Abstract
Wireless sensor networks are appealing, largely because they do not need wired infrastructure, but it is precisely this feature that renders them energy-constrained. The duty cycle scheduling is perceived as a contributor to the energy efficiency of sensing. This paper developed a novel paradigm for modeling wireless sensor networks; in this context, an adaptive sensing scheduling strategy is proposed depending on event occurrence behavior, and the scheduling problem is framed as an optimization problem. The optimization objectives include reducing energy depletion and optimizing detection accuracy. We determine the explicit form of the objective function by numerical fitting and found that the objective function aggregated by the fitting functions is a bivariate multimodal function that favors the Fibonacci tree optimization algorithm. Then, with the optimal parameters optimized by the Fibonacci tree optimization algorithm, the scheduling scheme can be easily deployed, and it behaves consistently in the coming hours. The proposed “Fibonacci Tree Optimization Strategy” (“FTOS”) outperforms lightweight deployment-aware scheduling (LDAS), balanced-energy scheduling (BS), distributed self-spreading algorithm (DSS) and probing environment and collaborating adaptive sleeping (PECAS) in achieving the aforementioned scheduling objectives. The Fibonacci tree optimization algorithm has attained a better optimistic effect than the artificial bee colony (ABC) algorithm, differential evolution (DE) algorithm, genetic algorithm (GA) algorithm, particle swarm optimization (PSO) algorithm, and comprehensive learning particle swarm optimization (CLPSO) algorithm in multiple runs.
1. Introduction
Wireless Sensor Network (WSN) is a network of thousands of low-cost miniature devices capable of processing, communicating wirelessly, and sensing, which runs on a limited battery. Since we typically expect WSN sensors to last from several months to one year without recharging, energy efficiency is essential. Much previous work has referred to energy-efficient communication (media access control and routing) in WSN ([,,,], for example); energy-efficient sensing, however, has received little attention. Results of recent measurements indicate that sensing uses comparable amounts of energy as wireless communication []. Additionally, sensing frequency is greater than communication frequency—for example, a sensor that monitors residential fire in forests only triggers an alarm when temperatures exceed a threshold. Therefore, it is prime time we called for efforts to study energy-saving strategies of sensing.
Dynamic events are not easily captured as they come and go and can only be observed by continuous monitoring. Energy efficiency is a serious concern if sensors are always ON. Programming sensors’ work/sleep cycles (or duty cycles) is seen as a helpful response measure. When the node is in SLEEP mode, only the low-power timer remains active should it be necessary to wake it up. Hence, the energy consumed during the sleep duration is only a tiny fraction of that in the working duration.
While many studies have investigated sensing scheduling problems, they differ in their design assumptions and objectives because of the multifarious business needs of applications. Based on the belief of building up mathematical foundations and establishing synergy between detection accuracy and energy depletion (as the central theme of this paper), we suggest that the main contributions of this paper are:
- A novel system model of wireless sensor network is introduced;
- An adaptive sensing scheduling strategy based on event occurrence behavior is proposed;
- The scheduling problem is formulated as an optimization problem and is solved by a Fibonacci tree optimization algorithm.
The rest of the paper proceeds as follows: Section 2 reviews related work. Section 3 presents the system model. Section 4 introduces the Fibonacci tree optimization algorithm. Section 5 explains why the Fibonacci tree optimization algorithm is selected for parameter optimization and examines the advantages of the proposed FTOS strategy. Section 6 implements experiments. Section 7 discusses the deficiencies and unresolved issues. Finally, Section 8 draws the conclusion.
2. Related Work
2.1. Sensing Scheduling Strategies
The research on energy-saving sensing scheduling strategies involves two levels. The first level is adaptive duty cycle scheduling, concerning active time, nap time and the idle listening period. The goal is to best model the event arrival patterns. The second level, collaborative sensing, considers the sensing coverage: how numerous sensor nodes (not just a single node) with different spatiotemporal coordinates in a public area can cooperate to achieve adequate coverage, which is conducive to global optimization of energy consumption.
We know that sensors consume the most energy when they are on duty and the least when they are sleeping. As a result, almost all scheduling strategies, such as ELECTION [] and additive increase/multiplicative decrease (AIDM) [], make full use of the energy-saving characteristic of the sleep mode. DANCE [] improves AIDM [] by incorporating the behavior of neighboring nodes into consideration scope. In DANCE, the sensor abandons its task if its neighbor has already done it, thus down-scaling the energy inefficiency. The authors argue that the data sampling rate affects the computing and communication load on the central server. Controlling the sampling rate within a specific range (if it exceeds, then the central server and nodes renegotiate a range) through Kalman filtering is believed to be capable of tackling this problem [].
Jothiraj et al. [] recommend fine-tuning the sensing frequency of each sensor dynamically. As the sensory readings increase, the detection accuracy improves. The challenge, however, lies in modeling the actual world. Maintaining the greatest possible coverage is a primary goal when designing a sensor network. Chen et al. [] defined a sensing coverage metric that measures a wireless sensor network’s QoS (quality of service). Furthermore, a polynomial-time complexity optimization algorithm using graphing theory and computational geometry is proposed to achieve optimum coverage [] broadens the work in [] by enhancing the algorithm. The first work that considers both energy consumption and sensing coverage was completed by [], which introduces an energy-efficient surveillance system (ESS). This was followed by lightweight deployment-aware scheduling (LDAS) [,], probing environment and adaptive sensing (PEAS) [], probing environment and collaborating adaptive sleeping (PECAS) [], and randomized independent scheduling (RIS) [], and so forth. These studies make the following two common assumptions: (1) each sensor is power-constrained, and (2) the network is expected to run for a long time. Other assumptions include:
- Network Structure. The network structure can be flat or hierarchical.
- Sensor Placement. The sensing coverage is usually affected by how sensors are initially placed. In most cases, the sensors follow a random distribution or two-dimensional (2-D) Poisson distribution [,].
- Sensing Area: The sensing area can be 2-D circular or 3-D spherical.
- Time Synchronization. The sensors are synchronized in time, and can be woken up simultaneously for the next scheduling round.
- Failure Model. Almost all the studies assume that sensors fail when energy is exhausted.
- Sensor Mobility. Most studies have assumed that the sensor is immobile.
- Location Information. These studies typically associate location information with whether, or how much, a sensor’s sensing area overlaps with its neighbor’s.
- Distance Information. The distance information can be inferred from the location information.
Randomized independent scheduling (RIS) [] can extend the sensor lifetime and obtain an asymptotic k-coverage, and, it is simple. RIS does not need to provide location information or distance information, nor does it need adjustable transmission range and mobility. However, it is based on strict distribution assumptions—for example, the sensor is Poisson/uniform/grid distributed, the sensing range follows a uniform distribution and the network is flat and two-dimensional.
Lightweight deployment-aware scheduling (LDAS) [], probing environment and adaptive sensing (PEAS) [], probing environment and collaborating adaptive sleeping (PECAS) [], and so forth, make relatively loose assumptions. LDAS assumes that the sensor nodes do not own a positioning device, such as GPS, thus forces the sensors achieving the desired coverage by static sensing. PEAS consists of two mechanisms: sensing and adaptive sleep scheduling, and requires high sensor density. PECAS is an updated version of the PEAS. It posts its remaining/available hours in response to neighbors to avoid misperceptions. This leads to an increase in communication energy depletion. Balanced-energy scheduling (BS) [] is a balanced-energy scheduling model designed for dense sensor networks. It distributes the sensing and communication tasks to all sensor nodes in the cluster. The assumptions made by the reviewed studies are listed in Table 1.

Table 1.
The studies’ classifications according to their assumptions.
Applications differ in their necessities. Hence, the served sensor networks have diverse design objectives and priorities. We summarize these design objectives as follows:
- Maximizing Network Lifetime. This is a goal that is hard not to consider.
- Sensing Coverage. A network is said to achieve k-coverage if any event occurs within the jurisdiction of at least k sensors. 1-overage is a minimum requirement for WSN.
- Network Connectivity. The developers applaud a model that offers a particular network connectivity needed by the application, but this requires a very high sensor density.
- Balanced Energy Usage. In the case of a sensing coverage breach, when a node runs out of power before others, some studies endeavor to spread the energy utilization evenly among each node.
- Simplicity. Sensors have exceptionally restricted memory space and limited computation power. For this reason, simple schemes are more popular.
- Robustness: Robustness measures how well a network can withstand downtime and crashes.
Adaptive self-configuring sEnsor networks topologies (ASCENT) [], PEAS, PECAS, Low-energy adaptive clustering hierarchy (LEACH-GA) [], IBLEACH [], energy-efficient surveillance system (ESS) [] and BS [] do not take complete coverage of the region as their primary goal. Cooperative spectrum sensing (CSS) [], however, is the opposite. The coverage configuration protocol (CCP) [] introduced the concept of interconnected sensor coverage. It devised an approximation algorithm to construct a topology with near-optimal sensor coverage. The central controller periodically selects sensors along a trajectory until the target area is fully covered.
Most schemes strive to attain an energy balance [], for example, the distributed self-spreading algorithm (DSS) [] and intelligent deployment and clustering algorithm (IDCA) []. In the DSS, the sensor nodes are initially deployed randomly and move because of the influence exerted by nearby nodes. In the IDCA, however, the remaining energy level of the node determines whether it moves or not. The idea behind DSS and IDCA is to reduce the residual capacity differential between nodes.
Many studies envisage network connectivity with sensing coverage, for example, [,,]. When the transmission range of the sensor node is at least twice its sensing range, k-coverage leads to k-connectivity [,]. Typically, high connectivity ensures high robustness, but one result of high connectivity is that data conflicts between nodes can seriously affect data transfer rates. The results of recent research presented in [] are not based on the assumption that the transmit range of the sensor nodes is not less than twice their sensing range. Dhumal et al. [] considered a tiered sensor network that includes sensors that could fail and they discussed the sensing coverage, network connectivity, and network diameter. In [], the authors proposed an optimal deployment strategy to achieve two connections that fully cover all communication and sensing ranges.
The design objectives of the reviewed studies are summarized in Table 2.

Table 2.
The studies’ classifications according to their objectives.
2.2. Optimization Algorithms for Multi-Modal Function
Population or single solution search-based optimization algorithms (viz., meta, hyper-heuristic) have solid global search ability. Typical examples include inter alia evolutionary and swarm intelligence algorithms, such as the genetic algorithm (GA) [], differential evolution (DE) algorithm [], particle swarm optimization (PSO) algorithm [], comprehensive learning particle swarm optimization (CLPSO) [] and artificial bee colony (ABC) algorithm []. These algorithms are essentially methods by trial and error. It can take many thousands or even millions of iterations to converge. New emerging algorithms, such as the multi-layered gravitational search algorithm (MLGSA) [] and quantum tabu search (QTS) algorithm [], improve classical versions by avoiding premature convergence or being trapped in local optima. When addressing practical issues, we search for the global extremum of a complicated or unknown function, but just finding one local minimum of a relatively simple but very high-dimensional function can also be a formidable challenge; for example, the Multi-modal Function Optimization (MFO) []. Given a multi-modal problem, the optimization task is to identify the greatest number of optimal solutions (global and local) to help the decision-maker better understand the problem at hand.
It has developed many techniques to locate local optimums. These techniques are termed “niching” methods. A niching method can be built into a standard search-based optimization algorithm to identify several optimal or sub-optimal solutions sequentially or concurrently. Sequential approaches discover optimal solutions gradually over time, while concurrent methods encourage and maintain many stable sub-populations within a single population. Conventional niching techniques include crowding, fitness sharing, decommissioning, covariance matrix adaptation, cleaning, species conserving, and so forth. More recently, some variants of meta-heuristic algorithms, such as an ant colony system with nonlinear pheromone update (ACS-NP) [], and comprehensive learning particle swarm optimization with local search (CLPSO-LS) [], have incorporated niching methods. Despite niching methods’ first appearance over 30 years ago (in the 1980s), niching methods (or multi-modal optimization) are being resurrected as an increasingly important research subject, attracting researchers from a broad spectrum of research areas, including Evolutionary Computation (EC) [] and Swarm Intelligence (SI) [].
The Fibonacci tree optimization algorithm (FTO) [] is a sophisticated optimization algorithm. It resolves the optimal solution of the problem by alternating iterations of global scanning and local scanning. It fully utilizes computer memory to save the optimization process. FTO can provide a reasonable approximation of a global optimum for a function with ample search space. In each iteration, the golden ratio separation is used to compress the search space, so the local optimal solution can also be achieved. It particularly applies to multi-peak/multi-modal function optimization.
The comparison of features of the aforementioned optimization algorithms is shown in Table 3.

Table 3.
Comparison of some optimization algorithms.
3. System Model
Table 4 lists the essential notations used in the system model.

Table 4.
List of essential notations in the model descriptions.
3.1. Basic Assumptions
The model operates on a 2-D map with many devices, each equipped with sensors to perform specific tasks. We make the following basic assumptions:
- A1: The network structure is flat. All nodes are homogeneous with the same energy budget.
- A2: The positions of sensor nodes are uniformly distributed.
- A3: The sensing area is 2-D.
- A4: The transmission/sensing radii are tunable.
- A5: Time is asynchronous. It is hard to coordinate sensors without a central controller but, otherwise, the central controller incurs a performance penalty. So, sensors embrace asynchronous scheduling—every sensor autonomously decides its duty cycle without synchronizing with each other.
- A6: The sensor node can be movable.
- A7: Location information is unknowable.
- A8: Distance information is unknowable.
3.2. Location Distribution and Sensing Radii
We assume the participants move around in M randomly. The locations of all N participants follow a uniform distribution. To accommodate different sensing radii, the sensor can adjust its transmission range r from to , which is usually accomplished by varying the transmitting power (see Figure 1).

Figure 1.
Tunable sensing radii.
3.3. Event Occurrence and Detection
We assume the events occur randomly and independently in M, subject to a Poisson process of Poisson rate . The Poisson process is a stochastic process used to model random and independent events. Furthermore, it is assumed that the measurement is efficient, which means all the events occurring within the sensing range will be expediently detected. Therefore, the probability that q events processed by a sensor with sensing radius r in duration t is
where is the counting process of events and represents the average Poisson rate in the circular sensing region of the sensor. By leveraging the properties of Poisson’s process, we have:
where is the expectation operator and denotes the expected number of events processed in .
An event at a distance of d from the sensor has a probability of being detected:
where and are parameters determined by the sensor physical characteristics, which reflects the probability attenuation coefficients with distance.
In sleep time, all events are considered missed. Let be the average number of missed events, then
During working hours, the average number of missed events, , can be calculated as
The event space is
Now we define the detection accuracy as a quantifiable indicator of event missing
3.4. Energy Depletion
We consider the sensing energy model introduced in Lee et al. []:
where are sensor-specific constants; in exemplary cases, ; describes the static power and the wake-up timing and wake-up frequency will affect the static power consumption, so is inextricably related to scheduling strategies. Equation (9) implies that the energy depletion of the perceptron during the working duration is determined by the distance at which an object appears. If a sensor is in sleep mode, then only the low-power timer and other necessary components remain active, viz.
represents the static power. Since frequent wake-up and sleep can affect the static power, that means is also a function of the scheduling strategy.
3.5. Scheduling Model
Figure 2 shows a schematic diagram of a typical alternate sensing scheduling scheme. A sensor wakes up its sensing unit when transitioning to the working state and turns it off when the sleep interval comes, and the length of the sleep interval is dynamically adjusted according to the event occurrence of the previous interval. Despite the scheme’s prevalence, how to adjust the intervals properly is as yet an open issue.

Figure 2.
The diagram of alternate sensing scheduling.
Now, we establish a baseline scheduling strategy: fixed-time scheduling (denoted as FT for convenience). In FT, we set the working duration and the sleep duration in advance and they remain unchanged. Then, we introduce an adaptive scheduling strategy, in which we dynamically fine-tune the sleep duration as per the event statistics and user-specified parameters. The mathematical formula is:
where and denotes the step-size increasing/diminishing factor, , . is sign function:
and provide the ability to maintain a synergy between the event capture and energy expenditure. For instance, a larger renders more energy-saving but also increases the probability of missing an event.
3.6. Sensing Coverage
Practical applications require the monitoring of almost the whole area of the wireless sensor network. Achieving 1-coverage is a minimum requirement (as shown in Figure 3).
Theorem 1.
Suppose there are N sensors uniformly distributed in a WSN, the sensing radius of each sensor is r, , then the overall detection accuracy is given by:
Proof.
The probability of a random event occurring within the sensing radii of sensors is:
The expected number of sensors within the scope of an event is:
The expected number of sensors that are within the scope of an event and are themselves in a working state is:
Therefore, the probability of a random event being detected by a sensor is:
The theorem holds. □

Figure 3.
The diagram of 1-coverage.
Theorem 1 reveals that the detection accuracy is a function of the average number of sensors in each cell area and sensing scheduling.
3.7. Problem Formulation
The design objective of our model is an optimization problem:
We change the optimization goal from maximizing to minimizing . is the logistic Sigmoid function, , which maps the entire number line into a small range between 0 and 1. The reason we divide by 1000 is that we want to convert the value of to the linear region of the Sigmoid function—as can be seen from Figure 4, the linear region of is only 0–1 mW, while that of is 0–4000 mW wide, which can fully cover the maximum variation range of energy depletion.

Figure 4.
The liner region for different Sigmoid functions.
We list all the equations that determine J:
Since the occurrence of events is random, then:
which means
The working interval is fixed to , so
Put these together, then we get the final objective function:
The constraint conditions are
and are affected by the scheduling strategy. The question now is how to establish the functional relationship between , and , . We have been thinking about numerical fitting methods—if we have real historical sample sensory readings, we can fit out the function between , and , .
Numerical fitting is also known as curve fitting. As for the discrete sensory data collected by sampling, we often want to get a continuous function (i.e., a curve) or a denser discrete equation consistent with the known data. The steps of numerical fitting are:
- Presume a functional form. Commonly used function forms include: polynomial function, exponential function, logarithmic function, trigonometric function, and so forth.
- Determine the indeterminate coefficients. Using the least square method, point group center method, random fuzzy method, and so on, to determine the coefficients of the function. Of those, the least square method is the most commonly used.
- Evaluation. The imitative effect can be measured by the mean square error (MSE) or the degree of fit (R2).
4. Fibonacci Tree Optimization Algorithm
Recall that one-dimensional Fibonacci (golden ratio) search cannot proficiently take care of multi-variate issues, giving rise to Fibonacci Tree Optimization—an improved multi-dimensional search algorithm [].
Let , and be the vectors in D-dimensional Euclidean space. In particular, . and address the endpoints of the search component fulfilling the optimization rule, and signifies the split points that can be resolved from searching rules. A proportion of the vectors can be determined as follows:
where denotes the pth Fibonacci number, and is equal to what is called the golden ratio.
The fitness function determined by the endpoints in the construction ought to be assessed as:
denotes the objective function. Then, the coordinate for split point can be calculated as:
Finding the optimal value can likewise be viewed as setting up a search component in FTO, and can be partitioned into two phases: the local optimization phase and the global optimization phase. Allow to signify the points set of the objective function and set , where denotes the number of points in the set, and d represents the depth of the tree. We select the point with the best fitness value. Then, in the following optimization stage, the points are rearranged by their fitness values from best to worst.
There are two search rules in FTO, which can be summed up:
Rule One: Consider the endpoints and , which are given by
where denotes the points set, with each point represented as , of the pth iteration, and k is the index. absorb every point from . select points from randomly, where denotes the population size. and are the upper and lower limits for every point. For , satisfies a uniform distribution over the span , viz.
Using the and given above, the split points are solved by Equation (30).
Rule Two: Assume that is the optimal point in the current iteration given by rule one, viz.
Then, let ; we have
Hence, the split points in the local optimization stage can be determined by Equations (35) and (36).
After applying the two rules above, new endpoints and and split points and are generated, and now we have points. These points are sorted from best to worst based on the fitness value, retaining the optimal points, while the remaining points are eliminated. At the end of this process, the set of search spaces for the current p iteration is updated from the remaining points and form a new set for the next iteration.
Figure 5 shows the branch generation process in the Fibonacci tree optimization algorithm. The depth is initialized as expected, and the number of points in each branch layer is equal to . The dotted circle represents the search points set of the previous iteration; the solid red circle represents the endpoint of the current iteration, and the solid blue circles represent the global random endpoints. Figure 5a shows the global optimization phase, the split points are constructed based on and and are represented by a solid white circle. Figure 5b shows the local optimization phase. New split points can be obtained as per the rules.

Figure 5.
The diagram of the branch generation process in the Fibonacci tree optimization algorithm.
The pseudo-code for the Fibonacci branch generation process is shown as Algorithm 1.
Algorithm 1: Pseudo-code of Fibonacci branch generation process |
![]() |
5. Analysis
5.1. Why FTO Algorithm Is Chosen for Parameter Optimization?
- In the FTO algorithm, the growth of a Fibonacci tree is based on the optimal points of the latest generation, which is a process of competitive elimination. If there are peaks with different heights, the smaller peaks will be removed in the optimization process. Hence, the global optima can be achieved.
- The inner structure of the FTO algorithm meets the golden ratio all over. With each iteration, the separation of the golden ratio rapidly compresses the search space, providing the local optimal solution. It is adapted to the optimization of multi-modal functions. Conversely, most heuristic algorithms are based on the probabilistic search; they are essentially trial and error methods. It may take thousands or even millions of iterations, which is uneconomical and slow.
- The FTO setup only concerns the initial Fibonacci number, which is exquisite and simple. The typical way to obtain multiple local extremums of the multi-modal function using heuristic algorithms is the niche technology. Setting population parameters has a significant impact on the optimistic effects.
- Just like most heuristic algorithms, FTO is also inspired by natural phenomena—plant phototropism. Plants flourish more in sunny areas. To solve the optimization of the multi-modal function, FTO considers the global search space as a sunlit area. The hit probability is sustained and stable. The lush areas refer to the local search process, reflecting the fact that FTO can alternate between global and local searches.
- It fully utilizes the computer memory to save the optimization process and therefore is traceable.
The comparison between FTO and other optimization algorithms is listed in Table 5. Figure 6a illustrates the idea of golden separation in the FTO algorithm’s structure. Figure 6b reflects the global/local alternate search process inspired by phototropism of plants.

Table 5.
The comparison between FTO and other optimization algorithms.

Figure 6.
Optimal points in each iteration of FTO for optimizing: (a) , and (b) .
5.2. Why Do We Claim FTOS Strategy Is Superior to Other Scheduling Strategies?
- Some of the latest scheduling strategies, such as LEACH, work under strict assumptions; for example, the network structure is flat, nodes are densely distributed, time is synchronized, and so forth. The FTOS strategy does not require time synchronization (centralized scheduling); each node independently determines the duty cycle; node density is not important; the location and distance information is not needed.
- The FTOS strategy determines the scheduling parameters as per the occurrence of events from the previous period, which is very scalable.
- Once the parameters are determined, they remain unchanged in the coming hours; you can easily deploy them.
Table 6 enlists the above-mentioned points.

Table 6.
The differences between FTOS and other scheduling strategies.
6. Experiment
6.1. Experimental Setup
We set up a wireless sensor network comprising three nodes (), covering a 5 m × 5 m lawn area (see Figure 7). Each node owns a single-chip microcomputer with a STM32F103ZET6 processor and a diffuse reflection photoelectric infrared proximity sensor. The technical parameters of the sensor are presented in Table 7.

Figure 7.
The experimental scene.

Table 7.
The technical parameters for the diffuse reflection photoelectric infrared proximity sensor.
We randomly throw objects into the area to simulate the event. The diffuse reflection photoelectric infrared proximity sensor with a sensing radius of r = 3~5 m () opens the switch when there is an object to block; the processor then issues a command to pull the buzzer.
Since the working voltage of the single-chip microcomputer is fixed to 5 V, the power formula is , so that the current reflects the size of the power consumption. Consequently, the energy is measured by the reading of the ammeter placed on each microcontroller.
6.2. Train
6.2.1. Function Fitting
We assume that the sensor node determines its sleep interval based on the adaptive scheduling model mentioned in Section 3, where the parameters and are randomly generated on . The polynomial function, double-exponential function, and checkmark function are used to fit the data (the forms are shown in Table 8). The determination of the coefficients is performed by the nonlinear least square method.

Table 8.
The fitting functions.
We generated 100 samples, recorded the static power losses, and , and the corresponding parameters and . Figure 8 shows the fitting curves. Table 9 enlists the degree of fit, .


Figure 8.
The fitting curves of , and , .

Table 9.
The degree of fit ().
Now that we have determined the functional relations between , and , , the explicit form of the objective function J can be obtained by putting the fitted functions in.
6.2.2. Univariate Analysis
Three sets of parameters, (0.175, 0.175), (0.65, 0.65), (0.5, 0.5), were used to test the sensing power dissipation against in base sleep duration and base working duration . The result is shown in Figure 9. When the distance between the event and the sensor, and the base sleep duration and base working duration, are fixed ( m, s, s), the working power increases exponentially with , and the sleeping power dissipation remains unchanged for . With the increase of step-size parameter and , both the working power dissipation and the sleeping power dissipation decrease.

Figure 9.
The power dissipation against in base duration and ( m, s, s).
Figure 10 shows the variation of detection accuracy and expected energy depletion with . Figure 11 shows the variation of detection accuracy and expected energy depletion with . It can be seen that the two parts of the objective function J, grow with , while decreases with ; the optima can only be obtained by jointly optimizing and . and move in the opposite direction against and and impose opposite effects on and . Anything that can increase/decrease / by increasing can also be achieved by decreasing .

Figure 10.
The detection accuracy and energy depletion against . (a) is fixed to 1 s, varying ; (b) is fixed to 1 s, varying .

Figure 11.
The detection accuracy and energy depletion against . (a) is fixed to 1 s, varying ; (b) is fixed to 1 s, varying .
Next, we set up a benchmark strategy: a fixed sleep time strategy, in which s. The relationship between the number of nodes N, the sensing radius r and the overall detection accuracy is studied. The results are shown in Figure 12. For both the proposed adaptive scheduling and fixed scheduling strategies, the detection accuracy will improve with the increase of the sensing radius and the number of nodes. However, the detection accuracy improvement of the proposed adaptive scheduling strategy is significantly higher than that of the fixed scheduling strategy.

Figure 12.
Detection accuracy for the proposed adaptive scheduling and fixed scheduling (a) against the number of cognitive sensors N (r is fixed and m); and (b) sensing radius r (N is fixed and ).
6.2.3. Optimization
By constructing a 3-D surface from the scattered data (see Figure 13), we found that is a bivariate multi-modal function, which favors the FTO algorithm.

Figure 13.
3-D surface graph for scattered data.
Figure 14 shows the optimization process of the FTO algorithm, and the values of the horizontal and vertical axis represent the values of and , respectively. The darker the color of the contour map, the smaller the value of J. The algorithm stops after 500 iterations, and Figure 15 provides the final comparison of the peak areas. We can see that the peak area in the lower-left corner is the largest, and is where the optimal point is most likely to appear. The central point of the aforementioned area was taken as the ultimate global optimization point with the coordinate pair .

Figure 14.
The contour plots in iterations.

Figure 15.
The determination of the ultimate optimum point.
As a comparison, we also implemented the particle swarm optimization (PSO) algorithm, genetic algorithm (GA), comprehensive learning PSO (CLPSO) algorithm, differential evolution (DE) algorithm, and the artificial bee colony (ABC) algorithm. Table 10 outlines the parameters, and Table 11 presents their optimization results. The FTO algorithm outperforms others in most iteration rounds.

Table 10.
The algorithm parameters adopted.

Table 11.
The optimization results.
6.3. Test
Once the parameters of the strategy are determined, they remain unchanged in the coming hours.
Figure 16a presents the optimal J for the first four runs, applying ABC, DE, GA, PSO, CLPSO and FTO; Figure 16b shows a statistical result from 100 runs. From the perspective of distribution, FTO demonstrates a better optimistic effect than the other algorithms for its lowest center J value .

Figure 16.
Test results of FTOS scheduling with parameters optimized by different algorithms.
We have implemented several sensing scheduling strategies including LDAS, PECAS, BS and DSS. These strategies all make similar assumptions. Figure 17 shows the results. FTOS () accomplished better detection accuracy and consumes the bare minimum of energy compared to the other sensing scheduling strategies. For sensing duration (t = 20~150 s), all sensing scheduling strategies improved, viz., and decline with time.

Figure 17.
The expected detection accuracy and the expected energy depletion of different sensing scheduling strategies at different time scales.
7. Deficiencies and Unresolved Issues
The research of this paper is still flawed in the following aspects:
- Selection of fitting functions. Some simple fitting functions are selected by experience to simulate the relationship between variables related to the objective function and the parameters of the scheduling strategy. The results are indeed good, but other fitting functions are still worth trying.
- Selection of sensors. The diffuse reflection photoelectric infrared proximity sensor, E3F-DS100P1, has a sensing radius of 3~5 m. If you have the budget to pay, you had better use sensors with a larger sensing radius and more accuracy, for example, laser radar.
- Too few nodes. Because of the insufficient number of devices we have, we have only configured a 3-node network. Experiments with more nodes would be more convincing.
The dynamics of network traffic were not analyzed. It is also interesting to associate our strategy with other approaches, such as the follow-up of specific targets in [], which is also a topic for future efforts.
8. Conclusions
The FTOS strategy proposed in this paper addresses the synergy between the energy availability and fault tolerance of event monitoring. The experimental results show that the FTOS strategy contributes to reducing energy depletion and increasing detection accuracy. It outperforms LDAS, BS, DSS and PECAS, which have the same design objectives. The experimental findings show that the step-size parameters optimized by the FTO algorithm are better than those optimized by PSO, GA, and so forth. We also guide the actual deployment. It should be noted that when applied in practice, the FTOS strategy can be generalized only if the step-size can be systematically formulated.
Author Contributions
Conceptualization, L.W.; Data curation, L.W.; Formal analysis, L.W.; Funding acquisition, H.C.; Investigation, L.W.; Methodology, L.W.; Project administration, H.C.; Software, L.W.; Supervision, H.C.; Validation, L.W.; Visualization, L.W.; Writing—original draft, L.W.; Writing—review & editing, H.C. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by the National Natural Science Foundation of China under Grant numbers 61832014.
Institutional Review Board Statement
Not applicable.
Data Availability Statement
Research data are be obatained by sending an email to wuliangshun@whu.edu.cn.
Acknowledgments
The authors gratefully acknowledge Hailei Duan for providing source codes of some optimization algorithms.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Phan, K.T.; Huynh, P.; Nguyen, D.N.; Ngo, D.T.; Hong, Y.; Le-Ngoc, T. Energy-Efficient Dual-Hop Internet of Things Communications Network with Delay-Outage Constraints. IEEE Trans. Ind. Inform. 2021, 17, 4892–4903. [Google Scholar] [CrossRef]
- Boddu, N.; Boba, V.; Vatambeti, R. A Novel Georouting Potency Based Optimum Spider Monkey Approach for Avoiding Congestion in Energy Efficient Mobile Ad-hoc Network. Wirel. Pers. Commun. 2021. [Google Scholar] [CrossRef]
- Sheng, Z.; Mahapatra, C.; Zhu, C.; Leung, V.C.M. Recent Advances in Industrial Wireless Sensor Networks Toward Efficient Management in IoT. IEEE Access 2015, 3, 622–637. [Google Scholar] [CrossRef]
- Solis, F.; Fernández Bocco, Á.; Galetto, A.C.; Passetti, L.; Hueda, M.R.; Reyes, B.T. A 4GS/s 8-bit time-interleaved SAR ADC with an energy-efficient architecture in 130 nm CMOS. Int. J. Circ. Theory Appl. 2021. [Google Scholar] [CrossRef]
- Li, H.; Wang, Z.; Wang, H. An energy-efficient power allocation scheme for Massive MIMO systems with imperfect CSI. Digit. Signal Process. 2021, 112, 102964. [Google Scholar] [CrossRef]
- Begum, S.; Wang, S.; Krishnamachari, B.; Helmy, A. ELECTION: Energy-efficient and low-latency scheduling technique for wireless sensor networks. In Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN), Tampa, FL, USA, 16–18 November 2004. [Google Scholar]
- Dantu, R.; Abbas, K.; O’Neill, M., II; Mikler, A. Data centric modelling of environmental sensor networks. In Proceedings of the IEEE Globecom, Dallas, TX, USA, 29 November–3 December 2004; pp. 447–452. [Google Scholar]
- Lee, J.; Lee, D.; Kim, J.; Cho, W.; Pajak, J. A dynamic sensing cycle decision scheme for energy efficiency and data reliability in wireless sensor networks. Lect. Notes Comput. Sci. 2007, 4681, 218–229. [Google Scholar]
- Jain, A.; Chang, E.Y. Adaptive sampling for sensor networks. In Proceedings of the International Workshop on Data Management for Sensor Networks, Toronto, ON, Canada, 30 August 2004; Volume 72, pp. 10–16. [Google Scholar]
- Jothiraj, S.; Balu, S.; Rangaraj, N. An efficient adaptive threshold-based dragonfly optimization model for cooperative spectrum sensing in cognitive radio networks. Int. J. Commun. Syst. 2021, 34, e4829. [Google Scholar] [CrossRef]
- Chen, S.; Shao, D.; Shu, X.; Zhang, C.; Wang, J. FCC-Net: A Full-Coverage Collaborative Network for Weakly Supervised Remote Sensing Object Detection. Electronics 2020, 9, 1356. [Google Scholar] [CrossRef]
- Franceschi, S.; Chirici, G.; Fattorini, L.; Giannetti, F.; Corona, P. Model-assisted estimation of forest attributes exploiting remote sensing information to handle spatial under-coverage. Spat. Stat. 2021, 41, 100472. [Google Scholar] [CrossRef]
- He, T. Energy-efficient surveillance system using wireless sensor networks. In Proceedings of the MobiSys 04, Boston, MA, USA, 6–9 June 2004. [Google Scholar]
- Wu, K. Lightweight deployment-aware scheduling for wireless sensor networks. ACM/Kluwer Mob. Netw. Appl. 2005, 10, 837–852. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Y.; Zhang, D.; Vance, N.; Li, Q.; Wang, D. A Light-weight and Quality-aware Online Adaptive Sampling Approach for Streaming Social Sensing in Cloud Computing. In Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems (ICPADS), Singapore, 11–13 December 2018. [Google Scholar]
- Ye, F.; Zhong, G.S.; Zhang, L. PEAS: A robust energy conserving protocol for long-lived sensor networks. In Proceedings of the IEEE International Conference on Network Protocols (ICNP), Paris, France, 12–15 November 2002. [Google Scholar]
- Liu, C.H.; Zhao, J.; Zhang, H.; Guo, S.; Leung, K.K.; Crowcroft, J. Energy-Efficient Event Detection by Participatory Sensing under Budget Constraints. IEEE Syst. J. 2017, 11, 2490–2501. [Google Scholar] [CrossRef]
- Friderikos, V.; Papadaki, K.; Wisely, D.; Aghvami, H.A. Non-Independent Randomized Rounding for Link Scheduling in Wireless Mesh Networks. In Proceedings of the 64th IEEE Vehicular Technology Conference, Montreal, QC, Canada, 25–28 September 2006. [Google Scholar]
- Sun, M. Adaptive Sensing Schedule for Dynamic Spectrum Sharing in Time-Varying Channel. IEEE Trans. Veh. Technol. 2018, 67, 5520–5524. [Google Scholar] [CrossRef] [Green Version]
- Hanef, M.; Deng, Z. Design challenges and comparative analysis of cluster based routing protocols used in Wireless Sensor Networks for improving network lifetime. Adv. Inf. Sci. Serv. Sci. 2012, 4, 450–459. [Google Scholar]
- Alam, K.M.; Kamruzzaman, J.; Karmakar, G.; Murshed, M. Dynamic adjustment of sensing range for event coverage in wireless sensor networks. J. Netw. Comput. Appl. 2014, 46, 139–153. [Google Scholar] [CrossRef]
- Cichon, K.; Kliks, A.; Bogucka, H. Energy-efficient cooperative spectrum sensing: A survey. IEEE Commun. Surv. Tutor. 2016, 18, 1861–1886. [Google Scholar] [CrossRef]
- Liu, J.L.; Ravishankar, C.V. LEACH-GA: Genetic Algorithm-based energy efficient adaptive clustering protocol for Wireless Sensor Networks. Int. J. Mach. Learn. Comput. 2011, 1, 79–85. [Google Scholar] [CrossRef] [Green Version]
- Salim, A.; Osamy, W.; Khedr, A.M. IBLEACH: Intra-balanced Leach protocol for Wireless Sensor Networks. Wirel. Netw. 2014, 20, 1515–1525. [Google Scholar] [CrossRef]
- Mishra, S.; Yaduvanshi, R.; Dubey, K.; Rajpoot, P. ESS-IBAA: Efficient, short, and secure ID-based authentication algorithm for wireless sensor network. Int. J. Commun. Syst. 2021, 34, e4764. [Google Scholar] [CrossRef]
- Heo, N.; Varshney, P.K. An intelligent deployment and clustering algorithm for adistributed mobile sensor network. In Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Washington, DC, USA, 5–8 October 2003. [Google Scholar]
- Song, C. Selective CS: An Energy-Efficient Sensing Architecture for Wireless Implantable Neural Decoding. IEEE J. Emerg. Sel. Top. Circuits Syst. 2018, 8, 201–210. [Google Scholar] [CrossRef]
- Sendra, S.; Lloret, J.; Garcia, M.; Toledo, J.F. Power saving and energy optimization techniques for wireless sensor neworks. J. Commun. 2011, 6, 439–459. [Google Scholar] [CrossRef]
- Wang, C.; Song, T.; Wu, J.; Jiang, W.; Hu, J. Energy-Efficient Optimal Sensing and Resource Allocation of Soft Cooperative Spectrum Sensing in CRNs. In Proceedings of the 11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi’an, China, 23–25 October 2019; pp. 1–6. [Google Scholar]
- Shakkottai, S.; Srikant, R.; Shroff, N. Unreliable sensor grids: Coverage, connectivity, and diameter. In Proceedings of the IEEE INFOCOM, San Francisco, CA, USA, 30 March–3 April 2003. [Google Scholar]
- Dhumal, S.; Shetty, B.S. Energy-Efficient Coverage and Sensor Localization for Scheduling. In Proceedings of the International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 17–19 July 2019; pp. 537–541. [Google Scholar]
- Rebiha, S.; Fouzi, S. Energy-efficient coverage and connectivity of wireless sensor network in the framework of hybrid sensor and vehicular network. Int. J. Comput. Appl. 2020. [Google Scholar] [CrossRef]
- Holland, J.H. Erratum: Genetic Algorithms and the Optimal Allocation of Trials. Siam J. Comput. 2006, 2, 88–105. [Google Scholar] [CrossRef]
- Storn, R.; Price, K. Differential Evolution—A Simple and Efficient Heuristic for Global Optimization over Continuous Spaces. J. Glob. Optim. 1997, 11, 341–359. [Google Scholar] [CrossRef]
- Kennedy, J.; Eberhart, R. Particle swarm optimization. In Proceedings of the IEEE International Conference on Neural Networks, The University of Western Australia, Perth, Australia, 27 November–1 December 1995; Volume 4, pp. 1942–1948. [Google Scholar]
- Liang, J.J.; Qin, A.K.; Suganthan, P.N.; Baskar, S. Comprehensive learning particle swarm optimizer for global optimization of multi-modal functions. IEEE Trans. Evol. Comput. 2006, 10, 281–295. [Google Scholar] [CrossRef]
- Zhu, B.; Zhu, F. Discrete artificial bee colony algorithm based on logic operation. Acta Electron. Sin. 2015, 43, 2161–2166. [Google Scholar]
- Wang, Y.; Gao, Y.; Zhou, M.; Yu, Y. A Multi-Layered Gravitational Search Algorithm for Function Optimization and Real-World Problems. IEEE/CAA J. Autom. Sin. 2021, 8, 94–109. [Google Scholar] [CrossRef]
- Chen, X.; Jiang, H. Research of quantum tabu search algorithm. Acta Electron. Sin. 2013, 41, 2161–2166. [Google Scholar]
- Das, S.; Maity, S. Real-parameter evolutionary multimodal optimization—A survey of the state of the art. Swarm Evol. Comput. 2011, 2, 71–78. [Google Scholar] [CrossRef]
- Lalbakhsh, P.; Zaeri, B.; Lalbakhsh, A. An improved model of ant colony optimization using a novel pheromone update strategy. IEICE Trans. Inf. Syst. 2013, 96, 2309–2318. [Google Scholar] [CrossRef] [Green Version]
- Cao, Y.; Zhang, H.; Li, W.; Zhou, M.; Zhang, Y.; Chaovalitwongse, W.A. Comprehensive Learning Particle Swarm Optimization Algorithm With Local Search for Multimodal Functions. IEEE Trans. Evol. Comput. 2019, 23, 718–731. [Google Scholar] [CrossRef]
- Jamshidi, M.; Alibeigi, N.; Oryani, B.; Lalbakhsh, A.; Soheyli, M.R.; Rabbani, N. Socialization of Industrial Robots: An Innovative Solution to Improve Productivity. In Proceedings of the IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 1–3 November 2018; pp. 832–837. [Google Scholar]
- Zhang, H.; Zeng, F. A Fibonacci Branch Search (FBS)-Based Optimization Algorithm for Enhanced Nulling Level Control Adaptive Beamforming Techinique. IEEE Access 2019, 7, 160800–160818. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).