4.6 Article

Autonomous bonobo optimization algorithm for power allocation in wireless networks

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

Solving unconstrained, constrained optimization and constrained engineering problems using reconfigured water cycle algorithm

Heba F. Eid et al.

Summary: Water cycle algorithm (WCA) is a popular meta-heuristic algorithm that has attracted significant attention from researchers in various fields. In this study, a reconfigured version of WCA, called RWCA, is proposed to improve the exploration procedure. The proposed algorithm incorporates a new position update strategy combining the Cauchy operator and a greedy selection procedure, and introduces a nonlinear controlling parameter to enhance the exploration-exploitation balance. Experimental results demonstrate that RWCA significantly outperforms the original WCA in terms of solution quality, convergence speed, and robustness. RWCA has also shown effectiveness in solving constrained optimization problems and challenging real-world engineering problems.

EVOLUTIONARY INTELLIGENCE (2023)

Article Computer Science, Information Systems

A Novel Bio-Inspired Energy Optimization for Two-Tier Wireless Communication Networks: A Grasshopper Optimization Algorithm (GOA)-Based Approach

Ashraf Sherif et al.

Summary: Energy consumption is a major challenge in future wireless communication networks. Wireless heterogeneous networks (HetNets) are a promising method in 5G cellular networks to meet high data traffic demands. In order to reduce power consumption and maximize energy efficiency, it is necessary to switch off some small cell base stations (SCBs). This paper proposes a novel mechanism based on bio-inspired behavior to select appropriate operation modes for SCBs, and uses the GOA-VPMS algorithm to solve the energy efficiency maximization problem.

ELECTRONICS (2023)

Article Computer Science, Hardware & Architecture

Bio-Inspired Multilevel Security Protocol for Data Aggregation and Routing in IoT WSNs

Neeraj Chandnani et al.

Summary: In this research, a trust-based secure data aggregation method and an energy-efficient secure routing protocol called ANTPSOAODV were proposed for IoT WSNs. The proposed protocol achieves secure data aggregation by detecting nodes' behavior, calculating their trust values, and implementing a data gathering method. Additionally, the protocol includes the segmentation of the network into outer and inner zones, cluster creation based on vicinity, secure data transmission using secret sharing, and analysis of the data link to minimize routing disturbance. Performance evaluation showed that ANTPSOAODV outperforms existing protocols in terms of Quality-of-Service parameters in IoT WSNs.

MOBILE NETWORKS & APPLICATIONS (2022)

Article Green & Sustainable Science & Technology

Development of an Improved Bonobo Optimizer and Its Application for Solar Cell Parameter Estimation

Reem Y. Abdelghany et al.

Summary: In this study, an improved bonobo optimizer (IBO) was proposed to enhance the performance of the conventional bonobo optimizer (BO) in obtaining accurate values of unknown parameters of different mathematical models of solar cells. The IBO improved the exploitation and exploration phases, showing durability and exceeding other algorithms in effectiveness.

SUSTAINABILITY (2021)

Article Engineering, Electrical & Electronic

Residual Transceiver Hardware Impairments on Cooperative NOMA Networks

Xingwang Li et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2020)

Article Computer Science, Information Systems

A Novel Multichannel Internet of Things Based on Dynamic Spectrum Sharing in 5G Communication

Xin Liu et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Mobile Edge Computing With Wireless Backhaul: Joint Task Offloading and Resource Allocation

Quoc-Viet Pham et al.

IEEE ACCESS (2019)

Proceedings Paper Computer Science, Theory & Methods

A New Bonobo Optimizer (BO) for Real-Parameter Optimization

Amit Kumar Das et al.

PROCEEDINGS OF 2019 IEEE REGION 10 SYMPOSIUM (TENSYMP) (2019)

Article Engineering, Electrical & Electronic

Power Allocation for Energy Efficiency and Secrecy of Wireless Interference Networks

Zhichao Sheng et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2018)

Article Computer Science, Artificial Intelligence

Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems

Seyedali Mirjalili

NEURAL COMPUTING & APPLICATIONS (2016)

Article Computer Science, Artificial Intelligence

Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm

Seyedali Mirjalili

KNOWLEDGE-BASED SYSTEMS (2015)

Article Computer Science, Information Systems

Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

Amitav Mukherjee et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Engineering, Electrical & Electronic

5G Network Capacity

Qian (Clara) Li et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2014)

Article Telecommunications

Energy Efficiency and Spectral Efficiency Tradeoff in Interference-Limited Wireless Networks

Yuzhou Li et al.

IEEE COMMUNICATIONS LETTERS (2013)

Article Computer Science, Information Systems

A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks

Alexandros G. Fragkiadakis et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Engineering, Electrical & Electronic

Cooperative Security at the Physical Layer [A summary of recent advances]

Raef Bassily et al.

IEEE SIGNAL PROCESSING MAGAZINE (2013)

Article Computer Science, Information Systems

GSA: A Gravitational Search Algorithm

Esmat Rashedi et al.

INFORMATION SCIENCES (2009)

Article Computer Science, Information Systems

Secure communication over fading channels

Yingbin Liang et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2008)