1 Introduction

Particle Swarm Optimization (PSO) by Kennedy and Eberhart [40] has been around 27 years since its first paper was published in 1995. Recently, Nayak et al. [56] surveyed the history of PSO spanning over 25 years, covering more than 450 literature sources. In their survey paper, PSO is highlighted as one of the most researched natural-inspired algorithms, extensively used not only by researchers but also by practitioners, together with discussing numerous improved variants and application domains. Furthermore, they point out that PSO forms the foundation of many recent metaheuristics.

Due to the simplicity of its structure and high performance, PSO has been applied in various fields:

  • Control Engineering: PSO is used for parameter tuning in control systems [61, 63, 69], solving optimal control problems, and applications such as robot control [7, 16, 52], path planning [6, 23, 24], and driver assistance systems in automobiles [10, 72, 108].

  • Machine Learning: PSO is employed for training machine learning models like neural networks [21, 32, 106], support vector machines [14, 28, 71, 80], or Bayesian networks [5, 30, 48]. It is used for tasks such as hyperparameter optimization and feature selection.

  • Image Processing: PSO finds applications in image segmentation, feature extraction, and image optimization. Examples include medical image processing [38, 43, 68, 102] and remote sensing [42, 57, 77, 87].

  • Combinatorial Optimization: PSO is utilized to solve combinatorial optimization problems, including the traveling salesman problem [62, 81, 104, 105], and placement problems [26, 31, 51, 76, 96, 100].

  • Power Systems: PSO plays a role in power network planning and control [46, 54, 66, 67, 91], demand management [41, 53, 99], and optimal placement of renewable energy sources [2, 20, 49, 55].

  • Other Applications: PSO is also used in data mining [9, 78, 85].

The search ability of the algorithm is greatly affected by three control parameters [29, 64, 97]: inertia weight, cognitive acceleration coefficient, and social acceleration coefficient. Early studies argued for stable solutions based on the assumption that inertia weight and acceleration coefficients should be constant values. Later, Shi and Eberhart [74] pointed out the effect of a linearly decreasing function of inertia weights with respect to time (or generation), although without an expression, and Ratnaweera et al. [65] extended a similar linear time-varying concept of an inertial weight to acceleration coefficients, and introduced a “crossing strategy" in which a monotonically decreasing cognitive acceleration coefficient and a monotonically increasing social acceleration coefficient are crossed during exploration to balance local exploitation and global exploration in exploration. However, the functional expressions of an inertia weight and acceleration coefficients are not identical, and the latter uses a simplified expression of the former. Chatterjee and Siarry [11] proposed a nonlinear function based on a linear decreasing function representation due to Shi and Eberhart [74] for faster solution convergence and better search accuracy. At about the same time, Zhang et al. [101] proposed nonlinear inertia weights with a logical switching rule, and Chen et al. [12] used nonlinear time-varying inertia weights with the square of the normalized time as a basic function. Xin et al. [92] proposed a multi-stage linearly-decreasing inertia weight method to achieve a better balance between global and local search, using the inertia weight representation used by Ratnaweera et al. [65]. Thus, various other nonlinear time-varying functions, exponential functions, and arbitrary adaptive functions have been proposed (see also a survey paper by Shami et al. [70]).

On the other hand, the cognitive and social acceleration coefficients were often set to constant values of 1.5 or 2.0 in early studies [15, 40, 73], so that there has been little discussion on its importance compared to the inertia weight. However, the time-varying inertia parameters inspired the proposal of linear time-varying acceleration coefficients [1, 65]. Subsequently, a nonlinear version of those of Ratnaweera et al. [65] as found in [86], those using various trigonometric functions [13, 36, 94], those of applying evaluation functions or related quantities to construct nonlinear time-varying acceleration coefficients [75, 90, 93], and even those using random acceleration coefficients [17, 34, 89, 107] have been proposed.

It should be noted, however, that there has been little systematic discussion on how to design or construct time-varying acceleration coefficients, including inertia weights. In this study, we present a unified design method for a nonlinear time-varying inertia weight or acceleration coefficients based on several time-related nonlinear functions, which are scaled linearly while satisfying initial and terminal boundary values. First, the normalized time is assumed to be the independent variable, and the basic functions are assumed to be monotonically decreasing or monotonically increasing functions that satisfy known initial and terminal values. However, when the basis function does not satisfy the specified boundary values (i.e., it is ill-posed), we propose to pre-compute fictitious boundary values for the inertia weight or acceleration coefficients and modify the inertia weight or acceleration coefficients so that they satisfy the actual specified boundary conditions.

Next, it is shown that in the crossing strategy where the cognitive acceleration coefficients and social acceleration coefficients are crossed during the search, if the relationship between the basic function and the ill-posed or well-posed boundary value is obtained, the crossing value and crossing time can be known in advance by using it. In particular, for asymmetric crossing strategies where the initial and terminal errors of the two acceleration coefficients are different in magnitude, it is pointed out that the crossing time of the two acceleration coefficients can be changed according to the ratio of the initial error. Furthermore, by introducing a parameter in the basic function that adjusts the shape of the function, it is possible to shift the crossing time in a symmetric crossing strategy where the magnitudes of the initial and terminal errors of the two acceleration coefficients are equal by changing this parameter, resulting in the ability to adjust the timing of convergence to the global best value. The results show that the convergence timing to the global best value can be adjusted by changing this parameter.

The effectiveness of the proposed algorithms (i.e., nonlinear crossing strategy-based PSOs: NCS-PSOs) is evaluated on CEC2014 (Congress on Evolutionary Computation in 2014) benchmark functions. That is, statistical analysis, Wilcoxon test, and Friedman test are used to evaluate optimization performance of NCS-PSOs, and the experimental results are compared with four state-of-the-art metaheuristics, as well as three classical PSO variants. A practical constraint programming of NCS-PSOs is studied for dealing with a 3D path optimization problem.

The structure of this paper is described below. Section 2 reviews how to design monotonically decreasing time-varying parameters that satisfy specified initial and terminal boundary values by linearly amplifying a linear basic function using monotonically increasing or decreasing functions with respect to normalized time. The basic functions are assumed to be well-posed, satisfying both boundary values, and monotonicity is guaranteed. In Section 3, when extending this concept to nonlinear basic functions that do not satisfy the boundary conditions, we show how to introduce fictitious boundary values. Section 4 derives the relationship between the basic functions and the boundary values in the crossing-strategy method for the two acceleration coefficients, so as to obtain the crossing values and crossing times for basic functions. Specific crossing times for the 10 selected basic functions are given in Section 5. In Section 6, the effectiveness of the proposed algorithm is evaluated on CEC2014 benchmark functions. After explaining a path optimization problem in Section 7, the effectiveness of the proposed method is also verified in Section 8 through an example of an actual optimization problem, in which six different nonlinear time-varying acceleration coefficients are used in 3D path planning for a drone, one using a series of normalized time as the basic function and several exponential functions with Napier’s constant as the base. The conclusion is given in Section 9.

2 Review of PSO and the design method of inertia weight with a linear time-varying function

2.1 Review of PSO

PSO is a search algorithm based on a group, and starts in the initial group of the solution which is called particles and which occurred at random. Each particle i in PSO is characterized by the position \(\varvec{x}_i (t) = [x_{i1} (t) \, x_{i2} (t) \,, \ldots , x_{iN}]^T\) and the velocity \(\varvec{v} _i (t) = [v_{i1} (t) \, v_{i2} (t) \,, \ldots , v_{iN}]^T\), where \(i=1, \ldots , M\), M makes the number of particles and N denotes the number of dimensions of search space. The optimal solution is performed by the following algorithms.

$$\begin{aligned} \varvec{v}_i(t+1)= & {} w(t) \varvec{v}_i(t) + c_1(t)\varvec{r}_{1i}(t)\circ [\varvec{p}_i(t) - \varvec{x}_i(t)] \nonumber \\{} & {} + c_2(t)\varvec{r}_{2i}(t)\circ [\varvec{g}(t) - \varvec{x}_i(t)] \end{aligned}$$
(1)
$$\begin{aligned} \varvec{x}_i(t+1)= & {} \varvec{x}_i(t) + \varvec{v}_i(t+1) \end{aligned}$$
(2)

Here, w(t) is the inertia weight, \(c_1 (t)\) and \(c_2(t)\) are respectively the cognitive and social coefficients (or acceleration coefficients), and \(\varvec{r}_{1i}(t)\) and \(\varvec{r}_{2i}(t) \) are two random vectors within [0, 1] taken from a uniform probability distribution. Moreover, the “\(\circ \)” sign is an operator denoting a product for every element between vectors; \(\varvec{p}_i (t) = [p_{i1} (t) \, p_{i2} (t) \,, \ldots , p_{iN}(t)]^T\) is the past best position vector of the ith particle; and \(\varvec{g}(t)= [g_{1} (t) \, g_{2} (t) \,, \ldots , g_{N}(t)]^T\) is the best position vector discovered by all the old particles.

2.2 Review of how to make a monotonically decreasing function with any known boundary values

Here, according to a monotonically increasing or decreasing basic function that includes a time variable, let us review how to make an inertia weight to be a monotonically decreasing function with any known initial and terminal values. However, the time is assumed to be normalized by the maximum time \(t_{\max }\). For example, consider a linear function about time t, which is described by

$$\begin{aligned} y(t) = t/t_{\max } \triangleq f(t,t_{\max }) \end{aligned}$$
(3)

Since this function is a monotonically increasing function whose initial and terminal values fill respectively \(f(t_0, t_{\max })=0\) and \(f(t_{\max }, t_{\max }) =1\) (i.e., it has well-posed boundary values), if \(t_0=0\), in order to make a monotonically decreasing function, let us transform it into

$$\begin{aligned} y(t) = 1- t/t_{\max } = 1- f(t,t_{\max }) \end{aligned}$$
(4)

Then, this monotonically decreasing function is scaled up to the function w(t) whose initial constant point is \(w_s\) and terminal constant point is \(w_e\). To this end, multiplying (4) by \((w_s - w_e)\) gives

$$\begin{aligned} y_1(t) = (w_s - w_e)[1- f(t,t_{\max })] \end{aligned}$$
(5)

where this \(y_1(t)\) becomes \(w_s - w_e\) if \(t=0\), whereas 0 if \(t=t_{\max }\). In addition, letting \(y_2(t) = y_1(t) + w_e\) yields that

$$\begin{aligned} y_2(t) = (w_s - w_e)[1- f(t,t_{\max })] + w_e \triangleq w(t) \end{aligned}$$
(6)

This clearly becomes \(w_s\) if \(t=0\), while \(w_e\) if \(t=t_{\max }\).

On the other hand, applying a monotonically decreasing function \(g(t,t_{\max })\) with well-posed boundary values, such as \(g(t_0, t_{\max })=1\) and \(g(t_{\max }, t_{\max })=0\), to make w(t) like the previous one, it follows, from the above result, immediately that

$$\begin{aligned} w(t) = (w_s - w_e)g(t,t_{\max }) + w_e \end{aligned}$$
(7)

Note that, from the equation of a line passing through two points \((0, w_s)\) and \((t_{\max }, w_e)\), (6) can also be derived as

$$\begin{aligned} w(t) - w_s = \frac{(w_e - w_s)}{t_{\max }}t \end{aligned}$$
(8)

Rewriting the expression that uses a monotonically increasing function \(t/t_{\max }\) in this equation by the expression that uses a monotonically decreasing function \((1- t/t_{\max })\), i.e.,

$$\begin{aligned} w(t)= w_1(1-t/t_{\max }) + w_2 \end{aligned}$$
(9)

comparing them, it follows readily that \(w_1 = w_s- w_e\) and \(w_2 = w_e\).

3 Calculation of fictitious boundary values

Since w(t), \(c_1(t)\) and \(c_2(t)\) are constituted in this paper using the form of time-varying parameter a(t) which is described later, consider designing or selecting \(f(t, t_{\max })\) or \(g(t, t_{\max })\) so that it may serve as a monotonically decreasing function or a monotonically increasing function.

$$\begin{aligned} a(t)= & {} (a_s - a_e)[1 - f(t, t_{\max })] + a_e \end{aligned}$$
(10)
$$\begin{aligned}= & {} (a_s - a_e) g(t, t_{\max }) + a_e \end{aligned}$$
(11)

Here, if \(f(t, t_ {\max })\) is considered as a monotonically increasing function with a well-posed boundary value, it should be satisfied such that \(f(t_0, t_ {\max }) =0\) and \(f(t_ {\max }, t_ {\max }) =1\). Similarly, if \(g(t, t_ {\max })\) is regarded as a monotonically decreasing function with a well-posed boundary value, it should be subjected to \(g(t_0, t_ {\max }) =1\) and \(g(t_ {\max }, t_ {\max }) =0\). Note here that when the monotonic increasing function f(t) is considered, if \((a_s - a_e) > 0\) according to (10), then \(1 - f(t)\) becomes a monotonically decreasing function, resulting in a monotonically decreasing parameter for a(t), whereas \(if (a_s - a_e) < 0\), then a(t) becomes a monotonically increasing parameter instead. Similarly, for the monotonic decreasing function g(t), if \((a_s - a_e) > 0\) according to (11), then a(t) immediately becomes a monotonically decreasing parameter, where \(if (a_s - a_e) < 0\), it becomes a monotonically increasing parameter instead.

However, in the selection of realistic \(f(\cdot )\) or \(g(\cdot )\), we often encounter the case that a terminal boundary value is not fulfilled though an initial boundary value is generally fulfilled, or that a terminal boundary value is fulfilled vice versa, but an initial boundary value is not fulfilled. In that case, the time-varying parameter in the above form becomes \(a(t) |_{t=t_0} \not = a_s\) or \(a(t) |_{t=t_{\max }} \not = a_e\), so that the exact estimate or setup of the parameter value in the starting point or the terminal point can not be performed. When the basic functions, \(f(\cdot ) \) and \(g(\cdot )\), are ill-posed which do not fulfill the appointed boundary values, reset the actual initial boundary value to be specified as \(a_{ini}\) or the actual terminal boundary value to be given as \(a_{ter}\). Then, the original \(a_s\) and \(a_e\) are regarded as a fictitious initial value or a fictitious termination value, respectively, and they are only set up as the intermediate variables, i.e., they are just accompanied to the equation of the parameter a(t).

3.1 For the case of an initially ill-posed boundary value

When the basic function is to be a monotonically increasing function \(f(t,t_{\max })\) with \(f(t_0,t_{\max })\not =0\): For this case, it follows from (10) that

$$\begin{aligned} a(t)|_{t=t_0} = (a_e - a_s)f(t_0, t_{\max }) + a_s \buildrel \triangle \over =a_{ini} \end{aligned}$$

or

$$\begin{aligned} a_{ini} = [1 - f(t_0, t_{\max })]a_s + f(t_0, t_{\max })a_e \end{aligned}$$

Given \(a_{ini}\), solving it about \(a_s\) yields

$$\begin{aligned} a_s = \frac{ a_{ini} - a_e f(t_0, t_{\max })}{1- f(t_0, t_{\max })} \end{aligned}$$
(12)

Thus, regarding \(a_s\) as a fictitious initial boundary value, it can be realized that \(a(t)|_{t=t_0} = a_{ini}\).

When the basic function is to be a monotonically decreasing function \(g(t,t_{\max })\) with \(g(t_0,t_{\max })\not =1\): For this case, it follows from (11) that

$$\begin{aligned} a(t) |_{t=t_0} = (a_s - a_e)g(t_0, t_{\max }) + a_e \buildrel \triangle \over =a_{ini} \end{aligned}$$

or

$$\begin{aligned} a_{ini} = a_s g(t_0, t_{\max }) - a_e[g(t_0, t_{\max }) - 1] \end{aligned}$$

Given \(a_{ini}\), solving it about \(a_s\) yields

$$\begin{aligned} a_s= & {} \frac{ a_{ini} + a_e[ g(t_0, t_{\max })-1]}{ g(t_0, t_{\max })} \nonumber \\= & {} \frac{a_{ini}}{g(t_0, t_{\max })} + a_e\left( 1 - \frac{1}{g(t_0, t_{\max } )}\right) \end{aligned}$$
(13)

Thus, regarding \(a_s\) as a fictitious initial boundary value, the given value \(a_{ini}\) can be assigned as the actual initial value such that \(a(t)|_{t=t_0} = a_{ini}\), instead of using \(a_s\).

3.2 For the case of a terminally ill-posed boundary value

When the basic function is to be a monotonically increasing function \(f(t,t_{\max })\) with \(f(t_{\max },t_{\max })\not =1\): For this case, it follows from (10) that

$$\begin{aligned} a(t) |_{t=t_{\max }} = (a_e - a_s)f(t_{\max }, t_{\max }) + a_s \buildrel \triangle \over =a_{ter} \end{aligned}$$

or

$$\begin{aligned} a_{ter} = [1 - f(t_{\max }, t_{\max })]a_s + f(t_{\max }, t_{\max })a_e \end{aligned}$$

Given \(a_{ter}\), solving it about \(a_e\) yields

$$\begin{aligned} a_e= & {} \frac{ a_{ter} - [1- f(t_{\max }, t_{\max }) ] a_s}{f(t_{\max }, t_{\max })} \nonumber \\= & {} \frac{a_{ter}}{f(t_{\max }, t_{\max })} + a_s\left( 1 - \frac{1}{f(t_{\max }, t_{\max } )}\right) \end{aligned}$$
(14)

Thus, regarding \(a_e\) as a fictitious terminal boundary value, it can be realized that \(a(t)|_{t=t_{\max }} = a_{ter}\).

When the basic function is to be a monotonically decreasing function \(g(t,t_{\max })\) with \(g(t_{\max },t_{\max })\not =0\): For this case, it follows from (11) that

$$\begin{aligned} a(t) |_{t=t_{\max }} = (a_s - a_e)g(t_{\max }, t_{\max }) + a_e \buildrel \triangle \over =a_{ter} \end{aligned}$$

or

$$\begin{aligned} a_{ter} = a_s g(t_{\max }, t_{\max }) + a_e[1 - g(t_{\max }, t_{\max })] \end{aligned}$$

Given \(a_{ter}\), solving it about \(a_e\) yields

$$\begin{aligned} a_e = \frac{ a_{ter} - a_s g(t_{\max }, t_{\max })}{1- g(t_{\max }, t_{\max })} \end{aligned}$$
(15)

Thus, regarding \(a_e\) as a fictitious terminal boundary value, the given value \(a_{ter}\) can be assigned as the actual terminal value such that \(a(t)|_{t=t_{\max }} = a_{ter}\), instead of using \(a_e\).

3.3 Examples of fictitious boundary values

Some fictitious boundary values are shown in several basic functions.

3.3.1 \(G(t, t_{\max })=\tan ^{-1}(\frac{t_{\max }-t}{t_{\max }})\)

This function is of used for constituting w(t) or \(c_1(t)\) in Jiang et al. [36], and

$$\begin{aligned} \left. \tan ^{-1} \left( \frac{t_{\max } - t}{t_{\max }}\right) \right| _{t=0} = \frac{\pi }{4},\; \left. \tan ^{-1}\left( \frac{t_{\max } - t}{t_{\max }}\right) \right| _{t=t_{\max }} = 0 \end{aligned}$$

Since

$$\begin{aligned} \frac{d\left[ \tan ^{-1}\frac{t_{\max } - t}{t_{\max }}\right] }{dt} = - \frac{1}{t_{\max }}\frac{1}{1+ \left( \frac{t_{\max } - t}{t_{\max }}\right) ^2} < 0 \end{aligned}$$

it is a monotonically decreasing function whose initial boundary value is ill-posed. Thus, it is found from (13) that the fictitious initial boundary value is reduced to

$$\begin{aligned} a_s= & {} \frac{a_{ini}}{\frac{\pi }{4}} + a_e \left( 1- \frac{1}{\frac{\pi }{4}}\right) \nonumber \\= & {} \frac{4}{\pi } (a_{ini} - a_e) + a_e \end{aligned}$$
(16)

Note that this function can have a well-posed boundary value, if it is modified as \(\frac{4}{\pi }\tan ^{-1} (\frac{t_{\max } - t}{t_{\max }} )\) by visual inspection.

3.3.2 \(G(t, t_{\max })=\cos (\pi t/t_{\max })\)

This function is used in Yang et al. [94] to make time-varying parameters \(c_1(t)\) and \(c_2(t)\). Since

$$\begin{aligned} \frac{d\cos (\pi t/t_{\max })}{dt} = - \frac{\pi }{t_{\max }} \sin (\pi t/t_{\max }) < 0 \end{aligned}$$

it is found that this function is to be a monotonically decreasing function, but the terminal boundary value is reduced to be ill-posed:

$$\begin{aligned} \cos (\pi t/t_{\max })|_{t=0} = 1,\quad \cos (\pi t/t_{\max })|_{t=t_{\max }} = -1 \end{aligned}$$

Thus, from (15), the fictitious terminal boundary value results in

$$\begin{aligned} a_e = \frac{ a_{ter} - a_s (-1)}{1- (-1)} = \frac{ a_{ter} + a_s}{2} \end{aligned}$$
(17)

Note that this function can take a well-posed terminal boundary value, if it is modified as \(\frac{1}{2}[\cos (\pi t/t_{\max })+1]\) by some rearrangements.

3.3.3 \(F(t, t_{\max })= e^{- (t_{\max }-t)/t_{\max }}\)

From the fact that

$$\begin{aligned} \frac{dF(t, t_{\max })}{dt} = \frac{1}{t_{\max }} F(t, t_{\max }) > 0 \end{aligned}$$

this monotonically increasing function provides \(F(0,t_{\max })\) \(=1/e\) and \(F(t_{\max }, t_{\max })=1\), so that the initial boundary value is to be ill-posed. Thus, from (12), the fictitious initial boundary value beomes

$$\begin{aligned} a_s = \frac{ a_{ini} - a_e /e}{1- 1/e} = \left( \frac{e}{e-1} \right) a_{ini} - \frac{a_e}{e - 1} \end{aligned}$$
(18)

3.3.4 \(G(t, t_{\max })= e^{- t_{\max }/(t_{\max }-t)}\)

Since

$$\begin{aligned} \frac{dG(t, t_{\max })}{dt} = - \frac{1}{t_{\max }(1- t/t_{\max })^2} G(t, t_{\max }) < 0 \end{aligned}$$

this monotonically decreasing function provides \(G(0,t_{\max })\) \(=1/e\) and \(G(t_{\max }, t_{\max })=0\), so that it has an ill-posed initial boundary value. Therefore, it is found from (13) that the fictitious initial boundary value results in

$$\begin{aligned} a_s = \frac{ a_{ini} }{1/e} + a_e \left( 1 - \frac{1}{1/e}\right) = e a_{ini} + a_e(1 - e) \end{aligned}$$
(19)

3.3.5 \(G(t, t_{\max })= e^{-\alpha t/t_{\max }}\)

Becuase of

$$\begin{aligned} \frac{dG(t, t_{\max })}{dt} = - \frac{\alpha }{t_{\max }} G(t, t_{\max }) < 0 \end{aligned}$$

this monotonically decreasing function gives \(G(0,t_{\max })=1\) and \(G(t_{\max }, t_{\max })=1/{e^{\alpha }}\), so that the terminal boundary value is not well-posed. Thus, it is found from (15) that the fictitious terminal boundary value is reduced to

$$\begin{aligned} a_e = \frac{ a_{ter} - a_s /e^{\alpha }}{1- 1/e^{\alpha }} = \left( \frac{e^{\alpha }}{e^{\alpha }-1} \right) a_{ter} - \frac{a_s}{e^{\alpha } - 1} \end{aligned}$$
(20)

3.3.6 \(F(t, t_{\max })= e^{- \alpha t_{\max }/t}\)

Since

$$\begin{aligned} \frac{dF(t, t_{\max })}{dt} = - \frac{\alpha t_{\max }}{t^2} F(t, t_{\max }) > 0 \end{aligned}$$

this monotonically increasing function provides \(F(0,t_{\max })\) \(=0\) and \(F(t_{\max }, t_{\max })=1/{e^{\alpha }}\), so that the terminal boundary value is ill-posed. Therefore, from (14), the fictitious terminal boundary value is found to be

$$\begin{aligned} a_e = \frac{ a_{ter} }{1/e^{\alpha }} + a_s \left( 1 - \frac{1}{1/e^{\alpha }}\right) = e^{\alpha } a_{ter} + a_s(1 - e^{\alpha }) \end{aligned}$$
(21)

4 Relationship between basic function and boundary values when adopting the crossing strategy of acceleration coefficients

In the crossing strategy proposed in this paper using nonlinear time-varying decreasing function \(c_1(t) \) and increasing function \(c_2(t)\) which are acceleration coefficients, the crossing time \(t_{cross}\) and crossing value \(c_{cross}\) are introduced as the amount of information in connection with the timing of intersection. Therefore, the relationship between the basic function and boundary values is derived in advance here when adopting a crossing strategy. It is roughly classified into four cases, depending on whether the basic function to be used is monotonically increasing or monotonically decreasing, or whether the initial boundary condition is ill-posed or the terminal boundary condition is ill-posed.

4.1 When the basic function is a monotonically increasing function with an ill-posed initial boundary condition

4.1.1 An asymmetric case about a crossing axis

When the acceleration coefficients \(c_1(t)\) and \(c_2(t)\) are asymmetrical about a crossing axis, using a fictitious initial boundary value in which the basic function is monotonically increasing with an ill-posed initial boundary condition, i.e., \(f(t_0, t_{\max }) \not =0\), \(c_1(t)\) and \(c_2(t)\) are respectively expressed as follows:

$$\begin{aligned} c_{1s} = \frac{ c_{1ini} - c_{1e} f(t_0, t_{\max })}{1- f(t_0, t_{\max })} \end{aligned}$$
(22)
$$\begin{aligned} c_{1}(t)= & {} (c_{1e} - c_{1s})f(t, t_{\max }) + c_{1s} \nonumber \\= & {} \left( c_{1e} - \frac{ c_{1ini} - c_{1e} f(t_0, t_{\max })}{1- f(t_0, t_{\max })} \right) f(t, t_{\max }) + c_{1s} \nonumber \\= & {} \left( \frac{ c_{1e} - c_{1ini}}{1- f(t_0, t_{\max })} \right) f(t, t_{\max }) \nonumber \\{} & {} + \frac{ c_{1ini} - c_{1e} f(t_0, t_{\max })}{1- f(t_0, t_{\max })} \end{aligned}$$
(23)
$$\begin{aligned} c_{2s} = \frac{ c_{2ini} - c_{2e} f(t_0, t_{\max })}{1- f(t_0, t_{\max })} \end{aligned}$$
(24)
$$\begin{aligned} c_{2}(t)= & {} (c_{2e} - c_{2s})f(t, t_{\max }) + c_{2s} \nonumber \\= & {} \left( c_{2e} - \frac{ c_{2ini} - c_{2e} f(t_0, t_{\max })}{1- f(t_0, t_{\max })} \right) f(t, t_{\max }) + c_{2s} \nonumber \\= & {} \left( \frac{ c_{2e} - c_{2ini}}{1- f(t_0, t_{\max })} \right) f(t, t_{\max }) \nonumber \\{} & {} + \frac{ c_{2ini} - c_{2e} f(t_0, t_{\max })}{1- f(t_0, t_{\max })} \end{aligned}$$
(25)

Equating (23) and (25), assuming that \(f(t_0, t_{\max })\not =0\) and \(f(t_0, t_{\max })\not =1\), it obtains

$$\begin{aligned}{} & {} [ (c_{2e} - c_{1e}) + (c_{1ini} - c_{2ini})]f(t, t_{\max }) \\{} & {} \qquad = ( c_{1ini} - c_{2ini} ) + (c_{2e} - c_{1e})f(t_0,t_{\max }) \end{aligned}$$

consequently it follows that

$$\begin{aligned} f(t, t_{\max }) = \beta + (1- \beta )f(t_0,t_{\max }) \end{aligned}$$
(26)

Here,

$$\begin{aligned} \beta = \frac{c_{12ini}}{c_{21e} + c_{12ini}} \end{aligned}$$
(27)

in which \(c_{12ini}\) denotes the actual initial error between two acceleration coefficients \(c_{1}(t)\) and \(c_{2}(t)\), \(c_{21e}\) is its terminal error, which are given by

$$\begin{aligned} c_{12ini} = c_{1ini} - c_{2ini},\quad c_{21e} = c_{2e} - c_{1e} \end{aligned}$$
(28)

where \(c_{12ini} \not =0\) and \(c_{21e}\not = 0\). Note here that \(c_1(t) \) and \(c_2(t) \) are asymmetrical means also that the initial acceleration coefficient error differs from the termination acceleration coefficient error. If \(f(t_0,t_{\max }) \equiv 0\), i.e., the initial boundary condition is well-posed, then (26) is reduced to

$$\begin{aligned} f(t, t_{\max }) = \beta \end{aligned}$$
(29)

Before discussing the symmetry of the crossing axis for the coefficients \(c_1(t)\) and \(c_2(t)\), we establish the relationship between the acceleration coefficient errors \(c_{12ini}\) at the initial point and \(c_{21e}\) at the terminal point to achieve this symmetry. In general, for the two time-varying coefficients \(c_1(t)\) and \(c_2(t)\) to be axisymmetric with respect to the time (or generation) axis for crossing strategies, they must intersect at least once along the time axis. This intersection should exhibit the property of symmetric movement, where the symmetry axis (crossing axis) becomes the perpendicular bisector of the line connecting corresponding points. The conditions for ensuring the symmetry of acceleration coefficients when the initial values are ill-posed can be categorized into three cases, introducing the ratio of acceleration coefficient errors at the initial point and the terminal point as:

$$\begin{aligned} \eta _{ii} = \frac{c_{12ini}}{c_{21e}} \end{aligned}$$
  1. 1.

    Case of \(\eta _{ii} = 1\) (i.e., \(c_{12ini} = c_{21e}\)): Additionally, the following conditions are necessary:

    $$\begin{aligned} c_{1ini} - c_{cross} = c_{cross} - c_{2ini} \quad \text {or} \quad c_{2e} - c_{cross} = c_{cross} - c_{1e} \end{aligned}$$
  2. 2.

    Case of \(\eta _{ii} > 1\): Further conditions are required:

    $$\begin{aligned} c_{1ini} - c_{cross} = c_{cross} - c_{2ini};\quad c_{2e} - c_{cross} = c_{cross} - c_{1e} \end{aligned}$$

    where \(c_{1ini} > c_{2e}\) or \(c_{1e} > c_{2ini}\).

  3. 3.

    Case of \(0< \eta _{ii} < 1\): Additional conditions apply:

    $$\begin{aligned} c_{1ini} - c_{cross} = c_{cross} - c_{2ini};\quad c_{2e} - c_{cross} = c_{cross} - c_{1e} \end{aligned}$$

where \(c_{2e} > c_{1ini}\) or \(c_{2ini} > c_{1e}\). In this discussion, we primarily focus on the case where \(\eta _{ii} = 1\). Furthermore, when the initial values are well-posed, we can design two axisymmetric acceleration coefficients by setting \(c_{1ini} = c_{1s}\), \(c_{2ini} = c_{2s}\), and \(c_{12ini} = c_{12s}\) (i.e., \(c_{12s} = c_{1s} - c_{2s}\)) in the above equations.

4.1.2 A symmetric case about a crossing axis

When \(c_1(t)\) and \(c_2(t)\) are symmetric about the crossing axis, or the initial acceleration coefficient error and the terminal acceleration error are equivalent, it obtains the condition of \(c_{12ini}=c_{21e}\), so that (26) becomes

$$\begin{aligned} f(t, t_{\max }) = \frac{1}{2} (1 + f(t_0,t_{\max })) \end{aligned}$$
(30)

Moreover, if the initial boundary condition is well-posed, then it follows that

$$\begin{aligned} f(t, t_{\max }) = \frac{1}{2} \end{aligned}$$
(31)
Fig. 1
figure 1

The fictitious initial value \(a_s\), crossing time \(t_{cross}\) and crossing value \(c_{cross}\), when the monotonic-increasing (MI) function \(f(t, t_{\max })\) is initially ill-posed

4.1.3 Crossing value

Here, a crossing value \(c_{cross}\) is solved, when using a crossing strategy. Substituting the relationship between the basic function and the initial boundary value in the asymmetrical crossing method, i.e., (26) into (23), letting \(c_1(t)\) at that time be \(c_{cross}\), it follows that

$$\begin{aligned} c_{cross}= & {} \frac{ (c_{1e} - c_{1ini}) [\beta + (1 -\beta )f(t_0,t_{\max })]}{1- f(t_0, t_{\max })} \\{} & {} + \frac{ c_{1ini} - c_{1e} f(t_0, t_{\max })}{1- f(t_0, t_{\max })} \\= & {} \frac{ (c_{1e} - c_{1ini})\beta + c_{1ini}}{1- f(t_0, t_{\max })} \\{} & {} + \frac{ [(c_{1e} - c_{1ini})(1 - \beta ) - c_{1e}] f(t_0, t_{\max })}{1- f(t_0, t_{\max })} \end{aligned}$$

Noting that \((c_{1e} - c_{1ini})(1 - \beta ) - c_{1e}\) \(= -[(c_{1e} - c_{1ini})\beta + c_{1ini}]\), the above equation is reduced to

$$\begin{aligned} c_{cross}= & {} \frac{ [(c_{1e} - c_{1ini})\beta + c_{1ini}](1- f(t_0, t_{\max }))}{ 1- f(t_0, t_{\max }) } \nonumber \\= & {} (c_{1e} - c_{1ini})\beta + c_{1ini} \end{aligned}$$
(32)

Since \(c_{1ini}=c_{2e}\) and \(\beta = 1/2\) in a symmetrical crossing strategy, it follows that

$$\begin{aligned} c_{cross} =\frac{1}{2} (c_{1ini} + c_{1e}) \equiv \frac{1}{2} (c_{1e} + c_{2e}) \end{aligned}$$
(33)

or using the fact of \(c_{1e} = c_{2ini}\), it is found that

$$\begin{aligned} c_{cross} =\frac{1}{2} (c_{1ini} + c_{2ini}) \equiv \frac{1}{2} (c_{2ini} + c_{2e}) \end{aligned}$$
(34)

Figure 1 summarizes the fictious initial values \(a_s\), crossing time \(t_{cross}\) and crossing value \(c_{cross}\) when the monotonically increasing function \(f(t,t_{\max })\) is initially ill-posed. However, \(t_{cross}\) must be obtained after the concrete \(f(t,t_{\max })\) is given. When \(f(t,t_{\max })\) is initially well-posed, it should take that \(f(t_0,t_{\max })\equiv 0\). Note also that the symmetric cross strategy denotes only for the case of \(c_{12ini}=c_{21e}\).

Fig. 2
figure 2

The fictitious initial value \(a_s\), crossing time \(t_{cross}\) and crossing value \(c_{cross}\), when the monotonic-decreasing (MD) function \(g(t, t_{\max })\) is initially ill-posed

4.2 When the basic function is a monotonically decreasing function with an ill-posed initial boundary condition

4.2.1 An asymmetric case about a crossing axis

When the acceleration coefficients \(c_1(t)\) and \(c_2(t)\) are asymmetrical about a crossing axis, using a fictitious initial boundary value in which the basic function is monotonically decreasing with an ill-posed initial boundary condition, i.e., \(g(t_0, t_{\max })\not =1\) and \(g(t_0, t_{\max })\not =0\), \(c_1(t)\) and \(c_2(t)\) are respectively expressed as follows:

$$\begin{aligned} c_{1s} = \frac{ c_{1ini} }{g(t_0, t_{\max })} + c_{1e} \left( 1- \frac{1}{g(t_0, t_{\max })} \right) \end{aligned}$$
(35)
$$\begin{aligned} c_{1}(t)= & {} (c_{1s} - c_{1e})g(t, t_{\max }) + c_{1e} \nonumber \\= & {} \left( \frac{ c_{1ini}}{g(t_0, t_{\max })} + c_{1e} - \frac{c_{1e}}{g(t_0, t_{\max })} - c_{1e} \right) \nonumber \\{} & {} \times g(t, t_{\max }) + c_{1e} \nonumber \\= & {} ( c_{1ini} - c_{1e})g(t, t_{\max })/ g(t_0, t_{\max }) + c_{1e} \end{aligned}$$
(36)
$$\begin{aligned} c_{2s} = \frac{ c_{2ini} }{g(t_0, t_{\max })} + c_{2e} \left( 1- \frac{1}{g(t_0, t_{\max })} \right) \end{aligned}$$
(37)
$$\begin{aligned} c_{2}(t)= & {} (c_{2s} - c_{2e})g(t, t_{\max }) + c_{2e} \nonumber \\= & {} \left( \frac{ c_{2ini}}{g(t_0, t_{\max })} + c_{2e} - \frac{c_{2e}}{g(t_0, t_{\max })} - c_{2e} \right) \nonumber \\{} & {} \times g(t, t_{\max }) + c_{2e} \nonumber \\= & {} ( c_{2ini} - c_{2e})g(t, t_{\max })/ g(t_0, t_{\max }) + c_{2e} \end{aligned}$$
(38)

Equating (36) and (38), assuming \(g(t_0, t_{\max })\not =0\), it obtains that

$$\begin{aligned}{} & {} (c_{1ini} - c_{1e}) g(t, t_{\max })/g(t_0, t_{\max }) + c_{1e} \\{} & {} \qquad = (c_{2ini} - c_{2e}) g(t, t_{\max })/g(t_0, t_{\max }) + c_{2e} \end{aligned}$$

or

$$\begin{aligned}{} & {} (c_{1ini} - c_{2ini}) g(t, t_{\max })/g(t_0, t_{\max }) \\{} & {} \quad + (c_{2e} - c_{1e}) g(t, t_{\max })/g(t_0, t_{\max }) = c_{2e} - c_{1e} \end{aligned}$$

In the sequel, if \(c_{12ini} \not =0\) and \(c_{21e} \not =0\), then it is found that

$$\begin{aligned} g(t, t_{\max })/ g(t_0, t_{\max })= 1- \beta \end{aligned}$$
(39)

When \(g(t_0,t_{\max }) \equiv 1\), i.e., the initial boundary condition is well-posed, it is easy to find that (39) is reduced to

$$\begin{aligned} g(t, t_{\max }) = 1- \beta \end{aligned}$$
(40)

4.2.2 A symmetric case about a crossing axis

When \(c_1(t)\) and \(c_2(t)\) are symmetric about the crossing axis, or the initial acceleration coefficient error and the terminal acceleration error are equivalent, i.e., \(c_{12ini}=c_{21e}\), it is easy to find that (39) becomes

$$\begin{aligned} g(t, t_{\max })/g(t_0, t_{\max }) = \frac{1}{2} \end{aligned}$$
(41)

Additionally, if the initial boundary condition is well-posed, i.e., \(g(t_0, t_{\max })\equiv 1\), then the above equation is reduced to

$$\begin{aligned} g(t, t_{\max }) = \frac{1}{2} \end{aligned}$$
(42)

4.2.3 Crossing value

Here, the crossing value \(c_{cross}\) is derived. Substituting the relationship between the basic function and the initial boundary value in the asymmetrical crossing method, i.e., (39) into (36), letting \(c_1(t)\) in that time be \(c_{cross}\), it is obtained that

$$\begin{aligned} c_{cross}= & {} (c_{1ini} - c_{1e}) (1 -\beta )g(t_0,t_{\max })/ g(t_0, t_{\max }) + c_{1e} \nonumber \\= & {} c_{1ini}(1 - \beta ) - c_{1e} (1- \beta ) + c_{1e} \nonumber \\= & {} c_{1ini}(1 - \beta ) + c_{1e}\beta \nonumber \\= & {} (c_{1e} - c_{1ini})\beta + c_{1ini} \end{aligned}$$
(43)

Since \(c_{1ini}=c_{2e}\) and \(\beta = 1/2\) in the symmetrical crossing strategy, it is easy to find that

$$\begin{aligned} c_{cross} =\frac{1}{2} (c_{1ini} + c_{1e}) \equiv \frac{1}{2} (c_{1e} + c_{2e}) \end{aligned}$$
(44)

or from the fact of \(c_{1e} = c_{2ini}\) that

$$\begin{aligned} c_{cross} =\frac{1}{2} (c_{1ini} + c_{2ini}) \equiv \frac{1}{2} (c_{2ini} + c_{2e}) \end{aligned}$$
(45)

Figure 2 summarizes the fictitious initial values \(a_s\), crossing time \(t_{cross}\) and crossing value \(c_{cross}\) when the monotonically decreasing function \(g(t,t_{\max })\) is initially ill-posed. However, \(t_{cross}\) must be obtained after the concrete \(g(t,t_{\max })\) is given. When \(g(t,t_{\max })\) is initially well-posed, it should take that \(g(t_0,t_{\max })\equiv 1\).

4.3 When the basic function is a monotonically decreasing function with an ill-posed terminal boundary condition

4.3.1 An asymmetric case about a crossing axis

When the acceleration coefficients \(c_1(t)\) and \(c_2(t)\) are asymmetrical about a crossing axis, using a fictitious terminal boundary value in which the basic function is monotonically decreasing with an ill-posed terminal boundary condition, i.e., \(g(t_{\max }, t_{\max })\not =0\), \(c_1(t)\) and \(c_2(t)\) are respectively expressed as follows:

$$\begin{aligned} c_{1e} = \frac{ c_{1ter} - c_{1s} g(t_{\max }, t_{\max })}{1- g(t_{\max }, t_{\max })} \end{aligned}$$
(46)
$$\begin{aligned} c_{1}(t)= & {} (c_{1s} - c_{1e})g(t, t_{\max }) + c_{1e} \nonumber \\= & {} \left( c_{1s} - \frac{ c_{1ter} - c_{1s} g(t_{\max }, t_{\max })}{1- g(t_{\max }, t_{\max })} \right) g(t, t_{\max }) + c_{1e} \nonumber \\= & {} \left( \frac{ c_{1s} - c_{1ter}}{1- g(t_{\max }, t_{\max })} \right) g(t, t_{\max }) \nonumber \\{} & {} + \frac{ c_{1ter} - c_{1s} g(t_{\max }, t_{\max })}{1- g(t_{\max }, t_{\max })} \end{aligned}$$
(47)
$$\begin{aligned} c_{2e} = \frac{ c_{2ter} - c_{2s} g(t_{\max }, t_{\max })}{1- g(t_{\max }, t_{\max })} \end{aligned}$$
(48)
$$\begin{aligned} c_{2}(t)= & {} (c_{2s} - c_{2e})g(t, t_{\max }) + c_{2e} \nonumber \\= & {} \left( c_{2s} - \frac{ c_{2ter} - c_{2s} g(t_{\max }, t_{\max })}{1- g(t_{\max }, t_{\max })} \right) g(t, t_{\max }) + c_{2e} \nonumber \\= & {} \left( \frac{ c_{2s} - c_{2ter}}{1- g(t_{\max }, t_{\max })} \right) g(t, t_{\max }) \nonumber \\{} & {} + \frac{ c_{2ter} - c_{2s} g(t_{\max }, t_{\max })}{1- g(t_{\max }, t_{\max })} \end{aligned}$$
(49)

Equating (47) with (49), assuming that \(g(t_{\max }, t_{\max })\not =0\) and \(g(t_{\max }, t_{\max })\not =1\), it follows that

$$\begin{aligned}{} & {} [ (c_{1s} - c_{2s}) + (c_{2ter} - c_{1ter})]g(t, t_{\max }) \\{} & {} \qquad = ( c_{2ter} - c_{1ter} ) + (c_{1s} - c_{2s})g(t_{\max },t_{\max }) \end{aligned}$$

consequently, it results in

$$\begin{aligned} g(t, t_{\max }) = (1- \gamma ) + \gamma g(t_{\max },t_{\max }) \end{aligned}$$
(50)

where

$$\begin{aligned} \gamma = \frac{c_{12s}}{c_{12s} + c_{21ter}} \end{aligned}$$
(51)

in which \(c_{12s}\) denotes the initial error of two acceleration coefficients \(c_{1(t)}\) and \(c_{2(t)}\), and \(c_{21ter}\) is its actual terminal error, which are respectively given by

$$\begin{aligned} c_{12s} = c_{1s} - c_{2s},\quad c_{21ter} = c_{2ter} - c_{1ter} \end{aligned}$$
(52)

Here, assume that \(c_{12s} \not =0\) and \(c_{21ter}\not = 0\). If \(g(t_{\max },t_{\max }) \equiv 0\), i.e., the terminal boundary condition is well-posed, then (50) becomes

$$\begin{aligned} g(t, t_{\max }) = 1- \gamma \end{aligned}$$
(53)

In a manner similar to the case of ill-posed initial boundary conditions, we also present analogous conditions to achieve symmetry for the two acceleration coefficients here. When the terminal value is ill-posed, three cases can be considered by introducing the ratio of acceleration coefficient errors at the initial point and at the terminal point as:

$$\begin{aligned} \eta _{ti} = \frac{c_{12s}}{c_{21ter}} \end{aligned}$$

The following conditions apply for each case:

  1. 1.

    When \(\eta _{ti} = 1\) (i.e., \(c_{12s} = c_{21ter}\)), the additional requirement is:

    $$\begin{aligned} c_{1s} - c_{cross} = c_{cross} - c_{2s} \quad \text {or} \quad c_{2ter} - c_{cross} = c_{cross} - c_{1ter} \end{aligned}$$
  2. 2.

    When \(\eta _{ti} > 1\), the additional conditions are:

    $$\begin{aligned} c_{1s} - c_{cross} = c_{cross} - c_{2s} \quad \text {and} \; c_{2ter} - c_{cross} = c_{cross} - c_{1ter} \end{aligned}$$

    where \(c_{1s} > c_{2ter}\) or \(c_{1ter} > c_{2s}\).

  3. 3.

    When \(0< \eta _{ti} < 1\), the additional conditions are:

    $$\begin{aligned} c_{1s} - c_{cross} = c_{cross} - c_{2s} \quad \text {and} \; c_{2ter} - c_{cross} = c_{cross} - c_{1ter} \end{aligned}$$

where \(c_{2ter} > c_{1s}\) or \(c_{2s} > c_{1ter}\). In this paper, we primarily focus on the case where \(\eta _{ti} = 1\).

4.3.2 A symmetric case about a crossing axis

When \(c_1(t)\) and \(c_2(t)\) are symmetric about the crossing axis, or the initial acceleration coefficient error and the terminal acceleration error are equivalent, i.e., \(c_{12s}=c_{21ter}\), it is easy to find that (50) becomes

$$\begin{aligned} g(t, t_{\max }) = \frac{1}{2} (1 + g(t_{\max },t_{\max })) \end{aligned}$$
(54)

In addition, if the terminal boundary condition is well-posed, then it is easy to find that

$$\begin{aligned} g(t, t_{\max }) = \frac{1}{2} \end{aligned}$$
(55)
Fig. 3
figure 3

The fictitious terminal value \(a_e\), crossing time \(t_{cross}\) and crossing value \(c_{cross}\), when the MD function \(g(t, t_{\max })\) is terminally ill-posed

4.3.3 Crossing value

The crossing value in the crossing strategy is derived here. Directly substituting the relationship between the basic function and the terminal boundary value in the asymmetric crossing method, i.e., (50) into (47), letting \(c_1(t)\) in that time be \(c_{cross}\), it follows that

$$\begin{aligned} c_{cross}= & {} \frac{ (c_{1s} - c_{1ter}) [(1 - \gamma ) + \gamma g(t_{\max },t_{\max })]}{1- g(t_{\max }, t_{\max })} \\{} & {} + \frac{ c_{1ter} - c_{1s} g(t_{\max }, t_{\max })}{1- g(t_{\max }, t_{\max })} \\= & {} \frac{ (c_{1s} - c_{1ter})(1 - \gamma ) + c_{1ter}}{1- g(t_{\max }, t_{\max })} \\{} & {} + \frac{ [(c_{1s} - c_{1ter})\gamma - c_{1s}] g(t_{\max }, t_{\max })}{1- g(t_{\max }, t_{\max })} \end{aligned}$$

Here, noting that \((c_{1s} - c_{1ter})\gamma - c_{1s}\) \(= -[(c_{1s} - c_{1ter})(1 - \gamma ) + c_{1ter}]\), the above equation is reduced to

$$\begin{aligned} c_{cross}= & {} \frac{ [(c_{1s} - c_{1ter})(1 - \gamma ) + c_{1ter}](1- g(t_{\max }, t_{\max }))}{ 1- g(t_{\max }, t_{\max }) } \nonumber \\= & {} (c_{1s} - c_{1ter})(1- \gamma ) + c_{1ter} \nonumber \\= & {} (c_{1ter} - c_{1s})\gamma + c_{1s} \end{aligned}$$
(56)

Since \(c_{1ter}=c_{2s}\) and \(\gamma = 1/2\) in the symmetric crossing strategy, it is easy to find that

$$\begin{aligned} c_{cross} =\frac{1}{2} (c_{1ter} + c_{1s}) \equiv \frac{1}{2} (c_{1s} + c_{2s}) \end{aligned}$$
(57)

or from \(c_{1s} = c_{2ter}\) that

$$\begin{aligned} c_{cross} =\frac{1}{2} (c_{1ter} + c_{2ter}) \equiv \frac{1}{2} (c_{2ter} + c_{2s}) \end{aligned}$$
(58)

Figure 3 summarizes the fictitious terminal value \(a_e\), crossing time \(t_{cross}\) and crossing value \(c_{cross}\) when the monotonically decreasing function \(g(t,t_{\max })\) is terminally ill-posed. However, \(t_{cross}\) must be obtained after the concrete \(g(t,t_{\max })\) is given. When \(g(t,t_{\max })\) is terminally well-posed, it should take that \(g(t_{\max },t_{\max })\equiv 0\). Note also that the symmetric cross strategy denotes only for the case of \(c_{12s}=c_{21ter}\).

Fig. 4
figure 4

The fictitious terminal value \(a_e\), crossing time \(t_{cross}\) and crossing value \(c_{cross}\), when the MI function \(f(t, t_{\max })\) is terminally ill-posed

Fig. 5
figure 5

The crossing time \(t_{cross}\) and crossing value \(c_{cross}\), when the MI function \(f(t, t_{\max })\) is well-posed at both boundaries

4.4 When the basic function is a monotonically increasing function with an ill-posed terminal boundary condition

4.4.1 An asymmetric case about a crossing axis

When the acceleration coefficients \(c_1(t)\) and \(c_2(t)\) are asymmetrical about a crossing axis, using a fictitious terminal boundary value in which the basic function is monotonically increasing with an ill-posed terminal boundary condition, i.e., \(f(t_{\max }, t_{\max })\not =1\) and \(f(t_{\max }, t_{\max })\not =0\), \(c_1(t)\) and \(c_2(t)\) are respectively expressed as follows:

$$\begin{aligned} c_{1e} = \frac{ c_{1ter} }{f(t_{\max }, t_{\max })} + c_{1s} \left( 1- \frac{1}{f(t_{\max }, t_{\max })} \right) \end{aligned}$$
(59)
$$\begin{aligned} c_{1}(t)= & {} (c_{1e} - c_{1s})f(t, t_{\max }) + c_{1s} \nonumber \\= & {} \left( \frac{ c_{1ter}}{f(t_{\max }, t_{\max })} + c_{1s} - \frac{c_{1s}}{f(t_{\max }, t_{\max })} - c_{1s} \right) \nonumber \\{} & {} \times f(t, t_{\max }) + c_{1s} \nonumber \\= & {} ( c_{1ter} - c_{1s})f(t, t_{\max })/ f(t_{\max }, t_{\max }) + c_{1s} \end{aligned}$$
(60)
$$\begin{aligned} c_{2e} = \frac{ c_{2ter} }{f(t_{\max }, t_{\max })} + c_{2s} \left( 1- \frac{1}{f(t_{\max }, t_{\max })} \right) \end{aligned}$$
(61)
$$\begin{aligned} c_{2}(t)= & {} (c_{2e} - c_{2s})f(t, t_{\max }) + c_{2s} \nonumber \\= & {} \left( \frac{ c_{2ter}}{f(t_{\max }, t_{\max })} + c_{2s} - \frac{c_{2s}}{f(t_{\max }, t_{\max })} - c_{2s} \right) \nonumber \\{} & {} \times f(t, t_{\max }) + c_{2s} \nonumber \\= & {} ( c_{2ter} - c_{2s})f(t, t_{\max })/ f(t_{\max }, t_{\max }) + c_{2s} \end{aligned}$$
(62)

Equating (60) with (62), assuming that \(f(t_{\max }, t_{\max })\not =0\), it follows that

$$\begin{aligned}{} & {} (c_{1ter} - c_{1s}) f(t, t_{\max })/f(t_{\max }, t_{\max }) + c_{1s} \\{} & {} \qquad = (c_{2ter} - c_{2s}) f(t, t_{\max })/f(t_{\max }, t_{\max }) + c_{2s} \end{aligned}$$

or

$$\begin{aligned}{} & {} (c_{2ter} - c_{1ter}) f(t, t_{\max })/f(t_{\max }, t_{\max }) \\{} & {} \quad + (c_{1s} - c_{2s}) f(t, t_{\max })/f(t_{\max }, t_{\max }) = c_{1s} - c_{2s} \end{aligned}$$

Consequently, setting \(c_{12s} \not =0\) and \(c_{21ter} \not =0\), it is easy to find that

$$\begin{aligned} f(t, t_{\max })/ f(t_{\max }, t_{\max })= \gamma \end{aligned}$$
(63)

If \(f(t_{\max },t_{\max }) \equiv 1\), i.e., the terminal boundary condition is well-posed, then (63) is simplified to

$$\begin{aligned} f(t, t_{\max }) = \gamma \end{aligned}$$
(64)

4.4.2 A symmetric case about a crossing axis

When \(c_1(t)\) and \(c_2(t)\) are symmetric about the crossing axis, or the initial acceleration coefficient error and the terminal acceleration error are equivalent, i.e., \(c_{21ter}=c_{12s}\), it is easy to find that (63) becomes

$$\begin{aligned} f(t, t_{\max })/f(t_{\max }, t_{\max }) = \frac{1}{2} \end{aligned}$$
(65)

In addition, if the terminal boundary condition is well-posed, i.e., \(f(t_{\max }, t_{\max })\equiv 1\), then it is reduced to

$$\begin{aligned} f(t, t_{\max }) = \frac{1}{2} \end{aligned}$$
(66)
Fig. 6
figure 6

The crossing time \(t_{cross}\) and crossing value \(c_{cross}\), when the MD function \(g(t, t_{\max })\) is well-posed at both boundaries

Fig. 7
figure 7

Schematic flowchart of the proposed cross-strategy method, where BF denotes the basic function, \(F_d\) is a desired global best cost if it is known in advance, Gbest is a global best cost, and \(P_ibest\) denotes a personal best at the ith particle

4.4.3 Crossing value

Here, the crossing value in the crossing strategy is derived. Directly substituting the relationship between the basic function and the terminal boundary value in the asymmetric crossing method, i.e., (63) into (60), letting \(c_1(t)\) in that time be \(c_{cross}\), it follows that

$$\begin{aligned} c_{cross}= & {} (c_{1ter} - c_{1s}) \gamma f(t_{\max },t_{\max })/ f(t_{\max }, t_{\max }) + c_{1s} \nonumber \\= & {} (c_{1ter} - c_{1s})\gamma + c_{1s} \end{aligned}$$
(67)

Since \(c_{1ter}=c_{2s}\) and \(\gamma = 1/2\) in the symmetric crossing strategy, it is easy to find that

$$\begin{aligned} c_{cross} =\frac{1}{2} (c_{1ter} + c_{1s}) \equiv \frac{1}{2} (c_{1s} + c_{2s}) \end{aligned}$$
(68)

or from \(c_{1s} = c_{2ter}\) that

$$\begin{aligned} c_{cross} =\frac{1}{2} (c_{1ter} + c_{2ter}) \equiv \frac{1}{2} (c_{2ter} + c_{2s}) \end{aligned}$$
(69)

Figure 4 shows the fictitious terminal value \(a_e\), crossing time \(t_{cross}\), and crossing value \(c_{cross}\) when the monotonically increasing function \(f(t,t_{\max })\) is terminally ill-posed. However, \(t_{cross}\) must be obtained after the concrete \(f(t,t_{\max })\) is given. When \(f(t,t_{\max })\) is terminally well-posed, it should take that \(f(t_{\max },t_{\max })\equiv 1\).

When the monotonically increasing function \(f(t,t_{\max })\) is well-posed at both ends, it is a special case of Section 4.1 or Section 4.4, and Fig. 5 summarizes the boundary values and crossing information values, i.e., crossing time \(t_{cross}\) and crossing value \(c_{cross}\). When the monotonically decreasing function \(g(t,t_{\max })\) is well-posed at both ends, it is a special case of Section 4.2 or Section 4.3, and similar results are summarized in Fig. 6.

Figure  7 shows a schematic flowchart of the cross-strategy method proposed in this paper. Figures 8 and 9 show the procedure for determining fictitious boundary values, calculating crossing times and crossing values. Figure 10 shows the monotonically decreasing \(w(t), c_1(t)\) and monotonically increasing \(c_2(t)\) formulas for which the monotonically increasing \(f(t, t_{\max })\) and monotonically decreasing \(g(t, t_{\max })\) basic functions are applied, respectively. Note that although theoretically there are six possible cases as shown in Figs. 1 to 6 for determining the fictitious boundary value and calculating the crossing time and crossing value according to the characteristics of the basic function, the actual program is executed only after the basic function is selected in advance and the symmetry or asymmetry strategy is determined.

Fig. 8
figure 8

Procedures for determining fictitious boundary values, calculating crossing times and corssing values when the basic function (BF) is monotonically increasing (MI)

Fig. 9
figure 9

Procedures for determining fictitious boundary values, calculating crossing times and corssing values when the basic function is monotonically decreasing

Fig. 10
figure 10

Inertia weight and acceleration coefficients with a monotonic-increasing or monotonic-decreasing function as a BF

5 Crossing time

Here, the crossing times are obtained for asymmetric general crossing strategies when using 10 monotonically increasing or monotonically decreasing basic functions.

5.1 \(N(t,t_{\max }) = \frac{1- (t/t_{\max })}{1 + s (t/t_{\max })}\), \(-1< s < \infty \)

Since this function was used to represent Sugeno’s fuzzy complement [79] and is a well-posed monotonically decreasing function satisfying \(N(0,t_{\max }) = 1, N(t_{\max },t_{\max }) = 0\) [45] , using the relationship between the basic function and the well-posed boundary values, \(t_{cross}\) satisfies

$$\begin{aligned} \frac{1- (t_{cross}/t_{\max })}{1+s(t_{cross}/t_{\max })} = 1- \beta \end{aligned}$$

Rearranging the above equation to obtain

$$\begin{aligned} 1 - \frac{t_{cross}}{t_{\max }} = (1 - \beta ) \left( 1 + \frac{st_{cross}}{t_{\max }}\right) \end{aligned}$$

or

$$\begin{aligned} \beta = \frac{t_{cross}}{t_{\max }}[ s(1-\beta ) + 1] \end{aligned}$$

it follows that

$$\begin{aligned} t_{cross} = \frac{\beta t_{\max }}{1 + s(1 - \beta )} \end{aligned}$$
(70)

For a symmetric crossing, i.e., \(\beta = 1/2\), (70) becomes

$$\begin{aligned} t_{cross} = \frac{0.5t_{\max }}{1 + 0.5s} \end{aligned}$$
(71)

5.2 \(N_g(t,t_{\max }) = [1 - (t/t_{\max })^{\alpha }]^{1/\alpha }\), \(-1< \alpha < \infty \)

This basic function was used to represent Yager’s fuzzy complement [44], which is also a monotonically decreasing function satisfying \(N_g(0,t_{\max })=1\), \(N_g(t_{\max },t_{\max }) = 0\). Therefore, since the crossing time \(t_{cross}\) satisfies

$$\begin{aligned}{}[1 - (t_{cross}/t_{\max })^{\alpha }]^{1/\alpha } = 1- \beta \end{aligned}$$

or

$$\begin{aligned} 1 - \left( \frac{t_{cross}}{t_{\max }} \right) ^{\alpha } = (1 - \beta )^{\alpha } \end{aligned}$$

it follows that

$$\begin{aligned} (t_{cross}/t_{\max })^{\alpha } = 1 - (1 - \beta )^{\alpha } \end{aligned}$$

consequently

$$\begin{aligned} t_{cross} = t_{\max }[ 1 - (1 - \beta )^{\alpha }]^{1/\alpha } \end{aligned}$$
(72)

Fo a symmetric crossing, i.e., \(\beta = 1/2\), (72) is reduced to

$$\begin{aligned} t_{cross} = t_{\max } \left( 1 - \left( \frac{1}{2} \right) ^{\alpha } \right) ^{1/{\alpha }} \end{aligned}$$
(73)

5.3 \(G(t,t_{\max }) = \tan ^{-1}( \frac{t_{\max }-t}{t_{\max }})\)

Since this function was a monotonically decreasing function whose initial boundary value was ill-posed in the result of fictitious boundary values, the crossing time satisfies

$$\begin{aligned} \tan ^{-1}\left( \frac{t_{\max }-t_{cross}}{t_{\max }} \right)= & {} (1-\beta )G(t_0,t_{\max }) \\= & {} \frac{(1-\beta )\pi }{4} \end{aligned}$$

so that

$$\begin{aligned} \tan \left[ \frac{(1-\beta )\pi }{4} \right] = 1- t_{cross}/t_{\max } \end{aligned}$$

Consequently, it yields that

$$\begin{aligned} t_{cross} = t_{\max }\left\{ 1- \tan \left[ \frac{(1-\beta )\pi }{4} \right] \right\} \end{aligned}$$
(74)

For a symmetric crossing of \(\beta = 1/2\), (74) results in

$$\begin{aligned} t_{cross} = t_{\max }\left[ 1- \tan \left( \frac{\pi }{8} \right) \right] \end{aligned}$$
(75)

Note that, changing it into a well-posed monotonically decreasing function such as \(\frac{4}{\pi } \tan ^{-1}( \frac{t_{\max }-t}{t_{\max }})\), the similar result is obtained from \(\frac{4}{\pi } \tan ^{-1}( \frac{t_{\max }-t}{t_{\max }})=1-\beta \).

5.4 \(G(t,t_{\max }) = \cos ( \pi \frac{t}{t_{\max }})\)

This function was a monotonically decreasing function whose terminal value was ill-posed in the previous result of fictitious boundary values, so that the crossing time satisfies

$$\begin{aligned} \cos \left( \pi \frac{t_{cross}}{t_{\max }} \right)= & {} (1-\gamma ) + \gamma G(t_{\max },t_{\max }) \\= & {} (1- \gamma ) - \gamma = 1- 2\gamma \end{aligned}$$

Deforming it such that

$$\begin{aligned} \pi \frac{t_{cross}}{t_{\max }} = \cos ^{-1} (1- 2\gamma ) \end{aligned}$$

consequently it follows that

$$\begin{aligned} t _{cross}= \frac{t_{\max }}{\pi }\cos ^{-1} (1- 2\gamma ) \end{aligned}$$
(76)

Here, in a symmetric crossing of \(\gamma = 1/2\), (76) becomes

$$\begin{aligned} t_{cross} = \frac{t_{\max }}{\pi }\cos ^{-1} (0)=\frac{t_{\max }}{2} \end{aligned}$$
(77)

Note that if it is slightly modified into a well-posed monotonically decreasing function such as \(\frac{1}{2}[\cos (\pi \frac{t}{t_{\max }}) + 1]\), then the similar result can be obtained directly from \(\frac{1}{2}[\cos (\pi \frac{t}{t_{\max }}) + 1]=1-\gamma \).

5.5 \(g(t,t_{\max }) = (1 - t/t_{\max })^n\)

This function in Chatterjee and Siarry [11] is a well-posed monotonically decreasing function (i.e., \(\{ (1 - t/t_{\max })^n \}' = -\frac{n}{t_{\max }}(1 - t/t_{\max })^{n-1} < 0\)) taking 1 at \(t= 0\) and 0 at \(t=t_{\max }\), where n denotes a modulation index. Therefore, the crossing time satisfies

$$\begin{aligned} (1 - t_{cross}/t_{\max })^n = 1 - \beta \end{aligned}$$

or

$$\begin{aligned} (1 - t_{cross}/t_{\max }) = (1 - \beta )^{1/n} \end{aligned}$$

so that

$$\begin{aligned} t_{cross} =t_{\max }[ 1 - (1 - \beta )^{1/n}] \end{aligned}$$
(78)

Note here that in a symmetric crossing of \(\beta = 1/2\), (78) results in

$$\begin{aligned} t_{cross} = t_{\max }\left[ 1- \left( \frac{1}{2}\right) ^{1/n}\right] \end{aligned}$$
(79)

5.6 \(f(t,t_{\max }) = (t/t_{\max })^n\)

This function in Wang and Liu [86] is a well-posed monotonically increasing function (i.e., \(\{ ( t/t_{\max })^n \}' = \frac{n}{t_{\max }}(t/t_{\max })^{n-1} > 0\)) taking 0 at \(t= 0\) and 1 at \(t=t_{\max }\). Then, since the crossing time satisfies

$$\begin{aligned} ( t_{cross}/t_{\max })^n = \beta \end{aligned}$$

or

$$\begin{aligned} t_{cross}/t_{\max } = (\beta )^{1/n} \end{aligned}$$

it follows that

$$\begin{aligned} t_{cross} =t_{\max }(\beta )^{1/n} \end{aligned}$$
(80)

Note here that in a symmetric crossing of \(\beta = 1/2\), (80) becomes

$$\begin{aligned} t_{cross} = t_{\max }\left( \frac{1}{2}\right) ^{1/n} \end{aligned}$$
(81)

5.7 \(F(t,t_{\max })= e^{-(t_{\max }-t)/t_{\max }}\)

When defining \(f(t,t_{\max }) = t/t_{\max }\) and letting the Napier’s constant be the base, this function uses \(1 - f(t,t_{\max })\) to make a function \(e^{-[1 - f(t,t_{\max })]} = \frac{1}{e^{1-f(t,t_{\max })}} \buildrel \triangle \over =F(t,t_{\max })\). This function is monotonically increasing because \(1 - f(t,t_{\max })\) is monotonically decreasing (i.e., \(\{ 1 - f(t,t_{\max })\}' = -1/t_{\max } < 0\)). However, \(F(0,t_{\max }) =1/e \not = 0\), \(F(t_{\max },t_{\max }) = 1\), which is an ill-posed boundary value. Therefore, from the relationship between the basic function and the ill-posed boundary value when the initial boundary condition of the monotonically increasing function is ill-posed, the crossing time satisfies

$$\begin{aligned} e^{-(t_{\max }-t_{cross})/t_{\max }}= & {} \beta + (1 - \beta )F(0,t_{\max }) \\= & {} \beta + (1-\beta )/e \\= & {} \frac{1}{e} [\beta e + (1 - \beta )] \end{aligned}$$

and moreover acting on both sides of this equation with log gives

$$\begin{aligned} -(t_{\max }-t_{cross})/t_{\max }= & {} \log \left\{ \frac{1}{e} [\beta e + (1 - \beta )] \right\} \\= & {} \log [\beta e + (1 - \beta )] - 1 \end{aligned}$$

Thus, from the fact that

$$\begin{aligned} t_{\max }-t_{cross} = t_{\max } \left\{ 1 - \log [ \beta e + (1 - \beta )] \right\} \end{aligned}$$

it yields that

$$\begin{aligned} t_{cross} = t_{\max } - t_{\max } \left\{ 1 - \log [ \beta e + (1 - \beta )] \right\} \end{aligned}$$
(82)

Note here that for a symmetric crossing of \(\beta = 1/2\), (82) is reduced to

$$\begin{aligned} t_{cross} = t_{\max } - t_{\max } \left\{ 1 - \log \left( \frac{e+1}{2} \right) \right\} \end{aligned}$$
(83)

5.8 \(G(t,t_{\max })=e^{-t_{\max }/(t_{\max }-t)}\)

When letting \(f(t,t_{\max }) = t/t_{\max }\), this is found to be a function \(e^{-1/[1 - f(t,t_{\max })]} = \frac{1}{e^{t_{\max }/(t_{\max }-t)}} \buildrel \triangle \over =G(t,t_{\max })\) in which the Napier’s constant is used as the base, using \((1 - f(t,t_{\max }))^{-1} \) that is the reciprocal of \(1 - f(t,t_{\max })\) (see also Wu et al. [89]). This function is monotonically decreasing, because \(1/(1 - f(t,t_{\max }))\) is monotonically increasing, where \(G(t_{\max },t_{\max }) =0\) is satisfied, but \(G(0,t_{\max })=1/e \not = 1\) so that it yields an ill-posed boundary value. Therefore, using the relationship between the basic function and the ill-posed boundary when the initial boundary condition is ill-posed in a monotonically decreasing function, the crossing time satisfies

$$\begin{aligned} e^{-t_{\max }/(t_{\max }-t_{cross})}= & {} (1 - \beta )G(0,t_{\max }) \\= & {} \frac{1-\beta }{e} \end{aligned}$$

and acting on both sides of this equation with log, it obtains

$$\begin{aligned} -t_{\max }/(t_{\max }-t_{cross}) = \log (1 -\beta ) - 1 \end{aligned}$$

or

$$\begin{aligned} \frac{1}{t_{\max }-t_{cross}} = \frac{ 1 - \log ( 1 - \beta )}{t_{\max }} \end{aligned}$$

As a result, it follows that

$$\begin{aligned} t_{cross} = t_{\max } - \frac{t_{\max }}{ 1 - \log (1 - \beta )} \end{aligned}$$
(84)

where note that in a symmetric crossing of \(\beta = 1/2\), (84) results in

$$\begin{aligned} t_{cross} = t_{\max } - \frac{t_{\max }}{ 1 - \log (\frac{1}{2})} \end{aligned}$$
(85)

5.9 \(G_L(t,t_{\max })=e^{-\alpha t/t_{\max }}\)

This function \(G_L(t,t_{\max })\) was used for inertial weights in Lu et al. [50] and is a monotonically decreasing function. However, this \(G_L(t,t_{\max })\) has an ill-posed boundary value because \(G_L(0,t_{\max }) =1\) and \(G_L(t_{\max },t_{\max })=e^{-\alpha } \not = 0\). Therefore, when the terminal boundary condition of the monotonically decreasing function is ill-posed, using the relationship between the basic function and the ill-posed boundary value, it is found that the crossing time satisfies

$$\begin{aligned} e^{-\alpha t_{cross}/t_{\max }}= & {} (1 - \gamma ) + \gamma G_L(t_{\max },t_{\max }) \\= & {} (1 - \gamma ) + \gamma /e^{\alpha } \end{aligned}$$

and acting on both sides of this equation with log gives

$$\begin{aligned} -\alpha t_{cross}/t_{\max } = \log [(1 -\gamma ) + \gamma /e^{\alpha }] \end{aligned}$$

consequently, it yields that

$$\begin{aligned} t_{cross} = -\frac{t_{\max }}{\alpha } \left\{ \log [ (1 - \gamma ) + \gamma /e^{\alpha }] \right\} \end{aligned}$$
(86)

Note here that if it takes a symmetric crossing of \(\gamma = 1/2\), then (86) becomes

$$\begin{aligned} t_{cross} = -\frac{t_{\max }}{\alpha } \left( \log \frac{1 + 1/e^{\alpha }}{2} \right) \end{aligned}$$
(87)

5.10 \(F_L(t,t_{\max })=e^{-\alpha t_{\max }/t}\)

This function \(F_L(t,t_{\max })\) has the reciprocal of the exponent \(t/t_{\max }\) of the previous \(G_L(t,t_{\max })\) and is a monotonically increasing function. However, in this \(F_L(t,t_{\max })\), \(F_L(0,t_{\max }) =0\), but \(F_L(t_{\max },t_{\max })=e^{-\alpha } \not = 1\), so that it results in an ill-posed boundary value. Therefore, from the relationship between the fundamental function and the ill-posed boundary value when the terminal boundary condition of the monotonically increasing function is ill-posed, it is found that the crossing time satisfies

$$\begin{aligned} e^{-\alpha t_{\max }/t_{cross}}= & {} \gamma F_L(t_{\max },t_{\max }) \\= & {} \gamma e^{-\alpha } \end{aligned}$$

and acting on both sides of this equation with log yields

$$\begin{aligned} -\alpha t_{\max }/t_{cross} = \log (\gamma ) - \alpha \end{aligned}$$

or

$$\begin{aligned} t_{\max }/t_{cross} = 1 - \frac{ \log (\gamma )}{\alpha } \end{aligned}$$

Consequently, it follows that

$$\begin{aligned} t_{cross} = \frac{t_{\max }}{ 1 - \frac{\log (\gamma )}{\alpha } } \end{aligned}$$
(88)

where for a symmetric crossing of \(\gamma = 1/2\), it is found that (88) is reduced to

$$\begin{aligned} t_{cross} = \frac{t_{\max }}{ 1 - \frac{\log (\frac{1}{2})}{\alpha } } \end{aligned}$$
(89)

6 Numerical experiments on CEC2014 bechmark functions

This section is the simulation experiment of the proposed algorithms. To validate the performance of local exploitation, local extremum avoidance and global exploration, the statistical analysis was performed on CEC2014 benchmark functions [47]. For comparing the relative performance of stochastic optimization algorithms, there are numerous test beds or benchmark functions [8]. Notably, recent benchmark functions include CEC2014 [47], CEC2017 [4], and CEC2020 [98]. However, focusing on CEC2014, the following differences can be observed:

  • CEC2017 has a total of 29 functions, which is almost the same as the 30 functions in CEC2014. However, compared to CEC2014, CEC2017 significantly reduces the number of multimodal functions and instead increases the number of hybrid and composition functions. These benchmark problems emphasize exploring these functions from different perspectives.

  • On the other hand, CEC2020 narrows its focus to a selective or specific set of benchmark problems. It includes a total of 10 functions derived from CEC2014 and CEC2017: one unimodal, two multimodal, four hybrid, and three composition functions.

In this study, we considered the simulation experiments conducted at the time, the available information (specifically, the MATLAB environment), and the ease of comparison based on the coherence of experiments and resource availability. As a result, we opted for a well-balanced set of benchmark functions from CEC2014. Three classic PSO variants, i.e., LDW-PSO [74], LCS-PSO [65], NDW-PSO [11], and four state-of-the-art metaheuristics, i.e., CSA [3], PPSO [27], POA [84], and SHO [103] were compared with our proposed NCS-PSOs.

Table 1 List of the compared algorithms
Table 2 Parameter settings for the classic PSO variants and the advanced methaheuristics
Table 3 Parameter settings for the proposed NCS-PSOs
Table 4 Results of the comparative methods on CEC2014 bechmark functions (CEC-1 to CEC-15)
Table 5 Results of the comparative methods on CEC2014 bechmark functions (CEC-16 to CEC-30)
Fig. 11
figure 11

Box plot of the proposed NCS-PSO and seven comparison algorithms on CEC2014 benchmark functions

6.1 Experimental parameter settings and conditions on benchmark functions

CEC2014 suite is the general test standard of modern algorithms, which has strong test suitability for all kinds of metaheuristic algorithms. Because of the dynamic and complexity of these benchmark functions, they are more convincing to validate the optimization performance of the proposed NCS-PSOs. This test suite includes 30 different types of functions: unimodal (CEC-1 to CEC-3), simple multimodal (CEC-4 to CEC-16), hybrid (CEC-17 to CEC-22) and composition functions (CEC-23 to CEC-30). Note that each optimal value is set as the function’s alignment number times 100. The mean costs or fitness values of the experiments are recorded. The algorithms are ranked based on the results of the mean values. Also, we conduct the Wilcoxon rank-sum test at 0.05 significance level between NCS-PSOs and other algorithms. The symbol ‘\(+\)’ and ‘−’ mean that any NCS-PSO is significantly better, significantly worse than the compared algorithm.

The compared algorithms are listed in Table 1, where the parameter settings are listed in Table 2. Note here that such design parameters were set, referring to original papers. All algorithms run 30 times on the CEC 2014 test suite. The experiments are conducted on the 30-dimensional problems (i.e., \(D=30\)), though 10, 30, 50 and 100 were prepared in the technical report [47]. The maximum number of fitness evaluations, \(t_{\max }\), is set to 500. The population size M is set to be 100 for all the algorithms. The search ranges \([-100, 100]^D\) are defined for all benchmark functions. All current algorithms were coded in MATLAB 2018a and executed on a computer with Intel(R) Core(TM) i9-9900K CPU @ 3.60 GHz (+ 16.0 GB of implemented RAM) processor under the 64-bit Windows 10 Pro operating system. Therefore, the results were based on double-precision floating-point number (64-bit) operations using MATLAB, and were managed using a 5-digit display, including the integer part. The design parameters of our NCS-PSOs are shown in Table 3. The selection of the basic functions BF-1 to BF-6 of the proposed method, the boundary values of each time-varying parameter as design parameters, and the modulation or time-decay rate were determined after some trials, considering their use in the 3-D path planning problem in the later section. It should be noted that the basic parameter design guideline is based on the assumption that symmetric crossing of acceleration coefficients is used, with crossing values around 1.5 and crossing times around \(0.5t_{\max }\), which is always the case in the linear case.

Table 6 Wilcoxon rank-sum test results for BF-4 against other algorithms on CEC2014 benchmark functions

6.2 Performance analysis of NCS-PSOs on ECE2014 benchmark functions

Tables 4 and 5 show the test results of NCS-PSOs and seven comparison algorithms, where the bold entries represent the best ones among all the algorithms. It can be seen that NCS-PSOs obtain better average fitness values on 15/30 functions. In the unimodal functions, the proposed BF-2 and BF-3 achieve the best means for the functions CEC-2 and CEC-3, with the BF-2 in particular having the best mean and variance. The conventional PPSO has the best mean and variance with respect to CEC-1.

For multimodal functions CEC-7, CEC- 8, CEC-9, CEC-11, CEC-12, CEC-13, CEC-15, and CEC-16, NCS-PSOs outperform other algorithms with stronger exploration performance. Moreover, BF-1 has the minimum Std result on function CEC-4. NCS-PSOs also shows less optimization performance on most of hybrid functions, except for CEC-22. The conventional PPSO has the best on functions CEC-17, CEC-20 and CEC-21. The conventional POA provides the best on many composition functions CEC-23, CEC-24, CEC-25, CEC-27, and CEC-28, whereas the proposed BF-2 and BF-4 can obtain the best on CEC-26 and CEC-29, respectively. Thus, the test results on CEC2014 benchmark functions show that the proposed NCS-PSOs are more competitive than other algorithms on unimodal and multimodal functions.

Figure 11 shows the boxplots for eight algorithms on CEC2014 benchmark functions, where BF-4 was selected out of six NCS-PSOs because of its superiority to other methods in NCS-PSOs. If ‘\(+\)’ has appeared outside the upper fence, it implies that the algorithm has a poor search accuracy in 30 runs, whereas if ‘\(+\)’ was outside the lower fence, it represents that the algorithm can be fully explored and exploited to search for the superior precision value. The linear crossing method LCS-PSO, the nonlinearly decreasing inertia weight method NDW-PSO and the proposed method BF-4 have much more ‘\(+\)’ from the upper fence than the other conventional methods, but their medians are lower than those of the other methods, as can be seen from the visual inspection of Fig. 11.

The proposed method has the smallest difference between the upper and lower quartiles for CEC-11, CEC-12, and CEC-15. On the other hand, for other benchmark functions, there are several conventional methods with similar quartile differences to the proposed method. For example, in CEC-7, LCS-PSO and the proposed method, in CEC-8, LDW-PSO, NDW-PSO and the proposed method, and in CEC-9, LCS-PSO, NDW-PSO and the proposed method obtain similar differences between quartiles. The boxplots verify that BF-4, one of NCS-PSOs, has strong robustness and stability. Thus, BF-4 in NCS-PSOs shows superior optimization performance on CEC2014 benchmark functions.

6.3 Statistical analysis

In order to avoid accidental test results, statistical tests are performed by using the Wilcoxon rank-sum test statistical method [88] applying a significance level of 5%. Further this method is used to evaluate the effectiveness and superiority of NCS-PSOs. Each BF-i out of NCS-PSOs was used as the optimization algorithm, and pairwise comparison was made with the other seven algorithms. If the p value generated by the two algorithms is less than 5%, it indicates that there is a significant difference between the two algorithms in statistical significance. Otherwise, the difference between the two algorithms is not obvious. The Wilcoxon rank-sum tests (i.e., Mann-Whitney U tests) of NCS-PSOs were conducted on CEC2014 benchmark functions. Table 6 is the summary of test results for BF-4, where ‘\(+\)’ represents significant difference and ‘−’ represents poor significant difference. In this table, BF-4 conducts 210 (30 \(\times \) 7) groups of experiments, among which 166 groups of data (i.e., 79%) shows significant differences. This result verifies that the optimization performance of the BF-4 algorithm in NCS-PSOs is better than the other seven comparison algorithms in the statistical sense.

Friedman rank test [22] is a nonparametric method that uses rank to implement significant differences for multiple population distributions. Friedman rank tests of 13 or eight algorithms were performed on the most challenging CEC2014 benchmark functions to compare their comprehensive average performance. Table 7 shows Friedman test results of 13 algorithms, whereas Tables 8 and 9 give the results of eight algorithms, one of which is changed from BF-1 to BF-6 in NCS-PSOs.

As is shown in Tables 7 to 9, any algorithm in NCS-PSOs has any rank among one to seven out of 13 ranks, together with verifying that one of NCS-PSOs acquires 79% in maximum and 72.4% in minimum in significant differences. Especially, BF-4 in NCS-PSOs ranked the first and the remaining algorithms in NCS-PSOs were significantly better than the other six comparison algorithms, which excluded LCS-PSO. Thus, Friedman rank tests demonstrate that the proposed NCS-PSOs are effective and stable.

Table 7 Friedman rank test results for BF-1 to BF-6 and other algorithms on CEC2014 benchmark functions
Table 8 Friedman rank test and Wilcoxon rank-sum test results for BF-i \((i=1, 2, 3)\) and other algorithms on CEC2014 benchmark functions
Table 9 Friedman rank test and Wilcoxon rank-sum test results for BF-i \((i=4, 5, 6)\) and other algorithms on CEC2014 benchmark functions

7 Path optimization problem

Fig. 12
figure 12

Obstacle model and path vector

Fig. 13
figure 13

Turning and climbing angles

In this paper, a 3D path planning for UAVs treated by Phung and Ha [58] is picked up, and the convergence speed and accuracy of the best solution are investigated in the difference between the initial or terminal boundary values in acceleration coefficients, and also in the difference between the crossing values (or crossing times), as well as in the variety of the basic functions for constituting nonlinear time-varying inertia weight and acceleration coefficients.

This 3D path planning for UAVs consists of each cost or constraint condition, which is described below.

7.1 Optimization of path length

Letting the jth path node in the ith particle be denoted by the coordinate point \(\textrm{P}_{ij}\), which is corresponded to a waypoint. When defining the Euclidean distance between two points, \(\textrm{P}_{ij}(x_{ij}, y_{ij}, z_{ij})\) and \(\textrm{P}_{i,j+1}(x_{i,j+1}, y_{i,j+1}, z_{i,j+1})\), as \(\Vert \overrightarrow{\textrm{P}_{ij}\textrm{P}_{i,j+1}} \Vert \), the cost related to the total path length \(F_1\) is represented by

$$\begin{aligned} F_1(X_i) = \sum _{j=1}^{n_w-1} \Vert \overrightarrow{\textrm{P}_{ij}\textrm{P}_{i,j+1}} \Vert \end{aligned}$$
(90)

where \(X_i\) denotes the path in the ith particle and \(n_w\) is the number of way points to be passed. In this paper, \(X_i\) is expressed by a list of \(n_w\) way points and the path length is minimized in total. Instead of using \(\varvec{x}^i\), introducing a vector composed of 3D information, which represents the following point \(\textrm{P}_{ij}(x_{ij}, y_{ij}, z_{ij})\) as the ith particle,

$$\begin{aligned} X_i = [x_{i1}\; y_{i1}\; z_{i1}\; x_{i2}\; y_{i2}\; z_{i2} \cdots x_{iN}\; y_{iN}\; z_{iN}]^T \end{aligned}$$

the swarm X is equivalent to a \(3N\times M\) matrix such as \(X= [X_1\; X_2\; \cdots X_M]\). Note that if the start and terminal points are fixed in all the paths, then any path with \(n_w\) way points is consequently reduced to be 3N dimension, where \(N=n_w-2\).

7.2 Modelling of obstacle and collision condition

Apart from the optimization of path planning, the planned path must secure the safety by avoiding the threats caused with the obstacles which appear in operation space, and guiding UAVs. Then, assume that there are K threats (i.e., obstacles) here, and that each projection is described by a superellipse which has the center \(c_k\), minor-axis \(a_k\), and major-axis \(b_k\) as shown in Fig. 12. To the obtained path segment \(\Vert \overrightarrow{\textrm{P}_{ij}\textrm{P}_{i, j+1}} \Vert \), the related threat cost is assumed to be proportional to the distance \(d_k\) up to the center of an obstacle \(C_k\). Moreover, letting the maximum diameter of UAVs be D and the hazarder distance to a collision zone be S, the threat cost \(F_2\) is, for the K obstacles, reduced to

$$\begin{aligned} F_2(X_i) = \sum _{j=1}^{n_w-1} \sum _{k=1}^{K} T_k(\overrightarrow{\textrm{P}_{ij}\textrm{P}_{i,j+1}}) \end{aligned}$$
(91)

with

$$\begin{aligned} T_k(\overrightarrow{\textrm{P}_{ij}\textrm{P}_{i,j+1}}) = {\left\{ \begin{array}{ll} 0 &{} \mathrm{if~} d_k > S+D+b_k\\ (S+D+b_k) - d_k &{} \mathrm{if~} D+b_k < d_k \le S+ D+ b_k\\ \inf &{} \mathrm{if~} d_k \le D+ b_k \end{array}\right. } \end{aligned}$$
(92)

where \(T_k(\overrightarrow{\textrm{P}_{ij}\textrm{P}_{i,j+1}})\) denotes the threat cost between any kth obstacle and the path segment \(\overrightarrow{\textrm{P}_{ij}\textrm{P}_{i,j+1}}\). Note here that the diameter D is determined depending on the size of an UAV, but S is set to from tens of meters to hundreds of meters [58] according to the variety of obstacles and environments.

7.3 Altitude cost

The flying altitude of UAVs is different from every practical operational configurations, i.e., every applications, so that it is often constrained between the maximum and minimum heights. Now defining the minimum heights and maximum heights be \(h_{\min }\) and \(h_{\max }\) respectively, the altitude cost \(H_{ij}\) related to a waypoint \(\textrm{P}_{ij}\) is calculated by

$$\begin{aligned} H_{ij} = {\left\{ \begin{array}{ll} \left| h_{ij} - \frac{h_{\max } + h_{\min }}{2} \right| &{} \mathrm{if~ } h_{\min } \le h_{ij} \le h_{\max }\\ \inf &{} \textrm{otherwise} \end{array}\right. } \end{aligned}$$
(93)

where \(h_{ij}\) denotes the flight height with respect to the ground and differs from the altitude from the sea level. This \(H_{ij}\) keeps an average height so as to penalize an outlier. By summing up \(H_{ij}\) for all waypoints, the total altitude cost is described by

$$\begin{aligned} F_3(X_i) = \sum _{j=1}^{n_w} H_{ij} \end{aligned}$$
(94)

7.4 Smooth cost

The turning and climbing rates, which are essential to generate a feasible path, are evaluated as the smooth cost in UAVs [24, 58]. The turning angle \(\phi _{ij}\) denotes the angle between \(\overrightarrow{\mathrm{P'}_{ij}\mathrm{P'}_{i,j+1}}\) and \(\overrightarrow{\mathrm{P'}_{i,j+1}\mathrm{P'}_{i,j+2}}\), which are the projections of two consecutive path segments \(\overrightarrow{\textrm{P}_{ij}\textrm{P}_{i,j+1}}\) and \(\overrightarrow{\textrm{P}_{i,j+1}\textrm{P}_{i,j+2}}\) onto the horizontal plane \(\textrm{O}_{xy}\) (see Fig. 13). Therefore, using a relationship between the inner product of two vectors and the angle formed by them, it yields [24] that

$$\begin{aligned} \phi _{ij} = \cos ^{-1} \left( \frac{\overrightarrow{\mathrm{P'}_{ij}\mathrm{P'}_{i,j+1}} \cdot \overrightarrow{\mathrm{P'}_{i,j+1}\mathrm{P'}_{i,j+2}}}{\Vert \overrightarrow{\mathrm{P'}_{ij}\mathrm{P'}_{i,j+1}}\Vert \Vert \overrightarrow{\mathrm{P'}_{i,j+1}\mathrm{P'}_{i,j+2}}\Vert } \right) \end{aligned}$$
(95)

Since the magnitude of outer product of two vectors is known to be reduced to the area of the parallelogram formed by them, it is also obtained that

$$\begin{aligned} \phi _{ij} = \sin ^{-1} \left( \frac{\Vert \overrightarrow{\mathrm{P'}_{ij}\mathrm{P'}_{i,j+1}} \times \overrightarrow{\mathrm{P'}_{i,j+1}\mathrm{P'}_{i,j+2}}\Vert }{\Vert \overrightarrow{\mathrm{P'}_{ij}\mathrm{P'}_{i,j+1}}\Vert \Vert \overrightarrow{\mathrm{P'}_{i,j+1}\mathrm{P'}_{i,j+2}}\Vert } \right) \end{aligned}$$
(96)

Combining them gives the following equation [58]:

$$\begin{aligned} \phi _{ij} = \tan ^{-1} \left( \frac{\Vert \overrightarrow{\mathrm{P'}_{ij}\mathrm{P'}_{i,j+1}} \times \overrightarrow{\mathrm{P'}_{i,j+1}\mathrm{P'}_{i,j+2}}\Vert }{\overrightarrow{\mathrm{P'}_{ij}\mathrm{P'}_{i,j+1}} \cdot \overrightarrow{\mathrm{P'}_{i,j+1}\mathrm{P'}_{i,j+2}}} \right) \end{aligned}$$
(97)

Thus, the smooth cost on turning angle is given by

$$\begin{aligned} F_4(X_i) = \sum _{j=1}^{n_w-2} \phi _{ij} \end{aligned}$$
(98)

where

$$\begin{aligned} \phi _{ij} = {\left\{ \begin{array}{ll} \phi _{ij} &{} \mathrm{if~} \phi _{ij} > \phi _{\max }\\ 0 &{} \textrm{otherwise} \end{array}\right. } \end{aligned}$$
(99)

in which \(\phi _{\max }\) is an allowable turning angle.

On the other hand, the climbing angle \(\psi _{ij}\) is coming from the angle between the path segment \(\overrightarrow{\textrm{P}_{ij}\textrm{P}_{i,j+1}}\) and the projection of it onto the horizontal plane, i.e., \(\overrightarrow{\mathrm{P'}_{ij}\mathrm{P'}_{i,j+1}}\), so that

$$\begin{aligned} \psi _{ij} = \tan ^{-1} \left( \frac{z_{i,j+1} - z_{i,j}}{\Vert \overrightarrow{\mathrm{P'}_{ij}\mathrm{P'}_{i,j+1}} \Vert } \right) \end{aligned}$$
(100)

Thus, if the climbing rate is defined by \(d\psi _{ij} \buildrel \triangle \over =|\psi _{ij} - \psi _{i,j+1}|\), then, using the total climbing rates, the smooth cost on climbing rate is set to

$$\begin{aligned} F_5(X_i) = \sum _{j=1}^{n_w-1} d\psi _{ij} \end{aligned}$$
(101)

where

$$\begin{aligned} d\psi _{ij} = {\left\{ \begin{array}{ll} d\psi _{ij} &{} \mathrm{if~} d\psi _{ij} > d\psi _{\max }\\ 0 &{} \textrm{otherwise} \end{array}\right. } \end{aligned}$$
(102)

in which \(d\psi _{\max }\) denotes an allowable climbing rate angle.

7.5 Overall cost function

Considering the optimality, safety and feasibility constraints related to a path \(X_i\), the overall cost function is described by the following form:

$$\begin{aligned} F(X_i) = \sum _{k=1}^{5}\eta _k F_k(X_i) \end{aligned}$$
(103)

where \(\eta _k\) denotes the weight factor, and \(F_k(X_i), k=1,...,5\) are the partial cost functions described above.

8 Examples of 3D path planning

8.1 Spherical vector-based PSO for UAV path planning

Instead of solving directly the waypoint vectors in the Cartesian coordinate system, \(\textrm{P}_{ij}=(x_{ij}, y_{ij}, z_{ij})\), \(i=1,...,M\), \( j=1,...,N, N=n-2\), spherical vector-based PSO (SPSO) solves once three components in the spherical coordinate system, i.e., the magnitude \(\rho \in (0, path\_length)\), the elevation angle \(\psi \in (-\pi /2, \pi /2)\) and the azimuth angle \(\phi \in (-\pi , \pi )\), where n denotes the number of waypoints including the initial and terminal values. Then, \(\textrm{U}_{ij} =(\rho _{ij}, \psi _{ij}, \phi _{ij})\) is transformed into a waypoint \(\textrm{P}_{ij}\) through the following equations:

$$\begin{aligned} x_{ij}= & {} x_{i,j-1} + \rho _{ij}\sin \psi _{ij}\cos \phi _{ij}\end{aligned}$$
(104)
$$\begin{aligned} y_{ij}= & {} y_{i,j-1} + \rho _{ij}\sin \psi _{ij}\sin \phi _{ij}\end{aligned}$$
(105)
$$\begin{aligned} z_{ij}= & {} z_{i,j-1} + \rho _{ij}\cos \psi _{ij} \end{aligned}$$
(106)

The scenario used in the following optimization is Scenario 3, in which there exist six obstacles, out of eight scenarios studied in Phung and Ha [58]. Considering any cylinders as obstacles, in other words, assuming that each threat projection is a circle, i.e., \(a_k=b_k\) in previous section, the radius \(R_k\) [m] and 3D position \((x_k, y_k, z_k)\) [m] are respectively given by

$$\begin{aligned}{} & {} 80; \quad (400, 500, 100)\; \mathrm{for~} k=1\\{} & {} 70; \quad (600, 200, 150)\; \mathrm{for~} k =2\\{} & {} 80; \quad (500, 350, 150)\; \mathrm{for~} k=3 \\{} & {} 70; \quad (350, 200, 150)\; \mathrm{for~} k =4\\{} & {} 70; \quad (700, 550, 150)\; \mathrm{for~} k=5\\{} & {} 80; \quad (650, 750, 150)\; \mathrm{for~} k=6 \end{aligned}$$
Table 10 Two crossing-time functions: The upper is for Chatterjee and Siarry [11], whereas the bottom is for Wang and Liu [86]
Fig. 14
figure 14

Time history of acceleration coefficients with different modulation indeces n

Table 11 Optimized results of using a basic function \((1 - t/t_{\max })^n\) (Chatterjee and Siarry [11]), where \(c_{1e}=c_{2s}=0.0\)
Table 12 Optimized results of using a basic function \((t/t_{\max })^n\) (Wang and Liu [86]), where \(c_{1e}=c_{2s}=0.0\)

For the path to be optimized, the initial and terminal positions are assumed to be provided by (200, 100, 150) [m] and (800, 800, 150) [m], respectively, and the number of waypoints is fixed to \(n_w=12\) (i.e., the number of line segments is set to \(N=10\)). The swarm size is set to \(M=500\), and the maximum number of iterations is fixed to \(t_{\max }=200\), while setting weight factors in the cost function such as \(\eta _1 = 5, \eta _2=\eta _4=\eta _5=1\), and \(\eta _3=10\). Note here that, for the penalty in the threat cost to judge the collision with an obstacle or in the altitude cost, the value of 15, 000 is applied to represent a finite cost value, instead of using \(\inf \). Moreover, the average cost with 20 trials and its standard deviation are evaluated to compare each other. Additionally, note that the basic function comprising the algorithm was chosen in terms of whether it has well-posed boundary conditions and whether it includes additional parameters such as time decay rate and modulation index.

8.2 Using of well-posed basic functions in symmetric crossing strategy

Here, let us apply well-posed basic functions to construct nonlinear time-varying inertia weight and acceleration coefficients, and consider the use of two acceleration coefficients in a symmetric crossing strategy. Therefore, the monotonically decreasing \((1-t/t_{\max })^n\) used in Chatterjee and Siarry [11] is first selected as a basic function, and constitute \(w(t), c_1(t)\), and \(c_2(t)\) by using

$$ a(t) = (a_s - a_e)(1- t/t_{\max })^n + a_e $$

where \(a_s > a_e\) so as to obtain monotonically decreasing w(t) and \(c_1(t)\), whereas \(a_s < a_e\) so as to realize a monotonically increasing \(c_2(t)\). In addition, let us select the monotonically increasing \((t/t_{\max })^n\) used in Wang and Liu [86] as another basic function, and constitute \(w(t), c_1(t)\), and \(c_2(t)\) by applying

$$ a(t) = (a_e - a_s)(t/t_{\max })^n + a_s $$

where the same conditions of \(a_s\) and \(a_e\) as used in above are required for making w(t) and \(c_1(t)\) be monotonically decreasing functions, while reducing \(c_2(t)\) to a monotonically increasing function. Note of course that it need not obtain fictitious initial or terminal values, because these basic functions satisfy the boundary values well.

Fig. 15
figure 15

Time history of gbest cost with basic functions due to Chatterjee and Siarry [11] with \(n=1.25\) and Wang and Liu [86] with \(n=0.75\), when using \(c_{1s}=3.0, c_{1e}=0.0\)

Fig. 16
figure 16

Stability bounds with different basic functions when using \(c_{1s}=3.0, c_{1e}=0.0\)

Letting the crossing strategy between \(c_1(t)\) and \(c_2(t)\) be symmetric, the duration from \(t=150\) \((n=0.5)\) to \(t=59\) \((n=2.0)\) was searched in the basic function due to Chatterjee and Siarry [11], as shown in Table 10, where refer to the previous section on the crossing time. On the other hand, the duration from \(t=50\) \((n=0.5)\) to \(t=142\) \((n=2.0)\) was searched in the basic function due to Wang and Liu [86]. The relationship between n and crossing time shows that \(t_{cross}\) varies inversely with the value of n in the one by Chatterjee and Siarry [11], while \(t_{cross}\) varies in direct proportion to the value of n in the one by Wang and Liu [86]. Figure 14 shows the time history of the accelerations in the difference of n for both methods, where the values of \(w_s =0.99\) and \(w_e=0.1\) were set commonly in all cases to the inertia weight. When setting \(c_{1s}= 2.0, 2.5, 3.0, 3.5, 4.0\), \(c_{1e}=0.0\), \(c_{2s}=c_{1e}\), \(c_{2e}= c_{1s}\), their search results are tabulated in Table 11 and Table 12, respectively, where the bold entries represent the mean global best costs blow 4700. Note here that the crossing value is given by \(c_{cross}=0.5(c_{1e}+c_{2e})\) because of adopting a symmetric crossing strategy, and the convergence rate denotes \((N_{suc}/20)\times 100\), where \(N_{suc}\) is defined as the number in which the global best cost (Gbest) became less than 4700.

Fig. 17
figure 17

One sample path optimized by using a basic function due to Chatterjee and Siarry [11]

It is found from Table 11 that about the basic function of Chatterjee and Siarry [11], in crossing value \(c_{cross} =1.25\), the good result is obtained from \(t_{cross}=75\) to \(t_{cross}=59\) in the first half of the search time. Moreover, in crossing value \(c_{cross} =1.5\), it turns out that the good result is mostly obtained in search time all over the districts from \(t_{cross}=150\) to \(t_{cross}=59\). However, as for the thing \(c_{cross}\) is near 2.0 or 1.0, the convergence accuracy has deteriorated. Although tabulating the data was omitted, even when crossing value \(c_{cross} \) is the same, it is the tendency for a convergence accuracy not to be so good in \(c_{1e} = c_{2s} \not = 0\). Similarly, the good result is obtained also about the basic function of Wang and Liu [86] in crossing value \(c_{cross} =1.25\) and \(c_{cross} =1.5\), but it is not as uniformly good over the time as obtained by Chatterjee and Siarry [11].

Table 13 Optimized results of using basic functions \(e^{-(t_{\max }-t)/t_{\max }}\) (Method A) and \(e^{-t_{\max }/(t_{\max }-t)}\) (Method B), where \(c_{1ini}= c_{2e}, c_{2ini}= c_{1e}=0.0\) (a symmetric case)
Fig. 18
figure 18

Time history of acceleration coefficients and inertia weight due to Methods A and B, where \( c_{1ini} = 2.5, c_{2ini}=0.0\) for the former, whereas \( c_{1ini} = 3.5, c_{2ini}=0.0\) for the latter

Figure 15 shows that, for the case of \(c_{1s}=3.0\) and \(c_{1e}=0.0\), the time history of the global best cost due to Chatterjee and Siarry [11] with \(n=1.25\) is compared to one due to Wang and Liu [86] with \(n=0.75\), Fig. 16 shows the time history of stability bounds in the corresponding case (refer to Appendix on each stability bound equation), and Fig. 17 gives the 3D view, side view and top view that depict the path search result in one sample when using the method of Chatterjee and Siarry [11] with \(n=1.25\) at the same case. As can be seen from Fig. 16 that in the stability bound due to Poli [59] and Jiang et al. [35], the method due to Wang and Liu [86] gives the start of stability bound slightly faster than that due to Chatterjee and Siarry [11], it is also slightly faster in the transient search speed of Fig. 15 than Chatterjee and Siarry [11], but there is no difference at all in the search ability between both methods after 100 generations.

In the proposed search method based on a crossing strategy in which nonlinear time-varying weight and coefficients, w(t), \(c_1(t)\) and \(c_2(t)\), are available, the criteria due to Kadirkamanathan et al. [37] and Gazi [25] do not satisfy the bound condition of stability over the search duration as found from the later examples, while those due to Trelea [83] and Yasuda et al. [95] (or Order-1 stability criterion) and Poli [59] and Jiang et al. [35] (or Order-2 stability criterion) satisfy the bound condition of stability as shown in Fig. 16. Thus, note that, although it needs to check the Order-1 stability criterion and the Order-2 stability criterion after that, the Order-1 stability criterion is relaxed too much, so that it concentrates on only the Order-2 criterion in fact.

Fig. 19
figure 19

Time history of gbest cost with basic functions due to Method C with \(\alpha =1.0\) and Method D with \(\alpha =0.6\), when using \(c_{1s}=3.0, c_{1ter}=0.0\)

Fig. 20
figure 20

Stability bounds due to Methods A and B, where \( c_{1ini} = 2.5, c_{2ini}=0.0\) for the former, whereas \( c_{1ini} = 3.5, c_{2ini}=0.0\) for the latter

8.3 Using of basic functions with ill-posed initial boundary in symmetric crossing strategy

The monotonically increasing \(e^{-(t_{\max } -t)/t_{\max }}\) (Method A) and decreasing \(e^{-t_{\max }/(t_{\max }-t)}\) (Method B) are here adopted as basic functions to constitute w(t) or \(c_i(t)\). Since these do not satisfy the initial boundary values well, the fictitious boundary values should be obtained. Note that the latter function is a basic function that was used to form a deterministic weight w(t), random adaptive coefficients \(c_1(t)\) and \(c_2(t)\), for improving a PSO-PF (particle swarm optimization particle filter) in Wu et al. [89], whereas the former function is of using the reciprocal value of the exponent \(t_{\max }/(t_{\max } -t)\) in the latter function. Applying the fictitious initial boundary values when the initial boundary condition is ill-posed in the previous section, the inertia weight and acceleration coefficients for Method A and Method B are constituted respectively by using the following equations:

$$\begin{aligned} a_s= & {} \left( \frac{e}{e-1} \right) a_{ini} - \frac{a_e}{e-1} \\ a(t)= & {} (a_e - a_s)e^{-(t_{\max } - t)/t_{\max }} + a_s\quad \mathrm{for~Method~A} \end{aligned}$$

and

$$\begin{aligned} a_s= & {} e a_{ini} + a_e(1- e) \\ a(t)= & {} (a_s - a_e)e^{-t_{\max }/(t_{\max } - t)} + a_e \quad \mathrm{for~Method~B} \end{aligned}$$

Table 13a shows the result in which a symmetric crossing search was conducted with the former basic function, under the condition of \(c_{2ini}=c_{1e}=0.0\). Fig. 18a shows the time histories of the inertia weight and acceleration coefficients when setting \(c_{1ini}=2.5\). In this method, since the crossing time is given by \(t_{cross} = t_{\max } - t_{\max }[1 - \ln (\frac{e+1}{2})]\), it results in \(t_{cross}=125\) uniquely, that is, the global search strategy is taken later than the mid crossing time. Thus, after achieving the local search to some extent, it is transferred to a global search so that the good results are obtained even in the crossing values of 1.0 and 1.25.

Table 14 Crossing-time of \(c_1(t)\) and \(c_2(t)\) for a symmetric crossing strategy, when using \(e^{-\alpha t/t_{\max }}\) (Method C) as a basic function

Table 13b shows the result in which a symmetric crossing search was conducted with the latter basic function, under the same condition as used in the former function. Fig. 18b shows the time histories of the inertia weight and acceleration coefficients when setting \(c_{1ini}=3.5\). In this method, since the crossing time is given by \(t_{cross} = t_{\max } - \frac{t_{\max }}{1- \ln (0.5)}\), it results in \(t_{cross}=82\) uniquely, that is, the global search strategy is taken earlier than the mid crossing time. Thus, since the local search is not achieved sufficiently, the search ability is inferior at pin points (such as \(c_{ini}=2.5 \) and 3.0 ) to the former, but the convergence rate results better than 90% are obtained at the initial setting regions (\(c_{ini}=2.0 \rightarrow 3.5\)), which are wider than the former.

Fig. 21
figure 21

Time history of acceleration coefficients with different decay rates \(\alpha \)

Figure 19 shows the time history comparision of the global best cost in both methods at the same conditon, and Fig. 20 shows the time history of stability bounds in the corresponding case. As can be seen from Fig. 19, it is found that the convergence speed of the Method B is fast transiently up to \(t=20\), but rather, that of the Method A is fast at from \(t=20\) to around \(t=120\).

Table 15 Crossing-time of \(c_1(t)\) and \(c_2(t)\) for a symmetric crossing strategy, when using \(e^{-\alpha t_{\max }/t}\) (Method D) as a basic function

8.4 Using of basic functions with ill-posed terminal boundary in symmetric crossing strategy

Here, a monotonically decreasing \(e^{-\alpha t/t_{\max }}\) (Method C) due to Lu et al. [50] and a monotonically increasing \(e^{-\alpha t_{\max }/t}\) (Method D) are adopted as the basic functions that make up w(t) or \(c_i(t)\). Since these do not satisfy the terminal boundary conditions well, a fictitious terminal value has to be found. However, it should be noted that Method D uses the reciprocal of \(t/t_{\max }\) in the basic function. As a result, Method C and Method D use respectively the following coefficient formulas:

$$\begin{aligned} a_e= & {} \left( \frac{e^{\alpha }}{e^{\alpha }-1} \right) a_{ter} - \frac{a_s}{e^{\alpha }-1} \\ a(t)= & {} (a_s - a_e)e^{-\alpha t/t_{\max }} + a_e\quad \mathrm{for~Method~C} \end{aligned}$$
$$\begin{aligned} a_e= & {} e^{\alpha } a_{ter} + a_s(1- e^{\alpha }) \\ a(t)= & {} (a_e - a_s)e^{-\alpha t_{\max }/t} + a_s\quad \mathrm{for~Method~D} \end{aligned}$$
Table 16 Optimized results of Method C when using a symmetric crossing strategy, where \(c_{1ter}=c_{2s}=0.0\)
Table 17 Optimized results of Method D when using a symmetric crossing strategy, where \(c_{1ter}=c_{2s}=0.0\)

In these examples as well, the crossing strategy for \(c_1(t)\) and \(c_2(t)\) is to be symmetrical crossing search, and the search using the basic function of Method C was conducted at the interval of \(t=96 (\alpha =0.1)\) to \(t=28 (\alpha =5.0)\), as shown in Table 14. On the other hand, it searched for Method D the interval of \(t=45 (\alpha =0.2)\) to \(t=127 (\alpha =1.2)\) (see Table 15). It can be seen that \(t_{cross}\) in Method C varies inversely with the value of \(\alpha \), while \(t_{cross}\) in Method D varies in direct proportion to the value of \(\alpha \). Note, however, that Method C’s \(t_{cross}\) can only handle the restricted crossing time region of \(t_{cross} \in [0, \frac{1}{2}t_{\max }]\) for \(\alpha \in [0, \infty ]\), as will be shown in the following discussion. Note also that the original study in Lu et al. [50] did not use \(e^{-\alpha t/t_{\max }}\) to make the acceleration coefficients, just only used it to make a time-varying weight. Figure 21 shows the acceleration coefficients used at this time.

Table 16 shows the research results for the case of \(c_{1s}= 2.0, 2.5, 3.0, 3.5, 4.0\), \(c_{1ter}=0.0\), \(c_{2s}=c_{1ter}, c_{2ter}= c_{1s}\). In Method C (using the basic function due to Lu et al. [50], when the decay rate \(\alpha \) is \(\alpha \rightarrow \infty \), the crossing time is \(t_{cross} \rightarrow 0\) and \(t_{cross} \rightarrow \frac{1}{2}t_{\max }\) if \(\alpha \rightarrow 0\). Therefore, only the global convergence strategy before the mid crossing time can be taken. Looking at the crossing value \(c_{cross}\) around 1.5, most of them are less than \(\alpha =2.0\) (that is, after \(t_{cross}=57\)) to obtain good global convergence values. Also, as can be seen from the value of the convergence rate, the number of times that a good global convergence value is obtained by the mid crossing time is very small.

Fig. 22
figure 22

Time history of gbest cost with basic functions due to Method C with \(\alpha \) = 1:0 and Method D with \(\alpha \) = 0:6, when using \(c_{1s}\) = 3:0; \(c_{1ter}\) = 0:0

Fig. 23
figure 23

Stability bounds due to Methods C and D, when using \(c_{1s}=3.0, c_{1ter}=0.0\)

On the other hand, it is found from Table 17 that, for Method D (using the basic function with the reciprocal of \(t/t_{\max }\)), the good global convergence values are obtained over the wide range of the decay rate from \(\alpha =0.4 (t_{cross}=75)\) to \(\alpha =1.2 (t_{cross}=127)\), at the crossing value \(c_{cross}=1.25\) or around 1.5 Therefore, it seems that convergence to the global best value is more likely to be obtained by adjusting the decay rate than Method C (using the basis function due to Lu et al. [50]). Figure 22 shows a comparison of time histories in Gbest by Method C with \(\alpha =1.0\) and Method D with \(\alpha =0.6\) when \(c_{1s}=3.0\) and \(c_{1ter}=0.0\), and a diagram of each stability bound is shown in Fig. 23. These figures also confirm that Method C is an early search type, while Method D is a wide area search type with respect to time.

8.5 Using of basic functions with ill-posed initial boundary in asymmetric crossing strategy

In the symmetric search in which the basic functions had ill-posed initial values, as had been discussed already, the crossing time was determined uniquely, so that the time transferred to a global search was not controlled in search strategy, because their basic functions did not have any modulation index or decay rate parameter. Therefore, setting here that \(c_{1ini}\) and \(c_{2e}\) are not equal, or \(c_{2ini}\) and \(c_{1e}\) are not equal, the crossing time of \(c_1(t)\) and \(c_2(t)\) is moved back and forth from the one at the symmetry crossing strategy, and as a result, one can handle an asymmetric crossing strategy, in which the crossing value \(c_{cross}\) can be placed higher and down than the one at the symmetry crossing strategy. However, in such an asymmetric crossing strategy, \(t_{cross}\) and \(c_{cross}\) are respectively as follows:

$$\begin{aligned} t_{cross}= & {} t_{\max } - t_{\max }\{ 1 - \ln [\beta e + (1 - \beta )] \} \\ c_{cross}= & {} (c_{1e} - c_{1ini})\beta + c_{1ini} \quad \mathrm{for~Method~A} \end{aligned}$$
$$\begin{aligned} t_{cross}= & {} t_{\max } - \frac{t_{\max }}{ 1 - \ln (1 - \beta )} \\ c_{cross}= & {} (c_{1e} - c_{1ini})\beta + c_{1ini} \quad \mathrm{for~Method~B} \end{aligned}$$

where \(\beta \) is given by

$$ \beta = \frac{c_{12ini}}{c_{21e} + c_{12ini}}, c_{12ini}=c_{1ini} - c_{2ini}, c_{21e}=c_{2e} - c_{1e} $$

In what follows, for the nonlinear time-varying acceleration coefficients as used in Method A and Method B under a symmetric crossing strategy, the following three cases are considered:

Case 1: \(c_{2ini}=c_{1e}=0\)

Case 2: \(c_{2ini} \not = 0, c_{1e}=0\)

Case 3: \(c_{2ini} =0, c_{1e} \not = 0\)

Fig. 24
figure 24

Time history of gbest cost due to Methods A and B in an asymmetric crossing strategy, where \(c_{1ini}=3.75\), \(c_{2e}=2.5\) for Method A, and \(c_{1ini}=4.0\), \(c_{2e}=3.0\) for Method B, but \(c_{2ini} = c_{1e}=0\) for both cases

Table 18 Optimized results of using a basic function \(e^{-(t_{\max }-t)/t_{\max }}\) (Method A), when using an asymmetric crossing strategy, where \(c_{2ini}=c_{1e}=0.0\)
Fig. 25
figure 25

Stability bounds due to Methods A and B in an asymmetric crossing strategy, when using \(c_{2ini}=c_{1e}=0.0\)

Table 19 Optimized results of using a basic function \(e^{-t_{\max }/(t_{\max }-t)}\) (Method B), when using an asymmetric crossing strategy, where \(c_{2ini}=c_{1e}=0.0\)

8.5.1 Case 1 results

It is found from Table 18 that good results are obtained for Method A, when \(c_{cross}\) is at \(1.27\sim 1.62\) (\(t_{cross}\) is at \(98\sim 153\)). Note, however, that with this asymmetric crossing strategy, the same \(t_{cross}\) has a different \(c_{cross}\), and the same \(c_{cross}\) has a different \(t_{cross}\). On the other hand, it is confirmed from Table 19 that in Method B, the search tendency seen in the range of \(c_{cross}\) or \(t_{cross}\) where good results are obtained is roughly similar to Method A. Note, however, that the range of \(c_{cross}\) where better results are obtained with Method B is somewhat wider, i.e., \(c_{cross}\) is \(1.2\sim 1.71\) (or \(60\sim 105\) in \(t_{cross}\)). In particular, it can be recognized that the number of good results in the case of \(c_{cross}\) greater than or equal to 1.5 is much higher than Method A.

Figures 24 and 25 show a comparison of the Gbest time histories in Method A and Method B, and the stability bound diagrams of both methods. However, it shows the case of \(c_{1ini}=3.75\) and \(c_{2e}=2.5\) for Method A, whereas \(c_{1ini}=4.0\) and \(c_{2e}=3.0\) for Method B. As can be seen from these figures, in Method B, convergence to the global value starts around \(t = 60\), whereas in Method A, the stability bound condition of the Order-2 stability criterion is not satisfied until after about \(t = 80\), so that convergence to the global value begins about 20 generations later than Method B.

Table 20 Optimized results of using a basic function \(e^{-(t_{\max }-t)/t_{\max }}\) (Method A), when using an asymmetric crossing strategy, where \(c_{2ini}=0.5, c_{1e}=0.0\)
Table 21 Optimized results of using a basic function \(e^{-t_{\max }/(t_{\max }-t)}\) (Method B), when using an asymmetric crossing strategy, where \(c_{2ini}=0.5, c_{1e}=0.0\)

8.5.2 Case 2 results

As shown in Tables 20 and 21, the value of \(c_{cross}\) is higher overall when \(c_{2ini} =0.5 \not =0.0\), resulting in a larger acceleration coefficient to the Gbest search in the exploitation process before the crossing time than when \(c_{2ini} =0.0\), and the results are not as good as those in Case 1. In fact, the Gbest evaluation for the 4600s is not obtained at all except for \(c_{1ini}=3.0, c_{2e}=3.0\) in Method B. Figures 26 and 27 show a comparison of the time histories of Gbest for Methods A and B and stability bound diagrams for both methods. For Method A, the time histories are shown for \(c_{1ini}=2.75, c_{2e}=2.5\), whereas for Method B, the time histories are shown for \(c_{1ini}=3.0, c_{2e}=3.0\). As these figures show, Method B begins to converge to global values around \(t=50\), while Method A does not satisfy the stability bound condition of the Order-2 stability criteria until after about \(t=70\), which is about 20 generations later than Method B, convergence to the global value begins about 20 generations later than Method B.

Fig. 26
figure 26

Time history of gbest cost due to Methods A and B in an asymmetric crossing strategy, where \(c_{1ini}=2.75\), \(c_{2e}=2.5\) for Method A, and \(c_{1ini}=3.0\), \(c_{2e}=3.0\) for Method B, but \(c_{2ini} =0.5\not = 0, c_{1e}=0\) for both cases

Fig. 27
figure 27

Stability bounds due to Methods A and B in an asymmetric crossing strategy, when using \(c_{2ini}=0.5\not =0, c_{1e}=0.0\)

8.5.3 Case 3 results

As can be seen from Table 22, more good results are obtained for Method A than for Case 1 when \(c_{cross}\) is relatively high, due to the effect of \(c_{1e}=0.5\). On the other hand, for Method B, the number of good results for relatively high \(c_{cross}\) is not much different from that in Case 1, but the number of good results for \(c_{cross}\) less than 1.50 is about half of that in Case 1, as shown in Table 23. Figures 28 and 29 show a comparison of the time histories of Gbest for methods A and B, and the stability bound diagrams for both methods, respectively, where for Method A, the case of \(c_{1ini}=2.0, c_{2e}=3.0\) is shown, whereas for Method B, the case of \(c_{1ini}=3.5, c_{2e}=2.75\) is shown. In the stability bound comparison diagram in Fig. 29, unlike the previous two comparisons, the stability bound condition for the Order-2 stability criteria begins to be satisfied at around \(t=40\) for Method A, while the same stability bound condition is not satisfied until after about \(t=50\) for Method B. It can be seen from Fig. 28 that the actual Gbest values of Method B approach those of Method A in the neighborhood of 40 generations, but only after 80 generations, about 40 generations later than those of Method A.

Table 22 Optimized results of using a basic function \(e^{-(t_{\max }-t)/t_{\max }}\) (Method A), when using an asymmetric crossing strategy, where \(c_{2ini}=0.0, c_{1e}=0.5\)

8.6 Time cost experiments and ablation studies

In this section, we conduct experiments to compare the time cost of the examples used to compare the time histories of the Gbest cost handled in Section 8.2 through Section 8.5. We also perform so-called ablation studies in which the time-varying acceleration coefficients are not used and the cross-strategy is removed.

Table 23 Optimized results of using a basic function \(e^{-t_{\max }/(t_{\max }-t)}\) (Method B), when using an asymmetric crossing strategy, where \(c_{2ini}=0.0, c_{1e}=0.5\)

8.6.1 Comparison of time cost

First, Table 24 shows the time required for 20 trials and the average time per trial for each crossing strategy that incorporates the six basic functions discussed in Section 8.2 through Section 8.5. Note that the design parameters selected are those used in the previous section for the Gbest cost time history comparison. The counted time is the elapsed time when the Gbest cost is displayed at each iteration time. On the other hand, Table 25 shows similar results for the asymmetric crossing strategy for methods A and B. As can be seen from these tables, the time elapsed for roughly 20 trials ranges from 715 to 724 s, with an average time per trial of about 36 s. There is no significant difference in time cost between the methods.

Fig. 28
figure 28

Time history of gbest cost due to Methods A and B in an asymmetric crossing strategy, where \(c_{1ini}=2.0\), \(c_{2e}=3.0\) for Method A, and \(c_{1ini}=3.5\), \(c_{2e}=2.75\) for Method B, but \(c_{2ini} = 0, c_{1e}=0.5\not =0\) for both cases

Fig. 29
figure 29

Stability bounds due to Methods A and B in an asymmetric crossing strategy, when using \(c_{2ini}=0, c_{1e}=0.5\not =0.0\)

Table 24 Time cost comparisons among methods when using a symmetric crossing strategy
Table 25 Time cost comparisons between methods A and B when using an asymmetric crossing strategy
Table 26 Ablation comparisons, where in those of Chatterjee and Siarry [11], Lu et al. [50], and Phung and Ha [58], the time-varying function of \(c_1(t), c_2(t)\) is removed, while in Wang and Liu [86] the modulation index n is \(n=1\) for w(t) and \(c_2(t)\), and it is set to \(n=1\) (i.e., linear) for all \(w(t), c_1(t)\) and \(c_2(t)\) in Ratnaweera et al. [65]

8.6.2 Ablation studies

In this ablation study, we investigate the search performance and computational cost of five PSO variants that originally utilize the different basic functions focused on in Section 8.2 through Section 8.5, as shown in Table 26. Ablation conditions for each PSO variant are described below.

First, in the PSO variant of Chatterjee and Siarry [11], the inertia weight was defined as \(w(t) = (w_s - w_e)(1 - t/t_{\max })^n + w_e\) using a monotonically decreasing function with the basic function of \(g(t,t_{\max })=(1 - t/t_{\max })^n\). In this paper, \(w_s = 0.6, w_e = -0.4\) and the recommended value of n is \(n=1.2\), while the acceleration coefficients are fixed values with no crossing, \(c_1=c_2=2.0\) or \(c_1 = c_2 = 1.5\).

On the other hand, the PSO variant in the original paper by Wang and Liu [86] used a monotonically increasing basic function, \(f(t, t_{\max })=(t/t_{\max })^n\) for all \(w(t), c_1(t)\) and \(c_2(t)\), but \(w_s =0.9, w_e = 0.4, c_{1s}= 2.5, c_{1e}=0.5\). However, it was assumed that \(n=1/3, 1/2, 1, 2, 3\) can be taken. They finally concluded that \(n=1/3\) for \(c_1(t)\) and \(n=1\) for \(c_2(t)\), in other words, cross-realization before the intermediate iteration time. However, w(t) always dealt only with \(n=1\). Therefore, for comparison objectives, we fix \(n=1\) for w(t) and \(c_2(t)\), and \(n=1/3\) for \(c_1(t)\).

The mixed type of these two basic functions at \(n=1\) is the PSO variant of Ratnaweera et al. [65]. That is, w(t) with \(g(t,t_{\max })= 1- t/t_{\max }\) is linearly monotonically decreasing time-varying weight with \(w_s = 0.9\) and \(w_e =0.4\), while \(c_1(t)\) and \(c_2(t)\) have \(f(t,t_{\max })=t/t_{\max }\) as a basic function, and they are linearly monotonically decreasing and monotonically increasing time-varying coefficients, respectively, in which the acceleration coefficients intersect at exactly \(0.5t_{\max }\). However, \(c_{1s}= 2.5\) and \(c_{1e}=0.5\) are used for comparison.

In the PSO variant of Lu et al. [50], only the inertia weight w(t) is constructed using a monotonically decreasing basic function, \(g(t,t_{\max }) = e^{-\alpha t/t_{\max }}\). However, \(w_s = 0.9, w_e = 0.2\) and \(\alpha \in [6, 8]\) were recommended, so that \(\alpha = 7.0\) is used for the comparison here, as well as setting \(c_1(t)=c_2(t)=2\).

The PSO variant of Phung and Ha [58] also has fixed acceleration coefficients, but only the inertia weight was time-varying. However, the condition used in the original 3D path planning is that w(t) is in a form that incorporates the damping coefficient, i.e., \(w(t) = w_{damp} w(t-1)\), \(w_{damp}=0.98, w(0)=1.0\), and the acceleration coefficients are \(c_1(t) = c_2(t)=1.5\).

These five PSO variants can be broadly divided into cases where the time-varying function of the acceleration coefficients is removed and consequently no crossing strategy is used, and cases where the basic function characteristics are partially linearly restricted. As can be seen from Table 26, the ablation-type PSO variants are clearly computationally less expensive, with a time of 709 to 721 s for 20 trials and an average time of about 35 to 36 s per trial. However, as can be seen from Tables 11, 12, 16, and 26, even with an increase in computational cost of about one second per trial, the search performance obtained by the proposed PSO, which incorporates a crossing strategy with nonlinear time-varying acceleration coefficients, shows significant improvement in terms of average Gbest cost and convergence rate.

8.7 How do we choose the basis functions in the sequel? And how do different basis functions affect search performance?

It is easier to obtain crossing times and crossing values on the crossing strategy if the basic functions are well-posed. In this sense, it is easy to use those of Chatterjee and Siarry [11] and Wang and Liu [86], where the crossing time and crossing value can be freely changed with the modulation parameter n. However, even when using ill-posed Napier numbers or trigonometric functions as basic functions, the crossing time and crossing value can be adjusted by correcting the acceleration coefficient at the beginning or end of the search with the fictitious boundary value and changing the decay rate \(\alpha \). Therefore, there is no problem in terms of crossing strategy, but there is some algorithmic complexity.

Although the effect of differences in basis functions on search performance cannot be discussed in general terms, a good convergence region can be predicted in advance from the pattern of crossing times \(t_{cross}\) for different modulation indices of acceleration coefficients and decay rates. For example, the basic functions of Chatterjee and Siarry [11] and Wang and Liu [86] are originally linear functions \(1-t/t_{\max }\) and \(t/t_{\max }\) in their components. Figure 14 shows that the pattern is distributed around \(\frac{1}{2}t_{\max }\) even when the modulation index n changes. The densely distributed crossing time patterns indicate the formation of the first half-dependent crossing pattern before \(\frac{1}{2}t_{\max }\) and the second half-dependent crossing pattern after \(\frac{1}{2}t_{\max }\), respectively, those of which are also supported by the search results in Tables 11 and 12, which include the convergence rate.

Similarly, Fig. 21 shows that the symmetric crossing patterns of the acceleration coefficients of Methods C and D, which use Napier numbers with decay rate \(\alpha \) as basic functions, are dense around \(t_{cross}=30\) and 90 for the former and around \(t_{cross}=110\) for the latter. The former is found in \(\alpha =2.0\; (t_{cross}=59)\) from Table 16, and the latter is found in \(\alpha =0.2\sim 1.2\; (t_{cross}=45\sim 127)\) from Table 17, showing good results in a wide range of crossing times.

On the other hand, when the basic functions do not include modulation index n or decay rate \(\alpha \), improved search performance can be expected by adopting asymmetric crossing, but one key is how to design the asymmetry of the two acceleration coefficients. Here, \(c_{1ini}\) and \(c_{2e}\) were selected and adjusted experimentally by looking at the values of \(t_{cross}\) and \(c_{cross}\). In the future, there is room for more in-depth research on asymmetric crossing strategies, including more systematic selection and adjustment methods.

8.8 Limitations of the proposed method

Finally, to demonstrate the limitations of the proposed method, we compare its advantages with its disadvantages and constraints.

8.8.1 Necessity of prior information

When selecting basic functions (such as trigonometric functions or the Napier’s constant), it is essential to check whether the chosen function is continuous or contains discontinuities and non-differentiable points. Additionally, we need to verify whether the initial and terminal values are well-posed (i.e., lie within the range of (0, 1) or (1, 0)). If ill-posed, determining fictitious initial or terminal values becomes necessary.

8.8.2 Choice of crossing method

Depending on the complexity of the search problem (e.g., unimodal or multimodal), different crossing methods should be considered. For simpler problems, a linear crossing method may suffice. However, for complex problems or cases where complexity is unknown, nonlinear symmetric crossing methods that allow adjustments between local and global exploration are recommended. Asymmetric crossing methods should be chosen when basic functions do not include a modulation parameter or decay rate.

8.8.3 Computational cost and complexity

In general, adjusting crossing values and timing in the proposed method allows for efficient global solution discovery compared to conventional methods with fixed acceleration coefficients. Implementation complexity is minimal, involving only setting fictitious initial or terminal values and adding one or two lines for time-varying acceleration coefficients. Although the computational cost increases by approximately one second per trial compared to conventional methods (as found in Section 8.6), significant improvements in evaluation function and convergence rate justify this cost.

8.8.4 Applicability to constraint conditions

We believe that the proposed method can be applied to various engineering problems, similar to conventional PSO variants. For instance, applying NCS-PSO to the design of flexible hinge displacement amplification mechanisms (as proposed in [33]) could lead to improved machine performance and efficiency by finding optimal magnification values. Additionally, hybridizing the “Taguchi" method with NCS-PSO for optimizing process parameters in electrical discharge machining (EDM) (as explored in [82]) may yield better results. However, it is crucial to recognize that, unlike other evolutionary computations (EC) or genetic algorithms (GA), PSO generally does not employ “arbitrary particle-to-particle crossovers" or “mutation operations," which means there is always a risk of converging to local solutions in non-convex problems.

9 Conclusions

In this paper, we have introduced a unified methodology for designing nonlinear time-varying inertia weight and acceleration coefficients, resulting in the development of Nonlinear Crossing Strategy-based Particle Swarm Optimizations (NCS-PSOs) for global optimization. We started by explaining the process of designing monotonically decreasing time-varying parameters, ensuring they meet specified initial and terminal boundary values by using and amplifying well-posed monotonic functions. Furthermore, we proposed a method to address ill-posed basic functions by introducing fictitious boundary values when extending this concept. Then, our exploration of the crossing strategy method, wherein acceleration coefficients are intersected during the PSO search, revealed novel insights into optimizing the search process. The introduction of crossing values and times as new information during the search demonstrated promising avenues for enhancing optimization outcomes. Comparative evaluations against conventional PSO variants and contemporary metaheuristics, using the CEC2014 benchmark functions, showcased the competitive performance of our proposed NCS-PSOs.

While our study predominantly focused on the integration of both cognitive and social acceleration terms, with their balance dynamically shifting throughout the search process, we recognize the potential for further refinement. Inspired by previous works, such as Kennedy’s cognition-only and social-only models [39], and Duan’s exploration of switching between these models [18], future research directions could involve the development of new search algorithms encompassing such variations [19]. Additionally, extending our investigation to encompass periodic and multi-point crossing methods to handle time intersections at multiple points presents intriguing avenues for future exploration. Finally, we acknowledge the importance of convergence analysis in ensuring the efficacy of optimization algorithms. Although not extensively covered in this paper, the work of Clerc and Kennedy [15] serves as a foundational reference in this domain, and future endeavors could delve deeper into convergence analysis to provide robust guarantees of convergence to global solutions. In summary, our contributions pave the way for more sophisticated and effective PSO optimization techniques, with potential applications spanning various domains, including but not limited to 3D path planning for drones.