
Securing Unmanned Aerial Vehicle (UAV) systems is vital to safeguard the processes involved in operating the drones. This involves the execution of robust communication encryption processes to defend the data exchanged between the UAVs and ground control stations. Intrusion detection, powered by Deep Learning (DL) techniques such as Convolutional Neural Networks (CNN), allows the classification and identification of potential attacks or illegal objects in the operational region of the drone, thus distinguishing them from the routine basics. The current research work offers a new Hybrid Arithmetic Optimizer Algorithm with DL method for Secure Unmanned Aerial Vehicle Network (HAOADL-UAVN) model. The purpose of the proposed HAOADL-UAVN technique is to secure the communication that occurs in UAV networks via threat detection. At the primary level, the network data is normalized through min-max normalization approach in order to scale the input dataset into a useful format. The HAOA is used to select a set of optimal features. Next, the security is attained via Deep Belief Network Autoencoder (DBN-AE)-based threat detection. At last, the hyperparameter choice of the DBN-AE method is implemented using the Seagull Optimization Algorithm (SOA). A huge array of simulations was conducted using the benchmark datasets to demonstrate the improved performance of the proposed HAOADL-UAVN algorithm. The comprehensive results underline the supremacy of the HAOADL-UAVN methodology under distinct evaluation metrics.
Citation: Sultanah M. Alshammari, Nofe A. Alganmi, Mohammed H. Ba-Aoum, Sami Saeed Binyamin, Abdullah AL-Malaise AL-Ghamdi, Mahmoud Ragab. Hybrid arithmetic optimization algorithm with deep learning model for secure Unmanned Aerial Vehicle networks[J]. AIMS Mathematics, 2024, 9(3): 7131-7151. doi: 10.3934/math.2024348
[1] | Xiujiao Chi, Pengtong Li . Characterization of frame vectors for A-group-like unitary systems on Hilbert C∗-modules. AIMS Mathematics, 2023, 8(9): 22112-22126. doi: 10.3934/math.20231127 |
[2] | Adel Alahmadi, Tamador Alihia, Patrick Solé . The build up construction for codes over a non-commutative non-unitary ring of order 9. AIMS Mathematics, 2024, 9(7): 18278-18307. doi: 10.3934/math.2024892 |
[3] | Yan Ling Fu, Wei Zhang . Some results on frames by pre-frame operators in Q-Hilbert spaces. AIMS Mathematics, 2023, 8(12): 28878-28896. doi: 10.3934/math.20231480 |
[4] | Yunpeng Xue . On enhanced general linear groups: nilpotent orbits and support variety for Weyl module. AIMS Mathematics, 2023, 8(7): 14997-15007. doi: 10.3934/math.2023765 |
[5] | Bhabesh Das, Helen K. Saikia . On the Sum of Unitary Divisors Maximum Function. AIMS Mathematics, 2017, 2(1): 96-101. doi: 10.3934/Math.2017.1.96 |
[6] | Xiaogang Liu, Muhammad Ahsan, Zohaib Zahid, Shuili Ren . Fault-tolerant edge metric dimension of certain families of graphs. AIMS Mathematics, 2021, 6(2): 1140-1152. doi: 10.3934/math.2021069 |
[7] | Lyimo Sygbert Mhagama, Muhammad Faisal Nadeem, Mohamad Nazri Husin . On the edge metric dimension of some classes of cacti. AIMS Mathematics, 2024, 9(6): 16422-16435. doi: 10.3934/math.2024795 |
[8] | Ali N. A. Koam, Adnan Khalil, Ali Ahmad, Muhammad Azeem . Cardinality bounds on subsets in the partition resolving set for complex convex polytope-like graph. AIMS Mathematics, 2024, 9(4): 10078-10094. doi: 10.3934/math.2024493 |
[9] | Hui Chen . Characterizations of normal cancellative monoids. AIMS Mathematics, 2024, 9(1): 302-318. doi: 10.3934/math.2024018 |
[10] | Chenggang Huo, Humera Bashir, Zohaib Zahid, Yu Ming Chu . On the 2-metric resolvability of graphs. AIMS Mathematics, 2020, 5(6): 6609-6619. doi: 10.3934/math.2020425 |
Securing Unmanned Aerial Vehicle (UAV) systems is vital to safeguard the processes involved in operating the drones. This involves the execution of robust communication encryption processes to defend the data exchanged between the UAVs and ground control stations. Intrusion detection, powered by Deep Learning (DL) techniques such as Convolutional Neural Networks (CNN), allows the classification and identification of potential attacks or illegal objects in the operational region of the drone, thus distinguishing them from the routine basics. The current research work offers a new Hybrid Arithmetic Optimizer Algorithm with DL method for Secure Unmanned Aerial Vehicle Network (HAOADL-UAVN) model. The purpose of the proposed HAOADL-UAVN technique is to secure the communication that occurs in UAV networks via threat detection. At the primary level, the network data is normalized through min-max normalization approach in order to scale the input dataset into a useful format. The HAOA is used to select a set of optimal features. Next, the security is attained via Deep Belief Network Autoencoder (DBN-AE)-based threat detection. At last, the hyperparameter choice of the DBN-AE method is implemented using the Seagull Optimization Algorithm (SOA). A huge array of simulations was conducted using the benchmark datasets to demonstrate the improved performance of the proposed HAOADL-UAVN algorithm. The comprehensive results underline the supremacy of the HAOADL-UAVN methodology under distinct evaluation metrics.
Fractional differential equations have gotten attention and prominence due to their numerous applications in engineering and science. These equations, for instance, are increasingly being utilized to explain phenomena in many different physical processes, including fluid mechanics, biology, electromagnetic, signal processing, acoustics and many more. In these and other applications, the non-locality of fractional differential equations is their main benefit. The integer order differential operator is typically considered a local operator, whereas the fractional order differential operator is non-local. This shows that the next state of a system depends on both its present state and all of its previous states. This is more practical, which is one of the reasons fractional calculus is growing in popularity [1,2,3,4,5,6,7,8,9].
Finding solutions to fractional differential equations has therefore received a lot of interest. A fractional differential equation is typically challenging to solve exactly. Researchers were interested in numerical approaches, the perturbation method among them. However, there are significant drawbacks to perturbation methods. For instance, the approximate solution necessitates a number of small parameters, which is problematic because most nonlinear problems do not have any small parameters. Even if an adequate selection of minor parameters occasionally results in the optimal solution, inappropriate selections frequently have negative consequences for the solutions. J. H. He, a Chinese researcher, invented the homotopy perturbation method (HPM) and presented it in 1998 [10,11].
The Adomian decomposition method [12,13] is a powerful approach for solving linear and nonlinear, homogeneous and nonhomogeneous partial and differential equations, and integro-differential equations of integer and non-integer order, which gives us convergent series from exact solutions. Several mathematicians used the homotopy perturbation method for handling nonlinear equations arising in engineering and science [14,15,16,17]. Many authors have focused their attention recently on examining the solutions to both linear and nonlinear partial differential equations using a variety of techniques such as Elzaki transform decomposition method [18,19], homotopy perturbation transform technique [20,21], homotopy analysis transform method [22,23], q-homotopy analysis transform method [24], iterative Laplace transform method [25], variational iteration method [26,27] and many others among them.
The mathematical theory of shock waves describes the first-order quasi-linear hyperbolic system of partial differential equations (PDEs) surface of discontinuity's characteristics. In the latter half of the 19th century, concerns with the compressible fluids and motion of gases gave rise to the mathematical theory of shock waves. The research of Earnshaw [28], Riemann [29], Rankine [30] and Hugoniot [31] laid the groundwork for it. One imagines a medium devoid of dissipation, viscosity and thermal conductivity as an idealization of actual gases and fluids. There may be discontinuities in the distribution of all flow parameters during motion in such idealized media (the temperature, the pressure, the velocity, the density, etc.). The collection of flow parameter discontinuity spots may be highly intricate when this set has piecewise-smooth surfaces of discontinuity made up of discontinuity points of the first kind; only the most elementary basic cases have been carefully taken into account. In the general scenario, discontinuous two-dimensional surfaces move in the three-dimensional space R3 as time passes. Conservation laws are among the characteristics shared by all continuum physics theories. By connecting the values of the primary vector field J to the flux f, constitutive relations that characterize the specific medium in question are added to the laws. By connecting the principal vector field J values to the flux f, constitutive relations that characterize the specific medium in question are added to the laws.
Since we are assuming that these relations are represented by smooth forms in this scenario, the conservation laws lead to nonlinear hyperbolic PDEs, which are expressed in their most basic form as
Jϑ(κ,ϑ)+f(J(κ,ϑ))κ=0,κ∈R,ϑ>0, | (1.1) |
subjected to the initial condition
J(κ,0)=J0(κ),κ∈R. |
A model for a variety of physical phenomena, including shock waves and three-phase flow in porous media, uses (1.1). Traffic flow, explosions, aeroplanes breaking the sound barrier, glacier waves, and other phenomena all use shock waves. Nonlinear hyperbolic PDEs are used to formulate them [32,33,34]. The Adomian decomposition method (ADM) [35,36,37] and the homotopy perturbation method (HPM) [38,39,40] have both been used to study the shock wave and wave equations. Since solutions are simple to find, the classical shock wave and wave equations provide excellent predictive equations. We introduce a fractional-order generalization of shock wave (1.1) in this article, which has the following form:
DρϑJ(κ,ϑ)+f(J(κ,ϑ))κ=0,κ∈R,ϑ>0, | (1.2) |
where a parameter named ρ designates the order of the time-derivative. In the Caputo sense, the derivative is regarded. A parameter specifying the order of the fractional-order shock wave equation is included in the general response expression and can be changed to generate different responses. The fractional-order shock wave equation is reduced to the standard shock wave equation when ρ=1.
This study solves the fractional-order shock wave and wave equations analytically and numerically using the new homotopy perturbation transform technique and the Yang transform decomposition method. This method's ability to combine two effective approaches for generating precise and approximative analytical solutions for nonlinear equations is an advantage. It is important to note that the suggested methodology can perform better overall since it can reduce the amount of computational work required compared to the other techniques while still keeping the high accuracy of the numerical result.
The rest of the paper is organized as follows: In Section 2, we introduce some fundamental preliminaries. In Section 3, we presented the general methodology of HPYTM to obtain the solution of general arbitrary order PDE, while in Section 4, we presented the general method of YDTM to get the solution of general arbitrary order PDE. In Section 5, the suggested techniques are implemented for solving nonlinear fractional-order shock wave equations, and in Section 6, results and discussion are given. Similarly, in the end, a brief conclusion is given in Section 7.
In this section, we discuss a number of important concepts, terminology and ideas relevant to the fractional derivative operators used in the current study.
Definition 2.1. The fractional Caputo derivative is stated as
DρJJ(κ,ϑ)=1Γ(k−ρ)∫ϑ0(ϑ−ρ)k−ρ−1J(k)(κ,ρ)dρ,k−1<ρ≤k,k∈N. | (2.1) |
Definition 2.2. The Yang transform (YT) of a function J(ϑ) is stated as
Y(J(ϑ))=M(u)=∫∞0e−ϑuJ(ϑ)dϑ,ϑ>0,u∈(−ϑ1,ϑ2), | (2.2) |
having Yang inverse transform as
Y−1{M(u)}=J(ϑ). | (2.3) |
Definition 2.3. The Yang transform of nth derivatives is stated as
Y(Jn(ϑ))=M(u)un−n−1∑k=0Jk(0)un−k−1, | (2.4) |
for all n=1,2,3,….
Definition 2.4. The Yang transform of fractional-order derivative is stated as
Y(Jρ(ϑ))=M(u)uρ−n−1∑k=0Jk(0)uρ−(k+1),0<ρ≤n. | (2.5) |
This section is concerned with fundamental solution process of HPYTM to get the solution of general arbitrary order partial differential equation
DρϑJ(κ,ϑ)=P1[κ]J(κ,ϑ)+Q1[κ]J(κ,ϑ),0<ρ≤2, | (3.1) |
subjected to the initial conditions
J(κ,0)=ξ(κ),∂∂ϑJ(κ,0)=ζ(κ), |
where Dρϑ=∂ρ∂ϑρ is the fractional Caputo derivative, P1[κ] and Q1[κ] are linear and nonlinear operators.
By employing YT, we have
Y[DρϑJ(κ,ϑ)]=Y[P1[κ]J(κ,ϑ)+Q1[κ]J(κ,ϑ)], | (3.2) |
1uρ{M(u)−uJ(0)−u2J′(0)}=Y[P1[κ]J(κ,ϑ)+Q1[κ]J(κ,ϑ)]. | (3.3) |
On simplification, we get
M(J)=uJ(0)+u2J′(0)+uρY[P1[κ]J(κ,ϑ)+Q1[κ]J(κ,ϑ)]. | (3.4) |
Operating inverse YT both sides, we have
J(κ,ϑ)=J(0)+J′(0)+Y−1[uρY[P1[κ]J(κ,ϑ)+Q1[κ]J(κ,ϑ)]]. | (3.5) |
Now, by using the HPM
J(κ,ϑ)=∞∑k=0ϵkJk(κ,ϑ), | (3.6) |
with perturbation parameter ϵ∈[0,1].
The nonlinear terms are decomposed as
Q1[κ]J(κ,ϑ)=∞∑k=0ϵkHn(J), | (3.7) |
and He's polynomials Hk(J) are given as
Hn(J0,J1,…,Jn)=1Γ(n+1)Dkϵ[Q1(∞∑k=0ϵiJi)]ϵ=0, | (3.8) |
where Dkϵ=∂k∂ϵk.
Using (3.7) and (3.8) in (3.5), we have
∞∑k=0ϵkJk(κ,ϑ)=J(0)+J′(0)+ϵ(Y−1{uρY(P1∞∑k=0ϵkJk(κ,ϑ)+∞∑k=0ϵkHk(J))}). | (3.9) |
Thus, by equating the coefficient of ϵ, we get
ϵ0:J0(κ,ϑ)=J(0)+J′(0),ϵ1:J1(κ,ϑ)=Y−1[uρY(P1[κ]J0(κ,ϑ)+H0(J))],ϵ2:J2(κ,ϑ)=Y−1[uρY(P1[κ]J1(κ,ϑ)+H1(J))],⋮ϵk:Jk(κ,ϑ)=Y−1[uρY(P1[κ]Jk−1(κ,ϑ)+Hk−1(J))], | (3.10) |
for k>0, k∈N.
Finally, we use truncated series to approximate the analytical solution Jk(κ,ϑ),
J(κ,ϑ)=limM→∞M∑k=1Jk(κ,ϑ). | (3.11) |
The solutions to the aforementioned series usually converge quickly.
This section is concerned with the fundamental solution process of YTDM to get the solution of general arbitrary order partial differential equation
DρϑJ(κ,ϑ)=P1(κ,ϑ)+Q1(κ,ϑ),0<ρ≤1, | (4.1) |
subjected to the initial conditions
J(κ,0)=ξ(κ),∂∂ϑJ(κ,0)=ζ(κ), |
where Dρϑ=∂ρ∂ϑρ is the fractional Caputo derivative, P1 and Q1 are linear and non-linear operators, respectively.
By employing YT, we have
Y[DρϑJ(κ,ϑ)]=Y[P1(κ,ϑ)+Q1(κ,ϑ)], | (4.2) |
using the differentiation property of the YT, we have
1uρ{M(u)−uJ(0)−u2J′(0)}=Y[P1(κ,ϑ)+Q1(κ,ϑ)]. | (4.3) |
On simplification, we get
M(J)=uJ(0)+u2J′(0)+uρY[P1(κ,ϑ)+Q1(κ,ϑ)]. | (4.4) |
Operating inverse YT both sides, we have
J(κ,ϑ)=J(0)+J′(0)+Y−1[uρY[P1(κ,ϑ)+Q1(κ,ϑ)]. | (4.5) |
Thus, by means of YTDM the infinite series solution of J(κ,ϑ),
J(κ,ϑ)=∞∑m=0Jm(κ,ϑ). | (4.6) |
The decomposition of of nonlinear terms Q1 in terms of the Adomian polynomials are given as
Q1(κ,ϑ)=∞∑m=0Am, | (4.7) |
where
Am=1m![∂m∂ℓm{Q1(∞∑k=0ℓkκk,∞∑k=0ℓkϑk)}]ℓ=0. | (4.8) |
By putting (4.6) and (4.8) into (4.5), we obtain
∞∑m=0Jm(κ,ϑ)=J(0)+J′(0)+Y−1uρ[Y(P1(∞∑m=0κm,∞∑m=0ϑm)+∞∑m=0Am)]. | (4.9) |
We illustrate the below terms:
J0(κ,ϑ)=J(0)+ϑJ′(0), | (4.10) |
J1(κ,ϑ)=Y−1[uρY+{P1(κ0,ϑ0)+A0}]. | (4.11) |
Hence, in general for m≥1, we have
Jm+1(κ,ϑ)=Y−1[uρY+{P1(κm,ϑm)+Am}]. |
This section is concerned with the implementation of YTDM and HPYTM to solve fractional-order nonlinear shock wave equations.
Example 5.1. Consider the nonlinear fractional-order shock wave equation
∂ρJ∂ϑρ+(1c0−Υ+12Jc20)∂J∂κ=0,0<ρ≤1, | (5.1) |
with the initial condition
J(κ,0)=exp(−κ22), |
where c0 and Υ are constants with Υ representing the specific heat. In the present study, we choose c0=2 and Υ=1.5, which represent the airflow.
By employing YT, we have
Y(∂ρJ∂ϑρ)=−Y[(1c0−Υ+12Jc20)∂J∂κ]. | (5.2) |
Now, by YT differentiation property, we get
1uρ{M(u)−uJ(0)}=−Y[(1c0−Υ+12Jc20)∂J∂κ] | (5.3) |
and
M(u)=uJ(0)−uρY[(1c0−Υ+12Jc20)∂J∂κ]. | (5.4) |
Operating inverse YT both sides, we have
J(κ,ϑ)=J(0)−Y−1{uρ[Y((1c0−Υ+12Jc20)∂J∂κ)]},J(κ,ϑ)=exp(−κ22)−Y−1{uρ[Y((1c0−Υ+12Jc20)∂J∂κ)]}. | (5.5) |
Thus, by using the HPM, we obtain
∞∑k=0ϵkJk(κ,ϑ)=γ+ϵ(Y−1{uρY[1c0∂J∂κ(∞∑k=0ϵkJk(κ,ϑ))−Υ+121c20(∞∑k=0ϵkHk(J))]}), | (5.6) |
where non-linear terms are represented by He's polynomial Hk(J) and is stated as
∞∑k=0ϵkHk(J)=J∂J∂κ. | (5.7) |
Some components of He's polynomials are calculated as
H0(J)=J0∂J0∂κ,H1(J)=J0∂J1∂κ+J1∂J0∂κ. |
By comparing the coefficient of ϵ, we obtain
ϵ0:J0(κ,ϑ)=exp(−κ22),ϵ1:J1(κ,ϑ)=Y−1{uρY(1c0∂J0∂κ−Υ+121c20H0(J))}=−[1c0−Υ+12c20exp(−κ22)]κexp(−κ22)ϑρΓ(ρ+1),ϵ2:J2(κ,ϑ)=Y−1{uρY[(1c0∂J1∂κ−Υ+121c20H1(J))}=exp(−κ22)[−1c20+κ2c20−Υ+1c30exp(−κ22)−2(Υ+1)c30κ2exp(−κ22)−(Υ+1)24c40exp(−κ2)+3(Υ+1)24c40κ2exp(−κ2)]ϑ2ρΓ(2ρ+1),⋮ |
The remaining elements of the HPYTM solution can be achieved by continuing in the same way. Thus,
J(κ,ϑ)=exp(−κ22)−[1c0−Υ+12c20exp(−κ22)]κexp(−κ22)ϑρΓ(ρ+1)+exp(−κ22)×[−1c20+κ2c20−Υ+1c30exp(−κ22)−2(Υ+1)c30κ2exp(−κ22)−(Υ+1)24c40exp(−κ2)+3(Υ+1)24c40κ2exp(−κ2)]ϑ2ρΓ(2ρ+1)+⋯. |
By employing YT, we have
Y(∂ρJ∂ϑρ)=−Y((1c0−Υ+12Jc20)∂J∂κ). | (5.8) |
Now, by YT differentiation property, we get
1uρ{M(u)−uJ(0)}=−Y((1c0−Υ+12Jc20)∂J∂κ), | (5.9) |
M(u)=uJ(0)+uρY((1c0−Υ+12Jc20)∂J∂κ). | (5.10) |
Operating inverse YT both sides, we have
J(κ,ϑ)=J(0)−Y−1{uρ[Y((1c0−Υ+12Jc20)∂J∂κ)]},J(κ,ϑ)=exp(−κ22)−Y−1{uρ[Y((1c0−Υ+12Jc20)∂J∂κ)]}. | (5.11) |
Thus, by means of YTDM the infinite series solution of J(κ,ϑ),
J(κ,ϑ)=∞∑m=0Jm(κ,ϑ), | (5.12) |
and by means of Adomian polynomial, the nonlinear terms are derived as J∂J∂κ=∑∞m=0Am, we have
∞∑m=0Jm(κ,ϑ)=J(κ,0)−Y−1{uρ[Y((1c0∂J∂κ−Υ+12c20∞∑m=0Am))]},∞∑m=0Jm(κ,ϑ)=exp(−κ22)−Y−1{uρ[Y((1c0∂J∂κ−Υ+12c20∞∑m=0Am))]}. | (5.13) |
In this way, the nonlinear terms are decomposed as
A0=J0∂J0∂κ,A1=J0∂J1∂κ+J1∂J0∂κ. |
On comparing both sides, we get
J0(κ,ϑ)=exp(−κ22). |
On m=0, we have
J1(κ,ϑ)=−[1c0−Υ+12c20exp(−κ22)]κexp(−κ22)ϑρΓ(ρ+1). |
On m=1, we have
J2(κ,ϑ)=exp(−κ22)[−1c20+κ2c20−Υ+1c30exp(−κ22)−2(Υ+1)c30κ2exp(−κ22)−(Υ+1)24c40exp(−κ2)+3(Υ+1)24c40κ2exp(−κ2)]ϑ2ρΓ(2ρ+1). |
Thus, the remaining elements ρm of YTDM for (m≥2) are easy to get. Hence, we write the series form solution as
J(κ,ϑ)=∞∑m=0Jm(κ,ϑ)=J0(κ,ϑ)+J1(κ,ϑ)+J2(κ,ϑ)+⋯,J(κ,ϑ)=exp(−κ22)−[1c0−Υ+12c20exp(−κ22)]κexp(−κ22)ϑρΓ(ρ+1)+exp(−κ22)[−1c20+κ2c20−Υ+1c30exp(−κ22)−2(Υ+1)c30κ2exp(−κ22)−(Υ+1)24c40exp(−κ2)+3(Υ+1)24c40κ2exp(−κ2)]ϑ2ρΓ(2ρ+1)+⋯. |
Example 5.2. Consider the nonlinear fractional-order shock wave equation
∂ρJ∂ϑρ+J∂J∂κ−∂∂ϑ∂J2∂κ2=0,0<ρ≤1, | (5.14) |
with initial source
J(κ,0)=3 sech2(κ−152). |
By employing YT, we have
Y(∂ρJ∂ϑρ)=Y(∂∂ϑ∂J2∂κ2−J∂J∂κ). | (5.15) |
Now, by YT differentiation property, we get
1uρ{M(u)−uJ(0)}=Y(∂∂ϑ∂J2∂κ2−J∂J∂κ) | (5.16) |
and
M(u)=uJ(0)+uρY(∂∂ϑ∂J2∂κ2−J∂J∂κ). | (5.17) |
Operating inverse YT both sides, we have
J(κ,ϑ)=J(0)+Y−1{uρ[Y(∂∂ϑ∂J2∂κ2−J∂J∂κ)]},J(κ,ϑ)=3 sech2(κ−152)+Y−1{uρ[Y(∂∂ϑ∂J2∂κ2−J∂J∂κ)]}. | (5.18) |
Now, by using the HPM, we obtain
∞∑k=0ϵkJk(κ,ϑ)=3 sech2(κ−152)+ϵ(Y−1{uρY[(∞∑k=0ϵkJk(κ,ϑ))κκϑ−(∞∑k=0ϵkHk(J))]}), | (5.19) |
where non-linear terms are presented by He's polynomial Hk(J) and is stated as
∞∑k=0ϵkHk(J)=J∂J∂κ. | (5.20) |
Some terms of He's polynomials are calculated as
H0(J)=J0∂J0∂κ,H1(J)=J0∂J1∂κ+J1∂J0∂κ. |
By comparing the coefficient of ϵ, we obtain
ϵ0:J0(κ,ϑ)=3 sech2(κ−152),ϵ1:J1(κ,ϑ)=Y−1{uρY(∂∂ϑ∂J20∂κ2−H0(J))}=9 sech4(κ−152)tanh(κ−152)ϑρΓ(ρ+1),ϵ2:J2(κ,ϑ)=Y−1{uρY(∂∂ϑ∂J21∂κ2−H1(J))}=[1892 sech6(κ−152)tanh2(κ−152)−272 sech6(κ−152)]ϑ2ρΓ(2ρ+1)+[1352 sech4(κ−152)tanh3(κ−152)−632 sech4(κ−152tanh(κ−152))]Γ(ρ+1)ϑ2ρ−1Γ(2ρ),⋮ |
The remaining elements of the HPYTM solution can be achieved by continuing in the same way. Thus,
J(κ,ϑ)=3 sech2(κ−152)+9 sech4(κ−152)tanh(κ−152)ϑρΓ(ρ+1)+[1892 sech6(κ−152)tanh2(κ−152)−272 sech6(κ−152)]ϑ2ρΓ(2ρ+1)+[1352 sech4(κ−152)tanh3(κ−152)−632 sech4(κ−152tanh(κ−152))]Γ(ρ+1)ϑ2ρ−1Γ(2ρ)+⋯. |
By employing YT, we have
Y(∂ρJ∂ϑρ)=Y(∂∂ϑ∂J2∂κ2−J∂J∂κ). | (5.21) |
Now, by YT differentiation property, we have
1uρ{M(u)−uJ(0)}=Y(∂∂ϑ∂J2∂κ2−J∂J∂κ) | (5.22) |
and
M(u)=uJ(0)+uρY(∂∂ϑ∂J2∂κ2−J∂J∂κ). | (5.23) |
Operating inverse YT both sides, we have
J(κ,ϑ)=J(0)+Y−1{uρ[Y(∂∂ϑ∂J2∂κ2−J∂J∂κ)]},J(κ,ϑ)=1(1+exp(κ))2+Y−1{uρ[Y(∂∂ϑ∂J2∂κ2−J∂J∂κ)]}. | (5.24) |
Thus, by means of YTDM the infinite series solution of J(κ,ϑ),
J(κ,ϑ)=∞∑m=0Jm(κ,ϑ), | (5.25) |
and by means of Adomian polynomial, the nonlinear terms are derived as J∂J∂κ=∑∞m=0Am, we have
∞∑m=0Jm(κ,ϑ)=J(κ,0)+Y−1{uρ[Y(∂∂ϑ∂J2∂κ2−∞∑m=0Am)]},∞∑m=0Jm(κ,ϑ)=1(1+exp(κ))2+Y−1{uρ[Y(∂∂ϑ∂J2∂κ2−∞∑m=0Am)]}. | (5.26) |
In this way, the nonlinear terms are decomposed as
A0=J0∂J0∂κ,A1=J0∂J1∂κ+J1∂J0∂κ. |
On comparing both sides, we get
J0(κ,ϑ)=3 sech2(κ−152). |
On m=0, we have
J1(κ,ϑ)=9 sech4(κ−152)tanh(κ−152)ϑρΓ(ρ+1). |
On m=1, we have
J2(κ,ϑ)=[1892 sech6(κ−152)tanh2(κ−152)−272 sech6(κ−152)]ϑ2ρΓ(2ρ+1)+[1352 sech4(κ−152)tanh3(κ−152)−632 sech4(κ−152tanh(κ−152))]Γ(ρ+1)ϑ2ρ−1Γ(2ρ). |
Thus, the remaining elements ρm of YTDM for (m≥3) are easy to get. Hence, we write the series form solution as
J(κ,ϑ)=∞∑m=0Jm(κ,ϑ)=J0(κ,ϑ)+J1(κ,ϑ)+⋯,J(κ,ϑ)=3 sech2(κ−152)+9 sech4(κ−152)tanh(κ−152)ϑρΓ(ρ+1)+[1892 sech6(κ−152)tanh2(κ−152)−272 sech6(κ−152)]ϑ2ρΓ(2ρ+1)+[1352 sech4(κ−152)tanh3(κ−152)−632 sech4(κ−152tanh(κ−152))]Γ(ρ+1)ϑ2ρ−1Γ(2ρ)+⋯. |
At ρ=1, we get in closed form the exact solution as
J(κ,ϑ)=3 sech2(κ−15−ϑ2). | (5.27) |
In this section, we present the physical explanations for the presented problems. We note that our approaches can handle time fractional-order shock wave equations perfectly. It can be shown that J(κ,ϑ) reduces with the growth of κ and ϑ for ρ=0.25,0.50,0.75 and 1 in Figure 1, which shows the surface solutions of J(κ,ϑ) for various time fractional equations in Brownian. The analytical solution derived using the suggested approaches is shown in Figure 2, together with the exact solution for various values of κ and ϑ. Figure 2 also shows the surface solutions of J(κ,ϑ). Figure 3 shows the absolute error behavior of Example 5.2. Similarly, in Table 1, we show the behavior of the accurate and proposed method solutions at various fractional orders of ρ having different values of κ and ϑ. The figures and table show that the solution of the proposed method is in good contact with the exact solution.
ϑ | κ | ρ=0.6 | ρ=0.8 | ρ=1(approx) | ρ=1(approx) | ρ=1(exact) |
0.2 | 0.000004490 | 0.000004487 | 0.000004483 | 0.000004483 | 0.000004479 | |
0.4 | 0.000005481 | 0.000005479 | 0.000005476 | 0.000005476 | 0.000005470 | |
0.01 | 0.6 | 0.000006693 | 0.000006691 | 0.000006688 | 0.000006688 | 0.000006681 |
0.8 | 0.000008171 | 0.000008171 | 0.000008169 | 0.000008169 | 0.000008161 | |
1 | 0.000009982 | 0.000009980 | 0.000009978 | 0.000009978 | 0.000009968 | |
0.2 | 0.000004490 | 0.000004487 | 0.000004483 | 0.000004483 | 0.000004474 | |
0.4 | 0.000005482 | 0.000005478 | 0.000005476 | 0.000005476 | 0.000005465 | |
0.02 | 0.6 | 0.000006693 | 0.000006690 | 0.000006688 | 0.000006688 | 0.000006675 |
0.8 | 0.000008177 | 0.000008172 | 0.000008169 | 0.000008169 | 0.000008153 | |
1 | 0.000009987 | 0.000009982 | 0.000009978 | 0.000009978 | 0.000009958 | |
0.2 | 0.000004489 | 0.000004485 | 0.000004483 | 0.000004483 | 0.000004470 | |
0.4 | 0.000005489 | 0.00000583 | 0.000005476 | 0.000005476 | 0.000005459 | |
0.03 | 0.6 | 0.000006693 | 0.000006690 | 0.000006688 | 0.000006688 | 0.000006668 |
0.8 | 0.000008179 | 0.000008174 | 0.000008169 | 0.000008169 | 0.000008145 | |
1 | 0.000009989 | 0.000009982 | 0.000009978 | 0.000009978 | 0.000009948 | |
0.2 | 0.000004492 | 0.000004487 | 0.000004483 | 0.000004483 | 0.000004465 | |
0.4 | 0.000005487 | 0.000005481 | 0.000005476 | 0.000005476 | 0.000005454 | |
0.04 | 0.6 | 0.000006699 | 0.000006691 | 0.000006688 | 0.000006688 | 0.000006661 |
0.8 | 0.000008183 | 0.000008177 | 0.000008169 | 0.000008169 | 0.000008136 | |
1 | 0.000009999 | 0.000009983 | 0.000009978 | 0.000009978 | 0.000009938 | |
0.2 | 0.000004497 | 0.000004489 | 0.000004483 | 0.000004483 | 0.000004461 | |
0.4 | 0.000005490 | 0.000005479 | 0.000005476 | 0.000005476 | 0.000005448 | |
0.05 | 0.6 | 0.000006697 | 0.000006691 | 0.000006688 | 0.000006688 | 0.000006655 |
0.8 | 0.000008191 | 0.000008185 | 0.000008169 | 0.000008169 | 0.000008128 | |
1 | 0.000009997 | 0.000009988 | 0.000009978 | 0.000009978 | 0.000009928 |
The approximate and analytical solutions of the fractional-order nonlinear shock wave and wave equations are successfully obtained using the HPYTM and YTDM. The proposed methods are completed in two steps. First, we implement the Yang transform to simplify the proposed problems. After simplification, Adomian decomposition and homotopy perturbation methods are used to get the close form solution to the issues presented. The significance of fractional derivatives and the method for handling the recurrence relation are both shown in this study. The HPYTM and YTDM are used directly to generate the series solutions. Compared to previous methods examined in the literature, the current schemes exhibit more efficiency and require less computation. With the aid of MAPLE Software, all iterations were calculated. According to the solution graphs, this method can be applied to a wide range of nonlinear fractional differential equations in science and engineering. In subsequent research, these strategies could be expanded to address diverse nonlinear obstacle issues.
This work was supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project (No. PNURSP2022R183).
This work was supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project (No. PNURSP2022R183).
The authors declare that they have no competing interests.
[1] |
T. Alladi, V. Kohli, V. Chamola, F. R. Yu, A deep learning-based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems, Digit. Commun. Netw., 9 (2023), 1113–1122. https://doi.org/10.1016/j.dcan.2022.06.018 doi: 10.1016/j.dcan.2022.06.018
![]() |
[2] | K. H. Park, E. Park, H. K. Kim, Unsupervised intrusion detection system for unmanned aerial vehicle with less labeling effort. In: Information security applications: 21st international conference, Springer, Cham. 2020, 45–58. https://doi.org/10.1007/978-3-030-65299-9_4 |
[3] | S. Jeong, E. Park, K. U. Seo, J. Do Yoo, H. K. Kim, MUVIDS: false MAVLink injection attack detection in communication for unmanned vehicles. In: Workshop on automotive and autonomous vehicle security (AutoSec), 2021. https://doi.org/10.14722/autosec.2021.23036 |
[4] |
D. Basavaraj, S. Tayeb, Towards a lightweight intrusion detection framework for in-vehicle networks, J. Sensor Actuator Netw., 11 (2022), 6. https://doi.org/10.3390/jsan11010006 doi: 10.3390/jsan11010006
![]() |
[5] |
P. Mansourian, N. Zhang, A. Jaekel, M. Kneppers, Deep learning-based anomaly detection for connected autonomous vehicles using spatiotemporal information, IEEE T. Intell. Transp. Syst., 24 (2023), 16006–16017. https://doi.org/10.1109/TITS.2023.3286611 doi: 10.1109/TITS.2023.3286611
![]() |
[6] |
L. Yang, A. Moubayed, A. Shami, MTH-IDS: A multitiered hybrid intrusion detection system for internet of vehicles, IEEE Internet Things J., 9 (2022), 616–632. https://doi.org/10.1109/JIOT.2021.3084796 doi: 10.1109/JIOT.2021.3084796
![]() |
[7] | N. Vanitha, P. Ganapathi, Traffic analysis of UAV networks using enhanced deep feed forward neural networks (EDFFNN). In: Handbook of research on machine and deep learning applications for cyber security. 2020. https://doi.org/10.4018/978-1-5225-9611-0.ch011 |
[8] |
S. Aziz, M. T. Faiz, A. M. Adeniyi, K. H. Loo, K. N. Hasan, L. Xu, et al., Anomaly detection in the internet of vehicular networks using explainable neural networks (xnn), Mathematics, 10 (2022), 1267. https://doi.org/10.3390/math10081267 doi: 10.3390/math10081267
![]() |
[9] |
S. Anbalagan, G. Raja, S. Gurumoorthy, R. D. Suresh, K. Dev, ⅡDS: Intelligent intrusion detection system for sustainable development in autonomous vehicles, IEEE T. Intell. Transp. Syst., 24 (2023), 15866–15875. https://doi.org/10.1109/TITS.2023.3271768 doi: 10.1109/TITS.2023.3271768
![]() |
[10] |
R. Fotohi, E. Nazemi, F. S. Aliee, An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks, Veh. Commun., 26 (2020), 100267. https://doi.org/10.1016/j.vehcom.2020.100267 doi: 10.1016/j.vehcom.2020.100267
![]() |
[11] |
F. Kateb, M. Ragab, Archimedes optimization with deep learning based aerial image classification for cybersecurity enabled UAV networks, Comput. Syst. Sci. Eng., 47 (2023), 2171–2185. https://doi.org/10.32604/csse.2023.039931 doi: 10.32604/csse.2023.039931
![]() |
[12] |
M. A. Sayeed, R. Kumar, V. Sharma, Safeguarding unmanned aerial systems: An approach for identifying malicious aerial nodes, IET Commun., 14 (2020), 3000–3012. https://doi.org/10.1049/iet-com.2020.0073 doi: 10.1049/iet-com.2020.0073
![]() |
[13] |
J. Tao, T. Han, R. Li, Deep-reinforcement-learning-based intrusion detection in aerial computing networks, IEEE Netw., 35 (2021), 66–72. https://doi.org/10.1109/MNET.011.2100068 doi: 10.1109/MNET.011.2100068
![]() |
[14] |
A. Masadeh, M. Alhafnawi, H. A. B. Salameh, A. Musa, Y. Jararweh, Reinforcement learning-based security/safety uav system for intrusion detection under dynamic and uncertain target movement, IEEE T. Eng. Manage., 2022, 1–11. https://doi.org/10.1109/TEM.2022.3165375 doi: 10.1109/TEM.2022.3165375
![]() |
[15] |
R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, T. R. Gadekallu, G. Srivastava, SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles, Comput. Netw., 187 (2021), 107819. https://doi.org/10.1016/j.comnet.2021.107819 doi: 10.1016/j.comnet.2021.107819
![]() |
[16] |
L. Almutairi, R. Daniel, S. Khasimbee, E. L. Lydia, S. Acharya, H. Kim, Quantum dwarf mongoose optimization with ensemble deep learning based intrusion detection in cyber-physical systems, IEEE Access, 11 (2023), 66828–66837. https://doi.org/10.1109/ACCESS.2023.3287896 doi: 10.1109/ACCESS.2023.3287896
![]() |
[17] | I. U. Khan, A. Abdollahi, M. A. Khan, I. Uddin, I. Ullah, Securing against DoS/DDoS attacks in internet of flying things using experience-based deep learning algorithm, 2021. (Preprint) https://doi.org/10.21203/rs.3.rs-271920/v1 |
[18] |
Q. Abu Al-Haija, A. Al Badawi, High-performance intrusion detection system for networked UAVs via deep learning, Neural Comput. Appl., 34 (2022), 10885–10900. https://doi.org/10.1007/s00521-022-07015-9 doi: 10.1007/s00521-022-07015-9
![]() |
[19] |
M. S. Minu, R. Aroul Canessane, S. S. Subashka Ramesh, Optimal squeeze net with deep neural network-based arial image classification model in Unmanned Aerial Vehicles, Traitement du Signal, 39 (2022), 275–281. https://doi.org/10.18280/ts.390128 doi: 10.18280/ts.390128
![]() |
[20] |
J. Tian, B Wang, R. Guo, Z. Wang, K. Cao, X. Wang, Adversarial attacks and defenses for deep-learning-based unmanned aerial vehicles, IEEE Internet Things J., 9 (2021), 22399–22409. https://doi.org/10.1109/JIOT.2021.3111024 doi: 10.1109/JIOT.2021.3111024
![]() |
[21] |
V. F. S. Francelin, J. Daniel, S. Velliangiri, Intelligent agent and optimization‐based deep residual network to secure communication in UAV network, Int. J. Intell. Syst., 37 (2022), 5508–5529. https://doi.org/10.1002/int.22800 doi: 10.1002/int.22800
![]() |
[22] |
H. Zhang, J. Xue, Q. Wang, Y. Li, A security optimization scheme for data security transmission in UAV-assisted edge networks based on federal learning, Ad Hoc Netw., 150 (2023), 103277. https://doi.org/10.1016/j.adhoc.2023.103277 doi: 10.1016/j.adhoc.2023.103277
![]() |
[23] |
A. M. Elshewey, M. Y. Shams, N. El-Rashidy, A. M. Elhady, S. M. Shohieb, Z. Tarek, Bayesian optimization with support vector machine model for Parkinson disease classification, Sensors, 23 (2023), 2085. https://doi.org/10.3390/s23042085 doi: 10.3390/s23042085
![]() |
[24] |
M. Stankovic, J. Gavrilovic, D. Jovanovic, M. Zivkovic, M. Antonijevic, N. Bacanin, et al., Tuning multi-layer perceptron by hybridized arithmetic optimization algorithm for healthcare 4.0, Procedia Comput. Sci., 215 (2022), 51–60. https://doi.org/10.1016/j.procs.2022.12.006 doi: 10.1016/j.procs.2022.12.006
![]() |
[25] |
H. Al-Khazraji, A. R. Nasser, A. M. Hasan, A. K. Al Mhdawi, H. Al-Raweshidy, A. J. Humaidi, Aircraft engines remaining useful life prediction based on a hybrid model of autoencoder and deep belief network, IEEE Access, 10 (2022), 82156–82163. https://doi.org/10.1109/ACCESS.2022.3188681 doi: 10.1109/ACCESS.2022.3188681
![]() |
[26] |
P. Krishnadoss, V. K. Poornachary, P. Krishnamoorthy, L. Shanmugam, Improvised seagull optimization algorithm for scheduling tasks in heterogeneous cloud environment, Comput. Mater. Con., 74 (2023), 2461–2478. https://doi.org/10.32604/cmc.2023.031614 doi: 10.32604/cmc.2023.031614
![]() |
[27] |
N. Moustafa, A new distributed architecture for evaluating AI-based security systems at the edge: Network TON_IoT datasets, Sustain. Cities Soc., 72 (2021), 102994. https://doi.org/10.1016/j.scs.2021.102994 doi: 10.1016/j.scs.2021.102994
![]() |
[28] |
R. A. Ramadan, A. H. Emara, M. Al-Sarem, M. Elhamahmy, Internet of drones intrusion detection using deep learning, Electronics, 10 (2021), 2633. https://doi.org/10.3390/electronics10212633 doi: 10.3390/electronics10212633
![]() |
[29] |
L. Kou, S. Ding, T. Wu, W. Dong, Y. Yin, An intrusion detection model for drone communication network in SDN environment, Drones, 6 (2022), 342. https://doi.org/10.3390/drones6110342 doi: 10.3390/drones6110342
![]() |
ϑ | κ | ρ=0.6 | ρ=0.8 | ρ=1(approx) | ρ=1(approx) | ρ=1(exact) |
0.2 | 0.000004490 | 0.000004487 | 0.000004483 | 0.000004483 | 0.000004479 | |
0.4 | 0.000005481 | 0.000005479 | 0.000005476 | 0.000005476 | 0.000005470 | |
0.01 | 0.6 | 0.000006693 | 0.000006691 | 0.000006688 | 0.000006688 | 0.000006681 |
0.8 | 0.000008171 | 0.000008171 | 0.000008169 | 0.000008169 | 0.000008161 | |
1 | 0.000009982 | 0.000009980 | 0.000009978 | 0.000009978 | 0.000009968 | |
0.2 | 0.000004490 | 0.000004487 | 0.000004483 | 0.000004483 | 0.000004474 | |
0.4 | 0.000005482 | 0.000005478 | 0.000005476 | 0.000005476 | 0.000005465 | |
0.02 | 0.6 | 0.000006693 | 0.000006690 | 0.000006688 | 0.000006688 | 0.000006675 |
0.8 | 0.000008177 | 0.000008172 | 0.000008169 | 0.000008169 | 0.000008153 | |
1 | 0.000009987 | 0.000009982 | 0.000009978 | 0.000009978 | 0.000009958 | |
0.2 | 0.000004489 | 0.000004485 | 0.000004483 | 0.000004483 | 0.000004470 | |
0.4 | 0.000005489 | 0.00000583 | 0.000005476 | 0.000005476 | 0.000005459 | |
0.03 | 0.6 | 0.000006693 | 0.000006690 | 0.000006688 | 0.000006688 | 0.000006668 |
0.8 | 0.000008179 | 0.000008174 | 0.000008169 | 0.000008169 | 0.000008145 | |
1 | 0.000009989 | 0.000009982 | 0.000009978 | 0.000009978 | 0.000009948 | |
0.2 | 0.000004492 | 0.000004487 | 0.000004483 | 0.000004483 | 0.000004465 | |
0.4 | 0.000005487 | 0.000005481 | 0.000005476 | 0.000005476 | 0.000005454 | |
0.04 | 0.6 | 0.000006699 | 0.000006691 | 0.000006688 | 0.000006688 | 0.000006661 |
0.8 | 0.000008183 | 0.000008177 | 0.000008169 | 0.000008169 | 0.000008136 | |
1 | 0.000009999 | 0.000009983 | 0.000009978 | 0.000009978 | 0.000009938 | |
0.2 | 0.000004497 | 0.000004489 | 0.000004483 | 0.000004483 | 0.000004461 | |
0.4 | 0.000005490 | 0.000005479 | 0.000005476 | 0.000005476 | 0.000005448 | |
0.05 | 0.6 | 0.000006697 | 0.000006691 | 0.000006688 | 0.000006688 | 0.000006655 |
0.8 | 0.000008191 | 0.000008185 | 0.000008169 | 0.000008169 | 0.000008128 | |
1 | 0.000009997 | 0.000009988 | 0.000009978 | 0.000009978 | 0.000009928 |
ϑ | κ | ρ=0.6 | ρ=0.8 | ρ=1(approx) | ρ=1(approx) | ρ=1(exact) |
0.2 | 0.000004490 | 0.000004487 | 0.000004483 | 0.000004483 | 0.000004479 | |
0.4 | 0.000005481 | 0.000005479 | 0.000005476 | 0.000005476 | 0.000005470 | |
0.01 | 0.6 | 0.000006693 | 0.000006691 | 0.000006688 | 0.000006688 | 0.000006681 |
0.8 | 0.000008171 | 0.000008171 | 0.000008169 | 0.000008169 | 0.000008161 | |
1 | 0.000009982 | 0.000009980 | 0.000009978 | 0.000009978 | 0.000009968 | |
0.2 | 0.000004490 | 0.000004487 | 0.000004483 | 0.000004483 | 0.000004474 | |
0.4 | 0.000005482 | 0.000005478 | 0.000005476 | 0.000005476 | 0.000005465 | |
0.02 | 0.6 | 0.000006693 | 0.000006690 | 0.000006688 | 0.000006688 | 0.000006675 |
0.8 | 0.000008177 | 0.000008172 | 0.000008169 | 0.000008169 | 0.000008153 | |
1 | 0.000009987 | 0.000009982 | 0.000009978 | 0.000009978 | 0.000009958 | |
0.2 | 0.000004489 | 0.000004485 | 0.000004483 | 0.000004483 | 0.000004470 | |
0.4 | 0.000005489 | 0.00000583 | 0.000005476 | 0.000005476 | 0.000005459 | |
0.03 | 0.6 | 0.000006693 | 0.000006690 | 0.000006688 | 0.000006688 | 0.000006668 |
0.8 | 0.000008179 | 0.000008174 | 0.000008169 | 0.000008169 | 0.000008145 | |
1 | 0.000009989 | 0.000009982 | 0.000009978 | 0.000009978 | 0.000009948 | |
0.2 | 0.000004492 | 0.000004487 | 0.000004483 | 0.000004483 | 0.000004465 | |
0.4 | 0.000005487 | 0.000005481 | 0.000005476 | 0.000005476 | 0.000005454 | |
0.04 | 0.6 | 0.000006699 | 0.000006691 | 0.000006688 | 0.000006688 | 0.000006661 |
0.8 | 0.000008183 | 0.000008177 | 0.000008169 | 0.000008169 | 0.000008136 | |
1 | 0.000009999 | 0.000009983 | 0.000009978 | 0.000009978 | 0.000009938 | |
0.2 | 0.000004497 | 0.000004489 | 0.000004483 | 0.000004483 | 0.000004461 | |
0.4 | 0.000005490 | 0.000005479 | 0.000005476 | 0.000005476 | 0.000005448 | |
0.05 | 0.6 | 0.000006697 | 0.000006691 | 0.000006688 | 0.000006688 | 0.000006655 |
0.8 | 0.000008191 | 0.000008185 | 0.000008169 | 0.000008169 | 0.000008128 | |
1 | 0.000009997 | 0.000009988 | 0.000009978 | 0.000009978 | 0.000009928 |