Next Article in Journal
Eddy Current-Based Delamination Imaging in CFRP Using Erosion and Thresholding Approaches
Previous Article in Journal
Fog Density Analysis Based on the Alignment of an Airport Video and Visibility Data
Previous Article in Special Issue
Unmanned Aerial Vehicle-Based Compressed Data Acquisition for Environmental Monitoring in WSNs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Charging Scheduling Method for Wireless Rechargeable Sensor Networks Based on Energy Consumption Rate Prediction for Nodes

School of Computer Science, Software and Cyberspace Security, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
*
Author to whom correspondence should be addressed.
Sensors 2024, 24(18), 5931; https://doi.org/10.3390/s24185931
Submission received: 28 July 2024 / Revised: 6 September 2024 / Accepted: 9 September 2024 / Published: 12 September 2024
(This article belongs to the Special Issue Energy Efficient Design in Wireless Ad Hoc and Sensor Networks)

Abstract

:
With the development of the IoT, Wireless Rechargeable Sensor Networks (WRSNs) derive more and more application scenarios with diverse performance requirements. In scenarios where the energy consumption rate of sensor nodes changes dynamically, most existing charging scheduling methods are not applicable. The incorrect estimation of node energy requirement may lead to the death of critical nodes, resulting in missing events. To address this issue, we consider both the spatial imbalance and temporal dynamics of the energy consumption of the nodes, and minimize the Event Missing Rate (EMR) as the goal. Firstly, an Energy Consumption Balanced Tree (ECBT) construction method is proposed to prolong the lifetime of each node. Then, we transform the goal into Maximizing the value of the Evaluation function of each node’s Energy Consumption Rate prediction (MEECR). Afterwards, the setting of the evaluation function is explored and the MEECR is further transformed into a variant of the knapsack problem, namely “the alternating backpack problem”, and solved by dynamic programming. After predicting the energy consumption rate of the nodes, a charging scheduling scheme that meets the Dual Constraints of Nodes’ energy requirements and MC’s capability (DCNM) is developed. Simulations demonstrate the advantages of the proposed method. Compared to the baselines, the EMR was reduced by an average of 35.2% and 26.9%.

1. Introduction

With the rapid development of the Internet of Things (IoT), Wireless Sensor Networks (WSNs) have found extensive applications in fields such as environmental monitoring [1], smart homes [2], and healthcare [3]. However, the limited battery capacity of sensor nodes poses a significant challenge to their long-term deployment and operation. To address this issue, Wireless Rechargeable Sensor Networks (WRSNs) have been developed. One or more Mobile Chargers (MCs) equipped with Wireless Power Transfer (WPT) technology are adopted to enable the remote and wireless charging of nodes, thereby significantly extending the network lifetime [4,5,6,7,8,9].
The energy consumption rate of nodes is often dynamic, fluctuating with the occurrence of events. Moreover, nodes closer to the Base Station (BS) bear a higher data burden and thus consume more energy. Without an effective charging scheduling strategy to promptly recharge these critical nodes, the network’s reliability can deteriorate rapidly, leading to potential paralysis. For example, in a nuclear wastewater monitoring network [10], if a critical sensing or forwarding node died due to energy depletion, the event reports may not be sent to the BS, causing the loss of critical data.
Most existing charging scheduling methods often overlook the temporal dynamics of node energy consumption rate, making them unsuitable for practical applications. Therefore, we propose a highly reliable charging scheduling method for WRSNs. We define the Event Missing Rate (EMR) as the ratio of the number of events not received by the base station to the total number of events occurring within the network monitoring area. Our method integrates network topology optimization and node energy consumption rate prediction, aiming to minimize the EMR.
There are three primary challenges in achieving this objective. Firstly, optimizing the network topology to facilitate effective charging scheduling is complex, even with the availability of mature routing protocols. Secondly, it is difficult to accurately predict the nodes’ energy consumption rate due to their spatial imbalance and temporal variability. Finally, selecting the nodes to charge, and determining the amount of energy supplied to them as well as the charging sequence are all complex problems for the energy-limited MC.
To address these challenges, we first propose an Energy Consumption Balanced Tree (ECBT) construction method. Then, we decompose the issue into two subproblems: (1) Maximizing the value of the Evaluation function of each node’s Energy Consumption Rate prediction (MEECR) by dynamic programming, and (2) developing a charging scheduling scheme that meets the Dual Constraints of Nodes’ energy requirements and MC’s capability (DCNM), thereby minimizing the EMR. The main contributions of this paper are summarized as follows.
  • To the best of our knowledge, we are the first to jointly consider the distributional imbalance and temporal dynamics of the node energy consumption rate in WRSNs and propose a charging scheduling method that minimizes the Event Missing Rate.
  • To prolong the lifetime of each node, we propose an energy consumption balanced tree construction method based on a greedy algorithm to form the network topology.
  • To solve the MEECR problem, we establish an energy consumption rate prediction model and transform it into an “alternating backpack” problem, which is then solved using a dynamic programming method. To solve the DCNM problem, we propose a charging scheduling scheme that satisfies the dual constraints.
The rest of this paper is organized as follows. In Section 2, we review related works focusing on the requirements of nodes, the performance of the MC, and the quality of service. The network model and energy consumption rate prediction are introduced in Section 3. Section 4 presents the proposed construction of the energy consumption balanced tree. Section 5 provides the solution for the energy consumption rate prediction for nodes. In Section 6, the charging scheduling scheme consistent with the MC’s service capability and nodes’ energy requirements is described. The simulation results are presented and analyzed in Section 7. Section 8 concludes the paper.

2. Related Works

In this section, we introduce the existing works focusing on the requirements of nodes [11,12,13,14,15,16,17,18], the performance of the MC [19,20,21,22,23,24,25], and the quality of service [26,27,28,29,30,31,32] to illustrate the significance of our study.

2.1. Focus on the Requirements of Nodes

In WRSNs, nodes are usually regarded as the service recipients. Wang et al. [11] proposed a hybrid energy supply framework combining solar energy and wireless charging by optimizing cluster-head deployment and energy management to improve the energy efficiency and cost-effectiveness of wireless sensor networks. To maximize the minimum residual energy of nodes after data transmission, Baek et al. [12] proposed a Voronoi diagram-based algorithm for UAV hovering point determination and path planning. After that, MCs were increasingly considered for both charging and data collection tasks to minimize network energy consumption and extend network lifetime, as exemplified by an optimized bifunctional vehicle path method proposed in [13]. Additionally, Lu et al. [14] introduced a joint routing and charging algorithm utilizing MCs for data collection while accounting for dynamic factors such as topology changes to prolong the lifetime of WRSNs. Furthermore, Yang et al. [15] proposed a dynamic charging scheduling scheme based on the Actor-Critic Reinforcement Learning (ACRL) algorithm to improve average node lifetime. To enhance the robustness of the energy transfer model, Lin et al. [16] introduced the linear constraints and proposed a directional charging scheme to minimize charging delay. For scenarios involving multiple MCs, Jia et al. [17] developed an on-demand charging architecture based on dynamic collaboration among MCs, aiming to minimize energy void rates through static partitioning and online path planning. Similarly, to reduce charging delay, increase coverage, and enhance network survivability, Kaswan et al. [18] proposed a distributed mobile charging protocol based on game theory, formulating the mobile charging problem as a series of repetitive games among MCs.
While these studies contribute to extending network lifetime and reducing charging delay, they overlook the temporal and spatial attributes of nodes. Consequently, the importance of nodes (e.g., workload) may change and this may increase the risk of critical node failure under limited MC service capacity.

2.2. Focus on the Performance of the MC

Enhancing the energy efficiency of the MC has been a primary objective in many studies. In [19,20,21], the authors proposed some one-to-many charging schedules for the MC to charge all nodes in a region, focusing on obtaining the optimal staying points and traversal paths to reduce the charging and moving cost of the MC. Dai et al. [22] considered a scenario where MCs can only charge nodes at the edge of the network, proposing a rectangle-based partitioned mobility strategy and a sector-based rotation strategy to minimize the charging time and improve the energy efficiency of the MC. Liang et al. [23] introduced an improved Firefly Algorithm (IFA) to optimize the deployment of the MC, enhancing charging efficiency and reducing energy consumption. Furthermore, Wu et al. [24] proposed a charging-oriented sensor layout and scheduling strategy to address deficiencies in charging coverage and efficiency. To increase system robustness, Yang et al. [25] introduced a risk-averse charging schedule model, balancing utility and risk to ensure a highly effective energy supply in the presence of risks.
However, these approaches primarily focus on how to improve the performance of the MC but neglect the energy requirement of nodes. As a result, these methods may not be suitable for scenarios with dynamic node energy consumption. If node energy consumption exceeds expectations, the designed scheduling schemes may fail to ensure continuous network operation.

2.3. Focus on the Quality of Service

Nowadays, more and more works have focused on the quality of service during the charging scheduling process. In [26], with the goal of maximizing the amount of data collected per unit of energy consumption by the MC, Lyu et al. proposed a cell-based residency determination and a path planning method based on the fireworks algorithm, where the MC periodically charges and collects data from all nodes in the cell. Boukerche et al. [27] designed two scheduling schemes for latency-sensitive and latency-tolerant data collection, respectively, by first constructing a cluster-based topology and then using a heuristic algorithm to design scheduling schemes based on different delay requirement scenarios. Additionally, a scheduling scheme combining on-demand charging and data collection was proposed in [28], suitable for applications with low tolerance for data dissemination latency. MCs are also considered for direct environmental data monitoring in addition to collecting data from nodes. Lin et al. [29] proposed a heuristic hexagonal-based scheduling algorithm to periodically collect and monitor data from the entire area. For event-triggered WRSNs, Dai et al. [30] proposed a node dormancy/activation switching and charging scheduling strategy to maximize the quality of the network monitoring of stochastic events. While this mechanism ensures nodes are not inactivated, it reduces the robustness of network monitoring, leading to missed events during node dormancy and reduced monitoring quality. To address this, Aloqaily et al. [31] proposed a decentralized charging strategy based on local learning (LL) to charge nodes through dynamic energy consumption prediction, divided into an initialization phase and a charging scheduling phase. The node’s charging requirement is obtained through learning and prediction in the initialization phase, and the MC continuously collects node information in the charging scheduling phase, dynamically updating the prediction results to adjust the charging order. However, it only considers a single attribute of node energy, so in [32], Kan et al. designed a charging scheduling scheme by integrating each node’s coverage, network connectivity, residual energy, and path length to maximize the monitoring quality. However, this scheme only considers nodes generating data at a fixed rate.
The quality of service is crucial for ensuring the reliability of WRSNs. However, existing methods are not suitable for multi-hop transmission and event-triggered networks. They either consider the network topology while simplifying data generation methods [32] or consider random events while ignoring the network topology’s impact on event capture [30], which cannot guarantee event detection in practical applications. To address these issues, we propose a charging scheduling method based on energy consumption balanced tree construction and event-oriented node energy consumption rate prediction to minimize the EMR.

3. Network Model and Problem Description

3.1. Network Model

To increase the applicability of the proposed method, assume that N nodes (each of them is remarked as si (i ∈ [1, N])) are randomly and uniformly deployed in a two-dimensional region, and all of them are aware of their locations. Compared to the deterministic deployment, the randomized uniform deployment is less costly and more flexible. Subsequently, the network runs according to the following two phases.
(1)
Network Topology Construction Phase
As shown in Figure 1, it is a simple example of a tree network topology. Twelve nodes communicate with the BS via multi-hop transmission. To achieve a balanced load among nodes, a network topology rooted at the BS is formed based on the proposed Energy Consumption Balanced Tree (ECBT) construction method. This approach aims to reduce the node failure rate and the EMR. The construction process of the ECBT is explained in detail in Section 4.
(2)
Data Uploading Phase
Once the topology is constructed, several nodes are assigned the task of monitoring the randomly deployed Points of Interest (POIs) within their sensing range. As soon as an event occurs at one of these POIs, the nodes immediately transmit the sensing data to the BS along the constructed paths, hop-by-hop, as shown by the black paths in Figure 1. It is evident that the nodes can be categorized into three types based on the tasks they perform:
  • Nodes that monitor POIs and only upload their own sensing data, such as s1 in Figure 1;
  • Nodes that monitor POIs and both upload their own sensing data and transmit the sensing data from other nodes, such as s4 in Figure 1;
  • Nodes that do not monitor any POIs (i.e., there are no POIs within their sensing range) but transmit the sensing data from other nodes, such as s7 in Figure 1.
Without a loss of generality, we assume that the MC traverses some nodes and replenishes energy to them during a fixed duration T. Here, the BS is both the starting and ending point of the MC’s journey. According to the setting described above, it is evident that the energy consumption rate of the nodes will change with the occurrence and termination of events. This will directly affect the charging scheduling behavior of the MC and its energy replenishment effectiveness during each round of service time. Therefore, it needs to be characterized at a fine-grained level. To reduce complexity, a discrete method is adopted where T is separated into K equal-length “time slices”. For each time slice k (k ∈ [1, K]), the energy consumption rate of node si is assumed to be a constant, denoted as pk(si).
Apparently, it is required that each si must survive for at least one round of service time, i.e., T after being charged. That is, making sure that Formula (1) holds, in which Earr(si) represents the residual energy of si when the MC has just arrived. Eo(si) represents the energy that si receives from the MC this time.
E a r r s i + E o s i k = 1 K T / K p k s i
The set of nodes served by the MC during the jth traversal is defined as Oj, so the total energy consumption (denoted as Ej(MC)) and total time consumption (marked as Tj(MC)) of the MC can be represented by Formulas (2) and (3), respectively. Here, pm and Dj are the energy the MC consumes to move a unit distance and the total distance the MC moves during T, respectively. pc and Tc(si) represent the energy transmission power of the MC as well as the time the MC spends on charging si, respectively. The moving speed of the MC is denoted as v.
E j M C = p m D j + p c s i O j T c s i
T j M C = D j / v + s i O j T c s i
Obviously, to ensure that the MC can return to the BS after each round of service, it is essential to satisfy Formulas (4) and (5). Here, EMC is the battery capacity of the MC.
E j M C E M C
T j M C T
Furthermore, the charging efficiency of the MC to each node is uniformly set to η, so we have
E o s i = η p c T c s i

3.2. Energy Consumption Rate Prediction

Without a loss of generality, we assume that a “sensing event” may occur at any POIl and follows a Poisson process with intensity λl [33,34]. In addition, at any given time, at most one sensing event occurs at a POI and each event is independent [30]. The range that a node si can monitor is defined as R(si). Therefore, if si can monitor the event that occurred at a POIl, there must be the POIl ∈ R(si).
Once a surviving node monitors the occurrence of an event, it continues to send sensing data to the BS until the end of the event. Obviously, replenishing energy to the corresponding nodes by the MC to ensure that they do not die is an effective means to lower the EMR. However, the network often consists of a substantial number of nodes. The energy capacity of the MC and the number of nodes it can serve each time are restricted. Consequently, improving the charging scheduling efficiency of the MC is a primary objective of WRSNs. It is easy to find that “predicting the future energy consumption rate of nodes accurately” is one of the effective means to achieve this goal. So, it is analyzed here.
The energy consumption rate of si during a round of service time T (i.e., the time interval between two consecutive replenishments) can be represented by the following vector.
p T s i = p 1 s i , p 2 s i , , p K s i
As previously mentioned, the nodes can be categorized into three types based on the tasks they undertake. This means that there are three different energy consumption rates for each time slice of si. That is, there are 3K results for p T s i . In order to reduce the search space, only “whether there is an event or not” is used as the basis for distinguishing the energy consumption rate of a node. If there is no sensing event, the energy consumption rate of si is ω1, otherwise it becomes ω2(si), which reduces the possible results of p T s i to 2K. So, C s i = p T s i 1 , p T s i 2 , , p T s i 2 K is used to represent the space of solutions of p T s i , and f p T s i x x 1 , 2 K serves as the evaluation function. The larger the value of f(.), the greater the probability that p T s i x occurs in the solution space C(si), i.e., the prediction of the energy consumption rate of si in the following duration T is more accurate. How to reasonably characterize the evaluation function f(.) and how to quickly find the optimal solution p T s i x from a 2K-sized space is the key to realize a “more accurate prediction of the future energy consumption rate of nodes”. We will explain this in detail in Section 5.

3.3. Problem Description

The objective of this paper is to Minimize the EMR (MEMR). Thus, based on the assumptions above, it can be split into two subproblems as follows.
  • Maximizing the value of the Evaluation function (denoted as f p T s i x ) of each node’s Energy Consumption Rate prediction (MEECR problem). It is evident that precisely predicting the future energy consumption rate of nodes is important because accurate prediction helps determine the energy requirement to ensure the nodes’ survival until the next replenishment. Consequently, the failure rate of critical nodes in the network can be reduced, leading to a decrease in the EMR. Therefore, the accuracy of node energy consumption rate prediction is negatively correlated with the EMR.
  • Based on the energy consumption rate prediction of the nodes, a charging scheduling scheme is developed to meets the Dual Constraints of Nodes’ energy requirements and MC’s capability (DCNM problem).
Thus, the issue is formally described as
M a x i = 1 N f p T s i x     x 1 , 2 K s . t .   ( 1 ) ,   ( 4 )   and   ( 5 )
The symbols mentioned in this section and their definitions are shown in Table 1.

4. Construction of Energy Consumption Balanced Tree

In order to minimize the load difference among nodes and thereby reduce node failure rate, we first construct an Energy Consumption Balanced Tree (ECBT) that includes all nodes in the network. The BS serves as the root.

4.1. Node Energy Consumption Model for Sending and Receiving Data

Without a loss of generality, the energy consumption model proposed by W. R. Heinzelman [35] is adopted in our method. Thus, for a sensor node, to transmit a 1-bit message to its parent, the energy consumption of it is
p t s i , s p = e e l e c + ε f s d 2 s i , s p     d s i , s p < d 0 p t s i , s p = e e l e c + ε a m p d 4 s i , s p   d s i , s p d 0
and to receive this message, the radio expends
p r s i = e e l e c
This model shows the communication process between si and its parent, i.e., sp, and the parameter d(si, sp) represents the distance between them. When d(si, sp) < d0, the model can be regarded as a “free space environment” (low signal attenuation), otherwise it is a “multi-path fading environment” (large signal attenuation). d0 denotes the threshold distance and its value is (εfs/εamp)1/2. Moreover, Pt(si, sp) and Pr(si) are the energy consumption rate of si during its sending and receiving phase, respectively. Meanwhile, eelec is the unit energy consumption of the circuit. εfs and εamp are the constant parameters of the signal amplifier in the free space and multi-path fading environment.
The energy consumption of node si in a round of service time T is considered to be its workload. In the worst case, there is a constant stream of events at all of the POIs within the range R(si) over T. Thus, the maximum energy consumption of si during this period can be expressed as
E T s i = P O I l P O I l R s i m p r s i + p t s i , s p
In this formula, |POIl| represents the number of POIs that si can monitor, and m represents the size of data generated by a node sensing a POI during T.

4.2. Energy Consumption Balanced Tree Construction (ECBTC) Based on Greedy Strategy

It is well known that in multi-hop transmission WRSNs, the nodes located close to the BS consume a significant amount of energy since they usually forward a large volume of data. As the root nodes of huge subtrees, their importance in the network is self-evident. Hence, the primary objective of constructing an ECBT is to balance the load among subtrees rather than individual nodes. In this way, the survival rate of the nodes can be significantly enhanced while reducing the EMR. To achieve this goal, it is necessary to ensure that the load difference among the subtrees of the ECBT is as consistent as possible before and after any node joins. Obviously, this is an NP-hard problem. To this end, we propose the following greedy strategy.
Step 1. Assume the BS as the root and generate the initial ECBT (line 1).
Step 2. The nodes in the network are ranked in descending order of their Euclidean distance from the BS to create the queue Cs (line 3). For instance, in Figure 2, Cs = {s4, s7, s11, s9, s3, s6, s13, s12, s2, s8, s10, s14, s1, s5}. The highlighted nodes are those that have already been added to the tree.
Step 3. If Cs = Φ, the construction process of ECBT ends. Otherwise, we investigate the first node in Cs (denoted as si). If the BS is its neighbor, si is directly added to the ECBT with the BS as its parent (e.g., s4, s7, s11, and s9 in Figure 2a). Following that, si is removed from Cs and Step 3 is performed again (line 5–9). Otherwise, the algorithm jumps to Step 4. In this way, both the transmission distance from the node to the BS can be shortened and the number of children of the BS can be increased as much as possible, so as to share the workload.
Step 4. Qp(si) is defined as the set of nodes that have previously been in the ECBT among all of the neighbors of si, which is also the set of candidate parents. If there is only one node in Qp(si), it will be considered as the parent of si. Therefore, si is added to the ECBT (e.g., in Figure 2b, s13 selects s11 as its parent and is consequently added to the tree because s11 is the only node in the ECBT among all of the neighbors of s13). Subsequently, si is removed from Cs and the algorithm moves to Step 3 again (line 27–28). Otherwise, Step 5 is carried out.
Step 5. Without a loss of generality, we suppose that the nodes in Qp(si) belong to a number of subtrees rooted at the nodes that are h hops away from the BS (marked as srh), respectively. Here, the set of these root nodes is denoted as Ωh(si). The initial value of h is 1, i.e., the subtrees rooted at the children of the BS are investigated first (line 15–23).
  • If Qp(si) ∩ Ωh(si) ≠ Φ, the node closest to si in this intersection set is selected as its parent. Subsequently, we remove si from Cs and the algorithm jumps to Step 3. For example, in the given scenario depicted in Figure 2c, h = 1 and there are two nodes s4 and s9 in Qp(s8) = {s3, s4, s9} which are also the roots of the current subtrees (i.e., belong to Ω1(s8)). As a result, s8 takes the closer node s9 as its parent. The purpose of this is to decrease the number of hops between si and the BS and to shorten its single-hop transmission distance as much as possible in order to minimize the value of pt(si, sp).
  • If Qp(si) ∩ Ωh(si) = Φ, the algorithm jumps to Step 6.
Step 6. Find out whether Formula (11) holds for each node in Ωh(si):
E T s r h + P O I l P O I l R s i m p r s r h + p t s r h , s p h 1 < α s r h Ω h s i E T s r h / Ω h s i
Among them, sph−1 is the parent of srh. The parameter α is adjustable with a value between 1 and 2, and can be set according to the specific network situations. The function of Formula (11) is to determine if when si is added to the subtree with a node as the root (denoted as srh), the overall energy consumption of srh in a round of service time is less than the average energy consumption of all of the root nodes in Ωh(si) before si is added.
If there is a node srh that makes Formula (11) invalid, it indicates that adding si to the subtree with srh as the root will potentially increase the imbalance of energy consumption among the subtrees. Therefore, all of the candidate parents of si that exist in the subtree rooted at the srh are removed from Qp(si) (line 18–20) (e.g., s1, s10 in Figure 2d). Otherwise, no operation is performed.
Step 7. If Qp(si) is empty at this moment, then we roll back the “remove” operation in Step 6. Next, the node closest to si in Qp(si) is selected as its parent, and then we remove si from Cs, and the algorithm returns to Step 3. If there is only one node in Qp(si) at this time, it is chosen as the parent of si. Then we remove si from Cs, and the algorithm jumps to Step 3 (line 24–33). Otherwise, after making h = h + 1, Step 5 is carried out again.
An example of ECBTC and its pseudo-code are shown in Figure 2 and Algorithm 1, respectively. The parameters mentioned in this section and their definitions are shown in Table 2.
Algorithm 1. Energy Consumption Balanced Tree Construction, ECBTC
Input: All nodes and POIs of the network.
Output: ECBT .
  1:
= sBS, CE = {ET(s1), ET(s2),…, ET(sN)};
  2:
for ET(si) = 0 in CE;
  3:
Cs ← sort all nodes by distance (si, sBS);
  4:
for si in Cs:
  5:
   if sBS is the neighbor of si:
  6:
      connect (sBS, si);
  7:
      update ET(si) of si;
  8:
      continue;
  9:
   end if;
10:
   Qp(si) = Φ;
11:
   for sj < i in Cs:
12:
      if sj is the neighbor of si:
13:
         add sj to Qp(si);
14:
   end for;
15:
   h = 1;
16:
   while size (Qp(si)) > 1 && Qp(si)∩Ωh(si) == Φ do:
17:
      for srh in Ωh(si):
18:
         if srh does not satisfy Equation (11):
19:
            remove sp from Qp(si) which belong to the sub-trees of srh;
20:
         end if;
21:
      end for;
22:
      h++;
23:
   end while;
24:
   if Qp(si) == Φ:
25:
      roll back last remove operation;
26:
   end if;
27:
   if size(Qp(si)) == 1:
28:
      get sp from Qp(si);
29:
   else:
30:
      get sp of the shortest distance(sp, si) from Qp(si)∩Ωh(si);
31:
   end if;
32:
   connect(sp, si);
33:
   update ET(sr) of sr in path(sBS, si);
34:
end for;
35:
return Ω;

5. Energy Consumption Rate Prediction for Nodes

Now, the energy consumption of the nodes in the same layer of ECBT has been basically balanced. To address the MEECR problem, we further aim to predict the energy consumption rates of nodes in the future duration, i.e., T. Thus, the amount of energy that the MC needs to replenish each node can be estimated, so as to efficiently sustain the operations of nodes and reduce the EMR. Firstly, the value range of T is calculated out by considering the charging requirement of the nodes and the service capability of the MC. Then, based on the properties of Poisson processes, an evaluation function for the accuracy of the nodes’ energy consumption rate prediction, which can be adapted to the different number of POIs within R(si), is constructed. Finally, we propose a method of the near-optimal solution for the energy consumption rate prediction oriented to the alternating knapsack problem.

5.1. The Value Range of T

As previously indicated, setting a fixed value of T for the MC to traverse nodes not only regulates its charging behavior, but also enhances the accuracy of their energy consumption rate prediction. Obviously, the value of T cannot be too large because it should ensure that each replenished node can survive until the MC serves it again. That is, Formula (12) is as follows:
T < β E s / M a x i 1 , N ω 2 s i
In Formula (12), Es is the full battery capacity of a node, M a x ω 2 s i i 1 , N represents the maximum value of the energy consumption rate of all nodes in the network, and β is an adjustable parameter with a value between 0 and 1. Thus, it can be seen that once the network topology is established, this upper limit value is fixed.
On the other hand, the value of T should not be too small. It is crucial to ensure that the MC has enough time to serve all nodes under its energy constraint. Hence, according to the aforementioned Formulas (3) and (5), we have the following:
T D j / v + s i O j T c s i
The right side of Formula (13) is the lower limit of T. Nevertheless, the duration Tc(si) for which MC replenishes si in the j-th round is currently unknown before MC starts charging scheduling (i.e., Tc(si) can be determined after obtaining the optimal solution of the energy consumption rate prediction of si). Therefore, an approximate method is adopted here to estimate the value of Tc(si) in order to get the lower limit value of T. To simplify the explanation, Tc(si) is denoted as Thc(si) in the following expression, where h is the hop counts between si and the BS.
Here, we consider the worst case that all nodes that are one-hop away from the BS are replenished by the MC only when they are exhausted from the full energy Es to zero, without being served by the MC during this period. Thus, it is easy to know
T 1 c s i = E s / η p c
We assume that Ch represents the set of all nodes in the network that are h hops away from the BS, and the number of nodes in the set is |Ch|. The mean Euclidean distance from nodes in Ch to the BS is denoted as d h ¯ , and pt(d) represents the power consumption of a node that transmits data to a distance of d meters. Then it is evident that C 1 E s / e e l e c + p t d 1 ¯ is the size of the data packet uploaded to the BS by all of the nodes that are one-hop away from the BS in the worst case described above. 1 j = 1 h 1 C j / N denotes the proportion of nodes whose hop counts to the BS are no less than h. Furthermore, e e l e c + p t d h ¯ d h 1 ¯ represents the energy consumption of the hth-hop node for uploading 1 bit of data to its parent (i.e., the (h − 1)th hop node). Therefore, for any node si which is h hops away from the BS (h > 1), the duration for the MC to charge it each time can be estimated by Formula (15).
T h c s i = C 1 E s / e e l e c + p t d 1 ¯ 1 j = 1 h 1 C j / N e e l e c + p t d h ¯ d h 1 ¯ / η p c
It is easy to know that, based on the estimation according to Formula (15), the nodes with the same number of hops are assigned the same charging duration. As known from Section 4.2, the workload between the nodes above has been basically balanced with the help of ECBTC. As a result, the estimation is reasonable.

5.2. The Evaluation Function f(.) for Energy Consumption Rate Prediction

As previously stated, in MEECR, the purpose of setting evaluation function f p T s i x     x 1 ,   2 K is to acquire a quantitative index f p T s i x for every candidate solution p T s i x in the energy consumption rate vector solution space C(si) of si. The larger the index is, the better the candidate solution is, i.e., using this solution to predict the energy consumption rate of si within a future T has the best effect. To this end, we establish the correlation between sensing events and energy consumption rate based on the property of the Poisson process. Afterwards, it is classified according to the number of POIs that can be monitored by a node.

5.2.1. Only One POI within R(si)

We assumed in the previous section that the arrival process of the events on each POIl obeys a Poisson process with intensity λl. Accordingly, the probability of δ events occurring at a POIl in time duration Δt is
P X = δ = λ l Δ t δ e λ l Δ t / δ !
As mentioned before, there are only two values, i.e., ω1 and ω2(si), for the energy consumption rate of any node si. Therefore, in order to simplify the computational complexity, it is regulated here that if si has the same value of pk(si) in several consecutive time slices within a T, they will be merged into a “time interval”. Therefore, the “energy consumption rate vector of si within a T” described in Formula (7) can also be expressed by Formula (17) as follows.
p T s i = p 1 s i ,   τ s i 1 ,   p 2 s i ,   τ s i 2 ,   ,   p K s i ,   τ K s i   |   K K
Each two-tuple (py(si), τy(si))|y∈[1, K′] in Formula (17) shows that the energy consumption rate of si in the time interval τy(si) is py(si). Therefore, it is easy to know that for any POIl monitored by si, the average probability of events occurring can be expressed as
P ω 2 s i δ 1 ¯ = y P δ 1     τ y s i τ y s i / y τ y s i
Among them, τy(si) ∈ arg p T s i where py(si) = ω2(si). P(δ ≥ 1|τy(si)) denotes the probability of events occurring within τy(si). According to Formula (16), the above formula can be further derived as
P ω 2 s i δ 1 ¯ = y 1 P δ = 0     τ y s i τ y s i / y τ y s i = y 1 e λ l τ y s i τ y s i / y τ y s i = 1 y e λ l τ y s i τ y s i / y τ y s i
And for any POIl that is monitored by si, the average probability of no event occurring can be expressed as
P ω 1 δ = 0 ¯ = y P δ = 0     τ y s i τ y s i / y τ y s i
In Formula (20), τy(si) ∈ arg p T s i where py(si) = ω1, and P(δ = 0|τy(si)) denotes the probability that no event occurs within τy(si). Similarly, we have
P ω 1 δ = 0 ¯ = y e λ l τ y s i τ y s i / y τ y s i
As a result, the evaluation function for the accuracy of the energy consumption rate prediction is characterized by Formula (22) as follows.
f p T s i x = γ s i P ω 2 s i δ 1 ¯ + 1 γ s i P ω 1 δ = 0 ¯
Among them, γ(si) is used to regulate the importance of the events monitored by si and takes a value between 0 and 1.

5.2.2. Multiple POIs within R(si)

Given that the events occurring at different POIs are independent, the following two conditions are considered.
  • For a number of POIs with a consistent value λl, they can be regarded as a “fused POI”. Its Poisson intensity is considered to be the sum of the Poisson intensities of the POIs.
  • For a number of POIs with different values of λl, the evaluation function of the energy consumption rate prediction for si is denoted as the sum of the evaluation functions of each single POIl within R(si).
f p T s i x = P O I l f p T s i x l

5.3. Approximate Optimal Solution for Energy Consumption Rate Prediction

The function f(.) provides a specific quantitative index for predicting the energy consumption rate of nodes. Thus, to obtain an approximate optimal solution of f(.), respectively, the nodes are further classified into the following four categories based on different tasks they undertake.

5.3.1. The Node Does Not Monitor Any POIs (i.e., R(si) = Φ) and Has No Children

Obviously, according to the definition of this paper, the energy consumption rate of this type of node is always ω1. Therefore, there is no need to predict anything.

5.3.2. The Node Monitors POIs (i.e., R(si) = Φ), but Has No Children

As mentioned in Section 3.2, the solution space C(si) still remains of size 2K even if we assign the energy consumption rate of si to only two specific values, ω1 and ω2(si). When the number of time slices K is large, the complexity of finding the optimal solution for f p T s i x is high. Thus, we transform the problem into a variant of the multiple knapsack problem. Then, a dynamic programming method is employed to get an approximate optimal solution. This method effectively reduces the time complexity to a polynomial level.
For each two-tuple (py(si), τy(si)) | y ∈ [1, K′] in p T s i x , the goal of MEECR is to determine the values of py(si) and τy(si) such that f p T s i x is maximal. Since y = 1 K τ y s i = T , this can be considered to be a knapsack problem. That is, the sum of the time intervals T represents the weight of the knapsack. The two-tuple (py(si), τy(si)) is the equivalent of the item with weight τy(si), and the value of the item is characterized by the evaluation function f p T s i x . From the previous description, the energy consumption rate of si in two adjacent time intervals (i.e., τy(si) and τy(si)) is different. If one of them is ω1, then the other is ω2(si). That is, the items that are put into the backpack twice in a row must be different. Hence, we call it the “alternating backpack problem”.
It is evident that τy(si) can take on any value inside the set {T/K, 2T/K,…, T}, so there are 2K types of items in total. In addition, the number of the items weighting τy(si) (denoted as my) needs to satisfy
m y τ y s i T
According to the property of “alternating backpack” described above, the maximum value of my can be calculated out by Formula (25).
m y = T / τ y s i + T / K + T mod τ y s i + T / K / τ y s i
For clarity, an example is shown in Table 3. Assume T = 5 h and K = 5. Therefore, there are 2K = 10 types of items in total. The diagrams in the table are the backpacks that are filled with the maximum number of current items. In particular, the energy consumption rate of si during the blue and red time intervals are ω1 and ω2(si), respectively. For instance, the time interval τy(si) of the first item is one hour, and the energy consumption rate py(si) is ω1. It is obvious that under the constraint of “alternating backpacks”, the maximum number of items will be three (i.e., three blue time intervals in that diagram) in this case. As an additional example, the time interval τy(si) of the fourth item is two hours, and the energy consumption rate py(si) is ω2(si). It is easy to know that the maximum number of items is two (i.e., two red time intervals of two hours in the diagram) in this case, as any more would not satisfy the constraint of “alternating backpacks”.
Thus, a dynamic programming approach is used to solve the alternating knapsack problem. Firstly, the 2T types of items are expanded by rows (similar to converting a multi-knapsack problem into a 0–1 knapsack problem), so that each item type has a quantity of one. Then, the attributes of each item are defined as (ID, τID, pID), where τID and pID are the weight and value of the item, respectively. Furthermore, the state dp(ID, χ, p) represents the maximum profit when there are ID items available for selection. The knapsack capacity is χ and the last placed item’s pID ∈ {ω1, ω2(si)}. As a result, the state transition equation is shown as follows.
d p I D , χ , p = max d p I D 1 , χ , ω 1 ,   d p I D 1 , χ τ I D , ω 2 s i + p I D   |   p = ω 1 max d p I D 1 , χ , ω 2 s i ,   d p I D 1 , χ τ I D , ω 1 + p I D   |   p = ω 2 s i
Now, it is possible to find an approximate optimal solution p T s i for the energy consumption rate prediction of si in polynomial time. The pseudo-code is shown in Algorithm 2.
Algorithm 2. Solution for the alternating knapsack problem
Input: Evaluation function f(·), the node si, the POIl monitored by si, the number of time slices K, and schedule cycle T.
Output: Energy cost prediction p T s i of si.
  1:
goods = Φ, ID = 1;
  2:
for k = 1 to K:
  3:
   τy(si) = (k × T)/K;
  4:
   my ← calculated by Equation (25);
  5:
   for r = 1 to my:
  6:
      add (ID++, τy(si), ω1) to goods;
  7:
      add (ID++, τy(si), ω2(si)) to goods;
  8:
   end for;
  9:
end for;
10:
initialize dp[size(goods)][T][2] and let the first row and the first column be 0.
11:
traverse array dp row by row, filling it according to the state transition Equation (26).
12:
p T s i ← yield the approximate solution by backtracking dp;
13:
return  p T s i ;
If |POIl| > 1, the following two cases can be discussed.
  • The Poisson intensity of the events monitored by these POIs are the same (might as well all be denoted as λl). As mentioned earlier, the occurrences of the events at different POIs are independent, so these POIs can be regarded as one “fused POI” and the Poisson intensity of it is |POIl|∙λl.
  • The Poisson intensity of events monitored by these POIs are different. Thus, an optimal solution p T s i l can be found for each POIl by Algorithm 2. Subsequently, the final energy consumption rate prediction of si is obtained by performing the merge operation, which is shown as follows.
p T s i = l = 1 P O I l p T s i l
The informal description of this formula is that, for any time slice, the energy consumption rate of p T s i is ω2(si) if there is a p T s i l with an energy consumption rate of ω2(si). Otherwise, the energy consumption rate of p T s i is ω1.

5.3.3. The Node Does Not Monitor Any POIs (i.e., R(si) = Φ), but Has Children

For this type of node si, its energy consumption rate prediction can be considered as the result of the merge operation of the energy consumption rate prediction of its children (remarked as sj, and it assumes the set of all sj to be DCN(si)). That is,
p T s i = j = 1 D C N s i p T s i j
The informal description of the above formula is similar to Formula (27).

5.3.4. The Node Monitors POIs (i.e., R(si) ≠ Φ) and Has Children

From Section 5.3.2 and Section 5.3.3 described above, it is easy to know that the final optimal solution for predicting the energy consumption rate of si in this case can be obtained according to Formula (29).
p T s i = l = 1 P O I l p T s i l j = 1 D C N s i p T s i j
It should be noted that, to ensure the accuracy of the results from the merge operation, we make the following assumption. For each time slice with the same k in p T s i l and p T s i j , if the values of pk(si) are all ω1, the smallest probability value among them is selected as the final predicted probability of the k-th time slice of si. Otherwise, the maximum probability value among the time slices whose pk(si) are ω2(si) is selected as the final predicted result for the kth time slice of si. Thus, the optimal solution p T s i for the energy consumption rate prediction for si can be finally expressed as follows.
p T s i = p 1 s i ,   P s i 1 ,   p 2 s i ,   P s i 2 ,   p k s i ,   P s i k ,   ,   p K s i ,   P K s i
Here, Pk(si) is the probability that the energy consumption rate of si is pk(si) at the kth time slice.
So far, we have solved the MEECR problem. The pseudo-code corresponding to the above process is shown in Algorithm 3, and the parameters mentioned in this section and their definitions are shown in Table 4.
Algorithm 3. Solution of MEECR problem
Input: The set of nodes Cs, evaluation function f(·), the number of time slices K, and schedule duration T.
Output: The solution X.
  1:
X = Φ;
  2:
Cs ← get the inverse order of Cs;
  3:
for si in Cs:
  4:
   initialize p T s i of si and let every Pk(si) = 1 and pk(si) = ω1;
  5:
   for POIl in R(si):
  6:
       p T s i l ← apply Algorithm 2 to get the energy consumption rate prediction;
  7:
       p T s i = p T s i p T s i l ;
  8:
   end for;
  9:
   for sj in DCN(si):
10:
       p T s i = p T s i p T s j ;
11:
   end for;
12:
   add p T s i to X;
13:
end for;
14:
return X;

6. Charging Scheduling Scheme Consistent with the MC’s Service Capability and Nodes’ Energy Requirement

After obtaining the near-optimal solution for the energy consumption rate prediction of each node, we construct the traversal path for MC during a round of service time. To address the DCNM problem, an iterative adjustment approach is proposed for the energy consumption rate prediction to ensure the MC’s service capability is consistent with the energy replenishment requirement of the nodes.
Here, we introduce a “hop count based multi-Hamiltonian traversal paths construction” method.
Step 1. At the beginning of a T, the MC departs from the BS, setting h = 1. Then, the node within Ch which is closest to the BS is selected out as the first energy-replenishing target. Next, the shortest Hamiltonian path that traverses all nodes in Ch from this node is constructed.
Step 2. Afterward, the MC moves along this path and serves each node in Ch sequentially. When finishing charging the last node (denoted as si), it checks whether the current value of h has reached the maximum number of layers of the ECBT. If so, the charging process of this round ends, and then the MC returns to the BS. Otherwise, after making h = h + 1, the algorithm goes to Step 3.
Step 3. The MC searches for the node within Ch that is closest to si (denoted as sj), and sets it as the starting point. Then, the shortest Hamiltonian path that traverses all of the nodes in Ch is constructed. Next, the MC moves from si to sj. After that, the algorithm goes to Step 2.
It is easy to find that the above “inside-out” charging mode effectively reduces the computational complexity by forming multiple traversal paths in a round of service time. Furthermore, it ensures that the MC gives higher priority to charge nodes with smaller hop counts from the BS.
As shown in Figure 3, we suppose there are seven nodes in the network, with C1 = {s1, s2, s3, s6} and C2 = {s4, s5, s7}. The MC initially selects s3, which is closest to its current location (i.e., the location of the BS), as its first service object for this round. Subsequently, the first Hamiltonian path s3s6s2s1, illustrated by the green solid line in this figure, is established. After sequentially charging these four nodes, MC selects s5, which is nearest to s1, as the next node to replenish energy. Furthermore, it establishes another Hamiltonian path s5s7s4 with s5 as the starting point, shown by the blue solid line in Figure 3. At last, after charging these three nodes in turn, the MC returns to the BS and completes a round of replenishment.
Obviously, the above traversal paths are almost unchanged once they are established (except when a node is dead, and a new Hamiltonian path containing all other nodes in Ch is constructed according to Step 3). Thus, the value of Dj in Formulas (2) and (3) can be calculated out now, and the value of Tc(si) can also be estimated through p T s i . Therefore, we further check whether Formulas (4) and (5) hold. If they are valid, the MC can start a round of charging scheduling. Alternatively, it indicates that its service capability temporarily cannot meet the requirement of all nodes. Hence, the energy consumption rate prediction p T s i is adjusted iteratively to appropriately reduce the amount of the energy replenishment of some nodes, so as to ensure that the service capacity of the MC is as consistent as possible with the energy requirement of the nodes. The execution process is shown as follows.
(1)
The time slice with the smallest value of Pk(si) among the time slices where pk(si) is ω2(si) in all nodes is selected. Then, the values of pk(si) and Pk(si) are set to ω1 and 1 − Pk(si), respectively, i.e., the value of p T s i is fine-tuned.
(2)
According to the fine-tuned p T s i , we recheck the validity of Formulas (4) and (5). If they are valid, the adjustment process ends, and then the MC begins a round of replenishment. Otherwise, it jumps to step (1).
We now have a complete solution for the DCNM problem. The corresponding pseudo-code is shown in Algorithm 4.
Algorithm 4. Solution for the DCNM problem.
Input: The set of nodes Cs, the solution X, and battery capacity EMC of the MC.
Output: The solution Y.
  1:
Ch = {C1, C2, …, CƱ} ← divide Cs by hop count;
  2:
Y = Φ, D = Φ, E = Φ;
  3:
for Ci in Ch:
  4:
   Hi ← construct the Hamiltonian path of Ci;
  5:
   sistart ← get sj of the shortest distance (si−1end, sj) in Ci;
  6:
   siendsistart + Hi;
  7:
   add (Hi, sistart, siend) to D;
  8:
end for;
  9:
for  p T s i  in X:
10:
   calculate Eo(si) of si according to Equation (1) and add it to E;
11:
end for;
12:
while not satisfy Equations (4) and (5) do:
13:
   select the time slice with the minimum Pk(si) from X which pk(si) == ω2(si) and let pk(si) = ω1, Pk(si) = 1 − Pk(si);
14:
   recalculate Eo(si) and update it in E;
15:
end while;
16:
Y = {D, E};
17:
return Y;

7. Simulation Results

In this section, simulations are conducted to show the advantages of our proposed method. To verify the advantages of ECBT, we employed a routing algorithm that selects the nearest neighbor (NN) as the parent as a baseline for comparison. During the network topology construction phase of NN, all nodes are sorted in ascending order of their distance to the BS. Then, each node is traversed, selecting the nearest neighbor (i.e., the nodes within communication range) with an established route as the parent. ECBT–MEMR combines the ECBT and MEMR which is our proposed charging scheduling method. Similarly, NN–MEMR integrates the NN and MEMR as a benchmark method. To validate the advantages of ECBT–MEMR in minimizing the EMR, we choose RAND and LL [31] as the baseline for comparison. In the RAND method, the MC charges all nodes in a random sequence during each T. The LL method takes into account the dynamic changes of the nodes’ energy consumption rate and uses short-term prediction to develop the charging scheduling strategy, which is consistent with our proposed method.
We first explore the impact of parameter α (Formula (11)) in ECBTC on the EMR. Next, the performance of ECBT–MEMR and NN–MEMR under the different size of time slices and T is compared. Subsequently, we compare our method with two baselines (RAND and LL). The impact of the number of nodes and the maximum Poisson intensity of POI events on EMR are examined. Moreover, the node survival under different numbers of nodes is investigated. Finally, by randomly generating nodes’ locations, we verify the robustness of our method in different networks.
Parameter settings for the simulation are shown in Table 5. By default, the simulation uses the value of each parameter from the table unless stated otherwise.

7.1. Impact of Parameter α

The parameter α reflects the energy consumption balance among nodes at the same layer in ECBT. The closer α is to 1, the more the smaller energy consumption differences are balanced. Figure 4 shows the impact of different values of α on the EMR when executing ECBT–MMDR. The overall trend indicates that as α increases, the EMR first decreases to about 5.3% (α = 1.1) and then increases steadily. Based on ECBTC, when determining whether each candidate parent is qualified to be a parent, the energy consumption balance is examined starting from the nodes with minimum h. When α is close to 1, even small energy consumption differences between nodes are considered unbalanced, leading to premature parent selection. Consequently, ECBTC might degrade into balancing energy consumption only among nodes with smaller h. This leads to an imbalance in the energy consumption of the remaining nodes, and may increase some nodes’ energy consumption due to selecting the more distant nodes as their parent. As mentioned in Section 6, the MC charges each node according to its hierarchical order of ECBT, starting from the BS. Consequently, the nodes with high energy consumption may die due to not being replenished in time, resulting in the occurrence of events missing.
As α increases, appropriate energy consumption differences are considered balanced. Thus, the energy consumption of the nodes with a larger value of h also gradually balances, thereby reducing the failure rate and EMR. When α increases to about 1.1, the EMR is at its lowest value, that is to say, the ECBTC effectively balances the energy consumption differences of the nodes with different h. Subsequently, as α continues to rise, excessive energy consumption differences are still considered to be balanced. Eventually, the algorithm degrades into NN–MMDR.

7.2. Impact of the Size of Time Slice

For ECBT–MEMR and NN–MEMR, we examined the impact of different sizes of time slices on the EMR. As illustrated in Figure 5, for both of them, the EMR increases as the size of the time slice increases. When the size of the time slice is 30 s, the EMR is below 5%. But it exceeds 10% when the size of the time slice is 80 s and even reaches 14.5% under NN–MEMR. The main reason for this is that the accuracy of node energy consumption rate prediction depends on the size of the time slice and directly affects the result of the EMR. According to Section 5, the smaller the size of the time slice is, the more accurately the energy consumption rate variation in the nodes in a T can be depicted. Conversely, an excessively large time slice significantly reduces the accuracy of energy consumption rate prediction, increasing the probability of node death and thereby raising the EMR.
On the contrary, the smaller the time slice, the larger the solution space, which increases the time and space complexity of the algorithm. For ECBT–MEMR, it can be seen that reducing the size of the time slice from 60 s to 30 s decreases the EMR from 5.3% to 3.0%, but the solution space expands from 247 to 294. Thus, a balance between the EMR and the algorithm’s time–space overhead is required. Comparing ECBT–MEMR and NN–MEMR, it is evident that the former consistently outperforms the latter, primarily due to ECBT’s role in balancing energy consumption, thereby reducing the nodes’ significance and death probability. NN, on the other hand, only considers the transmission distance and ignores the energy consumption of the nodes, resulting in a higher node death probability. Furthermore, as the size of the time slice increases, the EMR in NN–MEMR rises more rapidly. When the time slice is 30 s, the EMRs of these two algorithms differ by 0.8%. But when the time slice is 80 s, they differ by 2.5%. This is because compared to ECBT–MEMR, NN–MEMR requires a higher accuracy of node energy consumption rate prediction. However, as analyzed earlier, a larger time slice leads to lower prediction accuracy, resulting in an incorrect assessment of the nodes’ energy requirement. At this point, nodes with higher energy consumption under NN–MEMR are more likely to die, which in turn increases the EMR.

7.3. Impact of the Scheduling Duration T

According to the analysis mentioned in Section 5, we can get a range of [2814, 4028] for T with the help of some parameters in Table 3. To further examine the impact of its size on the EMR, we obtained the trend of the EMR with ECBT–MEMR and NN–MEMR through experiments, as shown in Figure 6. As T increases, the EMR first decreases, reaching an optimal value around T = 3420, and then gradually increases. According to Section 6, when T is too large or too small, the charging scheduling scheme adjusts the energy consumption rate predictions of some nodes (i.e., reduces the charging requirement of some nodes) to satisfy Formulas (4) and (5). Thus, it increases the probability of node death and consequently raises the EMR. In addition, for ECBT–MEMR, the average EMR is, overall, 0.92% lower than that of NN–MEMR, reflecting ECBT’s strong applicability under different sizes of T. However, it is important to note that as T (T > 3400) continues to increase, the EMR of ECBT–MEMR gradually approaches that of NN–MEMR. This is mainly because ECBT gradually fails to offset the performance differences due to the limited service capability of the MC.

7.4. Impact of the Number of Nodes

Next, we compare the proposed method with LL and RAND to explore their performance under different numbers of nodes, i.e., N. Figure 7 shows the trend of the EMR for each method. As the value of N increases, the EMR also gradually increases, which is inevitable due to the limited service capability of the MC. For LL and RAND, some nodes die because they are not replenished in time. For NN–MEMR and ECBT–MEMR, some nodes die because the supplied energy is insufficient. However, with the same value of EMR = 10% (i.e., the orange reference line in the figure), the MC can serve about 40 and 30 more nodes by using ECBT–MEMR compared to RAND and LL, respectively. Additionally, compared to RAND, the values of the EMR in NN–MEMR and ECBT–MEMR reduce by 33.3% and 35.2% on average, respectively. Moreover, compared to LL, they reduce it by 25.0% and 26.9%, respectively. The advantages of our method become more apparent as the number of nodes increases. The main reason for the above results is that ECBT–MEMR fully considers the stochastic process of events occurring at the POI and predicts the energy consumption variations in the nodes over a T to determine the appropriate charging amount. When exceeding the MC’s service capability, the proposed method prioritizes the energy requirement of the nodes with a higher probability of events (i.e., higher energy consumption) to minimize the EMR. In contrast, LL simply uses the expectation of historical data as the short-term energy consumption rate of the nodes, lacking an accurate model of node energy consumption for the occurrence and disappearance of events, resulting in a lower accuracy of predictions. Additionally, LL is a request-based charging method in WRSNs. Nodes will die when too many charging requests emerge in a short time because the MC cannot reach them in time, regardless of whether or not they undertake critical tasks. RAND, on the other hand, does not consider the remaining energy of the nodes, resulting in the poorest performance. Furthermore, we also noticed that compared to ECBT–MEMR, the EMR of NN–MEMR is higher and the gap gradually increases as the number of nodes increases. This indicates that as the number increases, the balance of node energy consumption has a growing impact on the MC’s service quality.
To further demonstrate the superiority of our method, we show the number of surviving nodes in Figure 8. Different methods correspond to stacked bar charts with different fillings. The vertical axis represents the number of surviving nodes. In the experiment, the number of POIs monitored by each node and its offspring nodes is counted. Then the range of the number is categorized into four levels evenly, and thus obtains the level of each node (Lv1~Lv4). The higher the level is (e.g., Lv1 is higher than Lv2), the more POIs the node monitors. That is to say, the level indicates the importance of the node. We use bar charts of different colors to show the levels of surviving nodes. Overall, when the number of nodes does not exceed 50, both our method and LL can ensure more than 80% of nodes are alive. When the number of nodes reaches 60, only ECBT–MEMR maintains a node survival rate of approximately 81.6%, while all other methods fall below 80%. In addition, RAND performs the worst, leading to a gradual mass death of nodes. In addition, it is evident from the figure that the number of alive nodes in LL is not significantly less than our method, but their EMRs differ greatly. The reason is that, under the constraint of the MC’s service capability, ECBT–MEMR always prioritizes supplying sufficient energy to nodes that are more likely to undertake data tasks (i.e., nodes or their offspring nodes monitoring POIs where events are more likely to occur), while reducing the energy requirement of other nodes. In contrast, LL always strives to ensure every node is alive. Therefore, the death probability of each node is the same. When nodes undertaking important data tasks die, many events go missing. For instance, when the number of nodes is 60, although all nodes of Lv4 have died under the proposed method, nodes of Lv1 and Lv2 are still alive. This strategy allows many event reports from the POI to be successfully transmitted to the BS through high-level nodes, minimizing the EMR. In contrast, under LL, although some nodes of Lv4 are alive, some nodes of Lv1 and Lv2 have already died. It should be noted that once the high-level nodes die, even if their children remain alive, the data cannot be sent to the BS. This leads to the loss of many event reports and a rapid increase in the EMR.

7.5. Impact of the Maximum Value of Poisson Intensity

Under the assumptions of ECBT–MEMR, the arrival of events at the POI follows a Poisson process. Hence, higher Poisson intensity results in more frequent events arriving. Figure 9 shows the impact of different maximum Poisson intensities on the EMR. It is apparent that as λ rises, the EMR also gradually increases. This is expected because the more frequently the events arrive, the more time slices are spent in a high energy consumption rate. Therefore, for LL and RAND, nodes are more likely to die because the MC cannot reach them in time. For our method, the primary reason is that the size of the time slice (the default value is 60 s) does not decrease with increases in λ, which means that a large time slice cannot accurately depict nodes’ energy consumption variations, significantly reducing prediction accuracy. For example, when λ is 0.04, the size of the time slice should be less than 1/0.04 = 25 s. Hence, this also explains why the EMR grows rapidly as λ increases in ECBT–MEMR and further confirms that the size of the time slice significantly affects the performance. Despite this, our method still outperforms the comparison methods, guaranteeing a lower EMR. Additionally, ECBT balances the energy consumption, which reduces the negative impact of the decreased accuracy of the energy consumption rate prediction, allowing ECBT–MEMR to further lower the EMR compared to NN–MEMR.

7.6. Performance Robustness

Finally, we recorded the resulting EMR with each method in 30 independent simulation experiments. As shown in Figure 10, the EMR in LL and RAND are the most volatile, ranging from 21% to 53%. Their variances are 6.79 × 10−3 and 3.96 × 10−3, respectively. The primary reason for this is that these two algorithms exhibit significant randomness in charging scheduling and lack mechanisms to ensure the survival of nodes. When nodes are unevenly deployed in the network, it greatly increases the MC’s moving time and energy consumption, thereby raising the risk of node death, leading to a higher EMR. In contrast, ECBT–MEMR demonstrates stronger robustness with various node distributions, with variances of 0.65 × 10−3 for NN–MEMR and only 0.08 × 10−3 for ECBT–MEMR. This is due to the complete node survival mechanism. On the one hand, the energy consumption rate prediction is based on the network topology, which accurately evaluates nodes’ energy requirements. As a result, node survival is guaranteed across different network topologies. On the other hand, the periodic charging scheduling mode guarantees that nodes will be replenished after a T. Furthermore, ECBT–MEMR is more stable compared to NN–MEMR. When nodes are unevenly deployed, NN may accelerate the energy consumption rate of the nodes in some areas, whereas ECBT always strives to balance the energy consumption among nodes in the same layer, thereby reducing the probability of node death.

8. Conclusions and Future Work

In this study, we propose a charging scheduling method based on an event-oriented node energy consumption rate prediction to minimize the event missing rate (EMR). The distributional imbalance and temporal dynamics of node energy consumption rate are considered. Hence, an energy consumption balanced tree construction method is proposed to prolong the lifetime of each node. In order to evaluate the energy requirement of the nodes, we predict their energy consumption rate within a scheduling duration. Within it, the evaluation function for energy consumption rate prediction is explored. Subsequently, we transform the energy consumption rate prediction into a variant of the backpack problem, namely, the alternating backpack problem, and solve this by dynamic programming. After that, a charging scheduling scheme to satisfy the MC’s service capability and nodes’ energy requirements is proposed.
When the POI is monitored by more than one node, it causes unnecessary energy consumption by sending redundant data. In the future, we will consider how to adjust the energy requirement of the nodes to further balance their energy consumption. Specifically, on the basis of ECBTC, nodes can adjust the sensing range through local communication to avoid redundant data generation. On the other hand, these redundant data can also be reduced by performing suitable data fusion algorithms.

Author Contributions

Conceptualization, S.H. and C.S.; methodology, S.H.; software, S.H. and X.Z.; validation, S.H. and J.W.; formal analysis, C.S. and R.W.; investigation, S.H. and R.W.; data curation, S.H. and J.W.; writing—original draft preparation, X.Z.; writing—review and editing, C.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of P.R. China (62272244, 62302232, 62372248, 62302236, 62102196), “333” Project of Jiangsu Province, and the Nature Science Research of Jiangsu Higher Education Institutions of China (22KJA520010).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Chen, H.; Wang, X.; Ge, B.; Zhang, T.; Zhu, Z. A Multi-Strategy Improved Sparrow Search Algorithm for Coverage Optimization in a WSN. Sensors 2023, 23, 4124. [Google Scholar] [CrossRef] [PubMed]
  2. Orfanos, V.A.; Kaminaris, S.D.; Papageorgas, P.; Piromalis, D.D.; Kandris, D. A Comprehensive Review of IoT Networking Technologies for Smart Home Automation Applications. J. Sens. Actuator Netw. 2023, 12, 30. [Google Scholar] [CrossRef]
  3. Chanak, P.; Banerjee, I. Congestion Free Routing Mechanism for IoT-Enabled Wireless Sensor Networks for Smart Healthcare Applications. IEEE Trans. Consum. Electron. 2020, 66, 223–232. [Google Scholar] [CrossRef]
  4. Lyu, Z.; Wei, Z.; Pan, J.; Chen, H.; Xia, C.; Han, J.; Shi, L. Periodic charging planning for a mobile WCE in wireless rechargeable sensor networks based on hybrid PSO and GA algorithm. Appl. Soft Comput. 2019, 75, 388–403. [Google Scholar] [CrossRef]
  5. Sha, C.; Sun, Y.; Malekian, R. Research on Cost-Balanced Mobile Energy Replenishment Strategy for Wireless Rechargeable Sensor Networks. IEEE Trans. Veh. Technol. 2020, 69, 3135–3150. [Google Scholar] [CrossRef]
  6. Sha, C.; Song, D.; Malekian, R. A Periodic and Distributed Energy Supplement Method Based on Maximum Recharging Benefit in Sensor Networks. IEEE Internet Things J. 2021, 8, 2649–2669. [Google Scholar] [CrossRef]
  7. Chen, T.-S.; Chen, J.-J.; Gao, X.-Y.; Chen, T.-C. Mobile Charging Strategy for Wireless Rechargeable Sensor Networks. Sensors 2022, 22, 359. [Google Scholar] [CrossRef]
  8. Ijemaru, G.K.; Ang, L.; Seng, K.P. Optimizing Energy Consumption and Provisioning for Wireless Charging and Data Collection in Large-Scale WRSNs with Mobile Elements. IEEE Internet Things J. 2023, 10, 17585–17602. [Google Scholar] [CrossRef]
  9. Jiang, C.; Chen, W.; Wang, Z.; Xiao, W. Deep Reinforcement Learning-Based Joint Sequence Scheduling and Trajectory Planning in Wireless Rechargeable Sensor Networks. IEEE Sens. J. 2024, 24, 13699–13711. [Google Scholar] [CrossRef]
  10. Simitha, K.M.; Raj, S. IoT and WSN Based Water Quality Monitoring System. In Proceedings of the 2019 3rd International Conference on Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, India, 12–14 June 2019. [Google Scholar]
  11. Wang, C.; Li, J.; Yang, Y.; Ye, F. Combining Solar Energy Harvesting with Wireless Charging for Hybrid Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2018, 17, 560–576. [Google Scholar] [CrossRef]
  12. Baek, J.; Han, S.I.; Han, Y. Energy-Efficient UAV Routing for Wireless Sensor Networks. IEEE Trans. Veh. Technol. 2020, 69, 1741–1750. [Google Scholar] [CrossRef]
  13. Zhong, P.; Xu, A.; Zhang, S.; Zhang, Y.; Chen, Y. EMPC: Energy-Minimization Path Construction for data collection and wireless charging in WRSN. Pervasive Mob. Comput. 2021, 73, 101401. [Google Scholar] [CrossRef]
  14. Lu, Z.; Fan, B.; Cai, J.; Tang, L. J-RCA: A Joint Routing and Charging Algorithm with WCE Assisted Data Gathering in Wireless Rechargeable Sensor Networks. IEEE Sens. J. 2021, 21, 3888–3899. [Google Scholar] [CrossRef]
  15. Yang, M.; Liu, N.; Zuo, L.; Feng, Y.; Minghui, L.; Gong, H.; Liu, M. Dynamic Charging Scheme Problem with Actor–Critic Reinforcement Learning. IEEE Internet Things J. 2021, 8, 370–380. [Google Scholar] [CrossRef]
  16. Lin, C.; Yang, Z.; Dai, H.; Cui, L.; Wang, L.; Wu, G. Minimizing Charging Delay for Directional Charging. IEEE/ACM Trans. Netw. 2021, 29, 2478–2493. [Google Scholar] [CrossRef]
  17. Jia, Y.; Wang, J.; Zeyu, J.; Peng, R. Multimobile Charger Charging Strategy Based on Dual Partitioning Model for Wireless Rechargeable Sensor Networks. IEEE Access 2022, 10, 93731–93744. [Google Scholar] [CrossRef]
  18. Kaswan, A.; Jana, P.K.; Dash, M.; Kumar, A.; Sinha, B.P. DMCP: A Distributed Mobile Charging Protocol in Wireless Rechargeable Sensor Networks. ACM Trans. Sens. Netw. 2022, 19, 1–29. [Google Scholar] [CrossRef]
  19. Wang, N.; Wu, J.; Dai, H. Bundle Charging: Wireless Charging Energy Minimization in Dense Wireless Sensor Networks. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019. [Google Scholar]
  20. Jia, R.; Wu, J.; Wang, X.; Lu, J.; Lin, F.; Zheng, Z.; Li, M. Energy Cost Minimization in Wireless Rechargeable Sensor Networks. IEEE/ACM Trans. Netw. 2023, 31, 2345–2360. [Google Scholar] [CrossRef]
  21. Liu, Y.; Pan, H.; Sun, G.; Wang, A.; Li, J.; Liang, S. Joint Scheduling and Trajectory Optimization of Charging UAV in Wireless Rechargeable Sensor Networks. IEEE Internet Things J. 2022, 9, 11796–11813. [Google Scholar] [CrossRef]
  22. Dai, H.; Wang, X.; Xu, L.; Dong, C.; Liu, Q.; Meng, L.; Chen, G. Area Charging for Wireless Rechargeable Sensors. In Proceedings of the 2020 29th International Conference on Computer Communications and Networks (ICCCN), Honolulu, HI, USA, 3–6 August 2020. [Google Scholar]
  23. Liang, S.; Fang, Z.; Sun, G.; Lin, C.; Li, J.; Li, S.; Wang, A. Charging UAV deployment for improving charging performance of wireless rechargeable sensor networks via joint optimization approach. Comput. Netw. 2021, 201, 108573. [Google Scholar] [CrossRef]
  24. Wu, T.; Yang, P.; Dai, H.; Xiang, C.; Xu, W. Optimal Charging Oriented Sensor Placement and Flexible Scheduling in Rechargeable WSNs. ACM Trans. Sens. Netw. (TOSN) 2022, 18, 1–27. [Google Scholar] [CrossRef]
  25. Yang, W.; Lin, C.; Dai, H.; Wang, P.; Ren, J.; Wang, L.; Wu, G.; Zhang, Q. Robust Wireless Rechargeable Sensor Networks. IEEE/ACM Trans. Netw. 2023, 31, 949–964. [Google Scholar] [CrossRef]
  26. Lyu, Z.; Wei, Z.; Wang, X.; Fan, Y.; Xia, C.; Shi, L. A Periodic Multinode Charging and Data Collection Scheme with Optimal Traveling Path in WRSNs. IEEE Syst. J. 2020, 14, 3518–3529. [Google Scholar] [CrossRef]
  27. Boukerche, A.F.; Wu, Q.; Sun, P. A Novel Joint Optimization Method Based on Mobile Data Collection for Wireless Rechargeable Sensor Networks. IEEE Trans. Green Commun. Netw. 2021, 5, 1610–1622. [Google Scholar] [CrossRef]
  28. Wedaj, F.T.; Hawbani, A.; Wang, X.; Qaisar, M.U.; Othman, W.; Alsamhi, S.H.; Zhao, L. RECO: On-Demand Recharging and Data Collection for Wireless Rechargeable Sensor Networks. IEEE Trans. Green Commun. Netw. 2023, 7, 1863–1876. [Google Scholar] [CrossRef]
  29. Lin, C.; Hao, S.; Yang, W.; Wang, P.; Wang, L.; Wu, G.; Zhang, Q. Maximizing Energy Efficiency of Period-Area Coverage with a UAV for Wireless Rechargeable Sensor Networks. IEEE/ACM Trans. Netw. 2023, 31, 1657–1673. [Google Scholar] [CrossRef]
  30. Dai, H.; Ma, Q.; Wu, X.; Chen, G.; Yau, D.K.; Tang, S.; Li, X.; Tian, C. CHASE: Charging and Scheduling Scheme for Stochastic Event Capture in Wireless Rechargeable Sensor Networks. IEEE Trans. Mob. Comput. 2020, 19, 44–59. [Google Scholar] [CrossRef]
  31. Aloqaily, O.I.; Flocchini, P.; Santoro, N. Achieving Immortality in Wireless Rechargeable Sensor Networks Using Local Learning. In Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 20–22 October 2020. [Google Scholar]
  32. Kan, Y.; Chang, C.; Kuo, C.H.; Roy, D.S. Coverage and Connectivity Aware Energy Charging Mechanism Using Mobile Charger for WRSNs. IEEE Syst. J. 2022, 16, 3993–4004. [Google Scholar] [CrossRef]
  33. Yang, J.; Bai, J.-S.; Xu, Q. An Online Charging Scheme for Wireless Rechargeable Sensor Networks Based on a Radical Basis Function. Sensors 2020, 20, 205. [Google Scholar] [CrossRef]
  34. Chen, Z.; Jia, X.; Wei, Z.; Wang, J. Age of Information and its Distribution Properties in Energy Harvesting WSN. In Proceedings of the ICC 2023—IEEE International Conference on Communications, Rome, Italy, 28 May–1 June 2023. [Google Scholar]
  35. Heinzelman, W.B.; Chandrakasan, A.; Balakrishnan, H. Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, 4–7 January 2000. [Google Scholar]
Figure 1. Network topology and data sensing and uploading.
Figure 1. Network topology and data sensing and uploading.
Sensors 24 05931 g001
Figure 2. An example of ECBTC; (ad) are four snapshots of the process.
Figure 2. An example of ECBTC; (ad) are four snapshots of the process.
Sensors 24 05931 g002
Figure 3. Multi-Hamiltonian path traversal mode based on hop count.
Figure 3. Multi-Hamiltonian path traversal mode based on hop count.
Sensors 24 05931 g003
Figure 4. EMR vs. parameter α.
Figure 4. EMR vs. parameter α.
Sensors 24 05931 g004
Figure 5. EMR vs. size of time slice.
Figure 5. EMR vs. size of time slice.
Sensors 24 05931 g005
Figure 6. EMR vs. scheduling duration T.
Figure 6. EMR vs. scheduling duration T.
Sensors 24 05931 g006
Figure 7. EMR vs. number of nodes.
Figure 7. EMR vs. number of nodes.
Sensors 24 05931 g007
Figure 8. Number of surviving nodes.
Figure 8. Number of surviving nodes.
Sensors 24 05931 g008
Figure 9. EMR vs. maximum poisson intensity λ of POI events.
Figure 9. EMR vs. maximum poisson intensity λ of POI events.
Sensors 24 05931 g009
Figure 10. Robustness of the four methods.
Figure 10. Robustness of the four methods.
Sensors 24 05931 g010
Table 1. Symbols mentioned in Section 3.
Table 1. Symbols mentioned in Section 3.
SymbolDefinitionUnit
Nnumber of nodes-
Tduration for the MC to perform a round of charging schedulings
Knumber of time slices in a T-
pk(si)energy consumption rate of si in the kth time sliceJoule/s
Earr(si)residual energy of si when the MC has just arrivedJoule
Eo(si)energy that si received from the MCJoule
Ojset of nodes served by the MC during the jth traversal-
Ej(MC)total energy consumption of the MC during the jth traversalJoule
Tj(MC)total time consumption of the MC during the jth traversals
pmenergy consumption of the MC moving per unit of distanceJoule
Djmoving distance of the MC during the jth traversalm
pcenergy transmission power of the MCw
Tc(si)duration for the MC to charge node sis
vmoving speed of the MCm/s
ηcharging efficiency of the MC-
λlarrival intensity of event in POIl-
R(si)sensing range of node si-
ω1node energy consumption rate in absence of sensing event w
ω2(si)node energy consumption rate of si with the occurrence of sensing eventsw
Table 2. Parameters mentioned in Section 4.
Table 2. Parameters mentioned in Section 4.
SymbolDefinitionUnit
d(si, sp) distance between si and its parent spm
d0the threshold distancem
Pt(si, sp)energy consumption rate of si for sending Joule/s
Pr(si)energy consumption rate of si for receiving Joule/s
eelecunit energy consumption of the circuitnano-Joule
εfsconstant parameters of the signal amplifier in the free space environment-
εampconstant parameters of the signal amplifier in the multi-path fading environment-
d(si, sp) distance between si and its parent spm
Table 3. Types and number of items available for backpacks when T = 5 h and K = 5.
Table 3. Types and number of items available for backpacks when T = 5 h and K = 5.
IDτy(si)py(si)myDiagram
11ω13Sensors 24 05931 i001
21ω2(si)3Sensors 24 05931 i002
32ω12Sensors 24 05931 i003
42ω2(si)2Sensors 24 05931 i004
53ω11Sensors 24 05931 i005
63ω2(si)1Sensors 24 05931 i006
74ω11Sensors 24 05931 i007
84ω2(si)1Sensors 24 05931 i008
95ω11Sensors 24 05931 i009
105ω2(si)1Sensors 24 05931 i010
Table 4. Parameters mentioned in Section 5.
Table 4. Parameters mentioned in Section 5.
SymbolDefinitionUnit
Esbattery capacity of nodeJoule
Tc(si)duration for the MC to replenish si in a Ts
Chset of all nodes in the network that are h hops away from the BS-
d h ¯ mean Euclidean distance from the nodes in the set Ch to the BSm
pt(d)power consumption of a node for transmitting data to a distance of d metersw
Knumber of time intervals in a T-
DCN(si)set of all children of si-
Pk(si)probability that the energy consumption rate of si is pk(si) in the kth time slice-
Table 5. Simulation parameters.
Table 5. Simulation parameters.
SymbolParametersValuesUnit
W × Lnetwork size100 × 150m2
Nnumber of nodes50-
rssensing radius10m
rccommunication radius5m
Bpacketpacket size4Kbit
Esfull energy of node200Joule
eelecunit energy consumption of the circuit50nano-Joule
εfsconstant parameters of the signal amplifier in the free space environment0.01-
εampconstant parameters of the signal amplifier in the multi-path fading environment1.3 × 10−6-
EMCfull energy of the MC104Joule
vmoving speed of the MC0.5m/s
pmenergy consumption of the MC on moving per unit of distance2Joule
pcenergy transmission power of the MC2w
ηcharging efficiency0.8-
Tduration for the MC to perform a round of charging scheduling2820s
λlarrival intensity of event in POIl≤0.01-
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, S.; Sha, C.; Zhu, X.; Wang, J.; Wang, R. Charging Scheduling Method for Wireless Rechargeable Sensor Networks Based on Energy Consumption Rate Prediction for Nodes. Sensors 2024, 24, 5931. https://doi.org/10.3390/s24185931

AMA Style

Huang S, Sha C, Zhu X, Wang J, Wang R. Charging Scheduling Method for Wireless Rechargeable Sensor Networks Based on Energy Consumption Rate Prediction for Nodes. Sensors. 2024; 24(18):5931. https://doi.org/10.3390/s24185931

Chicago/Turabian Style

Huang, Songjiang, Chao Sha, Xinyi Zhu, Jingwen Wang, and Ruchuan Wang. 2024. "Charging Scheduling Method for Wireless Rechargeable Sensor Networks Based on Energy Consumption Rate Prediction for Nodes" Sensors 24, no. 18: 5931. https://doi.org/10.3390/s24185931

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop