Next Article in Journal
Discrete Wavelet Transform—Based Metal Material Analysis Model by Constant Phase Angle Pulse Eddy Current Method
Previous Article in Journal
Sizing-Based Flaw Acceptability in Weldments Using Phased Array Ultrasonic Testing and Neural Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Boosted Reptile Search Algorithm for Engineering and Optimization Problems

by
Mohamed Abd Elaziz
1,2,3,4,5,*,
Samia Chelloug
6,*,
Mai Alduailij
7,* and
Mohammed A. A. Al-qaness
8
1
Department of Mathematics, Faculty of Science, Zagazig University, Zagazig 44519, Egypt
2
Artificial Intelligence Research Center (AIRC), Ajman University, Ajman 346, United Arab Emirates
3
Department of Artificial Intelligence Science and Engineering, Galala University, Suze 435611, Egypt
4
Department of Electrical and Computer Engineering, Lebanese American University, Byblos 13-5053, Lebanon
5
Faculty of Information Technology, Middle East University, Amman 11831, Jordan
6
Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh 11671, Saudi Arabia
7
Department of Computer Science, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh 11671, Saudi Arabia
8
College of Physics and Electronic Information Engineering, Zhejiang Normal University, Jinhua 321004, China
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2023, 13(5), 3206; https://doi.org/10.3390/app13053206
Submission received: 30 January 2023 / Revised: 21 February 2023 / Accepted: 26 February 2023 / Published: 2 March 2023

Abstract

:
Recently, various metaheuristic (MH) optimization algorithms have been presented and applied to solve complex engineering and optimization problems. One main category of MH algorithms is the naturally inspired swarm intelligence (SI) algorithms. SI methods have shown great performance on different problems. However, individual MH and SI methods face some shortcomings, such as trapping at local optima. To solve this issue, hybrid SI methods can perform better than individual ones. In this study, we developed a boosted version of the reptile search algorithm (RSA) to be employed for different complex problems, such as intrusion detection systems (IDSs) in cloud–IoT environments, as well as different optimization and engineering problems. This modification was performed by employing the operators of the red fox algorithm (RFO) and triangular mutation operator (TMO). The aim of using the RFO was to boost the exploration of the RSA, whereas the TMO was used for enhancing the exploitation stage of the RSA. To assess the developed approach, called RSRFT, a set of six constrained engineering benchmarks was used. The experimental results illustrated the ability of RSRFT to find the solution to those tested engineering problems. In addition, it outperformed the other well-known optimization techniques that have been used to handle these problems.

1. Introduction

In daily life, optimization is everywhere. Optimization is used widely in many fields, including system management, technical design, economics, and various engineering problems [1,2]. To optimize something means to make sure one or more goals of a particular situation are as ideal as possible. The goal of the optimization process is to investigate potential solutions and find the optimal one. Occasionally, many constraints are applied to solutions, making optimization more difficult [3].
In recent decades, the effectiveness of metaheuristic (MH) techniques in solving complicated problems with high dimensionality, multimodality, and non-differentiability has been proven by different studies in different applications [4,5,6]. As a result, the use of these algorithms has increased significantly, and there is a growing trend to suggest efficient upgrades and new metaheuristic algorithms. These algorithms primarily gain their inspiration from natural phenomena, physics laws, animals’ and birds’ behaviors, and so on. Earlier, some efficient optimization algorithms were developed, such as the genetic algorithm (GA) [7], artificial bee colony (ABC) [8], particle swarm optimization (PSO) [9], and the firefly algorithm [10]. Recently, there have been many newly developed metaheuristic optimization algorithms based on different inspirations, for example the sine–cosine algorithm (SCA) [11], the multi-verse optimizer (MVO) [12], Harris hawks optimization (HHO) [13], the marine predator algorithm [14], the Aquila optimizer [15], the arithmetic optimization algorithm [16], the Reptile search algorithm (RSA) [17], and many other optimization techniques.
Although those algorithms have shown good performance in different optimization and engineering algorithms, in some cases, they face critical limitations and shortcomings. According to the well-known no free lunch theorem, no one method has the ability of solving all problems. To this end, in recent years, researchers have used the hybridization concept to develop hybrid metaheuristic optimization algorithms to address different engineering and optimization issues.
For example, Houssein et al. [3] applied an improved equilibrium optimizer (EO) using a technique called the self-adaptive EO algorithm. They used four search techniques to enhance the search process of the EO optimization method. This method was employed to address different optimization engineering problems, and it showed better results compared to the original EO. Bo et al. [18] applied several search techniques, namely opposition-based learning and greedy search, to boost the chimp optimization algorithm (ChOA) search mechanism. The developed ChOA was employed to solve different constrained engineering problems and recorded significant outcomes. Shen et al. [19] introduced an enhanced whale optimization algorithm (WOA) to handle engineering design problems and global optimization issues. They used a technique called multi-population evolution to improve the original WOA. A modified SCA was developed by Yang et al. [20]. They suggested a multi-mechanism acting SCA method to overcome the drawbacks of the original SCA. This modified version of the SCA was utilized to address constrained engineering optimization problems. An improved SSA optimization technique was developed by Hong et al. [21] to solve engineering problems, using a new strategy called producer centralization. Furthermore, in [22], a modified improved moth–flame optimizer was suggested using two search mechanisms, namely Gaussian mutation and chaotic grouping. This modified method was evaluated with complex engineering and optimization problems. An enhanced FA was suggested by Peng et al. [23] to solve complex engineering optimization problems. They applied three search techniques to enhance the traditional FA. Zhang et al. [24] presented a modified AOA to be employed in various numerical and engineering optimization applications based on two techniques, called random high-speed jumping and multi-leader wandering around search strategy. Hybrid optimization algorithms have also been adopted in other research areas, such as a hybrid of AO and the seagull optimization algorithm for wind power forecasting [25] and a hybrid of AO with the SMA and SSO to predict CO2 trapping in deep saline [26,27]. Another hybrid optimization method was developed by [28] using DE and the Cuckoo Search algorithm to optimize the ship pipe route. Moreover, a hybrid method of HHO and DE was suggested by Zhong et al. to solve the flight trajectory prediction problem [29].
In recent years, MH optimization techniques also have been investigated to address the problems of intrusion detection systems. Many optimization algorithms have been suggested as feature selection methods to improve the quality solutions of the IDS, such as PSO [30], the GA [31], AO [32], HHO [33], and many other approaches [1,2].

Paper Contribution

Inspired by the successful applications of the hybrid concept to overcome the drawbacks of the individual optimization algorithms, in this study, we present a new version of the reptile search algorithm using two techniques, namely the red fox optimization algorithm and the mutation operators. The RSA [17] is a recently developed optimization method emulating crocodiles’ hunting behaviors in nature. It has been adopted in various applications since it has high performance, such as in [34,35,36]. The red fox optimization algorithm [37] is also a nature-inspired technique based on the hunting behavior of the red fox. It has also been adopted in solving some optimization problems [38,39,40].
The main modification was performed using RFO to enhance the ability of the RSA to explore the search domain. Additionally, the triangular mutation operator (TMO) was applied to improve the exploitation of the RSA. This competition between the operators of the RSA, TMO, and RFO led to enhancing the rate of convergence toward the optimal solution.
In short, we can represent the contributions of this study as the following points:
  • We propose a boosted version of the reptile search algorithm (RSA), called RSRFT, to address IDS problems in IoT and cloud environments, as well as complex and multidimensional engineering problems
  • We employed the operators of the red fox optimization and triangular mutation operator to boost the performance of the RSA.
  • We applied the RSRFT technique to solve different and complex engineering problems. We conducted a set of comparisons with other efficient techniques to verify the quality of RSRFT.
The rest of this study is organizes as follows: In Section 2, detailed background descriptions of the applied algorithms are presented. Section 3 introduces the descriptions of the RSRFT approach. In Section 4, we assess the quality of the modified RSA method using different datasets and with extensive comparisons to other methods, and in Section 5, we present the conclusion of this paper.

2. Background

2.1. The Reptile Search Algorithm

The conventional RSA, which simulates actual crocodile behavior, is presented in this section. This was accomplished using two steps: the local and global search stages.

2.1.1. Exploration Search

Following [17], the process of splitting the maximum number of generations into four parts will trigger the RSA to switch from the exploration to the exploitation stage. Moreover, the RSA exploration phase investigates the search domains using two primary search techniques in pursuit of a more reliable agent. There are two requirements for this search component. If the long walking plan is not adjusted by t T 4 , the agents are modified by t ≤ 2 T 4 and t > T 4 . Equation (1) can be utilized to update the positions for the exploration stage:
x i j ( t + 1 ) = B e s t j ( t ) × η i j ( t ) × β R i j ( t ) × r a n d , t T 4 B e s t j ( t ) × x ( r 1 , j ) × E S ( t ) × r a n d , t 2 T 4 a n d t > T 4
where B e s t j stands for the best solution at dimension j. x ( r 1 , j ) denotes the value of a randomly selected solution at dimension j. r a n d represents a random value, and β = 0.1 as in [17]. T represents the total number of generations. N and η i j are the number of solutions and the hunting operator. The definition of η i j is given as
η i j = B e s t j ( t ) × P i j ,
R i j = B e s t j ( t ) x ( r 2 , j ) B e s t j ( t ) + ϵ ,
E S ( t ) = 2 × r 3 × 1 1 T ,
In Equation (4), ϵ refers to a small value. r 3 [ 1 , 1 ] is a random integer value, while P i j is defined as
P i j = α + x i j M ( x i ) B e s t j ( t ) × ( U B ( j ) L B ( j ) ) + ϵ ,
In Equation (5), U B ( j ) and L B ( j ) represent the boundaries of the search domain, and α = 0.1 [17]. M( x i ) denotes the mean value of X, and it is given as
M ( x i ) = 1 n j = 1 n x i j ,

2.1.2. Exploitation Search

Using the hunting coordination plan, t ≤ 3 T 4 and t > 2 T 4 adopt the agents in this stage. In contrast, if tT and t > 3 T 4 , the hunting cooperation plan is carried out. Equation (7) provides the updated value using the exploitation process.
x i j ( t + 1 ) = B e s t j ( t ) × P i j ( t ) × r a n d , t 3 T 4 a n d t > 2 T 4 B e s t j ( t ) η i j ( t ) × ϵ R i j ( t ) × r a n d , t T a n d t > 3 T 4

2.2. Red Fox Algorithm

This optimizer begins by figuring out the parameters’ values and then creating the population of N foxes according to Equation (8):
X i j = L B j + r × U B j L B j , i = 1 , , N , j = 1 , , D , r [ 0 , 1 ]
where L B j and U B j indicate the boundaries of the search space, while D represents the dimension of X i j foxes. Thereafter, the objective value of X i is evaluated then allocating the best solution X b . The next process is to update X i r using the following formula:
X i r = X i + a s i g n X b X i
In Equation (9), a [ 0 , d i b ] stands for a scaling hyperparameter chosen randomly, whereas d i b is defined as
d i b = | | X i X b | |
In case X i r has a fitness value better than its previous value, then we replace X i with X i r . Otherwise, we preserved the X i value. The observation radius r is then adjusted by applying the formula Equation (11) in the case of the fox not being seen:
r = a sin ( ϕ 0 ) ϕ 0 i f ϕ 0 0 θ o t h e r w i s e
In Equation (11), θ [ 0 , 1 ] is a random value that is applied to control adverse weather conditions such as fog, rain, etc. After that, X is updated based on the following formula:
x 0 n e w = a r . cos ϕ 1 + x 0 a c t x 1 n e w = a r . sin ϕ 1 + a r . cos ϕ 2 + x 1 a c t x 2 n e w = a r . sin ϕ 1 + a r . sin ϕ 2 + a r . cos ϕ 3 + x 2 a c t x n 1 n e w = a r . sin ϕ 1 + a r . sin ϕ 2 + + a r . sin ϕ n 1 + x n 1 a c t
where ϕ i [ 0 , 2 π ] , i = 1 , 2 , , n 1 and each angular value represents a randomized one for each point.
This set of equations simulates a fox’s actions after it spots a target and tries to attack it. Then, the fitness value of X i is assessed and then sorted based on the values. Hunters may kill the worst solution, while Equation (13) is employed to update the X solution.
X = nomadic agent if > 0.5 Reproduction of the alpha couple otherwise
where in the first branch of Equation (13); the new solutions wander outside the environment in search of a new space to repopulate their herd as nomadic agents. Outside of the habitat and within the search zone, the solution is chosen randomly. The center of the habitat ( C H ) is calculated as
C H = X b + X β 2
In Equation (14), X b and X β denote the first- and second-best solutions, respectively.
In addition, in the second case of Equation (13), the following formula is used to update X.
X = X b + X β 2

2.3. Triangular Mutation Operator

The mutation technique utilizes a integration vector, which is constructed using three randomly selected vectors along with three distinct vectors that have been selected during the competition (the best, worst, and better). This combination vector is then utilized to create the new mutant vector.
V i ( t + 1 ) = M 1 × ( X b ( t ) X ¯ b r ( t ) ) + M 2 × ( X b ( t ) X w ( t ) ) + M 3 × ( X b r ( t ) X w ( t ) ) + X ¯ c ( t )
In Equation (16), M 1 , M 2 , and M 3 refer to the mutation factors that are related to x i and they are produced according to the uniform distribution. In addition, three tournaments are given as X w ( t ) , X b r ( t ) , X b ( t ) . In addition, X ¯ c ( t ) is the combination vector triangle at iteration t and formulated as:
X ¯ c = w 1 × X b + w 2 × X b r + w 3 × X w , w i 0 , i = 1 3 w i = 1
where w i is a real weight and w i is formulated as w i = p i / i = 1 3 p i .
Moreover, the mutation is used to balance the exploitation propensity with the exploration capacity, with the primary mutation favoring the exploration phase. As a result, utilizing the presented mutation is twice as likely to succeed as using the fundamental principles. The differential evolution (DE) method is the foundation of the advanced mutation technique. Thus, using the fundamental mutation approach DE/rand/1/bin, the following new combination is created:
If r a n d ( 2 / 3 ) ) , then
V i ( t + 1 ) = M 1 × ( X b ( t ) X b r ( t ) ) + M 2 × ( X b ( t ) X w ( t ) ) + M 3 × ( X b r ( t ) X w ( t ) ) + X ¯ c ( t )
Else:
V i ( t + 1 ) = X r 1 ( t ) + F × ( X r 1 ( t ) X r 3 ( t ) )
In Equation (18), F is a random value at ( 1 , 0 ) ( 0 , 1 ) and r a n d [ 0 , 1 ] a random value.

3. Proposed RSRFT Method

Within this section, we introduce the stages of the developed technique, which depends on modifying the performance of the RSA using TMO and RFO as given in Figure 1. The main objective of RFO is to facilitate the identification of a feasible solution within the feasible area, while TMO is applied to promote harmony between the exploitation and exploration. The initial population of RSRFT is constructed inside the search space’s confines. The best solution is then selected from the current population after the fitness function for each solution has been evaluated. The solutions are updated using the RSA, RFO, and TMO operators. The RFO technique will then be used to update a collection of individuals that have reached a local standstill. Until the terminal condition is satisfied, the updating of the population is conducted again. The next subsections offer a detailed explanation of the developed RSRFT approach.

3.1. Initial Phase

The RSRFT creates the N agent starting populations ( X i ) as
X i = r a n d ( 1 , D ) × ( U B L B ) + L B , i = 1 , , N
In Equation (20), r a n d [ 0 , 1 ] stands for a random vector with dimension D. N is the number of solutions.

3.2. Updating Phase

The current X is updated by using either the operators of the RSA, RFO, or TMO. This can be conducted through a set of steps. The first step is to calculate the fitness value for X i . The smallest fitness value and its related solution are then identified. Then, according to the probability of the fitness value, either the operators of the RSA or RFO and TMO are used to update X. This probability is computed as
P r i = F i t i i = 1 N F i t i
Then, the updating is performed using the following formula:
X i ( t + 1 ) = X i R S A i f P r i > r p r X i R T O t h e r w i s e ,
where r p r is computed as
r p r = m i n ( P r ) + ( m a x ( P r ) m i n ( P r ) ) × r a n d
In addition, the value of X i R T is computed as
X i ( t + 1 ) = X i T M O i f   r a n d > 0.5 X i R F O O t h e r w i s e ,
X i T M O = U s e E q u a t i o n ( 18 ) t o u p d a t e X i i f r a n d > 0.5 U s e E q u a t i o n ( 19 ) t o u p d a t e X i O t h e r w i s e ,
while the values of X i R F O and X i R S A refer to the updated value of X i using the operators of RFO and the RSA, respectively.

3.3. Terminal Phase

The stopping conditionsare examined during this phase, and in case they are satisfied, the steps of updating are halted and X b is returned. Otherwise, a new updating step is carried out.
The main steps of the proposed RSRFT are given in Algorithm 1.
Algorithm 1 The RSRFT method.
  1:
Initialize the parameters as N solutions.
  2:
Construct initial set of X solutions using Equation (20).
  3:
repeat
  4:
      Evaluate the fitness value of X i , and find X b .
  5:
      Compute P r i and r p r using Equations (21) and (23), respectively.
  6:
      for  i = 1 : N  do
  7:
    if  P r i > r p r  then
  8:
      Use the RSA to update X i as in Equations (1)–(7).
  9:
    else
10:
      if  r a n d > 0.5  then Update X i using the operators of RFO as in Equations (8)–(15).
11:
      else
12:
       Use TMO to update X i as in Equation (25).
13:
      end if
14:
   end if
15:
     end for
16:
      t = t + 1 .
17:
until Stopping conditions met
18:
Return best solution X b .

4. Experimental Results and Discussion

In this study, the performance of RSRFT was evaluated through two experimental series, which included engineering problems and improve the security in the IoT environment. The experiments illustrated in this section were conducted using MATLAB R2020b installed on machine configured with a 2.40 GHz Intel Core i5 CPU, 4.00 GB RAM, and a Windows 10 operating system.

4.1. Series of Analysis 1: Engineering Problems

The evaluation of the developed RSRFT to solve the constraint optimization engineering problem is presented in this section. Six engineering optimization problems—the design of welded beams, the design of tension/compression springs, and the design optimization challenge for pressure vessels—were the focus of this experiment. The next subsections address the problem definition and results.

4.1.1. Welded Beam Design Problem

Determining the welding beam’s settings that lower the fabrication costs are the major goal of solving welded beam design (WBD) problem (Figure 2). These parameters are the bar’s height (t), the length of an attached portion (l), the weld’s thickness (h), and the bar’s thickness (b).
The definition of WBD is formulated as
C o n s i d e r u = [ u 1 u 2 u 3 u 4 ] = [ h l t b ] , M i n i m i z e f ( u ) = 1.10471 u 1 2 u 2 + 0.04811 u 3 u 4 ( 14.0 + u 2 ) , S u b j e c t t o g 1 ( u ) = τ ( u ) τ m a x 0 , g 2 ( u ) = δ ( u ) δ m a x 0 , g 3 ( u ) = σ ( u ) σ m a x 0 , g 4 ( u ) = P P c ( u ) 0 , g 5 ( u ) = u 1 u 4 0 , g 6 ( u ) = 1.10471 u 1 2 + 0.04811 u 3 u 4 ( 14.0 + u 2 ) 5.0 0 , g 7 ( u ) = 0.125 u 1 0 V a r i a b l e s r a n g e 0.1 u 1 2 , 0.1 u 2 10 , 0.1 u 3 10 , 0.1 u 4 2 w h e r e τ ( u ) = ( τ ) 2 + 2 τ τ u 2 2 R + ( τ ) 2 , τ = p 2 u 1 u 2 , τ = M R J , M = P ( L + u 2 2 ) , R = u 2 2 4 + ( u 1 + u 3 2 ) 2 , J = 2 2 u 1 u 2 u 2 2 4 + ( u 1 + u 3 2 ) 2 , σ ( u ) = 6 P L u 4 u 3 2 , δ ( u ) = 6 P L 3 E u 3 2 u 4 P c ( u ) = u 3 2 u 4 6 36 4.013 E L 2 ( 1 u 3 2 L E 4 G ) , P = 6000 l b , L = 14 i n . , δ m a x = 0.25 i n . , E = 30 × 1 6 p s i , G = 12 × 10 6 p s i , τ m a x = 13600 p s i , σ m a x = 30000 p s i
RSRFT was compared to several optimization techniques, such as the whale optimization algorithm (WOA) [41], MVO [12], evolutionary particle swarm optimization (CPSO) [42], LSHcEpS [43], co-evolutionary differential evolution (CSCA) [44], the simplex method (SIMPLEX) [45], Davidon–Fletcher–Powell (DAVID) [45], the gravitational search algorithm (GSA) [46], the GA [47], harmony search (HS) [48], and LSHADE_SPACMA (we renamed it as LSHSPCM) [49]. The developed RSRFT was conducted for 25 independent runs with t m a x = 500 and N = 25 .
Table 1 contains the results of RSRFT and the compared optimization techniques. The RSRFT technique had the lowest cost (as given in the column Optimal Objective), followed by LSHSPCM, while SIMPLEX had the highest cost. As a result, the design parameters obtained by RSRFT were more suitable for WBD.

4.1.2. Tension/Compression Spring Design Problem

Within this section, we evaluated the performance of RSRFT to allocate the parameters that are used to minimize spring weight during tension/compression spring design (TCSD), which is defined in Figure 3. Those parameters include the wire diameter (d), the mean coil diameter (D), and the number of active coils (N) of a spring. The formulation of TCSD is illustrated as
C o n s i d e r u = [ u 1 u 2 u 3 ] = [ d D N ] , M i n i m i z e f ( u ) = ( u 3 + 2 ) u 2 u 1 2 , S u b j e c t t o g 1 ( u ) = 1 u 2 3 u 3 71785 u 1 4 0 , g 2 ( u ) = 4 u 2 2 u 1 u 2 12566 ( u 2 u 1 3 u 1 4 ) + 1 5108 u 1 2 0 , g 3 ( u ) = 1 140.45 u 1 u 2 2 u 3 0 , g 4 ( u ) = u 1 + u 2 1.5 1 0 , V a r i a b l e s r a n g e 0.05 u 1 2 0.25 u 2 1.30 2.00 u 3 15
In this experiment, RSRFT was compared with other approaches that have been used to solve the TCSD problem, for example CPSO [42], MVO [12], the GA [52], the GSA [41], the evolution strategy (ES) [53], the Ray–Saini method [54], the WOA [41], the CSCA [44], the method proposed by Belegundu and Arora [55], LSHSPCM, and LSHcEpS. The results of the comparison between RSRFT and the others are given in Table 2. The RSRFT offered superior outcomes over the other methods.

4.1.3. Pressure Vessel Design Problem

This section presents the performance of developed RSRFT to solve another engineering problem, named the pressure vessel design (PVD) problem (see Figure 4), by determining the parameters that lead to minimizing the cost of the pressure cylinder. Those parameters are the thickness of the head T h , the length of the cylindrical section of the vessel L, the thickness T s , and the inner radius R. The mathematical representation of PVD is given as
C o n s i d e r u = [ u 1 u 2 u 3 u 4 ] = [ T s T h R L ] , M i n i m i z e 0.6224 u 1 u 3 u 4 + 1.7781 u 2 u 3 2 + 3.1661 u 1 2 u 4 + 19.84 u 1 2 u 3 , S u b j e c t t o g 1 ( u ) = u 1 + 0.0193 u 3 0 , g 2 ( u ) = u 2 + 0.00954 u 3 0 , g 3 ( u ) = π u 3 2 u 4 4 3 π u 3 3 + 1296000 0 , g 4 ( u ) = u 4 240 0 , V a r i a b l e s r a n g e 0 u 1 99 , 0 u 2 99 , 10 u 3 200 , 10 u 4 200
The outcomes of the comparisons are listed in Table 3. Those approaches are HPSO [56], ACO [57], the ES [53], the GA [52], PSO-DE [58], the GSA [41], CDE [44], and LSHSPCM [49]. From these results, we noticed that RSRFT was able to reach the minimum objective value (as given in the column Optimal Objective), which outperformed the other compared techniques.

4.1.4. Three-Bar Truss Design Problem Design

The major aim of Three-Bar Truss Design (TBTD) is to minimize the weight of the structure [59,60]. Figure 5 illustrates the geometry structure of TBTD, in which cross-sectional areas stand in for the design variables. The cross-section with A 1 ( = x 1 ) and A 2 ( = x 2 ) must be found according to [59] because of the system’s symmetry. Below is a diagram that represents the TBTD problem mathematically.
C o n s i d e r f ( x ) = ( 2 2 x 1 + x 2 ) × l M i n i m i z e f ( u ) = ( u 3 + 2 ) u 2 u 1 2 , S u b j e c t t o g 1 ( x ) = x 1 x 1 + x 2 2 x 1 2 + 2 x 1 x 2 P σ 0 , g 2 ( x ) = x 2 2 x 1 2 + 2 x 1 x 2 P σ 0 , g 3 ( x ) = 1 2 x 2 + x 1 P σ 0 g 4 ( u ) = u 1 + u 2 1.5 1 0 , V a r i a b l e s r a n g e l = 100   cm , P = 2   kN / cm 2 , σ = 2   kN / cm 2 , ( 0 x 1 , x 2 1 , )
RSRFT was used to allocate the design variables. Furthermore, we compared RSRFT to other methods used to address the TBTD problem, which are shown in Table 4. Since RSRFT obtained the smallest weight (as given under Optimal Weight), it is clear from the findings in this table that it offered the best solution. However, the outcomes of the traditional RSA were better than the competitive algorithms, including RSRFT.

4.1.5. Speed Reducer Problem

In order for an airplane’s propeller and engine to rotate at an efficient speed, a gearbox between them is needed (see Figure 6 [67]). The optimization strategy employed to address the speed reducer problem is intended for minimizing the design’s weight while still meeting the requirements for the bending stress of the gear teeth, surface stress, transverse shaft deflections, and stresses in the shafts. The best value for each of the seven design factors must be established to solve this problem.
These variables are the face width ( x 1 ), the module of the teeth ( x 2 ), the number of teeth on the pinion ( x 3 ), the lengths of the first and second shafts between the bearings ( x 4 and x 5 , respectively), the first shaft’s diameter ( x 6 and x 7 , respectively), and the module of the teeth ( x 2 ). Given that it contains more limitations than other issues, the speed reducer problem is defined as having a high degree of complexity. Below is a diagram that represents this issue mathematically.
A s s u m e f ( x ) = 0.7854 x 1 x 2 2 ( 3.3333 x 3 2 + 14.9334 x 3 43.0934 ) 1.508 x 1 ( x 6 2 + x 7 2 ) + 7.4777 x 6 3 + x 7 3 + 0.7854 x 4 x 6 2 + x 5 x 7 2 M i n i m i z e f ( u ) = ( u 3 + 2 ) u 2 u 1 2 , S u b j e c t t o g ( 1 ) = 27 x 1 x 2 2 x 3 1 0 , g ( 2 ) = 397.5 x 1 x 2 2 x 3 2 1 0 , g ( 3 ) = 1.93 x 4 3 x 2 x 3 x 6 4 1 0 , g ( 4 ) = 1.93 x 5 3 x 2 x 3 x 7 4 1 0 , g ( 5 ) = 1 110 x 6 3 ( 745 x 4 x 2 x 3 ) 2 + 16.9 × 10 6 1 0 , g ( 6 ) = 1 85 x 7 3 ( 745 x 5 x 2 x 3 ) 2 + 157.5 × 10 6 1 0 , g ( 7 ) = x 2 x 3 40 1 0 , g ( 8 ) = 5 x 2 x 1 1 0 , g ( 9 ) = ( x 1 / 12 x 2 ) 1 0 , g ( 10 ) = 1.5 x 6 + 1.9 x 4 1 0 , g ( 11 ) = 1.1 x 7 + 1.9 x 5 1 0 V a r i a b l e s r a n g e ( 0.7 x 2 0.8 ) , ( 2.6 x 1 3.6 ) , ( 17 x 3 28 ) , ( 7.3 x 4 8.3 ) , ( 2.9 x 6 3.9 ) , ( 7.3 x 5 8.3 ) , ( 5 x 7 5.5 )
Table 5 provides the comparative findings between RSRFT and the other MH approaches that have been given in the literature. It is clear that RSRFT surpassed the majority of the techniques that were examined (as given under Optimal Weight), and it was generally assigned the third rank. CS and SBSM were assigned the first and second ranks, respectively [64,68]. Since all three algorithms almost had the same ideal weight, there was little difference between them.

4.1.6. Multiple Disc Clutch Brake Problem

Finding the values of five design factors to reduce the mass of an MDCB is the primary goal of research into the multiple disc clutch brake (MDCB) problem, which was cited in [63]. The design parameters are shown in Figure 7 as the inner radius x 1 , outer radius x 2 , disc thickness x 3 , actuation force x 4 , and number of friction surfaces x 5 . Below is a diagram that represents this issue mathematically.
A s s u m e f ( x ) = Π ( r o 2 r i 2 ) t ( Z + 1 ) ρ 1.508 x 1 ( x 6 2 + x 7 2 ) + 7.4777 x 6 3 + x 7 3 + 0.7854 x 4 x 6 2 + x 5 x 7 2 M i n i m i z e f ( u ) = ( u 3 + 2 ) u 2 u 1 2 , S u b j e c t t o g 1 ( x ) = l m a x ( Z + 1 ) ( t + δ ) 0 , g 2 ( x ) = r o r i Δ r 0 g 3 ( x ) = P m a x ν s r m a x P r z ν s r 0 g 4 ( x ) = P m a x P r z 0 , g 5 ( x ) = ν s r m a x ν s r 0 , g 6 = T m a x T 0 g 7 ( x ) = M h s M s 0 , g 8 ( x ) = T 0 w h e r e M h = 2 3 μ F Z r o 3 r i 2 r o 2 r i 3 , P r z = F Π ( r o 2 r i 2 ) , ν r z = 2 Π ( r o 3 r i 3 ) 90 ( r o 2 r i 2 ) , T = I z Π n 30 ( M h + M f ) Δ r = 20 mm , I z = 55 kgmm 2 , P m a x = 1 MPa , F m a x = 1000 N , ν s r m a x = 10 m / s , l m a x = 30 mm , r i m i n = 60 , T m a x = 15 s , μ = 0.5 , s = 1.5 , M s = 40   Nm , M f = 3   Nm , n = 250 rpm , F m a x = 1000 , Z m i n = 2 , Z m a x = 9 , r i m a x = 80 , r o m i n = 90 , r o m a x = 110 , t m i n = 1.5 , t m a x = 3 , F m i n = 600
Table 6 lists the outcomes of RSRFT and other MH approaches collected from the literature. From this table, it is clear that RSRFT obtained the ideal cost (0.31176) (as given under Optimal Weight), which was then followed by CMVO, MFO, MVO, and the WCA, which had the same efficiency.

4.2. Series of Analysis 2: RSRFT for Security in the IoT

Within this section, we evaluated the applicability of RSRFT to improve the detection of IDSs in the IoT environment [81]. In general, the problem definition of IDSs in the Internet of Things (IoT) is the need to detect and prevent unauthorized access, data breaches, and malicious activities in IoT devices and networks. With the rapid growth of the IoT, there has been an increase in the number and complexity of connected devices, which has also led to an increase in the number of potential attack vectors and vulnerabilities. As a result, there is a growing need for effective IDSs that can identify and respond to these threats in real-time [82].
The challenge of developing IDSs for the IoT is the complexity of the networks and the diversity of the devices. The systems need to be designed to detect and respond to a wide range of attack types, including malware, denial-of-service attacks, and insider threats. Furthermore, the systems need to be able to identify anomalous behaviors and patterns that may indicate an attack, while also avoiding false positives [83].
To address this problem, we present an alternative technique to detect the intrusions in the IoT. In this experiment, RSRFT was used as a feature selection technique to enhance the process of selecting the important features of the collected data in the IoT environment. This can be achieved through by the Boolean version of RSRFT by converting the real value of each solution into a binary value.
The proposed RSRFT starts by generating the value of the initial population. This can be defined as
X = L B + r a n d × ( U B L B )
where U B and L B are the upper and lower boundaries, respectively. In this experiment, the values of U B = 1 and L B = 0 , while r a n d [ 0 , 1 ] . This step is followed by obtaining the binary of X i using the following formula:
B X i = 1 i f X i > 0.5 0 o t h e r w i s e
The next process is to assess the quality of the selected features, which correspond to the ones in X i , using the following formula.
F i t i = η × γ i + ( 1 η ) × ( | B X i | D )
where γ i denotes the classification error of the KNN classifier, whereas the term ( | B X i | D ) refers to the ratio of features selected using X i . The value of η [ 0 , 1 ] is applied as the weight of the two terms of Equation (34).
Thereafter, according to the fitness values, we determined the best of them and their corresponding solution X b . Then, we used this solution and the operators of RSRFT that are discussed in Section 3.2 and Section 3.3 to update X. The next step after reaching the stop conditions is to compute the efficiency of X b using the testing set of IoT data.
In the following sections, we introduce the datasets used in this experiment to assess RSRFT as an FS method. The comparison was conducted with moth–flame optimization (MFO) [60], the bat (BAT) algorithm [84], transient search optimization (TSO) [83], and the RSA. The parameter of each approach was assigned based on the original implementation.

4.2.1. Dataset Description

The proposed algorithm was assessed using the KDDCup-99, NSL-KDD, BoT-IoT, and CICIDS-2017 datasets. The KDD-99 dataset, created by the Defense Advanced Research Project Agency (DARPA) in 1988, contains network traffic data. Another kind of dataset, called NSL-KDD, was also used, which is a derived dataset with no duplicate network traffic records and grouped into four types: Probe, U2R, R2L, and DoS, in addition to normal data. The CICIDS-2017 dataset [85] was obtained from 25 clients at the Canadian Institute for Cybersecurity (CIC) using the CICFlowMeter tool to simulate realistic network traffic obtained using protocols such as HTTP, SSH, HTTPS, FTP, and email. Additionally, the Bot-IoT dataset [86] includes 3.5 million records produced from different IoT devices and features botnet attacks.The description of all of these datasets is given in Table 7.

4.2.2. Evaluation Criteria and Experimental Setup

In this study, various performance and evaluation criteria were applied to evaluate the effectiveness of RSRFT, including the average accuracy ( A V A c c ) , the average recall ( A V S e n s ) , and the average precision ( A V P r e c ) :
  • A V A c c : This stands for the rate of the correct detection of intrusions in the IoT environment. A V A c c can be formulated as
    A V A c c = 1 N r k = 1 N r A c c B e s t k , A c c B e s t = T P + T N T P + F N + F P + T N
    where N r = 25 is the total number of runs. FN, TN, TP, and FP refer to false negative, true negative, true positive, and false positive, respectively.
  • A V S e n s : This can also be referred to as the true positive rate, and it describes the percentage of correctly predicted positive intrusions. A V S e n s is computed as
    A V S e n s = 1 N r k = 1 N r S e n s B e s t k , S e n s B e s t = T P T P + F N
  • A V P r e c : This describes the ratio of true detections among all correct detection samples, and it is formulated as
    A V P r e c = 1 N r k = 1 N r P r e c B e s t k , P r e c B e s t = T P F P + T P

4.2.3. Results and Discussion

The performance of the enhanced RSA based on TMO and RFO as the feature selection technique to improve the detection of IDSs in the IoT environment is discussed in this section. Table 8 shows the average results of the developed RSRFT to improve the detection of IDSs in the IoT environment using the training and testing sets. From these results, it can be noticed that RSRFT had a high ability to improve the detection of the IDSs in terms of accuracy. In addition, it can be observed that the behavior of RFO alone was the worst one among the tested algorithms using the training and testing sets. According to the results of the precision, recall, and F1-measure, it can be noticed that the developed algorithm was the first-ranked algorithm. This indicated that the ability of the developed RSRFT was better than exploring and exploiting the search space.
Figure 8 and Figure 9 show the average accuracy, precision, F1-measure, and recall using the training and testing sets, respectively. From these figures, we can see that the average of each measure (i.e., accuracy, precision, F1-measure, and recall) of RSRFT was better than that of the other methods using the training and testing sets. This was followed by the RSA, which provided better results than the other methods.
Moreover, we used the Friedman test as a non-parametric test to assess if there was a significant difference between the developed RSRFT and the others. Table 9 shows the mean rank obtained using each approach over the training and testing sets and among the performance measures. From these results, it can be noticed that the developed RSRFT had the highest mean rank, and the difference between it and the others was significant since the p-value was less than 0.05, except for the precision value using the training set.
From the previous results of the two experimental series, it can be observed that the developed RSRFT had high efficiency to determine the solution of different engineering problems, whereas we noticed the high ability of RSRFT to enhance the process of improving the detection of IDSs in the IoT environment by reducing the number of selected features. This resulted from boosting the operators of the RSA, RFO, and TMO to improve the rate of convergence towards the optimal solution. However, there are some limitations in RSRFT, for example the initial population can influence the performance of the developed method. In addition, the diversity of the solutions needs more improvement.

5. Conclusions

In this paper, the use of an enhanced version of the reptile search algorithm (RSA) to solve engineering problems was shown to be a highly effective approach. By combining the strengths of the RSA with those of the red fox algorithm (RFO) and triangular mutation operator (TMO), this modification was able to effectively explore a wider range of possible solutions and find improved solutions more quickly. The results of this study demonstrated the effectiveness of the developed approach, named RSRFT, in solving a variety of engineering problems and showed that this algorithm can provide reliable and accurate solutions in a variety of contexts. Overall, the use of RSRFT represents a promising advancement in the field of engineering and has the potential to greatly improve the design and optimization of various systems and technologies. In the second experiment series, we evaluated RSRFT as a feature selection method to improve the classification of intrusion detection systems (IDSs) in the IoT and cloud environments. Four IDS datasets were utilized to test the performance of RSRFT, namely, KDD99, NSL-KDD, BIoT, and CIC2017. The results also confirmed the superiority of RSRFT.
In future works, the presented RSRFT can be extended to other areas, including task scheduling in cloud and fog environments, medical applications, agriculture, and others. Additionally, it may be tested on multi-objective optimization problems and solar cell parameter estimation.

Author Contributions

All authors contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Funding

This research project was funded by the Deanship of Scientific Research, Princess Nourah bint Abdulrahman University, through the Program of Research Project Funding After Publication, grant No. (43- PRFA-P-24).

Data Availability Statement

All of the datasets are public, as we described in the main texts.

Acknowledgments

This research project was funded by the Deanship of Scientific Research, Princess Nourah bint Abdulrahman University, through the Program of Research Project Funding After Publication, grant No (43- PRFA-P-24).

Conflicts of Interest

The authors declare no conflict of interest.

Nomenclature

Acronyms
IDSIntrusion detection system
IoTInternet of Things
MHMetaheuristic
RFORed fox algorithm
RSAReptile search algorithm
TMOTriangular mutation operator
Variables
X ¯ c Combination vector triangle
η i j Hunting operator
B e s t j Best solution
M( x i )Mean value of X
NNumber of solutions
tIteration
XPopulation
x ( r 1 , j ) Value of randomly selected solution

References

  1. Sarkar, A.; Guchhait, R.; Sarkar, B. Application of the artificial neural network with multithreading within an inventory model under uncertainty and inflation. Int. J. Fuzzy Syst. 2022, 24, 2318–2332. [Google Scholar]
  2. Sarkar, B.; Takeyeva, D.; Guchhait, R.; Sarkar, M. Optimized radio-frequency identification system for different warehouse shapes. Knowl.-Based Syst. 2022, 258, 109811. [Google Scholar]
  3. Houssein, E.H.; Çelik, E.; Mahdy, M.A.; Ghoniem, R.M. Self-adaptive Equilibrium Optimizer for solving global, combinatorial, engineering, and Multi-Objective problems. Expert Syst. Appl. 2022, 195, 116552. [Google Scholar]
  4. Abualigah, L.; Ewees, A.A.; Al-qaness, M.A.; Elaziz, M.A.; Yousri, D.; Ibrahim, R.A.; Altalhi, M. Boosting arithmetic optimization algorithm by sine cosine algorithm and levy flight distribution for solving engineering optimization problems. Neural Comput. Appl. 2022, 34, 8823–8852. [Google Scholar]
  5. Al-Qaness, M.A.; Helmi, A.M.; Dahou, A.; Elaziz, M.A. The applications of metaheuristics for human activity recognition and fall detection using wearable sensors: A comprehensive analysis. Biosensors 2022, 12, 821. [Google Scholar] [PubMed]
  6. Al-Qaness, M.A.; Ewees, A.A.; Abualigah, L.; AlRassas, A.M.; Thanh, H.V.; Abd Elaziz, M. Evaluating the Applications of Dendritic Neuron Model with Metaheuristic Optimization Algorithms for Crude-Oil-Production Forecasting. Entropy 2022, 24, 1674. [Google Scholar] [PubMed]
  7. Whitley, D. A genetic algorithm tutorial. Stat. Comput. 1994, 4, 65–85. [Google Scholar]
  8. Dorigo, M.; Di Caro, G. Ant colony optimization: A new meta-heuristic. In Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406), Washington, DC, USA, 6–9 July 1999; Volume 2, pp. 1470–1477. [Google Scholar]
  9. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95-International Conference on Neural Networks, Perth, WA, Australia, 27 November–1 December 1995; Volume 4, pp. 1942–1948. [Google Scholar]
  10. Yang, X.S.; Slowik, A. Firefly algorithm. In Swarm Intelligence Algorithms; CRC Press: Boca Raton, FL, USA, 2020; pp. 163–174. [Google Scholar]
  11. Mirjalili, S. SCA: A sine cosine algorithm for solving optimization problems. Knowl.-Based Syst. 2016, 96, 120–133. [Google Scholar]
  12. Mirjalili, S.; Mirjalili, S.M.; Hatamlou, A. Multi-verse optimizer: A nature-inspired algorithm for global optimization. Neural Comput. Appl. 2016, 27, 495–513. [Google Scholar]
  13. Heidari, A.A.; Mirjalili, S.; Faris, H.; Aljarah, I.; Mafarja, M.; Chen, H. Harris hawks optimization: Algorithm and applications. Future Gener. Comput. Syst. 2019, 97, 849–872. [Google Scholar]
  14. Faramarzi, A.; Heidarinejad, M.; Mirjalili, S.; Gandomi, A.H. Marine Predators Algorithm: A nature-inspired metaheuristic. Expert Syst. Appl. 2020, 152, 113377. [Google Scholar]
  15. Abualigah, L.; Yousri, D.; Abd Elaziz, M.; Ewees, A.A.; Al-Qaness, M.A.; Gandomi, A.H. Aquila optimizer: A novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 2021, 157, 107250. [Google Scholar]
  16. Abualigah, L.; Diabat, A.; Mirjalili, S.; Abd Elaziz, M.; Gandomi, A.H. The arithmetic optimization algorithm. Comput. Methods Appl. Mech. Eng. 2021, 376, 113609. [Google Scholar]
  17. Abualigah, L.; Abd Elaziz, M.; Sumari, P.; Geem, Z.W.; Gandomi, A.H. Reptile Search Algorithm (RSA): A nature-inspired meta-heuristic optimizer. Expert Syst. Appl. 2022, 191, 116158. [Google Scholar]
  18. Bo, Q.; Cheng, W.; Khishe, M. Evolving chimp optimization algorithm by weighted opposition-based technique and greedy search for multimodal engineering problems. Appl. Soft Comput. 2023, 132, 109869. [Google Scholar]
  19. Shen, Y.; Zhang, C.; Gharehchopogh, F.S.; Mirjalili, S. An Improved Whale Optimization Algorithm based on Multi-Population Evolution for Global Optimization and Engineering Design problems. Expert Syst. Appl. 2023, 215, 119269. [Google Scholar]
  20. Yang, X.; Wang, R.; Zhao, D.; Yu, F.; Huang, C.; Heidari, A.A.; Cai, Z.; Bourouis, S.; Algarni, A.D.; Chen, H. An adaptive quadratic interpolation and rounding mechanism sine cosine algorithm with application to constrained engineering optimization problems. Expert Syst. Appl. 2023, 213, 119041. [Google Scholar]
  21. Hong, J.; Shen, B.; Xue, J.; Pan, A. A vector-encirclement-model-based sparrow search algorithm for engineering optimization and numerical optimization problems. Appl. Soft Comput. 2022, 131, 109777. [Google Scholar]
  22. Zhao, X.; Fang, Y.; Ma, S.; Liu, Z. Multi-swarm improved moth–flame optimization algorithm with chaotic grouping and Gaussian mutation for solving engineering optimization problems. Expert Syst. Appl. 2022, 204, 117562. [Google Scholar]
  23. Peng, H.; Xiao, W.; Han, Y.; Jiang, A.; Xu, Z.; Li, M.; Wu, Z. Multi-strategy firefly algorithm with selective ensemble for complex engineering optimization problems. Appl. Soft Comput. 2022, 120, 108634. [Google Scholar]
  24. Zhang, Y.J.; Wang, Y.F.; Yan, Y.X.; Zhao, J.; Gao, Z.M. LMRAOA: An improved arithmetic optimization algorithm with multi-leader and high-speed jumping based on opposition-based learning solving engineering and numerical problems. Alex. Eng. J. 2022, 61, 12367–12403. [Google Scholar]
  25. Al-qaness, M.A.; Ewees, A.A.; Elaziz, M.A.; Samak, A.H. Wind Power Forecasting Using Optimized Dendritic Neural Model Based on Seagull Optimization Algorithm and Aquila Optimizer. Energies 2022, 15, 9261. [Google Scholar]
  26. Al-qaness, M.A.; Ewees, A.A.; Thanh, H.V.; AlRassas, A.M.; Dahou, A.; Elaziz, M.A. Predicting CO2 trapping in deep saline aquifers using optimized long short-term memory. Environ. Sci. Pollut. Res. 2022, 1–15. [Google Scholar] [CrossRef]
  27. Al-qaness, M.A.; Ewees, A.A.; Thanh, H.V.; AlRassas, A.M.; Abd Elaziz, M. An optimized neuro-fuzzy system using advance nature-inspired Aquila and Salp swarm algorithms for smart predictive residual and solubility carbon trapping efficiency in underground storage formations. J. Energy Storage 2022, 56, 106150. [Google Scholar]
  28. Lin, Y.; Bian, X.Y.; Dong, Z.R. A discrete hybrid algorithm based on Differential Evolution and Cuckoo Search for optimizing the layout of ship pipe route. Ocean. Eng. 2022, 261, 112164. [Google Scholar]
  29. Zhong, X.; You, Z.; Cheng, P. A hybrid optimization algorithm and its application in flight trajectory prediction. Expert Syst. Appl. 2023, 213, 119082. [Google Scholar]
  30. Balyan, A.K.; Ahuja, S.; Lilhore, U.K.; Sharma, S.K.; Manoharan, P.; Algarni, A.D.; Elmannai, H.; Raahemifar, K. A hybrid intrusion detection model using ega-pso and improved random forest method. Sensors 2022, 22, 5986. [Google Scholar] [PubMed]
  31. Bu, S.J.; Kang, H.B.; Cho, S.B. Ensemble of Deep Convolutional Learning Classifier System Based on Genetic Algorithm for Database Intrusion Detection. Electronics 2022, 11, 745. [Google Scholar]
  32. Fatani, A.; Dahou, A.; Al-Qaness, M.A.; Lu, S.; Abd Elaziz, M. Advanced feature extraction and selection approach using deep learning and Aquila optimizer for IoT intrusion detection system. Sensors 2022, 22, 140. [Google Scholar]
  33. Mansour, R.F. Blockchain assisted clustering with Intrusion Detection System for Industrial Internet of Things environment. Expert Syst. Appl. 2022, 207, 117995. [Google Scholar]
  34. Dahou, A.; Abd Elaziz, M.; Chelloug, S.A.; Awadallah, M.A.; Al-Betar, M.A.; Al-qaness, M.A.; Forestiero, A. Intrusion Detection System for IoT Based on Deep Learning and Modified Reptile Search Algorithm. Comput. Intell. Neurosci. 2022, 2022, 6473507. [Google Scholar]
  35. Elgamal, Z.; Sabri, A.Q.M.; Tubishat, M.; Tbaishat, D.; Makhadmeh, S.N.; Alomari, O.A. Improved Reptile Search Optimization Algorithm using Chaotic map and Simulated Annealing for Feature Selection in Medical Filed. IEEE Access 2022, 10, 51428–51446. [Google Scholar] [CrossRef]
  36. Chauhan, S.; Vashishtha, G.; Kumar, A. Approximating parameters of photovoltaic models using an amended reptile search algorithm. J. Ambient. Intell. Humaniz. Comput. 2022, 1–16. [Google Scholar] [CrossRef]
  37. Połap, D.; Woźniak, M. Red fox optimization algorithm. Expert Syst. Appl. 2021, 166, 114107. [Google Scholar]
  38. Khorami, E.; Mahdi Babaei, F.; Azadeh, A. Optimal diagnosis of COVID-19 based on convolutional neural network and red Fox optimization algorithm. Comput. Intell. Neurosci. 2021, 2021, 4454507. [Google Scholar] [PubMed]
  39. Natarajan, R.; Megharaj, G.; Marchewka, A.; Divakarachari, P.B.; Hans, M.R. Energy and Distance Based Multi-Objective Red Fox Optimization Algorithm in Wireless Sensor Network. Sensors 2022, 22, 3761. [Google Scholar]
  40. Zaborski, M.; Woźniak, M.; Mańdziuk, J. Multidimensional Red Fox meta-heuristic for complex optimization. Appl. Soft Comput. 2022, 131, 109774. [Google Scholar]
  41. Mirjalili, S.; Lewis, A. The whale optimization algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar]
  42. Krohling, R.A.; dos Santos Coelho, L. Coevolutionary particle swarm optimization using Gaussian distribution for solving constrained optimization problems. IEEE Trans. Syst. Man Cybern. Part B (Cybern.) 2006, 36, 1407–1416. [Google Scholar]
  43. Awad, N.H.; Ali, M.Z.; Suganthan, P.N. Ensemble sinusoidal differential covariance matrix adaptation with Euclidean neighborhood for solving CEC2017 benchmark problems. In Proceedings of the 2017 IEEE Congress on Evolutionary Computation (CEC), San Sebastián, Spain, 5–8 June 2017; pp. 372–379. [Google Scholar]
  44. Huang, F.z.; Wang, L.; He, Q. An effective co-evolutionary differential evolution for constrained optimization. Appl. Math. Comput. 2007, 186, 340–356. [Google Scholar]
  45. Ragsdell, K.; Phillips, D. Optimal design of a class of welded structures using geometric programming. J. Manuf. Sci. Eng. 1976, 38, 1021–1025. [Google Scholar]
  46. Rashedi, E.; Nezamabadi-Pour, H.; Saryazdi, S. GSA: A gravitational search algorithm. Inf. Sci. 2009, 179, 2232–2248. [Google Scholar]
  47. Deb, K. Optimal design of a welded beam via genetic algorithms. AIAA J. 1991, 29, 2013–2015. [Google Scholar]
  48. Lee, K.S.; Geem, Z.W. A new meta-heuristic algorithm for continuous engineering optimization: Harmony search theory and practice. Comput. Methods Appl. Mech. Eng. 2005, 194, 3902–3933. [Google Scholar]
  49. Mohamed, A.W.; Hadi, A.A.; Fattouh, A.M.; Jambi, K.M. LSHADE with semi-parameter adaptation hybrid with CMA-ES for solving CEC 2017 benchmark problems. In Proceedings of the 2017 IEEE Congress on Evolutionary Computation (CEC), San Sebastián, Spain, 5–8 June 2017; pp. 145–152. [Google Scholar]
  50. Ewees, A.A.; Abd Elaziz, M.; Houssein, E.H. Improved grasshopper optimization algorithm using opposition-based learning. Expert Syst. Appl. 2018, 112, 156–172. [Google Scholar]
  51. Kaveh, A.; Khayatazad, M. A new meta-heuristic method: Ray optimization. Comput. Struct. 2012, 112, 283–294. [Google Scholar]
  52. Coello, C.A.C. Use of a self-adaptive penalty approach for engineering optimization problems. Comput. Ind. 2000, 41, 113–127. [Google Scholar]
  53. Mezura-Montes, E.; Coello, C.A.C. An empirical study about the usefulness of evolution strategies to solve constrained optimization problems. Int. J. Gen. Syst. 2008, 37, 443–473. [Google Scholar]
  54. Ray, T.; Saini, P. Engineering design optimization using a swarm with an intelligent information sharing among individuals. Eng. Optim. 2001, 33, 735–748. [Google Scholar]
  55. Belegundu, A.D.; Arora, J.S. A study of mathematical programmingmethods for structural optimization. Part II: Numerical results. Int. J. Numer. Methods Eng. 1985, 21, 1601–1623. [Google Scholar]
  56. He, Q.; Wang, L. A hybrid particle swarm optimization with a feasibility-based rule for constrained optimization. Appl. Math. Comput. 2007, 186, 1407–1422. [Google Scholar] [CrossRef]
  57. Kaveh, A.; Talatahari, S. An improved ant colony optimization for constrained engineering design problems. Eng. Comput. 2010, 27, 155–182. [Google Scholar] [CrossRef]
  58. Liu, H.; Cai, Z.; Wang, Y. Hybridizing particle swarm optimization with differential evolution for constrained numerical and engineering optimization. Appl. Soft Comput. 2010, 10, 629–640. [Google Scholar] [CrossRef]
  59. Ray, T.; Liew, K.M. Society and civilization: An optimization algorithm based on the simulation of social behavior. IEEE Trans. Evol. Comput. 2003, 7, 386–396. [Google Scholar] [CrossRef]
  60. Mirjalili, S. Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowl.-Based Syst. 2015, 89, 228–249. [Google Scholar] [CrossRef]
  61. Zhang, M.; Luo, W.; Wang, X. Differential evolution with dynamic stochastic selection for constrained optimization. Inf. Sci. 2008, 178, 3043–3074. [Google Scholar] [CrossRef]
  62. Mirjalili, S.; Gandomi, A.H.; Mirjalili, S.Z.; Saremi, S.; Faris, H.; Mirjalili, S.M. Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar] [CrossRef]
  63. Sadollah, A.; Bahreininejad, A.; Eskandar, H.; Hamdi, M. Mine blast algorithm: A new population based algorithm for solving constrained engineering optimization problems. Appl. Soft Comput. 2013, 13, 2592–2612. [Google Scholar] [CrossRef]
  64. Gandomi, A.H.; Yang, X.S.; Alavi, A.H. Cuckoo search algorithm: A metaheuristic approach to solve structural optimization problems. Eng. Comput. 2013, 29, 17–35. [Google Scholar] [CrossRef]
  65. YILDIRIM, A.E.; KARCI, A. Application of Three Bar Truss Problem among Engineering Design Optimization Problems using Artificial Atom Algorithm. In Proceedings of the 2018 International Conference on Artificial Intelligence and Data Processing (IDAP), Malatya, Turkey, 28–30 September 2018; pp. 1–5. [Google Scholar]
  66. Saremi, S.; Mirjalili, S.; Lewis, A. Grasshopper optimisation algorithm: Theory and application. Adv. Eng. Softw. 2017, 105, 30–47. [Google Scholar] [CrossRef] [Green Version]
  67. Siddall, J.N. Analytical Decision-Making in Engineering Design; Prentice Hall: Upper Saddle River, NJ, USA, 1972. [Google Scholar]
  68. Akhtar, S.; Tai, K.; Ray, T. A socio-behavioral simulation model for engineering design optimization. Eng. Optim. 2002, 34, 341–354. [Google Scholar] [CrossRef]
  69. SARUHAN, H.; UYGUR, İ. Design optimization of mechanical systems using genetic algorithms. Sak. Üniv. Fen Bilim. Enst. Derg. 2003, 7, 77–84. [Google Scholar]
  70. Geem, Z.W.; Kim, J.H.; Loganathan, G.V. A new heuristic optimization algorithm: Harmony search. Simulation 2001, 76, 60–68. [Google Scholar] [CrossRef]
  71. Mezura-Montes, E.; Coello, C.C.; Landa-Becerra, R. Engineering optimization using simple evolutionary algorithm. In Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence, Sacramento, CA, USA, 5 November 2003; pp. 149–156. [Google Scholar]
  72. Lu, S.; Kim, H.M. A regularized inexact penalty decomposition algorithm for multidisciplinary design optimization problems with complementarity constraints. J. Mech. Des. 2010, 132, 410051–4100512. [Google Scholar] [CrossRef] [Green Version]
  73. Stephen, S.; Christu, D.; David, D.C.N. Design Optimization of Weight of Speed Reducer Problem Through Matlab and Simulation Using Ansys. Int. J. Mech. Eng. Technol. 2018, 9, 339–349. [Google Scholar]
  74. Baykasoğlu, A.; Ozsoydan, F.B. Adaptive firefly algorithm with chaos for mechanical design optimization problems. Appl. Soft Comput. 2015, 36, 152–164. [Google Scholar] [CrossRef]
  75. Kamboj, V.K.; Nandi, A.; Bhadoria, A.; Sehgal, S. An intensify Harris Hawks optimizer for numerical and engineering optimization problems. Appl. Soft Comput. 2020, 89, 106018. [Google Scholar] [CrossRef]
  76. Rao, R.V.; Savsani, V.J.; Vakharia, D. Teaching–learning-based optimization: A novel method for constrained mechanical design optimization problems. Comput.-Aided Des. 2011, 43, 303–315. [Google Scholar] [CrossRef]
  77. Deb, K.; Srinivasan, A. Innovization: Discovery of innovative design principles through multiobjective evolutionary optimization. In Multiobjective Problem Solving from Nature; Springer: Berlin/Heidelberg, Germany, 2008; pp. 243–262. [Google Scholar]
  78. Eskandar, H.; Sadollah, A.; Bahreininejad, A.; Hamdi, M. Water cycle algorithm—A novel metaheuristic optimization method for solving constrained engineering optimization problems. Comput. Struct. 2012, 110, 151–166. [Google Scholar] [CrossRef]
  79. Sayed, G.I.; Darwish, A.; Hassanien, A.E. A new chaotic multi-verse optimization algorithm for solving engineering optimization problems. J. Exp. Theor. Artif. Intell. 2018, 30, 293–317. [Google Scholar] [CrossRef]
  80. Bhesdadiya, R.; Trivedi, I.N.; Jangir, P.; Jangir, N. Moth-flame optimizer method for solving constrained engineering optimization problems. In Advances in Computer and Computational Sciences; Springer: Berlin/Heidelberg, Germany, 2018; pp. 61–68. [Google Scholar]
  81. Zarpelão, B.B.; Miani, R.S.; Kawakani, C.T.; de Alvarenga, S.C. A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 2017, 84, 25–37. [Google Scholar] [CrossRef]
  82. Abomhara, M.; Køien, G.M. Security and privacy in the Internet of Things: Current status and open issues. In Proceedings of the 2014 international conference on privacy and security in mobile systems (PRISMS), Aalborg, Denmark, 11–14 May 2014; pp. 1–8. [Google Scholar]
  83. Fatani, A.; Abd Elaziz, M.; Dahou, A.; Al-Qaness, M.A.; Lu, S. IoT intrusion detection system using deep learning and enhanced transient search optimization. IEEE Access 2021, 9, 123448–123464. [Google Scholar] [CrossRef]
  84. Yang, X.S. A new metaheuristic bat-inspired algorithm. In Nature Inspired Cooperative Strategies for Optimization (NICSO 2010); Springer: Berlin/Heidelberg, Germany, 2010; pp. 65–74. [Google Scholar]
  85. Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Gener. Comput. Syst. 2019, 100, 779–796. [Google Scholar] [CrossRef] [Green Version]
  86. Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 2018, 1, 108–116. [Google Scholar]
Figure 1. Developed RSRFT approach.
Figure 1. Developed RSRFT approach.
Applsci 13 03206 g001
Figure 2. Structure of the WBD problem.
Figure 2. Structure of the WBD problem.
Applsci 13 03206 g002
Figure 3. Design of the TCSD problem.
Figure 3. Design of the TCSD problem.
Applsci 13 03206 g003
Figure 4. Schematic of the PVD problem.
Figure 4. Schematic of the PVD problem.
Applsci 13 03206 g004
Figure 5. The three-bar truss design problem.
Figure 5. The three-bar truss design problem.
Applsci 13 03206 g005
Figure 6. The speed reducer problem.
Figure 6. The speed reducer problem.
Applsci 13 03206 g006
Figure 7. The multiple disc clutch brake problem.
Figure 7. The multiple disc clutch brake problem.
Applsci 13 03206 g007
Figure 8. Performance measures of RSRFT using the training set.
Figure 8. Performance measures of RSRFT using the training set.
Applsci 13 03206 g008
Figure 9. Performance measures of RSRFT using the testing set.
Figure 9. Performance measures of RSRFT using the testing set.
Applsci 13 03206 g009
Table 1. The value of the estimated parameters using RSRFT and other methods for solving the WBD problem.
Table 1. The value of the estimated parameters using RSRFT and other methods for solving the WBD problem.
AlgorithmHLtbOptimal Objective
RSRFT0.205723.47049.03700.20571.72489
RFO0.218463.510248.872540.224911.86612
LSHSPCM 0.2057 3.4705 9.0366 0.2057 1.7249
RSA0.144683.5148.92510.211621.6726
LSHcEpS 0.2038 3.5148 9.0486 0.2057 1.7294
OBLGOA [50] 0.205769 3.471135 9.032728 0.2059072 1.7257
RO [51] 0.203687 3.528467 9.004233 0.207241 1.735344
HS [48] 0.2442 6.2231 8.2915 0.2443 2.3807
DAVID [45] 0.2434 6.2552 8.2915 0.2444 2.3841
SIMPLEX [45] 0.2792 5.6256 7.7512 0.2796 2.5307
CPSO [42] 0.202369 3.544214 9.04821 0.205723 1.72802
MVO [12] 0.205463 3.473193 9.044502 0.205695 1.72645
GA [47] 0.205986 3.471328 9.020224 0.20648 1.728226
GSA [46] 0.182129 3.856979 10 0.202376 1.87995
CSCA [44] 0.203137 3.542998 9.033498 0.206179 1.733461
WOA [41] 0.205396 3.484293 9.037426 0.206276 1.730499
Table 2. The value of the estimated parameters using RSRFT and others to solve the TCSD problem.
Table 2. The value of the estimated parameters using RSRFT and others to solve the TCSD problem.
AlgorithmdDNOptimal Objective
RSRFT0.051471460.351505011.60131410.01266617
RFO0.0526670110.380668010.02139250.0126934
RSA [17]0.0578140.584784.01670.01176
LSHSPCM 0.0535 0.4010 9.0962 0.012721349
LSHcEpS 0.0517 0.3567 11.2876 0.01266523
OBLGOA [50] 0.0530178 0.38953229 9.6001616 0.01270136
Belegundu-Arora method [55] 0.0500 0.3177 14.026 0.012730
GA [52] 0.05148 0.351661 11.632201 0.01270478
WOA [41] 0.051207 0.345215 12.004032 0.0126763
CPSO [42] 0.051728 0.357644 11.244543 0.0126747
ES [53] 0.051643 0.35536 11.397926 0.012698
MVO [12] 0.05251 0.37602 10.33513 0.012790
GSA [41] 0.050276 0.323680 13.525410 0.0127022
Ray–Saini method [54] 0.321532 0.050417 13.979915 0.013060
Table 3. The value of the estimated parameters using RSRFT and other approaches to solve the PVD problem.
Table 3. The value of the estimated parameters using RSRFT and other approaches to solve the PVD problem.
Estimated Values for Parameters
Method Th Ts R L Optimal Objective
RSRFT0.816122570.40340994942.2861349174.3250785953.4364
RFO0.814250.4452142.20231176.621456113.3195
RSA0.84006930.418959443.38117161.55566034.7591
LSHSPCM 0.9808 0.5251 50.1435 99.5532 6654.8902747
OBLGOA [50] 0.81622 0.40350 42.291138 174.811191 5966.67160
PSO-DE [58] 0.8125 0.4375 42.098446 176.6366 6059.71433
HPSO [56] 0.8125 0.4375 42.0984 176.6366 6059.7143
ACO [57] 0.8125 0.4375 42.098353 176.637751 6059.7258
CDE [44] 0.8125 0.4375 42.098411 176.63769 6059.734
ES [53] 0.8125 0.4375 42.098087 176.640518 6059.7456
GA [52] 0.8125 0.4375 42.097398 176.65405 6059.94634
GSA [41] 1.125 0.625 55.9886598 84.4542025 8538.8359
Table 4. The value of the estimated parameters using RSRFT to solve the 3-bar truss design problem.
Table 4. The value of the estimated parameters using RSRFT to solve the 3-bar truss design problem.
AlgorithmEstimated Values for ParametersOptimal Weight
x 1 x 2
RSRFT0.788750520.4080351263.89584
RFO0.753560.55373268.51195
RSA [17]0.788730.40805263.8928
DEDS [61]0.788675130.40824828263.89584
SSA [62]0.788665410.408275784263.89584
MBA [63]0.78856500.4085597263.89585
PSO-DE [58]0.78867510.4082482263.89584
Ray and Saini [54]0.7950.395264.3
CS [64]0.788670.40902263.9716
AAA [65]0.78873540.408078263.895880
GOA [66]0.788897555570.40761957011263.89588149
Table 5. The value of the estimated parameters using RSRFT to solve the speed reducer design problem.
Table 5. The value of the estimated parameters using RSRFT to solve the speed reducer design problem.
MethodEstimated Values for ParametersOptimal Weight
x 1 x 2 x 3 x 4 x 5 x 6 x 7
RSRFT3.50000550.7177.3058888.0046893.35023535.28680603000.97899
RFO3.5000010.717.000027.3144978.02947183.3502535.28676623001.5811
RSA [17]3.502790.7177.308127.747153.350675.286752996.5157
GA [69]3.5102530.7178.357.83.3622015.2877233067.561
GSA [46]3.6000000.7178.37.83.3696585.2892243051.120
HS [70]3.5201240.7178.377.83.3669705.2887193029.002
SES [71]3.5061630.700831177.4601817.9621433.3629005.3089493025.005127
MDA [72]3.50.7177.37.6703963.5424215.2458143019.583365
SBSM [68]3.5061220.700006177.5491267.8593303.3655765.2897733008.08
SCA [11]3.5087550.7177.37.83.4610205.2892133030.563
CS [64]3.50150.7000177.60507.81813.35205.28753000.9810
PSO [73]3.50010.700017.00027.51777.78323.35085.28673145.922
FA [74]3.5074950.7001177.7196748.0808543.3515125.2870513010.137492
hHHO-SCA [75]3.5061190.7177.37.991413.4525695.2867493029.873076
Table 6. The value of the estimated parameters using RSRFT to solve the multiple disc clutch brake problem.
Table 6. The value of the estimated parameters using RSRFT to solve the multiple disc clutch brake problem.
MethodEstimated Values for ParametersOptimal
Weight
x 1 x 2 x 3 x 4 x 5
RSRFT69.00390889.0039141789.523302.9658880.307109
RFO7293762210.25359
RSA [17]70.034790.03491.0000801.72852.97400.31176
TLBO [76]7090181030.313656611
NSGA-II [77]70901.5100030.470400
WCA [78]7090191030.313656
MVO [79]7090191030.313656
CMVO [79]7090191030.313656
MFO [80]7090191030.313656
Table 7. Description of the datasets.
Table 7. Description of the datasets.
Target ClassKDDCup-99NSL-KDDTarget ClassBot-IoTTarget ClassCICIDS-2017
TrainTestTrainTestTrainTestTrainTest
Normal97,27860,59367,3439710Normal370107Benign727,397163,572
DoS391,458229,85345,9277458DoS1,320,148385,309DDoS112,90125,388
Probe4107416611,6562422DDoS1,541,315330,112FTP-Patator
SSH-Patator
6997
5201
1574
1169
R2L112616,1899952887Reconnaissance72,91918,163PortScan
Brute Force
140,043
1329
31,492
299
U2R522285267Theft6514SQL Injection
XSS
19
575
4
129
Table 8. Results of RSRFT for improving the detection of IDSs in the IoT environment.
Table 8. Results of RSRFT for improving the detection of IDSs in the IoT environment.
TrainTest
AccuracyPrecisionF1-MeasureRecallAccuracyPrecisionF1-MeasureRecall
KDD99RSRFT99.94699.48399.94399.92393.61592.64990.38093.495
RFO92.27592.41497.30493.12684.37582.50187.35185.225
BAT98.00794.84797.33798.24790.34789.13490.09390.587
TSO95.43991.02797.43794.91987.53680.79187.47987.016
MFO96.07397.63198.37197.12388.17587.76388.42089.225
RSA99.91099.90999.90699.91092.04089.68489.98592.040
NSL-KDDRSRFT99.38299.54599.54899.30176.40782.37172.73177.107
RFO91.94792.08096.96892.79767.95171.13168.90768.801
BAT97.66994.50196.98997.90973.67173.50168.90573.911
TSO95.07890.65797.06794.55871.33071.29869.69770.810
MFO95.74597.29798.03596.79571.62676.12269.84472.676
RSA99.20199.15899.14899.20176.10782.17171.73176.107
BIoTRSRFT99.56899.56899.56899.56899.51299.42099.08099.064
RFO99.47299.47299.47299.47298.95698.95799.00598.964
BAT99.47599.47599.47499.47599.01998.98799.01299.021
TSO99.46099.45999.45999.46098.98698.94199.00598.981
MFO99.48099.48099.48099.48098.99899.01399.02099.009
RSA98.82998.82998.82998.82999.02099.09899.07099.038
CIC2017RSRFT99.94199.92099.91899.93199.93199.94799.98399.931
RFO99.69099.49099.45099.69099.43099.24099.19099.430
BAT99.49099.63099.44099.64099.23099.36099.18099.380
TSO99.68099.75099.68099.71099.42099.48099.42099.450
MFO99.36099.37099.48099.43099.10099.12099.22099.170
RSA99.91199.91099.88999.91199.91199.90799.88899.911
Table 9. The mean rank using the Friedman test.
Table 9. The mean rank using the Friedman test.
p-ValueRSRFTRFOBATTSOMFORSA
TrainingAccuracy0.04662.253.52.2534
Precision0.05435.752.253.2523.54.25
F1-Measure0.020861.752.25344
Recall0.0435623.52.534
TestingAccuracy0.006461.753.52.252.55
Precision0.006461.753.25235
F1-Measure0.010161.6252.52.6253.54.75
Recall0.005461.53.52.52.55
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Abd Elaziz, M.; Chelloug, S.; Alduailij, M.; Al-qaness, M.A.A. Boosted Reptile Search Algorithm for Engineering and Optimization Problems. Appl. Sci. 2023, 13, 3206. https://doi.org/10.3390/app13053206

AMA Style

Abd Elaziz M, Chelloug S, Alduailij M, Al-qaness MAA. Boosted Reptile Search Algorithm for Engineering and Optimization Problems. Applied Sciences. 2023; 13(5):3206. https://doi.org/10.3390/app13053206

Chicago/Turabian Style

Abd Elaziz, Mohamed, Samia Chelloug, Mai Alduailij, and Mohammed A. A. Al-qaness. 2023. "Boosted Reptile Search Algorithm for Engineering and Optimization Problems" Applied Sciences 13, no. 5: 3206. https://doi.org/10.3390/app13053206

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop