Stay updated with breaking news from Eta heuristic. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.
Privacy and security present significant challenges in wireless sensor networks (WSNs). In order to enhance security, the sensor network is equipped with high throughput. While the importance of both source node (SN) and base station (BS) location privacy and security is acknowledged, recent research has predominantly focused on location privacy. Addressing this gap, the geometric zigzag bidirectional tree effectively tackles privacy and security threats at both the SN and BS locations. Future iterations of WSN are anticipated to integrate additional functionalities to meet diverse requirements in real-world applications. The absence of robust security constraints leads to an unpredictable sensor network setup. This article aims to reduce energy consumption (EC) while simultaneously enhancing network security and connectivity. To address security challenges in WSN, we propose an optimized meta-heuristic clustering-based privacy key-agreement routing technique. In the suggested system, ....
Energy utilization and cost minimization of renewable energy microgrids (REM) is an essential and difficult optimization challenge. However, most works have not considered heuristic and non-heuristic algorithms of REM complex equality and inequality requirements. In response, a single-objective optimization model for REM scheduling is developed and presented in this study. This microgrid model uses a very efficient and well-liked meta-heuristic optimization method called the Backtracking Search Algorithm (BSA). The BSA method locates a solution by constructing a solution piece by piece, adding levels over time, and using recursive calling. It is a method of large-scale search, and unlike other meta-heuristic approaches, it has a different model structure. Therefore, the proposed solution strategy may provide desirable outcomes with sufficient computational effort. Furthermore, in this research, the suggested process evaluates the consequences of another well-known meta-heuristic, parti ....