1. Introduction
In the last decades, the world witnessed the increasing popularity of wireless sensor networks (WSNs) because of their robust fault tolerance, high energy efficiency, strong data processing capability, and advanced wireless communication technology [
1,
2,
3,
4].
Barrier coverage is one of the essential applications of WSNs. It can be exploited to monitor the targets traversing through the boundary of an FoI [
5]. To build an effective barrier coverage, the coverage area of the sensors should construct a continuous barrier covering the FoI. Compared with point coverage [
6] and area coverage [
7], barrier coverage obtains a balance between the number of sensors and the coverage area. Therefore, barrier coverage is efficient in monitoring intruders.
Most previous works on barrier coverage are based on the disk coverage model [
8] or the sector coverage model [
9]. The disk coverage model indicates that the coverage area is a circle with the sensor being located at the center, and the radius of the circle is the monitor range. While in the sector coverage model, the coverage area is a sector of the circle.
Recently, with the development of radar technologies, the multistatic radar based on a Cassini coverage model has drawn extensive attention [
10,
11]. Unlike the monostatic radar, which deploys a transmitter and a receiver at the same location, the multistatic radar is an important extension of bistatic radar. It consists of multiple transmitter-receiver pairs deployed at different locations [
12]. The multistatic radar has several advantages, including strong anti-electronic jamming capacity, ease of anti-stealth aircraft, and ease of anti-low-altitude penetration [
13,
14,
15]. The Cassini coverage model is derived from the bistatic radar equation. It is dependent on both the range between a pair of transmitter and receiver and the ranges from the target to the transmitter and receiver. Besides, two foci of Cassini coverage locate at a transmitter and a receiver [
16].
Some works exploit the Cassini coverage model to build the line barrier coverage. In [
17], the authors investigated the optimal deployment method for line barrier coverage to maximize the detectability of worst-case targets. In [
18], a line barrier coverage consisting of heterogeneous transmitters was studied. The transmitters form different barrier coverages under different parameter settings. In [
19], both the fault-tolerance issue and the energy-consumption issue of line barrier coverage were studied. The authors utilized the collaboration between transmitters and receivers on two consecutive deployment lines to obtain a minimum deployment cost.
Other works focus on building circular barrier coverage (CBC) to detect the invader who tries to enter the closed area. CBC can be exploited in various scenarios, such as monitoring coastlines, contaminated zones, and international boundaries. In these scenarios, the protected area has an irregular shape, which can be approximated by its minimum circumcircle and several multistatic radars are deployed in this circle. Thus, it is necessary to build circle barrier coverage on the circular FoI [
20]. However, due to the properties of the Cassini coverage model, it is challenging to optimize the deployment of multistatic radars to form the circle barrier coverage. Meanwhile, to ensure the monitor effectiveness, it is desirable to set a minimum threshold for the width of circle barrier coverage. Besides, to achieve an excellent and cost-efficient circle barrier coverage, the unit costs of the transmitter and receiver should be considered by the optimization model.
To overcome these challenges, this paper uses multistatic radars to construct CBC and develops an improved optimization method based on the equipartition strategy. First, the optimization conditions of CBC are proven through analyzing the properties of multistatic radar deployment patterns (simply referred to as “deployment patterns” in the subsequent content). Based on these conditions, given the number of transmitters and receivers, the deployment pattern for obtaining a maximum coverage area can be determined. Moreover, the transmitter-receiver cost ratio is considered to derive the optimal deployment with a minimum cost. Besides, to optimize the deployment on the whole circular area, a two-stage optimization algorithm is proposed. Specifically, in the first stage, this area is divided into several sub-circles with equal width. Thus, the total deployment cost is equal to the sum of each sub-circle barrier cost. In the second stage, since the width of a sub-circle is already determined in the first stage, integer linear programming (ILP) [
21] and exhaustive method (EM) are adopted to jointly determine the types and numbers of deployment patterns in the given sub-circle barrier. Finally, the optimization results in the condition of minimum cost can be obtained, and the proposed method is verified by the simulation results.
The main contributions in this paper are summarized as follows:
First, the properties of deployment patterns are studied, and the conditions for achieving the optimal deployment patterns in a circular barrier are proven. Based on these conditions, the optimization model for the whole circular FoI is introduced. Meanwhile, this model is divided into two sub-optimization models to obtain the solution of this model.
Secondly, a novel formula is proposed to calculate the maximum valid number of receivers in a deployment pattern. Moreover, another novel formula is introduced to calculate the upper threshold of width for a sub-circular barrier. These two formulas can dramatically reduce the computation.
Thirdly, a two-stage optimization algorithm with an equipartition strategy is proposed to solve these two sub-optimization models. In the condition of minimum deployment cost, the optimal deployment is derived by considering the transmitter-receiver cost ratio. The simulation results indicate that the proposed method needs less deployment cost and requires fewer transmitters than the works in the literature.
The rest of this paper is organized as follows.
Section 2 reviews the related work.
Section 3 introduces the concepts and details of the optimization issue.
Section 4 proposes the solution for the optimization issue.
Section 5 conducts the simulations to validate the performance of the proposed method.
Section 6 concludes the paper.
2. Related Work
Regarding various scenarios and tasks, barrier coverage problems were extensively and profoundly studied in the last decade. The models that have been studied can be divided into three categories: the disk coverage model [
8,
22,
23,
24,
25], sector coverage model [
9,
26,
27,
28,
29], and Cassini coverage model [
20,
30,
31,
32,
33].
In the beginning, the works on the disk coverage model were reviewed. In [
8], the notion of weak and strong barrier coverage was introduced, and a critical condition was derived for constructing the weak barrier coverage. In [
22], for the barrier coverage composed of a set of wireless sensors with adjustable ranges, the constant-approximation algorithms were designed to assign the ranges with the minimum cost, and the constant depends on the covering radius related to the power of sensors. In [
23], crossed barrier coverage was built to detect the intrusion behavior in both horizontal and vertical directions. Meanwhile, the branch-and-bound algorithm and multi-round shortest path algorithm are exploited to determine the maximum number of crossed barriers. Given a set of mobile sensors distributed on the plane and a set of targets located on a line, an exact algorithm was introduced to minimize the maximum movement of the sensors the work and cover the targets with minimum energy consumption [
24]. In [
25], the inspection robot was integrated into WSNs to form an efficient dynamic barrier coverage for monitoring the transmission lines. Moreover, a discrete heuristic method based on game theory was proposed to solve this issue.
Considering the works based on the sector coverage model, in [
9], sensors with arbitrarily adjustable directions were exploited to construct the strong barrier coverage. To determine the appropriate directions of sensors in the one-dimension scenario, a polynomial-time algorithm was adopted to achieve strong barrier coverage with a minimum number of sensors. Meanwhile, in the two-dimension scenario, the directional carrier graph was introduced to solve the issue. In [
26], the researchers surveyed the concepts and properties of the sector coverage model, and they analyzed the sensing characters and behaviors of directional sensors. Besides, each category of the sector coverage model was summarized in terms of issue description, assumption, application, solution, and performance. The researchers in [
27] addressed the barrier gap problem of weak and strong barrier coverage and deployed the directional sensors with a line deployment strategy. Besides, they proposed a gap-finding algorithm to determine sub-barriers and locate barrier gaps, and they fixed the gaps through two gap-mending algorithms. In [
28], the sector coverage model was applied in a three-dimension scenario, and a realistic resolution criterion of the camera sensor was proposed to capture the face characters of the invader. Based on this criterion, a feasible deployment strategy was studied for barrier coverage. In [
29], the virtual target–barrier construction method was adopted to construct a closed circular belt around a target. The closed virtual barrier curve was exploited to simplify the optimization problem, and then a distributed particle swarm optimization algorithm was designed to deploy an approximate optimal coverage on the virtual barrier curve.
There is increasing attention on the Cassini coverage model. In [
30], given the numbers of transmitters and receivers, an optimal linear barrier coverage was constructed. However, this barrier coverage does not have a requirement of minimum width. This means that in some parts, the barrier is only covered by some points, and a high-speed intruder can cross the barrier without detection. The authors in [
31] stated that it is optimal to place multistatic radars on the shortest deployment line connecting the left and right boundaries of the region. Based on these achievements, an optimization deployment method was proposed to build barrier coverage on the rectangular area [
32]. Specifically, the method divides the whole rectangular area into multiple sub-rectangles with equal width. Then, it sets the minimum width for a sub-rectangle. Finally, several identical deployment patterns are exploited to build barrier coverage for each sub-rectangle.
Besides, some works focus on constructing an optimal barrier coverage on a circular area, which is a challenging issue due to the circular shape. As for this shape, the width and radius of a sub-circular barrier should be considered. An optimal model was introduced to build one CBC [
20]. Practically, one circular barrier is inadequate to cover a vast circular area, and the width of a circular barrier is not set with a threshold. A model with a threshold of width was mentioned in [
33], and the whole circular area was divided into several sub-circular barriers with the same width. Each sub-circular barrier was composed of several identical deployment patterns, and only a varied one was exploited to cover the remaining part. Besides, EM was adopted to determine the optimal results. However, the composition of a sub-circular barrier and the searching scope of EM can be further improved. Inspirited by [
33], our work makes the following improvements: (1) several novel conditions are introduced to determine the types of deployment patterns for an optimal sub-circular barrier; (2) ILP is adopted to obtain the corresponding number of deployment patterns; (3) an improved formula is introduced to calculate the maximum valid number of receivers in a deployment pattern; (4) a novel formula is adopted to calculate the upper threshold of width to narrow the searching scope of sub-circular barrier width.
3. Conceptions and Problem Descriptions
3.1. Conceptions of Multistatic Radar Coverage
In this paper, the deployment pattern of multistatic radar is composed of a transmitter T and several receivers , and it can be denoted as . Thus, the multistatic radar can be regarded as a combination of multiple bistatic radars that share a transmitter. In terms of coverage area, it is desirable to use the bistatic radar to illustrate the coverage properties of the multistatic radar.
Taking
as an example, the signal-to-noise ratio (SNR) at point A, i.e.,
, can be computed by the radar equation of coherent pulse bistatic radar [
16], shown as follows:
where
is assumed to be a constant determined by the working parameters of the bistatic radar [
32]. Let
and
represent the distance from point A to the transmitter and the receiver, respectively.
Let
represent the minimum
that is the threshold for target detection. If
, the target is in the coverage area of a bistatic radar; otherwise, the target is out of the coverage area. Therefore, the coverage area of the bistatic radar is defined by the formula
. For ease of presentation, we have
. It is noteworthy that a target in the coverage area can be detected with an acceptable probability [
34].
According to [
16], the shape of the coverage area is determined by the relation between
and
, as shown in
Figure 1:
, the coverage is two unconnected areas, as plotted in
Figure 1a;
, the coverage is enclosed by a lemniscate of Bernoulli, as plotted in
Figure 1b;
, the coverage is enclosed by a waist-liked area, as plotted in
Figure 1c;
, the coverage is enclosed by an elliptical curve, as plotted in
Figure 1d.
It is also assumed that transmitters work at orthogonal frequencies. By choosing a working frequency, a receiver can pair with a certain transmitter and avoid being interfered with by other transmitters. Thus, the coverage area of the multistatic radar
is overlapped with that of
m bistatic radars. If a target is covered by multiple bistatic radars, the maximum SNR at point A, i.e.,
, is exploited to measure the coverage of the multistatic radar, which is formulated as:
where
,
denotes the
jth transmitter. Based on this, for a target at arbitrary point A, it can be covered by the multistatic radar if
, and we have
3.2. Conceptions of CBC
As for a closed area with irregular boundaries, it can be represented by a minimum circumscribed circle, and a circular FoI is built around the circle to protect the closed area from infiltrating. As shown in
Figure 2a, the gray circle area represents the circular FoI with a width of
H, and the center of the FoI is O.
and
respectively denote the inner and outer circle boundary of the FoI. Besides,
represents the radius
ci.
In this paper, the whole FoI is divided into multiple sub-circles with equal width, and each sub-circle is covered by a sub-CBC. By constructing a sub-CBC with a width of 2 h, multiple multistatic radars are deployed along the ring in the middle of a sub-circle. This ring is called the deployment curve, and it is denoted as . The radius of is denoted as . Here, , where is the minimum width threshold of a sub-circle, and 2 h is the minimum width of a sub-CBC.
For instance, an FoI is divided into three sub-circles in
Figure 2b. Without loss of generality, all the sub-CBCs are numbered from inside to outside. Correspondingly,
represents the deployment curve of each sub-CBC. Moreover, the nodes are deployed in counterclockwise order. The transmitter is represented by a square, and the receiver is represented by a hexagram.
It is desirable to study the deployment optimization for multistatic radars on a deployment curve. For ease of presentation, two definitions are given:
Definition 1. Letdenote a deployment pattern comprised of n receivers and two transmitters, i.e.,. Without ambiguity, it can be denoted asfor short. Note that n receivers are deployed between two transmitters, i.e.,and. Thenodecoverage angle (NCA) inis denotedas, where,,,.
According to [
33], NCA can be calculated as:
where,
r denotes the radius of the deployment curve
l, and
R denotes the radius of the outer boundary of the sub-circle. Besides,
is a valid receiver if
.
Furthermore, according to Formula (3), by using algebraic operation, we have
Let
denote the central angle formed by
, and it is referred to as pattern coverage angle (PCA). Usually, a PCA is inadequate to cover the whole FoI. Thus, we have
.
can be calculated as follows:
Definition 2. Let denote a deployment sequence formed by varied types of. Letdenote the number of types. Specifically, we have. To build a CBC,should hold.
As shown in
Figure 3, in the case where
, there is a sub-circle covered by the deployment sequence of
, and all patterns are deployed on the deployment curve
l. According to (5), the total angle formed by these three patterns equals to 367.2°, which is a bit larger than 360°. In theoretical, the transmitter T
4 should be placed where the blue square is plotted. However, in practice,
share the transmitter T
1.
3.3. Description of Optimization Deployment Problem
The problem can be described as follows. Let D denote the FoI, and FoI is equally divided into q sub-circles with a width of 2 h. The CBC is exploited to cover each sub-circle. Let and denote the number of transmitters and receivers on each deployment curve, respectively. Besides, it is assumed that all the transmitters are identical, so are the receivers. In addition, the unit costs of the transmitters and receivers are denoted as and , respectively. Let denote the transmitter-receiver cost ratio, and it is reasonable to set .
Under the minimum deployment cost,
, the optimization problem model can be formulated as follows:
In this paper, rounds k to the nearest integer towards minus infinity; rounds k to the nearest integer towards positive infinity; denotes an empty set; and denote the positive integer set and natural integer set, respectively. For point and , denotes the length of the line AA′.
4. Solution for Optimization Deployment Problem
4.1. The Upper Threshold of Width for a Sub-Circular Barrier
As mentioned above,
is the lower threshold width of the CBC. In this section, a novel formula is introduced to determine the upper threshold width of the CBC. Like the conditions in [
33], the waist-liked area in the bistatic radar is exploited first. Then, Lemma 1 is adopted to determine
.
Lemma 1. As for the width-equipartition strategy, denotes the upper threshold of h, and it can be calculated as follows: Proof of Lemma 1. The proof of Lemma 1 is given in the
Appendix A. □
According to Formula (3), we have . Thus, the range of barrier width can be modified to . Subsequently, let q denotes the number of sub-circles. According to the equipartition strategy, . Thus, we have and .
4.2. The Maximum Number of Receivers and the Property of NCA
In this section, Lemma 2 is introduced to improve the formula for determining the maximum number of receivers in a . Then, Lemma 3 is exploited to uncover the property of NCA.
Lemma 2. Let 2 h denote the width of a sub-circular barrier, and r denote the radius of the deployment curve. Let denote the maximum number of receivers in . Then is calculated as follows:
(1) If and is the largest natural number that satisfies the inequality:then and . (2) If and u is the largest natural number that satisfies the inequality:then . Proof of Lemma 2. The proof of Lemma 2 is given in the
Appendix A. □
By contrast, it is claimed in [
33] that
. However, this formula is ineffective in some conditions. To prove this, given
, based on [
33], we have
.
According to Formula (5), the more receivers are placed in , the larger a central angle can be formed. However, Lemma 3 states that the efficiency of placing receivers decreases as the number of receivers increases.
Lemma 3. For it is assumed that , . Then, the NCA sequence is strictly monotonous decreasing. Where, Proof of Lemma 3. The proof of Lemma 3 is given in the
Appendix A. □
For , let denote the effectiveness-cost ratio (ECR) of . It reveals the coverage efficiency of a receiver. The larger , the better coverage efficiency of a receiver. Besides, let denote the average ECR of , and it reveals the coverage efficiency of .
Moreover, Lemma 3 states that decreases as increases. In other words, the farther a receiver is placed away from the transmitter, the lower ECR is obtained. Meanwhile, the larger n, the lower average ECR of .
4.3. The Conditions of the Optimal Deployment Patterns for a CBC
According to the equipartition strategy, it is critical to find the optimization conditions of deployment patterns on a sub-CBC. These conditions are essential to establishing the optimization model of the deployment problem.
Given and , for ease of presentation, can be abbreviated as .
Lemma 4. Assuming two varied patterns and in the CBC and , the following statements holds.
(1) If , holds if and only if are equal or are consecutive odd;
(2) If , holds if, and only if .
Proof of Lemma 4. The proof of Lemma 4 is given in the
Appendix A. □
Lemma 4 provides the necessary and sufficient conditions for an optimal CBC. Moreover, it reveals that the PCA of
and
can be equally replaced by two PCAs of
. Thus,
P2n−1,
P2n, and
P2n+1 can be replaced with three
P2n to simplify the structure of the deployment sequence and make it easier for engineering. Furthermore, due to
, it is necessary to deploy three
P2n+1 instead of
P2n,
P2n+2, and
P2n+1 in an optimal CBC. Supposing that
, according to [
33], the coverage angle is
. By contrast, based on Lemma 4, we have
. It means that the proposed conditions can contribute to a better optimization result.
4.4. Model and Solution for Deployment Optimization Problem
It is revealed by Lemma 4 that, for a deployment sequence, the maximum coverage angle can be achieved by using two varied patterns at most. Moreover, the difference in the number of receivers in patterns should not be larger than 1. This deployment sequence is referred to as the optimal one. Besides, it is assumed that the whole circular area is equally divided into
q sub-circular barriers. Let
denote the optimal deployment sequence for the
kth sub-circular barrier. Without loss of generality,
represents the innermost sub-circular barrier and
represents the outmost sub-circular barrier. Then, the deployment optimization model can be represented as follows:
However, the nonlinearity and multiple parameters make the solution to this model difficult. To overcome these obstacles, the solution to this model is decomposed to a two-stage optimization problem:
, where
denotes the minimum deployment cost for the
kth sub-CBC. In this stage, it is assumed that the width of each sub-circle is given. Then,
and
can be calculated. For each
and
,
, the following sub-optimization problem is solved:
For each sub-CBC, there is a model depicted by Formula (9).
, where
. In this stage, supposing that
n is determined,
denotes the deployment cost of the
kth sub-CBC in this condition.
n is the number of receivers in a pattern. Besides, based on Lemma 2, the maximum number of receivers
for the patterns in the
kth sub-CBC can be calculated. The following sub-optimization problem can be solved:
Formula (10) can be solved by using the ILP.
The specific process of solving the deployment optimization model is given:
- 1:
Calculate , and through Lemma 1. Initialize the deployment curve set and the total deployment cost set
- 2:
For
- 3:
Calculate .
- 4:
For , calculate
- 5:
For
Based on Formula (10), the cost is obtained.
- 6:
end for
- 7:
, as depicted by the sub-optimization problem ②
- 8:
end for
- 9:
. Let denote the minimum deployment cost in the case where the whole area is divided into q sub-circles. Then, .
- 10:
end for
- 11:
, as depicted by the sub-optimization problem ①
, and .
5. Simulations
In this section, simulations are performed to verify the effectiveness of the proposed method. In the proposed method, the range of q can be determined by Lemma 1. Subsequently, given q, each width of sub-CBC is equal to . Then, according to Lemma 2, can be calculated for the kth sub-CBC. Given , a sequence can be obtained by using the Formula (10). Thus, is found via the minimum cost principle. Furthermore, the total minimum deployment cost is computed by for q equipartition strategy.
5.1. The Influence of H on the Performance
Let
,
.
H varies from 1 km to 20 km with a step size of 1 km. The optimization results for
are plotted in
Figure 4.
The change rate
is exploited to measure the performance achieved by the proposed method and the method mentioned in [
33];
is defined as follows:
where
and
represents the optimal deployment parameter obtained by [
33] and this paper, respectively.
First, the influence of
H on the minimum deployment cost is investigated. Correspondingly,
denotes the minimum deployment cost. In this case, the optimal deployment cost change rate revealed by Formula (11) is illustrated in
Figure 4.
It can be seen that the value of
is always larger than or equal to zero when
, indicating that the proposed method requires less deployment cost. Specifically, when
, the value of
is much larger. The larger
is the better cost-saving effect can be achieved. Besides, in most cases, the optimal results under
are superior to those under
. Therefore, the proposed method performs better when
. Although the change rate decreases in the case of
,
Figure 4 shows that the proposed method can still obtain less minimum deployment cost.
It can be seen from
Figure 5 that the magnitude of reduced cost for
has the same level as that of
. However,
is dramatically large for
, making the change rate descend.
Then, the impact of
H on the total number of transmitters is evaluated. The results are plotted in
Figure 6,
Figure 7 and
Figure 8. Correspondingly,
denotes the optimal number of transmitters in Formula (11). The change rate of the number of transmitters is illustrated in
Figure 6. The change rates for
are almost larger or equal to zero. By contrast, the change rates are constant and equal to zero for
.
Besides, the relative change of the number of transmitters is illustrated in
Figure 7. It can be seen from
Figure 7 that the relative changes of the numbers of transmitters are equal to zero for
leading the change rates equal to zero. Since a transmitter is far more expensive than a receiver, both methods exploit as few transmitters as possible. Actually, the number of transmitters cannot be further reduced by the proposed method under these conditions.
As illustrated in
Figure 6 and
Figure 7, though the proposed method exploits one more transmitter and obtains the change rate of −0.93% in the case of
, the results indicate that the proposed method requires fewer transmitters in most case.
Additionally, it can be observed from
Figure 8 that the number of transmitters increases dramatically when
H becomes large, leading to a decrease in the change rate. Moreover, a tendency that the number of transmitters decreases with the increase of
is shown in
Figure 8. Because of the considerable cost of a transmitter, it is economical to deploy more receivers to pair with one transmitter for extending the PCA. Consequently, the number of transmitters decreases with the number of patterns.
Subsequently, the impact of
H on the relative change number of receivers is discussed in
Figure 9. In this case,
and
represent the optimal number of receivers, respectively.
The relative change number of receivers fluctuates around zero in the condition of , by contrast, the curves are constantly larger than zero in the condition of . The high cost of a transmitter makes it challenging to improve the optimal result on transmitters, but the proposed method can still reduce the optimal result of receivers.
Taking
as an example, the optimal deployment sequences obtained by the proposed method are
and
. Therefore, the total cost of these sequences is 646. By contrast, the optimal deployment sequences obtained by the method in [
33] are
and
, and the total cost of these sequences is 642. It is worth emphasizing that there is a large peak for
. In this condition, although the proposed method exploits one more transmitter, it requires 32 fewer receivers. Therefore, it still reduces the cost.
5.2. The Influence of on the Performance
The influence of
on the proposed method is studied in this section. Let
,
.
varies from 1 km to 20 km with a step size of 1 km. Besides,
M and
N denote the total number of transmitters and receivers, respectively (see
Figure 10).
For , the value of varies at first and tends to be stable as the increases; for , fluctuates as the increases. It reveals that for a small and a large , does not change with the increase of .
In
Figure 11, the relation between
and the ratio of
N to
M is illustrated. It can be seen that the ratio in the condition of
is almost twice that of
. When
becomes larger, the pattern is composed of more receivers. Also, the more receivers contained in a pattern, the narrower barrier coverage is built [
32]. Thus, in the case of
, the whole area may need to be divided into more sub-circles, resulting in the fluctuation of
q*.
Additionally, as depicted in
Figure 11, it is worth emphasizing that the number of transmitters is almost equal to that of receivers when
. In other words, the
is mainly used in the deployment. This result is caused by two reasons. One reason is that the first receiver obtains the maximum ECR, according to lemma 3. The other reason is that the difference in the cost between a transmitter and a receiver is little. Therefore, it is economical and efficient to adopt as many
p1 as possible.
Next, the relationship between
and
M is investigated, and the result is shown in
Figure 12. It can be seen that the number of transmitters increases approximately linearly with
for
. According to Formula (5), the increase of
leads to an increase in the radius of the deployment curve and a decrease in the PCA. This change means that more transmitters are required as
increases. Moreover, given
, the result in
Figure 12 reveals that the number of transmitters decreases as
increases. Thus, it is worth deploying more receivers instead of a transmitter because the receivers are highly cheap when
.
Furthermore, the relationship between
and
N is studied, and the result is illustrated in
Figure 13. The number of receivers increases with
for
. It should be noted that there are three peaks for
. It is because more sub-circles are divided in these cases, as plotted in
Figure 10. Moreover, it is noteworthy that
N increases significantly when
and then tends to be stable as the
increases. It can be explained by the slope of the transmitter numbers that decrease in this condition, as depicted in
Figure 12. The decreased slope indicates that the magnitude of the increased number of transmitters decreases. To enlarge the PCA, more receivers are exploited in the patterns.
6. Conclusions
A deployment optimization method is proposed in this paper to construct circular barrier coverage with an equipartition strategy. The concepts of multistatic radar coverage and CBC are introduced. Based on the equipartition strategy, a circular FoI is equally divided into q sub-circles. Each sub-circle is blanketed by a sub-CBC composed of several multistatic radar deployment patterns. Moreover, the optimization conditions for determining the optimal deployment patterns in a sub-CBC are studied. The conditions reveal that at most two varied types of patterns are needed by an optimal deployment sequence. Besides, a model based on minimum deployment cost is proposed to optimize the deployment on the whole circular FoI. The model is divided into two sub-models, and a two-stage optimization algorithm is proposed to solve the model. In the inner model, it is assumed that the width of a sub-circle is given. Based on the optimization conditions, ILP and EM are jointly exploited to obtain the types and numbers of deployment patterns. Besides, a novel formula is derived to improve the result of the maximum number of receivers in a pattern and reduce the search scope of EM. In the outer model, the improved formula is proposed to determine the number range of sub-circles and the width of a sub-circle. Then, EM is adopted to determine the minimum deployment cost and the optimal deployment patterns in each sub-CBC. Finally, simulations are conducted to validate the effectiveness of the proposed method. It is worth mentioning that the equipartition strategy results in a locally optimal solution. To improve the optimization results, the non-equipartition strategy should be considered in the future. Moreover, there are many overlapping areas in CBC, making it challenging to improve the coverage effectiveness. Therefore, it is beneficial to explore new coverage models, such as the regular polygonal model.