[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (241)

Search Parameters:
Keywords = greedy selection

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 2497 KiB  
Article
Enhanced Polar Lights Optimization with Cryptobiosis and Differential Evolution for Global Optimization and Feature Selection
by Yang Gao and Liang Cheng
Biomimetics 2025, 10(1), 53; https://doi.org/10.3390/biomimetics10010053 - 14 Jan 2025
Viewed by 476
Abstract
Optimization algorithms play a crucial role in solving complex problems across various fields, including global optimization and feature selection (FS). This paper presents the enhanced polar lights optimization with cryptobiosis and differential evolution (CPLODE), a novel improvement upon the original polar lights optimization [...] Read more.
Optimization algorithms play a crucial role in solving complex problems across various fields, including global optimization and feature selection (FS). This paper presents the enhanced polar lights optimization with cryptobiosis and differential evolution (CPLODE), a novel improvement upon the original polar lights optimization (PLO) algorithm. CPLODE integrates a cryptobiosis mechanism and differential evolution (DE) operators to enhance PLO’s search capabilities. The original PLO’s particle collision strategy is replaced with DE’s mutation and crossover operators, enabling a more effective global exploration and using a dynamic crossover rate to improve convergence. Furthermore, a cryptobiosis mechanism records and reuses historically successful solutions, thereby improving the greedy selection process. The experimental results on 29 CEC 2017 benchmark functions demonstrate CPLODE’s superior performance compared to eight classical optimization algorithms, with higher average ranks and faster convergence. Moreover, CPLODE achieved competitive results in feature selection on ten real-world datasets, outperforming several well-known binary metaheuristic algorithms in classification accuracy and feature reduction. These results highlight CPLODE’s effectiveness for both global optimization and feature selection. Full article
Show Figures

Figure 1

Figure 1
<p>Flowchart of PLO.</p>
Full article ">Figure 2
<p>Flowchart of CPLODE.</p>
Full article ">Figure 3
<p>Convergence curves of CPLODE on benchmarks with other algorithms.</p>
Full article ">
22 pages, 2657 KiB  
Article
Optimizing Autonomous Multi-UAV Path Planning for Inspection Missions: A Comparative Study of Genetic and Stochastic Hill Climbing Algorithms
by Faten Aljalaud and Yousef Alohali
Energies 2025, 18(1), 50; https://doi.org/10.3390/en18010050 - 27 Dec 2024
Viewed by 394
Abstract
Efficient path planning is vital for multi-UAV inspection missions, yet the comparative effectiveness of different optimization strategies has not received much attention. This paper introduces the first application of the Genetic Algorithm (GA) and Hill Climbing (HC) to multi-UAV inspection of indoor pipelines, [...] Read more.
Efficient path planning is vital for multi-UAV inspection missions, yet the comparative effectiveness of different optimization strategies has not received much attention. This paper introduces the first application of the Genetic Algorithm (GA) and Hill Climbing (HC) to multi-UAV inspection of indoor pipelines, providing a unique comparative analysis. GA exemplifies the global search strategy, while HC illustrates an enhanced stochastic local search. This comparison is impactful as it highlights the trade-offs between exploration and exploitation—two key challenges in multi-UAV path optimization. It also addresses practical concerns such as workload balancing and energy efficiency, which are crucial for the successful implementation of UAV missions. To tackle common challenges in multi-UAV operations, we have developed a novel repair mechanism. This mechanism utilizes problem-specific repair heuristics to ensure feasible and valid solutions by resolving redundant or missed inspection points. Additionally, we have introduced a penalty-based approach in HC to balance UAV workloads. Using the Crazyswarm simulation platform, we evaluated GA and HC across key performance metrics: energy consumption, travel distance, running time, and maximum tour length. The results demonstrate that GA achieves a 22% reduction in travel distance and a 23% reduction in energy consumption compared to HC, which often converges to suboptimal solutions. Additionally, GA outperforms HC, Greedy, and Random strategies, delivering at least a 13% improvement in workload balancing and other metrics. These findings establish a novel and impactful benchmark for comparing global and local optimization strategies in multi-UAV tasks, offering researchers and practitioners critical insights for selecting efficient and sustainable approaches to UAV operations in complex inspection environments. Full article
Show Figures

Figure 1

Figure 1
<p>Steps of the penalty calculations in the Hill Climbing algorithm, showing how imbalance penalties are computed and adjusted to ensure balanced UAV workload distribution.</p>
Full article ">Figure 2
<p>Crazyflie UAV.</p>
Full article ">Figure 3
<p>Ultrasonic sensor (LV-MaxSonar-EZ2).</p>
Full article ">Figure 4
<p>Total traveled distance across algorithms: (<b>a</b>) Map#1; (<b>b</b>) Map#2, showing mean values calculated over 30 runs.</p>
Full article ">Figure 5
<p>Maximum tour length across algorithms: (<b>a</b>) Map#1; (<b>b</b>) Map#2, showing mean values calculated over 30 runs.</p>
Full article ">Figure 6
<p>Average consumed energy across algorithms: (<b>a</b>) Map#1; (<b>b</b>) Map#2, showing mean values calculated over 30 runs.</p>
Full article ">Figure 7
<p>Running time across algorithms: (<b>a</b>) Map#1; (<b>b</b>) Map#2, showing mean values calculated over 30 runs.</p>
Full article ">
30 pages, 1715 KiB  
Article
Multi-Armed Bandit Approaches for Location Planning with Dynamic Relief Supplies Allocation Under Disaster Uncertainty
by Jun Liang, Zongjia Zhang and Yanpeng Zhi
Smart Cities 2025, 8(1), 5; https://doi.org/10.3390/smartcities8010005 - 25 Dec 2024
Viewed by 534
Abstract
Natural disasters (e.g., floods, earthquakes) significantly impact citizens, economies, and the environment worldwide. Due to their sudden onset, devastating effects, and high uncertainty, it is crucial for emergency departments to take swift action to minimize losses. Among these actions, planning the locations of [...] Read more.
Natural disasters (e.g., floods, earthquakes) significantly impact citizens, economies, and the environment worldwide. Due to their sudden onset, devastating effects, and high uncertainty, it is crucial for emergency departments to take swift action to minimize losses. Among these actions, planning the locations of relief supply distribution centers and dynamically allocating supplies is paramount, as governments must prioritize citizens’ safety and basic living needs following disasters. To address this challenge, this paper develops a three-layer emergency logistics network to manage the flow of emergency materials, from warehouses to transfer stations to disaster sites. A bi-objective, multi-period stochastic integer programming model is proposed to solve the emergency location, distribution, and allocation problem under uncertainty, focusing on three key decisions: transfer station selection, upstream emergency material distribution, and downstream emergency material allocation. We introduce a multi-armed bandit algorithm, named the Geometric Greedy algorithm, to optimize transfer station planning while accounting for subsequent dynamic relief supply distribution and allocation in a stochastic environment. The new algorithm is compared with two widely used multi-armed bandit algorithms: the ϵ-Greedy algorithm and the Upper Confidence Bound (UCB) algorithm. A case study in the Futian District of Shenzhen, China, demonstrates the practicality of our model and algorithms. The results show that the Geometric Greedy algorithm excels in both computational efficiency and convergence stability. This research offers valuable guidelines for emergency departments in optimizing the layout and flow of emergency logistics networks. Full article
(This article belongs to the Section Applied Science and Humanities for Smart Cities)
Show Figures

Figure 1

Figure 1
<p>Diagram for emergency materials distribution.</p>
Full article ">Figure 2
<p>Timeline for the emergency logistics operations.</p>
Full article ">Figure 3
<p>Schematic diagram of Geometric Greedy algorithm.</p>
Full article ">Figure 4
<p>The distribution of candidate transfer stations, warehouses, and affect sites on the road network in Futian District.</p>
Full article ">Figure 5
<p>Selected locations of transfer stations.</p>
Full article ">Figure 6
<p>The number of times that {6, 9, 14} are selected under different <span class="html-italic">p</span>.</p>
Full article ">Figure 7
<p>The objective values as demand increases.</p>
Full article ">
29 pages, 2318 KiB  
Review
A Review of Smart Camera Sensor Placement in Construction
by Wei Tian, Hao Li, Hao Zhu, Yongwei Wang, Xianda Liu, Rongzheng Yang, Yujun Xie, Meng Zhang, Jun Zhu and Xiangyu Wang
Buildings 2024, 14(12), 3930; https://doi.org/10.3390/buildings14123930 - 9 Dec 2024
Viewed by 660
Abstract
Cameras, with their low cost and efficiency, are widely used in construction management and structural health monitoring. However, existing reviews on camera sensor placement (CSP) are outdated due to rapid technological advancements. Furthermore, the construction industry poses unique challenges for CSP implementation due [...] Read more.
Cameras, with their low cost and efficiency, are widely used in construction management and structural health monitoring. However, existing reviews on camera sensor placement (CSP) are outdated due to rapid technological advancements. Furthermore, the construction industry poses unique challenges for CSP implementation due to its scale, complexity, and dynamic nature. Previous reviews have not specifically addressed these industry-specific demands. This study aims to fill this gap by analyzing articles from the Web of Science and ASCE databases that focus exclusively on CSP in construction. A rigorous selection process ensures the relevance and quality of the included studies. This comprehensive review navigates through the complexities of camera and environment models, advocating for advanced optimization techniques like genetic algorithms, greedy algorithms, Swarm Intelligence, and Markov Chain Monte Carlo to refine CSP strategies. Simultaneously, Building Information Modeling is employed to consider the progress of construction and visualize optimized layouts, improving the effect of CSP. This paper delves into perspective distortion, the field of view considerations, and the occlusion impacts, proposing a unified framework that bridges practical execution with the theory of optimal CSP. Furthermore, the roadmap for future exploration in the CSP of construction is proposed. This work enriches the study of construction CSP, charting a course for future inquiry, and emphasizes the need for adaptable and technologically congruent CSP approaches amid evolving application landscapes. Full article
(This article belongs to the Special Issue Smart and Digital Construction in AEC Industry)
Show Figures

Figure 1

Figure 1
<p>Research methodology.</p>
Full article ">Figure 2
<p>Methodological workflow.</p>
Full article ">Figure 3
<p>Camera mode: (<b>a</b>) bullet/dome camera, (<b>b</b>) omnidirectional cameras.</p>
Full article ">Figure 4
<p>The general framework of GAs.</p>
Full article ">Figure 5
<p>The iteration process of PSO.</p>
Full article ">Figure 6
<p>The camera placement optimization framework based on BIM.</p>
Full article ">
23 pages, 3424 KiB  
Article
Automated Detection of Gastrointestinal Diseases Using Resnet50*-Based Explainable Deep Feature Engineering Model with Endoscopy Images
by Veysel Yusuf Cambay, Prabal Datta Barua, Abdul Hafeez Baig, Sengul Dogan, Mehmet Baygin, Turker Tuncer and U. R. Acharya
Sensors 2024, 24(23), 7710; https://doi.org/10.3390/s24237710 - 2 Dec 2024
Cited by 1 | Viewed by 720
Abstract
This work aims to develop a novel convolutional neural network (CNN) named ResNet50* to detect various gastrointestinal diseases using a new ResNet50*-based deep feature engineering model with endoscopy images. The novelty of this work is the development of ResNet50*, a new variant of [...] Read more.
This work aims to develop a novel convolutional neural network (CNN) named ResNet50* to detect various gastrointestinal diseases using a new ResNet50*-based deep feature engineering model with endoscopy images. The novelty of this work is the development of ResNet50*, a new variant of the ResNet model, featuring convolution-based residual blocks and a pooling-based attention mechanism similar to PoolFormer. Using ResNet50*, a gastrointestinal image dataset was trained, and an explainable deep feature engineering (DFE) model was developed. This DFE model comprises four primary stages: (i) feature extraction, (ii) iterative feature selection, (iii) classification using shallow classifiers, and (iv) information fusion. The DFE model is self-organizing, producing 14 different outcomes (8 classifier-specific and 6 voted) and selecting the most effective result as the final decision. During feature extraction, heatmaps are identified using gradient-weighted class activation mapping (Grad-CAM) with features derived from these regions via the final global average pooling layer of the pretrained ResNet50*. Four iterative feature selectors are employed in the feature selection stage to obtain distinct feature vectors. The classifiers k-nearest neighbors (kNN) and support vector machine (SVM) are used to produce specific outcomes. Iterative majority voting is employed in the final stage to obtain voted outcomes using the top result determined by the greedy algorithm based on classification accuracy. The presented ResNet50* was trained on an augmented version of the Kvasir dataset, and its performance was tested using Kvasir, Kvasir version 2, and wireless capsule endoscopy (WCE) curated colon disease image datasets. Our proposed ResNet50* model demonstrated a classification accuracy of more than 92% for all three datasets and a remarkable 99.13% accuracy for the WCE dataset. These findings affirm the superior classification ability of the ResNet50* model and confirm the generalizability of the developed architecture, showing consistent performance across all three distinct datasets. Full article
(This article belongs to the Special Issue AI-Based Automated Recognition and Detection in Healthcare)
Show Figures

Figure 1

Figure 1
<p>Sample images used in this work. (<b>a</b>) Dyed lifted polyps. (<b>b</b>) Dyed resection margins. (<b>c</b>) Esophagitis. (<b>d</b>) Normal cecum. (<b>e</b>) Normal pylorus. (<b>f</b>) Normal z-line. (<b>g</b>) Polyps. (<b>h</b>) Ulcerative colitis.</p>
Full article ">Figure 2
<p>Block designs for ResNet and ResNet*. F: number of filters.</p>
Full article ">Figure 3
<p>Graphical demonstration of the proposed ResNet50*. F: number of filters, BN: batch normalization, ReLU: restricted linear unit, Avg. Pool: average pooling, Max Pool: maximum pooling, GAP: global average pooling, FC: fully connected.</p>
Full article ">Figure 4
<p>Graphical overview of the proposed ResNet50*-based DFE model. Here, f: selected feature vector, c: classifier-based outcome, v: voted outcome.</p>
Full article ">Figure 5
<p>Graph of training and validation accuracies/losses versus number of epochs.</p>
Full article ">Figure 6
<p>Confusion matrices obtained for the proposed ResNet50*-based DFE model. In the confusion matrices, cells with a blue background represent the correctly predicted observations (true positives) for each class. Cells with a white background represent zeros, indicating no predictions for those combinations. Cells with a beige background represent the number of falsely predicted observations (misclassifications) between classes.</p>
Full article ">Figure 6 Cont.
<p>Confusion matrices obtained for the proposed ResNet50*-based DFE model. In the confusion matrices, cells with a blue background represent the correctly predicted observations (true positives) for each class. Cells with a white background represent zeros, indicating no predictions for those combinations. Cells with a beige background represent the number of falsely predicted observations (misclassifications) between classes.</p>
Full article ">Figure 7
<p>Sample images and their corresponding heatmaps. The colors in the heatmap typically represent varying levels of intensity or importance: blue tones indicate areas that are not important, yellow tones represent moderately important areas, and red tones highlight regions that are highly important for feature extraction.</p>
Full article ">Figure 8
<p>Validation accuracies (%) obtained for the ResNet50 and ResNet50* models.</p>
Full article ">Figure 9
<p>Classification accuracies (%) obtained using various feature selectors and classifiers. The given red lines represent the median of the accuracies.</p>
Full article ">Figure 10
<p>Number of times classifiers and feature selectors were used to obtain the best outcomes.</p>
Full article ">
19 pages, 1867 KiB  
Article
Bridging the Gap: An Algorithmic Framework for Vehicular Crowdsensing
by Luis G. Jaimes, Craig White and Paniz Abedin
Sensors 2024, 24(22), 7191; https://doi.org/10.3390/s24227191 - 9 Nov 2024
Viewed by 714
Abstract
In this paper, we investigate whether greedy algorithms, traditionally used for pedestrian-based crowdsensing, remain effective in the context of vehicular crowdsensing (VCS). Vehicular crowdsensing leverages vehicles equipped with sensors to gather and transmit data to address several urban challenges. Despite its potential, VCS [...] Read more.
In this paper, we investigate whether greedy algorithms, traditionally used for pedestrian-based crowdsensing, remain effective in the context of vehicular crowdsensing (VCS). Vehicular crowdsensing leverages vehicles equipped with sensors to gather and transmit data to address several urban challenges. Despite its potential, VCS faces issues with user engagement due to inadequate incentives and privacy concerns. In this paper, we use a dynamic incentive mechanism based on a recurrent reverse auction model, incorporating vehicular mobility patterns and realistic urban scenarios using the Simulation of Urban Mobility (SUMO) traffic simulator and OpenStreetMap (OSM). By selecting a representative subset of vehicles based on their locations within a fixed budget, our mechanism aims to improve coverage and reduce data redundancy. We evaluate the applicability of successful participatory sensing approaches designed for pedestrian data and demonstrate their limitations when applied to VCS. This research provides insights into adapting greedy algorithms for the particular dynamics of vehicular crowdsensing. Full article
(This article belongs to the Special Issue Intelligent Transportation Systems: Sensing, Automation and Control)
Show Figures

Figure 1

Figure 1
<p>Example of coverage per user.</p>
Full article ">Figure 2
<p>Radius vs. percent utilization (<b>left</b>) and number of participants (<b>right</b>).</p>
Full article ">Figure 3
<p>Cost vs. number of active participants under normal (<b>left</b>), exponential (<b>center</b>), and uniform (<b>right</b>) distributions.</p>
Full article ">Figure 4
<p>Number of samples vs. percentage area coverage (<b>left</b>), number of active participants (<b>center</b>), and cost (<b>right</b>).</p>
Full article ">Figure 5
<p>Simulation components.</p>
Full article ">Figure 6
<p>Normal distribution for trajectory distribution and participants’ true valuations.</p>
Full article ">Figure 7
<p>Exponential distribution for trajectory distribution and participants’ true valuations.</p>
Full article ">Figure 8
<p>Budget vs. coverage, number of participants, and budget utilization under uniform distribution for trajectory locations and participant true valuations.</p>
Full article ">Figure 9
<p>Budget vs. coverage, number of participants, and budget utilization under uniform and normal distributions for trajectory locations and participant true valuations, respectively.</p>
Full article ">Figure 10
<p>Budget vs. coverage, number of participants, and budget utilization under normal and uniform distributions for trajectory locations and participant true valuations, respectively.</p>
Full article ">
34 pages, 4777 KiB  
Article
Model for Predicting Maize Crop Yield on Small Farms Using Clusterwise Linear Regression and GRASP
by Germán-Homero Morán-Figueroa, Darwin-Fabián Muñoz-Pérez, José-Luis Rivera-Ibarra and Carlos-Alberto Cobos-Lozada
Mathematics 2024, 12(21), 3356; https://doi.org/10.3390/math12213356 - 26 Oct 2024
Viewed by 1541
Abstract
Planting a crop involves several key steps: resource assessment, crop selection, crop rotation, planting schedules, soil preparation, planting, care, and harvesting of crops. In this context, estimating the productivity of a crop based on available information, such as expected climatic conditions and agricultural [...] Read more.
Planting a crop involves several key steps: resource assessment, crop selection, crop rotation, planting schedules, soil preparation, planting, care, and harvesting of crops. In this context, estimating the productivity of a crop based on available information, such as expected climatic conditions and agricultural practices, helps farmers reduce the uncertainty of their investment. In Colombia, maize is the fourth most important crop in the country. Significant efforts are required to improve productivity in traditional and technified production systems. In this sense, this research proposes and evaluates an approach called Clusterwise Linear Regression (CLR) to predict the crop maize yield in small farms, considering data on climate, soil, fertilization, and management practices, among others. To develop the CLR model, we conducted the following steps: data collection and preparation, clustering using k-means, cluster optimization with Greedy Random Adaptive Search Procedure (GRASP), and performance evaluation. The cluster optimization process allows the identification of clusters with similar characteristics and generates multiple linear regression models with mixed variables that explain the yield of the farms on each cluster. The Simulated Multiple Start Annealing (MSSA) metaheuristics were also evaluated, but the results of GRASP were the best. The results indicate that the proposed CLR approach is more effective than the linear and nonlinear algorithms mentioned in the literature, such as multiple lasso linear regression, random forests, XGBoost, and support vector machines. These algorithms achieved an accuracy of 70%. However, with the new CLR model, a significantly improved accuracy of 87% was achieved with test data. The clusters’ studies revealed key factors affecting crop yield, such as fertilization, drainage, and soil type. This transparency is a benefit over black-box models, which can be harder to interpret. This advancement can allow farmers to make better decisions about the management of their crops. Full article
(This article belongs to the Section D2: Operations Research and Fuzzy Decision Making)
Show Figures

Figure 1

Figure 1
<p>Average yield maize production for the Cordoba department between 2016 and 2018, taken from the U.S. Department of Agriculture [<a href="#B40-mathematics-12-03356" class="html-bibr">40</a>].</p>
Full article ">Figure 2
<p>Representation of clustering observations (example for 5 clusters).</p>
Full article ">Figure 3
<p>Representation of a solution using the CLR approach.</p>
Full article ">Figure 4
<p>Representation of a cluster centroid CLR approach.</p>
Full article ">Figure 5
<p>Temperature Behavior in MSSA.</p>
Full article ">Figure 6
<p>Example of solutions with K = 2.</p>
Full article ">Figure 7
<p>Example data distribution within a cluster GRASP metaheuristic.</p>
Full article ">Figure 8
<p>Flowchart of the implementation of the CLR algorithm for mazie yield prediction.</p>
Full article ">Figure 9
<p>Average R<sup>2</sup> adjusted for 5 clusters with 6 h of execution per result.</p>
Full article ">Figure 10
<p>Performance of linear and nonlinear models vs. 5-cluster CLR model.</p>
Full article ">Figure 11
<p>Climatic variables that further distinguish the clusters.</p>
Full article ">Figure 12
<p>Soil variables that further distinguish the clusters.</p>
Full article ">Figure 13
<p>Management practices variables that further distinguish the clusters.</p>
Full article ">Figure 14
<p>Correlation between lot height vs. yield maize. Cluster 2, Cluster 3, Cluster 4 and Cluster 5.</p>
Full article ">
30 pages, 5232 KiB  
Article
Computer-Aided Identification and Design of Ligands for Multi-Targeting Inhibition of a Molecular Acute Myeloid Leukemia Network
by Seyedeh Sadaf Asfa, Reza Arshinchi Bonab, Onur Önder, Merve Uça Apaydın, Hatice Döşeme, Can Küçük, Alexandros G. Georgakilas, Bernhard M. Stadler, Stella Logotheti, Seyit Kale and Athanasia Pavlopoulou
Cancers 2024, 16(21), 3607; https://doi.org/10.3390/cancers16213607 - 25 Oct 2024
Viewed by 3475
Abstract
Background/Objectives: Acute myeloid leukemia (AML) is characterized by therapeutic failure and long-term risk for disease relapses. As several therapeutic targets participate in networks, they can rewire to eventually evade single-target drugs. Hence, multi-targeting approaches are considered on the expectation that interference with many [...] Read more.
Background/Objectives: Acute myeloid leukemia (AML) is characterized by therapeutic failure and long-term risk for disease relapses. As several therapeutic targets participate in networks, they can rewire to eventually evade single-target drugs. Hence, multi-targeting approaches are considered on the expectation that interference with many different components could synergistically hinder activation of alternative pathways and demolish the network one-off, leading to complete disease remission. Methods: Herein, we established a network-based, computer-aided approach for the rational design of drug combinations and de novo agents that interact with many AML network components simultaneously. Results: A reconstructed AML network guided the selection of suitable protein hubs and corresponding multi-targeting strategies. For proteins responsive to existing drugs, a greedy algorithm identified the minimum amount of compounds targeting the maximum number of hubs. We predicted permissible combinations of amiodarone, artenimol, fostamatinib, ponatinib, procaine, and vismodegib that interfere with 3–8 hubs, and we elucidated the pharmacological mode of action of procaine on DNMT3A. For proteins that do not respond to any approved drugs, namely cyclins A1, D2, and E1, we used structure-based de novo drug design to generate a novel triple-targeting compound of the chemical formula C15H15NO5, with favorable pharmacological and drug-like properties. Conclusions: Overall, by integrating network and structural pharmacology with molecular modeling, we determined two complementary strategies with the potential to annihilate the AML network, one in the form of repurposable drug combinations and the other as a de novo synthesized triple-targeting agent. These target–drug interactions could be prioritized for preclinical and clinical testing toward precision medicine for AML. Full article
(This article belongs to the Collection Molecular Signaling Pathways and Networks in Cancer)
Show Figures

Figure 1

Figure 1
<p>Reconstruction of an AML-specific network drives selection of suitable combinations of targets and appropriate strategies for their simultaneous inhibition. (<b>A</b>) The workflow for target/drug selection is based on the topological, functional, and pharmacological properties of the network. (<b>B</b>) Overview of the upregulated transcripts in AML cells versus normal blood controls. Of those, 404 transcripts encode proteins that are involved in the AML network. (<b>C</b>–<b>E</b>) GSEA on the biological processes (<b>C</b>), molecular functions (<b>D</b>), and cellular components (<b>E</b>) that are associated with the 405 transcripts, the products of which participate in the AML network.</p>
Full article ">Figure 1 Cont.
<p>Reconstruction of an AML-specific network drives selection of suitable combinations of targets and appropriate strategies for their simultaneous inhibition. (<b>A</b>) The workflow for target/drug selection is based on the topological, functional, and pharmacological properties of the network. (<b>B</b>) Overview of the upregulated transcripts in AML cells versus normal blood controls. Of those, 404 transcripts encode proteins that are involved in the AML network. (<b>C</b>–<b>E</b>) GSEA on the biological processes (<b>C</b>), molecular functions (<b>D</b>), and cellular components (<b>E</b>) that are associated with the 405 transcripts, the products of which participate in the AML network.</p>
Full article ">Figure 2
<p>Overview of the druggable (light red) versus undruggable (blue) components of the AML network. (<b>A</b>) The nodes represent proteins, and the connecting lines (edges) indicate functional associations. The fifteen selected target proteins are represented by bigger nodes. The three cyclin proteins that were selected for subsequent de novo multi-target drug design are denoted by a blue outline. (<b>B</b>) Diagram of the permissible two-drug combinations that can target the highest number of druggable hubs. The safe combinations appear in green, while those that are associated with drug–drug interactions are in red. The number of the AML network hubs targeted by each drug alone is depicted next to each drug name. The number of the targeted hubs for each drug combination is outlined in the corresponding cell.</p>
Full article ">Figure 3
<p>Molecular simulation of the mode of action of procaine on DNMT3A. (<b>A</b>) DNMT1, DNMT3A, and DNMT3B are canonical cytosine-5 DNMTs that catalyse the addition of methylation marks to genomic DNA. DNMT3A/DNMT3B are de novo methyltransferases, i.e., they preferentially bind to non-methylated DNA and generate new methylation patterns, while DNMT1 is a maintenance methyltransferase that binds to hemi-methylated DNA during DNA replication and mediates inheritable DNA methylation. The S-Adenosyl-L-homocysteine (SAH) is formed by demethylation of the cofactor S-Adenosyl-L-methionine (SAM). SAH is a potent inhibitor of DNA methylation by selectively binding to the active site of DNMTs, thereby preventing methyl groups from being added to the DNA template. (<b>B</b>–<b>G</b>) Molecular simulations of DNA-bound DNMT3A in procaine. (<b>B</b>) DNMT3A (green) bound to DNA (orange). The cofactor SAH is in red spheres in the top model. The bottom model illustrates the possibilities (indicated by “?”) by which procaine could be interacting with DNMT3A. (<b>C</b>) Ensemble of the molecular conformations of procaine as predicted by SwissDock to bind DNMT3A most favorably. (<b>D</b>) The snapshots of the active site procaine 1st (ASP1) simulation with initial (time = 0), midpoint (time = 250 ns), and final (time = 500 ns) states from the apoenzyme simulation. DNMT3A (green) bound to DNA (orange). The cofactor SAH is replaced by one copy of procaine (blue), which departs this position at the end of the simulation. (<b>E</b>) For the active site procaine 1st (ASP1) simulation, residues that make strong contacts with procaine are indicated in shades of red (red refers to the strongest interaction). (<b>F</b>) The snapshots of the excess procaine 1st (EP1) simulation with initial (time = 0), mid-point (time = 250 ns), and final (time = 500 ns) states from the SAH-bound enzyme in 0.07 M procaine. (<b>G</b>) Following panel E, strong procaine contacts are indicated for excess procaine 1st (EP1) simulation.</p>
Full article ">Figure 3 Cont.
<p>Molecular simulation of the mode of action of procaine on DNMT3A. (<b>A</b>) DNMT1, DNMT3A, and DNMT3B are canonical cytosine-5 DNMTs that catalyse the addition of methylation marks to genomic DNA. DNMT3A/DNMT3B are de novo methyltransferases, i.e., they preferentially bind to non-methylated DNA and generate new methylation patterns, while DNMT1 is a maintenance methyltransferase that binds to hemi-methylated DNA during DNA replication and mediates inheritable DNA methylation. The S-Adenosyl-L-homocysteine (SAH) is formed by demethylation of the cofactor S-Adenosyl-L-methionine (SAM). SAH is a potent inhibitor of DNA methylation by selectively binding to the active site of DNMTs, thereby preventing methyl groups from being added to the DNA template. (<b>B</b>–<b>G</b>) Molecular simulations of DNA-bound DNMT3A in procaine. (<b>B</b>) DNMT3A (green) bound to DNA (orange). The cofactor SAH is in red spheres in the top model. The bottom model illustrates the possibilities (indicated by “?”) by which procaine could be interacting with DNMT3A. (<b>C</b>) Ensemble of the molecular conformations of procaine as predicted by SwissDock to bind DNMT3A most favorably. (<b>D</b>) The snapshots of the active site procaine 1st (ASP1) simulation with initial (time = 0), midpoint (time = 250 ns), and final (time = 500 ns) states from the apoenzyme simulation. DNMT3A (green) bound to DNA (orange). The cofactor SAH is replaced by one copy of procaine (blue), which departs this position at the end of the simulation. (<b>E</b>) For the active site procaine 1st (ASP1) simulation, residues that make strong contacts with procaine are indicated in shades of red (red refers to the strongest interaction). (<b>F</b>) The snapshots of the excess procaine 1st (EP1) simulation with initial (time = 0), mid-point (time = 250 ns), and final (time = 500 ns) states from the SAH-bound enzyme in 0.07 M procaine. (<b>G</b>) Following panel E, strong procaine contacts are indicated for excess procaine 1st (EP1) simulation.</p>
Full article ">Figure 4
<p>Development of a drug-like ligand to target three cyclins simultaneously. (<b>A</b>) Cyclins A1, D2, and E1 are key hubs of the AML network. Complexes of these cyclins with their CDK partners regulate key processes during the cell cycle. CDK4/6/cyclin D complexes act in phase G1, and CDK2/cyclin E complexes act when G1/S transition takes place. The CDK2/cyclin A complex regulates progression through the S phase and the CDK1/cyclin A complex through the G2 phase in preparation for mitosis (M). (<b>B</b>) Chemical structure of the triple-targeting cyclin protein ligand that was generated by LigBuilder V3.</p>
Full article ">Figure 5
<p>Identification of amino acids involved in the interaction of the novel ligand with cyclin E1, A1, and D2. (<b>A</b>–<b>C</b>) Docking poses of the ligand against CCNE1, CCNA1, and CCND2. <b>Left</b>: Cartoon representation of target proteins and stick representation of the ligand compound. <b>Right</b>: 2D view of the protein–ligand binding residues. (<b>D</b>–<b>F</b>) Logos of corresponding conserved cyclin sequence motifs. The numbers denote the positions of the amino acids that are involved in the ligand–cyclin interaction. The residues reported to reside in the cyclin–CDK interface are indicated by dark red dots. The height of each letter is proportional to the frequency of the occurrence of the corresponding amino acid at that position.</p>
Full article ">Scheme 1
<p>(<b>a</b>) Retrosynthetic approach of the ligands. (<b>b</b>) Exemplary synthesis of (2S)-2-[5-(2-anilino-2-oxoethyl)furan-3-yl]-2-hydroxypropanoic acid (1), where R1 = CH<sub>3</sub>, n = 1, R2 = H.</p>
Full article ">
22 pages, 2403 KiB  
Article
MDSA: A Dynamic and Greedy Approach to Solve the Minimum Dominating Set Problem
by Fatih Okumuş and Şeyda Karcı
Appl. Sci. 2024, 14(20), 9251; https://doi.org/10.3390/app14209251 - 11 Oct 2024
Viewed by 1091
Abstract
The graph theory is one of the fundamental structures in computer science used to model various scientific and engineering problems. Many problems within the graph theory are categorized as NP-hard and NP-complete. One such problem is the minimum dominating set (MDS) problem, which [...] Read more.
The graph theory is one of the fundamental structures in computer science used to model various scientific and engineering problems. Many problems within the graph theory are categorized as NP-hard and NP-complete. One such problem is the minimum dominating set (MDS) problem, which seeks to identify the minimum possible subsets in a graph such that every other node in the subset is directly connected to a node in this subset. Due to its inherent complexity, developing an efficient polynomial-time method to address the MDS problem remains a significant challenge in graph theory. This paper introduces a novel algorithm that utilizes a centrality measure known as the Malatya Centrality to effectively address the MDS problem. The proposed algorithm, called the Malatya Dominating Set Algorithm (MDSA), leverages centrality values to identify dominating sets within a graph. It extends the Malatya centrality by incorporating a second-level centrality measure, which enhances the identification of dominating nodes. Through a systematic and algorithmic approach, these centrality values are employed to pinpoint the elements of the dominating set. The MDSA uniquely integrates greedy and dynamic programming strategies. At each step, the algorithm selects the most optimal (or near-optimal) node based on the centrality values (greedy approach) while updating the neighboring nodes’ criteria to influence subsequent decisions (dynamic programming). The proposed algorithm demonstrates efficient performance, particularly in large-scale graphs, with time and space requirements scaling proportionally with the size of the graph and its average degree. Experimental results indicate that our algorithm outperforms existing methods, especially in terms of time complexity when applied to large datasets, showcasing its effectiveness in addressing the MDS problem. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>The influential area of the first Malatya centrality values.</p>
Full article ">Figure 2
<p>The influential area of the second Malatya centrality values.</p>
Full article ">Figure 3
<p>A grid of size 5 × 6.</p>
Full article ">Figure 4
<p>Application steps of Malatya Dominating Set Algorithm to grid of sizes 5 × 6. Red nodes represent the nodes included in the dominating set. Gray nodes are nodes that are neighbors to a dominating set node. Blue nodes indicate nodes that have not yet been visited.</p>
Full article ">Figure 5
<p>Banana tree.</p>
Full article ">Figure 6
<p>Results of the algorithm’s first iteration on banana tree. (<b>a</b>) The raw output of the graph generated by the algorithm (<b>b</b>) Readable visualization of the graph.</p>
Full article ">Figure 7
<p>The resultant graphs of second (<b>a</b>) and third (<b>b</b>) iterations.</p>
Full article ">
26 pages, 3720 KiB  
Article
Adaptive Differential Evolution with the Stagnation Termination Mechanism
by Yuhong Liu, Liming Zheng and Bohan Cai
Mathematics 2024, 12(20), 3168; https://doi.org/10.3390/math12203168 - 10 Oct 2024
Viewed by 630
Abstract
Differential evolution is capable of searching for the optimum for different types of optimization problems with a few inputs, which has gained worldwide popularity. In this paper, we propose a parameters adaptation scheme based on the stagnation ratio (PASR), which regards the stagnation [...] Read more.
Differential evolution is capable of searching for the optimum for different types of optimization problems with a few inputs, which has gained worldwide popularity. In this paper, we propose a parameters adaptation scheme based on the stagnation ratio (PASR), which regards the stagnation ratio (STR) as the indicator for adjusting the control parameters and greediness parameter. To be specific, when the STR is larger than the predefined threshold, exploration is advocated. In this circumstance, larger control parameters and a greediness parameter are adopted. However, when the STR is smaller than the predefined threshold, exploitation is preferred. In this case, smaller control parameters and a greediness parameter are utilized. Further, when the stagnation lasts for a long period, a generation-based selection (GBS) scheme is developed to help it escape from the local optimum and stagnation. Comparative experiments have been implemented on the CEC2017 to testify the effectiveness of adaptive differential evolution with the stagnation termination mechanism (STMDE) and its components. The competitiveness of the STMDE is also verified via comparing it to top-performing DE variants in the practical optimization problem selected from the CEC2011. Full article
Show Figures

Figure 1

Figure 1
<p>Performance rankings of STMDE and compared DE variants.</p>
Full article ">Figure 2
<p>Performance comparison of STMDE with five SOTA DEs on all 30-D, 50-D and 100-D test functions with critical difference value.</p>
Full article ">Figure 3
<p>Time complexity of STMDE and its compared DE variants.</p>
Full article ">Figure 4
<p>Convergence graphics of STMDE and compared DE variants; (<b>a</b>) convergence graphic on 30-D F5; (<b>b</b>) convergence graphic on 30-D F15; (<b>c</b>) convergence graphic on 30-D F17; (<b>d</b>) convergence graphic on 30-D F29.</p>
Full article ">Figure 4 Cont.
<p>Convergence graphics of STMDE and compared DE variants; (<b>a</b>) convergence graphic on 30-D F5; (<b>b</b>) convergence graphic on 30-D F15; (<b>c</b>) convergence graphic on 30-D F17; (<b>d</b>) convergence graphic on 30-D F29.</p>
Full article ">Figure 5
<p>Box plots of error for STMDE and compared DE variants (<b>a</b>) on 30-D F5; (<b>b</b>) on 30-D F7; (<b>c</b>) on 30-D F8; (<b>d</b>) on 30-D F10; (<b>e</b>) on 30-D F14; (<b>f</b>) on 30-D F17; (<b>g</b>) on 30-D F19; (<b>h</b>) on 30-D F21; (<b>i</b>) on 30-D F23; (<b>j</b>) on 30-D F29.</p>
Full article ">Figure 5 Cont.
<p>Box plots of error for STMDE and compared DE variants (<b>a</b>) on 30-D F5; (<b>b</b>) on 30-D F7; (<b>c</b>) on 30-D F8; (<b>d</b>) on 30-D F10; (<b>e</b>) on 30-D F14; (<b>f</b>) on 30-D F17; (<b>g</b>) on 30-D F19; (<b>h</b>) on 30-D F21; (<b>i</b>) on 30-D F23; (<b>j</b>) on 30-D F29.</p>
Full article ">Figure 5 Cont.
<p>Box plots of error for STMDE and compared DE variants (<b>a</b>) on 30-D F5; (<b>b</b>) on 30-D F7; (<b>c</b>) on 30-D F8; (<b>d</b>) on 30-D F10; (<b>e</b>) on 30-D F14; (<b>f</b>) on 30-D F17; (<b>g</b>) on 30-D F19; (<b>h</b>) on 30-D F21; (<b>i</b>) on 30-D F23; (<b>j</b>) on 30-D F29.</p>
Full article ">Figure 6
<p>Performance rankings for different settings of <span class="html-italic">DCcr</span>.</p>
Full article ">Figure 7
<p>Performance rankings for different settings of <span class="html-italic">DCf</span>.</p>
Full article ">Figure 8
<p>Performance rankings for different settings of <span class="html-italic">T</span>.</p>
Full article ">Figure 9
<p>Performance rankings for different settings of <span class="html-italic">gp</span>.</p>
Full article ">
45 pages, 16184 KiB  
Article
MSAO-EDA: A Modified Snow Ablation Optimizer by Hybridizing with Estimation of Distribution Algorithm
by Wuke Li, Xiaoxiao Chen and Hector Chimeremeze Okere
Biomimetics 2024, 9(10), 603; https://doi.org/10.3390/biomimetics9100603 - 7 Oct 2024
Viewed by 679
Abstract
Metaheuristic algorithms provide reliable and effective methods for solving challenging optimization problems. The snow ablation algorithm (SAO) performs favorably as a physics-based metaheuristic algorithm. Nevertheless, SAO has some shortcomings. SAO is overpowered in its exploitation, has difficulty in balancing the proportion of global [...] Read more.
Metaheuristic algorithms provide reliable and effective methods for solving challenging optimization problems. The snow ablation algorithm (SAO) performs favorably as a physics-based metaheuristic algorithm. Nevertheless, SAO has some shortcomings. SAO is overpowered in its exploitation, has difficulty in balancing the proportion of global and local search, and is prone to encountering local optimum traps when confronted with complex problems. To improve the capability of SAO, this paper proposes a modified snow ablation algorithm hybrid distribution estimation algorithm named MSAO-EDA. In this work, a collaborative search framework is proposed where SAO and EDA can be organically integrated together to fully utilize the exploitation capability of SAO and the exploration capability of EDA. Secondly, an offset EDA approach that combines the optimal solution and the agent itself is used to replace SAO’s exploration strategy for the purpose of enhancing SAO’s exploration capability. Finally, the convergence of SAO is accelerated by selecting the next generation of agents through a greedy strategy. MSAO-EDA is tested on the CEC 2017 and CEC 2022 test suites and compared with EO, RIME, MRFO, CFOA, and four advanced algorithms, AFDBARO, CSOAOA, EOSMA, and JADE. The experimental results show that MSAO-EDA has excellent efficiency in numerical optimization problems and is a highly competitive SAO variant. Full article
Show Figures

Figure 1

Figure 1
<p>Sketch for procedure of collaborative search framework.</p>
Full article ">Figure 2
<p>Sketch for procedure of Offset EDA strategy.</p>
Full article ">Figure 3
<p>Rankings of the different parameter <span class="html-italic">ρ</span>.</p>
Full article ">Figure 4
<p>Rankings of MSAO-EDA and its variants.</p>
Full article ">Figure 5
<p>The rankings of MSAO-EDA and its competitors. (<b>a</b>) D = 10; (<b>b</b>) D = 30; (<b>c</b>) D = 50; (<b>d</b>) D = 100.</p>
Full article ">Figure 5 Cont.
<p>The rankings of MSAO-EDA and its competitors. (<b>a</b>) D = 10; (<b>b</b>) D = 30; (<b>c</b>) D = 50; (<b>d</b>) D = 100.</p>
Full article ">Figure 6
<p>The Wilcoxon rank sum results of MSAO-EDA and its competitors on CEC2017. (<b>a</b>) D = 10; (<b>b</b>) D = 30; (<b>c</b>) D = 50; (<b>d</b>) D = 100.</p>
Full article ">Figure 7
<p>The Friedman test results of MSAO-EDA and its competitors on CEC2017.</p>
Full article ">Figure 8
<p>The convergence graphs of MSAO-EDA and its competitors on CEC2017 50 D.</p>
Full article ">Figure 9
<p>The box graph of MSAO-EDA and its competitors on CEC2017 50 D.</p>
Full article ">Figure 10
<p>The rankings of MSAO-EDA and its competitors on CEC2022. (<b>a</b>) D = 10; (<b>b</b>) D = 20.</p>
Full article ">Figure 11
<p>The Wilcoxon rank sum results of MSAO-EDA and its competitors on CEC2022. (<b>a</b>) D = 10; (<b>b</b>) D = 20.</p>
Full article ">Figure 12
<p>The Friedman test results of MSAO-EDA and its competitors on CEC2022.</p>
Full article ">Figure 13
<p>The convergence graphs of MSAO-EDA and its competitors on CEC2022 10 D.</p>
Full article ">Figure 14
<p>The box graphs of MSAO-EDA and its competitors on CEC2022 10 D.</p>
Full article ">Figure A1
<p>The convergence graphs of MSAO-EDA and its competitors on CEC2017 (10 D).</p>
Full article ">Figure A1 Cont.
<p>The convergence graphs of MSAO-EDA and its competitors on CEC2017 (10 D).</p>
Full article ">Figure A2
<p>The convergence graphs of MSAO-EDA and its competitors on CEC2017 (30 D).</p>
Full article ">Figure A3
<p>The convergence graphs of MSAO-EDA and its competitors on CEC2017 (50 D).</p>
Full article ">Figure A4
<p>The box graphs of MSAO-EDA and its competitors on CEC2017 (10 D).</p>
Full article ">Figure A4 Cont.
<p>The box graphs of MSAO-EDA and its competitors on CEC2017 (10 D).</p>
Full article ">Figure A5
<p>The box graphs of MSAO-EDA and its competitors on CEC2017 (30 D).</p>
Full article ">Figure A6
<p>The box graphs of MSAO-EDA and its competitors on CEC2017 (50 D).</p>
Full article ">Figure A7
<p>The convergence graphs of MSAO-EDA and its competitors on CEC2022 (10 D).</p>
Full article ">Figure A8
<p>The convergence graphs of MSAO-EDA and its competitors on CEC2022 (20 D).</p>
Full article ">Figure A9
<p>The box graphs of MSAO-EDA and its competitors on CEC2022 (10 D).</p>
Full article ">Figure A10
<p>The box graphs of MSAO-EDA and its competitors on CEC2022 (20 D).</p>
Full article ">
29 pages, 4478 KiB  
Article
Secrecy Rate Bounds in Spatial Modulation-Based Visible Light Communications under Signal-Dependent Noise Conditions
by Yahya M. Al-Moliki, Ali H. Alqahtani, Mohammed T. Alresheedi and Yahya Al-Harthi
Photonics 2024, 11(10), 934; https://doi.org/10.3390/photonics11100934 - 3 Oct 2024
Viewed by 766
Abstract
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary. The SM technique is applied at the transmitters so that only one transmitter [...] Read more.
This study examines the physical-layer security of an indoor visible light communication (VLC) system using spatial modulation (SM), which consists of several transmitters, an authorized receiver, and a passive adversary. The SM technique is applied at the transmitters so that only one transmitter is operational at any given time. A uniform selection (US) strategy is employed to choose the active transmitter. The two scenarios under examination encompass the conditions of non-negativity and average optical intensity, as well as the conditions of non-negativity, average optical intensity, and peak optical intensity. The secrecy rate is then obtained for these two scenarios while accounting for both signal-independent noise and signal-dependent noise. Additionally, the high signal-to-noise ratio (SNR) asymptotic behavior of the derived secrecy rate constraints is investigated. A channel-adaptive selection (CAS) strategy and a greedy selection (GS) scheme are utilized to select the active transmitter, aiming to enhance the secrecy performance. The current numerical findings affirm a pronounced convergence between the lower and upper bounds characterizing the secrecy rate. Notably, marginal asymptotic differentials in performance emerge at elevated SNRs. Furthermore, the GS system outperforms the CAS scheme and the US method, in that order. Additionally, the impact of friendly optical jamming on the secrecy rate is investigated. The results show that optical jamming significantly enhances the secrecy rate, particularly at higher power levels. Full article
(This article belongs to the Section Optical Communication and Network)
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>The SM schematic in VLC.</p>
Full article ">Figure 3
<p>Secrecy rate bounds vs. <math display="inline"><semantics> <mi>P</mi> </semantics></math> for varying <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mi>B</mi> </msub> <mo>/</mo> <msub> <mi>h</mi> <mi>E</mi> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>ξ</mi> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Secrecy rate bounds vs. <math display="inline"><semantics> <mi>ξ</mi> </semantics></math> for varying <math display="inline"><semantics> <mi>P</mi> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mi>B</mi> </msub> <mo>/</mo> <msub> <mi>h</mi> <mi>E</mi> </msub> <mo>=</mo> <mn>1000</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Secrecy rate bounds vs. <math display="inline"><semantics> <mi>A</mi> </semantics></math> for varying <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mi>B</mi> </msub> <mo>/</mo> <msub> <mi>h</mi> <mi>E</mi> </msub> </mrow> </semantics></math> when <math display="inline"><semantics> <mrow> <mi>ξ</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>A</mi> <mo>=</mo> <mi>P</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 6
<p>Secrecy rate bounds vs. <math display="inline"><semantics> <mi>P</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mi>B</mi> </msub> <mo>/</mo> <msub> <mi>h</mi> <mi>E</mi> </msub> <mo>=</mo> <mn>1000</mn> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>ξ</mi> <mo>=</mo> <mn>0.3</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>Secrecy rate bounds vs. <math display="inline"><semantics> <mi>A</mi> </semantics></math> with <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mi>B</mi> </msub> <mo>/</mo> <msub> <mi>h</mi> <mi>E</mi> </msub> <mo>=</mo> <mn>1000</mn> </mrow> </semantics></math> when <math display="inline"><semantics> <mrow> <mi>ξ</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>α</mi> <mo>=</mo> <mn>0.5</mn> </mrow> </semantics></math>, and <math display="inline"><semantics> <mrow> <mi>A</mi> <mo>=</mo> <mi>P</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Secrecy rate bounds with/without optical jamming vs. <math display="inline"><semantics> <mi>A</mi> </semantics></math>, <math display="inline"><semantics> <mrow> <msub> <mi>h</mi> <mi>B</mi> </msub> <mo>/</mo> <msub> <mi>h</mi> <mi>E</mi> </msub> <mo>=</mo> <mn>100</mn> </mrow> </semantics></math>, <math display="inline"><semantics> <mrow> <mi>ξ</mi> <mo>=</mo> <mn>0.5</mn> <mo>,</mo> <mo> </mo> <mo> </mo> <mi>A</mi> <mo>=</mo> <mi>P</mi> </mrow> </semantics></math>.</p>
Full article ">
37 pages, 6077 KiB  
Article
MISAO: A Multi-Strategy Improved Snow Ablation Optimizer for Unmanned Aerial Vehicle Path Planning
by Cuiping Zhou, Shaobo Li, Cankun Xie, Panliang Yuan and Xiangfu Long
Mathematics 2024, 12(18), 2870; https://doi.org/10.3390/math12182870 - 14 Sep 2024
Cited by 2 | Viewed by 1179
Abstract
The snow ablation optimizer (SAO) is a meta-heuristic technique used to seek the best solution for sophisticated problems. In response to the defects in the SAO algorithm, which has poor search efficiency and is prone to getting trapped in local optima, this article [...] Read more.
The snow ablation optimizer (SAO) is a meta-heuristic technique used to seek the best solution for sophisticated problems. In response to the defects in the SAO algorithm, which has poor search efficiency and is prone to getting trapped in local optima, this article suggests a multi-strategy improved (MISAO) snow ablation optimizer. It is employed in the unmanned aerial vehicle (UAV) path planning issue. To begin with, the tent chaos and elite reverse learning initialization strategies are merged to extend the diversity of the population; secondly, a greedy selection method is deployed to retain superior alternative solutions for the upcoming iteration; then, the Harris hawk (HHO) strategy is introduced to enhance the exploitation capability, which prevents trapping in partial ideals; finally, the red-tailed hawk (RTH) is adopted to perform the global exploration, which, enhances global optimization capability. To comprehensively evaluate MISAO’s optimization capability, a battery of digital optimization investigations is executed using 23 test functions, and the results of the comparative analysis show that the suggested algorithm has high solving accuracy and convergence velocity. Finally, the effectiveness and feasibility of the optimization path of the MISAO algorithm are demonstrated in the UAV path planning project. Full article
Show Figures

Figure 1

Figure 1
<p>Taxonomy of meta-heuristic algorithms and representative algorithms.</p>
Full article ">Figure 2
<p>Melting and sublimation process of SAO algorithm.</p>
Full article ">Figure 3
<p>Schematic diagram of the cross term.</p>
Full article ">Figure 4
<p>Distribution of tent chaos mapping.</p>
Full article ">Figure 5
<p>MISAO flowchart.</p>
Full article ">Figure 6
<p>Convergence process of different algorithms.</p>
Full article ">Figure 7
<p>Convergence process of different strategies.</p>
Full article ">Figure 8
<p>Runtime line chart.</p>
Full article ">Figure 9
<p>Friedman cumulative value.</p>
Full article ">Figure 10
<p>Terrain environment with mountain peaks.</p>
Full article ">Figure 11
<p>Path planning diagram of different algorithms.</p>
Full article ">Figure 12
<p>3D and plan view of path planning with different algorithms.</p>
Full article ">
18 pages, 10246 KiB  
Article
Hypergraph-Based Influence Maximization in Online Social Networks
by Chuangchuang Zhang, Wenlin Cheng, Fuliang Li and Xingwei Wang
Mathematics 2024, 12(17), 2769; https://doi.org/10.3390/math12172769 - 7 Sep 2024
Cited by 1 | Viewed by 974
Abstract
Influence maximization in online social networks is used to select a set of influential seed nodes to maximize the influence spread under a given diffusion model. However, most existing proposals have huge computational costs and only consider the dyadic influence relationship between two [...] Read more.
Influence maximization in online social networks is used to select a set of influential seed nodes to maximize the influence spread under a given diffusion model. However, most existing proposals have huge computational costs and only consider the dyadic influence relationship between two nodes, ignoring the higher-order influence relationships among multiple nodes. It limits the applicability and accuracy of existing influence diffusion models in real complex online social networks. To this end, in this paper, we present a novel information diffusion model by introducing hypergraph theory to determine the most influential nodes by jointly considering adjacent influence and higher-order influence relationships to improve diffusion efficiency. We mathematically formulate the influence maximization problem under higher-order influence relationships in online social networks. We further propose a hypergraph sampling greedy algorithm (HSGA) to effectively select the most influential seed nodes. In the HSGA, a random walk-based influence diffusion method and a Monte Carlo-based influence approximation method are devised to achieve fast approximation and calculation of node influences. We conduct simulation experiments on six real datasets for performance evaluations. Simulation results demonstrate the effectiveness and efficiency of the HSGA, and the HSGA has a lower computational cost and higher seed selection accuracy than comparison mechanisms. Full article
(This article belongs to the Special Issue Deep Representation Learning for Social Network Analysis)
Show Figures

Figure 1

Figure 1
<p>An illustrative example of social network hypergraph.</p>
Full article ">Figure 2
<p>Influence of hyperedge influence ratio on improvement ratio.</p>
Full article ">Figure 3
<p>Comparison results of different algorithms.</p>
Full article ">Figure 4
<p>Comparison of running time.</p>
Full article ">Figure 5
<p>Overlap of seed nodes.</p>
Full article ">
12 pages, 2853 KiB  
Article
Research on Mitigating Atmosphere Turbulence Fading by Relay Selections in Free-Space Optical Communication Systems with Multi-Transceivers
by Xiaogang San, Zuoyu Liu and Ying Wang
Photonics 2024, 11(9), 847; https://doi.org/10.3390/photonics11090847 - 6 Sep 2024
Viewed by 693
Abstract
In free-space optical communication (FSOC) systems, atmospheric turbulence can bring about power fluctuations in receiver ends, restricting channel capacity. Relay techniques can divide a long FSOC link into several short links to mitigate the fading events caused by atmospheric turbulence. This paper proposes [...] Read more.
In free-space optical communication (FSOC) systems, atmospheric turbulence can bring about power fluctuations in receiver ends, restricting channel capacity. Relay techniques can divide a long FSOC link into several short links to mitigate the fading events caused by atmospheric turbulence. This paper proposes a Reinforcement Learning-based Relay Selection (RLRS) method based on Deep Q-Network (DQN) in a FSOC system with multiple transceivers, whose aim is to enhance the average channel capacity of the system. Malaga turbulence is studied in this paper. The presence of handover loss is also considered. The relay nodes serve in decode-and-forward (DF). Simulation results demonstrate that the RLRS algorithm outperforms the conventional greedy algorithm, which implies that the RLRS algorithm may be utilized in practical FSOC systems. Full article
(This article belongs to the Special Issue Recent Advances in Optical Turbulence)
Show Figures

Figure 1

Figure 1
<p>Diagram of a multi-transceiver FSOC system with relays.</p>
Full article ">Figure 2
<p>Performance of an RLRS algorithm in 10 time slots. (<b>a</b>) Curves of cumulative reward. (<b>b</b>) Curve of loss function.</p>
Full article ">Figure 3
<p>Performance of RLRS algorithm in 50 time slots. (<b>a</b>) Curves of cumulative reward. (<b>b</b>) Curve of loss function.</p>
Full article ">Figure 4
<p>Average channel capacity versus different handover loss. (<b>a</b>) 10 time slots. (<b>b</b>) 50 time slots.</p>
Full article ">Figure 5
<p>Average capacity of RLRS and greedy algorithm under Malaga and Gamma-Gamma turbulence with fog. (<b>a</b>) Average capacity under Malaga turbulence with fog. (<b>b</b>) Average capacity under Gamma-Gamma turbulence with fog.</p>
Full article ">
Back to TopTop