 Research
 Open Access
 Published:
A parallel WOA with two communication strategies applied in DVHop localization method
EURASIP Journal on Wireless Communications and Networking volume 2020, Article number: 50 (2020)
Abstract
Wireless sensor network (WSN) can effectively help us monitor the surrounding environment and prevent the occurrence of some natural disasters earlier, but we can only get the information of the surrounding environment correctly if we know the locations of nodes. How to know the exact positions of nodes is a strict challenge in WSN. Intelligent computing algorithms have been developed in recent years. They easily solve complex optimization problems, especially for those that cannot be modeled mathematically. This paper proposes a novel algorithm, named parallel whale optimization algorithm (PWOA). It contains two information exchange strategies between groups, and it significantly enhances global search ability and population diversity of the original whale optimization algorithm (WOA). Also, the algorithm is adopted to optimize the localization of WSN. Twentythree mathematical optimization functions are accustomed to verifying the efficiency and effectiveness of the novel approach. Compared with some existing intelligent computing algorithms, the proposed PWOA may reach better results.
Introduction
Algorithms of intelligent computing have achieved rapid development, and many animal swarm phenomenon inspires people to propose related new algorithms, such as whale optimization algorithm(WOA) [1–5], particle swarm optimization (PSO) [6–9], grey wolf optimization (GWO) [10, 11], cat swarm optimization (CSO) [12, 13], and artificial bee colony (ABC) [14]. They are successful examples of imitating intelligent behaviors of animals. In addition, in order to advance the performance of these algorithms, several methods are proposed [15–19]. The algorithms randomly separate individuals into a limited area in the first phase, and then they use a large variety of equations to update the positions of individuals. The PSO uses twoelements, i.e., p_{best} and g_{best}. They are used to adjust the velocity of individuals. The p_{best} attracts particles exploiting around the selfbest position and the g_{best} attracts particles exploiting around the global best position. When p_{best} has a relatively large weight, the algorithm has more chances to explore the promising area; on the contrary, the algorithm spends more time in exploiting around the global best position. The running process of CSO is similar to PSO, and it is inspired by cats. In the real world, the cats do not spend all time to catch prey, and they usually take more time to observe the around environments, so the algorithm introduces the modes of seeking and tracing to mimic the action of cats. In the first mode, each individual explores as many as possible areas around its position. While in another model, the population does something similar with PSO, and each individual aggregates to global best position. The ABC algorithm cancels the influence of the global best individual, and the bees have the probability to become onlooker bees or employed bees. The latter explores the environment around its position and according to fitness value, the former chooses one employed bee to follow. A better employed bee has a larger probability to be followed. Finally, the algorithm returns the best fitness value found by all bees. GWO algorithm makes subtle changes about the influence of the global best individual. In addition, the algorithm proposes an elaborate equation to imitate the catch movement of the grey wolf. The algorithm regards the average value of three elites as the prey, and other individuals exploit by far from or close to the prey.
With the development of WSN, there are many problems of security and data fusion in transmitting procedures [20–26]. People can conveniently obtain important information in many scenes, for example, forest fireprevention, predict nature disaster [27, 28], and rescue action after a disaster and marine monitoring. Utilizing the amount of data, we can predict something [29, 30]. To get correct information about monitor objects, the lives and positions of sensors are important for WSN [31–35]. A simple solution of this problem is to attach GPS to each node, but this way has a disadvantage, that is GPS is an expensive module, and the sizes of most sensor nodes are minor to conveniently layout, so it is not a practical way that all nodes equip with GPS modules. The node location of WSN usually consists of a range phase and evaluation phase. In the former phase, the distances of sensor nodes to anchors are evaluated by receiving signal strength indicator (RSSI) [36–38] and distance vectorhop (DVHop), and so on. This paper applies an intelligence computing algorithm to compensate for the deviation between the estimated position and actual position in the last phase.
In this paper, communication strategies are accustomed to advancing the property of WOA. We use 23 traditional mathematical test functions to indicate the performance of the novel algorithm, and the simulation results show it has better searchability than other existing algorithms. Furthermore, the new algorithm is applied to WSN localization and gets an excellent result.
The structure of this paper is as follows. In Section 2, we mainly introduce the WOA algorithm and DVHop method used in WSN localization. Section 3 explains in detail the proposed communication strategies of PWOA and how to combine the novel algorithm with DVHop method. The data from the simulation results are used to discuss the efficiency of the algorithm and the effectiveness of applying in the DVHop method in Section 4 and the summary of this paper in Section 5.
Related work
Whale optimization algorithm
Mirjalili et al., inspired by the prey action of whales, proposes the WOA algorithm, and this algorithm is a promising intelligence computing algorithm. The humpback whales’ hunting method is so interesting. They prefer to catch prey closing to the surface and this behavior is called bubblenet feeding method by people, because the hunting trails sometimes look like circles, and sometimes they look like the number nine.
The author provides the mathematical model about whale hunt action, and this model divides the hunt action into two phases, i.e., surrounding prey and bubblenet attacking method. The algorithm mimics the action of the whale population surrounding the prey. In the real world, the whale can recognize the position of prey, but we do not know where target prey is in a mathematical model, so the algorithm hypothesis the current global best position as the target prey and other whales gradually move to this position. The process of surrounding prey is presented as the following equations:
The t in the above equation means the current iteration number, V and U are variables that vary with the number of iterations. P^{t} and \(P_{\text {best}}^{t}\) are the individual locations and the global best position at the tth iteration and \(P_{\text {best}}^{t}\) will update when finding a better position. The values of V and U are calculated by the following equations:
The v decrease from 2 to 0 as the number of iterations increases and r is a random number between 0 and 1. The value of v is changing along with iteration, so the value of V is a variable between − 2 and 2. In the exploitation phase, the V is set to [ − 1, 1], and individuals can travel anywhere between their current locations and their prey. As V gets smaller and smaller, the population gets closer and closer to the prey, so the algorithm exploits promising areas around the current global best position.
The bubblenet attacking method mimics whale attacking the prey. This method consists of two approaches: shrinking encircling mechanism and spiral updating position. The former depends on the value of V in the Eqs. (2) and (3), on account of the v decrease, the encircle range is smaller gradually. In the next iteration, the position of the individual may be anywhere between the prey and its own position.
The spiral updating position makes full use of the cos function to simulate the shape of the whale’s hunting path. The equation below is used to update the position of an individual:
where D is calculated by Eq. (1), and it means the distance of the individual to the global best position ever found. The form of the logarithmic spiral is defined by s, and h is a rand number between − 1 and 1.
This algorithm uses probability to determine which approach is adopted, and the above two approaches have an equal chance to update the position of the individual. A question we must consider is that if the algorithm exploits around only one prey, the algorithm easily be trapped into local optimal value, so the algorithm uses a similarity equation to achieve explore operation. When V>1, the algorithm will randomly choose an individual as prey instead of the global best position. In other words, the algorithm randomly chooses an individual to replace the \(P^{t}_{\text {best}}\) of Eqs. (1) and (2). The below equations are used to present the mathematical model:
The \(P^{t}_{\text {rand}}\) is an individual chosen randomly from the current population.
Localization problem in WSN
WSN has been widely used in our life, for example, forest fireprevention, rescue action after a disaster, and marine monitoring. In order to obtain correct information, it is particularly important to accurately identify the location of nodes in the real world. Now the common methods are RSSI and DVHop, and the details of DVHop will be introduced in this section.
When solving the problem of localization in WSN, people often consider using the DVHop method [39]. This method estimates the linear distances between nodes by calculating the distance between each node, so it does not need complex hardware. Low cost and convenience to implement is the advantage of this method. The disadvantage of this method is the hop distance is used instead of the linear distance, so the results obtained by the DVHop method exists a larger error between actual distance and estimate distance.
Estimating distance about each hop is the key operation to recognize the positions of nodes in DVHop. After randomly decorating nodes, the method calculates the distances between anchor nodes and then calculates the distance of each hop of anchor nodes. Assume the method calculates the distance of each hop of A anchor node. Firstly, the method looks for the path with the least hops between A and the other anchor nodes. Then the method computes the distance of each hop of node A, which is the sum of their distances divided by the number of hops between them. To better illustrate the process of DVHop, we present Fig. 1.
We can see the distribution condition of the WSN in Fig. 1. Orange indicates the unknown nodes and unknown nodes mean they are not equipped with GPS models. The blue nodes are anchor nodes. There are ten routes from A to D. The method chooses the route that has minimal hops between A and D, so we utilize the same method to get the number of hops from A to B, C, D, and E, and they are 3, 2, 2, and 4, respectively. Assume the distances from A to B, C, D, and E are 12m, 8m, 12m, and 20m, respectively, and the distance of one hop of A is calculated by the equation below.
HopD_{i} indicates the distance of one hop of ith anchor node. The coordinates of the ith and jth anchor nodes are represented by (p_{i},q_{i}) and (p_{j},q_{j}). The hop_{ij} is minimal counts of hops from ith to jth anchor node. Then we acquire the distance that one hop of A anchor node is 4.73m. The distance is computed by multiplying the number of hops with the distance per hop.
A PWOA with two communication strategies applied in DVHop localization method
This section mainly introduces the communication strategies of PWOA. The communication strategy can transfer effective information between groups, so the performance of this algorithm is improved by using these communication strategies. After this, the localization problem in WSN is solved by the new algorithm.
Tribal annexation communication strategy
Normally, the swarm intelligence computing algorithm has one or two influence vectors, such as PSO, ABC, and CSO. The fewer influence vector leads to algorithms with faster convergence rates, but the algorithms are not rich in diversity. Traditional communication strategy in parallel algorithms is trying to change the information exchange way rather than the account of groups. In the process of civilization development, there are often annexation and integration between civilizations. In this way, although the weak civilization is annexed, as a new group, they learn the culture and technology of another advanced civilization.
Inspired by this, this communication strategy divides the population to many groups and starts to explore and exploit, respectively. This operation is similar to the selfdevelopment of the tribe, then after a certain number of iterations, two neighbor groups are merged to be a new group. For example, the first group and second group become a first group in the future iteration. Through this process, the new group has information about two groups before merging, so the global best individual of the new group needs to update. Figure 2 helps us better understand the merged process.
In the initial phase, this communication strategy divides the population into eight subgroups, so that the algorithm has more chances to avoid the local optimal value. At the later running process, this strategy by merging groups delivers the optimal information to a new group. In other words, the final group contains information about eight groups in the initial phase. Because this strategy explores the more promising area than the original WOA algorithm, so it has more chances to avoid local optimal value.
Herd mentality communication strategy
One of the challenges in our lives is to avoid doing the same things with others or being influenced by the actions of those around us. This phenomenon may make it difficult for us to do something. For example, more and more people study the knowledge about computers, and if you major computer, you would have the challenge of finding a comfortable job after graduating from university or college. But this phenomenon also can efficiently make sure you avoid some terrible things sometimes. Most people study computer knowledge, and although it is hard for you to find a comfortable job, you have more work chance, so you have a smaller probability of losing your job. This paper proposes a communication strategy that mimics the above phenomenon. This strategy divides the population into some groups, then respectively runs the traditional WOA algorithm. When the number of iteration reaches R_{2}, Eq. (9) is used to update the positions of some individuals which can be chosen randomly:
where the \(X_{R,d}^{t+1}\) indicates the value of a random individual in the dth dimension at the (t + 1) iteration and R is a random number between zero and group population size. The \(P_{\text {mean}_{d}^{t}}\) is the dth dimensional value of the mean position of all individuals at the tth iteration. This communication strategy randomly selects the same quantity of individuals from every group, and they are replaced by the P_{mean} in some dimension; if the algorithm produces a better position than a group’s best position, the algorithm would update the group’s best position. This communication strategy increases the diversity of the population by introducing the average position of the population so that individuals can have more choices to avoid the whole species having a similar value.
Apply the PWOA in DVHop localization method
In the second phase of localization, this paper utilizes the distance that has obtained in the first phase to recognize the position of the unknown node, and it applies PWOA in solving this problem. There are some distance errors between anchor nodes and unknown nodes, and it is calculated by the below equation:
The error_{j} indicates the sum of distance errors of jth unknow node to all anchor nodes. The (p_{i},q_{i}) is the coordinate of ith anchor node, and the position of the jth unknown node is represented by (p_{j},q_{j}). The m is the account of anchor nodes, and d_{ij} is the distance from the ith anchor node to jth unknow node estimated by the DVHop localization method. In order to improve the accuracy of localization, we utilize the following fitness equation and PWOA to achieve this object:
The d_{i} is the estimated distance between unknown nodes and ith anchor node. The actual position of the unknown node is (p,q) and the coordinate of the ith anchor node is represented by (p_{i},q_{i}). All individuals of WOA represent the positions of sensor nodes, then we use Eqs. (1), (2), (5), and (11) to find the best position in a limited area; in other words, we minimize the error of the unknown node.
Results and discussion
The simulation results that the novel algorithm under mathematical test functions and application effect in the DVHop localization method are shown in this section.
Simulation results on mathematic test function
Twentythree classical mathematical test functions in [10] are used to verify the performance of the novel algorithm in this paper. Although these functions are simple, they can distinguish the performance difference between the new algorithm and other algorithms.
To evaluate the performance of the novel approach, this paper compares the novel algorithm with the conventional optimization algorithm PSO and the original WOA algorithm. Table 1 shows the parameter settings of those compared algorithms.
The first communication strategy of PWOA (PWOAS1) is tribal annexation communication strategy, and the number of groups is reduced from eight to one in four separate processes. The iteration number is one thousand, so R_{1} is set to 250. The second communication strategy of PWOA (PWOAS2) is herd mentality communication strategy, and the value of R_{2} is smaller than R_{1} because the second communication strategy moves the population toward the mean position of the whole population. The more frequent communication between groups, the more stable the algorithm, and the algorithm has more chances to avoid trapping in a local optimal area.
In Table 2, we can see the results that the novel algorithm compares with PSO and original WOA algorithm in mean value and standard deviation of 30 runs. The PWOAS1 obtains 16 better results and 4 same results compared with PSO in all test functions. It has stronger searchability than original WOA in 10 test functions, and in 6 test functions, they produce similar results. The PWOAS2 acquires 15 better results and 4 same results than PSO, and in 9 test functions, it has better performance than the original WOA algorithm. The performance is the same for 6 test functions. In addition, we utilize the Wilcoxon method making nonparametric statistical hypothesis test [40], and we can see the test results from Table 3. The data is obtained by run 30 times for every test function. Some values are “NaN” because WOA under f_{9} or f_{11} test functions has the same value as PWOAS1 or PWOAS2. If the values of Table 3 are less than 0.05 means the performance of the novel algorithm is obviously better than other algorithms.
The test functions are chosen in this paper including unimodal functions and multimodal functions. From Fig. 3, we can obtain the convergence details of PSO, WOA, and PWOA under 23 classical mathematics test functions. To be faired prove the PWOA has better performance than PSO and WOA, the data used for plotting is the average result of 30 runs and the parameters of the algorithms as Table 1 shows.
As the novel algorithm has two communication strategies, it has more choices to avoid the local optimal value. Tribal annexation communication strategy separates the population into several groups in the initial phase and the groups merge into one group gradually. In this process, the final group contains all information of the initial groups, so this communication strategy has more chance to find the optimal value. Herd mentality communication strategy introduces the mean position value of the whole population to increase the diversity of the algorithm, so the algorithm can avoid local optimal value.
In most test functions, we can clearly see the difference in optimal results or convergence rates between 4 algorithms. But in f_{1} to f_{7}, the PWOA obtains similar results with WOA, except for f_{3} and f_{4}, because these functions are unimodal function. They are too simple to distinguish the performance difference between WOA and PWOA. In addition, the novel algorithm has a slower convergence rate than the WOA algorithm due to the communication action takes some time.
Compared with unimodal functions, there are many local optimal areas in multimodal function; if the algorithm has no powerful exploring ability, it would easily be trapped in a local optimal area. In f_{8} to f_{23} test functions, the PWOA algorithm is more competitive than other algorithms. In every certain number of iterations, the PWOA exchanges information between groups making the new algorithm obtain more exploration region information than the original algorithm. Through the comparison of the above experiments, we can get a conclusion that the PWOA algorithm has more outstanding performance than the original WOA and PSO algorithms.
Simulation results of PWOA applied in DVHop localization method
This paper combines PWOA with DVHop to solve the localization problem for WSN. We compare the simulation results of PWOAbased DVHop with DVHop, WOAbased DVHop, and PSObased DVHop. The coordinates of sensor nodes are calculated by the least square method in DVHop, while other methods use intelligent computing algorithms. All simulation experiments are implemented by MATLAB 2014a and the data is the average of 30 runs of independent trials. The iteration is set as 100 and other parameters are shown as in Table 1. The average localization error is used to evaluate the property of the localization method, which is given as follows:
The m is the number of unknown nodes, and ALE means average localization error of all unknown nodes in whole WSN. The (p_{e},q_{e}) is the estimated coordinate of the eth unknown node and the actual position of the eth unknown node is represented by (P_{e},Q_{e}). Each node has the same communication radius R.
Sensitivity of varying anchor node amount
In this experiment, randomly dispersing 200 nodes in a 100 m ×100 m sensing region. In each test, the number of anchor nodes was 5, 10, 15, 20, 25, 30, 35, and 40, respectively.
From Table 4, we can see that by comparing the DVHop and PSObased DVHop, the PWOA is more competitive. The more anchor nodes are placed, the estimated position of the unknown node is more accurate. In other words, the problem is easier to solve, so if there are a large number of anchor nodes, the performance difference would difficulty be found between algorithms.
Sensitivity of node density
In order to know the influence of node density on experimental data, each test has the same amount of anchor nodes and a different number of unknown nodes in this experiment, and we randomly disperse nodes in a 100 m × 100 m sensing region. The communication radius of all nodes is 20 m.
Table 5 shows that the localization error increases with the number of unknown nodes. This is because the number of unknown nodes influences the complexity of the WSN localization problem. From Table 5, we can see that in the case of a large number of unknown nodes, the performance of PWOAbased DVHop is better than other localization methods. So, the novel algorithm we proposed is more suitable for solving complex problems.
Figure 3 shows the variation of fitness value along with iteration number between algorithms, PWOAS1based DVHop, and PWOAS2based DVHop. There are 195 unknown nodes and 5 anchor nodes in this experiment, and the communication range of each node are 20 m. We can see the two novel communication strategies are both better than other algorithms. The proposed PWOA can be further improved by combining some useful methods [41–45].
Conclusion
In this paper, PWOA is presented to solve the WSN localization problem, and it consists of two communication strategies. The first strategy is by merging groups to achieve information communication, and it adequately exploits the promising area. The second strategy introduces the influence of the average position of the whole population. Through the 23 classical test functions, we clearly understand the performance of the new algorithm, and from simulation, we see the novel algorithm has competitive performance and good stability. Finally, we apply the novel algorithm in DVHop localization method and compare it with DVHop, PSObased DVHop, and WOAbased DVHop. Although the problem is so simple, the novel algorithm also gets excellent results.
In the future, we can further propose new communication strategies and combine the parallel method and other enhance ability method, and we believe that they can get excellent results.
Abbreviations
 ABC:

Artificial bee colony
 CSO:

Cat swarm optimization
 DVHop:

Distance vectorhop
 GWO:

Grey wolf optimization
 PSO:

Particle swarm optimization
 PWOA:

Parallel whale optimization algorithm
 PWOAS1:

First communication strategy of parallel whale optimization algorithm
 PWOAS2:

Second communication strategy of parallel whale optimization algorithm
 RSSI:

Receiving signal strength indicator
 WOA:

Whale optimization algorithm
 WSN:

Wireless sensor network
References
 1
S. Mirjalili, A. Lewis, The whale optimization algorithm. Adv. Eng. Softw.95:, 51–67 (2016).
 2
I. Aljarah, H. Faris, S. Mirjalili, Optimizing connection weights in neural networks using the whale optimization algorithm. Soft Comput.22(1), 1–15 (2018).
 3
M. M. Mafarja, S. Mirjalili, Hybrid whale optimization algorithm with simulated annealing for feature selection. Neurocomputing. 260:, 302–312 (2017).
 4
M. M. Ahmed, E. H. Houssein, A. E. Hassanien, A. Taha, E. Hassanien, in International Conference on Advanced Intelligent Systems and Informatics. Maximizing lifetime of wireless sensor networks based on whale optimization algorithm (Springer, 2017), pp. 724–733. https://doi.org/10.1007/9783319648613_68.
 5
A. R. Jadhav, T. Shankar, Whale optimization based energyefficient cluster head selection algorithm for wireless sensor networks. arXiv preprint arXiv:1711.09389 (2017).
 6
J. Kennedy, R. Eberhart, in Proceedings of ICNNŠ95International Conference on Neural Networks, 4. Particle swarm optimization (IEEE, 1995), pp. 1942–1948.
 7
J. F. Chang, S. C. Chu, J. F. Roddick, J. S. Pan, A parallel particle swarm optimization algorithm withcommunication strategies. J. Inf. Sci. Eng.21(4), 809–818 (2005).
 8
G. Liu, X. Huang, W. Guo, Y. Niu, G. Chen, Multilayer obstacleavoiding xarchitecture Steiner minimal tree construction based on particle swarm optimization. IEEE Trans. Cybern.45(5), 1003–1016 (2014).
 9
G. Liu, W. Guo, Y. Niu, G. Chen, X. Huang, A PSObased timingdriven Octilinear Steiner tree algorithm for VLSI routing considering bend reduction. Soft Comput.19(5), 1153–1169 (2015).
 10
S. Mirjalili, S. M. Mirjalili, A. Lewis, Grey wolf optimizer. Adv. Eng. Softw.69:, 46–61 (2014).
 11
P. Hu, J. S. Pan, S. C. Chu, Q. W. Chai, T. Liu, Z. C. Li, New hybrid algorithms for prediction of daily load of power network. Appl. Sci.9(21), 4514 (2019).
 12
S. C. Chu, P. W. Tsai, J. S. Pan, in Pacific Rim International Conference on Artificial Intelligence. Cat swarm optimization (Springer, 2006), pp. 854–858.
 13
P. W. Tsai, J. S. Pan, S. M. Chen, B. Y. Liao, Enhanced parallel cat swarm optimization based on the taguchi method. Expert Syst. Appl.39(7), 6309–6319 (2012).
 14
D. Karaboga, B. Basturk, On the performance of artificial bee colony (abc) algorithm. Appl. Soft Comput.8(1), 687–697 (2008).
 15
P. J. S. T. T. Nguyen, T. K. Dao, A compact bat algorithm for unequal clustering in wireless sensor networks. Appl. Sci.9(10), 1973 (2019).
 16
T. K. Dao, T. S. Pan, J. S. Pan, et al., Parallel bat algorithm for optimizing makespan in job shop scheduling problems. J. Intell. Manuf.29(2), 451–462 (2018).
 17
Z. Meng, J. S. Pan, K. K. Tseng, Pade: An enhanced differential evolution algorithm with novel control parameter adaptation schemes for numerical optimization. Knowl.Based Syst.168:, 80–99 (2019).
 18
T. T. Nguyen, J. S. Pan, T. K. Dao, An improved flower pollination algorithm for optimizing layouts of nodes in wireless sensor network. IEEE Access. 7:, 75985–75998 (2019).
 19
S. C. Chu, X. Xue, J. S. Pan, X. Wu, Optimizing ontology alignment in vector space. J. Internet Technol. (2020). https://doi.org/10.3966/160792642020012101002.
 20
C. M. Chen, B. Xiang, Y. Liu, K. H. Wang, A secure authentication protocol for internet of vehicles. IEEE Access. 7:, 12047–12057 (2019).
 21
C. M. Chen, K. H. Wang, K. H. Yeh, B. Xiang, T. Y. Wu, Attacks and solutions on a threeparty passwordbased authenticated key exchange protocol for wireless communications. J. Ambient. Intell. Humanized Comput.10(8), 3133–3142 (2019).
 22
T. Y. Wu, C. M. Chen, K. H. Wang, C. Meng, E. K. Wang, A provably secure certificateless public key encryption with keyword search. J. Chin. Inst. Eng.42(1), 20–28 (2019).
 23
J. Wang, Y. Gao, K. Wang, A. K. Sangaiah, S. J. Lim, An affinity propagationbased selfadaptive clustering method for wireless sensor networks. Sensors. 19(11), 2579 (2019).
 24
J. Wang, Y. Gao, W. Liu, W. Wu, S. J. Lim, An asynchronous clustering and mobile data gathering schema based on timer mechanism in wireless sensor networks. Comput. Mater. Contin.58:, 711–725 (2019).
 25
J. Wang, X. Gu, W. Liu, A. K. Sangaiah, H. J. Kim, An empower hamilton loop based data collection algorithm with mobile agent for WSNS. Hum.Centric Comput. Inf. Sci.9(1), 18 (2019).
 26
J. Wang, Y. Gao, W. Liu, A. K. Sangaiah, H. J. Kim, An intelligent data gathering schema with data fusion supported for mobile sink in wireless sensor networks. Int. J. Distrib. Sensor Netw.15(3), 1550147719839581 (2019).
 27
C. I. Wu, H. Y. Kung, C. H. Chen, L. C. Kuo, An intelligent slope disaster prediction and monitoring system based on WSN and ANP. Expert. Syst. Appl.41(10), 4554–4562 (2014).
 28
H. Y. Kung, C. H. Chen, H. H. Ku, Designing intelligent disaster prediction models and systems for debrisflow disasters in Taiwan. Expert. Syst. Appl.39(5), 5838–5856 (2012).
 29
C. H. Chen, An arrival time prediction method for bus system. IEEE Int. Things J.5(5), 4231–4232 (2018).
 30
C. H. Chen, F. J. Hwang, H. Y. Kung, Travel time prediction system based on data clustering for waste collection vehicles. IEICE Trans. Inf. Syst.102(7), 1374–1383 (2019).
 31
J. S. Pan, L. Kong, T. W. Sung, P. W. Tsai, V. Snášel, αfraction first strategy for hierarchical model in wireless sensor networks. J. Int. Technol.19(6), 1717–1726 (2018).
 32
J. S. Pan, L. Kong, T. W. Sung, P. W. Tsai, V. Snášel, A clustering scheme for wireless sensor networks based on genetic algorithm and dominating set. J. Int. Technol.19(4), 1111–1118 (2018).
 33
C. H. Chen, C. A. Lee, C. C. Lo, Vehicle localization and velocity estimation based on mobile phone sensing. IEEE Access. 4:, 803–817 (2016).
 34
W. Li, Z. Chen, X. Gao, W. Liu, J. Wang, Multimodel framework for indoor localization under mobile edge computing environment. IEEE Int. Things J.6(3), 4844–4853 (2018).
 35
W. Guo, J. Li, G. Chen, Y. Niu, C. Chen, A PSOoptimized realtime faulttolerant task allocation algorithm in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst.26(12), 3236–3249 (2014).
 36
A. Awad, T. Frunzke, F. Dressler, in 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools (DSD 2007). Adaptive distance estimation and localization in WSN using RSSI measures (IEEE, 2007), pp. 471–478. https://doi.org/10.1109/dsd.2007.4341511.
 37
M. Demirbas, Y. Song, in 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’06). An rssibased scheme for sybil attack detection in wireless sensor networks (IEEE, 2006), p. 5. https://doi.org/10.1109/wowmom.2006.27.
 38
K. Benkic, M. Malajner, P. Planinsic, Z. Cucej, in 2008 15th International Conference on Systems, Signals and Image Processing. Using RSSI value for distance estimation in wireless sensor networks based on ZigBee (IEEE, 2008), pp. 303–306. https://doi.org/10.1109/iwssip.2008.4604427.
 39
X. Chen, B. Zhang, Improved DVHop node localization algorithm in wireless sensor networks. Int. J. Distrib. Sensor Netw.8(8), 213980 (2012).
 40
S. Mirjalili, S. M. Mirjalili, X. S. Yang, Binary bat algorithm. Neural Comput. & Applic.25(34), 663–681 (2014).
 41
H. Wang, S. Rahnamayan, H. Sun, M. G. Omran, Gaussian barebones differential evolution. IEEE Trans. Cybern.43(2), 634–647 (2013).
 42
J. S. Pan, P. Hu, S. C. Chu, Novel parallel heterogeneous metaheuristic and its communication strategies for the prediction of wind power. Processes. 7(11), 845 (2019).
 43
J. S. Pan, C. Y. Lee, A. Sghaier, M. Zeghid, J. Xie, Novel systolization of subquadratic space complexity multipliers based on toeplitz matrixvector product approach. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. (2019). https://doi.org/10.1109/tvlsi.2019.2903289.
 44
C. Sun, Y. Jin, R. Cheng, J. Ding, J. Zeng, Surrogateassisted cooperative swarm optimization of highdimensional expensive problems. IEEE Trans. Evol. Comput.21(4), 644–660 (2017).
 45
X. Xue, J. Chen, X. Yao, Efficient user involvement in semiautomatic ontology matching. IEEE Trans. Emerg. Top. Comput. Intell. (2018). https://doi.org/10.1109/tetci.2018.2883109.
Funding
This research received no external funding.
Author information
Affiliations
Contributions
QC proposed the idea of communication strategies. SC carried out the simulations and drafted the paper. JP supervised the work and introduced the idea of applying the proposed algorithm in localization of WSN. PH and WZ gave some suggestions for the article and revised the manuscript. All authors read and approved the final manuscript.
Corresponding author
Correspondence to JengShyang Pan.
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Chai, Q., Chu, S., Pan, J. et al. A parallel WOA with two communication strategies applied in DVHop localization method. J Wireless Com Network 2020, 50 (2020). https://doi.org/10.1186/s1363802001663y
Received:
Accepted:
Published:
Keywords
 Parallel
 WOA
 Communication strategy
 DVHop