IAES
Inter
national
J
our
nal
of
Articial
Intelligence
(IJ-AI)
V
ol.
14,
No.
2,
April
2025,
pp.
1077
∼
1086
ISSN:
2252-8938,
DOI:
10.11591/ijai.v14.i2.pp1077-1086
❒
1077
New
family
of
err
or
-corr
ecting
codes
based
on
genetic
algorithms
El
Mehdi
Bellfkih
1
,
Said
Nouh
1
,
Imrane
Chemseddine
Idrissi
1
,
Khalid
Louartiti
2
,
J
amal
Mouline
1
1
Department
of
Mathematics
and
Computer
Science,
F
aculty
of
Science
Ben
M’
sick,
Uni
v
ersity
Hassan
II,
Casablanca,
Morocco
2
Department
of
Mathematical
Sciences
and
Decision
Support,
ENSA,
Abdelmalek
Essa
ˆ
adi
Uni
v
ersity
,
T
etouan,
Morocco
Article
Inf
o
Article
history:
Recei
v
ed
No
v
28,
2023
Re
vised
No
v
17,
2024
Accepted
No
v
24,
2024
K
eyw
ords:
Decoding
Design
Error
-correcting
codes
Generator
v
ector
Genetic
algorithm
Minimum
distance
ABSTRA
CT
This
paper
introduces
a
no
v
e
l
error
-correcting
code
(ECC)
construction
and
decoding
approach
utilizing
genetic
algorithms
(GAs).
Classical
ECCs
often
struggle
with
ef
cienc
y
in
correcting
multiple
errors
due
to
time-consuming
matrix-based
encoding
and
decoding
process
es.
Our
GA-based
method
opti-
mizes
generator
v
ect
ors
to
maximize
the
minimum
distance
between
code
w
ords,
enhancing
error
correction
capabilities.
Specically
,
we
construct
a
ne
w
f
amily
of
ECCs
with
code
length
31
,
dimension
12
,
and
minimum
distance
7
,
reducing
comple
xity
from
O
(
k
n
)
to
O
(
k
(
n
−
k
))
by
encoding
message
blocks
with
v
ec-
tors
instead
of
matrices.
In
the
decoding
phase,
the
GA
ef
fecti
v
ely
corrects
errors
in
recei
v
ed
code
w
ords.
Experimental
results
sho
w
that
at
a
signal-to-noise
ratio
(SNR)
of
7
.
7
dB,
our
method
achie
v
es
a
bit
error
rate
(
BER)
of
10
−
5
after
only
9
generations
of
the
GA.
These
result
s
demonstrate
impro
v
ed
error
correction
and
decoding
performance
compared
to
traditional
methods.
This
study
con-
trib
utes
an
inno
v
ati
v
e
approach
using
GAs
for
e
rror
correction,
of
fering
simpler
encoding
and
rob
ust
performance
in
coding
schemes.
This
is
an
open
access
article
under
the
CC
BY
-SA
license
.
Corresponding
A
uthor:
El
Mehdi
Bellfkih
Department
of
Mathematics
and
Computer
Science,
F
aculty
of
Science
Ben
M’
sick,
Uni
v
ersity
Hassan
II
Casablanca,
Morocco
Email:
elmehdi.bellfkih@gmail.com
1.
INTR
ODUCTION
The
transmission
and
storage
of
information
are
susceptible
to
corrupt
ion
due
to
v
arious
ph
ysical
or
logical
f
aults,
which
can
res
u
l
t
in
system-wide
f
ailures.
T
o
mitig
ate
such
risks,
rob
ust
testing
and
f
ault
tolerance
mechanisms
are
essential
for
ensuring
secure
and
stable
communication
o
ws.
Error
-correcting
codes
(ECCs)
play
a
pi
v
otal
role
in
safe
guarding
data
inte
grity
and
reliability
by
incorporating
redundant
information
into
transmitted
messages.
The
ef
cac
y
of
ECCs
lies
in
their
ability
to
detect
and/or
correct
errors
that
may
arise
during
data
transmission
or
storage.
This
error
-correction
capability
is
crucial
for
maintaining
data
inte
grity
under
adv
erse
conditions.
While
linear
block
codes,
such
as
Hamming
codes,
of
fer
decent
error
-correction
capability
,
the
y
are
inherently
lim
ited
in
their
scope.
In
contrast,
nonlinear
block
codes,
e
x
emplied
by
turbo
codes,
e
xhibit
superior
error
-correction
capabilities
b
ut
are
accompanied
by
higher
decoding
comple
xities
[1],
[2].
As
sho
wn
in
the
Figure
1,
the
minimum
distance
of
a
code
is
directly
related
to
its
error
detection
and
correction
capability
.
A
code
with
a
lar
ger
minimum
distance
can
detect
and
correct
more
errors
compared
to
a
code
with
a
smaller
minimum
distance.
J
ournal
homepage:
http://ijai.iaescor
e
.com
Evaluation Warning : The document was created with Spire.PDF for Python.
1078
❒
ISSN:
2252-8938
Figure
1.
Correlating
minimum
Hamming
distance
with
error
detection
and
correction
capabilities
In
the
realm
of
ECC
construction,
linear
block
codes,
grounded
in
linear
algebra,
are
reno
wned
for
their
simplicity
of
implementation,
analysis,
and
comprehension.
The
y
e
xcel
at
detecting
and
correcting
errors
within
a
conned
bit
range.
Examples
include
Hamming
codes,
Reed-Solomon
codes,
and
Bose-Chaudhuri-
Hocquenghem
(BCH)
codes.
Con
v
ersely
,
nonlinear
block
codes
present
a
more
intricate
landscape,
demanding
deeper
analytical
understanding
and
implementation
ef
forts.
Y
e
t,
the
y
boast
broader
error
-correcting
capabili-
ties,
ef
fecti
v
ely
managing
errors
across
a
lar
ger
bit
spectrum.
Notable
e
xamples
encompass
Reed-Mulle
r
codes,
Golay
codes,
and
BCH
codes.
Ho
we
v
er
,
despite
the
adv
ancements
in
ECC
design,
the
process
of
decoding
remains
a
challenging
task.
T
raditional
decoding
methods
often
encounter
computational
bottlenecks,
particularly
when
deal
ing
with
comple
x
codes.
Herein
lies
the
potential
for
emplo
ying
metaheuristic
approaches
to
decode
ECCs
ef
ciently
.
Metaheuristic
algorithms,
reno
wned
for
their
adaptability
and
problem-solving
pro
wess,
of
fer
a
promising
a
v
enue
for
tackling
the
intricacies
of
ECC
decoding.
By
le
v
eraging
metaheuristic
techniques,
such
as
genetic
algorithms
(GAs),
simulated
annealing,
or
particle
sw
arm
optimization,
researchers
can
e
xplore
no
v
el
decoding
strate
gies
capable
of
surmounting
the
comple
xities
associated
with
ECCs.
There
is
v
arious
classes
of
codes
in
coding
theory
,
and
v
arious
method
to
construct
them
aiming
to
achie
v
e
the
best
results
e.g.,
the
reliable
communication,
better
comple
xity
,
easy
construction
of
code.
Let
F
2
be
a
eld
of
order
2
and
F
k
2
be
a
v
ector
space
of
length
k
.
Here
we
present
our
ne
w
k-dimensional
binary
linear
code
C
o
v
er
F
n
2
whose
G
is
its
generator
matrix,
or
g
(
x
)
is
its
polynomial
generator
(the
ro
ws
of
G
for
m
a
basis
for
C
).
[
n,
k
,
d
]
2
denotes
a
2-ary
linear
code
with
length
n
,
dimenion
k
and
minimum
distance
d
.
An
element
of
C
is
called
a
code
w
ord,
its
weight
is
the
number
of
nonzero
coordinate.
The
minimum
distance
of
C
is
the
smallest
Hamming
distance
between
distinct
code
w
ords
(is
also
the
smallest
weight
in
case
of
binary
linear
codes)
denoted
by
d(
C
).
The
Singleton
bound
as
in
(1)
states
that
a
(
n,
k
,
d
)
-code
or
[
n,
k
,
d
]
-code
satisfy
.
d
(
C
)
≤
n
−
k
+
1
(1)
A
code
with
linearity
condition
and
achie
v
es
the
equalit
y
in
the
Singleton
bound
is
called
maximum
distance
separable
(MDS)
code.
T
o
achie
v
e
the
goal
of
nding
high-performing
ECC,
our
approach
tak
es
adv
antage
of
the
optimization
nature
of
the
problem.
By
formulating
the
problem
as
an
optimization
problem,
we
can
le
v
erage
the
po
wer
of
optimization
algorithms,
such
as
GAs
[3],
[4],
to
search
for
the
best
possible
solutions.
The
GA
frame
w
ork
allo
ws
us
to
ef
ciently
e
xplore
the
v
ast
solution
space
and
nd
good
ECC
with
high
minimum
distances,
making
it
an
ideal
approach
for
this
type
of
problem.
GAs
are
a
type
of
optimization
algorithm
that
is
inspired
by
the
process
of
natural
selection
and
e
v
olution
[5].
GAs
are
used
to
solv
e
comple
x
problems
by
simulating
the
process
of
e
v
olution,
where
a
population
of
potential
solutions
e
v
olv
es
o
v
er
time
to
w
ards
an
optimal
solution
[6]–[9].
The
y
w
orks
by
representing
a
problem
as
a
set
of
candidate
solutions,
also
kno
wn
as
a
population.
Each
candidate
solution
is
encoded
as
a
string
of
parameters,
called
a
chromosome.
The
chromosomes
in
the
population
are
then
e
v
aluated
using
a
tness
function
that
assigns
a
numerical
score
to
each
chromosome
based
on
ho
w
well
it
solv
es
the
problem.
The
chromosomes
with
the
highest
tness
scores
are
selected
as
parents
and
used
to
produce
of
fspring,
which
are
ne
w
candidate
solutions,
through
a
process
called
crosso
v
er
.
In
this
process,
the
genetic
information
from
the
parent
chromosomes
is
combined
to
produce
Int
J
Artif
Intell,
V
ol.
14,
No.
2,
April
2025:
1077–1086
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Artif
Intell
ISSN:
2252-8938
❒
1079
a
ne
w
chromosome
(child).
This
process
is
repeated
o
v
er
se
v
eral
generations,
leading
to
the
e
v
olution
of
the
population
to
w
ards
better
solutions.
GAs
also
include
a
mechanism
for
introducing
random
v
ariations
into
the
population,
called
mutation.
This
allo
ws
the
algorithm
to
e
xplore
ne
w
re
gions
of
the
solution
space
and
helps
to
pre
v
ent
getting
stuck
in
local
optima.
The
y
are
well-suited
for
problems
that
ha
v
e
multiple
solutions
or
where
the
solution
space
is
comple
x
and
dif
cult
to
e
xplore
using
traditional
optimization
methods.
In
the
ne
xt
section,
we
will
consider
related
research
ndings
to
conte
xtualize
and
augment
our
study’
s
conclusions.
2.
RELA
TED
W
ORKS
The
eld
of
ECCs
plays
a
crucia
l
role
in
ensuring
data
inte
grity
and
reliability
in
v
arious
applicati
ons.
Despite
the
widespread
use
of
e
xisting
ECCs,
there
are
challenges
that
hinder
their
ef
cienc
y
,
partic
ularly
in
terms
of
the
time-consuming
encoding
and
decoding
processes.
T
o
address
these
limitations,
researchers
ha
v
e
turned
to
inno
v
ati
v
e
approaches
such
as
GA
for
code
design
and
decoding.
GA
of
fer
a
promising
a
v
enue
for
generating
codes
with
high
minimum
distances,
thus
enhancing
error
detection
and
correction
capabil
ities.
A
range
of
studies
ha
v
e
e
xplored
the
design
and
decoding
of
ECC
[10]–[12].
Natarajan
et
al.
[13]
de
v
eloped
algebraic
ECC
for
informed
recei
v
ers,
while
Elk
elesh
et
al.
[11]
proposed
a
GA-based
lo
w
density
parity
check
(LDPC)
code
design
scheme.
Das
and
T
ouba
[14]
introduced
a
ne
w
class
of
single
b
urst
ECC
with
parallel
decoding,
and
Zhang
et
al.
[15]
presented
a
decoding
algorithm
for
v
e-error
-correcting
binary
quadratic
residue
codes.
These
studies
collecti
v
ely
contrib
ute
to
the
adv
ancement
of
ECC,
with
a
focus
on
informed
recei
v
ers,
LDPC
codes,
b
urst
error
correction,
and
decoding
algorithms.
McGuire
and
Sabin
[16]
ha
v
e
emplo
yed
GA
to
search
for
linear
binary
codes
with
optimal
minim
um
distance.
In
another
paper
,
Maini
et
al.
[17]
de
v
eloped
suboptimal
soft
decision
decoders
for
linear
block
codes.
GA
ha
v
e
also
been
utilized
to
tackle
the
problem
of
nding
ECCs
that
correct
a
maximum
number
of
errors
[18].
These
studies
highlight
the
ef
fecti
v
eness
of
GA
in
addressing
v
arious
aspects
of
error
correction
code
design
and
decoding,
and
recognized
as
one
of
the
most
po
werful
optimization
methods
due
to
its
v
er
-
satility
and
ease
of
implementation
across
v
arious
problem
domains.
One
of
the
k
e
y
strengths
of
GA
lies
in
their
di
v
erse
set
of
operators
and
options,
which
allo
w
for
e
xible
e
xploration
and
e
xploitation
of
the
search
space
[19]–[21].
These
operators,
including
selection,
crosso
v
er
,
and
mutation,
pro
v
i
de
a
rich
toolbox
that
can
be
tailored
to
specic
optimization
problems.
Moreo
v
er
,
the
GA
’
s
inherent
parallelism
and
population-
based
nature
enable
it
to
ef
fecti
v
ely
handle
comple
x
and
multimodal
optimization
landscapes.
In
f
act,
it
can
be
vie
wed
as
a
v
ariant
of
the
minimum
distance
problem,
which
is
kno
wn
to
be
NP-hard.
The
minimum
distance
of
a
code
plays
a
crucial
role
in
its
error
detection
and
correction
capabilities.
Ho
we
v
er
,
determin-
ing
the
e
xact
minimum
distance
of
a
code
is
computationally
comple
x
and
requires
e
xhausti
v
e
search
o
v
er
all
code
w
ords.
This
computational
hardness
moti
v
ates
the
e
xploration
of
heuristic
approaches,
such
as
GA,
to
ef
ciently
search
for
codes
with
lar
ge
minimum
distances.
The
design
of
ECCs
has
traditionally
relied
on
coding-theoretic
principles,
aiming
to
optimize
code
properties
such
as
minimum
Hamming
distance
and
de-
coding
threshold.
Ho
we
v
er
,
recent
adv
ancements
ha
v
e
e
xplored
the
application
of
articial
intelligence
(AI)
techniques,
particularly
GA,
for
ECC
design.
Huang
et
al.
[10]
in
v
estig
ate
an
AI-dri
v
en
approach
using
GA
to
design
optimal
codes
within
specic
f
amilies,
sho
wcasing
comparable
performance
to
e
xisting
codes
and
e
v
en
superior
performance
in
certain
cases.
Amirzadeh
et
al.
[22]
focus
on
joint
GA
and
linear
program-
ming
optimization
for
LDPC
codes,
stri
ving
for
lo
w
comple
xity
,
high
coding
threshold,
and
decoding
stability
.
Mahran
[23]
e
xplores
the
optimization
of
turbo
product
c
o
de
s
(TPC)
parameters
using
GA,
nding
a
balance
between
error
performance
and
code
comple
xity
.
Joundan
et
al.
[24]
present
a
GA
approach
for
designing
linear
codes
with
lar
ge
minimum
weight
and
small
dual
minimum
distance,
demonstrating
ef
fecti
v
e
error
correction
performance.
These
studies
collecti
v
ely
highl
ight
the
potential
of
GA
in
ECC
design,
of
fering
opportunities
for
impro
ving
code
performance,
comple
xity
,
and
error
correction
capabilities
in
v
arious
communication
systems.
GAs
ha
v
e
em
er
ged
as
a
po
werful
tool
for
ECCs
decoding.
Chaibi
et
al.
[25]
present
a
GA-based
decoder
for
LDPC
codes,
demonstrating
its
superior
performance
compared
to
the
sum-product
decoder
.
Azouaoui
et
al.
[26]
propose
hard-decision
and
soft-decision
decoding
techniques
based
on
GAs
for
general
ECC,
sho
wcasing
their
ef
fecti
v
eness
o
v
er
v
arious
transmission
channels.
Broul
´
ım
et
al.
[27]
e
xplore
the
appli-
cation
of
GA
optimization
algorithms
to
design
parity-check
matrices
for
LDPC
codes,
enabling
the
correction
of
b
urst
errors.
Nouh
et
al.
[28]
focus
on
decoding
block
codes
using
GAs
and
permutations
set,
sho
wing
comparable
error
correcting
performances
to
e
xisting
met
hod
s
.
Elk
elesh
et
al.
[11]
present
a
decoder
-tailored
polar
code
design
using
GAs,
achie
ving
the
same
error
-rate
performance
as
e
xisting
decoding
algorithms
while
Ne
w
family
of
err
or
-corr
ecting
codes
based
on
g
enetic
algorithms
(El
Mehdi
Bellfkih)
Evaluation Warning : The document was created with Spire.PDF for Python.
1080
❒
ISSN:
2252-8938
reducing
the
decoding
comple
xity
.
Berkani
et
al.
[29]
propose
compact
GAs
with
lar
ger
tournament
size
for
impro
v
ed
decoding
of
linear
block
codes,
demonstrating
the
ef
fecti
v
eness
of
lar
ger
tournament
sizes
in
soft
decision
decoding.
These
studies
collecti
v
ely
highlight
the
potential
of
GAs
in
ECC
decoding
and
code
design,
of
fering
enhanced
error
correction
performance,
reduced
comple
xity
,
and
impro
v
ed
decoding
capabilities
in
v
arious
communication.
3.
PR
OPOSED
METHODS
In
this
section,
our
GA-based
methods
are
proposed
using
the
principal
f
actors
(tness
function,
crosso
v
er
,
and
mutation
f
actors).
we
will
delv
e
into
the
application
of
GAs
based
methods
in
the
encoding
and
decoding
phases
of
ECCs.
Specically
,
we
wil
l
e
xplore
ho
w
GAs
can
be
utilized
to
optimize
these
cru-
cial
stages
of
the
coding
process.
F
or
the
encoding
phase,
we
will
discuss
the
use
of
GAs
based
methods
to
determine
optimal
generator
v
ectors,
considering
f
actors
such
as
code
properties
and
encoding
comple
xity
.
In
the
decoding
phase,
we
will
e
xamine
ho
w
GA
based
method
can
aid
in
nding
the
corrected
corrupted
recei
v
ed
w
ords,
focusing
on
f
actors
such
as
decoding
performance,
and
error
correction
capability
.
Through
a
detailed
analysis,
we
aim
to
shed
light
on
the
main
f
actors
and
considerations
when
emplo
ying
GA
for
ef
cient
encoding
and
decoding
of
ECCs.
3.1.
Construction
phase
Our
primary
objecti
v
e
is
to
identify
a
generator
v
ector
that
maximizes
the
distance
between
encoded
messages.
By
emplo
ying
GA
in
the
encoding
phase,
we
aim
to
nd
the
most
suitable
generator
v
ector
that
enhances
error
correction
capabilities.
Ho
we
v
er
,
we
will
rely
on
encoding
through
multiplying
by
generator
v
ector
and
con
v
ersion
based
on
binary
and
decimal.
The
Figure
2
sho
wcases
the
sequential
steps
in
v
olv
ed
in
encoding
a
message
using
a
generator
v
ector
.
The
process
be
gins
with
the
di
vision
of
the
message
into
blocks,
represented
in
decimal
form.
These
blocks
are
then
con
v
erted
into
their
corresponding
binary
forms,
ensuring
that
the
message
is
represented
using
binary
digits.
The
ne
xt
stage
focuses
on
the
encoding
process
itself.
The
binary
message,
consisting
of
k
bits,
under
-
goes
multiplication
with
a
generator
v
ector
of
n-k
bits.
This
multiplication
results
in
a
binary
message
of
length
n
bits,
which
represents
the
encoded
message
with
added
redundanc
y
for
error
correction
or
detection.
Finally
,
the
encoded
message
is
con
v
erted
back
to
its
original
deci
mal
form.
This
gure
pro
vides
a
clear
visualization
of
the
encoding
process,
emphasizing
the
transformation
from
decimal
to
binary
representation,
the
application
of
the
generator
v
ector
for
encoding,
and
the
subsequent
con
v
ersion
back
to
decimal
form.
Figure
2.
Encoding
process
using
generator
v
ector
The
diagram
in
Figure
3
illustrates
a
GA-based
method
for
nding
an
optimal
generator
v
ector
.
The
GA
operates
on
a
population
of
candidate
generator
v
ectors,
with
the
number
of
generations
and
initial
population
size
specied
as
input
parameters.
Elitism
is
emplo
yed
as
the
selection
strate
gy
,
ensuring
that
the
ttest
indi
viduals
are
preserv
ed
in
each
generation.
The
tness
function,
dened
as
the
minimum
distance
achie
v
ed
by
a
generator
v
ector
,
guides
the
e
v
aluation
and
selection
process.
Crosso
v
er
and
mutation
operators
are
applied
to
introduce
di
v
ersity
and
e
xplore
ne
w
solutions
within
the
population.
The
initial
population
con-
sists
of
generator
v
ectors
with
n
−
k
bits,
where
n
is
the
total
number
of
code-w
ord
bits
and
k
is
the
number
of
message
bits.
The
GA
iterati
v
ely
e
v
olv
es
the
population
to
con
v
er
ge
to
w
ards
an
optimal
generator
v
ector
that
maximizes
the
minimum
distance.
f
g
en
=
min
{
d
(
C
)
:
C
=
{
bw
i
×
g
en,
∀
i
<
2
k
}}
(2)
Where
bw
i
are
messages
of
k
bits
and
gen
is
a
generator
v
ector
of
n-k
bits.
Int
J
Artif
Intell,
V
ol.
14,
No.
2,
April
2025:
1077–1086
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Artif
Intell
ISSN:
2252-8938
❒
1081
Figure
3.
Diagram
of
the
method
based
on
the
GA
to
nd
the
generator
v
ector
for
an
ECC
The
pro
vided
Figure
4
demonstrates
the
crosso
v
er
operation
in
our
GA-based
method.
If
a
randomly
generated
probability
is
less
than
or
equal
to
a
predened
v
alue
(
p
m
=
0
.
97
),
the
crosso
v
er
is
applied.
T
w
o
parent
indi
viduals,
each
represented
by
a
binary
sequence
of
n
bits,
are
selected
based
on
tness
function
v
alue
as
mentioned
in
(2).
A
random
position,
denoted
as
p,
is
chosen
within
the
length
of
the
sequence.
The
rst
child
is
created
by
combining
the
section
from
the
rst
parent
starting
from
position
0
up
to
position
p,
with
the
section
from
the
second
parent
starting
from
position
p
up
to
position
n.
Similarly
,
the
second
child
is
formed
by
combining
the
section
from
the
second
parent
from
position
0
to
p,
and
from
the
rst
parent
from
position
p
to
n.
Additionally
,
the
gure
indicates
that
the
mutation
operation
follo
ws
a
similar
principle.
If
a
randomly
generated
number
between
0
and
1
is
less
than
or
equal
to
a
predened
v
alue
(
p
c
=
0
.
02
),
the
mutation
occurs.
It
in
v
olv
es
ipping
the
v
alue
at
a
specic
position
in
the
child’
s
binary
sequence.
Figure
4.
Crosso
v
er
and
mutation
f
actors
3.2.
Decoding
phase
W
e
present
a
GA-based
method
for
correcting
corrupted
recei
v
ed
code-w
ords
in
ECCs.
Our
ob
j
ec-
ti
v
e
is
to
accurately
reco
v
er
the
original
information
from
the
recei
v
ed
w
ord,
e
v
en
in
the
presence
of
errors.
The
proposed
method
utilizes
GA
to
iterati
v
ely
search
for
the
optimal
solution
that
con
v
er
ge
to
the
correct
code-w
ord.
f
codew
or
d
=
d
(
r
eceiv
edw
or
d,
codew
or
d
)
(3)
Ne
w
family
of
err
or
-corr
ecting
codes
based
on
g
enetic
algorithms
(El
Mehdi
Bellfkih)
Evaluation Warning : The document was created with Spire.PDF for Python.
1082
❒
ISSN:
2252-8938
The
diagram
in
Figure
5
illustrates
a
GA-based
method
for
decoding
recei
v
ed
w
ords
in
ECCs.
The
algorithm
tak
es
se
v
eral
inputs,
including
the
length
n
and
dimension
k
of
the
ECC,
the
number
of
corrections
allo
wed
t,
the
number
of
generations
for
the
algorithm
to
iterate,
and
the
initial
population
consisting
of
code-
w
ords
generated
using
the
a
v
ailable
generator
v
ectors.
Elitism
is
emplo
yed
as
the
selection
strate
gy
,
and
the
tness
function
is
dened
as
the
minimum
distance
between
the
recei
v
ed
w
ord
and
the
code-w
ords
as
in
(3)
in
the
population.
The
crosso
v
er
and
mutation
operations
are
applied
with
specic
rates
and
with
the
same
strate
gy
as
sho
wn
in
the
Figure
4,
aiming
to
e
xplore
and
e
xploit
the
solution
space.
The
initial
population
is
initialized
with
generator
v
ectors
of
size
n-k
bits.
Through
the
iterations
of
the
GA,
the
m
ethod
aims
to
decode
the
recei
v
ed
w
ord
and
reco
v
er
the
original
information
accurately
.
Figure
5.
Diagram
of
the
method
based
on
the
GA
for
decoding
ne
w
ECCs
4.
RESUL
TS
AND
DISCUSSION
In
this
section,
we
present
the
results
obtained
from
our
study
on
the
construction
and
decoding
of
ECCs.
The
subsections
belo
w
detail
the
outcomes
of
our
in
v
estig
ations
into
both
the
construction
and
decoding
phases,
highlighting
the
performance
and
ef
c
ac
y
of
our
proposed
methodologies.
Through
rigorous
e
xperimentation
and
analysis,
we
assess
the
ef
fecti
v
eness
of
our
approach
in
achie
ving
rob
ust
error
correction
capabilities
and
ef
cient
decoding
processes.
4.1.
Construction
of
err
or
-corr
ecting
codes
The
pro
vided
T
able
1
outl
ines
the
def
ault
parameters
used
in
running
the
GA-based
method
for
nding
the
generator
v
ector
of
the
ECC
with
a
length
of
31
and
a
dimension
of
12.
These
parameters,
which
include
settings
such
as
populati
on
size,
crosso
v
er
rate,
and
mutation
probability
,
serv
e
as
the
initial
congurations
for
the
GA,
pro
viding
a
starting
point
for
the
optimization
process.
By
carefully
selecting
these
def
ault
parameters,
the
algorithm
ef
ciently
na
vig
ates
the
search
space
to
identify
generator
v
ectors
that
maximize
the
minimum
distance
between
code
w
ords,
thereby
enhancing
the
ECC’
s
error
-correcting
capabilities.
After
running
the
GA-based
method
with
the
def
ault
parameters
mentioned
in
T
able
1,
we
obtained
a
set
of
generator
v
ectors
for
an
ECC
of
length
31
and
dimension
26.
The
T
able
2
results
include
the
minimum
distance
achie
v
ed
by
these
generator
v
ectors,
which
is
equal
to
the
kno
wn
lo
wer
bound.
This
suggests
that
the
GA
ef
fecti
v
ely
identied
generator
v
ectors
that
of
fer
optimal
error
correction
capabilities
for
the
gi
v
en
ECC
dimensions.
Int
J
Artif
Intell,
V
ol.
14,
No.
2,
April
2025:
1077–1086
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Artif
Intell
ISSN:
2252-8938
❒
1083
T
able
1.
The
def
ault
parameters
for
GA
based
method
for
codes
of
moderate
lengths
P
arameter
v
alue
Initial
population
size
20000
Selection
elitism
Crosso
v
er
rate
0.93
Mutation
rate
0.02
Number
of
generations
50
T
able
2.
Set
of
ECCs
of
parameters
(31,12)
n
k
d
Generator
31
12
7
1110001001011000001
31
12
7
1110000111101100101
31
12
7
1101001101011000101
31
12
7
1010000110111010111
31
12
7
1110010110100100101
31
12
7
1011100111111000111
31
12
7
1111011100111010011
31
12
7
1111010010101000111
31
12
7
1111100110001111011
31
12
7
1111111010010011001
31
12
7
1111001011000011001
31
12
7
1110101001111100111
31
12
7
1111110111011010011
31
12
7
1110100010101001111
The
application
of
the
GA-based
approach
resulted
in
the
disco
v
ery
of
ECCs
with
dimension
12
and
length
31,
sho
wcasing
minimum
distances
that
equal
to
the
kno
wn
lo
wer
bound.
This
signicant
achie
v
ement
holds
promising
implications
for
error
detection
and
correction
in
practical
scenarios.
These
codes
e
xhibit
an
e
xceptional
capability
to
detect
and
correct
errors,
surpassing
the
performance
of
pre
viously
kn
o
wn
codes.
The
listed
codes
in
T
able
2
e
x
emplify
superior
error
-correcting
properties,
indicating
their
potential
for
enhancing
data
inte
grity
and
ensuring
reliable
information
transmission
and
storage.
Also,
Our
GA
based
method
has
successfully
identied
optimal
generator
v
ectors,
enabling
a
more
ef
cie
n
t
encoding
process.
Instead
of
multi-
plying
message
blocks
of
length
k
by
a
matrix
of
dimension
(k,n),
we
no
w
multiply
them
by
a
v
ector
of
length
n-k.
This
reduction
in
dimensionality
results
in
signicant
comple
xity
g
ains,
leading
to
impro
v
ed
ef
cienc
y
in
the
encoding
process.
The
results
are
summarized
in
the
T
able
3.
T
able
3.
Encoding
comple
xity
Encoding
process
Comple
xity
Encoding
via
generator
matrix
O
(
k
n
)
Encoding
via
generator
v
ector
O
(
k
(
n
−
k
))
4.2.
Decoding
After
successfully
nding
a
set
of
generator
v
ectors
that
maximize
the
error
-correcting
capabiliti
es
of
our
ECCs,
we
proceed
to
the
decoding
phase,
where
we
introduce
a
GA-based
method
for
decoding
these
ne
w
codes.
This
method
le
v
erages
GA
to
ef
ciently
correct
errors
in
the
recei
v
ed
code
w
ords
by
e
xploring
possible
solutions
and
selecting
the
most
optimal
one
based
on
a
tness
function.
The
focus
of
this
section
is
on
e
v
aluating
the
bit
error
rate
(BER)
performance
of
the
decoding
process,
demonstrating
ho
w
ef
fecti
v
ely
our
GA-based
decoder
restores
the
original
messages
under
v
arious
le
v
els
of
noise.
The
T
able
4,
presents
the
chosen
def
ault
parameters
for
the
GA-based
decoding
method
include
a
relati
v
ely
small
population
size
and
a
limited
number
of
generations.
This
decision
w
as
made
to
ensure
a
manageable
computational
comple
xity
during
the
decoding
process.
Our
algorithm
is
designed
to
create
a
population
of
candidate
w
ords
deri
v
ed
from
a
recei
v
ed
w
ord.
Specically
,
the
algorithm
generates
a
set
of
I
n
itP
op
w
ords
closely
related
to
the
input
recei
v
ed
w
ord.
Additionally
,
we
implement
an
adjustment
by
increasing
the
minimum
allo
w
able
distance
between
generated
w
ords.
These
tw
o
strate
gic
steps
collecti
v
ely
serv
e
to
reduce
algorithmic
comple
xity
and
enhance
computational
ef
cienc
y
in
terms
of
speed.
Furthermore,
in
instances
where
corre
ction
of
t
he
recei
v
ed
w
ord
is
not
feasible
due
to
an
error
count
surpassing
the
predened
Ne
w
family
of
err
or
-corr
ecting
codes
based
on
g
enetic
algorithms
(El
Mehdi
Bellfkih)
Evaluation Warning : The document was created with Spire.PDF for Python.
1084
❒
ISSN:
2252-8938
threshold
v
alue
(t),
the
algorithm
pro
vides
a
set
of
proximate
w
ords.
This
information
pro
v
es
v
aluable
in
scenarios
where
understanding
the
proximity
of
the
recei
v
ed
data
is
of
signicance.
T
able
4.
The
def
ault
parameters
for
GA
based
method
for
decoding
ECCs
P
arameter
V
alue
Initial
population
size
500
Selection
elitism
Crosso
v
er
rate
0.93
Mutation
rate
0.07
Number
of
generations
1000
The
Figure
6
illustrates
the
e
xceptional
decoding
performances
of
our
method
for
our
found
code
with
a
length
of
31,
dimension
12,
and
a
minimum
distance
of
7.
Notably
,
at
an
signal-to-noise
ratio
(SNR)
of
7.7
dB,
the
BER
stands
at
10
−
5
,
highlighting
the
decoder’
s
initial
performance.
As
the
SNR
increases
to
8.5
dB,
the
BER
de
creases
to
10
−
6
,
underscoring
the
decoder’
s
enhanced
error
-correcting
capabilities
with
impro
v
ed
SNR.
This
progression
signies
the
decoder’
s
ef
fecti
v
eness
in
achie
vi
ng
higher
le
v
els
of
data
accurac
y
under
v
arying
signal
conditions.
Figure
6.
BER
performance
of
GA-based
decoder
In
spite
of
the
substantial
increase
in
the
number
of
generations
as
indicated
in
T
able
4,
intended
to
ensure
the
successful
decoding
of
recei
v
ed
w
ords
irrespecti
v
e
of
the
nu
m
ber
of
errors,
the
achie
v
ed
outcomes
remain
belo
w
the
v
alues
specied
in
T
able
4.
This
observ
ation
is
substantiated
by
the
statistical
summary
presented
in
T
able
5,
which
pro
vides
insights
into
the
a
v
erage
and
standard
de
viation.
Notably
,
the
lo
w
v
alues
of
both
parameters
in
T
able
5
signify
the
commendable
ef
cienc
y
and
ef
fecti
v
eness
of
our
algorithm
in
the
decoding
process
across
v
arying
SNRs.
T
able
5.
Statistical
summary
of
algorithm
performance
Number
of
w
ords
Max
number
of
generations
A
vg
number
of
generations
Std
number
of
generations
100000
1000
≈
8.7
≈
8.2
5.
CONCLUSION
This
research
article
has
demonstrated
the
ef
fecti
v
eness
of
uti
lizing
GA-based
methods
for
both
the
construction
and
decoding
of
ECCs.
By
emplo
yi
n
g
these
methods,
we
ha
v
e
successfully
identied
generator
v
ectors
with
high
minimum
Hamming
distances,
thereby
streamlining
the
encoding
proce
ss
and
enhancing
the
BER
performance
of
the
codes.
Ho
we
v
er
,
we
ackno
wledge
the
limitation
of
achie
ving
relati
v
ely
lo
w
rates.
Mo
ving
forw
ard,
our
future
objecti
v
es
entail
addressing
this
limitation
by
optimizing
the
generat
ion
of
gener
-
ator
v
ectors
for
specied
parameters
of
length
n
and
dimension
k,
as
well
as
rening
our
decoder
to
further
Int
J
Artif
Intell,
V
ol.
14,
No.
2,
April
2025:
1077–1086
Evaluation Warning : The document was created with Spire.PDF for Python.
Int
J
Artif
Intell
ISSN:
2252-8938
❒
1085
impro
v
e
the
BER
performances
of
the
ECCs.
Through
these
endea
v
ors,
we
aim
to
bolster
the
ef
cienc
y
and
ef
cac
y
of
ECCs
in
real-w
orld
communication
and
storage
systems.
REFERENCES
[1]
A.
Said,
“Intr
oduction
to
arithmetic
coding
–
theory
and
practice,
”
arXiv-Computer
Science
,
2023.
[2]
J.
H.
V
.
Lint,
“Introduction
to
coding
theory
,
”
Discr
ete
Applied
Mathematics
,
Berlin,
Ne
w
Y
ork:
Springer
,
v
ol.
6,
no.
1,
1983,
doi:
10.1016/0166-218X(83)90114-2.
[3]
S.
Benghazouani,
S.
Nouh,
and
A.
Zakrani,
“Enhancing
breast
cancer
diagnosis:
a
comparati
v
e
analysis
of
feature
selec-
tion
techniques,
”
IAES
International
J
ournal
of
Articial
Intellig
ence
(IJ-AI)
,
v
ol.
13,
no.
4,
pp.
4312–4322,
2024,
doi:
10.11591/ijai.v13.i4.pp4312-4322.
[4]
K.
Kangra
and
J.
Singh,
“
A
genetic
algori
thm-based
feature
selection
approach
for
diabetes
prediction,
”
IAES
International
J
ournal
of
Articial
Intellig
ence
(IJ-AI)
,
v
ol.
13,
no.
2,
pp.
1489–1498,
2024,
doi:
10.11591/ijai.v13.i2.pp1489-1498.
[5]
J.
H.
Holland,
Adaptation
in
natur
al
and
articial
systems:
an
intr
oductory
analysis
with
applications
to
biolo
gy
,
contr
ol,
and
articial
intellig
ence
.
Cambridge,
Massachusetts:
The
MIT
Press,
1992,
doi:
10.7551/mitpress/1090.001.0001.
[6]
M.
A.
Albadr
,
S.
T
iun,
M.
A
yob,
and
F
.
AL-Dhief,
“Genetic
algorithm
based
on
natural
selection
theory
for
optimization
problems,
”
Symmetry
,
v
ol.
12,
no.
11,
2020,
doi:
10.3390/sym12111758.
[7]
T
.
Harada
and
E.
Alba,
“P
arallel
genetic
algorithms:
A
useful
surv
e
y
,
”
A
CM
Computing
Surve
ys
,
v
ol.
53,
no.
4,
2020,
doi:
10.1145/3400031.
[8]
A.
Lambora,
K.
Gupta,
and
K.
Chopra,
“Genetic
algorithm-a
literat
ure
re
vie
w
,
”
in
2019
International
Confer
ence
on
Mac
hine
Learning
,
Big
Data,
Cloud
and
P
ar
allel
Computing
(COMITCon)
,
2019,
pp.
380–384,
doi:
10.1109/COMITCon.2019.8862255.
[9]
O.
Castillo
and
L.
T
.
Aguilar
,
“Genetic
algorithms,
”
in
T
ype-2
Fuzzy
Lo
gic
in
Contr
ol
of
Nonsmooth
Systems
,
2019,
pp.
23–39,
doi:
10.1007/978-3-030-03134-3
2.
[10]
L.
Huang,
H.
Zhang,
R.
Li,
Y
.
Ge,
and
J.
W
ang,
“
AI
coding:
learning
to
construct
error
correction
codes,
”
IEEE
T
r
ansactions
on
Communications
,
v
ol.
68,
no.
1,
pp.
26–39,
2020,
doi:
10.1109/TCOMM.2019.2951403.
[11]
A.
Elk
elesh,
M.
Ebada,
S.
Cammerer
,
and
S.
T
.
Brink,
“Decoder
-tailored
polar
code
design
using
the
genetic
algorithm,
”
IEEE
T
r
ansactions
on
Communications
,
v
ol.
67,
no.
7,
pp.
4521–4534,
2019,
doi:
10.1109/TCOMM.2019.2908870.
[12]
A.
Elk
elesh,
M.
Ebada,
S.
Cammerer
,
L.
Schmalen,
and
S.
T
.
Brink,
“Decoder
-in-the-loop:
genetic
optimization-based
LDPC
code
design,
”
IEEE
Access
,
v
ol.
7,
pp.
141161–141170,
2019,
doi:
10.1109/A
CCESS.2019.2942999.
[13]
L.
Natarajan,
Y
.
Hong,
and
E.
V
iterbo,
“Ne
w
error
correcting
codes
for
informed
recei
v
ers,
”
in
2016
IEEE
Inter
national
Symposium
on
Information
Theory
(ISIT)
,
2016,
pp.
2839–2843,
doi:
10.1109/ISIT
.2016.7541817.
[14]
A.
Das
and
N.
A.
T
ouba,
“
A
ne
w
class
of
single
b
urst
error
correcting
codes
with
parallel
decoding,
”
IEEE
T
r
ansactions
on
Com-
puter
s
,
v
ol.
69,
no.
2,
pp.
253–259,
2020,
doi:
10.1109/TC.2019.2947425.
[15]
Y
.
Zhang,
X.
Bao,
Z.
Y
uan,
and
X.
W
u,
“Decoding
of
the
v
e-error
-correc
ting
binary
quadratic
residue
codes,
”
American
J
ournal
of
Mathematical
and
Computer
Modelling
,
v
ol.
2,
no.
1,
pp.
6–12,
2017.
[16]
K.
M.
McGuire
and
R.
E.
Sabin,
“Using
a
genetic
algorithm
to
nd
good
linear
error
-correcting
codes,
”
in
Pr
oceedings
of
the
1998
A
CM
symposium
on
Applied
Computing
-
SA
C
’98
,
1998,
pp.
332–337,
doi:
10.1145/330560.330834.
[17]
H.
Maini,
K.
Mehrotra,
C.
Mohan,
and
S.
Ranka,
“Genetic
algorithms
for
soft-decision
decoding
of
linear
block
codes,
”
Evolutionary
Computation
,
v
ol.
2,
no.
2,
pp.
145–164,
1994,
doi:
10.1162/e
vco.1994.2.2.145.
[18]
M.
D.
J.
Simon,
J.
A.
G.
Pulido,
M.
A.
V
.
Rodriguez,
J.
M.
S.
Perez,
and
J.
M.
G.
Criado,
“
A
genetic
algorithm
to
design
error
correct-
ing
codes,
”
in
2006
IEEE
Mediterr
anean
Electr
otec
hnical
Confer
ence
,
2006,
pp.
807–810,
doi:
10.1109/MELCON.2006.1653221.
[19]
B.
El
Mehdi,
S.
Nouh,
I.
C.
Idriss
i,
A.
Ettaouk,
K.
Louartiti,
and
J.
Mouline,
“On
the
computation
of
the
automorphisms
group
of
lo
w
density
parity
check
codes
using
genetic
algorithm,
”
Indonesian
J
ournal
of
Electrical
Engineering
and
Computer
Science
,
v
ol.
25,
no.
2,
pp.
1059–1066,
2022,
doi:
10.11591/ijeecs.v25.i2.pp1059-1066.
[20]
J.
Alander
,
“Population
size,
b
uilding
blocks,
tness
landscape
and
genetic
algorithm
search
ef
cienc
y
in
combinatorial
optimiza-
tion,
”
in
Pr
actical
Handbook
of
Genetic
Algorithms
,
CRC
Press,
1998,
pp.
459–486,
doi:
10.1201/9781420050080.ch13.
[21]
M.
T
abassum,
“
A
genetic
algorithm
analysis
to
w
ards
optimization
solutions,
”
International
J
ournal
of
Digital
Infor
mation
and
W
ir
eless
Communications
,
v
ol.
4,
no.
1,
pp.
124–142,
2014,
doi:
10.17781/p001091.
[22]
A.
Amirzadeh,
M.
H.
T
aieb,
and
J.-Y
.
Chouinard,
“On
the
design
of
good
LDPC
codes
with
joint
genetic
algorithm
and
linear
programming
optimization,
”
in
2017
15th
Canadian
W
orkshop
on
Information
Theory
(CWIT)
,
2017,
pp.
1–5,
doi:
10.1109/CWIT
.2017.7994822.
[23]
A.
Mahran,
“Optimizing
the
parameters
of
turbo
product
codes
using
genetic
al
gorithms,
”
in
2017
IEEE
Aer
ospace
Confer
ence
,
2017,
pp.
1–7,
doi:
10.1109/AER
O.2017.7943565.
[24]
I.
A.
Joundan,
S.
Nouh,
and
A.
Namir
,
“Design
of
good
linear
codes
for
a
decoder
based
on
majority
v
oting
procedure,
”
in
2016
Inter
-
national
Confer
ence
on
Advanced
Communication
Systems
and
Information
Security
(A
COSIS)
,
2016,
pp.
1–6,
doi:
10.1109/A
CO-
SIS.2016.7843918.
[25]
H.
Chaibi,
A.
Berkani,
and
M.
Ahmad,
“Syndrome
weight
decision
base
d
genetic
algorithm
decoder
for
LDPC
codes,
”
International
J
ournal
of
Computer
Applications
,
v
ol.
127,
no.
6,
pp.
38–43,
2015,
doi:
10.5120/ijca2015906403.
[26]
A.
Azouaoui,
I.
Chana,
and
M.
Belkasmi
,
“Ef
cient
information
set
decoding
based
on
genetic
algorithms,
”
International
J
ournal
of
Communications,
Network
and
System
Sciences
,
v
ol.
5,
no.
7,
pp.
423–429,
2012,
doi:
10.4236/ijcns.2012.57052.
[27]
J
.
Broul
´
ım,
A.
A
yriyan,
and
H.
Grigorian,
“Genetic
optimization
of
LDPC
codes
to
impro
v
e
the
correction
of
b
urst
errors,
”
EPJ
W
eb
of
Confer
ences
,
v
ol.
226,
2020,
doi:
10.1051/epjconf/202022602006.
[28]
S
.
Nouh,
I.
Chana,
and
M.
Belkasmi,
“Decoding
of
block
codes
by
using
genetic
algorithms
and
permutations
set,
”
International
J
ournal
of
Communication
Networks
and
Information
Security
,
v
ol.
5,
no.
3,
pp.
201–209,
2013,
doi:
10.17762/ijcnis.v5i3.428.
[29]
A.
Berkani,
A.
Azouaoui,
M.
Belkasmi,
and
B.
A
ylaj,
“Impro
v
ed
decoding
of
linear
block
codes
using
compact
genetic
algo-
rithms
with
lar
ger
tournament
size,
”
International
J
ournal
of
Computer
Science
Issues
,
v
ol.
14,
no.
1,
pp.
15–24,
2017,
doi:
10.20943/01201701.1524.
Ne
w
family
of
err
or
-corr
ecting
codes
based
on
g
enetic
algorithms
(El
Mehdi
Bellfkih)
Evaluation Warning : The document was created with Spire.PDF for Python.
1086
❒
ISSN:
2252-8938
BIOGRAPHIES
OF
A
UTHORS
El
Mehdi
Bellfkih
holds
a
Ph.D.
in
applied
mathematics
from
Hassan
II
Uni
v
ersity
,
specializing
in
coding
theory
,
error
-correcting
codes,
articial
intelligence,
and
machine
learning.
His
research
e
xplores
inno
v
ati
v
e
solutions
in
t
hese
elds
to
address
comple
x
computational
problems.
He
can
be
contacted
at
email:
elmehdi.bellfkih@gmail.com.
Said
Nouh
holds
a
Ph.D.
in
computer
sciences
at
National
School
of
Computer
Science
and
Systems
Analysis
(ENSIAS),
Rabat,
Morocco
in
2014.
He
is
currently
professor
(higher
de
gree
research
(HDR))
at
F
aculty
of
sciences
Ben
M’Sick,
Hassan
II
Uni
v
ersity
,
Casablanca,
Morocco.
His
current
research
interests
articial
intelligence,
machine
learning,
deep
learning,
telecommunications,
information,
and
coding
theory
.
He
can
be
contacted
at
email:
said.nouh@uni
vh2m.ma.
Imrane
Chemseddine
Idrissi
is
a
Ph.D.
in
computer
science
at
F
aculty
of
Sciences
Ben
M’Sik
(FSBM),
Hassan
II
Uni
v
ersity
,
Cas
ablanca,
Morocco.
He
recei
v
ed
a
mas
ter’
s
thesis
in
data
science
and
big
data
at
ENSIAS
Mohammed
V
uni
v
ersity
in
2019.
His
current
research
interests
include
netw
orks
and
sys
tems,
telecommunications,
information,
coding
theory
,
m
achine
learning,
and
deep
learning.
He
can
be
contacted
at
email:
imrane.chemseddine-etu@etu.uni
vh2c.ma
or
im-
ran.chems@gmail.com.
Khalid
Louartiti
originally
hailing
from
T
aounate,
Morocco,
he
earned
his
Ph.D.
from
Sidi
Mohamed
Ben
Abdellah
Uni
v
ersity
in
Fes,
Morocco.
Presently
serving
as
a
Professor
at
the
National
School
of
Applied
Scie
nces
(ENSA)
in
T
etouan,
Morocco.
His
research
focuses
on
graph
theory
,
modules,
ideals,
commutati
v
e
algebra,
and
amalg
amat
ed
algebra.
He
can
be
contacted
at
email:
lokha2000@hotmail.com.
J
amal
Mouline
originally
from
Ouaz
zane,
Morocco,
he
earned
his
Ph.D.
from
Pro
v
ence
Uni
v
ersity
in
France.
Presently
,
he
holds
the
position
of
a
Professor
in
the
Department
of
Mathematics
and
Informatics
at
Hassan
II
Uni
v
ersity
in
Morocco.
His
research
focuses
on
x
ed
point
theory
and
combinatorial
theory
.
He
can
be
contacted
at
email:
mouline61@gmail.com.
Int
J
Artif
Intell,
V
ol.
14,
No.
2,
April
2025:
1077–1086
Evaluation Warning : The document was created with Spire.PDF for Python.