Next Article in Journal
Frequency Selective Surface for Ultra-Wide Band Filtering and Shielding
Next Article in Special Issue
Mobile-BAT—A Novel Ultra-Low Power Wildlife Tracking System
Previous Article in Journal
Transmission Line Vibration Damper Detection Using Deep Neural Networks Based on UAV Remote Sensing Image
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Swarm Optimization for Energy-Based Acoustic Source Localization: A Comprehensive Study

1
COPELABS, Universidade Lusófona de Humanidades e Tecnologias, Campo Grande 376, 1749-024 Lisboa, Portugal
2
VALORIZA—Research Centre for Endogenous Resource Valorization, Instituto Politécnico de Portalegre, Campus Politécnico n.10, 7300-555 Portalegre, Portugal
3
Instituto de Telecomunicações, Instituto Superior Técnico, Universidade de Lisboa, 1049-001 Lisboa, Portugal
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(5), 1894; https://doi.org/10.3390/s22051894
Submission received: 5 February 2022 / Revised: 23 February 2022 / Accepted: 24 February 2022 / Published: 28 February 2022

Abstract

:
In the last decades, several swarm-based optimization algorithms have emerged in the scientific literature, followed by a massive increase in terms of their fields of application. Most of the studies and comparisons are restricted to high-level languages (such as MATLAB®) and testing methods on classical benchmark mathematical functions. Specifically, the employment of swarm-based methods for solving energy-based acoustic localization problems is still in its inception and has not yet been extensively studied. As such, the present work marks the first comprehensive study of swarm-based optimization algorithms applied to the energy-based acoustic localization problem. To this end, a total of 10 different algorithms were subjected to an extensive set of simulations with the following aims: (1) to compare the algorithms’ convergence performance and recognize novel, promising methods for solving the problem of interest; (2) to validate the importance (in convergence speed) of an intelligent swarm initialization for any swarm-based algorithm; (3) to analyze the methods’ time efficiency when implemented in low-level languages and when executed on embedded processors. The obtained results disclose the high potential of some of the considered swarm-based optimization algorithms for the problem under study, showing that these methods can accurately locate acoustic sources with low latency and bandwidth requirements, making them highly attractive for edge computing paradigms.

1. Introduction

In the last decade, swarm optimization methods have found their way into the scientific community, where several algorithms have been proposed and applied in real-life problems. In computer science, swarm optimization assumes a set of sequential operations, where a candidate population is iteratively improved according to a measure of quality (the cost/objective/fitness function). As the opposite of gradient-based optimization [1], these algorithms assume no knowledge of the problem itself, and a candidate population evolves only according to the evaluation of a given cost function. As such, the method uses a combination of random choices and historical knowledge of past results to guide and drive its evolution through the search space, providing a sufficiently good solution, but without the guarantee of achieving a global solution (metaheuristics). The use of metaheuristics to solve optimization problems goes back to the 1970s with the work of J. Holland and the proposal of genetic algorithms (GAs) [2]. The method consisted of a search heuristic based on Charles Darwin’s theory of natural evolution [3]. The proposed methodology reflected the process of natural selection where the fittest individuals are selected for reproduction to produce the next generation. Although still widely applied nowadays [4], GAs, together with simulated annealing (SA) [5] or hill-climbing methods [6], have shown slow convergence towards sub-optimal solutions [7]. Though GA and SA are related to biological evolution and physical proprieties of materials, respectively, the first algorithm based on swarm intelligence was proposed to mimic the finding of good paths by ants [8]. The search technique was inspired by modeling the swarm intelligence of social ants using a pheromone as a chemical messenger [8]. The Particle Swarm Optimization (PSO) algorithm followed [9] with the premise of representing the movement of particles in a bird flock, and it was widely applied and with numerous variants proposed over the years [10]. At the turn of the 21st century, the authors of [11] proposed a music-inspired algorithm called Harmony Search (HS), and around 2002, K. M. Passino presented a Bacteria Foraging algorithm [12]. In 2004, S. Nakrani and C. Tovey published the Honey Bee algorithm [13] that they applied to Internet hosting centers, which was followed by a novel bee algorithm [14] and the Artificial Bee Colony (ABC) in 2007 [15]. Later, in 2008, the Firefly (FA) algorithm was published, inspired by the flashing behavior of fireflies. In 2009, the Cuckoo Search (CS) algorithm [16] was proposed, based on the obligate brood parasitic behavior of some cuckoo species in combination with the Lévy flight behavior of some birds and fruit flies. The decade ended with the publishing of the Bat algorithm (BAT), which was inspired by the echolocation behavior of micro-bats [17].
At this stage, the fundamentals of swarm intelligence had been established. Simple software agents (or particles) move in the search space of a predetermined optimization problem, where the position of a particle represents a candidate solution to the problem at hand. Each particle evolves by updating its position according to rules inspired by their behavioral models. Those rules rely on the best, current, or past position(s), as well as some randomly generated variables, combined with simple arithmetic. From this point, numerous algorithms have been raised in the scientific literature, and most publishers have created journals dedicated to the subject. As a major feature, the efficiency of a metaheuristic algorithm relies on the right balance between exploration (also known as diversification) and exploitation (or intensification), where exploration describes the ability of the algorithm to leave the current optimum in search of a better candidate, and exploitation is defined as the ability of the algorithm to improve the best solution it has found so far by searching a small area around the current solution [18]. In swarm-based optimization, this balance is archived through the control of a set of parameters with a direct impact on its performance, making them dependent on accurate parameterization [19]. This situation implies that different algorithms may have different performances with regard to the same problem. In addition, since these methods are based on an iterative evolution of the first state of a population, their initialization plays an important role in the performance achieved, and may even imply a lack of convergence [20]. Generally, algorithms are evaluated within a set of mathematical functions considered as representative for a wide range of features, such as convexity, continuity, differentiability, etc., but where the obtained performance cannot be conveyed to real-life physical models. This suggests that choosing a specific algorithm for a certain problem may not be a trivial task, especially due to the large number of swarm-based methods available.
There are many applications in which efficiently (accurately and promptly) solving the localization problem is crucial, such as navigation [21], underwater networks [22], surveillance [23,24], or power systems [25,26]. When considering the fourth industrial transformation and the fundamental advanced digital changes—known as Industry 4.0—robust and precise localization can be seen as a key feature in pervasive systems in future industry and factory applications. More specifically, it is necessary for a wide range of industrial applications to perform the localization of acoustic sources. In addition, sound localization may be a valuable instrument for analyzing the workflow of vital machinery (pumps, motors, electric drives, or fans). Such machinery can be targeted for noise reduction, where its noise footprint can be analyzed and compared between diverse workflows or product life spans [27]. In the context of predictive maintenance, one can find applications for preventing structural failure [28], leak localization [29], or nondestructive localization of cracks [30]. In its early stages, the PSO algorithm [9,10] was also used for solving some acoustic localization problems, namely, those related to the localization of partial discharge sources in power transformers [31,32]. Both non-linear and binary forms of the optimization algorithm were successfully applied [25,33]. The PSO algorithm contributed to the beginning of a new approach to the nonlinear optimization problem. As one of the most cited works in the scientific literature, it is still applied in several fields due to its phase-correcting structure for electromagnetic band-gap resonators [34], time-delay equalizer meta-surface for electromagnetic band-gap resonator antennas [35], or artificial magnetic conductor design [36].
From a physical point of view, several approaches exist for acquiring the necessary signals to achieve the localization of an acoustic source. Solutions based on time of arrival [37], time difference of arrival [38], or direction of arrival [39] are well-known examples in the literature; however, they depend on high-precision hardware for timing purposes or on microphone sensor arrays for angle perception, which might drastically raise the network implementation costs. On the contrary, solutions based on energy measurements are much more flexible to deploy, but are capable of achieving good performance. For this reason, only energy-based localization will be under analysis in the present work (however, the extrapolation to any range-based localization method is straightforward). The energy decay model was initially proposed by conducting field experiments with the sound emitted from an engine [40]. The localization approach considers averaging the energy information of the received acoustic signal data samples, standing out for lower bandwidth, since it is sampled at a much lower rate [41]. The energy-based acoustic location (EBAL) problem has traditionally been approached with deterministic algorithms [42,43]. The least-squares method was applied in [44], considering weighted terms and a correction technique. Although it offers certain gains, principally due to the correction performed, its performance might be severely deteriorated in surroundings with high noise powers because of the neglect of the second-order noise terms. Considering the non-convexity of the EBAL problem, the authors in [45,46] proposed the use of convex optimization methods, namely, by applying semi-definite programming relaxations to convert it into a convex one. By contemplating the solution offered by in [45,46], one understands that it is actually circumvented by resorting to a set of convex relaxations that result in increased computational burden. Therefore, more convenient methods were proposed in [47,48,49], where the authors had to take recourse to second-order cone programming techniques. Even though estimators founded on convex optimization render good performance in general, even in surroundings with large noise powers, their biggest shortcoming was related with their computational burden, which was a polynomial function of the network size. The use of a black-box model, namely, a feed-forward neural network, was proposed in [50], showing equivalent or even improved performance in comparison with state-of-the-art methods while being computational simpler. Nonetheless, these results were obtained in a constrained simulated environment whereby it was possible to generate perfect and abundant training data, something that is not typically available in real scenarios. The use of metaheuristics to tackle the acoustic localization problem, namely, Elephant Herding Optimization (EHO) [51,52], was firstly proposed in [53], and its implementation was validated in [54]. The results in [54] demonstrated that the EHO algorithm could supplant deterministic methods for high values of the measurement noise, as it is computational simpler. Ultimately, taking advantage of specific information about the problem layout to intelligently initialize the population, an improved EHO (iEHO) showed even better accuracy, with good results over a wide range of measurement noises, network size, and even in tracking scenarios [55,56]. This is one of the main reasons for why this work studies swarm-based techniques. Considering (1) the good results obtained by the EHO and iEHO, as well as the vast range of existent swarm-based algorithms, and (2) the performance gain in using an intelligent swarm initialization with EHO, the following questions arise: (1) Can the performances obtained by the EHO be achieved or even exceeded by other swarm-based algorithms? (2) Can the population initialization proposed for the iEHO improve the performance of all swarm-based algorithms? To answer these questions, a total of 10 swarm-based methods were applied to the EBAL problem and tested in this extensive work.
The biggest advantage of swarm-based methods over deterministic approaches is their low computational cost, making them highly attractive for edge computing paradigms by reducing latency and saving bandwidth. When embedded processing is at stake, either by running the algorithms at the edge of the network or even on the sensors, computational complexity and processing time play an important role in selecting the appropriate method [57]. Since its origin in the late 1990s for delivering video content from edge servers [58], edge computing has shown several advantages concerning the reduction of bandwidth and payload overlay [59]. Referring to the acoustic localization problem, running the location algorithm at the edge of the network allows less traffic (since only calculated coordinates are transmitted) and advantages related to privacy and security (since the architecture provides computing and memory storage options close to the device itself) [60]. Secondly, by allocating all of the processing to the edge, the number of sensor nodes and the covered area can grow without the need for centralized data center processing and networking power to increase. Actually, only the number of edge servers would grow proportionally. Nevertheless, these are much cheaper devices, and because of the distributed computing paradigm, networking congestion that could occur on a centralized data center would be avoided. Finally, to implement the solution on edge devices, it is crucial (and sometimes the only option) to do it using low-level programming languages, since the memory and processing are limited. This further increases the importance of the presented work, where the selected algorithms (with implementations available online, but only in MATLAB® or Python) were implemented from scratch in the C language and tested through exhaustive simulations on several embedded devices. It is common that the localization problem is represented through non-linear, non-differentiable, and non-continuous models, where a metaheuristic supplants its counterparts. Even though these methods recently gained a lot of attention, to the best of our knowledge, no comprehensive study about their effectiveness in tackling target localization exists in the literature. Therefore, this work should be seen as a guide and our initiative to incentivize researchers to tackle the localization problem by applying metaheuristic tools. Hence, this review also adds an important contribution to the current state of the art when it comes to computing the localization problem through swarm-based algorithms on edge platforms.
Based on the above discussion and the results obtained, the main insights and contributions of the present work are summarized as follows: (1) application of several of the most significant and up-to-date swarm-based techniques to the EBAL problem and assessing their performance with regard to convergence and localization error; (2) integration of the intelligent initialization technique proposed in [55] (but only integrated with EHO) with all of these swarm techniques to generally validate the improvements in convergence speed for any swarm algorithm; (3) evaluation of the time efficiency of these methods when executed on embedded processors, thus proving the feasibility of the approach for any real edge computing scenario.
The remainder of the paper is organized as follows. Section 2 defines the methodology adopted for the comprehensive study. Section 3 formulates the theoretical background on both energy-based acoustic localization and swarm-based optimization. Section 4 presents a detailed implementation of the testing procedure with regard to the embedded setup and selected algorithms. Section 5 provides the obtained results and their discussion, and lastly, Section 6 concludes the paper and provides possible future directions of research.

2. Methodology

On the one hand, when considering the first steps in swarm-based optimization, algorithms such as Ant System [8] and Particle Swarm Optimization [9] are immediately noticed. Since they are accepted as the first methods based on swarm intelligence, it is common to reference them as landmarks. Currently, considering the metrics from Google Scholar (https://scholar.google.com/, accessed on 10 September 2020), both exceed several tens of thousands of citations. On the other hand, until the present day, more than two hundred algorithms have been proposed in the literature, which makes the process of choosing an algorithm for a given problem somewhat complex. In order to choose the methods to be implemented in the current study, the databases of several publishers (MDPI, IEEE, Elsevier, Springer, Sage, IOS Press, Science Open, AIP, Inder-Science, Wiley and Sons, Emerald, and Taylor and Francis) were searched to collect the published swarm-based methods, which were ordered by year and number of citations per year while considering their date of publication and Google Scholar for the citation metrics. The landmark PSO and ANT algorithms are usually objects of comparison for new proposals, where novel methods present improvements in relation to the first two; hence, they were not targeted for implementation. Then, Cuckoo Search (CS) [16] was considered for implementation, as it was the most cited method published in the first decade of the current century, with a mean value of 464 citations per year. To reduce the time grid in recent years, from this point on, the analysis was performed with a five-year interval. Between 2010 and 2014, three algorithms stood out, namely, the Grey Wolf Optimizer (GWO) [61] with 4112 citations (685 citations/year), the Bat Algorithm [17] (a total of 3753 citations or 375 citations/year), and the Teaching–Learning-Based Optimization (TLBO) algorithm [62] (with a total of 2227 citations or 247 citations/year). As such, the GWO algorithm was considered for implementation as representative of the 2010–2014 time window. Then, for the 2015–2019 quinquennium, the methodology was once again refined, and a year-by-year approach is considered. Based on the metric analysis, in 2015, the Moth–Flame Optimization algorithm (MFO) [63] was the most cited method, with a total of 1167 citations or 233 citations/year, and it was selected for implementation. Consequently, the Whale Optimization (WOA) [64] and the Salp Swarm (SSA) [65] algorithms, with 557 and 298 citations/year in 2016 and 2017, respectively, were considered for implementation. With regard to 2018, two algorithms were considered. Firstly, the Tree Growth Algorithm (TGA) [66] with 45 citations or 23 citations/year and, secondly, the Coyote Optimization Algorithm (COA) [67] were considered because they were some of the few methods that divide a population into groups, similarly to the Elephant Herding Optimization (EHO) [51] algorithm. Similarly and for the same reasons, in 2019, two algorithms were selected for implementation. Firstly, the Supply–Demand-Based Optimization (SDO) [68] was chosen for its novelty, and Enhanced Elephant Herding Optimization (EEHO) [69] was chosen, as it also considers its population divided and manages it in groups. It should be noted that this latest publication corrected three important flaws (each regarding unjustified convergence towards the search space’s origin, unbalanced exploration/exploitation trade-off, and skewed agent distribution) in relation to its original version, which is why the first EHO [51] method will not be considered. It is worth mentioning that other methods with a higher number of citations were published in 2019, e.g., the Squirrel Search [70] or the Harris Hawks Optimization [71] algorithms. However, they will not be considered here due to their similarities with other already implemented methods, namely, CS and GWO. Finally, in 2020, several new methods could still be found in various publications. Since considering the number of citations would be highly influenced by the month of publication, this criterion was not taken into account. Instead, the Momentum Search Algorithm (MSA) [72] was considered due to its inspiration from a physical principle instead of the behavior of living beings. A complete list of the methods selected for analysis is presented in Table 1, along with the number of citations obtained from Google Scholar (accessed in September 2020). For the citations/year metric, the total number of citations was divided by the publication year and subtracted from the current year. A more detailed list of all of the considered algorithms is presented in Appendix B.
After having stated the criteria for selecting the algorithms to implement, it remains to define the hardware processing platform and the programming language. As previously stated, the present work intends to validate decentralized implementations of the acoustic localization problem (namely, over edge computing), apart from accuracy and feasibility. In other words, the algorithms must run on low-complexity and low-clock-rate processors. As such, the obtained results will be closely in line with practical implementations in real contexts. For that purpose, the completion relies on two main features: (1) all algorithms are implemented in the C language; (2) the code runs on embedded processors. These features contrast with the usual testing procedures developed in high-level languages (most commonly, in MATLAB®) and executed on high-performance computers, where issues such as floating points, matrix operations, and mathematical functions (e.g., trigonometric functions) are generally well established. Basically, the fact that good performance and convergence results are obtained on high-level platforms does not guarantee operation on computer systems with lower capabilities, namely, embedded systems. On the contrary, however, validations carried out in an embedded context guarantee the operation of algorithms on high-level platforms, taking into account that the change is towards computational improvement. As such, the present work considers the assessment of the selected swarm-based optimization algorithms on BroadcomTM BCM series processors based on ARM® architectures, which are well known for their use on Raspberry Pi FoundationTM electronic boards.
To comprehensively assess the performance of swarm-based methods applied to the acoustic source localization problem, a wide range of processors with different memory capacities and different clock speeds were considered. The set of hardware modules consisted of several Raspberry Pi modules, which went from 700 MHz to 1.5 GHz clock frequencies, and they had 512 MB to 4 GB of RAM and CPU buses that were 32 and 64 bits wide, running the Raspberry Pi Lite operating system. In total, five different modules were used, and their main features are summarized in Table 2. The applicability of Raspberry Pi modules for edge computing applications has been considered in the literature for smart manufacturing [74], smart agriculture [75], and smart surveillance [76]. Nevertheless, when processing requirements increase, shortcomings in terms of performance have been reported [77]. Thus, the use of more computationally efficient algorithms (with lesser computational requirements) is of major importance.
To conclude, the selected swarm-based methods were evaluated on the five modules, seeking: (1) analysis and comparison of convergence and accuracy; (2) validation of improvements by population initialization; (3) validation and analysis of execution times.

3. Theoretical Background

The current section intends to provide the necessary theoretical background on both the formulation of the energy-based localization problem and swarm-based optimization.

3.1. Energy-Based Acoustic Source Localization

The energy-based acoustic model, which was initially proposed in [40], implies that the observation at a given sensor i decays with a ratio inversely proportional to the distance between the sensor and the acoustic source, according to:
y i = g i P | | x s i | | β
where g i is the gain of sensor i, P is the transmitted power, x and s i are the source and sensor coordinates, and, finally, β is a decay propagation factor that is dependent on environmental conditions. For the sake of simplicity, an outdoor scenario without reverberation or reflections is considered here, and thus, β = 2 [40]. In the case of a two-dimensional problem, x = x x a ^ i + x y a ^ j and s i = s i x a ^ i + s i y a ^ j , where a ^ i and a ^ j are the coordinate unit vectors. The extension to higher-dimensional problems is straightforward. By employing the observations defined in (1), the maximum likelihood (ML) estimator of x can be formulated as [53]:
x ^ = arg min x i = 1 N y i g i P | | x s i | | 2 2 .
ML is one of the most commonly employed estimators [53], since it is asymptotically efficient (for large enough data records). This estimator, however, depends on the noise statistics and might produce very different optimal solutions for different noise models used for the same problem. In general, researchers tend to model the noise according to a Gaussian model, but it could also be modeled according to non-Gaussian noise, such as Middleton noise [78] or Alpha-stable noise [79,80]. Moreover, one can see that the estimator in (2) is highly non-convex, presenting singularities at all of the true sensor positions. The single-cost-function optimization problem is thus an appropriate candidate for applying metaheuristic optimization methods, namely, swarm-based optimization.
When considering ideal conditions, the solution of the optimization problem would be a single point in the two-dimensional plane. This point would be the unique intersection of the circumferences’ radii, which would be centered on the sensors with distance d i ^ = g i P / y i (represented by solid lines in Figure 1). Due to the measurement noise in the energy observations, an added or subtracted effect will distort the distance estimation, implying the appearance of two or more intersections, or perhaps even no intersections at all (represented by dashed lines in Figure 1). Hence, the solution of the optimization problem (2) lies in the region of interest (please see Figure 1), which is obtained by minimizing the sum of the squared difference between the observations and the measurement model (Equation (1)).

3.2. Swarm Intelligence

In the current section, an overview of swarm optimization is firstly presented by providing the general sequence of the steps that compose a typical swarm algorithm, with the specifics of each of the selected algorithms being described afterwards. It is worth mentioning that a general nomenclature is adopted rather than an algorithm-specific one (e.g., an agent is simply called an agent rather than coyote, wolf, or elephant, as used within the original methods). An overview of the nomenclature is provided in Appendix A.
Swarm intelligence algorithms have very similar activity sequences among them. The common steps are: (1) initializing the population, (2) evaluating the population (testing the cost function on the existent solutions of the population), (3) testing the stopping criterion, (4) updating the population (updating the position of the search agents in the search space), and cyclically repeating steps (2), (3), and (4) until a stopping criterion is met (please see Figure 2).
The population initialization can be considered a crucial step, since starting the search far away from the global optimum might prevent a method from finding the global solution [81]. In addition to generic methods, such as the pseudo-random number generator [82] or the chaotic number generator [83], initialization strategies specific to certain applications were also considered for particular problems, i.e., acoustic localization [55]. Random initialization is done by randomly spreading the agents throughout the search space. Typically, this process follows a uniform distribution bounded by the physical limits of the search space, such that each search agent has a random initial position x 0 U ( lb ,   ub ) , and lb and ub are vectors with the lower and upper bounds, respectively, for each dimension of the search space. This initialization method is used when no information about the problem is available at the initial phase or when that information should be ignored (e.g., in benchmarking when well-known functions are used (including their optimal solution(s)). However, when approaching a specific problem, it is common to have information that can be used to our advantage to initialize the agents. Smart or intelligent initialization means the determination of the areas of the search space where the best solution or solutions are expected to be and then initializing the search agents within those areas. For instance, for the EBAL problem, this can be done as explained in [55].
Once the agents in the population are initialized, their positions in the search space should be evaluated against the cost function so that in the end of the evaluation step, all agents have a cost value associated with them. After this, a stopping criterion is tested to see whether the obtained solutions are good enough, the algorithm has converged, a maximum number of function evaluations has been reached, or a combination of the three. If the stopping criterion is not met, the agents are moved within the search space in search of better solutions. The way the movement, position update, or walk is done is one of the features that should distinguish a swarm-based algorithm. The great diversity of nature is typically the inspiration for a wide variety of new update strategies. However, the mathematical models can be considered quite similar when cross-referencing some methodologies.
A transition of an agent’s position from iteration t to t + 1 is usually defined by its current position x t , a step direction s , and a step scale factor α , such that:
x t + 1 = x t + α s ,
where ⊙ is the element-wise multiplication. The way α and s are calculated depends on the algorithm itself and involves some stochastic variables and the position of other agents. Each agent’s position is typically updated once or twice per iteration, following some variation of Equation (3).
In the following, we present the main particularities of each of the considered algorithms.

3.2.1. Cuckoo Search

The CS algorithm, which was initially proposed by [16], arises from brood parasite species of cuckoos that lay their eggs in the nests of other specimens, expecting that other birds will take care of them.
At each iteration, there are two operations applied to all agents: random update (exploration) and discovery (exploitation).
From (3), the random updating operator can be defined as
x t + 1 = x t + α · s , with α = 0.01 and s = ( x t x t ) R 0 R 1 ,
where R 0 and R 1 are vectors of random values, such that R 0 N ( 0 , 1 ) , R 1 L ( 1.5 , 1 ) , and x t is the best search agent in the population at iteration t. The value of α is intended to avoid large flights that could easily make the agents jump outside the search space [84], whereas ( x t x t ) reduces the step length for agents closer to the best one, causing the best agent to stay at the same position.
After this updating operator, the discovery of fraction p a of the agents is done with
x t + 1 = discovery ( x t ) = x t + α · s H ( p a ϵ ) ( x r 1 t x r 2 t ) ,
where s is a vector of random values drawn from a standard normal distribution, such that s N ( 0 ,   1 ) , H is the Heaviside function, p a = 0.25 , ϵ U ( 0 ,   1 ) , and x r 1 t and x r 2 t are two different agents selected randomly through random permutation [84].
Actually, both updates persist only if the new solution is better than the current one, i.e.,
x t + 1 = x t + α · s , if f ( x t + α · s ) < f ( x t ) x t , otherwise
for the random update operator, and
x t + 1 = discovery ( x t ) , if f ( discovery ( x t ) ) < f ( x t ) x t , otherwise
for the discovery operator, where, in this case, f denotes the cost function, which should be minimized.
The CS then has an implicit strategy of greedy elitism for both updating operators, where the quality of an agent never degrades.

3.2.2. Grey Wolf Optimizer

The GWO algorithm was proposed in [61] and was inspired by the hunting behavior of gray wolfs and their social hierarchy. In this optimization procedure, the agents are wolves chasing the prey (optimal solution); however, because the optimal solution is unknown, it is considered that the wolves at the top of the hierarchy have better knowledge about the location of the prey and are closer to it [61]. Thus, the procedure is based on a simple updating operator that considers the position of the three best agents (the agents whose positions correspond to the best solutions), which are known, respectively, as alpha, beta, and delta (in descending order of the solution quality).
The updating operator in GWO is different from the general concept of (3), and the next location of each agent is given by
x t + 1 = s α + s β + s δ 3 ,
where the s e vectors are calculated as
s e = x e t R 0 ( | R 1 x e t x t | ) , e { α , β , δ } ,
where x t is the agent’s current position; x α t , x β t , and x δ t are the positions of the alpha, beta, and delta wolves, respectively, R 0 U ( a , a ) , and a is linearly decreased from 2 to 0 over the course of the iterations such that R 0 U ( 2 + t / t m a x , 2 t / t m a x ) , where t is the current iteration, t m a x is the maximum number of iterations, and R 1 U ( 0 , 2 ) .
The goal of the decrease in a over the course of the iterations is to control the trade-off between exploration and exploitation. As a decreases, R 0 tends to assume values closer to 0 , which diminishes | R 1 x e t x t | in (4), which, in turn, forces the new solution to converge to x α t , x β t , and x δ t . As such, exploration is favored in the initial iterations, while exploitation is favored in the latter.

3.2.3. Enhanced Elephant Herding Optimization

The EHO method, which was originally proposed in 2015 [51], was inspired by elephants’ herding behavior, where a group of elephants, mainly calves and females, follow a matriarch, thus forming a clan of elephants. The algorithm also considers the fact that male elephants may leave the clan to live alone when they reach adulthood. Accordingly, the paper in [51] presents a multi-population algorithm where the population is divided into several groups of agents by applying two operators: a clan updating operator, in which the agents tend to move towards the best agent of their group, and a separating operator, where some agents are repositioned randomly in the search space, mimicking desertion from the group.
Aside from the inspiration, three major drawbacks in the EHO algorithm were identified in [69]—unjustified convergence towards the search space’s origin in the matriarch update operator, unbalanced exploration/exploitation trade-off in the group updating operator, and skewed agent distribution in the separating operator. Hence, the evolution of the EHO into the EEHO was proposed in [69] with better performance in benchmarking than that of the EHO. The EEHO algorithm is not just an improvement over the EHO, but a rectification of relevant problems that cannot be ignored.
In the EEHO method, the clan updating operator updates each agent x c t of each group c with a combination of three steps:
x c t + 1 = x c t + α s 1 + β s 2 + γ s 3 , with s 1 = x c t x c t and s 2 = c c t x c t ,
where x c t is the best agent in the group c; c c t is the center of group c, which is obtained by averaging the position of the agent in group c; s 3 U ( ( ub lb ) , ( ub lb ) ) ; α , β , and γ , are, respectively, the best agent, the group center, and the randomized influence factors, respectively. The position of the best agent in group c, x c t , is not updated as in (5), but instead as:
x c t + 1 = x c t + β s 2 , with s 2 = c c t x c t ,
where, once again, β is the influence factor of the group center.
After the clan updating operator is executed, the worst agents in each group are randomly repositioned in the search space with
x c t + 1 = R , R U ( lb , ub ) ,
with the possibility of finding new local optimums (exploration).

3.2.4. Moth–Flame Optimization

The MFO algorithm was proposed in [63] in 2015. Its inspiration comes from a navigational strategy that some flying insects use to move in a straight line over a given time. In particular, at night, moths fly by maintaining a fixed angle with respect to a source of light [63]. This strategy only works if the source of light is a further distance away than the traveled distance, since it will otherwise lead to circular flying around the source of light. Before human-made artificial lights, the moon was the reference that moths used to guide their flying, and the result was a straight path. However, nowadays, moths easily get trapped in artificial sources of light, such as lamps, and fly around them indefinitely. This circular behavior around a source of light is actually what is mimicked.
In the MFO, the light sources are considered plausible optimum solutions, and the moths search around them. To improve exploration and to avoid falling into one local optimum, several light sources are considered, and each moth updates its position with regard to one of these lights at each iteration. Thus, the position update of each search agent (moth) between iterations t and ( t + 1 ) is defined as
x t + 1 = x l s t + | x l s t x t | exp ( b R ) cos ( 2 π R ) ,
where b is the spiral-shape constant; x l s t is the position of a chosen light source; R U ( r , 1 ) is a vector of random numbers; r decreases linearly from 1 to 2 over the course of iterations.
The light sources represent the best solutions found up to a moment and are updated in every iteration if new and better solutions are found. In order to increase exploitation over the course of the iterations, the number of light sources is also reduced, forcing the agents to update their positions with respect to the same sources of light, i.e., forcing the algorithm to converge. Let N l s be the number of light sources; then, at iteration t,
N l s = N l s 0 t t m a x ( N l s 0 1 ) ,
where means rounding to the nearest integer, N l s 0 is the initial number of light sources (typically equal to the number of agents), and t m a x is the maximum number of iterations.
The value r, which decreases linearly from 1 to 2 over the course of the iterations, can also be defined in a similar way with
r = 1 t t m a x .
It can be seen from (6) that when R assumes negative values, the agent gets closer to the light source, whereas when it assumes positive values, the agent moves away from the light source. Therefore, while N l s controls the number of local search areas, r tries to control the scattering of the search agents around those areas. With different strategies, they both try to control the trade-off between exploration and exploitation over the iterations (favoring exploration initially and exploitation afterwards).

3.2.5. Whale Optimization Algorithm

The WOA (proposed in 2016 [64]) was inspired by the bubble-net hunting behavior of humpback whales. The WOA applies to each agent’s (whale’s) position one of three possible updating operators at each iteration. Two of these operators are very similar to the one used by the GWO algorithm (Section 3.2.2). These are
x t + 1 = s e , for e =
and
x t + 1 = s e , for e = r a n d
where s e is calculated exactly as in (4), x t is the position of the best agent in the current iteration, and x r a n d t is the position of a random agent from the current population.
The third operator, called the spiral updating operator, is borrowed from the MFO algorithm (Section 3.2.4, (6)), but, instead of using a light source as a reference, the best whale is used, such that
x t + 1 = x t + | x t x t | exp ( b R 2 ) cos ( 2 π R 2 ) ,
where b is once again the spiral-shape constant; R 2 is a vector of random values such that R 2 U ( 1 , 1 ) ; x t is the position of the best agent.
As previously mentioned, at each iteration, each agent updates its position with only one of these three operators. Hence, for each agent, the choice is made as shown in Algorithm 1, where a decreases linearly over the course of the iterations, with the same goal as in GWO (to control exploration and exploitation).
Algorithm 1 Selection of the updating operator.
Generate p U ( 0 , 1 )
if p < 0.5 then
    Generate R 0 U ( a , a ) (Section 3.2.2)
    if  | R 0 | < 1  then
        Update agent with (7). (exploitation)
    else
        Update agent with (8). (exploration)
    end if
else
    Update agent with (9)
end if
As a concluding remark, it is clear that the WOA is a conjunction of both the GWO and MFO, i.e., it can be considered as an integration of the two algorithms.

3.2.6. Salp Swarm Algorithm

The SSA was proposed in [65], and its inspiration came from the collective behavior of salps that group together alongside another, arranged in a chain.
To simulate the salp chain, the SSA proposes a food source as the search goal, a chain leader that guides the movement towards the food, and the salp followers, who follow one after the other after the leader. The food source is the best solution found so far, x , and the leader is the best search agent in the current iteration t, x t . Then, Ref. [65] proposed updating the leader’s position as
x t + 1 = x + α · R 0 ( R 1 ( ub lb ) + lb ) ,
where R 0 is a vector of values equal to 1 or 1 with equal probabilities, i.e., P ( R 0 j = 1 ) = P ( R 0 j = 1 ) = 0.5 for each dimension j of R 0 , R 1 U ( 0 , 1 ) is a vector of random values, ub and lb are vectors with the upper and lower bounds of the search space, respectively, and α is a coefficient that balances exploration and exploitation by decreasing its value over the course of the iterations according to
α = 2 exp ( ( 4 t / t m a x ) 2 ) ,
where t is the current iteration and t m a x the maximum number of iterations.
Because each agent in the followers’ group should follow one after the other, the ith agent in the population is updated with:
x i t + 1 = 1 2 ( x i t + x i 1 t ) , for i = 2 , 3 , , n ,
where n is the population size and x 1 t is the position of the best agent at iteration t.
The facts that (1) only one of the n individuals in the population updates its position using stochastic values and (2) all the others just follow the leader one after the other might suggest that the algorithm does not perform very well. Indeed, to improve the performance, the original MATLAB® implementation updates one half of the population according to (10) and the other half according to (11). The same was done in the developed implementation.

3.2.7. Tree Growth Algorithm

The TGA was proposed in 2018 and was inspired by the way that trees grow depending on their prioritized needs (light or soil resources) [66]. The TGA presents four operators to be applied on four groups in the population (Table 3). After sorting the search agents according to their quality (with the best agent first) to the best N 1 trees (search agents), a local search operator is applied, where the new position of the search agent only depends on its current position and on stochastic variables. The best N 2 trees after the best N 1 trees are called competition trees, and for these, the updating operator considers the position of some trees in the best tree group, the current position of the tree to be updated, and some stochastic variables. After the competition group, the N 3 search agents are randomly repositioned in the search space. The same happens to the N 4 search agents after these, but after the repositioning, their position-vector dimensions are mixed with the ones in the position vector of the best tree in the population.
The first operator, applied to the trees in the best tree group, is defined as:
x t + 1 = x t θ + R x t ,
where R U ( 0 ,   1 ) is a vector of random values, and θ is a constant value.
The second updating operator, which is applied to the competition trees, is defined as:
x t + 1 = x t + R 0 ( λ x 0 + ( 1 λ ) x 1 ) ,
where R 0 U ( 0 ,   1 ) is a vector of random values, λ is also a constant value, and x 0 and x 1 are the positions of the two search agents from the best tree group closest to x t .
The third updating operator, which is applied to the removed trees, is defined as
x t + 1 = R ,
where R U ( lb ,   ub ) is a vector of random values.
The fourth updating operator, as stated above, results in new trees, where each dimension value is either equal to a dimension value of the best tree in the population or equal to a random value within the search space’s bounds. This operator is applied to the reproduction group, and it can be defined as:
x t + 1 = R 1 R 0 + ( 1 R 1 ) x t ,
where R 0 U ( lb ,   ub ) is a vector of random values within the search space, R 1 is a bit vector of values equal to 0 or 1 with equal probability, and x t is the position of the best search agent in all of the population in the current iteration t.

3.2.8. Coyote Optimization Algorithm

The COA is a swarm-based algorithm that was proposed in 2018 and was inspired by coyotes’ social behavior [67]. Similarly to the EHO, it is a multi-population method, meaning that the entire population is divided into independent sub-populations or groups, which are called packs, referring to coyote groups.
Once the coyotes (search agents) are divided into packs, each agent of pack p is updated by following a variation of (3):
x p t + 1 = x p t + R 1 s 1 + R 2 s 2 , with s 1 = x p t x p t and s 2 = M p x p t ,
where R 1 U ( 0 ,   1 ) and R 2 U ( 0 ,   1 ) , x p t is the best agent in pack p, and M p is the median of the search agents’ positions in pack p.
After all agents in a pack are updated, a new search agent (called a pup) is generated by a random combination of dimension values of other agents or random values in the search space. If some agents in the group have higher costs than the pup, the oldest of these is replaced by the new pup; otherwise, the pup dies.
After this, a last operator is applied before the iteration ends; it exchanges agents between groups with some probability of increasing the diversity inside the groups. Finally, the ages of all agents are incremented and the iteration is concluded.

3.2.9. Supply–Demand Optimization

The SDO algorithm, which was proposed in [68], gained its inspiration from a set of fundamentals in economic theory concerning commodity prices and quantities in markets, and it states that these two values might have periods of instability (where they tend to fluctuate) and stability (where they tend to an equilibrium point) [68].
Based on this, SDO divides the initial population into two sub-populations (or groups) of equal sizes, which are called the quantities (Q) and the prices (P). Each quantity has an associated price (and vice-versa), such that each search agent in Q has a corresponding search agent P. At each iteration t, the “equilibrium” quantity ( x Q e q t ) and price ( x P e q t ) are defined based on the current solutions. The value of x Q e q t is defined by roulette-wheel selection [68] from the search agents in population Q, and the best search agents have a higher probability of being selected. The price x P e q t is defined by roulette-wheel selection half of the time (from population P), and in the other times, it is defined by the average of the positions of the search agents in P.
Once x Q e q t and x P e q t are defined, the search agents from Q (quantities) are updated:
x Q t + 1 = x Q e q t + α · ( x P t x P e q t ) ,
where x P t is the corresponding search agent in P (price), and α is defined as:
α = 2 · t m a x t 1 t m a x · sin ( 2 π r ) ,
where t is the current iteration, t m a x is the maximum number of iterations, and r U ( 0 , 1 ) is a random number.
The agents in group P are updated with:
x P t + 1 = x P e q t + β · ( x Q t + 1 x Q e q t ) ,
where x Q t + 1 is the corresponding search agent in group Q, and β is defined as:
β = 2 · cos ( 2 π r ) ,
where r U ( 0 ,   1 ) is a random number redefined at each iteration.
The original paper states that whenever the new price x P t + 1 is better than the quantity x Q t + 1 , the quantity should be replaced by the price. However, this causes a loss of diversity without a gain in intensification, and it is just doubling a solution. Instead of that, the original MATLAB® implementation (as well as the implementation used in this work) does not replace the quantity with the price if the latter is better, but only updates the new solutions (either x P t + 1 and x Q t + 1 ) if it means an improvement regarding the objective function, meaning that the costs of the solutions never get worse, as it is for the CS algorithm (Section 3.2.1).

3.2.10. Momentum Search Algorithm

The MSA was published in the year 2020. Inspired by the momentum conservation law [72], it can be considered as both a physical and a swarm-based algorithm. In the MSA, each solution, or search agent, is a body with a mass m proportional to its quality, such that, at each iteration t,
m t = f ( x t ) f ( x w o r s t t ) f ( x b e s t t ) f ( x w o r s t t ) .
Then, at each iteration, an external body collides once against each of the search agents, moving each towards the heaviest body (the best solution).
The momentum of this external body is the key point in the MSA for controlling the trade-off between exploration and exploitation. When the external body collides at a higher momentum, the other bodies will change their positions more radically. When the momentum is lower, the other bodies will experience small position updates.
The momentum p of a body depends on its mass and velocity, and it is defined as:
p = m v .
As such, to calculate the momentum of the external body, its mass and velocity need to be known. The mass of the external body at iteration t is defined as:
m e x t t = 1 t 1 t m a x 1
and its velocity before each collision against a search agent x t is defined as:
v e x t t = ( 1 t 1 t m a x 1 ) · R v m a x · sgn ( x b e s t t x t ) ,
where t m a x is the maximum number of iterations, R U ( 0 ,   1 ) is a vector of random values, sgn is the sign function, and v m a x is a constant value representing the maximum possible speed.
Finally, by the momentum conservation law (more details in [72]), the velocity of each search agent after the collision at iteration t can be calculated as:
v t = 2 m e x t t m t + m e x t t v e x t t .
Then, the position x t is updated with:
x t + 1 = x t + R v t .

3.2.11. Summary

Having seen the algorithms individually and in detail, it is possible to recognize some common features and others that might differentiate them. As a major difference in this group of methods, one can see that some methods divide the whole population into independent sub-groups, while others do not; this property improves the exploration phase over exploitation. As such, this property might be of great importance when searching for more complicated, highly non-convex spaces. Another feature concerns the distribution of random variables employed in the algorithms. From the presented methods, only Cuckoo Search relies on non-uniform stochastic variables, namely, on normal and Lévy ones. In unbounded search spaces, the Lévy flight behavior might offer outstanding exploration capacities to algorithms; however, when the space’s bounds are known, it might be sufficient (and more efficient) to rely only on uniform random variables. Starting from the Grey Wolf in 2014, many algorithms have started to use an exploration/exploitation strategy that depends on a predefined maximum number of iterations. This feature allows the algorithms to begin with a strong stage of exploration of the search space that transitions to a strong exploitation stage in the last iterations. This feature should always be considered if one wants an algorithm to run a fixed and known number of iterations. Lastly, there is a property related to how the population’s quality can evolve over iterations or generations. Most algorithms use an elitism strategy, where only the k best individuals are preserved and passed directly to the next generation. At the same time, the remaining ones are subject to operators that might improve their fitness, but might also deteriorate it. Other algorithms, however, have a much greedier behavior where the operators are applied to every search agent, but the resulting mutations are only preserved if the agent improves its quality and are reverted otherwise. This greedy behavior favors exploitation by clearly sacrificing the exploration capacity. Table 4 summarizes these four properties in the selected algorithms. Please note that the presented properties are not general indicators of the performance of the algorithms, since performance is always dependent on the problem to which the algorithms are applied.

3.3. Population Initialization

A common feature of the analyzed algorithms is the fact that they all depend on the computation of an initial population. Over recent years, initialization techniques have attracted much attention in the research community, which is in search of constant improvements [85]. One of the simplest and most widely used methods is randomization, the aim of which is to produce evenly distributed populations [81]. The initialization step is critical in population generation because it not only because it can improve the convergence rate of an algorithm, but unsatisfactory preliminary guesses can also possibly lead the search away from optimal solutions. Apart from generic techniques, such as a pseudo-random number generator [86] or chaotic number generator [87], there are initialization schemes that are particularly designed for a specific type of problem, such as the ones for antenna design [81] or image segmentation [88].
Since, most commonly, the agents are deployed adrift over the search region with no prior consideration of any particularities of the problem of interest, it is very hard to achieve any kind of progress. Therefore, it is better that one bears in mind all additional information about the problem, such as knowledge about the employed observation model, and that one uses it as leverage to produce better starting points. This could be done, for instance, by taking advantage of the acoustic decay model in (1), from which a distance estimate between a sensor s i and the source can be obtained from y i according to
d i ^ = g i P y i , i = 1 , , N .
The distance obtained from (16) represents an ML estimate of the distance between the source and the i-th sensor. This simply tells us that the source lies within the circle (in 2-D) centered at the ith sensor with a radius equal to d i ^ . Since, as mentioned in Section 3.1, there will not be a unique intersection point, when considering a pair of measures, several situations can arise, namely, secant circumferences and external or internal circumferences. The methodology for creating the initial population of agents considers the center of the convex hull formed by the intersection of pairwise measures [55] for secant circumferences or the middle point of the straight-line segment between pair-wise sensors. For further details, please refer to [55].

4. Testing Procedure and Experimental Setup

Regarding the implementation, the selected algorithms were implemented in the C language, with the original publications and associated MATLAB® source code (when available) serving as the basis. In the end, since the algorithms have several similarities between them and, in the optimization procedure, only parts are algorithm-specific (Figure 2), most of the code written—cost function, mathematical operations, main data structures, and initialization and stopping criteria—was shared between the different algorithms. The test script for obtaining the simulation results shown in this work was conceptually equal to the one published in [89], which was based on a MATLAB® script that repeatedly sends energies to an embedded device and receives the estimated location and associated statistics. However, as the Raspberry boards had more persistent memory than the ones used in [89], here, it was possible to preload a batch of energies on the board and then have a C-language script doing the testing of the control flow. Since this was done on-board with compiled code, the simulations could be done in a reduced time. The testing procedure on the board is detailed in Algorithm 2, where the input datasets and file results (both in JSON format) were generated and analyzed, respectively, in the MATLAB® environment.
As already stated, in this study, three main goals were considered: (1) comparing the performance of the selected algorithms in solving the EBAL problem, (2) validating whether the smart/intelligent initialization improved their accuracy, and (3) analyzing the feasibility of the selected methods for running on computationally low-power devices. For the first two goals, the cost and the error ( | | x x ^ | | ) of the best agent found so far over the algorithms’ iterations were analyzed. For the third goal, the simulation execution time was considered. Thus, for each simulation, t agents/solutions and the simulation execution time were recorded (where t is the number of iterations necessary for the algorithm to reach the maximum number of function evaluations).
Algorithm 2 Testing procedure on the Raspberry boards.
N = { 6 , 9 , 12 , 15 } ▹ Number of sensors
V = { 80 , 75 , 70 , 65 , 60 , 55 } ▹ Noise variances
I = { Random , Intelligent } ▹ Types of swarm initialization
A = { CS , GWO , EEHO , MFO , WOA , SSA , TGA , COA , SDO , MFO }
for all ( n , v , i , a ) N × V × I × A do
     d a t a = LoadDataset( n , v ) ▹ Energies, sensors’ positions, etc.
     r e s u l t s = [ ]
    for  m = 1 , 2 , 3 , , 10.000  do
         s t a r t T i m e =  Clock()
         X ^ = Execute( a , n , i , data[m]) ▹ Location estimation by algorithm a. X ^ contains
the best solutions found so far at each iteration of the algorithm
         e x e c u t i o n T i m e = Clock() − startTime
         r e s u l t s = [ r e s u l t s ; X ^ e x e c u t i o n T i m e ]
    end for
    SaveToFile( r e s u l t s )
end for
The energies generated ( y i ) were corrupted by white Gaussian noise, ν , of variance σ ν 2 to approximate real situations. With the purpose of the extrapolation of the obtained results, different sets of sensors ( N = 6 , N = 9 , N = 12 , and N = 15 ) and variances (from σ ν 2 = 80 dB to σ ν 2 = 55 dB in intervals of 5 dB) were considered in a virtual search space with dimensions of 50 m × 50 m. For more reliable results, for each combination of the number of sensors, variance, algorithm, and initialization procedure, 10,000 Monte Carlo runs were executed, meaning that a total of 4,800,000 simulations were carried out. It should be noticed that, for each combination of sensors sets and variances, only one input dataset with 10,000 testing scenarios was generated and used by all different algorithms. This means that all algorithms were subject to the exact same scenarios. The transmitted power, gains, and decay propagation factor considered were set to P = 5 , g i = 1 , and β L = 2 , respectively. With the purpose of providing a benchmark for the comparison of the implemented algorithms, an exhaustive Grid Search method with 0.1 m of grid spacing was implemented (also in the C language) and tested in the same simulation conditions. Table 5 summarizes the model and the testing scenario parameters considered in the tests.
A fixed maximum number of function evaluations was used as the stopping condition for all tests. For all algorithms to evaluate the cost function exactly the same number times without interrupting any iterations, it was necessary to find the least common multiple of E v a l u a t i o n s I t e r a t i o n between all of them. This value, or a multiple of it, could be used as the maximum number of evaluations. In the tests employed, 6000 function evaluations were performed in every test. The chosen value was sufficient for the convergence analysis (as will be shown in the next section, the optimization should not exceed one or two thousand function evaluations if a good algorithm and stopping criterion are used). Table 6 summarizes the overall parameters used for each method.
Some algorithms rely on random numbers that follow normal or Lévy symmetrical stable distributions. To generate those values, the Box–Muller method [90] and Mantegna’s algorithm [91] were used, respectively.

5. Results and Discussion

Two important performance metrics are the function cost, which is calculated with (2), and the error, i.e., the distance between the estimated location and the real (unknown) location. The correlation between these two variables is central in the approach to the EBAL problem used here, where the true goal is to reduce the error, but, because it is unknown, an estimated cost is considered and minimized. In ideal conditions, this correlation would be perfect, such that
if cost ( x ) < cost ( x ) then error ( x ) < error ( x ) , for all x , x R 2
With this, a minimum value of the estimated cost would always mean a minimal error; however, there are two other independent variables that influence this correlation. The main one is the noise: As noise increases, the correlation between the estimator cost and the corresponding true error becomes unreliable, since noise perverts the measured energies considered in the estimator. Another variable, which is not as relevant as noise, is the number of measured energies (or sensors) considered in the estimator. Because the expected noise mean is null, considering more energies in the cost function might improve the correlation in a way in which individual errors might cancel each other out. Obviously, in a situation where the noise variance would be null, the number of energies would not matter. However, as the variance increases, the number of energies considered becomes more important. As such, caution should be taken when analyzing the correlation between the cost and the error in tests with higher noise values, mainly when a low number of sensors is considered.
Before analyzing the convergence plots in the next subsections, something should be clarified about the difference in the starting points of these convergence curves. The tested swarm algorithms have different population sizes, which means that the initialization also generates different numbers of initial solutions. When more solutions are generated, more diversity exists; thus, the best solution from those is likely to be better than the best one from a smaller set of generated solutions (the same applies to the worst solution: It is expected to be worse than the worst from a smaller set). That is why the convergence plots start at different cost values—methods with higher population sizes tend to have a better best initial solution, as well a worse worst solution, but, because the convergence plots only consider the best solution found so far, the convergences of these methods are expected to start at lower cost values. The CS algorithm, for instance, which has the lowest population size of all methods, is expected to have a convergence plot that starts above all of the plots of the other methods.
Bearing this in mind, the next three subsections compare the algorithms’ convergences (Section 5.1) and analyze the performance gains with smart/intelligent initialization (Section 5.2), as well as the computational times obtained on several embedded processors (Section 5.3).

5.1. Algorithm Comparison

The cost convergence and respective error while using different algorithms with smart/intelligent initialization for different combinations of the number of sensors and noise are shown in Figure 3, Figure 4, Figure 5 and Figure 6. The plotted lines are the result of averaging 10,000 Monte Carlo runs. The continuous lines represent the averaging cost of the best solution in the current iteration, and the dashed lines represent the averaging error of that best solution. Since all of the tested optimization methods have some elitism strategy, the best solution in the current iteration is also the best solution found so far over all iterations in the optimization procedure (the reason for why the cost convergence curves are all always decreasing).
Because noise distorts the correlation between the cost and true error, the fact that the cost plots are always decreasing does not imply that the error plots are as well. In fact, it is possible to see in some plots (mainly the ones with higher noise values) that even the average error can increase at some moments. Nonetheless, in most cases, a strong correlation between the cost and the error can be seen, where the decrease in the cost is reflected by an error decrease, resulting in the methods that better minimize the cost function being the ones that get lower errors.
Observing the continuous lines, the three methods that converge the fastest towards the optimum are MFO, SDO, and EEHO, while methods such as the TGA, GWO, and SSA present the worst performances. Looking at the dashed lines (and as expected), it is possible to see that MFO, SDO, and EEHO are also the ones that achieve lower errors, while the TGA, GWO, and SSA present higher errors. For comparison, the mean error of the Grid Search in Table 7 shows that, while being an exhaustive search method that evaluates the cost function 501 × 501 = 251,001 times, it achieves very similar accuracy to that of the swarm algorithms, which only evaluate the cost function 6000 times (with some convergence much before the 6000 function evaluations).
It should be noted that the late convergence of methods such as GWO and SSA is due to their native exploration and exploitation control strategies, which depend on the maximum number of iterations. In GWO, this is even more problematic with lower noise because, as the end of the curve in Figure 6a shows, it reaches the stopping criteria before fully converging (increasing the maximum number of iterations does not change this issue).

5.2. Smart/Intelligent vs. Random Initialization

The present section intends to provide an understanding of the impact of the smart/ intelligent initialization proposed in [55] on the performance of the different algorithms that were implemented. It was already shown that it improves the performance of the EHO in terms of both cost and localization error [55]. Now, it will be shown whether or not this initialization can be generalized to any swarm-based optimization algorithm.
For this purpose, the same tests that were performed in the previous section were carried out, but using random initialization. Since it is already known that, generally, there is a strong correlation between the cost and the error, the focus will just be on the cost convergence of the different methods when using both types of swarm initialization. Figure 7, Figure 8, Figure 9 and Figure 10 compare the cost convergences of the different methods when using smart/intelligent initialization (continuous lines) and when using random initialization (dashed lines) for different combinations of numbers of sensors and noise.
Since the smart/intelligent initialization generates the initial solutions in a reduced search area in which it is believed that the global optimum lies, it is obvious that, when using smart initialization, the best initial costs are, on average, much lower than when using random initialization. Because of this, it is possible to see that the dashed lines (random initialization) all start above the continuous lines (smart/intelligent initialization). Moreover, no dashed line of any algorithm crosses the respective continuous line at any moment throughout the iterations, which means that, on average, using smart initialization is always better than or equal to using a random initialization. The term “equal” is justified because, as can be seen, for example, in Figure 10a, SDO and EEHO using random initialization can reach, on average, the same optimums that they reach when using smart initialization (their dashed lines join the respective continuous lines at around 2000 function evaluations). Nevertheless, these are the only methods where the benefits of smart initialization stop before 6000 function evaluations. At 6000 function evaluations, none of the other algorithms have yet (on average) reached the same optimums as when using the smart/intelligent initialization. With this, it can be seen that smart/intelligent initialization not only works for any swarm algorithm, but it is even more relevant for most of them than it is for EEHO.
It is interesting to see that with random initialization, in contrast with what happens when using smart/intelligent initialization, methods with stronger initial exploration phases, such as GWO, the WOA, and the SSA, outperform methods such as the COA and CS, which do not employ special care for the initial exploration techniques. Nonetheless, with the exception of SDO and EEHO, it possible to see a tendency for the methods to stagnate in sub-optimal solutions when using random initialization. These two facts imply that smart/intelligent initialization, by initializing the population in a restricted area in which the global optimum is believed to be, not only facilitates the optimization task for methods that have weak exploration operators, but also avoids that methods with strong initial exploration phases get trapped in sub-optimums that are far away from the global optimum, as seems to happen with MFO, the MSA, and the SSA when using random initialization.

5.3. Time Efficiency

It is known that a key feature of swarm-based algorithms is their low computational complexity. However, this low complexity is not sufficient for knowing a priori exactly how time-consuming these algorithms are when solving the EBAL problem in real applications. In the same way, the widely available test benches implemented in MATLAB® and executed on powerful computational platforms are not sufficient, since it is impossible (or not very feasible) to have those processing cores as nodes in wireless sensor networks. As such, to understand how time efficient these algorithms are, several simulations were performed on different embedded boards. It should be noted that the goal is not to compare the algorithms against each other, since they all have the same (linear) computational complexities regarding the number of function evaluations. The goal here is to evaluate whether swarm-based algorithms, in general, are feasible in embedded devices and for use in constrained-time applications.
For this effort, we present the execution times of each swarm algorithm on different embedded devices averaged over 10,000 Monte Carlo runs, giving as a reference the execution times of the Grid Search algorithm with a 0.1 m spacing interval. The average computational times (in milliseconds) of the Grid Search algorithm are presented in Table 8 for the different boards and numbers of sensors. For the swarm algorithms, Table 9 shows the average execution times (also in milliseconds) that they take to reach 1000 function evaluations and the respective standard deviations. (One thousand function evaluations are a value sufficient for convergence, as shown by the previous sections. However, if desired, the estimation of the execution times for a different number of function evaluations is straightforward, since time is linearly proportional to the number of function evaluations).
The obtained results demonstrate that while the swarm algorithms have very similar performance to that of the Grid Search in terms of accuracy, they are very superior in terms of time efficiency, with computational times that are 100 times faster than that of the Grid Search. If the small grid space of 0.1 m allows the Grid Search to accurately locate the acoustic target, it demands a time-consuming computational burden, which is avoided in the swarm-based algorithms. Knowing the average time superiority of the swarm, it is also important to see if that superiority is constant or volatile considering the stochastic nature of the algorithms in their operations and the execution flow of their subroutines. The computational times’ standard deviations ( σ t ) in Table 9 show that the obtained times are very constant, which also allows the application of these methods in systems where determinism and reliability are important issues. The execution times presented in Table 9 can be seen as a reference for the time that it takes to estimate the source location of an acoustic event in devices with processors ranging from 1.5 GHz (Rasp. Pi 4 B) to 0.7 GHz (Rasp. Pi B) clock rates. The processing time is not just dependent on the clock rates, but also on the device architecture itself, whereby the presented reference time may vary slightly for other devices, even with the same clock rates. Nonetheless, the obtained times show that the localization estimation can be performed in dozens of milliseconds, which can be considered as being on a real-time scale. Thus, after analyzing the accuracy of the methods in the previous sections and the execution time performance in this section, the following claim is demonstrated: Through swarm-based optimization with smart/intelligent initialization, acoustic source localization can be done at the edge on embedded devices with good accuracy and in real time.

6. Conclusions

The comprehensive study presented here extends and expands previous work on swarm optimization for energy-based acoustic source localization by applying some of the most popular and novel swarm-based algorithms to the EBAL problem. Three main goals guided the present work.
Considering the simulations performed, three algorithms, namely, MFO, SDO, and EEHO, showed great performance. While the former slightly overcame the other two in cost convergence, the average errors of the three methods were very similar. In addition, considering the features of the different algorithms tested and the obtained results, it was shown that when using smart/intelligent initialization, the algorithms that rely more on the local space perform better than the ones with stronger initial exploration phases.
The second goal was to see whether the intelligent initialization that was previously proposed and validated for the EHO method could also work for any swarm-based algorithm. Overall, the algorithms used in the simulations all had their average performance improved when using intelligent initialization. As such, it is now possible to claim that this initialization technique should always be considered when implementing any swarm-based algorithm for the EBAL problem.
After widely studying the accuracy of the swarm-based methods in solving the EBAL problem, it remained to analyze their computational time performance. To that end, the algorithms were implemented, and a large set of simulations were executed on five different boards that could be used in real edge computing scenarios. The obtained results demonstrated the value of the mathematical simplicity of swarm-based algorithms. As such, it is possible to locate acoustic sources in units of milliseconds or dozens of milliseconds, depending on the processors used or the number of sensors considered, allowing the use of the presented approach in real-time edge computing applications.
With the completion of these three goals, the present work is a crucial milestone in acoustic source localization through swarm intelligence, breaking barriers towards its real implementation in demanding edge computing scenarios. The typical physical architecture of these systems relies on a powerful centralized machine and complex algorithms to process the acoustic signals obtained at the edge of the architecture by acoustic sensors. The low computational complexity of the approach considered in this work allows for the localization to be calculated at the edge of the architecture itself, where a central processor would receive only the estimated location coordinates, which are what is required in most applications. The benefits of this are obvious, and, as proved by the present work, both accuracy and real-time performance can be guaranteed.
One of the major shortcomings of the presented methods is that they depend on a noise model, given that they are based on evaluating an objective function whose form is determined by the noise statistics. A possible direction for our future work will include the derivation of a new objective function that does not depend on noise statistics, but is a valid cost criterion for evaluating the quality of the particles. Another drawback of swarm-based methods is that they usually require a training phase to optimize some of the parameters used in their operation. Although the impact of these parameters is not crucial in terms of their functioning, they do have a tuning effect on their performance.
While the present work focused on a solution based on energy measurements, the same work can be applied or extended to any other range-based localization method. As future work, different research challenges exist, such as the development of noise mitigation techniques to improve the accuracy (e.g., by considering variables other than energy measures), the application of this approach to other range-based localization methods, or the integration and implementation of this solution on real edge computing localization systems.

Author Contributions

All authors contributed equally to this work. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Fundação para a Ciência e a Tecnologia under the Projects UIDB/04111/2020, UIDB/05064/202, EXPL/EEI-EEE/0776/2021 Robust, 2021.04180.CEECIND, and foRESTER PCIF/SSI/0102/2017, as well as Instituto Lusófono de Investigação e Desenvolvimento (ILIND) under the Project COFAC/ILIND/COPELABS/1/2020.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Definitions and Notation

Definition A1.
An agent, search agent, or individual is an entity with a position in the search space and an associated quality. Its position at iteration t represents a solution for the problem, and it will be denoted by a D-dimensional vector x t , where D is the number of dimensions of the problem. Its quality can be obtained by applying the cost function f on its position: f ( x t ) .
Notation A1.
Bold symbols should be interpreted as vectors.
Notation A2.
R U ( a , b ) means that R is a vector of random values R i drawn from a uniform distribution between a and b, such that R i U ( a , b ) , for i = 1 , 2 , , D , where D is the dimension of the vector. If R U ( a , b ) , where a and b are both vectors, then it should be considered that each value R i follows a uniform distribution between a i and b i , such that R i U ( a i , b i ) , for i = 1 , 2 , , D . This also applies to the distributions described below.
Notation A3.
R N ( μ , σ 2 ) means that R is a vector of random values drawn from a normal distribution with mean μ and variance σ 2 .
Notation A4.
R L ( α , γ ) means that R is a vector of random values drawn from a Lévy symmetric alpha-stable distribution, with α as the index of stability and γ as a scale factor (the symmetric alpha-stable distribution is a specific case of alpha-stable distribution, where the skewness parameter β = 0 and the location parameter δ = 0 ).
Notation A5.
lb and ub represent the upper- and lower-bound vectors of the search space, respectively, so that any valid x t must satisfy lb x t ub .

Appendix B. Swarm Algorithm Listing

Table A1. Swarm algorithm listing.
Table A1. Swarm algorithm listing.
Year 1 Acronym(*)(**)Method (Reference)
–19991995PSO61,8392474Particle Swarm Optimization [9]
1996ANT14,356598Ant System [73]
2000–20102001HS5315280Harmony Search [11]
2002BF3214179Bacterial Foraging [12]
2004HB32320Honey Bees [13]
2006SOA15211Seeker Optimization Algorithm [92]
GSO21115Glowworm Swarm Optimization [93]
HBMO36126Honey Bee Mating Optimization [94]
CSO50236Cat Swarm Optimization [95]
BA133996Bee Algorithm [14]
2007MS22818Monkey Search [96]
IWD32525Intelligent Water Drops [97]
ICA2228171Imperialist Competitive Algorithm [98]
ABC5045388Artificial Bee Colony [15]
2008BBO2821235Biogeography-Based Optimization [99]
2009DS383Dialectic Search [100]
GSO68162Group Search Optimizer [101]
GSA4354396Gravitational Search Algorithm [102]
CS5100464Cuckoo Search [16]
2010–20152010SO11211Spiral Optimization [103]
FWA72973Fireworks Algorithm for Optimization [104]
CSS90090Charged System Search [105]
FA3112311Firefly Algorithm [106]
BAT3753375Bat Algorithm [17]
2011GSA16018Galaxy-Based Search Algorithm [107]
DS36841Differential Search [108]
BSO41446Brain Storm Optimization Algorithm [109]
FOA1126125Fruit Fly Optimization Algorithm [110]
TLBO2227247Teaching–Learning-Based Optimization [62]
2012ACROA668Artificial Chemical Reaction Optimization Algorithm [111]
ACS10513Artificial Cooperative Search [112]
MBO19825Migrating Bird Optimization [113]
RO39650Ray Optimization [114]
MBA41252Mine Blast Algorithm [115]
BH62278Black Hole [116]
KH1214152Krill Herd [117]
2013LCA13219League Championship Algorithm [118]
DE29342Dolphin Echolocation [119]
SSO33848Social Spider Optimization [120]
2014OIO9716Optics-Inspired Optimization [121]
VS17529Vortex Search [122]
ISA24140Interior Search Algorithm [123]
SFS25543Stochastic Fractal Search [124]
SMO26644Spider Monkey Optimization [125]
PIO27446Pigeon-Inspired Optimization [126]
WWO28548Water Wave Optimization [127]
CSO31452Chicken Swarm Optimization [128]
CBO38865Colliding Bodies Optimization [129]
SOS713119Symbiotic Organism Search [130]
GWO4112685Grey Wolf Optimizer [61]
2015–20202015VOA347Virus Optimization Algorithm [131]
WSA408Weighted Superposition Attraction [132]
MBO16333Monarch Butterfly Optimization [133]
LSA17134Lightning Search Algorithm [134]
EHO22745Elephant Herding Optimization [51]
DA877175Dragonfly Algorithm [135]
SCA1016203Sine–Cosine Algorithm [136]
ALO1161232The Ant Lion Optimizer [137]
MFO1167233Moth–Flame Optimization [63]
2016SWA5313Sperm Whale Algorithm [138]
MS19248Moth Search [139]
CSA689172Crow Search Algorithm [140]
WOA2227557Whale Optimization Algorithm [64]
2017KA5819Kidney-Inspired Algorithm [141]
SHO6522Selfish Herd Optimizer [142]
TEO12642Thermal Exchange Optimization [143]
SHO16655Spotted Hyena Optimizer [144]
GOA700233Grasshopper Optimization Algorithm [145]
SSA894298Salp Swarm Algorithm [65]
2018TGA4515Tree Growth Algorithm [66]
FF5920Farmland Fertility [146]
COA8528Coyote Optimization Algorithm [67]
BOA17257Butterfly Optimization Algorithm [147]
EWA17458Earthworm Optimization Algorithm [148]
2019NRO66Nuclear Reaction Optimization [149]
SDO99Supply–Demand-Based Optimization [68]
PRO1212Poor and Rich Optimization Algorithm [150]
EEHO1616Enhanced Elephant Herding Optimization [69]
FDO2020Fitness Dependent Optimizer [151]
BWO2020Black Widow Optimization Algorithm [152]
PFA3232Pathfinder Algorithm [153]
EO5656Equilibrium Optimizer [154]
SOA6060Seagull Optimization Algorithm [155]
SSA150150Squirrel Search Algorithm [65]
HHO323323Harris Hawks Optimization [71]
2020BOA11Billiards-Inspired Optimization Algorithm [156]
WSA51Water Strider Algorithm [157]
DGCO77Dynamic Group-Based Cooperative Optimization [158]
TSA1212Tunicate Swarm Algorithm [159]
MPA3838Marine Predators Algorithm [160]
WFS--Wingsuit Flying Search [161]
AOA--Archimedes Optimization Algorithm [162]
MSA--Momentum Search Algorithm [72]
1 Year of online publication (may be different from issue year). (*) Number of citations in set/2020 [scholar.google.com]. (**) Number of citations per year in set/2020 [scholar.google.com].

References

  1. Culioli, J.C. Introduction à l’Optimisation; Références Sciences; Ellipses: Paris, France, 2012. [Google Scholar]
  2. Holland, J.H. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence; University of Michigan Press: Ann Arbor, MI, USA, 1975. [Google Scholar]
  3. Liu, Y.; Chen, Q. 150 years of Darwin’s theory of intercellular flow of hereditary information. Nat. Rev. Mol. Cell Biol. 2018, 19, 749–750. [Google Scholar] [CrossRef] [PubMed]
  4. Mahjoob Karambasti, B.; Ghodrat, M.; Ghorbani, G.; Lalbakhsh, A.; Behnia, M. Design methodology and multi-objective optimization of small-scale power-water production based on integration of Stirling engine and multi-effect evaporation desalination system. Desalination 2022, 526, 115542. [Google Scholar] [CrossRef]
  5. Kirkpatrick, S.; Gelatt, C.D.; Vecchi, M.P. Optimization by Simulated Annealing. Science 1983, 220, 671–680. [Google Scholar] [CrossRef] [PubMed]
  6. Yuret, D.; de la Maza, M. Dynamic Hill Climbing: Overcoming the limitations of optimization techniques. In Proceedings of the Second Turkish Symposium on Artificial Intelligence and Neural Networks, Istanbul, Turkey, 24–25 June 1993; pp. 208–212. [Google Scholar]
  7. Bousson, K.; Correia, S.D. Optimization algorithm based on densification and dynamic canonical descent. J. Comput. Appl. Math. 2006, 191, 269–279. [Google Scholar] [CrossRef] [Green Version]
  8. Colorni, A.; Dorigo, M.; Maniezzo, V. Distributed Optimization by Ant Colonies. In Proceedings of the European Conference on Artificial Life, ECAL’91, Paris, France, 11–13 December 1991; Elsevier Publishing: Amsterdam, The Netherlands, 1991; Volume 142, pp. 134–142. [Google Scholar]
  9. Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the ICNN’95—International Conference on Neural Networks, Perth, Australia, 27 November–1 December 1995; Volume 4, pp. 1942–1948. [Google Scholar] [CrossRef]
  10. Bonyadi, M.R.; Michalewicz, Z. Particle Swarm Optimization for Single Objective Continuous Space Problems: A Review. Evol. Comput. 2017, 25, 1–54. [Google Scholar] [CrossRef]
  11. Geem, Z.W.; Kim, J.H.; Loganathan, G.V. A New Heuristic Optimization Algorithm: Harmony Search. Simulation 2001, 76, 60–68. [Google Scholar] [CrossRef]
  12. Passino, K.M. Biomimicry of bacterial foraging for distributed optimization and control. IEEE Control Syst. Mag. 2002, 22, 52–67. [Google Scholar] [CrossRef]
  13. Nakrani, S.; Tovey, C. On Honey Bees and Dynamic Server Allocation in Internet Hosting Centers. Adapt. Behav. 2004, 12, 223–240. [Google Scholar] [CrossRef]
  14. Pham, D.T.; Ghanbarzadeh, A.; Koç, E.; Otri, S.; Rahim, S.; Zaidi, M. The bees algorithm—A novel tool for complex optimisation problems. In Intelligent Production Machines and Systems; Elsevier: Amsterdam, The Netherlands, 2006; pp. 454–459. [Google Scholar]
  15. Karaboga, D.; Basturk, B. Artificial Bee Colony (ABC) Optimization Algorithm for Solving Constrained Optimization Problems. In Foundations of Fuzzy Logic and Soft Computing; Melin, P., Castillo, O., Aguilar, L.T., Kacprzyk, J., Pedrycz, W., Eds.; Springer: Berlin/Heidelberg, Germany, 2007; pp. 789–798. [Google Scholar]
  16. Yang, X.; Deb, S. Cuckoo Search via Lévy flights. In Proceedings of the 2009 World Congress on Nature Biologically Inspired Computing (NaBIC), Coimbatore, India, 9–11 December 2009; pp. 210–214. [Google Scholar]
  17. Yang, X.S. A New Metaheuristic Bat-Inspired Algorithm. In Nature Inspired Cooperative Strategies for Optimization (NICSO 2010); González, J.R., Pelta, D.A., Cruz, C., Terrazas, G., Krasnogor, N., Eds.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 65–74. [Google Scholar] [CrossRef] [Green Version]
  18. Zhang, H.; Sun, J.; Liu, T.; Zhang, K.; Zhang, Q. Balancing exploration and exploitation in multiobjective evolutionary optimization. Inf. Sci. 2019, 497, 129–148. [Google Scholar] [CrossRef]
  19. Jain, N.K.; Nangia, U.; Jain, J. Impact of Particle Swarm Optimization Parameters on its Convergence. In Proceedings of the 2018 2nd IEEE International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES), Delhi, India, 22–24 October 2018; pp. 921–926. [Google Scholar] [CrossRef]
  20. Li, Q.; Liu, S.Y.; Yang, X.S. Influence of initialization on the performance of metaheuristic optimizers. Appl. Soft Comput. 2020, 91, 106–193. [Google Scholar] [CrossRef] [Green Version]
  21. Kumar, M.M.S.; Yadav, H.; Soman, D.; Kumar, A.; Reddy, N.A.K. Acoustic Localization for Autonomous Unmanned Systems. In Proceedings of the 2020 14th International Conference on Innovations in Information Technology (IIT), Al Ain, United Arab Emirates, 17–18 November 2020; pp. 69–74. [Google Scholar] [CrossRef]
  22. Ullah, I.; Liu, Y.; Su, X.; Kim, P. Efficient and Accurate Target Localization in Underwater Environment. IEEE Access 2019, 7, 101415–101426. [Google Scholar] [CrossRef]
  23. Chang, X.; Yang, C.; Wu, J.; Shi, X.; Shi, Z. A Surveillance System for Drone Localization and Tracking Using Acoustic Arrays. In Proceedings of the 2018 IEEE 10th Sensor Array and Multichannel Signal Processing Workshop (SAM), Sheffield, UK, 8–11 July 2018; pp. 573–577. [Google Scholar] [CrossRef]
  24. Correia, S.D.; Fé, J.; Tomic, S.; Beko, M. Drones as Sound Sensors for Energy-Based Acoustic Tracking on Wildfire Environments. In Proceedings of the 4th IFIP International Internet of Things (IOT) Conference, Virtual Event, 4–5 November 2021; Springer: Cham, Switzerland, 2021; pp. 1–17. [Google Scholar] [CrossRef]
  25. Tang, L.; Luo, R.; Deng, M.; Su, J. Study of Partial Discharge Localization Using Ultrasonics in Power Transformer Based on Particle Swarm Optimization. IEEE Trans. Dielectr. Electr. Insul. 2008, 15, 492–495. [Google Scholar] [CrossRef]
  26. Mirzaei, H.R.; Akbari, A.; Gockenbach, E.; Zanjani, M.; Miralikhani, K. A novel method for ultra-high-frequency partial discharge localization in power transformers using the particle swarm optimization algorithm. IEEE Electr. Insul. Mag. 2013, 29, 26–39. [Google Scholar] [CrossRef]
  27. Alloza, P.; Vonrhein, B. Noise source localization in industrial facilities. In Proceedings of the INTER-NOISE and NOISE-CON Congress and Conference Proceedings, Madrid, Spain, 16–19 June 2019; Institute of Noise Control Engineering: Reston, VA, USA, 2019; pp. 7616–7627. [Google Scholar]
  28. Fu, J.; Yin, S.; Cui, Z.; Kundu, T. Experimental Research on Rapid Localization of Acoustic Source in a Cylindrical Shell Structure without Knowledge of the Velocity Profile. Sensors 2021, 21, 511. [Google Scholar] [CrossRef]
  29. Hu, Z.; Tariq, S.; Zayed, T. A comprehensive review of acoustic based leak localization method in pressurized pipelines. Mech. Syst. Signal Process. 2021, 161, 107994. [Google Scholar] [CrossRef]
  30. Suwansin, W.; Phasukkit, P. Deep Learning-Based Acoustic Emission Scheme for Nondestructive Localization of Cracks in Train Rails under a Load. Sensors 2021, 21, 272. [Google Scholar] [CrossRef]
  31. Wang, Y.B.; Chang, D.G.; Fan, Y.H.; Zhang, G.J.; Zhan, J.Y.; Shao, X.J.; He, W.L. Acoustic localization of partial discharge sources in power transformers using a particle-swarm-optimization-route-searching algorithm. IEEE Trans. Dielectr. Electr. Insul. 2017, 24, 3647–3656. [Google Scholar] [CrossRef]
  32. Robles, G.; Fresno, J.; Martínez-Tarifa, J.; Ardila-Rey, J.; Parrado-Hernández, E. Partial Discharge Spectral Characterization in HF, VHF and UHF Bands Using Particle Swarm Optimization. Sensors 2018, 18, 746. [Google Scholar] [CrossRef] [Green Version]
  33. Hooshmand, R.A.; Parastegari, M.; Yazdanpanah, M. Simultaneous location of two partial discharge sources in power transformers based on acoustic emission using the modified binary partial swarm optimisation algorithm. IET Sci. Meas. Technol. 2013, 7, 119–127. [Google Scholar] [CrossRef]
  34. Lalbakhsh, A.; Afzal, M.U.; Zeb, B.A.; Esselle, K.P. Design of a dielectric phase-correcting structure for an EBG resonator antenna using particle swarm optimization. In Proceedings of the 2015 International Symposium on Antennas and Propagation (ISAP), Hobart, Australia, 9–12 November 2015; pp. 1–3. [Google Scholar]
  35. Lalbakhsh, A.; Afzal, M.U.; Esselle, K.P.; Smith, S.L. A high-gain wideband EBG resonator antenna for 60 GHz unlicenced frequency band. In Proceedings of the 12th European Conference on Antennas and Propagation (EuCAP 2018), London, UK, 9–13 April 2018; pp. 1–3. [Google Scholar] [CrossRef]
  36. Lalbakhsh, A.; Afzal, M.U.; Esselle, K.P.; Smith, S. Design of an artificial magnetic conductor surface using an evolutionary algorithm. In Proceedings of the 2017 International Conference on Electromagnetics in Advanced Applications (ICEAA), Verona, Italy, 11–15 September 2017; pp. 885–887. [Google Scholar] [CrossRef]
  37. Xu, E.; Ding, Z.; Dasgupta, S. Source Localization in Wireless Sensor Networks from Signal Time-of-Arrival Measurements. IEEE Trans. Signal Process. 2011, 59, 2887–2897. [Google Scholar] [CrossRef]
  38. Yang, L.; Ho, K. An Approximately Efficient TDOA Localization Algorithm in Closed-Form for Locating Multiple Disjoint Sources with Erroneous Sensor Positions. IEEE Trans. Signal Process. 2009, 57, 4598–4615. [Google Scholar] [CrossRef]
  39. Ali, A.M.; Yao, K.; Collier, T.C.; Taylor, C.E.; Blumstein, D.T.; Girod, L. An Empirical Study of Collaborative Acoustic Source Localization. In Proceedings of the 2007 6th International Symposium on Information Processing in Sensor Networks, Cambridge, MA, USA, 25–27 April 2007. [Google Scholar] [CrossRef]
  40. Li, D.; Hu, Y. Energy based collaborative source localization using acoustic micro-sensor array. EURASIP J. Adv. Signal Process. 2003, 2003, 321–337. [Google Scholar] [CrossRef] [Green Version]
  41. Sheng, X.; Hu, Y.H. Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor networks. IEEE Trans. Signal Process. 2004, 53, 44–53. [Google Scholar] [CrossRef] [Green Version]
  42. Meng, W.; Xiao, W. Energy-Based Acoustic Source Localization Methods: A Survey. Sensors 2017, 17, 376. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  43. Cobos, M.; Antonacci, F.; Alexandridis, A.; Mouchtaris, A.; Lee, B. A Survey of Sound Source Localization Methods in Wireless Acoustic Sensor Networks. Wirel. Commun. Mob. Comput. 2017, 2017, 3956282. [Google Scholar] [CrossRef]
  44. Meesookho, C.; Mitra, U.; Narayanan, S. On Energy-Based Acoustic Source Localization for Sensor Networks. IEEE Trans. Signal Process. 2008, 56, 365–377. [Google Scholar] [CrossRef]
  45. Wang, G. A Semidefinite Relaxation Method for Energy-Based Source Localization in Sensor Networks. IEEE Trans. Veh. Technol. 2011, 60, 2293–2301. [Google Scholar] [CrossRef]
  46. Beko, M. Energy-based localization in wireless sensor networks using semidefinite relaxation. In Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, Cancun, Mexico, 28–31 March 2011; pp. 1552–1556. [Google Scholar] [CrossRef]
  47. Beko, M. Energy-Based Localization in Wireless Sensor Networks Using Second-Order Cone Programming Relaxation. Wirel. Pers. Commun. 2014, 77, 1847–1857. [Google Scholar] [CrossRef]
  48. Yan, Y.; Shen, X.; Hua, F.; Zhong, X. On the Semidefinite Programming Algorithm for Energy-Based Acoustic Source Localization in Sensor Networks. IEEE Sens. J. 2018, 18, 8835–8846. [Google Scholar] [CrossRef]
  49. Shi, J.; Wang, G.; Jin, L. Robust Semidefinite Relaxation Method for Energy-Based Source Localization: Known and Unknown Decay Factor Cases. IEEE Access 2019, 7, 163740–163748. [Google Scholar] [CrossRef]
  50. Correia, S.D.; Tomic, S.; Beko, M. A Feed-Forward Neural Network Approach for Energy-Based Acoustic Source Localization. J. Sens. Actuator Netw. 2021, 10, 29. [Google Scholar] [CrossRef]
  51. Wang, G.; Deb, S.; dos S. Coelho, L. Elephant Herding Optimization. In Proceedings of the 2015 3rd International Symposium on Computational and Business Intelligence (ISCBI), Bali, Indonesia, 7–9 December 2015; pp. 1–5. [Google Scholar]
  52. Li, J.; Lei, H.; Alavi, A.H.; Wang, G.G. Elephant Herding Optimization: Variants, Hybrids, and Applications. Mathematics 2020, 8, 1415. [Google Scholar] [CrossRef]
  53. Correia, S.D.; Beko, M.; Cruz, L.A.D.S.; Tomic, S. Elephant Herding Optimization for Energy-Based Localization. Sensors 2018, 18, 2849. [Google Scholar]
  54. Correia, S.D.; Beko, M.; Da Silva Cruz, L.A.; Tomic, S. Implementation and Validation of Elephant Herding Optimization Algorithm for Acoustic Localization. In Proceedings of the 2018 26th Telecommunications Forum (TELFOR), Belgrade, Serbia, 20–21 November 2018; pp. 1–4. [Google Scholar]
  55. Correia, S.D.; Beko, M.; Tomic, S.; Da Silva Cruz, L.A. Energy-Based Acoustic Localization by Improved Elephant Herding Optimization. IEEE Access 2020, 8, 28548–28559. [Google Scholar] [CrossRef]
  56. Fé, J.; Correia, S.D.; Tomic, S.; Beko, M. Kalman Filtering for Tracking a Moving Acoustic Source based on Energy Measurements. In Proceedings of the 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Mauritius, 7–8 October 2021; pp. 1–6. [Google Scholar] [CrossRef]
  57. Sittón-Candanedo, I.; Alonso, R.S.; Corchado, J.M.; Rodríguez-González, S.; Casado-Vara, R. A review of edge computing reference architectures and a new global edge proposal. Future Gener. Comput. Syst. 2019, 99, 278–294. [Google Scholar] [CrossRef]
  58. Dilley, J.; Maggs, B.; Parikh, J.; Prokop, H.; Sitaraman, R.; Weihl, B. Globally distributed content delivery. IEEE Internet Comput. 2002, 6, 50–58. [Google Scholar] [CrossRef] [Green Version]
  59. Yu, W.; Liang, F.; He, X.; Hatcher, W.G.; Lu, C.; Lin, J.; Yang, X. A Survey on the Edge Computing for the Internet of Things. IEEE Access 2018, 6, 6900–6919. [Google Scholar] [CrossRef]
  60. Parikh, S.; Dave, D.; Patel, R.; Doshi, N. Security and Privacy Issues in Cloud, Fog and Edge Computing. Procedia Comput. Sci. 2019, 160, 734–739. [Google Scholar] [CrossRef]
  61. Mirjalili, S.; Mirjalili, S.M.; Lewis, A. Grey Wolf Optimizer. Adv. Eng. Softw. 2014, 69, 46–61. [Google Scholar] [CrossRef] [Green Version]
  62. Rao, R.; Savsani, V.; Vakharia, D. Teaching–learning-based optimization: A novel method for constrained mechanical design optimization problems. Comput.-Aided Des. 2011, 43, 303–315. [Google Scholar] [CrossRef]
  63. Mirjalili, S. Moth-flame optimization algorithm: A novel nature-inspired heuristic paradigm. Knowl.-Based Syst. 2015, 89, 228–249. [Google Scholar] [CrossRef]
  64. Mirjalili, S.; Lewis, A. The Whale Optimization Algorithm. Adv. Eng. Softw. 2016, 95, 51–67. [Google Scholar] [CrossRef]
  65. Mirjalili, S.; Gandomi, A.H.; Mirjalili, S.Z.; Saremi, S.; Faris, H.; Mirjalili, S.M. Salp Swarm Algorithm: A bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 2017, 114, 163–191. [Google Scholar] [CrossRef]
  66. Cheraghalipour, A.; Hajiaghaei-Keshteli, M.; Paydar, M.M. Tree Growth Algorithm (TGA): A novel approach for solving optimization problems. Eng. Appl. Artif. Intell. 2018, 72, 393–414. [Google Scholar] [CrossRef]
  67. Pierezan, J.; Dos Santos Coelho, L. Coyote Optimization Algorithm: A New Metaheuristic for Global Optimization Problems. In Proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC), Rio de Janeiro, Brazil, 8–13 July 2018; pp. 1–8. [Google Scholar]
  68. Zhao, W.; Wang, L.; Zhang, Z. Supply-Demand-Based Optimization: A Novel Economics-Inspired Algorithm for Global Optimization. IEEE Access 2019, 7, 73182–73206. [Google Scholar] [CrossRef]
  69. Ismaeel, A.A.K.; Elshaarawy, I.A.; Houssein, E.H.; Ismail, F.H.; Hassanien, A.E. Enhanced Elephant Herding Optimization for Global Optimization. IEEE Access 2019, 7, 34738–34752. [Google Scholar] [CrossRef]
  70. Jain, M.; Singh, V.; Rani, A. A novel nature-inspired algorithm for optimization: Squirrel search algorithm. Swarm Evol. Comput. 2019, 44, 148–175. [Google Scholar] [CrossRef]
  71. Heidari, A.A.; Mirjalili, S.; Faris, H.; Aljarah, I.; Mafarja, M.; Chen, H. Harris hawks optimization: Algorithm and applications. Future Gener. Comput. Syst. 2019, 97, 849–872. [Google Scholar] [CrossRef]
  72. Dehghani, M.; Samet, H. Momentum search algorithm: A new meta-heuristic optimization algorithm inspired by momentum conservation law. SN Appl. Sci. 2020, 2, 1720. [Google Scholar] [CrossRef]
  73. Dorigo, M.; Maniezzo, V.; Colorni, A. Ant system: Optimization by a colony of cooperating agents. IEEE Trans. Syst. Man Cybern. Part B 1996, 26, 29–41. [Google Scholar] [CrossRef] [Green Version]
  74. Chen, B.; Wan, J.; Celesti, A.; Li, D.; Abbas, H.; Zhang, Q. Edge Computing in IoT-Based Manufacturing. IEEE Commun. Mag. 2018, 56, 103–109. [Google Scholar] [CrossRef]
  75. Caria, M.; Schudrowitz, J.; Jukan, A.; Kemper, N. Smart farm computing systems for animal welfare monitoring. In Proceedings of the 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 22–26 May 2017; pp. 152–157. [Google Scholar] [CrossRef]
  76. Xu, R.; Nikouei, S.Y.; Chen, Y.; Polunchenko, A.; Song, S.; Deng, C.; Faughnan, T.R. Real-Time Human Objects Tracking for Smart Surveillance at the Edge. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; pp. 1–6. [Google Scholar] [CrossRef]
  77. Miori, L.; Sanin, J.; Helmer, S. A Platform for Edge Computing Based on Raspberry Pi Clusters. In Data Analytics; Cali, A., Wood, P., Martin, N., Poulovassilis, A., Eds.; Springer: Cham, Switzerland, 2017. [Google Scholar]
  78. Zhang, X.; Ying, W.; Yang, P.; Sun, M. Parameter estimation of underwater impulsive noise with the Class B model. IET Radar Sonar Navig. 2020, 14, 1055–1060. [Google Scholar] [CrossRef]
  79. Georgiou, P.G.; Tsakalides, P.; Kyriakakis, C. Alpha-stable modeling of noise and robust time-delay estimation in the presence of impulsive noise. IEEE Trans. Multimed. 1999, 1, 291–301. [Google Scholar] [CrossRef] [Green Version]
  80. Pelekanakis, K.; Chitre, M. Adaptive sparse channel estimation under symmetric alpha-stable noise. IEEE Trans. Wirel. Commun. 2014, 13, 3183–3195. [Google Scholar] [CrossRef]
  81. Ma, Z.; Vandenbosch, G.A.E. Impact of Random Number Generators on the performance of particle swarm optimization in antenna design. In Proceedings of the 6th European Conference on Antennas and Propagation (EUCAP), Prague, Czech Republic, 26–30 March 2012; pp. 925–929. [Google Scholar] [CrossRef]
  82. Koeune, F. Pseudo-random number generator. In Encyclopedia of Cryptography and Security; Van Tilborg, H.C.A., Ed.; Springer: Boston, MA, USA, 2005; pp. 485–487. [Google Scholar] [CrossRef]
  83. Yuan, X.; Zhao, J.; Yang, Y.; Wang, Y. Hybrid parallel chaos optimization algorithm with harmony search algorithm. Appl. Soft Comput. 2014, 17, 12–22. [Google Scholar] [CrossRef]
  84. Yang, X.S. Chapter 9—Cuckoo Search. In Nature-Inspired Optimization Algorithms; Yang, X.S., Ed.; Elsevier: Oxford, UK, 2014; pp. 129–139. [Google Scholar] [CrossRef]
  85. Kazimipour, B.; Li, X.; Qin, A.K. A review of population initialization techniques for evolutionary algorithms. In Proceedings of the 2014 IEEE Congress on Evolutionary Computation (CEC), Beijing, China, 6–11 July 2014; pp. 2585–2592. [Google Scholar] [CrossRef]
  86. Jun, B.; Kocher, P. The Intel Random Number Generator; White Paper; Cryptography Research Inc.: San Francisco, CA, USA, 1999; Volume 27, pp. 1–8. [Google Scholar]
  87. Zhang, M.; Zhang, W.; Sun, Y. Chaotic co-evolutionary algorithm based on differential evolution and particle swarm optimization. In Proceedings of the 2009 IEEE International Conference on Automation and Logistics, Shenyang, China, 5–7 August 2009; pp. 885–889. [Google Scholar] [CrossRef]
  88. Guerrero, J.L.; Berlanga, A.; Molina, J.M. Initialization Procedures for Multiobjective Evolutionary Approaches to the Segmentation Issue. In Hybrid Artificial Intelligent Systems; Corchado, E., Snášel, V., Abraham, A., Woźniak, M., Graña, M., Cho, S.B., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 452–463. [Google Scholar]
  89. Correia, S.D.; Fé, J.; Beko, M.; Tomic, S. Development of a Test-bench for Evaluating the Embedded Implementation of the Improved Elephant Herding Optimization Algorithm Applied to Energy-Based Acoustic Localization. Computers 2020, 9, 87. [Google Scholar] [CrossRef]
  90. Box, G.E.P.; Muller, M.E. A Note on the Generation of Random Normal Deviates. Ann. Math. Stat. 1958, 29, 610–611. [Google Scholar] [CrossRef]
  91. Mantegna, R.N. Fast, accurate algorithm for numerical simulation of Lévy stable stochastic processes. Phys. Rev. E 1994, 49, 4677–4683. [Google Scholar] [CrossRef]
  92. Dai, C.; Zhu, Y.; Chen, W. Seeker optimization algorithm. In International Conference on Computational and Information Science; Springer: Berlin/Heidelberg, Germany, 2006; pp. 167–176. [Google Scholar]
  93. Krishnanand, K.; Ghose, D. Glowworm swarm based optimization algorithm for multimodal functions with collective robotics applications. Multiagent Grid Syst. 2006, 2, 209–222. [Google Scholar] [CrossRef] [Green Version]
  94. Haddad, O.B.; Afshar, A.; Marino, M.A. Honey-bees mating optimization (HBMO) algorithm: A new heuristic approach for water resources optimization. Water Resour. Manag. 2006, 20, 661–680. [Google Scholar] [CrossRef]
  95. Chu, S.C.; Tsai, P.W.; Pan, J.S. Cat swarm optimization. In Pacific Rim International Conference on Artificial Intelligence; Springer: Berlin/Heidelberg, Germany, 2006; pp. 854–858. [Google Scholar]
  96. Mucherino, A.; Seref, O. Monkey search: A novel metaheuristic search for global optimization. AIP Conf. Proc. 2007, 953, 162–173. [Google Scholar]
  97. Hosseini, H.S. Problem solving by intelligent water drops. In Proceedings of the 2007 IEEE Congress on Evolutionary Computation, Singapore, 25–28 September 2007; pp. 3226–3231. [Google Scholar]
  98. Atashpaz-Gargari, E.; Lucas, C. Imperialist competitive algorithm: An algorithm for optimization inspired by imperialistic competition. In Proceedings of the 2007 IEEE Congress on Evolutionary Computation, Singapore, 25–28 September 2007; pp. 4661–4667. [Google Scholar]
  99. Simon, D. Biogeography-based optimization. IEEE Trans. Evol. Comput. 2008, 12, 702–713. [Google Scholar] [CrossRef] [Green Version]
  100. Kadioglu, S.; Sellmann, M. Dialectic search. In International Conference on Principles and Practice of Constraint Programming; Springer: Berlin/Heidelberg, Germany, 2009; pp. 486–500. [Google Scholar]
  101. He, S.; Wu, Q.H.; Saunders, J. Group search optimizer: An optimization algorithm inspired by animal searching behavior. IEEE Trans. Evol. Comput. 2009, 13, 973–990. [Google Scholar] [CrossRef]
  102. Rashedi, E.; Nezamabadi-Pour, H.; Saryazdi, S. GSA: A gravitational search algorithm. Inf. Sci. 2009, 179, 2232–2248. [Google Scholar] [CrossRef]
  103. Tamura, K.; Yasuda, K. Primary study of spiral dynamics inspired optimization. IEEJ Trans. Electr. Electron. Eng. 2011, 6, S98–S100. [Google Scholar] [CrossRef]
  104. Tan, Y.; Zhu, Y. Fireworks algorithm for optimization. In International Conference in Swarm Intelligence; Springer: Berlin/Heidelberg, Germany, 2010; pp. 355–364. [Google Scholar]
  105. Kaveh, A.; Talatahari, S. A novel heuristic optimization method: Charged system search. Acta Mech. 2010, 213, 267–289. [Google Scholar] [CrossRef]
  106. Yang, X.S. Firefly algorithms for multimodal optimization. In International Symposium on Stochastic Algorithms; Springer: Berlin/Heidelberg, Germany, 2009; pp. 169–178. [Google Scholar]
  107. Shah-Hosseini, H. Principal components analysis by the galaxy-based search algorithm: A novel metaheuristic for continuous optimisation. Int. J. Comput. Sci. Eng. 2011, 6, 132–140. [Google Scholar]
  108. Civicioglu, P. Transforming geocentric cartesian coordinates to geodetic coordinates by using differential search algorithm. Comput. Geosci. 2012, 46, 229–247. [Google Scholar] [CrossRef]
  109. Shi, Y. Brain storm optimization algorithm. In International Conference in Swarm Intelligence; Springer: Berlin/Heidelberg, Germany, 2011; pp. 303–309. [Google Scholar]
  110. Pan, W.T. A new fruit fly optimization algorithm: Taking the financial distress model as an example. Knowl.-Based Syst. 2012, 26, 69–74. [Google Scholar] [CrossRef]
  111. Alatas, B. A novel chemistry based metaheuristic optimization method for mining of classification rules. Expert Syst. Appl. 2012, 39, 11080–11088. [Google Scholar] [CrossRef]
  112. Civicioglu, P. Artificial cooperative search algorithm for numerical optimization problems. Inf. Sci. 2013, 229, 58–76. [Google Scholar] [CrossRef]
  113. Duman, E.; Uysal, M.; Alkaya, A.F. Migrating Birds Optimization: A new metaheuristic approach and its performance on quadratic assignment problem. Inf. Sci. 2012, 217, 65–77. [Google Scholar] [CrossRef]
  114. Kaveh, A.; Khayatazad, M. A new meta-heuristic method: Ray optimization. Comput. Struct. 2012, 112, 283–294. [Google Scholar] [CrossRef]
  115. Sadollah, A.; Bahreininejad, A.; Eskandar, H.; Hamdi, M. Mine blast algorithm: A new population based algorithm for solving constrained engineering optimization problems. Appl. Soft Comput. 2013, 13, 2592–2612. [Google Scholar] [CrossRef]
  116. Hatamlou, A. Black hole: A new heuristic optimization approach for data clustering. Inf. Sci. 2013, 222, 175–184. [Google Scholar] [CrossRef]
  117. Gandomi, A.H.; Alavi, A.H. Krill herd: A new bio-inspired optimization algorithm. Commun. Nonlinear Sci. Numer. Simul. 2012, 17, 4831–4845. [Google Scholar] [CrossRef]
  118. Kashan, A.H. League championship algorithm: A new algorithm for numerical function optimization. In Proceedings of the 2009 International Conference of Soft Computing and Pattern Recognition, Malacca, Malaysia, 4–7 December 2009; pp. 43–48. [Google Scholar]
  119. Kaveh, A.; Farhoudi, N. A new optimization method: Dolphin echolocation. Adv. Eng. Softw. 2013, 59, 53–70. [Google Scholar] [CrossRef]
  120. Cuevas, E.; Cienfuegos, M.; ZaldíVar, D.; Pérez-Cisneros, M. A swarm optimization algorithm inspired in the behavior of the social-spider. Expert Syst. Appl. 2013, 40, 6374–6384. [Google Scholar] [CrossRef] [Green Version]
  121. Kashan, A.H. A new metaheuristic for optimization: Optics inspired optimization (OIO). Comput. Oper. Res. 2015, 55, 99–125. [Google Scholar] [CrossRef]
  122. Doğan, B.; Ölmez, T. A new metaheuristic for numerical function optimization: Vortex Search algorithm. Inf. Sci. 2015, 293, 125–145. [Google Scholar] [CrossRef]
  123. Gandomi, A.H. Interior search algorithm (ISA): A novel approach for global optimization. ISA Trans. 2014, 53, 1168–1183. [Google Scholar] [CrossRef] [PubMed]
  124. Salimi, H. Stochastic fractal search: A powerful metaheuristic algorithm. Knowl.-Based Syst. 2015, 75, 1–18. [Google Scholar] [CrossRef]
  125. Bansal, J.C.; Sharma, H.; Jadon, S.S.; Clerc, M. Spider monkey optimization algorithm for numerical optimization. Memetic Comput. 2014, 6, 31–47. [Google Scholar] [CrossRef]
  126. Duan, H.; Qiao, P. Pigeon-inspired optimization: A new swarm intelligence optimizer for air robot path planning. Int. J. Intell. Comput. Cybern. 2014, 7, 24–37. [Google Scholar] [CrossRef]
  127. Zheng, Y.J. Water wave optimization: A new nature-inspired metaheuristic. Comput. Oper. Res. 2015, 55, 1–11. [Google Scholar] [CrossRef] [Green Version]
  128. Meng, X.; Liu, Y.; Gao, X.; Zhang, H. A new bio-inspired algorithm: Chicken swarm optimization. In International Conference in Swarm Intelligence; Springer: Cham, Switzerland, 2014; pp. 86–94. [Google Scholar]
  129. Kaveh, A.; Mahdavi, V.R. Colliding bodies optimization: A novel meta-heuristic method. Comput. Struct. 2014, 139, 18–27. [Google Scholar] [CrossRef]
  130. Cheng, M.Y.; Prayogo, D. Symbiotic organisms search: A new metaheuristic optimization algorithm. Comput. Struct. 2014, 139, 98–112. [Google Scholar] [CrossRef]
  131. Liang, Y.C.; Cuevas Juarez, J.R. A novel metaheuristic for continuous optimization problems: Virus optimization algorithm. Eng. Optim. 2016, 48, 73–93. [Google Scholar] [CrossRef]
  132. Baykasoğlu, A.; Akpinar, Ş. Weighted Superposition Attraction (WSA): A swarm intelligence algorithm for optimization problems—Part 1: Unconstrained optimization. Appl. Soft Comput. 2017, 56, 520–540. [Google Scholar] [CrossRef]
  133. Wang, G.G.; Deb, S.; Cui, Z. Monarch butterfly optimization. Neural Comput. Appl. 2015, 31, 1995–2014. [Google Scholar] [CrossRef] [Green Version]
  134. Shareef, H.; Ibrahim, A.A.; Mutlag, A.H. Lightning search algorithm. Appl. Soft Comput. 2015, 36, 315–333. [Google Scholar] [CrossRef]
  135. Mirjalili, S. Dragonfly algorithm: A new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput. Appl. 2015, 27, 1053–1073. [Google Scholar] [CrossRef]
  136. Mirjalili, S. SCA: A sine cosine algorithm for solving optimization problems. Knowl.-Based Syst. 2016, 96, 120–133. [Google Scholar] [CrossRef]
  137. Mirjalili, S. The ant lion optimizer. Adv. Eng. Softw. 2015, 83, 80–98. [Google Scholar] [CrossRef]
  138. Ebrahimi, A.; Khamehchi, E. Sperm whale algorithm: An effective metaheuristic algorithm for production optimization problems. J. Nat. Gas Sci. Eng. 2016, 29, 211–222. [Google Scholar] [CrossRef]
  139. Wang, G.G. Moth search algorithm: A bio-inspired metaheuristic algorithm for global optimization problems. Memetic Comput. 2016, 10, 151–164. [Google Scholar] [CrossRef]
  140. Askarzadeh, A. A novel metaheuristic method for solving constrained engineering optimization problems: Crow search algorithm. Comput. Struct. 2016, 169, 1–12. [Google Scholar] [CrossRef]
  141. Jaddi, N.S.; Alvankarian, J.; Abdullah, S. Kidney-inspired algorithm for optimization problems. Commun. Nonlinear Sci. Numer. Simul. 2017, 42, 358–369. [Google Scholar] [CrossRef]
  142. Fausto, F.; Cuevas, E.; Valdivia, A.; González, A. A global optimization algorithm inspired in the behavior of selfish herds. Biosystems 2017, 160, 39–55. [Google Scholar] [CrossRef]
  143. Kaveh, A.; Dadras, A. A novel meta-heuristic optimization algorithm: Thermal exchange optimization. Adv. Eng. Softw. 2017, 110, 69–84. [Google Scholar] [CrossRef]
  144. Dhiman, G.; Kumar, V. Spotted hyena optimizer: A novel bio-inspired based metaheuristic technique for engineering applications. Adv. Eng. Softw. 2017, 114, 48–70. [Google Scholar] [CrossRef]
  145. Saremi, S.; Mirjalili, S.; Lewis, A. Grasshopper optimisation algorithm: Theory and application. Adv. Eng. Softw. 2017, 105, 30–47. [Google Scholar] [CrossRef] [Green Version]
  146. Shayanfar, H.; Gharehchopogh, F.S. Farmland fertility: A new metaheuristic algorithm for solving continuous optimization problems. Appl. Soft Comput. 2018, 71, 728–746. [Google Scholar] [CrossRef]
  147. Arora, S.; Singh, S. Butterfly optimization algorithm: A novel approach for global optimization. Soft Comput. 2019, 23, 715–734. [Google Scholar] [CrossRef]
  148. Wang, G.G.; Deb, S.; Coelho, L.D.S. Earthworm optimisation algorithm: A bio-inspired metaheuristic algorithm for global optimisation problems. Int. J. Bio-Inspired Comput. 2018, 12, 1–22. [Google Scholar] [CrossRef]
  149. Wei, Z.; Huang, C.; Wang, X.; Han, T.; Li, Y. Nuclear reaction optimization: A novel and powerful physics-based algorithm for global optimization. IEEE Access 2019, 7, 66084–66109. [Google Scholar] [CrossRef]
  150. Moosavi, S.H.S.; Bardsiri, V.K. Poor and rich optimization algorithm: A new human-based and multi populations algorithm. Eng. Appl. Artif. Intell. 2019, 86, 165–181. [Google Scholar] [CrossRef]
  151. Abdullah, J.M.; Ahmed, T. Fitness dependent optimizer: Inspired by the bee swarming reproductive process. IEEE Access 2019, 7, 43473–43486. [Google Scholar] [CrossRef]
  152. Hayyolalam, V.; Kazem, A.A.P. Black widow optimization algorithm: A novel meta-heuristic approach for solving engineering optimization problems. Eng. Appl. Artif. Intell. 2020, 87, 103249. [Google Scholar] [CrossRef]
  153. Yapici, H.; Cetinkaya, N. A new meta-heuristic optimizer: Pathfinder algorithm. Appl. Soft Comput. 2019, 78, 545–568. [Google Scholar] [CrossRef]
  154. Faramarzi, A.; Heidarinejad, M.; Stephens, B.; Mirjalili, S. Equilibrium optimizer: A novel optimization algorithm. Knowl.-Based Syst. 2020, 191, 105190. [Google Scholar] [CrossRef]
  155. Dhiman, G.; Kumar, V. Seagull optimization algorithm: Theory and its applications for large-scale industrial engineering problems. Knowl.-Based Syst. 2019, 165, 169–196. [Google Scholar] [CrossRef]
  156. Kaveh, A.; Khanzadi, M.; Moghaddam, M.R. Billiards-inspired optimization algorithm; A new meta-heuristic method. Structures 2020, 27, 1722–1739. [Google Scholar] [CrossRef]
  157. Kaveh, A.; Eslamlou, A.D. Water strider algorithm: A new metaheuristic and applications. Structures 2020, 25, 520–541. [Google Scholar] [CrossRef]
  158. Fouad, M.M.; El-Desouky, A.I.; Al-Hajj, R.; El-Kenawy, E.S.M. Dynamic group-based cooperative optimization algorithm. IEEE Access 2020, 8, 148378–148403. [Google Scholar] [CrossRef]
  159. Kaur, S.; Awasthi, L.K.; Sangal, A.; Dhiman, G. Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization. Eng. Appl. Artif. Intell. 2020, 90, 103541. [Google Scholar] [CrossRef]
  160. Faramarzi, A.; Heidarinejad, M.; Mirjalili, S.; Gandomi, A.H. Marine predators algorithm: A nature-inspired Metaheuristic. Expert Syst. Appl. 2020, 152, 113377. [Google Scholar] [CrossRef]
  161. Covic, N.; Lacevic, B. Wingsuit Flying Search—A Novel Global Optimization Algorithm. IEEE Access 2020, 8, 53883–53900. [Google Scholar] [CrossRef]
  162. Hashim, F.A.; Hussain, K.; Houssein, E.H.; Mabrouk, M.S.; Al-Atabany, W. Archimedes optimization algorithm: A new metaheuristic algorithm for solving optimization problems. Appl. Intell. 2020, 51, 1531–1551. [Google Scholar] [CrossRef]
Figure 1. Geometry of the search space and measurement uncertainties.
Figure 1. Geometry of the search space and measurement uncertainties.
Sensors 22 01894 g001
Figure 2. Activity sequence in swarm-based optimization.
Figure 2. Activity sequence in swarm-based optimization.
Sensors 22 01894 g002
Figure 3. Cost convergence and respective error for each algorithm when N = 6 .
Figure 3. Cost convergence and respective error for each algorithm when N = 6 .
Sensors 22 01894 g003
Figure 4. Cost convergence and respective error for each algorithm when N = 9 .
Figure 4. Cost convergence and respective error for each algorithm when N = 9 .
Sensors 22 01894 g004
Figure 5. Cost convergence and respective error for each algorithm when N = 12 .
Figure 5. Cost convergence and respective error for each algorithm when N = 12 .
Sensors 22 01894 g005
Figure 6. Cost convergence and respective error for each algorithm when N = 15 .
Figure 6. Cost convergence and respective error for each algorithm when N = 15 .
Sensors 22 01894 g006
Figure 7. Cost convergence when using smart and random initialization for each algorithm when N = 6 .
Figure 7. Cost convergence when using smart and random initialization for each algorithm when N = 6 .
Sensors 22 01894 g007
Figure 8. Cost convergence when using smart and random initialization for each algorithm when N = 9 .
Figure 8. Cost convergence when using smart and random initialization for each algorithm when N = 9 .
Sensors 22 01894 g008
Figure 9. Cost convergence when using smart and random initialization for each algorithm when N = 12 .
Figure 9. Cost convergence when using smart and random initialization for each algorithm when N = 12 .
Sensors 22 01894 g009
Figure 10. Cost convergence when using smart and random initialization for each algorithm when N = 15 .
Figure 10. Cost convergence when using smart and random initialization for each algorithm when N = 15 .
Sensors 22 01894 g010
Table 1. Citation metrics of swarm-based algorithms.
Table 1. Citation metrics of swarm-based algorithms.
YearAcronym(*)(**)Method (Reference)
–19991995PSO61,8392474Particle Swarm Optimization [9]
1996ANT14,356598Ant System [73]
2000–20092009CS 5100464Cuckoo Search via Lévy flights [16]
2010–20142010BAT3753375Bat Algorithm [17]
2011TLBO2227247Teaching–Learning-Based Optimization [62]
2014GWO4112685Grey Wolf Optimizer [61]
2015–20202015MFO1167233Moth–Flame Optimization Algorithm [63]
2016WOA2227557Whale Optimization Algorithm [64]
2017SSA894298Salp Swarm Algorithm [65]
2018TGA4523Tree Growth Algorithm [66]
COA8543Coyote Optimization Algorithm [67]
2019SDO99Supply–Demand-Based Optimization [68]
EEHO1616Enhanced Elephant Herding Optimization [69]
2020MSA--Momentum Search Algorithm [72]
(*) Number of citations in set/2020 [scholar.google.com]. (**) Number of citations per year in set/2020 [scholar.google.com].
Table 2. Computational architectures of the swarm-based algorithms’ implementation.
Table 2. Computational architectures of the swarm-based algorithms’ implementation.
Rasp. Pi 4 BRasp. Pi ZWRasp. Pi 3Rasp. Pi 2Rasp. Pi B
SOCBCM2711BCM2835BCM2837BCM2836BCM2835
CoreCortex-A72
[64-bit]
ARM1176JZF-SCortex-A53
[64-bit]
Cortex-A7ARM1176JZF-S
Cores41441
Clock1.5 GHz1 GHz1.2 GHz900 MHz700 MHz
RAM4 GB512 MB1 GB1 GB512 MB
Table 3. TGA operators.
Table 3. TGA operators.
Target AgentsOperatorGoal
x i for i = 1 , 2 , , N 1
(Best Trees)
(12)Exploitation
x i for i = N 1 + 1 , N 1 + 2 , , N 1 + N 2
(Competition Trees)
(13)Exploration, exploitation
x i for i = N 1 , 2 + 1 , N 1 , 2 + 2 , , N 1 , 2 + N 3 ,
where N 1 , 2 = N 1 + N 2
(Remove Trees)
(14)Exploration
x i for i = N 1 , 2 , 3 + 1 , N 1 , 2 , 3 + 2 , , N 1 , 2 , 3 + N 4 ,
where N 1 , 2 , 3 = N 1 , 2 + N 3
(Reproduction Trees)
(15)Exploration, exploitation
Table 4. Comparison of the algorithms’ properties.
Table 4. Comparison of the algorithms’ properties.
MethodSub-GroupsRandom Variable
Distributions
Exploitation/Exploration
Balance over Iterations
Quality Evolution
CSNo U , N , L ConstantGreedy
GWONo U VariableElitist
EEHOYes U ConstantElitist
MFONo U VariableElitist
WOANo U VariableElitist
SSANo U VariableElitist
TGANo U ConstantElitist
COAYes U ConstantElitist
SDONo U VariableGreedy
MSANo U VariableElitist
U —Uniform distribution; N —Normal distribution; L —Lévy distribution.
Table 5. Test parameters.
Table 5. Test parameters.
Search Space50 m × 50 m
P5
g i 1
β L 2
Noise Variance σ ν 2 { 80 , 75 , 70 , 65 , 60 , 55 } (dB)
Number of Sensors N { 6 , 9 , 12 , 15 }
Table 6. Algorithms’ parameters.
Table 6. Algorithms’ parameters.
Population
Size ( P S )
No. of Groups
( G N )
Groups Size
( G S )
Evaluations Iteration Specific
Parameters
CS25n.a.n.a. 2 × P S , i.e., 50 P a = 0.25
GWO30n.a.n.a. P S , i.e., 30n.a.
EEHO120 ( 3 , 4 , 5 , 6 ) ( 40 , 30 , 25 , 20 ) P S , i.e., 120 α = 0.7
β = 0.1
γ = 0.015
MFO30n.a.n.a. P S , i.e., 30 b = 1
WOA30n.a.n.a. P S , i.e., 30 b = 1
SSA30n.a.n.a. P S , i.e., 30n.a.
TGA100n.a.n.a. P S + N 4 ,
i.e., 150
N 1 = N 2 = 20
N 3 = 60
N 4 = 50
θ = 1.2
λ = 0.5
COA100205 P S + G N ,
i.e., 25
P e = 0.005 × G S 2
SDO50n.a.n.a. P S , i.e., 50n.a.
MSA60n.a.n.a. P S , i.e., 60 U m a x = 2.5
n.a.—not applicable.
Table 7. Mean error (in meters) of the Grid Search ( 0.1 m interval).
Table 7. Mean error (in meters) of the Grid Search ( 0.1 m interval).
σ ν 2 = 80 dB σ ν 2 = 75 dB σ ν 2 = 70 dB σ ν 2 = 65 dB σ ν 2 = 60 dB σ ν 2 = 55 dB
N = 6 0.0830.1340.2220.3940.7982.844
N = 9 0.0560.0760.1300.2040.4021.980
N = 12 0.0510.0780.1000.1610.3280.533
N = 15 0.0480.0620.0860.1400.2150.476
Table 8. Average execution time (in milliseconds) of the Grid Search ( 0.1 interval).
Table 8. Average execution time (in milliseconds) of the Grid Search ( 0.1 interval).
N = 6 N = 9 N = 12 N = 15
Rasp. Pi B1999298340325057
Rasp. Pi ZW1347201327193404
Rasp. Pi 2946141118952368
Rasp. Pi 358988011711477
Rasp. Pi 4 B241358477595
Table 9. Average execution time ( t ¯ ) ± standard deviation ( σ t ) to reach 1000 function evaluations (in milliseconds).
Table 9. Average execution time ( t ¯ ) ± standard deviation ( σ t ) to reach 1000 function evaluations (in milliseconds).
N = 6 N = 9 N = 12 N = 15
Rasp. Pi BCS 16.258 ± 0.094 20.537 ± 0.095 28.714 ± 0.107 29.561 ± 0.116
GWO 12.282 ± 0.051 16.731 ± 0.057 20.913 ± 0.059 29.264 ± 0.073
EEHO 10.223 ± 0.122 14.251 ± 0.150 18.541 ± 0.187 22.764 ± 0.406
MFO 14.346 ± 0.568 18.620 ± 0.435 22.442 ± 0.381 26.406 ± 0.386
WOA 10.894 ± 0.051 15.459 ± 0.063 19.696 ± 0.068 28.098 ± 0.087
SSA 9.688 ± 0.062 15.086 ± 0.131 19.412 ± 0.132 27.809 ± 0.125
TGA 10.888 ± 0.295 15.082 ± 0.400 21.949 ± 0.589 24.133 ± 0.773
COA 11.500 ± 0.098 15.760 ± 0.128 20.159 ± 0.169 24.464 ± 0.187
SDO 16.813 ± 0.258 24.475 ± 0.314 32.263 ± 0.246 39.731 ± 0.294
MSA 10.613 ± 0.350 14.702 ± 0.685 18.793 ± 0.586 23.076 ± 0.956
Rasp. Pi ZWCS 10.849 ± 0.046 13.840 ± 0.055 16.725 ± 0.049 19.608 ± 0.061
GWO 8.270 ± 0.027 11.462 ± 0.059 14.457 ± 0.078 20.220 ± 0.087
EEHO 6.930 ± 0.188 9.615 ± 0.079 12.630 ± 0.491 15.300 ± 0.159
MFO 10.060 ± 0.398 12.821 ± 0.375 15.444 ± 0.366 18.874 ± 0.533
WOA 7.502 ± 0.027 11.678 ± 0.038 15.155 ± 0.062 20.633 ± 0.044
SSA 6.448 ± 0.041 9.259 ± 0.049 11.938 ± 0.028 18.016 ± 0.050
TGA 7.541 ± 0.082 10.352 ± 0.098 13.322 ± 0.248 16.062 ± 0.120
COA 7.505 ± 0.081 10.378 ± 0.101 13.524 ± 0.127 16.488 ± 0.141
SDO 11.461 ± 0.154 16.652 ± 0.198 21.932 ± 0.147 27.163 ± 0.174
MSA 6.845 ± 0.106 9.541 ± 0.168 12.599 ± 0.313 15.362 ± 0.562
Rasp. Pi 2CS 7.875 ± 0.020 9.752 ± 0.020 11.697 ± 0.019 13.612 ± 0.028
GWO 6.171 ± 0.024 8.090 ± 0.034 10.000 ± 0.016 11.848 ± 0.017
EEHO 4.813 ± 0.017 6.659 ± 0.020 8.613 ± 0.022 10.513 ± 0.023
MFO 6.568 ± 0.163 8.478 ± 0.086 10.351 ± 0.049 12.262 ± 0.038
WOA 5.156 ± 0.017 7.063 ± 0.019 8.971 ± 0.017 10.889 ± 0.018
SSA 4.538 ± 0.022 6.446 ± 0.015 8.278 ± 0.010 10.189 ± 0.014
TGA 4.957 ± 0.024 6.849 ± 0.024 8.784 ± 0.024 10.689 ± 0.033
COA 5.493 ± 0.016 7.441 ± 0.017 9.429 ± 0.020 11.389 ± 0.021
SDO 8.454 ± 0.027 12.117 ± 0.061 15.890 ± 0.025 19.603 ± 0.028
MSA 4.923 ± 0.017 6.784 ± 0.016 8.695 ± 0.027 10.583 ± 0.030
Rasp. Pi 3CS 4.783 ± 0.016 5.927 ± 0.017 7.155 ± 0.016 8.348 ± 0.017
GWO 3.748 ± 0.011 4.944 ± 0.011 6.163 ± 0.011 7.405 ± 0.012
EEHO 2.986 ± 0.016 4.137 ± 0.020 5.367 ± 0.022 6.594 ± 0.027
MFO 4.079 ± 0.115 5.275 ± 0.058 6.434 ± 0.039 7.637 ± 0.029
WOA 3.167 ± 0.014 4.379 ± 0.013 5.569 ± 0.013 6.787 ± 0.014
SSA 2.799 ± 0.011 3.980 ± 0.019 5.162 ± 0.008 6.373 ± 0.012
TGA 3.068 ± 0.016 4.252 ± 0.016 5.475 ± 0.017 6.668 ± 0.019
COA 3.359 ± 0.013 4.628 ± 0.016 5.841 ± 0.029 7.059 ± 0.020
SDO 5.201 ± 0.024 7.482 ± 0.051 9.807 ± 0.023 12.150 ± 0.028
MSA 3.023 ± 0.015 4.200 ± 0.016 5.403 ± 0.019 6.595 ± 0.022
Rasp. Pi 4 BCS 2.284 ± 0.016 2.782 ± 0.020 3.277 ± 0.030 3.771 ± 0.025
GWO 1.868 ± 0.008 2.350 ± 0.010 2.829 ± 0.018 3.313 ± 0.013
EEHO 1.329 ± 0.015 1.862 ± 0.014 2.291 ± 0.022 2.769 ± 0.025
MFO 2.067 ± 0.104 2.557 ± 0.065 3.033 ± 0.038 3.511 ± 0.037
WOA 1.439 ± 0.009 1.926 ± 0.011 2.407 ± 0.013 2.888 ± 0.017
SSA 1.231 ± 0.011 1.698 ± 0.013 2.160 ± 0.016 2.628 ± 0.016
TGA 1.413 ± 0.009 1.904 ± 0.010 2.381 ± 0.010 2.863 ± 0.011
COA 1.692 ± 0.012 2.181 ± 0.014 2.672 ± 0.018 3.164 ± 0.021
SDO 2.173 ± 0.040 3.091 ± 0.047 4.033 ± 0.056 4.964 ± 0.072
MSA 1.341 ± 0.015 1.811 ± 0.018 2.285 ± 0.022 2.753 ± 0.024
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Fé, J.; Correia, S.D.; Tomic, S.; Beko, M. Swarm Optimization for Energy-Based Acoustic Source Localization: A Comprehensive Study. Sensors 2022, 22, 1894. https://doi.org/10.3390/s22051894

AMA Style

Fé J, Correia SD, Tomic S, Beko M. Swarm Optimization for Energy-Based Acoustic Source Localization: A Comprehensive Study. Sensors. 2022; 22(5):1894. https://doi.org/10.3390/s22051894

Chicago/Turabian Style

Fé, João, Sérgio D. Correia, Slavisa Tomic, and Marko Beko. 2022. "Swarm Optimization for Energy-Based Acoustic Source Localization: A Comprehensive Study" Sensors 22, no. 5: 1894. https://doi.org/10.3390/s22051894

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop