Mine locomotives are widely used in mining industry for transporting. Usually, these locomotives need to move along the tunnels and communicate with access points which are equipped on the side of these tunnels. It is important to maintain high-quality communication services due to the unsafe underground working environment. In this article, we design the mine locomotive wireless network strategy based on successive interference cancellation with dynamical power control. We first divide the whole schedule time into time segments and build the problem model in each time segment. To maximize throughput for each time segment, we formulate a linear programming problem based on certain features of successive interference cancellation decoding order. However, this problem has lots of constraints which makes it hard to solve in polynomial time. Then, we propose a concept of the maximum successive interference cancellation set to reduce the problem size. Based on this concept, we propose a polynomial complexity algorithm named max-SIC-set algorithm. Simulation results show that our algorithm can increase throughput significantly compared with the algorithm using successive interference cancellation only (no power control) and with the algorithm without using successive interference cancellation and power control.
Mine locomotives are widely used in mining industry for transporting. Usually, the mine locomotives are needed to be driven by men when they travel along the underground tunnels. However, the underground working environment is a harsh environment. According to incomplete statistics, at least 50,000 miners lost their lives from 2001 to 2014 in China.1 Among all kinds of these incidents, at least are caused by transporting systems. Fortunately, with the development of technology, the death rate decreased significantly. For example, in China, the number of death miners is 5670 in 2001 while is 931 in 2014.2 But 931 is still a big number, and if we can make the transporting systems safer, then lots of lives may not be lost.
Nowadays, we usually use some mine locomotive systems to control and regulate the mine locomotives, such as the signal centralization interlocking system.3 A typical mine locomotive system (see Figure 1) is usually consisted with underground locomotives, access points (APs), and the ground control center. The underground locomotives will transmit their data to APs and then APs will forward data to the ground control center. The APs can use wired networks to transform data to the ground control center. But, locomotives are mobile, and thus, it is better for them to transmit their data to APs by wireless networks. However, such a wireless network is not available in the traditional systems. So, data collection is done at the APs manually.3
A typical mine locomotive system.
Today, we can consider to use wireless network in the underground tunnels. Many researchers have done their work to improve transporting systems based on wireless network,4,5 such as building monitoring systems for mine locomotives.6 When using these improved transporting systems, locomotive data should be transmitted to APs efficiently and correctly. Especially to unmanned locomotive systems, the locomotive may transmit image or video data to APs by wireless network, which means we need to design robust transporting systems with large capacity. Nowadays, the wireless network protocols used in underground tunnels do not have many differences with which used in vehicular ad hoc network (VANET).7,8 Since, in wireless network, collisions often happen when several transmitters are transmitting together, traditional schemes will force the transmitters to abandon the transmitting data and wait for transmitting again. This is not an efficient way to underground wireless network.
Unlike the traditional schemes, some other technologies can let several transmitters transmitting simultaneously, and these technologies are more suitable for the underground locomotive wireless network. For example, successive interference cancellation (SIC) is a typical protocol9,10 of this type. Because of its good performance and easy implementation, SIC has been widely used. Its basic principle can be described as follows. When combined data with several transmitters’ information are received by a receiver, it will first try to decode and receive the strongest signal from the combined data. Only when the Shannon capacity is satisfied, the strongest signal can be decoded. After doing this, the strongest signal can be removed from the combined data, and the receiver will try to decode the second strongest signal. This process will be proceeded until all signals are decoded or one signal cannot be decoded.
The rest of the article is organized as follows. In section “Related works” related works are discussed. In section “Mine locomotive wireless networks,” we describe the problem and show that it is a non-linear programming (NLP) formulation. We further show how to reformulate it as a linear programming (LP) problem. In section “Polynomial-time algorithm,” we design a polynomial-time algorithm based on the concept of maximum SIC set. In section “Simulation results,” simulation results show that our algorithm can achieve large throughput improvement than schemes without power control and SIC. Finally, conclusions are provided in section “Conclusion.” (An abridged version of this article has appeared in wireless algorithms, systems, and applications (WASA) 2016, Bozeman, MT, USA.)11
Related works
Many works have been done for underground mine systems. Most of them focus on positioning,12,13 monitoring,14,15 and unmanned locomotive systems.16 And most just consider the wireless network protocols the same as which used in VANET.8,9 The IEEE 802.11p, which is standardized as the medium access control (MAC) layer of the dedicated short-range communication (DSRC) standard,17 is the most commonly used protocol in VANET.18,19 It divides the whole bandwidth into seven channels; among them, one for exchanging control and safety-related messages and the other six for exchanging normal data. In the work by Yao et al.,17 the authors analyze the models for the safety-critical messages transmitting in the first channel and improve the existing work by taking several aspects into design consideration. In the work by Amadeo et al.,20 the authors focus on the other six channels and propose the protocol named WAVE-based hybrid coordination function to improve performances of delay-constrained and loss-sensitive non-safety applications.
IEEE 802.11p is based on collision avoidance (CA), which means when collisions happen, the receiver will abandon the received data and ask transmitters to transmit again, while the interference management (IM)-based protocols21 can let several transmitters transmitting simultaneously. IM is a realizing method for wireless network communication, and it can be categorized into several types, such as interference cancellation,22 interference coordination,23 and interference randomization.23 In this article, we focus on the interference cancellation, which can be realized into several techniques further, such as SIC,24 parallel interference cancellation,25 and iterative interference cancellation.26 Among them, the SIC technique is preferred nowadays because of its good performance and easy implementation. Toumpis and Goldsmith’s27 work has proved that SIC technique can increase the capacity of wireless network significantly. Thus, we will use it in this article.
SIC changes the physical layer behaviors, so new schemes on the upper layer should be designed to fully exploit its capability.28 Many researchers have done their work in this research field. In the work by Shi et al.,29 the authors proposed an optimal SIC scheme for one base station and one hop wireless network where they suppose that all transmitters’ positions are known and fixed. The throughput increased almost compared with the one without using SIC. In the work by Gelal et al.,30 the authors proposed a framework that facilitates efficient multi-user MIMO-SIC enabled communications, and they named it MUSIC. The MUSIC is mainly focused on how to divide the whole wireless network into sub-topologies when using SIC, and simulation results show that MUSIC provided throughput improvements of up to four times. In the work by Jiang et al.,31 the authors designed an optimal algorithm for multi-hop ad hoc networks with SIC. Their algorithm is based on cross-layer design, that is, the algorithm designs both the transmitting scheme at link layer and the routing scheme at network layer. Simulation results show that the throughput can be increased by compared with the algorithm without using SIC. Based on the work of Jiang et al.,31 Shi et al.32 proposed a greedy cross-layer algorithm with polynomial complexity for SIC in a multi-hop network. Their algorithm was more suitable for the network with large transmitting nodes. In our previous work, we have designed an optimal locomotive moving schedule for the underground locomotives via SIC with power control.33 In that work, we supposed that the tunnel is straight, with only one lane, and each locomotive’s working time can be allocated precisely.
Mine locomotive wireless networks
A mine locomotive wireless network provides communication support for locomotives by APs on the side of a straight tunnel (see Figure 2). These APs are deployed such that there is no overlap of APs’ coverage, and these APs cover the entire tunnel. Locomotives move along the tunnel and there may be multiple locomotives in an AP’s coverage at the same time. APs apply SIC11 to receive data from multiple locomotives. We want to maximize throughput for locomotives.
The straight underground tunnel model.
Network model
We focus on the problem for one AP and locomotives within its coverage. The same approach can be applied to other APs. Suppose that each locomotive is in AP’s coverage for certain period of time and all these time periods are within . Each can apply power control and use power to transmit its data at time .
To simplify discussions, we assume the coordinate of considered AP is zero and denote as the coordinate of at time . Then, the distance between and AP at time is and propagation gain , where is the path loss index.
Now, we determine the communication range. Denote as noise and as the SINR (signal-to-interference-and-noise ratio) threshold for a successful transmission. The maximum transmission range is achieved when the transmission power is and there is no interference. Then, we have , that is
We define as a locomotive’s communication range since the transmission from may be successful only if . Then, the coordinate of is , where is the locomotive speed.
A locomotive may not always transmit during . We denote binary variable if transmits at time and otherwise. Apparently, if , we have , that is
where is the set of all locomotives.
Under SIC, AP can receive multiple locomotives’ data simultaneously and decode them from the strongest signal to the weakest signal.10 Once a signal is decoded, it will be canceled from the combined data, and thus, the SINR for the remaining signals increased. The SINR of at time under SIC can be written as
The SINR requirement under SIC is if , then , that is
Problem formulation
In the last subsection, we describe constraints for a locomotive network with SIC. However, there are infinite number of variables, for example, for . In this section, we consider a problem based on SIC sets, where the SIC set is a set of locomotives that can transmit at the same time under SIC, and prove the existence of optimal solutions that satisfy a particular SIC decoding order. Then, we can formulate an NLP problem with finite number of variables.
To reduce the number of variables, we divide time into small time segments such that in each time segment, (1) the set of locomotives within AP’s coverage does not change, and (2) the distance between a locomotive in this set and the AP does not change much. Denote the set of time segments as . By (2), we can approximate the channel gain for a locomotive in time segment as a constant . Our objective is to maximize throughput in each time segment.
We now formulate an optimization problem for time segment . Given the set of locomotives within AP’s coverage, we can determine all SIC sets (by the approach in the next section). Denote as the set of SIC sets in time segment and as the SIC set in . We divide time segment into time slots and assign one time slot for each SIC set. Denote as the time slot assigned to and as the normalized length of time slot . We have
Since both the set of active locomotives and their channel gains do not change within a time slot, these locomotives do not need to change their transmission powers in a time slot. Denote as the power of in time slot . The SINR for a locomotive in time slot is
The SINR requirement under SIC is
Note that in equation (3), the set of terms in depends on and values. But in a math programming formulation, the set of terms should be fixed. To resolve this issue, it is important to note that optimal solutions are not unique. Instead of considering all optimal solutions, we focus on optimal solutions with a particular SIC decoding order described in the following theorem.
Theorem 1.There is an optimal solution satisfying the following requirement: in each time slot, locomotives are decoded by the decreasing order of their channel gains to AP.
To prove Theorem 1, we first need the following corollary.
Corollary 1.Suppose that in an optimal solution and a time slot , locomotive is decoded right after and ’s channel gain to AP is larger than ’s channel gain, where . Then, there is another optimal solution with locomotive which is decoded right after in time slot .
Proof. Suppose that in solution and time slot , transmission powers at and are and , respectively. We construct solution by letting and and keeping other variables’ values unchanged. Then, we have and , that is, received powers for and are switched. Thus, in solution , locomotive is decoded right after in time slot , that is, the constructed solution satisfies the requirement on SIC decoding order.
To show that solution is feasible, we only need to verify . Since , we have , and since, in solution , locomotive is decoded right after , we have . Then . Thus, the constructed solution is feasible.
Then, Theorem 1 can be proved using Corollary 1 repeatedly to remove any violation on decoding order. By Theorem 1, equation (3) can be rewritten as
Now, there are fixed number of terms in .
Suppose that the minimum data rate requirement for is . For time segment , we want to maximize a common scaling factor such that
Then, the optimization problem for time segment is
where , , , and are variables. This formulation is an NLP problem and is very challenging to solve.
Reformulation
Problem (7) is non-linear due to variables in equation (5). Thus, we aim to remove these variables. In this section, we focus on certain optimal solutions that enable us to determine values for an SIC set in each time slot . Then, we formulate an LP problem to obtain such optimal solutions.
As a starting point, we have the following corollary.
Corollary 2.Suppose that in an optimal solution , a locomotive ’s SINR under SIC is larger than in time slot . Then, there is an optimal solution with ’s SINR under SIC equal to in time slot .
Proof. Under solution , ’s SINR in time slot is . Then, we can determine a such that .
We construct a solution by changing ’s transmission power from to and keeping other variables’ values unchanged. It is clear that solution satisfies the requirement on SINR.
To show that solution is feasible, we only need to verify that SINR requirements are met for all locomotives in . We consider the following three cases. (1) It is clear that ’s SINR in time slot is . (2) For a locomotive with , its SINR in solution is . Then, its SINR in solution is . (3) For a locomotive with , ’s signal will be decoded and then removed before ’s signal is decoded. Thus, there is no change in ’s SINR. With the proof for the above three cases, solution is feasible.
Based on Corollary 2, we can further get the following theorem.
Theorem 2.There is an optimal solution satisfying the following requirement: in each time slot , each locomotive has its SINR value under SIC equal to .
Theorem 2 can be proved using Corollary 1 repeatedly, where within each time slot , locomotives in are checked (and transmission powers are updated if needed) by following the increasing order of their channel gains.
Now, we focus on optimal solution described in Theorem 2. For a set , we can determine transmission powers in time slot as follows:
From the farthest locomotive to the nearest locomotive in , calculate to make .
Note that (1) values for and are already determined when we calculate , and (2) for an SIC set, the calculated all , that is, if any value is larger than , the corresponding set is not an SIC set. The complexity to calculate for transmission powers of an SIC set is , where is the number of locomotives in time segment . Once variables are all determined, problem (7) becomes the following LP
where and are variables. Note that if we check all non-empty subsets ( subsets) to obtain all SIC sets, the complexity to obtain all SIC sets and transmission powers is and thus the overall complexity is non-polynomial.
Polynomial-time algorithm
As we discussed in the last section, a simple algorithm by checking sets to find all SIC sets has an exponential complexity. To reduce complexity, we need to reduce the number of potential SIC sets.
We prove the maximum number of locomotives in an SIC set.
Theorem 3.The maximum number of locomotives in an SIC set is not more than a small constant .
Proof. Suppose that at time slot in a time segment , there are locomotives transmitting their data simultaneously to the AP. Suppose the power of the received signals satisfies , based on the SIC technique and Theorem 2, we must have
Then, we have . Since and , we have . And since the number of locomotives in time segment is , Theorem 3 is proved.
By Theorem 3, we only need to check subsets with at most locomotives to obtain all SIC sets. The number of these subsets is . Then, we have the following SIC-set algorithm:
Check all subsets with no more than locomotives to find all SIC sets and transmission powers.
The complexity to find all SIC sets and transmission powers is . For the second step, since the formulated LP has variables, the complexity to solve this LP is .34 So, the complexity of the SIC-set algorithm is , which is polynomial.
Note that may still be a large number. To further decrease the complexity, we define a concept of maximum SIC set (see Definition 1) and show that we only need to consider solutions with maximum SIC sets.
Definition 1.An SIC set is a maximum SIC set if for any locomotive which is closer to the AP than all locomotives in , is not an SIC set.
Theorem 4.For a maximum SIC set and an SIC set , we have (1) the data rate from each locomotive in is positive in ’s time slot and is zero in ’s time slot; (2) the data rate from each locomotive in is the same in both ’s and ’s time slots.
Proof. Because is an SIC set, for each locomotive in , its data rate is positive in ’s time slot. In particular, for each locomotive in , its data rate is positive. However, such a node has a zero rate in ’s time slot since it is not in . Thus, (1) is proved.
By SIC, stronger signals are decoded and canceled before decoding weaker signals. Since locomotives in are closer to the AP than locomotives in , signals from locomotives in are stronger than signals from locomotives in . Therefore, in ’s time slot, before signals from locomotives in are decoded, signals from locomotives in are all canceled. Thus, the decoding process for locomotives in is the same in both ’s and ’s time slots, yielding the same data rates. Hence, (2) is also proved.
Based on Theorem 4, it is easy to see that if we replace by in a solution, the new solution will have a better objective value. Thus, we only need to consider maximum SIC sets in equation (8) to obtain an optimal solution. We call this approach as the max-SIC-set algorithm.
We now show how to find all maximum SIC sets (see pseudocode in Figure 3). Initially, we have an empty set and then add locomotives to this set while keeping it as an SIC set. We sort the locomotives by their distances to AP and then try to add locomotives from the farthest one to the closest one. During this process, if we cannot find a locomotive that is closer to AP than any locomotive in an SIC set such that is an SIC set, then is a maximum SIC set. Otherwise, is not a maximum SIC set and we need to further check whether is a maximum SIC set.
Pseudocode for getting all maximum SIC sets.
