Next Article in Journal
Mathematical Modeling of Electrical Conductivity of Anisotropic Nanocomposite with Periodic Structure
Previous Article in Journal
Modeling the Context of the Problem Domain of Time Series with Type-2 Fuzzy Sets
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Enhanced Naked Mole Rat Algorithm for Optimal Cross-Layer Solution for Wireless Underground Sensor Networks

1
Department of Computer Science and Engineering, Guru Jambheshwar University of Science & Technology, Hisar 125001, India
2
Department of Computer Science and Engineering, Maharshi Dayanand University, Rohtak 124001, India
3
Department of Computer Science, College of Arts and Science, Prince Sattam Bin Abdul University, Wadi Ad-Dawasir 11991, Saudi Arabia
4
Department of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(22), 2942; https://doi.org/10.3390/math9222942
Submission received: 1 October 2021 / Revised: 6 November 2021 / Accepted: 15 November 2021 / Published: 18 November 2021

Abstract

:
Nature-inspired algorithms serve as the backbone of modern computing technology, and over the past three decades, the field has grown enormously. Many applications were solved by such algorithms and are replacing the traditional classical optimization processes. A recent naked mole-rat algorithm (NMRA) was proposed based on the mating patterns of naked mole-rats. This algorithm proved its worth in terms of competitiveness and application to various domains of research. The aim was to propose an algorithm based on NMRA, named enhanced NMRA (ENMRA), by mitigating the problems that this algorithm suffers from: slow convergence, poor exploration, and local optima stagnation. To enhance the exploration capabilities of basic NMRA, grey wolf optimization (GWO)-based search equations were employed. Exploitation was improved using population division methods based on local neighborhood search (LNS) and differential evolution (DE) equations. To avoid the local stagnation problem, a neighborhood search strategy around the best individual was utilized. Such improvements help the new variant to solve highly challenging optimization problems in contrast to existing algorithms. The efficacy of ENMRA was evaluated using CEC 2019 benchmark test suite. The results were statistically analyzed by the Wilcoxon rank-sum test and Friedman rank (f-rank) test. The resulting analysis proved that ENMRA is superior to the competitive algorithms for test functions CEC 2019 with overall effectiveness of 60.33%. Moreover, the real-world optimization problem from underground wireless sensor networks for an efficient cross-layer solution was also used to test the efficiency of ENMRA. The results of comparative study and statistical tests affirmed the efficient performance of the proposed algorithm.

1. Introduction

In the present world, there are numerous real-world applications of optimization. Currently, many scientific fields and industrial companies face many hurdles in finding an appropriate optimization tool or, more precisely, an optimization algorithm to solve real-world problems. The main reason to employ such algorithms is that the majority of the real-life applications may be expressed as potential domain optimization problems depending upon their nature and the number of objectives to be optimized. This can be estimated from the fact that these algorithms find application in almost every research domain, such as economics, engineering, mathematics, signal processing, weather forecasting, operation research, management, production planning, scheduling, routing problems, machine learning, and others. These optimization problems are highly complex and pose a challenge for researchers to solve them efficiently. In recent times, nature-inspired algorithms (NIAs) have dominated the various spheres of optimization research and are in use in almost every field [1].
NIAs are considered efficient solutions for solving various real-life issues. These algorithms include differential evolution (DE) [2], cuckoo search (CS) [3], flower pollination algorithm (FPA) [4], and others. These algorithms incorporate four major processes to simulate natural behavior: initialization, global search, local search, and selection. Although these algorithms demonstrate exceptional performance and competitiveness, many theoretical and experimental analyses proved that they are still dependent on the choice of tuning parameters [5,6]. Such parameters include scaling factor, switch probability, crossover/mutation rate, local/global search, population size, and standard randomization. Early investigation proved that these algorithms require a trial-and-error methodology to tune their parameters [6]. This method is tedious and hence is not efficient. Apart from that, these algorithms suffer from premature convergence, slow convergence, local optima stagnation, and more [5]. Such drawbacks make these algorithms vulnerable to poor solution generation, thus adding to less diversity and, hence, unable to find the desired solution.
An important factor is the local optima stagnation and slow convergence associated with the above algorithms. DE has a deficiency of premature convergence and stagnation. Also, DE sometimes stops proceeding toward the global optima, even though the population has not converged to local optima or any other point. It was found that FPA also suffers from the local optima stagnation problem and slow convergence [7,8], and hence, the requirement of a new enhanced version of such algorithms is needed. Overall, NIAs suffer from these problems, and there is a requirement to design new algorithms or improve the existing algorithms for prospective researchers. In this respect, a substantial effort was made to eradicate the issues above by introducing new enhanced versions of nature-inspired algorithms using new and novel strategies. These algorithms perform significantly better but have some inherent drawbacks. Many hybrid and improved versions of these procedures were also investigated to eradicate the flaws of basic algorithms.
The no free lunch (NFL) theorem [9] is an essential source of inspiration for investigators to propose novel algorithms that meet the problem objectives. According to the theory, no algorithm can be regarded as the single solution to all domain research tasks, and problem-based tweaks are always necessary for enhanced performance [9]. The fundamental reason for this adaptation is that each domain’s research challenge may have a variety of situations, such as complexity, dimension size, nature (constrained or unconstrained), and so on. The high peak in a problem and the local minimal solutions make it difficult for investigators to propose improved variants and deliver consistent outcomes.
A new algorithm was introduced by using the worker–breeder relationship of naked mole-rats (NMRs) [5]. This NMR algorithm (NMRA) aimed to provide an altogether new metaheuristic algorithm for prospective researchers to exploit and apply to their research domains. However, the NMRA has the disadvantage of poor exploration and was predicted to produce less consistent outcomes. The lack of randomness in the algorithm’s search equations is the primary cause of inadequate investigation. This work mainly focused on designing NMRA with improved exploration and exploitation. The authors aimed to achieve this by using randomly generated solutions inside the search space using grey wolf optimization (GWO) [10], instead of moving all the random solutions toward the best particles. For exploitation, it was required that the unexpected solutions follow the local group leader or simply the current best solution. So here, the general equation of both exploration and exploitation phases were enhanced to achieve better results.
This work dealt with the proposal to enhance the exploitation and exploration characteristics of a new algorithm, namely NMRA, to solve CEC 2019 benchmark problems and some real-world applications, such as an energy-throughput efficient, cross-layer solution for underground wireless sensor networks.
The major contributions of this work are summarized as follows:
  • To improve the exploration and exploitation tendency of NMRA, a new variant of NMRA was presented.
  • The exploration capability was enhanced with the implementation of GWO-inspired equations in basic NMRA.
  • The local neighborhood search along with DE equations were employed for enhanced exploitation characteristics of NMRA.
  • The performance of the proposed NMRA variant was evaluated using a set of CEC 2019 benchmark test functions and a real-time underground wireless sensor network problem.
The rest of the paper is structured as follows. Section 2 deals with the related work. The description of NMRA and enhanced NMRA (ENMRA) is presented in Section 3. The statistical testing of ENMRA is evaluated in Section 4. The framework of DECEN is given in Section 5 to attain optimal energy throughput as a cross-layer design and the system model for a cross-layer communication solution. Section 6 concludes the paper with possible future work.

2. Related Work

To find the best possible solutions, many real-world problems are formulated as optimization problems. Hence, many researchers work in tandem to introduce new effective methods and tools to resolve such domain-specific optimization tasks. The objective is to attain the optimal global solution for an objective function under a specific set of decision variables within a particular range. Without the loss of generality, these optimization problems are represented mathematically either as minimization of a maximization problem.
Due to various optimization problems and real-world applications in many related fields, different optimization algorithms were developed by researchers. Earlier classical methods were found to be effective [10,11,12,13,14]. These classical methods used differential mathematical calculus methods requiring two main features. The first feature was to differentiate the objective function of the optimization problem concerning X, and second, the derivative ought to be continuous. These requirements limited classical optimization techniques to a specific set of benchmark optimization problems and only a particular set of real-world applications. Apart from that, these algorithms easily got trapped into local optima and required more computational time and cost than other algorithms [14]. For millions of years, nature has continuously solved problems. Biological systems, such as immune systems, help eliminate foreign bodies; perception is used to recognize different patterns, decision-making helps design robots, etc. Such systems show high-level computational intelligence present in nature, and these algorithms are called NIAs. Such algorithms are popular in various applications, such as business management, traveling optimal paths, and others [15]. They are popular due to their flexibility, resilience, and quick response. These are population-based algorithms, which eliminate the need for an initial assumption when solving any problem. These algorithms are suitable for highly complex domain research challenges due to a smaller number of tuned parameters.
NIAs have dominated the sphere of optimization research. Because of their simple structure, the low requirement of parametric and gradient information, and simple conceptual modeling, these algorithms are found to provide highly viable solutions. Broadly, these algorithms are classified into two categories, namely evolutionary algorithms (EAs), based on Darwin’s theory of natural selection, and swarm intelligent (SI) algorithms using the concept of social and swarming behavior of animal species. All EAs and SIs algorithms are stochastic and require a certain population for generating an initial solution. Certain operators, such as crossover, mutation, and selection are used to generate new solutions. The new solutions thus found are evaluated over subsequent iterations, and over a due course of iterations or stopping criteria, the final solution is obtained. Generally, EAs were the first of their kind and used the Darwinian theory of survival of the fittest. The genetic algorithm (GA) [16], proposed in the late 1970s, can be called the mother of all EAs. This algorithm is one of the best EAs and is still in use. The first variant was a binary algorithm and was lately extended to continuous domain. At present, the algorithm is mostly used to optimize multi-objective problems with NSGA-II as one of the best variants. For single-objective optimization, the EA-based algorithms were projected, namely evolutionary strategy (ES) [17], DE [2], BBO [18], GP [19], ALO [20], PBIL [21], and others.
SI is another category of NIAs in that swarm refers to a set of species, such as bees, monkeys, wolves, ants, and birds, that work together to achieve a certain goal. SIs make use of these species’ learning abilities and adaptability to solve extremely complex problems. Beni and Wang [22] presented the first work on SI in cellular robots. It has since been used in nearly every sector, including electrical load dispatch problems, business modelling, forecasting, search optimization, structural engineering design, etc. Main algorithms under this category include ABC algorithm [23], FA [24], DA [25], FPA [4], SSA [26], CS [27], fitness-dependent optimizer (FDO) [28], GWO [10], and others.
Inspired by the collective nature of the community of interacting scientists, the Community of Scientists Optimization (CoSO) algorithm [29] was proposed. The solutions were updated based on the interactions of a group of scientists pursuing their research outcomes by raising finances to continue their research. In addition to the above-mentioned algorithms, there are some recent algorithms, such as Aquila optimizer (AO) [30], arithmetic optimization algorithm (AOA) [31], and hybridized optimization algorithms, such as adaptive SSA (ASSA) [32], adaptive FPA (AFPA) [33], CS version 1.0 (CV 1.0) [34], and NMRA version 3.0 (NMRV 3.0) [35] that are employed in every field of research, such as mathematics, medical imaging, robotics, antenna arrays, image segmentation, artificial immune systems, business management, and others. Furthermore, such algorithms are easier to implement and demonstrate a major contribution to basic optimization techniques.
However, there are certain downsides to using nature-inspired algorithms. They may be appropriate for specific problems but not for others. The NFL theorem [9] confirmed this. Many scholars are inspired by this notion to examine and develop novel algorithms for tackling optimization problems. The inherent shortcomings of existing algorithms, such as inadequacy in exploring, stagnation, and premature convergence of population-based algorithms, are another motivation to create new algorithms. As a result, one must evaluate, hybridize, and propose more powerful algorithms to address optimization issues to eliminate these flaws.
Compared to prior NIAs, such as FA, CS, GWO, and others, NMRA is a newly presented approach that offers extremely dependable results [35]. However, compared to upgraded variants or hybrid algorithms, the NMRA was proved to produce less accurate results. This is primarily due to NMRA’s inadequate exploration and exploitation capabilities. A closer examination of these notions revealed that because the worker phase contains less randomness in the search space, the algorithm was more likely to get stuck in a local optimum, resulting in lower performance. This can be addressed by introducing new potential equations in the worker and breeder phases, significantly improving the algorithm’s global and local searching capabilities.

3. Proposed Naked Mole-Rat Algorithm Variant

3.1. Naked Mole-Rat Algorithm

The NMRA was developed in response to the behavioral characteristics of NMRs [5]. Thus, NMRA is capable of simulating the mating patterns of NMRs. NMRs live in groups of about 70–80 individuals led by a female queen who is solely interested in mating, and the rest are worker NMRs and breeder NMRs. For the sake of simplicity, breeders are considered to be 20% of total NMRs [5].
Breeders are the productive NMRs, with their primary function being to mate with queens, while the remaining NMRs perform a variety of other tasks. The NMRA consists of many steps. Initially, an NMR group is created that is further divided into worker and breeder subgroups. Next, breeders select their breeding stock based on their breeding potential. The following sections discuss the steps taken by the NMRA.
Initialization. A randomly generated population of n NMRs is obtained where each NMR is denoted as a vector in a vector space (D-dimensional), initialized as follows:
N M R i , j = N M R m i n , j + U ( 0 , 1 ) × ( N M R m i n , j N M R m a x , j )
where i [ 1 , 2 , , , n ] , j [ 1 , 2 , , , D ] , N M R i , j is the i th solution in the j th dimension, N M R m i n , j and N M R m a x , j are the lower and upper limit of the problem under study, and U ( 0 , 1 ) is a random number between 0 and 1. The fitness of each solution is evaluated following the initialization stage. Breeder and worker NMRs are classified based on their fitness value attained, and out of these, the best NMR is determined.
Worker Phase. In this stage, the workers (W) attempt to advance their fitness to pursue work as a breeder.
The updated solution is created using the updated equation as follows:
w i t + 1 = w i t + λ ( w j t w k t )
where w i t denotes the i th worker in the t th iteration, w i t + 1 signifies the new fitness solution, and w j t and w k t are the randomly chosen worker NMRs. The λ is the random variable uniformly distributed [ 0 ,   1 ] .
Breeder Phase. Breeder (B) must improve his fitness to be considered as a mating partner or to maintain his status as a breeder. The breeders are upgraded based on the breeding probability (bp initially set to 0.5). If the breeder is unable to supersede its fitness, it may be reintroduced into the worker pool:
b i t + 1 = ( 1 λ ) b i t + λ ( d b i t )
where b i t signifies the i th breeder in the t th iteration and the mating frequency is controlled by parameter λ .
The process is repeated iteratively until the termination requirements are satisfied. The best breeder from the entire population is a possible outcome to the situation under consideration. The pseudocode of NMRA is given in Algorithm 1 as follows:
Algorithm 1. Pseudocode of NMRA.
Input: Define objective function f(NMR), NMR = (NMR1, NMR2, …, NMRD)
Output: Determine current best solution d
Initialization: Initialize NMRs: n, breeders B: n/5, workers W: Bn
Define breeding probability: bp
while iterations t m a x
fori = 1:w
perform worker phase: w i t + 1 = w i t + λ ( w k t w j t )
evaluate w i t + 1
end for
fori = 1:B
if rand >bp
perform breeder phase: b i t + 1 = ( 1 λ ) b i t + λ ( d b i t )
end if
evaluate b i t + 1
end for
combine the updated worker and breeder population
evaluate the population
update the overall best d
update iteration count
end while
update final bestd
end

3.2. Enhanced Naked Mole-Rat Algorithm

Due to its simplicity and linear nature, NMRA received attention in the recent past [35]. The updated, enhanced NMRA (ENMRA) aims to improve efficiency by enhancing its fundamental exploitation and exploration capabilities. Exploration is enriched with the implementation of GWO-inspired equations [10] in basic NMRA, and local neighborhood search (LNS), along with DE equations, are used for enhanced exploitation [36]. The notion of LNS is addressed as follows.
Local Neighborhood Search (LNS). To boost the search space in the worker phase, NMRA employs the current solution and local information. In addition, the local neighborhood search (LNS) model is implemented to enhance the search functionality with increased convergence speed [37].
The key concept is to update the old solution to the new one in a small neighborhood using the best solution. The initial population X = ( X 1 ,   X 2 ,   X 3 , ,   X n ) ,   X i ( i [ 1 , ,   n ] ) is a vector (D-dimensional). The neighborhood radius r (where 2r + 1 <   n ) is defined for each vector X i ; that is, X i neighborhood comprises of X i r ,   ,   X i ,   ,   X i + r . The vectors here are structured according to their indices into a ring topology [35]. Figure 1 represents the notion of the LNS model, which is defined as:
L i = X i + m ( X n _ o p t X i ) + n ( X p X q )
where X n _ o p t is the optimum solution so far in the X i ; m, n ∈ rand () are the scaling factors and p, q ∈ [ir, i + r] (p   q     i). In the improved NMRA, the best solution is modified using Equation (4), and the modified solution executes the worker phase:
x i t + 1 = L i t + r ( x k t x m t )
where r∈ rand( ) is a scaling factor, L i is the best solution modified using LNS, and x k t   a n d   x m t are randomly selected vectors for kth and mth NMR with k m .
Worker Phase. The worker phase is upgraded in the enhanced NMRA to improve the performance of conventional NMRA. Here, the total iterations are divided into two portions. The regular NMRA’s general Equation (2) is utilized for the latter part of the iterations, and a new search equation is introduced for the first half. This equation is supported by considering the mean of the first three solutions that are created based on the best solution available and is represented as:
w 1 = w i A 1 ( C 1 · d w i ) ,   w 2 = w i A 2 ( C 2 · d w i ) ,   w 3 = w i A 3 ( C 3 · d w i )
w n e w = w 1 + w 2 + w 3 3
The main idea for this adjustment came from GWO search equations [10]. The solution in GWO is built by tweaking the parameters to the best search agent position. GWO search equations help to improve the randomness in the algorithm’s worker phase search equations, and hence to overcome the poor exploration of conventional NMRA. To obtain a new solution, the same definition is employed:
w i t + 1 = w n e w t + λ ( w j t w k t )
where A 1 , A 2 , A 3 and C 1 , C 2 , C 3 belong to A and C , respectively, and are given as:
A = 2 a r 1 a ,   C = 2 ·   r 2
where a is a random number that is linearly decreasing [0, 2] in relation to iterations and r 1 and r 2 are the uniformly distributed random numbers. The random number allows the agents to move around within the search space at any location, enhancing the NMRA’s exploration capabilities.
Breeder Phase. In this phase, to enhance the exploitation efficiency of NMRA, the population is separated into three sections, and the final solution is evaluated using three separate search strategies. First, the general equation similar to standard NMRA is used as follows for the first part of the population:
b i t + 1 = { b n e w t + λ ( b j t b k t ) ,     i f   0 t   t m a x / 2 b i t + λ ( b j t b k t ) ,           i f t m a x 2 + 1 t   t m a x
For the second part of the population, an LNS-based search equation is used, inspired by Equation (4) as follows:
b i t + 1 = { L n e w t + λ ( b k t b m t ) ,       i f   0 t   t m a x / 2 L i t + λ ( b k t b m t ) ,         i f t m a x 2 + 1 t   t m a x
where L i t is the best solution modified using LNS and λ is a uniformly generated scaling factor [0, 1]. Here L n e w = b n e w + m ( b n _ o p t b n e w ) + n ( b p b q ) using Equation (4).
For the third part of the population, the search equation inspired by DE is used and is given by:
b i t + 1 = { b n e w t +   λ ( ( b j t b k t ) + ( b p t b q t ) ) ,     i f   0 t   t m a x / 2 b i t +   λ ( ( b j t b k t ) + ( b p t b q t ) ) ,           i f t m a x 2 + 1 t   t m a x
Also, in the basic NMRA breeder phase, the search directions of the new breeders are simply updating processes within the population by best-estimated NMR. However, the entire algorithm quickly gets into premature convergence if the globally optimal individuals collapse into the local optima. Therefore, the guiding function of the better individuals potentially residing near the optimum solution is to minimize the probability of the algorithm getting into the local optimum. In this work, the random individuals near the best solution are used to substitute the current optimal individuals to direct the search for the algorithm to expand the probability of deviating the algorithm from the local optima.
The updated scheme for the neighborhood search of the best individual in ENMRA is:
b i t + 1 = ( 1 λ ) b i t + λ ( d ( 1 + µ . u n i f r n d ( 1 ,   1 ) ) b i t )
where µ is the disturbance coefficient and   u n i f r n d ( 1 ,   1 ) is the uniformly distributed variable within ( 1 , 1). The current best solution is taken as the center and μ as the step size in the neighborhood quest for the optimal individual, and the algorithm searches between segment d ( 1 µ ) and d ( 1 + µ ) . This essentially extends the search direction and raises the probability of the algorithm jumping from the local optimal. The pseudocode of ENMRA is shown in Algorithm 2 as follows:
Algorithm 2. Pseudocode of Enhanced NMRA.
Input: Define objective function (NMR), NMR = (NMR1, NMR2, …, NMRD)
Output: Determine current best solution d
Initialization: Initialize NMRs: n, B: n/5, W: Bn
Define breeding probability: bp
whileiterations < t m a x
fori = 1: workers
perform worker phase:
if t   t m a x / 2
w 1 = w i A 1 ( C 1 · d w i ) ,   w 2 = w i A 2 ( C 2 · d w i ) ,   w 3 = w i A 3 ( C 3 · d w i )
w n e w = w 1 + w 2 + w 3 3
w i t + 1 = w n e w t + λ ( w j t w k t )
else
w i t + 1 = w i t + λ ( w j t w k t )
evaluate w i t + 1
end for
fori = 1: breeders
ifrand >bp
perform breeder phase: divide the whole population into three parts
For the first part of population:
  b i t + 1 = { b n e w t + λ ( b j t b k t ) ,     i f   0 t   t m a x / 2 b i t + λ ( b j t b k t ) ,           i f t m a x 2 + 1 t   t m a x
For the second part of population:
  b i t + 1 = { L n e w t + λ ( b k t b m t ) ,       i f   0 t   t m a x / 2 L i t + λ ( b k t b m t ) ,         i f t m a x 2 + 1 t   t m a x
For the third part of the population:
  b i t + 1 = { b n e w t +   λ ( ( b j t b k t ) + ( b p t b q t ) ) ,     i f   0 t   t m a x / 2 b i t +   λ ( ( b j t b k t ) + ( b p t b q t ) ) ,           i f t m a x 2 + 1 t   t m a x
end if
evaluate b i t + 1
end for
Updating strategy for the neighborhood search
b i t + 1 = ( 1 λ ) b i t + λ ( d ( 1 + µ . u n i f r n d ( 1 , 1 ) ) b i t )
combine the updated worker and breeder population
evaluate the population
update the overall best d
update iteration count
end while
update final best d
end

4. Statistical Testing of ENMRA Algorithm

The 100-Digit Challenge [38], a set of 10 CEC 2019 benchmark functions, was nominated for ENMRA evaluation. All the test functions are scalable. Comparison with FPA [4], DA [25], SSA [26], CS [27], FDO [28], GWO [10], ASSA [32], CV 1.0 [34], NMRA [5], and NMRV 3.0 [35] was performed to test the efficacy of ENMRA. The ENMRA and competitive algorithms were coded using MATLAB version R2020a. All compared methods were run under the same configuration, an IntelR CoreTM, 2.4 GHz (i5 CPU) with 4 GB memory to ensure a fair comparison. Each algorithm underwent 500 iterations with the help of 30 search agents. The parameter settings of competitive algorithms are given in Table 1. The findings are reported in terms of the performance metric such as best, worst, mean, and standard deviation values for 30 independent runs for each algorithm under consideration. Except in CEC02, CEC06–07, and CEC09–10 (see Table 2), ENMRA outperformed competitive algorithms. The box plots and convergence graphs of various methods for various test functions are shown in Figure 2.
ENMRA’s results for CEC01 function were better in terms of the best, median, worst, and mean values obtained. For CEC02 function, ENMRA, CS, and GWO identified an optimal solution, but FDO was found to be the best. Most algorithms produced a nearly globally optimal solution for the CEC03, but ENMRA was proven to be better than other methods in terms of least standard deviation. In the case of CEC04 and CEC05, ENMRA outperformed the competition in terms of fitness performance.
When compared to competitive algorithms, ENMRA’s results for CEC06 and CEC07 functions were the worst. In terms of the best-acquired fitness performance, ENMRA’s results for function CEC08 were better. For CEC09 and CEC10 functions, ENMRA’s findings were comparable to those of other methods.
The box plots of competing algorithms for the benchmark test suite are shown in Figure 2. In this case, the box plots are utilized to assess algorithm efficiency concerning the fitness value attained. It was demonstrated that the proposed ENMRA was cost-effective in terms of fitness values in the majority of cases, as the median of fitness values for ENMRA was lower. As a result, ENMRA’s overall performance was determined to be consistent to that of other optimization techniques.
The performance of the competitive algorithms was statistically assessed using two nonparametric statistical tests, namely the Wilcoxon rank-sum test [39] and Friedman rank (f-rank) test [40], because of the stochastic nature of the above algorithms.
When the outcome of the two algorithms was compared, the Wilcoxon rank-sum test was employed to get the p-rank. In this scenario, the statistical efficiency of the suggested ENMRA was demonstrated in contrast to other methods. For each CEC function, the rank of distinct algorithms is shown in the sixth row of Table 2 and is represented in terms of win(w)/loss(l)/tie(t). The win(w) condition occurred when the tested method outperformed the suggested one and was given the + sign. The performance of the algorithm was worse in the loss(l) situation than in the proposed approach, and the - sign was utilized for this scenario. Both methods under test were statistically significant in the last tie(t) condition, as indicated by the = symbol. As one can observe from the w/l/t row in Table 2, the proposed ENMRA outperformed competitive algorithms in most cases.
The f-rank test additionally evaluated the suggested ENMRA’s performance after the Wilcoxon rank-sum test. The f-rank test assigned a unique rank to each algorithm under comparison based on its performance, and the total f-rank was generated from all the functions as shown in Table 2. The table shows that ENMRA had the best performance and was ranked first majority of cases among all the other algorithms tested.
Table 2 (last row) displays the overall effectiveness (OE) of the ENMRA and competitor algorithms based on their complete performance to summarize the performance evaluation results. Again, Equation (14) is used to calculate the OE of each method [41], where L is the total number of losing tests and N represents the total number of tests for each algorithm.
O E = ( N L N ) × 100
Here, the total number of tests N is 300 as each algorithm runs 30 times for 10 CEC 2019 benchmark functions.

5. Real-Time Application: Energy-Throughput-Efficient Cross-Layer Solution for Wireless Underground Sensor Networks (WUSNs)

In the wide range of new applications, WUSNs [42,43,44] have attracted a great deal of attention that includes monitoring the soil and electricity grid, preventing/saving of mine disasters, extracting oil, predicting earthquakes and landslides, regulating border and security, and a lot more. However, as indicated in [45], these underground environments create significant wireless communication challenges through conventional electromagnetic (EM) waves. Especially, the main problems with EM communication are caused by large antenna sizes, highly unreliable channel conditions, and concise communication ranges.
The magnetic induction (MI) technique is a promising alternate wireless communications solution to deal with the underground challenges [45]. This technique uses a near magnet field of coils to spread information, thereby attaining stable channel conditions through small coil sizes. Numerous significant contributions to underground wireless sensor networks were extensively reported in the literature [46,47,48,49]. MI communication is ideal for underground environments with these great features. The majority of physical layer work has been completed to date, including signal analysis and antenna design. However, there is currently no protocol for MI-based WUSNs. This work aimed to provide a cross-layer solution for optimizing MI communication within the network via a distributed approach.
In this article, we presented a distributed cross-layer solution for WUSNs based on MI using an enhanced naked mole-rat algorithm (ENMRA), called the DECEN protocol framework. Our solution satisfied the quality requirements (i.e., packet delay and transmission reliability) of various applications while achieving optimal energy efficiency and computational complexity, resulting in increased throughput. These characteristics contribute to the practicality of our solution.
The rest of this section is arranged accordingly. Section 5.1 presents classification of MI techniques used in WUSNs. The system model is presented in Section 5.2. A cross-layer framework using ENMRA is proposed for the optimal energy-throughput performance in Section 5.3. Performance evaluation is provided in Section 5.4.

5.1. Magnetic Induction Techniques Used in WUSNs

The basic principle of mutual magnetic induction is used to transmit and receive communication signals in direct MI communication architecture [50]. As with transformers, the transmitter coil communicates the signal as sinusoidal current, which induces analogous sinusoidal current to the receiving node, completing the communication [51,52]. Due to mutual induction, the interaction between the coupled coils of the transmitter and receiver is accomplished (See Figure 3).
Despite the advantages of direct MI communication, such as a small coil size, low path loss, and stable communication channel, few limitations prevent it from being a viable alternate to WUSN applications.
To overcome the limitations of direct MI communication, such as limited communication range, investigators developed waveguide-based MI communication, which proved to be effective in achieving a practical bandwidth of intersensor communication. Moreover, it increased the communication range and reduced the transmission path loss in numerous applications in the underground environment (see Figure 4).
This design was made up of a succession of resonant relay nodes [52] that were deployed between underneath transceiver sensor nodes and were wirelessly coupled in MI-based WUSNs. To achieve an effective signal strength increase with a transmission range of 2 m, six or more relay coils were necessary.
The following advantages were observed when using this approach: sufficient bandwidth, fewer sensors, increased transmission range, path loss reduction, better robustness, extended system lifetime, a stable MI channel, and easier deployability and maintenance.
In practical underground communication applications, coils are not buried in a straight line due to two probable causes: the first one is the inability to deploy in exact planned positions due to rocks or pipes present inside the ground, and second, the positions of already buried coils may get changed during operation of the network due to above-ground pressure or movement of soil. Moreover, it was also well established that received signal strength at the MI transceiver end was affected by the angle between the axes of two adjacently placed coils. Therefore, the option of using multidimensional MI coils in such a complex scenario was worked on for high-quality transmission between sensing nodes [52]. More precisely, three-directional (3D) coils were designed and used, which offered omnidirectional signal coverage, as well as a minimal number of coils, leading to reduced system complexity and cost (see Figure 5).
In a 3D MI coil system, three individually fabricated unidirectional (UD) coils were vertically mounted on a cubical structure having each side with a length of 10 cm, such that each UD coil was perpendicularly deployed in relation to others. These three coils were meant to form a powerful beam along the three different axes of a Cartesian coordinate. Due to magnetic flux created by one surrounding coil becoming zero on another two orthogonal coils, these three coils did not interfere with each other, attributing to the field distribution structure of the coils. Like direct MI coils, the 3D MI coils were also made up of 26AWG wire, and each one of these coils was supported by a serial capacitor for detecting resonance. At the side of the receiving node, all three signals from three coils were introduced.
Depending on the channel model, after fixing MI coil parameters and transmission distance, the intersection angle between transmission and receiver nodes determined the signal strength. At least one coil achieved adequate signal strength with three orthogonal coils regardless of how the angle of intersection was changed. Even if MI coils were rotated, or the intersection angle between them changed, a high degree of communication was supposed to be kept by the system in this case [53]. It was also observed that if transmission gain was maximized using optimal power allocation and adoption of spatial-temporal code, good system performance was achieved by combining the received signals at three orthogonally placed coils [44].
In underwater sensor networks, it was found through modeling and analysis that the transmission range of an MI system achieved was a 20 m range using small-sized coils of 5 cm radius with high value of water conductivity. Therefore, using 3D coils rebut, MU links were established, which remained unaffected by the dynamical rotation of underground sensor nodes [54].

5.2. System Model

5.2.1. Modulation

As observed in [55], fewer variations of the channel were faced by MI communication than EM waves. Advanced modulation techniques may result in more energy consumption with energy-restricted MI-USNs [44]. For underground communication, many easy and suitable modulation techniques can be picked up, e.g., BFSK, BPSK, QPSK, and 16-QAM. Given the connection i j , m i j   represents the adopted modulation technique and η ( m i j ) signifies the modulation spectrum efficiency. The bit error rate (BER) ψ can be obtained for the modulation scheme m i j over link i j , called the received SNR, ψ i j m i j   .

5.2.2. FEC Schemes

In comparison to the automatic repeat request (ARQ), when addressing channel coding systems, FEC improved the reliability of transmission lines without adding overhead or retransmission cost. Furthermore, compared to the energy-efficient convolutional codes, the multilevel cyclic BCH code for WSNs achieved roughly 15% better [56]. Thus, it was necessary to strike a balance between transmission quality and energy consumption, and the presented cross-layer approach enabled such a compromise for maximum energy-throughput efficiency.

5.2.3. DS-CDMA Design

The DS-CDMA system delivered low-packet retransmissions and high-channel reuse and thereby offset the multipath effect in WUSNs. It lessened the use of energy and thereby increased the network throughput. The multiuser access interference (MAI) [57] must be reduced if this technique is used in MI-USNs.

5.2.4. Geographical Routing Algorithm

The notion of geographical routing protocol [58] was promising with a required limited signaling and limited scalability for underground environments. A source i was selected among the neighbors of node i , the best forwarder was j * , i.e., S i   F i D corresponded to the specified objective function.

5.2.5. Statistical QoS Guarantees

The statistical QoS to reaffirm end-to-end data traffic reliably in MI-USNs was analyzed. The reliability of the upsurged transmission was particularly crucial in nearly all underground sensing applications with lower packet loss [44]. The bounded delay was also significant in the setting of timing constraints and real-time monitoring [59]. The communications link i j is given for the packet delay and link reliability with the aim of distributed functionality between sensors.

5.3. Distributed Cross-Layer Energy-Throughput-Efficient Protocol Using ENMRA for WUSNs

Because of the significant differences in communication media (for example, between the air and the soil), it was discovered that the methodologies for terrestrial WSNs were not appropriate to WUSNs. In addition, the majority of the study centered around the physical layer, such as receiving signal analysis and antenna design. As a result, a wholly distributed cross-layer solution was proposed rather than the traditional layered protocol approach, resulting in well-organized resource usage and high system performance (the OSI model).
In WUSNs, viable throughput of link transmissions and energy consumption were the main challenges to be addressed. To obtain the packet successfully for link i j , the objective was to reduce average packet energy and make the most of the average transmitted packet rate, characterized by the acceptable link throughput, given by:
M i n i m i z e   E i j = L ( P i j / R i j ( T , σ ) R C i j + 2 E e l e c b ) M a x i m i z e   Q i j
The energy dissipation per bit for transfer data from the node i to j is expressed as P i j / R i j ( T , σ ) R C i j + 2 E e l e c b . P i j / R i j ( T , σ ) R C i j is the energy consumption as a function of distance. E e l e c b = E e l e c t r a n s = E e l e c r e c   [ J / b i t ] represents the energy dissipation independent of transmitter-receiver separation. E e l e c t r a n s and E e l e c r e c denote the energy consumed per bit by the transmitter and receiver circuit, respectively.
The above objective functions were transformed to a single one using the vector sum method, and the optimization problem (i.e., energy and throughput   ( E a T ) ) is expressed as:
M i n i m i z e   E a T i j ( T , σ ) = w 1 L ( P i j / R i j ( T , σ ) R C i j + 2 E e l e c b ) w 2 Q i j F i n d   T , σ , j S i   F i D ,   m i j   ,   c i j   , P i j [ 0 , P i m a x ] ,   Q i j ,   l i j S u b j e c t   t o   power ,   link ,   average   delay ,   delay   variance   constraints
The decision variables for node i are the allowed link throughput, DS-CDMA code length, operating temperature, modulation scheme, forwarder, soil conductivity, power level, and channel coding scheme.
For the best support in actual applications of WUSNs, cross-layer frameworks should have environmentally aware and distributive properties. DECEN’s main concerns were that: (i) it calculate the relationship between link throughput and chaotic code, (ii) it achieve sensing and information exchange, (iii) it measure two environment-dependent parameters (electrical conductivity and temperature), (iv) it employ a two-phase decision strategy, and (v) it implement a loss-tolerance random-access scheme.
DECEN was intended to solve the initial cross-layer design’s application-driven objective optimization problem. DECEN employed non-cooperative game theory to solve a near-far dilemma in DS-CDMA and examined the relationship between link throughput and chaotic code length using distributed power management. The goal was to determine the relationship between DS-CDMA code lengths and link throughput. A two-phase technique was used to determine which geographic routes can be favored by low signaling overhead and their scalability, which is ideal for oil reservoirs. As a result, we presented a distributed two-stage framework with a cross-layer design.
The sender divided the cross-layer optimization into two sequentially solved subproblems, taking inspiration from the geographical routing algorithm as follows:
(i)
Minimize link metric E a T i j using ENMRA, concerning power level P i j , acceptable link throughput Q i j , DS-CDMA code length l i j , and possible modulation function and channel coding combinations, i.e., j ,   m i j , and c i j , and each of its possible next-hop neighbors.
(ii)
Select the appropriate next-hop j * and optimum link metric physical functionalities ( m i j * ;   c i j * ).

5.4. Performance Evaluation

This section examines DECEN’s performance in comparison to other algorithms. The DECEN algorithm was modeled in MATLAB version R2020a with the same system and resource characteristics. DECEN’s performance (for MI communication, MI waveguide, and MI waveguide with 3D coil) was compared to DEAP and DECN [55], two traditional layered protocol systems. The population size (NP = 20), number of iterations ( t m a x = 100), and problem dimension (D = 2) were the simulation parameters employed by DECEN and DECN algorithms. The simulation results revealed that DECEN saved substantial energy while also providing higher throughput, ideal for use in WUSNs.
Figure 6 and Figure 7 illustrate the results for a successfully decoded payload bit on the receiver. Because centrally regulated power gives more network information, it uses less energy and power than the proposed distributed method. Such assumptions can only be reached theoretically with a massive interchange of control signals, untenable in real-world settings, such as WUSNs. DECEN enabled the MAI power level, and the received noise at the receivers became the transmitter’s only required information. It allowed for practically centralized energy usage and even achieved efficiency over extended transmission distances. The effect of the coil angle inaccuracy on the DECEN was not considered, and actual applications did not permit the use of multilayer arrangements. In this setting, DECEN and the central design required about the same amount of energy even over small transmission distances. Huge antenna size, dynamic channel conditions, and small communication range were addressed by MI-based WUSNs using MI waveguide and 3D MI coils, making them better for underground communication. Cross-layered architecture proved superior to traditional layered protocol architecture in terms of energy savings and link reliability.
Figure 8 depicts the average bit rates of layered and cross-layered systems (i.e., DECEN, DECN, DEAP, and centralized). Cross-layer design is preferable over layered design because of its higher bit rate. On the other hand, the proposed DECEN outperformed the centralized system for almost all transmission lengths and allowed for a much greater bit rate, especially over medium communication ranges. This was because our distributed method was not constrained by the severe power limits of two-hop neighbors, like a centralized system, which is always the worst-case situation. Instead, DECEN employed the ENMRA optimization algorithm to manage each sensor’s transmission power distribution better and increase its performance.
DECEN achieved an energy level that was nearly identical to that of the centralized technique. It also enabled exceptional connectivity via bandwidth-constrained MI routes and significantly reduced the computational complexity of highly viable WUSNs.
Figure 9 and Figure 10 depict the normalized energy usage and packet rate for the successfully received end-to-end data flow, respectively. As the number of sensor nodes grew, better routes became available, and a wider variety of cooperatives emerged. In all of the simulated procedures, these benefits were demonstrated by lower energy usage and higher throughput. Without interchanging data between the multiple layer functionalities and employing a layered strategy, GEO precisely picked the set of nodes that advance successively closest to their target, principally in terms of geographical progress and the poorest performance. TPL reduced the amount of transmitted power required in multihop scenarios, resulting in improved energy savings, more connections, and longer routes. Our solutions delivered the best energy and performance by overcoming GEO, TPL, DEAP, and DECN solutions with higher throughput gain and more energy savings. It is because combining the optimization of several layers’ communication features yielded significant synergy in terms of boosting system performance from one end to the other. The suggested DECEN’s appropriateness for underground conditions was confirmed by its outstanding spectral and energy efficiency, as well as its lower computational complexity. As a result, we propose a novel protocol for efficient and dependable MI communication, as well as a new cross-layer approach in WUSNs.

6. Conclusions

This work enhanced the performance of the optimization algorithm based on the mating behavior of NMRs. The proposed ENMRA used enhanced exploration and exploitation properties, concepts of hybridization, and a division of population strategy to improve the performance of a basic NMRA optimizer. A GWO-based exploration strategy and LNS- and DE-based exploitation characteristics helped attain good results compared to competitive algorithms. The neighborhood search around the best solution caused the algorithm to converge to the global optimum faster than the competitive algorithms. The effectiveness of the proposed algorithm was evaluated using a CEC 2019 benchmark test suite. The superiority of ENMRA was confirmed using the Wilcoxon rank-sum test and Friedman rank (f-rank) test. The overall effectiveness (OE) summarized the performance of ENMRA over compared algorithms.
The interaction of essential underground communications functions was also addressed in this study, and a distributed cross-layer framework called DECEN for the effective utilization of bandwidth-limited MI channels was presented. The DS-CDMA technique provided reliable transmissions links with little network information by leveraging ENMRA. Furthermore, statistical delay constraints were guaranteed, and the best link performance was realized through analytical cross-layer design resolution for the given code length. According to simulation outcomes, the DECEN had lower latency, higher throughput, and lower energy usage.
Other modified variants of the suggested ENMRA can also be proposed to tackle optimization issues with binary, discrete, or multi-objective problems. The suggested method can also be integrated with opposition-based learning, mutation, disruption, and Levy flight for improved performance. Finally, research into the use of ENMRA in other disciplines, such as industry and engineering applications, signal denoising, cloud computing task scheduling, image-processing applications, resource management applications, big data applications, feature selection, neural networks, and other real-world applications, would be a valuable contribution.

Author Contributions

Conceptualization, P.S., R.P.S., and Y.S.; methodology, P.S., R.P.S., and Y.S.; software, P.S., R.P.S., and Y.S.; validation, P.S., R.P.S., and Y.S.; investigation, P.S., R.P.S., Y.S., J.S., and M.F.I.; writing—original draft preparation, P.S., J.S., and M.F.I.; writing—review and editing, P.S., Y.S., J.S., and M.F.I.; visualization, R.P.S. and Y.S.; supervision, R.P.S., Y.S., J.S., and M.F.I.; project administration, P.S., R.P.S., Y.S., J.S., and M.F.I.; funding acquisition, J.S., and M.F.I.; All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Sejong University Research fund.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data are available from the authors upon reasonable request.

Acknowledgments

Jana Shafi would like to thank the Deanship of Scientific Research, Prince Sattam bin Abdul Aziz University, for supporting this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yang, X.S. Nature-inspired optimization algorithms: Challenges and open problems. J. Comput. Sci. 2020, 46, 101104. [Google Scholar] [CrossRef] [Green Version]
  2. Storn, R.; Price, K. Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 1997, 11, 341–359. [Google Scholar] [CrossRef]
  3. Yang, X.S.; Deb, S. Cuckoo search via Lévy flights. In Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC), Coimbatore, India, 9–11 December 2009; IEEE: Piscataway, NJ, USA, 2009; pp. 210–214. [Google Scholar]
  4. Yang, X.S. Flower pollination algorithm for global optimization. In Proceedings of the International Conference on Unconventional Computing and Natural Computation, Orléans, France, 3–7 September 2012; Springer: Berlin, Germany, 2012; pp. 240–249. [Google Scholar]
  5. Salgotra, R.; Singh, U. The naked mole-rat algorithm. Neural Comput. Appl. 2019, 31, 8837–8857. [Google Scholar] [CrossRef]
  6. Karaboga, D.; Basturk, B. On the performance of artificial bee colony (abc) algorithm. Appl. Soft Comput. 2008, 8, 687–697. [Google Scholar] [CrossRef]
  7. Mittal, N.; Singh, U.; Salgotra, R.; Bansal, M. An Energy Efficient Stable Clustering Approach using Fuzzy Enhanced Flower Pollination Algorithm for WSNs. Neural Comput. Appl. 2020, 32, 7399–7419. [Google Scholar] [CrossRef]
  8. Singh, P.; Mittal, N. An Efficient Localization Approach to locate sensor nodes in 3D Wireless Sensor Networks using Adaptive Flower Pollination Algorithm. Wirel. Netw. 2021, 27, 1999–2014. [Google Scholar] [CrossRef]
  9. Wolpert, D.H.; Macready, W.G. No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1997, 1, 67–82. [Google Scholar] [CrossRef] [Green Version]
  10. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey wolf optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef] [Green Version]
  11. Nelder, J.A.; Mead, R. A simplex method for function minimization. Comput. J. 1965, 7, 308–313. [Google Scholar] [CrossRef]
  12. Gill, P.E.; Murray, W. Quasi-newton methods for unconstrained optimization. IMA J. Appl. Math. 1972, 9, 91–108. [Google Scholar] [CrossRef]
  13. Shor, N.Z. The Subgradient Method. In Minimization Methods for Nondifferentiable Functions; Springer: Berlin, Germany, 1985; pp. 22–47. [Google Scholar]
  14. Glover, F. Future paths for integer programming and links to artificial intelligence. Comput. Oper. Res. 1986, 13, 533–549. [Google Scholar] [CrossRef]
  15. Gutjahr, W.J. Convergence analysis of metaheuristics. In Matheuristics. Annals of Information Systems; Maniezzo, V., Stützle, T., Voß, S., Eds.; Springer: Boston, MA, USA, 2009; Volume 10, pp. 159–187. [Google Scholar]
  16. Holland, J.H. Genetic algorithms. Sci. Am. 1992, 267, 66–73. [Google Scholar] [CrossRef]
  17. Rechenberg, I. Evolution strategies—A comprehensive introduction. Nat. Comput. 1978, 1, 3–52. [Google Scholar]
  18. Simon, D. Biogeography-based optimization. IEEE Trans. Evol. Comput. 2008, 12, 702–713. [Google Scholar] [CrossRef] [Green Version]
  19. Koza, J.R. Genetic Programming: On the Programming of Computers by Means of Natural Selection; MIT Press: Cambridge, MA, USA, 1992; Volume 1. [Google Scholar]
  20. Mirjalili, S. The ant lion optimizer. Adv. Eng. Softw. 2015, 83, 80–98. [Google Scholar] [CrossRef]
  21. Michalewicz, Z. Genetic Algorithms+ Data Structures = Evolution Programs; Springer Science & Business Media: Berlin, Germany, 2013. [Google Scholar]
  22. Beni, G.; Wang, J. Swarm intelligence in cellular robotic systems. In Robots and Biological Systems: Towards a New Bionics; Springer: Berlin, Germany, 1993; pp. 703–712. [Google Scholar]
  23. Karaboga, D. An Idea Based on Honey Bee Swarm for Numerical Optimization; Technical Report-tr06; Erciyes University, Engineering Faculty, Computer Engineering Department: Kayseri, Turkey, 2005. [Google Scholar]
  24. Yang, X.S. Firefly algorithm, stochastic test functions and design optimisation. arXiv 2010, arXiv:1003.1409, preprint. [Google Scholar] [CrossRef]
  25. Mirjalili, S. Dragonfly algorithm: A new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput. Appl. 2016, 27, 1053–1073. [Google Scholar] [CrossRef]
  26. Faris, H.; Mirjalili, S.; Aljarah, I.; Mafarja, M.; Heidari, A.A. Salp swarm algorithm: Theory, literature review, and application in extreme learning machines. Nat. -Inspired Optim. 2020, 185–199. [Google Scholar] [CrossRef]
  27. Gandomi, A.H.; Yang, X.S.; Alavi, A.H. Cuckoo search algorithm: A metaheuristic approach to solve structural optimization problems. Eng. Comput. 2013, 29, 17–35. [Google Scholar] [CrossRef]
  28. Abdullah, J.M.; Ahmed, T. Fitness Dependent Optimizer: Inspired by the Bee Swarming Reproductive Process. IEEE Access 2019, 7, 43473–43486. [Google Scholar] [CrossRef]
  29. Santucci, V. Community of scientist optimization: An autonomy oriented approach to distributed optimization. A.I. Commun. 2012, 25, 157–172. [Google Scholar]
  30. Abualigah, L.; Yousri, D.; Elaziz, M.A.; Ewees, A.A.; Al-qaness, M.A.A.; Gandomi, A.H. Aquila Optimizer: A novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 2021, 157, 107250. [Google Scholar] [CrossRef]
  31. Abualigah, L.; Diabat, A.; Mirjalili, S.; Elaziz, M.A.; Gandomi, A.H. The Arithmetic Optimization Algorithm. Comput. Methods Appl. Mech. Eng. 2021, 376, 113609. [Google Scholar] [CrossRef]
  32. Salgotra, R.; Singh, U.; Singh, S.; Singh, G.; Mittal, N. Self-adaptive salp swarm algorithm for engineering optimization problems. Appl. Math. Model. 2021, 89, 188–207. [Google Scholar] [CrossRef]
  33. Singh, K.J.; Nayyar, A.; Kapoor, D.S.; Mittal, N.; Mahajan, S.; Pandit, A.K.; Masud, M. Adaptive Flower Pollination Algorithm based Energy Efficient Routing Protocol for Multi-Robot Systems. IEEE Access 2021, 9, 82417–82434. [Google Scholar] [CrossRef]
  34. Salgotra, R.; Singh, U.; Saha, S. New cuckoo search algorithms with enhanced exploration and exploitation properties. Expert Syst. Appl. 2018, 95, 384–442. [Google Scholar] [CrossRef]
  35. Singh, P.; Mittal, N.; Singh, U.; Salgotra, R. Naked Mole-Rat Algorithm with Improved Exploration and Exploitation Capabilities to Determine 2D and 3D Coordinates of Sensor Nodes in W.S.N.s. Arab. J. Sci. Eng. 2020, 46, 1155–1178. [Google Scholar] [CrossRef]
  36. Das, S.; Abraham, A.; Chakraborty, U.K.; Konar, A. Differential evolution using a neighborhood-based mutation operator. IEEE Trans. Evol. Comput. 2009, 13, 526–553. [Google Scholar] [CrossRef] [Green Version]
  37. Mittal, N.; Garg, A.; Singh, P.; Singh, S.; Singh, H. Improvement in Learning Enthusiasm-based TLBO Algorithm with Enhanced Exploration and Exploitation Properties. Nat. Comput. 2020, 20. [Google Scholar] [CrossRef]
  38. Brest, J.; Maučec, M.S.; Bošković, B. The 100-Digit Challenge: Algorithm jDE100. In Proceedings of the 2019 IEEE Congress on Evolutionary Computation (CEC), Wellington, New Zealand, 10–13 June 2019; pp. 19–26. [Google Scholar]
  39. Derrac, J.; García, S.; Molina, D.; Herrera, F. A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol. Comput. 2018, 1, 3–18. [Google Scholar] [CrossRef]
  40. Tejani, G.G.; Savsani, V.J.; Patel, V.K.; Mirjalili, S. Truss optimization with natural frequency bounds using improved symbiotic organisms search. Knowl. -Based Syst. 2018, 143, 162–178. [Google Scholar] [CrossRef] [Green Version]
  41. Zamani, H.; Nadimi-Shahraki, M.H.; Gandomi, A.H. QANA: Quantum-based avian navigation optimizer algorithm. Eng. Appl. Artif. Intell. 2021, 104, 1–30. [Google Scholar] [CrossRef]
  42. Alfian, G.; Rhee, J.; Ahn, H.; Lee, J.; Farooq, U.; Ijaz, M.F.; Syaekhoni, M.A. Integration of RFID, wireless sensor networks, and data mining in an e-pedigree food traceability system. J. Food Eng. 2017, 212, 65–75. [Google Scholar] [CrossRef]
  43. Liu, B.H.; Fu, T.H.; Wang, Y.B. Research on the model and characteristics of underground 580 magnetic induction communication channel. Prog. Electromagn. Res. M 2021, 101, 89–100. [Google Scholar] [CrossRef]
  44. Akyildiz, I.F.; Stuntebeck, E.P. Wireless underground sensor networks: Research challenges. Ad Hoc Netw. 2006, 4, 669–686. [Google Scholar] [CrossRef]
  45. Sun, Z.; Akyildiz, I.F. Magnetic induction communications for wireless underground sensor networks. IEEE Trans. Antennas Propag. 2010, 58, 2426–2435. [Google Scholar] [CrossRef] [Green Version]
  46. De, S.; Qiao, C.; Pados, D.A.; Chatterjee, M.; Philip, S.J. An integrated cross-layer study of wireless CDMA sensor networks. IEEE J. Sel. Areas Commun. 2004, 22, 1271–1285. [Google Scholar] [CrossRef] [Green Version]
  47. Cui, S.; Madan, R.; Goldsmith, A.J.; Lall, S. Cross-layer energy and delay optimization in small-scale sensor networks. IEEE Trans. Wirel. Commun. 2007, 6, 3688–3699. [Google Scholar] [CrossRef] [Green Version]
  48. Vuran, M.C.; Akyildiz, I.F. XLP: A cross-layer protocol for efficient communication in wireless sensor networks. IEEE Trans. Mob. Comput. 2010, 9, 1578–1591. [Google Scholar] [CrossRef] [Green Version]
  49. Pompili, D.; Akyildiz, I.F. A multimedia cross-layer protocol for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 2010, 9, 2924–2933. [Google Scholar] [CrossRef]
  50. Kisseleff, S.; Akyildiz, I.F.; Gerstacker, W. On modulation for magnetic induction based transmission in wireless underground sensor networks. In Proceedings of the 2014 IEEE International Conference on Communications (I.C.C.), Sydney, Australia, 10–14 June 2014; pp. 71–76. [Google Scholar]
  51. Banaseka, F.K.; Franklin, H.; Katsriku, F.A.; Abdulai, J.D.; Ekpezu, A.; Wiafe, I. Soil Medium Electromagnetic Scattering Model for the Study of Wireless Underground Sensor Networks. Wirel. Commun. Mob. Comput. 2021, 2021, 8842508. [Google Scholar]
  52. Tan, X.; Sun, Z.; Akyildiz, I.F. Wireless underground sensor networks: Mi-based communication systems for underground applications. IEEE Antennas Propag. Mag. 2015, 57, 74–87. [Google Scholar] [CrossRef]
  53. Sardar, M.S.; Xuefen, W.; Yi, Y.; Kausar, F.; Akbar, M.W. Wireless underground sensor networks. Int. J. Perform. Eng. 2019, 15, 3042–3051. [Google Scholar]
  54. Sun, Z.; Wang, P.; Vuran, M.C.; Al-Rodhaan, M.A.; Al-Dhelaan, A.M.; Akyildiz, I.F. Mise-pipe: Magnetic induction-based wireless sensor networks for underground pipeline monitoring. Ad Hoc Netw. 2011, 9, 218–227. [Google Scholar] [CrossRef]
  55. Singh, P.; Singh, R.P.; Singh, Y. An Optimal Energy-Throughput Efficient Cross-layer Solution using Naked Mole Rat Algorithm for Wireless Underground Sensor Networks. In Proceedings of the Symposium on Synthesis, Characterization & Processing of Inorganic, Bio and Nano Materials (SCPINM 2021), Gharuan, India, 30–31 July 2021; pp. 1–8. [Google Scholar]
  56. Agbinya, J.I. A magneto-inductive link budget for wireless power transfer and inductive communication systems. Progr. Electromagn. Res. C 2013, 37, 15–28. [Google Scholar] [CrossRef] [Green Version]
  57. Masihpour, M.; Franklin, D.; Abolhasan, M. Multihop relay techniques for communication range extension in near-field magnetic induction communication systems. J. Netw. 2013, 8, 999–1011. [Google Scholar] [CrossRef] [Green Version]
  58. Bell, T.H.; Barrow, B.J.; Miller, J.T. Subsurface discrimination using electromagnetic induction sensors. IEEE Trans. Geosci. Remote Sens. 2001, 39, 1286–1293. [Google Scholar] [CrossRef]
  59. Lin, X.; Shroff, N.B.; Srikant, R. A tutorial on cross-layer optimization in wireless networks. IEEE J. Sel. Areas Commun. 2006, 24, 1452–1463. [Google Scholar]
Figure 1. Neighborhood ring topology of radius 3.
Figure 1. Neighborhood ring topology of radius 3.
Mathematics 09 02942 g001
Figure 2. Convergence graphs and boxplots for CEC 2019 benchmark functions.
Figure 2. Convergence graphs and boxplots for CEC 2019 benchmark functions.
Mathematics 09 02942 g002aMathematics 09 02942 g002b
Figure 3. Structure of direct MI communication.
Figure 3. Structure of direct MI communication.
Mathematics 09 02942 g003
Figure 4. Structure of MI waveguide technique.
Figure 4. Structure of MI waveguide technique.
Mathematics 09 02942 g004
Figure 5. Basic structure of MI waveguide with 3D coils.
Figure 5. Basic structure of MI waveguide with 3D coils.
Mathematics 09 02942 g005
Figure 6. Comparison graph for transmitted energy as a function of distance.
Figure 6. Comparison graph for transmitted energy as a function of distance.
Mathematics 09 02942 g006
Figure 7. Comparison graph for transmitted power as a function of distance.
Figure 7. Comparison graph for transmitted power as a function of distance.
Mathematics 09 02942 g007
Figure 8. Comparison graph for average bit rate as a function of distance.
Figure 8. Comparison graph for average bit rate as a function of distance.
Mathematics 09 02942 g008
Figure 9. Comparison graph for energy consumption with the varying number of sensors.
Figure 9. Comparison graph for energy consumption with the varying number of sensors.
Mathematics 09 02942 g009
Figure 10. Comparison graph for received packet rate with the varying number of sensors.
Figure 10. Comparison graph for received packet rate with the varying number of sensors.
Mathematics 09 02942 g010
Table 1. Parameter settings of competitive algorithms.
Table 1. Parameter settings of competitive algorithms.
AlgorithmParameters
FPA [3] p s = 0.5
GWO [8]A = linearly decreasing from 2 to 0
SSA [24] c 1 = c 2 = c 3 =  rand[0, 1]
CS [25]probability (pa) = 0.25
DA [23]w = [0.4–0.9], s = 0.1, a = 0.1, c = 0.7, f = 1, e = 1
FDO [26]weight factor (Wf) = 0; r is rand[−1, 1]
ASSA [29] c 1 = c 2 = c 3 = rand[0, 1]; λ = 3
CV 1.0 [31] A = linearly   decreasing   from 2 to 0,r1 = r2 = rand[0, 1]
NMRA [4]bp = 0.5; λ = rand[0, 1]; number of breeders B = population(n)/5
NMRV 3.0 [32]bp = 0.5; λ = rand[0, 1]; B = n/5
ENMRA bp = 0.5; λ = rand[0, 1]; B = n/5; ; a = linearly decreasing from 2 to 0; r1 = r2 = rand[0, 1]
Table 2. Statistical analysis of competitive algorithms for CEC 2019 test suite.
Table 2. Statistical analysis of competitive algorithms for CEC 2019 test suite.
FunctionMetricFPAGWOSSACSDAFDOASSACV 1.0NMRANMRA 3.0ENMRA
CEC01Best1.37E + 085.15E + 044.18E + 081.00E + 102.03E + 097.32E + 077.55E + 041.00E + 108.91E + 053.86E + 043.68E + 04
Median4.41E + 083.46E + 072.68E + 091.00E + 104.09E + 106.37E + 082.74E + 051.00E + 103.07E + 095.24E + 063.94E + 04
Worst1.20E + 096.35E + 082.63E + 101.00E + 101.67E + 117.66E + 091.24E + 061.00E + 103.58E + 106.59E + 084.82E + 04
Mean5.03E + 081.14E + 085.38E + 091.00E + 104.95E + 101.34E + 095.57E + 051.00E + 106.65E + 096.35E + 074.01E + 04
Std2.78E + 081.64E + 086.16E + 090.00E + 004.73E + 101.72E + 094.12E + 050.00E + 009.21E + 091.32E + 082.45E + 03
p-rank
f-rank547911629831
CEC02Best1.81E + 011.73E + 011.73E + 011.73E + 011.74E + 011.73E + 011.75E + 017.36E + 031.74E + 011.73E + 011.73E + 01
Median2.16E + 011.73E + 011.73E + 011.73E + 013.77E + 011.73E + 011.77E + 011.61E + 041.75E + 011.73E + 011.73E + 01
Worst3.37E + 011.73E + 011.74E + 011.73E + 013.16E + 021.73E + 011.90E + 012.44E + 041.77E + 011.74E + 011.73E + 01
Mean2.24E + 011.73E + 011.73E + 011.73E + 016.00E + 011.73E + 011.79E + 011.61E + 041.75E + 011.73E + 011.73E + 01
Std3.66E + 002.69E-041.48E-023.44E-046.71E + 011.65E-054.10E-014.57E + 037.24E-026.40E-036.24E-05
p-rank+
f-rank9364101811752
CEC03Best1.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 01
Median1.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 01
Worst1.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 01
Mean1.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 011.27E + 01
Std1.47E-072.18E-071.93E-139.07E-115.25E-041.40E-113.14E-059.19E-044.73E-059.00E-151.53E-16
p-rank
f-rank6735114810921
CEC04Best9.52E + 012.58E + 011.58E + 011.79E + 012.17E + 011.10E + 017.14E + 029.77E + 034.53E + 024.23E + 018.50E + 00
Median1.37E + 025.56E + 013.87E + 012.56E + 013.94E + 023.27E + 012.45E + 032.82E + 041.10E + 036.75E + 024.68E + 01
Worst1.93E + 029.38E + 017.15E + 013.91E + 019.05E + 028.56E + 014.64E + 035.43E + 042.06E + 031.96E + 036.65E + 01
Mean1.37E + 025.87E + 014.04E + 012.74E + 013.80E + 023.75E + 012.63E + 032.97E + 041.15E + 037.05E + 024.28E + 01
Std2.50E + 011.82E + 011.55E + 016.04E + 002.72E + 022.05E + 011.06E + 039.60E + 034.12E + 025.32E + 021.60E + 01
p-rank
f-rank6432851011791
CEC05Best1.38E + 001.12E + 001.04E + 001.03E + 001.12E + 001.06E + 002.06E + 003.53E + 001.93E + 001.16E + 001.01E + 00
Median1.60E + 001.32E + 001.25E + 001.06E + 001.42E + 001.15E + 002.47E + 007.97E + 002.17E + 001.49E + 001.07E + 00
Worst1.72E + 001.88E + 001.50E + 001.12E + 002.18E + 001.54E + 003.09E + 001.22E + 012.32E + 002.69E + 001.74E + 00
Mean1.58E + 001.43E + 001.26E + 001.06E + 001.49E + 001.19E + 002.49E + 007.99E + 002.17E + 001.59E + 001.15E + 00
Std8.72E-022.55E-011.39E-011.68E-023.15E-011.23E-012.91E-011.71E + 008.31E-023.44E-012.00E-01
p-rank
f-rank8542631011971
CEC06Best9.50E + 009.91E + 001.41E + 007.34E + 005.08E + 009.31E + 009.65E + 001.13E + 019.52E + 009.65E + 009.55E + 00
Median1.07E + 011.08E + 015.03E + 009.36E + 008.78E + 001.11E + 011.16E + 011.57E + 011.07E + 011.14E + 011.08E + 01
Worst1.15E + 011.18E + 011.02E + 011.01E + 011.11E + 011.23E + 011.30E + 011.75E + 011.17E + 011.25E + 011.19E + 01
Mean1.07E + 011.08E + 015.01E + 009.08E + 008.78E +001.10E + 011.14E + 011.56E + 011.08E + 011.13E + 011.09E + 01
Std6.07E-015.93E-012.06E + 007.91E-011.51E + 007.62E-019.15E-011.23E + 005.72E-017.07E-016.16E-01
p-rank++++++
f-rank4613281011597
CEC07Best5.03E + 002.57E + 003.01E + 004.61E + 005.13E + 003.36E + 003.85E + 021.14E + 034.88E + 002.67E + 026.87E + 01
Median5.76E + 004.83E + 005.13E + 005.36E + 005.92E + 005.12E + 009.19E + 022.12E + 035.91E + 008.27E + 025.38E + 02
Worst6.27E + 006.65E + 006.38E + 005.74E + 006.79E + 006.28E + 001.47E + 032.64E + 026.92E + 001.35E + 031.02E + 03
Mean5.70E + 004.86E + 005.08E + 005.34E + 005.85E + 005.05E + 009.08E + 022.07E + 035.85E + 007.75E + 025.11E + 02
Std3.40E-011.11E + 007.27E-012.38E-014.22E-016.27E-012.35E + 024.13E + 025.42E-012.34E + 022.78E + 02
p-rank+++++++
f-rank5124631011798
CEC08Best5.11E + 003.45E + 004.05E + 004.82E + 005.16E + 002.69E + 004.68E + 006.74E + 004.42E + 002.86E + 002.14E + 00
Median5.77E + 005.27E + 005.37E + 005.33E + 005.72E + 004.86E + 006.34E + 008.45E + 005.87E + 005.76E + 004.96E + 00
Worst6.47E + 006.75E + 006.14E + 005.65E + 006.53E + 006.02E + 006.90E + 009.09E + 006.88E + 006.79E + 006.74E + 00
Mean5.77E + 005.18E + 005.34E + 005.26E + 005.71E + 004.85E + 006.15E + 008.32E + 005.93E + 005.65E + 004.83E + 00
Std3.41E-019.32E-014.67E-011.95E-014.10E-017.80E-015.84E-015.81E-015.91E-018.41E-011.83E-01
p-rank
f-rank8354721011961
CEC09Best3.17E + 003.11E + 002.37E + 002.49E + 002.88E + 002.39E + 001.33E + 023.27E + 036.83E + 003.27E + 002.65E + 00
Median4.83E + 004.28E + 002.47E + 002.75E + 004.17E + 002.51E + 003.29E + 025.91E + 037.90E + 017.43E + 004.19E + 00
Worst7.82E + 006.36E + 002.96E + 002.94E + 006.71E + 003.17E + 007.51E + 021.06E + 043.92E + 021.88E + 025.10E + 00
Mean4.74E + 004.51E + 002.52E + 002.75E + 004.30E + 002.55E + 003.69E + 026.11E + 039.12E + 014.48E + 014.19E + 00
Std9.58E-019.03E-011.20E-011.34E-019.20E-011.54E-011.41E + 021.94E + 036.96E + 015.65E + 016.57E-01
p-rank+++
f-rank7613521011984
CEC10Best2.02E + 012.02E + 012.00E + 012.02E + 012.00E + 012.34E-082.03E + 012.07E + 011.97E + 011.44E + 016.35E + 00
Median2.04E + 012.05E + 012.00E + 012.03E + 012.02E + 012.00E + 012.05E + 012.11E + 012.05E + 012.05E + 012.05E + 01
Worst2.06E + 012.06E + 012.05E + 012.04E + 012.05E + 012.00E + 012.07E + 012.15E + 012.06E + 012.07E + 012.06E + 01
Mean2.04E + 012.05E + 012.00E + 012.03E + 012.02E + 011.93E + 012.05E + 012.11E + 012.04E + 012.02E + 012.00E + 01
Std9.37E-029.62E-021.05E-016.07E-021.51E-013.65E + 007.44E-022.07E-011.55E-011.23E + 002.57E + 00
p-rank+
f-rank7936511011842
Average f-rank6.54.83.54.27.13.58.810.77.86.22.8
Overall f-rank7524821011961
win(w)|loss(l)|tie(t)4|294|228|272|053|225|22|298|05|292|356|240|44|293|38|292|012|286|28|289|3165|119|16
OE%2%9.33%18.33%0.67%2.67%20%2.33%2.67%4.67%3.67%60.33%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Singh, P.; Singh, R.P.; Singh, Y.; Shafi, J.; Ijaz, M.F. An Enhanced Naked Mole Rat Algorithm for Optimal Cross-Layer Solution for Wireless Underground Sensor Networks. Mathematics 2021, 9, 2942. https://doi.org/10.3390/math9222942

AMA Style

Singh P, Singh RP, Singh Y, Shafi J, Ijaz MF. An Enhanced Naked Mole Rat Algorithm for Optimal Cross-Layer Solution for Wireless Underground Sensor Networks. Mathematics. 2021; 9(22):2942. https://doi.org/10.3390/math9222942

Chicago/Turabian Style

Singh, Pratap, Rishi Pal Singh, Yudhvir Singh, Jana Shafi, and Muhammad Fazal Ijaz. 2021. "An Enhanced Naked Mole Rat Algorithm for Optimal Cross-Layer Solution for Wireless Underground Sensor Networks" Mathematics 9, no. 22: 2942. https://doi.org/10.3390/math9222942

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop