Skip to main content

Global sensing search for nonlinear global optimization

Research Abstract

Metaheuristics are powerful and generic global search methods. Most metaheuristics methods are not fully equipped with learning processes. Therefore, most of the search history is not reused in further steps of metaheuristics. The main aim of this research is to develop a general framework for automating and enhancing the search process and procedures in metaheuristics. The proposed framework, called Global Sensing Search (GSS), utilizes search memories to equip the search with applicable sensing features and adaptive learning elements to find a better solution and explore more diverse ones. Moreover, the GSS framework applies different search conditions to check the need for using suitable intensification and/or diversification strategies and also for terminating the search. An implementation of the GSS framework is proposed to alter the structure of standard genetic algorithms (GAs). Therefore, a new GA-based method called Genetic Sensing Algorithm is presented. The computational experiments show the efficiency of the proposed methods.

Research Authors
Abdel-Rahman Hedar, Wael Deabes, Hesham H Amin, Majid Almaraashi, Masao Fukushima
Research Date
Research Department
Research Journal
Journal of Global Optimization
Research Pages
1-50
Research Publisher
Springer US
Research Website
https://link.springer.com/article/10.1007/s10898-021-01075-2
Research Year
2021

Simulated Annealing with Exploratory Sensing for Global Optimization

Research Abstract

Simulated annealing is a well-known search algorithm used with success history in many search problems. However, the random walk of the simulated annealing does not benefit from the memory of visited states, causing excessive random search with no diversification history. Unlike memory-based search algorithms such as the tabu search, the search in simulated annealing is dependent on the choice of the initial temperature to explore the search space, which has little indications of how much exploration has been carried out. The lack of exploration eye can affect the quality of the found solutions while the nature of the search in simulated annealing is mainly local. In this work, a methodology of two phases using an automatic diversification and intensification based on memory and sensing tools is proposed. The proposed method is called Simulated Annealing with Exploratory Sensing. The computational experiments show the efficiency of the proposed method in ensuring a good exploration while finding good solutions within a similar number of iterations. 

Research Authors
Majid Almarashi, Wael Deabes, Hesham H Amin, Abdel-Rahman Hedar
Research Date
Research Department
Research Journal
Algorithms
Research Pages
230
Research Publisher
Multidisciplinary Digital Publishing Institute
Research Vol
13
Research Website
https://www.mdpi.com/1999-4893/13/9/230
Research Year
2020

Simulation-Based EDAs for Stochastic Programming Problems

Research Abstract

With the rapid growth of simulation software packages, generating practical tools for simulation-based optimization has attracted a lot of interest over the last decades. In this paper, a modified method of Estimation of Distribution Algorithms (EDAs) is constructed by a combination with variable-sample techniques to deal with simulation-based optimization problems. Moreover, a new variable-sample technique is introduced to support the search process whenever the sample sizes are small, especially in the beginning of the search process. The proposed method shows efficient results by simulating several numerical experiments. 

Research Authors
Abdel-Rahman Hedar, Amira A Allam, Alaa E Abdel-Hakim
Research Date
Research Department
Research Journal
Computation
Research Pages
18
Research Publisher
Multidisciplinary Digital Publishing Institute
Research Vol
8
Research Website
https://www.mdpi.com/2079-3197/8/1/18
Research Year
2020

Evolutionary Algorithms Enhanced with Quadratic Coding and Sensing Search for Global Optimization

Research Abstract

Enhancing Evolutionary Algorithms (EAs) using mathematical elements significantly contribute to their development and control the randomness they are experiencing. Moreover, the automation of the primary process steps of EAs is still one of the hardest problems. Specifically, EAs still have no robust automatic termination criteria. Moreover, the highly random behavior of some evolutionary operations should be controlled, and the methods should invoke advanced learning process and elements. As follows, this research focuses on the problem of automating and controlling the search process of EAs by using sensing and mathematical mechanisms. These mechanisms can provide the search process with the needed memories and conditions to adapt to the diversification and intensification opportunities. Moreover, a new quadratic coding and quadratic search operator are invoked to increase the local search improving possibilities. The suggested quadratic search operator uses both regression and Radial Basis Function (RBF) neural network models. Two evolutionary-based methods are proposed to evaluate the performance of the suggested enhancing elements using genetic algorithms and evolution strategies. Results show that for both the regression, RBFs and quadratic techniques could help in the approximation of high-dimensional functions with the use of a few adjustable parameters for each type of function. Moreover, the automatic termination criteria could allow the search process to stop appropriately.

Research Authors
Abdel-Rahman Hedar, Wael Deabes, Majid Almaraashi, Hesham H Amin
Research Date
Research Department
Research Journal
Mathematical and Computational Applications
Research Pages
7
Research Publisher
Multidisciplinary Digital Publishing Institute
Research Vol
25
Research Website
https://www.mdpi.com/2297-8747/25/1/7
Research Year
2020

Adaptive scatter search to solve the minimum connected dominating set problem for efficient management of wireless networks

Research Abstract

An efficient routing using a virtual backbone (VB) network is one of the most significant improvements in the wireless sensor network (WSN). One promising method for selecting this subset of network nodes is by finding the minimum connected dominating set (MCDS), where the searching space for finding a route is restricted to nodes in this MCDS. Thus, finding MCDS in a WSN provides a flexible low-cost solution for the problem of event monitoring, particularly in places with limited or dangerous access to humans as is the case for most WSN deployments. In this paper, we proposed an adaptive scatter search (ASS-MCDS) algorithm that finds the near-optimal solution to this problem. The proposed method invokes a composite fitness function that aims to maximize the solution coverness and connectivity and minimize its cardinality. Moreover, the ASS-MCDS methods modified the scatter search framework through new local search and solution update procedures that maintain the search objectives. We tested the performance of our proposed algorithm using different benchmark-test-graph sets available in the literature. Experiments results show that our proposed algorithm gave good results in terms of solution quality.

Research Authors
Abdel-Rahman Hedar, Shada N Abdulaziz, Adel A Sewisy, Gamal A El-Sayed
Research Date
Research Department
Research Journal
Algorithms
Research Pages
35
Research Publisher
Multidisciplinary Digital Publishing Institute
Research Vol
13
Research Website
https://www.mdpi.com/1999-4893/13/2/35
Research Year
2020

Estimation of Distribution Algorithms with Fuzzy Sampling for Stochastic Programming Problems

Research Abstract

Generating practical methods for simulation-based optimization has attracted a great deal of attention recently. In this paper, the estimation of distribution algorithms are used to solve nonlinear continuous optimization problems that contain noise. One common approach to dealing with these problems is to combine sampling methods with optimal search methods. Sampling techniques have a serious problem when the sample size is small, so estimating the objective function values with noise is not accurate in this case. In this research, a new sampling technique is proposed based on fuzzy logic to deal with small sample sizes. Then, simulation-based optimization methods are designed by combining the estimation of distribution algorithms with the proposed sampling technique and other sampling techniques to solve the stochastic programming problems. Moreover, additive versions of the proposed methods are developed to optimize functions without noise in order to evaluate different efficiency levels of the proposed methods. In order to test the performance of the proposed methods, different numerical experiments were carried out using several benchmark test functions. Finally, three real-world applications are considered to assess the performance of the proposed methods.

Research Authors
Abdel-Rahman Hedar, Amira A Allam, Alaa Fahim
Research Date
Research Department
Research Journal
Applied Sciences
Research Pages
6937
Research Publisher
Multidisciplinary Digital Publishing Institute
Research Vol
10
Research Website
https://www.mdpi.com/2076-3417/10/19/6937
Research Year
2020

Wireless sensor networks fault-tolerance based on graph domination with parallel scatter search

Research Abstract

In wireless sensor/ad hoc networks, all wireless nodes frequently flood the network channel by transmitting control messages causing “broadcast storm problem”. Thus, inspired by the physical backbone in wired networks, a Virtual Backbone (VB) in wireless sensor/ad hoc networks can help achieve efficient broadcasting. A well-known and well-researched approach for constructing virtual backbone is solving the Connected Dominating Set (CDS) problem. Furthermore, minimizing the size of the CDS is a significant research issue. We propose a new parallel scatter search algorithm with elite and featured cores for constructing a wireless sensor/ad hoc network virtual backbones based on finding minimum connected dominating sets of wireless nodes. Also, we addressed the problem of VB node/nodes failure by either deploying a previously computed VBs provided by the main pSSEF algorithm that does not contain the failed node/nodes, or by using our proposed FT-pSSEF algorithm repairing the broken VBs. Finally, as nodes in a VB incur extra load of communication and computation, this leads to faster power consumption compared to other nodes in the network. Consequently, we propose the virtual backbone scheduling algorithm SC-pSSEF which aims to find multiple VBs using the VBs provided by the pSSEF algorithm and switch between them periodically to prolong the network life time.

Research Authors
Abdel-Rahman Hedar, Shada N Abdulaziz, Emad Mabrouk, Gamal A El-Sayed
Research Date
Research Department
Research Journal
Sensors
Research Pages
3509
Research Publisher
Multidisciplinary Digital Publishing Institute
Research Vol
20
Research Website
https://www.mdpi.com/1424-8220/20/12/3509
Research Year
2020

An Efficient Access Technique based on Clustering and Resources Sharing for Machine Type Communication over LTE Network

Research Abstract

Machine Type Communication (MTC) over the cellular network plays an important role in many smart applications. Long Term Evolutionary (LTE) network is considered the best cellular network for deploying the MTC devices in remote areas because of its high data rate and wide coverage area. The massive access of the MTC devices over LTE network results in poor network performance due to the high collision rate, high retransmission rate, high overhead, high delay, low throughput, and high power wastage. This paper proposes a new access technique to increase the access performance for MTC over LTE network. It is based on the clustering and grouping approach and resources sharing using the capillary network without using cluster head/helper node. In the proposed technique, MTC devices are divided into WLAN groups based on the geographical distance. In each WLAN, an MTC device can ask for uplink resources for data transmission from eNB for individual use or a group use. The MTC device shares the allocated resources with other devices inside its WLAN after finishing its data transmission using Distributed List Hub Polling (DLHPL) MAC protocol. The other devices inside the same WLAN can contend locally on these free resources without querying the eNB. The devices send data frames over LTE using these shared uplink resources without the need to relay it through a head node. The experimental results show that the proposed access technique gives lower collision rate, higher access probability, higher transmission opportunity, higher resources utilization, lower overhead, higher throughput, and lower delay compared with other recent techniques.

Research Authors
Mahmoud Abd El-sattar, Nagwa M. Omar and Hosny M. Ibrahim
Research Date
Research Department
Research Journal
Applied Mathematics & Information Sciences
Research Pages
1-16
Research Publisher
Natural Sciences
Research Vol
16
Research Website
http://www.naturalspublishing.com/Article.asp?ArtcID=24390
Research Year
2022

A color image encryption technique using block scrambling and chaos

Research Abstract

Images are very important forms of data that are widely used nowadays. Every day, millions of grey and color images are transferred via the web. Protecting these images from unauthorized persons is an important issue. Image encryption is one of the image-securing techniques. One advantage of using encryption is that the plain image is converted to an unrecognized one. Also, the plain image is restored without any loss of information. In this paper, a color image encryption technique using blocks scrambling and chaos is presented. First, the plain image is decomposed into three channels: R, G, and B. Then, each channel is divided into sub-images and blocks. Our encryption algorithm depends on two main steps: scrambling and diffusion. First, the pixels’ arrangement in sub-images and blocks is changed, and then scrambling between sub-images is done to get the scrambled image. Then, in diffusion, the scrambled image diffuses using the logistic map to get the encrypted image. The experimental results show that our proposed algorithm has good performance in encrypting color images.

Research Authors
Khalid M Hosny, Sara T Kamal, Mohamed M Darwish
Research Date
Research Department
Research Journal
Multimedia Tools and Applications
Research Pages
505–525
Research Publisher
Springer US
Research Vol
81
Research Year
2022
Subscribe to