The objective of this criminal search optimization algorithm (CSOA) [32 (
link)] is to find the criminal by the evidence that is collected by the investigators. Cooperative jamming and power randomness are used to improve covertness performance [33 (
link)]. To achieve the goal of CSOA, the entire process is segmented into four phases. These phases are explained below:
Phase 1: Initialization
This initialization process is carried out in this phase. Here the parameters, SI (sub-investigators), and the undercover officers are initialized that are being used by the CSOA. At first, all informants and SIs are obtaining suspects’ random information at their pre-defined search location. The parameters such as
and
represent maximum inquiries and the random numbers’ maximum limit, respectively.
Phase 2: Evaluating the Performance and Searching for the Criminal
The chief investigator (CI) collects all the information that is gathered by the informer and SI and creates the evidence against the accused person by using the objective function. Initially (
), the defender is considered as primary suspect based on best fitness (evidence) as shown by below equation.
The terms
is the primary suspects’ information that is available in CI;
B represents the best,
represents the accused persons’ best information available with the
SI; and
represents the accused persons’ best information available with the informers; then
is for investigation steps. In the following phases (
), the comparison is made between the primary accused persons’ present inquiry stage and previous inquiry stage to select the evidence of the present primary accused person by using Equation (4),
In the above equation, the term
represents the accused persons’ best information that is present with the CI; the term
signifies the best prior information of the primary accused person with the CI; the terms
and
represents the evidence after processing
and
information, respectively; in the beginning, viz. when
,
is considered as
.
Phase 3: Update Information
The updating of information is carried out in three steps. They are:
Interrogation—The accused persons’ information with the investigator is upgraded using Equation (5).
From the above equation, the term
represent the primary accused persons’ updated information; the term
represents the primary accused persons’ present information which is available with CI;
is the random number with the range [−1, 1]. The term
is the investigation stages.
Information Updating of SI—The information from
SI is upgraded by using Equation (6) in this step.
The term
is the primary suspects’ present information that is available in
SI; the term
is the primary suspects’ updated information that is available in
SI; the evidence gathered from the primary accused person by the
SI is represented as
and is given as (
). The evidence gathered from previous best evidence by
SI is given as (
) is represented by
. The evidence collected from random
SI is given as (
) is represented by
. The random numbers from [0,
] range are represented as
and
is a random number with a maximum limit. Here
x is an influencing factor with [0, 1] range random number which represents
SI’s influence over evidence after comparing.
Information updating of Informer—The information from informer is upgraded by using Equation (7) in this step.
The term
define the accused persons’ evidence available with informers, the updated defender evidence present with the undercover officer is represented as
. Then the gathered evidence from previous evidence which is present with the undercover officer is shown as
which is represented as
. The updated evidence gathered by an undercover officer from
SI is represented as
and it is given as (
).
Phase 4: Termination
After the information are updated from
SI and informers, the updated data is reviewed to see if it is contained inside the search space. When the termination criteria (
) is met, the inquiry is terminated and the primary accused person present is considered as criminal; otherwise, phases 2–4 are repeated.
Phase 5: Output
The final phase of CSOA is the output phase, here the culprit is announced. When the requirement of termination is reached the inquiry is terminated. The criminal informer is considered as suspect information that generates the strongest proof, and the accused person is declared as the criminal.
Matheen M.A, & Sundar S. (2023). A Novel Technique to Mitigate the Data Redundancy and to Improvise Network Lifetime Using Fuzzy Criminal Search Ebola Optimization for WMSN. Sensors (Basel, Switzerland), 23(4), 2218.