<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xml:lang="en" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CMC</journal-id>
<journal-id journal-id-type="nlm-ta">CMC</journal-id>
<journal-id journal-id-type="publisher-id">CMC</journal-id>
<journal-title-group>
<journal-title>Computers, Materials &#x0026; Continua</journal-title>
</journal-title-group>
<issn pub-type="epub">1546-2226</issn>
<issn pub-type="ppub">1546-2218</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">47875</article-id>
<article-id pub-id-type="doi">10.32604/cmc.2024.047875</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network</article-title>
<alt-title alt-title-type="left-running-head">Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network</alt-title>
<alt-title alt-title-type="right-running-head">Secrecy Outage Probability Minimization in Wireless-Powered Communications Using an Improved Biogeography-Based Optimization-Inspired Recurrent Neural Network</alt-title>
</title-group>
<contrib-group>
<contrib id="author-1" contrib-type="author">
<name name-style="western"><surname>Nevisi</surname><given-names>Mohammad Mehdi Sharifi</given-names></name><xref ref-type="aff" rid="aff-1">1</xref></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Bashir</surname><given-names>Elnaz</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<contrib id="author-3" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Mart&#x00ED;n</surname><given-names>Diego</given-names></name><xref ref-type="aff" rid="aff-3">3</xref><email>diego.martin.de.andres@upm.es</email></contrib>
<contrib id="author-4" contrib-type="author">
<name name-style="western"><surname>Rezvanjou</surname><given-names>Seyedkian</given-names></name><xref ref-type="aff" rid="aff-4">4</xref></contrib>
<contrib id="author-5" contrib-type="author">
<name name-style="western"><surname>Shoushtari</surname><given-names>Farzaneh</given-names></name><xref ref-type="aff" rid="aff-5">5</xref></contrib>
<contrib id="author-6" contrib-type="author">
<name name-style="western"><surname>Ghafourian</surname><given-names>Ehsan</given-names></name><xref ref-type="aff" rid="aff-2">2</xref></contrib>
<aff id="aff-1"><label>1</label><institution>Department of Industrial Engineering, Iran University of Science and Technology, Narmak</institution>, <addr-line>Tehran, 16846-13114</addr-line>, <country>Iran</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Computer Science, Iowa State University</institution>, <addr-line>Ames, Iowa, IA, 50011</addr-line>, <country>USA</country></aff>
<aff id="aff-3"><label>3</label><institution>ETSI de Telecomunicaci&#x00F3;n, Universidad Polit&#x00E9;cnica de Madrid</institution>, <addr-line>Madrid, 28040</addr-line>, <country>Spain</country></aff>
<aff id="aff-4"><label>4</label><institution>Department of Engineering, California State University East Bay, Hayward</institution>, <addr-line>California, 94542</addr-line>, <country>USA</country></aff>
<aff id="aff-5"><label>5</label><institution>Department of Industrial Engineering, Bu-Ali Sina University</institution>, <addr-line>Hamedan, 65178-38695</addr-line>, <country>Iran</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Diego Mart&#x00ED;n. Email: <email>diego.martin.de.andres@upm.es</email></corresp>
</author-notes>
<pub-date date-type="collection" publication-format="electronic">
<year>2024</year></pub-date>
<pub-date date-type="pub" publication-format="electronic"><day>26</day>
<month>3</month>
<year>2024</year></pub-date>
<volume>78</volume>
<issue>3</issue>
<fpage>3971</fpage>
<lpage>3991</lpage>
<history>
<date date-type="received">
<day>20</day>
<month>11</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>28</day>
<month>1</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2024 Nevisi et al.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Nevisi et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CMC_47875.pdf"></self-uri>
<abstract>
<p>This paper focuses on wireless-powered communication systems, which are increasingly relevant in the Internet of Things (IoT) due to their ability to extend the operational lifetime of devices with limited energy. The main contribution of the paper is a novel approach to minimize the secrecy outage probability (SOP) in these systems. Minimizing SOP is crucial for maintaining the confidentiality and integrity of data, especially in situations where the transmission of sensitive data is critical. Our proposed method harnesses the power of an improved biogeography-based optimization (IBBO) to effectively train a recurrent neural network (RNN). The proposed IBBO introduces an innovative migration model. The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation. This is accomplished by integrating tactics such as advancing towards a random habitat, adopting the crossover operator from genetic algorithms (GA), and utilizing the global best (Gbest) operator from particle swarm optimization (PSO) into the IBBO framework. The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters, resulting in significant outage probability reduction. Through comprehensive simulations, we showcase the superiority of the IBBO-RNN over existing approaches, highlighting its capability to achieve remarkable gains in SOP minimization. This paper compares nine methods for predicting outage probability in wireless-powered communications. The IBBO-RNN achieved the highest accuracy rate of 98.92%, showing a significant performance improvement. In contrast, the standard RNN recorded lower accuracy rates of 91.27%. The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio (SNR) spectrum tested, suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Wireless-powered communications</kwd>
<kwd>secrecy outage probability</kwd>
<kwd>improved biogeography-based optimization</kwd>
<kwd>recurrent neural network</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Wireless-powered communication (WPC), a transformative paradigm in wireless communications, encompasses technologies such as wireless power transfer (WPT) and simultaneous wireless information and power transfer (SWIPT) [<xref ref-type="bibr" rid="ref-1">1</xref>]. WPT enables the wireless transmission of electrical power from a source to electronic devices, removing the need for physical connectors. Notable applications include wireless charging for mobile devices, biomedical implants such as pacemakers, and self-sustained sensor networks for environmental monitoring. SWIPT, on the other hand, combines power transfer with data transmission [<xref ref-type="bibr" rid="ref-2">2</xref>]. It empowers devices to recharge while simultaneously receiving data, opening doors for applications like solar-powered sensor networks, enhanced IoT devices in remote areas, and energy-harvesting communications for scenarios where traditional power sources are impractical. These innovations promise to revolutionize the Internet of Things (IoT) by increasing device autonomy and addressing some of the most pressing challenges in wireless communications [<xref ref-type="bibr" rid="ref-3">3</xref>&#x2013;<xref ref-type="bibr" rid="ref-5">5</xref>].</p>
<p>While the concept of WPC opens the door to a vast array of opportunities, it is not devoid of challenges. A comprehensive understanding of these challenges is vital to harness the full potential of this paradigm [<xref ref-type="bibr" rid="ref-6">6</xref>]. These challenges include optimizing energy harvesting efficiency, improving data transmission rates, and ensuring system reliability under dynamic environmental conditions. In this context, security stands as a paramount concern. With the rapid adoption of WPC technologies, safeguarding the confidentiality and integrity of data transmission becomes imperative. This is precisely where the concept of secrecy outage probability (SOP) comes into play. SOP is a fundamental metric that quantifies the vulnerability of communication links to information leakage. It assesses the likelihood that the secrecy capacity of a wireless-powered communication system falls below a certain threshold, rendering it susceptible to security breaches [<xref ref-type="bibr" rid="ref-6">6</xref>&#x2013;<xref ref-type="bibr" rid="ref-10">10</xref>]. The significance of minimizing SOP cannot be emphasized enough, as it is intricately linked to data security levels, particularly in situations where the transmission of sensitive information is a central concern. Attaining the utmost reduction in SOP plays a vital role in upholding the highest standards of data privacy and network robustness [<xref ref-type="bibr" rid="ref-11">11</xref>&#x2013;<xref ref-type="bibr" rid="ref-15">15</xref>]. SOP minimization embodies a critical optimization problem. It demands the orchestration of numerous system parameters, such as the allocation of energy resources, the determination of transmission power, and the management of signal-to-noise ratios. This problem&#x2019;s intricacy is accentuated by the dynamic and often unpredictable nature of wireless channels, leading to variations in communication quality and potentially disruptive interferences. Achieving the lowest possible SOP is not solely a matter of security but a multifaceted challenge that involves the continuous balancing act of optimizing security while preserving operational efficiency [<xref ref-type="bibr" rid="ref-16">16</xref>&#x2013;<xref ref-type="bibr" rid="ref-20">20</xref>].</p>
<sec id="s1_1">
<label>1.1</label>
<title>Related Works</title>
<p>Wireless-powered communication networks have garnered significant attention due to their potential to enhance energy efficiency and extend network lifetime. One critical aspect of such networks is ensuring the security and confidentiality of communication, particularly in the presence of eavesdroppers. This section provides an overview of recent research related to secrecy outage probability minimization in wireless-powered communications. In their work, Cao et al. [<xref ref-type="bibr" rid="ref-1">1</xref>] introduced a joint artificial noise and power allocation (JAP) scheme for ensuring reliability and security in wireless-powered non-orthogonal multiple access (NOMA) systems. The study presents closed-form expressions for connection outage probability (COP), SOP, and effective secrecy throughput (EST). The proposed JAP scheme was found to outperform benchmark schemes, making it a notable contribution in the field of wireless-powered secure communications. Lee et al. [<xref ref-type="bibr" rid="ref-2">2</xref>] addressed secrecy outage minimization in wireless-powered relay networks with destination-assisted cooperative jamming. Their work introduced power splitting-based relaying (PSR) and time switching-based relaying (TSR) protocols to control energy harvesting and minimize secrecy outages. The results demonstrated that these protocols could achieve near-optimal secrecy outage performance, even without precise knowledge of eavesdropper locations, under high signal-to-noise ratio (SNR) conditions. Chen et al. [<xref ref-type="bibr" rid="ref-3">3</xref>] focused on the secrecy communication of a wirelessly powered network, proposing protocols that combine maximum ratio transmission with zero-forcing (ZF) jamming to enhance physical layer security. They provided closed-form expressions for connection and secrecy outage probabilities, along with optimal time-switching ratio and power allocation for secrecy throughput maximization in high SNR regimes. Their proposed schemes effectively improved security in wireless-powered networks. Moon et al. [<xref ref-type="bibr" rid="ref-4">4</xref>] considered a wireless-powered communication network with an energy harvesting (EH) jammer, addressing secrecy performance optimization. Their work involved the transmission of energy signals and information in separate phases, effectively thwarting eavesdropping attempts. The research provided insights into maximizing secrecy rates under various channel state information scenarios, emphasizing the advantage of optimal power allocation for security in EH systems. Li et al. [<xref ref-type="bibr" rid="ref-5">5</xref>] explored the performance of friendly jammer selection-aided multiuser scheduling for wireless networks. They proposed random jammer selection-aided multiuser scheduling (RJS-MUS) and optimal jammer selection-aided multiuser scheduling (OJS-MUS) schemes, analyzing their impact on secrecy outage probability. Their research demonstrated that, under specific SNR conditions, the proposed schemes outperformed conventional non-jammer selection-aided multiuser scheduling (NJS-MUS), highlighting the potential of power allocation strategies to enhance security. Yan et al. [<xref ref-type="bibr" rid="ref-6">6</xref>] investigated transmit antenna selection in a multiple-input-multiple-output (MIMO) energy-harvesting system. Their work introduced optimal antenna selection (OAS) and suboptimal antenna selection (SAS) schemes, examining the secrecy performance of these schemes under various channel state information scenarios. Notably, their results showed that full knowledge of CSI led to better secrecy performance, emphasizing the importance of CSI in achieving security in MIMO systems.</p>
