Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
A Real-Time Streaming System for Customized Network Traffic Capture
Previous Article in Journal
Frugal Heart Rate Correction Method for Scalable Health and Safety Monitoring in Construction Sites
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Enhanced Flower Pollination Algorithm with Gaussian Perturbation for Node Location of a WSN

1
College of Optical, Mechanical and Electrical Engineering, Zhejiang A&F University, Hangzhou 311300, China
2
School of Information Science and Engineering, Hunan Institute of Science and Technology, Yueyang 414006, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(14), 6463; https://doi.org/10.3390/s23146463
Submission received: 18 June 2023 / Revised: 11 July 2023 / Accepted: 12 July 2023 / Published: 17 July 2023
(This article belongs to the Section Sensor Networks)

Abstract

:
Localization is one of the essential problems in internet of things (IoT) and wireless sensor network (WSN) applications. However, most traditional range-free localization algorithms cannot fulfill the practical demand for high localization accuracy. Therefore, a localization algorithm based on an enhanced flower pollination algorithm (FPA) with Gaussian perturbation (EFPA-G) and the DV-Hop method is proposed.FPA is widely applied, but premature convergence still cannot be avoided. How to balance its global exploration and local exploitation capabilities still remains an outstanding problem. Therefore, the following improvement schemes are introduced. A search strategy based on Gaussian perturbation is proposed to solve the imbalance between the global exploration and local exploitation search capabilities. Meanwhile, to fully exploit the variability of population information, an enhanced strategy is proposed based on optimal individual and Lévy flight. Finally, in the experiments with 26 benchmark functions and WSN simulations, the former verifies that the proposed algorithm outperforms other state-of-the-art algorithms in terms of convergence and search capability. In the simulation experiment, the best value for the normalized mean squared error obtained by the most advanced algorithm, RACS, is 20.2650%, and the best value for the mean distance error is 5.07E+00. However, EFPA-G reached 19.5182% and 4.88E+00, respectively. It is superior to existing algorithms in terms of positioning, accuracy, and robustness.

1. Introduction

Over recent decades, as the technologies of the internet of things (IoT) have become more and more sophisticated, the intelligent perception and management of objects can be realized through the connection of things and people [1]. Wireless sensor networks (WSNs) have been playing an increasingly significant role in the IoT with their functions such as real-time sensing, collecting, and processing of information. The inherent characteristics of the node location make it an essential prerequisite for many functions. With the demand for location-based services developing rapidly, the accuracy of node localization affects numerous practical application areas, such as smart homes [2], city surveillance [3], fault diagnosis [4], etc.
The localization methods can be classified into range-based [5] and range-free [6] localization methods based on whether the actual measurement of the distance between nodes is necessary. The former achieves the estimation of the distance between nodes based on the angle of arrival [7], time of arrival [8], and time difference of arrival [9] of the signal or based on the received signal strength. Although this type of method has high positioning accuracy, it requires additional equipment to achieve the corresponding measurement, which is costly and not suitable for monitoring of large areas. The latter method estimates the location of unknown nodes by the connectivity between neighboring nodes. Although the accuracy of this type of algorithm is low, it can basically meet the practical needs. This paper focuses on the DV-Hop method, which is one of the typical range-free based localization methods [10]. To satisfy the increasing demand of positioning accuracy, many scholars have conducted research related to the DV-Hop method. For example, Xue [11] proposed an improved DV-Hop algorithm based on hop refinement and distance correction for the shortcomings of the traditional DV-Hop-based wireless sensor network localization algorithm with large errors. Messous et al. [12] proposed an improved recursive DV-Hop localization algorithm by minimizing the localization error of the estimated distance between the anchor node and the unknown node. Cheikhrouhou et al. [13] proposed an enhanced DV-Hop method by transforming the localized nodes into anchor nodes to improve the localization accuracy. Messous et al. [14] proposed an improved DV-Hop method by receiving the signal strength and polynomial approximation to estimate the distance between the anchor node and the unknown node. Zhao et al. [15] proposed a DV-Hop algorithm based on locally weighted linear regression (LWLR-DV-Hop), using a kernel approach to improve localization accuracy by increasing the weights of neighboring anchor nodes. Liouane et al. [16] proposed an improved method of the DV-Hop algorithm for wireless sensor networks based on the Tikhonov regularization method. Liu et al. [17] proposed an improved DV-Hop algorithm based on neural dynamics (ND-DV-Hop) for improving the accuracy of the DV-Hop algorithm. Although the above algorithms can obtain satisfactory localization accuracy, with the continuous development of metaheuristic optimization algorithms, such as the cuckoo search algorithm (CS) [18], beluga whale optimization (BWO) [19], and golden jackal optimization (GJO) [20], how to better utilize the advantages of both methods is a hot research topic.
The flower pollination algorithm (FPA) [21], as one of the typical metaheuristic optimization algorithms, has attracted much attention by virtue of its effective applicability to real-world problems. Although the FPA can achieve satisfactory performance in solving regular problems, for complex problems it remains limited by its low search capability and convergence speed [22]. Therefore, scholars have conducted much innovative research. Kaya [23] proposed a quick flower pollination algorithm based on parameter adaptive and arithmetic crossover. Cao et al. [24] proposed a robot calibration method using an extended Kalman filter (EKF) and an artificial neural network (ANN) based on the butterfly and flower pollination algorithms (ANN-BFPA) to improve the absolute pose (position and orientation) accuracy of the robot. Ozsoydan et al. [25] proposed a species-based flower pollination algorithm with increased selection pressure and enhanced reinforcement in abiotic local pollination. Mergos [26] applied the FPA for the first time to compute challenging optimal designs of real-world three-dimensional reinforced concrete (RC) building frame structures after a series of appropriate modifications. Dao et al. [27] proposed to hybridize the FPA with a sine–cosine algorithm (called HSFPA) to avoid the drawbacks of the FPA for microgrid operation planning and global optimization problems. Sasikumar et al. [28] proposed a population intelligence-based approach for op-amp optimization sizing. A hybrid version of the flower pollination algorithm (HFPA) is introduced to effectively solve the analog circuit transistor sizing problem and reduce the design search space. Ozsoydan et al. [29] introduced several FPA modifications using chaotic maps and further enhanced the exploited search capabilities by using an enhanced step quantification procedure. All the mentioned studies relevant to the FPA have achieved satisfactory results. However, most of them are parametric algorithms and hybrid algorithms that lack innovative research on the FPA’s search mechanism. Therefore, this paper focuses on relevant studies on global exploration and local exploitation search mechanisms.
With respect to the mentioned problems, an enhanced flower pollination algorithm with Gaussian perturbation (EFPA-G) is proposed in this paper. In the global exploration of the traditional FPA, the optimal search process of the population is achieved only by relying on Lévy flight, which can mean the algorithm becomes trapped in local extremes in the late iterations. Therefore, in the FPA proposed in this paper, an enhanced strategy based on Lévy flight is proposed to improve the search capability of the algorithm. An imbalance in the search capability exists between the global exploration and local exploitation of the traditional FPA, which results in the local exploitation struggling to contribute to a faster convergence speed of the algorithm during the iterations. Therefore, this paper proposes a Gaussian perturbation strategy for improving the search ability of the local exploitation. Extensive experimental results on the benchmark optimization problems show that the proposed EFPA-G algorithm outperforms other state-of-the-art improved metaheuristic optimization algorithms. Satisfactory localization accuracy is also achieved in the WSN simulation experiments.
The major contributions of this article are stated as follows:
(1)
A localization algorithm based on the enhanced flower pollination algorithm with Gaussian perturbation and the DV-Hop method is proposed. The superiority and robustness of the proposed algorithm are verified by extensive simulation experiments.
(2)
An enhancement strategy based on Lévy flight is proposed to improve the search capability of the algorithm.
(3)
A Gaussian perturbation strategy for balancing global exploration and local exploitation search capabilities is proposed.
The remainder of this paper is presented as follows: The FPA and the DV-Hop method are described in Section 2. The proposed EFPA-G algorithm is described in detail in Section 3. The simulation results and comparisons of the approaches are shown in Section 4. Finally, conclusions are presented in Section 5.

2. Background

2.1. DV-Hop Method

The distance vector hop (DV-Hop) localization algorithm is based on the distance vector exchange protocol to obtain hop counts for node localization. The DV-Hop algorithm is widely used in WSN node localization because of its relatively simple implementation [30], which only requires the use of hop counts and distance vector estimates to calculate the nodes’ positions. No additional hardware or measurement costs are necessary, making it easy to implement and apply in large-scale wireless sensor networks, including dense and sparse networks. Additionally, it can handle situations such as partial node failures compared to other algorithms. The algorithm uses hop counts and distance vector estimates to calculate the nodes’ positions, which can be measured and transmitted by multiple nodes, thereby improving the measurement’s reliability and accuracy. Combining the proposed algorithm with the DV-Hop algorithm increases the algorithm’s robustness and improves its localization accuracy.

2.1.1. Calculating the Minimum Number of Hops

The anchor node broadcasts its own packet to the whole network by flooding, and the packet contains the anchor node’s location information and hop value. The unknown node receives the packet from the anchor node and updates its hop count information, adds 1 to the packet’s hop value and saves it. To ensure that all nodes in the network have access to the minimum hop count h u i information of each anchor node, the node receiving the packet only needs to keep the packet with the smaller hop count.

2.1.2. Estimating the Distance between Anchor Nodes and Unknown Nodes

After each anchor node receives the coordinates of other anchor nodes and the minimum number of hops, it calculates its average hop distance according to Equation (1).
H o p s i z e i = i j x i x j 2 + y i y j 2 i j h i j
where x , y represents the coordinates of the anchor nodes, h i j represents the number of hops between anchor nodes i and j, and H o p s i z e i represents the average hop distance of anchor node i.

2.1.3. Estimating Unknown Node Coordinates

The estimated distance d u i is calculated using Equation (1), and then combined with the least squares method to estimate the position of the unknown node, as shown in Equation (2).
x 1 x 2 + y 1 y 2 = d 1 2 x 2 x 2 + y 2 y 2 = d 2 2 x n x 2 + y n y 2 = d n 2
where x , y denotes the coordinates of the unknown node and d denotes the distance between the unknown node and the anchor node. By subtracting the first term from the previous term and splitting it, the form A X = B is obtained, where A, B, and X are shown in Equations (3)∼(5), respectively.
A = 2 x 1 x n 2 y 1 y n 2 x n 1 x n 2 y n 1 y n
B = x 1 2 x n 2 + y 1 2 y n 2 + d n 2 d 1 2 x n 1 2 x n 2 + y n 1 2 y n n 2 + d n 2 d n 1 2
X = x y
Finally, the estimated coordinates of the unknown nodes are obtained by Equation (6).
X ^ = A T A 1 A T B

2.2. Flower Pollination Algorithm

The flower pollination algorithm (FPA) is a metaheuristic optimization algorithm based on the pollination process in nature. The FPA uses adaptive parameters and adaptive operators, which can dynamically adjust parameters according to the characteristics of the problem and the search process, thereby improving the robustness and adaptability of the algorithm. It is highly robust, and can handle noisy data and complex problems with multiple variables and constraints by using probabilistic methods to explore different regions of the search space. It can quickly converge to a satisfactory solution, reducing calculation time and cost. Because its implementation is relatively simple and can be quickly applied to the solution of various practical problems, it is widely used in various fields such as optimization, classification, and clustering. It mainly consists of global pollination and self-pollination, which can also be called global exploration and local exploitation.

2.2.1. Global Pollination

Global pollination, that is, cross-pollination, is usually based on biology. Pollen is spread over long distances by pollinators such as birds, insects, bees, or bats. Its spread can be modeled using the Lévy distribution, as shown in Equation (7).
x i t + 1 = x i t + l e ´ v y · x b e s t x i t
where x b e s t represents the optimal solution, x i t represents the i-th solution of the t-th generation, and l e ´ v y represents the Lévy flight step length, as shown in Equation (8).
l e ´ v y λ Γ λ sin π λ π λ 2 2 π · 1 s 1 + λ s s 0 > 0
where Γ λ represents the standard gamma function, λ = 1.5 , parameter s is calculated using Equation (9), and μ and v are random numbers subject to Gaussian distribution. μ is the distribution with the mean zero variance of σ 2 . The parameter σ is calculated using Equation (10).
s = μ v 1 1 λ λ , μ N 0 , σ 2 , v N 0 , 1
σ = Γ 1 + λ λ Γ 1 + λ 1 + λ 2 2 · sin λ π λ π 2 2 2 λ 1 λ 1 2 2 1 2 λ

2.2.2. Local Pollination

Local pollination, that is, self-pollination, is pollination by abiotic and other factors, so the spread range is small, and pollination is often completed around itself, as shown in Equation (11).
x i t + 1 = x i t + ε · x j t x k t
where x j t and x k t are pollen from different flowers of similar flowering plants, i.e., two solutions randomly selected from the population, and ε is a random variable that follows a uniform distribution.

2.2.3. Transition Probability

The algorithm randomly switches between the two processes of exploitation and exploration by transition probability P to determine the type of flower pollination (i.e., global or local search process) to ensure the quality of the search. When the random probability is less than the transition probability, self-pollination is performed, otherwise the cross-pollination process is performed.

3. Proposed EFPA-G Approach

An enhanced flower pollination algorithm with Gaussian perturbation (EFPA-G) is proposed to avoid premature convergence of the FPA algorithm and to improve the performance of the FPA algorithm on complex optimization problems.

3.1. Enhanced Strategy

In traditional FPAs, global exploration relies only on Levy flights to carry out global optimization, but the search capability is not sufficient to accomplish high-precision optimization in late iterations. In addition, the Lévy flight only exploits the difference between the optimal solution and the candidate solution, without utilizing the global search information of the population as a whole, resulting in a waste of information. Therefore, an enhanced strategy based on Lévy flight is proposed in this paper to accommodate the requirements of the algorithm for high-precision search optimization in the late iterations, as shown in Equation (12).
x i t + 1 = x i t + δ · r a n d · x b e s t x i t + l e ´ v y s t e p
where δ represents the iteration-based weights, as shown in Equation (13), and l e ´ v y s t e p is the leap distance based on the Lévy flight, as shown in Equation (14).
δ = r a n d · 1 t t I t e r I t e r
l e ´ v y s t e p = α · l e ´ v y · x k t x i t
where t and I t e r denote the current iteration number and the maximum iteration number, respectively. α is a constant, and α = 0.05 , x k t represents the randomly selected individuals in the t-th generation.

3.2. Gaussian Perturbation

The enhanced strategy based on Levy flight further improves the search capability of the FPA’s global exploration, but cannot satisfy the needs of large-scale optimization problems, and further increases the imbalance between global exploration and the local development search capability. Therefore, how to enhance the search capability of local exploitation becomes particularly more significant.
In Equation (11), x performs a modification of its own information based only on the information difference with the other two candidate solutions in the population. In addition, the Gaussian distribution alters its curve according to the variation in the mean and variance, which indicates the stability while being random. Therefore, employing a Gaussian distribution in the iteration to achieve perturbation of the population is practicable. In this paper, an optimal search strategy based on Gaussian perturbation is proposed, as shown in Equation (15).
x i t + 1 = G x i t + ε · x j t x k t
where G · is defined by Equation (16).
G x i t = 1 2 π ζ 2 e x i t x b e s t t 2 x i t x b e s t t 2 2 ζ 2 2 ζ 2
where x b e s t t represents the t-th generation optimal solution and ζ is defined by Equation (17).
ζ = 1 + log t log t t t · x i t x b e s t
where x b e s t represents the global optimal solution.
With respect to the designed Gaussian perturbation, it is designed to maintain stability throughout the iterations while further perturbing x over a large range, thus permitting the algorithm to leap out of local extremes.

3.3. Objective Function

For the proposed EFPA-G algorithm to be more applicable to WSN node localization, the localization problem is transformed into the problem of minimizing the difference between the estimated and actual locations, i.e., the localization error minimization problem, as shown in Equation (18).
min f x , y = i = 1 N a a x x i 2 + y y i 2 d i 2
where N a is the number of anchor nodes, and a is the reciprocal of the minimum number of hops between the estimated unknown x , y and the anchor node x i , y i . d i 2 denotes the actual distance between the unknown node and the anchor node.

3.4. EFPA-G Algorithm

According to the previous theory, this section focuses on detailing the framework of the proposed enhanced flower pollination algorithm with Gaussian perturbation, as shown in Algorithm 1.
Algorithm 1 Proposed EFPA-G Algorithm
Input:
  The maximum number of iterations I t e r , population size N, transition probability P;
Output:
  Optimal solution;
1:
Initialize: x i 0 = x min + r a n d · x max x min ;
2:
Calculate the fitness of the initial population x i 0 ;
3:
Record the current optimal solution b e s t ;
4:
t = 1 ;
5:
while  t I t e r   do
6:
   for  i = 1 to N do
7:
     if  r a n d < P  then
8:
         δ = r a n d · 1 t / I t e r ;
9:
        Update n e w x using Equation (12);
10:
     else
11:
         β = log t log t t t · b e s t x i t ;
12:
        Update n e w x using Equation (15);
13:
     end if
14:
     Calculate the fitness of n e w x ;
15:
     if  f i t n e w x < f i t x i t 1  then
16:
         x i t = n e w x ;
17:
     end if
18:
     if  f i t n e w x < f i t b e s t  then
19:
         b e s t = n e w x ;
20:
     end if
21:
   end for
22:
    t = t + 1 ;
23:
end while
24:
output result.

3.5. Complexity Analysis

This section focuses on the complexity analysis in two parts, the DV-Hop method and the EFPA-G algorithm. In the DV-Hop method, the total number of nodes is n and the number of anchor nodes is m. The complexity of the minimum hop count estimation between nodes is O n 3 , the complexity of the actual distance calculation between nodes is O n × m , the complexity of the distance between unknown nodes and anchor nodes is N, and the complexity of the likelihood estimation method is O n m 4 . In the EFPA-G algorithm, the dimension of the objective function is D. The complexity of the proposed algorithm is O I t e r × N × D . By replacing the likelihood estimation method in DV-Hop by the proposed EFPA-G algorithm, the complexity of the final WSN node localization method is O n 3 + O n + O n × m + O I t e r × N × D .

4. Numerical Results and Discussions

The performance of the proposed algorithm is verified using 26 well-known benchmark functions, and the superiority of the proposed algorithm is confirmed by comparison with other state-of-the-art metaheuristic optimization algorithms. In addition, the performance of the EFPA-G algorithm is tested in a WSN simulation for real optimization problems.

4.1. Parameters Settings

In this section, we discuss the performance of the proposed EFPA-G and other state-of-the-art optimization algorithms as follows.
(1)
Flower pollination algorithm (FPA): transition probability P = 0.5 ;
(2)
Flower pollination algorithm based on cloud mutation (CMFPA) [31]: transition probability P = 0.5 ;
(3)
Modified particle swarm optimization (MPSO) [32]: inertia weight ω = 0.9 0.4 , acceleration factors c 1 = c 2 = 2 ;
(4)
Marine predators algorithm (MPA) [33]: fish aggregating devices F A D s = 0.2 , constant number p = 0.5 ;
(5)
Ranking-based adaptive cuckoo search algorithm (RACS) [34]: the maximum size of the archive A N = N , exponent parameter α min = 0.5 , α max = 2.5 , the pre-determined number of cycles l i m i t = N · D , initial crossover rate C R m = 0.5 ;
(6)
Proposed EFPA-G algorithm: transition probability P = 0.5 .
For the sake of fairness, the mentioned algorithms are all run 30 times independently with the same population size N = 50 and the termination condition is the maximum number of iterations. The maximum number of iterations is set to 1000 for the numerical experiments and to 200 for the WSN simulation experiments.

4.2. Benchmark Test

To test the proposed EFPA-G apporach, 26 benchmark functions are available which are divided into unimodal functions ( f 1 f 12 ) and multimodal functions ( f 13 f 26 ). The former reveals the exploitation performance of the algorithm, while the latter challenges the exploration capability of the algorithm. Details of the benchmark functions are shown in Table 1. In addition, to test the optimization performance of the proposed algorithm for benchmark functions of different dimensions, experiments are conducted using D = 30 and D = 50 .

4.2.1. D = 30

To highlight the superiority and robustness of the proposed EFPA-G algorithm, this section compares the convergence curves and search accuracy of the algorithm from two aspects. The computational accuracy results of the proposed EFPA-G algorithm and the compared algorithms are shown in Table 2. The mean and standard deviation are compared to reflect the robustness of the algorithms. Lower values of the mean and standard deviation indicate better robustness. The optimal results are highlighted in bold and marked. The convergence curves are shown in Figure 1 and Figure 2.
Based on the results from the 12 unimodal functions in Table 2, it is observed that the proposed EFPA-G algorithm can match 0.00E+00 (the optimal values) for all the six unimodal functions tested ( f 1 , f 3 , f 6 , f 8 , f 9 , and f 11 ).The other functions ( f 2 , f 4 , f 7 ) are ahead of the other comparison algorithms even though they do not achieve the optimal values. However, in the f 10 function, the optimal values are obtained for the MPSO, MPA, and RACS algorithms, The mean reached −5.00E+00, and the standard deviations were 0.00E+00, 1.77E-12, and 6.26E-10, respectively. The presence of a large number of local extremes in the multimodal functions provides a better evaluation of the search performance of the proposed EFPA-G algorithm. From the experimental results of the 14 multimodal functions ( f 13 f 26 ) in Table 2, the performance of the proposed EFPA-G algorithm outperforms the other comparison algorithms obviously. For the five multimodal functions ( f 14 f 16 , f 19 , and f 22 ), the proposed EFPA-G algorithm is able to obtain the optimal values. The proposed EFPA-G algorithm obtains the first rank in both average and standard deviation for all the nine multimodal functions ( f 13 f 16 , f 19 , f 20 , and f 22 f 24 ). Therefore, in the testing of 26 benchmark functions, the mean and standard deviation of EFPA-G in 30 experiments were mostly optimal. This indicates that EFPA-G has superior robustness compared to the compared algorithms.
The convergence curves of the 10 unimodal functions in Figure 1 and Figure 2 show that the proposed EFPA-G algorithm outperforms the other compared algorithms in terms of convergence speed. The proposed EFPA-G algorithm converges much more quickly than the other compared algorithms in the seven unimodal functions ( f 1 f 4 , f 6 , f 8 , and f 9 ). In the six multimodal functions ( f 14 f 16 , f 19 , f 23 , and f 24 ), the convergence speed of the proposed EFPA-G algorithm obtains the first rank. In the other benchmark functions, the proposed EFPA-G algorithm obtained a satisfactory ranking.
From Table 2 and Figure 1 and Figure 2, it can be observed that the proposed EFPA-G algorithm exerts the exploitation capability in dealing with single-peaked functions and the exploration capability in dealing with multi-peaked functions.

4.2.2. D = 50

To test the sensitivity of the proposed EFPA-G algorithm in solving the same problem with different dimensions, this paper modifies the dimension D to 50 for the experiment, and the corresponding experimental results are shown in Table 3. Comparing the experimental results in Table 2 and Table 3.
For unimodal functions ( f 1 , f 3 , f 6 , f 8 , f 9 , and f 11 ) and multimodal functions ( f 14 f 16 , f 19 , and f 22 ) the optimal value of 0.00E+00 is achieved. The MPSO, MPA, and RACS algorithms all obtained optimal values for unimodal functions only ( f 6 , f 10 ). Compared with the RACS algorithm, it outperforms the proposed EFPA-G algorithm in five benchmark functions ( f 10 , f 18 f 20 , and f 26 ). The MPA algorithm outperforms the proposed EFPA-G algorithm and other algorithms in functions ( f 17 , f 21 , and f 26 ) as the dimensionality increases. It is observed that with the increase in dimensions, the proposed EFPA-G algorithm can still obtain the first rank in most of the benchmark functions, including unimodal and multimodal functions.
Overall, the proposed algorithm EFPA-G still has stable performance and the best robustness in development and exploration with dimension D = 50 .

4.3. Simulation for WSN

In this section, two different WSN models of general-shape networks and O-shape networks are adopted to test the sensitivity of the proposed EFPA-G localization algorithm to different node distributions, as shown in Figure 3, both with 100 nodes in a 100 m × 100 m square area. Firstly, the localization accuracy and robustness of the proposed EFPA-G algorithm are demonstrated by a general simulation. Then, the localization accuracy of the proposed algorithm is tested for different anchor node proportions and node communication radii. The normalized root mean square error (NRMSE) and the mean distance error (MDE) are considered as metrics to evaluate the performance of the proposed algorithm, as shown in Equations (19) and (20).
N R M S E = i = 1 N r x i x ^ i 2 + y i y ^ i 2 N r × R
where ( x i , y i ) and ( x ^ i , y ^ i ) denote the real and estimated coordinates of regular node i, respectively. R and N r denote the communication radius and the number of unknown nodes, respectively.
M D E = k = 1 N a i = 1 N r d k i d ^ k i N a × N r
where d k i and d ^ k i are the real distance and estimated distance between anchor node k and unknown node i, respectively. N a denotes the number of anchor nodes.
Figure 3. General-shaped and O-shaped networks.
Figure 3. General-shaped and O-shaped networks.
Sensors 23 06463 g003

4.3.1. General Simulation

In this subsection, the proportion of anchor nodes is set to 30%, the number of unknown nodes is 70, and the node communication radius is 25 m. The experimental results are shown in Table 4, and the optimal solutions are marked in bold. The comparison results between the proposed EFPA-G and other comparison algorithms for the localization error of each unknown node are shown in Figure 4 and Figure 5.
From the experimental results in Table 4, it can be seen that under different node distribution conditions, the NRMSE and MDE obtained by the traditional DV-Hop positioning method achieved the worst positioning accuracy, of 31.2086% and 7.80E+00, respectively, which indicates that the performance of the metaheuristic optimization algorithm is better than the least squares method. For networks of different shapes, the EFPA-G algorithm obtains the first rank of mean and optimal values on NRMSE and MDE, with the lowest reaching 19.5182% and 4.88E+00. The “std” values of MPA and RACS are smaller than EFPA-G, which means that the former is more stable in 30 experiments. However, the proposed algorithm for node location pays more attention to positioning accuracy. Figure 4 and Figure 5 also intuitively observe that the EFPA-G algorithm has the smallest positioning error, especially at low anchor ratios.

4.3.2. Effect of the Proportion of Anchor Nodes

In this subsection, the performance of the proposed algorithm is tested by gradually changing the proportion of anchor nodes (10%, 20%, 30%, and 40%) without changing the WSN model and the communication radius of the nodes. The experimental results are shown in Table 5. As the proportion of anchor nodes increases, the NRMSE of WSN node localization decreases, but this does not necessarily mean that a higher number of anchor nodes in the WSN model will result in higher localization accuracy. For example, in a general-shaped network, the NRMSE of the DV-Hop method increases from 30.12% to 30.48% as the proportion increases from 30% to 40%. In an O-shaped network, the NRMSE values of all metaheuristic localization methods first decrease and then increase as the proportion of anchor nodes increases. Overall, the proposed EFPA-G algorithm performs better in terms of overall performance for different networks when the proportion of anchor nodes is 30%.

4.3.3. Effect of Node Communication Radius

The sensitivity of the proposed EFPA-G algorithm to different communication radii is tested by gradually changing the communication radius of the nodes (15 m, 20 m, 25 m, and 30 m) without changing the WSN model and the proportion of anchor nodes.
Table 6 shows the experimental results for different communication radii. As the communication radius of the nodes increases, the NRMSE values generally decrease in a general-shaped network. In an O-shaped network, the NRMSE values first decrease and then increase, indicating that blindly increasing the communication radius cannot guarantee an improvement in node localization accuracy. Instead, it places higher demands on hardware equipment and leads to wastage of resources. However, for both a general-shaped network and O-shaped network, the other compared methods obtain very close NRMSE values. This indicates that the FPA, CMFPA, MPA, and RACS algorithms have similar local exploitation capabilities in solving real optimization problems. The NRMSE obtained by the proposed EFPA-G algorithm ranked first with the changing radius of node communication, which suggests that the algorithm has superior performance in solving practical problems. Overall, EFPA-G outperforms state-of-the-art algorithms in terms of accuracy and robustness against network anisotropy.

5. Conclusions

This paper proposed a localization algorithm based on an enhanced flower pollination algorithm with Gaussian perturbation (EFPA-G) and the DV-Hop method. Firstly, the highly adaptive and parallel computing capabilities, and ease of implementation and application of the flower pollination algorithm were utilized to achieve sensor node localization. Subsequently, an enhanced strategy based on Lévy flight was proposed to address the problems of the difficulty in escaping from local extreme values, sensitivity to initial values, and possible over-exploration in the later iterations. By leveraging the diversity of the Lévy flight step length and the ability to avoid the influence of noisy data by jumping over long distances, the robustness of the flower pollination algorithm was improved. Then, a Gaussian perturbation strategy was proposed to address the critical imbalance between global exploration and local exploitation search capabilities of the flower pollination algorithm. The Gaussian distribution alters its curve according to the variation in the mean and variance, to improve the search capability, a large-scale population perturbation was implemented. Benchmark function experiments and WSN simulation experiments were conducted. The benchmark function experiments demonstrated that the proposed algorithm can achieve good search accuracy and convergence speed in different modes of benchmark functions. In the WSN simulation experiments, the proposed EFPA-G algorithm achieved lower localization error compared to similar algorithms such as PACS and MPA, which have been used in recent years, indicating better robustness. The main drawback of the proposed algorithm is that it depends on multiple complicated calculations, which may increase the overheads and power costs. Therefore, the proposed algorithm is more suitable for applications where there is little restriction of power consumption and overheads.

Author Contributions

Methodology, J.Z., T.Y. and D.Y.; Formal analysis, Z.Y.; Resources, Z.Y.; Data curation, W.X. and D.Y.; Writing—original draft, T.Y. and W.X.; Writing—review & editing, D.Y.; Supervision, J.Z. and W.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Natural Science Foundation of Hunan Province under Grant 2023JJ50045 and 2023JJ50046, and the Hunan Province for Postgraduate: QL20230275 and CX20231220. And general Program-Education Department of Zhejiang Province under Grant Y201737932.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Niyato, D.; Dobre, O.; Poor, H.V. 6g internet of things: A comprehensive survey. IEEE Internet Things J. 2022, 9, 359–383. [Google Scholar] [CrossRef]
  2. Bianchi, V.; Ciampolini, P.; Munari, I.D. Rssi-based indoor localization and identification for zigbee wireless sensor networks in smart homes. IEEE Trans. Instrum. Meas. 2019, 68, 566–575. [Google Scholar] [CrossRef]
  3. Sundhari, R.M.; Jaikumar, K. Iot assisted hierarchical computation strategic making (HCSM) and dynamic stochastic optimization technique (DSOT) for energy optimization in wireless sensor networks for smart city monitoring. Comput. Commun. 2020, 150, 226–234. [Google Scholar] [CrossRef]
  4. Du, C.; Gao, S.; Jia, N.; Kong, D.; Jiang, J.; Tian, G.; Su, Y.; Wang, Q.; Li, C. A high-accuracy least-time-domain mixture features machine-fault diagnosis based on wireless sensor network. IEEE Syst. J. 2020, 14, 4101–4109. [Google Scholar] [CrossRef]
  5. Liu, X.; Yin, J.; Zhang, S.; Ding, B.; Guo, S.; Wang, K. Range-based localization for sparse 3-d sensor networks. IEEE Internet Things J. 2019, 6, 753–764. [Google Scholar] [CrossRef]
  6. Tu, Q.; Liu, Y.; Han, F.; Liu, X.; Xie, Y. Range-free localization using reliable anchor pair selection and quantum-behaved salp swarm algorithm for anisotropic wireless sensor networks. Ad Hoc Netw. 2021, 113, 102406. [Google Scholar] [CrossRef]
  7. Wang, L.; Su, D.; Liu, M.; Du, X. Modified zeroing neurodynamics models for range-based wsn localization from aoa and tdoa measurements. IEEE Sens. J. 2022, 22, 13716–13726. [Google Scholar] [CrossRef]
  8. Shen, H.; Ding, Z.; Dasgupta, S.; Zhao, C. Multiple source localization in wireless sensor networks based on time of arrival measurement. IEEE Trans. Signal Process. 2014, 62, 1938–1949. [Google Scholar] [CrossRef]
  9. Liu, W.; Zhang, J.; Wei, W.; Qin, T.; Fan, Y.; Long, F.; Yang, J. A hybrid bald eagle search algorithm for time difference of arrival localization. Appl. Sci. 2022, 12, 5221. [Google Scholar] [CrossRef]
  10. Wang, P.; Zhou, R.; Fan, X.; Zhao, D. A distance estimation model for dv-hop localization in wsns. IEEE Trans. Veh. Technol. 2023, 72, 5290–5299. [Google Scholar] [CrossRef]
  11. Xue, D. Research of localization algorithm for wireless sensor network based on dv-hop. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 218. [Google Scholar] [CrossRef] [Green Version]
  12. Messous, S.; Liouane, H.; Liouane, N. Improvement of dv-hop localization algorithm for randomly deployed wireless sensor networks. Telecommun. Syst. 2020, 73, 75–86. [Google Scholar] [CrossRef]
  13. Cheikhrouhou, O.; Bhatti, G.M.; Alroobaea, R. A hybrid dv-hop algorithm using rssi for localization in large-scale wireless sensor networks. Sensors 2018, 18, 1469. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Messous, S.; Liouane, H.; Cheikhrouhou, O.; Hamam, H. Improved recursive dv-hop localization algorithm with rssi measurement for wireless sensor networks. Sensors 2021, 21, 4152. [Google Scholar] [CrossRef] [PubMed]
  15. Zhao, W.; Su, S.; Shao, F. Improved dv-hop algorithm using locally weighted linear regression in anisotropic wireless sensor networks. Wirel. Pers. Commun. 2018, 98, 3335–3353. [Google Scholar] [CrossRef]
  16. Liouane, H.; Messous, S.; Cheikhrouhou, O. Regularized least square multi-hops localization algorithm based on dv-hop for wireless sensor networks. Telecommun. Syst. 2022, 80, 349–358. [Google Scholar] [CrossRef]
  17. Liu, J.; Liu, M.; Du, X.; Stanimirovi, P.S.; Jin, L. An improved dv-hop algorithm for wireless sensor networks based on neural dynamics. Neurocomputing 2022, 491, 172–185. [Google Scholar] [CrossRef]
  18. Ou, X.; Wu, M.; Pu, Y.; Tu, B.; Zhang, G.; Xu, Z. Cuckoo search algorithm with fuzzy logic and gauss–cauchy for minimizing localization error of wsn. Appl. Soft Comput. 2022, 125, 109211. [Google Scholar] [CrossRef]
  19. Zhong, C.; Li, G.; Meng, Z. Beluga whale optimization: A novel nature-inspired metaheuristic algorithm. Knowl.-Based Syst. 2022, 251, 109215. [Google Scholar]
  20. Chopra, N.; Ansari, M.M. Golden jackal optimization: A novel nature-inspired optimizer for engineering applications. Expert Syst. Appl. 2022, 198, 116924. [Google Scholar]
  21. Chen, Y.; Pi, D.; Xu, Y. Neighborhood global learning based flower pollination algorithm and its application to unmanned aerial vehicle path planning. Expert Syst. Appl. 2021, 170, 114505. [Google Scholar]
  22. Mohanty, S.; Dash, R. A flower pollination algorithm based chebyshev polynomial neural network for net asset value prediction. Evol. Intell. 2023, 16, 115–131. [Google Scholar] [CrossRef]
  23. Kaya, E. Quick flower pollination algorithm (QFPA) and its performance on neural network training. Soft Comput. 2022, 26, 9729–9750. [Google Scholar] [CrossRef]
  24. Cao, H.Q.; Nguyen, H.X.; Tran, T.N.-C.; Tran, H.N.; Jeon, J.W. A robot calibration method using a neural network based on a butterfly and flower pollination algorithm. IEEE Trans. Ind. Electron. 2022, 69, 3865–3875. [Google Scholar] [CrossRef]
  25. Ozsoydan, F.B.; Baykasoglu, A. A species-based flower pollination algorithm with increased selection pressure in abiotic local pollination and enhanced intensification. Knowl.-Based Syst. 2021, 225, 107125. [Google Scholar] [CrossRef]
  26. Mergos, P.E. Optimum design of 3d reinforced concrete building frames with the flower pollination algorithm. J. Build. Eng. 2021, 44, 102935. [Google Scholar] [CrossRef]
  27. Dao, T.-K.; Nguyen, T.-T.; Nguyen, V.-T.; Nguyen, T.-D. A hybridized flower pollination algorithm and its application on microgrid operations planning. Appl. Sci. 2022, 12, 6487. [Google Scholar] [CrossRef]
  28. Sasikumar, A.; Subramaniyaswamy, V.; Jannali, R.; Rao, V.S.; Ravi, L. Design and area optimization of cmos operational amplifier circuit using hybrid flower pollination algorithm for iot end-node devices. Microprocess. Microsyst. 2022, 93, 104610. [Google Scholar]
  29. Ozsoydan, F.B.; Baykasoglu, A. Chaos and intensification enhanced flower pollination algorithm to solve mechanical design and unconstrained function optimization problems. Expert Syst. Appl. 2021, 184, 115496. [Google Scholar] [CrossRef]
  30. Chen, Y.; Li, X.; Ding, Y.; Xu, J.; Liu, Z. An improved DV-Hop localization algorithm for wireless sensor networks. In Proceedings of the 2018 13th IEEE Conference on Industrial Electronics and Applications, Wuhan, China, 31 May–2 June 2018; pp. 1831–1836. [Google Scholar]
  31. Chen, Y.; Pi, D. An innovative flower pollination algorithm for continuous optimization problem. Appl. Math. Model. 2020, 83, 237–265. [Google Scholar] [CrossRef]
  32. Liu, H.; Zhang, X.-W.; Tu, L.-P. A modified particle swarm optimization using adaptive strategy. Expert Syst. Appl. 2020, 152, 113353. [Google Scholar]
  33. Faramarzi, A.; Heidarinejad, M.; Mirjalili, S.; Gandomi, A.H. Marine predators algorithm: A nature-inspired metaheuristic. Expert Syst. Appl. 2020, 152, 113377. [Google Scholar]
  34. Wei, J.; Niu, H. A ranking-based adaptive cuckoo search algorithm for unconstrained optimization. Expert Syst. Appl. 2022, 204, 117428. [Google Scholar]
Figure 1. Comparison of proposed EFPA-G and other state-of-the-art algorithms for convergence performance ( D = 30 ).
Figure 1. Comparison of proposed EFPA-G and other state-of-the-art algorithms for convergence performance ( D = 30 ).
Sensors 23 06463 g001
Figure 2. Comparison of proposed EFPA-G and other state-of-the-art algorithms for convergence performance ( D = 30 ).
Figure 2. Comparison of proposed EFPA-G and other state-of-the-art algorithms for convergence performance ( D = 30 ).
Sensors 23 06463 g002
Figure 4. Comparison of proposed EFPA-G and other state-of-the-art algorithms for location error of general-shaped network.
Figure 4. Comparison of proposed EFPA-G and other state-of-the-art algorithms for location error of general-shaped network.
Sensors 23 06463 g004
Figure 5. Comparison of proposed EFPA-G and other state-of-the-art algorithms for location error of O-shaped network.
Figure 5. Comparison of proposed EFPA-G and other state-of-the-art algorithms for location error of O-shaped network.
Sensors 23 06463 g005
Table 1. The information of the benchmark functions used in this paper.
Table 1. The information of the benchmark functions used in this paper.
NameFunctionRange f opt
Sphere f 1 = i = 1 D x i 2 100 , 100 0
Schwefel 2.22 f 2 = i = 1 D x i + i = 1 D x i 10 , 10 0
Schwefel 1.2 f 3 = i = 1 D j = 1 i x j 2 100 , 100 0
Schwefel 2.21 f 4 = max 1 i D x i 100 , 100 0
Rosenbrock f 5 = i = 1 D 1 100 x i + 1 x i 2 2 + x i 1 2 30 , 30 0
Step f 6 = i = 1 D x i 100 , 100 0
Quartic f 7 = i = 1 D i x i 4 + r a n d o m 0 , 1 1.28 , 1.28 0
Zakharov f 8 = i = 1 D x i 2 + 0.5 i = 1 D i x i 2 + 0.5 i = 1 D i x i 4 5 , 10 0
Sum Squares f 9 = i = 1 D i x i 2 10 , 10 0
Ridge f 10 = x 1 + d i = 2 D x i 2 α , d = 1 , α = 0.5 5 , 5 −5
Xin-She Yang 3 f 11 = e i = 1 D x i β 2 m 2 e i = 1 D x i 2 · i = 1 D cos 2 x i 2 π , 2 π −1
Dixon&Price f 12 = x 1 1 2 + i = 2 D i 2 x i 2 x i 1 2 10 , 10 0
Schwefel 2.26 f 13 = 1 D i = 1 D x i sin x i 500 , 500 0
Rastrigin f 14 = i = 1 D x i 2 10 cos 2 π x i + 10 5.12 , 5.12 0
Ackley 1 f 15 = 20 e 0.02 D 1 i = 1 D x i 2 e D 1 i = 1 D cos 2 π x i + 20 + e 35 , 35 0
Griewank f 16 = i = 1 D x i 2 4000 i = 1 D cos x i i + 1 100 , 100 0
Generalized pen-
alized function 1
f 17 = π D 10 sin 2 π x 1 + i = 1 D x i 1 2 1 + 10 sin 2 π x i + x D 1 2 + i = 1 D u x i , 10 , 100 , 4 50 , 50 0
Generalized pen-
alized function 2
f 18 = 1 10 sin 2 3 π x 1 + i = 1 D 1 x i 1 2 1 + sin 2 3 π x i + 1 + 1 10 x D 1 1 + sin 2 π x D 2 + i = 1 D u x i , 5 , 100 , 4 50 , 50 0
Periodic f 19 = 1 + i = 1 D sin 2 x i 0.1 e i = 1 D x i 2 10 , 10 0.9
Ackley 4 f 20 = i = 1 D 1 e 0.2 x i 2 + x i + 1 2 + 3 cos 2 x i + sin 2 x i + 1 10 , 10 −4.59
Xin-She Yang 2 f 21 = i = 1 D x i e i = 1 D sin x i 2 2 π , 2 π 0
Xin-She Yang 4 f 22 = i = 1 D sin 2 x i e i = 1 D x i 2 e i = 1 D sin 2 x i 10 , 10 −1
Styblinski-Tank f 23 = 1 2 i = 1 D x i 4 16 x i 2 + 5 x i 5 , 5 0
Salomon f 24 = 1 cos 2 π i = 1 D x i 2 + 0.1 i = 1 D x i 2 100 , 100 39.16599 · D
Happy Cat f 25 = x 2 D 2 α + 1 D 1 2 x 2 + i = 1 D x i + 1 2 , α = 0.5 2 , 2 0
Qing f 26 = i = 1 D x i 2 i 2 500 , 500 0
Table 2. Results for unimodal and multimodal functions ( D = 30 ).
Table 2. Results for unimodal and multimodal functions ( D = 30 ).
FunctionAlgorithmFunctionAlgorithm
FPACMFPAMPSOMPARACSEFPA-GFPACMFPAMPSOMPARACSEFPA-G
f 1 Ave2.11E+011.19E+026.69E-629.61E-508.34E-150.00E+00 f 14 Ave8.45E+011.68E+021.17E+010.00E+001.19E-080.00E+00
Std1.26E+017.99E+013.66E-611.05E-496.55E-150.00E+00Std1.38E+011.39E+011.32E+010.00E+008.19E-090.00E+00
f 2 Ave6.21E+001.00E+011.39E-351.33E-272.75E-091.77E-178 f 15 Ave3.81E+004.26E+002.96E-153.08E-151.78E-010.00E+00
Std2.03E+002.06E+004.54E-351.72E-278.79E-100.00E+00Std1.03E+008.13E-011.35E-151.23E-154.26E-010.00E+00
f 3 Ave1.86E+018.07E+012.60E+027.83E-131.16E+030.00E+00 f 16 Ave6.30E-011.02E+000.00E+000.00E+001.53E-130.00E+00
Std9.71E+003.31E+011.54E+022.82E-125.61E+020.00E+00Std1.40E-014.63E-020.00E+000.00E+006.53E-130.00E+00
f 4 Ave7.71E+009.89E+003.13E-252.70E-191.30E-017.58E-177 f 17 Ave2.26E+013.14E+016.54E-025.95E-115.02E-147.64E-01
Std1.49E+001.75E+007.68E-252.34E-193.43E-020.00E+00Std7.89E+001.54E+011.24E-012.55E-113.08E-144.24E-01
f 5 Ave5.45E+024.47E+033.19E+012.24E+012.38E+012.78E+01 f 18 Ave6.96E+011.29E+024.33E-027.40E-103.34E-147.22E-02
Std4.30E+023.15E+033.17E+016.19E-013.96E+004.98E+00Std3.36E+018.84E+013.80E-023.21E-103.06E-143.70E-02
f 6 Ave1.87E+015.26E+010.00E+000.00E+000.00E+000.00E+00 f 19 Ave1.46E+003.51E+001.59E+001.00E+001.03E+009.00E-01
Std5.46E+001.48E+010.00E+000.00E+000.00E+000.00E+00Std6.81E-025.06E-015.13E-012.01E-036.42E-034.52E-16
f 7 Ave4.27E-025.71E-025.73E-044.08E-041.53E-029.56E-05 f 20 Ave1.15E+012.14E+01−3.93E+01−4.71E+01−4.81E+01−4.69E+01
Std1.36E-021.90E-022.95E-042.30E-044.10E-036.88E-05Std9.23E+009.55E+003.02E+001.94E+001.21E+004.47E+00
f 8 Ave4.70E+001.03E+016.02E+004.05E-093.81E+010.00E+00 f 21 Ave5.87E-126.34E-124.23E-117.30E-123.66E-127.98E-11
Std2.84E+005.64E+008.05E+004.15E-091.27E+010.00E+00Std2.32E-122.91E-124.29E-112.84E-122.07E-132.30E-10
f 9 Ave2.20E+001.37E+014.78E-661.68E-507.77E-160.00E+00 f 22 Ave3.35E-135.58E-121.62E-127.93E-213.59E-16−1.00E+00
Std1.08E+006.90E+001.09E-653.13E-503.31E-160.00E+00Std5.79E-141.57E-121.43E-123.42E-211.72E-160.00E+00
f 10 Ave−4.59E+00−3.85E+00−5.00E+00−5.00E+00−5.00E+00−1.50E+00 f 23 Ave−1.01E+03−8.47E+02−1.03E+03−1.11E+03−1.17E+03−6.73E+02
Std1.09E-012.63E-010.00E+001.77E-126.26E-108.97E-01Std1.27E+012.47E+013.96E+012.12E+011.79E-133.93E+01
f 11 Ave−2.56E-01−2.98E-019.95E-011.99E-019.95E-01−1.00E+00 f 24 Ave2.49E+002.55E+009.99E-021.10E-013.55E-011.33E-159
Std8.96E-018.64E-013.39E-169.91E-013.39E-160.00E+00Std3.29E-014.23E-016.30E-093.05E-024.97E-027.29E-159
f 12 Ave8.63E+004.28E+016.67E-016.67E-016.67E-012.55E-01 f 25 Ave5.31E-015.48E-012.06E-012.16E-011.68E-018.92E-01
Std3.97E+002.59E+011.96E-071.06E-094.35E-056.84E-03Std9.33E-026.84E-027.30E-024.65E-022.33E-022.02E-01
f 13 Ave−2.70E+02−1.79E+02−3.15E+02−3.36E+02−4.19E+02−1.41E+02 f 26 Ave9.19E+042.88E+063.52E+035.40E-011.98E-013.24E+03
Std6.91E+007.94E+002.01E+011.71E+011.00E+002.09E+01Std7.72E+043.60E+061.11E+041.66E+008.29E-028.43E+02
Bold values indicate that the function is optimal in experimental comparisons.
Table 3. Results for unimodal and multimodal functions ( D = 50 ).
Table 3. Results for unimodal and multimodal functions ( D = 50 ).
FunctionAlgorithmFunctionAlgorithm
FPACMFPAMPSOMPARACSEFPA-GFPACMFPAMPSOMPARACSEFPA-G
f 1 Ave3.50E+021.26E+031.43E-453.84E-467.23E-080.00E+00 f 14 Ave1.78E+023.33E+021.53E+010.00E+001.40E+000.00E+00
Std1.25E+024.98E+027.41E-457.34E-462.93E-080.00E+00Std1.97E+012.21E+013.36E+010.00E+009.42E-010.00E+00
f 2 Ave1.61E+012.20E+015.64E-323.88E-265.07E-051.80E-178 f 15 Ave4.49E+004.35E+004.19E-013.32E-151.23E+010.00E+00
Std1.70E+002.81E+002.11E-314.70E-261.03E-050.00E+00Std1.22E+001.06E+001.91E+039.01E-164.33E+000.00E+00
f 3 Ave3.77E+027.17E+022.84E+032.48E-081.17E+040.00E+00 f 16 Ave1.08E+001.35E+000.00E+000.00E+001.26E-080.00E+00
Std1.22E+022.57E+021.91E+031.02E-071.94E+030.00E+00Std2.88E-029.60E-020.00E+000.00E+001.83E-080.00E+00
f 4 Ave1.25E+011.35E+013.54E-221.36E-172.33E+001.74E-175 f 17 Ave3.23E+013.58E+012.50E+002.52E-099.05E-071.63E+00
Std1.91E+001.58E+001.39E-219.06E-184.29E-010.00E+00Std8.86E+001.56E+013.24E+006.82E-105.27E-076.35E-01
f 5 Ave1.26E+041.03E+054.92E+034.34E+015.76E+014.85E+01 f 18 Ave1.51E+021.85E+021.22E+004.90E-033.59E-071.12E-01
Std8.62E+036.20E+042.00E+045.44E-012.00E+016.88E-03Std6.45E+017.93E+011.41E+007.86E-031.22E-075.15E-02
f 6 Ave9.58E+011.71E+020.00E+000.00E+000.00E+000.00E+00 f 19 Ave3.11E+006.80E+002.30E+001.01E+001.35E+009.00E-01
Std1.38E+012.75E+010.00E+000.00E+000.00E+000.00E+00Std2.02E-016.73E-016.13E-017.12E-035.44E-024.52E-16
f 7 Ave1.52E-011.81E-018.88E-046.65E-043.05E-028.43E-05 f 20 Ave5.09E+017.40E+015.64E-32−7.44E+01−6.85E+01−7.95E+01
Std5.13E-025.37E-023.87E-043.84E-046.91E-039.02E-05Std1.37E+011.17E+016.51E+002.74E+001.45E+006.96E+00
f 8 Ave5.52E+018.81E+019.81E+016.66E-052.88E+020.00E+00 f 21 Ave1.96E-201.92E-208.90E-171.97E-203.71E-209.85E-19
Std1.66E+012.01E+015.53E+016.29E-055.32E+010.00E+00Std8.23E-217.09E-214.87E-166.74E-212.56E-212.37E-18
f 9 Ave6.94E+012.37E+029.73E-561.77E-461.43E-080.00E+00 f 22 Ave5.31E-213.44E-193.35E-203.93E-229.24E-22−1.00E+00
Std2.26E+017.41E+015.32E-552.91E-464.21E-090.00E+00Std5.86E-221.32E-195.13E-202.15E-211.15E-220.00E+00
f 10 Ave−3.47E+00−1.48E+00−5.00E+00−5.00E+00−5.00E+00−1.41E+00 f 23 Ave−1.57E+03−1.25E+03−1.71E+03−1.77E+03−1.96E+03−1.07E+03
Std2.93E-015.64E-011.65E-161.77E-112.99E-061.01E+00Std2.42E+014.17E+014.41E+013.19E+012.41E-077.78E+01
f 11 Ave−1.83E-016.93E-029.92E-01−5.22E-029.92E-01−1.00E+00 f 24 Ave4.66E+004.84E+009.99E-021.43E-017.64E-013.57E-159
Std8.98E-018.79E-013.39E-169.94E-013.39E-160.00E+00Std5.32E-015.70E-011.26E-085.04E-027.15E-021.90E-158
f 12 Ave2.26E+021.14E+035.24E+006.67E-016.80E-012.56E-01 f 25 Ave6.41E-016.84E-014.38E-014.46E-013.75E-019.90E-01
Std1.56E+024.97E+022.51E+013.00E-092.79E-021.49E-02Std6.72E-025.15E-028.45E-025.99E-024.25E-022.73E-01
f 13 Ave−2.39E+02−1.41E+02−2.64E+02−3.22E+02−4.18E+02−1.55E+02 f 26 Ave9.06E+068.09E+072.31E+068.69E+019.28E+011.87E+04
Std7.17E+007.54E+002.58E+011.27E+011.27E+005.49E+01Std5.34E+065.29E+078.35E+061.25E+022.08E+012.11E+03
Bold values indicate that the function is optimal in experimental comparison results.
Table 4. Comparison of proposed EFPA-G and other state-of-the-art algorithms for location error.
Table 4. Comparison of proposed EFPA-G and other state-of-the-art algorithms for location error.
General-Shaped NetworkO-Shaped Network
AlgorithmAverageBestStdAlgorithmAverageBestStd
Normalized Root Mean
Square Error (NRMSE %)
DV-Hop30.1224%24.4230%2.94E-02DV-Hop31.2086%25.3410%3.23E-02
FPA20.2731%20.2595%1.86E-04FPA24.9798%24.9442%3.60E-04
CMFPA20.2648%20.2629%8.87E-06CMFPA25.0067%24.9509%3.25E-04
MPSO20.1720%19.3034%3.39E-03MPSO25.0103%24.8910%4.42E-04
MPA20.2650%20.2649%6.17E-08MPA25.0280%25.0280%4.20E-07
RACS20.2650%20.2650%2.71E-15RACS25.0159%24.9552%2.76E-04
EFPA-G19.5182%19.0583%2.21E-03EFPA-G24.5535%24.0744%1.56E-03
Mean Distance Error (MDE)DV-Hop7.53E+006.11E+007.35E-01DV-Hop7.80E+006.34E+008.07E-01
FPA5.07E+005.06E+004.64E-03FPA6.24E+006.24E+009.01E-03
CMFPA5.07E+005.07E+002.22E-04CMFPA6.25E+006.24E+008.13E-03
MPSO5.04E+004.83E+008.48E-02MPSO6.25E+006.22E+001.10E-02
MPA5.07E+005.07E+001.54E-06MPA6.26E+006.26E+001.05E-05
RACS5.07E+005.07E+006.79E-14RACS6.25E+006.24E+006.91E-03
EFPA-G4.88E+004.76E+005.52E-02EFPA-G6.14E+006.02E+003.90E-02
Bold values indicate that the algorithm achieves the best in the experimental comparison results.
Table 5. Results of different proportions of anchor nodes.
Table 5. Results of different proportions of anchor nodes.
AlgorithmProportion of Anchor Nodes (%)
10203040
General-shaped networkDV-Hop39.38%31.29%30.12%30.48%
FPA26.85%20.50%20.27%18.97%
CMFPA26.84%20.44%20.27%18.97%
MPSO26.85%20.49%20.17%18.47%
MPA26.84%20.44%20.27%18.97%
RACS26.84%20.44%20.27%18.97%
EFPA-G25.94%20.45%19.52%18.02%
O-shaped networkDV-Hop37.66%31.49%31.21%29.70%
FPA34.14%25.50%24.98%25.79%
CMFPA33.91%25.51%25.01%25.79%
MPSO34.10%25.52%25.01%25.78%
MPA33.92%25.51%25.03%25.79%
RACS33.97%25.51%25.02%25.79%
EFPA-G33.41%25.45%24.56%25.14%
Bold values indicate that the algorithm achieves the best in the experimental comparison results.
Table 6. Results of different node communication radius.
Table 6. Results of different node communication radius.
AlgorithmCommunication Radius of Nodes (m)
15202530
General-shaped networkDV-Hop158.78%43.64%30.12%29.42%
FPA72.53%22.31%20.27%21.74%
CMFPA71.83%22.31%20.27%21.74%
MPSO71.90%22.68%20.17%21.58%
MPA71.83%22.31%20.27%21.74%
RACS71.84%22.31%20.26%21.74%
EFPA-G71.43%22.14%19.52%20.98%
O-shaped networkDV-Hop156.64%42.18%31.21%29.71%
FPA48.12%38.45%24.98%23.16%
CMFPA48.12%38.22%25.01%23.16%
MPSO47.97%39.05%25.01%23.17%
MPA48.12%38.23%25.03%23.15%
RACS48.12%38.12%25.02%23.16%
EFPA-G46.53%37.17%24.55%22.33%
Bold values indicate that the algorithm achieves the best in the experimental comparison results.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zheng, J.; Yuan, T.; Xie, W.; Yang, Z.; Yu, D. An Enhanced Flower Pollination Algorithm with Gaussian Perturbation for Node Location of a WSN. Sensors 2023, 23, 6463. https://doi.org/10.3390/s23146463

AMA Style

Zheng J, Yuan T, Xie W, Yang Z, Yu D. An Enhanced Flower Pollination Algorithm with Gaussian Perturbation for Node Location of a WSN. Sensors. 2023; 23(14):6463. https://doi.org/10.3390/s23146463

Chicago/Turabian Style

Zheng, Jun, Ting Yuan, Wenwu Xie, Zhihe Yang, and Dan Yu. 2023. "An Enhanced Flower Pollination Algorithm with Gaussian Perturbation for Node Location of a WSN" Sensors 23, no. 14: 6463. https://doi.org/10.3390/s23146463

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop