Next Article in Journal
Simultaneous Measurement of Refractive Index and Temperature Based on SMF–HCF–FCF–HCF–SMF Fiber Structure
Next Article in Special Issue
Moving-Target Defense in Depth: Pervasive Self- and Situation-Aware VM Mobilization across Federated Clouds in Presence of Active Attacks
Previous Article in Journal
Finite Element Model Updating of RC Bridge Structure with Static Load Testing: A Case Study of Vietnamese ThiThac Bridge in Coastal and Marine Environment
Previous Article in Special Issue
On the Efficient Delivery and Storage of IoT Data in Edge–Fog–Cloud Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data Collection in IoT Using UAV Based on Multi-Objective Spotted Hyena Optimizer

by
Hamza Mohammed Ridha Al-Khafaji
Biomedical Engineering Department, Al-Mustaqbal University College, Hillah 51001, Babil, Iraq
Sensors 2022, 22(22), 8896; https://doi.org/10.3390/s22228896
Submission received: 4 September 2022 / Revised: 8 November 2022 / Accepted: 16 November 2022 / Published: 17 November 2022
(This article belongs to the Special Issue Internet of Things, Sensing and Cloud Computing)

Abstract

:
Today, the use of information and communication technology is very important in making the internet of things (IoT) elements distributable around the earth. With the development of IoT topics, today unmanned aerial vehicles (UAV) are utilized as a platform for gathering data from various IoT devices located worldwide. Determining the number and optimal locations of drones can minimize energy consumption in this data-collection system in the IoT. Using a promising multi-objective optimization algorithm (MOA) can achieve this goal. In this research, a bio-inspired MOA, termed the multi-objective spotted hyena optimizer (MOSHO), is employed on the data-collection platform for a group of IoT devices in a geographical area. The results of this method have been compared with other evolutionary MOAs. The analysis of the results shows that the MOSHO has a noteworthy consequence on the process of optimal energy consumption in this system, in addition to a high convergence associated with better diversity and robustness. The results of this research can be used to identify the optimization parameters in this system.

1. Introduction

Today, the internet of things (IoT) has taken over the world of information and communication technology, and has affected all aspects of human life with smart solutions [1]. This technology is presented as creating a more efficient, beautiful, and comfortable future. To better understand the concept of the IoT, this technology refers to many objects and devices around us that can be recognized, located, addressed, and controlled through a network [2]. In simple terms, with this technology, sensors and devices can interact with each other and with their users within a network.
Currently, most organizations and businesses are making extensive use of this technology [3]. Among these industries are the aviation and airport industry, banking and security, construction, urban development, medicine, etc. [4]. By benefiting from the IoT’s advantages, they gain a better understanding of their audience and can provide better and more appropriate services [5]. Furthermore, the decision-making processes in various issues is improved by using the capabilities of the IoT.
The IoT is a collection of all of the physical things that are connected to the Internet in some way [6]. This collection includes everything from mobile phones and vehicles to buildings, sensors, and all other items equipped with electronics that can help users to do different things [7]. Lately, drones have also joined the IoT collection with the help of secure connections and reliable wireless Internet. These drones can be controlled directly, and their missions can even be changed in the middle of a flight [8].
As the level of drone technology improves, the ability of drones to interact with their environments and respond to them also increases. The existence of drones that will be able to be sent to different places and carry flexible loads also improves. The drone can reprogram, measure, and provide analytical data about anything at any time [9]. The technology of these small aircraft is constantly advancing, and more and more business owners are finding ways to use drones in their daily activities.
In areas with weak terrestrial wireless networks, IoT devices with limited capacities cannot communicate the data remotely to a base station [10]. Consequently, efficient data collection from IoT devices is a challenging issue [11]. Today, drones are widely used due to their mobility, autonomy, communication, processing power, relatively low cost (because they eliminate all of the risks related to human operators), and because they cost much less than manned aircraft [10]. Furthermore, the use of unmanned aerial vehicles (UAVs) as emerging platforms for gathering information has been widely considered.
Compared with terrestrial data-collection platforms, UAVs’ data-collection platforms provide various supremacies: (1) UAVs are able to contribute more obediently to the goals of campaigns because of their mobility and agility; (2) UAVs can create remote-viewing connections to benefit the aims of campaigns; (3) UAVs offer emergency services support for the aims of campaigns during unanticipated incidents. Therefore, the application of drones is suitable for delivering a satisfying method for gathering data from IoT devices.
The optimization of UAV deployment has already been studied. In 2018, Chen et al. [12] proposed a 3D settlement of UAV base stations using an improved genetic algorithm to provide the maximum number of users with diverse quality-of-service needs [13]. For maximizing the quantity of users that is covered, the 3D placement problem in the study was represented as a placement problem involving numerous concentric rings. First, the features of the problem were emphasized [14]. Then, after performing some mathematical operations to decouple the UAV base station implementation problem in horizontal and vertical proportions without sacrificing optimality, the mixed-integer second-order cone problem was formulated, and an enhanced multi-population genetic algorithm (MPGA) was suggested for the assignment problem in the horizontal dimensions. The performance of the modified MPGA in comparison with the standard genetic algorithm (SGA) was demonstrated through computational models. However, IoT technology, on the other hand, would have enabled smarter system control and improved personal safety if the strategy had been employed.
Özdağ et al. [15] presented a new optimal methodology for the 3D assignment of multiple UAV base stations in wireless networks. The optimization method was based on a combination of a maximum drone-deployment algorithm (MDDA) and electromagnetism-like (EML) algorithms. For assessing the efficiency of the created MDDA–EML, pure-EML, using the fundamental EML algorithm, was also built. Based on the experimental results, MDDA–EML, which covered the most customers in the field and achieved the highest handling rates in comparison with pure-EML, was able to effectively organize many 3D drone base stations at close to the optimal height. This high-level conflict approach’s main flaw was that it went into great depth on how certain classes, procedures, and items were implemented. Additionally, the implementation of business logic was not related to the object-oriented paradigm; therefore, the programmer must write a ton of code to compensate for this.
Na et al. [16] presented a multicarrier wireless-powered communication model with UAV assistance for IoT applications. In particular, the UAV acted as an airborne base station, transmitting orthogonal frequency-division multiplexing (OFDM) signals to the IoT nodes, which in turn decoded data and collected the signals’ energy. Afterwards, the IoT nodes used the collected energy to communicate data to the UAV. On the basis of OFDM, a suggested combined UAV-trajectory-optimization approach and resource allocation was put forth. By concurrently optimizing the UAVs’ trajectory, power, sub-slot allocation, and subcarrier subject to the attainable total rate of all of the IoT nodes in the downlink, the goal was to maximize the least-attainable rate in the uplink among all of the IoT nodes. An alternate-iteration approach was suggested to solve the problem due to the complicated nonconvex optimization nature. The proposed technique can optimize the UAV trajectory and regulate node movement with regards to the simulation results. The suggested system not only greatly improves the lowest attainable rate when compared with standard resource-allocation techniques, but it also functions effectively for two flying modes. Nonetheless, this technique has some disadvantages. Systems using drone swarms usually do not consider the low-cost solution.
Masroor et al. [17] introduced resource management in UAV-aided wireless networks. From an optimization viewpoint, this study offered a thorough analysis of resource allocation in UAV-assisted wireless networks. To emphasize the relevance of the UAV-assisted wireless networks, the classification of UAVs, their advantages, and their applications were explained. The management of resources was then covered in depth, with metrics such as UAV placement, backhaul, trajectory, spectrum, path planning, data offloading, and charging included. There was also a discussion of various optimization types, limitations, and solutions designed to enable UAV-assisted wireless networks. In order to solve the issues preventing the successful implementation of UAV-assisted wireless networks, the study concluded by offering future research options. Despite their method’s advantages, the method can be improved by adding more aims, such as placement problems, multi-UAV-assisted wireless networks, and multi-objective data collection.
To use the drone efficiently, the deployment of the drone should be optimized. If organized correctly, a drone must be able to deliver a dependable and low-cost solution for IoT data. Different multi-objective optimization techniques have been paid attention, such as the well-developed epsilon constraint approach [18], the weighted sum method [19], and the interactive fuzzy-programming scheme [20]. Moreover, the concept of synchro-modal and intermodal are among the important solutions in routing optimization [21,22]. In order to explore the optimum solution, a bio-inspired multi-objective optimization algorithm (MOA) is utilized on the platform of data collection for a group of IoT devices across the earth. The next sections of the paper are organized as follows: Section 2 presents the materials and methods for data collection in the IoT, which is based on multi-objective spotted hyena optimizer (MOSHO). Section 3 describes the theoretical modelling of the study. Section 4 discusses the simulation results of using the method on the case study, and finally, the paper is concluded in Section 5.

2. Materials and Methods

Nature-inspired algorithms have been presented as an effective tool for exploring convergent and divergent Pareto optimal fronts in multi-objective optimization problems, which generally include two or three conflicting objectives. Multi-objective optimization problems are related to solving M conflicting objectives at the same time in problems where the value of M is equal to two or three. In general, a multi-objective optimization problem has the following relationship which is expressed as follows:
F x = f 1 x ,   f 2 x , , f n x
where x K and K n are the decision space and f : K Ω n is the search space, and it is assumed that f is a minimization problem. Most multi-objective nature-inspired algorithms are focused on maintaining diversity and increasing convergence. In this study, a MO form of a spotted hyena optimizer was designed and utilized to achieve the research aim.

2.1. Spotted Hyena Optimizer

In this section, the fundamental notions of a spotted hyena optimizer (SHO) are introduced before moving on to a brief overview of the MO variant of a spotted hyena optimizer. The fundamental idea of SHO is initially presented, before the multi-objective variant of SHO is suggested [23,24]. The primary sources of inspiration for this algorithm were the social interactions and hunting habits of spotted hyenas. The SHO imitates the dependable spotted hyenas’ coherent groups. Searching, surrounding, hunting, and attacking are the four fundamental components of SHO. The SHO algorithm uses a group of trusted people to direct the hunting behavior toward the most efficient search agent and store the finest optimum solutions. The following formula is utilized to model the spotted hyena’s circling pattern:
D h = B · X P x X x
X x + 1 = X P x E · D h
where D h stands for the separation between both the target and the spotted hyena. The iteration is indicated by x . The location vectors of the spotted hyena and its target are represented by X p and X , respectively, and || is the absolute value. The co-efficient vectors are B and E . The formulas used to evaluate B and E are as follows:
B = 2 · r d 1
E = 2 h · r d 2 h
h = 5 ( I t e r a t i o n × 5 M a x i t e r a t i o n )
where iteration is between one to maximum iteration.
In this case, h showed gradual decreases throughout the duration of iterations from 5 to 0. The stochastic arrays r d 1 and r d 2 were those that fell between [0, 1]. By changing the values of vectors B and E , other locations could be achieved relative to the present location. This algorithm pushed other search agents to improve their locations while saving the optimal answer so far.
The following equations were created to replicate the hunting behavior of spotted hyenas and identify viable random search areas:
D h = B · X h X k
X k = X h E · D h
C h = X k + X k + 1 + + X k + N
where N is the number of iterations, which may be computed as:
N = c o u n t n o s ( X h + X h + 1 + X h + 2 , , X h + M )
X x + 1 = C h N
where n o s is the number of possible solutions in the given solution space which are very similar to the best optimum solution, C h denotes a collection or cluster of optimal solutions, and M denotes a random vector in the range between 0.5 and 1. X x + 1 changes the locations of additional search agents based on the location of the successful completion of this work and records the N   most optimum answers.
The search candidates are required to retreat from the target, as illustrated in Figure 1 by the exploration criteria that were met through vector E with random values larger than 1 or less than 1. B , another component of SHO, is in charge of exploration [25]. It supplies the weight of the prey and has random values between [0, 5]. When | E | < 1, the SHO method can be used for attacking the prey, as shown in Figure 1, by meeting the prey’s estimated location.
The method starts by producing a collection of random answers as the population in order to execute the optimization. The search agents group toward the best search agent throughout the optimization.
Vectors h   and E , however, continuously decline during the course of repetitions. When the terminating requirement is met, the placements of candidate solutions that form a cluster are finally regarded as the best optimum solutions. The SHO technique is capable of effectively resolving optimization issues. SHO’s enormous exploration capacity yields superior outcomes than the current metaheuristics. As a result, SHO’s answers do not become locked-in optimal answers. This is what spurred the author to utilize the MOSHO.

2.2. Multi-Objective Spotted Hyena Optimizer (MOSHO)

Multi-objective optimization defines a field of multiple-criteria decision making, which includes more than one objective function to be optimized simultaneously. To construct a MO-based model of SHO, two components are included. These features are very comparable to those of MOSHO. The strongest non-dominated Pareto optimum answer is stored in the first component, an archive [26]. The second element uses a clustering method of selecting and choosing close solutions from the collection that match the location of the target. The sub-section before this one discusses these parts. Algorithm 1 indicates the description of MOSHO [27].
Algorithm 1. MOSHO
1.
Initialization of h   , B , E , and N
2.
Evaluate the objective values of each search agent
3.
Obtain all of the non-dominated solutions
4.
nitialize X h from archive and C h according to X h
5.
While ( x < M a x i t e r a t i o n )
6.
Update the position by Equations (7)–(11)
7.
Update h   , B , E , N , and C h according to X h
8.
x = x + 1
9.
End while
10.
Return the solution

2.3. Archive

All so-far-discovered non-dominated Pareto optimum solutions have an archive as a storage component. In the case of concave, convex, and unconnected Pareto fronts, this archive component has the capacity to disperse uniformly. There are two primary components, such as array and storage manager.

2.4. The Archive Controller

This operator’s primary duty is to determine whether or not the answer should be archived. The following are several crucial details about the archive updating procedure.
Whenever the archive is managed by at minimum one archive member, the answer should not be permitted to enter.
  • After excluding the dominated solution(s) from the archive, a new answer that governs one or more associates of the archive will be permitted to arrive at the archive.
  • If neither the new answer nor the archive answers overwhelm one another, the archive should receive a new member.
  • Whenever the archive is complete, the grid approach should be used to exclude one of the answer sections which is the maximum packed and to add a new answer to increase the diversity, according to the Pareto optimum front.

2.5. The Grid

The scattered Pareto fronts are created utilizing an adaptive grid approach. The objective function space is separated into several areas. If a population inserts a person outside of the grid’s existing boundaries, the grid must be recalculated, and each person relocated. The adaptive grid is a hypercube-based environment that is employed to distribute information uniformly.

2.6. Group-Selection Mechanism

The difficult challenge in a multi-objective search space is to evaluate the answers with archive members. A technique for group answers was created to address this problem. The decision was made using the probability-based roulette-wheel technique, which is described as:
H k = f S k
where S is the amount of Pareto optimum answers that have been found thus far in the kth segment and f is a constant number that should be bigger than one [27]. A well-known selection mechanism of the proportional kind is the roulette-wheel approach. Every person in the population has an optimal solution that resembles the proportional region on a roulette wheel. The MOSHO (see Algorithm 1) incorporates the characteristics of the SHO algorithm. The primary distinction between SHO and MOSHO is that the former searches inside a set of archive members while the latter saves the collection of best-case scenarios.
The archive is where NSGA-2 and MOSHO diverge most. The goal of using archives is to lessen the likelihood that non-dominated answers would deteriorate. Comparatively speaking with other archive-based techniques, MOSHO offers the best options. Standard selection operators used by archive-based algorithms include crossover, mutation, etc. These controllers lean the search in favor of archive members. Parameters are swapped inside of a solution in the search space in MOSHO. The swap procedure improves MOSHO’s capacity for exploration. As opposed to that, it lessens the converging feature. In order to find a minimum of non-dominated solutions in the available exploration area, MOSHO employs a cluster decision model to solve this issue.

3. Conceptual Model of the Research

3.1. Model Conception

In this research, the positions and the quantity of stopping arguments are instantaneously optimized for UAV placement. Due to the fact that the number of stopping points is unknown and not specified in advance, and must therefore be varied throughout the optimization process, the issue creates a great challenge for the traditional gradient, as no clear description of the slope vector is present. Evolutionary algorithms have the ability to deal with this problem.
In this research, the IoT’ information-collection system has been studied with the help of a drone. Here, the positions and the quantity of stopping arguments are simultaneously optimized for drone placement, which leads to the provision of better services for the IoT devices and achieves more energy-efficient data collection. Due to the fact that the length of people is fixed, the MOSHO algorithm for optimizing UAV deployment does not need to use operators such as intersection and mutation that exist in the genetic algorithm. Based on [28], it is verified that the UAV deployment problem is an NP-hard problem. Each person’s length is also decreased by two. Thus, in a two-dimensional search space, the population is seeking the ideal distribution of halting locations.
A new approach is being developed to modify the population size (i.e., the number of stopping points). In addition, depending on the improving efficiency, the number of breakpoints might be raised, dropped, or left constant in each update. This results in the omission of a crucial parameter, namely the size of the population. Moreover, the MOSHO algorithm acts as a search engine for the position-optimization of the stop points. Figure 2 shows the conceptual model of the research.
According to Figure 2, the conceptual model is an IoT information-collection system with the help of a drone, which includes a rotary-wing UAV and a collection of n ground-based IoT devices with N = 1 , 2 , , n being shown. These IoT devices’ data are collected using a UAV as a framework for flight data collecting. The UAV can move the stations’ positions numerous times because of its flexibility and movement, which increases coverage while using less energy.
Here, it is assumed that the number of stopping points is k and that no prior information is available. The breakpoints can be set as K = 1 , 2 , , k .

3.2. Fitness Function

The coordinates of the ith IoT devices are recognized and immobile ( X i , Y i , 0) where X i and Y i are the values of the x and y coordinate vectors of the ith IoT device. Furthermore, it is assumed that the UAV is hovering at a static height H , and the position of the fixed point ( j K ) is shown by ( X j ,   Y j   ,   H ) where X j and Y j are the values of the x and y coordinate vectors corresponding to the jth fixed point. Therefore, the distance between the IoT’ arguments and the stopping point j is defined below:
d i j = X j X i 2 + Y j Y i 2 + H 2 i N ,   j K
A binary variable is used to represent the connection between the drone and the IoT’ elements at the drone’s halting position. If the IoT device provides data to the drone at a fixed location, the value of this variable is equal to 1; else, it is equal to 0. Every IoT device always sends data to the closest stop-point to conserve energy during transmission. So:
C 1 : a i j = 1 ,       i f   j = arg min d i j 0 ,       o t h e r w i s e
C 2 = j = 1 K a i j = 1
where i N and j K .
Consequently, all IoT arguments select a single breakpoint to transfer their data to. Additionally, each stopping point’s UAV can acknowledge IoT devices to transfer signals instantaneously due to the system’s bandwidth restriction. Therefore:
C 3 = i = 1 m a i j M
To ensure the service of all IoT devices, the following conditions must be met:
C 4 = i = 1 m j = 1 K a i j = m
In the proposed model, the channel amplification between the drone at the jth stopping point and the IoT device is calculated using the following equation:
h i j = h 0 d i j 2 = h 0 X j X i 2 + Y j Y i 2 + H 2
Consequently, if the IoT device directs data to the drone at stop point j , the data rate is calculated by the following relation:
r i j = B log 2 1 + p i h i j σ 2 = B log 2 1 + p i h 0 σ 2 X j X i 2 + Y j Y i 2 + H 2
where p i defines the transmission power from the ith IoT device to the drone. The h 0 indicates the amplification of the channel’s power in the reference distance d 0 = 2 m . σ 2 stands for the power of Gaussian white noise and B is the bandwidth of the system.
It is assumed that the ith IoT device delivers D i amount of the data sent to the drone. The time to send data from the ith IoT device to the drone at the jth stopping point is calculated as follows:
T i j = D i r i j , i N ,   j K
Additionally, the energy consumption is calculated as follows:
E i j = p i T i j = p i D i r i j ,   i N , j K
Therefore, it is possible to obtain the energy consumption of all IoT devices:
E IoT = i = 1 m j = 1 K a i j E i j
In fact, the drone will hover for a while at each stop point. Until the collection of all of the data is sent from the IoT devices to this stop point, it will not be transferred to another stop point.
Consequently, the drone floating time at the stopping point j is calculated as follows:
T j h = m a x i n a i j T i j
Furthermore, the floating energy consumption of the UAV at the jth the stopping point is calculated as follows:
E j h = p h T j h
where p h shows the drone’s floating power.
Therefore, the drone’s total energy consumption can be calculated as follows:
E UAV = j = 1 K E j h
Here, the drone flight’s energy consumption of the UAV flight is ignored. The energy consumption of the system consists of the energy consumption of the drone and all IoT devices. Therefore, the issue can be related as follows:
E UAV = j = 1 K E j h
Here, the drone flight’s energy consumption is ignored. This term consists of the energy consumption of the drone and all IoT devices. Therefore, the issue (fitness function) can be related as follows:
m i n X j , Y j , k   E UAV + γ E IoT
Subject to:
C 1 : a i j 0 ,   1 ,   i N , j K
C 2 : j = 1 n a i j = 1 , i N
C 3 : j = 1 n a i j M , i N
C 4 : i = 1 m j = 1 K a i j = n
C 5 : X m i n X j X m a x , j K
C 6 : Y m i n Y j Y m a x , j K
C 7 : k m i n k k m a x
where γ 0 describes the weight between the UAV’s energy consumption and all IoT devices. X m i n and X m a x represent, in turn, the inferior and the superior bounds of X j . Y m i n and Y m a x , represent, in turn, the inferior and the superior bounds of Y j . k m i n and k m a x are, in turn, the inferior and the superior values of k . Hence, when the number of IoT devices working is no less than one IoT device at a stopping point, the k m i n and k m a x are, in turn, fit for | n M | and n .
Here, the aim is to optimize drone arrangement, as well as the positions and the number of drone stations, to achieve minimum system energy consumption in all constraints. Actually, the objective is to optimize X 1 , Y 1 , , X k , Y k to achieve the minimum value of ( E UAV + γ E IoT ) while satisfying C 1 to C 7 . The aim of this research is to optimize the position and the quantity of the station in the deployment of the drone jointly. Basically, the MOSHO algorithm obtains the optimization of the stop points’ quantity by adaptively updating the size of the population. Furthermore, the stopping places were optimized. The evolutionary MOA based on inverse modeling using Gaussian processing treats the entire population as a total deployment, and the position changes at most one breakpoint in each update. The new breakpoint location is created by inverse density estimation, which allows for the use of information from other breakpoint locations. As a result, global search capability is better than local search. The algorithm will be stopped when the iteration number has been reached.

4. Simulation Results

The approach to the solving of a problem is one of the most basic aspects of research, which is assigned to this section. According to the definition and mathematical model of the problem of this research, the solution method that is considered for it is the evolutionary multi-objective algorithm based on inverse modeling using the Gaussian process. Numerous heuristic methods have been created in the last three decades to handle multi-objective optimization issues. Nevertheless, it might be difficult for academics to accurately assess current algorithms and to employ specific algorithms to address issues in the absence of an up-to-date and extensive software platform.
In this study, PlatEMO, a system that is based on the MATLAB software for metaheuristic-based MO optimization, was employed to avoid this difficulty, because the source code for different methods has not been made publicly available. Together with numerous frequently utilized functions, it offers more than fifty multi-objective optimization techniques and more than one hundred multi-objective test tasks. This platform is completely open source, so users can build new algorithms based on it. The plateEMO source code can be accessed at [14]. This software is the basis of the exact solution for the proposed model of this research, and the goal is to validate the model. In the research findings, the proposed model will be validated with a precise method using this software. This research is developmental in terms of its purpose because it seeks to find a suitable scientific method to solve a problem.
In terms of the nature of the data, it is mixed (quantitative and qualitative), and in terms of the data collection method, it is also descriptive. The research method in this study is descriptive (case and contextual) based on the nature and method of data collection. It utilizes a mixed approach (quantitative and qualitative) due to because the fact that it is supposed to be deeply researched in a specific case. In this research, in a wide range, experiments are addressed to indicate the efficiency of the suggested conceptual model, and the suggested technique has been compared and evaluated with a set of algorithms. These tests have been performed on specific test samples.
In this sense, in the continuation of this section, the evaluation criteria and studied indicators have been introduced. In the second section, the settings of the parameters in the experiments are shown. In the third section, the compared algorithms are shown. In the research findings section, the results of the experiments are shown, and the discussion and conclusion section shows the review of the compared and evaluated algorithms.

4.1. Evaluation Criteria and Studied Indicators

A simple method for evaluating the quality of a set of solutions is with quality indicators (QIs). Overall, QIs are categorized into the following six groups:
1—QIs for convergence
2—QIs for spread
3—QIs for uniformity
4—cardinality index
5—QIs for spread and uniformity
6—QIs for the first four sections.
There are two groups of convergence in QIs:
  • Evaluating the Pareto dominance relationship between solutions or sets.
  • Evaluating the distance of a set of solutions from the beam view.
Generational distance (GD) determines the mean squared Euclidean distance of the solutions set for the nearest point on the ray. Spread quality is associated with the area coverage of a solution area. Pure diversity (PD) shows the variation of all solutions to the rest of the solutions in a set of solutions. The quality index for uniformity evaluates the uniform distribution of a set of solutions and measures the changes in the distance between solutions, i.e., spacing.
The cardinality index adds a diverse non-dominant solution to the set of solutions to progress the assessment. QIs for uniformity and spread are close to each other and can be used together to show the diversity of the set of solutions, and are categorized into two groups:
  • Indexes based on distance
  • Region division-based indicator
which partition a specific area into a large number of cells of the same size and then calculate the cell quantity that has solutions. Some of them consider the cells as grids that partition the space into a large number of hyper boxes, such as diversity metric.
The quality index covers convergence, diffusion, uniformity, and basic aspects for all aspects, and they are categorized into two groups:
A distance-based quality index that measures the distance of the beamformer to the set of considered solutions, such as inverted generational distance (IGD).
The volume-base index measures the size of the volume and is assigned to the set of considered solutions, such as hyper-volume (HV). Table 1 illustrates the connection between the assessment criteria and their grouping.
In this research, to evaluate the performance of the evolutionary MOA based on inverse modeling, seven samples with different numbers of IoT devices have been used: n = 100 ,   200 ,   300 ,   400 ,   500 ,   600 ,   700 .

4.2. Parameter Settings

It is considered that each IoT argument is randomly dispersed in a square meter of 1000 m by 1000 m, and the flying height of the drone is 200 m. Furthermore, D i is randomly distributed in the range of 1 , 10 3 MB.
The initial value is determined randomly, and the values are M = 5 , p i = 0.1   w and h 0 = 30   dB , σ 2 = 250   dBm , and λ = 9000 . In each compared algorithm, the same parameter settings of the problems are used. A total of 20 independent executions for each comparison algorithm are performed on each of the test samples. The end disorder for all algorithms is a maximum of 95,000 fitness evaluations (FE) for all test samples. Wilcoxon rank sum test is equal to 10, and the size of the grouping model is equal to L = 3 , which is used to compare the obtained results at a significance level of 0.05 of the tested algorithms.
By taking the MOSHO as a reference algorithm in the Wilcoxon rank sum test, the label “ + ” means that the performance of the MOSHO algorithm is better than other comparative algorithms, the “ ” label defines that the performance of the MOSHO algorithm is weaker than the other evolutionary algorithms, and the “ ” label means that they have almost the same result. In this study, the MOSHO algorithm is compared with some other works, including the non-dominated sorting genetic algorithm (NSGA) [29], the ant colony optimization (ACO) [29], and the multiple ant colony non-dominated sorting genetic algorithm II (MAC-NSGA II) [30]. The parameter values of the algorithms is given below:
-
NSGA-II and MAC-NSGA II:
Pop-size: 85; max iteration: 200; crossover prob: 0.8; mutation prob: 0.2; mutation operator: 20; crossover operator: 20.
-
ACO
Ant size: 85; max iteration: 200; evaporation rate: 0.1; No. deposited pheromone: 0.2; pheromone factor: one; heuristic factor: one.

4.3. Discussions

Here, the results of the experiments are shown and discussed. The statistical results are presented for each algorithm under consideration based on the function of the problem shown in Equation (27) and using the criteria of the expression evaluation indicators. They were evaluated on the PlatEMO and are shown in Table 2.
The results listed in Table 2 show the algorithms’ superiority according to the energy consumption of the IoT’ information collection system with the help of a drone. Furthermore, the MOSHO algorithm has the best performance (lowest energy consumption) on evaluation functions. As well as this, based on the Wilcoxon rank sum test used in this table, the signs , , and + compare the performance of each algorithm with respect to the MOSHO algorithm. Therefore, by examining the Table, it can be seen that the MOSHO algorithm performs better than the other evolutionary MOAs in seven evaluation functions. Finally, it is concluded that with rising in the number of IoT devices, the efficiency of the MOSHO algorithm is still better.
Figure 3 shows the graph of the hyper-volume outcomes on the MOSHO algorithm and the compared methods. It shows that the MOSHO method has a better performance in terms of convergence, diversity, and power with respect to the compared methods in the optimization of the problem. In fact, the super-volume criterion evaluates the degree of convergence, diversity, and the strength of the problem solutions by algorithms. Moreover, the MOSHO solution and comparative algorithms have been evaluated by the multi-volume criterion, and as shown in Figure 3, the MOSHO algorithm shown in blue has the best diversity, convergence, and power compared withother comparative algorithms.

5. Conclusions

In this study, a conceptual model for a bio-inspired MOSHO was used on the platform of data collection for a group of IoT devices around the earth. The performance of the MOSHO was evaluated and compared with other MOAs including NSGA, ACO, and MAC-NSGA II, and the results obtained are based on a comprehensive evaluation criterion that covers all of the necessary categories (convergence, diversity, and robustness). It has been shown that the MOSHO based on inverse modeling using Gaussian processing has increased the rate of convergence, diversity, and robustness of the problem compared with the evolutionary MOAs under investigation. Moreover, the MOSHO algorithm had the lowest energy consumption on evaluation functions. Due to the fact that the Pareto optimality of the solutions cannot be guaranteed, the fundamental drawback of using multi-objective optimization based on the MOSHO is its slower speed. Only the fact that none of the created solutions is superior to the others is known. In the future, to provide a better method for covering the MOSHO’s drawback, a new multi-objective optimizer with a simpler structure will be used.

Funding

This study was implemented under the funding no. MUC-E-0122 by Al-Mustaqbal University College.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

There is no conflict of interest.

References

  1. Chegini, H.; Naha, R.K.; Mahanti, A.; Thulasiraman, P. Process automation in an IoT–fog–cloud ecosystem: A survey and taxonomy. IoT 2021, 2, 92–118. [Google Scholar] [CrossRef]
  2. Alferaidi, A.; Yadav, K.; Alharbi, Y.; Razmjooy, N.; Viriyasitavat, W.; Gulati, K.; Kautish, S.; Dhiman, G. Distributed Deep CNN-LSTM Model for Intrusion Detection Method in IoT-Based Vehicles. Math. Probl. Eng. 2022, 1, 3424819. [Google Scholar] [CrossRef]
  3. Al-Khafaji, H.M.R. Improving Quality Indicators of the Cloud-Based IoT Networks Using an Improved Form of Seagull Optimization Algorithm. Future Internet 2022, 14, 281. [Google Scholar] [CrossRef]
  4. Shafique, K.; Khawaja, B.A.; Sabir, F.; Qazi, S.; Mustaqim, M. Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access 2020, 8, 23022–23040. [Google Scholar] [CrossRef]
  5. Bahmanyar, D.; Razmjooy, N.; Mirjalili, S. Multi-objective scheduling of IoT-enabled smart homes for energy management based on Arithmetic Optimization Algorithm: A Node-RED and NodeMCU module-based technique. Knowl. -Based Syst. 2022, 247, 108762. [Google Scholar] [CrossRef]
  6. Wheelus, C.; Zhu, X. IoT network security: Threats, risks, and a data-driven defense framework. IoT 2020, 1, 259–285. [Google Scholar] [CrossRef]
  7. Almalki, F.A.; Soufiene, B.O.; Alsamhi, S.H.; Sakli, H. A low-cost platform for environmental smart farming monitoring system based on IoT and UAVs. Sustainability 2021, 13, 5908. [Google Scholar] [CrossRef]
  8. Motlagh, N.H.; Bagaa, M.; Taleb, T. UAV-based IoT platform: A crowd surveillance use case. IEEE Commun. Mag. 2017, 28, 5977–5990. [Google Scholar] [CrossRef] [Green Version]
  9. Chakareski, J. UAV-IoT for next generation virtual reality. IEEE Trans. Image Process. 2019, 28, 5977–5990. [Google Scholar] [CrossRef]
  10. Boursianis, A.D.; Papadopoulou, M.S.; Diamantoulakis, P.; Liopa-Tsakalidi, A.; Barouchas, P.; Salahas, G.; Karagiannidis, G.; Wan, S.; Goudos, S.K. Internet of things (IoT) and agricultural unmanned aerial vehicles (UAVs) in smart farming: A comprehensive review. Internet Things 2022, 18, 100187. [Google Scholar] [CrossRef]
  11. Mahmoud, A.; Muhaidat, S.; Sofotasios, P.C.; Abualhaol, I. Intelligent reflecting surfaces assisted UAV communications for IoT networks: Performance analysis. IEEE Trans. Green Commun. Netw. 2021, 5, 1029–1040. [Google Scholar] [CrossRef]
  12. Chen, Y.; Li, N.; Wang, C.; Xie, W.; Xv, J. A 3D placement of unmanned aerial vehicle base station based on multi-population genetic algorithm for maximizing users with different QoS requirements. In Proceedings of the 2018 IEEE 18th International Conference on Communication Technology (ICCT), Chongqing, China, 8–11 October 2018; pp. 967–972. [Google Scholar]
  13. Jha, S.K.; Prakash, S.; Rathore, R.S.; Mahmud, M.; Kaiwartya, O.; Lloret, J. Quality-of-Service-Centric Design and Analysis of Unmanned Aerial Vehicles. Sensors 2022, 22, 5477. [Google Scholar] [CrossRef] [PubMed]
  14. Tang, S.; Zhou, W.; Chen, L.; Lai, L.; Xia, J.; Fan, L. Battery-constrained federated edge learning in UAV-enabled IoT for B5G/6G networks. Phys. Commun. 2021, 47, 101381. [Google Scholar] [CrossRef]
  15. Özdağ, R.; Yanikomeroglu, H. A New Meta-heuristic Approach for 3D Placement of Multiple Unmanned Aerial Vehicle Base Stations In Wireless Networks. In Proceedings of the International Conference on Data Science, Machine Learning and Statistics, Van, Turkey, 26–29 June 2019; pp. 64–66. [Google Scholar]
  16. Na, Z.; Zhang, M.; Wang, J.; Gao, Z. UAV-assisted wireless powered Internet of Things: Joint trajectory optimization and resource allocation. Ad Hoc Netw. 2020, 98, 102052. [Google Scholar] [CrossRef]
  17. Masroor, R.; Naeem, M.; Ejaz, W. Resource management in UAV-assisted wireless networks: An optimization perspective. Ad Hoc Netw. 2021, 121, 102596. [Google Scholar] [CrossRef]
  18. Lahri, V.; Shaw, K.; Ishizaka, A. Sustainable supply chain network design problem: Using the integrated BWM, TOPSIS, possibilistic programming, and ε-constrained methods. Expert Syst. Appl. 2021, 168, 114373. [Google Scholar] [CrossRef]
  19. Sojobi, A.O.; Xuan, D.; Li, L.; Liu, S.; Poon, C.S. Optimization of gas-solid carbonation conditions of recycled aggregates using a linear weighted sum method. Dev. Built Environ. 2021, 7, 100053. [Google Scholar] [CrossRef]
  20. Sun, Y.; Yu, N.; Huang, B. Green road–rail intermodal routing problem with improved pickup and delivery services integrating truck departure time planning under uncertainty: An interactive fuzzy programming approach. Complex Intell. Syst. 2022, 8, 1459–1486. [Google Scholar] [CrossRef]
  21. Resat, H.G.; Turkay, M. A discrete-continuous optimization approach for the design and operation of synchromodal transportation networks. Comput. Ind. Eng. 2019, 130, 512–525. [Google Scholar] [CrossRef]
  22. Sun, Y. Fuzzy approaches and simulation-based reliability modeling to solve a Road–Rail intermodal routing problem with soft delivery time windows when demand and capacity are uncertain. Int. J. Fuzzy Syst. 2020, 22, 2119–2148. [Google Scholar] [CrossRef]
  23. Dhiman, G.; Kumar, V. Spotted hyena optimizer: A novel bio-inspired based metaheuristic technique for engineering applications. Adv. Eng. Softw. 2017, 114, 48–70. [Google Scholar] [CrossRef]
  24. Dhiman, G.; Sharma, R. SHANN: An IoT and machine-learning-assisted edge cross-layered routing protocol using spotted hyena optimizer. Complex Intell. Syst. 2021, 8, 3779–3787. [Google Scholar] [CrossRef]
  25. Naderipour, A.; Nowdeh, S.A.; Saftjani, P.B.; Abdul-Malek, Z.; Mustafa, M.W.B.; Kamyab, H.; Davoudkhani, I.F. Deterministic and probabilistic multi-objective placement and sizing of wind renewable energy sources using improved spotted hyena optimizer. J. Clean. Prod. 2021, 286, 124941. [Google Scholar] [CrossRef]
  26. Razmjooy, N.; Ashourian, M.; Foroozandeh, Z. Metaheuristics and Optimization in Computer and Electrical Engineering; Springer International Publishing AG: Berlin/Heidelberg, Germany, 2020. [Google Scholar]
  27. Dhiman, G.; Kumar, V. Multi-objective spotted hyena optimizer: A multi-objective optimization algorithm for engineering problems. Knowl. -Based Syst. 2018, 150, 175–197. [Google Scholar] [CrossRef]
  28. Zhang, X.; Duan, L. Energy-saving deployment algorithms of UAV swarm for sustainable wireless coverage. IEEE Trans. Veh. Technol. 2020, 69, 10320–10335. [Google Scholar] [CrossRef]
  29. Yang, Q.; Yoo, S.-J. Optimal UAV path planning: Sensing data acquisition over IoT sensor networks using multi-objective bio-inspired algorithms. IEEE Access 2018, 6, 13671–13684. [Google Scholar] [CrossRef]
  30. Qin, H.; Zhao, B.; Xu, L.; Bai, X. Petri-Net based multi-objective optimization in multi-UAV aided large-scale wireless power and information transfer networks. Remote Sens. 2021, 13, 2611. [Google Scholar] [CrossRef]
Figure 1. The process of attacking to the prey by the hyena hunters.
Figure 1. The process of attacking to the prey by the hyena hunters.
Sensors 22 08896 g001
Figure 2. Conceptual model of the research.
Figure 2. Conceptual model of the research.
Sensors 22 08896 g002
Figure 3. Hyper-volume results on the MOSHO and the associated studied techniques.
Figure 3. Hyper-volume results on the MOSHO and the associated studied techniques.
Sensors 22 08896 g003
Table 1. The connection between assessment criteria and their classification.
Table 1. The connection between assessment criteria and their classification.
ClassInversed Generational DistanceDiversity MetricPure
Diversity
Hyper-
Volume
SpacingGenerational Distance
Convergence* * *
Diversity****
Cardinality *
Uniformity * *
Table 2. Energy consumption (J) using different algorithms.
Table 2. Energy consumption (J) using different algorithms.
NMOSHONSGAACOMAC-NSGA II
100 1.38 × 10 6 1.42 × 10 6 1.66 × 10 6 1.45 × 10 6
200 2.57 × 10 6 2.61 × 10 6 2.85 × 10 6 2.67 × 10 6
300 3.74 × 10 6 3.86 × 10 6 4.21 × 10 6 3.72 × 10 6
400 5.16 × 10 6 5.30 × 10 6 5.55 × 10 6 5.36 × 10 6
500 6.14 × 10 6 6.23 × 10 6 7.50 × 10 6 6.31 × 10 6
600 7.50 × 10 6 7.78 × 10 6 8.38 × 10 6 7.95 × 10 6
700 8.04 × 10 6 8.16 × 10 6 8.90 × 10 6 8.53 × 10 6
+ 777
000
000
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Al-Khafaji, H.M.R. Data Collection in IoT Using UAV Based on Multi-Objective Spotted Hyena Optimizer. Sensors 2022, 22, 8896. https://doi.org/10.3390/s22228896

AMA Style

Al-Khafaji HMR. Data Collection in IoT Using UAV Based on Multi-Objective Spotted Hyena Optimizer. Sensors. 2022; 22(22):8896. https://doi.org/10.3390/s22228896

Chicago/Turabian Style

Al-Khafaji, Hamza Mohammed Ridha. 2022. "Data Collection in IoT Using UAV Based on Multi-Objective Spotted Hyena Optimizer" Sensors 22, no. 22: 8896. https://doi.org/10.3390/s22228896

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop