You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

10 January 2025

Delay-Sensitive Multi-Sensor Routing Scheduling Method for Underground IoT in Mines

,
and
1
School of Computing and Software, Chengdu Neusoft University, Chengdu 611844, China
2
School of Information Management and Business Administration, Chengdu Neusoft University, Chengdu 611844, China
3
School of Cyber Science and Engineering, Liaoning University, Shenyang 110036, China
*
Author to whom correspondence should be addressed.
This article belongs to the Section Internet of Things

Abstract

Recently, there has been a growing interest in underground construction safety, during activities such as subway construction, underground mining, and tunnel excavation. While Internet of Things (IoT) sensors help to monitor these conditions, large-scale deployment is limited by high power needs and complex tunnel layouts, making real-time response a critical challenge. A delay-sensitive multi-sensor multi-base-station routing scheduling method is proposed for the IoT in underground mining. First, a mixed network topology of wireless and wired networks is formed based on the irregular distribution characteristics of multiple tunnels in the mine construction environment. Based on this topology, a multi-sensor and multi-base-station real-time routing scheduling problem is proposed, proving that the problem is NP-hard. Secondly, the corresponding solving algorithms are designed based on the greedy strategy and the heuristic strategy. Finally, an experimental platform is built, and the performance of the proposed algorithm is compared and analyzed.

1. Introduction

Underground mining is an industry with a high accident rate that presents significant risks to both workers and operations. The persistent challenges of preventing mining accidents, detecting them in real time, and mitigating their consequences has received increasing attention from both researchers and industry professionals [1]. Recently, advances in mining safety have focused on the integration of technology, particularly in predicting and preventing accidents before they occur. The early detection of hazards and minimizing the impact of incidents remain critical and complex areas of study [2]. A key aspect of these advances is the timely and accurate transmission of information within mines, making the Internet of Things (IoT) an essential tool in enhancing operational safety.
In the context of mining, IoT sensor networks are indispensable for monitoring and managing critical data, including the status of equipment, personnel locations, and environmental conditions. These networks not only improve the efficiency of mine operations, but also significantly improve safety by detecting potential hazards before they escalate. IoT devices provide real-time data that enable predictive maintenance and early anomaly detection, thus preventing accidents. In addition, in the event of an accident, these sensor networks accelerate the transmission of key information, aiding in a faster emergency response and improving the overall effectiveness of rescue operations. By relaying detailed event data, the impact on post-incident construction and recovery efforts is minimized.
However, despite the potential of IoT in mining, wireless communication in such environments faces two primary challenges. First, data transmission delays occur because data packets often pass through multiple network nodes, reducing the timeliness of critical information. Second, data collisions caused by simultaneous transmissions from multiple sensors lead to packet loss, which compromises the reliability of the communication system. These challenges highlight the need for robust and efficient wireless transmission methods tailored to the demanding conditions of underground mines.
To address these issues, various researchers have investigated routing and scheduling algorithms designed for use in underground mining environments. Chehri [3] and Wu [4] have explored ways to optimize power consumption and extend the network lifetime of Wireless Sensor Networks (WSNs) by strategically placing sensors and applying quality-of-service strategies. Their research has focused on improving the reliability and scalability of the networks through load-balancing techniques. In particular, Chehri et al. [3] accounted for sensor mobility and channel characteristics, offering a comprehensive analysis of real-world applications.
In addition, Chen et al. [5] proposed a hierarchical communication structure, which organizes the network into separate layers of the protocol stack for communication and information transmission. This approach improves scalability and improves network robustness by optimizing resource utilization between routing nodes. Zhang et al. [6], on the other hand, introduced a delay-sensitive routing and scheduling method based on Ant Colony Optimization (ACO). Through simulations and performance comparisons, Zhang’s method demonstrated superior performance in minimizing delay and jitter under specific mining conditions.
Despite the progress made, several challenges remain unresolved in current research. One major limitation is the insufficient consideration of transmission delay, as most studies emphasize energy efficiency and packet loss without addressing the varying transmission deadlines of different sensors. The lack of comprehensive delay analysis presents a gap in existing solutions, especially in time-sensitive applications.
This paper aims to address these gaps by presenting the following novel contributions:
  • Based on the unique characteristics of underground construction environments, a hybrid network topology that integrates wireless sensor collection with wired transmission is proposed. A real-time routing and scheduling method is proposed, taking into account the transmission deadlines of individual sensors. This problem is proven to be NP-hard;
  • We introduce algorithms based on both greedy and heuristic strategies and improve traditional shortest path algorithms to better suit the complex conditions in mining environments. Comparative analysis in various experimental setups demonstrates that the proposed algorithms significantly reduce transmission delays across a range of application scenarios.
The remainder of this paper is structured as follows. Section 2 reviews related work in the field of WSNs in underground mining. Section 3 presents the system model and formalizes the problem definition. Section 4 describes the design of the proposed algorithms. Section 5 provides a detailed experimental analysis and a comparison of the algorithms’ performance. Finally, Section 6 concludes the paper, summarizing the key findings and outlining potential directions for future research.

3. System Modeling

3.1. Topology Structure of Underground IoT in Mines

IoT devices are deployed along irregular tunnels in some complex construction environments with multiple tunnels, such as metal mining sites. As shown in Figure 1, in the process of gold mining, tunnels need to be excavated according to the distribution of veins, so the deployment of IoT devices will present a mesh topology along different tunnels.
Figure 1. The hardware deployment diagram of the IoT under the mine.
In Figure 1, the base stations are connected to each other via wired connections, while the sensor still sends data wirelessly. The base station and the sensor form a star topology, and the base station and the base station present a multi-hop network topology according to the actual situation of the tunnel. In this topology, both the reliability of wireless transmission and the path of multi-hop data transmission between base stations need to be considered to ensure that data are sent to the cloud between deadlines.
Based on the IoT application scenario in underground construction, Figure 2 is a multi-sensor IoT application topology. In this topology, node F is the endpoint of the cloud device. The four base stations A , B , C , and D form a mesh topology through a cable. The sensor (1, 2, 3, …) sends wireless data to the base station, and the base station needs to send data to the endpoint F through the multi-hop network topology. Assume that the No. 1 sensor of the base station A sends data to A, and A can send data to F through multiple path selections. When the network does not consider other node data, the transmission problem is the shortest-path problem, which the shortest-path algorithm can solve. However, when other nodes in the network also need to send data, considering the delay caused by node caching, queuing, etc., how to send all data to focus F in the shortest time is a problem that needs to be studied such as in this paper.
Figure 2. Hybrid topological structure of mesh and star.
As shown in Figure 2, the next hop of the packet arriving from the base station A can select the base station C or the base station D. After selecting the base station C, the direct path to the destination base station is the shortest path. If base station A has only one data packet, and there is no other data packet except base station A, this method can obtain the minimum delay. However, in practice, if all data packets choose the shortest path to reach the destination base station, such as base station A and base station B, all data packets of the base station are through the base station C, which will lead to congestion at the base station C. Compared with the case where each data packet randomly selects the path based on not repeating the path, the delay will be higher. If all data packets are routed to the base station with the smallest load at the next hop, there will likely be an unnecessary detour. Assume that the load of the base station D is slightly smaller than that of the base station C; a single data packet in the B base station will select the base station D. Since the load of the next hop of base station D and the number of hops required cannot be known directly, the next-hop base station E of base station D may produce a higher delay after the base station D is selected by detour. As a result, the delay of a single packet is not as good as the shortest path. In scheduling, data packets will interact with each other. Using a fixed decision method to optimize the individual scheduling data packets in the front is likely to lead to a significant deterioration of the scheduling results of the data packets in the back of the scheduling problem. For example, it is assumed that the base station A has two packets with an arrival time of 0 and a deadline of 3. The base station E has one packet with an arrival time of 2 and a deadline of 1. If the two packets of the base station A evenly select C and D as the next hop, at the time of 2, one of the packets reaches E, but the one packet that the base station E reaches cannot reach the target base station on time. If both packets of base station A pass through base station C, all packets can arrive before the deadline. Therefore, scheduling from a global perspective is the main starting point of this paper.

3.2. Multi-Sensor Real-Time Routing Scheduling Problem

Assume that there are a total of I base stations; for any 0 i I 1 , n b r ( i ) denotes the set of all nodes connected to node i. Obviously, for 0 i I 1 , if i n b r ( i ) , then i n b r ( i ) . Let e be the set of export nodes. Suppose that there are a total of J data packets in the periodic time of T time slots (assuming that all nodes can transmit a data packet within a time slot). For 0 j J 1 , use B j to represent the base station to which the data packet j belongs (issued by which base station), the arrival time of the data packet j is A j (the arrival time of the data packet j to the base station), the deadline is D j , and the absolute deadline is A j + D j . Q i is used to represent the maximum buffer queue length of base station i.
Suppose that s [ j ] [ t ] [ i ] is used to represent the state of the packet j at time t on the base station i. If s [ j ] [ t ] [ i ] = 1 , this means that the packet j arrives (stays) on the base station i at time t; otherwise, s [ j ] [ t ] [ i ] = 0 . r [ j ] is used to represent the time when the packet j reaches the target node, that is, if s [ j ] [ r ] [ t ] [ i ] = 1 , then i e . c [ t ] [ i ] is used to represent the number of packets that the base station i waits to process in the cache queue at time t. In this paper, for the data packet j, the purpose of the transmission is to send it to the target node as soon as possible. Therefore, the objective function f j is defined as follows:
f j = r [ j ] A j D j
Obviously, r [ j ] > A j . At the same time, in order to complete the scheduling before the deadline, we need to satisfy r [ j ] < A j + D j ; therefore, 0 < r [ j ] A j r [ j ] A j D j D j 1 . That is, for any j, this satisfies f j 0 , 1 .
Therefore, we define the multi-sensor real-time routing scheduling problem for a given I, J, T, A, e, and n b r .
The multi-sensor real-time routing scheduling problem may contain many feasible solutions. To find an optimal solution among multiple feasible solutions, this paper takes the minimization of the objective function value in a feasible solution as the optimization objective. That is to say, for the scheduling results of J sensors, the largest f j is selected as the representative of this set of solutions, and then the smallest of multiple feasible solutions is selected as the final problem solution. The mathematical model of the multi-sensor real-time routing scheduling problem S is as follows:
    min max j = 0 J 1 f j s . t . ( 1 ) j { 0 , 1 , , J 1 } , r j T 1 r j A j D j ( 2 ) j { 0 , 1 , , J 1 } , s j r j i e = 1 s j A j B j = 1 ( 3 ) j { 0 , 1 , , J 1 } , i , i { 0 , 1 , , I 1 } , t { 0 , 1 , , T 2 } , if s j t i = s j t + 1 i = 1 , then i n b r i ( 4 ) t { 0 , 1 , , T 1 } , i { 0 , 1 , , I 1 } , c t i Q i ( 5 ) j { 0 , 1 , , J 1 } , t 0 , 1 , , T 1 , i = 0 I 1 s j t i 1
The following explains the constraints of the problem S .
Constraints (1) and (2) show that, if there is r [ j ] , it must be scheduled between the deadlines, and all scheduling beyond the deadline is not satisfied. If there is a packet that does not reach the endpoint, this condition is not satisfied. Therefore, as long as Constraints (1) and (2) are satisfied, all the data packets on the surface reach the destination node within the specified time.
Constraint Condition (3) indicates that data transmission can only be performed when two base stations are adjacent.
Constraint Condition (4) indicates that the cache of all base stations cannot overflow.
Constraint Condition (5) means that any sensor data can only be transmitted on one base station at any time.
As shown in Figure 3, the network topology consists of I starting nodes, I routing nodes, and a single terminal node D. For any i { 0 , 1 , , I 1 } and i { 0 , 1 , , I 1 } , let i nbr ( i ) . Moreover, for any i { 0 , 1 , , I 1 } , it must hold that D nbr ( i ) . Let any Q i = . Clearly, the problem S in Figure 3 is a subproblem of the problem S discussed in this paper. We now prove that S is an NP-hard problem.
Figure 3. A special case of the multi-sensor real-time routing scheduling problem.
Proof. 
Let W = I and C = I ; this allows us to describe this problem as a multi-task, multi-processor scheduling problem [23] with W tasks and C processors. Nodes 1 to n in the figure are base stations with sensor data, and a column of nodes in the middle is a routable base station. Each sensor data can face the same n routing nodes after departure. It is evident that this transformation process has polynomial-time computational complexity. □
The problem proposed in [23] has been proven to be an NP-complete problem; therefore, the problem S is NP-hard.
Since a simpler subproblem S is NP-hard, the more complex problem S must also be NP-hard.

4. Algorithm Design

Since the NP-hard problem is difficult to solve effectively in polynomial time, this paper designs a variety of solving algorithms based on the ideas of the greedy algorithm, the shortest-path algorithm, and two heuristic algorithms and conducts experimental comparison and analysis to find different solutions to the problem under different conditions.

4.1. Algorithm Design Based on Greedy Strategy

Greedy strategy is a simple and rapid method to solve the problem. The characteristics of the greedy algorithm are step by step. The greedy algorithm does not consider the global optimal solution, but is only based on the current situation, and uses a certain measure to optimize the selection. Although the greedy algorithm cannot obtain the optimal solution in most cases, the greedy algorithm can obtain a ‘fairly good’ solution with a lower time complexity. For this problem, the most critical step is to select a fixed standard in each step of optimization selection. By selecting a fixed standard, it is necessary to be able to obtain a ‘not too bad’ solution at the end. The steps of using the greedy algorithm to solve this problem are as follows:
Step 1: Initialize the parameters, including the number of nodes I, the node set n b r ( i ) , the export node i e , the number of data packets J, the base station B j to which the data packet j belongs, the arrival time of the data packet j A j , the deadline D j , and the maximum buffer queue length of the base station Q i ;
Step 2: Sorting the data packets according to the absolute deadline in ascending order and selecting the first packet after sorting to start processing;
Step 3: If the current packet does not reach the export node i e , save the current situation to the stack. Otherwise, skip to step 8;
Step 4: Select the base station that is adjacent to the current base station and has not been visited, and add it to the set to be selected. If the set to be selected is empty, the current base station is marked as visited, and the situation is recovered from the stack and jumped to step 2; if the set to be selected is not empty, the base station with the smallest load is selected as the next-hop base station;
Step 5: The arrival time is obtained based on the current load of the base station. If the buffer of the next-hop base station at the arrival time is full, the arrival time + 1, jump to step 5;
Step 6: Update c [ T ] [ I ] and s [ J ] [ T ] [ I ] according to the base station number and arrival time of the next hop, and jump to step 3;
Step 7: Select a packet after the current packet; jump to step 3;
Step 8: Output results.

4.2. Design of Greedy-Based Genetic Algorithm

A genetic algorithm [24] is a heuristic algorithm. The sequence of each packet in the problem is encoded and can be solved by genetic algorithm. Since the results of the genetic algorithm are highly dependent on the initial solution, the results of the greedy algorithm are used as the initial solution in this paper. The specific steps are as follows:
Step 1: Use a greedy algorithm to solve the problem and use the sequence as the coding method. And retain the results of the greedy algorithm;
Step 2: Replicate the solution of a greedy algorithm as an individual of the population. Other individuals create an initial population by crossing c [ T ] [ I ] in different packets;
Step 3: If the current round is greater than the number of iterations, jump to step 9;
Step 4: According to the fitness, randomly select the ‘number of individuals in the population’ for crossover;
Step 5: In the coding, the same site is put into the candidate set and randomly selected in the candidate set for crossover. Obtain offspring individuals. If it cannot be crossed, it is directly placed into the offspring individual;
Step 6: Coding mutation in the offspring set. According to the mutation rate, change the loci in the code. This site becomes randomly numbered as the base station connected to the adjacent last point;
Step 7: Merge the parent population with the offspring population and calculate the fitness;
Step 8: Generate the next group based on the fitness and roulette algorithm. Jump to step 3;
Step 9: Output results.

4.3. Design of Improved Genetic Algorithm Based on Dijkstra Coding

Dijkstra’s algorithmis an algorithm for finding the shortest path. This algorithm suits the shortest-path problem with a single source point on the graph G = V , E . During the algorithm’s operation, there will be a set of points S. The shortest-path values of all vertices and source points in the set S have been determined. The algorithm repeatedly selects the estimated minimum point u V S . It adds this to S. This paper uses the Dijkstra algorithm to solve each packet along its shortest path to the endpoint and the calculation results.
In some cases, congestion will occur in the network if each packet passes the shortest path from the target node. In this case, the global delay is higher than that of some packets passing through non-shortest paths. Therefore, in the process of searching the shortest path in the Dijkstra algorithm, the non-shortest path should also be appropriately searched. These non-shortest paths should have the characteristics of ‘a cyclic’, and the shortest path difference is not too large.
Based on this idea, the Dijkstra algorithm is improved. In the search by the Dijkstra algorithm, the addition of non-minimum points is appropriately allowed in the process of repeatedly selecting the estimated minimum point. For example, the current distance is the shortest, and the worst case is not more than 5. This value can be adjusted according to the size of the graph. Through this improvement, the path derived from the Dijkstra algorithm can also appropriately contain non-minimum paths with little difference.
Genetic algorithms usually include genetic, mutation, hybridization, natural selection, and other processes. During the whole search process, it is always inclined to retain individuals with higher fitness. In the genetic algorithm, each needs to be encoded. In this problem, the individual is a specific case. In this case, each packet selects a path from the alternative set, and all packets select a feasible path. This constitutes a case of the individual of the problem. The case of each packet selecting a path constitutes the coding of the problem.
The Dijkstra algorithm can only maintain a single shortest path to a certain point, but only maintaining a single shortest path often falls into a local optimal solution, and it is difficult to find a better solution. For this problem, the key to improving the Dijkstra algorithm is to design rules for generating alternative paths. Considering that the greedy algorithm finds it difficult to use the shortest path in the early stage (or when the sample is small), the simple use of the Dijkstra algorithm will lead to multiple packets using the same path, which will lead to congestion. In this problem, the set of nodes that are touched in each step, and, in some cases, include the accessed nodes, is updated to the path set. Some of the additional alternative paths will also be updated with the Dijkstra algorithm update.

5. Experimental Analysis

5.1. Experimental Parameter Settings

Four different scale topologies are randomly generated to compare the algorithm’s advantages and disadvantages. Considering the real scene, the four topologies of different sizes are all non-fully connected graphs. The greedy algorithm, Dijkstra algorithm, genetic algorithm based on greedy algorithm, and genetic algorithm based on Dijkstra coding are compared and analyzed.
(1) Delay Performance Analysis
In order to compare different algorithms, the results obtained by different algorithms are compared in a ‘fitness’ manner. The higher the fitness, the better the solution and the smaller the delay. We compare the fitness of different algorithm scheduling results. After the same iteration, the greater the fitness of the task, the better the algorithm’s solution. The fitness calculation formula in this paper is
( τ G r d τ * ) / τ G r d
where τ G r d is greedy algorithm delay and τ * are the delays of the algorithms to be evaluated.
(2) Convergence Speed Performance Analysis
If complete arrival cannot be achieved, the same round of iterations is performed on different algorithms to compare the proportion of completion. Under the same number of iterations, if the proportion of completion is higher, the algorithm is better. The calculation formula for the completion rate in this paper is the number of packets arriving before the deadline divided by the total number of packets.
Table 1 is the experimental parameter configuration of the analysis in this paper. Table 2 is the experimental parameter configuration of the convergence speed performance analysis in this paper.
Table 1. Delay performance analysis parameter configuration.
Table 2. Convergence speed performance analysis parameter configuration.
In this experiment, fitness is the objective function of the problem, as shown in Equation (1). The value of fitness ranges from [0, 1]. Iters represents the number of iterations executed by the algorithm.

5.2. Experimental Result Analysis

In the experiment, the result of the greedy algorithm is used as its fitness benchmark (0) to minimize the impact of randomness on the experiment. In each experiment, the fixed graph and data packet input are run 10 times, and the average value of the fitness of the corresponding iteration times is taken as the result of the fitness of the 10 experiments.
When the number of points is 10 and the number of packets is 100, the experiment is carried out. The results are shown in Figure 4. Although the initial population using the Dijkstra algorithm is poor, the initial convergence is extremely fast, and a better solution can quickly be found. The convergence rate slows down in the later period, but it is constantly approaching the optimal solution. The faster initial convergence may be because the solution of the Dijkstra algorithm is poor. A better solution can be found after a simple crossover, mutation, and roulette algorithm. The genetic algorithm based on the greedy algorithm in the figure initially has a not-too-bad solution. Still, the initial crossover and mutation are not flexible, and to a certain extent, it is subject to the solution generated by the greedy algorithm. The medium term becomes faster because a better solution than the initial solution is generated, and the cross-matching roulette algorithm accelerates the convergence speed.
Figure 4. Comparison of fitness when Station is 10 and Package is 100.
As shown in Figure 5 and Figure 6, as the size of the graph increases, the genetic algorithm based on the greedy algorithm will slow the convergence speed. In contrast, the genetic algorithm based on the Dijkstra algorithm still has a fast convergence speed in the early stage, while the convergence speed in the later stage has no obvious change. The reason for this phenomenon is that, as the size of the graph increases, the ‘random’ variation will make it more and more difficult to find a better solution. The improved Dijkstra algorithm, although in the early shrinkage limit to understand the space, has a very high crossover and mutation efficiency. Therefore, as the size of the graph increases, the genetic algorithm based on the Dijkstra algorithm will be more advantageous.
Figure 5. Comparison of fitness when Station is 15 and Package is 100.
Figure 6. Comparison of fitness when Station is 20 and Package is 100.
As shown in Figure 4 and Figure 6, the number of data packets is increased, the genetic algorithm based on the greedy algorithm and the genetic algorithm based on the Dijkstra algorithm are compared, and the convergence speed does not change significantly. Comparing Figure 5 with Figure 7, Figure 8 and Figure 9, it is found that, when the Dijkstra algorithm can obtain a better solution, the convergence speed of the genetic algorithm based on the Dijkstra algorithm is relatively slow compared with the greedy algorithm. When the Dijkstra algorithm can obtain a better solution than the greedy algorithm, the genetic algorithm has a relatively fast convergence speed based on the greedy algorithm. The reason is that, when the initial solution is poor, there are more ways to iterate to a better solution; when the initial solution is poor, the method of iterating to the better solution is relatively few, and it is not easy to find.
Figure 7. Comparison of fitness when Station is 15 and Package is 150.
Figure 8. Comparison of fitness when Station is 15 and Package is 200.
Figure 9. Comparison of fitness when Station is 15 and Package is 250.
As shown in Figure 10 and Figure 11, the genetic algorithm based on Dijkstra has more advantages in the final result of the completion rate than the genetic algorithm based on the greedy algorithm. At the same time, the convergence speed of the genetic algorithm based on Dijkstra tends to be faster when the total number of packets increases; the advantages of the genetic algorithm based on Dijkstra will be more obvious.
Figure 10. Comparison of completion rates when Station is 10 and Package is 200.
Figure 11. Comparison of completion rates when Station is 10 and Package is 250.
In the experiments presented in this paper, the parameters of the genetic algorithm were set based on experimental data and optimized through multiple iterations of testing. After adjusting and selecting the optimal parameter combination, the final settings were chosen. In practical engineering applications, the parameter settings of the genetic algorithm can significantly impact the results. Typically, optimization techniques such as particle swarm optimization are used for parameter tuning. As there is already related work on this topic, we do not elaborate further on this aspect in this paper.

6. Conclusions

This paper studied the real-time data transmission problem of the IoT for underground mining safety. The current work was analyzed, and it was demonstrated that existing approaches cannot effectively solve the real-time data transmission problem of IoT in underground mines. Addressing the limitations of current approaches, this paper analyzed the tunnel structure of IoT in mines and proposed a hybrid network topology that combines wireless and wired transmission. A multi-sensor, multi-base-station real-time routing scheduling problem was defined, and it was proven to be NP-hard. Three different algorithms were proposed, and experiments were designed to analyze the delay performance of these algorithms under varying node sizes and packet numbers. At the same time, the computational complexity of the three algorithms was analyzed by evaluating their convergence speeds. The method proposed in this paper can be applied to the real-time routing scheduling of multi-sensors in IoT systems in mining environments and provides a feasible solution with relatively better constraints before the deadline.
In practical applications, due to the complex structure of mines, the reliability of wireless signals is difficult to ensure. Additionally, since the algorithm proposed in this paper requires good clock synchronization between base stations, but devices in underground mines find it challenging to maintain synchronization through low-performance crystal oscillators, these issues must be addressed. In practical applications, a polling method should be used to ensure clock synchronization, and algorithms like CSMA should be appropriately considered to ensure the reliability of data transmission from sensors to base stations.
The main direction for future research is to improve the execution efficiency of the algorithm and analyze the optimization algorithm design approach for specific scenarios, such as dynamic programming. The goal is to propose an optimized scheduling algorithm with pseudo-polynomial time complexity.

Author Contributions

Writing–original draft, Y.Z.; validation, M.L.; writing—review and editing, A.T. All authors have read and agreed to the published version of the manuscript.

Funding

The development and application demonstration of the comprehensive service platform for health maintenance and tour in Dujiangyan, Chengdu Science and Technology Bureau, 2020-YF09-00010-SN.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

All experimental data are presented in the paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Ismail, S.N.; Ramli, A.; Aziz, H.A. Research trends in mining accidents study: A systematic literature review. Saf. Sci. 2021, 143, 105438. [Google Scholar] [CrossRef]
  2. Yang, X.; Krul, K.; Sims, D. Uncovering coal mining accident coverups: An alternative perspective on China’s new safety narrative. Saf. Sci. 2022, 148, 105637. [Google Scholar] [CrossRef]
  3. Chehri, A.; Saadane, R.; Hakem, N.; Chaibi, H. Enhancing energy efficiency of wireless sensor network for mining industry applications. Procedia Comput. Sci. 2020, 176, 261–270. [Google Scholar] [CrossRef]
  4. Wu, B.; Zhou, X.; Huang, Q. Optimal data routing algorithm for mine WSNs based on maximum life cycle. IEEE Access 2020, 8, 131826–131834. [Google Scholar] [CrossRef]
  5. Chen, W.; Wang, X. Coal mine safety intelligent monitoring based on wireless sensor network. IEEE Sens. J. 2020, 21, 25465–25471. [Google Scholar] [CrossRef]
  6. Zhang, Y.; Wu, J.; Liu, M.; Tan, A. TSN-based routing and scheduling scheme for Industrial Internet of Things in underground mining. Eng. Appl. Artif. Intell. 2022, 115, 105314. [Google Scholar] [CrossRef]
  7. Menon, V.; Midhunchakkaravarthy, D.; Sujith, A.; John, S.; Li, X.; Khosravi, M.R. Towards energy-efficient and delay-optimized opportunistic routing in underwater acoustic sensor networks for IoUT platforms: An overview and new suggestions. Comput. Intell. Neurosci. 2022, 2022, 7061617. [Google Scholar] [CrossRef]
  8. Fu, X.; Fortino, G.; Li, W.; Pace, P.; Yang, Y. WSNs-assisted opportunistic network for low-latency message forwarding in sparse settings. Future Gener. Comput. Syst. 2019, 91, 223–237. [Google Scholar] [CrossRef]
  9. Su, Y.; Fan, R.; Fu, X.; Jin, Z. DQELR: An adaptive deep Q-network-based energy-and latency-aware routing protocol design for underwater acoustic sensor networks. IEEE Access 2019, 7, 9091–9104. [Google Scholar] [CrossRef]
  10. Samarji, N.; Salamah, M. ESRA: Energy soaring-based routing algorithm for IoT applications in software-defined wireless sensor networks. Egypt. Inform. J. 2022, 23, 215–224. [Google Scholar] [CrossRef]
  11. Kumar, S.; Gautam, P.; Rashid, T.; Verma, A.; Kumar, A. Division algorithm based energy-efficient routing in wireless sensor networks. Wirel. Pers. Commun. 2022, 122, 2335–2354. [Google Scholar] [CrossRef]
  12. Yun, W.; Yoo, S. Q-learning-based data-aggregation-aware energy-efficient routing protocol for wireless sensor networks. IEEE Access 2021, 9, 10737–10750. [Google Scholar] [CrossRef]
  13. Chaitra, H.; Manjula, G.; Shabaz, M.; Martinez-Valencia, A.B.; Vikhyath, K.B.; Verma, S.; Arias-Gonzáles, J.L. Delay optimization and energy balancing algorithm for improving network lifetime in fixed wireless sensor networks. Phys. Commun. 2023, 58, 102038. [Google Scholar]
  14. Devi, V.; Ravi, T.; Priya, S. Cluster based data aggregation scheme for latency and packet loss reduction in WSN. Comput. Commun. 2020, 149, 36–43. [Google Scholar] [CrossRef]
  15. Yates, R.D.; Sun, Y.; Brown, D.R.; Kaul, S.K.; Modiano, E.; Ulukus, S. Age of information: An introduction and survey. IEEE J. Sel. Areas Commun. 2021, 39, 1183–1210. [Google Scholar] [CrossRef]
  16. Liu, C.; Guo, Y.; Li, N.; Song, X. AoI-minimal task assignment and trajectory optimization in multi-UAV-assisted IoT networks. IEEE Internet Things J. 2022, 9, 21777–21791. [Google Scholar] [CrossRef]
  17. Liu, X.; Liu, H.; Zheng, K.; Liu, J.; Taleb, T.; Shiratori, N. AoI-minimal clustering, transmission and trajectory co-design for UAV-assisted WPCNs. IEEE Trans. Veh. Technol. 2024; Early Access. [Google Scholar]
  18. Bi, S.; Zeng, Y.; Zhang, R. Wireless powered communication networks: An overview. IEEE Wirel. Commun. 2016, 23, 10–18. [Google Scholar] [CrossRef]
  19. Wang, Q.; Chen, H.; Li, Y.; Pang, Z.; Vucetic, B. Minimizing age of information for real-time monitoring in resource-constrained industrial IoT networks. In Proceedings of the 2019 IEEE 17th International Conference on Industrial Informatics (INDIN), Helsinki, Finland, 20–25 July 2019; IEEE: Piscataway, NJ, USA, 2019; Volume 1, pp. 1766–1771. [Google Scholar]
  20. Huynh, T.T.; Tran, T.N.; Tran, C.H.; Dinh-Duc, A.V. Delay constraint energy-efficient routing based on Lagrange relaxation in wireless sensor networks. IET Wirel. Sens. Syst. 2017, 7, 138–145. [Google Scholar] [CrossRef]
  21. Fortino, G.; Russo, W.; Savaglio, C.; Shen, W.; Zhou, M. Agent-oriented cooperative smart objects: From IoT system design to implementation. IEEE Trans. Syst. Man, Cybern. Syst. 2017, 48, 1939–1956. [Google Scholar] [CrossRef]
  22. Kant, K.; Jolfaei, A.; Moessner, K. IoT systems for extreme environments. IEEE Internet Things J. 2024, 11, 3671–3675. [Google Scholar] [CrossRef]
  23. Garey, M.; Johnson, D. Computers and Intractability: A Guide to NP-Completeness; W. H. Freeman: New York City, NY, USA, 1979. [Google Scholar]
  24. Whitley, D. Genetic algorithm tutorial. Stat. Comput. 1994, 4, 65–85. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.