190 research outputs found

    Enhanced Computational Intelligence Algorithm for Coverage Optimization of 6G Non-Terrestrial Networks in 3D Space

    Get PDF
    The next generation 6G communication network is typically characterized by the full connectivity and coverage of Users Equipment (UEs). This leads to the need for moving beyond the traditional two-dimensional (2D) coverage service to the three-dimensional (3D) full-service one. The 6G 3D architecture leverages different types of non-terrestrial or aerial nodes that can act as mobile Base Stations (BSs) such as Unmanned Aerial Vehicles (UAVs), Low Altitude Platforms (LAPs), High-Altitude Platform Stations (HAPSs), or even Low Earth Orbit (LEO) satellites. Moreover, aided technologies have been added to the 6G architecture to dynamically increase its coverage efficiency such as the Reconfigurable Intelligent Surfaces (RIS). In this paper, an enhanced Computational Intelligence (CI) algorithm is introduced for optimizing the coverage of UAV-BSs with respect to their location from RIS in the 3D space of 6G architecture. The regarded problem is formulated as a constrained 3D coverage optimization problem. In order to increase the convergence of the proposed algorithm, it is hybridized with a crossover operator. For the validation of the proposed method, it is tested on different scenarios with large-scale coordinates and compared with many recent and hybrid CI algorithms, as Slime Mould Algorithm (SMA), Lévy Flight Distribution (LFD), hybrid Particle Swarm Optimization and Gravitational Search Algorithm (PSOGSA), the Covariance Matrix Adaptation Evolution Strategy (CMA-ES), and hybrid Grey Wolf Optimizer and Cuckoo Search (GWOCS). The experiment and the statistical analysis show the significant efficiency of the proposed algorithm in achieving complete coverage with a lower number of UAV-BSs and without constraints violation. </p

    Green Communication for Sixth-Generation Intent-Based Networks:An Architecture Based on Hybrid Computational Intelligence Algorithm

    Get PDF
    The sixth-generation (6G) is envisioned as a pivotal technology that will support the ubiquitous seamless connectivity of substantial networks. The main advantage of 6G technology is leveraging Artificial Intelligence (AI) techniques for handling its interoperable functions. The pairing of 6G networks and AI creates new needs for infrastructure, data preparation, and governance. Thus, Intent-Based Network (IBN) architecture is a key infrastructure for 6G technology. Usually, these networks are formed of several clusters for data gathering from various heterogeneities in devices. Therefore, an important problem is to find the minimum transmission power for each node in the network clusters. This paper presents hybridization between two Computational Intelligence (CI) algorithms called the Marine Predator Algorithm and the Generalized Normal Distribution Optimization (MPGND). The proposed algorithm is applied to save power consumption which is an important problem in sustainable green 6G-IBN. MPGND is compared with several recently proposed algorithms, including Augmented Grey Wolf Optimizer (AGWO), Sine Tree-Seed Algorithm (STSA), Archimedes Optimization Algorithm (AOA), and Student Psychology-Based Optimization (SPBO). The experimental results with the statistical analysis demonstrate the merits and highly competitive performance of the proposed algorithm

    Multi-Objective Task Scheduling Approach for Fog Computing

    Get PDF
    Despite the remarkable work conducted to improve fog computing applications&#x2019; efficiency, the task scheduling problem in such an environment is still a big challenge. Optimizing the task scheduling in these applications, i.e. critical healthcare applications, smart cities, and transportation is urgent to save energy, improve the quality of service, reduce the carbon emission rate, and improve the flow time. As proposed in much recent work, dealing with this problem as a single objective problem did not get the desired results. As a result, this paper presents a new multi-objective approach based on integrating the marine predator&#x2019;s algorithm with the polynomial mutation mechanism (MHMPA) for task scheduling in fog computing environments. In the proposed algorithm, a trade-off between the makespan and the carbon emission ratio based on the Pareto optimality is produced. An external archive is utilized to store the non-dominated solutions generated from the optimization process. Also, another improved version based on the marine predator&#x2019;s algorithm (MIMPA) by using the Cauchy distribution instead of the Gaussian distribution with the levy Flight to increase the algorithm&#x2019;s convergence with avoiding stuck into local minima as possible is investigated in this manuscript. The experimental outcomes proved the superiority of the MIMPA over the standard one under various performance metrics. However, the MIMPA couldn&#x2019;t overcome the MHMPA even after integrating the polynomial mutation strategy with the improved version. Furthermore, several well-known robust multi-objective optimization algorithms are used to test the efficacy of the proposed method. The experiment outcomes show that MHMPA could achieve better outcomes for the various employed performance metrics: Flow time, carbon emission rate, energy, and makespan with an improvement percentage of 414, 27257.46, 64151, and 2 for those metrics, respectively, compared to the second-best compared algorithm

    Task Scheduling Approach in Cloud Computing Environment Using Hybrid Differential Evolution

    Get PDF
    Task scheduling is one of the most significant challenges in the cloud computing environment and has attracted the attention of various researchers over the last decades, in order to achieve cost-effective execution and improve resource utilization. The challenge of task scheduling is categorized as a nondeterministic polynomial time (NP)-hard problem, which cannot be tackled with the classical methods, due to their inability to find a near-optimal solution within a reasonable time. Therefore, metaheuristic algorithms have recently been employed to overcome this problem, but these algorithms still suffer from falling into a local minima and from a low convergence speed. Therefore, in this study, a new task scheduler, known as hybrid differential evolution (HDE), is presented as a solution to the challenge of task scheduling in the cloud computing environment. This scheduler is based on two proposed enhancements to the traditional differential evolution. The first improvement is based on improving the scaling factor, to include numerical values generated dynamically and based on the current iteration, in order to improve both the exploration and exploitation operators; the second improvement is intended to improve the exploitation operator of the classical DE, in order to achieve better results in fewer iterations. Multiple tests utilizing randomly generated datasets and the CloudSim simulator were conducted, to demonstrate the efficacy of HDE. In addition, HDE was compared to a variety of heuristic and metaheuristic algorithms, including the slime mold algorithm (SMA), equilibrium optimizer (EO), sine cosine algorithm (SCA), whale optimization algorithm (WOA), grey wolf optimizer (GWO), classical DE, first come first served (FCFS), round robin (RR) algorithm, and shortest job first (SJF) scheduler. During trials, makespan and total execution time values were acquired for various task sizes, ranging from 100 to 3000. Compared to the other metaheuristic and heuristic algorithms considered, the results of the studies indicated that HDE generated superior outcomes. Consequently, HDE was found to be the most efficient metaheuristic scheduling algorithm among the numerous methods researched

    An Improved Binary Grey-Wolf Optimizer with Simulated Annealing for Feature Selection

    Get PDF
    This paper proposes improvements to the binary grey-wolf optimizer (BGWO) to solve the feature selection (FS) problem associated with high data dimensionality, irrelevant, noisy, and redundant data that will then allow machine learning algorithms to attain better classification/clustering accuracy in less training time. We propose three variants of BGWO in addition to the standard variant, applying different transfer functions to tackle the FS problem. Because BGWO generates continuous values and FS needs discrete values, a number of V-shaped, S-shaped, and U-shaped transfer functions were investigated for incorporation with BGWO to convert their continuous values to binary. After investigation, we note that the performance of BGWO is affected by the selection of the transfer function. Then, in the first variant, we look to reduce the local minima problem by integrating an exploration capability to update the position of the grey wolf randomly within the search space with a certain probability; this variant was abbreviated as IBGWO. Consequently, a novel mutation strategy is proposed to select a number of the worst grey wolves in the population which are updated toward the best solution and randomly within the search space based on a certain probability to determine if the update is either toward the best or randomly. The number of the worst grey wolf selected by this strategy is linearly increased with the iteration. Finally, this strategy is combined with IBGWO to produce the second variant of BGWO that was abbreviated as LIBGWO. In the last variant, simulated annealing (SA) was integrated with LIBGWO to search around the best-so-far solution at the end of each iteration in order to identify better solutions. The performance of the proposed variants was validated on 32 datasets taken from the UCI repository and compared with six wrapper feature selection methods. The experiments show the superiority of the proposed improved variants in producing better classification accuracy than the other selected wrapper feature selection algorithms

    Interpretable Deep Learning for Discriminating Pneumonia from Lung Ultrasounds

    Get PDF
    Lung ultrasound images have shown great promise to be an operative point-of-care test for the diagnosis of COVID-19 because of the ease of procedure with negligible individual protection equipment, together with relaxed disinfection. Deep learning (DL) is a robust tool for modeling infection patterns from medical images; however, the existing COVID-19 detection models are complex and thereby are hard to deploy in frequently used mobile platforms in point-of-care testing. Moreover, most of the COVID-19 detection models in the existing literature on DL are implemented as a black box, hence, they are hard to be interpreted or trusted by the healthcare community. This paper presents a novel interpretable DL framework discriminating COVID-19 infection from other cases of pneumonia and normal cases using ultrasound data of patients. In the proposed framework, novel transformer modules are introduced to model the pathological information from ultrasound frames using an improved window-based multi-head self-attention layer. A convolutional patching module is introduced to transform input frames into latent space rather than partitioning input into patches. A weighted pooling module is presented to score the embeddings of the disease representations obtained from the transformer modules to attend to information that is most valuable for the screening decision. Experimental analysis of the public three-class lung ultrasound dataset (PCUS dataset) demonstrates the discriminative power (Accuracy: 93.4%, F1-score: 93.1%, AUC: 97.5%) of the proposed solution overcoming the competing approaches while maintaining low complexity. The proposed model obtained very promising results in comparison with the rival models. More importantly, it gives explainable outputs therefore, it can serve as a candidate tool for empowering the sustainable diagnosis of COVID-19-like diseases in smart healthcare

    An Optimization Model for Appraising Intrusion-Detection Systems for Network Security Communications:Applications, Challenges, and Solutions

    Get PDF
    Cyber-attacks are getting increasingly complex, and as a result, the functional concerns of intrusion-detection systems (IDSs) are becoming increasingly difficult to resolve. The credibility of security services, such as privacy preservation, authenticity, and accessibility, may be jeopardized if breaches are not detected. Different organizations currently utilize a variety of tactics, strategies, and technology to protect the systems’ credibility in order to combat these dangers. Safeguarding approaches include establishing rules and procedures, developing user awareness, deploying firewall and verification systems, regulating system access, and forming computer-issue management groups. The effectiveness of intrusion-detection systems is not sufficiently recognized. IDS is used in businesses to examine possibly harmful tendencies occurring in technological environments. Determining an effective IDS is a complex task for organizations that require consideration of many key criteria and their sub-aspects. To deal with these multiple and interrelated criteria and their sub-aspects, a multi-criteria decision-making (MCMD) approach was applied. These criteria and their sub-aspects can also include some ambiguity and uncertainty, and thus they were treated using q-rung orthopair fuzzy sets (q-ROFS) and q-rung orthopair fuzzy numbers (q-ROFNs). Additionally, the problem of combining expert and specialist opinions was dealt with using the q-rung orthopair fuzzy weighted geometric (q-ROFWG). Initially, the entropy method was applied to assess the priorities of the key criteria and their sub-aspects. Then, the combined compromised solution (CoCoSo) method was applied to evaluate six IDSs according to their effectiveness and reliability. Afterward, comparative and sensitivity analyses were performed to confirm the stability, reliability, and performance of the proposed approach. The findings indicate that most of the IDSs appear to be systems with high potential. According to the results, Suricata is the best IDS that relies on multi-threading performance

    EfFcient mcdm model for evaluating the performance of commercial banks:A case study

    Get PDF
    Evaluation of commercial banks (CBs) performance has been a significant issue in the financial world and deemed as a multi-criteria decision making (MCDM) model. Numerous research assesses CB performance according to different metrics and standers. As a result of uncertainty in decision-making problems and large economic variations in Egypt, this research proposes a plithogenic based model to evaluate Egyptian commercial banks' performance based on a set of criteria. The proposed model evaluates the top ten Egyptian commercial banks based on three main metrics including financial, customer satisfaction, and qualitative evaluation, and 19 subcriteria. The proportional importance of the selected criteria is evaluated by the Analytic Hierarchy Process (AHP). Furthermore, the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), Vlse Kriterijumska Optimizacija Kompro-misno Resenje (VIKOR), and COmplex PRoportional ASsessment (COPRAS) are adopted to rank the top ten Egyptian banks based on their performance, comparatively. The main role of this research is to apply the proposed integrated MCDM framework under the plithogenic environment to measure the performance of the CBs under uncertainty. All results show that CIB has the best performance while Faisal Islamic Bank and Bank Audi have the least performance among the top 10 CBs in Egypt.</p
    • …
    corecore