Wireless Communications and Mobile Computing

Wireless Communications and Mobile Computing / 2021 / Article
Special Issue

Machine Learning for Wireless Networks - Recent Advances and Future Trends

View this Special Issue

Research Article | Open Access

Volume 2021 |Article ID 9931677 | https://doi.org/10.1155/2021/9931677

Khalid A. Eldrandaly, Laila Abdel-Fatah, Mohamed Abdel-Basset, Mohamed El-hoseny, Nabil M. Abdel-Aziz, "Green Communication for Sixth-Generation Intent-Based Networks: An Architecture Based on Hybrid Computational Intelligence Algorithm", Wireless Communications and Mobile Computing, vol. 2021, Article ID 9931677, 13 pages, 2021. https://doi.org/10.1155/2021/9931677

Green Communication for Sixth-Generation Intent-Based Networks: An Architecture Based on Hybrid Computational Intelligence Algorithm

Academic Editor: K. Shankar
Received21 Mar 2021
Revised05 May 2021
Accepted02 Jun 2021
Published21 Jun 2021

Abstract

The sixth-generation (6G) is envisioned as a pivotal technology that will support the ubiquitous seamless connectivity of substantial networks. The main advantage of 6G technology is leveraging Artificial Intelligence (AI) techniques for handling its interoperable functions. The pairing of 6G networks and AI creates new needs for infrastructure, data preparation, and governance. Thus, Intent-Based Network (IBN) architecture is a key infrastructure for 6G technology. Usually, these networks are formed of several clusters for data gathering from various heterogeneities in devices. Therefore, an important problem is to find the minimum transmission power for each node in the network clusters. This paper presents hybridization between two Computational Intelligence (CI) algorithms called the Marine Predator Algorithm and the Generalized Normal Distribution Optimization (MPGND). The proposed algorithm is applied to save power consumption which is an important problem in sustainable green 6G-IBN. MPGND is compared with several recently proposed algorithms, including Augmented Grey Wolf Optimizer (AGWO), Sine Tree-Seed Algorithm (STSA), Archimedes Optimization Algorithm (AOA), and Student Psychology-Based Optimization (SPBO). The experimental results with the statistical analysis demonstrate the merits and highly competitive performance of the proposed algorithm.

1. Introduction

The sixth-generation (6G) wireless network is the upcoming networking technology in many countries that will provide ubiquitous connectivity. This emerging technology is characterized by several features compared to the previous networking technologies such as holographic deep communication, Artificial Intelligence (AI), Visible Light Communication, 3D coverage frame, and ground and aerial wireless hotspots for cloud functionality [1]. One of the most influential of these features is the complete reliance on AI with its various technologies to control such a massive networking architecture. This has led to the emergence of the AI-empowered 6G or so-called Intent-Based Networks (IBNs) [2] in 6G technology.

IBN has been extracted from the well-known Software-Defined Network (SDN) as an emerging network infrastructure that poses a simple way for network administrators to achieve their intended goals [3]. Regarding 6G technology, pairing 6G with IBN architecture (6G-IBN) can offer optimization of the network efficiency. In particular, 6G-IBN is a technology that supports AI interference in the work of the network by collecting customer data and their requirements and autoconfiguring the network settings accordingly.

Several studies have been proposed for handling the problem of data manipulation in 6G-IBN and AI-empowered 6G architecture or in general networks’ architecture. For instance, Zhang and Zhu [4] presented a comprehensive survey of the AI-empowered 6G. The roles of AI in 6G architecture were categorized into radio interface, traffic control, security, management, and network optimization. The authors depicted that one of the main driving forces of enabling 6G with AI is lower energy consumption. In other words, the data burst from the ever-increasing number of small heterogeneous devices makes the power consumption of 6G particularly challenging, especially with the complexity of transceiver processing and the increase in end-user applications. Nawaz et al. [5] introduced a survey of potential usages of Quantum Machine Learning (QML) for the communication of 6G networks. The authors showed that handling the massive data traffic is a very difficult challenge for 6G technology because of high power consumption and the need for overhead security configurations. Zhou et al. [6] proposed a study of service-aware AI-empowered 6G. They mentioned that the efficient service of the 6G network depends on the collected information from end-users, even human sense information, including touch, smell, and taste, together with audio and visual data. Wei et al. [7] presented a study of the role of IBN in 6G technology. To our best knowledge, it is the only study that presents the IBN architecture for 6G technology. The authors showed that IBNs can continually learn and adapt to a changing network environment over time based on massive network data gathered in real time. So, 6G technology can exploit IBN architecture for an efficient communication experience.

From the previously discussed studies, it is clear that power-saving and data gathering are very imperative issues in AI-empowered 6G or 6G-IBN. In this paper, we proposed a hybrid Computational Intelligence (CI) algorithm for reducing energy consumption through the data gathering process in 6G-IBN. This problem is formulated as a minimization problem of single cluster transmission power [8], and ten different datasets have been solved. The experimental results and comparisons indicate the prosperity of the proposed algorithm. The remainder of the paper is organized as follows: Section 2 discusses the related works, Section 3 gives a definition of the regarded problem, Section 4 presents the proposed CI-based architecture, the experimental results are presented in Section 5, and finally, the conclusion is given in Section 6.

This section discusses several examples of literature that handle the network clustering problem and the general efforts exerted for reducing energy consumption in networks. For instance, Xiao et al. [9] proposed an energy-efficient clustering scheme for Highway Addressable Remote Transducer (WirelessHART) networks. In the proposed Adaptive Freeshape Clustering (AFC) protocol, the area of interest was divided into several fan-shaped clusters. The nodes in each cluster challenge the positions of the Cell Node (CN), and the successful one modifies their coverages radius to adaptively cover the clusters with the minimum overlapped areas. By doing this, each fan-shaped cluster was divided again into several free-shape regions with respect to each CN’s coverage, and the CN in each cluster was responsible for converge casting the data to the CH.

Rais et al. [10] introduced a Honeycomb Clustering Algorithm (EHCA) for energy-efficient honeycomb clustering. EHCA was characterized by being a hierarchical and a geographical protocol at the same time. Moreover, the proposed algorithm guarantees changing the cluster head’s location in each round. So, EHCA can balance the energy consumption in a given vertex of the honeycomb cluster.

Song et al. [11] presented a hybrid algorithm for efficient clustering and equalization routing of networks. In particular, the authors hybridized Particle Swarm Optimization (PSO) and Evolutionary Game Theory (EGT) algorithms for increasing the network lifetime. First, PSO was used for the selection of the CHs. After that, improved noncooperative evolutionary game theory was employed for a model building of the regarded energy waste problem caused by routing congestion.

Qureshi et al. [12] introduced the Gateway Clustering Energy-Efficient Centroid- (GCEEC-) based routing protocol for selecting the CH from the gateway nodes and centroid position. This assured that the gateway nodes reduce the data load from cluster head nodes and forward the data to the base station.

Pitchaimanickam and Murugaboopathi [13] combined the Firefly Algorithm (FA) with PSO for CH selection. The proposed algorithm was applied in the Centralized Low-Energy Adaptive Clustering Hierarchy (LEACH-C) which is an improved version of the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol.

Ali et al. [14] proposed a novel ARSH-FATI-based Cluster Head Selection (ARSH-FATI-CHS) algorithm integrated with a heuristic called novel ranked-based clustering (NRC) for CH selection. Moreover, the proposed algorithm took into account the residual energy, communication distance parameters, and workload in the selection process.

Baradaran and Navi [15] presented a high-quality clustering algorithm (HQCA) for reducing the clustering error and the intercluster and intracluster distances. In particular, the authors used fuzzy logic for selecting CH with respect to several criteria, including the residual energy and the cluster minimum and maximum energy and distances between the nodes.

Mehmood and Aadil [16] introduced an efficient clustering using the Dragonfly Algorithm (DA). The proposed algorithm was applied in the health sector. In particular, the proposed algorithm reduced the power consumption of the Wireless Body Area Network (WBAN) with tiny healthcare monitoring devices.

Han et al. [17] proposed a clustering algorithm called CPEH for efficient clustering in the energy harvesting wireless sensor networks. In CPEH, the node’s information was collected like the status of local energy, local density, and remote degree. Then, the collected information was used by fuzzy logic for the selection of cluster head and cluster size. Moreover, the Ant Colony Optimization (ACO) algorithm was used by CPEH for a highly efficient intercluster routing between cluster heads and the base station.

Regarding other efforts for energy saving of general networks, Di and Chen [18] proposed an Unmanned Aerial Vehicle- (UAV-) aided communication. In the proposed system, the drone first releases energy to a source and relay and then cooperatively transmitted the source and relayed information to their destination.

Zhu [19] presented an adaptive service mode mechanism based on online learning and a predictive method for an evolving service migration dependent on a factor graph model. This model was proposed to solve the problem of placement of computing services at the edge computing side.

Nabavi et al. [20] proposed a multitarget greedy approach to find the optimal pathway in WSN to the near-optimal pathway. The proposed model was presented in this method to transfer the physical data of the sensor network to the base station for the desired applications.

Nguyen and Kha [21] studied the trade-offs between the energy and the spectral efficiency in the full-duplex (FD) multiuser multi-input multioutput (MU-MIMO) cloud radio access networks (CRANs).

Jiang et al. [22] proposed an improved problem formulation to maximize total output on the condition of ensuring fair productivity. In addition, a back-propagation-assisted full-duplex wireless communications network (FDBA-WPCN) with a two-way access point (FAP) and multiple wireless power-gathering devices (WDs) has been introduced.

3. Green 6G-IBN

3.1. Problem Description

One of the most important advanced applications of CI algorithms is the provisioning of 6G technology networks. As mentioned before, the technology of 6G-IBN is an emerging networking paradigm that ensures a fully connected wireless network by leveraging collected data from end-users (see Figure 1). Unfortunately, 6G consists of numerous terrestrial or nonterrestrial clusters in order to maximize the network lifetime. This issue makes the energy-efficient collection of such a massive data flood a very difficult challenge.

In the clustering paradigm, each node is connected at least with another node in the same cluster and the base station (directly or indirectly) [23]. Node connectivity is a significant issue that can help the network to be more reliable with regard to provision collecting of emitted data. The main objective of this paper is to find the minimum sum power of each node in a single cluster that ensures the full connection of all nodes. In this paper, the proposed algorithm is used for energy saving in 6G-IBN networks causing a sustainable green 6G network paradigm [24]. Next, the definition of the problem will be discussed.

3.2. Mathematical Definition of the Problem

Assume a single cluster with an indirect graph of nodes that are linked through indirect links such that . The main objective of all cluster nodes is to send their packets to a sink node which is responsible for the external retransmitting of collected data. A constant threshold of signal strength is which is needed for reception and representation of the receiver sensitivity. In other words, the requirement of successful reception can be expressed as [25] where is a power of a node and is a spatial increasing function of distance between two cluster nodes and . In general, this is true for free-space propagation and the same degradation of signals.

Thus, the transmitted power vector can be calculated by merging and as where is the level of received power at node when node has a transmitting power .

The adequate connection happens when cluster node has enough power that confirms that the received signal is greater than the receiver sensitivity . In addition, the level of received power is a function that decreased with a proportion to the square distance according to Friis formula [26]. This indicates that a cluster node can save more energy when it chooses shorter communication links. After all, the objective function of the regarded problem can be expressed as

In other words, the main objective is to find the minimum power of transmission that ensures totally connected nodes in a single cluster.

Regarding the connectivity test of cluster nodes, it can be conducted by calculating the Laplacian matrix as [27] where is the number of connected nodes to a cluster node .

After the calculation of the Laplacian matrix, the Laplacian eigenvalue is calculated. If the second smallest eigenvalue of the Laplacian matrix is positive and there is at least one connection to a cluster node, then the single cluster nodes are verified to be fully connected.

4. Proposed Technique

4.1. Marine Predator Algorithm

The main inspiration of the Marine Predator Algorithm (MPA) [28] is the reciprocal action between predator and prey in the marine environment. This biological behavior is controlled by the behavior of Lévy and Brownian distribution. The MPA key hypotheses are as follows: (i)For environments with low intensity of prey, predators progress by the movement of Lévy; otherwise, they use the Brownian movement(ii)The percentages of the Lévy and Brownian movements are equal(iii)The predator behavior varies with respect to the factors of natural eddy formation or human-caused (FADs)(iv)A prey progress is either Brownian or Lévy while the predator uses Lévy’s strategy with a low ratio of velocity () as its best choice(v)In the case of prey Lévy or Brownian movement with a high-velocity ratio, the predator stops moving(vi)The best movement behavior for a predator is not moving at all in the case when prey is moving either Brownian or Lévy with a high ratio of velocity ().(vii)At high velocity, the prey uses good memory to remind its partners and a good hunt site

MPA begins with generating an initial random population. The generated solutions are evaluated and ordered according to their fitness. After that, a matrix of best solutions or best predators is constructed. In particular, the matrix of best solutions contains clones of the best solution according to the population size. Also, this matrix is updated at the end of each search procedure.

The MPA searching mechanism depends on three key phases with respect to the ratio level of velocity. In the first third of the searching procedures, the predator does not move at all in the case when the prey is moving, either Brownian or Lévy, in the early stage of the search or at a high rate of velocity (). This is achieved through the following: where is the step size of the prey, is a random vector derived from Brownian distribution, the notation means entry-wise multiplications, is the finest solution from the matrix of best predators, is the current candidate solution, is a predefined constant value, and is a uniform random vector derived between .

In the second third of the searching procedures, a predator moves by Brownian strategy if a prey movement has a Lévy behavior with . In particular, the community of search agents is separated into two subgroups. The first half is updated by where is a Lévy random vector.

The second half is calculated as the following: where is an adaptive parameter that can be computed as where is the current search iteration and is the total iteration number.

In the last third of the searching procedures, a predator moves by Lévy’s strategy with a low velocity () if prey progresses in either Brownian or Lévy behavior. The next solution is computed as

For a natural eddy formation or FADs, an additional searching phase is added. This condition occurs based on a predetermined probability (). Then, the calculation of the next candidate solutions will be as follows: where and are the searching area lower and upper bound vectors, respectively; is a random binary vector; is a uniform random value derived between ; and and are two randomly selected solutions. The MPA pseudocode is presented in Algorithm 1.

1: Set MPA parameters:
2: Generate the preliminary population with a size
3: while () do
4: Population evaluation
5: Create the best solution matrix
6:ifthen
7:  Apply the first phase of searching
8: elseifthen
9:  Split the population of prey
10:  Apply the second searching phase
11: else
12:  Apply the third searching phase
13: endif
14: FADs effect the population
15: Update the best solution matrix
16: endwhile
17: return the top predator
4.2. Generalized Normal Distribution Optimization

The Generalized Normal Distribution Optimization (GNDO) algorithm [29] emulates the model of a generalized normal distribution or so-called Gaussian distribution. In particular, each search agent updates its position according to a generalized normal distribution curve. The searching process begins with the initialization of random search agents. Then, the whole population is evaluated in order to determine the current global best solution. After that, the searching behavior is determined according to a predefined probability . In other words, if a random number is bigger than , then the exploitation phase is performed. First, the mean value of the whole population is calculated. After that, the next solution is computed as where is the next candidate solution. The other parameters , , and can be defined as where is the current candidate solution, is the global best solution, and is the mean of the current population. The parameters , , , and are uniform random numbers between .

On the other hand, the exploration phase is applied by computing the next candidate solution as where is a uniform random number between . The parameters and are random numbers selected from a normal distribution between , whereas the parameters and can be computed as where , , and are different randomly selected solutions from the current population. Algorithm 2 shows the GNDO pseudocode.

1: Set GNDO parameters
2: Initialize the initial population
3: Evaluate each solution
4: Define the global best solution
5: while () do
6:ifthen
7:  Compute the mean of the population
8:  Find , , and
8:  Apply the exploitation phase
9: else
10:  Find and
11:  Apply the exploration phase
14: endif
15: endwhile
16: return the best solution
4.3. Proposed Hybrid CI Algorithm

In this paper, the original MPA is a hybrid with the GNDO’s exploitation phase. The pseudocode of the proposed hybrid algorithm (MPGND) is presented in Algorithm 3.

1: Set MPA parameters:
2: Generate the preliminary population with a size
3: while () do
4: Population evaluation
5: Create the best solution matrix
6:ifthen
7:  Apply the first phase of searching
8: elseifthen
9:  Split the population of prey
10:  Apply the second searching phase
11: else
12:  Apply the third searching phase
13: endif
14: FADs effect the population
15: Update the best solution matrix
16: if
17:  Compute the mean of prey population
18:  Find , , and
19:  Apply GNDO exploitation phase
20: endif
21: endwhile
22: return the best solution

5. Experimental Results

In this section, the proposed algorithm is applied to solve the problem of a single cluster power saving. The ten experiment datasets are obtained from [30], whereas the characteristics of the selected datasets are presented in Table 1. In this experiment, MPGND is compared with many metaheuristics, including the original MPA, GNDO, Augmented Grey Wolf Optimizer (AGWO) [31], Sine Tree-Seed Algorithm (STSA) [32], Archimedes Optimization Algorithm (AOA) [33], and Student Psychology-Based Optimization (SPBO) [34] algorithm. The number of total search iterations of all algorithms is set to 500 while the population size is set to 30. The other parameters of the compared algorithms are given in Table 2. The descriptive statistics of MPGND and the compared algorithms after 30 independent runs are exposed in Table 3. As observed, MPGND significantly outperforms the other algorithms in minimizing the sum of the transmission power of cluster nodes. In addition, it is able to reach a feasible solution compared to the other algorithms. For analyzing the performance of MPGND and the comparators, the one-way ANOVA test [35] is performed with a significant value equal to 0.05. As shown in Figures 211, MPGND is better than the other algorithms. This indicates that the MPGND-obtained transmission power values are lower than those of the other comparators.


ParameterValue

Range of transmission power dBm
Transmission frequency915 MHz
Number of cluster nodes20
Area of a single cluster
Receiver sensitivity-60 dBm


AlgorithmParameterValue

MPAFish aggregating devices (FADs)0.2
constant0.5
MPGNDFish aggregating devices (FADs)0.2
constant0.5
Probability of GNDO’s exploitation occurrence0.2
GNDOSwitching probability 0.5
STSAControlling parameter (ST)0.6
Switching probability0.3
AOAConstant 1
Constant 6
Constant 1
Constant 2


DatasetAlgorithmsMinimumMaximumMeanStd. deviation value

Dataset 1MPGND-5.0353-4.6055-4.9717990.08422450.3725
MPA-5.03900.8748-4.7360401.0733152
GNDO-4.6940NANANA
STSA1.38673.80492.9927321.0432979
AGWO4.36128.04876.2509860.5431646
AOA11.429113.010312.8714800.4258639
SPBO5.7984NANANA
Dataset 2MPGND-7.6795-7.4268-7.6193330.05334621.7219-37
MPA-7.6737-7.4363-7.6093630.0558062
GNDO-7.4016-5.7387-6.6300760.4245837
STSA1.29873.44762.4836300.6018840
AGWO-1.35478.64275.1207092.5246429
AOA4.960813.010311.5408792.8188932
SPBO4.3756NANANA
Dataset 3MPGND-5.0329-4.7821-4.9630540.06048512.6711-56
MPA-5.0320-3.0296-4.8477410.4636465
GNDO-4.58562.4853-2.9417801.5729501
STSA1.59814.13612.9820840.5763874
AGWO2.58648.63885.6280071.3833722
AOA11.027113.010312.8566820.4839176
SPBO5.6385NANANA
Dataset 4MPGND-6.2499-6.0708-6.2047470.04158122.14592-22
MPA-6.2479-5.3300-6.1701700.1623287
GNDO-6.0514-4.8293-5.4831680.2581445
STSA0.96363.83982.2919700.6265332
AGWO-1.12768.05905.2802502.2070198
AOA4.800113.010311.7565452.5926190
SPBO1.8805NANANA
Dataset 5MPGND-7.6628-6.0328-7.5565240.29275832.6711-56
MPA-7.6702-7.4857-7.6123440.0424757
GNDO-7.5239-5.6587-6.4901700.5304868
STSA1.20613.61502.4488040.6424697
AGWO-1.41157.36414.8971112.3316796
AOA4.045713.010311.9791762.7014299
SPBO4.8835NANANA
Dataset 6MPGND-6.2420-6.0254-6.1948830.04548566.4893-20
MPA-6.2520-6.0199-6.2049550.0499140
GNDO-5.9981NANANA
STSA1.10073.13142.2956110.4713219
AGWO-0.01417.33844.6977821.8008367
AOA3.555513.010312.0762952.4419530
SPBO4.2507NANANA
Dataset 7MPGND-5.0351-4.8050-4.9602840.05334604.437-60
MPA-5.0304-0.0620-4.7832090.8989318
GNDO-3.1342NANANA
STSA2.02323.95663.1780770.4732431
AGWO2.92108.15776.2840941.2189823
AOA11.351613.010312.8629740.4515585
SPBO8.0443NANANA
Dataset 8MPGND-7.2786-6.6134-7.1938370.12339366.1764-34
MPA-7.2788-5.2792-7.1232290.3626609
GNDO-6.7108-4.0510-5.8534000.6097682
STSA1.28953.13272.4953110.4558036
AGWO-0.76108.56114.8410222.6100941
AOA4.639513.010312.3503211.8322584
SPBO4.8479NANANA
Dataset 9MPGND-5.0368-4.4658-4.9172260.14788346.44134-53
MPA-5.0352-2.5880-4.8489560.4633953
GNDO-3.8810NANANA
STSA2.22824.30813.3949010.4834886
AGWO4.55808.16046.5150270.8505038
AOA11.846213.010312.9714960.2125355
SPBO7.6914NANANA
Dataset 10MPGND-4.4953-4.1923-4.4205550.08322734.4372-60
MPA-4.4941-3.1240-4.3599110.2772618
GNDO-3.8503NANANA
STSA1.81894.20353.4075940.5210286
AGWO3.06098.78886.3903481.5931690
AOA11.488613.010312.8237810.4858622
SPBO6.5527NANANA

NA: not a number.

6. Conclusion

6G-IBN or the AI-empowered 6G network mainly depends on the efficiency of the data collection process. In this paper, the MPGND algorithm is introduced for a power-efficient collection of user information in IBN. The proposed algorithm is compared with several other algorithms on ten different datasets. From the comparison with the original MPA, the final obtained results of MPGND are better than MPA because of the additional exploitation phase. Although the difference between the solutions of MPA and MPGND appears very small, the difference becomes significant with the increment of the cluster numbers. In addition, the proposed algorithm is significantly better than the other comparators for the ten datasets.

For future works, we suggest using the proposed algorithm for solving other 6G-related problems such as scheduling, coverage, and security. Also, it is suggested to use the proposed algorithm for solving the regarded problem with the increment of the number of clusters.

Data Availability

The benchmark case studies, experiment results, and any other data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

References

  1. J. Zhang, X. Yue, X. Li, H. Zhang, T. Ni, and W. Lin, “Secrecy-oriented optimization of sparse code multiple access for simultaneous wireless information and power transfer in 6G aerial access networks,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 9922043, 11 pages, 2021. View at: Publisher Site | Google Scholar
  2. A. Leivadeas and M. Falkner, “VNF placement problem: a multi-tenant intent-based networking approach,” in 2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), pp. 143–150, Paris, France, March 2021. View at: Publisher Site | Google Scholar
  3. M. Medvetskyi, M. Beshley, and M. Klymash, “A quality of experience management method for intent-based software-defined networks,” in 2021 IEEE 16th International Conference on the Experience of Designing and Application of CAD Systems (CADSM), pp. 59–62, Lviv, Ukraine, February 2021. View at: Publisher Site | Google Scholar
  4. S. Zhang and D. Zhu, “Towards artificial intelligence enabled 6G: state of the art, challenges, and opportunities,” in Computer Networks, vol. 183, p. 107556, Elsevier B.V, 2020. View at: Publisher Site | Google Scholar
  5. S. J. Nawaz, S. K. Sharma, S. Wyne, M. N. Patwary, and M. Asaduzzaman, “Quantum machine learning for 6G communication networks: state-of-the-art and vision for the future,” IEEE Access, vol. 7, pp. 46317–46350, 2019. View at: Publisher Site | Google Scholar
  6. Y. Zhou, L. Liu, L. Wang et al., “Service-aware 6G: an intelligent and open network based on the convergence of communication, computing and caching,” in Digital Communications and Networks, vol. 6, no. 3, pp. 253–260, Chongqing University of Posts and Telecommunications, 2020. View at: Publisher Site | Google Scholar
  7. Y. Wei, M. Peng, and Y. Liu, “Intent-based networks for 6G: insights and challenges,” Digital Communications and Networks, vol. 6, no. 3, pp. 270–280, 2020. View at: Publisher Site | Google Scholar
  8. E. Figueiredo, M. Macedo, H. V. Siqueira, C. J. Santana Jr., A. Gokhale, and C. J. A. Bastos-Filho, “Swarm intelligence for clustering -- a systematic review with new perspectives on data mining,” Engineering Applications of Artificial Intelligence, vol. 82, pp. 313–329, 2019. View at: Publisher Site | Google Scholar
  9. G. Xiao, J. Shi, N. Sun, Y. Chen, and Y. Zhang, “Adaptive freeshape clustering for balanced energy saving in the WirelessHART networks,” Complexity, vol. 2019, Article ID 2836981, 11 pages, 2019. View at: Publisher Site | Google Scholar
  10. A. Rais, K. Bouragba, and M. Ouzzif, “Routing and clustering of sensor nodes in the honeycomb architecture,” Journal of Computer Networks and Communications, vol. 2019, Article ID 4861294, 12 pages, 2019. View at: Publisher Site | Google Scholar
  11. Y. Song, Z. Liu, and X. He, “Hybrid PSO and evolutionary game theory protocol for clustering and routing in wireless sensor network,” Journal of Sensors, vol. 2020, Article ID 8817815, 20 pages, 2020. View at: Publisher Site | Google Scholar
  12. K. N. Qureshi, M. U. Bashir, J. Lloret, and A. Leon, “Optimized cluster-based dynamic energy-aware routing protocol for wireless sensor networks in agriculture precision,” Journal of Sensors, vol. 2020, Article ID 9040395, 19 pages, 2020. View at: Publisher Site | Google Scholar
  13. B. Pitchaimanickam and G. Murugaboopathi, “A hybrid firefly algorithm with particle swarm optimization for energy efficient optimal cluster head selection in wireless sensor networks,” Neural Computing and Applications, vol. 32, no. 12, pp. 7709–7723, 2020. View at: Publisher Site | Google Scholar
  14. H. Ali, U. U. Tariq, M. Hussain, L. Lu, J. Panneerselvam, and X. Zhai, “ARSH-FATI a novel metaheuristic for cluster head selection in wireless sensor networks,” IEEE Systems Journal, no. 2, pp. 1–12, 2020. View at: Publisher Site | Google Scholar
  15. A. A. Baradaran and K. Navi, “HQCA-WSN: high-quality clustering algorithm and optimal cluster head selection using fuzzy logic in wireless sensor networks,” Fuzzy Sets and Systems, vol. 389, pp. 114–144, 2020. View at: Publisher Site | Google Scholar
  16. B. Mehmood and F. Aadil, “An efficient clustering technique for wireless body area networks based on dragonfly optimization,” in Internet of Things in Business Transformation, pp. 27–42, Wiley, 2021. View at: Publisher Site | Google Scholar
  17. Y. Han, J. Su, G. Wen, Y. He, and J. Li, “CPEH: a clustering protocol for the energy harvesting wireless sensor networks,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 5533374, 14 pages, 2021. View at: Publisher Site | Google Scholar
  18. X. Di and Y. Chen, “Joint position and time allocation optimization of UAV-aided wireless powered relay communication systems,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 5537517, 10 pages, 2021. View at: Publisher Site | Google Scholar
  19. Y. Zhu, “Network public opinion prediction and control based on edge computing and artificial intelligence new paradigm,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 5566647, 11 pages, 2021. View at: Publisher Site | Google Scholar
  20. S. R. Nabavi, N. O. Eraghi, and J. A. Torkestani, “WSN routing protocol using a multiobjective greedy approach,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 6664669, 12 pages, 2021. View at: Publisher Site | Google Scholar
  21. X.-X. Nguyen and H. H. Kha, “Energy-spectral efficiency trade-offs in full-duplex MU-MIMO cloud-RANs with SWIPT,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 6678792, 21 pages, 2021. View at: Publisher Site | Google Scholar
  22. R. Jiang, M. Liu, X. Wang, and Y. Xu, “Fairness-aware resource allocation in full-duplex backscatter-assisted wireless powered communication networks,” Wireless Communications and Mobile Computing, vol. 2021, Article ID 8842562, 10 pages, 2021. View at: Publisher Site | Google Scholar
  23. A. Shahraki, A. Taherkordi, Ø. Haugen, and F. Eliassen, “Clustering objectives in wireless sensor networks: a survey and research direction analysis,” Computer Networks, vol. 180, p. 107376, 2020. View at: Publisher Site | Google Scholar
  24. T. Huang, W. Yang, J. Wu, J. Ma, X. Zhang, and D. Zhang, “A survey on green 6G network: architecture and technologies,” IEEE Access, vol. 7, pp. 175758–175768, 2019. View at: Publisher Site | Google Scholar
  25. J. C. Silva, F. Andery, D. Mazzer, and L. D. P. Mendes, “Factorial design analysis applied to the performance of transmission power optimization techniques for wireless sensor networks,” in Proceedings of the XXII Iberchip Workshop, vol. 28, Florianopolis, Brazil, 2016. View at: Google Scholar
  26. N. S. Perovic, M. Renzo, and M. F. Flanagan, “Channel capacity optimization using reconfigurable intelligent surfaces in indoor mmWave environments,” in IEEE International Conference on Communications, vol. 2020, Institute of Electrical and Electronics Engineers Inc, 2020. View at: Publisher Site | Google Scholar
  27. A. Jahanbani, S. M. Sheikholeslami, and R. Khoeilar, “On the spectrum of laplacian matrix,” Mathematical Problems in Engineering, vol. 2021, Article ID 8096874, 4 pages, 2021. View at: Publisher Site | Google Scholar
  28. A. Faramarzi, M. Heidarinejad, S. Mirjalili, and A. H. Gandomi, “Marine predators algorithm: a nature-inspired metaheuristic,” Expert Systems with Applications, vol. 152, p. 113377, 2020. View at: Publisher Site | Google Scholar
  29. Y. Zhang, Z. Jin, and S. Mirjalili, “Generalized normal distribution optimization and its applications in parameter extraction of photovoltaic models,” Energy Conversion and Management, vol. 224, p. 113301, 2020. View at: Publisher Site | Google Scholar
  30. G. L. da Silva Fré, J. de Carvalho Silva, F. A. Reis, and L. D. P. Mendes, “Particle swarm optimization implementation for minimal transmission power providing a fully-connected cluster for the internet of things,” in 2015 International Workshop on Telecommunications (IWT), pp. 1–7, Santa Rita do Sapucai, Brazil, June 2015. View at: Publisher Site | Google Scholar
  31. M. H. Qais, H. M. Hasanien, and S. Alghuwainem, “Augmented grey wolf optimizer for grid-connected PMSG-based wind energy conversion systems,” Applied Soft Computing, vol. 69, pp. 504–515, 2018. View at: Publisher Site | Google Scholar
  32. J. Jiang, M. Xu, X. Meng, and K. Li, “STSA: a sine tree-seed algorithm for complex continuous optimization problems,” Physica A: Statistical Mechanics and its Applications, vol. 537, p. 122802, 2020. View at: Publisher Site | Google Scholar
  33. F. A. Hashim, K. Hussain, E. H. Houssein, M. S. Mabrouk, and W. al-Atabany, “Archimedes optimization algorithm: a new metaheuristic algorithm for solving optimization problems,” Applied Intelligence, vol. 51, no. 3, pp. 1531–1551, 2020. View at: Publisher Site | Google Scholar
  34. B. Das, V. Mukherjee, and D. Das, “Student psychology based optimization algorithm: a new population based optimization algorithm for solving optimization problems,” Advances in Engineering Software, vol. 146, p. 102804, 2020. View at: Publisher Site | Google Scholar
  35. J. T. Zhang, M. Y. Cheng, H. T. Wu, and B. Zhou, “A new test for functional one-way ANOVA with applications to ischemic heart screening,” Computational Statistics & Data Analysis, vol. 132, pp. 3–17, 2019. View at: Publisher Site | Google Scholar

Copyright © 2021 Khalid A. Eldrandaly et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Related articles

No related content is available yet for this article.
 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder
Views378
Downloads375
Citations

Related articles

No related content is available yet for this article.

Article of the Year Award: Outstanding research contributions of 2021, as selected by our Chief Editors. Read the winning articles.