<p>Jiang et al. [<xref ref-type="bibr" rid="ref-7">7</xref>] contributed to the field by studying secrecy performance in wirelessly powered wiretap channels. Their work involved exploring multi-antenna transmission schemes and deriving closed-form expressions for achievable secrecy outage probability and average secrecy rate. It emphasized the role of channel state information in achieving substantial secrecy diversity gain, furthering our understanding of security in wireless-powered networks. Zen et al. [<xref ref-type="bibr" rid="ref-8">8</xref>] explored wirelessly powered backscatter communications in the context of smart sustainable cities. Their work addressed the secrecy performance of WP-BackComs using a stochastic geometry framework. They considered factors such as imperfect successive interference cancellation, non-linear energy harvesting, and energy-causality constraints in the analysis. The results emphasized the importance of optimizing reflection coefficients to minimize SOP and the potential benefits of optimal strategies in WP-BackComs. Xu et al. [<xref ref-type="bibr" rid="ref-9">9</xref>] studied resource allocation for secure communications in cooperative cognitive wireless-powered communication networks. Their research proposed a cooperative protocol for secondary users, focusing on maximization of the secondary user&#x2019;s ergodic rate while ensuring primary user security. Their algorithms considered perfect and imperfect channel state information and addressed both collusive and non-collusive eavesdroppers, highlighting the significance of secure resource allocation in cognitive wireless-powered networks. Tang et al. [<xref ref-type="bibr" rid="ref-10">10</xref>] addressed secrecy outage probability in wireless-powered cognitive radio networks. Their work focused on secure information transmission for secondary systems sharing the spectrum with primary networks and considered the presence of eavesdroppers. The closed-form analytical expressions revealed the trade-offs between primary outage probability, secondary secrecy outage probability, and the probability of non-zero secrecy capacity. Their research also discussed optimal time-switching and power-splitting strategies to maximize secondary secrecy outage probability under primary constraints, highlighting the importance of securing cognitive radio networks. The work by Lee et al. [<xref ref-type="bibr" rid="ref-11">11</xref>] delved into deep-learning-assisted wireless-powered secure communications with imperfect channel state information. They aimed to find robust transmit power control strategies to maximize secrecy rates while accounting for imperfect channel state information (CSI). Their research included iterative methods and a deep learning (DL)-assisted approach to tackle the no convexity of the problem, demonstrating the robustness of DL-assisted strategies against channel errors. Liu et al. [<xref ref-type="bibr" rid="ref-12">12</xref>] proposed a tag selection scheme to enhance security in passive backscatter communication systems with multiple tags and eavesdroppers. They analyzed SOP while considering a non-linear energy harvesting model. Their research introduced dynamic reflection coefficient optimization and tag selection to maximize the instantaneous secrecy capacity.</p>
<p>Moon et al.&#x2019;s research [<xref ref-type="bibr" rid="ref-13">13</xref>] delved into the intricacies of enhancing security in wireless-powered communication networks by introducing an energy harvesting (EH) jammer, where an eavesdropper seeks to intercept communication between a user and a hybrid access point (H-AP). Their study presents a novel approach to this challenge, dividing the communication process into two key phases: energy transfer (ET) and information transfer (IT). During the ET phase, the H-AP transmits an energy signal to replenish the batteries of both the EH user and the EH jammer. In the subsequent IT phase, the user sends its information signal to the H-AP, while the EH jammer leverages the harvested energy to generate jamming signals aimed at interfering with the eavesdropper. This innovative approach assumes only knowledge of the channel distribution information (CDI) of the eavesdropper, and it focuses on minimizing the secrecy outage probability through an optimized time allocation between the two phases. To manage complexity, Moon et al. offered a simplified closed-form solution, demonstrating through simulations that their method closely approaches the optimum performance. Their research provides insights into secure wireless-powered communication networks, particularly in scenarios with energy-harvesting jammers and partial channel information. Chen et al. [<xref ref-type="bibr" rid="ref-18">18</xref>] researched a unique hierarchical game model for enhancing physical layer security (PLS) through dynamic three-party collaborations. This system focuses on legitimate users (LUs) who strive to securely send confidential data to their respective base stations (BSs) via uplink channels, contending with potential eavesdroppers (EVs). Additionally, jammers (JAs) exist, which can opt to align with either LUs to boost their secure data transmission or with EVs to enhance eavesdropping capabilities, in return for possible rewards. They introduced a deep reinforcement learning (DRL) strategy for achieving equilibrium with long-term performance assurances in this hierarchical game. Through simulations, they demonstrated the effectiveness of their method, highlighting its advantages over similar approaches.</p>
</sec>
<sec id="s1_2">
<label>1.2</label>
<title>Paper Motivations and Contributions</title>
<p>The challenges involved in SOP minimization span the realms of both cyber security and system optimization. It requires the development of efficient algorithms [<xref ref-type="bibr" rid="ref-21">21</xref>&#x2013;<xref ref-type="bibr" rid="ref-25">25</xref>]. That can adapt to evolving network conditions, effectively allocate power and resources, and dynamically adjust to potential security threats [<xref ref-type="bibr" rid="ref-5">5</xref>&#x2013;<xref ref-type="bibr" rid="ref-8">8</xref>]. Furthermore, the integration of machine learning (ML) techniques introduces a new layer of complexity, but also the potential for groundbreaking advancements [<xref ref-type="bibr" rid="ref-26">26</xref>&#x2013;<xref ref-type="bibr" rid="ref-28">28</xref>]. In the literature of wireless-powered communication, there have been notable efforts aimed at minimizing SOP as we investigated in <xref ref-type="sec" rid="s1_1">Subsection 1.1</xref>. However, it is evident that while significant progress has been made, particularly in enhancing security against eavesdroppers, most existing research tends to focus on scenarios with specific conditions, such as high or perfect CSI. These studies often present strategies optimized for idealized conditions and may not fully encapsulate the challenges encountered in more variable and realistic wireless network environments. Additionally, many of these approaches concentrate on theoretical models and may not sufficiently address the practical challenges of deployment in real-world scenarios. Moreover, proposing an efficient optimization scheme to tackle this challenge has proven to be a formidable task. The primary motivation of this work lies in advancing the state-of-the-art in wireless-powered communications. By minimizing SOP and, in turn, enhancing the secrecy performance, this paper not only contributes to the evolution of wireless-powered communication but also exemplifies the potential of combining nature-inspired optimization methods with advanced ML methods to address complex communication challenges [<xref ref-type="bibr" rid="ref-3">3</xref>&#x2013;<xref ref-type="bibr" rid="ref-5">5</xref>]. ML techniques are now extensively and effectively utilized across various sectors [<xref ref-type="bibr" rid="ref-29">29</xref>&#x2013;<xref ref-type="bibr" rid="ref-31">31</xref>]. Specifically, recurrent neural networks (RNNs) are increasingly used to reduce outage probabilities in wireless-powered communication, offering a smart solution to key challenges in today&#x2019;s wireless networks [<xref ref-type="bibr" rid="ref-25">25</xref>]. Their role is crucial for improving the dependability and effectiveness of these systems, particularly in managing the fluctuating and hard-to-predict nature of wireless channels. RNNs become essential in such scenarios because wireless communication faces various uncertainties like constantly changing channel conditions, variable energy harvesting rates, and unpredictable movements of users. They excel in fine-tuning power distribution and managing resources to lower the chances of outages, thereby boosting system reliability. Consequently, RNNs play a pivotal role in enhancing the performance of wireless-powered communication systems by continuously fine-tuning energy and resource allocation [<xref ref-type="bibr" rid="ref-26">26</xref>].</p>
<p>While DL algorithms can play a crucial role in reducing SOP, the primary difficulty is in adjusting the DL&#x2019;s hyper-parameters. Currently, meta-heuristic algorithms are used for fine-tuning network parameters. Training RNNs poses significant challenges, particularly with traditional gradient-based techniques, which often encounter limitations such as getting trapped in local minima and struggling with non-differentiable objectives [<xref ref-type="bibr" rid="ref-32">32</xref>&#x2013;<xref ref-type="bibr" rid="ref-34">34</xref>]. These issues highlight the need for alternative optimization strategies to enhance RNN training. Biogeography-based optimization (BBO) emerges as a promising approach, illustrating the effectiveness of meta-heuristic methods in addressing these challenges. BBO offers a unique way of balancing exploration and exploitation, potentially avoiding local minima and improving training results. However, standard BBO has its drawbacks, including a propensity to get stuck in local optima and inefficient exploration of the search space, leading to suboptimal outcomes [<xref ref-type="bibr" rid="ref-35">35</xref>]. Improving BBO could lead to more powerful and versatile optimization algorithms, better equipped to address the complex problems encountered in real-world optimization scenarios. In light of these challenges and the pressing need for heightened security, this paper introduces a novel approach aimed at the minimization of SOP in wireless-powered communications. Our proposed method harnesses the power of an improved BBO (IBBO) to effectively train an RNN. This unique synergy between the IBBO and the RNN&#x2019;s capacity for learning complex relationships within wireless-powered communication scenarios promises to enhance system performance significantly. The main contributions of this paper can be summarized as follows:
<list list-type="bullet">
<list-item>
<p>Our work introduces a novel approach to address the pressing challenge of minimizing SOP in the context of WPC. SOP, a pivotal metric, quantifies the vulnerability of communication links to information leakage, and our scheme offers a fresh perspective on how to effectively reduce it.</p></list-item>
<list-item>
<p>In the proposed approach, this paper introduces an innovative IBBO algorithm, tailored to boost the weights and biases in RNN models (named IBBO-RNN). The proposed IBBO introduces an innovative migration model, detailed in <xref ref-type="disp-formula" rid="eqn-11">Eqs. (11)</xref>&#x2013;<xref ref-type="disp-formula" rid="eqn-13">(13)</xref>. This new approach aims to create a more intelligent migration structure, thus hastening the algorithm&#x2019;s progression towards the optimal solution. The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation. This is accomplished by integrating tactics such as advancing towards a random habitat, adopting the crossover operator from genetic algorithms (GA), and utilizing the global best (Gbest) operator from particle swarm optimization (PSO) into the IBBO framework.</p></list-item>
<list-item>
<p>The performance of the proposed IBBO-RNN is compared against eight ML models, namely capuchin search algorithm (CapSA), chimp optimization algorithm (ChOA), linear BBO, logarithmic BBO, backpropagation RNN (BP-RNN), long short-term memory (LSTM), support vector machine (SVM), and k-nearest neighbors (KNN).</p></list-item>
<list-item>
<p>To validate our contributions, we conduct comprehensive simulations. The results unequivocally illustrate the effectiveness of our approach. By significantly reducing SOP, our method not only advances the state-of-the-art in WPC but also exemplifies the potential of integrating nature-inspired optimization techniques with advanced neural networks. This synergy addresses intricate communication challenges, ensuring higher data confidentiality and network integrity.</p></list-item>
</list></p>
</sec>
<sec id="s1_3">
<label>1.3</label>
<title>Paper Organization</title>
<p>The structure of the paper is organized as follows: <xref ref-type="sec" rid="s2">Section 2</xref> delves into the research model, encompassing the system model, SOP problem formulation, the proposed IBBO, and the evolutionary RNN. <xref ref-type="sec" rid="s3">Section 3</xref> presents the experimental findings and discussions, providing crucial insights. The paper concludes in <xref ref-type="sec" rid="s4">Section 4</xref> with a summary of the key contributions and the broader implications of the research.</p>
</sec>
</sec>
<sec id="s2">
<label>2</label>
<title>Research Model and Methodology</title>
<p>This section explores the research model, which includes the system model, the formulation of the SOP problem, the proposed IBBO approach, and the evolutionary RNN.</p>
<sec id="s2_1">
<label>2.1</label>
<title>System Model</title>
<p>The considered system model, as illustrated in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>, consists of a wireless-powered communication network. Within this setup, a legitimate user we refer to as Alice receives her power wirelessly from a distant power beacon (PB). The objective for Alice is to securely send a private message to Bob, another authorized receiver, across a wireless channel subject to fading. Concurrently, an eavesdropper, whom we call Eve, is attempting to capture and decipher the message from the signals that reach her.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>System model depicting the secure wireless power communication</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-1.tif"/>
</fig>
<p>For ease of analysis while maintaining the system&#x2019;s generality, it is assumed that each node in the network is equipped with only one antenna. Consequently, the power that Alice receives at any specific instant can be quantified by the <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>:</p>
<p><disp-formula id="eqn-1"><label>(1)</label><mml:math id="mml-eqn-1" display="block"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>R</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x03B1;</mml:mi></mml:mrow></mml:msubsup><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub></mml:math></disp-formula></p>
<p>Here, <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> represents the power transmitted by the power beacon (PB), <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> combines the effects of antenna gains and frequency-dependent propagation losses, <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the distance between the power beacon and Alice, <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi>&#x03B1;</mml:mi><mml:mo>&#x003E;</mml:mo><mml:mn>2</mml:mn></mml:math></inline-formula> is the path-loss exponent, and <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mrow><mml:mtext>h</mml:mtext></mml:mrow><mml:mrow><mml:mrow><mml:mtext>T</mml:mtext></mml:mrow></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> signifies the normalized fading power channel coefficient between the power beacon and Alice, where <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mi>E</mml:mi><mml:mo stretchy="false">[</mml:mo><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">]</mml:mo><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> (indicating an average value of 1). With these assumptions, the instantaneous SNR at user <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mi>K</mml:mi></mml:math></inline-formula>, where <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mi>K</mml:mi></mml:math></inline-formula> can be either Bob (B) or Eve (E), can be defined as <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref>:</p>
<p><disp-formula id="eqn-2"><label>(2)</label><mml:math id="mml-eqn-2" display="block"><mml:msub><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mi>K</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:msubsup><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>K</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x03B1;</mml:mi></mml:mrow></mml:msubsup><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>K</mml:mi></mml:mrow><mml:mrow><mml:mi>&#x03B1;</mml:mi></mml:mrow></mml:msubsup></mml:mrow></mml:mfrac><mml:msup><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:msup><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>K</mml:mi></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup><mml:mo>=</mml:mo><mml:msub><mml:mover><mml:mi>&#x03B3;</mml:mi><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mrow><mml:mi>K</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>K</mml:mi></mml:mrow></mml:msub></mml:math></disp-formula></p>
<p>Here, <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:msubsup><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>K</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math></inline-formula> represents the noise power at Bon/Eve, <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:msub><mml:mover><mml:mi>&#x03B3;</mml:mi><mml:mo accent="false">&#x00AF;</mml:mo></mml:mover><mml:mrow><mml:mi>K</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the average SNR, and <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:msub><mml:mi>g</mml:mi><mml:mrow><mml:mi>K</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mo>|</mml:mo><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>K</mml:mi></mml:mrow></mml:msub><mml:mo>|</mml:mo></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></inline-formula> is the corresponding fading coefficient with an average value of 1. Furthermore, we assume that all channels in the system are quasi-static fading channels, meaning they remain constant during the transmission of an entire code word and change randomly from one transmission block to another. These channels are modeled using the independent Rayleigh distribution. The goal of this paper is to minimize the SOP, which is the probability that the instantaneous secrecy capacity falls below a threshold target secrecy rate; <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>. The secrecy capacity <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is given by the difference between the capacities of the main channel (Alice to Bob) and the eavesdropper&#x2019;s channel (Alice to Eve):</p>
<p><disp-formula id="eqn-3"><label>(3)</label><mml:math id="mml-eqn-3" display="block"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msup><mml:mrow><mml:mo>[</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mspace width="0pt" /><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub><mml:mspace width="0pt" /><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>+</mml:mo></mml:mrow></mml:msup></mml:math></disp-formula>where <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>log</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula> and <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>log</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo></mml:math></inline-formula>, and <inline-formula id="ieqn-16"><mml:math id="mml-ieqn-16"><mml:msup><mml:mrow><mml:mo>[</mml:mo><mml:mi>X</mml:mi><mml:mspace width="0pt" /><mml:mo>]</mml:mo></mml:mrow><mml:mrow><mml:mo>+</mml:mo></mml:mrow></mml:msup></mml:math></inline-formula> denotes the positive part of <italic>X</italic> as <inline-formula id="ieqn-17"><mml:math id="mml-ieqn-17"><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi><mml:mo fence="false" stretchy="false">{</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mspace width="0pt" /><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub><mml:mspace width="0pt" /><mml:mo>,</mml:mo><mml:mn>0</mml:mn><mml:mo fence="false" stretchy="false">}</mml:mo></mml:math></inline-formula>. Therefore, the SOP can be given by <xref ref-type="disp-formula" rid="eqn-4">Eq. (4)</xref>:</p>
<p><disp-formula id="eqn-4"><label>(4)</label><mml:math id="mml-eqn-4" display="block"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>S</mml:mi><mml:mi>O</mml:mi><mml:mi>P</mml:mi></mml:mrow></mml:msub><mml:mspace width="0pt" /><mml:mo>=</mml:mo><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2264;</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub><mml:mspace width="0pt" /><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Using the definition of <inline-formula id="ieqn-18"><mml:math id="mml-ieqn-18"><mml:msub><mml:mi>C</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, we can deduce a mathematical representation for SOP:</p>
<p><disp-formula id="eqn-5"><label>(5)</label><mml:math id="mml-eqn-5" display="block"><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>S</mml:mi><mml:mi>O</mml:mi><mml:mi>P</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>log</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac><mml:mo>&#x2264;</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Thus, according to <xref ref-type="disp-formula" rid="eqn-2">Eq. (2)</xref>, the cost function can be formulated as <xref ref-type="disp-formula" rid="eqn-6">Eq. (6)</xref>:</p>
<p><disp-formula id="eqn-6"><label>(6)</label><mml:math id="mml-eqn-6" display="block"><mml:mi>f</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>L</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mi>&#x03B1;</mml:mi><mml:mo>,</mml:mo><mml:msubsup><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:msubsup><mml:mi>&#x03C3;</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup><mml:mo>,</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mi>P</mml:mi><mml:mi>r</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:msub><mml:mi>log</mml:mi><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msub><mml:mo>&#x2061;</mml:mo><mml:mfrac><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mn>1</mml:mn><mml:mo>+</mml:mo><mml:msub><mml:mi>&#x03B3;</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac><mml:mo>&#x2264;</mml:mo><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula></p>
<p>Under the following constraints:</p>
<p><disp-formula id="ueqn-7"><mml:math id="mml-ueqn-7" display="block"><mml:mn>0</mml:mn><mml:mo>&#x2264;</mml:mo><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mo>&#x2264;</mml:mo><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:math></disp-formula></p>
<p><inline-formula id="ieqn-19"><mml:math id="mml-ieqn-19"><mml:mi>&#x03B1;</mml:mi><mml:mo>&#x003E;</mml:mo><mml:mn>2</mml:mn></mml:math></inline-formula> is a constant value.</p>
<p><inline-formula id="ieqn-20"><mml:math id="mml-ieqn-20"><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo></mml:math></inline-formula> and <inline-formula id="ieqn-21"><mml:math id="mml-ieqn-21"><mml:msub><mml:mi>h</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> follow independent Rayleigh distributions with the mean value of <inline-formula id="ieqn-22"><mml:math id="mml-ieqn-22"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>T</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, <inline-formula id="ieqn-23"><mml:math id="mml-ieqn-23"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, and <inline-formula id="ieqn-24"><mml:math id="mml-ieqn-24"><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>E</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, respectively.</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Standard BBO</title>
<p>The BBO algorithm, introduced by Dan Simon in 2008, is inspired by biogeography, a field that examines species distribution and their migration and adaptation processes in different geographic areas [<xref ref-type="bibr" rid="ref-35">35</xref>]. BBO utilizes the concepts of immigration, emigration, and speciation from biogeography to find optimal solutions in multi-objective optimization problems. In BBO, potential solutions are conceptualized as &#x201C;habitats,&#x201D; each with a habitat suitability index (HSI) indicating its fitness. The algorithm operates through migration, mutation, and elitism. Habitats with higher fitness values are more likely to share their features with others, facilitating the spread of advantageous features. Conversely, habitats with lower fitness levels are prone to receiving features from others, potentially enhancing their quality. The emigration rate of a habitat depends on its fitness relative to the population&#x2019;s average fitness, with higher fitness habitats having higher emigration rates. Similarly, the likelihood of a habitat receiving immigrants correlates with the emigration rates of other habitats. The mathematical foundation of linear BBO is encapsulated in <xref ref-type="disp-formula" rid="eqn-7">Eqs. (7)</xref>, <xref ref-type="disp-formula" rid="eqn-8">(8)</xref> that detail its operational mechanisms [<xref ref-type="bibr" rid="ref-35">35</xref>].</p>
<p><disp-formula id="eqn-7"><label>(7)</label><mml:math id="mml-eqn-7" display="block"><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>k</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>E</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mtext>k</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>j</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mi>N</mml:mi></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>
<disp-formula id="eqn-8"><label>(8)</label><mml:math id="mml-eqn-8" display="block"><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>k</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mi>I</mml:mi><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>1</mml:mtext></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:mrow><mml:mrow><mml:mtext>k</mml:mtext></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>j</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mi>N</mml:mi></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-25"><mml:math id="mml-ieqn-25"><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> signifies the emigration rate, <inline-formula id="ieqn-26"><mml:math id="mml-ieqn-26"><mml:msub><mml:mrow><mml:mi mathvariant="normal">&#x03BB;</mml:mi></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub></mml:math></inline-formula> denotes the immigration rate, <inline-formula id="ieqn-27"><mml:math id="mml-ieqn-27"><mml:msub><mml:mi>k</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> refers to the species&#x2019; rank, <italic>N</italic> represents the total population size, <italic>E</italic> and <italic>I</italic> are the maximum rates of emigration and immigration, respectively. Within BBO, the information exchange between habitats is facilitated probabilistically through the emigration and immigration rates of each solution [<xref ref-type="bibr" rid="ref-35">35</xref>]. The migration process in standard BBO is described by <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>:</p>
<p><disp-formula id="eqn-9"><label>(9)</label><mml:math id="mml-eqn-9" display="block"><mml:msub><mml:mi>H</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>SIVs</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo stretchy="false">&#x2190;</mml:mo><mml:msub><mml:mi>H</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>SIVs</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:msub><mml:mi>H</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtext>SIVs</mml:mtext></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-28"><mml:math id="mml-ieqn-28"><mml:msub><mml:mi>H</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the host habitat and <inline-formula id="ieqn-29"><mml:math id="mml-ieqn-29"><mml:msub><mml:mi>H</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the guest habitat. According to the <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>, the host habitat receives information from the guest habitat and itself. Also, the mutation operator defines as <xref ref-type="disp-formula" rid="eqn-10">Eq. (10)</xref>:</p>
<p><disp-formula id="eqn-10"><label>(10)</label><mml:math id="mml-eqn-10" display="block"><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mo movablelimits="true" form="prefix">max</mml:mo></mml:mrow></mml:msub><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mfrac><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mo movablelimits="true" form="prefix">max</mml:mo></mml:mrow></mml:msub></mml:mfrac><mml:mo>)</mml:mo></mml:mrow></mml:math></disp-formula>where <inline-formula id="ieqn-30"><mml:math id="mml-ieqn-30"><mml:msub><mml:mi>m</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is chosen by user, <inline-formula id="ieqn-31"><mml:math id="mml-ieqn-31"><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> reveals the probability of species count and <inline-formula id="ieqn-32"><mml:math id="mml-ieqn-32"><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>x</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is the highest value of <inline-formula id="ieqn-33"><mml:math id="mml-ieqn-33"><mml:msub><mml:mi>p</mml:mi><mml:mrow><mml:mi>j</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>.</p>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Improved BBO</title>
<p>The linear BBO algorithm, like other optimization methods, faces several challenges that affect its applicability and efficiency. Its performance is sensitive to the precise tuning of various parameters, such as migration and immigration rates, which need careful adjustment for different problem domains. This sensitivity can make BBO challenging to apply broadly without specific tuning. Additionally, BBO tends to converge slowly, particularly in complex and high-dimensional problems, often requiring numerous iterations due to its probabilistic migration and immigration rules. The algorithm also struggles with effectively exploring the entire search space, especially in rugged, multi-modal landscapes, as it tends to focus on regions with higher fitness values, potentially overlooking other viable areas. Scalability is another issue, particularly with very high-dimensional problems or those with numerous constraints, as maintaining and updating habitat populations can be computationally intensive. Furthermore, like many evolutionary algorithms, BBO faces difficulties in striking the right balance between exploration and exploitation, a critical aspect of its overall effectiveness [<xref ref-type="bibr" rid="ref-35">35</xref>].</p>
<p>To address these limitations, researchers have proposed various enhancements and modifications, such as hybridizing BBO with other techniques, introducing diversity-preserving mechanisms, or addressing parameter tuning issues. Recent research, particularly studies on Markov theory-based models, has explored the impact of different migration models on BBO&#x2019;s efficiency. Various models like linear BBO, quadratic BBO, sinusoidal BBO, generalized sinusoidal BBO, and exponential-logarithmic BBO have been introduced. The paper under discussion introduces a novel migration model for BBO, described in <xref ref-type="disp-formula" rid="eqn-11">Eqs. (11)</xref>&#x2013;<xref ref-type="disp-formula" rid="eqn-13">(13)</xref>, which proposes unique migration rates for each habitat. This new approach aims to create a smarter migration structure to accelerate convergence to the best solution, differing from previous models that used a single function for migration rates and treated all habitats uniformly.</p>
<p><disp-formula id="eqn-11"><label>(11)</label><mml:math id="mml-eqn-11" display="block"><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing=".2em" columnspacing="1em" displaystyle="false"><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:mi>E</mml:mi></mml:mrow><mml:mn>3</mml:mn></mml:mfrac></mml:mstyle><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mi>k</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>j</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:mfrac></mml:mstyle><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:mi>I</mml:mi></mml:mrow><mml:mn>3</mml:mn></mml:mfrac></mml:mstyle><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mi>k</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>j</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:mfrac></mml:mstyle><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x003C;</mml:mo><mml:mfrac><mml:mi>N</mml:mi><mml:mn>5</mml:mn></mml:mfrac></mml:math></disp-formula>
<disp-formula id="eqn-12"><label>(12)</label><mml:math id="mml-eqn-12" display="block"><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing=".2em" columnspacing="1em" displaystyle="false"><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mi>E</mml:mi><mml:mn>2</mml:mn></mml:mfrac></mml:mstyle><mml:mo>&#x00D7;</mml:mo><mml:mi>L</mml:mi><mml:mi>n</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mi>k</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>j</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mi>N</mml:mi></mml:mfrac></mml:mstyle><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mi>I</mml:mi><mml:mn>2</mml:mn></mml:mfrac></mml:mstyle><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mi>e</mml:mi><mml:mi>x</mml:mi><mml:mi>p</mml:mi></mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mi>k</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>j</mml:mi><mml:mo>)</mml:mo></mml:mrow></mml:mrow><mml:mi>N</mml:mi></mml:mfrac></mml:mstyle><mml:mo>)</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mi>N</mml:mi><mml:mn>5</mml:mn></mml:mfrac></mml:mstyle><mml:mo>&#x2264;</mml:mo><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x2264;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:mi>N</mml:mi></mml:mrow><mml:mn>5</mml:mn></mml:mfrac></mml:mstyle></mml:math></disp-formula>
<disp-formula id="eqn-13"><label>(13)</label><mml:math id="mml-eqn-13" display="block"><mml:mrow><mml:mo>{</mml:mo><mml:mtable columnalign="left left" rowspacing=".2em" columnspacing="1em" displaystyle="false"><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03BC;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:mi>E</mml:mi></mml:mrow><mml:mn>3</mml:mn></mml:mfrac></mml:mstyle><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>h</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mi>k</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>j</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:mfrac></mml:mstyle><mml:mo>&#x2212;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:mi>&#x03C0;</mml:mi></mml:mrow><mml:mn>7</mml:mn></mml:mfrac></mml:mstyle><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:msub><mml:mi>&#x03BB;</mml:mi><mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:mi>I</mml:mi></mml:mrow><mml:mn>3</mml:mn></mml:mfrac></mml:mstyle><mml:mo>&#x00D7;</mml:mo><mml:mrow><mml:mo>(</mml:mo><mml:mo>&#x2212;</mml:mo><mml:mi>t</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>h</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mi>k</mml:mi><mml:mrow><mml:mo>(</mml:mo><mml:mi>j</mml:mi><mml:mo>)</mml:mo></mml:mrow><mml:mi>&#x03C0;</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:mfrac></mml:mstyle><mml:mo>&#x2212;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:mi>&#x03C0;</mml:mi></mml:mrow><mml:mn>7</mml:mn></mml:mfrac></mml:mstyle><mml:mo>)</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn><mml:mo>)</mml:mo></mml:mrow></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow><mml:mi>k</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>j</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x003E;</mml:mo><mml:mfrac><mml:mrow><mml:mn>2</mml:mn><mml:mi>N</mml:mi></mml:mrow><mml:mn>5</mml:mn></mml:mfrac></mml:math></disp-formula></p>
<p>Selecting the six specified mathematical functions for migration rates, the IBBO employs a range of functions suited to combining habitats with diverse HSI, which enhances its overall effectiveness. In this paper, the GA&#x2019;s crossover operator is employed to enhance the exploitation capabilities of the BBO. During the optimization process, in addition to the regular migration of BBO, the crossover operator can be applied to selected pairs of habitats. This operation allows for a more diversified exchange of features between habitats, potentially leading to more effective exploration and exploitation of the search space. It can help in overcoming local optima issues by providing a mechanism to escape and explore new areas of the solution space. Additionally, the mechanism of moving towards the Gbest from the PSO algorithm has been utilized to improve the performance of the BBO. This concept can be applied to BBO by allowing habitats to be influenced not just by their features but also by the best solutions found in their neighborhood. This mimics the way particles in PSO are influenced by their neighbors. By moving habitats towards the best experiences of their neighbors, the BBO algorithm can more effectively explore the solution space and exploit the best-known solutions. This approach encourages convergence towards optimal or near-optimal solutions by leveraging collective knowledge.</p>
<p><xref ref-type="fig" rid="fig-2">Fig. 2</xref> presents an example of the operators in the IBBO. Moving towards a random habitat involves occasionally directing a habitat towards a completely random position in the solution space. Such random movements can prevent the algorithm from getting stuck in local optima. It introduces an element of randomness that helps to explore potentially unvisited regions of the search space. While the PSO-inspired mechanism focuses on exploiting known good solutions, the random habitat movement ensures that the algorithm does not overly focus on certain areas, thus maintaining a balance between exploration and exploitation. The key to effective optimization is balancing exploration and exploitation. Integrating moving towards a random habitat, the crossover operator from GA, and global best (Gbest) operator from PSO into BBO can help in maintaining this balance, as it introduces a new layer of complexity and adaptability to the search process. By incorporating these techniques, the BBO algorithm becomes more adaptable and robust, capable of handling a wider range of optimization problems.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Illustration of IBBO operators utilized for weights and biases training</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-2.tif"/>
</fig>
</sec>
<sec id="s2_4">
<label>2.4</label>
<title>Evolutionary RNN</title>
<p>RNNs are a unique subset of artificial neural networks tailored for processing sequential data, setting them apart from traditional feed-forward neural networks. Their defining feature is a feedback loop that maintains a &#x2018;memory&#x2019; of previous inputs, enabling the handling of variable input lengths and the integration of past information into current input processing [<xref ref-type="bibr" rid="ref-25">25</xref>]. Comprising multiple layers, including an input layer for sequence data, a recurrent layer that refeeds outputs into the network, and an output layer for final outcomes, RNNs utilize activation functions such as sigmoid, tanh, and ReLU to learn complex patterns. These networks are highly effective in tasks like language modeling, sentiment analysis, machine translation, text generation, and speech recognition, as well as in predicting time series data and, in combination with CNNs, generating images and videos [<xref ref-type="bibr" rid="ref-26">26</xref>].</p>
<p>However, RNNs encounter significant challenges, notably in capturing long-term dependencies and grappling with vanishing or exploding gradients during training. Their primary training method, gradient-based optimization techniques, has inherent limitations, including the risk of getting trapped in local optima, leading to less than optimal training outcomes. Moreover, these methods are computationally complex and time-consuming, especially in large networks or with long sequences, due to the extensive computation of gradients across many layers and time steps. The vanishing gradient problem, where gradients become too small to effect meaningful learning, particularly hampers standard RNNs in handling long sequences and capturing long-term data dependencies. Conversely, the exploding gradient issue causes overly large updates to network weights, destabilizing training. These challenges collectively constrain the efficiency and applicability of RNNs in certain real-world applications.</p>
<p>Meta-heuristic algorithms [<xref ref-type="bibr" rid="ref-36">36</xref>&#x2013;<xref ref-type="bibr" rid="ref-39">39</xref>], including BBO, are gaining recognition as effective tools for training the weights and biases of RNNs, offering several advantages over traditional gradient-based methods. One of their primary benefits is the ability to avoid getting trapped in local optima, a common issue with gradient-based techniques that follow the steepest descent. Meta-heuristics, in contrast, employ mechanisms to explore the search space more broadly and escape local minima, thus increasing the likelihood of identifying the global minimum. These algorithms are not dependent on the gradient of the error function, making them well-suited for optimizing functions that are non-differentiable, discontinuous, or highly nonlinear, which often poses challenges for gradient-based methods. This attribute is particularly beneficial in complex RNN architectures with a non-smooth error surface.</p>
<p>In this paper, the IBBO is utilized for training the RNN due to its ability to effectively balance exploration and exploitation. This equilibrium is key in training RNNs, as it allows the algorithm to investigate various weight and bias configurations without prematurely converging on a solution. The adaptive nature of the BBO, characterized by migration rates that change based on the quality of the habitats, enables the algorithm to modify its search strategy to suit the specific needs of the problem at hand. Such adaptability is particularly beneficial in training RNNs within dynamic environments, where data patterns may evolve over time. <xref ref-type="fig" rid="fig-3">Fig. 3</xref> shows the structure of the IBBO-RNN, and <xref ref-type="fig" rid="fig-4">Fig. 4</xref> shows the structure of a habitat in IBBO. Additionally, the cost function used in the IBBO is detailed in <xref ref-type="disp-formula" rid="eqn-14">Eq. (14)</xref>.</p>
<p><disp-formula id="eqn-14"><label>(14)</label><mml:math id="mml-eqn-14" display="block"><mml:mi>M</mml:mi><mml:mi>e</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>S</mml:mi><mml:mi>q</mml:mi><mml:mi>u</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mtext>&#x00A0;</mml:mtext><mml:mi>E</mml:mi><mml:mi>r</mml:mi><mml:mi>r</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>M</mml:mi><mml:mi>S</mml:mi><mml:mi>E</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mi>k</mml:mi></mml:mfrac><mml:munderover><mml:mo>&#x2211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mi>k</mml:mi></mml:mrow></mml:munderover><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>O</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mrow><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msup></mml:math></disp-formula>where <inline-formula id="ieqn-34"><mml:math id="mml-ieqn-34"><mml:mrow><mml:mtext>k</mml:mtext></mml:mrow></mml:math></inline-formula> &#x003D; the total number of samples, <inline-formula id="ieqn-35"><mml:math id="mml-ieqn-35"><mml:msub><mml:mi>O</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> &#x003D; System output, <inline-formula id="ieqn-36"><mml:math id="mml-ieqn-36"><mml:msub><mml:mi>D</mml:mi><mml:mrow><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> &#x003D; Desire.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>The structure of the proposed IBBO-RNN</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-3.tif"/>
</fig><fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>The structure of a habitat in IBBO</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-4.tif"/>
</fig>
</sec>
</sec>
<sec id="s3">
<label>3</label>
<title>Results</title>
<p>This section evaluates the efficiency of the IBBO-RNN approach. Its performance are measured using eight well-known and advanced ML algorithms: CapSA, ChOA, linear BBO, logarithmic BBO, BP-RNN, LSTM, SVM, and KNN. The execution of various algorithms is carried out in the R Studio software environment. Detailed information regarding the calibration parameters linked to these algorithms can be found in <xref ref-type="table" rid="table-1">Table 1</xref>. Calibrating meta-heuristic algorithm parameters is essential for optimal performance and requires meticulous attention. It involves determining the most effective parameter value combinations for efficient algorithm functioning. Before evaluating the algorithm&#x2019;s performance, it is vital to establish these optimal settings.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Parameter setting of algorithms through the trial and error method</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th>Algorithm</th>
<th>Parameter</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td/>
<td>The probability range for migrating into for each gene</td>
<td>[0, 1]</td>
</tr>
<tr>
<td/>
<td>Maximum emigration (I) and immigration (E) coefficient</td>
<td>1</td>
</tr>
<tr>
<td>IBBO and</td>
<td>Elitism percent</td>
<td>11%</td>
</tr>
<tr>
<td>other BBO</td>
<td>Mutation rate</td>
<td>0.09</td>
</tr>
<tr>
<td/>
<td>Population size</td>
<td>120</td>
</tr>
<tr>
<td/>
<td>Iteration</td>
<td>300</td>
</tr>
<tr>
<td/>
<td>Velocity control constants</td>
<td>1.00</td>
</tr>
<tr>
<td/>
<td>Inertia parameter</td>
<td>0.65</td>
</tr>
<tr>
<td>CapSA</td>
<td>Balance and elasticity factors</td>
<td>0.72, 9</td>
</tr>
<tr>
<td/>
<td>Population size</td>
<td>120</td>
</tr>
<tr>
<td/>
<td>Iteration</td>
<td>300</td>
</tr>
<tr>
<td/>
<td>a</td>
<td>[&#x2212;1, 1]</td>
</tr>
<tr>
<td>ChOA</td>
<td>f</td>
<td>Linearly decreased from 2 to 0</td>
</tr>
<tr>
<td/>
<td>Population size</td>
<td>120</td>
</tr>
<tr>
<td/>
<td>Iteration</td>
<td>300</td>
</tr>
<tr>
<td/>
<td>Number of hidden layers</td>
<td>{10, 15, 20}</td>
</tr>
<tr>
<td/>
<td>Number of neurons in hidden layers</td>
<td>{50, 70, 100}</td>
</tr>
<tr>
<td>RNN</td>
<td>Learning rate</td>
<td>0.08</td>
</tr>
<tr>
<td/>
<td>Dropout rate</td>
<td>0.2</td>
</tr>
<tr>
<td/>
<td>Activation</td>
<td>Tanh and sigmoid</td>
</tr>
<tr>
<td/>
<td>Optimizer</td>
<td>IBBO and SGD</td>
</tr>
<tr>
<td/>
<td>Number of hidden layers</td>
<td>{8, 10, 12}</td>
</tr>
<tr>
<td/>
<td>Number of neurons in hidden layers</td>
<td>{40, 70, 110}</td>
</tr>
<tr>
<td>LSTM</td>
<td>Learning rate</td>
<td>0.10</td>
</tr>
<tr>
<td/>
<td>Recurrent dropout Rate</td>
<td>0.3</td>
</tr>
<tr>
<td/>
<td>Activation</td>
<td>ReLU and Tanh</td>
</tr>
<tr>
<td/>
<td>Optimizer</td>
<td>Adam</td>
</tr>
<tr>
<td/>
<td>C (regularization parameter)</td>
<td>10</td>
</tr>
<tr>
<td>SVM</td>
<td>Kernel type</td>
<td>Linear</td>
</tr>
<tr>
<td/>
<td>Gamma</td>
<td>0.002</td>
</tr>
<tr>
<td/>
<td>Iteration</td>
<td>300</td>
</tr>
<tr>
<td/>
<td>Number of neighbors (k)</td>
<td>7</td>
</tr>
<tr>
<td/>
<td>Distance metric</td>
<td>Euclidean distance</td>
</tr>
<tr>
<td>KNN</td>
<td>Weights</td>
<td>Uniform</td>
</tr>
<tr>
<td/>
<td>Algorithm</td>
<td>Kd-tree</td>
</tr>
<tr>
<td/>
<td>Leaf size</td>
<td>30</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In this paper, we use a trial-and-error method for parameter calibration, systematically altering each parameter and observing the effects while maintaining all other variables constant. For example, in an algorithm with various parameters like learning rates, convergence thresholds, or population sizes, we individually test each to see how they influence the algorithm&#x2019;s behavior. A fitness function is used to evaluate the effectiveness of these parameter settings. This function provides a standard to assess the algorithm&#x2019;s performance with different parameter combinations. The possible range for each parameter is wide, but practical limitations necessitate selecting and presenting a manageable subset of varied parameter instances. <xref ref-type="table" rid="table-1">Table 1</xref> displays this selection, offering a glimpse into the trial-and-error process by highlighting the parameter values that improved or reduced algorithm performance in certain cases.</p>
<p><xref ref-type="fig" rid="fig-5">Fig. 5</xref> illustrates the performance of the SOP of the proposed scheme <italic>vs.</italic> the different values of the average SNR at Bob. In this figure, the SOP is inversely related to the SNR at Bob&#x2013;as the SNR increases, the SOP decreases, indicating enhanced secrecy performance. The proposed IBBO-inspired RNN scheme demonstrates superior performance compared to other benchmark algorithms like KNN, SVM, and BP-based RNN. This can be observed from the steeper slope of the IBBO-based RNN curve, which indicates a faster reduction in SOP with increasing SNR. Notably, the IBBO-based RNN maintains lower SOP values across the entire SNR spectrum tested, suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>SOP performance of the proposed scheme <italic>vs.</italic> different average SNR at Bob</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-5.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-6">Fig. 6</xref> presents the SOP performance against various values of <inline-formula id="ieqn-37"><mml:math id="mml-ieqn-37"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, which can be interpreted as the target secrecy rate or the rate of confidential information transmission. The SOP increases with higher <inline-formula id="ieqn-38"><mml:math id="mml-ieqn-38"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula>, which aligns with the expectation that higher data rates pose a greater challenge for maintaining secrecy due to increased vulnerability to interception. The IBBO-based RNN again outperforms the benchmark algorithms across all <inline-formula id="ieqn-39"><mml:math id="mml-ieqn-39"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> values. However, the rate at which SOP increases with <inline-formula id="ieqn-40"><mml:math id="mml-ieqn-40"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula> is less steep for the IBBO-based RNN, indicating its robustness in maintaining secrecy even as demands on the system&#x2019;s secrecy capacity rise. This demonstrates the efficiency of the proposed method in managing energy harvesting and data transmission processes under various operational constraints.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>SOP performance of the proposed scheme for different values of <inline-formula id="ieqn-41"><mml:math id="mml-ieqn-41"><mml:msub><mml:mi>R</mml:mi><mml:mrow><mml:mi>S</mml:mi></mml:mrow></mml:msub></mml:math></inline-formula></title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-6.tif"/>
</fig>
<p>The rest of this section evaluates the effectiveness of the IBBO-RNN and various other methods in reducing outage probability in wireless-powered communications. This assessment includes performing tests for sensitivity, accuracy, and specificity and utilizes <xref ref-type="disp-formula" rid="eqn-15">Eqs. (15)</xref>&#x2013;<xref ref-type="disp-formula" rid="eqn-17">(17)</xref> for calculation.</p>
<p><disp-formula id="eqn-15"><label>(15)</label><mml:math id="mml-eqn-15" display="block"><mml:mi>S</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>v</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>y</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula>
<disp-formula id="eqn-16"><label>(16)</label><mml:math id="mml-eqn-16" display="block"><mml:mi>S</mml:mi><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>f</mml:mi><mml:mi>i</mml:mi><mml:mi>c</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>y</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>N</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula></p>
<p><disp-formula id="eqn-17"><label>(17)</label><mml:math id="mml-eqn-17" display="block"><mml:mi>A</mml:mi><mml:mi>c</mml:mi><mml:mi>c</mml:mi><mml:mi>u</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>y</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:mrow><mml:mrow><mml:mi>T</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>N</mml:mi><mml:mo>+</mml:mo><mml:mi>F</mml:mi><mml:mi>P</mml:mi><mml:mo>+</mml:mo><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:mrow></mml:mfrac></mml:math></disp-formula>where, <inline-formula id="ieqn-42"><mml:math id="mml-ieqn-42"><mml:mi>T</mml:mi><mml:mi>P</mml:mi></mml:math></inline-formula> &#x003D; True positive, <inline-formula id="ieqn-43"><mml:math id="mml-ieqn-43"><mml:mi>T</mml:mi><mml:mi>N</mml:mi></mml:math></inline-formula> &#x003D; True negative, <inline-formula id="ieqn-44"><mml:math id="mml-ieqn-44"><mml:mi>F</mml:mi><mml:mi>N</mml:mi></mml:math></inline-formula> &#x003D; False negative, <inline-formula id="ieqn-45"><mml:math id="mml-ieqn-45"><mml:mi>F</mml:mi><mml:mi>P</mml:mi></mml:math></inline-formula> &#x003D; False positive.</p>
<p><xref ref-type="table" rid="table-2">Table 2</xref> presents the results from different algorithms designed for outage probability in wireless-powered communications. The table clearly demonstrates that the IBBO-RNN surpasses others in terms of sensitivity, specificity, and accuracy across training and validation sets. Specifically, the IBBO-RNN achieved accuracies of 98.92% and 99.45% in the testing and training datasets, respectively. Furthermore, it attained sensitivities of 99.14% and 99.65% in the test and train datasets, respectively. According to <xref ref-type="table" rid="table-2">Table 2</xref>, the IBBO-RNN, CapSA-RNN, and ChOA-RNN algorithms recorded the top accuracy rates of 98.92%, 96.52%, and 95.62%, respectively, demonstrating a significantly improved capability in predicting outage probability in wireless-powered communications. In contrast, the BP-RNN, SVM, and KNN algorithms reported lower accuracy levels, with respective values of 91.27%, 88.81%, and 87.11%. The high sensitivity scores reflect superior algorithmic efficiency. The IBBO-RNN algorithm achieved the highest sensitivity of 99.14%, marking its exceptional performance over other models. On the other hand, the BP-RNN, SVM, and KNN algorithms showed lesser effectiveness.</p>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>The results of architectures in the test and train datasets</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th rowspan="2">Architectures</th>
<th align="center" colspan="3">Training (%)</th>
<th align="center" colspan="3">Validation (%)</th>
</tr>
<tr>
<th>Sensitivity</th>
<th>Specificity</th>
<th>Accuracy</th>
<th>Sensitivity</th>
<th>Specificity</th>
<th>Accuracy</th>
</tr>
</thead>
<tbody>
<tr>
<td>IBBO-RNN</td>
<td>99.65</td>
<td>96.81</td>
<td>99.45</td>
<td>99.14</td>
<td>96.12</td>
<td>98.92</td>
</tr>
<tr>
<td>Linear BBO-RNN</td>
<td>95.32</td>
<td>92.47</td>
<td>94.02</td>
<td>94.68</td>
<td>92.09</td>
<td>93.29</td>
</tr>
<tr>
<td>Logarithmic BBO-RNN</td>
<td>95.96</td>
<td>93.27</td>
<td>94.71</td>
<td>95.17</td>
<td>92.58</td>
<td>94.05</td>
</tr>
<tr>
<td>CapSA-RNN</td>
<td>98.21</td>
<td>95.29</td>
<td>97.25</td>
<td>97.71</td>
<td>94.68</td>
<td>96.52</td>
</tr>
<tr>
<td>ChOA-RNN</td>
<td>97.26</td>
<td>94.53</td>
<td>96.24</td>
<td>96.85</td>
<td>94.03</td>
<td>95.62</td>
</tr>
<tr>
<td>BP-RNN</td>
<td>93.12</td>
<td>90.98</td>
<td>92.45</td>
<td>92.41</td>
<td>89.34</td>
<td>91.27</td>
</tr>
<tr>
<td>LSTM</td>
<td>93.49</td>
<td>91.15</td>
<td>92.86</td>
<td>92.85</td>
<td>89.69</td>
<td>91.74</td>
</tr>
<tr>
<td>SVM</td>
<td>90.18</td>
<td>87.75</td>
<td>89.66</td>
<td>89.49</td>
<td>86.65</td>
<td>88.81</td>
</tr>
<tr>
<td>KNN</td>
<td>89.63</td>
<td>86.05</td>
<td>88.77</td>
<td>88.29</td>
<td>85.91</td>
<td>87.11</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="fig" rid="fig-7">Figs. 7</xref> and <xref ref-type="fig" rid="fig-8">8</xref> offer a graphical comparison among different architectural models. These models are ranked according to their performance, with the IBBO-RNN leading, followed by CapSA-RNN, ChOA-RNN, Logarithmic BBO-RNN, Linear BBO-RNN, LSTM, BP-RNN, SVM, and KNN. The rankings reflect the effective training of these architectures using meta-heuristic algorithms, which have successfully maximized their operational efficiency. Additionally, the accuracy of these architectures is consistently high across various hybrid DL structures in both the testing and training datasets. This uniformity in performance indicates that the meta-heuristic algorithms incorporated into the training regimen have yielded reliable and consistent results across multiple models and datasets.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>A visual representation showcasing the comparison of algorithms using training datasets</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-7.tif"/>
</fig><fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>A visual representation showcasing the comparison of algorithms using validation datasets</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-8.tif"/>
</fig>
<p><xref ref-type="fig" rid="fig-9">Fig. 9</xref> depicts a graphical comparison of the receiver operating characteristic (ROC) curves for different architectures. The ROC curve visually shows how well a binary classifier, like one that differentiates between two categories, performs as its discrimination threshold changes. It highlights the balance between the true positive rate (sensitivity) and the false positive rate (1-specificity) at various threshold levels. Sensitivity indicates the percentage of true positive cases accurately identified, whereas specificity denotes the percentage of true negative cases correctly classified. An analysis of the graph in <xref ref-type="fig" rid="fig-9">Fig. 9</xref> reveals that the area under the curve (AUC) for the IBBO-RNN surpasses that of the other architectures. The AUC is a measure of a classifier&#x2019;s overall effectiveness, reflecting the likelihood that a randomly selected positive instance is ranked above a randomly selected negative one. The greater AUC of the IBBO-RNN indicates its superior accuracy and discrimination capability relative to the others.</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>A visual comparison of the ROC curves for different architectures</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-9.tif"/>
</fig>
<p>MSE criteria in <xref ref-type="table" rid="table-3">Table 3</xref> are utilized for evaluating the proposed models. Among these, the IBBO-RNN architecture shows a lower MSE compared to its counterparts, signifying the effectiveness of the proposed method in addressing the problem. The IBBO&#x2019;s key strength lies in its ability to balance exploration and exploitation. This balance is achieved by incorporating strategies such as moving towards a random habitat, integrating the crossover operator from GA, and employing the global best operator from PSO into the IBBO. The IBBO algorithm enhances the parameter optimization for the RNN, enabling it to more accurately represent and understand the patterns and relationships in the data. <xref ref-type="fig" rid="fig-10">Fig. 10</xref> illustrates that the IBBO-RNN architecture converges faster than other models. At epoch 100, the IBBO-RNN nearly reaches the lowest MSE, while other models continue to show higher MSE values.</p>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>The MSE values of the different models</title>
</caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th rowspan="2">Architecture</th>
<th align="center" colspan="2">MSE</th>
</tr>
<tr>
<th>Training datasets</th>
<th>Validation datasets</th>
</tr>
</thead>
<tbody>
<tr>
<td>IBBO-RNN</td>
<td>0.00017</td>
<td>0.00082</td>
</tr>
<tr>
<td>Linear BBO-RNN</td>
<td>0.18965</td>
<td>0.32584</td>
</tr>
<tr>
<td>Logarithmic BBO-RNN</td>
<td>0.10563</td>
<td>0.25185</td>
</tr>
<tr>
<td>CapSA-RNN</td>
<td>0.00484</td>
<td>0.01941</td>
</tr>
<tr>
<td>ChOA-RNN</td>
<td>0.03974</td>
<td>0.04856</td>
</tr>
<tr>
<td>BP-RNN</td>
<td>0.54853</td>
<td>0.61056</td>
</tr>
<tr>
<td>LSTM</td>
<td>0.49652</td>
<td>0.58541</td>
</tr>
<tr>
<td>SVM</td>
<td>0.61423</td>
<td>0.89854</td>
</tr>
<tr>
<td>KNN</td>
<td>0.68452</td>
<td>0.94125</td>
</tr>
</tbody>
</table>
</table-wrap><fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>The convergence trend of architectures</title>
</caption>
<graphic mimetype="image" mime-subtype="tif" xlink:href="CMC_47875-fig-10.tif"/>
</fig>
</sec>
<sec id="s4">
<label>4</label>
<title>Conclusion</title>
<p>This paper has presented a novel approach to addressing one of the key challenges in the field of wireless-powered communications, particularly within the context of the IoT: the minimization of SOP. Our work introduces an IBBO-inspired RNN, a method that blends the strengths of BBO with the capabilities of RNNs. The core of our approach is the innovative migration model within the IBBO, which adeptly balances exploration and exploitation through advanced techniques borrowed from GA and PSO. This balance is critical in optimizing the parameters of the RNN to reduce the SOP effectively. The IBBO-RNN achieved a remarkable accuracy rate of 98.92%, outperforming the BP-RNN and other algorithms, and demonstrated a lower MSE alongside a higher AUC. These metrics underscore not only the method&#x2019;s efficacy in SOP minimization but also its superiority over existing approaches. However, this research is not without its limitations and challenges. As with any advanced computational method, the complexity and computational requirements of the IBBO-RNN can be considerable. The effectiveness of RNNs heavily relies on extensive labeled data for training, which may not always be available. Furthermore, while our approach has shown excellent results in simulations, real-world deployment may present additional challenges, including varying environmental conditions and hardware limitations.</p>
<p>In conclusion, our work represents a significant advance in the field of wireless-powered communications, particularly in enhancing the security of IoT systems. It opens up new possibilities for the integration of nature-inspired optimization algorithms with DL architectures. For future work, we aim to refine the IBBO-RNN to be more computationally efficient and to test its robustness in real-world scenarios. Additionally, exploring the adaptability of our approach to other types of wireless communication challenges could further demonstrate its versatility and effectiveness. In our current paper, we focus on the innovative application and benefits of the IBBO-RNN. For future research, we plan to extend our comparisons to include deep reinforcement learning (DRL), federated transfer learning, and game theory-based methods. We believe such an expansion will significantly enhance the wireless communication field, especially in IoT and security contexts.</p>
</sec>
</body>
<back>
<ack>
<p>The work described in this paper has been developed within the Project PRESECREL. We would like to acknowledge the financial support of the Ministerio de Ciencia e Investigaci&#x00F3;n (Spain), in relation to the Plan Estatal de Investigaci&#x00F3;n Cient&#x00ED;fica y T&#x00E9;cnica y de Innovaci&#x00F3;n 2017&#x2013;2020.</p>
</ack>
<sec><title>Funding Statement</title>
<p>The authors received no specific funding for this study.</p>
</sec>
<sec><title>Author Contributions</title>
<p>The authors confirm contribution to the paper as follows: study conception and design: M. M. Sharifi Nevisi, E. Bashir, S. Rezvanjou; data collection: M. M. Sharifi Nevisi, E. Ghafourian, F. Shoushtari; analysis and interpretation of results: E. Bashir, D. Mart&#x00ED;n, S. Rezvanjou, E. Ghafourian, F. Shoushtari; draft manuscript preparation: M. M. Sharifi Nevisi, E. Bashir, D. Mart&#x00ED;n. All authors reviewed the results and approved the final version of the manuscript.</p>
</sec>
<sec sec-type="data-availability"><title>Availability of Data and Materials</title>
<p>The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.</p>
</sec>
<sec sec-type="COI-statement"><title>Conflicts of Interest</title>
<p>The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</sec>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Cao</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Achieving reliable and secure communications in wireless-powered NOMA systems</article-title>,&#x201D; <source>IEEE Trans. Veh. Technol.</source>, vol. <volume>70</volume>, no. <issue>2</issue>, pp. <fpage>1978</fpage>&#x2013;<lpage>1983</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/TVT.2021.3053093</pub-id>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Lee</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Bang</surname></string-name>, and <string-name><given-names>H. H.</given-names> <surname>Choi</surname></string-name></person-group>, &#x201C;<article-title>Secrecy outage minimization for wireless-powered relay networks with destination-assisted cooperative jamming</article-title>,&#x201D; <source>IEEE Internet. Things.</source>, vol. <volume>8</volume>, no. <issue>3</issue>, pp. <fpage>1467</fpage>&#x2013;<lpage>1476</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2020.3013573</pub-id>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Hadley</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Ding</surname></string-name>, and <string-name><given-names>X.</given-names> <surname>Dai</surname></string-name></person-group>, &#x201C;<article-title>Improving secrecy performance of a wirelessly powered network</article-title>,&#x201D; <source>IEEE Trans. Commun.</source>, vol. <volume>65</volume>, no. <issue>11</issue>, pp. <fpage>4996</fpage>&#x2013;<lpage>5008</lpage>, <year>2017</year>. doi: <pub-id pub-id-type="doi">10.1109/TCOMM.2017.2732449</pub-id>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Moon</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Lee</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Song</surname></string-name>, and <string-name><given-names>I.</given-names> <surname>Lee</surname></string-name></person-group>, &#x201C;<article-title>Secrecy performance optimization for wireless powered communication networks with an energy harvesting jammer</article-title>,&#x201D; <source>IEEE Trans. Commun.</source>, vol. <volume>65</volume>, no. <issue>2</issue>, pp. <fpage>764</fpage>&#x2013;<lpage>774</lpage>, <year>2016</year>. doi: <pub-id pub-id-type="doi">10.1109/TCOMM.2016.2623627</pub-id>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>B.</given-names> <surname>Li</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Zou</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Zhou</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Cao</surname></string-name> and <string-name><given-names>Y. D.</given-names> <surname>Yao</surname></string-name></person-group>, &#x201C;<article-title>Secrecy outage probability analysis of friendly jammer selection aided multiuser scheduling for wireless networks</article-title>,&#x201D; <source>IEEE Trans. Commun.</source>, vol. <volume>67</volume>, no. <issue>5</issue>, pp. <fpage>3482</fpage>&#x2013;<lpage>3495</lpage>, <year>2019</year>. doi: <pub-id pub-id-type="doi">10.1109/TCOMM.2019.2894824</pub-id>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Yan</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Sun</surname></string-name>, and <string-name><given-names>G.</given-names> <surname>Gui</surname></string-name></person-group>, &#x201C;<article-title>Secrecy outage analysis of transmit antenna selection assisted with wireless power beacon</article-title>,&#x201D; <source>IEEE Trans. Veh. Technol.</source>, vol. <volume>69</volume>, no. <issue>7</issue>, pp. <fpage>7473</fpage>&#x2013;<lpage>7482</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/TVT.2020.2992766</pub-id>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Jiang</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Zhong</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>T. Q.</given-names> <surname>Duong</surname></string-name>, <string-name><given-names>A. T.</given-names> <surname>Tsiftsis</surname></string-name> and <string-name><given-names>Z.</given-names> <surname>Zhang</surname></string-name></person-group>, &#x201C;<article-title>Secrecy performance of wirelessly powered wiretap channels</article-title>,&#x201D; <source>IEEE Trans. Commun.</source>, vol. <volume>64</volume>, no. <issue>9</issue>, pp. <fpage>3858</fpage>&#x2013;<lpage>3871</lpage>, <year>2016</year>. doi: <pub-id pub-id-type="doi">10.1109/TCOMM.2016.2592529</pub-id>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Zan</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Shi</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Lu</surname></string-name>, and <string-name><given-names>Y.</given-names> <surname>Ye</surname></string-name></person-group>, &#x201C;<article-title>Wireless-powered backscatter communications for smart sustainable cities: A secrecy analysis</article-title>,&#x201D; <source>Sustain. Energy Technol. Assess.</source>, vol. <volume>56</volume>, pp. <fpage>103036</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.seta.2023.103036</pub-id>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Xu</surname></string-name> and <string-name><given-names>Q.</given-names> <surname>Li</surname></string-name></person-group>, &#x201C;<article-title>Resource allocation for secure communications in cooperative cognitive wireless powered communication networks</article-title>,&#x201D; <source>IEEE Syst. J.</source>, vol. <volume>13</volume>, no. <issue>3</issue>, pp. <fpage>2431</fpage>&#x2013;<lpage>2442</lpage>, <year>2018</year>. doi: <pub-id pub-id-type="doi">10.1109/JSYST.2018.2883491</pub-id>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Tang</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Liao</surname></string-name>, <string-name><given-names>M. Z. A.</given-names> <surname>Bhuiyan</surname></string-name>, and <string-name><given-names>W.</given-names> <surname>Shi</surname></string-name></person-group>, &#x201C;<article-title>Secrecy outage probability of secondary system for wireless-powered cognitive radio networks</article-title>,&#x201D; in <conf-name>Proc. 5th Int. Conf. Dependability Sens., Cloud, Big Data Syst. Appl.</conf-name>, <conf-loc>DependSys, Guangzhou, China</conf-loc>, <year>2019</year>, pp. <fpage>3</fpage>&#x2013;<lpage>17</lpage>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>W.</given-names> <surname>Lee</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Lee</surname></string-name>, and <string-name><given-names>T. Q.</given-names> <surname>Quek</surname></string-name></person-group>, &#x201C;<article-title>Deep-learning-assisted wireless-powered secure communications with imperfect channel state information</article-title>,&#x201D; <source>IEEE Internet. Things J.</source>, vol. <volume>9</volume>, no. <issue>13</issue>, pp. <fpage>11464</fpage>&#x2013;<lpage>11476</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/JIOT.2021.3128936</pub-id>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Ye</surname></string-name>, and <string-name><given-names>R. Q.</given-names> <surname>Hu</surname></string-name></person-group>, &#x201C;<article-title>Secrecy outage probability in backscatter communication systems with tag selection</article-title>,&#x201D; <source>IEEE Wirel. Commun. Lett.</source>, vol. <volume>10</volume>, no. <issue>10</issue>, pp. <fpage>2190</fpage>&#x2013;<lpage>2194</lpage>, <year>2021</year>. doi: <pub-id pub-id-type="doi">10.1109/LWC.2021.3095969</pub-id>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Moon</surname></string-name>, <string-name><given-names>H.</given-names> <surname>Lee</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Song</surname></string-name>, and <string-name><given-names>I.</given-names> <surname>Lee</surname></string-name></person-group>, &#x201C;<article-title>Secrecy outage minimization for wireless powered communication networks with an energy harvesting jammer</article-title>,&#x201D; in <conf-name>IEEE Global Commun. Conf. (GLOBECOM)</conf-name>, <publisher-loc>Washington DC, USA</publisher-loc>, <publisher-name>IEEE</publisher-name>, <year>2016</year>, pp. <fpage>1</fpage>&#x2013;<lpage>5</lpage>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Rabiei</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name>, <string-name><given-names>M. R.</given-names> <surname>Mosavi</surname></string-name>, and <string-name><given-names>D.</given-names> <surname>Mart&#x00ED;n</surname></string-name></person-group>, &#x201C;<article-title>MCRO-PUF: A novel modified crossover RO-PUF with an ultra-expanded CRP space</article-title>,&#x201D; <source>Comput. Mater. Contin.</source>, vol. <volume>74</volume>, no. <issue>3</issue>, pp. <fpage>4831</fpage>&#x2013;<lpage>4845</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.32604/cmc.2023.034981</pub-id>; <pub-id pub-id-type="pmid">37303558</pub-id></mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Yan</surname></string-name>, and <string-name><given-names>R.</given-names> <surname>Jantti</surname></string-name></person-group>, &#x201C;<article-title>Secrecy performance analysis of RIS-aided smart grid communications</article-title>,&#x201D; <source>IEEE Trans. Ind. Inform.</source>, pp. <fpage>1</fpage>&#x2013;<lpage>13</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1109/TII.2023.333384</pub-id>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name>, <string-name><given-names>F. R.</given-names> <surname>Ghadi</surname></string-name>, <string-name><given-names>R.</given-names> <surname>J&#x00E4;ntti</surname></string-name>, and <string-name><given-names>Z.</given-names> <surname>Yan</surname></string-name></person-group>, &#x201C;<article-title>Secrecy performance analysis of backscatter communications with side information</article-title>,&#x201D; <source>Sens.</source>, vol. <volume>23</volume>, no. <issue>20</issue>, pp. <fpage>8358</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.3390/s23208358</pub-id>; <pub-id pub-id-type="pmid">37896453</pub-id></mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Venkatesh</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Asha</surname></string-name></person-group>, &#x201C;<article-title>DERNNet: Dual encoding recurrent neural network based secure optimal routing in WSN</article-title>,&#x201D; <source>Comput. Syst. Sci. &#x0026; Eng.</source>, vol. <volume>45</volume>, no. <issue>2</issue>, pp. <fpage>1375</fpage>&#x2013;<lpage>1392</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.32604/csse.2023.030944</pub-id>; <pub-id pub-id-type="pmid">37303558</pub-id></mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Yi</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Cai</surname></string-name>, and <string-name><given-names>B.</given-names> <surname>Chen</surname></string-name></person-group>, &#x201C;<article-title>A DRL-Based hierarchical game for physical layer security with dynamic trilateral coalitions</article-title>,&#x201D; in <conf-name>ICC 2023&#x2013;IEEE Int. Conf. Commun.</conf-name>, <publisher-loc>Rome, Italy</publisher-loc>, <publisher-name>IEEE</publisher-name>, <year>2023</year>, pp. <fpage>4495</fpage>&#x2013;<lpage>4500</lpage>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Waqas</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Bano</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Hassan</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Tu</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Abbas</surname></string-name> and <string-name><given-names>Z. H.</given-names> <surname>Abbas</surname></string-name></person-group>, &#x201C;<article-title>Physical layer authentication using ensemble learning technique in wireless communications</article-title>,&#x201D; <source>Comput. Mater. Contin.</source>, vol. <volume>73</volume>, no. <issue>3</issue>, pp. <fpage>4489</fpage>&#x2013;<lpage>4499</lpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.32604/cmc.2022.029539</pub-id>; <pub-id pub-id-type="pmid">37303558</pub-id></mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H. M.</given-names> <surname>Wang</surname></string-name> and <string-name><given-names>X. G.</given-names> <surname>Xia</surname></string-name></person-group>, &#x201C;<article-title>Enhancing wireless secrecy via cooperation: Signal design and optimization</article-title>,&#x201D; <source>IEEE Commun. Mag.</source>, vol. <volume>53</volume>, no. <issue>12</issue>, pp. <fpage>47</fpage>&#x2013;<lpage>53</lpage>, <year>2015</year>. doi: <pub-id pub-id-type="doi">10.1109/MCOM.2015.7355565</pub-id>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name>, <string-name><given-names>M. R.</given-names> <surname>Mosavi</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Martin</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Aghapour</surname></string-name></person-group>, &#x201C;<article-title>An efficient authentication protocol for smart grid communication based on on-chip-error-correcting physical unclonable function</article-title>,&#x201D; <source>Sustain. Energy, Grids Netw.</source>, vol. 36, pp. <fpage>101228</fpage>, <year>2023</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Miri</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name>, <string-name><given-names>H. S.</given-names> <surname>Shahhoseini</surname></string-name>, <string-name><given-names>M. R.</given-names> <surname>Mosavi</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Aghapour</surname></string-name></person-group>, &#x201C;<article-title>On the security of &#x2018;an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller&#x2019;</article-title>,&#x201D; <source>IET Inform. Secur.</source>, vol. <volume>17</volume>, no. <issue>3</issue>, pp. <fpage>544</fpage>&#x2013;<lpage>551</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1049/ise2.12108</pub-id>.</mixed-citation></ref>
<ref id="ref-23"><label>[23]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S. S.</given-names> <surname>Fard</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name>, <string-name><given-names>M. R.</given-names> <surname>Mosavi</surname></string-name>, and <string-name><given-names>S. B.</given-names> <surname>Ko</surname></string-name></person-group>, &#x201C;<article-title>An efficient modeling attack for breaking the security of XOR-Arbiter PUFs by using the fully connected and long-short term memory</article-title>,&#x201D; <source>Microprocess. Microsyst.</source>, vol. <volume>94</volume>, pp. <fpage>104667</fpage>, <year>2022</year>. doi: <pub-id pub-id-type="doi">10.1016/j.micpro.2022.104667</pub-id>.</mixed-citation></ref>
<ref id="ref-24"><label>[24]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F. R.</given-names> <surname>Gahdi</surname></string-name> and <string-name><given-names>D.</given-names> <surname>Martin</surname></string-name></person-group>, &#x201C;<article-title>Performance analysis of RIS/STAR-IOS-aided V2V NOMA/OMA communications over composite fading channels</article-title>,&#x201D; <source>IEEE Trans. Intell. Vehi.</source>, pp. <fpage>1</fpage>&#x2013;<lpage>9</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1109/TIV.2023.3337898</pub-id>.</mixed-citation></ref>
<ref id="ref-25"><label>[25]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Khanduzi</surname></string-name> and <string-name><given-names>A. K.</given-names> <surname>Sangaiah</surname></string-name></person-group>, &#x201C;<article-title>An efficient recurrent neural network for defensive Stackelberg game</article-title>,&#x201D; <source>J. Comput. Sci.</source>, vol. <volume>67</volume>, pp. <fpage>101970</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.jocs.2023.101970</pub-id>.</mixed-citation></ref>
<ref id="ref-26"><label>[26]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Zhang</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Differentiating brain states via multi-clip random fragment strategy-based interactive bidirectional recurrent neural network</article-title>,&#x201D; <source>Neural. Netw.</source>, vol. <volume>165</volume>, no. <issue>1</issue>, pp. <fpage>1035</fpage>&#x2013;<lpage>1049</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.neunet.2023.06.040</pub-id>; <pub-id pub-id-type="pmid">37473638</pub-id></mixed-citation></ref>
<ref id="ref-27"><label>[27]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>U.</given-names> <surname>Kaya</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Y&#x0131;lmaz</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>A&#x015F;ar</surname></string-name></person-group>, &#x201C;<article-title>Sepsis prediction by using a hybrid metaheuristic algorithm: A novel approach for optimizing deep neural networks</article-title>,&#x201D; <source>Diagnostics</source>, vol. <volume>13</volume>, no. <issue>12</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>15</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.3390/diagnostics13122023</pub-id>; <pub-id pub-id-type="pmid">37370918</pub-id></mixed-citation></ref>
<ref id="ref-28"><label>[28]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E.</given-names> <surname>Ghandourah</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Khatir</surname></string-name>, <string-name><given-names>E. M.</given-names> <surname>Banoqitah</surname></string-name>, <string-name><given-names>A. M.</given-names> <surname>Alhawsawi</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Benaissa</surname></string-name> and <string-name><given-names>M. A.</given-names> <surname>Wahab</surname></string-name></person-group>, &#x201C;<article-title>Enhanced ANN predictive model for composite pipes subjected to low-velocity impact loads</article-title>,&#x201D; <source>Build.</source>, vol. <volume>13</volume>, no. <issue>4</issue>, pp. <fpage>973</fpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.3390/buildings13040973</pub-id>.</mixed-citation></ref>
<ref id="ref-29"><label>[29]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Parmar</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Chouhan</surname></string-name>, <string-name><given-names>V.</given-names> <surname>Raychoudhury</surname></string-name>, and <string-name><given-names>S.</given-names> <surname>Rathore</surname></string-name></person-group>, &#x201C;<article-title>Open-world machine learning: Applications, challenges, and opportunities</article-title>,&#x201D; <source>ACM Comput. Surv.</source>, vol. <volume>55</volume>, no. <issue>10</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>37</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1145/3561381</pub-id>.</mixed-citation></ref>
<ref id="ref-30"><label>[30]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Gheisari</surname></string-name> <etal>et al.</etal></person-group>, &#x201C;<article-title>Deep learning: Applications, architectures, models, tools, and frameworks: A comprehensive survey</article-title>,&#x201D; <source>CAAI Trans. Intell. Technol.</source>, vol. <volume>8</volume>, no. <issue>3</issue>, pp. <fpage>581</fpage>&#x2013;<lpage>606</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1049/cit2.12180</pub-id>.</mixed-citation></ref>
<ref id="ref-31"><label>[31]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Dargan</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Kumar</surname></string-name>, <string-name><given-names>M. R.</given-names> <surname>Ayyagari</surname></string-name>, and <string-name><given-names>G.</given-names> <surname>Kumar</surname></string-name></person-group>, &#x201C;<article-title>A survey of deep learning and its applications: A new paradigm to machine learning</article-title>,&#x201D; <source>Arch. Comput. Method. Eng.</source>, vol. <volume>27</volume>, pp. <fpage>1071</fpage>&#x2013;<lpage>1092</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1007/s11831-019-09344-w</pub-id>.</mixed-citation></ref>
<ref id="ref-32"><label>[32]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Aghapour</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Martin</surname></string-name>, and <string-name><given-names>M. R.</given-names> <surname>Mosavi</surname></string-name></person-group>, &#x201C;<article-title>A secure lightweight signcryption scheme for smart grid communications using reliable physically unclonable function</article-title>,&#x201D; in <conf-name>IEEE Int. Conf. Environ. Electr. Eng.</conf-name>, <publisher-loc>Madrid, Spain</publisher-loc>, <publisher-name>IEEE</publisher-name>, <year>2020</year>, pp. <fpage>1</fpage>&#x2013;<lpage>6</lpage>.</mixed-citation></ref>
<ref id="ref-33"><label>[33]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A. H.</given-names> <surname>Ribeiro</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Tiels</surname></string-name>, <string-name><given-names>L. A.</given-names> <surname>Aguirre</surname></string-name>, and <string-name><given-names>T.</given-names> <surname>Sch&#x00F6;n</surname></string-name></person-group>, &#x201C;<article-title>Beyond exploding and vanishing gradients: Analyzing RNN training using attractors and smoothness</article-title>,&#x201D; in <conf-name>Int. Conf. Artif. Intell. Stat.</conf-name>, <year>2020</year>, pp. <fpage>2370</fpage>&#x2013;<lpage>2380</lpage>.</mixed-citation></ref>
<ref id="ref-34"><label>[34]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Z.</given-names> <surname>Allen-Zhu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Li</surname></string-name>, and <string-name><given-names>Z.</given-names> <surname>Song</surname></string-name></person-group>, &#x201C;<article-title>On the convergence rate of training recurrent neural networks</article-title>,&#x201D; <source>Adv. Neural Inf. Process. Syst.</source>, vol. <volume>32</volume>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-35"><label>[35]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name>, <string-name><given-names>M. S.</given-names> <surname>Mesgari</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Mart&#x00ED;n</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name></person-group>, &#x201C;<article-title>TDMBBO: A novel three-dimensional migration model of biogeography-based optimization (case study: Facility planning and benchmark problems)</article-title>,&#x201D; <source>J. Supercomput.</source>, vol. <volume>79</volume>, pp. <fpage>1</fpage>&#x2013;<lpage>56</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s11227-023-05047-z</pub-id>.</mixed-citation></ref>
<ref id="ref-36"><label>[36]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name>, <string-name><given-names>M. S.</given-names> <surname>Mesgari</surname></string-name>, and <string-name><given-names>B.</given-names> <surname>Saeidian</surname></string-name></person-group>, &#x201C;<article-title>Orchard algorithm (OA): A new meta-heuristic algorithm for solving discrete and continuous optimization problems</article-title>,&#x201D; <source>Math. Comput. Simulat.</source>, vol. <volume>208</volume>, pp. <fpage>95</fpage>&#x2013;<lpage>135</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1016/j.matcom.2022.12.027</pub-id>.</mixed-citation></ref>
<ref id="ref-37"><label>[37]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Tian</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Peng</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Rodemann</surname></string-name>, <string-name><given-names>K. C.</given-names> <surname>Tan</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Jin</surname></string-name></person-group>, &#x201C;<article-title>A recommender system for metaheuristic algorithms for continuous optimization based on deep recurrent neural networks</article-title>,&#x201D; <source>IEEE Trans. Artif. Intell.</source>, vol. <volume>1</volume>, no. <issue>1</issue>, pp. <fpage>5</fpage>&#x2013;<lpage>18</lpage>, <year>2020</year>. doi: <pub-id pub-id-type="doi">10.1109/TAI.2020.3022339</pub-id>.</mixed-citation></ref>
<ref id="ref-38"><label>[38]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Kaveh</surname></string-name> and <string-name><given-names>M. S.</given-names> <surname>Mesgari</surname></string-name></person-group>, &#x201C;<article-title>Application of meta-heuristic algorithms for training neural networks and deep learning architectures: A comprehensive review</article-title>,&#x201D; <source>Neural. Process. Lett.</source>, vol. <volume>55</volume>, no. <issue>4</issue>, pp. <fpage>4519</fpage>&#x2013;<lpage>4622</lpage>, <year>2023</year>. doi: <pub-id pub-id-type="doi">10.1007/s11063-022-11055-6</pub-id>; <pub-id pub-id-type="pmid">36339645</pub-id></mixed-citation></ref>
<ref id="ref-39"><label>[39]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Ma</surname></string-name>, <string-name><given-names>D.</given-names> <surname>Simon</surname></string-name>, <string-name><given-names>P.</given-names> <surname>Siarry</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Yang</surname></string-name>, and <string-name><given-names>M.</given-names> <surname>Fei</surname></string-name></person-group>, &#x201C;<article-title>Biogeography-based optimization: A 10-year review</article-title>,&#x201D; <source>IEEE Trans. Emerg. Topics Comput. Intell.</source>, vol. <volume>1</volume>, no. <issue>5</issue>, pp. <fpage>391</fpage>&#x2013;<lpage>407</lpage>, <year>2017</year>. doi: <pub-id pub-id-type="doi">10.1109/TETCI.2017.2739124</pub-id>.</mixed-citation></ref>
</ref-list>
</back></article>