You are currently viewing a new version of our website. To view the old version click .
Mathematics
  • Article
  • Open Access

18 November 2021

An Enhanced Naked Mole Rat Algorithm for Optimal Cross-Layer Solution for Wireless Underground Sensor Networks

,
,
,
and
1
Department of Computer Science and Engineering, Guru Jambheshwar University of Science & Technology, Hisar 125001, India
2
Department of Computer Science and Engineering, Maharshi Dayanand University, Rohtak 124001, India
3
Department of Computer Science, College of Arts and Science, Prince Sattam Bin Abdul University, Wadi Ad-Dawasir 11991, Saudi Arabia
4
Department of Intelligent Mechatronics Engineering, Sejong University, Seoul 05006, Korea

Abstract

Nature-inspired algorithms serve as the backbone of modern computing technology, and over the past three decades, the field has grown enormously. Many applications were solved by such algorithms and are replacing the traditional classical optimization processes. A recent naked mole-rat algorithm (NMRA) was proposed based on the mating patterns of naked mole-rats. This algorithm proved its worth in terms of competitiveness and application to various domains of research. The aim was to propose an algorithm based on NMRA, named enhanced NMRA (ENMRA), by mitigating the problems that this algorithm suffers from: slow convergence, poor exploration, and local optima stagnation. To enhance the exploration capabilities of basic NMRA, grey wolf optimization (GWO)-based search equations were employed. Exploitation was improved using population division methods based on local neighborhood search (LNS) and differential evolution (DE) equations. To avoid the local stagnation problem, a neighborhood search strategy around the best individual was utilized. Such improvements help the new variant to solve highly challenging optimization problems in contrast to existing algorithms. The efficacy of ENMRA was evaluated using CEC 2019 benchmark test suite. The results were statistically analyzed by the Wilcoxon rank-sum test and Friedman rank (f-rank) test. The resulting analysis proved that ENMRA is superior to the competitive algorithms for test functions CEC 2019 with overall effectiveness of 60.33%. Moreover, the real-world optimization problem from underground wireless sensor networks for an efficient cross-layer solution was also used to test the efficiency of ENMRA. The results of comparative study and statistical tests affirmed the efficient performance of the proposed algorithm.

1. Introduction

In the present world, there are numerous real-world applications of optimization. Currently, many scientific fields and industrial companies face many hurdles in finding an appropriate optimization tool or, more precisely, an optimization algorithm to solve real-world problems. The main reason to employ such algorithms is that the majority of the real-life applications may be expressed as potential domain optimization problems depending upon their nature and the number of objectives to be optimized. This can be estimated from the fact that these algorithms find application in almost every research domain, such as economics, engineering, mathematics, signal processing, weather forecasting, operation research, management, production planning, scheduling, routing problems, machine learning, and others. These optimization problems are highly complex and pose a challenge for researchers to solve them efficiently. In recent times, nature-inspired algorithms (NIAs) have dominated the various spheres of optimization research and are in use in almost every field [1].
NIAs are considered efficient solutions for solving various real-life issues. These algorithms include differential evolution (DE) [2], cuckoo search (CS) [3], flower pollination algorithm (FPA) [4], and others. These algorithms incorporate four major processes to simulate natural behavior: initialization, global search, local search, and selection. Although these algorithms demonstrate exceptional performance and competitiveness, many theoretical and experimental analyses proved that they are still dependent on the choice of tuning parameters [5,6]. Such parameters include scaling factor, switch probability, crossover/mutation rate, local/global search, population size, and standard randomization. Early investigation proved that these algorithms require a trial-and-error methodology to tune their parameters [6]. This method is tedious and hence is not efficient. Apart from that, these algorithms suffer from premature convergence, slow convergence, local optima stagnation, and more [5]. Such drawbacks make these algorithms vulnerable to poor solution generation, thus adding to less diversity and, hence, unable to find the desired solution.
An important factor is the local optima stagnation and slow convergence associated with the above algorithms. DE has a deficiency of premature convergence and stagnation. Also, DE sometimes stops proceeding toward the global optima, even though the population has not converged to local optima or any other point. It was found that FPA also suffers from the local optima stagnation problem and slow convergence [7,8], and hence, the requirement of a new enhanced version of such algorithms is needed. Overall, NIAs suffer from these problems, and there is a requirement to design new algorithms or improve the existing algorithms for prospective researchers. In this respect, a substantial effort was made to eradicate the issues above by introducing new enhanced versions of nature-inspired algorithms using new and novel strategies. These algorithms perform significantly better but have some inherent drawbacks. Many hybrid and improved versions of these procedures were also investigated to eradicate the flaws of basic algorithms.
The no free lunch (NFL) theorem [9] is an essential source of inspiration for investigators to propose novel algorithms that meet the problem objectives. According to the theory, no algorithm can be regarded as the single solution to all domain research tasks, and problem-based tweaks are always necessary for enhanced performance [9]. The fundamental reason for this adaptation is that each domain’s research challenge may have a variety of situations, such as complexity, dimension size, nature (constrained or unconstrained), and so on. The high peak in a problem and the local minimal solutions make it difficult for investigators to propose improved variants and deliver consistent outcomes.
A new algorithm was introduced by using the worker–breeder relationship of naked mole-rats (NMRs) [5]. This NMR algorithm (NMRA) aimed to provide an altogether new metaheuristic algorithm for prospective researchers to exploit and apply to their research domains. However, the NMRA has the disadvantage of poor exploration and was predicted to produce less consistent outcomes. The lack of randomness in the algorithm’s search equations is the primary cause of inadequate investigation. This work mainly focused on designing NMRA with improved exploration and exploitation. The authors aimed to achieve this by using randomly generated solutions inside the search space using grey wolf optimization (GWO) [10], instead of moving all the random solutions toward the best particles. For exploitation, it was required that the unexpected solutions follow the local group leader or simply the current best solution. So here, the general equation of both exploration and exploitation phases were enhanced to achieve better results.
This work dealt with the proposal to enhance the exploitation and exploration characteristics of a new algorithm, namely NMRA, to solve CEC 2019 benchmark problems and some real-world applications, such as an energy-throughput efficient, cross-layer solution for underground wireless sensor networks.
The major contributions of this work are summarized as follows:
  • To improve the exploration and exploitation tendency of NMRA, a new variant of NMRA was presented.
  • The exploration capability was enhanced with the implementation of GWO-inspired equations in basic NMRA.
  • The local neighborhood search along with DE equations were employed for enhanced exploitation characteristics of NMRA.
  • The performance of the proposed NMRA variant was evaluated using a set of CEC 2019 benchmark test functions and a real-time underground wireless sensor network problem.
The rest of the paper is structured as follows. Section 2 deals with the related work. The description of NMRA and enhanced NMRA (ENMRA) is presented in Section 3. The statistical testing of ENMRA is evaluated in Section 4. The framework of DECEN is given in Section 5 to attain optimal energy throughput as a cross-layer design and the system model for a cross-layer communication solution. Section 6 concludes the paper with possible future work.

3. Proposed Naked Mole-Rat Algorithm Variant

3.1. Naked Mole-Rat Algorithm

The NMRA was developed in response to the behavioral characteristics of NMRs [5]. Thus, NMRA is capable of simulating the mating patterns of NMRs. NMRs live in groups of about 70–80 individuals led by a female queen who is solely interested in mating, and the rest are worker NMRs and breeder NMRs. For the sake of simplicity, breeders are considered to be 20% of total NMRs [5].
Breeders are the productive NMRs, with their primary function being to mate with queens, while the remaining NMRs perform a variety of other tasks. The NMRA consists of many steps. Initially, an NMR group is created that is further divided into worker and breeder subgroups. Next, breeders select their breeding stock based on their breeding potential. The following sections discuss the steps taken by the NMRA.
Initialization. A randomly generated population of n NMRs is obtained where each NMR is denoted as a vector in a vector space (D-dimensional), initialized as follows:
N M R i , j = N M R m i n , j + U ( 0 , 1 ) × ( N M R m i n , j N M R m a x , j )
where i [ 1 , 2 , , , n ] , j [ 1 , 2 , , , D ] , N M R i , j is the i th solution in the j th dimension, N M R m i n , j and N M R m a x , j are the lower and upper limit of the problem under study, and U ( 0 , 1 ) is a random number between 0 and 1. The fitness of each solution is evaluated following the initialization stage. Breeder and worker NMRs are classified based on their fitness value attained, and out of these, the best NMR is determined.
Worker Phase. In this stage, the workers (W) attempt to advance their fitness to pursue work as a breeder.
The updated solution is created using the updated equation as follows:
w i t + 1 = w i t + λ ( w j t w k t )
where w i t denotes the i th worker in the t th iteration, w i t + 1 signifies the new fitness solution, and w j t and w k t are the randomly chosen worker NMRs. The λ is the random variable uniformly distributed [ 0 ,   1 ] .
Breeder Phase. Breeder (B) must improve his fitness to be considered as a mating partner or to maintain his status as a breeder. The breeders are upgraded based on the breeding probability (bp initially set to 0.5). If the breeder is unable to supersede its fitness, it may be reintroduced into the worker pool:
b i t + 1 = ( 1 λ ) b i t + λ ( d b i t )
where b i t signifies the i th breeder in the t th iteration and the mating frequency is controlled by parameter λ .
The process is repeated iteratively until the termination requirements are satisfied. The best breeder from the entire population is a possible outcome to the situation under consideration. The pseudocode of NMRA is given in Algorithm 1 as follows:
Algorithm 1. Pseudocode of NMRA.
Input: Define objective function f(NMR), NMR = (NMR1, NMR2, …, NMRD)
Output: Determine current best solution d
Initialization: Initialize NMRs: n, breeders B: n/5, workers W: Bn
Define breeding probability: bp
while iterations t m a x
fori = 1:w
perform worker phase: w i t + 1 = w i t + λ ( w k t w j t )
evaluate w i t + 1
end for
fori = 1:B
if rand >bp
perform breeder phase: b i t + 1 = ( 1 λ ) b i t + λ ( d b i t )
end if
evaluate b i t + 1
end for
combine the updated worker and breeder population
evaluate the population
update the overall best d
update iteration count
end while
update final bestd
end

3.2. Enhanced Naked Mole-Rat Algorithm

Due to its simplicity and linear nature, NMRA received attention in the recent past [35]. The updated, enhanced NMRA (ENMRA) aims to improve efficiency by enhancing its fundamental exploitation and exploration capabilities. Exploration is enriched with the implementation of GWO-inspired equations [10] in basic NMRA, and local neighborhood search (LNS), along with DE equations, are used for enhanced exploitation [36]. The notion of LNS is addressed as follows.
Local Neighborhood Search (LNS). To boost the search space in the worker phase, NMRA employs the current solution and local information. In addition, the local neighborhood search (LNS) model is implemented to enhance the search functionality with increased convergence speed [37].
The key concept is to update the old solution to the new one in a small neighborhood using the best solution. The initial population X = ( X 1 ,   X 2 ,   X 3 , ,   X n ) ,   X i ( i [ 1 , ,   n ] ) is a vector (D-dimensional). The neighborhood radius r (where 2r + 1 <   n ) is defined for each vector X i ; that is, X i neighborhood comprises of X i r ,   ,   X i ,   ,   X i + r . The vectors here are structured according to their indices into a ring topology [35]. Figure 1 represents the notion of the LNS model, which is defined as:
L i = X i + m ( X n _ o p t X i ) + n ( X p X q )
where X n _ o p t is the optimum solution so far in the X i ; m, n ∈ rand () are the scaling factors and p, q ∈ [ir, i + r] (p   q     i). In the improved NMRA, the best solution is modified using Equation (4), and the modified solution executes the worker phase:
x i t + 1 = L i t + r ( x k t x m t )
where r∈ rand( ) is a scaling factor, L i is the best solution modified using LNS, and x k t   a n d   x m t are randomly selected vectors for kth and mth NMR with k m .
Figure 1. Neighborhood ring topology of radius 3.
Worker Phase. The worker phase is upgraded in the enhanced NMRA to improve the performance of conventional NMRA. Here, the total iterations are divided into two portions. The regular NMRA’s general Equation (2) is utilized for the latter part of the iterations, and a new search equation is introduced for the first half. This equation is supported by considering the mean of the first three solutions that are created based on the best solution available and is represented as:
w 1 = w i A 1 ( C 1 · d w i ) ,   w 2 = w i A 2 ( C 2 · d w i ) ,   w 3 = w i A 3 ( C 3 · d w i )
w n e w = w 1 + w 2 + w 3 3
The main idea for this adjustment came from GWO search equations [10]. The solution in GWO is built by tweaking the parameters to the best search agent position. GWO search equations help to improve the randomness in the algorithm’s worker phase search equations, and hence to overcome the poor exploration of conventional NMRA. To obtain a new solution, the same definition is employed:
w i t + 1 = w n e w t + λ ( w j t w k t )
where A 1 , A 2 , A 3 and C 1 , C 2 , C 3 belong to A and C , respectively, and are given as:
A = 2 a r 1 a ,   C = 2 ·   r 2
where a is a random number that is linearly decreasing [0, 2] in relation to iterations and r 1 and r 2 are the uniformly distributed random numbers. The random number allows the agents to move around within the search space at any location, enhancing the NMRA’s exploration capabilities.
Breeder Phase. In this phase, to enhance the exploitation efficiency of NMRA, the population is separated into three sections, and the final solution is evaluated using three separate search strategies. First, the general equation similar to standard NMRA is used as follows for the first part of the population:
b i t + 1 = { b n e w t + λ ( b j t b k t ) ,     i f   0 t   t m a x / 2 b i t + λ ( b j t b k t ) ,           i f t m a x 2 + 1 t   t m a x
For the second part of the population, an LNS-based search equation is used, inspired by Equation (4) as follows:
b i t + 1 = { L n e w t + λ ( b k t b m t ) ,       i f   0 t   t m a x / 2 L i t + λ ( b k t b m t ) ,         i f t m a x 2 + 1 t   t m a x
where L i t is the best solution modified using LNS and λ is a uniformly generated scaling factor [0, 1]. Here L n e w = b n e w + m ( b n _ o p t b n e w ) + n ( b p b q ) using Equation (4).
For the third part of the population, the search equation inspired by DE is used and is given by:
b i t + 1 = { b n e w t +   λ ( ( b j t b k t ) + ( b p t b q t ) ) ,     i f   0 t   t m a x / 2 b i t +   λ ( ( b j t b k t ) + ( b p t b q t ) ) ,           i f t m a x 2 + 1 t   t m a x
Also, in the basic NMRA breeder phase, the search directions of the new breeders are simply updating processes within the population by best-estimated NMR. However, the entire algorithm quickly gets into premature convergence if the globally optimal individuals collapse into the local optima. Therefore, the guiding function of the better individuals potentially residing near the optimum solution is to minimize the probability of the algorithm getting into the local optimum. In this work, the random individuals near the best solution are used to substitute the current optimal individuals to direct the search for the algorithm to expand the probability of deviating the algorithm from the local optima.
The updated scheme for the neighborhood search of the best individual in ENMRA is:
b i t + 1 = ( 1 λ ) b i t + λ ( d ( 1 + µ . u n i f r n d ( 1 ,   1 ) ) b i t )
where µ is the disturbance coefficient and   u n i f r n d ( 1 ,   1 ) is the uniformly distributed variable within ( 1 , 1). The current best solution is taken as the center and μ as the step size in the neighborhood quest for the optimal individual, and the algorithm searches between segment d ( 1 µ ) and d ( 1 + µ ) . This essentially extends the search direction and raises the probability of the algorithm jumping from the local optimal. The pseudocode of ENMRA is shown in Algorithm 2 as follows:
Algorithm 2. Pseudocode of Enhanced NMRA.
Input: Define objective function (NMR), NMR = (NMR1, NMR2, …, NMRD)
Output: Determine current best solution d
Initialization: Initialize NMRs: n, B: n/5, W: Bn
Define breeding probability: bp
whileiterations < t m a x
fori = 1: workers
perform worker phase:
if t   t m a x / 2
w 1 = w i A 1 ( C 1 · d w i ) ,   w 2 = w i A 2 ( C 2 · d w i ) ,   w 3 = w i A 3 ( C 3 · d w i )
w n e w = w 1 + w 2 + w 3 3
w i t + 1 = w n e w t + λ ( w j t w k t )
else
w i t + 1 = w i t + λ ( w j t w k t )
evaluate w i t + 1
end for
fori = 1: breeders
ifrand >bp
perform breeder phase: divide the whole population into three parts
For the first part of population:
  b i t + 1 = { b n e w t + λ ( b j t b k t ) ,     i f   0 t   t m a x / 2 b i t + λ ( b j t b k t ) ,           i f t m a x 2 + 1 t   t m a x
For the second part of population:
  b i t + 1 = { L n e w t + λ ( b k t b m t ) ,       i f   0 t   t m a x / 2 L i t + λ ( b k t b m t ) ,         i f t m a x 2 + 1 t   t m a x
For the third part of the population:
  b i t + 1 = { b n e w t +   λ ( ( b j t b k t ) + ( b p t b q t ) ) ,     i f   0 t   t m a x / 2 b i t +   λ ( ( b j t b k t ) + ( b p t b q t ) ) ,           i f t m a x 2 + 1 t   t m a x
end if
evaluate b i t + 1
end for
Updating strategy for the neighborhood search
b i t + 1 = ( 1 λ ) b i t + λ ( d ( 1 + µ . u n i f r n d ( 1 , 1 ) ) b i t )
combine the updated worker and breeder population
evaluate the population
update the overall best d
update iteration count
end while
update final best d
end

4. Statistical Testing of ENMRA Algorithm

The 100-Digit Challenge [38], a set of 10 CEC 2019 benchmark functions, was nominated for ENMRA evaluation. All the test functions are scalable. Comparison with FPA [4], DA [25], SSA [26], CS [27], FDO [28], GWO [10], ASSA [32], CV 1.0 [34], NMRA [5], and NMRV 3.0 [35] was performed to test the efficacy of ENMRA. The ENMRA and competitive algorithms were coded using MATLAB version R2020a. All compared methods were run under the same configuration, an IntelR CoreTM, 2.4 GHz (i5 CPU) with 4 GB memory to ensure a fair comparison. Each algorithm underwent 500 iterations with the help of 30 search agents. The parameter settings of competitive algorithms are given in Table 1. The findings are reported in terms of the performance metric such as best, worst, mean, and standard deviation values for 30 independent runs for each algorithm under consideration. Except in CEC02, CEC06–07, and CEC09–10 (see Table 2), ENMRA outperformed competitive algorithms. The box plots and convergence graphs of various methods for various test functions are shown in Figure 2.
Table 1. Parameter settings of competitive algorithms.
Table 2. Statistical analysis of competitive algorithms for CEC 2019 test suite.
Figure 2. Convergence graphs and boxplots for CEC 2019 benchmark functions.
ENMRA’s results for CEC01 function were better in terms of the best, median, worst, and mean values obtained. For CEC02 function, ENMRA, CS, and GWO identified an optimal solution, but FDO was found to be the best. Most algorithms produced a nearly globally optimal solution for the CEC03, but ENMRA was proven to be better than other methods in terms of least standard deviation. In the case of CEC04 and CEC05, ENMRA outperformed the competition in terms of fitness performance.
When compared to competitive algorithms, ENMRA’s results for CEC06 and CEC07 functions were the worst. In terms of the best-acquired fitness performance, ENMRA’s results for function CEC08 were better. For CEC09 and CEC10 functions, ENMRA’s findings were comparable to those of other methods.
The box plots of competing algorithms for the benchmark test suite are shown in Figure 2. In this case, the box plots are utilized to assess algorithm efficiency concerning the fitness value attained. It was demonstrated that the proposed ENMRA was cost-effective in terms of fitness values in the majority of cases, as the median of fitness values for ENMRA was lower. As a result, ENMRA’s overall performance was determined to be consistent to that of other optimization techniques.
The performance of the competitive algorithms was statistically assessed using two nonparametric statistical tests, namely the Wilcoxon rank-sum test [39] and Friedman rank (f-rank) test [40], because of the stochastic nature of the above algorithms.
When the outcome of the two algorithms was compared, the Wilcoxon rank-sum test was employed to get the p-rank. In this scenario, the statistical efficiency of the suggested ENMRA was demonstrated in contrast to other methods. For each CEC function, the rank of distinct algorithms is shown in the sixth row of Table 2 and is represented in terms of win(w)/loss(l)/tie(t). The win(w) condition occurred when the tested method outperformed the suggested one and was given the + sign. The performance of the algorithm was worse in the loss(l) situation than in the proposed approach, and the - sign was utilized for this scenario. Both methods under test were statistically significant in the last tie(t) condition, as indicated by the = symbol. As one can observe from the w/l/t row in Table 2, the proposed ENMRA outperformed competitive algorithms in most cases.
The f-rank test additionally evaluated the suggested ENMRA’s performance after the Wilcoxon rank-sum test. The f-rank test assigned a unique rank to each algorithm under comparison based on its performance, and the total f-rank was generated from all the functions as shown in Table 2. The table shows that ENMRA had the best performance and was ranked first majority of cases among all the other algorithms tested.
Table 2 (last row) displays the overall effectiveness (OE) of the ENMRA and competitor algorithms based on their complete performance to summarize the performance evaluation results. Again, Equation (14) is used to calculate the OE of each method [41], where L is the total number of losing tests and N represents the total number of tests for each algorithm.
O E = ( N L N ) × 100
Here, the total number of tests N is 300 as each algorithm runs 30 times for 10 CEC 2019 benchmark functions.

5. Real-Time Application: Energy-Throughput-Efficient Cross-Layer Solution for Wireless Underground Sensor Networks (WUSNs)

In the wide range of new applications, WUSNs [42,43,44] have attracted a great deal of attention that includes monitoring the soil and electricity grid, preventing/saving of mine disasters, extracting oil, predicting earthquakes and landslides, regulating border and security, and a lot more. However, as indicated in [45], these underground environments create significant wireless communication challenges through conventional electromagnetic (EM) waves. Especially, the main problems with EM communication are caused by large antenna sizes, highly unreliable channel conditions, and concise communication ranges.
The magnetic induction (MI) technique is a promising alternate wireless communications solution to deal with the underground challenges [45]. This technique uses a near magnet field of coils to spread information, thereby attaining stable channel conditions through small coil sizes. Numerous significant contributions to underground wireless sensor networks were extensively reported in the literature [46,47,48,49]. MI communication is ideal for underground environments with these great features. The majority of physical layer work has been completed to date, including signal analysis and antenna design. However, there is currently no protocol for MI-based WUSNs. This work aimed to provide a cross-layer solution for optimizing MI communication within the network via a distributed approach.
In this article, we presented a distributed cross-layer solution for WUSNs based on MI using an enhanced naked mole-rat algorithm (ENMRA), called the DECEN protocol framework. Our solution satisfied the quality requirements (i.e., packet delay and transmission reliability) of various applications while achieving optimal energy efficiency and computational complexity, resulting in increased throughput. These characteristics contribute to the practicality of our solution.
The rest of this section is arranged accordingly. Section 5.1 presents classification of MI techniques used in WUSNs. The system model is presented in Section 5.2. A cross-layer framework using ENMRA is proposed for the optimal energy-throughput performance in Section 5.3. Performance evaluation is provided in Section 5.4.

5.1. Magnetic Induction Techniques Used in WUSNs

The basic principle of mutual magnetic induction is used to transmit and receive communication signals in direct MI communication architecture [50]. As with transformers, the transmitter coil communicates the signal as sinusoidal current, which induces analogous sinusoidal current to the receiving node, completing the communication [51,52]. Due to mutual induction, the interaction between the coupled coils of the transmitter and receiver is accomplished (See Figure 3).
Figure 3. Structure of direct MI communication.
Despite the advantages of direct MI communication, such as a small coil size, low path loss, and stable communication channel, few limitations prevent it from being a viable alternate to WUSN applications.
To overcome the limitations of direct MI communication, such as limited communication range, investigators developed waveguide-based MI communication, which proved to be effective in achieving a practical bandwidth of intersensor communication. Moreover, it increased the communication range and reduced the transmission path loss in numerous applications in the underground environment (see Figure 4).
Figure 4. Structure of MI waveguide technique.
This design was made up of a succession of resonant relay nodes [52] that were deployed between underneath transceiver sensor nodes and were wirelessly coupled in MI-based WUSNs. To achieve an effective signal strength increase with a transmission range of 2 m, six or more relay coils were necessary.
The following advantages were observed when using this approach: sufficient bandwidth, fewer sensors, increased transmission range, path loss reduction, better robustness, extended system lifetime, a stable MI channel, and easier deployability and maintenance.
In practical underground communication applications, coils are not buried in a straight line due to two probable causes: the first one is the inability to deploy in exact planned positions due to rocks or pipes present inside the ground, and second, the positions of already buried coils may get changed during operation of the network due to above-ground pressure or movement of soil. Moreover, it was also well established that received signal strength at the MI transceiver end was affected by the angle between the axes of two adjacently placed coils. Therefore, the option of using multidimensional MI coils in such a complex scenario was worked on for high-quality transmission between sensing nodes [52]. More precisely, three-directional (3D) coils were designed and used, which offered omnidirectional signal coverage, as well as a minimal number of coils, leading to reduced system complexity and cost (see Figure 5).
Figure 5. Basic structure of MI waveguide with 3D coils.
In a 3D MI coil system, three individually fabricated unidirectional (UD) coils were vertically mounted on a cubical structure having each side with a length of 10 cm, such that each UD coil was perpendicularly deployed in relation to others. These three coils were meant to form a powerful beam along the three different axes of a Cartesian coordinate. Due to magnetic flux created by one surrounding coil becoming zero on another two orthogonal coils, these three coils did not interfere with each other, attributing to the field distribution structure of the coils. Like direct MI coils, the 3D MI coils were also made up of 26AWG wire, and each one of these coils was supported by a serial capacitor for detecting resonance. At the side of the receiving node, all three signals from three coils were introduced.
Depending on the channel model, after fixing MI coil parameters and transmission distance, the intersection angle between transmission and receiver nodes determined the signal strength. At least one coil achieved adequate signal strength with three orthogonal coils regardless of how the angle of intersection was changed. Even if MI coils were rotated, or the intersection angle between them changed, a high degree of communication was supposed to be kept by the system in this case [53]. It was also observed that if transmission gain was maximized using optimal power allocation and adoption of spatial-temporal code, good system performance was achieved by combining the received signals at three orthogonally placed coils [44].
In underwater sensor networks, it was found through modeling and analysis that the transmission range of an MI system achieved was a 20 m range using small-sized coils of 5 cm radius with high value of water conductivity. Therefore, using 3D coils rebut, MU links were established, which remained unaffected by the dynamical rotation of underground sensor nodes [54].

5.2. System Model

5.2.1. Modulation

As observed in [55], fewer variations of the channel were faced by MI communication than EM waves. Advanced modulation techniques may result in more energy consumption with energy-restricted MI-USNs [44]. For underground communication, many easy and suitable modulation techniques can be picked up, e.g., BFSK, BPSK, QPSK, and 16-QAM. Given the connection i j , m i j   represents the adopted modulation technique and η ( m i j ) signifies the modulation spectrum efficiency. The bit error rate (BER) ψ can be obtained for the modulation scheme m i j over link i j , called the received SNR, ψ i j m i j   .

5.2.2. FEC Schemes

In comparison to the automatic repeat request (ARQ), when addressing channel coding systems, FEC improved the reliability of transmission lines without adding overhead or retransmission cost. Furthermore, compared to the energy-efficient convolutional codes, the multilevel cyclic BCH code for WSNs achieved roughly 15% better [56]. Thus, it was necessary to strike a balance between transmission quality and energy consumption, and the presented cross-layer approach enabled such a compromise for maximum energy-throughput efficiency.

5.2.3. DS-CDMA Design

The DS-CDMA system delivered low-packet retransmissions and high-channel reuse and thereby offset the multipath effect in WUSNs. It lessened the use of energy and thereby increased the network throughput. The multiuser access interference (MAI) [57] must be reduced if this technique is used in MI-USNs.

5.2.4. Geographical Routing Algorithm

The notion of geographical routing protocol [58] was promising with a required limited signaling and limited scalability for underground environments. A source i was selected among the neighbors of node i , the best forwarder was j * , i.e., S i   F i D corresponded to the specified objective function.

5.2.5. Statistical QoS Guarantees

The statistical QoS to reaffirm end-to-end data traffic reliably in MI-USNs was analyzed. The reliability of the upsurged transmission was particularly crucial in nearly all underground sensing applications with lower packet loss [44]. The bounded delay was also significant in the setting of timing constraints and real-time monitoring [59]. The communications link i j is given for the packet delay and link reliability with the aim of distributed functionality between sensors.

5.3. Distributed Cross-Layer Energy-Throughput-Efficient Protocol Using ENMRA for WUSNs

Because of the significant differences in communication media (for example, between the air and the soil), it was discovered that the methodologies for terrestrial WSNs were not appropriate to WUSNs. In addition, the majority of the study centered around the physical layer, such as receiving signal analysis and antenna design. As a result, a wholly distributed cross-layer solution was proposed rather than the traditional layered protocol approach, resulting in well-organized resource usage and high system performance (the OSI model).
In WUSNs, viable throughput of link transmissions and energy consumption were the main challenges to be addressed. To obtain the packet successfully for link i j , the objective was to reduce average packet energy and make the most of the average transmitted packet rate, characterized by the acceptable link throughput, given by:
M i n i m i z e   E i j = L ( P i j / R i j ( T , σ ) R C i j + 2 E e l e c b ) M a x i m i z e   Q i j
The energy dissipation per bit for transfer data from the node i to j is expressed as P i j / R i j ( T , σ ) R C i j + 2 E e l e c b . P i j / R i j ( T , σ ) R C i j is the energy consumption as a function of distance. E e l e c b = E e l e c t r a n s = E e l e c r e c   [ J / b i t ] represents the energy dissipation independent of transmitter-receiver separation. E e l e c t r a n s and E e l e c r e c denote the energy consumed per bit by the transmitter and receiver circuit, respectively.
The above objective functions were transformed to a single one using the vector sum method, and the optimization problem (i.e., energy and throughput   ( E a T ) ) is expressed as:
M i n i m i z e   E a T i j ( T , σ ) = w 1 L ( P i j / R i j ( T , σ ) R C i j + 2 E e l e c b ) w 2 Q i j F i n d   T , σ , j S i   F i D ,   m i j   ,   c i j   , P i j [ 0 , P i m a x ] ,   Q i j ,   l i j S u b j e c t   t o   power ,   link ,   average   delay ,   delay   variance   constraints
The decision variables for node i are the allowed link throughput, DS-CDMA code length, operating temperature, modulation scheme, forwarder, soil conductivity, power level, and channel coding scheme.
For the best support in actual applications of WUSNs, cross-layer frameworks should have environmentally aware and distributive properties. DECEN’s main concerns were that: (i) it calculate the relationship between link throughput and chaotic code, (ii) it achieve sensing and information exchange, (iii) it measure two environment-dependent parameters (electrical conductivity and temperature), (iv) it employ a two-phase decision strategy, and (v) it implement a loss-tolerance random-access scheme.
DECEN was intended to solve the initial cross-layer design’s application-driven objective optimization problem. DECEN employed non-cooperative game theory to solve a near-far dilemma in DS-CDMA and examined the relationship between link throughput and chaotic code length using distributed power management. The goal was to determine the relationship between DS-CDMA code lengths and link throughput. A two-phase technique was used to determine which geographic routes can be favored by low signaling overhead and their scalability, which is ideal for oil reservoirs. As a result, we presented a distributed two-stage framework with a cross-layer design.
The sender divided the cross-layer optimization into two sequentially solved subproblems, taking inspiration from the geographical routing algorithm as follows:
(i)
Minimize link metric E a T i j using ENMRA, concerning power level P i j , acceptable link throughput Q i j , DS-CDMA code length l i j , and possible modulation function and channel coding combinations, i.e., j ,   m i j , and c i j , and each of its possible next-hop neighbors.
(ii)
Select the appropriate next-hop j * and optimum link metric physical functionalities ( m i j * ;   c i j * ).

5.4. Performance Evaluation

This section examines DECEN’s performance in comparison to other algorithms. The DECEN algorithm was modeled in MATLAB version R2020a with the same system and resource characteristics. DECEN’s performance (for MI communication, MI waveguide, and MI waveguide with 3D coil) was compared to DEAP and DECN [55], two traditional layered protocol systems. The population size (NP = 20), number of iterations ( t m a x = 100), and problem dimension (D = 2) were the simulation parameters employed by DECEN and DECN algorithms. The simulation results revealed that DECEN saved substantial energy while also providing higher throughput, ideal for use in WUSNs.
Figure 6 and Figure 7 illustrate the results for a successfully decoded payload bit on the receiver. Because centrally regulated power gives more network information, it uses less energy and power than the proposed distributed method. Such assumptions can only be reached theoretically with a massive interchange of control signals, untenable in real-world settings, such as WUSNs. DECEN enabled the MAI power level, and the received noise at the receivers became the transmitter’s only required information. It allowed for practically centralized energy usage and even achieved efficiency over extended transmission distances. The effect of the coil angle inaccuracy on the DECEN was not considered, and actual applications did not permit the use of multilayer arrangements. In this setting, DECEN and the central design required about the same amount of energy even over small transmission distances. Huge antenna size, dynamic channel conditions, and small communication range were addressed by MI-based WUSNs using MI waveguide and 3D MI coils, making them better for underground communication. Cross-layered architecture proved superior to traditional layered protocol architecture in terms of energy savings and link reliability.
Figure 6. Comparison graph for transmitted energy as a function of distance.
Figure 7. Comparison graph for transmitted power as a function of distance.
Figure 8 depicts the average bit rates of layered and cross-layered systems (i.e., DECEN, DECN, DEAP, and centralized). Cross-layer design is preferable over layered design because of its higher bit rate. On the other hand, the proposed DECEN outperformed the centralized system for almost all transmission lengths and allowed for a much greater bit rate, especially over medium communication ranges. This was because our distributed method was not constrained by the severe power limits of two-hop neighbors, like a centralized system, which is always the worst-case situation. Instead, DECEN employed the ENMRA optimization algorithm to manage each sensor’s transmission power distribution better and increase its performance.
Figure 8. Comparison graph for average bit rate as a function of distance.
DECEN achieved an energy level that was nearly identical to that of the centralized technique. It also enabled exceptional connectivity via bandwidth-constrained MI routes and significantly reduced the computational complexity of highly viable WUSNs.
Figure 9 and Figure 10 depict the normalized energy usage and packet rate for the successfully received end-to-end data flow, respectively. As the number of sensor nodes grew, better routes became available, and a wider variety of cooperatives emerged. In all of the simulated procedures, these benefits were demonstrated by lower energy usage and higher throughput. Without interchanging data between the multiple layer functionalities and employing a layered strategy, GEO precisely picked the set of nodes that advance successively closest to their target, principally in terms of geographical progress and the poorest performance. TPL reduced the amount of transmitted power required in multihop scenarios, resulting in improved energy savings, more connections, and longer routes. Our solutions delivered the best energy and performance by overcoming GEO, TPL, DEAP, and DECN solutions with higher throughput gain and more energy savings. It is because combining the optimization of several layers’ communication features yielded significant synergy in terms of boosting system performance from one end to the other. The suggested DECEN’s appropriateness for underground conditions was confirmed by its outstanding spectral and energy efficiency, as well as its lower computational complexity. As a result, we propose a novel protocol for efficient and dependable MI communication, as well as a new cross-layer approach in WUSNs.
Figure 9. Comparison graph for energy consumption with the varying number of sensors.
Figure 10. Comparison graph for received packet rate with the varying number of sensors.

6. Conclusions

This work enhanced the performance of the optimization algorithm based on the mating behavior of NMRs. The proposed ENMRA used enhanced exploration and exploitation properties, concepts of hybridization, and a division of population strategy to improve the performance of a basic NMRA optimizer. A GWO-based exploration strategy and LNS- and DE-based exploitation characteristics helped attain good results compared to competitive algorithms. The neighborhood search around the best solution caused the algorithm to converge to the global optimum faster than the competitive algorithms. The effectiveness of the proposed algorithm was evaluated using a CEC 2019 benchmark test suite. The superiority of ENMRA was confirmed using the Wilcoxon rank-sum test and Friedman rank (f-rank) test. The overall effectiveness (OE) summarized the performance of ENMRA over compared algorithms.
The interaction of essential underground communications functions was also addressed in this study, and a distributed cross-layer framework called DECEN for the effective utilization of bandwidth-limited MI channels was presented. The DS-CDMA technique provided reliable transmissions links with little network information by leveraging ENMRA. Furthermore, statistical delay constraints were guaranteed, and the best link performance was realized through analytical cross-layer design resolution for the given code length. According to simulation outcomes, the DECEN had lower latency, higher throughput, and lower energy usage.
Other modified variants of the suggested ENMRA can also be proposed to tackle optimization issues with binary, discrete, or multi-objective problems. The suggested method can also be integrated with opposition-based learning, mutation, disruption, and Levy flight for improved performance. Finally, research into the use of ENMRA in other disciplines, such as industry and engineering applications, signal denoising, cloud computing task scheduling, image-processing applications, resource management applications, big data applications, feature selection, neural networks, and other real-world applications, would be a valuable contribution.

Author Contributions

Conceptualization, P.S., R.P.S., and Y.S.; methodology, P.S., R.P.S., and Y.S.; software, P.S., R.P.S., and Y.S.; validation, P.S., R.P.S., and Y.S.; investigation, P.S., R.P.S., Y.S., J.S., and M.F.I.; writing—original draft preparation, P.S., J.S., and M.F.I.; writing—review and editing, P.S., Y.S., J.S., and M.F.I.; visualization, R.P.S. and Y.S.; supervision, R.P.S., Y.S., J.S., and M.F.I.; project administration, P.S., R.P.S., Y.S., J.S., and M.F.I.; funding acquisition, J.S., and M.F.I.; All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by Sejong University Research fund.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are available from the authors upon reasonable request.

Acknowledgments

Jana Shafi would like to thank the Deanship of Scientific Research, Prince Sattam bin Abdul Aziz University, for supporting this work.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Yang, X.S. Nature-inspired optimization algorithms: Challenges and open problems. J. Comput. Sci. 2020, 46, 101104. [Google Scholar] [CrossRef]
  2. Storn, R.; Price, K. Differential evolution–a simple and efficient heuristic for global optimization over continuous spaces. J. Glob. Optim. 1997, 11, 341–359. [Google Scholar] [CrossRef]
  3. Yang, X.S.; Deb, S. Cuckoo search via Lévy flights. In Proceedings of the 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC), Coimbatore, India, 9–11 December 2009; IEEE: Piscataway, NJ, USA, 2009; pp. 210–214. [Google Scholar]
  4. Yang, X.S. Flower pollination algorithm for global optimization. In Proceedings of the International Conference on Unconventional Computing and Natural Computation, Orléans, France, 3–7 September 2012; Springer: Berlin, Germany, 2012; pp. 240–249. [Google Scholar]
  5. Salgotra, R.; Singh, U. The naked mole-rat algorithm. Neural Comput. Appl. 2019, 31, 8837–8857. [Google Scholar] [CrossRef]
  6. Karaboga, D.; Basturk, B. On the performance of artificial bee colony (abc) algorithm. Appl. Soft Comput. 2008, 8, 687–697. [Google Scholar] [CrossRef]
  7. Mittal, N.; Singh, U.; Salgotra, R.; Bansal, M. An Energy Efficient Stable Clustering Approach using Fuzzy Enhanced Flower Pollination Algorithm for WSNs. Neural Comput. Appl. 2020, 32, 7399–7419. [Google Scholar] [CrossRef]
  8. Singh, P.; Mittal, N. An Efficient Localization Approach to locate sensor nodes in 3D Wireless Sensor Networks using Adaptive Flower Pollination Algorithm. Wirel. Netw. 2021, 27, 1999–2014. [Google Scholar] [CrossRef]
  9. Wolpert, D.H.; Macready, W.G. No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1997, 1, 67–82. [Google Scholar] [CrossRef]
  10. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey wolf optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef]
  11. Nelder, J.A.; Mead, R. A simplex method for function minimization. Comput. J. 1965, 7, 308–313. [Google Scholar] [CrossRef]
  12. Gill, P.E.; Murray, W. Quasi-newton methods for unconstrained optimization. IMA J. Appl. Math. 1972, 9, 91–108. [Google Scholar] [CrossRef]
  13. Shor, N.Z. The Subgradient Method. In Minimization Methods for Nondifferentiable Functions; Springer: Berlin, Germany, 1985; pp. 22–47. [Google Scholar]
  14. Glover, F. Future paths for integer programming and links to artificial intelligence. Comput. Oper. Res. 1986, 13, 533–549. [Google Scholar] [CrossRef]
  15. Gutjahr, W.J. Convergence analysis of metaheuristics. In Matheuristics. Annals of Information Systems; Maniezzo, V., Stützle, T., Voß, S., Eds.; Springer: Boston, MA, USA, 2009; Volume 10, pp. 159–187. [Google Scholar]
  16. Holland, J.H. Genetic algorithms. Sci. Am. 1992, 267, 66–73. [Google Scholar] [CrossRef]
  17. Rechenberg, I. Evolution strategies—A comprehensive introduction. Nat. Comput. 1978, 1, 3–52. [Google Scholar]
  18. Simon, D. Biogeography-based optimization. IEEE Trans. Evol. Comput. 2008, 12, 702–713. [Google Scholar] [CrossRef]
  19. Koza, J.R. Genetic Programming: On the Programming of Computers by Means of Natural Selection; MIT Press: Cambridge, MA, USA, 1992; Volume 1. [Google Scholar]
  20. Mirjalili, S. The ant lion optimizer. Adv. Eng. Softw. 2015, 83, 80–98. [Google Scholar] [CrossRef]
  21. Michalewicz, Z. Genetic Algorithms+ Data Structures = Evolution Programs; Springer Science & Business Media: Berlin, Germany, 2013. [Google Scholar]
  22. Beni, G.; Wang, J. Swarm intelligence in cellular robotic systems. In Robots and Biological Systems: Towards a New Bionics; Springer: Berlin, Germany, 1993; pp. 703–712. [Google Scholar]
  23. Karaboga, D. An Idea Based on Honey Bee Swarm for Numerical Optimization; Technical Report-tr06; Erciyes University, Engineering Faculty, Computer Engineering Department: Kayseri, Turkey, 2005. [Google Scholar]
  24. Yang, X.S. Firefly algorithm, stochastic test functions and design optimisation. arXiv 2010, arXiv:1003.1409, preprint. [Google Scholar] [CrossRef]
  25. Mirjalili, S. Dragonfly algorithm: A new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput. Appl. 2016, 27, 1053–1073. [Google Scholar] [CrossRef]
  26. Faris, H.; Mirjalili, S.; Aljarah, I.; Mafarja, M.; Heidari, A.A. Salp swarm algorithm: Theory, literature review, and application in extreme learning machines. Nat. -Inspired Optim. 2020, 185–199. [Google Scholar] [CrossRef]
  27. Gandomi, A.H.; Yang, X.S.; Alavi, A.H. Cuckoo search algorithm: A metaheuristic approach to solve structural optimization problems. Eng. Comput. 2013, 29, 17–35. [Google Scholar] [CrossRef]
  28. Abdullah, J.M.; Ahmed, T. Fitness Dependent Optimizer: Inspired by the Bee Swarming Reproductive Process. IEEE Access 2019, 7, 43473–43486. [Google Scholar] [CrossRef]
  29. Santucci, V. Community of scientist optimization: An autonomy oriented approach to distributed optimization. A.I. Commun. 2012, 25, 157–172. [Google Scholar]
  30. Abualigah, L.; Yousri, D.; Elaziz, M.A.; Ewees, A.A.; Al-qaness, M.A.A.; Gandomi, A.H. Aquila Optimizer: A novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 2021, 157, 107250. [Google Scholar] [CrossRef]
  31. Abualigah, L.; Diabat, A.; Mirjalili, S.; Elaziz, M.A.; Gandomi, A.H. The Arithmetic Optimization Algorithm. Comput. Methods Appl. Mech. Eng. 2021, 376, 113609. [Google Scholar] [CrossRef]
  32. Salgotra, R.; Singh, U.; Singh, S.; Singh, G.; Mittal, N. Self-adaptive salp swarm algorithm for engineering optimization problems. Appl. Math. Model. 2021, 89, 188–207. [Google Scholar] [CrossRef]
  33. Singh, K.J.; Nayyar, A.; Kapoor, D.S.; Mittal, N.; Mahajan, S.; Pandit, A.K.; Masud, M. Adaptive Flower Pollination Algorithm based Energy Efficient Routing Protocol for Multi-Robot Systems. IEEE Access 2021, 9, 82417–82434. [Google Scholar] [CrossRef]
  34. Salgotra, R.; Singh, U.; Saha, S. New cuckoo search algorithms with enhanced exploration and exploitation properties. Expert Syst. Appl. 2018, 95, 384–442. [Google Scholar] [CrossRef]
  35. Singh, P.; Mittal, N.; Singh, U.; Salgotra, R. Naked Mole-Rat Algorithm with Improved Exploration and Exploitation Capabilities to Determine 2D and 3D Coordinates of Sensor Nodes in W.S.N.s. Arab. J. Sci. Eng. 2020, 46, 1155–1178. [Google Scholar] [CrossRef]
  36. Das, S.; Abraham, A.; Chakraborty, U.K.; Konar, A. Differential evolution using a neighborhood-based mutation operator. IEEE Trans. Evol. Comput. 2009, 13, 526–553. [Google Scholar] [CrossRef]
  37. Mittal, N.; Garg, A.; Singh, P.; Singh, S.; Singh, H. Improvement in Learning Enthusiasm-based TLBO Algorithm with Enhanced Exploration and Exploitation Properties. Nat. Comput. 2020, 20. [Google Scholar] [CrossRef]
  38. Brest, J.; Maučec, M.S.; Bošković, B. The 100-Digit Challenge: Algorithm jDE100. In Proceedings of the 2019 IEEE Congress on Evolutionary Computation (CEC), Wellington, New Zealand, 10–13 June 2019; pp. 19–26. [Google Scholar]
  39. Derrac, J.; García, S.; Molina, D.; Herrera, F. A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol. Comput. 2018, 1, 3–18. [Google Scholar] [CrossRef]
  40. Tejani, G.G.; Savsani, V.J.; Patel, V.K.; Mirjalili, S. Truss optimization with natural frequency bounds using improved symbiotic organisms search. Knowl. -Based Syst. 2018, 143, 162–178. [Google Scholar] [CrossRef]
  41. Zamani, H.; Nadimi-Shahraki, M.H.; Gandomi, A.H. QANA: Quantum-based avian navigation optimizer algorithm. Eng. Appl. Artif. Intell. 2021, 104, 1–30. [Google Scholar] [CrossRef]
  42. Alfian, G.; Rhee, J.; Ahn, H.; Lee, J.; Farooq, U.; Ijaz, M.F.; Syaekhoni, M.A. Integration of RFID, wireless sensor networks, and data mining in an e-pedigree food traceability system. J. Food Eng. 2017, 212, 65–75. [Google Scholar] [CrossRef]
  43. Liu, B.H.; Fu, T.H.; Wang, Y.B. Research on the model and characteristics of underground 580 magnetic induction communication channel. Prog. Electromagn. Res. M 2021, 101, 89–100. [Google Scholar] [CrossRef]
  44. Akyildiz, I.F.; Stuntebeck, E.P. Wireless underground sensor networks: Research challenges. Ad Hoc Netw. 2006, 4, 669–686. [Google Scholar] [CrossRef]
  45. Sun, Z.; Akyildiz, I.F. Magnetic induction communications for wireless underground sensor networks. IEEE Trans. Antennas Propag. 2010, 58, 2426–2435. [Google Scholar] [CrossRef]
  46. De, S.; Qiao, C.; Pados, D.A.; Chatterjee, M.; Philip, S.J. An integrated cross-layer study of wireless CDMA sensor networks. IEEE J. Sel. Areas Commun. 2004, 22, 1271–1285. [Google Scholar] [CrossRef]
  47. Cui, S.; Madan, R.; Goldsmith, A.J.; Lall, S. Cross-layer energy and delay optimization in small-scale sensor networks. IEEE Trans. Wirel. Commun. 2007, 6, 3688–3699. [Google Scholar] [CrossRef]
  48. Vuran, M.C.; Akyildiz, I.F. XLP: A cross-layer protocol for efficient communication in wireless sensor networks. IEEE Trans. Mob. Comput. 2010, 9, 1578–1591. [Google Scholar] [CrossRef]
  49. Pompili, D.; Akyildiz, I.F. A multimedia cross-layer protocol for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 2010, 9, 2924–2933. [Google Scholar] [CrossRef]
  50. Kisseleff, S.; Akyildiz, I.F.; Gerstacker, W. On modulation for magnetic induction based transmission in wireless underground sensor networks. In Proceedings of the 2014 IEEE International Conference on Communications (I.C.C.), Sydney, Australia, 10–14 June 2014; pp. 71–76. [Google Scholar]
  51. Banaseka, F.K.; Franklin, H.; Katsriku, F.A.; Abdulai, J.D.; Ekpezu, A.; Wiafe, I. Soil Medium Electromagnetic Scattering Model for the Study of Wireless Underground Sensor Networks. Wirel. Commun. Mob. Comput. 2021, 2021, 8842508. [Google Scholar]
  52. Tan, X.; Sun, Z.; Akyildiz, I.F. Wireless underground sensor networks: Mi-based communication systems for underground applications. IEEE Antennas Propag. Mag. 2015, 57, 74–87. [Google Scholar] [CrossRef]
  53. Sardar, M.S.; Xuefen, W.; Yi, Y.; Kausar, F.; Akbar, M.W. Wireless underground sensor networks. Int. J. Perform. Eng. 2019, 15, 3042–3051. [Google Scholar]
  54. Sun, Z.; Wang, P.; Vuran, M.C.; Al-Rodhaan, M.A.; Al-Dhelaan, A.M.; Akyildiz, I.F. Mise-pipe: Magnetic induction-based wireless sensor networks for underground pipeline monitoring. Ad Hoc Netw. 2011, 9, 218–227. [Google Scholar] [CrossRef]
  55. Singh, P.; Singh, R.P.; Singh, Y. An Optimal Energy-Throughput Efficient Cross-layer Solution using Naked Mole Rat Algorithm for Wireless Underground Sensor Networks. In Proceedings of the Symposium on Synthesis, Characterization & Processing of Inorganic, Bio and Nano Materials (SCPINM 2021), Gharuan, India, 30–31 July 2021; pp. 1–8. [Google Scholar]
  56. Agbinya, J.I. A magneto-inductive link budget for wireless power transfer and inductive communication systems. Progr. Electromagn. Res. C 2013, 37, 15–28. [Google Scholar] [CrossRef][Green Version]
  57. Masihpour, M.; Franklin, D.; Abolhasan, M. Multihop relay techniques for communication range extension in near-field magnetic induction communication systems. J. Netw. 2013, 8, 999–1011. [Google Scholar] [CrossRef]
  58. Bell, T.H.; Barrow, B.J.; Miller, J.T. Subsurface discrimination using electromagnetic induction sensors. IEEE Trans. Geosci. Remote Sens. 2001, 39, 1286–1293. [Google Scholar] [CrossRef]
  59. Lin, X.; Shroff, N.B.; Srikant, R. A tutorial on cross-layer optimization in wireless networks. IEEE J. Sel. Areas Commun. 2006, 24, 1452–1463. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.