Abstract
Wireless sensor networks deployed in coal mines could help companies provide workers working in coal mines with more qualified working conditions. With the underground information collected by sensor nodes at hand, the underground working conditions could be evaluated more precisely. However, sensor nodes may tend to malfunction due to their limited energy supply. In this paper, we study the cross-layer optimization problem for wireless rechargeable sensor networks implemented in coal mines, of which the energy could be replenished through the newly-brewed wireless energy transfer technique. The main results of this article are two-fold: firstly, we obtain the optimal relay nodes’ placement according to the minimum overall energy consumption criterion through the Lagrange dual problem and KKT conditions; secondly, the optimal strategies for recharging locomotives and wireless sensor networks are acquired by solving a cross-layer optimization problem. The cyclic nature of these strategies is also manifested through simulations in this paper.
  1. Introduction
With the help of the rapid development of micro-electro-mechanical systems (MEMS), various types of sensors and actuators can be forged into an incredibly small size. Together with the state-of-the-art wireless communication technologies, wireless sensor networks (WSNs) are now playing an indispensable role in environment monitoring, target tracking, disaster rescuing and industrial process control [].
Wireless sensor networks deployed in coal mines are assigned to gather environment temperature, humidity, seismic, gas leak information, etc. With this information at hand, we are able to evaluate the safety issues more precisely and provide workers with more reliable working conditions. However, due to the built-in nature of wireless sensor nodes, they are prone to different types of failures. Therefore, it is still not an easy task to ensure that these sensor nodes work properly over a long time. Since sensor nodes deployed in an underground environment may suffer from certain unattended ordeals, such as high temperature and humidity, the reasons accounting for failures of them may vary a great deal. Amongst all of these reasons, running out of energy supply takes up a large percentage of the reasons for node failure incidents.
Sensor nodes deployed in coal mines may be installed on the ceilings of mine tunnels or in walls; it is somehow difficult, if not impossible, to replace their batteries when their energy is depleted. Meanwhile, the energy harvesting techniques introduced by researchers may not be applied easily, since light, wind and ambient radio are all scanty commodities in an underground environment. Many other research works have been conducted in order to spend every bit of energy more wisely and efficiently to balance the communication load among all sensor nodes and to prolong the lifetime of WSNs. All of these works will be discussed in Section 2.
In this article, we discuss the corresponding issues of wireless rechargeable sensor networks that are implemented in coal mines with wireless energy transfer technique to prevent sensor nodes from energy depletion. As for wireless rechargeable sensor networks, this means that sensor nodes are equipped with certain wireless energy-receiving devices, such that they are able to receive energy charging remotely from a wireless power transferring source. The wireless energy transfer is not a brand-new concept. Early in the 20th century, this technique was advocated by a great inventor, Nikola Tesla. At the turn of the 21st century, the world witnessed the tremendous development of the inductive wireless power transfer technique. Kurs et al. from the Massachusetts Institute of Technology (MIT) proposed a new way to transfer energy remotely in a non-radiative way by means of the same magnetic resonance frequency among the transferor and the transferees. This technique is pretty suitable for wireless sensor networks in coal mines due to several reasons. Firstly, the way of wireless energy transfer is inductive, which will reduce the chance of fire accidents. Secondly, this type of wireless energy transfer nearly has no interference with this communication process.
The main contribution of this article is that we discuss the optimal cross-layer optimization problem for wireless sensor networks implemented for coal mines with the wireless energy transfer technique. The sensor nodes installed in coal mines are recharged remotely by mine locomotives passing through the tunnels with wireless energy transfer devices mounted on them. In order to make these sensor nodes immune to insufficient energy supply, the compatible working schemes for wireless sensor nodes and locomotives for recharging tasks are developed in this article. In order to obtain these schemes, two optimization problems are formulated and solved in this paper. The optimal working schemes are composed of the relaying nodes’ placement, the traveling paths taken by recharging locomotives, the charging time, etc.
The rest of this article is organized as follows: In Section 2, we introduce the wireless energy transfer technique, as well as some research results related to energy-aware issues in wireless sensor networks briefly. In Section 3, the working scenarios of wireless rechargeable sensor networks and recharging locomotives are introduced. In this section, we also introduce some preliminary knowledge and notations. In Section 4, the problem of optimal relay nodes’ placement is discussed. The problem is solved according to the Lagrange dual problem and the KKT (Karush–Kuhn–Tucker) conditions. In Section 5, the cross-layer optimization problem considering the working strategies of both sensor nodes and recharging locomotives is formulated and then reshaped into a linear programming problem with identical optimality. In Section 6, we perform simulations and analyze the numerical results. Section 7 concludes this paper.
2. Related Works
2.1. Wireless Energy Transfer
In the year 2007, Kurs from the Massachusetts Institution of Technology (MIT) published a breaking-through paper [] in Science discussing transferring energy through magnetic fields between two coupled coils. The wireless energy transfer method introduced by this MIT research team has high efficiency and can be performed from a relatively long distance. Later on, this team co-founded the WiTricity Cooperation and manufactured several different types of wireless energy transfer devices, such as Prodigy, WiT-5000, WiT-3300, etc. Recently, many researchers enriched the theoretical results and practical usages of the newly-brewed wireless energy transfer technique. Zhong et al. found a way to make a three-coil wireless energy transfer system more efficient than a two-coil one []. Experiments were also conducted by Tang et al. to show the efficiency of wireless energy transfer between unsegmented and segmented coupling coils []. Li et al. wrote a paper introducing the potential usage of wireless energy transfer for electrical vehicles []. Wireless energy transfer may also be adopted to deliver energy to some in-body medical parts, such as heart pacemakers instead of complicated open chest surgery [].
The wireless energy transfer method proposed by Kurs has several advantages compared to previous ones. First of all, this method adopts a non-radiative way to deliver energy between the transferor and transferees efficiently, even if there are ferrous obstacles amongst them. Secondly, the transfer range can be further increased by installing repeaters between the transferor and transferees. Moreover, this type of energy transfer has high directionality, i.e., the energy delivery only succeeds among coils of the same magnetic resonance frequency. Besides, the energy transfer process has almost no interference with wireless communications, which makes it a suitable way to replenish the energy of sensor nodes. Khripkov et al. developed a data telemetry device, which can be charged remotely by a wireless energy transfer technique []. What is more, fortunately, the non-radiative nature of this wireless energy transfer technique will not emit electromagnetic waves and, hence, will not probably induce fire accidents or explosions, which is a huge advantage with respect to dealing with the safety-related issues in the complicated underground environment.
2.2. Energy-Related Issues in WSNs
Since sensor nodes in WSNs have a limited energy supply, they will sooner or later experience the depletion of their power sources. The whole network, therefore, may probably be paralyzed because of the failures of sensor nodes running out of energy. In dealing with this problem, many researchers devoted themselves to problems related to energy-aware issues in WSNs. Recently, many subtle energy-aware protocols have been proposed to use every drop of energy efficiently to prolong the lifetime of WSNs. Dervis et al. proposed a hierarchical clustering method and a corresponding data routing and cluster head election protocol to balance the remaining node energy, such that the lifetime of the wireless sensor network gets prolonged []. Selcuk et al. proposed an optimization problem to obtain the optimal energy-aware data routing scheme. The solution is acquired by implementing the differential evolution method []. Nicolas et al. studied the data routing recovery methods in wireless sensor networks while using controlled mobility to locate sensor nodes []. Zhao et al. made a comprehensive study on the medium access control (MAC) protocols applied in wireless sensor networks []. Jang et al. provided an energy-efficient MAC protocol to avoid overhearing and reduce contention and delay by asynchronous scheduling the wake-up time of neighboring nodes []. Cross-layer optimization methods were also well studied during these years in order to provide inter-layer solutions to energy-aware problems []. Indeed, these methods can squeeze out every bit of the node energy, balance the energy usage amongst different sensor nodes and prolong the lifetime of wireless sensor networks. Nevertheless, sensor nodes may still be inclined to malfunction due to their limited energy supply.
Many other researchers focus on developing suitable energy-harvesting technology to endow sensor nodes with a certain ability to harvest energy from the environment. The system architecture proposed by Yang et al. could acquire energy from solar power []. The sensor networks having a distributed fashion could achieve the optimal end-to-end network performance. Shigeta et al. developed a software control method for maximizing the sensing rate of WSNs, which could harvest energy from the ambient RF power []. Other researchers study the impact of energy-harvesting technology on the stability region of WSNs. Jeon and Ephremides characterized the stability region of the packet queues given energy-harvesting rates for the two-node slotted ALOHA system []. They also accurately assessed the effect of limited, but renewable, energy availability due to harvesting on the stability region by comparing against the case of having unlimited energy []. Pappas et al. provided inner and outer bounds on the stability region of a two-hop network with an energy harvesting source and relay []. They also discussed the relatively unexplored and important domain of energy harvesting in two-hop sensor networks by studying the maximum stable throughput region metric []. Krikidis et al. investigated the effects of network-layer cooperation in a wireless three-node network with energy-harvesting nodes and bursty data traffic. Additionally, they prove that orthogonal decode-and-forward cooperative schemes achieve a higher maximum stable throughput than a direct link for scenarios with poor energy arrival rates [].
2.3. WSNs in Coal Mines
In recent years, safety-related issues and wireless sensor networks for coal mines are becoming more and more attractive []. Nazir et al. studied the routing scheme for emergency data for wireless sensor networking for coal mines []. Ruan et al. proposed an algorithm for task scheduling for underground wireless sensor networks based on distributed computing []. Menon et al. developed an early warning system (EWS) deployment strategy for wireless sensor networks in coal mines []. The corresponding power optimization strategies can switch sensor nodes to energy saving mode to reduce the energy consumption. However, research of wireless sensor networks implemented in coal mines with wireless energy transfer devices is still new and open to discussion.
3. The Working Scenario and Problems Statement
3.1. The Working Scenario
The wireless sensor networks that we discuss here is intended to work in coal mines. A typical coal mine consists of several layers, as shown in Figure 1. The vertical well connects different layers together through mine tracks. The railroads paved on different layers lead the way to different pit faces where the mining operation proceeds. At certain locations of interest, different types of wireless sensor nodes are installed to gauge the humidity, temperature and gas density and to send these data back to a base station or a data center for future analysis. The data transmitting and receiving procedure will definitely consume a large portion of battery energy. Therefore, sooner or later, sensor nodes will encounter the problem of insufficient energy supply no matter what energy-saving techniques are adopted.
      
    
    Figure 1.
      The sketch map of a coal mine.
  
In order to make sensor nodes work properly without the problem caused by insufficient energy supply, recharging locomotives with wireless energy transfer devices mounted on them will cyclically stop by each sensor node and recharge it with a certain amount of energy, such that the energy of each sensor node will not fall below a certain level before the next round recharging task.
3.2. Problems Statement
The problems we discuss in this article can be split into two main sub-problems. Firstly, since each sensor node has a limited communication ability, relay nodes are a great need to keep the whole network connected. However, different criteria will lead to different sensor node placement strategies. In this paper, we study the optimal relay nodes’ placement with minimum overall energy usage as a criterion. The procedure of solving this problem is elaborated in Section 4. Secondly, as mentioned in previous sections, unmanned locomotives will charge sensor nodes to make sure that no sensor node will suffer from the shortage of energy supply. However, the design of charging strategies of locomotives is not trivial. Many factors, such as the traveling path, the charging power and charging durations for different sensor nodes, should be taken into consideration. In Section 5, in order to deal with this problem, we formulate an optimization problem and reshape it into a linear programming problem, which can be solved efficiently.
4. The Optimal Relay Nodes Placement with Respect to Minimum Overall Power Usage
4.1. Problem Formulation
Each sensor node has a limited communication ability; therefore, without pre-installed relay nodes, data acquired by sensor nodes may not be able to be piggybacked to the base station. In this section, we try to give the optimal scheme for relay nodes’ placement with respect to minimum overall power usage. Without losing the rigorous nature of mathematics, we resort to the Lagrange dual problem and KKT conditions in order to figure out the closed-form solution.
Before we step forward into the problem formulation, please allow us to introduce some notations used here. Since the networking issues among all layers are similar to each other, without any loss of generality, we take one layer of the mine for example. Since most coal mines are composed of tunnels, the topological structure of sensor networks of coal mines is somewhat linear. The optimization problem we formulated in this section is aimed to minimize the energy consumption of sensor and relay nodes along a linear structure. Assume that the distance between two sensor nodes is L meters. The communication range of each sensor node is R meters, and R < L. For the successful communication between these two sensor nodes, a certain amount of relay sensor nodes should be placed between them. As shown in Figure 2, there are n relay nodes placed successively at , and each of these sensor nodes has a communication range of R meters. The positions of the two sensor nodes are denoted as  and . We assume that the relay nodes are only reliable for receiving and forwarding data in the following discussion.
      
    
    Figure 2.
      A sketch map for sensor nodes and relay nodes.
  
The power usage of each node is composed of transmitting, receiving, processing and sensing data. Since the last two parts are relatively smaller compared to the first two factors and are independent of the optimization problem we discuss below, therefore, we omit the last two factors in the formulation of our optimization problem. The power usage of a node when transmitting data can be modeled as:
		
      
        
      
      
      
      
    
		where  is the transmitting power used by node i at time instance t,  is the transmitting distance, k is often chosen between two and four and  is the transmitting data rate of node i at time instance t. The symbols  and  are power-related constants.
The receiving power used by node i can be modeled as:
		
      
        
      
      
      
      
    
		where  is the power used for receiving data at time instance t,  is the receiving data rate and ρ is the power-related constant.
As shown in Figure 2, there are two sensor nodes and n relay nodes. By the definition of  given in the previous section, we have the following equation,
        
      
        
      
      
      
      
    
        where  is the distance between two successive sensor nodes.
Then, we formulate the following optimization problem, OPT-1:
		
      
        
      
      
      
      
    
In this optimization problem, our objective is to minimize the energy used for transmitting data among sensor nodes and the corresponding relay nodes. The optimization variables are the number of relaying nodes n, which is an integer value, and the distance between two nodes . The optimization constants are the power-related constants, i.e., ,  and ρ, the transmitting data rate of the first sensor node, .
Since all nodes should communicate properly, we have . After solving this problem, we are able to obtain the optimal number and placement for relay nodes.
4.2. Solution to OPT-1
To solve this optimization problem, we might use the method of the Lagrange multiplier. However, the mathematical correctness and completeness of this method can only be ensured when finding extreme points for problems with equality constraints. The optimization problem formulated in Section 4.1 obviously has inequality constraints and an integer optimization variable. Therefore, the method of the Lagrange multiplier may not be applied easily without any criticism. In order to solve this problem, alternatively, we firstly divide OPT-1 into two sub-optimization problems. Secondly, we form the Lagrange dual problem of the first one and prove the strong duality of the prime and dual problems. Eventually, we combine these two optimization problems together to get the optimal number and placement for relay nodes.
By substituting the objective function with Equations (1) and (2), we have:
		
      
        
      
      
      
      
    
The objective function can be further reshaped as:
		
      
        
      
      
      
      
    
		where  and  are the data that the i-th node transmits and receives during the time period τ. For the data integrity, during the time period τ, we have the following chain equation,
        
      
        
      
      
      
      
    
This chain equation indicates that during time period τ, the data transmitted by the i-th node are equal to the data received by it (in this article, we do not take into consideration the data aggregation and data compression at each node).
After expanding the objective function, we have:
		
      
        
      
      
      
      
    
The Constraints (1) and (2) are omitted here in that they have been already plugged into the objective function. The optimization variables are the number of relay nodes n and the distance between two successive nodes . To solve this optimization problem, we firstly divide it into two sub-optimization problems.
For a given number n, we can firstly solve the following optimization problem OPT-2,
        
      
        
      
      
      
      
    
It is not difficult to verify that this optimization problem is a convex problem since the objective function and all of the constraints are convex.
Then, the Lagrangian of this prime optimization problem is:
		
      
        
      
      
      
      
    
The Lagrangian dual function is defined as:
		
      
        
      
      
      
      
    
		where the  stands for the infimum over all .
The Lagrange dual problem of the prime problem is:
		
      
        
      
      
      
      
    
In general cases, the optimal value of the dual problem always provides a loose lower bound of the optimal value of the prime one. However, in this case, we can prove that the strong duality holds for the prime and dual problems, that is the optimal values of the prime and dual problem are identical.
		
Theorem 1.  
The strong duality of the prime optimization problem OPT-2 and its Lagrange dual problem holds, i.e., the optimal values of these two problem are identical.
The proof of this theorem is not trivial, and we leave it to the Appendix section for a better intelligibility. The next theorem will show a necessary condition for achieving the optimality of OPT-1.
		
Theorem 2.  
The optimality of OPT-1 can be achieved only if relay nodes are placed at the equal partition points between two sensor nodes.
Proof.  
Since the prime optimization problem OPT-2 is a convex problem and the strong duality holds, we can use the KKT conditions to figure out the optimal value of both the prime and dual optimization problems.
The KKT conditions for OPT-2 for a given n are listed below:
		
      
        
      
      
      
      
    
After solving this set of equations, we can draw the conclusion that,
        
      
        
      
      
      
      
    
        which means that relay nodes must be put at the equal partition points between two sensor nodes to get the minimum overall energy consumption, since the first term of the objective function of OPT-1 is constant given the value of n.
The next step is to decide how many relay nodes should be installed. Since relay nodes should be placed at the equal partition points, the optimization problem OPT-1 can be rewritten as the following optimization problem, denoted as OPT-3,
        
      
        
      
      
      
      
    
The variable n of this optimization problem must have an integer value. However, we can first take the unconstrained problem into consideration, i.e.,
        
      
        
      
      
      
      
    
By calculating the second derivative of the objective function, we could find out that this function is strict convex when  is greater than zero. Therefore, this problem can be solved by calculating the stationary points of the objective function, i.e., if any stationary point exists when n is greater than zero, it also must be the minimum point. In order to calculate the stationary point, we first calculate the first derivative of the objective function. We have:
		
      
        
      
      
      
      
    
Therefore,
        
      
        
      
      
      
      
    
From the property of convex functions, we have the following conclusions:
		
- If is an integer and , then ;
 - If , but is not endowed with an integer value, then the value of n is chosen from and ;
 - If , then the value of n is .
 
Next, the correctness of solving OPT-1 via the given procedure can be validated by contradiction.
Assume that the value n and the relay nodes’ placement is not optimal, i.e., there exist another value  and a relay nodes’ placement method that lead to a smaller objective value of OPT-1. However, for a given , due to the result of OPT-2, the objective function can only be minimized by placing relay nodes at the equal partition points. Then, OPT-1 is transformed into OPT-3. Since the value of n is obtained by solving OPT-3, the objective function value must be smaller than that acquired by , which causes the contradiction. Therefore, the optimality of OPT-1 can be ensured when following the given solution procedure. ☐
5. The Optimal Working Strategies for Wireless Rechargeable Sensor Networks
In the last section, we discuss the relay nodes’ placement issue. After that, we will study the working strategies for sensor nodes and the recharging locomotives. The working strategies consist of the data routing protocols, roaming path, energy charging time, etc.. In order to obtain these strategies, we formulated another optimization problem and reshape it into a linear programming problem, which can be solved efficiently.
5.1. Problem Formulation
Assume that there are N nodes, including sensor nodes and relay nodes, deployed in one layer of the coal mine. Each node is equipped with a wireless rechargeable battery. The initial energy of each node is denoted as . The minimum energy level to maintain the routine duty of sensor nodes is denoted as , where .
Before formulating the optimization problem, we should first introduce some constraints that nodes and recharging locomotives should comply with. First of all, all nodes, including sensor nodes and relay nodes, should satisfy the following equation:
      
        
      
      
      
      
    
		where  is the data rate generated by nodes i. For relay nodes,  is zero.  is the data rate received by node i at time instance t.  is the data rate transmitted by node i at time instance t. In other words, Equation (12) is the network flow constraint.
The second constraint is the power usage constraint. Each sensor node should satisfy:
		
      
        
      
      
      
      
    
We want to design cyclic work strategies for the recharging locomotive, that is it will roam periodically along the traveling path and charge each sensor node with a certain amount of energy. The period of each workload of recharging locomotives is denoted as τ. In order to meet the periodic requirement, the energy consumed during each period should be the same as that recharged, i.e.,
        
      
        
      
      
      
      
    
        where U is the power used for recharging nodes and τ is the length of a single charging period.
During each period, in order to keep sensor nodes working properly, the energy level of each node should not fall below  and should not exceed , which is the upper bound of battery energy. Therefore, we have the following constraint:
		
      
        
      
      
      
      
    
There are also some constraints that the wireless energy transfer device should satisfy. First of all, since the wireless energy transfer device should stop by each node, we denote the visiting order of nodes as , where  stands for the sojourn spot at which the locomotive receives services, such as replacing the energy source, checking mechanical structure status, and so on.  stands for the i-th node visited by the wireless energy transfer device. The length of the traveling path taken by the wireless energy transfer device is denote as , and the time spent on roaming is denoted as . Then, we have,
        
      
        
      
      
      
      
    
        where V is the moving velocity of the recharging locomotive.
τ could be further divided into three parts, that is,
        
      
        
      
      
      
      
    
        where  is the time spent on staying at the sojourn spot and  is the time spent on charging the i-th node along the traveling path.
In order to minimize the interference introduced by locomotives mounted with wireless energy devices when roaming around the sensor networks, we hope that locomotives could stay at sojourn spots as much as possible while all of the Constraints (12)–(17) will be satisfied. Therefore, we have the following optimization problem, OPT-4,
        
      
        
      
      
      
      
    
The objective function stands for our pursuit of more time spent at sojourn spots in each charging period. The optimization variables of OPT-4 are the traveling path P,,,τ, and , and the rest of the symbols stand for the optimization constants.
5.2. The Simplification and Linearization of OPT-4
The optimization problem formulated in the last subsection is not easy to solve for several reasons. First of all, the optimization problem has variables that are continuous over time. Secondly, the constraints of this problem contain integration terms and proportional terms, which make this problem nonlinear. Therefore, it is not an easy job to find an efficient algorithm to obtain the optimal solution. Instead of providing a heuristic algorithm, in this paper, we try to reach the optimal solution of OPT-4 by simplifying and linearizing it.
First of all, we want to introduce two properties that are useful when transforming the original problem into a linear programming problem.
		
Property 1.  
The energy of each node reaches its peak when the locomotive mounted with the wireless transfer device finishes recharging it. Moreover, its energy falls to the bottom when the locomotive arrives at this node.
Property 2.  
If the batteries of nodes are fully recharged, that is the energy of each battery reached when the locomotive finishes recharging task, the optimal value of OPT-4 remains the same.
With these two properties, we are able to slightly change the form of OPT-4. For the constraint (15), we can rewrite it as:
		
      
        
      
      
      
      
    
		where  denotes the arriving time of the recharging locomotive at the i-th node. Then, we have the new optimization problem, OPT-5, with identical optimality.
        
      
        
      
      
      
      
    
We will then try to take the integration terms out to simplify OPT-5. The integration terms are introduced by Constraint (14). We first substitute Equation (14) with Equations (12) and (13), then we have:
		
      
        
      
      
      
      
    
According to the Lagrange mean value theorem, there exists  and , which satisfy:
		
      
        
      
      
      
      
    
For Equation (12), we have,
        
      
        
      
      
      
      
    
Then, we have the optimization problem OPT-6,
        
      
        
      
      
      
      
    
The constraint (14) is omitted since we plug it into Equation (20).
In OPT-6, we use  and  instead of continuous variables. The next theorem will show the equal optimality of OPT-5 and OPT-6.
		
Theorem 3.  
If we use discrete variables  and  instead of  and , the optimal values of both OPT-5 and OPT-6 are the same, that is OPT-5 and OPT-6 have equal optimality.
Proof.  
The proof of this theorem can be divided into two steps. On the one hand, since we use  and  instead of  and , the flexibility of variables is of course compromised to a certain extent. The optimal values of OPT-5 and OPT-6 are denoted as  and . Then, we have . On the other hand, for each feasible solution of OPT-5, we are always able to construct a corresponding solution to OPT-6 that yields the same objective value, which means . Therefore, we have . ☐
The next theorem will tell us the optimal traveling path that the locomotive should take to achieve the optimality.
		
Theorem 4.  
The optimal traveling path that the recharging locomotive should take is the shortest roaming path connecting all nodes and the sojourn spot.
Proof.  
The proof of this theorem is based on contradiction, that is if a solution to the optimization problem yields the optimal value while the locomotive does not follow the shortest roaming path, we can construct a new solution from it that yields a better objective value while the locomotive travels along the shortest roaming path. Intuitively, if the locomotive spends less time on traveling, it will be rewarded more time staying at the sojourn spot. ☐
For a given shortest roaming path in a coal mine and a given moving velocity, the constraint (15) can also be omitted in OPT-6. Then, we have the following optimization problem, OPT-7:
		
      
        
      
      
      
      
    
By exploiting the cyclic nature, OPT-7 can be further reshaped as:
		
      
        
      
      
      
      
    
We denote this problem as OPT-8, and it can be further linearized as:
		
      
        
      
      
      
      
    
The above optimization problem is OPT-9, and the reshaping process is elaborated in the Appendix section. Now, OPT-9 is a linear programming problem with optimization variables , ,  and . Additionally, this linear programming program can be solved efficiently by some commercial tools, such as LINDO API and CPLEX.
6. Simulations and Numerical Analysis
6.1. Simulation Scenario
The simulation scenario is a coal mine with three layers (Layers A, B and C), as shown in Figure 3. The vertical tunnel connects the three layers. In this section, the simulation will be conducted at the vertical tunnel and one horizontal layer (Layer A). The figure of Layer A is shown in Figure 4. At each intersection of the vertical and horizontal tunnels, there is one sub-base station, which has the duty of collecting the data of its own layer and forwarding them to the base station.
Several sensor nodes are installed along the mine tracks of the vertical tunnel and horizontal tunnels. There are also some of them installed at pit faces to collect the environmental information. At the entrance of each branch of horizontal tunnel, a relay node is placed in case of wireless signal loss. The nodes’ placement is shown in Figure 4. The sensor nodes are labeled with dot symbols. The relay nodes at branch entrances and the sub-base station are denoted as hollow circles. The sojourn spot of the recharging locomotive is located at the sub-base station. After recharging each node, the recharging locomotive will stay at the sojourn spot receiving maintenance.
      
    
    Figure 3.
      A sketch map for a coal mine with three layers.
  
      
    
    Figure 4.
      A sketch map for the sensor nodes deployment in Layer A.
  
6.2. Simulation Parameters
The rate of data generated by each sensor nodes is listed in Table 1. The data rates are random numbers ranging from 10–20 kb/s. The lengths between each node are labeled in Figure 4. The moving velocity of the recharging locomotive is 5 m/s. The energy-related parameters are listed in Table 2. The communication range of each node is 100 m.
       
    
    Table 1.
    The ri of each sensor node in Layer A.
  
| Node No. | ri (kb/s) | Node No. | ri (kb/s) | Node No. | ri (kb/s) | 
|---|---|---|---|---|---|
| 1 | 17 | 5 | 14 | 9 | 19 | 
| 2 | 16 | 6 | 18 | 10 | 19 | 
| 3 | 19 | 7 | 15 | 11 | 10 | 
| 4 | 13 | 8 | 18 | 
       
    
    Table 2.
    Values of parameters related to power usage.
  
| Notation | Value | Notation | Value | Notation | Value | 
|---|---|---|---|---|---|
| Emax | 10.8 kJ | U | 5 W | Φ1 | 50 nJ/b | 
| Emin | 540 J | ρ | 50 nJ/b | Φ2 | 0.013 pJ/(b m4) | 
| v | 5 m/s | 
6.3. Simulation Tools
The simulation codes are programmed and executed on a ThinkPad W530. The CPU of this computer is an Intel Core i7-3840, and its RAM is 16 GB. The operation system is Win7 Home Premium. We use Microsoft VS 2010 and the LINDO API to solve the optimization problem. MATLAB R2010a is used to analyze the data and draw the corresponding pictures.
6.4. Simulation Results
In the simulation, we compare the charging strategy corresponding to the minimum energy consumption routing with the one corresponding to the minimum hop routing. For minimum hops and minimum power usage routing schemes, the relay nodes’ placement for Layer A is listed in Table 3. The optimal numbers and deploying locations of relay nodes in minimum energy consumption mode are calculated according to OPT-1, OPT-2 and OPT-3.
       
    
    Table 3.
    Relay nodes’ placement for both minimum hops and minimum overall energy consumption routings in Layer A. BE, branch entrance.
  
| Placement | No. of Relay Nodes for Minimum Hop Routing | No. of Relay Nodes for Minimum Overall Power Usage Routing (Theoretically) | No. of Relay Nodes for Minimum Overall Power Usage Routing (Floor Number) | No. of Relay Nodes for Minimum Overall Power Usage Routing (Ceiling Number) | 
|---|---|---|---|---|
| 1-2 | 6 | 8.8 | 8 | 9 | 
| 2-BE | 3 | 3.9 | 3 | 4 | 
| 3-4 | 2 | 3.2 | 3 | 4 | 
| 4-BE | 6 | 8.8 | 8 | 9 | 
| 5-6 | 3 | 3.9 | 3 | 4 | 
| 6-BE | 2 | 2.9 | 2 | 3 | 
| 7-8 | 1 | 1.5 | 1 | 2 | 
| 7-BE | 3 | 4.6 | 4 | 5 | 
| 9-10 | 9 | 13 | 13 | 14 | 
| 9-BE | 2 | 3.2 | 3 | 4 | 
| 11-BE | 3 | 4.6 | 4 | 5 | 
The notation “1-2” in the first column means relay nodes should be placed on the equal partition points between Sensor Nodes 1 and 2. The notation “2-BE” means relay nodes should be placed on the equal partition points between Sensor Node 2 and the node places at the entrance of this branch (BE). The second column tells us how many relay nodes should be placed according to the minimum hop routing. The third column shows the optimal number of nodes theoretically according to the minimum overall power usage routing. Columns 3 and 4 show the floor and ceiling numbers. The locations and numbers of nodes are shown in Figure 5.
The optimal traveling path of the recharging locomotive is shown in Figure 6. After solving OPT-9, we have the optimal working strategies for both routing minimum energy consumption and minimum hop schemes, which are manifested in Table 4 and Table 5.
      
    
    Figure 5.
      The node numbers after adding relay nodes for both routing schemes in Layer A. (a) Minimum hop routing. (b) Minimum overall power usage routing.
  
      
    
    Figure 6.
      The optimal traveling path of the recharging locomotive in Layer A.
  
       
    
    Table 4.
    The working strategies for minimum hop routing in Layer A.
  
| Node No. | Arrival Time (s) | Recharging Duration (s) | Remaining Battery Energy (J) | Node No. | Arrival Time (s) | Recharging Duration (s) | Remaining Battery Energy (J) | 
|---|---|---|---|---|---|---|---|
| 56 | 437, 442 | 267 | 9462 | 16 | 454, 418 | 382 | 8890 | 
| 55 | 437, 727 | 342 | 9091 | 15 | 454, 820 | 382 | 8890 | 
| 54 | 438, 085 | 342 | 9091 | 14 | 455, 223 | 382 | 8890 | 
| 53 | 438, 443 | 342 | 9091 | 13 | 455, 625 | 382 | 8890 | 
| 52 | 438, 800 | 342 | 9091 | 12 | 456, 027 | 382 | 8890 | 
| 34 | 439, 162 | 342 | 9091 | 63 | 456, 429 | 382 | 8890 | 
| 33 | 439, 524 | 342 | 9091 | 62 | 457, 032 | 382 | 8890 | 
| 32 | 439, 886 | 438 | 8608 | 61 | 457, 434 | 382 | 8890 | 
| 31 | 440, 345 | 508 | 8259 | 60 | 457, 836 | 681 | 7397 | 
| 30 | 508 | 8259 | 59 | 764 | 6983 | ||
| 29 | 508 | 8259 | 58 | 764 | 6983 | ||
| 11 | 299 | 9305 | 57 | 157 | |||
| 10 | 382 | 8890 | 28 | 201 | 9794 | ||
| 9 | 382 | 8890 | 27 | 201 | 9794 | ||
| 8 | 587 | 7868 | 26 | 201 | 9794 | ||
| 7 | 643 | 7585 | 25 | 407 | 8764 | ||
| 6 | 643 | 7585 | 24 | 407 | 8764 | ||
| 5 | 643 | 7585 | 23 | 951 | 6054 | ||
| 4 | 643 | 7585 | 22 | 951 | 6054 | ||
| 3 | 643 | 7585 | 51 | 951 | 6054 | ||
| 2 | 643 | 7585 | 50 | 643 | 7585 | ||
| 1 | 154 | 49 | 643 | 7585 | |||
| 73 | 215 | 9721 | 48 | 845 | 6582 | ||
| 72 | 215 | 9721 | 47 | 845 | 6582 | ||
| 71 | 215 | 9721 | 46 | 845 | 6582 | ||
| 70 | 485 | 8375 | 45 | 845 | 6582 | ||
| 69 | 564 | 7983 | 44 | 845 | 6582 | ||
| 68 | 564 | 7983 | 43 | 1199 | 4818 | ||
| 67 | 177 | 9912 | 42 | 1199 | 4818 | ||
| 66 | 243 | 9584 | 41 | 1199 | 4818 | ||
| 65 | 585 | 7877 | 40 | 1199 | 4818 | ||
| 64 | 664 | 7484 | 39 | 1199 | 4818 | ||
| 21 | 664 | 7484 | 38 | 2061 | 540 | ||
| 19 | 664 | 7484 | 37 | 2061 | 540 | ||
| 18 | 299 | 9305 | 36 | 2061 | 540 | ||
| 17 | 382 | 8890 | 
       
    
    Table 5.
    The working strategies for minimum overall energy consumption routing in Layer A.
  
| Node No. | Arrival Time (s) | Recharging Duration (s) | Remaining Battery Energy (J) | Node No. | Arrival Time (s) | Recharging Duration (s) | Remaining Battery Energy (J) | 
|---|---|---|---|---|---|---|---|
| 81 | 195 | 9820 | 22 | 340 | 9099 | ||
| 80 | 316 | 9217 | 21 | 340 | 9099 | ||
| 79 | 316 | 9217 | 20 | 340 | 9099 | ||
| 78 | 316 | 9217 | 19 | 340 | 9099 | ||
| 77 | 316 | 9217 | 18 | 340 | 9099 | ||
| 76 | 316 | 9217 | 17 | 340 | 9099 | ||
| 75 | 316 | 9217 | 16 | 340 | 9099 | ||
| 48 | 316 | 9217 | 92 | 340 | 9099 | ||
| 47 | 316 | 9217 | 91 | 340 | 9099 | ||
| 46 | 316 | 9217 | 90 | 340 | 9099 | ||
| 45 | 501 | 8296 | 89 | 495 | 8324 | ||
| 44 | 614 | 7729 | 88 | 630 | 7651 | ||
| 43 | 614 | 7729 | 87 | 630 | 7651 | ||
| 42 | 614 | 7729 | 86 | 630 | 7651 | ||
| 41 | 614 | 7729 | 85 | 630 | 7651 | ||
| 40 | 180 | 9898 | 84 | 108 | |||
| 15 | 315 | 9225 | 83 | 179 | 9904 | ||
| 14 | 315 | 9225 | 82 | 179 | 9904 | ||
| 13 | 315 | 9225 | 39 | 179 | 9904 | ||
| 12 | 315 | 9225 | 38 | 179 | 9904 | ||
| 11 | 503 | 8283 | 37 | 179 | 9904 | ||
| 10 | 595 | 7822 | 36 | 506 | 8269 | ||
| 9 | 595 | 7822 | 35 | 506 | 8269 | ||
| 8 | 595 | 7822 | 34 | 506 | 8269 | ||
| 7 | 595 | 7822 | 33 | 1122 | 5196 | ||
| 6 | 595 | 7822 | 32 | 1122 | 5196 | ||
| 5 | 595 | 7822 | 31 | 1122 | 5196 | ||
| 4 | 595 | 7822 | 74 | 1122 | 5196 | ||
| 3 | 595 | 7822 | 73 | 573 | 7936 | ||
| 2 | 595 | 7822 | 72 | 573 | 7936 | ||
| 1 | 161 | 9993 | 71 | 573 | 7936 | ||
| 106 | 260 | 9496 | 70 | 714 | 7231 | ||
| 105 | 260 | 9496 | 69 | 714 | 7231 | ||
| 104 | 260 | 9496 | 68 | 714 | 7231 | ||
| 103 | 260 | 9496 | 67 | 714 | 7231 | ||
| 102 | 468 | 8460 | 66 | 714 | 7231 | ||
| 101 | 595 | 7822 | 65 | 714 | 7231 | ||
| 100 | 595 | 7822 | 64 | 714 | 7231 | ||
| 99 | 595 | 7822 | 63 | 714 | 7231 | ||
| 98 | 142 | 62 | 1279 | 4414 | |||
| 97 | 248 | 9556 | 61 | 1279 | 4414 | ||
| 96 | 248 | 9556 | 60 | 1279 | 4414 | ||
| 95 | 463 | 8484 | 59 | 1279 | 4414 | ||
| 94 | 591 | 7847 | 58 | 1279 | 4414 | ||
| 93 | 591 | 7847 | 57 | 1279 | 4414 | ||
| 30 | 591 | 7847 | 56 | 1279 | 4414 | ||
| 29 | 591 | 7847 | 55 | 2057 | 540 | ||
| 28 | 591 | 7847 | 54 | 2057 | 540 | ||
| 27 | 205 | 9772 | 53 | 2057 | 540 | ||
| 26 | 340 | 9099 | 52 | 2057 | 540 | ||
| 25 | 340 | 9099 | 51 | 2057 | 540 | ||
| 24 | 340 | 9099 | 50 | 2057 | 540 | ||
| 23 | 340 | 9099 | 49 | 2057 | 540 | 
The optimal traveling path for the recharging locomotive is calculated according to Theorem 4 and is shown in Figure 6. The length of this path is 13,980 m, and the time spent on traveling around it is 2796 s.
The orders of nodes listed in these two tables are according to their visiting orders along the traveling path, that is the first node along the roaming path of the recharging locomotive in Table 4 is the node with number 56, and the second one is the node with number 55. The second column stands for the arrival time of the recharging locomotive in the second working cycle. The third column tells us how long this node should be recharged. The forth column shows the remaining energy of each node in the second working cycle.
The lengths of each working cycle for the minimum hops and minimum overall energy consumption routing are about 4.3 × 105 and 7.1 × 105 s. The  for both of them is 88.52% and 90.22%, which means the minimum overall energy consumption recharging scheme achieves better  than the minimum hop routing recharging scheme.
For the nodes in the vertical tunnel, we also apply the same approach. The optimal traveling path is shown in Figure 7. The corresponding working strategies after solving OPT-9 are shown in Table 6 and Table 7. The  for both of them is 72.93% and 77.23%, which indicates that the minimum energy consumption recharging scheme also yields a better objective value.
      
    
    Figure 7.
      The optimal traveling path for the recharging locomotive in the vertical tunnel.
  
       
    
    Table 6.
    The working strategies for minimum hop routing in the vertical tunnel.
  
| Node No. | Arrival Time (s) | Recharging Duration (s) | Remaining Battery Energy (J) | Node No. | Arrival Time (s) | Recharging Duration (s) | Remaining Battery Energy (J) | 
|---|---|---|---|---|---|---|---|
| 5 | 814 | 6755 | 27 | 972 | 5975 | ||
| 4 | 1040 | 5641 | 26 | 972 | 5975 | ||
| 3 | 1040 | 5641 | 25 | 972 | 5975 | ||
| 2 | 1040 | 5641 | 24 | 993 | 5872 | ||
| 1 | 1040 | 5641 | 23 | 993 | 5872 | ||
| 31 | 745 | 7094 | 22 | 993 | 5872 | ||
| 30 | 952 | 6072 | 21 | 993 | 5872 | ||
| 29 | 952 | 6072 | 20 | 993 | 5872 | ||
| 12 | 952 | 6072 | 19 | 993 | 5872 | ||
| 11 | 952 | 6072 | 18 | 993 | 5872 | ||
| 10 | 952 | 6072 | 17 | 993 | 5872 | ||
| 9 | 952 | 6072 | 16 | 993 | 5872 | ||
| 8 | 725 | 7191 | 15 | 2086 | 540 | ||
| 7 | 972 | 5975 | 14 | 2086 | 540 | ||
| 6 | 972 | 5975 | 13 | 2086 | 540 | ||
| 28 | 972 | 5975 | 
       
    
    Table 7.
    The working strategies for minimum overall energy consumption routing in the vertical tunnel.
  
| Node No. | Arrival Time (s) | Recharging Duration (s) | Remaining Battery Energy (J) | Node No. | Arrival Time (s) | Recharging Duration (s) | Remaining Battery Energy (J) | 
|---|---|---|---|---|---|---|---|
| 8 | 511 | 8249 | 37 | 1076 | 5443 | ||
| 7 | 877 | 6430 | 36 | 1076 | 5443 | ||
| 6 | 877 | 6430 | 35 | 1076 | 5443 | ||
| 5 | 877 | 6430 | 34 | 1076 | 5443 | ||
| 4 | 877 | 6430 | 33 | 1076 | 5443 | ||
| 3 | 877 | 6430 | 32 | 1162 | 5018 | ||
| 2 | 877 | 6430 | 31 | 1162 | 5018 | ||
| 1 | 877 | 6430 | 30 | 1162 | 5018 | ||
| 41 | 657 | 7520 | 29 | 1162 | 5018 | ||
| 40 | 993 | 5857 | 28 | 1162 | 5018 | ||
| 39 | 993 | 5857 | 27 | 1162 | 5018 | ||
| 38 | 993 | 5857 | 26 | 1162 | 5018 | ||
| 17 | 993 | 5857 | 25 | 1162 | 5018 | ||
| 16 | 993 | 5857 | 24 | 1162 | 5018 | ||
| 15 | 993 | 5857 | 23 | 1162 | 5018 | ||
| 14 | 993 | 5857 | 22 | 1162 | 5018 | ||
| 13 | 993 | 5857 | 21 | 2072 | 540 | ||
| 12 | 677 | 7421 | 20 | 2072 | 540 | ||
| 11 | 1076 | 5443 | 19 | 2072 | 540 | ||
| 10 | 1076 | 5443 | 18 | 2072 | 540 | ||
| 9 | 1076 | 544 | 
We also compare our solution via solving the linear programming problem with the one solved by the genetic algorithm. The optimal value figured out by the GA is around 55%. The comparison and the convergence of the GA are shown in Figure 8.
      
    
    Figure 8.
      The caparison of the results obtained by solving the linear programming problem and the GA. (a) The comparison of the objective values obtained by solving the linear programming problem and the GA. (b) The convergence of the GA.
  
Up to now, we have almost finished our discussion on working strategies for wireless rechargeable sensor networks in coal mines. However, this first working cycle is a little bit different from the rest, since at the very beginning of the first cycle, the energy of each node is , which is higher than that at the beginning of the rest cycles. However, if we adjust the recharging power according to:
		
      
        
      
      
      
      
    
		where  stands for the beginning energy of node i at the rest cycles, then we can make the first and second cycle match perfectly. The energy consumption-time chart for the node with the number 53 is drawn Figure 9, and the recharging power for this nodes is adjusted to 0.76 Watts. From this figure, we can see that the initial energy level of this sensor node in the first working cycle is higher that that of the rest cycles.
      
    
    Figure 9.
      The energy consumption time curve of the node with the number 53 in Layer A.
  
7. Conclusions
Recharging sensor nodes deployed in coal mines remotely by implementing the wireless energy transfer technique may provide a promising way to make a wireless sensor network work perpetually. In this paper, we discuss problems on the relay nodes’ placement and the working strategies for wireless rechargeable sensor networks in coal mines in order to keep nodes from malfunctioning caused by insufficient energy supply. Two sets of optimization problems are introduced to obtain the optimal solutions to these two problems. For the problems related to the best relay nodes’ placement, we resort to the Lagrange dual problem and KKT conditions for help. The optimization problems formulated for the optimal working strategies for wireless rechargeable sensor networks are simplified and linearized through several properties and theorems. In the simulation section, the optimal solutions to these problems are provided and compared to the optimal solutions with respect to minimum hop routing schemes.
Acknowledgments
This article is supported by the Natural Science Foundation of China (Grant Nos. 61370088 and 61501161), the International Science & Technology Cooperation Program of China (Grant No. 2014DFB10060) and the Fundamental Research Funds for the Central Universities (Grant No. JZ2015HGBZ0453). We are also in great debt to the anonymous reviewers and editors of this article.
Author Contributions
Xu Ding drafted this article and gave the sketched proofs of the theorems listed in the article. Shi Lei did most of the simulations. Jianghong Han offered the idea of this research. Jingting Lu offered help for refining this article.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A. The Strong Duality
Theorem A1.  
The strong duality of the prime optimization problem OPT-2 and its Lagrange dual problem holds, i.e., the optimal values of these two problems are identical.
The proof of this theorem is a little bit complicated. Before we move forward, we firstly rewrite OPT-2 as follows:
		
      
        
      
      
      
      
    
		where  is a column vector, which is , and  is a column vector of which the entries are all one. The objective function  stands for . For , the inequality constraints stand for . For ,  stands for .
First of all, we denote the feasible solution set to OPT-2 as . Then, we have the following facts:
		
- It is obvious that is not empty, that is it has interior points. Additionally, we have certain , such that and (int stands for the set of interior points of ).
 - The function and are all convex functions for , and the rank of is one.
 
We denote the optimal value of OPT-2 as , and we denote the set  as:
		
      
        
      
      
      
      
    
Then, we have:
		
      
        
      
      
      
      
    
		where ,  and . The Lagrangian dual function of OPT-2 can be written as:
		
      
        
      
      
      
      
    
Now, we define the “epigraph” (the word “epigraph” means “upper graph”) of set  as:
		
      
        
      
      
      
      
    
The convexity of the set  can be justified easily through the definition of convex sets. We define another convex set:
		
      
        
      
      
      
      
    
Then, we can prove that the two convex sets,  and , do not intersect.
Suppose that ; then, we have at least one element . Therefore, we have , and . Since , then we have at least one , such that ,  and , which is impossible, since  is already the optimal solution to OPT-2. Hence, . Since  and  are both convex sets that do not intersect, there must exist a separating hyperplane between them. Therefore, there exists a non-zero vector  and a non-negative number α, such that:
		
      
        
      
      
      
      
    
      
        
      
      
      
      
    
From Equation (A6), we have  and , otherwise  is unbounded below. From Equation (A7), we have  for any . Therefore, we have  since if , then there must exist a vicinity of , denoted as , such that for any , , which contradicts that  for any . Therefore, we have:
		
      
        
      
      
      
      
    
- If , for allLet and ; we have . Thus, we have . However, always provides a lower bound of OPT-2; we have . Therefore, .
 - If , from Equation (A8), we have:By applying this to the point that satisfies the first fact we mentioned above, we have:Since and , we must have . Since is a non-zero vector, we have . Since , Equation (A10) can be rewritten as:For those that satisfy the first fact, we have:Since is an affine function of , and , there must exist some within the vicinity of , such that unless . However, by the definition of , which is a non-zero column vector, holds only if , which contradicts that is a non-zero vector. Therefore, μ cannot be zero.
 
In conclusion, we have , which means that the strong duality holds. ☐
Appendix B. The linearization Process of OPT-8
Let:
	  
      
        
      
      
      
      
    
Then, the objective function of OPT-8 can be rewritten as , and the third constraint can be rewritten as .
For the second constraint, we have:
	  
      
        
      
      
      
      
    
The “=” holds due to Equation (14). Then, by dividing the both sides with τ, we have:
	  
      
        
      
      
      
      
    
Thus, we have the linear programming problem OPT-9:
	  
      
        
      
      
      
      
    
References
- Antonio, P.; Grimaccia, F.; Mussetta, M. Architecture and methods for innovative heterogeneous wireless sensor network applications. Remote Sens. 2012, 4, 1146–1161. [Google Scholar] [CrossRef]
 - Kurs, A.; Karalis, A. Wireless Power Transfer via Strongly Coupled Magnetic Resonances. Science 2007, 317, 83–86. [Google Scholar] [CrossRef] [PubMed]
 - Zhong, W.X.; Zhang, C.; Xun, L.; Hui, S.Y.R. A Methodology for Making a Three-Coil Wireless Power Transfer System More Energy Efficient Than a Two-Coil Counterpart for Extended Transfer Distance. IEEE Trans. Power Electron. 2015, 30, 933–942. [Google Scholar] [CrossRef]
 - Tang, S.C.; McDannold, N.J. Power Loss Analysis and Comparison of Segmented and Unsegmented Energy Coupling Coils for Wireless Energy Transfer. IEEE J. Emerg. Sel. Top. Power Electron. 2015, 3, 215–225. [Google Scholar] [CrossRef] [PubMed]
 - Li, S.; Mi, C.C. Wireless Power Transfer for Electric Vehicle Applications. IEEE J. Emerg. Sel. Top. Power Electron. 2015, 3, 4–17. [Google Scholar]
 - MORRIS, K. Highly Resonant Wireless Power Transfer: Safe, Efficient, and over Distance; WiTricity Corporation Technical Report: Watertown, MA, USA, 2013. [Google Scholar]
 - Khripkov, A.; Hong, W.; Pavlov, K. Integrated resonant structure for simultaneous wireless power transfer and data telemetry. IEEE Antennas Wirel. Propag. Lett. 2012, 11, 1659–1662. [Google Scholar] [CrossRef]
 - Dervis, K.; Selcuk, O. Cluster Based Wireless Sensor Network Routing Using Artificial Bee Colony Algorithm. Wirel. Netw. 2012, 18, 847–860. [Google Scholar]
 - Selcuk, O.; Ozturk, C. A Comparative Study on Differential Evolution Based Routing Implementations for Wireless Sensor Networks. In Proceedings of the International Symposium on INISTA, Trabzon, Turkey, 2–4 July 2012; pp. 1–5.
 - Nicolas, G.; Nathalie, M. Greedy Routing Recovery Using Controlled Mobility in Wireless Sensor Networks. Ad-hoc Mobile Wirel. Netw. 2013, 7960, 209–220. [Google Scholar]
 - Zhao, Y.Z.; Miao, C.; Ma, M.; Zhang, J.B.; Leung, C. A Survey and Projection on Medium Access Control Protocols for Wireless Sensor Networks. ACM Comput. Surv. 2012, 45, 7:1–7:37. [Google Scholar] [CrossRef]
 - Jang, B.; Lim, J.B. An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks. Comput. Netw. 2013, 57, 85–98. [Google Scholar] [CrossRef]
 - Murthy, J.K.; Kumar, S. Energy Efficient Scheduling in Cross Layer Optimized Cluster Wireless Sensor Networks. Int. J. Comput. Sci. Commun. 2012, 3, 149–153. [Google Scholar]
 - Yang, S.; Yang, X.; McCann, J.A.; Zhang, T.; Liu, G.; Liu, Z. Distributed Networking in Autonomic Solar Powered Wireless Sensor Networks. IEEE J. Sel. Areas Commun. 2013, 31, 750–761. [Google Scholar] [CrossRef]
 - Shigeta, R.; Sasaki, T. Ambient RF Energy Harvesting Sensor Device with Capacitor-Leakage-Aware Duty Cycle Control. IEEE J. Sens. 2013, 13, 2973–2983. [Google Scholar] [CrossRef]
 - Jeon, J.; Ephremides, A. The Stability Region of Random Multiple Access under Stochastic Energy Harvesting. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), St. Petersburg, Russia, 31 July–5 August 2011; pp. 1796–1800.
 - Jeon, J.; Ephremides, A. On the Stability of Random Multiple Access with Stochastic Energy Harvesting. IEEE J. Sel. Areas Commun. 2015, 33, 571–584. [Google Scholar] [CrossRef]
 - Pappas, N.; Kountouris, M.; Jeon, J.; Ephremides, A.; Traganitis, A. Network-Level Cooperation in Energy Harvesting Wireless Networks. In Proceedings of the Global Conference on Signal and Information Processing (GlobalSIP), Austin, TX, USA, 3–5 December 2013; pp. 383–386.
 - Pappas, N.; Kountouris, M.; Jeon, J.; Ephremides, A.; Traganitis, A. Effect of Energy Harvesting on Stable Throughput in Cooperative Relay Systems. Comput. Sci. 2015, 2015. arXiv:1502.01134. [Google Scholar]
 - Krikidis, I.; Charalambous, T.; Thompson, J. Stability Analysis and Power Optimization for Energy Harvesting Cooperative Networks. IEEE Signal Process. Lett. 2012, 19, 20–23. [Google Scholar] [CrossRef]
 - Li, M.; Liu, Y. Underground coal mine monitoring with wireless sensor networks. ACM Trans. Sens. Netw. 2009, 5, 10:1–10:19. [Google Scholar] [CrossRef]
 - Nazir, U.; Shahid, N.; Arshad, M.A.; Raza, S.H. Classification of Localization Algorithms for Wireless Sensor Network: A Survey. In Proceedings of the International Conference on Open Source Systems and Technologies, Lahore, Pakistan, 20–22 December 2012; pp. 1–5.
 - Ruan, D.X.; Zhang, X.G.; Li, H.; Liu, Y. The Research of Optimal Algorithm for Task Scheduling Underground Wireless Network Based on Distributed Computing. In Proceedings of the International Conference on Manufacturing Automation (ICMA), Hong Kong, China, 13–15 December 2010; pp. 151–155.
 - Menon, K.A.U.; Maria, D.; Thirugnanam, H. Power Optimization Strategies for Wireless Sensor Networks in Coal Mines. In Proceedings of the Ninth International Conference on Wireless and Optical Communications Networks, Indore, India, 13–15 December 2012; pp. 1–5.
 
© 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons by Attribution (CC-BY) license (http://creativecommons.org/licenses/by/4.0/).