ArticlePDF Available

Enhanced Dragonfly Algorithm based K-Medoid Clustering Model for VANET

Authors:

Abstract and Figures

A VANET or vehicular Ad Hoc Network is known for its fast topology transition and node mobility, contributing to its attributes as an ad hoc network. The aspect of gathering the nodes, making this system extremely vigorous is known as clustering. However, in certain cases, it is not possible to keep track of the nodes which will results in network issues due to energy insufficiency during execution. Hence this will lead to primary energy management problems faced during the routing protocol which take into consideration the node lifetime. To address this discrepancy, we have proposed a novel optimization technique based on clustering. It has been observed that the proposed methodology will further improve the effectiveness of V2V communication. In this paper, clustering of the vehicle nodes is done using K-Medoid clustering model and are then used to improve energy efficiency. A metaheuristic algorithm is used to establish an energy efficient communication methodology. Based on the simulation analysis performed, it is seen that this methodology requires lesser execution time and improves the nodes’ energy efficiency.
Content may be subject to copyright.
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
50
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
Enhanced Dragonfly Algorithm based
K-Medoid Clustering Model for VANET
Dr. Joy Iong Zong Chen,
Professor,
Department of Electrical Engineering,
Da-Yeh University,
Changhua County,
Taiwan.
P. Hengjinda,
Department of Industrial Robotics and Automation System,
Phetchaburi Rajabhat University,
Phetchaburi,
Thailand.
Abstract: A VANET or vehicular Ad Hoc Network is known for its fast topology transition
and node mobility, contributing to its attributes as an ad hoc network. The aspect of gathering
the nodes, making this system extremely vigorous is known as clustering. However, in certain
cases, it is not possible to keep track of the nodes which will results in network issues due to
energy insufficiency during execution. Hence this will lead to primary energy management
problems faced during the routing protocol which take into consideration the node lifetime.
To address this discrepancy, we have proposed a novel optimization technique based on
clustering. It has been observed that the proposed methodology will further improve the
effectiveness of V2V communication. In this paper, clustering of the vehicle nodes is done
using K-Medoid clustering model and are then used to improve energy efficiency. A
metaheuristic algorithm is used to establish an energy efficient communication methodology.
Based on the simulation analysis performed, it is seen that this methodology requires lesser
execution time and improves the nodes’ energy efficiency.
Keywords: VAENT; EDA algorithm; energy efficient routing protocol; V2V
communication, metaheuristic algorithm
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
51
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
1. Introduction
In today’s scenario, roads are seen to be large frameworks that comprise of multiple
resources such as vehicles, sensors, computers, road-side foundation etc. The VANETs
provide the apt platform for trading information between the roadside components and the
clients without the need for network supplier. A number of researchers have researched the
various network problems dealt with VRC, V2V and V1I technology with respect to the role
of Intelligent Transportation systems. As the use of green communication is gaining
popularity in the recent years, it has led to the use of such energy utilization in remote
communications. It uses the sending probability and dimension of transmission power. In
every round, the consumed energy is picked up by the node and is used for sending traffic
information. Based on the convictions, the nodes are also refreshed in a periodic manner.
Similarly in a large-scale Wireless Sensor Network (WSN), the many dead nodes are
decreased along with an increase in energy efficiency using other protocols [1]. The aim of
this algorithm [2] is to identify the base inactivity and efficiency of energy usage in a given
lossy network. The major aim of such energy saving protocols is to decrease the utilization of
energy in the WSN and a subsequent increase in operational lifetime by means of the shortest
routing path. Similarly, energy utilization can also be adjusted based on the partitioning of the
network when using energy balancing protocol [3]. Hence VANET will prove to be dynamic
network that incorporates a variable and outsized network in order to enhance the
communication with vehicles. Based on the movement of bearing and the areas of destination
node and the source node, the optimal path between optimization and clustering model is
chosen to transmit information between the source node as well as the destination node
analysing the utilization of moving vehicles as a means of versatile transfer of data. Thus a
number of VANET ventures have been incorporated and introduced by various academic
establishments, businesses and governments, globally for over a decade now.
2. Related Works
As the demand for download of data is increasing in control utilization and vehicular
clients, there is also a subsequent increase in the roadside unit and vehicular aspects. In [4] an
energy efficient system based on multicast, operating using scheduling algorithm using artful
information is examined. Here the optimum clients’ counts as well as the optimum data rate
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
52
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
are examined. Hence there is no need for knowledge on channel data state during the
transmission process. Versatility and dynamic topology are the most crucial aspects of a
VANET and the vehicles will be going in several directions at varying speeds. Since the
WSNs execute their output based on the lifetime of the nodes, the constrained energy assets
of the nodes are tested and examined by the authors in [5]. A number of Quality of Service
(QoS) parameters are examined to determine the various difficulties and ways in which they
can be tacked using efficient distributed routing protocol that is based on its position along
with estimation of data transmission along with spotlights. A subclass of MANET is called
the VANET, even though it is known to have a range of vehicles with high versatility with
disposition to deliver to transmit successfully, the variation in network topology such as
different node thickness of the vehicles and change in the road choice as observed by the
authors in [6]. Characteristics such as the total number of clusters created and network
overhead value are used to identify a particular vehicle from the other.
Researchers in [7] have insisted on discussions between cars in a remote manner
using VANETs where attackers might affect genuineness, security and secrecy of the
information that could affect the insurance. A VANET framework is built taking into
consideration the various existing threads and safety challenges. Using information sent from
a vehicular test bed, the reliability of many applications were examined using good
portability information. When using Fog computing, it was possible to properly estimate the
timings of bus as well as traffic peculiarities by interfacing with the cloud. In [8] the authors
have improved the steering execution with respect to higher availability and better
transmission time. VANET can be improved using FF algorithm which can further improve
its performance using transfer of packets between the goal vehicle and the source vehicle. In
[9] the security challenges and protection mechanisms were laid out to ensure the stability of
a network. This work deals with recent security issues faced while transferring information
with respect to cryptographic transmission in VANETs [10].
3. Proposed Work
In this paper we have incorporated an energy efficient routing protocol that is used to solve
the issue of optimization in the vehicular communication framework. Here the V2V
communication model or VIR communication model is used along with the vehicle network
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
53
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
topology. First the cluster head as is managed with the help of clustering algorithm which is
followed by the implementation of an energy efficient algorithm. Due to the increase in
population of developing nations, the subsequent increase in the traffic is of high importance.
Accordingly, the security of the road is to be concentrated in order to make movement of
vehicles as efficient as possible amidst road traffic [11-12]. This is where the energy efficient
algorithm and clustering methodologies are used to ensure that communication between and
among vehicles take place in a well-coordinated and streamlined manner. When there is such
a vast source of ways to broadcast information with limited means of message conveyance, it
will result in blockage of information while communicating them resulting in broadened
delay, low energy efficiency and packet dropping. Hence we propose a novel methodology
that ensures optimal information transmission with an energy-efficient routing protocol that
takes into consideration the energy parameter with optimal routing technique.
Fig.1. Basic Network Topology for V2V Communication
Fig.1. represents the network topology of the proposed work along with vehicular
development and a subset of the city map with a view of the streets and the various traffic
congestions. In this paper, we have made use of 200 vehicular nodes where every node
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
54
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
transmits information with each other without a GPS. Some reference nodes have also been
incorporated with a GPS [13] to have an accurate knowledge on the data position. Here the
two sides of the road representing the destination and the source node are segregated into two
sections by means of a plane. The VANET clustering system is used in order to build the
clusters such that they will not play in contrast to that of their arrangement. In this work we
have incorporated K-medoid clustering methodology that uses nodes from 200 vehicles in
order to form a complete cluster. If a node form the cluster is rejected due to some reason, it
will join the neighbouring group of nodes. If there is much difference between the node with
which they will be joining, the can join other groups.
With K-Medoid clustering, the information things ‘k’ are chosen within a cluster. Within a
particular cluster, the various particulars essential are incorporated with respect to the nodes
that fall within its medoids. Based on its properties, the node will either fall under one
medoid or another that is closest. The different stages involved in K-medoid clustering are:
Initializing: Medoids are chosen as K value depending on the different points of data
nodes.
Choosing the Medoids: Based on the distance between the data points of two objects,
the value of medoid is selected. Accordingly, the distance can be evaluated using the
formula:
  

Cluster Generation: Each cluster is allocated to the medoid value that is closest to the
object present.
Medoid Updation: The purpose of evaluating the new medoids in every cluster is to
ensure that the distance between the cluster and the object is minimal.
Nodes in Medoid: Clustering is achieved by allocating every object that is closer to
the medoid. The separation from the objects will be used to determine the distance
between the medoids and the objects. On incorporating the K-medoid algorithm, the
distance measured is used to analyse the gathering of the various nodes. The
clustering process is done between the vehicles using V2V as shown in the Fig.2.
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
55
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
Fig.2. Clustering of vehicle nodes (200 nodes considered)
Portability measurements such as acceleration, position and speed are used to determine the
cluster head formation for the vehicle nodes. The cluster head is chosen depending on the
smallest average distance of the vehicle with respect to a cluster.
Closest Velocity to Average: Based on the difference between the average velocity
and the candidate’s velocity, the cluster head is chosen with respect to the vehicle
proximity.
Closest Position to Average: Based on the difference between the average position
and the candidate’s position, the cluster head is chosen with respect to the vehicle
proximity.
The major goal is to develop an efficient routing schedule for V2V communication, taking
into consideration the network parameter optimization. By decreasing the use of energy by
the vehicular nodes, the fitness parameters are determined. The target work is denoted as
shown below:
 
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
56
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
Optimization techniques such as enhanced dragonfly algorithm are used to decrease the value
of energy constraint. The dragonfly algorithm is based on the characteristics of the dragon
flies which tend to chase away smaller insects, behaving like predators. The dynamic and
static swarming particles form the basis of the DA algorithm. These two swarming practices
use exploitation and exploration of meta heuristics as their tool for optimization. Similarly,
the enhanced function does not take into consideration the neighbourhood ideal and will be
used to decrease the probability of catching. The dragonflies or vehicle nodes can be
initialized using the formula:
  such that i=1, 2, 3....n
There are five stages in which the behaviour of dragonflies can be analyzed such as
attraction, cohesion, alignment, distraction, attraction and separation.
4. Results and Discussions
The performance of the proposed algorithm is examined using NS2 software. The analysis is
made based on the network parameters such as throughput, network lifetime, packet delivery
ratio (PDR) and energy consumption. Based on the optimization procedure and the clustering
algorithm, the throughput analysis is performed as shown in Fig. 3. The proposed enhanced
dragonfly algorithm shows better results when compared with its predecessors when
measurements of throughput are taken in intervals of 50. Similarly, Fig.4 shows the PDR for
varying vehicle quantity and it is observed that the delivery ratio is high as the number of
vehicles increases.
Fig.3 Throughput Analysis using K-Medoid EDA algorithm
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
57
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
Fig.4 PDR Analysis using K-Medoid EDA algorithm
Fig.5 NLT Analysis using K-Medoid EDA algorithm
Fig.6 EC Analysis using K-Medoid EDA algorithm
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
58
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
Fig.5 and Fig.6 summerise the impact of the proposed algorithm in analysis of NLT and EC
respectively. It is observed that when compared with existing algorithm, the enhanced dragon
fly model shows lesser amount of energy spent and improved NLT ratio.
5. Conclusion
In this paper, we have introduced a K-Medoid clustering using Enhanced Dragonfly
algorithm for identifying and communicating with the nodes present in the cluster, taking into
consideration the energy utilization factor. The vehicle nodes are clustered together using a
cluster head at every round which can transmit the message between the base station and the
nodes. With the aid of EDA algorithm, the most energy efficient route to transmit information
between the clusters using V2V communication is determined. The experimental analysis and
simulation results indicate that the proposed enhanced dragonfly algorithm performs better in
terms of throughput, EC analysis, PDR and NLT output. This work can further be expanded
to a broader scope to increase the QoS and also address the issues of cost consideration.
References
[1] Shilaja, C., & Arunprasath, T. (2019). Internet of medical things-load optimization of
power flow based on hybrid enhanced grey wolf optimization and dragonfly
algorithm. Future Generation Computer Systems, 98, 319-330.
[2] Wang, Y., Wang, M., Shen, L., Sun, X., Shi, G., Ma, W., & Yan, X. (2018). High-
performance flexible surface-enhanced Raman scattering substrates fabricated by
depositing Ag nanoislands on the dragonfly wing. Applied Surface Science, 436, 391-
397.
[3] Rahman, C. M., & Rashid, T. A. (2019). Dragonfly algorithm and its applications in
applied science survey. Computational Intelligence and Neuroscience, 2019.
[4] Stevani, C. V., de Faria, D. L., Porto, J. S., Trindade, D. J., & Bechara, E. J. (2000).
Mechanism of automotive clearcoat damage by dragonfly eggs investigated by surface
enhanced Raman scattering. Polymer Degradation and Stability, 68(1), 61-66.
[5] Kadoya, T., Suda, S. I., & Washitani, I. (2004). Dragonfly species richness on man-
made ponds: effects of pond size and pond age on newly established
assemblages. Ecological Research, 19(5), 461-467.
Journal of ISMAC (2021)
Vol.03/ No.01
Pages: 50-59
http://irojournals.com/iroismac/
DOI: https://doi.org/10.36548/jismac.2021.1.005
59
ISSN: 2582-1369 (online)
Submitted:20.01.2021
Revised: 28.02.2021
Accepted: 22.03.2021
Published: 07.04.2021
[6] Karunakaran, V. (2019). a stochastic development of cloud computing based task
scheduling ALGORITHM. Journal of Soft Computing Paradigm (JSCP), 1(01), 41-48.
[7] Hu, Z., & Deng, X. Y. (2014). Aerodynamic interaction between forewing and
hindwing of a hovering dragonfly. Acta Mechanica Sinica, 30(6), 787-799.
[8] Halberstadt, A. L., Chatha, M., Stratford, A., Grill, M., & Brandt, S. D. (2019).
Comparison of the behavioral responses induced by phenylalkylamine hallucinogens
and their tetrahydrobenzodifuran (“FLY”) and benzodifuran (“DragonFLY”)
analogs. Neuropharmacology, 144, 368-376.
[9] Yıldız, B. S., & Yıldız, A. R. (2019). The Harris hawks optimization algorithm, salp
swarm algorithm, grasshopper optimization algorithm and dragonfly algorithm for
structural design optimization of vehicle components. Materials Testing, 61(8), 744-
748.
[10] Sureshkumar, K., & Ponnusamy, V. (2019). Power flow management in micro grid
through renewable energy sources using a hybrid modified dragonfly algorithm with
bat search algorithm. Energy, 181, 1166-1178.
[11] Manoharan, S. (2019). A smart image processing algorithm for text recognition
information extraction and vocalization for the visually challenged. Journal of
Innovative Image Processing (JIIP), 1(01), 31-38.
[12] Rahimunnisa, K. (2019). Hybrdized genetic-simulated annealing algorithm for
performance optimization in wireless adhoc network. Journal of Soft Computing
Paradigm (JSCP), 1(01), 1-13.
[13] Senthilkumar, M., Kavitha, V. R., Kumar, M. S., Raj, P. A. C., & Shirley, D. R. A.
(2021, March). Routing in a Wireless Sensor Network using a Hybrid Algorithm to
Improve the Lifetime of the Nodes. In IOP Conference Series: Materials Science and
Engineering (Vol. 1084, No. 1, p. 012051). IOP Publishing.
... The authors [ 3] have proposed a new clustering-based optimization technique that will improve V2V communication even more. The K-Medoid clustering model is used to cluster vehicle nodes in this paper, and the results are then applied to the problem of increasing energy efficiency. ...
... It is used to reduce the likelihood of being caught. The following formula can be used to initialize the dragonflies or vehicle nodes [ 3,12] (Fig. 3): Figure 4 depicts the five basic primitive principles utilized to design the swarm intelligence of Dragonfly. Let us assume that P denotes the current vehicle's position, P j is the position of jth neighbouring vehicle, and M is the number of neighbouring vehicles. ...
Chapter
Deep Neural Networks (DNN) with enhanced Dragonfly Algorithms (DA) are presented as a novel method for dynamic traffic control in intelligent vehicular ad-hoc networks (VANETs) in this research paper. Because of its rapid topology transition and node mobility, a VANET is an ad-hoc network. In some cases, nodes cannot be tracked, causing network issues due to a lack of energy. Several intelligent vehicles in a vehicular ad-hoc network can form a group based on shared characteristics.VANET clustering typically employs k-means clustering strategies. Deep learning has improved some VANET node-clustering algorithms.KeywordsIntelligent vehicle systemFog computingDeep learning
... [20], [21] Center-position The vehicle in the center is selected to act as CH. ...
... A. Data Dissemination: The K-Medoid clustering model is employed in [21] to cluster the vehicle nodes, which are subsequently used to increase energy efficiency. An energyefficient communication is established using a metaheuristic algorithm. ...
... -Most of K-medoids-based solutions consider energy efficiency. [74][75][76][77]79 Meanwhile, the work in Gupta et al 75 effectively mitigates the hotspot problem. The dynamic nature of the network is well managed by previous studies. ...
... The dynamic nature of the network is well managed by previous studies. 76,77,79 However, all k-medoids-based solutions are centralized. ...
Article
Full-text available
The Internet of Things (IoT) continues to expand the current Internet, opening the door to a wide range of novel applications. The increasing volume of the IoT requires effective strategies to overcome its challenges. Machine Learning (ML) has led to a growing technology that enables computers to solve problems without the need for knowledge of their intricate details. Over the past years, various ML techniques have been used to efficiently manage IoT networks. Clustering is a technique that has proven its performance in the networking domain. Many works in the literature have studied ML‐based clustering methods for IoT networks, including their main properties, characteristics, underlying technologies, and open issues. In this paper, we focus on topology‐centered ML‐based clustering protocols for IoT networks. Specifically, we investigate the potential benefits of adopting the clustering approach to address several IoT challenges. Moreover, we provide a comprehensive taxonomy of ML‐based clustering algorithms for IoT networks. Finally, we statistically analyze the incorporation of ML techniques for clustering in various IoT systems and highlight the related open issues.
... CH can be chosen from the vehicles that have to be very stable among the vehicles that were participating. The remaining vehicles enter the cluster as CMs [8]. Thus, choosing a CH becomes a part of the cluster formation process, and no separate CM choosing criteria is needed. ...
Article
Wireless sensor health monitoring system integrates biomedical engineering technology and wireless sensor network, which can monitor human physiological information in real time. The monitoring system takes the network technology as the platform, and sends the status information of the monitoring object to the coordinator in real time through mobile edge computing server to realize data collection. A mathematical model of wireless sensor health monitoring network energy consumption optimization is established in this paper, which takes into account the constraints of the actual network system, such as computing task offloading, power, bit error rate and actual delay. To improve the performance of the method, ensure the complete decline of the function value and the convergence of the iteration matrix, an energy optimal resource allocation algorithm for health monitoring system based on improved quasi Newton method BFGS is proposed. It reduces the computational complexity during the iteration process, maintains superliner convergence, and has strong numerical stability in calculations. Simulation results show that the proposed resource allocation algorithm effectively reduces the time delay to process computing tasks and energy consumption of health monitoring sensor nodes, which enables the health monitoring system to process large-scale medical data and information more effectively and timely.
Chapter
The field is experiencing an increase in research finding due to the significance of VANETs in the contemporary world. Routing is essential for vehicle communication in a VANET, but choosing the best route can be challenging given how quickly cars move. On these routing paths, it is still challenging to prevent attacks like wormhole, greyhole, and sinkhole attacks. Researchers have created defensive mechanisms, but because routing packets frequently lack message integrity, they are insufficient. In this paper, we have proposed a delay-sensitive routing parameters with integrity mechanism to detect and prevent the wormhole attack. In this study, we found vulnerable routing parameters for wormhole attack detection and secured them with hash functions. Our tests demonstrate that vehicle communication protect against wormhole attacks. This implies that throughput is higher and more packets are delivered even in hostile environments.KeywordsVehicular ad hoc networksVehicle to vehicleVehicle to infrastructureWormhole attackSourceDestinationThroughputRound-trip time
Article
Advertisements establish the reputation of an organization and promote its business growth. The advancements in technology have replaced traditional promotions with personalized advertising techniques. Advertisement click prediction utilizes machine learning and deep learning techniques to predict the likelihood of a user clicking on an advertisement. These predictions require intensive computational power to handle large sparse datasets and train complex models that effectively capture feature interactions. In this paper, an efficient method is presented to identify the representative points of the large dataset and capture higher-order interactions of the click features by utilizing K-Means clustering and FNFM (Field Aware Neural Factorization Machine) classifiers, respectively. Our proposed model is trained on 2 lakh representative data points drawn from 1 million samples and is tested with various test sample sizes of 1,2,3,4 million. To show the efficiency of the proposed model, we have evaluated the area under the curve (AUC) results and compared them with the Base models from the literature. Hence, by addressing the above-mentioned factors it is evident that the proposed clustering-based FM model is yielding better results.
Article
Full-text available
A reliable and secure routing protocol for Wireless Sensor Networks should be easy to maintain, reliable and cost-efficient. In this paper, we propose a hybrid routing algorithm using Ant Colony Optimization and Minimum Hop Count scheme. The proposed hybrid methodology provides an optimal routing path that ensures balanced and minimal energy consumption. The hybrid algorithm is unique in maintaining network topology, balancing network load and searching for the optimal route. The proposed algorithm with the WSN model is implemented in C++ and the simulation output proves our algorithm to outperform other similar routing algorithms.The proposed work indicates animprovement in network lifetime, success rate in finding the best solution and rate of convergence. The existing techniques are reviewed and their strengths and weaknesses are diagnosed and compared with our proposed hybrid methodology that integrates the strengths of both the algorithms.
Article
Full-text available
One of the most recently developed heuristic optimization algorithms is dragonfly by Mirjalili. Dragonfly algorithm has shown its ability to optimizing different real-world problems. It has three variants. In this work, an overview of the algorithm and its variants is presented. Moreover, the hybridization versions of the algorithm are discussed. Furthermore, the results of the applications that utilized the dragonfly algorithm in applied science are offered in the following area: machine learning, image processing, wireless, and networking. It is then compared with some other metaheuristic algorithms. In addition, the algorithm is tested on the CEC-C06 2019 benchmark functions. The results prove that the algorithm has great exploration ability and its convergence rate is better than the other algorithms in the literature, such as PSO and GA. In general, in this survey, the strong and weak points of the algorithm are discussed. Furthermore, some future works that will help in improving the algorithm’s weak points are recommended. This study is conducted with the hope of offering beneficial information about dragonfly algorithm to the researchers who want to study the algorithm.
Article
Full-text available
Due to diversity of services with respect to technology and resources, it is challenging to choose virtual machines (VM) from various data centres with varied features like cost minimization, reduced energy consumption, optimal response time and so on in cloud Infrastructure as a Service (IaaS) environment. The solutions available in the market are exhaustive computationally and aggregates multiple objectives to procure single trade-off that affects the solution quality inversely. This paper describes a hybrid algorithm that facilitates VM selection for scheduling applications based on Gravitational Search and Non-dominated Sorting Genetic Algorithm (GSA and NSGA). The efficiency of the proposed algorithm is verified by the simulation results.
Article
In this paper, an efficient hybrid approach is presented for the power flow management of the HRES connected smart grid system. The novelty of the proposed approach is the combined execution of the MDA with BSA named as MDABSA technique. The main aim of the proposed strategy is to control the power flow based on the source side and load side parameters variations. In the proposed approach, the control signals of the voltage source are developed by the MDA based on the variety of power exchange between the source side and load side. Like that, the online control signals are located by the BSA procedure by utilizing the parallel execution against the active and reactive power varieties. The multi-objective function is shaped by the grid required active and reactive power varieties created based on the accessible source power. Here, the control parameters of the power controller are enhanced by the proposed technique based control models in light of the power flow varieties. Finally, the proposed model is executed in MATLAB/Simulink working platform and the execution is compared with the existing techniques.
Article
This paper proposes a smart algorithm for image processing by means of recognition of text, extraction of information and vocalization for the visually challenged. The system uses LattePanda Alpha system on board that processes the scanned images. The image is categorized into its equivalent alphanumeric characters following pre-processing, segmentation, extraction of features and post-processing of the scanned or image based information. Further, a text to speech synthesizer is used for vocalization processed content. In converting handwritten scripts, the system offers an accuracy of 97% in conversion. This also depends on the legibility of the data. The time delay for the entire conversion process is also analysed and the efficiency of the system is estimated.
Article
The wireless Adhoc network are framed instantaneously utilizing the neighboring available mobile nodes and are capable of reconfiguring and healing. This autonomous behavior of the WANET and their other unique characteristics such as high mobility, limited battery power and dynamic topology changes incorporates several challenges in routing process for the transmission of the information. The traditional methods did not shows improvement and the existing methods also resulted with moderate improvements in performance of the WANET. So the paper proposes a hybridized method for the routing process combining the multi-populated genetic with simulated annealing to identify the shortest path and the fuzzy logic in detection of the malicious activities enhancing the performance of the network preventing the packet losses. The proposed method is validated using the network simulator-2 and its performance is analyzed.
Article
There is a growing interest in designing lightweight and low-cost vehicles. In this research, the Harris hawks optimization algorithm (HHO), the salp swarm algorithm (SSA), the grasshopper optimization algorithm(GOA), and the dragonfly algorithm (DA ) are introduced to solve shape optimization problems in the automotive industry. This research is the first application of HHO, the SSA, the GOA, and the DA to shape design optimization problems in the literature. In this paper, HHO, the SSA, and the DA algorithms are used for shape optimization of a vehicle brake pedal to prove how HHO, the SSA, the GOA, and the DA can be used for solving shape optimization problems. The results show the ability of HHO, the SSA, the GOA, and the DA to design better optimal components.
Article
In hybrid renewable energy system, optimization and control are more complex and non-linearity in nature. This research presented a hybrid algorithm based on Enhance grey wolf optimization and algorithm of Dragonfly algorithm for handling OPF (optimal power flow) issues. The hybrid algorithm is proposed for solving the minimization of fuel cost, power loss and voltage deviation. The Renewable energy are incorporated with solar and wind energy. To forecast the wind and solar photovoltaic power output the weibull distribution function are modelled. The traditional method is slow and incapable to solve non-linearity problems. The proposed method is fast and effective and it is experimented on IEEE 30 bus system by comparing with recent existing methods.
Article
In recent years, rigid analogs of phenylalkylamine hallucinogens have appeared as recreational drugs. Examples include 2-(8-bromo-2,3,6,7-tetrahydrobenzo[1,2-b:4,5-b′]difuran-4-yl)ethan-1-amine (2C-B-FLY) and 1-(8-bromobenzo[1,2-b;4,5-b']difuran-4-yl)-2-aminopropane (Bromo-DragonFLY, DOB-DFLY). Although some rigid compounds such as DOB-DFLY reportedly have higher potency than their non-rigid counterparts, it is not clear whether the same is true for 2C-B-FLY and other tetrahydrobenzodifurans. In the present study, the head twitch response (HTR), a 5-HT2A receptor-mediated behavior induced by serotonergic hallucinogens, was used to assess the effects of 2,5-dimethoxy-4-bromoamphetamine (DOB) and its α-desmethyl homologue 2,5-dimethoxy-4-bromophenethylamine (2C-B), as well as their benzodifuranyl and tetrahydrobenzodifuranyl analogs, in C57BL/6J mice. DOB (ED50 = 0.75 μmol/kg) and 2C-B (ED50 = 2.43 μmol/kg) induced the HTR. The benzodifurans DOB-DFLY (ED50 = 0.20 μmol/kg) and 2C-B-DFLY (ED50 = 1.07 μmol/kg) had significantly higher potency than DOB and 2C-B, respectively. The tetrahydrobenzodifurans DOB-FLY (ED50 = 0.67 μmol/kg) and 2C-B-FLY (ED50 = 1.79 μmol/kg), by contrast, were approximately equipotent with their non-rigid counterparts. Three novel tetrahydrobenzodifurans (2C-I-FLY, 2C-E-FLY and 2C-EF-FLY) were also active in the HTR assay but had relatively low potency. In summary, the in vivo potency of 2,5-dimethoxyphenylalkylamines is enhanced when the 2- and 5-methoxy groups are incorporated into aromatic furan rings, whereas potency is not altered if the methoxy groups are incorporated into dihydrofuran rings. The potency relationships for these compounds in mice closely parallel the human hallucinogenic data. The high potency of DOB-DFLY is probably linked to the presence of two structural features (a benzodifuran nucleus and an α-methyl group) known to enhance the potency of phenylalkylamine hallucinogens.
Article
Natural dragonfly wing (DW), as a template, was deposited on noble metal sliver (Ag) nanoislands by magnetron sputtering to fabricate a flexible, low-cost, large-scale and environment-friendly surface-enhanced Raman scattering (SERS) substrate (Ag/DW substrate). Generally, materials with regular surface nanostructures are chosen for the templates, the selection of our new material with irregular surface nanostructures for substrates provides a new idea for the preparation of high-performance SERS-active substrates and many biomimetic materials. The optimum sputtering time of metal Ag was also investigated at which the prepared SERS-active substrates revealed remarkable SERS activities to 4-aminothiophenol (4-ATP) and crystal violet (CV). Even more surprisingly, the Ag/DW substrate with such an irregular template had reached the enhancement factor (EF) of ∼1.05 × 10⁵ and the detection limit of 10⁻¹⁰ M to 4-ATP. The 3D finite-different time-domain (3D-FDTD) simulation illustrated that the “hot spots” between neighbouring Ag nanoislands at the top of pillars played a most important role in generating electromagnetic (EM) enhancement and strengthening Raman signals.