Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

On Coverage and Capacity for Disaster Area Wireless Networks Using Mobile Relays

verfasst von: Wenxuan Guo, Xinming Huang

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Public safety organizations increasingly rely on wireless technology to provide effective communications during emergency and disaster response operations. This paper presents a comprehensive study on dynamic placement of relay nodes (RNs) in a disaster area wireless network. It is based on our prior work of mobility model that characterizes the spatial movement of the first responders as mobile nodes (MNs) during their operations. We first investigate the COverage-oriented Relay Placement (CORP) problem that is to maximize the total number of MNs connected with the relays. Considering the network throughput, we then study the CApacity-oriented Relay Placement (CARP) problem that is to maximize the aggregated data rate of all MNs. For both coverage and capacity studies, we provide each the optimal and the greedy algorithms with computational complexity analysis. Furthermore, simulation results are presented to compare the performance between the greedy and the optimal solutions for the CORP and CARP problems, respectively. It is shown that the greedy algorithms can achieve near optimal performance but at significantly lower computational complexity.

1. Introduction

Public safety organizations increasingly rely on wireless technology to establish disaster area communication systems for first responder operations. The reason mainly lies in the fact that in catastrophe situations, wired network suffers from low sustainability, high expense, slow deployment, and being unadaptable to mobility. It is crucial for the replacement network to be highly dynamic in accordance with the mission-critical mobile users. Considering the first responders as mobile nodes (MNs), the communication range of each MN is often limited by its power constraint. Since MNs are highly mobile within the disaster area, using infrastructureless ad hoc networks would result in unexpected disconnection for some MNs and frequent rediscovery of routing paths. Therefore, mobile relay nodes (RNs) can be introduced to relay the communications between MNs and the base station. In this paper, we exemplify the movable RNs as vehicles loaded with wireless communication equipment. The RNs installed on wheeled vehicles move themselves to places where the first responders are actively working in the field. Although RNs form the backbone network, the number of users each RN can support is often limited, because each RN can only provide limited number of channels. Due to the abundance of available bandwidth in disaster area, we assume that each RN can set its bands at unused frequencies, so that they do not interfere with each other. With MNs and RNs defined, we term such a dynamic communication system as a disaster area wireless network (DAWN), shown in Figure 1.
In our prior work [1], we proposed a mobility model to describe the movement pattern of MNs within a large disaster area. Moreover, we studied the coverage problem with no capacity constraints on RNs. In this paper, we assume that each RN can support a limited number of users. Then the problem to be studied is formulated as finding the deployment of a given number of RNs such that: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq1_HTML.gif most MNs can be covered; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq2_HTML.gif the network throughput can be maximized.
We first study the COverage-oriented Relay Placement (CORP) problem of deploying a set of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq3_HTML.gif RNs to cover a maximum number of MNs. As an initial setup, we consider the subproblem of Relay Assignment for COverage-oriented Relay Placement (RA-CORP) which is, for any given RNs' placement, to obtain the optimal associations between RNs and MNs using maximal matching method. Secondly, the Greedy Incremental COverage (GICO) algorithm is proposed to iteratively find the optimal location for the RN, one at each time. Thirdly, we put forward the constrained exhaustive search (CES) method to produce the optimal solution to the CORP problem as a benchmark for the GICO algorithm.
We also investigate the CApacity-oriented Relay Placement (CARP) problem to maximize the total throughput of DAWN. In this case, the Relay Assignment for CApacity-oriented Relay Placement (RA-CARP) can be formulated as the assignment problem and solved by the Hungarian method [2]. Subsequently, we propose the Greedy Incremental Capacity (GICA) algorithm to find the RNs' positions one by one. In comparison, the optimal placement of all RNs can be obtained by solving a complicated binary integer programming problem but at very high computational complexity.
The rest of this paper is organized as follows. In Section 2, related work on disaster area networks, mobility model, and base station placement in wireless networks is summarized. In Section 3, we describe the mobility model of MNs within the disaster area; Section 4 presents the problem formulation of maximizing coverage for DAWN; Section 5 presents the technical approaches to solve the CORP problem. In Section 6, we present the problem formulation of maximizing aggregate throughput for DAWN. Subsequently, Section 7 presents the technical approaches to solve the CARP problem; simulation results are given in Section 8, followed by conclusions in Section 9.

2.1. Disaster Area Wireless Network

Recently, many kinds of wireless networks have been proposed to be applied to disaster area relief operations. In [3], Hiroaki et al. propose and evaluate a mobile ad hoc network system to pursue the location and personal information of victims in occurrence of disaster. In [4], Kanchanasut et al. describe an emergency communication network platform designed for collaborative simultaneous emergency response operations using a combination of mobile ad hoc networking and a satellite IP network operating with conventional terrestrial internet. In [5], Malan et al. introduce a wireless infrastructure intended for emergency medical care, integrating low-power, wireless vital sign sensors, and PC-class systems. In addition, Zussman and Segall propose to construct an ad hoc network of wireless smart badges in order to acquire information from trapped survivors [6]. Besides, a novel ballooned wireless mesh network [7] has been proposed for emergency information system. All these works either assume the majority network nodes are static or mention little about their mobility model. Therefore, they fail in constructing the disaster area communication system to accommodate dynamic node configurations.

2.2. Macroscopic Mobility Model

In the recent years, several different macroscopic mobility models have been proposed and used for performance evaluation of networks. The fluid mobility model [810] conceptualizes traffic flow of users as the flow of a fluid, which models mobility in terms of the mean number of users crossing the boundary of a given area. Derived from transportation theory, these models give an aggregated description of the movement of several users, ranging from street scale and city scale [1113] to national and international scales [12, 14]. Furthermore, two different event-driven role-based mobility models are designed for disaster area relief applications [15, 16]. However, these two models only apply in small area with specific disaster sites.

2.3. Base Station Placement

There have been extensive researches dedicated to base station placement problem in wireless sensor networks. In [17], a multiobjective metric is proposed for placing multiple base stations at the optimal positions in wireless sensor networks, including coverage, fault tolerance, energy consumption, and network delay. In [18], Shi and Hou propose a (1- https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq4_HTML.gif ) optimal approximation algorithm to place base station so that the network lifetime could be maximized. In [19], a polynomial time heuristic is proposed for optimal base station selection within a wireless sensor network. In [20], Pan et al. study base station placement problem to maximize network lifetime. Most of existing base station placement schemes are designed for wireless networks with nodes at specific positions. Therefore, they are not suitable for the proposed mobile scenarios.

3. System Modeling and Applications

3.1. Mobility Model

As shown in Figure 2, we discretize the entire disaster area into squares, each square with a Catastrophic Intensity (CI) value to indicate the severity of damage. The squares that are yet to be cleared are called https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq5_HTML.gif . Those working-in-progress squares are also termed as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq6_HTML.gif . Both raw squares and busy squares are considered as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq7_HTML.gif . A square is said to be cleared if the CI value is reduced to zero. Faced with the mission of relieving such a large-scale disaster area, first responders ought to start from places near the boundary of the disaster area. The first responders do not stop working in the square until it is cleared. When first responders finish clearing a square, they split up and enter the adjacent uncleared squares. More specifically, the diversification is determined by the CI values and the current workforce in the neighboring squares. If obstacles and unreachable spots exist in the disaster area, as the stripe squares in Figure 2, first responders will make a detour according to our mobility model. As the first responders move deeper and broader spatially, they can finally clear the entire disaster area. The details of the mobility model can be referred to our prior work [1].

3.2. Network Model

We consider a set of MNs moving within the disaster area following the mobility model described previously and assume that a fixed number of RNs are ready for deploying to connect all MNs to the backbone network. We assume that all MNs have small transmission range https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq8_HTML.gif . The transmission region of an MN is defined as the area in which all points are within distance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq9_HTML.gif from the MN. The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq10_HTML.gif th MN https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq11_HTML.gif can communicate bi-directionally with the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq12_HTML.gif th RN https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq13_HTML.gif if the distance between them https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq14_HTML.gif . In other words, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq15_HTML.gif is said to be covered by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq16_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq17_HTML.gif is within the transmission region of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq18_HTML.gif . RNs are able to communicate with each other without distance constraints and they form the backbone network. We assume that the relay stations can be installed on vehicles and can quickly move to any locations in the disaster area. We assume each MN occupies one orthogonal channel associated with an RN for at least one time unit to communicate bi-directionally. Since the RN has a limited bandwidth, each RN can only support a certain number of MNs. As a note, no interference issues are considered in our network model due to abundant unoccupied spectrum in the disaster area.

4. Maximizing Node Coverage: Problem Formulation

We first provide the notation used in this section. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq19_HTML.gif denote the set of four vertices of square https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq20_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq21_HTML.gif denotes the disk centering at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq22_HTML.gif with radius as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq23_HTML.gif . A spot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq24_HTML.gif is said to be covered by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq25_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq26_HTML.gif , denoted as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq27_HTML.gif . A polygon https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq28_HTML.gif is said to be covered by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq29_HTML.gif if for any point https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq30_HTML.gif within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq31_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq32_HTML.gif , denoted as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq33_HTML.gif .
For the CORP problem, RNs should be placed at positions to connect the maximum number of MNs. As MNs follow a macroscopic mobility model, we choose to cover the active (busy) squares instead of tracking the individual MNs. In other words, if a busy square is covered, then all MNs within the square are connected. We now claim Theorem 1 to show that a square can be covered by a circle if and only if its four vertices are within that circle.
Theorem 1 (covering a polygon).
Assume a polygon https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq34_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq35_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq36_HTML.gif denote the set of vertices and edges, respectively. If for all vertex https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq37_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq38_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq39_HTML.gif .
Proof.
First of all, we need to acknowledge the fact that if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq40_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq41_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq42_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq43_HTML.gif denotes the edge connecting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq44_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq45_HTML.gif ), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq46_HTML.gif (it is obviously true since the edge is fully contained in one circle if the two terminals are within the same circle). For all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq47_HTML.gif , we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq48_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq49_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq50_HTML.gif . Since for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq51_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq52_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq53_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq54_HTML.gif . As a result, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq55_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq56_HTML.gif .
Based on Theorem 1, the region where one RN should be placed to cover one busy square approximates to a circle (shown as Figure 3), which is defined as the feasible circle of each square. For every busy square in the DAWN, each has a corresponding feasible circle. These feasible circles may overlap each other and the intersected areas are referred as shared regions. As shown in Figure 4, three feasible circles are intersected and an RN placed in the shared region (shaded area) can cover all 3 squares at the same time. In a DAWN, these shared regions form a candidate set for RN placement. In this paper, our analysis and simulations are derived directly based on the concept of shared regions, instead of using traditional Cartesian coordinates.
The CORP problem is defined as follows. Given a set of busy squares, in which each contains some MNs inside with transmission range https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq57_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq58_HTML.gif RNs each with capability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq59_HTML.gif , find the optimal placement of the RNs, such that the maximum number of MNs is covered.

5. Maximizing Node Coverage: Technical Approaches

In this section, we first present a maximal matching method to solve the RA-CORP problem if the RNs' positions are known. Secondly, we propose the GICO and CES algorithms to tackle the CORP problem. In addition, we conduct complexity analysis for both algorithms.

5.1. Relay Assignment for Fixed RN Positions (RA-CORP)

The RA-CORP problem tries to find the optimal association between MNs and RNs. We use a bipartite graph to represent the RA-CORP problem, and then use a sparse matrix-based algorithm to find the maximum-sized matching between the MNs and RNs.
Definition 1.
Denote the feasible circle of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq60_HTML.gif th busy square https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq61_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq62_HTML.gif . Assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq63_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq64_HTML.gif have some area overlap, then the intersection area is defined as a shared region that only MNs within busy squares https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq65_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq66_HTML.gif ) can access, denoted as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq67_HTML.gif , or simply as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq68_HTML.gif .
At any time, MNs are distributed within a set of busy squares. The feasible circles of these busy squares intersect and yield a set of shared regions https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq69_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq70_HTML.gif denotes the cardinality of the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq71_HTML.gif . A fixed number of RNs https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq72_HTML.gif are deployed at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq73_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq74_HTML.gif . Each RN can support at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq75_HTML.gif MNs within the squares covered by the RNs. Then the RA-CORP problem is formulated as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq76_HTML.gif denotes that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq77_HTML.gif is connected with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq78_HTML.gif and 0 otherwise. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq79_HTML.gif denotes the set of RNs that cover https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq80_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq81_HTML.gif denotes the set of MNs that are covered by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq82_HTML.gif . The second constraint demands that each MN can at most connect to one RN. The third constraint shows that at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq83_HTML.gif MNs can connect to one RN.
Given MNs placed within busy squares, and RNs deployed in some shared regions, the bipartite graph can be generated as in Figure 5, where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq84_HTML.gif denotes the number of MNs. We prove that the maximal matching problem within a bipartite graph shown as Figure 5 is tantamount to the RA-CORP problem. In Figure 5, each MN can be assigned to any subband of an RN that covers the busy square where the MN is. Each line in Figure 5 shows that the corresponding MN can be connected to the RN with one channel. As each node of the bipartite graph can only be incident on one line, this bipartite graph correctly satisfies the second constraint in (1). Moreover, this bipartite graph extends each RN by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq85_HTML.gif times to obtain the matchings between MNs and channels of RNs; this transformation successfully captures the third constraint in (1). Therefore, the RA-CORP problem is equivalent to the maximal-matching problem in a bipartite graph as shown in Figure 5.
In this paper, we use a sparse matrix-based approach [21] to find the maximal matching between MNs and channels of RNs for each RN. This approach yields the optimal solution. The complexity of finding the maximal matching within a bipartite graph is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq86_HTML.gif .

5.2. Relay Placement for Optimal Coverage (CORP)

We first claim Theorem 2 about complexity of the CORP problem.
Theorem 2.
The CORP problem is NP-complete.
Proof.
See Appendix .
Then we perform aggregation for all shared regions to reduce the solution space. Since the CORP problem is NP-complete, we introduce a heuristic approach GICO to solve the problem. To measure the performance of GICO, we also give the optimal solution by employing the CES algorithm.

5.2.1. Aggregation

The aggregation procedure aims to reduce the cardinality of the set of shared regions, thus greatly reduces the solution space. Given a set of shared regions https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq87_HTML.gif , the aggregation proceeds as in Algorithm 1. We say https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq88_HTML.gif belongs to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq89_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq90_HTML.gif contains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq91_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq92_HTML.gif Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq93_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq94_HTML.gif denote the set of all shared regions, and reduced set of shared regions, respectively. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq95_HTML.gif denotes the cardinality of the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq96_HTML.gif .
Algorithm 1: Aggregation procedure.
Aggregation( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq97_HTML.gif )
1 https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq98_HTML.gif ;
2
for i=2 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq99_HTML.gif
 
3
sign=0;
 
4
for j=1 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq100_HTML.gif
 
5
if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq101_HTML.gif belongs to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq102_HTML.gif
 
6
remove https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq103_HTML.gif from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq104_HTML.gif ;
 
7
sign=1;
 
8
end if;
 
9
if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq105_HTML.gif belongs to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq106_HTML.gif
 
10
sign=2;
 
11
break;
 
12
end if;
 
13
end for;
 
14
if sign==0 or sign==1
 
15
add https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq107_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq108_HTML.gif ;
 
16
end if;
 
17
end for;
 
18
return https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq109_HTML.gif ;
 
The procedure reduces the cardinality of the set of shared regions by removing those that are contained by others. The procedure reduces the solution space without losing any coverage options. The reason is that RNs placed in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq110_HTML.gif that contains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq111_HTML.gif can cover busy squares https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq112_HTML.gif . Therefore, the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq113_HTML.gif can contain all shared regions but with the minimal cardinality.

5.2.2. Greedy Incremental Coverage (GICO)

The GICO algorithm is based on the following idea. Although it is not computationally feasible to perform an exhaustive search for placing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq114_HTML.gif RNs simultaneously, it is possible to choose an optimal position to place one RN at a time. When the RN is placed at each shared region, the optimal relay assignment can be obtained by utilizing the maximal matching method. The best shared region for placing one node can be found by exhaustively searching all shared regions in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq115_HTML.gif . Once the location for this RN is fixed, the next RN can be placed following the same procedure. It should be noted that when placing next RN, those previously placed RNs should be jointly considered for relay assignment in order to compute the coverage values. In this approach, the RNs are placed one by one until all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq116_HTML.gif RNs are deployed in the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq117_HTML.gif .
As listed in Algorithm 2, GICO works as follows. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq118_HTML.gif represents the shared regions that have been chosen to place RNs. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq119_HTML.gif denotes the cardinality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq120_HTML.gif . It is possible that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq121_HTML.gif contains multiple same shared regions, which means that multiple RNs should be placed in that shared region. At line 4, each shared region in the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq122_HTML.gif is added into the current set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq123_HTML.gif and the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq124_HTML.gif is obtained. The procedure at line 5 calculates and stores the maximal matching based on RNs' deployment according to the current https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq125_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq126_HTML.gif denotes the calculated optimal maximal matching while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq127_HTML.gif denotes the set of shared regions that each contains one RN. After executing the procedure of lines 4 and 5 for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq128_HTML.gif times, the best next shared region to place one RN is found (line 7) and added to the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq129_HTML.gif (line 8). Therefore, after greedily choosing RN placement one by one for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq130_HTML.gif times, we can finally obtain the solution.
Algorithm 2: GICO.
GICO( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq131_HTML.gif )
1
1 https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq132_HTML.gif ;
 
2
for i=1 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq133_HTML.gif
 
3
for j=1 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq134_HTML.gif
 
4
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq135_HTML.gif
 
5
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq136_HTML.gif RA-CORP( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq137_HTML.gif )
 
6
end for;
 
7
[maximum, index]=Max(value);
 
8
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq138_HTML.gif ;
 
9end for;
10 return https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq139_HTML.gif ;

5.2.3. Constrained Exhaustive Search (CES)

In order to obtain the optimal solution as a benchmark for our GICO algorithm, we need to search all possible combinations of the shared regions. However, even after employing the aggregation procedure to reduce the size of solution space, the complexity for searching the optimal solution could still be as high as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq140_HTML.gif Therefore, we resort to devising the CES algorithm to further reduce the solution space by adding one constraint to the combinations of shared regions. The constraint is that for each set of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq141_HTML.gif RN placements, each RN should cover at least one MN based on the RA-CORP results. In particular, the number of RNs placed in one shared region times RNs' capability should not exceed the total number of MNs in those busy squares that are covered by the RNs by more than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq142_HTML.gif , shown as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ2_HTML.gif
(2)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq143_HTML.gif denotes the number of RNs placed at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq144_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq145_HTML.gif denotes the number of MNs in the busy square https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq146_HTML.gif .

5.3. Complexity Analysis

We first discuss the complexity of the aggregation procedure. Based on Algorithm 1, the procedure between line 5 to line 12 is iterated https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq147_HTML.gif times, and the procedure between line 14 to line 16 is iterated https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq148_HTML.gif times. As neither https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq149_HTML.gif nor https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq150_HTML.gif is influenced by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq151_HTML.gif , the complexity for the aggregation procedure is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq152_HTML.gif .
Secondly, we analyze the complexity of GICO. Based on Algorithm 2, the complexity of the GICO algorithm is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq153_HTML.gif , because the procedure from line 4 to line 5 is iterated https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq154_HTML.gif times, and the worst case complexity for the maximal matching method is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq155_HTML.gif .
For CES, the complexity analysis is more complicated. According to the constraint in (2), each shared region cannot host more than a limited number of RNs. Therefore, we assume on average each shared region can host https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq156_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq157_HTML.gif ) RNs, as shown in
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ3_HTML.gif
(3)
In other words, the list of shared regions can be extended to a longer one with length https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq158_HTML.gif , on which each shared region can host at most one RN. As the worst case complexity for the maximal matching method is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq159_HTML.gif , the computation complexity for CES can be stated as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq160_HTML.gif . Now we claim that the complexity of the CES algorithm is higher than GICO, as shown in Theorem 3.
Theorem 3 (complexity of GICO and CES).
The complexity of the GICO algorithm is lower than the complexity of the CES algorithm.
Proof.
As already explained, the complexity of GICO is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq161_HTML.gif while the complexity for CES is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq162_HTML.gif We can tell that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq163_HTML.gif has little relation with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq164_HTML.gif , while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq165_HTML.gif is roughly linearly related with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq166_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq167_HTML.gif , because the more MNs, the more channels are required to access them to the backbone network. Then we can develop the ultimate form for the complexity of GICO as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ4_HTML.gif
(4)
By substituting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq168_HTML.gif in (5) with (3), the ultimate form for the complexity of CES is developed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ5_HTML.gif
(5)
Obviously, the term https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq169_HTML.gif . Therefore, the complexity for GICO is less than the complexity for CES.

6. Maximizing Aggregate Throughput: Problem Formulation

In Section 4, we formulate the CORP problem, which is aimed to maximize the number of MNs that can be connected to the backbone network. However, the objective of the CORP problem does not address the quality of service (QoS) requirements of individual links. In other words, the deployment of RNs has to consider not only the coverage but also the QoS performance with intelligent channel allocation. Therefore, we put forward the CARP problem in the interest of enhancing the QoS performance of DAWN.
To measure the throughput of individual links, we ought to set the positions of RNs as exact Cartesian coordinates. In particular, instead of defining the position of an RN as a region, we specify its position as the centroid point of the polygon, whose vertices are the intersection points of the arcs of a region in counterclockwise order. An example is shown in Figure 6. Let us denote the coordinates of the intersection points of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq170_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq171_HTML.gif , the coordinates of the centroid point as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq172_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq173_HTML.gif denotes the centroid point of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq174_HTML.gif . Then the coordinates of the centroid point is calculated as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ6_HTML.gif
(6)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq182_HTML.gif denotes the area of the polygon formed by connecting the intersection points in a counterclockwise order, which can be calculated using
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ7_HTML.gif
(7)
Based on Shannon formula, the channel capacity of a link can be expressed as (8) using path loss model
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ8_HTML.gif
(8)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq183_HTML.gif denotes the capacity of the channel, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq184_HTML.gif denotes the bandwidth of the channel, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq185_HTML.gif denotes the distance between the transmitter and receiver of the link, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq186_HTML.gif denotes the path loss coefficient, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq187_HTML.gif denotes the transmit power, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq188_HTML.gif denotes the noise power, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq189_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq190_HTML.gif are the transmitter and receiver antenna gains, respectively, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq191_HTML.gif denotes the wavelength of the transmitted signal, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq192_HTML.gif denotes the frequency of the transmitted signal, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq193_HTML.gif is the velocity of radio-wave propagation in free space, which is equal to the speed of light.
Since MNs follow the macroscopic mobility model, we resort to developing the two-dimensional integral (9) to compute the throughput of the link between an MN and its assigned RN. In (9), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq194_HTML.gif denotes the coordinates of the left downward vertex of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq195_HTML.gif th busy square https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq196_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq197_HTML.gif denotes the throughput of the link between one MN in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq198_HTML.gif and one RN placed at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq199_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq200_HTML.gif denotes the side length of each square
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ9_HTML.gif
(9)
The CARP problem is formulated as follows. Given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq201_HTML.gif MNs each with transmission range https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq202_HTML.gif that are distributed within a set of busy squares and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq203_HTML.gif RNs each with capability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq204_HTML.gif , find the optimal positions for the RNs such that the aggregated throughput of all established links between MNs and RNs are maximized.

7. Maximizing Aggregate Throughput: Technical Approaches

In this section, we investigate the CARP problem of deploying a set of RNs to maximize the total throughput of DAWN. We first consider the optimal relay assignment for fixed RN positions, which can be solved using the Hungarian method. On this basis, we propose the GICA approach to tackle the CARP problem. In addition, since the CARP problem falls into a binary integer programming formulation, the branch and bound algorithm [22] is adopted to produce the optimal solution as the benchmark for the GICA approach.

7.1. Relay Assignment for Fixed RN Positions (RA-CARP)

At any time, MNs are distributed within a set of busy squares. The feasible circles of these busy squares intersect and yield a set of shared regions https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq205_HTML.gif A fixed number of RNs https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq206_HTML.gif are deployed at the set of centroid points https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq207_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq208_HTML.gif . Each RN can support at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq209_HTML.gif MNs to access the network in the squares that it covers. Now the RA-CARP problem is formulated as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ10_HTML.gif
(10)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq210_HTML.gif denotes that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq211_HTML.gif is connected with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq212_HTML.gif and 0 otherwise; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq213_HTML.gif denotes the index of the busy square where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq214_HTML.gif is. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq215_HTML.gif denotes the index of the shared region where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq216_HTML.gif is placed. The second constraint denotes that each MN can at most connect to one RN. The third constraint shows that at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq217_HTML.gif MNs can connect to one RN.
Given MNs placed within busy squares and RNs deployed in some shared regions, the bipartite graph can be generated as in Figure 5. It can be seen that for each MN-RN pair, there are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq218_HTML.gif edges each with a weight equal to the capacity value of the corresponding link. Note that for those pairs that the RN does not cover the MN, the edges are assigned weights equal to 0. We now can generate a gain matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq219_HTML.gif shown as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ11_HTML.gif
(11)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq220_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq221_HTML.gif . We now present the Hungarian method [2] as follows.
Step 1.
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq222_HTML.gif is not a square matrix, we have to augment https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq223_HTML.gif into a square matrix by padding rows or columns with all zeros.
Step 2.
Multiply the matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq224_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq225_HTML.gif .
Step 3.
Subtract the minimum value of each row from row entries.
Step 4.
Subtract the minimum value of each column from column entries.
Step 5.
Select rows and columns across which you draw lines, such that all zeros are covered and that no more lines have been drawn than necessary.
Step 6.
If the number of lines equals the number of rows, choose a combination of zero elements from the modified gain matrix such that the position of each chosen element is incident on a unique row and column. Then the optimal assignment result consists of the RN-MN pairs as represented by the chosen elements in the modified gain matrix. If the number of lines is less than the number of rows, go to Step 7.
Step 7.
Find the smallest element which is not covered by any of the lines. Then subtract it from each entry which is not covered by the lines and add it to each entry which is at the intersection of a vertical and horizontal line. Go back to Step 5.

7.2. Relay Placement for Maximal Aggregate Throughput (CARP)

We claim Theorem 4 about complexity of the CARP problem.
Theorem 4.
The CARP problem is NP-complete.
Proof.
See Appendix .
Since the CARP problem is NP-complete, we introduce a heuristic approach GICA to solve the problem. To measure the performance of GICA, we also present the optimal method for the CARP problem.

7.2.1. Greedy Incremental Capacity (GICA)

According to Algorithm 3, the algorithm works as follows. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq226_HTML.gif denotes the set of centroid points that have been chosen to place RNs. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq227_HTML.gif denotes the set of centroid points of all shared regions. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq228_HTML.gif denotes the set of centroid points that have been chosen. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq229_HTML.gif denotes a current set of centroid points with each hosting one RN. At line 4, each centroid point in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq230_HTML.gif is added to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq231_HTML.gif and the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq232_HTML.gif is obtained. The procedure at line 5 calculates and stores the total throughput yielded by the Hungarian method based on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq233_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq234_HTML.gif denotes the calculated optimal association between MNs and RNs. After executing the procedure of lines 4 and 5 for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq235_HTML.gif times, the best next centroid point to place one RN is found (line 7) and added to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq236_HTML.gif (line 8). Therefore, after greedily choosing centroid points one by one for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq237_HTML.gif times, we can finally obtain the set of centroid points https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq238_HTML.gif to place RNs.
Algorithm 3: GICA.
GICA( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq239_HTML.gif )
1
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq240_HTML.gif ;
 
2
for i=1 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq241_HTML.gif
 
3
for j=1 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq242_HTML.gif
 
4
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq243_HTML.gif
 
5
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq244_HTML.gif RA-CARP( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq245_HTML.gif )
 
6
end for;
 
7
[maximum, index]=Max(value);
 
8
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq246_HTML.gif ;
 
9
end for;
 
10
return https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq247_HTML.gif ;
 

7.2.2. Optimal Solution to CARP Problem

We show that the RA-CARP can be formulated as a binary integer programming problem when RNs are placed at fixed positions. Subsequently, the GICA method utilizes the Hungarian method to greedily place one RN at an iteration. Therefore, the solutions yielded by GICA cannot be guaranteed optimal because the RN assignment and placement are considered separately. It would be natural to believe that only when we search all solution space can the optimal solution be produced.
Hereby we introduce two binary variables https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq248_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq249_HTML.gif    https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq250_HTML.gif denotes that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq251_HTML.gif is connected with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq252_HTML.gif and 0 otherwise; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq253_HTML.gif denotes that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq254_HTML.gif is placed at the centroid point of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq255_HTML.gif th shared region and 0 otherwise. Then we can jointly formulate the CARP problem as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ12_HTML.gif
(12)
Since the objective term https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq256_HTML.gif contains the product of two variables https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq257_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq258_HTML.gif , it is difficult to solve. According to [23], the product of multiple binary variables https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq259_HTML.gif can be substituted by a new variable https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq260_HTML.gif with two constraints that ensure that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq261_HTML.gif if there exists https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq262_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq263_HTML.gif if for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq264_HTML.gif . Therefore, we transform (12) into a binary integer programming problem shown as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_Equ13_HTML.gif
(13)
Now the CARP problem is formulated as a binary integer programming problem. We then utilize the branch and bound algorithm to solve it. The algorithm searches for an optimal solution by solving a series of LP-relaxation problems, in which the binary integer requirement on the variables https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq265_HTML.gif is replaced by the weaker constraint https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq266_HTML.gif . More details can be referred to [22].

7.3. Complexity Analysis

We first discuss the computation complexity of the Hungarian method to assign MNs when RNs are placed at fixed positions. According to [2], the complexity is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq267_HTML.gif .
Then we analyze the complexity of the GICA algorithm. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq268_HTML.gif denote the number of shared regions. Based on Algorithm 3, as the procedure on lines 4 to 5 is iterated https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq269_HTML.gif times, the computation complexity of the GICA algorithm is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq270_HTML.gif .
The optimal method to the CARP problem uses the branch and bound algorithm to solve a binary integer programming problem. As the number of binary variables is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq271_HTML.gif , the worst case complexity for the optimal method is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq272_HTML.gif . It is apparent that the complexity of the GICA algorithm is much lower than the optimal algorithm.

8. Simulation Results

In this section, we present the numerical results obtained from the simulation using high level programming language. For the CORP problem, we compare the performance of the GICO algorithm and the CES algorithm. For the CARP problem, we compare the performance of the GICA algorithm and the optimal algorithm. It is illustrated that the two greedy algorithms both merit close-to-optimal performance and low complexity.

8.1. Simulation Setup

We present the simulation results in a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq273_HTML.gif square disaster area. The CI values of each square are initially set as 5 or randomly chosen in the interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq274_HTML.gif in Table 1. We implement two initial distributions of MNs: 40 MNs assemble at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq275_HTML.gif or evenly divided at 4 corners https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq276_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq277_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq278_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq279_HTML.gif . Thus we can obtain four different scenarios with each of the two distributions of CI values when MNs follow each of the two initial deployments. The bandwidth for each channel is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq280_HTML.gif  Mbps. The area of each square is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq281_HTML.gif . Disaster relief efficiency coefficient is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq282_HTML.gif , which means each first responder can clear 1 unit of CI per unit time. The transmit power of MNs https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq283_HTML.gif is set to 1 watt. The transmitter and receiver antenna gains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq284_HTML.gif . The frequency is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq285_HTML.gif  Hz. The noise power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq286_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq287_HTML.gif  watt. The path loss exponent is set as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq288_HTML.gif . The transmission range https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq289_HTML.gif of MNs is set as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq290_HTML.gif meters.
Table 1
The initial configuration of CI values of squares in disaster area. The CI values are randomly chosen between the interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq291_HTML.gif .
Square index
1
2
3
4
5
6
7
8
9
10
1
2
10
10
5
9
2
5
10
8
10
2
7
1
9
10
7
8
8
4
7
2
3
8
1
3
1
1
9
7
4
10
1
4
5
4
8
8
2
5
5
7
8
8
5
3
7
7
2
2
5
10
4
6
3
6
8
3
6
7
9
10
6
2
2
3
7
9
3
9
3
10
4
2
3
7
5
8
4
9
6
6
10
3
8
8
4
6
9
1
1
6
8
10
2
6
5
1
4
10
2
8
4
6
2
7
3
7
7
8

8.2. Simulation Results for Maximal Coverage

We introduce coverage percentage as the measurement of coverage performance, which is defined as the ratio of the number of covered MNs to the total number of MNs working in the disaster area.
Figure 7 shows the covering percentage of four scenarios for the entire disaster area relief process. It is clear that GICO performs very close to the optimal CES algorithm. In addition, results of all four scenarios share a similarity; the covering percentage is quite high during both initial and final periods (equal to 1), while lower during the middle of the disaster area relief process. The reason is that in the middle of the process, all the MNs are working in many widely distributed busy squares within the disaster area, thus the covering percentage is low due to limited covering range of RNs. On the other hand, in both initial and final periods, MNs are located in only a few spatially close squares, which renders covering the MNs an easy task as long as the channel resources are abundant. It is also worth pointing out that results from Figure 7(c) vibrate more dynamically than other 3 subfigures. This phenomenon shows that the number of busy squares is relatively small during the disaster area relief process if the first responder starts from one location and the CI values are random.
Next, in Figure 8, we look at the average covering percentage over the entire disaster area relief process for four scenarios when the capability of each RN changes. As can be observed, both algorithms yield better coverage performance if each RN can support more MNs. This is because more channel resources brought by RNs can accommodate more MNs. In addition, it is worth mentioning that as the capability of RNs is enlarged, less improvement is rendered for the covering percentage. The reason is that when one RN can cover more MNs, less uncovered MNs are left to boost the covering percentage in the future. In the end, it is clear that the GICO algorithm produces close-to-optimal solutions.
In Figure 9, we compare the performance of GICO and CES in terms of the average covering percentage over the entire disaster area relief process when the number of RNs changes. It is clearly shown that the GICO algorithm produces close-to-optimal solutions. As expected, in all four scenarios, both GICO and CES yield better performance in terms of average covering percentage as the number of RNs increases. This can be explained by the fact that more channel resources brought by RNs can accommodate more MNs. The coverage percentage asymptotically approaches 1 when the number of RNs becomes more than 6 for one starting location and 10 for 4 starting locations. By comparing the 4 subfigures, we can point out that the two curves corresponding with the scenarios that MNs start from 1 corner rises more sharply than the curves demonstrating scenarios that MNs start from 4 corners. The rationale is that during early periods, when MNs start from 4 corners, MNs disperse quickly to more squares than the case starting from a single location. Then limited RNs would produce better performance with MNs more crowded. Therefore, when RNs are very limited, it is preferable to start the MNs from 1 corner for coverage-oriented DAWN.

8.3. Simulation Results for Maximal Throughput

In Figure 10, we look at the average total throughput over the entire disaster area relief process for four scenarios when the number of RNs changes. As expected, it can be noted that both algorithms yield better performance in terms of total link throughput when the number of RNs increases, which is due to the fact that more RNs can accommodate more MNs or produce more reliable links. In addition, it is worth mentioning that as the capability of RNs increases, less improvement is rendered for the total link throughput. This is because when the capacity of channels is larger, less chances are given for those uncovered MNs or MNs with unreliable links to improve the total throughput. By comparing the 4 subfigures, we can see that when the capability of RNs is small, GICA produces better results for the scenarios that MNs start from 1 corner than that of all MNs starting from 4 corners. This is because during early periods, when MNs start from one corner, MNs expand less quickly to more squares than the scenarios that MNs start from 4 corners. Therefore, when the capability of RNs is very limited, it is preferable to start MNs from 1 corner for capacity-oriented DAWN, too. In the end, it is easily seen that the GICA algorithm produces close-to-optimal solutions.
Next, in Figure 11, we look at the average total throughput over the entire disaster area relief process when the capability of RNs changes. It can be noted that for four scenarios, both algorithms yield better performance in terms of total link throughput when each RN can support more MNs. The rationale behind is that more channel resources brought by RNs can accommodate more MNs or produce more reliable links. In addition, it can be observed that as the capability of RNs is enlarged, less improvement is rendered for total link throughput. This is because when one RN can cover more MNs, less uncovered MNs are left. By comparing the 4 subfigures, it can be found that although the algorithms yield similar results for 4 different scenarios when the capability of RNs is small, the throughput performance converges at a higher value as the capability of RNs increases for scenarios that MNs start from 1 corner than scenarios that MNs start from 4 corners. This phenomenon stems from the fact that when MNs start from 1 corner, a smaller average number of busy squares are generated over the disaster relief process. Even when the capability for RNs is high, the network throughput performance still suffers from wide distribution of the MNs for scenarios that MNs start from 4 corners. Therefore, it is preferable to start MNs from 1 corner for capacity-oriented DAWN regardless of the capability of RNs. In the end, as can be observed, the GICA algorithm produces close-to-optimal solutions.

9. Conclusion

In this paper, we study the dynamic deployment of mobile relays in DAWN to enable and improve the communications for the first responders during their operations. A mobility model is used to capture the movement pattern of the MNs and their communications to the RNs. Given a fixed number of relay nodes, the optimization problem is to determine the locations of the RNs as the MNs move in the disaster area nomadically. Two performance objectives, including maximal node coverage and maximal network capacity, are considered, respectively, in this study.
In the coverage problem (CORP), the performance objective is to place the RNs that can connect the maximum number of MNs in the network. As a preliminary step, we employ a maximal matching method to find the optimal relay node assignment for the static network scenario, that is, all RNs are fixed. Subsequently, we present the greedy incremental coverage algorithm (GICO) and the optimal constrained exhaustive search (CES) algorithms. The GICO algorithm is suboptimal but with significantly less computational complexity than the CES algorithm. The simulation results show that GICO algorithm can achieve close to optimal performance at different network setup and configurations.
In the capacity problem (CARP), the performance objective is to maximize the aggregated network throughput for all MNs in the DAWN. As an initial step, we first consider the relay node assignment for the static case that can be solved using the Hungarian method. Similarly, we also present both the greedy incremental capacity algorithm (GICA) and the optimal algorithm. The optimal solution for CARP can be obtained through the binary integer programming approach but at much higher computational complexity. The simulation results show that the GICA algorithm can produce near optimal results.
In addition, it is observed that network generally yields better coverage and throughput performance for scenarios in which all MNs start from 1 corner than from 4 corners of a disaster area. The tradeoff is that it would require longer time to clear the entire disaster area. As a conclusion, we advocate using the greedy algorithms to determine the dynamic relay placement in the deployment of disaster area wireless networks, in which real-time computation is practically more important.

Appendices

A. Proof of Theorem 2

NP-completeness applies directly not to optimization problems, however, but to decision problems, in which the answer is simply "yes" or "no" [24]. We first present the decision problem CORP-D associated with the CORP problem as follows. Given a set of busy squares, the number of MNs in each square, the transmission range https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq348_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq349_HTML.gif RNs each with capability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq350_HTML.gif , is it possible to cover all MNs using exactly https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq351_HTML.gif RNs? To prove the NP-completeness of the CORP problem, it suffices to prove that the decision problem CORP-D is NP-complete.
We start by arguing that CORP-D https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq352_HTML.gif NP. Then we prove that the CORP-D problem is NP-hard by showing that MSC https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq353_HTML.gif CORP-D, ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq354_HTML.gif denotes a transformation of polynomial time. MSC denotes the NP-complete minimum set cover problem). Because the CORP-D problem is both NP and NP-hard, it is NP-complete.
To show CORP-D https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq355_HTML.gif NP, we deploy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq356_HTML.gif RNs in the shared regions. Then to find if such deployment of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq357_HTML.gif RNs can cover all MNs is tantamount to solving the RA-CORP problem. As the RA-CORP problem has been proved to be solved in polynomial time, CORP-D https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq358_HTML.gif NP.
We next prove that MSC https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq359_HTML.gif CORP-D, which shows that CORP-D is NP-hard. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq360_HTML.gif be an instance of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq361_HTML.gif problem, where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq362_HTML.gif denotes the collection of subsets of a set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq363_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq364_HTML.gif denotes the minimum cardinality of the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq365_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq366_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq367_HTML.gif . To obtain an instance of the CORP-D problem we only need to define the capacity bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq368_HTML.gif for each RN. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq369_HTML.gif be the number of all MNs. Then we build the relationship between instances of the CORP-D problem and the MSC problem as follows. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq370_HTML.gif Each element in the set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq371_HTML.gif corresponds to one MN; https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq372_HTML.gif each shared region corresponds with one subset https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq373_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq374_HTML.gif    https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq375_HTML.gif is covered by the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq376_HTML.gif th shared region if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq377_HTML.gif . Then we must prove that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq378_HTML.gif RNs can cover all MNs if, and only if, there exists https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq379_HTML.gif , such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq380_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq381_HTML.gif .
First, suppose that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq382_HTML.gif MNs in a set of busy squares can be covered by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq383_HTML.gif RNs, each with a capacity of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq384_HTML.gif . Then for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq385_HTML.gif deployed at one shared region, the corresponding subset is chosen as one element in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq386_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq387_HTML.gif RNs can cover all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq388_HTML.gif MNs, it is easy to see that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq389_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq390_HTML.gif .
Now assume that there exists https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq391_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq392_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq393_HTML.gif . For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq394_HTML.gif we can place one RN https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq395_HTML.gif at the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq396_HTML.gif th shared region. In the meantime, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq397_HTML.gif covers https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq398_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq399_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq400_HTML.gif all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq401_HTML.gif MNs are covered by the RNs. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq402_HTML.gif , the number of RNs placed is no larger than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq403_HTML.gif .
Thus we have shown that the CORP-D problem is NP-complete, which completes the proof.

B. Proof of Theorem 4

We start by arguing that CARP-D https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq404_HTML.gif NP (CARP-D is the decision problem associated with the CARP problem). Then we prove that CARP-D is NP-hard by showing that CORP-D https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq405_HTML.gif CARP-D. Because the problem CARP-D is both NP and NP-hard, the problem CARP is NP-complete.
To show CARP-D https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq406_HTML.gif NP, we deploy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq407_HTML.gif RNs in the shared regions. Then to find if such deployment of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq408_HTML.gif RNs can produce the objective amount of throughput is tantamount to solving the RA-CARP problem. As the RA-CARP problem has been proved to be solved in polynomial time, the problem CARP-D https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq409_HTML.gif NP.
We next prove that CORP-D https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq410_HTML.gif CARP-D, which shows that the problem CARP-D is NP-hard. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq411_HTML.gif and a positive integer https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq412_HTML.gif be an instance of the CORP-D problem. To obtain an instance of the CARP-D problem we only need define the capacity of each link between one MN and RN. Let the capacity for every link between each RN and MN be 1 unit. Then we recognize the instance of the CARP-D problem the same as the instance of the CORP-D problem. This transformation surely consumes polynomial time. Subsequently, we must prove that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq413_HTML.gif units of throughput can be produced if and only if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq414_HTML.gif MNs can be covered by the same set of RNs.
First, suppose that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq415_HTML.gif MNs in a set of busy squares can be covered by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq416_HTML.gif RNs. Then for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq417_HTML.gif covered by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq418_HTML.gif , one link is established between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq419_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq420_HTML.gif to produce one unit of capacity. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq421_HTML.gif MNs are covered, it is easy to see that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq422_HTML.gif units of throughput can be produced.
Now we assume that the overall network capacity is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq423_HTML.gif units. Then for each link between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq424_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq425_HTML.gif , we render https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq426_HTML.gif cover https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq427_HTML.gif . As there are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq428_HTML.gif links available, each associated with one MN, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F251314/MediaObjects/13638_2009_Article_1617_IEq429_HTML.gif MNs can be covered by the same set of RNs.
Thus we have shown that the problem CARP-D is NP-complete, which completes the proof.

Acknowledgments

This work has been supported in part by the National Science Foundation (NSF) through Award ECS-0725522 and by the Faculty Advancement in Research Awards from WPI. This work was presented in part at 3rd Intl. Conf. Wireless Algorithms, Systems and Applications, 2008.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Guo W, Huang X, Liu Y: Dynamic relay deployment for disaster area wireless networks. Wireless Communications and Mobile Computing 2008. Guo W, Huang X, Liu Y: Dynamic relay deployment for disaster area wireless networks. Wireless Communications and Mobile Computing 2008.
2.
Zurück zum Zitat Kuhn HW: The hungarian method for the assignment problem. Naval Research Logistics Quarterly 1955., 2(1-2): Kuhn HW: The hungarian method for the assignment problem. Naval Research Logistics Quarterly 1955., 2(1-2):
3.
Zurück zum Zitat Hiroaki U, Jun T, Kazuki S, Takaaki U, Teruo H: A manet based system for gathering location and personal information from victims in disasters. IEIC Technical Report 2005, 105(260):13-18. Hiroaki U, Jun T, Kazuki S, Takaaki U, Teruo H: A manet based system for gathering location and personal information from victims in disasters. IEIC Technical Report 2005, 105(260):13-18.
4.
Zurück zum Zitat Kanchanasut K, Tunpan A, Awal MA, Das DK, Wongsaardsakul T, Tsuchimoto Y: A multimedia communication system for collaborative emergency response operation in disaster-affected areas. Internet Education and Research Laboratory, Asian Insitute of Technology, Bangkok, Thailand; January 2007. Kanchanasut K, Tunpan A, Awal MA, Das DK, Wongsaardsakul T, Tsuchimoto Y: A multimedia communication system for collaborative emergency response operation in disaster-affected areas. Internet Education and Research Laboratory, Asian Insitute of Technology, Bangkok, Thailand; January 2007.
5.
Zurück zum Zitat Malan D, Fulford-Jones T, Welsh M, Moulton S: An ad hoc sensor network infrastructure for emergency medical care. Proceedings of the Workshop on Applications of Mobile Embedded Systems in Conjunction with the 2nd International Conference on Mobile Systems, Applications and Services (Mobisys '04), June 2004, Boston, Mass, USA Malan D, Fulford-Jones T, Welsh M, Moulton S: An ad hoc sensor network infrastructure for emergency medical care. Proceedings of the Workshop on Applications of Mobile Embedded Systems in Conjunction with the 2nd International Conference on Mobile Systems, Applications and Services (Mobisys '04), June 2004, Boston, Mass, USA
6.
Zurück zum Zitat Zussman G, Segall A: Energy efficient routing in ad hoc disaster recovery networks. Ad Hoc Networks 2003, 1(4):405-421. 10.1016/S1570-8705(03)00041-6CrossRef Zussman G, Segall A: Energy efficient routing in ad hoc disaster recovery networks. Ad Hoc Networks 2003, 1(4):405-421. 10.1016/S1570-8705(03)00041-6CrossRef
7.
Zurück zum Zitat Shibata Y, Sato Y, Ogasawara N, Chiba G: Ballooned wireless mesh network for emergency information system. Proceedings of the 22nd International Conference on Advanced Information Networking and Applications-Workshops (WAINA '08), March 2008, Quebec, Canada 1118-1122. Shibata Y, Sato Y, Ogasawara N, Chiba G: Ballooned wireless mesh network for emergency information system. Proceedings of the 22nd International Conference on Advanced Information Networking and Applications-Workshops (WAINA '08), March 2008, Quebec, Canada 1118-1122.
8.
Zurück zum Zitat Frost V, Melamed B: Traffic modeling for telecommunications networks. IEEE Communications Magazine 1994, 32(3):70-81. 10.1109/35.267444CrossRef Frost V, Melamed B: Traffic modeling for telecommunications networks. IEEE Communications Magazine 1994, 32(3):70-81. 10.1109/35.267444CrossRef
9.
Zurück zum Zitat Leung KK, Massey WA, Whitt W: Traffic models for wireless communication networks. IEEE Journal on Selected Areas in Communications 1994, 12(8):1353-1364. 10.1109/49.329340CrossRef Leung KK, Massey WA, Whitt W: Traffic models for wireless communication networks. IEEE Journal on Selected Areas in Communications 1994, 12(8):1353-1364. 10.1109/49.329340CrossRef
10.
Zurück zum Zitat Lo C, Wolff R, Bernhardt R: An estimate of network database transaction volume to support universal personal communications service. Proceedings of the 1st International Conference on Universal Personal Communications (ICUPC '92), September-October 1992, Dallas, Tex, USA 1-6. Lo C, Wolff R, Bernhardt R: An estimate of network database transaction volume to support universal personal communications service. Proceedings of the 1st International Conference on Universal Personal Communications (ICUPC '92), September-October 1992, Dallas, Tex, USA 1-6.
11.
Zurück zum Zitat Bouchard RJ, Pyers CE: Use of gravity model for describing urban travel. Highway Research Record 1965, 88: 1-43. Bouchard RJ, Pyers CE: Use of gravity model for describing urban travel. Highway Research Record 1965, 88: 1-43.
12.
Zurück zum Zitat Lam D, Cox DC, Widom J: Teletraffic modeling for personal communications services. IEEE Communications Magazine 1997, 35(2):79-87. 10.1109/35.565664CrossRef Lam D, Cox DC, Widom J: Teletraffic modeling for personal communications services. IEEE Communications Magazine 1997, 35(2):79-87. 10.1109/35.565664CrossRef
13.
Zurück zum Zitat Markoulidakis JG, Lyberopoulos GL, Tsirkas DF, Sykas ED: Mobility modeling in third-generation mobile telecommunications systems. IEEE Personal Communications 1997, 4(4):41-56. 10.1109/98.612276CrossRef Markoulidakis JG, Lyberopoulos GL, Tsirkas DF, Sykas ED: Mobility modeling in third-generation mobile telecommunications systems. IEEE Personal Communications 1997, 4(4):41-56. 10.1109/98.612276CrossRef
14.
Zurück zum Zitat Slater PB: International migration and air travel: global smoothing and estimation. Applied Mathematics and Computation 1993, 53(2-3):225-234. 10.1016/0096-3003(93)90103-LCrossRef Slater PB: International migration and air travel: global smoothing and estimation. Applied Mathematics and Computation 1993, 53(2-3):225-234. 10.1016/0096-3003(93)90103-LCrossRef
15.
Zurück zum Zitat Aschenbruck N, Gerhards-Padilla E, Gerharz M, Frank M, Martini P: Modelling mobility in disaster area scenarios. Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM '07), October 2007, Chania, Greece 4-12.CrossRef Aschenbruck N, Gerhards-Padilla E, Gerharz M, Frank M, Martini P: Modelling mobility in disaster area scenarios. Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM '07), October 2007, Chania, Greece 4-12.CrossRef
16.
Zurück zum Zitat Nelson S, Harris A, Kravets R: Eventdriven, rolebased mobility in disaster recovery networks. Proceedings of the 2nd Workshop on Challenged Networks (CHANTS '07), September 2007, Montréal, Canada Nelson S, Harris A, Kravets R: Eventdriven, rolebased mobility in disaster recovery networks. Proceedings of the 2nd Workshop on Challenged Networks (CHANTS '07), September 2007, Montréal, Canada
17.
Zurück zum Zitat Kim S, Ko J-G, Yoon J, Lee H: Multiple-objective metric for placing multiple base stations in wireless sensor networks. Proceedings of the 2nd International Symposium on Wireless Pervasive Computing (ISWPC '07), Feburary 2007 627-631. Kim S, Ko J-G, Yoon J, Lee H: Multiple-objective metric for placing multiple base stations in wireless sensor networks. Proceedings of the 2nd International Symposium on Wireless Pervasive Computing (ISWPC '07), Feburary 2007 627-631.
18.
Zurück zum Zitat Shi Y, Hou YT: Approximation algorithm for base station placement in wireless sensor networks. Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '07), June 2007, San Diego, Calif, USA 512-519. Shi Y, Hou YT: Approximation algorithm for base station placement in wireless sensor networks. Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON '07), June 2007, San Diego, Calif, USA 512-519.
19.
Zurück zum Zitat Hou YT, Shi Y: Optimal base station selection for anycast routing in wireless sensor networks. IEEE Transactions on Vehicular Technology 2006, 55(3):813-821. 10.1109/TVT.2006.873822MathSciNetCrossRef Hou YT, Shi Y: Optimal base station selection for anycast routing in wireless sensor networks. IEEE Transactions on Vehicular Technology 2006, 55(3):813-821. 10.1109/TVT.2006.873822MathSciNetCrossRef
20.
Zurück zum Zitat Pan J, Hou YT, Cai L, Shi Y, Shen S: Topology control for wireless sensor networks. Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (ICDCS '99), August 1999, Seattle, Wash, USA Pan J, Hou YT, Cai L, Shi Y, Shen S: Topology control for wireless sensor networks. Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (ICDCS '99), August 1999, Seattle, Wash, USA
21.
Zurück zum Zitat Pothen A, Fan C: Computing the block triangular form of a sparse matrix. ACM Transactions on Mathematical Software 1990, 16(4):303-324. 10.1145/98267.98287MATHMathSciNetCrossRef Pothen A, Fan C: Computing the block triangular form of a sparse matrix. ACM Transactions on Mathematical Software 1990, 16(4):303-324. 10.1145/98267.98287MATHMathSciNetCrossRef
22.
Zurück zum Zitat Wolsey LA: Integer Programming. John Wiley & Sons, New York, NY, USA; 1998.MATH Wolsey LA: Integer Programming. John Wiley & Sons, New York, NY, USA; 1998.MATH
23.
Zurück zum Zitat Belegundu AD, Chandrupatla TR: Optimization Concepts and Applications in Engineering. Prentice-Hall, Upper Saddle River, NJ, USA; 1999.MATH Belegundu AD, Chandrupatla TR: Optimization Concepts and Applications in Engineering. Prentice-Hall, Upper Saddle River, NJ, USA; 1999.MATH
24.
Zurück zum Zitat Cormen T, Leiserson C, Rivest R, Stein C: Introduction to Algorithms. MIT Press, Cambridge, MA, USA; 2002. Cormen T, Leiserson C, Rivest R, Stein C: Introduction to Algorithms. MIT Press, Cambridge, MA, USA; 2002.
Metadaten
Titel
On Coverage and Capacity for Disaster Area Wireless Networks Using Mobile Relays
verfasst von
Wenxuan Guo
Xinming Huang
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/251314

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe