Abstract
In the process of the wireless sensor network research, the issue on the energy consumption and coverage is an essential and critical one. According to the characteristic of the sensor nodes, it is homogeneous, and we proposed the k-degree coverage algorithm based on optimization nodes deployment. First, the algorithm gives the solving procedure of the maximum seamless coverage ratio, when the three-node joint coverage has been provided. Second, when the sensor nodes are covering the monitoring area, the algorithm gives the solving procedure of the expected coverage quality and the judgment methods of the coverage ratio, when the nodes are compared with the nearby ones. And when there is redundancy coverage in the given monitoring area, we have given the solving procedure of any sensor nodes that exist in the redundant nodes coverage. Finally, using the simulation experiment, the results of the coverage algorithm based on optimization nodes deployment are compared with other algorithms in terms of the coverage quality and the network lifetime, the performance indexes have enhanced to 13.36% and 12.92% on average. Thus, the effectiveness and viability of the coverage algorithm based on optimization nodes deployment have been proved.
Introduction
The wireless sensor network is a new type of network system, which is connected by thousands of sensors in the way of self-organizing and hybrid-hop; it is also the organic unification of the world of information and the physical world, which has realized the operation of the acquisition, computation, communication, and storage of the data.1–3 With the rapid development of information technology, the wireless sensor network can be mainly applied in all kinds of engineering fields, such as the military affair, environment monitoring, disaster relief, smart home, health care, agricultural production, and transportation.4–7
The energy consuming and the coverage quality of the network are the two key points in the field of wireless sensor network research.8–10 The coverage quality will affect the monitoring effectiveness on moving target; its behavior characteristic is mainly reflected in the deployment mode of sensor node. The energy consumption of the network is shown as the effective reduction of the sensor nodes’ quick energy consumption, which can prolong the lifetime of the whole network. The coverage quality and the rapid energy consumption mainly depend on the rationality of sensor nodes deployment.11,12 Generally, because of the limitation of the topographic, geomorphic conditions, and the environmental factors, we usually take the methods of the stochastic deployment to handle with the deployment of the sensor nodes. Due to its randomness, in the process of the deployment, the specific location of the sensor nodes cannot be predicted, so there are several or plenty of sensor nodes in a certain monitoring area or point, which can form the k-degree coverage finally. In the process of the stochastic deployment, it is possible that there are no sensor nodes covering at all in a certain monitoring area or point, which can form coverage holes. Thus, the effective coverage can be achieved by adding sensor nodes. Both of the cases can achieve the expected coverage effectiveness, but both have their own disadvantages.13,14 First, plenty of sensor nodes gather in high density, generating lots of redundant information, which will cause congestion in the communication linkage, suppress the expandability of the network, lower the service quality of the network, and shorten the whole lifetime of the network. 15 Second, when the concerned targets are in the coverage hole, we cannot take the real-time monitoring and coverage of the goal nodes. For sensor nodes, if they cannot provide accurate data information to sink nodes, there will be deviations and uncertainties in the data information that sink nodes have collected. Third, several work periods later, the sensor nodes will present the characteristic of heterogeneous sensor nodes. Because of the heterogeneous, it makes the whole sensor coverage area to change. Once the goal nodes shifted their statuses from covered to not covered, all the collected data information of goal nodes would lose their meanings. Fourth, the essentiality of the coverage is not the complete coverage of all the goal nodes, but the effective coverage of the concerned goal nodes. The essentiality of effective coverage is that when the concerned moving goal nodes are passing through the monitoring areas, the sensor nodes will complete their coverage first; simultaneously they will wake up their joint nodes to complete the linkage coverage, and then the collected data information will be uploaded to sink nodes.
Materials and methods
In the wireless sensor network research field, the issue of the network energy consumption and the effective coverage is a key one and an essential one that supports other special indexes of the wireless sensor network. Recent years, many experts, scholars at home and abroad have carried out plenty of researches thoroughly and carefully. Adulyasas et al. 16 take the symmetry of the regular hexagon of a given circle as the research object and propose the connected coverage optimization algorithm, which can reduce the overlapping coverage area to improve the effective coverage of the whole monitoring area. Sun et al. 17 propose the enhanced coverage control algorithm. When the monitoring area is covered, the algorithm gives the solving procedure of the expected value of the coverage quality. It also tests the proportion function relationship among various parameters, when the random variables are independent of each other. Besides, it also completes the effective coverage of the whole monitoring area by adjusting the adjustable parameter. Satisfying the presupposition of the network connection, Liao et al. 18 complete the coverage of goal nodes by taking advantages of the moving characteristic of the sensor nodes. Thus, it proposes the heuristic algorithm, taking the Thiessen polygon as the active area to reduce the sensor nodes’ energy consumption to balance the network energy, proposing the sensor network coverage.
Sun et al. 19 propose the maximum lifetime of reinforced barrier-coverage algorithm. The algorithm starts from the moving goal nodes going through the monitoring area. It takes advantages of the associate attribute of the sensor nodes and their neighbor nodes to complete the continuous coverage of the moving goal nodes. Finally, it achieves the complete coverage of the goal nodes. Sahoo and Sheu 20 propose the distributed connectivity and coverage maintenance algorithm (CoCo). The algorithm keeps the connection of the whole network by the work nodes awakening the redundant nodes. The restricted movement of sensor nodes ensures the goal nodes’ effective coverage, which limits the energy consumption caused by the monitoring distance to extend the lifetime of network. Meng et al. 21 propose the scheduling control algorithm (SCA) based on the awareness model. The algorithm builds the awareness model taking advantages of the connection of the network and the nodes; it computes and chooses the minimum work nodes to guarantee the maximum coverage quality by the performance parameter relationship of the monitoring area of the nodes. Mini et al. 22 bring in the artificial intelligence algorithms, the swarm intelligence algorithm, and the granule algorithm to complete the nodes deployment of the whole network monitoring area; in the stage of coverage optimization, the whole coverage is optimized by the two artificial intelligence algorithms and finally realizes the complete coverage of the monitoring area; as for the energy consumption, it completes the scheduling conversion of the node energy by the heuristic node scheduling, which extends the lifetime of the network. While Li et al. 23 bring in the partial parameter α, utilize the partial coverage optimization, constitute the partial αcoverage, after a series of calculation and optimization of the α, the complete coverage optimization is finally achieved. All the above-mentioned algorithms have achieved the effective coverage of the monitoring area to some extent; however, they have the mutual problem that the algorithms have more calculations, they are more complex, and the scalability of the wireless sensor network is worse.
Zhao et al. 24 propose the optimization strategy on coverage algorithm based on Voronoi. Having satisfied the condition of a certain coverage quality, the algorithm can add some work nodes to coverage holes to improve the current coverage ratio. Meanwhile, it will search reasonable information of repairing site to guarantee the connection of the whole network. Hanid et al. 25 also take the Voronoi as the research objective, solve the information of wire rod site that is formed by the geometry variation in the Voronoi of the sensor nodes, and finally, it completes the coverage of the monitoring area. Sahoo and Sheu 20 and Yuchee et al. 26 calculate the goal nodes effectively, utilizing different angles of the sector that composed by the sensor nodes and the goal nodes. They also give the method of computing the coverage ratio of different monitoring areas. All the above-mentioned algorithms have the better feasibility and the higher reliability, but the network models and the algorithms are too complex when they are put into research.
From Zhao et al., 24 Hanid et al., 25 and Yuchee et al., 26 they all take the static goal nodes as the research objective, Wang et al. 27 do not consider the situation when the moving targets are the concerned goal nodes, what the k-barrier coverage will be. Xing et al. 28 propose the polytypic target coverage algorithm based on the linear programming. The algorithm utilizes the clustering structure to solve the polytypic target coverage problem. By computing the coverage ability and the residual energy of the sensor, it completes the polytypic target optimization coverage in the way of the linear programming. Sun et al. 29 propose the event probability driven mechanism (EPDM). First, EPDM algorithm builds the network model that is covered by the sensor nodes and the goal nodes, then it calculates the coverage ratio of the sensor nodes and the goal nodes with the help of the probability, and finally, it will complete the changing states among the nodes by the node-scheduling algorithm, which achieves the purpose of extending the lifetime of the network. Under certain conditions, all the above-mentioned algorithms can complete the effective coverage of the goal nodes in the monitoring area to extend the lifetime of the network.
With the aid of the basic ideas in Xing et al. 28 and Sun et al., 29 the coverage algorithm based on optimization nodes deployment (CAOND) algorithm gives the solving procedure of the maximum coverage area when there is three-node joint; it verifies the expected value of the coverage quality of the goal nodes in the monitoring area by utilizing some related theoretical knowledge of the probabilistic theory. Meanwhile, it compares the proportionate relationship of the awareness intensity of the joint nodes and the single nodes; it also gives the coverage judgment method of any sensor nodes in the redundancy nodes. Finally, we took the simulation experiment to testify the CAOND algorithm. The result showing that both the coverage ratio and the lifetime of the network have improved a lot, which has verified the effectiveness and the feasibility of the algorithm in this article.
For the deficiencies and shortcomings of the research, the main contributions of this article will be presented in the following five points:
Having studied and analyzed some relevant literature information at home and abroad, with the help of the theoretical idea from the literature, we proposed the CAOND algorithm.
Through the relevant geometry and the three-node joint, the article gives the derivation procedure of the maximum seamless joint coverage ratio. Besides, it also calculates the maximum effective coverage ratio, when the three-node joint coverage has been completed.
In the monitoring area, k nodes are selected at random to be the object of study. Based on the probability theory taking advantages of the characteristic of sensor nodes’ sending range, the solving procedure of the expected value is given, when there are k nodes covering jointly.
When the goal nodes are covered by joint network nodes or single nodes, the comparative methods of the awareness intensity are given. By limiting the value range of the adjustable parameter λ, we also provide the judgment method of redundancy coverage of any sensor nodes being covered by redundant nodes.
Through the simulation experiment, compared with other algorithm, we verify the effectiveness and feasibility of the CAOND algorithm.
Prerequisite knowledge
Table 1 illustrates the symbols used in this article.
Parameter description.
All the sensor nodes are deployed at a two-dimensional (2D) monitoring area at random; they have the following characteristics:
At the initial time, all the perceived radii of the sensor nodes are the same, and it equals to the energy.
All the perceived radii of the sensor nodes comply with the normal distribution; it is much less than the length of the monitoring area and ignores the boundary effect.
The communication range is equal or greater than the two times the value of the perceived radius.
All the sensor nodes are independent of each other and are equal to each other.
Definition 1 (k-barrier coverage)
A certain goal node is covered by k sensor nodes at least, and it is called as the k-barrier coverage.
Definition 2 (network coverage probability)
In the monitoring area, the specific value of the effective coverage area and the monitoring area is called as the network coverage rate. The physical significance of the network coverage rate is that the bigger the coverage rate is, the better the coverage quality is
In the formula, the area(S) symbolizes the monitoring area, the
Definition 3 (effective coverage probability)
It is the specific value of the effective area of the sensor nodes with the area of the sensor nodes in the monitoring area. The effective area of the sensor nodes is the area, which is covered by several times but only need calculated once, when several sensor nodes are completing the k-coverage. Definition 2 provided the network coverage probability, which is the specific value of the effective area of the sensor nodes with the area of the monitoring area
Theorem 1
When the three nodes are seamlessly integrated jointly, the maximum coverage area can be shown as
Proof
As shown in Figure 1, supposing that the shaded area is S1, the area of the sector OACB is S2 and the area of the regular triangle is S3. Because the coverage area should be the maximum one, the three sensor nodes will meet at the point B; from the symmetry and the concentric circles of the same string theorem, the center chord of the shaded area is one of the sides of the regular hexagon of the given Circle O, that is to say the sector OACB is one-sixth of the Circle O, the central angle of the string is π/3, so the ΔOAB is the regular triangle, OA = AB = BO = r

The three-node seamless joint diagrammatic sketch.
So the maximum effective coverage rate is as follows
Analysis of the coverage quality
Basic idea
To solve the issue of the redundant sensor nodes, the redundant connected graph of sensor nodes should be built first. It means that all the sensor nodes can calculate the redundant information with their neighbor nodes by a certain location algorithm, such as the centroid location and the received signal strength indicator (RSSI) range-based localization; they fuse themselves in their own cluster and then send the result to the sink nodes through the communication linkage. 30 When the sink nodes receive the redundant information, after calculating and analyzing the information, the redundant relationship connected graph G can be built according to the results. The degree of the connected graph is the number of the relevant limited information corresponding to the redundancy rate of the sensor nodes. When the number of the sensor nodes is adding, the redundancy rate is upping. In the connected graph G, when the redundancy rate is more than the threshold that is set in advance, the state of the node will turn to sleep. At the same time, when there are n (n > 2) high-redundant nodes in the connectivity graph G, taking the energy as the choice condition, the highest energy nodes are selected as the sleeping nodes taking advantages of ranking algorithm. Meanwhile, the nodes and their neighbors will be deleted, then iterate them by the iterative method to find the next high-energy nodes until the redundant rates of all the sensor nodes in the connected graph A are less than the threshold. In the energy consumption, the article manages the managing node and the member node with the help of clustering principle. At the first stage of the network, member node sends a piece of information, inf_coverag to sink node, the information inf_coverag including the location information, the ID information, and the energy information. After one round or several rounds, the sink nodes receive the information from all the sensor nodes, calculate the information, and store the node-energy at the Store List CL. The nodes are sorted from highness to the lowliness according to the rest energy. The nodes at the frontier range have higher ability to cover. The managing node will find the sensor node that corresponds with the covering conditions among the List CL, according to the location information of the goal nodes. It will send information, inf_coverag to that sensor node to realize the effective coverage, the rest nodes are sleeping, which achieves the goal of saving network energy cost.
Expected value of coverage quality
In the above section, we give the solving method and the procedure of the proof of the maximum coverage area when the three nodes are jointed seamlessly. In the monitoring area, the sensor nodes need to complete the operations, such as the data acquisition, the data communication, the behavioral features of which can mainly be reflected in the distribution density of the sensor nodes throwing at random. The distribution density can affect the coverage quality directly; stable network does not only need the reasonable network service system, but also need a feasible coverage system.31–33 To meet the prerequisite of a certain coverage rate, if the effective coverage of the monitoring area was completed, the expected coverage value of the monitoring area would be computed.
Theorem 2
In the monitoring area S, k nodes are chosen at random; their expected value needs to be completed
Proof
Because sensor nodes thrown in the monitoring areas at random comply with the uniform distribution, the coverage rate Pa of any sensor nodes in the monitoring is as follows
Because the perceived radius of sensor nodes complies with the normal distribution (R0, σ2), in the monitoring area, the coverage rate of any goal nodes covered by sensor nodes is as follows
Making x = (r − R0)/σ, so
Obtained by the calculation
On simplifying formula (9), we get
The sensor nodes districted in the monitoring area at random are independent of each other, so in the monitoring area, the expected coverage value of any goal nodes covered by the sensor nodes is as follows
Corollary 1
To complete the effective coverage of the monitoring area, the minimum of the nodes is
Proof
Supposing that the minimum of the sensor nodes deployed in the monitoring area is n. According to Theorem 2, the expected value of the goal nodes covered by any sensor node is as follows
After taking the logarithm of the both sides of formula (12)
Seeking n
Thus, to complete the effective coverage of the monitoring area, the required minimum of sensor nodes should be
Nodes coverage probability
Definition 4 (neighbor node)
The distance between any two nodes si, sj is less than the double times of the perceived radius that is called as the neighbor node
In formula (15), the (xi,yi) and the (xj,yj) are the coordinate values of the two sensor nodes si, sj, the d is the Euclidean distance between the two sensor nodes, and the r is the perceived radius of the sensor nodes.
Definition 5 (awareness intensity)
The awareness intensity of any sensor node s at the point is α 25
In formula (16), the d(s,a) is the Euclidean distance between the sensor node s and any point α, α is the physical parameter of the perceptive module, and r is the perceived radius of the sensor nodes. Supposing that the joint nodes set is T, so the awareness intensity of the joint nodes set at the point α is
The expression form of formula (17) is quite similar to the probability expression form of at least one of the nodes that are covered by the n sensor nodes. Zairi et al. 8 and Zhu et al. 9 have provided the relevant proof. Thus, in the monitoring area, the awareness intensity of a certain point can be converted into the probability expression form of the certain point. Because of the sensor nodes’ randomness states deployed in the monitoring area, when the concerned moving goal nodes are covered by sensor nodes or single nodes, in order to know how to identify the awareness intensity of sensor nodes and single nodes to enhance effective coverage of the coverage area, we brought in Theorem 3.
Theorem 3
Within the unique sensing range, the awareness intensity of the joint nodes is higher than the neighbor nodes.
Proof
Supposing that when the joint nodes cover the goal nodes, the awareness intensity of the joint nodes is c; when the goal nodes are covered by the single nodes, the awareness intensity of the single nodes is w. Within the sensing range, when the moving goal nodes are covered by joint nodes for the first time, the awareness intensity is c1, the ones covered by single nodes not joint nodes, the awareness intensity is w1(1 − c1). When the moving goal nodes are covered by joint nodes and single nodes for the second time, the awareness intensity is Ci and Wi
When the mth coverage is completed, the awareness intensity of the joint nodes and the single nodes is as follows
Because the positions of any sensor nodes are equal to each other, the probabilities are all probability events, and the awareness intensity is c1 = c2 = … = cm; w1 = w2 = … = wm.
From the theorem of the geometrical progression, we could know
When the m → ∞, simplified formulas (22) and (23), we get the following the formulas
The coverage area of the joint nodes is bigger than the coverage area of the single nodes, so the C > W, that is
From the relevant knowledge of the probability theory, q ∈ [0,1], calculating the awareness intensity, when goal nodes are covered completely by single nodes, that is when w = 1, c > 1/2. The physical signification is that whether single nodes cover goal nodes or not, the awareness intensity of joint nodes holds more than 50% of the total, which verifies that the awareness intensity is higher than the single of that.
Redundancy coverage
At the initial time, the deployment of sensor nodes is casted in the monitoring area in high density and at random.34–36 Because of the randomness, there will be plenty of redundancy nodes in somewhere of the monitoring area. The existence of large number of redundancy nodes will lower the network expansibility, cause the network congestion, and consume the network energy rapidly.30,37,38 The solutions to solve the above-mentioned problems, there are two basic algorithms; they are the centralized optimization algorithm and the distributed optimization algorithm. The centralized optimization algorithm is mainly applied to the medium- and-small sized network system. The operating principle of it is that the sensor nodes compute their own geography information, the information will be uploaded to the sink nodes after the data fusion; the sink nodes will close or sleep the redundancy nodes to restrain the network energy consumption, after computing and analyzing the information collected. The distributed optimization algorithm is mainly applied to the large-scale sensor network. The operating principle of it is that after the mutual information of the sensor nodes and their neighbor nodes, the redundancy of the every node can be solved by a certain algorithm. When the redundancy is higher than the threshold value that is set in advance, the higher redundancy nodes will be closed or slept to save the network energy.39–41 Compared with the centralized optimization algorithm, the applied range of the distributed optimization algorithm is higher; it can be widely used.
Definition 6 (redundancy coverage nodes)
Any two sensor nodes, si, sj are the neighbor nodes to each other, when the Euclidean distance of the two nodes is smaller than the critical threshold ith that is called as the redundancy coverage nodes.
Definition 7 (redundant coverage)
When the sensor nodes si and the neighbor are the redundancy coverage nodes to each other, the specific value of the sensing area of sensor nodes si and neighbor nodes is the redundant coverage, we usually express it using P(α).
Definition 8 (connected graphs)
The Astatic connected graph, G, G = (V,E), is given, the sensor nodes si ∈ V, the connectivity d(u) of the nodes is defined as the number of the neighbor nodes; and the connectivity of the G is defined as the minimum of the nodes in the V.
Theorem 4
The redundant coverage of the n redundant nodes that belong to any one sensor node si needs to meet
Proof
Taking Figure 2 as the example to prove this. According to the characteristic of the Poisson distribution, the distribution of the n redundant neighbor nodes of the sensor node si complies with uniform distribution. The sensor nodes are all homogeneous nodes, the proportional relation of the communication radius R with the perceived radius r is R = λr, where λ is coefficient of proportionality, supposing that ∠BCE = α; the distance between the point B and the point C is a random variable, according to the probability density function

Node joint-coverage sketch.
The area of the intersection of the two circles S1 can expressed as follows
Making the distance between B and C, l = 2r cos α, dl = 2r sin αdα,
According to formula (27), for any sensor node that covers the redundant neighbor nodes, the redundant coverage can be expressed as follows
That is that when there are n communication nodes covering any sensor nodes, the redundant coverage is as follows
Steps and descriptions of CAOND algorithm
When the moving object entered the monitored area, active cluster head node around the target would monitor it first. The cluster head node sends on-duty messages to member nodes and neighbor nodes to awaken those member nodes to enter waiting state and notify the neighbor cluster head nodes the monitored information of the target. Based on the above information, member nodes calculate their weighting of whether participating the monitoring. If its weighting is greater than the set threshold, the node would enter into active state and monitor any moving target within its sensing range. Active nodes around the target will form an initial dynamic cover group. Member nodes will send an information packet to the cluster head node. The data packet contains information such as time stamp, node ID, and distance between the nodes and the target. As there may be more than one cluster head node in CAOND, for the convenience of management, one of the cluster head nodes will be selected as managing node, and it is responsible for the information fusion and data management. Because the target node is moving in the monitoring area, the initial CAOND may not meet the requirements of target monitoring. Therefore, dynamic reconstruction is needed according to the position of the target. Reconstruction process is completed by members updating management and head node re-selecting. When the target moves to a new grid, new cluster head node and member nodes will meet the threshold weighting joint to the original CAOND, the newly jointed cluster head node is elected as the leader node. Nodes of the original CAOND that cannot meet the monitoring requirements will quit the CAOND. If the original managing node happens to be a quitting one, at this time, the original managing node needs to send information of target location and information of member nodes to the new managing node. When the target moves away from the original location, the cluster head node will broadcast messages to its member nodes to enter into sleep state to save power consumption, Steps of the algorithm are as follows:
Step 1: Initialize the correlation parameters.
Step 2: Store the node information and the neighboring nodes in the s[i].data, including the information of the parameters, such as, the ID of the nodes, the left energy, coverage probability.
Step 3: Broadcast the information in the way of flooding, an undirected graph.
Step 4: When the energy of the node is more than the minimal energy, then the node will be started, be at the working state; if the energy of the node is smaller than or equal to the minimal energy, the node will be altered into the sleeping state, the basic information of the node will be recorded in the list, the neighboring node will be started.
Step 5: After all the working nodes have collected all the information of the relevant information, the current coverage probabilities will be evaluated to the corresponding nodes in the list.
Step 6: The indicator of the list will point the next node.
Step 7: When the energy of the current node is higher than that of the next node, then the sink node will send information to the node; calculate the coverage probability of the node, until all the nodes in the list have been traversed.
Complexity of the CAOND algorithm
The algorithm is sending and receiving data in the way of single circle, so the complication of the algorithm is O(n); in the process of ranging the node energy, it is completed in the way of nested invocations of methods, so the complication of the algorithm is O(n2). Thus, based on above analysis, the complication of the CAOND in the article is O(n2).
Analysis of the coverage quality
When sensor nodes are working, the energy consumption is mainly caused by node awareness part and the communication part. In the awareness part, within one single circle, the energy consumption is caused by the node awareness collecting a bit data; in the communication part, the energy consumption is caused by the transmitting and receiving k bits under the condition of the distance of the neighbor node being d
In the formulas, the ET-elec and the ER-elec stand for the energies that are consumed when transmitting or receiving 1 bit data; the d0 stands for the threshold of the Euclidean distance of the nodes and the communication neighbor nodes; the εamp stands for the quantity of the multiple attenuation energy consumption; the εfs stands for the energy of the nodes in the free space. When the nodes are transmitting the data, the indexes of the path attenuation energy are 2 and 4.
In order to verify the effectiveness and the feasibility of the CAOND, we take the MATLAB 7.0 as the simulation platform, take different scales of the monitoring area, and dynamic parameter as the research objective. Then, the contrast experiment is set to compare with Sun et al., 19 Yuchee et al., 26 and Wang et al. 27 in terms of the node deployment, the network coverage ratio, the dynamic change of the sleeping redundant nodes, and the lifetime of the network. The values of every group data are taken from the mean values of 50 simulation data. The values of the simulation data can be seen in Table 2.
The specification of the simulation data.
Taking the adjoining sensor nodes as the research objective to confirm the value range of the probability density parameter λ, optimize the different simulations of domain. Supposing that the mean probability density of the sensor nodes in the monitoring area is λ, the Euler distance between the adjoining nodes is d; the perceived radius of the sensor nodes is equal to the sides of the external hexagonal that is the Rs (Figure 3).

Model of the evenly distributed sensor nodes.
For the single sensor nodes, the functional relationship of the area of the regular hexagon and the probability density parameter can be expressed as follows
Putting formula (31) into
Experiment 1
When the value of λ is limited within the range, we take the simulation experiment in the monitoring area 300 × 300. The results are shown in Figures 4–9.






From Figures 4–9, they provide the coverage situation of the random deployment coverage and the optimization of the CAOND when the values of the λ are different. After the calculation, when
Experiment 2
Using different scale of the simulation platform, we compare the CAOND in this article with Bachir et al. 13 and Meng et al. 21 in terms of the coverage ratio and the quantity of the redundant nodes. The results can be shown in Figures 10–15.

100 × 100 m2, quantity comparison of the sensor nodes and work nodes.

200 × 200 m2, changing curve of network coverage probability.

300 × 300 m2, the comparison of the CAOND under different coverage probabilities.

300 × 300 m2, comparison of the quantity of the redundant sensor nodes and the coverage probability.

300 × 300 m2, quantity comparison of the sleeping redundant nodes and the coverage.

300 × 300 m2, quantity comparison of the redundant nodes and the sleeping nodes.
From Figures 10–15, they provide the changing curves of the coverage ratio, the changing curves of the redundant nodes quantity, and the coverage ratio in the case of different network scales. Figure 10 provides the changing curves of the quantity of the sensor nodes, the sensor work nodes in the CAOND as well as the SCA and the EPDM. From Figure 10, we can know that the CAOND in this article needs less work nodes under the function of different parameters; however, the EPDM needs more sensor nodes.
The reason is that when the λ = 1.2, the coverage area that the sensor nodes and the neighbor nodes forms is bigger than that when λ = 0.8. However, the SCA and the EPDM achieve the effective coverage of the monitoring area by adding the quantity of the sensor nodes. The increase in number of the sensor nodes will produce lots of redundant nodes, and it will cause rapid consumption of the energy of the sensor nodes, which is not benefit to the balance of the whole network energy. Figure 11 chooses the 200 × 200 m2 as the simulation platform, provides the changing curves of the coverage ratio changing with the change of the sensor nodes. From Figure 11, when the quantity of the sensor nodes is adding, the coverage ratio of the three algorithms is improving. In this article, the CAOND adjusts the coverage by setting the dynamic parameter λ. So at the initial time, the coverage ratio of the CAOND is higher than that of the other two algorithms. When the quantity of the sensor nodes is 137, the algorithm in this article can achieve the effective coverage; however, the SCA and the EPDM can achieve the effective coverage when the quantities are 188 and 199. Compared with the two algorithms, the mean coverage ratio of the CAOND has improved 13.36% on average. The main reason is that CAOND algorithm uses the setup of the parameter λ to adjust the number of the working nodes, makes more nodes cover the goal nodes by the round scheduling system, which will prolong the network lifetime. From Figures 12–15, they choose the 300 × 300 m2 as the simulation platform, provide the comparison of the different coverage ratios, and the quantity of the redundant nodes. From Figure 12, we can get to know that having met the certain coverage ratio, the bigger the value of λ is, the less the quantity of the sensor nodes is. The reason is similar to the analysis of Figure 7. Figure 13 provides the contrast diagram of the redundant sensor nodes and the coverage ratio. From Figure 13, we can get that when the redundant nodes are increasing, the coverage ratio is declining. It mainly because the EPDM completes the dispatch of the status of the redundant nodes in the way of probability driven; however, the SCA completes the process of the receivingand transmitting the information among the nodes. CAOND algorithm uses the coverage capability of the nodes to reduce the number of the working nodes; thus, the purpose of saving the energy of the sensor nodes can be reached. However, SCA algorithm and EPDM algorithm use the technology of global information to complete the coverage of the monitoring area; they complete the coverage by increasing the number of the sensor nodes, which is not suitable for the limited resource of the wireless sensor network. The analysis of Figures 14 and 15 is similar to that of Figures 11 and 12.
Experiment 3
In different simulation scales, the contrast experiment is taken between the CAOND and the ECTA. Sahoo and Sheu 20 propose in terms of the lifetime of the network and the runtime of the algorithms.
Figures 16 and 17 provide the comparison of the CAOND and the ECTA in terms of the lifetime of the network and the runtime of the algorithms. From Figure 16, we can get that at the initial time, the network lifetime of the two algorithms is almost equal to each other; as the quantity of the sensor nodes is increasing, the network lifetime of them is increasing. However, the ECTA monitors the nodes by the nonlinear continuous coverage pattern, so the energy consumption is higher than the CAOND. When the quantity of the sensor nodes is 180, the network lifetime of the two algorithms is going to be steady, and the mean network lifetime of the CAOND is 12.92% higher than the ECTA. Figure 17 provides the contrast diagram of the quantity of sensor nodes and the runtime of the algorithm. The ECTA adopts the chain list storage to store the node energy, ranges the node from the highest to the lowest by the traversal algorithm, making the high-energy nodes get the higher authority to complete the coverage of the target node. The complication of the ECTA is lower than the CAOND. So, in terms of the runtime, the runtime of the CAOND is higher than the ECTA.

200 × 200 m2, comparison of the network lifetime of the two algorithms.

Comparison of the runtime of the two algorithms.
Conclusion
In order to solve the issue of the wireless sensor network coverage better, on the basis of its characteristics, the article proposes the optimization coverage algorithm of the dynamic parameters of the controlled. The algorithm gives the solving method of the maximum coverage area of the three-circle seamless joint first. Second, taking advantages of the related theory of the probability to solve the expected value of the coverage quality in the monitoring area, based on which provide the solving method to the minimum quantity of the sensor nodes. On the basis of the analysis of the node coverage, this article provides the comparison and contrast of the awareness intensity of the joint nodes and the single nodes. In terms of researching the redundant nodes coverage, the article has proved the condition that there is redundant coverage in the sensor nodes; this article provides the steps and descriptions how to suppress the consumption of the energy in detail; finally, through the simulation experiment, the algorithm in this article has been simulated in terms of the optimization deployment, the coverage rate, the redundancy rate, and the network lifetime as well as the runtime of the algorithm. The analysis and the expression of the simulation result show the effectiveness and the feasibility of the CAOND in this article. The future work may focus on how to realize the effective coverage of the boundary boxes and the effective coverage of the multiple moving target nodes.
Footnotes
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Natural Science Foundation of China under Grant No. 61503174 and 61628210; Henan Province Education Department Natural Science Foundation under Grant No. 15A413016, 16A520063, and 17A520044; Natural Science and Technology Research of Henan Province Department of Science Foundation under Grant No. 142102210063, 152102410053, 162102210113, 162102210276, and 162102410051; Henan Province Education Department Cultivation Young Key Teachers in University of Under Grant No. 2016GGJS-158; the Guangdong Natural Science Foundation of China under Grant No. 2016A030313540, and Guangzhou Education Bureau Science Foundation under Grant No. 1201430560, Shaanxi Education Bureau Science Foundation under Grant No. 2016SF-428; Science and Technology Development Project of Luoyang Foundation under Grant No. 1401037A.
