Abstract

The sixth-generation (6G) is envisioned as a pivotal technology that will support the ubiquitous seamless connectivity of substantial networks. The main advantage of 6G technology is leveraging Artificial Intelligence (AI) techniques for handling its interoperable functions. The pairing of 6G networks and AI creates new needs for infrastructure, data preparation, and governance. Thus, Intent-Based Network (IBN) architecture is a key infrastructure for 6G technology. Usually, these networks are formed of several clusters for data gathering from various heterogeneities in devices. Therefore, an important problem is to find the minimum transmission power for each node in the network clusters. This paper presents hybridization between two Computational Intelligence (CI) algorithms called the Marine Predator Algorithm and the Generalized Normal Distribution Optimization (MPGND). The proposed algorithm is applied to save power consumption which is an important problem in sustainable green 6G-IBN. MPGND is compared with several recently proposed algorithms, including Augmented Grey Wolf Optimizer (AGWO), Sine Tree-Seed Algorithm (STSA), Archimedes Optimization Algorithm (AOA), and Student Psychology-Based Optimization (SPBO). The experimental results with the statistical analysis demonstrate the merits and highly competitive performance of the proposed algorithm.

1. Introduction

The sixth-generation (6G) wireless network is the upcoming networking technology in many countries that will provide ubiquitous connectivity. This emerging technology is characterized by several features compared to the previous networking technologies such as holographic deep communication, Artificial Intelligence (AI), Visible Light Communication, 3D coverage frame, and ground and aerial wireless hotspots for cloud functionality [1]. One of the most influential of these features is the complete reliance on AI with its various technologies to control such a massive networking architecture. This has led to the emergence of the AI-empowered 6G or so-called Intent-Based Networks (IBNs) [2] in 6G technology.

IBN has been extracted from the well-known Software-Defined Network (SDN) as an emerging network infrastructure that poses a simple way for network administrators to achieve their intended goals [3]. Regarding 6G technology, pairing 6G with IBN architecture (6G-IBN) can offer optimization of the network efficiency. In particular, 6G-IBN is a technology that supports AI interference in the work of the network by collecting customer data and their requirements and autoconfiguring the network settings accordingly.

Several studies have been proposed for handling the problem of data manipulation in 6G-IBN and AI-empowered 6G architecture or in general networks’ architecture. For instance, Zhang and Zhu [4] presented a comprehensive survey of the AI-empowered 6G. The roles of AI in 6G architecture were categorized into radio interface, traffic control, security, management, and network optimization. The authors depicted that one of the main driving forces of enabling 6G with AI is lower energy consumption. In other words, the data burst from the ever-increasing number of small heterogeneous devices makes the power consumption of 6G particularly challenging, especially with the complexity of transceiver processing and the increase in end-user applications. Nawaz et al. [5] introduced a survey of potential usages of Quantum Machine Learning (QML) for the communication of 6G networks. The authors showed that handling the massive data traffic is a very difficult challenge for 6G technology because of high power consumption and the need for overhead security configurations. Zhou et al. [6] proposed a study of service-aware AI-empowered 6G. They mentioned that the efficient service of the 6G network depends on the collected information from end-users, even human sense information, including touch, smell, and taste, together with audio and visual data. Wei et al. [7] presented a study of the role of IBN in 6G technology. To our best knowledge, it is the only study that presents the IBN architecture for 6G technology. The authors showed that IBNs can continually learn and adapt to a changing network environment over time based on massive network data gathered in real time. So, 6G technology can exploit IBN architecture for an efficient communication experience.

From the previously discussed studies, it is clear that power-saving and data gathering are very imperative issues in AI-empowered 6G or 6G-IBN. In this paper, we proposed a hybrid Computational Intelligence (CI) algorithm for reducing energy consumption through the data gathering process in 6G-IBN. This problem is formulated as a minimization problem of single cluster transmission power [8], and ten different datasets have been solved. The experimental results and comparisons indicate the prosperity of the proposed algorithm. The remainder of the paper is organized as follows: Section 2 discusses the related works, Section 3 gives a definition of the regarded problem, Section 4 presents the proposed CI-based architecture, the experimental results are presented in Section 5, and finally, the conclusion is given in Section 6.

This section discusses several examples of literature that handle the network clustering problem and the general efforts exerted for reducing energy consumption in networks. For instance, Xiao et al. [9] proposed an energy-efficient clustering scheme for Highway Addressable Remote Transducer (WirelessHART) networks. In the proposed Adaptive Freeshape Clustering (AFC) protocol, the area of interest was divided into several fan-shaped clusters. The nodes in each cluster challenge the positions of the Cell Node (CN), and the successful one modifies their coverages radius to adaptively cover the clusters with the minimum overlapped areas. By doing this, each fan-shaped cluster was divided again into several free-shape regions with respect to each CN’s coverage, and the CN in each cluster was responsible for converge casting the data to the CH.

Rais et al. [10] introduced a Honeycomb Clustering Algorithm (EHCA) for energy-efficient honeycomb clustering. EHCA was characterized by being a hierarchical and a geographical protocol at the same time. Moreover, the proposed algorithm guarantees changing the cluster head’s location in each round. So, EHCA can balance the energy consumption in a given vertex of the honeycomb cluster.

Song et al. [11] presented a hybrid algorithm for efficient clustering and equalization routing of networks. In particular, the authors hybridized Particle Swarm Optimization (PSO) and Evolutionary Game Theory (EGT) algorithms for increasing the network lifetime. First, PSO was used for the selection of the CHs. After that, improved noncooperative evolutionary game theory was employed for a model building of the regarded energy waste problem caused by routing congestion.

Qureshi et al. [12] introduced the Gateway Clustering Energy-Efficient Centroid- (GCEEC-) based routing protocol for selecting the CH from the gateway nodes and centroid position. This assured that the gateway nodes reduce the data load from cluster head nodes and forward the data to the base station.

Pitchaimanickam and Murugaboopathi [13] combined the Firefly Algorithm (FA) with PSO for CH selection. The proposed algorithm was applied in the Centralized Low-Energy Adaptive Clustering Hierarchy (LEACH-C) which is an improved version of the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol.

Ali et al. [14] proposed a novel ARSH-FATI-based Cluster Head Selection (ARSH-FATI-CHS) algorithm integrated with a heuristic called novel ranked-based clustering (NRC) for CH selection. Moreover, the proposed algorithm took into account the residual energy, communication distance parameters, and workload in the selection process.

Baradaran and Navi [15] presented a high-quality clustering algorithm (HQCA) for reducing the clustering error and the intercluster and intracluster distances. In particular, the authors used fuzzy logic for selecting CH with respect to several criteria, including the residual energy and the cluster minimum and maximum energy and distances between the nodes.

Mehmood and Aadil [16] introduced an efficient clustering using the Dragonfly Algorithm (DA). The proposed algorithm was applied in the health sector. In particular, the proposed algorithm reduced the power consumption of the Wireless Body Area Network (WBAN) with tiny healthcare monitoring devices.

Han et al. [17] proposed a clustering algorithm called CPEH for efficient clustering in the energy harvesting wireless sensor networks. In CPEH, the node’s information was collected like the status of local energy, local density, and remote degree. Then, the collected information was used by fuzzy logic for the selection of cluster head and cluster size. Moreover, the Ant Colony Optimization (ACO) algorithm was used by CPEH for a highly efficient intercluster routing between cluster heads and the base station.

Regarding other efforts for energy saving of general networks, Di and Chen [18] proposed an Unmanned Aerial Vehicle- (UAV-) aided communication. In the proposed system, the drone first releases energy to a source and relay and then cooperatively transmitted the source and relayed information to their destination.

Zhu [19] presented an adaptive service mode mechanism based on online learning and a predictive method for an evolving service migration dependent on a factor graph model. This model was proposed to solve the problem of placement of computing services at the edge computing side.

Nabavi et al. [20] proposed a multitarget greedy approach to find the optimal pathway in WSN to the near-optimal pathway. The proposed model was presented in this method to transfer the physical data of the sensor network to the base station for the desired applications.

Nguyen and Kha [21] studied the trade-offs between the energy and the spectral efficiency in the full-duplex (FD) multiuser multi-input multioutput (MU-MIMO) cloud radio access networks (CRANs).

Jiang et al. [22] proposed an improved problem formulation to maximize total output on the condition of ensuring fair productivity. In addition, a back-propagation-assisted full-duplex wireless communications network (FDBA-WPCN) with a two-way access point (FAP) and multiple wireless power-gathering devices (WDs) has been introduced.

3. Green 6G-IBN

3.1. Problem Description

One of the most important advanced applications of CI algorithms is the provisioning of 6G technology networks. As mentioned before, the technology of 6G-IBN is an emerging networking paradigm that ensures a fully connected wireless network by leveraging collected data from end-users (see Figure 1). Unfortunately, 6G consists of numerous terrestrial or nonterrestrial clusters in order to maximize the network lifetime. This issue makes the energy-efficient collection of such a massive data flood a very difficult challenge.

In the clustering paradigm, each node is connected at least with another node in the same cluster and the base station (directly or indirectly) [23]. Node connectivity is a significant issue that can help the network to be more reliable with regard to provision collecting of emitted data. The main objective of this paper is to find the minimum sum power of each node in a single cluster that ensures the full connection of all nodes. In this paper, the proposed algorithm is used for energy saving in 6G-IBN networks causing a sustainable green 6G network paradigm [24]. Next, the definition of the problem will be discussed.

3.2. Mathematical Definition of the Problem

Assume a single cluster with an indirect graph of nodes that are linked through indirect links such that . The main objective of all cluster nodes is to send their packets to a sink node which is responsible for the external retransmitting of collected data. A constant threshold of signal strength is which is needed for reception and representation of the receiver sensitivity. In other words, the requirement of successful reception can be expressed as [25] where is a power of a node and is a spatial increasing function of distance between two cluster nodes and . In general, this is true for free-space propagation and the same degradation of signals.

Thus, the transmitted power vector can be calculated by merging and as where is the level of received power at node when node has a transmitting power .

The adequate connection happens when cluster node has enough power that confirms that the received signal is greater than the receiver sensitivity . In addition, the level of received power is a function that decreased with a proportion to the square distance according to Friis formula [26]. This indicates that a cluster node can save more energy when it chooses shorter communication links. After all, the objective function of the regarded problem can be expressed as

In other words, the main objective is to find the minimum power of transmission that ensures totally connected nodes in a single cluster.

Regarding the connectivity test of cluster nodes, it can be conducted by calculating the Laplacian matrix as [27] where is the number of connected nodes to a cluster node .

After the calculation of the Laplacian matrix, the Laplacian eigenvalue is calculated. If the second smallest eigenvalue of the Laplacian matrix is positive and there is at least one connection to a cluster node, then the single cluster nodes are verified to be fully connected.

4. Proposed Technique

4.1. Marine Predator Algorithm

The main inspiration of the Marine Predator Algorithm (MPA) [28] is the reciprocal action between predator and prey in the marine environment. This biological behavior is controlled by the behavior of Lévy and Brownian distribution. The MPA key hypotheses are as follows: (i)For environments with low intensity of prey, predators progress by the movement of Lévy; otherwise, they use the Brownian movement(ii)The percentages of the Lévy and Brownian movements are equal(iii)The predator behavior varies with respect to the factors of natural eddy formation or human-caused (FADs)(iv)A prey progress is either Brownian or Lévy while the predator uses Lévy’s strategy with a low ratio of velocity () as its best choice(v)In the case of prey Lévy or Brownian movement with a high-velocity ratio, the predator stops moving(vi)The best movement behavior for a predator is not moving at all in the case when prey is moving either Brownian or Lévy with a high ratio of velocity ().(vii)At high velocity, the prey uses good memory to remind its partners and a good hunt site

MPA begins with generating an initial random population. The generated solutions are evaluated and ordered according to their fitness. After that, a matrix of best solutions or best predators is constructed. In particular, the matrix of best solutions contains clones of the best solution according to the population size. Also, this matrix is updated at the end of each search procedure.

The MPA searching mechanism depends on three key phases with respect to the ratio level of velocity. In the first third of the searching procedures, the predator does not move at all in the case when the prey is moving, either Brownian or Lévy, in the early stage of the search or at a high rate of velocity (). This is achieved through the following: where is the step size of the prey, is a random vector derived from Brownian distribution, the notation means entry-wise multiplications, is the finest solution from the matrix of best predators, is the current candidate solution, is a predefined constant value, and is a uniform random vector derived between .

In the second third of the searching procedures, a predator moves by Brownian strategy if a prey movement has a Lévy behavior with . In particular, the community of search agents is separated into two subgroups. The first half is updated by where is a Lévy random vector.

The second half is calculated as the following: where is an adaptive parameter that can be computed as where is the current search iteration and is the total iteration number.

In the last third of the searching procedures, a predator moves by Lévy’s strategy with a low velocity () if prey progresses in either Brownian or Lévy behavior. The next solution is computed as

For a natural eddy formation or FADs, an additional searching phase is added. This condition occurs based on a predetermined probability (). Then, the calculation of the next candidate solutions will be as follows: where and are the searching area lower and upper bound vectors, respectively; is a random binary vector; is a uniform random value derived between ; and and are two randomly selected solutions. The MPA pseudocode is presented in Algorithm 1.

1: Set MPA parameters:
2: Generate the preliminary population with a size
3: while () do
4: Population evaluation
5: Create the best solution matrix
6:ifthen
7:  Apply the first phase of searching
8: elseifthen
9:  Split the population of prey
10:  Apply the second searching phase
11: else
12:  Apply the third searching phase
13: endif
14: FADs effect the population
15: Update the best solution matrix
16: endwhile
17: return the top predator
4.2. Generalized Normal Distribution Optimization

The Generalized Normal Distribution Optimization (GNDO) algorithm [29] emulates the model of a generalized normal distribution or so-called Gaussian distribution. In particular, each search agent updates its position according to a generalized normal distribution curve. The searching process begins with the initialization of random search agents. Then, the whole population is evaluated in order to determine the current global best solution. After that, the searching behavior is determined according to a predefined probability . In other words, if a random number is bigger than , then the exploitation phase is performed. First, the mean value of the whole population is calculated. After that, the next solution is computed as where is the next candidate solution. The other parameters , , and can be defined as where is the current candidate solution, is the global best solution, and is the mean of the current population. The parameters , , , and are uniform random numbers between .

On the other hand, the exploration phase is applied by computing the next candidate solution as where is a uniform random number between . The parameters and are random numbers selected from a normal distribution between , whereas the parameters and can be computed as where , , and are different randomly selected solutions from the current population. Algorithm 2 shows the GNDO pseudocode.

1: Set GNDO parameters
2: Initialize the initial population
3: Evaluate each solution
4: Define the global best solution
5: while () do
6:ifthen
7:  Compute the mean of the population
8:  Find , , and
8:  Apply the exploitation phase
9: else
10:  Find and
11:  Apply the exploration phase
14: endif
15: endwhile
16: return the best solution
4.3. Proposed Hybrid CI Algorithm

In this paper, the original MPA is a hybrid with the GNDO’s exploitation phase. The pseudocode of the proposed hybrid algorithm (MPGND) is presented in Algorithm 3.

1: Set MPA parameters:
2: Generate the preliminary population with a size
3: while () do
4: Population evaluation
5: Create the best solution matrix
6:ifthen
7:  Apply the first phase of searching
8: elseifthen
9:  Split the population of prey
10:  Apply the second searching phase
11: else
12:  Apply the third searching phase
13: endif
14: FADs effect the population
15: Update the best solution matrix
16: if
17:  Compute the mean of prey population
18:  Find , , and
19:  Apply GNDO exploitation phase
20: endif
21: endwhile
22: return the best solution

5. Experimental Results

In this section, the proposed algorithm is applied to solve the problem of a single cluster power saving. The ten experiment datasets are obtained from [30], whereas the characteristics of the selected datasets are presented in Table 1. In this experiment, MPGND is compared with many metaheuristics, including the original MPA, GNDO, Augmented Grey Wolf Optimizer (AGWO) [31], Sine Tree-Seed Algorithm (STSA) [32], Archimedes Optimization Algorithm (AOA) [33], and Student Psychology-Based Optimization (SPBO) [34] algorithm. The number of total search iterations of all algorithms is set to 500 while the population size is set to 30. The other parameters of the compared algorithms are given in Table 2. The descriptive statistics of MPGND and the compared algorithms after 30 independent runs are exposed in Table 3. As observed, MPGND significantly outperforms the other algorithms in minimizing the sum of the transmission power of cluster nodes. In addition, it is able to reach a feasible solution compared to the other algorithms. For analyzing the performance of MPGND and the comparators, the one-way ANOVA test [35] is performed with a significant value equal to 0.05. As shown in Figures 211, MPGND is better than the other algorithms. This indicates that the MPGND-obtained transmission power values are lower than those of the other comparators.

6. Conclusion

6G-IBN or the AI-empowered 6G network mainly depends on the efficiency of the data collection process. In this paper, the MPGND algorithm is introduced for a power-efficient collection of user information in IBN. The proposed algorithm is compared with several other algorithms on ten different datasets. From the comparison with the original MPA, the final obtained results of MPGND are better than MPA because of the additional exploitation phase. Although the difference between the solutions of MPA and MPGND appears very small, the difference becomes significant with the increment of the cluster numbers. In addition, the proposed algorithm is significantly better than the other comparators for the ten datasets.

For future works, we suggest using the proposed algorithm for solving other 6G-related problems such as scheduling, coverage, and security. Also, it is suggested to use the proposed algorithm for solving the regarded problem with the increment of the number of clusters.

Data Availability

The benchmark case studies, experiment results, and any other data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.