Stochastic Optimization for Hostage Rescue Using Internet of Things and Queen Honey Bee Algorithm
DOI:
https://doi.org/10.30812/matrik.v25i1.5065Keywords:
Energy Efficiency, Hostage Release Operation, Internet of Things, Migration Algorithm, Stochastic Model, Time EfficiencyAbstract
This study proposes a stochastic optimization model to enhance the efficiency of hostage rescue operations using Internet of Things technology and the Queen Honey Bee Migration algorithm. The model aims to reduce response time and energy consumption by leveraging real-time data from IoT sensors to adapt dynamically to field conditions. Simulation tests conducted in a multi-story building environment demonstrated a 40% improvement in response time and a 35% reduction in energy consumption compared to conventional methods. The system also achieved up to 94.8% positioning accuracy using RSSI analysis and demonstrated consistent performance across floors. The results indicate that integrating QHBM and IoT provides a scalable and adaptive solution for mission-critical operations, with potential applications in real-world tactical planning.
Downloads
References
[1] K. Kasiyanto, A. Aripriharta, D. Widiatmoko, D. Irmanto, and M. Cahyo Bagaskoro, “Hostage Liberation Operations using
Wheeled Robots Based on LIDAR (Light Detection and Ranging) Sensors,” vol. 23, no. 2, pp. 243–258, January, 2024, https:
//doi.org/10.30812/matrik.v23i2.3493.
[2] A. Aripriharta, M. S. Al Rasyid, M. C. Bagaskoro, I. Fadlika, S. Sujito, A. N. Afandi, S. Omar, and N. Rosmin, “Queen honey
bee migration (QHBM) optimization for droop control on DC microgrid under load variation,” vol. 15, no. 1, pp. 12–22, July,
2024, https://doi.org/10.55981/j.mev.2024.742.
[3] G. B. Iwasokun, O. O. Ogunfeitimi, O. K. Akinyokun, and S. O. Ogunlana, “Geo-Fence Technique for Prevention of Human
Kidnapping:,” vol. 8, no. 2, pp. 21–41, July, 2021, https://doi.org/10.4018/IJSST.2021070102.
[4] M. A. Al-Sharqi, A. T. S. Al-Obaidi, and S. O. Al-mamory, “Apiary Organizational-Based Optimization Algorithm: A New
Nature-Inspired Metaheuristic Algorithm,” vol. 17, no. 3, pp. 783–801, June, 2024, https://doi.org/10.22266/ijies2024.0630.61.
[5] D. Irmanto, S. Sujito, A. Aripriharta, D. Widiatmoko, K. Kasiyanto, and S. Omar, “Optimizing the Personnel Position
Monitoring System Using the Global Positioning System in Hostage Release,” vol. 8, no. 1, pp. 91–107, Februari, 2024,
https://doi.org/10.29407/intensif.v8i1.21665.
[6] L. G. R. Putra, D. D. Prasetya, and M. Mayadi, “Student Dropout Prediction Using Random Forest and XGBoost Method,”
vol. 9, no. 1, pp. 147–157, February, 2025, https://doi.org/10.29407/intensif.v9i1.21191.
[7] F. Yang, A. Vereshchaka, and W. Dong, “Optimizing Complex Interaction Dynamics in Critical Infrastructure with a Stochastic
Kinetic Model,” in 2019 Winter Simulation Conference (WSC). IEEE, December, 2019, pp. 1672–1683, https://doi.org/10.
1109/WSC40007.2019.9004667.
[8] V. I. Norkin, “Optimization Models Of Anti-Terrorist Protection*,” vol. 54, no. 6, pp. 918–929, November, 2018, https://doi.
org/10.1007/s10559-018-0094-0.
[9] Aripriharta, A. Firly Aprilia Putri, S. Omar, and M. Wahyu Prasetyo, “Multiple Range of Output Converter for Hazard Sensors
with PV System,” vol. 473, p. 01003, 2024, https://doi.org/10.1051/e3sconf/202447301003.
[10] M. Ahmad, A. A. Ikram, I. Wahid, F. Ullah, A. Ahmad, and F. Alam Khan, “Optimized clustering in vehicular ad hoc networks
based on honey bee and genetic algorithm for internet of things,” vol. 13, no. 2, pp. 532–547, March, 2020, https://doi.org/10.
1007/s12083-019-00724-4.
[11] R. Tamzid, E. F. Mahee, A. Rahman, T. A. Tamanna, M. Rahman, and M. M. Hossain, “Intelligent Route Planning for Post-
Earthquake Rescues Using IoT,” in 2024 6th International Conference on Electrical Engineering and Information & Communication
Technology (ICEEICT). IEEE, May, 2024, pp. 586–591, https://doi.org/10.1109/ICEEICT62016.2024.10534533.
[12] A. Zambrano, M. E. Ortiz, M. Zambrano Vizuete, and X. Calder´on, “Crowdsensing and MQTT Protocol: A Real-Time Solution
for the Prompt Localization of Kidnapped People,” in Advances in Emerging Trends and Technologies, M. Botto-Tobar, J. Le´on-
Acurio, A. D´ıaz Cadena, and P. Montiel D´ıaz, Eds. Springer International Publishing, 2020, pp. 238–247, https://doi.org/10.
1007/978-3-030-32033-1 22.
[13] C. Li and Y. Zhu, “A Q-learning approach for energy-efficient trajectory design: Stochastic event capture using a fixed-wing
UAV,” in 2023 IEEE 26th International Conference on Intelligent Transportation Systems (ITSC). IEEE, September, 2023,
pp. 5516–5523, https://doi.org/10.1109/ITSC57777.2023.10422042.
[14] F. Qin, A. Mohd Zain, K.-Q. Zhou, N. Bin Yusup, D. Dwi Prasetya, R. Abdul Jalil, Z. Zainal Abidin, M. Bahari, Y. Kamin,
and M. Abdul Majid, “Hybrid Harmony Search Algorithm Integrating Differential Evolution and L´evy Flight for Engineering
Optimization,” vol. 13, pp. 13 534–13 572, 2025, https://doi.org/10.1109/ACCESS.2025.3529714.
[15] A. Saji, A. R. Thomas, A. M. Benny, and N. Jayapandian, “Rescue Operation with RF Pose Enabled Drones in Earthquake
Zones,” in 2023 International Conference on Sustainable Computing and Smart Systems (ICSCSS). IEEE, June, 2023, pp.
1333–1338, https://doi.org/10.1109/ICSCSS57650.2023.10169438.
[16] H. Yang, R. Ruby, Q.-V. Pham, and K. Wu, “Aiding a Disaster Spot via Multi-UAV-Based IoT Networks: Energy and Mission
Completion Time-Aware Trajectory Optimization,” vol. 9, no. 8, pp. 5853–5867, April, 2022, https://doi.org/10.1109/JIOT.
2021.3109138.
[17] J. R. E. Leite, P. S. Martins, and E. L. Ursini, “Planning of AdHoc and IoT Networks Under Emergency Mode of Operation,”
in 2019 IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE,
October, 2019, pp. 1071–1080, https://doi.org/10.1109/IEMCON.2019.8936196.
[18] R. Singh, R. Samkaria, A. Gehlot, and S. Choudhary, “Design and Development of IoT enabled Multi Robot System for Search
and Rescue Mission,” vol. 10, no. 2, p. 51, June, 2018, https://doi.org/10.6025/ijwa/2018/10/2/51-63.
[19] T. Yang, N. Zhang, M. Xu, M. Dianati, and F. R. Yu, “Guest Editorial Special Issue on Space–Air–Ground-Integrated Networks
for Internet of Vehicles,” vol. 9, no. 8, pp. 5666–5669, April, 2022, https://doi.org/10.1109/JIOT.2022.3150896.
[20] D. A. Lott, A. J. Raglin, and S. Metu, “On the use of operations research for decision making with uncertainty for IoT devices in
battlefield situations: Simulations and outcomes,” in Virtual, Augmented, and Mixed Reality (XR) Technology for Multi-Domain
Operations, M. S. Dennison, Ed. SPIE, April, 2020, p. 10, https://doi.org/10.1117/12.2557870.
[21] L. Decheng, H. Hongjing, Z. Yishu, and Z. Fan, “Research on Mining Different Brand Customer Models Based on Correlation
Coefficient and Bayesian Discrimination Methods,” in 2024 International Conference on Computers, Information Processing
and Advanced Education (CIPAE). IEEE, August, 2024, pp. 477–481, https://doi.org/10.1109/CIPAE64326.2024.00092.
[22] I. Rusnak, H. Weiss, and G. Hexner, “Optimal guidance laws with prescribed degree of stability,” vol. 99, p. 105780, April,
2020, https://doi.org/10.1016/j.ast.2020.105780.
[23] I. S. Van Droffelaar, J. H. Kwakkel, J. P. Mense, and A. Verbraeck, “Simulation–optimization configurations for real-time
decision-making in fugitive interception,” vol. 133, p. 102923, MAy, 2024, https://doi.org/10.1016/j.simpat.2024.102923.
[24] A. Jaimes, “AI & Public Data for Humanitarian and Emergency Response,” in Proceedings of the Fifteenth ACM International
Conference on Web Search and Data Mining, ser. WSDM ’22. Association for Computing Machinery, p. 1644, https://doi.org/
10.1145/3488560.3510013.
[25] A. Polo, P. Rocca, M. Salucci, G. Gottardi, and A. Massa, “Decision Support for Resilient Emergency Response Through IoTdriven
Environmental Monitoring,” in 2024 9th International Conference on Smart and Sustainable Technologies (SpliTech).
IEEE, June, 2024, pp. 1–4, https://doi.org/10.23919/SpliTech61897.2024.10612338.
[26] D. A. Lott, A. Raglin, and S. Metu, “On the Use of Operations Research for Decision Making with Uncertainty for IoT Devices
in Battlefield Situations,” in 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC). IEEE,
December, 2019, pp. 266–297, https://doi.org/10.1109/CIC48465.2019.00041.
[27] D. S. Ignatova and R. K. Oransky, “Mechatronical approach to investigations of rescue operations,” in 14th International
Conference Mechatronika. IEEE, June, 2011, pp. 103–108, https://doi.org/10.1109/MECHATRON.2011.5961098.
[28] J. E. Pye and N. M. Alexandrov, “APIS: Honey Bee Foraging Task Assignment for Use in Uncertain and Unreliable Environments,”
in AIAA SCITECH 2024 Forum. American Institute of Aeronautics and Astronautics, January, 2024, https:
//doi.org/10.2514/6.2024-0333.
[29] F. Roesner, C. A. S. Castrilli´on, R. Hartanto, and A. Struck, “Optimal Search Strategies for Rescue Drones Based on Swarm
Behaviour of Different Ethics,” in EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization,
H. Rodrigues, J. Herskovits, C. Mota Soares, A. Ara´ujo, J. Guedes, J. Folgado, F. Moleiro, and J. F. A. Madeira, Eds. Springer
International Publishing, 2019, pp. 122–131, https://doi.org/10.1007/978-3-319-97773-7 12.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Achmad Afif Irwansyah, Aripriharta, Didik Dwi Prasetya

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
How to Cite
Similar Articles
- Bambang Saras Yulistiawan, Rifka Widyastuti , RR Octanty Mulianingtyas , Galih Prakoso Rizky A, Hengki Tamando Sihotang, Developing the Adaptive Digital IT Governance Framework forNext-Generation IT Governance , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 25 No. 1 (2025)
- Erlin Erlin, Yenny Desnelita, Nurliana Nasution, Laili Suryati, Fransiskus Zoromi, Dampak SMOTE terhadap Kinerja Random Forest Classifier berdasarkan Data Tidak seimbang , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 3 (2022)
- Zein Zein, Ahmat Adil, APLIKASI MEDIA BANTU PEMBELAJARAN KRIPTOGRAFI DENGAN MENGGUNAKAN ALGORITMA MESSAGE DIGEST 5 (MD5) , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 15 No. 2 (2016)
- Rahmaddeni Rahmaddeni, M. Teguh Wicaksono, Denok Wulandari, Agustriono Agustriono, Sang Adji Ibrahim, Enhancing Multiple Linear Regression with Stacking Ensemble for Dissolved Oxygen Estimation , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 1 (2024)
- Muhammad Furqan Nazuli, Muhammad Fachrurrozi, Muhammad Qurhanul Rizqie, Abdiansah Abdiansah, Muhammad Ikhsan, A Image Classification of Poisonous Plants Using the MobileNetV2 Convolutional Neural Network Model Method , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 24 No. 2 (2025)
- Zulfian Azmi, Ishak Ishak, Model Jaringan Syaraf Tiruan untuk Variabel tidak Pasti pada Kontrol Putaran Kincir Angin , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 1 (2021)
- yusri ikhwani, As`ary Ramadhan, Muhammad Bahit, Taufik Hidayat Faesal, Single elimination tournament design using dynamic programming algorithm , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
- Rizki Rino Pratama, Analisis Model Machine Learning Terhadap Pengenalan Aktifitas Manusia , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 19 No. 2 (2020)
- Purnawarman Musa, Eri Prasetyo Wibowo, Saiful Bahri Musa, Iqbal Baihaqi, Pelican Crossing System for Control a Green Man Light with Predicted Age , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 21 No. 2 (2022)
- Imam Riadi, Herman Herman, Fitriah Fitriah, Suprihatin Suprihatin, Optimizing Inventory with Frequent Pattern Growth Algorithm for Small and Medium Enterprises , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 1 (2023)
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Kasiyanto Kasiyanto, Aripriharta Aripriharta, Dekki Widiatmoko, Dodo Irmanto, Muhammad Cahyo Bagaskoro, Hostage Liberation Operations using Wheeled Robots Based on LIDAR (Light Detection and Ranging) Sensors , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
- Dekki Widiatmoko, Aripriharta Aripriharta, Kasiyanto Kasiyanto, Dodo Irmanto, Muchamad Wahyu Prasetyo, Power Efficiency using Bank Capacitor Regulator on Field Service Shoes with Fast Charge Method , MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer: Vol. 23 No. 2 (2024)
.png)











