Next Article in Journal
Motion Magnification of Vibration Image in Estimation of Technical Object Condition-Review
Previous Article in Journal
LSTM-DDPG for Trading with Variable Positions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Deployment Optimization Method of Multistatic Radar for Constructing Circular Barrier Coverage

1
National Key Laboratory of Radar Signal Processing, Xidian University, Xi’an 710071, China
2
Xi’an Electronic Engineering Research Institute, Xi’an 710100, China
3
Teaching and Research Support Center, Engineering University of PAP, Xi’an 710086, China
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(19), 6573; https://doi.org/10.3390/s21196573
Submission received: 30 May 2021 / Revised: 16 September 2021 / Accepted: 24 September 2021 / Published: 30 September 2021
(This article belongs to the Section Radar Sensors)

Abstract

:
To construct circular barrier coverage (CBC) with multistatic radars, a deployment optimization method based on equipartition strategy is proposed in this paper. In the method, the whole circular area is divided into several sub-circles with equal width, and each sub-circle is blanketed by a sub-CBC that is built based on the multistatic radar deployment patterns. To determine the optimal deployment patterns for each sub-CBC, the optimization conditions are firstly studied. Then, to optimize the deployment of the whole circular area, a model based on minimum deployment cost is proposed, and the proposed model is divided into two sub-models to solve the optimization issue. In the inner model, it is assumed that the width of a sub-circle is given. Based on the optimization conditions of the deployment pattern, integer linear programming (ILP) and exhaustive method (EM) are jointly adopted to determine the types and numbers of deployment patterns. Moreover, a modified formula is introduced to calculate the maximum valid number of receivers in a pattern, thus narrowing the search scope of the EM. In the outer model, the width of a sub-circle is assumed to be a variable, and the EM is adopted to determine the minimum total deployment cost and the optimal deployment patterns on each sub-circle. Moreover, the improved formula is exploited to determine the range of width for a sub-circle barrier and reduce the search scope of the EM. Finally, simulations are conducted in different conditions to verify the effectiveness of the proposed method. The simulation results indicate that the proposed method can spend less deployment cost and deploy fewer transmitters than the state-of-the-artwork.

1. Introduction

In the last decades, the world witnessed the increasing popularity of wireless sensor networks (WSNs) because of their robust fault tolerance, high energy efficiency, strong data processing capability, and advanced wireless communication technology [1,2,3,4].
Barrier coverage is one of the essential applications of WSNs. It can be exploited to monitor the targets traversing through the boundary of an FoI [5]. To build an effective barrier coverage, the coverage area of the sensors should construct a continuous barrier covering the FoI. Compared with point coverage [6] and area coverage [7], barrier coverage obtains a balance between the number of sensors and the coverage area. Therefore, barrier coverage is efficient in monitoring intruders.
Most previous works on barrier coverage are based on the disk coverage model [8] or the sector coverage model [9]. The disk coverage model indicates that the coverage area is a circle with the sensor being located at the center, and the radius of the circle is the monitor range. While in the sector coverage model, the coverage area is a sector of the circle.
Recently, with the development of radar technologies, the multistatic radar based on a Cassini coverage model has drawn extensive attention [10,11]. Unlike the monostatic radar, which deploys a transmitter and a receiver at the same location, the multistatic radar is an important extension of bistatic radar. It consists of multiple transmitter-receiver pairs deployed at different locations [12]. The multistatic radar has several advantages, including strong anti-electronic jamming capacity, ease of anti-stealth aircraft, and ease of anti-low-altitude penetration [13,14,15]. The Cassini coverage model is derived from the bistatic radar equation. It is dependent on both the range between a pair of transmitter and receiver and the ranges from the target to the transmitter and receiver. Besides, two foci of Cassini coverage locate at a transmitter and a receiver [16].
Some works exploit the Cassini coverage model to build the line barrier coverage. In [17], the authors investigated the optimal deployment method for line barrier coverage to maximize the detectability of worst-case targets. In [18], a line barrier coverage consisting of heterogeneous transmitters was studied. The transmitters form different barrier coverages under different parameter settings. In [19], both the fault-tolerance issue and the energy-consumption issue of line barrier coverage were studied. The authors utilized the collaboration between transmitters and receivers on two consecutive deployment lines to obtain a minimum deployment cost.
Other works focus on building circular barrier coverage (CBC) to detect the invader who tries to enter the closed area. CBC can be exploited in various scenarios, such as monitoring coastlines, contaminated zones, and international boundaries. In these scenarios, the protected area has an irregular shape, which can be approximated by its minimum circumcircle and several multistatic radars are deployed in this circle. Thus, it is necessary to build circle barrier coverage on the circular FoI [20]. However, due to the properties of the Cassini coverage model, it is challenging to optimize the deployment of multistatic radars to form the circle barrier coverage. Meanwhile, to ensure the monitor effectiveness, it is desirable to set a minimum threshold for the width of circle barrier coverage. Besides, to achieve an excellent and cost-efficient circle barrier coverage, the unit costs of the transmitter and receiver should be considered by the optimization model.
To overcome these challenges, this paper uses multistatic radars to construct CBC and develops an improved optimization method based on the equipartition strategy. First, the optimization conditions of CBC are proven through analyzing the properties of multistatic radar deployment patterns (simply referred to as “deployment patterns” in the subsequent content). Based on these conditions, given the number of transmitters and receivers, the deployment pattern for obtaining a maximum coverage area can be determined. Moreover, the transmitter-receiver cost ratio is considered to derive the optimal deployment with a minimum cost. Besides, to optimize the deployment on the whole circular area, a two-stage optimization algorithm is proposed. Specifically, in the first stage, this area is divided into several sub-circles with equal width. Thus, the total deployment cost is equal to the sum of each sub-circle barrier cost. In the second stage, since the width of a sub-circle is already determined in the first stage, integer linear programming (ILP) [21] and exhaustive method (EM) are adopted to jointly determine the types and numbers of deployment patterns in the given sub-circle barrier. Finally, the optimization results in the condition of minimum cost can be obtained, and the proposed method is verified by the simulation results.
The main contributions in this paper are summarized as follows:
First, the properties of deployment patterns are studied, and the conditions for achieving the optimal deployment patterns in a circular barrier are proven. Based on these conditions, the optimization model for the whole circular FoI is introduced. Meanwhile, this model is divided into two sub-optimization models to obtain the solution of this model.
Secondly, a novel formula is proposed to calculate the maximum valid number of receivers in a deployment pattern. Moreover, another novel formula is introduced to calculate the upper threshold of width for a sub-circular barrier. These two formulas can dramatically reduce the computation.
Thirdly, a two-stage optimization algorithm with an equipartition strategy is proposed to solve these two sub-optimization models. In the condition of minimum deployment cost, the optimal deployment is derived by considering the transmitter-receiver cost ratio. The simulation results indicate that the proposed method needs less deployment cost and requires fewer transmitters than the works in the literature.
The rest of this paper is organized as follows. Section 2 reviews the related work. Section 3 introduces the concepts and details of the optimization issue. Section 4 proposes the solution for the optimization issue. Section 5 conducts the simulations to validate the performance of the proposed method. Section 6 concludes the paper.

2. Related Work

Regarding various scenarios and tasks, barrier coverage problems were extensively and profoundly studied in the last decade. The models that have been studied can be divided into three categories: the disk coverage model [8,22,23,24,25], sector coverage model [9,26,27,28,29], and Cassini coverage model [20,30,31,32,33].
In the beginning, the works on the disk coverage model were reviewed. In [8], the notion of weak and strong barrier coverage was introduced, and a critical condition was derived for constructing the weak barrier coverage. In [22], for the barrier coverage composed of a set of wireless sensors with adjustable ranges, the constant-approximation algorithms were designed to assign the ranges with the minimum cost, and the constant depends on the covering radius related to the power of sensors. In [23], crossed barrier coverage was built to detect the intrusion behavior in both horizontal and vertical directions. Meanwhile, the branch-and-bound algorithm and multi-round shortest path algorithm are exploited to determine the maximum number of crossed barriers. Given a set of mobile sensors distributed on the plane and a set of targets located on a line, an exact algorithm was introduced to minimize the maximum movement of the sensors the work and cover the targets with minimum energy consumption [24]. In [25], the inspection robot was integrated into WSNs to form an efficient dynamic barrier coverage for monitoring the transmission lines. Moreover, a discrete heuristic method based on game theory was proposed to solve this issue.
Considering the works based on the sector coverage model, in [9], sensors with arbitrarily adjustable directions were exploited to construct the strong barrier coverage. To determine the appropriate directions of sensors in the one-dimension scenario, a polynomial-time algorithm was adopted to achieve strong barrier coverage with a minimum number of sensors. Meanwhile, in the two-dimension scenario, the directional carrier graph was introduced to solve the issue. In [26], the researchers surveyed the concepts and properties of the sector coverage model, and they analyzed the sensing characters and behaviors of directional sensors. Besides, each category of the sector coverage model was summarized in terms of issue description, assumption, application, solution, and performance. The researchers in [27] addressed the barrier gap problem of weak and strong barrier coverage and deployed the directional sensors with a line deployment strategy. Besides, they proposed a gap-finding algorithm to determine sub-barriers and locate barrier gaps, and they fixed the gaps through two gap-mending algorithms. In [28], the sector coverage model was applied in a three-dimension scenario, and a realistic resolution criterion of the camera sensor was proposed to capture the face characters of the invader. Based on this criterion, a feasible deployment strategy was studied for barrier coverage. In [29], the virtual target–barrier construction method was adopted to construct a closed circular belt around a target. The closed virtual barrier curve was exploited to simplify the optimization problem, and then a distributed particle swarm optimization algorithm was designed to deploy an approximate optimal coverage on the virtual barrier curve.
There is increasing attention on the Cassini coverage model. In [30], given the numbers of transmitters and receivers, an optimal linear barrier coverage was constructed. However, this barrier coverage does not have a requirement of minimum width. This means that in some parts, the barrier is only covered by some points, and a high-speed intruder can cross the barrier without detection. The authors in [31] stated that it is optimal to place multistatic radars on the shortest deployment line connecting the left and right boundaries of the region. Based on these achievements, an optimization deployment method was proposed to build barrier coverage on the rectangular area [32]. Specifically, the method divides the whole rectangular area into multiple sub-rectangles with equal width. Then, it sets the minimum width for a sub-rectangle. Finally, several identical deployment patterns are exploited to build barrier coverage for each sub-rectangle.
Besides, some works focus on constructing an optimal barrier coverage on a circular area, which is a challenging issue due to the circular shape. As for this shape, the width and radius of a sub-circular barrier should be considered. An optimal model was introduced to build one CBC [20]. Practically, one circular barrier is inadequate to cover a vast circular area, and the width of a circular barrier is not set with a threshold. A model with a threshold of width was mentioned in [33], and the whole circular area was divided into several sub-circular barriers with the same width. Each sub-circular barrier was composed of several identical deployment patterns, and only a varied one was exploited to cover the remaining part. Besides, EM was adopted to determine the optimal results. However, the composition of a sub-circular barrier and the searching scope of EM can be further improved. Inspirited by [33], our work makes the following improvements: (1) several novel conditions are introduced to determine the types of deployment patterns for an optimal sub-circular barrier; (2) ILP is adopted to obtain the corresponding number of deployment patterns; (3) an improved formula is introduced to calculate the maximum valid number of receivers in a deployment pattern; (4) a novel formula is adopted to calculate the upper threshold of width to narrow the searching scope of sub-circular barrier width.

3. Conceptions and Problem Descriptions

3.1. Conceptions of Multistatic Radar Coverage

In this paper, the deployment pattern of multistatic radar is composed of a transmitter T and several receivers R i , ( i = 1 , 2 , , m ) , and it can be denoted as F m = T , R 1 , , R m . Thus, the multistatic radar can be regarded as a combination of multiple bistatic radars that share a transmitter. In terms of coverage area, it is desirable to use the bistatic radar to illustrate the coverage properties of the multistatic radar.
Taking F 1 as an example, the signal-to-noise ratio (SNR) at point A, i.e., S N R ( A ) , can be computed by the radar equation of coherent pulse bistatic radar [16], shown as follows:
S N R ( A ) = K b / d T ( A ) d R 1 ( A ) 2
where K b is assumed to be a constant determined by the working parameters of the bistatic radar [32]. Let d T A and d R 1 A represent the distance from point A to the transmitter and the receiver, respectively.
Let γ represent the minimum S N R that is the threshold for target detection. If S N R A γ , the target is in the coverage area of a bistatic radar; otherwise, the target is out of the coverage area. Therefore, the coverage area of the bistatic radar is defined by the formula d T ( A ) d R ( A ) K b / γ . For ease of presentation, we have l max = K b / γ 4 . It is noteworthy that a target in the coverage area can be detected with an acceptable probability [34].
According to [16], the shape of the coverage area is determined by the relation between d 1 and l max , as shown in Figure 1:
  • d 1 > l max , the coverage is two unconnected areas, as plotted in Figure 1a;
  • d 1 = l max , the coverage is enclosed by a lemniscate of Bernoulli, as plotted in Figure 1b;
  • 2 l max / 2 d 1 < l max , the coverage is enclosed by a waist-liked area, as plotted in Figure 1c;
  • 0 < d 1 < 2 l max / 2 , the coverage is enclosed by an elliptical curve, as plotted in Figure 1d.
It is also assumed that transmitters work at orthogonal frequencies. By choosing a working frequency, a receiver can pair with a certain transmitter and avoid being interfered with by other transmitters. Thus, the coverage area of the multistatic radar F m is overlapped with that of m bistatic radars. If a target is covered by multiple bistatic radars, the maximum SNR at point A, i.e., S N R max ( A ) , is exploited to measure the coverage of the multistatic radar, which is formulated as:
S N R max ( A ) = K b / min ( T j , R i ) l A 2
where l A = d T j ( A ) d R i ( A ) , T j denotes the jth transmitter. Based on this, for a target at arbitrary point A, it can be covered by the multistatic radar if S N R max ( A ) γ , and we have l A l m a x 2

3.2. Conceptions of CBC

As for a closed area with irregular boundaries, it can be represented by a minimum circumscribed circle, and a circular FoI is built around the circle to protect the closed area from infiltrating. As shown in Figure 2a, the gray circle area represents the circular FoI with a width of H, and the center of the FoI is O. c i and c o respectively denote the inner and outer circle boundary of the FoI. Besides, R min represents the radius ci.
In this paper, the whole FoI is divided into multiple sub-circles with equal width, and each sub-circle is covered by a sub-CBC. By constructing a sub-CBC with a width of 2 h, multiple multistatic radars are deployed along the ring in the middle of a sub-circle. This ring is called the deployment curve, and it is denoted as l k ,   k = 1 , , q . The radius of l k , k = 1 , , q is denoted as r k . Here, 2 h 2 η > 0 , where 2 η is the minimum width threshold of a sub-circle, and 2 h is the minimum width of a sub-CBC.
For instance, an FoI is divided into three sub-circles in Figure 2b. Without loss of generality, all the sub-CBCs are numbered from inside to outside. Correspondingly, l k ,   k = 1 , 2 , 3 represents the deployment curve of each sub-CBC. Moreover, the nodes are deployed in counterclockwise order. The transmitter is represented by a square, and the receiver is represented by a hexagram.
It is desirable to study the deployment optimization for multistatic radars on a deployment curve. For ease of presentation, two definitions are given:
Definition 1.
Let P i n denote a deployment pattern comprised of n receivers and two transmitters, i.e., P i n = T i , R 1 , , R n , T i + 1 . Without ambiguity, it can be denoted as P n for short. Note that n receivers are deployed between two transmitters, i.e., T i and T i + 1 . Thenodecoverage angle (NCA) in P i n is denotedas 2 θ j ,   j = 1 , , n + 1 , where 2 θ 1 = T i O R 1 , 2 θ j = R j 1 O R j , j = 2 , , n , 2 θ n + 1 = R n O T i + 1 .
According to [33], NCA can be calculated as:
θ k = acos ( r 2 + R 2 l max 2 2 r R ) ,   k = 1 acos ( r 2 + R 2 ) cos ( m = 1 k 1 θ m ) 2 r R ( R 2 r 2 ) 2 ( cos 2 ( m = 1 k 1 θ m ) 1 ) + l max 4 ) 2 r R m = 1 k 1 θ m ,   k = 2 , , n + 1 / 2 θ k = θ n k + 2 , k = 1 , , n + 1 / 2
where, r denotes the radius of the deployment curve l, and R denotes the radius of the outer boundary of the sub-circle. Besides, R j is a valid receiver if θ j > 0 ,   j = 1 , 2 , , n + 1 .
Furthermore, according to Formula (3), by using algebraic operation, we have
m = 1 k θ m = acos [ ( r 2 + R 2 ) cos ( m = 1 k 1 θ m ) - ( R 2 r 2 ) 2 ( cos 2 ( m = 1 k 1 θ m ) 1 ) + l max 4 ) ] / 2 r R
Let ω P ( n , h , r ) denote the central angle formed by P n , and it is referred to as pattern coverage angle (PCA). Usually, a PCA is inadequate to cover the whole FoI. Thus, we have ω P ( n , h , r ) = T i + 1 O T i = j = 1 n + 1 2 θ j < 360 . ω P ( n , h , r ) can be calculated as follows:
ω P ( n , h , r ) = 4 k = 1 n 2 θ k + 2 θ n 2 + 1 , if   n   is   an   even . 4 k = 1 n + 1 2 θ k , if   n   is     an   odd .
Definition 2.
Let  S denote a deployment sequence formed by  k  varied types of P n j ,   j = 1 , 2 , , k . Let s j ,   j = 1 , 2 , , k denote the number of types. Specifically, we have S = { s 1 , P 1 n 1 , , s k , P k n k } ,   k = j = 1 k 1 s j + 1 . To build a CBC, j = 1 k s j ω P n j ( n j , h , r ) 360 should hold.
As shown in Figure 3, in the case where r = 3.833   km ,   l max = 2   km ,   R = 4.667   km , there is a sub-circle covered by the deployment sequence of P 1 3 , P 2 3 , P 3 2 , and all patterns are deployed on the deployment curve l. According to (5), the total angle formed by these three patterns equals to 367.2°, which is a bit larger than 360°. In theoretical, the transmitter T4 should be placed where the blue square is plotted. However, in practice, P 1 3 , P 3 2 share the transmitter T1.

3.3. Description of Optimization Deployment Problem

The problem can be described as follows. Let D denote the FoI, and FoI is equally divided into q sub-circles with a width of 2 h. The CBC is exploited to cover each sub-circle. Let M k and N k ,   ( k = 1 , , q ) denote the number of transmitters and receivers on each deployment curve, respectively. Besides, it is assumed that all the transmitters are identical, so are the receivers. In addition, the unit costs of the transmitters and receivers are denoted as c T and c R , respectively. Let α = c T / c R denote the transmitter-receiver cost ratio, and it is reasonable to set α > 1 .
Under the minimum deployment cost, c tot , the optimization problem model can be formulated as follows:
minimize   c tot = k = 1 q M k c T + N k c R s . t .     l ( A ) l max 2 ,   A D
In this paper, k rounds k to the nearest integer towards minus infinity; k rounds k to the nearest integer towards positive infinity; Φ denotes an empty set; N + and N denote the positive integer set and natural integer set, respectively. For point A and A , A A denotes the length of the line AA′.

4. Solution for Optimization Deployment Problem

4.1. The Upper Threshold of Width for a Sub-Circular Barrier

As mentioned above, 2 μ is the lower threshold width of the CBC. In this section, a novel formula is introduced to determine the upper threshold width of the CBC. Like the conditions in [33], the waist-liked area in the bistatic radar is exploited first. Then, Lemma 1 is adopted to determine h sup .
Lemma 1.
As for the width-equipartition strategy, h sup denotes the upper threshold of h, and it can be calculated as follows:
h sup = 1 3 ( 2 l max + R min 2 + 2 R min l max l max 2 R min )
Proof of Lemma 1.
The proof of Lemma 1 is given in the Appendix A.  □
According to Formula (3), we have l max 2 r h l max . Thus, the range of barrier width can be modified to 2 max { l max 2 r , η } < 2 h 2 h sup . Subsequently, let q denotes the number of sub-circles. According to the equipartition strategy, q = H / 2 h . Thus, we have q max = H / 2 max { l max 2 r , η } and q min = H / 2 h sup .

4.2. The Maximum Number of Receivers and the Property of NCA

In this section, Lemma 2 is introduced to improve the formula for determining the maximum number of receivers in a P n . Then, Lemma 3 is exploited to uncover the property of NCA.
Lemma 2.
Let 2 h denote the width of a sub-circular barrier, and r denote the radius of the deployment curve. Let n max denote the maximum number of receivers in P n . Then n max is calculated as follows:
(1) If h sup h > r 2 + l max 2 r and u is the largest natural number that satisfies the inequality:
m = 1 u θ m acos ( 2 r + h ) 2 h 2 l max 4 4 r ( r + h ) h 2
then n max = 2 u + 1 and 2 Σ m = 1 u + 1 θ m < 180 0 .
(2) If max { l max 2 r , 0 } < h min { r 2 + l max 2 r , h sup } and u is the largest natural number that satisfies the inequality:
m = 1 u θ m acos l max 4 ( 2 r + h ) 2 h 2 4 r 2 ( r + h ) 2
then n max = 2 u + 1 .
Proof of Lemma 2.
The proof of Lemma 2 is given in the Appendix A.  □
By contrast, it is claimed in [33] that θ max = acos ( ( R 2 + r 2 ) ( R r ) 2 l max 2 2 r R ( R r ) 2 ) . However, this formula is ineffective in some conditions. To prove this, given r = 4   km ,   R = 4.3   km ,   l max = 3   km , based on [33], we have θ max = acos ( 1.9044 ) .
According to Formula (5), the more receivers are placed in P n , the larger a central angle can be formed. However, Lemma 3 states that the efficiency of placing receivers decreases as the number of receivers increases.
Lemma 3.
For P n it is assumed that k = 1 u θ k < φ , u = n + 1 / 2 . Then, the NCA sequence θ k ,   k = 1 , 2 , , u is strictly monotonous decreasing. Where,
φ = acos ( ( 2 r + h ) 2 h 2 l max 4 4 r ( r + h ) h 2 ) ,   h > r 2 + l max 2 r acos ( l max 4 ( 2 r + h ) 2 h 2 4 r 2 ( r + h ) 2 ) ,   0 < h r 2 + l max 2 r
Proof of Lemma 3.
The proof of Lemma 3 is given in the Appendix A.  □
For P n , let λ j = θ j / c R denote the effectiveness-cost ratio (ECR) of R j ,   j = 1 , 2 , , n . It reveals the coverage efficiency of a receiver. The larger λ j , the better coverage efficiency of a receiver. Besides, let λ ¯ = 1 n j = 1 n λ j denote the average ECR of P n , and it reveals the coverage efficiency of P n .
Moreover, Lemma 3 states that λ j decreases as j increases. In other words, the farther a receiver is placed away from the transmitter, the lower ECR is obtained. Meanwhile, the larger n, the lower average ECR of P n .

4.3. The Conditions of the Optimal Deployment Patterns for a CBC

According to the equipartition strategy, it is critical to find the optimization conditions of deployment patterns on a sub-CBC. These conditions are essential to establishing the optimization model of the deployment problem.
Given h and r , for ease of presentation, ω P ( n , h , r ) can be abbreviated as ω P ( n ) .
Lemma 4.
Assuming two varied patterns P n 1 and P n 2 in the CBC and max { n 1 , n 2 } n max , the following statements holds.
(1) If n 1 + n 2 = 2 v , ω P ( n 1 ) + ω P ( n 2 ) 2 ω P ( v ) holds if and only if n 1 , n 2 are equal or n 1 , n 2 are consecutive odd;
(2) If n 1 + n 2 = 2 v + 1 , ω P ( n 1 ) + ω P ( n 2 ) ω P ( v ) + ω P ( v + 1 ) holds if, and only if | n 1 n 2 | = 1 .
Proof of Lemma 4.
The proof of Lemma 4 is given in the Appendix A.  □
Lemma 4 provides the necessary and sufficient conditions for an optimal CBC. Moreover, it reveals that the PCA of P 2 n 1 and P 2 n + 1 can be equally replaced by two PCAs of P 2 n . Thus, P2n−1, P2n, and P2n+1 can be replaced with three P2n to simplify the structure of the deployment sequence and make it easier for engineering. Furthermore, due to ω P ( 2 n ) + ω P ( 2 n + 2 ) < 2 ω P ( 2 n + 1 ) , it is necessary to deploy three P2n+1 instead of P2n, P2n+2, and P2n+1 in an optimal CBC. Supposing that n 1 = 2 ,   n 2 = 4 ,   r = 4   km , R = 4.8   km ,     l max = 3   km , according to [33], the coverage angle is ω P ( 2 ) + ω P ( 4 ) = 188.67 . By contrast, based on Lemma 4, we have 2 ω P ( 3 ) = 197.75 . It means that the proposed conditions can contribute to a better optimization result.

4.4. Model and Solution for Deployment Optimization Problem

It is revealed by Lemma 4 that, for a deployment sequence, the maximum coverage angle can be achieved by using two varied patterns at most. Moreover, the difference in the number of receivers in patterns should not be larger than 1. This deployment sequence is referred to as the optimal one. Besides, it is assumed that the whole circular area is equally divided into q sub-circular barriers. Let S opt k = s 1 k , P n k , s 2 k , P n k + 1 ,   1 k q denote the optimal deployment sequence for the kth sub-circular barrier. Without loss of generality, k = 1 represents the innermost sub-circular barrier and k = q represents the outmost sub-circular barrier. Then, the deployment optimization model can be represented as follows:
min { q , s 1 k , s 2 k , n k } c tot = k = 1 q { s 1 k ( n k + α ) + s 2 k ( n k + 1 + α ) } s 1 k ω P ( n k , h q , r k ) + s 2 k ω P ( n k + 1 , h q , r k ) 2 π s . t .   n k n max k ,     ( k = 1 , 2 , , q ) ,   H / q = 2 h q ,   s i k N 0 , n k N * ,   r k = R min + ( 2 k 1 ) h q ,   q min q q max  
However, the nonlinearity and multiple parameters make the solution to this model difficult. To overcome these obstacles, the solution to this model is decomposed to a two-stage optimization problem:
min { q , s 1 k , s 2 k , n k } c tot = min q { k = 1 q min { s 1 k , s 2 k , n k } c s k } , where c s k denotes the minimum deployment cost for the kth sub-CBC. In this stage, it is assumed that the width of each sub-circle is given. Then, q min and q max can be calculated. For each q ,   ( q min q q max ) and q N + , 2 h q = H / q , the following sub-optimization problem is solved:
min { s 1 k , s 2 k , n k } c s k = s 1 k ( n k + α ) + s 2 k ( n k + 1 + α ) s . t .   s 1 k ω P ( n k , h q , r k ) + s 2 k ω P ( n k + 1 , h q , r k ) 2 π   s i k N 0 ,   n k N * ,   r k = R min + ( 2 k 1 ) h q ,   n k n max k ,   k = 1 , 2 , , q
For each sub-CBC, there is a model depicted by Formula (9).
min { s 1 k , s 2 k , n } c s k = min n n max k { min { s 1 k , s 2 k } c s k , n } , where c s k , n = s 1 k ( n + α ) + s 2 k ( n + 1 + α ) . In this stage, supposing that n is determined, c s k , n denotes the deployment cost of the kth sub-CBC in this condition. n is the number of receivers in a pattern. Besides, based on Lemma 2, the maximum number of receivers n max k for the patterns in the kth sub-CBC can be calculated. The following sub-optimization problem can be solved:
min { s 1 k , s 2 k } c s k , n = s 1 k ( n + α ) + s 2 k ( n + 1 + α ) s . t . s 1 k ω P ( n , h q , r k ) + s 2 k ω P ( n + 1 , h q , r k ) 2 π ,   s i k N 0
Formula (10) can be solved by using the ILP.
The specific process of solving the deployment optimization model is given:
1:
Calculate h sup , q min and q max through Lemma 1. Initialize the deployment curve set Q = Φ and the total deployment cost set C tot = Φ
2:
For q = q min : q max
3:
Calculate h = H / 2 q .
4:
For k = 1 : q , calculate n max k
5:
For n = 1 : n max k
Based on Formula (10), the cost c s k , n is obtained.
6:
end for
7:
c s k min c s k , 1 , c s k , 2 , , c s k , n max k , as depicted by the sub-optimization problem ②
8:
end for
9:
c tot q k = 1 q c s k . Let c tot q denote the minimum deployment cost in the case where the whole area is divided into q sub-circles. Then, Q = Q q ,   C tot = C tot c tot q .
10:
end for
11:
c tot min C tot , as depicted by the sub-optimization problem ①
i n d e x = C tot . index ( c tot * ) , and q * = Q ( i n d e x ) .

5. Simulations

In this section, simulations are performed to verify the effectiveness of the proposed method. In the proposed method, the range of q can be determined by Lemma 1. Subsequently, given q, each width of sub-CBC is equal to H / q . Then, according to Lemma 2, n max k can be calculated for the kth sub-CBC. Given n n max k , a sequence c s k , 1 , c s k , 2 , , c s k , n max k can be obtained by using the Formula (10). Thus, c s k is found via the minimum cost principle. Furthermore, the total minimum deployment cost is computed by k = 1 q c s k for q equipartition strategy.

5.1. The Influence of H on the Performance

Let l max = 2   km ,   μ = 0.1   km , R min = 3   km . H varies from 1 km to 20 km with a step size of 1 km. The optimization results for α = 2 ,   10 ,   50 ,   80 are plotted in Figure 4.
The change rate κ is exploited to measure the performance achieved by the proposed method and the method mentioned in [33]; κ is defined as follows:
κ = 100 × τ 1 τ 2 / τ 1
where τ 1 and τ 2 represents the optimal deployment parameter obtained by [33] and this paper, respectively.
First, the influence of H on the minimum deployment cost is investigated. Correspondingly, τ j ,   j = 1 , 2 denotes the minimum deployment cost. In this case, the optimal deployment cost change rate revealed by Formula (11) is illustrated in Figure 4.
It can be seen that the value of κ is always larger than or equal to zero when α = 2 ,   10 ,   50 ,   80 , indicating that the proposed method requires less deployment cost. Specifically, when α = 2 ,   10 , the value of κ is much larger. The larger κ is the better cost-saving effect can be achieved. Besides, in most cases, the optimal results under α = 2 ,   10 are superior to those under α = 50 ,   80 . Therefore, the proposed method performs better when α = 2 ,   10 . Although the change rate decreases in the case of α = 50 ,   80 , Figure 4 shows that the proposed method can still obtain less minimum deployment cost.
It can be seen from Figure 5 that the magnitude of reduced cost for α = 50 ,   80 has the same level as that of α = 2 ,   10 . However, c tot is dramatically large for α = 50 ,   80 , making the change rate descend.
Then, the impact of H on the total number of transmitters is evaluated. The results are plotted in Figure 6, Figure 7 and Figure 8. Correspondingly, τ j ,   j = 1 , 2 denotes the optimal number of transmitters in Formula (11). The change rate of the number of transmitters is illustrated in Figure 6. The change rates for α = 2 ,   10 are almost larger or equal to zero. By contrast, the change rates are constant and equal to zero for α = 50 ,   80 .
Besides, the relative change of the number of transmitters is illustrated in Figure 7. It can be seen from Figure 7 that the relative changes of the numbers of transmitters are equal to zero for α = 50 ,   80 leading the change rates equal to zero. Since a transmitter is far more expensive than a receiver, both methods exploit as few transmitters as possible. Actually, the number of transmitters cannot be further reduced by the proposed method under these conditions.
As illustrated in Figure 6 and Figure 7, though the proposed method exploits one more transmitter and obtains the change rate of −0.93% in the case of α = 10 ,   H = 19 km , the results indicate that the proposed method requires fewer transmitters in most case.
Additionally, it can be observed from Figure 8 that the number of transmitters increases dramatically when H becomes large, leading to a decrease in the change rate. Moreover, a tendency that the number of transmitters decreases with the increase of α is shown in Figure 8. Because of the considerable cost of a transmitter, it is economical to deploy more receivers to pair with one transmitter for extending the PCA. Consequently, the number of transmitters decreases with the number of patterns.
Subsequently, the impact of H on the relative change number of receivers is discussed in Figure 9. In this case, τ 1 and τ 2 represent the optimal number of receivers, respectively.
The relative change number of receivers fluctuates around zero in the condition of α = 2 ,   10 , by contrast, the curves are constantly larger than zero in the condition of α = 50 ,   80 . The high cost of a transmitter makes it challenging to improve the optimal result on transmitters, but the proposed method can still reduce the optimal result of receivers.
Taking α = 50 ,   H = 5 km as an example, the optimal deployment sequences obtained by the proposed method are S opt 1 = 1 , P 2 , 2 , P 3 ,   S opt 2 = 1 , P 4 , 3 , P 3 and S opt 3 = 4 , P 4 , 1 , P 5 . Therefore, the total cost of these sequences is 646. By contrast, the optimal deployment sequences obtained by the method in [33] are S opt 1 = 1 , P 2 , 2 , P 3 , S opt 2 = 1 , P 3 , 3 , P 4 and S opt 3 = 1 , P 3 , 4 , P 5 , and the total cost of these sequences is 642. It is worth emphasizing that there is a large peak for α = 10 ,   H = 19 km . In this condition, although the proposed method exploits one more transmitter, it requires 32 fewer receivers. Therefore, it still reduces the cost.

5.2. The Influence of R min on the Performance

The influence of R min on the proposed method is studied in this section. Let l max = 2   km ,   μ = 0.1   km , H = 19 km . R min varies from 1 km to 20 km with a step size of 1 km. Besides, M and N denote the total number of transmitters and receivers, respectively (see Figure 10).
For α = 2 ,   10 , the value of q varies at first and tends to be stable as the R min increases; for α = 50 ,   100 , q fluctuates as the R min increases. It reveals that for a small α and a large R min , q does not change with the increase of R min .
In Figure 11, the relation between R min and the ratio of N to M is illustrated. It can be seen that the ratio in the condition of α = 50 ,   100 is almost twice that of α = 2 ,   10 . When α becomes larger, the pattern is composed of more receivers. Also, the more receivers contained in a pattern, the narrower barrier coverage is built [32]. Thus, in the case of α = 50 ,   100 , the whole area may need to be divided into more sub-circles, resulting in the fluctuation of q*.
Additionally, as depicted in Figure 11, it is worth emphasizing that the number of transmitters is almost equal to that of receivers when α = 2 . In other words, the P 1 is mainly used in the deployment. This result is caused by two reasons. One reason is that the first receiver obtains the maximum ECR, according to lemma 3. The other reason is that the difference in the cost between a transmitter and a receiver is little. Therefore, it is economical and efficient to adopt as many p1 as possible.
Next, the relationship between R min and M is investigated, and the result is shown in Figure 12. It can be seen that the number of transmitters increases approximately linearly with R min for α = 2 ,   10 ,   50 ,   100 . According to Formula (5), the increase of R min leads to an increase in the radius of the deployment curve and a decrease in the PCA. This change means that more transmitters are required as R min increases. Moreover, given R min , the result in Figure 12 reveals that the number of transmitters decreases as α increases. Thus, it is worth deploying more receivers instead of a transmitter because the receivers are highly cheap when α = 50 ,   100 .
Furthermore, the relationship between R min and N is studied, and the result is illustrated in Figure 13. The number of receivers increases with R min for α = 2 ,   10 ,   50 ,   100 . It should be noted that there are three peaks for α = 100 ,   H = 2 , 5 , 10 . It is because more sub-circles are divided in these cases, as plotted in Figure 10. Moreover, it is noteworthy that N increases significantly when α = 10 ,   7 H 12 and then tends to be stable as the R min increases. It can be explained by the slope of the transmitter numbers that decrease in this condition, as depicted in Figure 12. The decreased slope indicates that the magnitude of the increased number of transmitters decreases. To enlarge the PCA, more receivers are exploited in the patterns.

6. Conclusions

A deployment optimization method is proposed in this paper to construct circular barrier coverage with an equipartition strategy. The concepts of multistatic radar coverage and CBC are introduced. Based on the equipartition strategy, a circular FoI is equally divided into q sub-circles. Each sub-circle is blanketed by a sub-CBC composed of several multistatic radar deployment patterns. Moreover, the optimization conditions for determining the optimal deployment patterns in a sub-CBC are studied. The conditions reveal that at most two varied types of patterns are needed by an optimal deployment sequence. Besides, a model based on minimum deployment cost is proposed to optimize the deployment on the whole circular FoI. The model is divided into two sub-models, and a two-stage optimization algorithm is proposed to solve the model. In the inner model, it is assumed that the width of a sub-circle is given. Based on the optimization conditions, ILP and EM are jointly exploited to obtain the types and numbers of deployment patterns. Besides, a novel formula is derived to improve the result of the maximum number of receivers in a pattern and reduce the search scope of EM. In the outer model, the improved formula is proposed to determine the number range of sub-circles and the width of a sub-circle. Then, EM is adopted to determine the minimum deployment cost and the optimal deployment patterns in each sub-CBC. Finally, simulations are conducted to validate the effectiveness of the proposed method. It is worth mentioning that the equipartition strategy results in a locally optimal solution. To improve the optimization results, the non-equipartition strategy should be considered in the future. Moreover, there are many overlapping areas in CBC, making it challenging to improve the coverage effectiveness. Therefore, it is beneficial to explore new coverage models, such as the regular polygonal model.

Author Contributions

Conceptualization, H.-P.L. and D.-Z.F.; data curation, H.-P.L., S.-F.C. and Y.-P.Z.; formal analysis, H.-P.L. and Y.-P.Z.; investigation, H.-P.L., S.-F.C. and Y.-P.Z.; methodology, H.-P.L. and D.-Z.F.; software, H.-P.L. and S.-F.C.; supervision, D.-Z.F.; validation, D.-Z.F.; writing—original draft, H.-P.L., D.-Z.F., S.-F.C. and Y.-P.Z.; writing—review and editing, H.-P.L. and D.-Z.F. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 61971470.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Lemma 1.
As shown in Figure A1, the line A A is the perpendicular bisector of the line TR . Let B denotes the intersection point of the line A A and the deployment curve. Let C denotes the intersection point of line A A and line TR . The distance between the first pair of transmitters and receivers is 2d, the radius of the deployment curve is r. Clearly, | BC | = r | OC | , | OC | = r 2 d 2 , | BC | = r r 2 d 2 . Besides, since h = | AC | | BC | and | AC | = l max 2 d 2 , thus we have
h = l max 2 d 2 + r 2 d 2 r
It is easy to know that h is a monotonically decreasing function concerning d. Let h max denotes maximum width. Additionally, waist-liked area means d 1 l max / 2 . According to Formula (A1), we obtain h max = l max / 2 + r 2 0.5 l max 2 r . Furthermore, h max increases as r increases, and the innermost CBC obtains the smallest radius of R min + h . Therefore, in width-equipartition strategy, substituting r with R min + h , then h sup is calculated as follows:
h sup = 1 3 ( 2 l max + R min 2 + 2 R min l max l max 2 R min )
Figure A1. Schematic diagram of the upper limit of the sub-circular barrier width.
Figure A1. Schematic diagram of the upper limit of the sub-circular barrier width.
Sensors 21 06573 g0a1
The proof of Lemma 1 is completed.  □
By contrast, in [33], it claims the width range of CBC is 0 , 2 l max . However, 2 l max is the maximum value of the A A . When 2 h = 2 l max it means points C and B are coincident, which is impossible in this scenario.
Proof of Lemma 2.
(1) In the beginning, h > r 2 + l max 2 r means ( 2 r + h ) 2 h 2 l max 4 > 0 .
To guarantee R k ,   k = 1 , 2 , , n + 1 / 2 is valid, θ k > 0 should hold. According to Formula (3), we obtain
acos { [ ( r 2 + R 2 ) cos ( m = 1 k 1 θ m ) - ( R 2 r 2 ) 2 ( cos 2 ( m = 1 k 1 θ m ) 1 ) + l max 4 ) ] / 2 r R } > m = 1 k 1 θ m
( R 2 r 2 ) 2 ( cos 2 ( m = 1 k 1 θ m ) 1 ) + l max 4 0
According to Formula (A2), we obtain
( r 2 + R 2 ) cos ( m = 1 k 1 θ m ) - ( R 2 r 2 ) 2 ( cos 2 ( m = 1 k 1 θ m ) 1 ) + l max 4 ) < 2 r R cos ( m = 1 k 1 θ m )  
Furthermore, ( R r ) 2 cos ( m = 1 k 1 θ m ) < ( R 2 r 2 ) 2 ( cos 2 ( m = 1 k 1 θ m ) 1 ) + l max 4 . From the inequality above, we obtain
cos 2 ( m = 1 k 1 θ m ) > ( R 2 r 2 ) 2 l max 4 4 r R ( R r ) 2
Note that R = r + h is the outer radius of a sub-circular barrier, and the cosine function decreases in the first quadrant. Thus we obtain
m = 1 k 1 θ m < acos ( ( 2 r + h ) 2 h 2 l max 4 4 r ( r + h ) h 2 )
Besides, according to Formula (A3), we obtain:
m = 1 k 1 θ m acos ( ( 2 r + h ) 2 h 2 l max 4 ( 2 r + h ) 2 h 2 )
Clearly, ( 2 r + h ) 2 h 2 > 4 r ( r + h ) h 2 . Combining Formulas (A5) and (A6), we achieve
m = 1 k 1 θ m < acos ( ( 2 r + h ) 2 h 2 l max 4 4 r ( r + h ) h 2 ) .
Particularly, for k = n + 1 / 2 , we obtain m = 1 ( n + 1 ) / 2 1 θ m < acos ( ( 2 r + h ) 2 h 2 l max 4 4 r ( r + h ) h 2 ) . Thus n max = 2 u + 1 .
Next, it is desirable to prove cos ( m = 1 u + 1 θ m ) > 0 is the sufficient and necessary condition for 2 m = 1 u + 1 θ m < π . Since cos ( m = 1 u + 1 θ m ) > 0 , according to Formula (4), we obtain
( r 2 + R 2 ) cos ( m = 1 u θ m ) > ( R 2 r 2 ) 2 ( cos 2 ( m = 1 u θ m ) 1 ) + l max 4 ) .
With the algebraic operation, we obtain
cos 2 ( m = 1 u θ m ) > l max 4 ( R 2 r 2 ) 2 4 r 2 R 2
Note that l max 4 ( R 2 r 2 ) 2 < 0 , therefore, Formula (A7) holds. It means 2 m = 1 u + 1 θ m < π holds
(2) When max { l max 2 r , 0 } < h min { r 2 + l max 2 r , h sup } , we obtain ( 2 r + h ) 2 h 2 l max 4 0 . In this case, both Formulas (A2) and (A3) hold. In other words, for P n , n is a valid number as long as m = 1 t 2 θ m π , t = n / 2 holds. Nevertheless, due to the CBC, we have m = 1 u 2 θ m π ,   u n / 2 . And according to Formula (4), with the algebraic operation, we obtain ( r 2 + R 2 ) cos ( m = 1 u 1 θ m ) ( R 2 r 2 ) 2 ( cos 2 ( m = 1 u 1 θ m ) 1 ) + l max 4 ) .
Furthermore, we have m = 1 u 1 θ m acos ( l max 4 ( R 2 r 2 ) 2 4 r 2 R 2 ) . Substituting u with n / 2 , we obtain m = 1 n / 2 1 θ m acos ( l max 4 ( R 2 r 2 ) 2 4 r 2 R 2 )   and n max = 2 ( u + 1 ) .
The proof of Lemma 2 is completed.  □
Proof of Lemma 3.
First, if k = 1 we obtain m = 1 k 1 θ m = 0 . According to Formula (A4), we have:
2 r R cos ( m = 1 k θ m ) = ( r 2 + R 2 ) cos ( m = 1 k 1 θ m ) - ( R 2 r 2 ) 2 ( cos 2 ( m = 1 k 1 θ m ) 1 ) + l max 4 .
With the algebraic operation, we have
2 r R cos m = 1 k θ m cos m = 1 k 1 θ m = ( r R ) 2 cos m = 1 k 1 θ m - ( R 2 r 2 ) 2 ( cos 2 ( m = 1 k 1 θ m ) 1 ) + l max 4
Applying the Lagrange Mean Value Theorem, we obtain
2 r R θ k sin ξ k = ( R 2 r 2 ) 2 ( cos 2 ( m = 1 k 1 θ m ) 1 ) + l max 4 ( R r ) 2 cos ( m = 1 k 1 θ m )
where ξ k satisfies
m = 1 k 1 θ m < ξ k < m = 1 k θ m
Let f ( x ) = ( R 2 r 2 ) 2 ( cos 2 x 1 ) + l max 4 ( R r ) 2 cos x , 0 < x < φ . Then,
f ( x ) = ( R r ) 2 1 ( R + r ) 2 cos x ( R 2 r 2 ) 2 ( cos 2 x 1 ) + l max 4 sin x
Note that the formula ( R + r ) 2 cos x > ( R 2 r 2 ) 2 ( cos 2 x 1 ) + l max 4 can be rewritten as:
4 r R ( R + r ) 2 cos 2 x > l max 4 ( R 2 r 2 ) 2
If h > r 2 + l max 2 r , then we obtain l max 4 ( R 2 r 2 ) 2 < 0 . It leads Formula (A10) holds. By contrast, if h r 2 + L max 2 r , then we obtain l max 4 ( R 2 r 2 ) 2 0 . Furthermore, Formula (A10) can be rewritten as:
x acos ( l max 4 ( R 2 r 2 ) 2 4 r R ( r + R ) 2 )
Since R = r + h , then we obtain: acos ( l max 4 ( 2 r + h ) 2 h 2 4 r 2 ( r + h ) 2 ) acos ( l max 4 ( 2 r + h ) 2 h 2 4 r R ( r + R ) 2 ) .
Therefore, if 0 < x < φ , then f ( x ) < 0 . It reveals that the right part of the equation in Formula (A8) is monotonically decreasing. Besides, according to Formula (A9), the sequence { ξ k , k = 1 , 2 , . u } is strictly monotonically increasing. Also, it is well-known that the sine function is the monotonic increasing at ( 0 , π / 2 ) . Thus, it is safe to claim that the NCA sequence is strictly monotonically decreasing.
The proof of Lemma 3 is completed.  □
Proof of Lemma 4.
(1) Since n 1 + n 2 is even, then it can be divided into two cases: (a) both n 1 and n 2 are even; (b) both n 1 and n 2 are odd. Without loss of generality, let n 1 = v i ,   n 2 = v + i .
(a) When both n 1 and n 2 are even, there are two sub-cases:
① if v is even, and then we obtain i is even. According to Formula (5), we obtain
2 ω P ( v ) = k = 1 v / 2 8 θ k + 4 θ v 2 + 1 = k = 1 v + i 2 4 θ k k = v 2 + 1 v + i 2 4 θ k + k = 1 v i 2 4 θ k + k = v i 2 + 1 v 2 4 θ k + 4 θ v 2 + 1 = ω P ( n 1 ) + ω P ( n 2 ) + 4 k = 1 i 2 1 ( θ k + v i 2 θ k + v 2 ) + 2 ( θ v i 2 + 1 θ v + i 2 + 1 )
Then
ω P ( n 1 ) + ω P ( n 2 ) = 2 ω P ( v ) 4 k = 1 i 2 1 ( θ k + v i 2 θ k + v 2 ) 2 ( θ v i 2 θ v + i 2 )
Based on Lemma 3 and Formula (A11), we obtain ω P ( n 1 ) + ω P ( n 2 ) 2 ω P ( v ) .
Furthermore, if and only if i = 0 the equation holds. And i = 0 means n 1 = n 2 .
② If v is odd, in this case, i is odd. According to Formula (5), we obtain
2 ω P ( v ) = 8 k = 1 ( v + 1 ) / 2 θ k = 4 k = 1 v + i 2 θ k 4 k = v + 1 2 + 1 v + i 2 θ k + 4 k = 1 v i 2 θ k + 4 k = v i 2 + 1 v + 1 2 θ k = ω P ( n 1 ) + ω P ( n 2 ) + 4 k = 1 i 1 2 ( θ k + v i 2 + 1 θ k + v + 1 2 ) + 2 ( θ v i 2 + 1 θ v + i 2 + 1 )
Based on Lemma 3 and Formula (A12), we obtain ω P ( n 1 ) + ω P ( n 2 ) < 2 ω P ( v ) .
(b) When both n 1 and n 2 are odd, also, there are two sub-cases: ① v is even; ② v is odd. First, for v is even, we obtain 2 ω P ( v ) = ω P ( n 1 ) + ω P ( n 2 ) + 4 k = 1 i 1 2 ( θ k + v i + 1 2 θ k + v 2 + 1 ) . Furthermore, ω P ( n 1 ) + ω P ( n 2 ) 2 ω P ( v ) . If and only if i = 1 the equation holds. And, i = 1 means n 1 , n 2 are consecutive odd. Second, for v is odd, we obtain ω P ( n 1 ) + ω P ( n 2 ) = 2 ω P ( v ) 4 k = 1 i 2 ( θ k + v i + 1 2 θ k + v + 1 2 ) leading ω P ( n 1 ) + ω P ( n 2 ) 2 ω P ( v ) . If and only if i = 0 , the equation holds. And i = 0 means n 1 = n 2 .
(2) Without loss of generality, it is assumed that n 2 = v + i , n 1 = v + 1 i . And let n 1 is odd, n 2 is even. Since n 1 + n 2 is odd, there are two cases: ① v is odd; ② v is even. First, if v is odd, thus i is odd. According to Formula (5), it can be derived that
ω P ( v ) + ω P ( v + 1 ) = k = 1 v + i 2 4 θ k k = v + 1 2 + 1 v + i 2 4 θ k + k = 1 v + 2 i 2 4 θ k + k = v + 2 i 2 + 1 v + 1 2 4 θ k + 2 θ v + 1 2 + 1 = ω P ( n 1 ) + ω P ( n 2 ) + 4 k = 1 i 1 2 ( θ k + v + 2 i 2 θ k + v + 1 2 ) + 2 ( θ v + 1 2 + 1 θ v + i 2 + 1 )
Then
ω P ( n 1 ) + ω P ( n 2 ) = ω P ( v ) + ω P ( v + 1 ) 2 ( θ v + 1 2 + 1 θ v + i 2 + 1 ) 4 k = 1 i 1 2 ( θ k + v + 2 i 2 θ k + v + 1 2 )
According to Formula (A13), we obtain ω P ( n 1 ) + ω P ( n 2 ) ω P ( v ) + ω P ( v + 1 ) . If and only if i = 1 the equation holds. And, i = 1 means n 2 = v + 1 ,   n 1 = v .
Second, if v is even, in this case, i is even. Similarly, we obtain.
ω P ( v ) + ω P ( v + 1 ) = k = 1 v + i 2 4 θ k k = v 2 + 1 v + i 2 4 θ k + k = 1 v + 2 i 2 4 θ k + k = v + 2 i 2 + 1 v + 2 2 4 θ k + 2 θ v 2 + 1 = ω P ( n 1 ) + ω P ( n 2 ) + 4 k = 1 i 2 ( θ k + v + 2 i 2 θ k + v 2 ) + 2 ( θ v 2 + 1 θ v + i 2 + 1 )
Then,
ω P ( n 1 ) + ω P ( n 2 ) = ω P ( v ) + ω P ( v + 1 ) 4 k = 1 i 2 ( θ k + v + 2 i 2 θ k + v 2 ) 2 ( θ v 2 + 1 θ v + i 2 + 1 )
According to Formula (A14), we obtain ω P ( n 1 ) + ω P ( n 2 ) ω P ( v ) + ω P ( v + 1 ) . If and only if i = 0 , the equation holds. And, i = 0 means n 2 = v ,   n 1 = v + 1 .
The proof of Lemma 4 is completed.  □

References

  1. Wang, Y.; Wu, S.; Chen, Z.; Gao, X.; Chen, G. Coverage Problem with Uncertain Properties in Wireless Sensor Networks: A Survey. Comput. Netw. 2017, 123, 200–232. [Google Scholar] [CrossRef]
  2. Abraham, J.; Jose, A. Literature Survey on Reliable event detection in WSN using aggregation of data. In 2018 Second International Conference on Computing Methodologies and Communication; IEEE: Piscataway, NJ, USA, 2018; pp. 841–843. [Google Scholar]
  3. Yu, H.; Zikria, Y.B. Cognitive Radio Networks for Internet of Things and Wireless Sensor Networks. Sensors 2020, 20, 5288. [Google Scholar] [CrossRef] [PubMed]
  4. Tripathi, A.; Gupta, H.; Dutta, T.; Mishra, R.; Shukla, K.; Jit, S. Coverage and Connectivity in WSNs: A Survey, Research Issues and Challenges. IEEE Access 2018, 6, 26971–26992. [Google Scholar] [CrossRef]
  5. Tang, L.; Gong, X.; Wu, J.; Zhang, J. Target Detection in Bistatic Radar Networks: Node Placement and Repeated Security Game. Wirel. Commun. IEEE Trans. 2013, 12, 1279–1289. [Google Scholar] [CrossRef]
  6. Zalyubovskiy, V.; Erzin, A.; Astrakov, S.; Choo, H. Energy-efficient Area Coverage by Sensors with Adjustable Ranges. Sensors 2009, 9, 2446–2460. [Google Scholar] [CrossRef] [PubMed]
  7. Zhuang, Y.; Wu, C.; Zhang, Y.; Jia, Z. Compound Event Barrier Coverage in Wireless Sensor Networks under Multi-Constraint Conditions. Sensors 2016, 17, 25. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Kumar, S.; Lai, T.; Arora, A. Barrier coverage with wireless sensors. Wirel. Netw. 2007, 13, 817–834. [Google Scholar] [CrossRef] [Green Version]
  9. Tao, D.; Tang, S.; Zhang, H.; Mao, X.; Ma, H. Strong barrier coverage in directional sensor networks. Comput. Commun. 2012, 35, 895–905. [Google Scholar] [CrossRef]
  10. Chernyak, V. Fundamentals of Multisite Radar Systems: Multistatic Radars and Multiradar Systems; Routledge: Oxfordshire, UK, 2018. [Google Scholar]
  11. He, S.; Gong, X.; Zhang, J.; Chen, J.; Sun, Y. Barrier Coverage in Wireless Sensor Networks: From Lined-based to Curve-based Deployment. In 2013 Proceedings IEEE INFOCOM; IEEE: Piscataway, NJ, USA, 2013; pp. 470–474. [Google Scholar]
  12. Willis, N.J.; Griffiths, H.D. Advances in Bistatic Radar; SciTech Publishing: Raleigh, NC, USA, 2007; pp. 1–494. [Google Scholar]
  13. Hamdollahzadeh, M.; Amiri, R.; Behnia, F. Moving Target Localization in Bistatic Forward Scatter Radars: Performance Study and Efficient Estimators. IEEE Trans. Aerosp. Electron. Syst. 2019, 56, 1582–1594. [Google Scholar] [CrossRef]
  14. Cataldo, D.; Gentile, L.; Ghio, S.; Giusti, E.; Tomei, S.; Martorella, M. Multibistatic Radar for Space Surveillance and Tracking. IEEE Aerosp. Electron. Syst. Mag. 2020, 35, 14–30. [Google Scholar] [CrossRef]
  15. Luo, Y.-F.; Liu, N.; Zhang, L.; Li, Q.; Zhang, J.; Tang, S.; Zhao, S. An Interference Suppression Method for Multistatic Radar Based on Noise Subspace Projection. IEEE Sens. J. 2020, 20, 8797–8805. [Google Scholar]
  16. Chiani, M.; Giorgetti, A.; Paolini, E. Sensor Radar for Object Tracking. Proc. IEEE 2018, 106, 1022–1041. [Google Scholar] [CrossRef] [Green Version]
  17. Gong, X.; Zhang, J.; Cochran, D.; Xing, K. Optimal Placement for Barrier Coverage in Bistatic Radar Sensor Networks. IEEE/ACM Trans. Netw. 2014, 24, 259–271. [Google Scholar] [CrossRef]
  18. Xu, X.; Zhao, C.; Cheng, Z.; Gu, T. Approximate Optimal Deployment of Barrier Coverage on Heterogeneous Bistatic Radar Sensors. Sensors 2019, 19, 2403. [Google Scholar] [CrossRef] [Green Version]
  19. Chang, H.-Y.; Kao, L.; Chang, K.-P.; Chen, C. Fault-Tolerance and Minimum Cost Placement of Bistatic Radar Sensors for Belt Barrier Coverage. In Proceedings of the 2016 International Conference on Network and Information Systems for Computers (ICNISC), Wuhan, China, 15–17 April 2016; pp. 1–7. [Google Scholar]
  20. Chen, J.; Wang, B.; Liu, W. Constructing perimeter barrier coverage with bistatic radar sensors. J. Netw. Comput. Appl. 2015, 57, 129–141. [Google Scholar] [CrossRef]
  21. Fan, H.; Li, M.; Sun, X.; Wan, P.-J.; Zhao, Y. Barrier Coverage by Sensors with Adjustable Ranges. ACM Trans. Sens. Netw. 2014, 11, 1–20. [Google Scholar] [CrossRef]
  22. Melo, L.V.D.; Queiroz, T.A.D. Integer Linear Programming Formulations for the RCPSP considering Multi-Skill, Multi-Mode, and Minimum and Maximum Time Lags. IEEE Lat. Am. Trans. 2021, 19, 5–16. [Google Scholar] [CrossRef]
  23. Han, R.; Yang, W.; Zhang, L. Achieving Crossed Strong Barrier Coverage in Wireless Sensor Network. Sensors 2018, 18, 534. [Google Scholar] [CrossRef] [Green Version]
  24. Huang, P.; Zhu, W.; Guo, L. Optimizing Movement for Maximizing Lifetime of Mobile Sensors for Covering Targets on a Line. Sensors 2019, 19, 273. [Google Scholar] [CrossRef] [Green Version]
  25. Fan, F.; Ji, Q.; Wu, G.; Wang, M.; Ye, X.; Mei, Q. Dynamic Barrier Coverage in a Wireless Sensor Network for Smart Grids. Sensors 2018, 19, 41. [Google Scholar] [CrossRef] [Green Version]
  26. Tao, D.; Wu, T.-Y. A Survey on Barrier Coverage Problem in Directional Sensor Networks. Sens. J. IEEE 2015, 15, 876–885. [Google Scholar]
  27. Chen, J.; Wang, B.; Liu, W.; Yang, L.; Deng, X. Rotating Directional Sensors to Mend Barrier Gaps in a Line-Based Deployed Directional Sensor Network. IEEE Syst. J. 2017, 11, 1027–1038. [Google Scholar] [CrossRef]
  28. Si, P.; Wu, C.; Zhang, Y.; Jia, Z.; Ji, P.; Chu, H. Barrier Coverage for 3D Camera Sensor Networks. Sensors 2017, 17, 1771. [Google Scholar] [CrossRef] [Green Version]
  29. Chen, G.; Xiong, Y.; She, J.; Wu, M.; Galkowski, K. Optimization of the Directional Sensor Networks with Rotatable Sensors for Target-Barrier Coverage. IEEE Sens. J. 2020, 21, 8276–8288. [Google Scholar] [CrossRef]
  30. Gong, X.; Zhang, J.; Cochran, D.; Xing, K. Barrier coverage in bistatic radar sensor networks: Cassini oval sensing and optimal placement. In Proceedings of the 14th ACM international symposium on Mobile ad hoc networking and computing, Bangalore, India, 29 July 2013; pp. 49–58. [Google Scholar]
  31. He, S.; Gong, X.; Zhang, J.; Chen, J.; Sun, Y. Curve-Based Deployment for Barrier Coverage in Wireless Sensor Networks. Wirel. Commun. IEEE Trans. 2014, 13, 724–735. [Google Scholar] [CrossRef]
  32. Wang, B.; Chen, J.; Liu, W.; Yang, L. Minimum Cost Placement of Bistatic Radar Sensors for Belt Barrier Coverage. IEEE Trans. Comput. 2015, 65, 577–588. [Google Scholar] [CrossRef]
  33. Xu, X.; Zhao, C.; Ye, T.; Gu, T. Minimum Cost Deployment of Bistatic Radar Sensor for Perimeter Barrier Coverage. Sensors 2019, 19, 225. [Google Scholar] [CrossRef] [Green Version]
  34. Do, C.T.; Nguyen, H.V. Tracking Multiple Targets from Multistatic Doppler Radar with Unknown Probability of Detection. Sensors 2019, 19, 1672. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The coverage area of bistatic radar under different parameters; (a) d 1 > l max ; (b) d 1 = l max ; (c) 2 l max / 2 d 1 < l max ; (d) 0 < d 1 < 2 l max / 2 .
Figure 1. The coverage area of bistatic radar under different parameters; (a) d 1 > l max ; (b) d 1 = l max ; (c) 2 l max / 2 d 1 < l max ; (d) 0 < d 1 < 2 l max / 2 .
Sensors 21 06573 g001
Figure 2. (a) The enclosed area is rounded by a circular FoI with a width of H and an inner radius of Rmin. (b) An FoI is divided into three sub-circles, where the black curve represents the boundary of a sub-circle and the blue curve represents the deployment curve.
Figure 2. (a) The enclosed area is rounded by a circular FoI with a width of H and an inner radius of Rmin. (b) An FoI is divided into three sub-circles, where the black curve represents the boundary of a sub-circle and the blue curve represents the deployment curve.
Sensors 21 06573 g002
Figure 3. Deployment diagram for the deployment sequence S = 2 , P 1 3 , 1 , P 3 2 .
Figure 3. Deployment diagram for the deployment sequence S = 2 , P 1 3 , 1 , P 3 2 .
Sensors 21 06573 g003
Figure 4. The influence of H on the change rates of deployment cost.
Figure 4. The influence of H on the change rates of deployment cost.
Sensors 21 06573 g004
Figure 5. The influence of H on the relative changes of deployment cost.
Figure 5. The influence of H on the relative changes of deployment cost.
Sensors 21 06573 g005
Figure 6. The influence of H on the change rates of the number of transmitters.
Figure 6. The influence of H on the change rates of the number of transmitters.
Sensors 21 06573 g006
Figure 7. The influence of H on the relative change of the number of transmitters.
Figure 7. The influence of H on the relative change of the number of transmitters.
Sensors 21 06573 g007
Figure 8. The influence of H on the total number of transmitters.
Figure 8. The influence of H on the total number of transmitters.
Sensors 21 06573 g008
Figure 9. The influence of H on the relative change numbers of receivers.
Figure 9. The influence of H on the relative change numbers of receivers.
Sensors 21 06573 g009
Figure 10. The relationship between the optimal number of sub-circles q and R min .
Figure 10. The relationship between the optimal number of sub-circles q and R min .
Sensors 21 06573 g010
Figure 11. The change of the ratio of the number of transmitters to receivers with the inner radius.
Figure 11. The change of the ratio of the number of transmitters to receivers with the inner radius.
Sensors 21 06573 g011
Figure 12. The relationship between the number of transmitters M and R min .
Figure 12. The relationship between the number of transmitters M and R min .
Sensors 21 06573 g012
Figure 13. The relationship between the number of receivers N and R min .
Figure 13. The relationship between the number of receivers N and R min .
Sensors 21 06573 g013
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Li, H.-P.; Feng, D.-Z.; Chen, S.-F.; Zhou, Y.-P. Deployment Optimization Method of Multistatic Radar for Constructing Circular Barrier Coverage. Sensors 2021, 21, 6573. https://doi.org/10.3390/s21196573

AMA Style

Li H-P, Feng D-Z, Chen S-F, Zhou Y-P. Deployment Optimization Method of Multistatic Radar for Constructing Circular Barrier Coverage. Sensors. 2021; 21(19):6573. https://doi.org/10.3390/s21196573

Chicago/Turabian Style

Li, Hai-Peng, Da-Zheng Feng, Shao-Feng Chen, and Ya-Peng Zhou. 2021. "Deployment Optimization Method of Multistatic Radar for Constructing Circular Barrier Coverage" Sensors 21, no. 19: 6573. https://doi.org/10.3390/s21196573

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop