“…Li, Liu, Zhang, & Ye, 2016), secure encryption (Y. , image filtering (H. Zhao, Gao, Wang, Pan, & Graphics, 2016;H. Zhao, Jiang, Jin, Du, & Li, 2018), image editing (Xujie Li, Huang, Zhao, Wang, & Hu, 2020;, structural topology optimization (Shaohua Zhang, Li, Zhong, & Xiang, 2014), scheduling problem (Pang, Zhou, Tsai, & Chou, 2018;H. Zhou, Pang, Chen, & Chou, 2018), face recognition and micro-expression recognition (S. J.…”