Next Article in Journal
Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks
Next Article in Special Issue
Truthful Incentive Mechanisms for Social Cost Minimization in Mobile Crowdsourcing Systems
Previous Article in Journal
Multi-Target Joint Detection and Estimation Error Bound for the Sensor with Clutter and Missed Detection
Previous Article in Special Issue
Probabilistic Multi-Sensor Fusion Based Indoor Positioning System on a Mobile Device
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Study of Cross-layer Optimization for Wireless Rechargeable Sensor Networks Implemented in Coal Mines

1
Institute of Industry and Equipment Technology, Hefei University of Technology, Hefei 230009, China
2
School of Computer and Information, Hefei University of Technology, Hefei 230009, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2016, 16(2), 171; https://doi.org/10.3390/s16020171
Submission received: 28 November 2015 / Revised: 17 January 2016 / Accepted: 22 January 2016 / Published: 28 January 2016

Abstract

:
Wireless sensor networks deployed in coal mines could help companies provide workers working in coal mines with more qualified working conditions. With the underground information collected by sensor nodes at hand, the underground working conditions could be evaluated more precisely. However, sensor nodes may tend to malfunction due to their limited energy supply. In this paper, we study the cross-layer optimization problem for wireless rechargeable sensor networks implemented in coal mines, of which the energy could be replenished through the newly-brewed wireless energy transfer technique. The main results of this article are two-fold: firstly, we obtain the optimal relay nodes’ placement according to the minimum overall energy consumption criterion through the Lagrange dual problem and KKT conditions; secondly, the optimal strategies for recharging locomotives and wireless sensor networks are acquired by solving a cross-layer optimization problem. The cyclic nature of these strategies is also manifested through simulations in this paper.

1. Introduction

With the help of the rapid development of micro-electro-mechanical systems (MEMS), various types of sensors and actuators can be forged into an incredibly small size. Together with the state-of-the-art wireless communication technologies, wireless sensor networks (WSNs) are now playing an indispensable role in environment monitoring, target tracking, disaster rescuing and industrial process control [1].
Wireless sensor networks deployed in coal mines are assigned to gather environment temperature, humidity, seismic, gas leak information, etc. With this information at hand, we are able to evaluate the safety issues more precisely and provide workers with more reliable working conditions. However, due to the built-in nature of wireless sensor nodes, they are prone to different types of failures. Therefore, it is still not an easy task to ensure that these sensor nodes work properly over a long time. Since sensor nodes deployed in an underground environment may suffer from certain unattended ordeals, such as high temperature and humidity, the reasons accounting for failures of them may vary a great deal. Amongst all of these reasons, running out of energy supply takes up a large percentage of the reasons for node failure incidents.
Sensor nodes deployed in coal mines may be installed on the ceilings of mine tunnels or in walls; it is somehow difficult, if not impossible, to replace their batteries when their energy is depleted. Meanwhile, the energy harvesting techniques introduced by researchers may not be applied easily, since light, wind and ambient radio are all scanty commodities in an underground environment. Many other research works have been conducted in order to spend every bit of energy more wisely and efficiently to balance the communication load among all sensor nodes and to prolong the lifetime of WSNs. All of these works will be discussed in Section 2.
In this article, we discuss the corresponding issues of wireless rechargeable sensor networks that are implemented in coal mines with wireless energy transfer technique to prevent sensor nodes from energy depletion. As for wireless rechargeable sensor networks, this means that sensor nodes are equipped with certain wireless energy-receiving devices, such that they are able to receive energy charging remotely from a wireless power transferring source. The wireless energy transfer is not a brand-new concept. Early in the 20th century, this technique was advocated by a great inventor, Nikola Tesla. At the turn of the 21st century, the world witnessed the tremendous development of the inductive wireless power transfer technique. Kurs et al. from the Massachusetts Institute of Technology (MIT) proposed a new way to transfer energy remotely in a non-radiative way by means of the same magnetic resonance frequency among the transferor and the transferees. This technique is pretty suitable for wireless sensor networks in coal mines due to several reasons. Firstly, the way of wireless energy transfer is inductive, which will reduce the chance of fire accidents. Secondly, this type of wireless energy transfer nearly has no interference with this communication process.
The main contribution of this article is that we discuss the optimal cross-layer optimization problem for wireless sensor networks implemented for coal mines with the wireless energy transfer technique. The sensor nodes installed in coal mines are recharged remotely by mine locomotives passing through the tunnels with wireless energy transfer devices mounted on them. In order to make these sensor nodes immune to insufficient energy supply, the compatible working schemes for wireless sensor nodes and locomotives for recharging tasks are developed in this article. In order to obtain these schemes, two optimization problems are formulated and solved in this paper. The optimal working schemes are composed of the relaying nodes’ placement, the traveling paths taken by recharging locomotives, the charging time, etc.
The rest of this article is organized as follows: In Section 2, we introduce the wireless energy transfer technique, as well as some research results related to energy-aware issues in wireless sensor networks briefly. In Section 3, the working scenarios of wireless rechargeable sensor networks and recharging locomotives are introduced. In this section, we also introduce some preliminary knowledge and notations. In Section 4, the problem of optimal relay nodes’ placement is discussed. The problem is solved according to the Lagrange dual problem and the KKT (Karush–Kuhn–Tucker) conditions. In Section 5, the cross-layer optimization problem considering the working strategies of both sensor nodes and recharging locomotives is formulated and then reshaped into a linear programming problem with identical optimality. In Section 6, we perform simulations and analyze the numerical results. Section 7 concludes this paper.

2. Related Works

2.1. Wireless Energy Transfer

In the year 2007, Kurs from the Massachusetts Institution of Technology (MIT) published a breaking-through paper [2] in Science discussing transferring energy through magnetic fields between two coupled coils. The wireless energy transfer method introduced by this MIT research team has high efficiency and can be performed from a relatively long distance. Later on, this team co-founded the WiTricity Cooperation and manufactured several different types of wireless energy transfer devices, such as Prodigy, WiT-5000, WiT-3300, etc. Recently, many researchers enriched the theoretical results and practical usages of the newly-brewed wireless energy transfer technique. Zhong et al. found a way to make a three-coil wireless energy transfer system more efficient than a two-coil one [3]. Experiments were also conducted by Tang et al. to show the efficiency of wireless energy transfer between unsegmented and segmented coupling coils [4]. Li et al. wrote a paper introducing the potential usage of wireless energy transfer for electrical vehicles [5]. Wireless energy transfer may also be adopted to deliver energy to some in-body medical parts, such as heart pacemakers instead of complicated open chest surgery [6].
The wireless energy transfer method proposed by Kurs has several advantages compared to previous ones. First of all, this method adopts a non-radiative way to deliver energy between the transferor and transferees efficiently, even if there are ferrous obstacles amongst them. Secondly, the transfer range can be further increased by installing repeaters between the transferor and transferees. Moreover, this type of energy transfer has high directionality, i.e., the energy delivery only succeeds among coils of the same magnetic resonance frequency. Besides, the energy transfer process has almost no interference with wireless communications, which makes it a suitable way to replenish the energy of sensor nodes. Khripkov et al. developed a data telemetry device, which can be charged remotely by a wireless energy transfer technique [7]. What is more, fortunately, the non-radiative nature of this wireless energy transfer technique will not emit electromagnetic waves and, hence, will not probably induce fire accidents or explosions, which is a huge advantage with respect to dealing with the safety-related issues in the complicated underground environment.

2.2. Energy-Related Issues in WSNs

Since sensor nodes in WSNs have a limited energy supply, they will sooner or later experience the depletion of their power sources. The whole network, therefore, may probably be paralyzed because of the failures of sensor nodes running out of energy. In dealing with this problem, many researchers devoted themselves to problems related to energy-aware issues in WSNs. Recently, many subtle energy-aware protocols have been proposed to use every drop of energy efficiently to prolong the lifetime of WSNs. Dervis et al. proposed a hierarchical clustering method and a corresponding data routing and cluster head election protocol to balance the remaining node energy, such that the lifetime of the wireless sensor network gets prolonged [8]. Selcuk et al. proposed an optimization problem to obtain the optimal energy-aware data routing scheme. The solution is acquired by implementing the differential evolution method [9]. Nicolas et al. studied the data routing recovery methods in wireless sensor networks while using controlled mobility to locate sensor nodes [10]. Zhao et al. made a comprehensive study on the medium access control (MAC) protocols applied in wireless sensor networks [11]. Jang et al. provided an energy-efficient MAC protocol to avoid overhearing and reduce contention and delay by asynchronous scheduling the wake-up time of neighboring nodes [12]. Cross-layer optimization methods were also well studied during these years in order to provide inter-layer solutions to energy-aware problems [13]. Indeed, these methods can squeeze out every bit of the node energy, balance the energy usage amongst different sensor nodes and prolong the lifetime of wireless sensor networks. Nevertheless, sensor nodes may still be inclined to malfunction due to their limited energy supply.
Many other researchers focus on developing suitable energy-harvesting technology to endow sensor nodes with a certain ability to harvest energy from the environment. The system architecture proposed by Yang et al. could acquire energy from solar power [14]. The sensor networks having a distributed fashion could achieve the optimal end-to-end network performance. Shigeta et al. developed a software control method for maximizing the sensing rate of WSNs, which could harvest energy from the ambient RF power [15]. Other researchers study the impact of energy-harvesting technology on the stability region of WSNs. Jeon and Ephremides characterized the stability region of the packet queues given energy-harvesting rates for the two-node slotted ALOHA system [16]. They also accurately assessed the effect of limited, but renewable, energy availability due to harvesting on the stability region by comparing against the case of having unlimited energy [17]. Pappas et al. provided inner and outer bounds on the stability region of a two-hop network with an energy harvesting source and relay [18]. They also discussed the relatively unexplored and important domain of energy harvesting in two-hop sensor networks by studying the maximum stable throughput region metric [19]. Krikidis et al. investigated the effects of network-layer cooperation in a wireless three-node network with energy-harvesting nodes and bursty data traffic. Additionally, they prove that orthogonal decode-and-forward cooperative schemes achieve a higher maximum stable throughput than a direct link for scenarios with poor energy arrival rates [20].

2.3. WSNs in Coal Mines

In recent years, safety-related issues and wireless sensor networks for coal mines are becoming more and more attractive [21]. Nazir et al. studied the routing scheme for emergency data for wireless sensor networking for coal mines [22]. Ruan et al. proposed an algorithm for task scheduling for underground wireless sensor networks based on distributed computing [23]. Menon et al. developed an early warning system (EWS) deployment strategy for wireless sensor networks in coal mines [24]. The corresponding power optimization strategies can switch sensor nodes to energy saving mode to reduce the energy consumption. However, research of wireless sensor networks implemented in coal mines with wireless energy transfer devices is still new and open to discussion.

3. The Working Scenario and Problems Statement

3.1. The Working Scenario

The wireless sensor networks that we discuss here is intended to work in coal mines. A typical coal mine consists of several layers, as shown in Figure 1. The vertical well connects different layers together through mine tracks. The railroads paved on different layers lead the way to different pit faces where the mining operation proceeds. At certain locations of interest, different types of wireless sensor nodes are installed to gauge the humidity, temperature and gas density and to send these data back to a base station or a data center for future analysis. The data transmitting and receiving procedure will definitely consume a large portion of battery energy. Therefore, sooner or later, sensor nodes will encounter the problem of insufficient energy supply no matter what energy-saving techniques are adopted.
Figure 1. The sketch map of a coal mine.
Figure 1. The sketch map of a coal mine.
Sensors 16 00171 g001
In order to make sensor nodes work properly without the problem caused by insufficient energy supply, recharging locomotives with wireless energy transfer devices mounted on them will cyclically stop by each sensor node and recharge it with a certain amount of energy, such that the energy of each sensor node will not fall below a certain level before the next round recharging task.

3.2. Problems Statement

The problems we discuss in this article can be split into two main sub-problems. Firstly, since each sensor node has a limited communication ability, relay nodes are a great need to keep the whole network connected. However, different criteria will lead to different sensor node placement strategies. In this paper, we study the optimal relay nodes’ placement with minimum overall energy usage as a criterion. The procedure of solving this problem is elaborated in Section 4. Secondly, as mentioned in previous sections, unmanned locomotives will charge sensor nodes to make sure that no sensor node will suffer from the shortage of energy supply. However, the design of charging strategies of locomotives is not trivial. Many factors, such as the traveling path, the charging power and charging durations for different sensor nodes, should be taken into consideration. In Section 5, in order to deal with this problem, we formulate an optimization problem and reshape it into a linear programming problem, which can be solved efficiently.

4. The Optimal Relay Nodes Placement with Respect to Minimum Overall Power Usage

4.1. Problem Formulation

Each sensor node has a limited communication ability; therefore, without pre-installed relay nodes, data acquired by sensor nodes may not be able to be piggybacked to the base station. In this section, we try to give the optimal scheme for relay nodes’ placement with respect to minimum overall power usage. Without losing the rigorous nature of mathematics, we resort to the Lagrange dual problem and KKT conditions in order to figure out the closed-form solution.
Before we step forward into the problem formulation, please allow us to introduce some notations used here. Since the networking issues among all layers are similar to each other, without any loss of generality, we take one layer of the mine for example. Since most coal mines are composed of tunnels, the topological structure of sensor networks of coal mines is somewhat linear. The optimization problem we formulated in this section is aimed to minimize the energy consumption of sensor and relay nodes along a linear structure. Assume that the distance between two sensor nodes is L meters. The communication range of each sensor node is R meters, and R < L. For the successful communication between these two sensor nodes, a certain amount of relay sensor nodes should be placed between them. As shown in Figure 2, there are n relay nodes placed successively at x 1 , x 2 , , x n , and each of these sensor nodes has a communication range of R meters. The positions of the two sensor nodes are denoted as x 0 and x n + 1 . We assume that the relay nodes are only reliable for receiving and forwarding data in the following discussion.
Figure 2. A sketch map for sensor nodes and relay nodes.
Figure 2. A sketch map for sensor nodes and relay nodes.
Sensors 16 00171 g002
The power usage of each node is composed of transmitting, receiving, processing and sensing data. Since the last two parts are relatively smaller compared to the first two factors and are independent of the optimization problem we discuss below, therefore, we omit the last two factors in the formulation of our optimization problem. The power usage of a node when transmitting data can be modeled as:
p T i ( t ) = ( Φ 1 + Φ 2 d i k ) r T i ( t ) ,
where p T i ( t ) is the transmitting power used by node i at time instance t, d i is the transmitting distance, k is often chosen between two and four and r T i ( t ) is the transmitting data rate of node i at time instance t. The symbols Φ 1 and Φ 2 are power-related constants.
The receiving power used by node i can be modeled as:
p R i ( t ) = ρ r R i ( t )
where p R i ( t ) is the power used for receiving data at time instance t, r R i ( t ) is the receiving data rate and ρ is the power-related constant.
As shown in Figure 2, there are two sensor nodes and n relay nodes. By the definition of x i given in the previous section, we have the following equation,
i = 1 n + 1 ( x i x i 1 ) = i = 0 n d i = L
where d i 1 = x i x i 1 is the distance between two successive sensor nodes.
Then, we formulate the following optimization problem, OPT-1:
min τ [ i = 0 n p T i ( t ) + i = 1 n + 1 p R i ( t ) ] d t s . t . ( 1 ) ( 3 ) ( 0 d i R , i = 0 , , n )
In this optimization problem, our objective is to minimize the energy used for transmitting data among sensor nodes and the corresponding relay nodes. The optimization variables are the number of relaying nodes n, which is an integer value, and the distance between two nodes d i . The optimization constants are the power-related constants, i.e., Φ 1 , Φ 2 and ρ, the transmitting data rate of the first sensor node, r T 0 ( t ) .
Since all nodes should communicate properly, we have 0 d i R . After solving this problem, we are able to obtain the optimal number and placement for relay nodes.

4.2. Solution to OPT-1

To solve this optimization problem, we might use the method of the Lagrange multiplier. However, the mathematical correctness and completeness of this method can only be ensured when finding extreme points for problems with equality constraints. The optimization problem formulated in Section 4.1 obviously has inequality constraints and an integer optimization variable. Therefore, the method of the Lagrange multiplier may not be applied easily without any criticism. In order to solve this problem, alternatively, we firstly divide OPT-1 into two sub-optimization problems. Secondly, we form the Lagrange dual problem of the first one and prove the strong duality of the prime and dual problems. Eventually, we combine these two optimization problems together to get the optimal number and placement for relay nodes.
By substituting the objective function with Equations (1) and (2), we have:
min τ [ i = 0 n ( Φ 1 + Φ 2 d i k ) r T i ( t ) + i = 1 n + 1 ρ r R i ( t ) ] d t s . t . ( 3 ) ( 0 d i R , i = 0 n ) .
The objective function can be further reshaped as:
i = 0 n ( Φ 1 + Φ 2 d i k ) τ r T i ( t ) d t + i = 1 n + 1 ρ τ r R i ( t ) d t = i = 0 n ( Φ 1 + Φ 2 d i k ) f T i + i = 1 n + 1 ρ f R i
where f T i = τ r T i ( t ) d t and f R i = τ r R i ( t ) d t are the data that the i-th node transmits and receives during the time period τ. For the data integrity, during the time period τ, we have the following chain equation,
f T 0 = f R 1 = f T 1 = = f R n = f T n = f R n + 1 = f
This chain equation indicates that during time period τ, the data transmitted by the i-th node are equal to the data received by it (in this article, we do not take into consideration the data aggregation and data compression at each node).
After expanding the objective function, we have:
min ( n + 1 ) ( Φ 1 + ρ ) f + Φ 2 f i = 0 n d i k s . t . ( 3 ) ( 0 d i R , i = 0 n )
The Constraints (1) and (2) are omitted here in that they have been already plugged into the objective function. The optimization variables are the number of relay nodes n and the distance between two successive nodes d i . To solve this optimization problem, we firstly divide it into two sub-optimization problems.
For a given number n, we can firstly solve the following optimization problem OPT-2,
min Φ 2 f i = 0 n d i k s . t . i = 0 n d i L = 0 d i R 0 ( i = 0 n ) d i 0 ( i = 0 n )
It is not difficult to verify that this optimization problem is a convex problem since the objective function and all of the constraints are convex.
Then, the Lagrangian of this prime optimization problem is:
L ( d i , λ 1 i , λ 2 i , v ) = Φ 2 f i = 0 n d i k + i = 0 n λ 1 i ( d i ) + i = 0 n λ 2 i ( d i R ) + v ( i = 0 n d i L )
The Lagrangian dual function is defined as:
G ( λ 1 i , λ 2 i , v ) = inf d i { L ( d i , λ 1 i , λ 2 i , v ) } = inf d i { Φ 2 f i = 0 n λ 1 i ( d i ) + i = 0 n λ 2 i ( d i R ) + v ( i = 0 n d i L ) }
where the inf d i stands for the infimum over all d i .
The Lagrange dual problem of the prime problem is:
max G ( λ 1 i , λ 2 i , v ) s . t . λ 1 i , λ 2 i 0
In general cases, the optimal value of the dual problem always provides a loose lower bound of the optimal value of the prime one. However, in this case, we can prove that the strong duality holds for the prime and dual problems, that is the optimal values of the prime and dual problem are identical.
Theorem 1. 
The strong duality of the prime optimization problem OPT-2 and its Lagrange dual problem holds, i.e., the optimal values of these two problem are identical.
The proof of this theorem is not trivial, and we leave it to the Appendix section for a better intelligibility. The next theorem will show a necessary condition for achieving the optimality of OPT-1.
Theorem 2. 
The optimality of OPT-1 can be achieved only if relay nodes are placed at the equal partition points between two sensor nodes.
Proof. 
Since the prime optimization problem OPT-2 is a convex problem and the strong duality holds, we can use the KKT conditions to figure out the optimal value of both the prime and dual optimization problems.
The KKT conditions for OPT-2 for a given n are listed below:
i = 0 n d i L = 0 d i R 0 d i 0 λ 1 i ( d i ) = 0 λ 2 i ( d i R ) = 0 λ 1 i 0 λ 2 i 0 ( Φ 2 f i = 0 n d i k + i = 0 n λ 1 i ( d i ) + i = 0 n λ 2 i ( d i R ) + v ( i = 0 n d i L ) ) d i = 0
After solving this set of equations, we can draw the conclusion that,
d 0 = d 1 = = d n = L n + 1
which means that relay nodes must be put at the equal partition points between two sensor nodes to get the minimum overall energy consumption, since the first term of the objective function of OPT-1 is constant given the value of n.
The next step is to decide how many relay nodes should be installed. Since relay nodes should be placed at the equal partition points, the optimization problem OPT-1 can be rewritten as the following optimization problem, denoted as OPT-3,
min ( n + 1 ) ( Φ 1 + ρ ) f + Φ 2 f L k ( n + 1 ) k 1 s . t . n is an integer
The variable n of this optimization problem must have an integer value. However, we can first take the unconstrained problem into consideration, i.e.,
min ( n c + 1 ) ( Φ 1 + ρ ) f + Φ 2 f L k ( n c + 1 ) k 1
By calculating the second derivative of the objective function, we could find out that this function is strict convex when n c is greater than zero. Therefore, this problem can be solved by calculating the stationary points of the objective function, i.e., if any stationary point exists when n is greater than zero, it also must be the minimum point. In order to calculate the stationary point, we first calculate the first derivative of the objective function. We have:
( ( n c + 1 ) ( Φ 1 + ρ ) f + Φ 2 f L k ( n c + 1 ) k 1 ) / n c = ( Φ 1 + ρ ) f ( k 1 ) Φ 2 f L k ( n c + 1 ) k
Therefore,
n c = L ( ( k 1 ) Φ 2 Φ 1 + ρ ) 1 / k 1
From the property of convex functions, we have the following conclusions:
  • If L ( ( k 1 ) Φ 2 Φ 1 + ρ ) 1 / k 1 is an integer and L ( ( k 1 ) Φ 2 Φ 1 + ρ ) 1 / k 1 L R , then n = L ( ( k 1 ) Φ 2 Φ 1 + ρ ) 1 / k 1 ;
  • If L ( ( k 1 ) Φ 2 Φ 1 + ρ ) 1 / k 1 > L R , but L ( ( k 1 ) Φ 2 Φ 1 + ρ ) 1 / k 1 is not endowed with an integer value, then the value of n is chosen from L ( ( k 1 ) Φ 2 Φ 1 + ρ ) 1 / k 1 and L ( ( k 1 ) Φ 2 Φ 1 + ρ ) 1 / k 1 ;
  • If L ( ( k 1 ) Φ 2 Φ 1 + ρ ) 1 / k 1 < L R , then the value of n is L R .
Next, the correctness of solving OPT-1 via the given procedure can be validated by contradiction.
Assume that the value n and the relay nodes’ placement is not optimal, i.e., there exist another value n and a relay nodes’ placement method that lead to a smaller objective value of OPT-1. However, for a given n , due to the result of OPT-2, the objective function can only be minimized by placing relay nodes at the equal partition points. Then, OPT-1 is transformed into OPT-3. Since the value of n is obtained by solving OPT-3, the objective function value must be smaller than that acquired by n , which causes the contradiction. Therefore, the optimality of OPT-1 can be ensured when following the given solution procedure. ☐

5. The Optimal Working Strategies for Wireless Rechargeable Sensor Networks

In the last section, we discuss the relay nodes’ placement issue. After that, we will study the working strategies for sensor nodes and the recharging locomotives. The working strategies consist of the data routing protocols, roaming path, energy charging time, etc.. In order to obtain these strategies, we formulated another optimization problem and reshape it into a linear programming problem, which can be solved efficiently.

5.1. Problem Formulation

Assume that there are N nodes, including sensor nodes and relay nodes, deployed in one layer of the coal mine. Each node is equipped with a wireless rechargeable battery. The initial energy of each node is denoted as E m a x . The minimum energy level to maintain the routine duty of sensor nodes is denoted as E m i n , where E m i n = α E m a x ( 0 α 1 ) .
Before formulating the optimization problem, we should first introduce some constraints that nodes and recharging locomotives should comply with. First of all, all nodes, including sensor nodes and relay nodes, should satisfy the following equation:
r i + r R i ( t ) = r T i ( t )
where r i is the data rate generated by nodes i. For relay nodes, r i is zero. r R i ( t ) is the data rate received by node i at time instance t. r T i ( t ) is the data rate transmitted by node i at time instance t. In other words, Equation (12) is the network flow constraint.
The second constraint is the power usage constraint. Each sensor node should satisfy:
p i ( t ) = p R i ( t ) + p T i ( t ) = ρ r R i ( t ) + ( Φ 1 + Φ 2 d i k ) r T i ( t )
We want to design cyclic work strategies for the recharging locomotive, that is it will roam periodically along the traveling path and charge each sensor node with a certain amount of energy. The period of each workload of recharging locomotives is denoted as τ. In order to meet the periodic requirement, the energy consumed during each period should be the same as that recharged, i.e.,
τ p i ( t ) d t = U τ i
where U is the power used for recharging nodes and τ is the length of a single charging period.
During each period, in order to keep sensor nodes working properly, the energy level of each node should not fall below E m i n and should not exceed E m a x , which is the upper bound of battery energy. Therefore, we have the following constraint:
E m i n E i ( t ) E m a x
There are also some constraints that the wireless energy transfer device should satisfy. First of all, since the wireless energy transfer device should stop by each node, we denote the visiting order of nodes as P = { π 0 , π 1 , , π 0 } , where π 0 stands for the sojourn spot at which the locomotive receives services, such as replacing the energy source, checking mechanical structure status, and so on. π i stands for the i-th node visited by the wireless energy transfer device. The length of the traveling path taken by the wireless energy transfer device is denote as D P , and the time spent on roaming is denoted as τ P . Then, we have,
τ p = D P / V
where V is the moving velocity of the recharging locomotive.
τ could be further divided into three parts, that is,
τ = i τ i + τ P + τ s
where τ s is the time spent on staying at the sojourn spot and τ i is the time spent on charging the i-th node along the traveling path.
In order to minimize the interference introduced by locomotives mounted with wireless energy devices when roaming around the sensor networks, we hope that locomotives could stay at sojourn spots as much as possible while all of the Constraints (12)–(17) will be satisfied. Therefore, we have the following optimization problem, OPT-4,
max τ s / τ s . t . ( 12 ) ( 17 )
The objective function stands for our pursuit of more time spent at sojourn spots in each charging period. The optimization variables of OPT-4 are the traveling path P, τ s , τ i ,τ, r R i ( t ) and r T i ( t ) , and the rest of the symbols stand for the optimization constants.

5.2. The Simplification and Linearization of OPT-4

The optimization problem formulated in the last subsection is not easy to solve for several reasons. First of all, the optimization problem has variables that are continuous over time. Secondly, the constraints of this problem contain integration terms and proportional terms, which make this problem nonlinear. Therefore, it is not an easy job to find an efficient algorithm to obtain the optimal solution. Instead of providing a heuristic algorithm, in this paper, we try to reach the optimal solution of OPT-4 by simplifying and linearizing it.
First of all, we want to introduce two properties that are useful when transforming the original problem into a linear programming problem.
Property 1. 
The energy of each node reaches its peak when the locomotive mounted with the wireless transfer device finishes recharging it. Moreover, its energy falls to the bottom when the locomotive arrives at this node.
Property 2. 
If the batteries of nodes are fully recharged, that is the energy of each battery reached when the locomotive finishes recharging task, the optimal value of OPT-4 remains the same.
With these two properties, we are able to slightly change the form of OPT-4. For the constraint (15), we can rewrite it as:
E i ( t i ) E m i n , E i ( t i + τ i ) = E m a x
where t i denotes the arriving time of the recharging locomotive at the i-th node. Then, we have the new optimization problem, OPT-5, with identical optimality.
max τ s / τ s . t . ( 12 ) ( 18 )
We will then try to take the integration terms out to simplify OPT-5. The integration terms are introduced by Constraint (14). We first substitute Equation (14) with Equations (12) and (13), then we have:
ρ τ r R i ( t ) d t + ( Φ 1 + Φ 2 d i k ) τ r T i ( t ) d t = U τ i
According to the Lagrange mean value theorem, there exists r R i and r T i , which satisfy:
ρ r R i τ + ( Φ 1 + Φ 2 d i k ) r T i τ = U τ i
For Equation (12), we have,
r i + r R i = r T i
Then, we have the optimization problem OPT-6,
max τ s / τ s . t . ( 16 ) ( 21 )
The constraint (14) is omitted since we plug it into Equation (20).
In OPT-6, we use r R i and r T i instead of continuous variables. The next theorem will show the equal optimality of OPT-5 and OPT-6.
Theorem 3. 
If we use discrete variables r R i and r T i instead of r R i ( t ) and r T i ( t ) , the optimal values of both OPT-5 and OPT-6 are the same, that is OPT-5 and OPT-6 have equal optimality.
Proof. 
The proof of this theorem can be divided into two steps. On the one hand, since we use r R i and r T i instead of r R i ( t ) and r T i ( t ) , the flexibility of variables is of course compromised to a certain extent. The optimal values of OPT-5 and OPT-6 are denoted as O 5 and O 6 . Then, we have O 5 O 6 . On the other hand, for each feasible solution of OPT-5, we are always able to construct a corresponding solution to OPT-6 that yields the same objective value, which means O 5 O 6 . Therefore, we have O 5 = O 6 . ☐
The next theorem will tell us the optimal traveling path that the locomotive should take to achieve the optimality.
Theorem 4. 
The optimal traveling path that the recharging locomotive should take is the shortest roaming path connecting all nodes and the sojourn spot.
Proof. 
The proof of this theorem is based on contradiction, that is if a solution to the optimization problem yields the optimal value while the locomotive does not follow the shortest roaming path, we can construct a new solution from it that yields a better objective value while the locomotive travels along the shortest roaming path. Intuitively, if the locomotive spends less time on traveling, it will be rewarded more time staying at the sojourn spot. ☐
For a given shortest roaming path in a coal mine and a given moving velocity, the constraint (15) can also be omitted in OPT-6. Then, we have the following optimization problem, OPT-7:
max τ s / τ s . t . ( 17 ) ( 21 )
By exploiting the cyclic nature, OPT-7 can be further reshaped as:
max τ s / τ s . t . r i + r R i = r T i U τ i ( ρ r R i + ( Φ 1 + Φ 2 d i k ) r T i ) τ i E m a x E m i n τ = i τ i + τ P + τ S
We denote this problem as OPT-8, and it can be further linearized as:
max ξ S s . t . r i + r R i = r T i ξ 0 ξ S ( ρ r R i + ( Φ 1 + Φ 2 d i k ) r T i ) ( 1 ξ i ) τ P E m a x E m i n 0 k = 0 N ξ k = 1
The above optimization problem is OPT-9, and the reshaping process is elaborated in the Appendix section. Now, OPT-9 is a linear programming problem with optimization variables ξ 0 , ξ S , r R i and r T i . Additionally, this linear programming program can be solved efficiently by some commercial tools, such as LINDO API and CPLEX.

6. Simulations and Numerical Analysis

6.1. Simulation Scenario

The simulation scenario is a coal mine with three layers (Layers A, B and C), as shown in Figure 3. The vertical tunnel connects the three layers. In this section, the simulation will be conducted at the vertical tunnel and one horizontal layer (Layer A). The figure of Layer A is shown in Figure 4. At each intersection of the vertical and horizontal tunnels, there is one sub-base station, which has the duty of collecting the data of its own layer and forwarding them to the base station.
Several sensor nodes are installed along the mine tracks of the vertical tunnel and horizontal tunnels. There are also some of them installed at pit faces to collect the environmental information. At the entrance of each branch of horizontal tunnel, a relay node is placed in case of wireless signal loss. The nodes’ placement is shown in Figure 4. The sensor nodes are labeled with dot symbols. The relay nodes at branch entrances and the sub-base station are denoted as hollow circles. The sojourn spot of the recharging locomotive is located at the sub-base station. After recharging each node, the recharging locomotive will stay at the sojourn spot receiving maintenance.
Figure 3. A sketch map for a coal mine with three layers.
Figure 3. A sketch map for a coal mine with three layers.
Sensors 16 00171 g003
Figure 4. A sketch map for the sensor nodes deployment in Layer A.
Figure 4. A sketch map for the sensor nodes deployment in Layer A.
Sensors 16 00171 g004

6.2. Simulation Parameters

The rate of data generated by each sensor nodes is listed in Table 1. The data rates are random numbers ranging from 10–20 kb/s. The lengths between each node are labeled in Figure 4. The moving velocity of the recharging locomotive is 5 m/s. The energy-related parameters are listed in Table 2. The communication range of each node is 100 m.
Table 1. The ri of each sensor node in Layer A.
Table 1. The ri of each sensor node in Layer A.
Node No.ri (kb/s)Node No.ri (kb/s)Node No.ri (kb/s)
117514919
2166181019
3197151110
413818
Table 2. Values of parameters related to power usage.
Table 2. Values of parameters related to power usage.
NotationValueNotationValueNotationValue
Emax10.8 kJU5 WΦ150 nJ/b
Emin540 Jρ50 nJ/bΦ20.013 pJ/(b m4)
v5 m/s

6.3. Simulation Tools

The simulation codes are programmed and executed on a ThinkPad W530. The CPU of this computer is an Intel Core i7-3840, and its RAM is 16 GB. The operation system is Win7 Home Premium. We use Microsoft VS 2010 and the LINDO API to solve the optimization problem. MATLAB R2010a is used to analyze the data and draw the corresponding pictures.

6.4. Simulation Results

In the simulation, we compare the charging strategy corresponding to the minimum energy consumption routing with the one corresponding to the minimum hop routing. For minimum hops and minimum power usage routing schemes, the relay nodes’ placement for Layer A is listed in Table 3. The optimal numbers and deploying locations of relay nodes in minimum energy consumption mode are calculated according to OPT-1, OPT-2 and OPT-3.
Table 3. Relay nodes’ placement for both minimum hops and minimum overall energy consumption routings in Layer A. BE, branch entrance.
Table 3. Relay nodes’ placement for both minimum hops and minimum overall energy consumption routings in Layer A. BE, branch entrance.
PlacementNo. of Relay Nodes for Minimum Hop RoutingNo. of Relay Nodes for Minimum Overall Power Usage Routing (Theoretically)No. of Relay Nodes for Minimum Overall Power Usage Routing (Floor Number)No. of Relay Nodes for Minimum Overall Power Usage Routing (Ceiling Number)
1-268.889
2-BE33.934
3-423.234
4-BE68.889
5-633.934
6-BE22.923
7-811.512
7-BE34.645
9-109131314
9-BE23.234
11-BE34.645
The notation “1-2” in the first column means relay nodes should be placed on the equal partition points between Sensor Nodes 1 and 2. The notation “2-BE” means relay nodes should be placed on the equal partition points between Sensor Node 2 and the node places at the entrance of this branch (BE). The second column tells us how many relay nodes should be placed according to the minimum hop routing. The third column shows the optimal number of nodes theoretically according to the minimum overall power usage routing. Columns 3 and 4 show the floor and ceiling numbers. The locations and numbers of nodes are shown in Figure 5.
The optimal traveling path of the recharging locomotive is shown in Figure 6. After solving OPT-9, we have the optimal working strategies for both routing minimum energy consumption and minimum hop schemes, which are manifested in Table 4 and Table 5.
Figure 5. The node numbers after adding relay nodes for both routing schemes in Layer A. (a) Minimum hop routing. (b) Minimum overall power usage routing.
Figure 5. The node numbers after adding relay nodes for both routing schemes in Layer A. (a) Minimum hop routing. (b) Minimum overall power usage routing.
Sensors 16 00171 g005
Figure 6. The optimal traveling path of the recharging locomotive in Layer A.
Figure 6. The optimal traveling path of the recharging locomotive in Layer A.
Sensors 16 00171 g006
Table 4. The working strategies for minimum hop routing in Layer A.
Table 4. The working strategies for minimum hop routing in Layer A.
Node No.Arrival Time (s)Recharging Duration (s)Remaining Battery Energy (J)Node No.Arrival Time (s)Recharging Duration (s)Remaining Battery Energy (J)
56437, 442267946216454, 4183828890
55437, 727342909115454, 8203828890
54438, 085342909114455, 2233828890
53438, 443342909113455, 6253828890
52438, 800342909112456, 0273828890
34439, 162342909163456, 4293828890
33439, 524342909162457, 0323828890
32439, 886438860861457, 4343828890
31440, 345508825960457, 8366817397
30 440 , 871 508825959 458 , 538 7646983
29 441 , 398 508825958 459 , 322 7646983
11 442 , 070 299930557 460 , 107 157 10 , 012
10 442 , 387 382889028 460 , 285 2019794
9 442 , 787 382889027 460 , 505 2019794
8 443 , 186 587786826 460 , 725 2019794
7 443 , 793 643758525 460 , 945 4078764
6 444 , 457 643758524 461 , 370 4078764
5 445 , 121 643758523 461 , 795 9516054
4 445 , 785 643758522 462 , 763 9516054
3 446 , 449 643758551 463 , 732 9516054
2 447 , 113 643758550 464 , 869 6437585
1 447 , 777 154 10 , 027 49 465 , 533 6437585
73 448 , 211 215972148 466 , 197 8456582
72 448 , 446 215972147 467 , 062 8456582
71 448 , 681 215972146 468 , 197 8456582
70 448 , 916 485837545 469 , 062 8456582
69 449 , 420 564798344 469 , 927 8456582
68 450 , 002 564798343 470 , 792 11994818
67 450 , 584 177991242 472 , 012 11994818
66 450 , 780 243958441 473 , 231 11994818
65 451 , 041 585787740 474 , 451 11994818
64 451 , 644 664748439 475 , 670 11994818
21 452 , 328 664748438 476 , 890 2061540
19 453 , 012 664748437 478 , 972 2061540
18 453 , 696 299930536 481 , 053 2061540
17 454 , 016 3828890
Table 5. The working strategies for minimum overall energy consumption routing in Layer A.
Table 5. The working strategies for minimum overall energy consumption routing in Layer A.
Node No.Arrival Time (s)Recharging Duration (s)Remaining Battery Energy (J)Node No.Arrival Time (s)Recharging Duration (s)Remaining Battery Energy (J)
81 709 , 640 195982022 733 , 149 3409099
80 709 , 848 316921721 733 , 504 3409099
79 710 , 178 316921720 733 , 856 3409099
78 710 , 507 316921719 734 , 208 3409099
77 710 , 833 316921718 734 , 560 3409099
76 711 , 160 316921717 734 , 913 3409099
75 711 , 486 316921716 735 , 265 3409099
48 711 , 816 316921792 735 , 818 3409099
47 712 , 146 316921791 736 , 171 3409099
46 712 , 476 316921790 736 , 523 3409099
45 712 , 806 501829689 736 , 876 4958324
44 713 , 321 614772988 737 , 384 6307651
43 713 , 949 614772987 738 , 027 6307651
42 714 , 575 614772986 738 , 669 6307651
41 715 , 202 614772985 739 , 312 6307651
40 715 , 828 180989884 739 , 956 108 10 , 259
15 716 , 168 315922583 740 , 077 1799904
14 716 , 498 315922582 740 , 270 1799904
13 716 , 827 315922539 740 , 463 1799904
12 717 , 156 315922538 740 , 656 1799904
11 717 , 485 503828337 740 , 849 1799904
10 718 , 003 595782236 741 , 042 5068269
9 718 , 612 595782235 741 , 563 5068269
8 719 , 222 595782234 742 , 083 5068269
7 719 , 832 595782233 742 , 603 11225196
6 720 , 442 595782232 743 , 740 11225196
5 721 , 052 595782231 744 , 876 11225196
4 721 , 662 595782274 746 , 178 11225196
3 722 , 272 595782273 747 , 314 5737936
2 722 , 882 595782272 747 , 901 5737936
1 723 , 492 161999371 748 , 487 5737936
106 723 , 927 260949670 749 , 074 7147231
105 724 , 201 260949669 749 , 802 7147231
104 724 , 476 260949668 750 , 798 7147231
103 724 , 751 260949667 751 , 524 7147231
102 725 , 025 468846066 752 , 251 7147231
101 725 , 507 595782265 752 , 977 7147231
100 726 , 117 595782264 753 , 703 7147231
99 726 , 725 595782263 754 , 431 7147231
98 727 , 334 142 10 , 088 62 755 , 159 12794414
97 727 , 489 248955661 756 , 451 12794414
96 727 , 751 248955660 757 , 744 12794414
95 728 , 012 463848459 759 , 037 12794414
94 728 , 489 591784758 760 , 330 12794414
93 729 , 092 591784757 761 , 622 12794414
30 729 , 697 591784756 762 , 915 12794414
29 730 , 302 591784755 764 , 208 2057540
28 730 , 907 591784754 766 , 279 2057540
27 731 , 513 205977253 768 , 350 2057540
26 731 , 732 340909952 770 , 422 2057540
25 732 , 086 340909951 772 , 493 2057540
24 732 , 441 340909950 774 , 565 2057540
23 732 , 795 340909949 776 , 636 2057540
The optimal traveling path for the recharging locomotive is calculated according to Theorem 4 and is shown in Figure 6. The length of this path is 13,980 m, and the time spent on traveling around it is 2796 s.
The orders of nodes listed in these two tables are according to their visiting orders along the traveling path, that is the first node along the roaming path of the recharging locomotive in Table 4 is the node with number 56, and the second one is the node with number 55. The second column stands for the arrival time of the recharging locomotive in the second working cycle. The third column tells us how long this node should be recharged. The forth column shows the remaining energy of each node in the second working cycle.
The lengths of each working cycle for the minimum hops and minimum overall energy consumption routing are about 4.3 × 105 and 7.1 × 105 s. The ξ S for both of them is 88.52% and 90.22%, which means the minimum overall energy consumption recharging scheme achieves better ξ S than the minimum hop routing recharging scheme.
For the nodes in the vertical tunnel, we also apply the same approach. The optimal traveling path is shown in Figure 7. The corresponding working strategies after solving OPT-9 are shown in Table 6 and Table 7. The ξ S for both of them is 72.93% and 77.23%, which indicates that the minimum energy consumption recharging scheme also yields a better objective value.
Figure 7. The optimal traveling path for the recharging locomotive in the vertical tunnel.
Figure 7. The optimal traveling path for the recharging locomotive in the vertical tunnel.
Sensors 16 00171 g007
Table 6. The working strategies for minimum hop routing in the vertical tunnel.
Table 6. The working strategies for minimum hop routing in the vertical tunnel.
Node No.Arrival Time (s)Recharging Duration (s)Remaining Battery Energy (J)Node No.Arrival Time (s)Recharging Duration (s)Remaining Battery Energy (J)
5 127 , 060 814675527 142 , 696 9725975
4 127 , 894 1040564126 143 , 687 9725975
3 128 , 954 1040564125 144 , 678 9725975
2 130 , 015 1040564124 145 , 669 9935872
1 131 , 075 1040564123 146 , 681 9935872
31 132 , 235 745709422 147 , 693 9935872
30 133 , 001 952607221 148 , 705 9935872
29 133 , 973 952607220 149 , 717 9935872
12 134 , 946 952607219 150 , 729 9935872
11 135 , 918 952607218 151 , 741 9935872
10 136 , 891 952607217 152 , 753 9935872
9 137 , 863 952607216 153 , 765 9935872
8 138 , 836 725719115 154 , 776 2086540
7 139 , 582 972597514 156 , 881 2086540
6 140 , 574 972597513 158 , 986 2086540
28 141 , 705 9725975
Table 7. The working strategies for minimum overall energy consumption routing in the vertical tunnel.
Table 7. The working strategies for minimum overall energy consumption routing in the vertical tunnel.
Node No.Arrival Time (s)Recharging Duration (s)Remaining Battery Energy (J)Node No.Arrival Time (s)Recharging Duration (s)Remaining Battery Energy (J)
8 205 , 719 511824937 225 , 430 10765443
7 206 , 243 877643036 226 , 523 10765443
6 207 , 133 877643035 227 , 615 10765443
5 208 , 023 877643034 228 , 708 10765443
4 208 , 914 877643033 229 , 800 10765443
3 209 , 804 877643032 230 , 892 11625018
2 210 , 694 877643031 232 , 071 11625018
1 211 , 584 877643030 233 , 249 11625018
41 212 , 576 657752029 234 , 427 11625018
40 213 , 249 993585728 235 , 605 11625018
39 214 , 258 993585727 236 , 784 11625018
38 215 , 266 993585726 237 , 961 11625018
17 216 , 275 993585725 239 , 138 11625018
16 217 , 284 993585724 240 , 316 11625018
15 218 , 293 993585723 241 , 493 11625018
14 219 , 302 993585722 242 , 670 11625018
13 220 , 310 993585721 243 , 847 2072540
12 221 , 319 677742120 245 , 935 2072540
11 222 , 013 1076544319 248 , 022 2072540
10 223 , 105 1076544318 250 , 109 2072540
9 224 , 198 1076544
We also compare our solution via solving the linear programming problem with the one solved by the genetic algorithm. The optimal value figured out by the GA is around 55%. The comparison and the convergence of the GA are shown in Figure 8.
Figure 8. The caparison of the results obtained by solving the linear programming problem and the GA. (a) The comparison of the objective values obtained by solving the linear programming problem and the GA. (b) The convergence of the GA.
Figure 8. The caparison of the results obtained by solving the linear programming problem and the GA. (a) The comparison of the objective values obtained by solving the linear programming problem and the GA. (b) The convergence of the GA.
Sensors 16 00171 g008
Up to now, we have almost finished our discussion on working strategies for wireless rechargeable sensor networks in coal mines. However, this first working cycle is a little bit different from the rest, since at the very beginning of the first cycle, the energy of each node is E m a x , which is higher than that at the beginning of the rest cycles. However, if we adjust the recharging power according to:
U i 1 s t = U E m a x E i τ i
where E i stands for the beginning energy of node i at the rest cycles, then we can make the first and second cycle match perfectly. The energy consumption-time chart for the node with the number 53 is drawn Figure 9, and the recharging power for this nodes is adjusted to 0.76 Watts. From this figure, we can see that the initial energy level of this sensor node in the first working cycle is higher that that of the rest cycles.
Figure 9. The energy consumption time curve of the node with the number 53 in Layer A.
Figure 9. The energy consumption time curve of the node with the number 53 in Layer A.
Sensors 16 00171 g009

7. Conclusions

Recharging sensor nodes deployed in coal mines remotely by implementing the wireless energy transfer technique may provide a promising way to make a wireless sensor network work perpetually. In this paper, we discuss problems on the relay nodes’ placement and the working strategies for wireless rechargeable sensor networks in coal mines in order to keep nodes from malfunctioning caused by insufficient energy supply. Two sets of optimization problems are introduced to obtain the optimal solutions to these two problems. For the problems related to the best relay nodes’ placement, we resort to the Lagrange dual problem and KKT conditions for help. The optimization problems formulated for the optimal working strategies for wireless rechargeable sensor networks are simplified and linearized through several properties and theorems. In the simulation section, the optimal solutions to these problems are provided and compared to the optimal solutions with respect to minimum hop routing schemes.

Acknowledgments

This article is supported by the Natural Science Foundation of China (Grant Nos. 61370088 and 61501161), the International Science & Technology Cooperation Program of China (Grant No. 2014DFB10060) and the Fundamental Research Funds for the Central Universities (Grant No. JZ2015HGBZ0453). We are also in great debt to the anonymous reviewers and editors of this article.

Author Contributions

Xu Ding drafted this article and gave the sketched proofs of the theorems listed in the article. Shi Lei did most of the simulations. Jianghong Han offered the idea of this research. Jingting Lu offered help for refining this article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. The Strong Duality

Theorem A1. 
The strong duality of the prime optimization problem OPT-2 and its Lagrange dual problem holds, i.e., the optimal values of these two problems are identical.
 
The proof of this theorem is a little bit complicated. Before we move forward, we firstly rewrite OPT-2 as follows:
min g ( d ) s . t . A T d L = 0 g i ( d ) 0 , i = 0 , , 2 n + 1
where d is a column vector, which is d 0 , d 1 , , d n T , and A is a column vector of which the entries are all one. The objective function g ( d ) stands for Φ 2 f i = 0 n d i k . For 0 i n , the inequality constraints stand for d i R 0 . For n + 1 i 2 n + 1 , g i ( d ) stands for d i ( n + 1 ) 0 .
First of all, we denote the feasible solution set to OPT-2 as D . Then, we have the following facts:
  • It is obvious that D is not empty, that is it has interior points. Additionally, we have certain d int D , such that g i ( d ) < 0 and A T d = L (int D stands for the set of interior points of D ).
  • The function g ( d ) and g i ( d ) are all convex functions for d int D , and the rank of A is one.
We denote the optimal value of OPT-2 as p , and we denote the set A as:
A = g 0 ( d ) , g 1 ( d ) , , g 2 n + 1 ( d ) , A T d , g ( d ) )
Then, we have:
p = inf t ( u , w , t ) A , u 0 , w = 0
where u = g 0 ( d ) , g 1 ( d ) , , g 2 n + 1 ( d ) , w = A T d and t = g ( d ) . The Lagrangian dual function of OPT-2 can be written as:
G ( λ , v ) = G ( λ 1 , i , λ 2 , i , v ) = inf ( λ , v , 1 ) T ( u , w , 1 ) ( u , w , t ) A
Now, we define the “epigraph” (the word “epigraph” means “upper graph”) of set A as:
A E = A + ( R + 2 n + 2 × 0 × R + )
The convexity of the set A E can be justified easily through the definition of convex sets. We define another convex set:
B = ( 0 , 0 , s ) R 2 n + 2 × R × R s < p
Then, we can prove that the two convex sets, A E and B , do not intersect.
Suppose that A E B ; then, we have at least one element ( u , w , t ) A E B . Therefore, we have u = 0 , w = 0 and t < p . Since ( u , w , t ) A E , then we have at least one d , such that g i ( d ) 0 , A T d = 0 and g ( d ) t < p , which is impossible, since p is already the optimal solution to OPT-2. Hence, A E B = . Since A E and B are both convex sets that do not intersect, there must exist a separating hyperplane between them. Therefore, there exists a non-zero vector ( λ ˜ , v ˜ , μ ) and a non-negative number α, such that:
( u , w , t ) A E ( λ ˜ , v ˜ , μ ) T ( u , w , t ) α
( u , w , t ) B ( λ ˜ , v ˜ , μ ) T ( u , w , t ) α
From Equation (A6), we have λ ˜ 0 and μ 0 , otherwise ( λ ˜ , v ˜ , μ ) T ( u , w , t ) is unbounded below. From Equation (A7), we have μ t α for any t < p . Therefore, we have μ p α since if μ p > α , then there must exist a vicinity of p , denoted as δ ( p ) , such that for any x δ ( p ) , μ x > α , which contradicts that μ t α for any t < p . Therefore, we have:
i = 0 2 n + 1 λ ˜ i g i ( d ) + v ˜ ( A T d L ) + μ g i ( d ) α μ p
  • If μ > 0 , for all d D
    i = 0 2 n + 1 λ ˜ i μ g i ( d ) + v ˜ μ ( A T d L ) + g i ( d ) = L ( d , λ ˜ μ , v μ ) p
    Let λ ˜ i μ = λ and v μ = v ; we have G ( λ , v ) = inf d L ( d , λ ˜ , v ) . Thus, we have G ( λ , v ) p . However, G ( λ , v ) always provides a lower bound of OPT-2; we have G ( λ , v ) p . Therefore, G ( λ , v ) = p .
  • If μ = 0 , from Equation (A8), we have:
    i = 0 2 n + 1 λ ˜ i g i ( d ) + v ˜ ( A T d L ) α 0
    By applying this to the point d that satisfies the first fact we mentioned above, we have:
    i = 0 2 n + 1 λ ˜ i g i ( d ) 0
    Since λ ˜ 0 and g i ( d ) < 0 , we must have λ ˜ = 0 . Since ( λ ˜ , v ˜ , μ ) is a non-zero vector, we have v ˜ 0 . Since λ ˜ = 0 , Equation (A10) can be rewritten as:
    v ˜ ( A T d L ) 0
    For those d ^ that satisfy the first fact, we have:
    v ˜ ( A T d ^ L ) = 0
    Since v ˜ ( A T d L ) is an affine function of d , and d int D , there must exist some d within the vicinity of d ^ , such that v ˜ ( A T d L ) < 0 unless A v ˜ = 0 . However, by the definition of A , which is a non-zero column vector, A v ˜ = 0 holds only if v ˜ = 0 , which contradicts that ( λ ˜ , v ˜ , μ ) is a non-zero vector. Therefore, μ cannot be zero.
In conclusion, we have G ( λ , v ) = p , which means that the strong duality holds. ☐

Appendix B. The linearization Process of OPT-8

Let:
τ i / τ = ξ i , 1 i N ( τ S + τ P ) / τ = τ 0 / τ = ξ 0 τ S / τ = ξ S
Then, the objective function of OPT-8 can be rewritten as ξ S , and the third constraint can be rewritten as k = 0 N ξ k = 1 .
For the second constraint, we have:
U τ i ( ρ r R i + ( Φ 1 + Φ 2 d i k ) r T i ) τ i = ( ρ r R i + ( Φ 1 + Φ 2 d i k ) r T i ) ( τ τ i ) E m a x E m i n
The “=” holds due to Equation (14). Then, by dividing the both sides with τ, we have:
ξ 0 ξ S ( ρ r R i + ( Φ 1 + Φ 2 d i k ) r T i ) ( 1 ξ i ) τ P E m a x E m i n 0
Thus, we have the linear programming problem OPT-9:
max ξ S s . t . r i + r R i = r T i ξ 0 ξ S ( ρ r R i + ( Φ 1 + Φ 2 d i k ) r T i ) ( 1 ξ i ) τ P E m a x E m i n 0 k = 0 N ξ k = 1 .

References

  1. Antonio, P.; Grimaccia, F.; Mussetta, M. Architecture and methods for innovative heterogeneous wireless sensor network applications. Remote Sens. 2012, 4, 1146–1161. [Google Scholar] [CrossRef] [Green Version]
  2. Kurs, A.; Karalis, A. Wireless Power Transfer via Strongly Coupled Magnetic Resonances. Science 2007, 317, 83–86. [Google Scholar] [CrossRef] [PubMed]
  3. Zhong, W.X.; Zhang, C.; Xun, L.; Hui, S.Y.R. A Methodology for Making a Three-Coil Wireless Power Transfer System More Energy Efficient Than a Two-Coil Counterpart for Extended Transfer Distance. IEEE Trans. Power Electron. 2015, 30, 933–942. [Google Scholar] [CrossRef]
  4. Tang, S.C.; McDannold, N.J. Power Loss Analysis and Comparison of Segmented and Unsegmented Energy Coupling Coils for Wireless Energy Transfer. IEEE J. Emerg. Sel. Top. Power Electron. 2015, 3, 215–225. [Google Scholar] [CrossRef] [PubMed]
  5. Li, S.; Mi, C.C. Wireless Power Transfer for Electric Vehicle Applications. IEEE J. Emerg. Sel. Top. Power Electron. 2015, 3, 4–17. [Google Scholar]
  6. MORRIS, K. Highly Resonant Wireless Power Transfer: Safe, Efficient, and over Distance; WiTricity Corporation Technical Report: Watertown, MA, USA, 2013. [Google Scholar]
  7. Khripkov, A.; Hong, W.; Pavlov, K. Integrated resonant structure for simultaneous wireless power transfer and data telemetry. IEEE Antennas Wirel. Propag. Lett. 2012, 11, 1659–1662. [Google Scholar] [CrossRef]
  8. Dervis, K.; Selcuk, O. Cluster Based Wireless Sensor Network Routing Using Artificial Bee Colony Algorithm. Wirel. Netw. 2012, 18, 847–860. [Google Scholar]
  9. Selcuk, O.; Ozturk, C. A Comparative Study on Differential Evolution Based Routing Implementations for Wireless Sensor Networks. In Proceedings of the International Symposium on INISTA, Trabzon, Turkey, 2–4 July 2012; pp. 1–5.
  10. Nicolas, G.; Nathalie, M. Greedy Routing Recovery Using Controlled Mobility in Wireless Sensor Networks. Ad-hoc Mobile Wirel. Netw. 2013, 7960, 209–220. [Google Scholar]
  11. Zhao, Y.Z.; Miao, C.; Ma, M.; Zhang, J.B.; Leung, C. A Survey and Projection on Medium Access Control Protocols for Wireless Sensor Networks. ACM Comput. Surv. 2012, 45, 7:1–7:37. [Google Scholar] [CrossRef]
  12. Jang, B.; Lim, J.B. An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks. Comput. Netw. 2013, 57, 85–98. [Google Scholar] [CrossRef]
  13. Murthy, J.K.; Kumar, S. Energy Efficient Scheduling in Cross Layer Optimized Cluster Wireless Sensor Networks. Int. J. Comput. Sci. Commun. 2012, 3, 149–153. [Google Scholar]
  14. Yang, S.; Yang, X.; McCann, J.A.; Zhang, T.; Liu, G.; Liu, Z. Distributed Networking in Autonomic Solar Powered Wireless Sensor Networks. IEEE J. Sel. Areas Commun. 2013, 31, 750–761. [Google Scholar] [CrossRef]
  15. Shigeta, R.; Sasaki, T. Ambient RF Energy Harvesting Sensor Device with Capacitor-Leakage-Aware Duty Cycle Control. IEEE J. Sens. 2013, 13, 2973–2983. [Google Scholar] [CrossRef]
  16. Jeon, J.; Ephremides, A. The Stability Region of Random Multiple Access under Stochastic Energy Harvesting. In Proceedings of the IEEE International Symposium on Information Theory (ISIT), St. Petersburg, Russia, 31 July–5 August 2011; pp. 1796–1800.
  17. Jeon, J.; Ephremides, A. On the Stability of Random Multiple Access with Stochastic Energy Harvesting. IEEE J. Sel. Areas Commun. 2015, 33, 571–584. [Google Scholar] [CrossRef]
  18. Pappas, N.; Kountouris, M.; Jeon, J.; Ephremides, A.; Traganitis, A. Network-Level Cooperation in Energy Harvesting Wireless Networks. In Proceedings of the Global Conference on Signal and Information Processing (GlobalSIP), Austin, TX, USA, 3–5 December 2013; pp. 383–386.
  19. Pappas, N.; Kountouris, M.; Jeon, J.; Ephremides, A.; Traganitis, A. Effect of Energy Harvesting on Stable Throughput in Cooperative Relay Systems. Comput. Sci. 2015, 2015. arXiv:1502.01134. [Google Scholar]
  20. Krikidis, I.; Charalambous, T.; Thompson, J. Stability Analysis and Power Optimization for Energy Harvesting Cooperative Networks. IEEE Signal Process. Lett. 2012, 19, 20–23. [Google Scholar] [CrossRef]
  21. Li, M.; Liu, Y. Underground coal mine monitoring with wireless sensor networks. ACM Trans. Sens. Netw. 2009, 5, 10:1–10:19. [Google Scholar] [CrossRef]
  22. Nazir, U.; Shahid, N.; Arshad, M.A.; Raza, S.H. Classification of Localization Algorithms for Wireless Sensor Network: A Survey. In Proceedings of the International Conference on Open Source Systems and Technologies, Lahore, Pakistan, 20–22 December 2012; pp. 1–5.
  23. Ruan, D.X.; Zhang, X.G.; Li, H.; Liu, Y. The Research of Optimal Algorithm for Task Scheduling Underground Wireless Network Based on Distributed Computing. In Proceedings of the International Conference on Manufacturing Automation (ICMA), Hong Kong, China, 13–15 December 2010; pp. 151–155.
  24. Menon, K.A.U.; Maria, D.; Thirugnanam, H. Power Optimization Strategies for Wireless Sensor Networks in Coal Mines. In Proceedings of the Ninth International Conference on Wireless and Optical Communications Networks, Indore, India, 13–15 December 2012; pp. 1–5.

Share and Cite

MDPI and ACS Style

Ding, X.; Shi, L.; Han, J.; Lu, J. The Study of Cross-layer Optimization for Wireless Rechargeable Sensor Networks Implemented in Coal Mines. Sensors 2016, 16, 171. https://doi.org/10.3390/s16020171

AMA Style

Ding X, Shi L, Han J, Lu J. The Study of Cross-layer Optimization for Wireless Rechargeable Sensor Networks Implemented in Coal Mines. Sensors. 2016; 16(2):171. https://doi.org/10.3390/s16020171

Chicago/Turabian Style

Ding, Xu, Lei Shi, Jianghong Han, and Jingting Lu. 2016. "The Study of Cross-layer Optimization for Wireless Rechargeable Sensor Networks Implemented in Coal Mines" Sensors 16, no. 2: 171. https://doi.org/10.3390/s16020171

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop