Next Article in Journal
Wireless Sensor Network-Based Service Provisioning by a Brokering Platform
Next Article in Special Issue
A Protocol Layer Trust-Based Intrusion Detection Scheme for Wireless Sensor Networks
Previous Article in Journal
Easy and Fast Reconstruction of a 3D Avatar with an RGB-D Sensor
Previous Article in Special Issue
DCE: A Distributed Energy-Efficient Clustering Protocol for Wireless Sensor Network Based on Double-Phase Cluster-Head Election
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Power Allocation Based on Data Classification in Wireless Sensor Networks

1
School of Mechanical and Electrical Engineering, China University of Mining & Technology, Xuzhou 221116, China
2
Jiangsu Key Laboratory of Mine Mechanical and Electrical Equipment, China University of Mining & Technology, Xuzhou 221116, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2017, 17(5), 1107; https://doi.org/10.3390/s17051107
Submission received: 29 March 2017 / Revised: 8 May 2017 / Accepted: 10 May 2017 / Published: 12 May 2017
(This article belongs to the Collection Smart Communication Protocols and Algorithms for Sensor Networks)

Abstract

:
Limited node energy in wireless sensor networks is a crucial factor which affects the monitoring of equipment operation and working conditions in coal mines. In addition, due to heterogeneous nodes and different data acquisition rates, the number of arriving packets in a queue network can differ, which may lead to some queue lengths reaching the maximum value earlier compared with others. In order to tackle these two problems, an optimal power allocation strategy based on classified data is proposed in this paper. Arriving data is classified into dissimilar classes depending on the number of arriving packets. The problem is formulated as a Lyapunov drift optimization with the objective of minimizing the weight sum of average power consumption and average data class. As a result, a suboptimal distributed algorithm without any knowledge of system statistics is presented. The simulations, conducted in the perfect channel state information (CSI) case and the imperfect CSI case, reveal that the utility can be pushed arbitrarily close to optimal by increasing the parameter V, but with a corresponding growth in the average delay, and that other tunable parameters W and the classification method in the interior of utility function can trade power optimality for increased average data class. The above results show that data in a high class has priorities to be processed than data in a low class, and energy consumption can be minimized in this resource allocation strategy.

1. Introduction

Wireless sensor networks typically consist of distributed battery-equipped sensors which aim to monitor a given area by sensing relevant physical information. One practical example of these kinds of networks is the monitoring in coal mines, because condition monitoring and failure diagnosis are essential to environmental security and equipment operation safety in coal mines and wireless sensor networks can better adapt to complex environments without wiring [1,2,3]. In practice, the memory, power supply and processing capacity of sensor nodes are limited, and the environment in coal mines is very harsh, making it difficult to replace and recharge batteries manually and the nodes’ energy can be exhausted easily. Although there are increasingly innovative energy harvesting methods, such as wireless energy harvesting [4,5], and wind energy harvesting [6,7], which can potentially prolong the lifetime of wireless sensor networks, how to allocate power and use energy effectively is still a problem.
Aiming at resolving this problem, a number of studies have been launched. Xu formulated a new energy-efficient packet scheduling problem by adopting a recently developed channel capacity formula for finite blocklength codes [8]. Gong implemented a generic algorithm to search for an energy-cost-effective schedule under volatile energy price conditions with the constraint of due dates [9]. Suto et al. proposed an energy-efficient and delay-aware wireless computing system (E2DA-WCS) that can control the sleep schedules of nodes and the number of links to minimize the power consumption, while providing an acceptable delay constraint [10]. In [11], the optimal schedules were generated to maximize the delay-tolerant throughput of an energy harvesting powered wireless link with negligible circuit power in time-invariant channels. An auction model with multiple auctioneers, multiple bidders and hybrid divisible/indivisible commodities was proposed to solve channel bands and cooperative transmit power competitions among secondary users [12].
Some authors have also considered interference and imperfect channel state information (CSI) in resource allocation of wireless networks. In [13], the authors derived a fundamental relation providing the largest feasible cellular Signal-to-Interference-PlusNoise Ratio (SINR) to quantify ear-far effects with universal frequency reuse. Then the authors proposed a distributed utility-based SINR adaptation at femtocells in order to alleviate cross-tier interference at the macrocell from co-channel femtocells. In [14], the authors applied the dual decomposition method and proposed a resource allocation scheme for co-channel femtocells, which aimed to maximize the capacity for both delay-sensitive users and delay-tolerant users subject to a delay-sensitive users’ QoS constraint and an interference constraint imposed by the macrocell. In [15], the authors considered imperfect hybrid spectrum sensing, cross-tier interference mitigation, minimum data rate requirement and energy efficiency. An iterative power control algorithm and a near optimal sensing time scheme are developed in an asymptotically optimal manner. In [16], minimum outage probability requirement and fairness are also considered, a unified analytical framework is proposed for the optimization problem, where the near optimal cooperative bargaining resource allocation strategy is derived based on Lagrangian dual decomposition by introducing time-sharing variables and recalling the Lambert-W function. In [17], the authors proposed an asymptotically optimal algorithm based on the dual decomposition method and a heuristic algorithm based on alternating optimization respectively, in order to solve the mixed integer programming and non-convex problem in the subcarrier assignment, subcarrier pairing and power allocations.
However, in those existing works, the special situation in coal mines that the network traffic may be unbalanced because the amount of data arriving at different nodes may be different is ignored. This are many reasons for this in coal mines. Data acquisition rates may differ in different application environments such as the detection of gears and bearings in the structural health monitoring systems [18,19,20]. Heterogeneous nodes may sample different sorts of physical information such as gas, vibration and image, producing different data flows in wireless sensor networks. In some cases, if mechanical equipment fails or will fail, soaring amounts of data will emerge in the corresponding sensors, waiting to be transmitted, which leads to an unbalanced distribution of network traffic. Hence the transmission mechanism should make comprehensive assessment of the number of arriving data, queue lengths and channel states to allocate power properly and prevent a certain queue from reaching the maximum size earlier. If not handled properly, important data may be dropped [21].
In this paper, power is allocated effectively based on channel states and the data classification. A kind of data classification based on the number of arriving data packets is applied in this paper. The arriving data with a larger number of packets has a higher priority. Then Lyapunov drift optimization is applied to schedule network resources considering the channel states, classified data and QoS requirements, because Lyapunov drift optimization can stabilize the system and optimize communication queue scheduling performance without arrival rate and channel state statistics [22,23,24]. Finally, a suboptimal strategy is proposed in which power is allocated dynamically in reaction to the current channel state, the queue backlog, the data class and the weight factor. The algorithm is simulated under scenarios with the perfect CSI and imperfect CSI, respectively. Although our study is similar to [25] at first glance, in fact we aim to control and constrain queue lengths in advance by transmitting classified data with a higher priority first. As a result, the Lyapunov drift optimization is utilized to minimize the weight sum of the average power and the average data class.
The paper is organized as follows: in the next section, a wireless sensor network model is described and the optimization problem is formulated. The proposed framework is presented in Section 3. Performance evaluation results under the scenarios with perfect CSI and imperfect CSI are discussed in Section 4. Finally, in Section 5, we draw the main conclusions of our work.

2. Problem Definition

A network model of multiple transmitters and one receiver is included in the current wireless sensor networks [26,27,28]. Provided that data can be sent to the fusion center directly with N nodes and L links, each source node will put packets into the transmission queue in accordance with FIFO principle, as shown in Figure 1.
The incoming data is assumed to leave the network once it is sent over a transmission link l { 1 , , L } . Let S l ( t ) represent the channel state over the link l , which is time-varying and finite. Let μ l ( P l ( t ) , S l ( t ) ) represent the transmission rate over link l during slot t , and μ l ( P l ( t ) , S l ( t ) ) is a continuous function of the power P l ( t ) for each channel state S l ( t ) , abbreviated as μ l ( P l , S l ) , for the whole network μ ( P , S ) = ( μ 1 ( P 1 , S 1 ) , μ L ( P L , S L ) ) . Let P ( t ) = ( P 1 ( t ) , , P L ( t ) ) represent the power allocated over links during every slot t and P l ( t ) is limited by a peak value P p e a k according to the discrete ON/OFF power constraint P l { 0 , P p e a k } . If P l > 0 for some link, then P l ˜ = 0 , l ˜ l , namely P ( t ) Ι . The arriving data and channel states are assumed to be ergodic with the arrival rate λ = ( λ 1 , , λ L ) and the channel probability π S i Pr [ S l = S i ] . A ( t ) = ( A 0 ( t ) , , A L ( t ) ) is given as the number of packets arriving for transmission over links; The data is classified based on the following principle:
Ψ l = f ( A l ( t ) ) = { r 1 , 0 A l ( t ) a r 2 , a A l ( t ) b r n , c A l ( t )
r is the class level, a , b , c is the boundary, and Ψ = f ( A ( t ) ) = ( Ψ 0 , , Ψ L ) is the class vector. When the channel state over link l is S i , the probability of chosen P k S i is α k S i , equaling to the probability of μ l ( P k S i , S i ) , and the probability of the data with a class admitted into a queue is β k S i . Then an ideal power allocation strategy should solve the following problems:
Min   :   S i π S i ( k = 1 α k S i P k S i + W k = 1 β k S i Ψ k S i )
S . T . : μ a v S i π S i k = 1 α k S i μ ( P k S i , S i ) λ   k k = 1 α k S i = 1 , α k S i > 0 , f o r   a l l   k , S i k = 1 β k S i = 1 , β k S i > 0 , f o r   a l l   k , S i P Ι
Our target in (2) is to minimize power consumption and the class of data received by the fusion center (the larger the number of packets is, the smaller the class function Ψ l is). W is a weight factor representing on “importance weight” on how much we emphasize the average level of the data admitted; Constraint 3 guarantees the stability of the network, namely rate vector λ strictly in the internal network capacity Λ [29]. Although the objective function and constraints can be formulated, it is hard to solve the problem without any prior probability knowledge. Even though these parameters are obtained, the large amount of calculation will not make it very suitable [30].

3. Power Allocation Based on Data Classification

In this paper, a Lyapunov optimization algorithm is applied to solve the aforementioned problems. Define the queue backlog U ( t ) = ( U 1 ( t ) , , U l ( t ) ) , representing queue length waiting to be sent. The l th queueing dynamic are:
U l ( t + 1 ) = max [ U l ( t ) μ l ( P l ( t ) , S l ( t ) ) , 0 ] + A l ( t )
Define the Lyapunov function:
L ( U ( t ) ) = l U l ( t ) 2
Now, define Δ U ( t ) as the Lyapunov drift for slot t:
Δ U ( t ) = E { L ( U ( t + 1 ) L ( U ( t ) ) ) }
Drift plus penalty is obtained as:
Δ U ( t ) + V l E { ( P l + W Ψ l ) | U ( t ) }
V is the penalty factor and W is the weight factor. V and W can be considered as weight factors of the power and data class, respectively. When V and W are changed, the importance of P and Ψ will be adjusted. According to the Lyapunov drift theorem, by minimizing (6), we can achieve a stable network system and the minimization of the object function. Admittedly, any control decision meeting constraints (3) satisfies the following inequality at any slot t:
Δ U ( t ) + V l E { ( P l + W Ψ l ) | U ( t ) } = l E [ U l ( t + 1 ) 2 U l ( t ) 2 ] + V l E { ( P l + W Ψ l ) | U ( t ) } = l E [ ( max [ U l ( t ) μ l ( P l ( t ) , S l ( t ) ) , 0 ] + A l ( t ) ) 2 U l ( t ) 2 ] + V l E { ( P l + W Ψ l ) | U ( t ) } l E [ U l ( t ) 2 + A l ( t ) 2 + μ l ( P l ( t ) , S l ( t ) ) 2 + 2 U l ( t ) ( A l ( t ) μ l ( P l ( t ) , S l ( t ) ) ) U l ( t ) 2 ] + V l E { ( P l + W Ψ l ) | U ( t ) } = B + 2 l U l ( t ) λ l E { l [ 2 U l μ l ( P l , S l ) V ( P l + W Ψ l ( A l ) ) ] | U ( t ) }
where B being is a fixed constant that satisfies the following inequality:
B E { l [ A l 2 ( t ) + μ l 2 ( t ) ] }
To minimize the Lyapunov bound is to minimize the right hand side of the inequality (8). Hence, a suboptimal strategy is acquired: observe U ( t ) , S ( t ) and Ψ ( t ) every slot t , and allocate power vector P ( t ) = ( P 1 ( t ) , , P L ( t ) ) according to the following rules:
M a x : l [ 2 U l μ l ( P l , S l ) V ( P l + W Ψ l ) ] S . T . : P Ι
Although (10) gives a solution to the power allocation problem of (2) and (3), an algorithm to provide the execution structure and the executing entity for the equations still needs to be designed. Therefore, we propose Algorithm 1 as an implementation of our resource scheduling solution.
Algorithm 1: Power Allocation Based on Data Classification
1.Every node measures the channel state S l and data class Ψ l
2.Calculate Z l = 2 U l μ l ( P l , S l ) V ( P l + W Ψ l )
3.repeat
4.if Z l 0
5.   P l = 0
6.else
7.  for i = 1 to L−1
8.    max( Z l , Z i ), i l
9.    If max( Z l , Z i )== Z l
10.       P l = 1
11.    else
12.       P l = 0
13.    end for
14.    i = i + 1
15.  end for
16.end for
17.Update Z i , i l , i { 1 , 2 , 3 , L 1 }

4. Performance Analysis

4.1. Stability Proof and Complexity Analysis

If λ is strictly interior to the network capacity Λ , there exists a positive value ε such that λ + ε Λ (where ε is the L–dimensional vector with all entries equal to ε ) and a stationary power allocation rule exists [25]:
E { μ ( P ( t ) , S ( t ) ) } λ + ε > λ
Plugging the above inequality into Equation (8) gives:
E { L ( U ( t + 1 ) ) L ( ( U ( t ) ) ) } + V l E { P l ( t ) + W Ψ l ( t ) | U ( t ) } B ε l E { U l ( t ) } + V ( P * + W Ψ * )
where the utility is defined as Y ( t ) = P ( t ) + W Ψ ( t ) , and our target is to make the time average utility arbitrarily close to the target cost level Y * = P * + W Ψ * . Because drift conditions can be satisfied at all slots, the following formula is accessible after a total of T iterations:
E { L ( U ( T ) ) L ( U ( 0 ) ) } T + V T t = 0 T 1 l E { [ P l ( t ) + W Ψ l ( t ) ] | U ( t ) } B ε T t = 0 T 1 l E { U l ( t ) } + V ( P * + W Ψ * )
Rearranging, we find:
1 T t = 0 T 1 l E { U l ( t ) } B + V ( P * + W Ψ * ) + E { L ( U ( 0 ) ) } / T ε B + V ( P * + W Ψ * ) + E { L ( U ( 0 ) ) } / T ε max
1 T t = 0 T 1 l E { [ P l ( t ) + W Ψ l ( t ) ] | U ( t ) } P * + W Ψ * + B V + E { L ( U ( 0 ) ) } V T
Taking limits as T yields the time average bound:
l U l ¯ lim T 1 T t = 0 T 1 l E { U l ( t ) } B + V ( P * + W Ψ * ) ε max
Y ¯ = lim T 1 T t = 0 T 1 l E { [ P l ( t ) + W Ψ l ( t ) ] | U ( t ) } P * + W Ψ * + B V
Further expand formula (12), yielding:
Ψ ¯ B V W + P * P ¯ W + Ψ *
P ¯ B V + W ( Ψ * Ψ ¯ ) + P *
In [22,31], it is shown that this time average backlog bound implies system stability from Equation (11). The performance bounds in Equations (11) and (12) demonstrate an [ O ( V ) , O ( 1 / V ) ] utility-backlog tradeoff: an arbitrarily large V can be used to make B/V arbitrarily small, so that Equation (12) implies the time average utility Y is arbitrarily close to the optimum Y * . This comes with a tradeoff: The average queue backlog bound in Equation (11) is O ( V ) . In Algorithm 1, the calculation of max ( Z l , Z i ) in step 9 for every sensor entails L operations. Therefore, the complexity of the proposed distributed algorithm is O(L).

4.2. Simulation Analysis

To analyze how the control parameters make a utility-backlog trade-off and power-class trade-off, let N = 2 in Figure 1, i.e., a single-hop network with two transmitters and one receiver. A channel has three states, “G”, “B” and “M”, where the maximum number of packets transmitted is 3, 2 and 1 in every slot, respectively. The simulations are conducted under perfect CSI and imperfect CSI cases. The probability distribution of the three channel states is shown in Table 1 for the perfect CSI scenario, where all the simulation parameters are equal to those given in [25]. On the other hand, in the imperfect CSI case, the probabilities of correct detection and false detection of the channel state are 90% and 10%, respectively. For example, if the current channel state is detected as [G,M], then the practical channel state, in reality, is that [G,M] occupies 90%, [M,B]: 2.5%, [M,M]: 2.5%, [G,B]: 2.5%, and [M,G]: 2.5%. Two nodes transmit data to a fusion center according to Poisson processes with rates λ 1 = 8 / 9 , λ 2 = 5 / 9 . The arriving data is divided into three classes according to the number of packets as shown in the Table 2. It is obvious that the larger the number of data packets is, the smaller the class is, and the higher the priority is.
The algorithm was simulated under four different values of the control parameter V, six different values of the weight parameter W and 20 different values of classification methods. Each simulation was run for 10 million time slots. Next, we observe how V, W and classification methods determine the average backlog, average utility, average power and average class.

4.2.1. Parameters V and W

According to Little’s theorem, the average delay is equal to the average queue backlog divided by the average arriving rate, so the average queue backlog reflects network delay to some extent. In Figure 2, the average queue backlog increases with V and W from the bottom 2.521 (V = 0.01, W = 0.01) to the highest point 12,530 (V = 100, W = 100) in the perfect CSI case, as suggested in Equation (11). Table 3 shows the average backlog in prefect CSI case subtracted from average backlog in imperfect CSI case increases with V and Table 4 shows V can also increase the difference in different classes. It can be found in Figure 3 that the delay in a high class is larger than the one in a low class, that the average backlog in different levels increases with V and W, whose trend is similar to the total average queue backlog, and that the differences of the delay among each level become bigger and bigger.
The utility grows from the bottom 0.9234 (V = 0.01, W = 0.01) to the top 131.5452 (V = 100, W = 100) in Figure 4b. Actually, W itself belongs to the inside parameter of the utility, thus its growth naturally increases the utility. In terms of V, the average utility decreases with parameter V and tends to converge in Figure 4a, which means adjusting parameter V can make a trade-off between the queue backlog and the utility. The difference between average utility with different classes in the imperfect CSI case and the perfect CSI case increases with V and W, shown in Table 5.
It can be discovered that the average power and the average class are both under the determination of V and W in inequalities (13) and (14). Meanwhile the average power and the average class are influenced by each other, owing to the term P ¯ in the inequality (13) and Ψ ¯ in inequality (14). With the increase of V and W, the average data class rapidly decreases and eventually stabilizes at 1.3102 in Figure 5. In Table 6, the difference between average data class in the imperfect CSI case and the perfect CSI case is very small, ranging from 0.0016 to 0.04906. In terms of average power, it monotonically declines with the parameter V and does not monotonically decrease with the parameter W, but with a fluctuant reduction in Figure 6b. The phenomenon may be caused by the term W ( Ψ * Ψ ¯ ) in Formula (14). With growing W, Ψ ¯ decreases while Ψ * Ψ ¯ increases, and this makes the variation tendency of term W ( Ψ * Ψ ¯ ) uncertain and then leads to the result in Figure 6. In Table 7, the difference between average power in the imperfect CSI case and the perfect CSI case is also very small, ranging from 0.0006 to 0.0162.

4.2.2. Parameter Ψ

The above simulations are conducted under the condition of data divided into three classes and a data classification method shown in Table 2. Thus, the classification number and classification methods should be studied, and here the effect of two factors on the average power is considered especially. All possible classification methods are considered and simulated in this section. Due to arriving data in line with the Poisson distribution, the probability of A l ( t ) 5 is very little according to the probability density function, so that the data is not split when A l ( t ) 5 in simulations. The arriving data is divided into 2, 3 and 5 class levels, respectively, in the corresponding simulations. For example, when the number of classification is 2, all the classification methods are listed in Table 8. When the number is chosen as 3 and 5, the classification methods are similar in principle; therefore it is unnecessary to go into detail.
The error bar graph for the power versus the number of classification is obtained when V = 1 ,   W = 1 chosen for convenience in Figure 7. When the number of classification changes from 2 to 5, the average power drops by 16.47% in the prefect CSI case and by 20.44% in the imperfect CSI case. The variation range is minimal and the standard deviation is 6.08 × 10 4 in the prefect CSI case and 1.45 × 10 3 in the imperfect CSI case when classification number equals 2. In contrast, when classification number equals 3, the variation is maximal and the standard deviation is 0.033 in the prefect CSI case and 0.028 in the imperfect CSI case. From Table 3, Table 4, Table 5, Table 6 and Table 7 and Figure 7, we can discover that the differences between the simulation values in the perfect CSI case and the imperfect CSI case are relatively small.

4.2.3. Comparisons

Here simulation results of our network control algorithm are presented to compare with EECA [25] in the perfect CSI case. Three curves are acquired with W = 0.1 , W = 1 and W = 10 in Figure 8. There are five points in each curve in correspondence to V = 1 , V = 10 , V = 50 , V = 100 and V = 1000 . The convergence is 0.518, 0.525 and 0.528 respectively when W = 0.1 , W = 1 and W = 10 while the convergence in EECA is 0.518. Small W can push the curve close to EECA, because W 0 our algorithm nearly equals EECA. Besides, the convergence speed is faster in the proposed algorithm than EECA when the backlog increases.
In our algorithm, the delay is different for different levels of data and the larger the number of data packets is, the higher the priority is. It should be also observed that the delay in the proposed algorithm is larger than that in EECA. In reality, if W is a positive value in Equation (11), it will result in the growth of delay. W can be made negative and classification strategy can be adjusted to reduce the queue backlog, however the power will increase inevitably. So this approach is more applicable for a network with heterogeneous nodes and data acquisition rates, especially in coal mines.

5. Conclusions

A suboptimal distributed algorithm has been developed to allocate power based on the data classification for wireless sensor networks in coal mines. Owning to the many heterogeneous nodes and the data’s arrival randomness underground, the arriving data is divided into different levels according to the number of arriving packets. The larger the number of data packets is, the higher the priority is. Then, the Lyapunov drift optimization technology is used to stabilize the system and form an energy-efficient distributed strategy via data classification. The advantages are listed as follows:
  • Data in high classes have high priorities to be dealt with and the delay in high classes is smaller than that in low classes.
  • With the control parameter V adjusted, the utility function can be pushed arbitrarily close to the optimization (average power and average data class decreases with V), and the average network delay increases.
  • Adjusting W and a classification method can change the average power: with the growth of W, the average power decreases in a fluctuation; the larger the number of data classification is, the smaller the average power will be.
  • The algorithm itself does not need any prior knowledge about data rate, channel statistics and global network topology, which is adaptive in certain environments.

Acknowledgments

This work is supported by National Natural Science Foundation of China (No. 51575513), Jiangsu Provincial Natural Science Foundation of China (No. BK20151146), National Key Research and Development Program (No. 2016YFC0600905), as well as A Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD).

Author Contributions

Houlian Wang and Gongbo Zhou proposed the idea of DCE protocol, and determined the structure of research work and this paper. Houlian Wang conducted the simulation work and wrote the paper. Gongbo Zhou conducted the verification work for simulations and the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bo, C.; Xin, C.; Zhai, Z.; Zhang, C.; Chen, J. Web of things-based remote monitoring system for coal mine safety using wireless sensor network. Int. J. Distrib. Sens. Netw. 2014, 2014, 1–14. [Google Scholar] [CrossRef]
  2. Dohare, Y.S.; Maity, T.; Das, P.S.; Paul, P.S. Wireless communication and environment monitoring in underground coal mines—Review. IETE Tech. Rev. 2015, 32, 140–150. [Google Scholar] [CrossRef]
  3. Zhou, G.; Zhu, Z.; Zhang, P.; Li, W. Node deployment of band-type wireless sensor network for underground coalmine tunnel. Comput. Commun. 2016, 81, 43–51. [Google Scholar] [CrossRef]
  4. Mekikis, P.V.; Antonopoulos, A.; Kartsakli, E.; Lalos, A.S.; Alonso, L.; Verikoukis, C. Information exchange in randomly deployed dense wsns with wireless energy harvesting capabilities. IEEE Trans. Wirel. Commun. 2016, 15, 3008–3018. [Google Scholar] [CrossRef]
  5. Mekikis, P.V.; Lalos, A.S.; Antonopoulos, A.; Alonso, L. Wireless energy harvesting in two-way network coded cooperative communications: A stochastic approach for large scale networks. IEEE Commun. Lett. 2014, 18, 1011–1014. [Google Scholar] [CrossRef]
  6. Zhou, G.; Wang, H.; Zhu, Z.; Huang, L.; Li, W. Performance analysis of wind-induced piezoelectric vibration bimorph cantilever for rotating machinery. Shock Vib. 2015, 2015, 1–10. [Google Scholar] [CrossRef]
  7. Li, Z.; Zhou, G.; Zhu, Z.; Li, W. A study on the power generation capacity of piezoelectric energy harvesters with different fixation modes and adjustment methods. Energies 2016, 9, 98. [Google Scholar] [CrossRef]
  8. Xu, S.; Chang, T.H.; Lin, S.C.; Shen, C. Energy-efficient packet scheduling with finite blocklength codes: Convexity analysis and efficient algorithms. IEEE Trans. Wirel. Commun. 2016, 15, 5527–5540. [Google Scholar] [CrossRef]
  9. Gong, X.; Pessemier, T.D.; Joseph, W.; Martens, L. A generic method for energy-efficient and energy-cost-effective production at the unit process level. J. Clean. Prod. 2016, 113, 508–522. [Google Scholar] [CrossRef]
  10. Suto, K.; Nishiyama, H.; Kato, N.; Huang, C.W. An energy-efficient and delay-aware wireless computing system for industrial wireless sensor networks. IEEE Access 2015, 3, 1026–1035. [Google Scholar] [CrossRef]
  11. Tutuncuoglu, K.; Yener, A. Optimum transmission policies for battery limited energy harvesting nodes. IEEE Trans. Wirel. Commun. 2010, 11, 1180–1189. [Google Scholar] [CrossRef]
  12. Zou, J.; Wu, Q.; Xiong, H.; Chen, C.W. Dynamic spectrum access and power allocation for cooperative cognitive radio networks. IEEE Trans. Signal Process. 2015, 63, 5637–5649. [Google Scholar] [CrossRef]
  13. Chandrasekhar, V.; Andrews, J.G.; Muharemovic, T.; Shen, Z.; Gatherer, A. Power control in two-tier femtocell networks. IEEE Trans. Wirel. Commun. 2009, 8, 4316–4328. [Google Scholar] [CrossRef]
  14. Zhang, H.; Jiang, C.; Beaulieu, N.C.; Chu, X.; Wen, X.; Tao, M. Resource allocation in spectrum-sharing ofdma femtocells with heterogeneous services. IEEE Trans. Commun. 2014, 62, 2366–2377. [Google Scholar] [CrossRef]
  15. Zhang, H.; Nie, Y.; Cheng, J.; Leung, V.C.M.; Arumugam, N. Sensing time optimization and power control for energy efficient cognitive small cell with imperfect hybrid spectrum sensing. IEEE Trans. Wirel. Commun. 2017, 16, 730–743. [Google Scholar] [CrossRef]
  16. Zhang, H.; Jiang, C.; Beaulieu, N.C.; Chu, X.; Wang, X.; Quek, T.Q.S. Resource allocation for cognitive small cell networks: A cooperative bargaining game theoretic approach. IEEE Trans. Wirel. Commun. 2015, 14, 3481–3493. [Google Scholar] [CrossRef]
  17. Zhang, H.; Xing, H.; Cheng, J.; Nallanathan, A.; Leung, V.C.M. Secure resource allocation for ofdma two-way relay wireless sensor networks without and with cooperative jamming. IEEE Trans. Ind. Inform. 2016, 12, 1714–1725. [Google Scholar] [CrossRef]
  18. Jayawardhana, M.; Zhu, X.; Liyanapathirana, R.; Gunawardana, U. Compressive sensing for efficient health monitoring and effective damage detection of structures. Mech. Syst. Signal Process. 2017, 84, 414–430. [Google Scholar] [CrossRef]
  19. Huang, Q.; Tang, B.; Deng, L.; Wang, J. A divide-and-compress lossless compression scheme for bearing vibration signals in wireless sensor networks. Measurement 2015, 67, 51–60. [Google Scholar] [CrossRef]
  20. Guo, W.; Tse, P.W. A novel signal compression method based on optimal ensemble empirical mode decomposition for bearing vibration signals. J. Sound Vib. 2013, 332, 423–441. [Google Scholar] [CrossRef]
  21. Neely, M.J. Opportunistic Scheduling with Worst Case Delay Guarantees in Single and Multi-Hop Networks; IEEE: Shanghai, China, 2011; pp. 1728–1736. [Google Scholar]
  22. Neely, M.J. Stochastic network optimization with application to communication and queueing systems. Synth. Lect. Commun. Netw. 2010, 3, 211. [Google Scholar] [CrossRef]
  23. Huang, L.; Neely, M.J. Utility optimal scheduling in processing networks. Perform. Eval. 2010, 68, 1002–1021. [Google Scholar] [CrossRef]
  24. Shah, G.A.; Gungor, V.C.; Akan, O.B. A cross-layer qos-aware communication framework in cognitive radio sensor networks for smart grid applications. IEEE Ind. Inform. Trans. 2013, 9, 1477–1485. [Google Scholar] [CrossRef]
  25. Neely, M.J. Energy optimal control for time-varying wireless networks. IEEE Trans. Inf. Theory 2006, 52, 2915–2934. [Google Scholar] [CrossRef]
  26. Cheng, B.; Cheng, X.; Chen, J. Lightweight monitoring and control system for coal mine safety using rest style. ISA Trans. 2014, 54, 229–239. [Google Scholar] [CrossRef] [PubMed]
  27. Ren, P.; Qian, J. A power-efficient clustering protocol for coal mine face monitoring with wireless sensor networks under channel fading conditions. Sensors 2016, 16, 835. [Google Scholar] [CrossRef] [PubMed]
  28. Jiang, T.; Yang, Z. Research on mine safety monitoring system based on wsn. Procedia Eng. 2011, 26, 2146–2151. [Google Scholar]
  29. Urgaonkar, R.; Neely, M.J. Network capacity region and minimum energy function for a delay-tolerant mobile ad hoc network. IEEE/ACM Trans. Netw. 2011, 19, 1137–1150. [Google Scholar] [CrossRef]
  30. Vijayandran, L.; Brandt-Pearce, M.; Kansanen, K.; Ekman, T. Efficient state estimation with energy harvesting and fairness control using stochastic optimization. In Proceedings of the Global Telecommunications Conference, Houston, TX, USA, 5–9 December 2011; pp. 1–6. [Google Scholar]
  31. Neely, M.J. Dynamic power allocation and routing for satellite and wireless networks with time varying channels. Mass. Inst. Technol. 2003, 31, 231–241. [Google Scholar]
Figure 1. A network model of N transmitters and one receiver.
Figure 1. A network model of N transmitters and one receiver.
Sensors 17 01107 g001
Figure 2. Average backlog versus V and W for a two-queue uplink in the perfect CSI case. (a) Average backlog versus V; (b) Average backlog versus W.
Figure 2. Average backlog versus V and W for a two-queue uplink in the perfect CSI case. (a) Average backlog versus V; (b) Average backlog versus W.
Sensors 17 01107 g002
Figure 3. Average backlog with different classes versus V and W for a two-queue uplink in the perfect CSI case. (a) Average backlog versus V; (b) Average backlog versus W.
Figure 3. Average backlog with different classes versus V and W for a two-queue uplink in the perfect CSI case. (a) Average backlog versus V; (b) Average backlog versus W.
Sensors 17 01107 g003
Figure 4. Average utility versus V and W for a two-queue uplink in the perfect CSI case. (a) Average utility versus V; (b) Average utility versus W.
Figure 4. Average utility versus V and W for a two-queue uplink in the perfect CSI case. (a) Average utility versus V; (b) Average utility versus W.
Sensors 17 01107 g004
Figure 5. Average data class versus V and W for a two-queue uplink in the perfect CSI case. (a) Average data class versus V; (b) Average data class versus W.
Figure 5. Average data class versus V and W for a two-queue uplink in the perfect CSI case. (a) Average data class versus V; (b) Average data class versus W.
Sensors 17 01107 g005
Figure 6. Average power versus V and W for a two-queue uplink in the perfect CSI case. (a) Average power versus V; (b) Average power versus W.
Figure 6. Average power versus V and W for a two-queue uplink in the perfect CSI case. (a) Average power versus V; (b) Average power versus W.
Sensors 17 01107 g006
Figure 7. The error bar graph about average power under different class numbers in the imperfect CSI case and the perfect CSI case.
Figure 7. The error bar graph about average power under different class numbers in the imperfect CSI case and the perfect CSI case.
Sensors 17 01107 g007
Figure 8. Average power versus average backlog between the proposed algorithm and EECA with 3 different values of W and 5 different values of V. V is 1, 10, 50, 100 and 1000 respectively, and W is 0.1, 1 and 10.
Figure 8. Average power versus average backlog between the proposed algorithm and EECA with 3 different values of W and 5 different values of V. V is 1, 10, 50, 100 and 1000 respectively, and W is 0.1, 1 and 10.
Sensors 17 01107 g008
Table 1. Channel state probability distribution.
Table 1. Channel state probability distribution.
Channel State [S1,S2][G,M][M,B][M,M][G,B][M,G]
Probability Pr [ ( S 1 , S 2 ) ] 1/32/91/92/91/9
Table 2. The method of classification.
Table 2. The method of classification.
Number of Arriving PacketsAl = 0,1Al = 2Al = 3,4,5...
Class321
Table 3. The difference between average backlog in the imperfect CSI case and the perfect CSI case.
Table 3. The difference between average backlog in the imperfect CSI case and the perfect CSI case.
DifferenceW = 0.01W = 0.1W = 1W = 10W = 100
V = 0.010.01790.01790.01790.01790.0183
V = 0.10.01790.01790.01790.01840.1801
V = 10.01790.01790.03150.17970.7464
V = 100.07410.11250.23780.76490.8675149
V = 1000.42430.48730.86310.88664311.3688602
Table 4. The difference between average backlog with different classes in the imperfect CSI case and the perfect CSI case.
Table 4. The difference between average backlog with different classes in the imperfect CSI case and the perfect CSI case.
Difference E { U 1 1 + U 2 1 } E { U 1 2 + U 2 2 } E { U 1 3 + U 2 3 }
V = 0.010.00360.00660.0076
V = 0.10.00360.00660.0076
V = 10.00480.01150.0152
V = 100.03690.08010.1208
V = 1000.10710.28090.4751
Table 5. The difference between average utility with different classes in the imperfect CSI case and the perfect CSI case.
Table 5. The difference between average utility with different classes in the imperfect CSI case and the perfect CSI case.
DifferenceW = 0.01W = 0.1W = 1W = 10W = 100
V = 0.010.00060.00080.00210.01650.2189
V = 0.10.00060.00080.00210.02243.9587
V = 10.00060.00080.01070.4084.6871
V = 100.00790.01520.05810.4924.80722
V = 1000.01740.02210.06670.507644.92458
Table 6. The difference between average data class in the imperfect CSI case and the perfect CSI case.
Table 6. The difference between average data class in the imperfect CSI case and the perfect CSI case.
DifferenceW = 0.01W = 0.1W = 1W = 10W = 100
V = 0.010.00160.00160.00160.00160.0022
V = 0.10.00160.00160.00160.00210.0394
V = 10.00160.00160.0080.03940.0467
V = 100.02140.03330.04280.04760.04789
V = 1000.04780.04910.04990.049130.04906
Table 7. The difference between average power in the imperfect CSI case and the perfect CSI case.
Table 7. The difference between average power in the imperfect CSI case and the perfect CSI case.
Difference W = 0.01W = 0.1W = 1W = 10W = 100
V = 0.010.00060.00060.00060.00060.0008
V = 0.10.00060.00060.00060.00070.0136
V = 10.00060.00060.00270.01360.0158
V = 100.00760.01190.01530.01610.0162
V = 1000.0170.01720.01670.016430.01638
Table 8. All classification methods when number of classification is 2.
Table 8. All classification methods when number of classification is 2.
Serial NumberClassification Methods
1 Ψ l = { 2 , A l = 0 , 1 , 2 , 3 , 4 1 , A l = 5 , 6 , 7
2 Ψ l = { 2 , A l = 0 , 1 , 2 , 3 1 , A l = 4 , 5 , 6
3 Ψ l = { 2 , A l = 0 , 1 , 2 1 , A l = 3 , 4 , 5
4 Ψ l = { 2 , A l = 0 , 1 1 , A l = 2 , 3 , 4
5 Ψ l = { 2 , A l = 0 1 , A l = 1 , 2 , 3

Share and Cite

MDPI and ACS Style

Wang, H.; Zhou, G. Power Allocation Based on Data Classification in Wireless Sensor Networks. Sensors 2017, 17, 1107. https://doi.org/10.3390/s17051107

AMA Style

Wang H, Zhou G. Power Allocation Based on Data Classification in Wireless Sensor Networks. Sensors. 2017; 17(5):1107. https://doi.org/10.3390/s17051107

Chicago/Turabian Style

Wang, Houlian, and Gongbo Zhou. 2017. "Power Allocation Based on Data Classification in Wireless Sensor Networks" Sensors 17, no. 5: 1107. https://doi.org/10.3390/s17051107

APA Style

Wang, H., & Zhou, G. (2017). Power Allocation Based on Data Classification in Wireless Sensor Networks. Sensors, 17(5), 1107. https://doi.org/10.3390/s17051107

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop