Skip to main content
Top
Published in: EURASIP Journal on Wireless Communications and Networking 1/2010

Open Access 01-12-2010 | Research Article

Perimeter Coverage Scheduling in Wireless Sensor Networks Using Sensors with a Single Continuous Cover Range

Authors: Ka-Shun Hung, King-Shan Lui

Published in: EURASIP Journal on Wireless Communications and Networking | Issue 1/2010

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In target monitoring problem, it is generally assumed that the whole target object can be monitored by a single sensor if the target falls within its sensing range. Unfortunately, this assumption becomes invalid when the target object is very large that a sensor can only monitor part of it. In this paper, we study the perimeter coverage problem where the perimeter of a big object needs to be monitored, but each sensor can only cover a single continuous portion of the perimeter. We describe how to schedule the sensors so as to maximize the network lifetime in this problem. We formally prove that the perimeter coverage scheduling problem is NP-hard in general. However, polynomial time solution exists in some special cases. We further identify the sufficient conditions for a scheduling algorithm to be a 2-approximation solution to the general problem, and propose a simple distributed 2-approximation solution with a small message overhead.

1. Introduction

Wireless sensor networks have caught lots of attention in recent years. One of the major problems is the coverage problem. Traditionally, coverage problems concern whether a certain target area or a certain target object can be fully monitored by the sensors collaboratively. Instead of considering whether a certain area or a certain target object is completely covered, we focus on a specific coverage problem called the perimeter coverage problem. In this problem, we want to monitor the perimeter of a big target but each sensor can only monitor part of the perimeter. One typical application scenario is to monitor the coastline of a large lake so as to ensure that no people can go through its perimeter intentionally or accidentally. Another application scenario is to monitor the wall of a prison so as to ensure that no criminal can escape easily by digging holes through the wall. Therefore, perimeter monitoring is an important problem.
In [14], we studied how to identify a set of sensors to cover the perimeter of a large object with the minimum size and minimum cost. Since sensors are battery-powered and the battery is unlikely to be rechargeable, every sensor network has a functional network lifetime. In this work, we are particularly interested in how to schedule the sensors so as to maximize the network lifetime in the perimeter coverage problem. To the best of our knowledge, the lifetime maximization issue in the perimeter coverage problem was first studied in [5]. In [5], we adopted several heuristic energy-related scheduling objectives as cost metrics. Different sets of sensors are identified using these objectives to monitor the target at different times. The energy-related objectives include the minimization of energy of each sensor set found, the minimization of the battery cost which is defined as the reciprocal of the remaining battery capacity of the sensor, the hybrid algorithm, and so forth. The heuristic scheduling algorithms developed based on the adoption of different energy-related objectives are then compared through extensive simulations.
Unlike that of [5], in this paper, we study the problem from the theoretical perspective and make the following contributions: (1) We formally prove that the perimeter coverage problem is NP-hard in general, but polynomial time solution exists in some special cases. (2) We identify the sufficient conditions for a perimeter coverage scheduling algorithm to be a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq1_HTML.gif -approximation solution. (3) We develop a distributed scheduling algorithm that generates https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq2_HTML.gif (size of the minimum cover) number of messages. The schedules generated must have a lifetime that is at least half of the optimal one. (4) We simulate the proposed algorithm and compare it with the optimal schedules.
The paper is organized as follows. Section 2 discusses the related work on the other coverage problems. Section 3 describes the notations, problem statement, and the properties of the problem. Section 4 studies the special cases in which polynomial time optimal solutions exist. A formal proof of NP-hardness of this problem in general is given in Section 5. The sufficient condition for a perimeter coverage scheduling algorithm to be a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq3_HTML.gif -approximation solution is discussed in Section 6. Our proposed distributed https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq4_HTML.gif -approximation solution which requires https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq5_HTML.gif (size of the minimum cover) number of messages is also described. Section 7 presents the simulation results of our proposed algorithm by comparing it with the optimal schedules. Finally, we conclude our work with some of the future directions in Section 8.
Extensive research has been carried out to extend the lifetime of sensor networks [68]. In this study, network lifetime is defined as the length of the time period that the target area or target objects are being covered continuously. One way to extend network lifetime is to schedule the sensor nodes' activities to alternate between active and sleep modes so that only a minimal number of sensors are turned on at any time [9]. Tian and Georganas [10] propose a distributed scheduling algorithm which turns off the sensors with a cover area completely replaceable by the cover areas of their neighboring nodes. Yan et al. [11] adopt a similar concept. However, instead of considering whether the sensing area of a sensor is covered by its neighbors, the sensor considers a certain number of grid points inside the area. Later, Hsin and Liu [12] propose a randomized algorithm and a coordinated algorithm so as to schedule the sleeping times of the nodes. In the randomized algorithm, a sensor will sleep with a certain probability. In the coordinated algorithm, a sensor will sleep only when its sensing area is completely covered by others. On the other hand, Huang and Tseng [13] study the criteria for determining whether the sensing area of a sensor is covered by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq6_HTML.gif different sensors simultaneously. Huang et al. [14] propose several decentralized energy-conserving and coverage-preserving protocols so as to solve the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq7_HTML.gif area coverage problem. Other than those suggested above which aim at full area coverage, the fractional coverage problem, in which only a certain fraction of the target area has to be covered, has also been considered in [15]. In [15], Ye et al. first calculate the ideal density for providing a certain fraction of coverage. Then, each sensor is activated with a probability. This probability is determined based on the ratio between the current density and the ideal density calculated. On the contrary, Wang and Kulkarni [16] investigate similar problem in another direction, and they show that sacrificing a certain fraction of the target area can significantly increase the network lifetime. Ren et al. [17] study the relationship between the fraction of coverage and the quality of the object detection capability. As a result, the network can be deployed with a fraction of coverage that can achieve an acceptable quality.
Cardei et al. [18] study the target coverage problem where a target object has to be monitored by at least one sensor at any moment and each sensor can monitor multiple target objects if the objects fall within the sensor's sensing area. They formulate this target coverage problem as a set coverage problem, and propose both centralized approximation and distributed heuristic solutions. In [19], Liu et al. study similar problem. However, they assume that each sensor can only monitor one target object at any moment even if multiple targets fall within the sensing area of a sensor. Unfortunately, the cover formed by using these approaches may not be connected as some nodes in the cover may not have any route back to the sink node. Therefore, Zhao and Gurusamy [20] further investigate the connected target coverage problem. They prove that this problem is NP-complete, and develop a centralized approximation solution and a distributed heuristic solution. Thai et al. [21] propose an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq8_HTML.gif -approximation distributed algorithm to solve the target coverage problem, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq9_HTML.gif denotes the number of sensors in the network. They organize the sensors into nondisjoint cover sets in which each set can cover all the target objects with high probability. They formally show that their solution is an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq10_HTML.gif approximation solution if the initial battery capacity of all the sensors is the same, but the approximation ratio is worsen if the initial battery capacity of the sensors is different. On the other hand, Calines and Ellis [22] suggest an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq11_HTML.gif -approximation algorithm. Their solution achieves the same approximation ratio no matter the initial battery capacity of all the sensors is the same or not. Unfortunately, these algorithms cannot guarantee that all the targets are covered all the time.
Another related problem is the barrier coverage problem. In [23], Kumar et al. consider the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq12_HTML.gif barrier coverage problem. They assume that an intruder can be detected by a sensor if it falls within its sensing area. They consider the scenario in which an intruder will be detected by at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq13_HTML.gif sensors if she goes through a thin strip of area (known as belt) no matter where her start point and her end point are. In [23], Kumar et al. propose a polynomial time mechanism to determine whether there exists https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq14_HTML.gif barrier coverage. On the other hand, Kumar et al. [24] study the optimal sleeping schedule on the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq15_HTML.gif barrier coverage problem. They transform the problem to a maximum flow problem so that it can be solved optimally in a centralized manner. Chen et al. further propose a localized algorithm in [25]. They first study the critical conditions for the existence of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq16_HTML.gif barrier coverage locally. The sensor can then turn into sleep mode when it determines that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq17_HTML.gif barrier coverage can be provided by its neighbors. Chen et al. further study how to find and measure the quality of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq18_HTML.gif barrier coverage accurately in [26]. Later, Liu et al. [27] discover that it may not be possible to guarantee https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq19_HTML.gif barrier coverage by using the approach in [25] under some special situations. They identify the critical conditions for the existence of a strong barrier coverage and devise an efficient technique to guarantee https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq20_HTML.gif coverage. Other than that, Saipulla et al. [28] study the barrier coverage problem where the sensors are dropped from air. They suggest that the sensors are deployed along a line with a certain offset by using this deployment strategy. They show that the performance achievable by using this method is much better than that of using the random deployment strategy which is generally assumed in most of the literatures.

3. Notations, Problem Statement, and Properties

We assume that the object is a very big one and we want the whole perimeter to be monitored continuously. Each sensor has a certain sensing range. It can monitor a point such that the distance between the point and the sensor is less than or equal to the sensing range. The area that the sensor can monitor, called sensing area, is a circle. The object that falls within the sensing area of a sensor is said to be monitored by the sensor. It is assumed that each sensor can only monitor a single continuous portion of the perimeter, and no sensor can monitor the whole perimeter as shown in Figure 1. Sensors are randomly distributed around the big object. The set of sensors that can cover a portion of the target object is denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq21_HTML.gif . Also, we use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq22_HTML.gif to denote the number of sensors in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq23_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq24_HTML.gif .

3.1. Cover Range, Proper Set of Sensors, and General Set of Sensors

Cover range is defined as the portion of the perimeter of the target object covered by the sensing area of a sensor node. In this paper, we represent the cover range in terms of angular measurement for the ease of discussion. It is worth noting that the perimeter of the target object can be in any irregular shape as long as it forms a loop, a sensor only has a single continuous cover range, and the sensor can determine its cover range. Note that under some extreme conditions, the assumption that each sensor only has a single continuous cover range may not be valid, such as, the target object contains a sharp convex or concave shape on the perimeter. In this case, the sensor has multiple cover ranges instead [29]. This makes the problem a lot more complicated, and we leave it as future work. On the other hand, how a sensor determines the range is application dependent, and is outside the scope of this paper. Interested readers are referred to [3032].
We denote the cover range of a sensor node https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq25_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq26_HTML.gif as shown in Figure 1. We refer to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq27_HTML.gif as the start angle and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq28_HTML.gif as the end angle. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq29_HTML.gif for most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq30_HTML.gif . Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq31_HTML.gif that covers https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq32_HTML.gif would have https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq33_HTML.gif . We denote the set of sensors that cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq34_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq35_HTML.gif .
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq36_HTML.gif is a proper set of sensors if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq37_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq38_HTML.gif , such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq39_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq40_HTML.gif . In other words, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq41_HTML.gif is a proper set of sensors if none of the sensors has cover range containing or contained inside another sensor. Otherwise, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq42_HTML.gif is known as a general set of sensors. As an example, the set of sensors shown in Figure 4 is a proper set of sensors. On the other hand, the set of sensors shown in Figure 2 is a general set of sensors.

3.2. Cover, Proper Cover, and Mutually Disjoint Cover Set

A set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq43_HTML.gif is a cover if for each angle https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq44_HTML.gif , there exists a sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq45_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq46_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq47_HTML.gif . In other words, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq48_HTML.gif . Figure 2 illustrates a scenario of 9 sensors surrounding a target object. Each arrow represents the cover range of a node. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq49_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq50_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq51_HTML.gif are all covers.
A proper cover is a cover that every sensor is essential for the coverage. That is, if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq52_HTML.gif is a proper cover, then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq53_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq54_HTML.gif is not a cover for any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq55_HTML.gif . For instance, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq56_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq57_HTML.gif are proper covers in Figure 2.
Suppose https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq58_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq59_HTML.gif are two covers. We say https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq60_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq61_HTML.gif are mutually disjoint if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq62_HTML.gif . A set of covers Ϝ is a mutually disjoint cover set if any arbitrary pair of covers inside https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq63_HTML.gif are mutually disjoint. Formally, for any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq64_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq65_HTML.gif . Refering to Figure 4, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq66_HTML.gif can be https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq67_HTML.gif .

3.3. Sensor Lifetime—Uniform and Nonuniform, Schedule, Network Lifetime, and Problem Statement

We adopt the cycle-based scheduling mechanism as in [33, 34]. In other words, a cover is selected to monitor the target object in each cycle, and the duration of each cycle is the same. The sensor lifetime of a sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq68_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq69_HTML.gif , is the number of cycles it can be turned on. If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq70_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq71_HTML.gif , we say that the sensors have uniform battery. Otherwise, they have nonuniform battery.
In each cycle, a set of sensors is turned on to monitor the target. Those sensors that are not in the set can switch to sleep mode to conserve energy. A schedule defines the cycles in which a sensor has to be turned on or off. We use a matrix https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq72_HTML.gif of size https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq73_HTML.gif to represent the schedule. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq74_HTML.gif means Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq75_HTML.gif should be turned on at cycle https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq76_HTML.gif ; https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq77_HTML.gif otherwise. With the definition of the schedule, network lifetime https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq78_HTML.gif refers to the number of cycles that the perimeter of the target can be monitored continuously according to the schedule https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq79_HTML.gif . Note that different schedules will result in different network lifetimes. An optimal scheduling algorithm finds a schedule https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq80_HTML.gif such that the maximum network lifetime https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq81_HTML.gif on a set of sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq82_HTML.gif can be achieved. In other words, no scheduling algorithm can find a schedule https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq83_HTML.gif which can achieve a network lifetime https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq84_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq85_HTML.gif .
Therefore, the objective of the scheduling problem is to find a schedule https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq86_HTML.gif to monitor the target object continuously so that the lifetime https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq87_HTML.gif is maximized. Formally, we would like to find an https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq88_HTML.gif which maximizes https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq89_HTML.gif , such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq90_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq91_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq92_HTML.gif .

3.4. Neighbors, Backward Neighbors, and Forward Neighbors

If two nodes' cover ranges overlap, they are neighbors. Formally, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq93_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq94_HTML.gif are neighbors if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq95_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq96_HTML.gif (This applies when both https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq97_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq98_HTML.gif do not cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq99_HTML.gif . The definition can be extended easily to ranges that cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq100_HTML.gif but we leave it out for the ease of discussion.). We assume that a node can only communicate with its neighbors. It is possible that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq101_HTML.gif completely contains https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq102_HTML.gif , such as Sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq103_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq104_HTML.gif in Figure 2. When two sensors have overlapping cover ranges and none of them is contained in the other, one of them is a backward neighbor and the other is a forward neighbor. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq105_HTML.gif is a backward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq106_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq107_HTML.gif is a forward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq108_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq109_HTML.gif . Refer to Figure 2, Sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq110_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq111_HTML.gif are forward neighbors of Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq112_HTML.gif , while Sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq113_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq114_HTML.gif are backward neighbors of Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq115_HTML.gif .

3.5. Perimeter Segment and Properties of the Problem

An endpoint can be any start angle https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq116_HTML.gif or end angle https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq117_HTML.gif of any sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq118_HTML.gif . Suppose all the endpoints are distinct, there are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq119_HTML.gif endpoints formed by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq120_HTML.gif sensors in the network. We denote each endpoint as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq121_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq122_HTML.gif in ascending order. Figure 3 illustrates the endpoints of the sensors in Figure 2. The perimeter segment is the portion of the perimeter of the target object formed by a pair of consecutive endpoints https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq123_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq124_HTML.gif . When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq125_HTML.gif , the perimeter segment is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq126_HTML.gif . We denote https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq127_HTML.gif as the segment https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq128_HTML.gif as shown in Figure 3. Now, we use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq129_HTML.gif to denote the set of all perimeter segments formed by consecutive endpoints, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq130_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq131_HTML.gif , if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq132_HTML.gif covers https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq133_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq134_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq135_HTML.gif is a cover. Similarly, if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq136_HTML.gif is a cover, it covers all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq137_HTML.gif .
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq139_HTML.gif covers all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq140_HTML.gif if and only if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq141_HTML.gif covers [ https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq142_HTML.gif ), an upper bound of the lifetime of covering https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq143_HTML.gif can be derived. To start the discussion, we further define some terms as follows and we use the example in Figure 3 to explain them. For the ease of discussion, we use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq144_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq145_HTML.gif in the examples.
(i)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq146_HTML.gif denotes the set of sensors in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq147_HTML.gif which cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq148_HTML.gif . Formally, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq149_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq150_HTML.gif covers https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq151_HTML.gif . For instance, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq152_HTML.gif . We further let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq153_HTML.gif denote https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq154_HTML.gif . For instance, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq155_HTML.gif .
 
(ii)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq156_HTML.gif denotes the total number of energy cycles of the sensors in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq157_HTML.gif . Formally, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq158_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq159_HTML.gif . For instance, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq160_HTML.gif since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq161_HTML.gif + https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq162_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq163_HTML.gif .
 
(iii)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq164_HTML.gif denotes the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq165_HTML.gif with the minimum https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq166_HTML.gif . Formally, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq167_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq168_HTML.gif , for example, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq169_HTML.gif .
 
(iv)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq170_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq171_HTML.gif covers https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq172_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq173_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq174_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq175_HTML.gif = https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq176_HTML.gif . For instance, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq177_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq178_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq179_HTML.gif .
 
We now prove that the maximum achievable lifetime of sensor set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq180_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq181_HTML.gif ) is upper bounded by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq182_HTML.gif .
Property 1.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq183_HTML.gif .
Proof.
Suppose https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq184_HTML.gif . In each cycle, at least one sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq185_HTML.gif is selected to cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq186_HTML.gif . Since each sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq187_HTML.gif can be activated at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq188_HTML.gif units of time, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq189_HTML.gif is at most covered https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq190_HTML.gif units of time. Afterwards, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq191_HTML.gif cannot be covered by any sensor. Therefore, this leads to the contradiction that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq192_HTML.gif .
When all the sensors have the same initial battery https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq193_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq194_HTML.gif . Therefore, in the uniform battery case, Property 1 can naturally be extended to Property 2.
Property 2.
If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq195_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq196_HTML.gif .

4. Proper Set of Sensors

In this section, we describe how to find a schedule when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq197_HTML.gif is a proper sensor set, such that there is no sensor whose cover range is contained inside another sensor. We consider two scenarios: uniform battery scenario and nonuniform battery scenario. In the following, we drop the superscript https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq198_HTML.gif in notations for simplicity if the context is clear.

4.1. Uniform Battery Scenario

In this scenario, by Property 2, the maximum lifetime https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq199_HTML.gif . Hence, if there exists a mutually disjoint cover set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq200_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq201_HTML.gif , an optimal schedule can be found by activating each cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq202_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq203_HTML.gif cycles. We consider two cases: (1) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq204_HTML.gif ; (2) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq205_HTML.gif .
(1) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq206_HTML.gif : in this case, we can find a mutually disjoint cover set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq207_HTML.gif with exactly https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq208_HTML.gif covers and each cover has exactly https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq209_HTML.gif number of sensors. To find these covers, we first label the nodes in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq210_HTML.gif in the clockwise manner where the most anti-clockwise sensor in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq211_HTML.gif is labeled as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq212_HTML.gif . In Figure 4, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq213_HTML.gif and so https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq214_HTML.gif is Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq215_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq216_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq217_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq218_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq219_HTML.gif be subsets of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq220_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq221_HTML.gif . On the other hand, a collection of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq222_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq223_HTML.gif , is denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq224_HTML.gif . Refering to Figure 4, a mutually disjoint cover set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq225_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq226_HTML.gif covers is formed. We show that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq227_HTML.gif is a mutually disjoint cover set with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq228_HTML.gif covers by the following property and lemma.
Property 3.
If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq229_HTML.gif is proper, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq230_HTML.gif is a backward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq231_HTML.gif .
Proof.
Let the start angle and end angle of sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq232_HTML.gif be https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq233_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq234_HTML.gif , respectively. Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq235_HTML.gif . Suppose https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq236_HTML.gif is not the backward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq237_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq238_HTML.gif . This implies that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq239_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq240_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq241_HTML.gif do not overlap in terms of sensing range. Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq242_HTML.gif is covered by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq243_HTML.gif sensors, we know that the range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq244_HTML.gif (which may be a union of several perimeter segments) must be covered by at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq245_HTML.gif sensors. In this case, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq246_HTML.gif is covered by Sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq247_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq248_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq249_HTML.gif . It implies that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq250_HTML.gif is only covered by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq251_HTML.gif sensors. This contradicts to the definition of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq252_HTML.gif . Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq253_HTML.gif is a backward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq254_HTML.gif .
Lemma 1.
If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq255_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq256_HTML.gif forms a mutually disjoint cover set with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq257_HTML.gif covers.
Proof.
By Property 3, we know that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq258_HTML.gif is the backward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq259_HTML.gif . Similarly, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq260_HTML.gif is the backward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq261_HTML.gif , and so on. Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq262_HTML.gif is divisible by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq263_HTML.gif , for each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq264_HTML.gif , the last member is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq265_HTML.gif . By Property 3, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq266_HTML.gif is the backward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq267_HTML.gif . This implies that every https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq268_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq269_HTML.gif , forms a cover. As a result, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq270_HTML.gif covers are formed. On the other hand, a sensor in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq271_HTML.gif falls into exactly one of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq272_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq273_HTML.gif . Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq274_HTML.gif forms a mutually disjoint cover set with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq275_HTML.gif covers.
The direct consequence of Lemma 1 is that the maximum lifetime schedule can be achieved by activating each cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq276_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq277_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq278_HTML.gif units of time and the corresponding lifetime is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq279_HTML.gif .
(2) https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq280_HTML.gif : in this case, Lemma 1 cannot be directly applied to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq281_HTML.gif . Refering to Figure 5, if we set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq282_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq283_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq284_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq285_HTML.gif . However, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq286_HTML.gif is not a cover. To solve the problem, one possible way is to split https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq287_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq288_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq289_HTML.gif sensors and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq290_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq291_HTML.gif sensors such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq292_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq293_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq294_HTML.gif . Then, Lemma 1 can be applied to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq295_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq296_HTML.gif individually to form two corresponding mutually disjoint cover sets, denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq297_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq298_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq299_HTML.gif covers and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq300_HTML.gif covers, respectively. Refering back to Figure 5, two mutually disjoint cover sets with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq301_HTML.gif covers in total do exist. Suppose the broken arcs are sensors in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq302_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq303_HTML.gif . On the other hand, solid arcs are sensors in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq304_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq305_HTML.gif . In this case, we set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq306_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq307_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq308_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq309_HTML.gif . Hence, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq310_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq311_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq312_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq313_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq314_HTML.gif . Finally, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq315_HTML.gif forms a mutually disjoint cover set with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq316_HTML.gif covers in total.
However, let us consider Figure 6. In this example, the maximum network lifetime is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq318_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq319_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq320_HTML.gif units. This can be achieved by activating the sets https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq321_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq322_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq323_HTML.gif , each for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq324_HTML.gif time unit. In this example, although we know that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq325_HTML.gif , there is no way for us to find https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq326_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq327_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq328_HTML.gif . Instead, we can only identify a single mutually disjoint cover set that contains one cover. By activating this only cover, the achievable network lifetime is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq329_HTML.gif units. Hence, we can conclude that when we cannot find a mutually disjoint cover set with exactly https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq330_HTML.gif covers using the sensor partitioning method, we cannot be sure we have an optimal solution. This implies that even if we can find a mutually disjoint cover set with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq331_HTML.gif covers, the set found may not be an optimal solution as shown in the example in Figure 6. The sensor partitioning problem aforementioned can be transformed to a shortest path problem and solved with the time complexity of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq332_HTML.gif . We refer readers for details in [35, 36].

4.2. Nonuniform Battery Scenario

In the nonuniform battery scenario, it is possible to transform https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq334_HTML.gif into a sensor set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq335_HTML.gif such that all sensors have the same initial battery. For every https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq336_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq337_HTML.gif units of battery and with the cover range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq338_HTML.gif , we put https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq339_HTML.gif sensors in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq340_HTML.gif , each with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq341_HTML.gif unit of battery and cover range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq342_HTML.gif . Then, the maximum achievable lifetime on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq343_HTML.gif is the same as the maximum achievable lifetime on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq344_HTML.gif . However, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq345_HTML.gif is no longer a proper set since all the sensors we put in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq346_HTML.gif based on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq347_HTML.gif share the same cover range. Figure 7 illustrates an example of the transformation with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq348_HTML.gif . The next section studies how to find a schedule when the sensor set is not proper.

5. General Set of Sensors

In this section, we would like to prove that the perimeter coverage scheduling problem is NP-hard if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq351_HTML.gif is a general set of sensors. We first consider the situation where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq352_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq353_HTML.gif . To prove the perimeter coverage scheduling problem is NP-hard, a reduction is constructed from the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq354_HTML.gif -coloring problem on a circular-arc graph, which was first shown to be NP-hard in [37], to the perimeter coverage scheduling problem. Here, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq355_HTML.gif denotes a perimeter scheduling problem instance with a set of sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq356_HTML.gif , and the maximum lifetime achievable on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq357_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq358_HTML.gif .
Before we go into details about the transformation, we first describe the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq359_HTML.gif -coloring problem on a circular arc graph https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq360_HTML.gif . A circular arc https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq361_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq362_HTML.gif is denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq363_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq364_HTML.gif denotes the anti-clockwise endpoint, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq365_HTML.gif denotes the clockwise endpoint of a circular arc. In other words, a circular arc is open on the clockwise endpoint. We further assume that all the endpoints are distinct. Arcs https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq366_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq367_HTML.gif are neighbors if the arcs overlap. In the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq368_HTML.gif -coloring problem, we would like to determine whether https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq369_HTML.gif colors are enough to assign a color to each arc such that no two neighbor arcs share the same color.
We further introduce some notations so as to define the problem formally. Here, we use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq370_HTML.gif to denote the number of circular arcs in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq371_HTML.gif . Therefore, there are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq372_HTML.gif endpoints in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq373_HTML.gif . We sort the endpoints in ascending order, and denote them as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq374_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq375_HTML.gif . A pair of consecutive endpoints https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq376_HTML.gif are denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq377_HTML.gif . We use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq378_HTML.gif to denote the set of arcs covering https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq379_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq380_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq381_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq382_HTML.gif denote the set of circular arcs with Color https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq383_HTML.gif . Since the sensors in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq384_HTML.gif are neighbors of each other, at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq385_HTML.gif colors are needed.
Given any instance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq386_HTML.gif of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq387_HTML.gif -coloring problem in the circular arc graph, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq388_HTML.gif is an integer larger than or equal to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq389_HTML.gif , an instance https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq390_HTML.gif of the perimeter coverage scheduling problem can be constructed from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq391_HTML.gif as follows.
(1)For
each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq392_HTML.gif , put Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq393_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq394_HTML.gif and the cover range of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq395_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq396_HTML.gif .
 
(2)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq397_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq398_HTML.gif sensors with cover range of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq399_HTML.gif are put in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq400_HTML.gif . These sensors are named with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq401_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq402_HTML.gif .
 
(3)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq403_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq404_HTML.gif .
 
Consider Arcs https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq405_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq406_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq407_HTML.gif in Figure 8; Sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq408_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq409_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq410_HTML.gif are put into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq411_HTML.gif according to (1) in Figure 9. Suppose https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq412_HTML.gif = 3. Consider the range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq413_HTML.gif ; according to (2), Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq414_HTML.gif is put in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq415_HTML.gif . Similarly, Sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq416_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq417_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq418_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq419_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq420_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq421_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq422_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq423_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq424_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq425_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq426_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq427_HTML.gif are put into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq428_HTML.gif as shown in Figure 9. As a result, we know that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq429_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq430_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq431_HTML.gif . Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq432_HTML.gif .
Lemma 2.
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq436_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq437_HTML.gif -colorable if and only if the maximum lifetime on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq438_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq439_HTML.gif .
Proof.
"" part: if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq440_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq441_HTML.gif -colorable, we can put the arcs into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq442_HTML.gif different partitions https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq443_HTML.gif according to their colors. We show that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq444_HTML.gif covers https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq445_HTML.gif can be formed in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq446_HTML.gif by using the following approach:
(1)
if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq447_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq448_HTML.gif .
 
(2)
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq449_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq450_HTML.gif , if there is no sensor in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq451_HTML.gif which can cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq452_HTML.gif , then we can randomly select a sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq453_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq454_HTML.gif , with cover range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq455_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq456_HTML.gif to cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq457_HTML.gif . Recall that there are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq458_HTML.gif arcs in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq459_HTML.gif covering https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq460_HTML.gif and these arcs must fall into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq461_HTML.gif different colors, that is, different partitions. Since we have constructed https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq462_HTML.gif sensors with cover range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq463_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq464_HTML.gif , if there is no sensor in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq465_HTML.gif which can cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq466_HTML.gif , then we can always find a sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq467_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq468_HTML.gif , with cover range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq469_HTML.gif to put into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq470_HTML.gif .
 
The corresponding https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq471_HTML.gif formed, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq472_HTML.gif , are covers, because https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq473_HTML.gif ; there is a sensor in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq474_HTML.gif covering https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq475_HTML.gif . At the same time, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq476_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq477_HTML.gif . Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq478_HTML.gif , for any https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq479_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq480_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq481_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq482_HTML.gif , by Property 2, the maximum lifetime https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq483_HTML.gif is upper bounded by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq484_HTML.gif . Hence, the maximum lifetime https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq485_HTML.gif can be achieved by activating each cover for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq486_HTML.gif unit of time. This results in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq487_HTML.gif . Therefore, if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq488_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq489_HTML.gif -colorable, then the maximum lifetime on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq490_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq491_HTML.gif .
" https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq492_HTML.gif " part: If the maximum lifetime https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq493_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq494_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq495_HTML.gif and the corresponding schedule is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq496_HTML.gif , then there must exist a mutually disjoint cover set with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq497_HTML.gif covers since each sensor has a battery lifetime of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq498_HTML.gif unit. Without loss of generality, these https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq499_HTML.gif covers are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq500_HTML.gif . In other words, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq501_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq502_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq503_HTML.gif .
Hence, with the existence of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq504_HTML.gif covers, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq505_HTML.gif partitions https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq506_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq507_HTML.gif can be formed by the following approach:
https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq509_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq510_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq511_HTML.gif . Note that we do not need to consider the sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq512_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq513_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq514_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq515_HTML.gif .
Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq516_HTML.gif is constructed in such a way that every https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq517_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq518_HTML.gif , is exactly covered by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq519_HTML.gif sensors, if there exist https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq520_HTML.gif covers, then every https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq521_HTML.gif is exactly covered by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq522_HTML.gif sensor in each cover. Therefore, by constructing https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq523_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq524_HTML.gif , according to the above description, neighbor arcs must fall into different color partitions. As a result, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq525_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq526_HTML.gif , forms a color partition and so https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq527_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq528_HTML.gif -colorable if the maximum lifetime on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq529_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq530_HTML.gif .
By Lemma 2, Theorem 1 can then be developed.
Theorem 1.
The perimeter coverage scheduling problem is NP-hard.

6. Approximation Solutions

Since the perimeter coverage problem is NP-hard, it is not likely to have a polynomial time solution. The problem can be formulated as a mixed integer programming problem, and solved by some existing software. However, a centralized approach is not appropriate. Therefore, we develop a distributed approximation solution with a small overhead. Before describing our algorithm, we first show that any scheduling algorithm that selects a proper cover in each cycle is a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq531_HTML.gif -approximation algorithm.

6.1. Properties of Proper Covers

Property 4.
In a proper cover, there are at most two sensors covering https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq532_HTML.gif for each https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq533_HTML.gif .
Proof.
Suppose https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq534_HTML.gif all cover range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq535_HTML.gif , and the cover ranges of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq536_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq537_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq538_HTML.gif are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq539_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq540_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq541_HTML.gif , respectively. Without loss of generality, we assume https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq542_HTML.gif . In this case, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq543_HTML.gif . This contradicts to the definition of proper cover as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq544_HTML.gif is redundant.
Property 4 says that each portion on the perimeter is at most covered by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq545_HTML.gif sensors in a proper cover. Lemma 3 shows that any scheduling algorithm which selects a proper cover to monitor the target object in each cycle is a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq546_HTML.gif -approximation solution.
Lemma 3.
Suppose https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq547_HTML.gif is the schedule which selects a proper cover in each cycle. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq548_HTML.gif has a lifetime https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq549_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq550_HTML.gif is the maximum lifetime on https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq551_HTML.gif .
Proof.
We use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq552_HTML.gif to denote the remaining energy of Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq553_HTML.gif after cycle https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq554_HTML.gif . At the beginning, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq555_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq556_HTML.gif . We further use the term https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq557_HTML.gif to denote https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq558_HTML.gif covers https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq559_HTML.gif . That is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq560_HTML.gif covers https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq561_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq562_HTML.gif . By Property 4, at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq563_HTML.gif sensors cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq564_HTML.gif in cycle https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq565_HTML.gif . In fact, this implies that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq566_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq567_HTML.gif sensors are required to cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq568_HTML.gif in each cycle https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq569_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq570_HTML.gif . Note that this is the worst possible case for the selection of a proper cover in each cycle as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq571_HTML.gif is covered by sensors with the least total amount of energy cycle. Here, we assume https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq572_HTML.gif . Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq573_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq574_HTML.gif is even and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq575_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq576_HTML.gif is odd. In case https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq577_HTML.gif is odd, all the sensors can be activated in the last unit of time. This is possible as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq578_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq579_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq580_HTML.gif .
All the heuristic algorithms we proposed in [5] identify a proper cover in each cycle. By Lemma 3, we know that all of them are 2-approximation solutions if no message transmission cost is considered. Unfortunately, these approaches have very high message overheads. It may require https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq581_HTML.gif minimum size of cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq582_HTML.gif size of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq583_HTML.gif number of messages during the whole network lifetime, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq584_HTML.gif denotes the set of sensors with cover range passing through https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq585_HTML.gif .

6.2. Our Proposed 2-Approximation Algorithm

To reduce message overhead, our approximation algorithm identifies as many proper covers as possible by circulating messages around the sensors once. This can be done by using a similar method suggested in [3], which will be discussed later in this section. In the uniform battery case, we try to find a mutually disjoint cover set with as many proper covers as possible. Then, each proper cover can be activated for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq586_HTML.gif units of time. On the other hand, in the nonuniform battery scenario, each sensor with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq587_HTML.gif units of battery is transformed to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq588_HTML.gif sensors with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq589_HTML.gif unit each similar to that discussed in Section 4.2, and thus the battery of the transformed set of sensors becomes uniform. Then, we try to find a mutually disjoint cover set with as many proper covers as possible and each cover is activated for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq590_HTML.gif unit of time.
Note that although the uniform battery case is discussed here, the suggested algorithm can be extended to the nonuniform battery case easily. Basically, our proposed algorithm works as follows. A message is passed around the sensors in the clockwise direction. A sensor passing through https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq591_HTML.gif creates the message. The message contains information for constructing mutually disjoint covers. When a sensor receives the message, it is responsible for filling in the information and passes it to a neighbor sensor. When the message is received by another sensor passing through https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq592_HTML.gif , mutually disjoint covers are identified.
Suppose https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq593_HTML.gif denotes the set of sensors with cover range passing through https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq594_HTML.gif . The sensor with the largest ending angle in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq595_HTML.gif , denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq596_HTML.gif , initiates the algorithm. It first puts its neighbors which are in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq597_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq598_HTML.gif different sets. Then, for each set, it identifies some remaining neighbors to be put in the set, such that the sensors in the set can cover the range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq599_HTML.gif . The detailed procedure is as follows: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq600_HTML.gif keeps track of a sorted order of the sets based on the ending angles of the cover ranges in the sensors of the sets. It takes the set with the smallest ending angle, and identifies a sensor that can extend its cover range. After putting the sensor in the set, the ending angle is updated. The process ends when there is no more sensor to extend the cover range of the set. It is possible that not all the sets can cover the whole range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq601_HTML.gif after all the neighbors of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq602_HTML.gif are put in the sets. In this case, these sets are removed and would not be put in the message. We argue that the removal of these sets will not affect the approximation ratio of the algorithm. Suppose no neighbor can extend the cover range of a set without a gap. Since this is the set with the smallest ending angle among all the sets and there are at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq603_HTML.gif sensors covering the gap, this implies that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq604_HTML.gif sensors that can cover the gap must fall into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq605_HTML.gif different sets. Therefore, there are still https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq606_HTML.gif different sets remaining even the aforementioned one is removed.
Refering to Figure 10, Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq607_HTML.gif is the sensor in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq608_HTML.gif with the largest end angle, so https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq609_HTML.gif is Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq610_HTML.gif . Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq611_HTML.gif puts Sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq612_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq613_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq614_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq615_HTML.gif different sets, denoted as Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq616_HTML.gif , Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq617_HTML.gif , and Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq618_HTML.gif , respectively. Since Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq619_HTML.gif ends before Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq620_HTML.gif and Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq621_HTML.gif do, Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq622_HTML.gif tries to put a neighbor into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq623_HTML.gif to extend its cover range. Hence, Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq624_HTML.gif is put into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq625_HTML.gif by Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq626_HTML.gif . Now, Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq627_HTML.gif updates the ending angle of each set and finds that Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq628_HTML.gif still ends before the others. Unfortunately, other neighbors of Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq629_HTML.gif cannot be put into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq630_HTML.gif to extend the range of Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq631_HTML.gif . Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq632_HTML.gif will then be removed. At this moment, only Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq633_HTML.gif and Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq634_HTML.gif are remaining. Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq635_HTML.gif puts Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq636_HTML.gif into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq637_HTML.gif , and Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq638_HTML.gif into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq639_HTML.gif . Note that Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq640_HTML.gif is not put in either set because it cannot extend the cover ranges of both sets. Now, Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq641_HTML.gif consists of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq642_HTML.gif , while Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq643_HTML.gif consists of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq644_HTML.gif .
After the sets are identified, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq645_HTML.gif puts the information in a message. The message format is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq646_HTML.gif , where each tuple https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq647_HTML.gif contains the information of one set. The first element represents the identifier of the set. The second element represents the first member in the set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq648_HTML.gif . Note that this member must be a sensor in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq649_HTML.gif and can later be used for determining whether the set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq650_HTML.gif forms a cover or not. Without loss of generality, we assume the tuple in the message is sorted according to the ending angle of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq651_HTML.gif . The third element represents the list of members selected to be included in the set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq652_HTML.gif by the node sending the message. The message is sent to the onlygreedy forward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq653_HTML.gif . The greedy forward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq654_HTML.gif , denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq655_HTML.gif , is the forward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq656_HTML.gif with the largest end angle. Refering back to the example in Figure 10. Since Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq657_HTML.gif selects https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq658_HTML.gif into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq659_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq660_HTML.gif into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq661_HTML.gif , it sends out https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq662_HTML.gif to Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq663_HTML.gif .
When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq664_HTML.gif receives the message, it tries to extend the cover ranges of the sets by putting its neighbors in them. The procedure is similar to what https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq665_HTML.gif did earlier. Refering back to the example in Figure 10, when Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq666_HTML.gif receives https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq667_HTML.gif , it finds that the ending angle of Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq668_HTML.gif is smaller than that of Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq669_HTML.gif . Therefore, it puts Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq670_HTML.gif into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq671_HTML.gif . Then, it further puts Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq672_HTML.gif into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq673_HTML.gif , and then informs its own greedy forward neighbor to continue the set construction.
We let the node with the smallest start angle in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq674_HTML.gif be https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq675_HTML.gif . Since the message has been passed in the clockwise manner, it must be received by one of the backward neighbors of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq676_HTML.gif , say https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq677_HTML.gif . After https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq678_HTML.gif has performed the set construction, it sends the message to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq679_HTML.gif instead of its greedy forward neighbor. After receiving the message, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq680_HTML.gif continues the set construction for those sets which have not yet formed a cover. After considering all the neighbors that can extend the cover range of the sets, if there still exist sets which have not yet formed covers, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq681_HTML.gif reorganizes those sets. To avoid ambiguity, we now use covers to denote those sets which have formed covers. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq682_HTML.gif keeps track of a sorted order of the sets based on the ending angles of the cover ranges in the sensors of the sets. It starts to form a cover from the set with the smallest ending angle. If no neighbors can be identified to form a cover, the sensors in the set with the largest identifier will be used, and the set with the largest identifier will no longer be considered for forming a cover. We argue that there will be at least https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq683_HTML.gif covers formed at the end of the process. As discussed before, when no covers have been formed yet, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq684_HTML.gif sets are remaining. However, the worst case occurs when half of the sets are removed by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq685_HTML.gif so that the sensors can be moved to fill up the gaps to form the covers in the other half. Note that each perimeter segment is covered by at most https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq686_HTML.gif sensors in a proper cover, and so it is not possible to remove more than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq687_HTML.gif sets.
Let us consider the example in Figure 10 again. Since Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq688_HTML.gif selects https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq689_HTML.gif into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq690_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq691_HTML.gif into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq692_HTML.gif , it sends https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq693_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq694_HTML.gif . Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq695_HTML.gif sends https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq696_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq697_HTML.gif . Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq698_HTML.gif further puts Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq699_HTML.gif into Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq700_HTML.gif and then removes Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq701_HTML.gif . Therefore, it sends https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq702_HTML.gif to Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq703_HTML.gif which is the forward neighbor of Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq704_HTML.gif . Now, Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq705_HTML.gif finds that Sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq706_HTML.gif is the backward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq707_HTML.gif . As a result, a cover is formed in Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq708_HTML.gif .
It is worth mentioning that all other sensors which do not involve in the circulation of the message can overhear the message transmission. Therefore, they know the set which they have been selected in. When https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq709_HTML.gif completes the covers formation process, it can construct the activation schedule. Then, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq710_HTML.gif announces the activation schedule of different covers. The message about the activation schedule can be circulated through the whole network in the same manner as the cover identification process. By overhearing this message, all the sensors know their schedules. The whole process can then be terminated when the message circulates back to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq711_HTML.gif again. The pseudocodes of Sensors https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq712_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq713_HTML.gif who receives the cover identification message are provided in Algorithms 1 and 2, respectively.
Algorithm 1: Pseudocode of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq714_HTML.gif receives https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq715_HTML.gif sent by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq716_HTML.gif .
1: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq717_HTML.gif is a set of sensors selected into available set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq718_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq719_HTML.gif . Initially, the last member of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq720_HTML.gif is put into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq721_HTML.gif .
2: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq722_HTML.gif is the last member in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq723_HTML.gif .
3: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq724_HTML.gif is the index of the set which has the smallest ending angle among all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq725_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq726_HTML.gif .
4: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq727_HTML.gif is the next hop target for the message.
5:If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq728_HTML.gif is forward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq729_HTML.gif then
6:   https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq730_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq731_HTML.gif .
7:else
8:  https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq732_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq733_HTML.gif .
9:end if
10: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq734_HTML.gif selects neighbors to extend the cover range of the sets. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq735_HTML.gif
11:for each neighbor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq736_HTML.gif do
12:  If https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq737_HTML.gif cannot extend the cover range of set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq738_HTML.gif then
13:   Remove the Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq739_HTML.gif .
14:  end if
15: if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq740_HTML.gif is the forward neighbor of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq741_HTML.gif then
16:   Put https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq742_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq743_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq744_HTML.gif .
17:  end if
18:  Find the set with the smallest end angle and denote it as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq745_HTML.gif .
19:end for
20: Send the message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq746_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq747_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq748_HTML.gif and set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq749_HTML.gif has not been removed, to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq750_HTML.gif .
Algorithm 2: Pseudocode of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq751_HTML.gif receives message https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq752_HTML.gif .
1: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq753_HTML.gif is a set of sensors which has originally been selected into a set but later removed by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq754_HTML.gif .
2: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq755_HTML.gif is a set of sensors selected into available set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq756_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq757_HTML.gif . Initially, the last member of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq758_HTML.gif is put into https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq759_HTML.gif .
3: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq760_HTML.gif is the last member in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq761_HTML.gif .
4: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq762_HTML.gif is the index of the available set which has the smallest ending angle among all https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq763_HTML.gif and has not yet formed
a cover, where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq764_HTML.gif .
5: https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq765_HTML.gif selects neighbors to extend the cover range of the sets. https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq766_HTML.gif
6: for each set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq767_HTML.gif do
7:  while (set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq768_HTML.gif does not form a cover) do
8:   Select sensors in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq769_HTML.gif which can cover [ https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq770_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq771_HTML.gif ] to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq772_HTML.gif .
9:   if Set https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq773_HTML.gif still does not form a cover then
10:     https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq774_HTML.gif Remove the available set with the highest index number, that is, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq775_HTML.gif
11:    Move sensors in https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq776_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq777_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq778_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq779_HTML.gif .
12:     https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq780_HTML.gif .
13:   end if
14:  end while
15: end for
16: Announce https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq781_HTML.gif , for https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq782_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq783_HTML.gif , together with the activation schedule for each cover.
In fact, we can further optimize the message overheads in terms of the number of messages required by removing the activation schedule circulation process. To do so, we can reorganize the sets when we find that the cover range of a set cannot be extended by putting a neighbor into the set. Here, we always use the sensors in the set with the largest identifier to extend the cover range of a set, and the set with the largest identifier will no longer be considered for forming a cover. By doing so, we know that if https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq784_HTML.gif covers are formed finally, they will have set identifiers https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq785_HTML.gif . Since the sensors can overhear in which set they are selected in, they can activate automatically following the time slot allocated to the cover with a specific set identifier without the need of circulating the activation schedule.

7. Simulation Results

For comparison, we have implemented several algorithms. The first algorithm is the optimal solution found by transforming the maximum lifetime scheduling problem to the Multicommodity Network Flow problem, and solved by AMPL-CPLEX [38], which is denoted as Optimal in our figures. The second algorithm is the one proposed in this paper, which is denoted as Proposed algorithm in the figures. The third algorithm is the one proposed in [5], which is denoted as Round-based algorithm in the figures. In this algorithm, a minimum size cover, known as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq786_HTML.gif , is found to monitor the target object in each monitoring cycle until no more MC can be found. The fourth algorithm is denoted as Single-MC in the figures. In this algorithm, an MC is found and this MC is activated until a sensor is running out of energy. Afterwards, another MC is found and activated again. This process continues until no more MC can be found.
In our simulations, we considered an area of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq787_HTML.gif grids https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq788_HTML.gif grids. Each grid takes up an area of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq789_HTML.gif unit https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq790_HTML.gif and has a certain probability of containing a sensor. A grid that is partially/completely occupied by the target does not have any sensor. This probability is known as thesensor availability probability, and we use https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq791_HTML.gif to denote it. If the grid contains a sensor, the sensor is located at the center of the grid. This is similar to the simulation environment considered in [5]. Each sensor has a sensing range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq792_HTML.gif ; The target object is located at the center https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq793_HTML.gif with the object radius of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq794_HTML.gif . For uniform initial battery case, each sensor has https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq795_HTML.gif units of energy. In the nonuniform battery case, each sensor has a mean value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq796_HTML.gif units of energy. The uniform case is denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq797_HTML.gif , while the nonuniform case is denoted as https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq798_HTML.gif in the figures. Each monitoring cycle is assumed to take up https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq799_HTML.gif units of energy, and each message takes up https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq800_HTML.gif unit of energy if transmission cost is counted.

7.1. Effect of Energy Needed Per Cycle

First of all, we simulated the scenario in which https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq801_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq802_HTML.gif units, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq803_HTML.gif units, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq804_HTML.gif units. In the simulations, we vary https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq805_HTML.gif from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq806_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq807_HTML.gif units per cycle. Figure 11(a) illustrates the network lifetime achieved by various algorithms under different energy needed per cycle without transmission cost. The figure shows that all the algorithms have shorter lifetimes when each monitoring cycle requires more energy. On the other hand, our proposed algorithm achieves similar network lifetime with that ofSingle-MC andRound-based algorithm as all the algorithms are https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq808_HTML.gif -approximation solutions if no transmission cost is counted. All of them achieve around https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq809_HTML.gif of the maximum lifetime under the uniform battery environment. This is mainly because many sensors have never been chosen in any proper cover. In the nonuniform situation, the lifetimes of the algorithms are about https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq810_HTML.gif of the optimal one. This is mainly due to the reason that more nodes are involved.
Figure 11(b) shows the performance under different energy needed per cycle with transmission cost. It can be shown thatRound-based algorithm is affected the most by the transmission cost as an MC needs to be found every cycle, while our proposed algorithm is affected by the transmission cost the least. Therefore, our purposed algorithm outperforms the others. Figures 11(c) and 11(d) illustrate the number of messages and the number of scheduling rounds required by various algorithms throughout the network lifetime. As expected,Round-based algorithm requires the most number of messages and rounds, while our algorithm requires the least. It is worthwhile to state that our proposed algorithm requires only one scheduling round with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq811_HTML.gif (size of the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq812_HTML.gif ) and this contributes to the good performance shown in Figures 11(c) and 11(d). On the other hand, the figures also show that our proposed algorithm and the Round-based algorithm require similar amount of messages and rounds no matter the initial battery capacity of a sensor is uniform or not. However, there is a large discrepancy between uniform and nonuniform battery for theSingle-MC algorithm. It is becauseSingle-MC algorithm finds an MC and then it is activated until a sensor in this MC fails. In the uniform battery scenario, nearly all the sensors in an MC runs out of energy simultaneously. However, this is not the case in nonuniform battery scenario.

7.2. Effect of Initial Battery Capacity

In Figures 12(a) and 12(b), we simulated the scenario where https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq813_HTML.gif units, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq814_HTML.gif units, and https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq815_HTML.gif units per cycle. In these simulations, we vary the mean value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq816_HTML.gif from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq817_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq818_HTML.gif units. Figures 12(a) and 12(b) illustrate the network lifetime achieved by various algorithms under different initial battery capacity settings without transmission cost and with transmission cost, respectively. The figure shows that all the algorithms have longer lifetimes when the initial battery capacity increases. Similar to the results in Figure 11(a), all the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq819_HTML.gif -approximation solutions achieve about https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq820_HTML.gif and over https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq821_HTML.gif of the optimal solution under the uniform and nonuniform scenarios, respectively. These results show that the algorithms considered generally achieve good performance although they are 2-approximation solutions. Similar to that in Figures 11(a) and 11(b), our proposed algorithm performs similarly to the Round-based and Single-MC algorithms in case no transmission cost is counted. However, our proposed algorithm outperforms them when transmission cost is considered. This is mainly due to the reasons that more messages are required in other algorithms as shown in Figure 12(c) where the number of messages required grows with the increasing initial battery capacity.
In both the scenarios considered in Sections 7.1 and 7.2, the algorithms achieve longer lifetime when uniform initial battery is considered. It is because any portion of the perimeter is covered by sensors with approximately the same amount of total energy. Unfortunately, this is not the case in the nonuniform initial battery scenario where some portions have significantly higher total energy than others.

7.3. Effects of Sensing Range

In this section, we have simulated the scenario in which https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq822_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq823_HTML.gif units, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq824_HTML.gif units, and mean value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq825_HTML.gif units. In the simulations, we vary https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq826_HTML.gif from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq827_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq828_HTML.gif units. Here, we study two scenarios. First, each sensor has the same sensing range https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq829_HTML.gif , we denote this as thehomogenous sensing range scenario. Second, different sensors may have different sensing ranges. In other words, each sensor has the sensing range with the mean value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq830_HTML.gif . We denote this scenario as the heterogenous sensing range scenario.
Let us start with the homogenous sensing range scenario. Generally speaking, the longer the sensing range, the fewer the sensors needed to cover the perimeter of the target object. This results in longer network lifetime in various algorithms as shown in Figure 13(a). On the other hand, Figure 13(b) illustrates that our proposed algorithm requires fewer messages when the sensing range increases. This is mainly due to the reason that the larger the sensing range the smaller the size of the minimum cover is. Recall that our proposed algorithm requires https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq831_HTML.gif (size of the minimum cover) number of messages to find all the schedules. However, Round-based and Single-MC algorithms require more messages when the sensing range increases. On one hand, the longer the sensing range, fewer messages are needed to find an MC. On the other hand, the longer the sensing range, less sensors are required to cover a target object. This results in a larger number of scheduling rounds. Since the second factor outweighs the first factor, the number of messages increases in both the Round-based and Single-MC algorithms.
We further consider the heterogenous sensing range scenario in Figure 14(a). Figure 14(a) exhibits similar trend as that of the homogenous sensing range scenario in Figure 13(a) due to the same reason aforementioned. However, when we compare the homogenous sensing range and the heterogenous sensing range scenarios with the mean value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq832_HTML.gif in Figure 14(b), we can find that the lifetime achievable by the heterogenous scenario is better than that of the homogenous case. In fact, this phenomenon can be explained with the help of Figure 14(c). As we know that the network lifetime achievable is upper bounded by https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq833_HTML.gif , we compare https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq834_HTML.gif of the homogenous and the heterogenous sensing range scenarios in Figure 14(c). In both scenarios, we can observe that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq835_HTML.gif of the uniform initial battery capacity case is higher than that of the nonuniform initial battery case. These agree with the results shown in Figures 13(a) and 14(a) that various algorithms achieve better lifetime in the uniform initial battery case than that in the nonuniform initial battery case. On the other hand, we can observe that https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq836_HTML.gif of the homogenous sensing range scenario is generally smaller than that of the heterogenous sensing range scenario no matter the initial battery capacity of the sensor is uniform or not. This is mainly due to the reason that some sensors which are too far to cover any portion of the perimeter of the target object in the homogenous sensing range scenario may cover a certain portion of the perimeter in the heterogenous sensing range scenario. This also accounts for the better performance shown in heterogenous sensing range scenario.

7.4. Effect of Object Size

In this section, we have simulated the scenario in which https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq838_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq839_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq840_HTML.gif units, and mean value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq841_HTML.gif units. In the simulations, we vary https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq842_HTML.gif from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq843_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq844_HTML.gif units. Generally speaking, the larger the target radius, the larger the number of sensors needed to cover the perimeter of the whole target object. This results in smaller network lifetime in various algorithms as shown in Figure 15(a). On the other hand, Figure 15(b) illustrates that various algorithms require larger amount of messages when the target radius increases. This is mainly due to the reason that the larger the target radius the larger the size of the minimum cover is. In both figures, we can observe that our proposed algorithm generally achieves better performance than the others.

7.5. Effect of Network Density

In this section, we have simulated the scenario in which https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq845_HTML.gif units, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq846_HTML.gif units, https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq847_HTML.gif units, and mean value https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq848_HTML.gif units. In the simulations, we vary https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq849_HTML.gif from https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq850_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq851_HTML.gif units. Generally speaking, the smaller the sensor availability probability, the fewer the sensors exist in the network. This results in smaller network lifetime in various algorithms as shown in Figure 16(a). On the other hand, Figure 16(b) illustrates that our proposed algorithm requires similar amount of messages no matter what the value of https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq852_HTML.gif is. However, Round-based and Single-MC require smaller amount of messages when https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq853_HTML.gif becomes smaller. This is mainly due to the reason that fewer sensors exist in the network. Therefore, the total number of rounds required to find the https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq854_HTML.gif decreases in both cases. Hence, this results in the smaller number of messages. Nevertheless, we still observe that our proposed algorithm generally achieves the best performance.

8. Conclusion and Future Work

In this paper, we study the perimeter coverage scheduling problem. We found that this problem is solvable in polynomial time under some special sensor configurations. However, this problem is NP-hard in general. We realize that the selection of a proper cover in each cycle leads to a https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq855_HTML.gif -approximation solution. We then propose a simple distributed https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq856_HTML.gif -approximation solution with https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq857_HTML.gif size of the minimum cover https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq858_HTML.gif number of messages, and we demonstrate its effectiveness through simulations.
In the future, we plan to study the perimeter coverage scheduling issues on the scenario where a sensor can monitor multiple continuous portions of the perimeter on the target object instead of a single continuous portion. In [29], we have proposed a distributed https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq859_HTML.gif maximum number of cover ranges per sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq860_HTML.gif approximation solution on the problem of finding the minimum size and minimum cost set of sensors to cover the perimeter of the whole target object. To the best of our knowledge, no approximation solution has been developed on the scheduling problem up to now and the approximation ratio is likely to be larger than https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq861_HTML.gif maximum number of cover ranges per sensor https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq862_HTML.gif . Therefore, we would like to develop a distributed approximation solution to tackle this issue in the coming future.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literature
1.
go back to reference Chow K-Y, Lui K-S, Lam EY: Maximizing angle coverage in visual sensor networks. Proceedings of IEEE International Conference on Communications (ICC '07), June 2007 3516-3521. Chow K-Y, Lui K-S, Lam EY: Maximizing angle coverage in visual sensor networks. Proceedings of IEEE International Conference on Communications (ICC '07), June 2007 3516-3521.
2.
go back to reference Chow K-Y, Lui K-S, Lam EY:Achieving 360 angle coverage with minimum transmission cost in visual sensor networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '07), March 2007 4115-4119. Chow K-Y, Lui K-S, Lam EY:Achieving 360 https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq863_HTML.gif angle coverage with minimum transmission cost in visual sensor networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '07), March 2007 4115-4119.
3.
go back to reference Hung K-S, Lui K-S: On perimeter coverage of wireless sensor networks. Department of Electrical and Electronic Engineering, The University of Hong Kong; September 2008. Hung K-S, Lui K-S: On perimeter coverage of wireless sensor networks. Department of Electrical and Electronic Engineering, The University of Hong Kong; September 2008.
4.
go back to reference Hung K-S, Lui K-S: On perimeter coverage of wireless sensor networks with minimum cost. Department of Electrical and Electronic Engineering, The University of Hong Kong; December 2008. Hung K-S, Lui K-S: On perimeter coverage of wireless sensor networks with minimum cost. Department of Electrical and Electronic Engineering, The University of Hong Kong; December 2008.
5.
go back to reference Chow K-Y, Lui K-S, Lam EY: Wireless sensor networks scheduling for full angle coverage. Multidimensional Systems and Signal Processing 2009, 20(2):101-119. 10.1007/s11045-008-0062-3CrossRefMATH Chow K-Y, Lui K-S, Lam EY: Wireless sensor networks scheduling for full angle coverage. Multidimensional Systems and Signal Processing 2009, 20(2):101-119. 10.1007/s11045-008-0062-3CrossRefMATH
6.
go back to reference Dong Q: Maximizing system lifetime in wireless sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005 13-19. Dong Q: Maximizing system lifetime in wireless sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005 13-19.
7.
go back to reference Schurgers C, Srivastava MB: Energy efficient routing in wireless sensor networks. Proceedings of IEEE Military Communications Conference (MILCOM '01), October 2001 1: 357-361. Schurgers C, Srivastava MB: Energy efficient routing in wireless sensor networks. Proceedings of IEEE Military Communications Conference (MILCOM '01), October 2001 1: 357-361.
8.
go back to reference Dietrich I, Dressler F: On the lifetime of wireless sensor networks. ACM Transactions on Sensor Networks 2009., 5(1, article 5): Dietrich I, Dressler F: On the lifetime of wireless sensor networks. ACM Transactions on Sensor Networks 2009., 5(1, article 5):
9.
go back to reference Huang C-F, Lo L-C, Tseng Y-C, Chen W-T: Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005 1: 640-643.CrossRef Huang C-F, Lo L-C, Tseng Y-C, Chen W-T: Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks. Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS '05), May 2005 1: 640-643.CrossRef
10.
go back to reference Tian D, Georganas ND: A coverage-preserving node scheduling scheme for large wireless sensor networks. Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications, September 2002 32-41.CrossRef Tian D, Georganas ND: A coverage-preserving node scheduling scheme for large wireless sensor networks. Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications, September 2002 32-41.CrossRef
11.
go back to reference Yan T, He T, Stankovic JA: Differentiated surveillance for sensor networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03), November 2003 51-62.CrossRef Yan T, He T, Stankovic JA: Differentiated surveillance for sensor networks. Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys '03), November 2003 51-62.CrossRef
12.
go back to reference Hsin C-F, Liu M: Network coverage using low duty-cycled sensors: random and coordinated sleep algorithms. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN '04), April 2004 433-442. Hsin C-F, Liu M: Network coverage using low duty-cycled sensors: random and coordinated sleep algorithms. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks (IPSN '04), April 2004 433-442.
13.
go back to reference Huang C-F, Tseng Y-C: The coverage problem in a wireless sensor network. Proceedings of the 2nd ACM International Workshop on Wireless Sensor networks and Applications (WSNA '03), September 2003 115-121. Huang C-F, Tseng Y-C: The coverage problem in a wireless sensor network. Proceedings of the 2nd ACM International Workshop on Wireless Sensor networks and Applications (WSNA '03), September 2003 115-121.
14.
go back to reference Huang C-F, Lo L-C, Tseng Y-C, Chen W-T: Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks. ACM Transactions on Sensor Networks 2006, 2(2):182-187. 10.1145/1149283.1149285CrossRef Huang C-F, Lo L-C, Tseng Y-C, Chen W-T: Decentralized energy-conserving and coverage-preserving protocols for wireless sensor networks. ACM Transactions on Sensor Networks 2006, 2(2):182-187. 10.1145/1149283.1149285CrossRef
15.
go back to reference Ye M, Chan E, Chen G, Wu J: Energy efficient fractional coverage schemes for low cost wireless sensor networks. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS '06), July 2006 Ye M, Chan E, Chen G, Wu J: Energy efficient fractional coverage schemes for low cost wireless sensor networks. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS '06), July 2006
16.
go back to reference Wang L, Kulkarni SS: Sacrificing a little coverage can substantially increase network lifetime. Ad Hoc Networks 2008, 6(8):1281-1300. 10.1016/j.adhoc.2007.11.013CrossRef Wang L, Kulkarni SS: Sacrificing a little coverage can substantially increase network lifetime. Ad Hoc Networks 2008, 6(8):1281-1300. 10.1016/j.adhoc.2007.11.013CrossRef
17.
go back to reference Ren S, Li Q, Wang H, Chen X, Zhang X: Design and analysis of sensing scheduling algorithms under partial coverage for object detection in sensor networks. IEEE Transactions on Parallel and Distributed Systems 2007, 18(3):334-350.CrossRef Ren S, Li Q, Wang H, Chen X, Zhang X: Design and analysis of sensing scheduling algorithms under partial coverage for object detection in sensor networks. IEEE Transactions on Parallel and Distributed Systems 2007, 18(3):334-350.CrossRef
18.
go back to reference Cardei M, Thai MT, Li Y, Wu W: Energy-efficient target coverage in wireless sensor networks. Proceedings of IEEE Conference on Computer Communications (INFOCOM '05), March 2005 3: 1976-1984. Cardei M, Thai MT, Li Y, Wu W: Energy-efficient target coverage in wireless sensor networks. Proceedings of IEEE Conference on Computer Communications (INFOCOM '05), March 2005 3: 1976-1984.
19.
go back to reference Liu H, Wan P, Jia X: Maximal lifetime scheduling for sensor surveillance systems with K sensors to one target. IEEE Transactions on Parallel and Distributed Systems 2006, 17(12):1526-1536.CrossRef Liu H, Wan P, Jia X: Maximal lifetime scheduling for sensor surveillance systems with K sensors to one target. IEEE Transactions on Parallel and Distributed Systems 2006, 17(12):1526-1536.CrossRef
20.
go back to reference Zhao Q, Gurusamy M: Lifetime maximization for connected target coverage in wireless sensor networks. IEEE/ACM Transactions on Networking 2008, 16(6):1378-1391.CrossRef Zhao Q, Gurusamy M: Lifetime maximization for connected target coverage in wireless sensor networks. IEEE/ACM Transactions on Networking 2008, 16(6):1378-1391.CrossRef
21.
go back to reference Thai MT, Li Y, Du D-Z, Wang F: O (log n)-localized algorithms on the coverage problem in heterogeneous sensor networks. Proceedings of the 27th IEEE International Performance Computing and Communications Conference (IPCCC '07), April 2007 85-92. Thai MT, Li Y, Du D-Z, Wang F: O (log n)-localized algorithms on the coverage problem in heterogeneous sensor networks. Proceedings of the 27th IEEE International Performance Computing and Communications Conference (IPCCC '07), April 2007 85-92.
22.
go back to reference Calines G, Ellis RB: Monitoring schedules for randomly deployed sensor networks. Proceedings of the 5th ACM International Workshop on Foundations of Mobile Computing (DIALM-POMC '08), August 2008 3-11.CrossRef Calines G, Ellis RB: Monitoring schedules for randomly deployed sensor networks. Proceedings of the 5th ACM International Workshop on Foundations of Mobile Computing (DIALM-POMC '08), August 2008 3-11.CrossRef
23.
go back to reference Kumar S, Lai TH, Arora A: Barrier coverage with wireless sensors. Wireless Networks 2007, 13(6):817-834. 10.1007/s11276-006-9856-0CrossRef Kumar S, Lai TH, Arora A: Barrier coverage with wireless sensors. Wireless Networks 2007, 13(6):817-834. 10.1007/s11276-006-9856-0CrossRef
24.
go back to reference Kumar S, Lai TH, Posner ME, Sinha P: Optimal sleep-wakeup algorithms for barriers of wireless sensors. Proceedings of the 4th International Conference on Broadband Communications, Networks and Systems (BroadNets '07), September 2007 327-336. Kumar S, Lai TH, Posner ME, Sinha P: Optimal sleep-wakeup algorithms for barriers of wireless sensors. Proceedings of the 4th International Conference on Broadband Communications, Networks and Systems (BroadNets '07), September 2007 327-336.
25.
go back to reference Chen A, Kumar S, Lai TH: Designing localized algorithms for barrier coverage. Proceedings of the 13th Annual International Conference on Mobile Computing and Networking (MOBICOM '07), September 2007 63-74.CrossRef Chen A, Kumar S, Lai TH: Designing localized algorithms for barrier coverage. Proceedings of the 13th Annual International Conference on Mobile Computing and Networking (MOBICOM '07), September 2007 63-74.CrossRef
26.
go back to reference Chen A, Lai TH, Xuan D: Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), April 2008 421-430.CrossRef Chen A, Lai TH, Xuan D: Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), April 2008 421-430.CrossRef
27.
go back to reference Liu B, Dousse O, Wang J, Saipulla A: Strong barrier coverage of wireless sensor networks. Proceedings of the 9th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), May 2008 411-419.CrossRef Liu B, Dousse O, Wang J, Saipulla A: Strong barrier coverage of wireless sensor networks. Proceedings of the 9th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), May 2008 411-419.CrossRef
28.
go back to reference Saipulla A, Westphal C, Liu B, Wang J: Barrier coverage of line-based deployed wireless sensor networks. Proceedings of the IEEE Conference on Computer Communications (INFOCOM '09), April 2009 127-135. Saipulla A, Westphal C, Liu B, Wang J: Barrier coverage of line-based deployed wireless sensor networks. Proceedings of the IEEE Conference on Computer Communications (INFOCOM '09), April 2009 127-135.
29.
go back to reference Hung K-S, Lui K-S: Perimeter coverage made practical in wireless sensor networks. Proceedings of the 9th International Symposium on Communications and Information Technology (ISCIT '09), September 2009 87-92. Hung K-S, Lui K-S: Perimeter coverage made practical in wireless sensor networks. Proceedings of the 9th International Symposium on Communications and Information Technology (ISCIT '09), September 2009 87-92.
30.
go back to reference Lee H, Aghajan H: Vision-enabled node localization in wireless sensor networks. Proceedings of the Cognitive Systems with Interactive Sensors (COGIS '06), March 2006 Lee H, Aghajan H: Vision-enabled node localization in wireless sensor networks. Proceedings of the Cognitive Systems with Interactive Sensors (COGIS '06), March 2006
31.
go back to reference McCormick C, Laligand P-Y, Lee H, Aghajan H: Distributed agent control with self-localizing wireless image sensor networks. Proceedings of the Cognitive Systems with Interactive Sensors (COGIS '06), March 2006 McCormick C, Laligand P-Y, Lee H, Aghajan H: Distributed agent control with self-localizing wireless image sensor networks. Proceedings of the Cognitive Systems with Interactive Sensors (COGIS '06), March 2006
32.
go back to reference Tezcan N, Wang W: Self-orienting wireless multimedia sensor networks for maximizing multimedia coverage. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008 2206-2210. Tezcan N, Wang W: Self-orienting wireless multimedia sensor networks for maximizing multimedia coverage. Proceedings of IEEE International Conference on Communications (ICC '08), May 2008 2206-2210.
33.
go back to reference Cardei M, Wu J, Lu M: Improving network lifetime using sensors with adjustable sensing range. International Journal of Sensor Networks 2006, 1: 41-49. 10.1504/IJSNET.2006.010833CrossRef Cardei M, Wu J, Lu M: Improving network lifetime using sensors with adjustable sensing range. International Journal of Sensor Networks 2006, 1: 41-49. 10.1504/IJSNET.2006.010833CrossRef
34.
go back to reference Deng J, Han YS, Heinzelman WB, Varshney PK: Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks. Computer Communications 2005, 28(14):1631-1642. 10.1016/j.comcom.2005.02.019CrossRef Deng J, Han YS, Heinzelman WB, Varshney PK: Balanced-energy sleep scheduling scheme for high-density cluster-based sensor networks. Computer Communications 2005, 28(14):1631-1642. 10.1016/j.comcom.2005.02.019CrossRef
35.
go back to reference Bonuccelli MA: Dominating sets and domatic number of circular arc graphs. Discrete Applied Mathematics 1985, 12(3):203-213. 10.1016/0166-218X(85)90025-3MathSciNetCrossRefMATH Bonuccelli MA: Dominating sets and domatic number of circular arc graphs. Discrete Applied Mathematics 1985, 12(3):203-213. 10.1016/0166-218X(85)90025-3MathSciNetCrossRefMATH
36.
go back to reference Orlin JB, Bonucceli MA, Bovet DP:An algorithm for coloring proper circular arc graphs. SIAM Journal on Algebraic Discrete Methods 1981, 2(2):88-93. 10.1137/0602012CrossRefMathSciNetMATH Orlin JB, Bonucceli MA, Bovet DP:An https://static-content.springer.com/image/art%3A10.1155%2F2010%2F926075/MediaObjects/13638_2009_Article_2064_IEq864_HTML.gif algorithm for coloring proper circular arc graphs. SIAM Journal on Algebraic Discrete Methods 1981, 2(2):88-93. 10.1137/0602012CrossRefMathSciNetMATH
37.
go back to reference Garey MR, Johnson DR, Miller GL, Paradimitriou CH: The complexity of coloring circular arcs and chords. SIAM Journal on Algebraic and Discrete Methods 1980, 1(2):216-223. 10.1137/0601025CrossRefMathSciNetMATH Garey MR, Johnson DR, Miller GL, Paradimitriou CH: The complexity of coloring circular arcs and chords. SIAM Journal on Algebraic and Discrete Methods 1980, 1(2):216-223. 10.1137/0601025CrossRefMathSciNetMATH
38.
go back to reference Fourer R, Gay DM, Kernighan BW: AMPL: A Modeling Language for Mathematical Programming. 2nd edition. Cole Publishing Company; 2002.MATH Fourer R, Gay DM, Kernighan BW: AMPL: A Modeling Language for Mathematical Programming. 2nd edition. Cole Publishing Company; 2002.MATH
Metadata
Title
Perimeter Coverage Scheduling in Wireless Sensor Networks Using Sensors with a Single Continuous Cover Range
Authors
Ka-Shun Hung
King-Shan Lui
Publication date
01-12-2010
Publisher
Springer International Publishing
DOI
https://doi.org/10.1155/2010/926075

Other articles of this Issue 1/2010

EURASIP Journal on Wireless Communications and Networking 1/2010 Go to the issue

Premium Partner