information,” Journal of Industrial & Management Optimization, vol. 11, no. 2, pp. 575–594, 2015. View at: Publisher Site  Google Scholar
 M. J. Brusco, L. W. Jacobs, and G. M. Thompson, “A morphing procedure to supplement a simulated annealing heuristic for costandcoveragecorrelated setcovering problems,” Annals of Operations Research, vol. 86, pp. 611–627, 1999. View at: Publisher Site  Google Scholar
 C. Valenzuela, B. Crawford, R. Soto, E. Monfroy, and F. Paredes, “A 2level metaheuristic for the set covering problem,” International Journal of Computers Communications & Control, vol. 7, no. 2, pp. 377–387, 2014. View at: Publisher Site  Google Scholar
 B. Crawford, R. Soto, N. Berríos et al., “A binary cat swarm optimization algorithm for the nonunicost set covering problem,” Mathematical Problems in Engineering, vol. 2015, Article ID 578541, 8 pages, 2015. View at: Publisher Site  Google Scholar
 J. García, B. Crawford, R. Soto, and G. Astorga, “A percentile transition ranking algorithm applied to binarization of continuous swarm intelligence metaheuristics,” in Proceedings of the International Conference on Soft Computing and Data Mining, pp. 3–13, Springer, Senai, Malaysia, January 2018. View at: Google Scholar
 J. García, B. Crawford, R. Soto, and P. García, “A multi dynamic binary black hole algorithm applied to set covering problem,” in Proceedings of the International Conference on Harmony Search Algorithm, pp. 42–51, Springer, Bilbao, Spain, February 2017. View at: Google Scholar
 R. S. Garfinkel and G. L. Nemhauser, Integer Programming, Wiley, New York, NY, USA, 1972.
 B. Crawford, R. Soto, G. Astorga, J. García, C. Castro, and F. Paredes, “Putting continuous metaheuristics to work in binary search spaces,” Complexity, vol. 2017, Article ID 8404231, 19 pages, 2017. View at: Publisher Site  Google Scholar
 J. Kennedy and R. C. Eberhart, “A discrete binary version of the particle swarm algorithm,” in Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics Computational Cybernetics and Simulation, pp. 4104–4108, IEEE, Orlando, FL, USA, October 1997. View at: Google Scholar
 Y. Yang, Y. Mao, P. Yang, and Y. Jiang, “The unit commitment problem based on an improved firefly and particle swarm optimization hybrid algorithm,” in Proceedings of the Chinese Automation Congress (CAC), pp. 718–722, IEEE, Changsha, Hunan, China, November 2013. View at: Google Scholar
 W. Liu, L. Liu, and D. Cartes, “Angle Modulated Particle Swarm Optimization Based Defensive Islanding of Large Scale Power Systems,” in Proceedings of the 2007 IEEE Power Engineering Society Conference and Exposition in AfricaPowerAfrica, pp. 1–8, Johannesburg, South Africa, 2007. View at: Publisher Site  Google Scholar
 D. Zakaria and D. A. Cartes, “Angle Modulated Particle Swarm Optimization Based Defensive Islanding of Large Scale Power Systems,” Computer Science and Its Applications, vol. 456, pp. 3–14, 2015. View at: Publisher Site  Google Scholar
 D. Swagatam, M. Rohan, and K. Rupam, “Multiuser detection in multicarrier cdma wireless broadband system using a binary adaptive differential evolution algorithm,” in Proceedings of the 15th Annual Conference on Genetic and Evolutionary Computation, pp. 1245–1252, GECCO, New York, NY, USA, July 2013. View at: Google Scholar
 G. Zhang, “Quantuminspired evolutionary algorithms: a survey and empirical study,” Journal of Heuristics, vol. 17, no. 3, pp. 303–351, 2011. View at: Publisher Site  Google Scholar
 B. J. Leonard, A. P. Engelbrecht, and C. W. Cleghorn, “Critical considerations on angle modulated particle swarm optimisers,” Swarm Intelligence, vol. 9, no. 4, pp. 291–314, 2015. View at: Publisher Site  Google Scholar
 S. Saremi, S. Mirjalili, and A. Lewis, “How important is a transfer function in discrete heuristic algorithms,” Neural Computing and Applications, vol. 26, no. 3, pp. 625–640, 2015. View at: Publisher Site  Google Scholar
 G. Pampara, “Angle modulated population based algorithms to solve binary problems,” University of Pretoria, Pretoria, South Affrica, 2012, PhD thesis. View at: Google Scholar
 E. Chen, J. Li, and X. Liu, “In search of the essential binary discrete particle swarm,” Applied Soft Computing, vol. 11, no. 3, pp. 3260–3269, 2011. View at: Publisher Site  Google Scholar
 C. M. Bishop, Pattern Recognition and Machine Learning, Springer, Berlin, Germany, 2006.
 J. García, C. Pope, and F. Altimiras, “A distributedmeans segmentation algorithm applied to lobesia botrana recognition,” Complexity, vol. 2017, Article ID 5137317, 14 pages, 2017. View at: Publisher Site  Google Scholar
 H. Kaur, J. Virmani, Kriti, and S. Thakur, “Chapter 10—a genetic algorithmbased metaheuristic approach to customize a computeraided classification system for enhanced screen film mammograms,” in UHealthcare Monitoring Systems, Advances in Ubiquitous Sensing Applications for Healthcare, N. Dey, A. S. Ashour, S. J. Fong, and S. Borra, Eds., pp. 217–259, Academic Press, Cambridge, MA, USA, 2019. View at: Google Scholar
 H. Faris, M. A. Hassonah, A. M. AlZoubi, S. Mirjalili, and I. Aljarah, “A multiverse optimizer approach for feature selection and optimizing svm parameters based on a robust system architecture,” Neural Computing and Applications, vol. 30, no. 8, pp. 2355–2369, 2018. View at: Publisher Site  Google Scholar
 H. Faris, I. Aljarah, and S. Mirjalili, “Improved monarch butterfly optimization for unconstrained global search and neural network training,” Applied Intelligence, vol. 48, no. 2, pp. 445–464, 2018. View at: Publisher Site  Google Scholar
 J.S. Chou and J. P. P. Thedja, “Metaheuristic optimization within machine learningbased classification system for early warnings related to geotechnical problems,” Automation in Construction, vol. 68, pp. 65–80, 2016. View at: Publisher Site  Google Scholar
 A.D. Pham, N.D. Hoang, and Q.T. Nguyen, “Predicting compressive strength of highperformance concrete using metaheuristicoptimized least squares support vector regression,” Journal of Computing in Civil Engineering, vol. 30, no. 3, Article ID 06015002, 2015. View at: Google Scholar
 M. Göçken, M. Özçalıcı, A. Boru, and A. T. Dosdoğru, “Integrating metaheuristics and artificial neural networks for improved stock price prediction,” Expert Systems with Applications, vol. 44, pp. 320–331, 2016. View at: Publisher Site  Google Scholar
 J.S. Chou and T.K. Nguyen, “Forward forecast of stock price using slidingwindow metaheuristicoptimized machinelearning regression,” IEEE Transactions on Industrial Informatics, vol. 14, no. 7, pp. 3132–3142, 2018. View at: Publisher Site  Google Scholar
 J.S. Chou and A.D. Pham, “Natureinspired metaheuristic optimization in least squares support vector regression for obtaining bridge scour information,” Information Sciences, vol. 399, pp. 64–80, 2017. View at: Publisher Site  Google Scholar
 R. J. Kuo, T. C. Lin, F. E. Zulvia, and C. Y. Tsai, “A hybrid metaheuristic and kernel intuitionistic fuzzy cmeans algorithm for cluster analysis,” Applied Soft Computing, vol. 67, pp. 299–308, 2018. View at: Publisher Site  Google Scholar
 P. S. Mann and S. Singh, “Energy efficient clustering protocol based on improved metaheuristic in wireless sensor networks,” Journal of Network and Computer Applications, vol. 83, pp. 40–52, 2017. View at: Publisher Site  Google Scholar
 R. d. A. Rosa, A. M. Machado, G. M. Ribeiro, and G. R. Mauri, “A mathematical model and a clustering search metaheuristic for planning the helicopter transportation of employees to the production platforms of oil and gas,” Computers & Industrial Engineering, vol. 101, pp. 303–312, 2016. View at: Publisher Site  Google Scholar
 N. Vecek, M. Mernik, B. Filipic, and M. Xrepinsek, “Parameter tuning with chess rating system (crstuning) for metaheuristic algorithms,” Information Sciences, vol. 372, pp. 446–469, 2016. View at: Publisher Site  Google Scholar
 J. Ries and P. Beullens, “A semiautomated design of instancebased fuzzy parameter tuning for metaheuristics based on decision tree induction,” Journal of the Operational Research Society, vol. 66, no. 5, pp. 782–793, 2015. View at: Publisher Site  Google Scholar
 Z.q. Li, H.l. Zhang, J.h. Zheng, M.j. Dong, Y.f. Xie, and Z.j. Tian, “Heuristic evolutionary approach for weighted circles layout,” in Proceedings of the International Symposium on Information and Automation, pp. 324–331, Springer, Guangzhou, China, June 2010. View at: Google Scholar
 T. Yalcinoz and H. Altun, “Power economic dispatch using a hybrid genetic algorithm,” IEEE Power Engineering Review, vol. 21, no. 3, pp. 5960, 2001. View at: Publisher Site  Google Scholar
 A. D. de León, E. LallaRuiz, B. MeliánBatista, and J. Marcos MorenoVega, “A machine learningbased system for berth scheduling at bulk terminals,” Expert Systems with Applications, vol. 87, pp. 170–182, 2017. View at: Publisher Site  Google Scholar
 S. Asta, E. Ö.tae, and T. Curtois, “A tensor based hyperheuristic for nurse rostering,” Knowledgebased Systems, vol. 98, pp. 185–199, 2016. View at: Publisher Site  Google Scholar
 S. Martin, D. Ouelhadj, P. Beullens, E. Ozcan, A. A. Juan, and E. K. Burke, “A multiagent based cooperative approach to scheduling and routing,” European Journal of Operational Research, vol. 254, no. 1, pp. 169–178, 2016. View at: Publisher Site  Google Scholar
 M. Ester, H.P. Kriegel, J. Sander, and X. Xu, “A densitybased algorithm for discovering clusters in large spatial databases with noise,” Kdd Knowledge Discovery and Data Mining, vol. 96, pp. 226–231, 1996. View at: Google Scholar
 M. Jiang, J. Luo, D. Jiang, J. Xiong, H. Song, and J. Shen, “A cuckoo searchsupport vector machine model for predicting dynamic measurement errors of sensors,” IEEE Access, vol. 4, pp. 5030–5037, 2016. View at: Publisher Site  Google Scholar
 Y. Zhou, N. Wang, and W. Xiang, “Clustering hierarchy protocol in wireless sensor networks using an improved pso algorithm,” IEEE Access, vol. 5, pp. 2241–2253, 2017. View at: Publisher Site  Google Scholar
 C. Mao, R. Lin, C. Xu, and Q. He, “Towards a trust prediction framework for cloud services based on psodriven neural network,” IEEE Access, vol. 5, pp. 2187–2199, 2017. View at: Publisher Site  Google Scholar
 X.S. He, F. Wang, Y. Wang, and X.S. Yang, “Global convergence analysis of cuckoo search using markov theory,” in NatureInspired Algorithms and Applied Optimization, Springer, Berlin, Germany, 2018. View at: Google Scholar
 K. Hoffmann and U. Buscher, “Valid inequalities for the arc flow formulation of the railway crew scheduling problem with attendance rates,” Computers & Industrial Engineering, vol. 127, pp. 1143–1152, 2019. View at: Publisher Site  Google Scholar
 M. Horváth and T. Kis, “Computing strong lower and upper bounds for the integrated multipledepot vehicle and crew scheduling problem with branchandprice,” Central European Journal of Operations Research, vol. 27, no. 1, pp. 39–67, 2019. View at: Publisher Site  Google Scholar
 S. Jütte, D. Müller, and U. W. Thonemann, “Optimizing railway crew schedules with fairness preferences,” Journal of Scheduling, vol. 20, no. 1, pp. 43–55, 2017. View at: Publisher Site  Google Scholar
 O. Ö. Özener, M. Örmeci Matoğlu, G. Erdoğan, M. Haouari, and H. Sözer, “Solving a largescale integrated fleet assignment and crew pairing problem,” Annals of Operations Research, vol. 253, no. 1, pp. 477–500, 2017. View at: Publisher Site  Google Scholar
 S. Ceria, P. Nobili, and A. Sassano, “A Lagrangianbased heuristic for largescale set covering problems,” Mathematical Programming, vol. 81, no. 2, pp. 215–228, 1998. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2019 José García et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.