The complexity of the algorithm in Figure 3 is not easy to analyze. Instead, we can compare it with the approach of checking all subsets with no more than locomotives to find all SIC sets. This algorithm has much less complexity due to the following two reasons. (1) We do not check all subsets with no more than locomotives, that is, once a set is identified as not an SIC set, we will not add more locomotives to this set and check whether the new set is an SIC set or not (since the new set will not be an SIC set). (2) When we check a new set, we only need to determine the transmission power of the newly added locomotives (other locomotives’ powers are already determined) and compare it with .
In the real environment, the max-SIC-set algorithm will be run on the AP in each beginning of a time segment. To do that, the AP will first get all distances from the covered locomotives, then get all maximum SIC sets using the algorithm shown in Figure 3, and then allocate time slots and transmission powers for these locomotives. After doing this, all locomotives will run using the allocated time slots and the transmission powers during the whole time segment.
Simulation results
In this section, we give simulation results to show the performance of the max-SIC-set algorithm. We compare our results with the other two schemes: SIC only (no power control) and non-SIC (traditional approach). Under these two schemes, each locomotive uses the maximum power to transmit data. Similar algorithms can be designed to obtain optimal solutions under these two schemes.
Consider wireless networks with 20–50 mine locomotives and one AP in a straight tunnel. A locomotive’s maximum transmission power is , and the noise power is . The SINR threshold is . The path lost index is . Then, by equation (1), a locomotive’s communication range is . The channel bandwidth is . The minimum data transmission rate requirement is between 100 kbps and 1 Mbps. The traveling speed is . The maximum length of a time segment is 5 s. The distance between two successive locomotives should be kept at least 30 m for safety reasons. Suppose we have known all start times , which are created randomly in our simulations and satisfy the minimum security distance. The algorithm can be written by any of computer languages, and we use based on VisualStudio.Net 2012 platform. The LP problem can be calculated by some math tool packages, such as LINDO which we select to use. The computer we used has an Intel Core i5 CPU and 4 GB memory. All the following results are obtained in seconds.
We first present detailed results of a wireless network with locomotives; then, we provide complete results of all network instances with different number of locomotives.
Results of a wireless network with 20 locomotives
Consider a wireless network with locomotives. The start times and the minimum data transmission rate requirement of each locomotive are given in Table 1. The whole schedule time and will be divided into time segments. To show the efficiency of our algorithm, we list the values of from the 21st time segment to the 25th time segment (We do not show result in the first time slots since there are only a few locomotives within AP’s coverage.) in Table 2 while comparing the values of under the other two schemes. We also list the lengths of some time segments in Table 2. We can see that SIC with power control can always achieve the best performance, while the non-SIC scheme always has the worst performance. To show the overall performance over all segments, we calculate the average values for all segments, which are for the SIC with power control scheme, for the SIC only scheme, and for the non-SIC scheme. That is, the improvement in throughput by the SIC with power control scheme is compared with the SIC only scheme and is compared with the non-SIC scheme.
Start times and minimum rate requirements of the locomotives.
(s)
(kbps)
(s)
(kbps)
1
0
605.4
11
118
394.0
2
14
795.6
12
130
509.3
3
28
603.1
13
140
747.2
4
41
896.5
14
152
330.7
5
52
291.8
15
165
620.9
6
58
222.4
16
172
557.9
7
70
799.1
17
183
493.9
8
80
639.2
18
191
147.6
9
95
638.6
19
197
862.8
10
104
669.2
20
205
425.4
values under different schemes from to .
Time length
(SIC with power control)
(SIC only)
(non-SIC)
21
5
2.29
1.04
0.91
22
5
2.30
1.04
0.91
23
1
1.39
0.91
0.80
24
5
1.88
1.03
0.90
25
3
1.88
1.21
0.90
SIC: successive interference cancellation.
To show the transmission regularity, we draw the locomotives’ transmitting time from the 21st time segment to 25th time segment in Figure 4. From Table 2 and Figure 4, we can see that the length of the 21st segment is 5 s (i.e. the 85th, 86th, 87th, 88th, and 89th second), the length of the 22nd segment is 5 s (i.e. the 90th, 91st, 92nd, 93rd, and 94th second), the length of the 23rd segment is 1 s (i.e. the 95th second), the length of the 24th segment is 5 s (i.e. the 96th, 97th, 98th, 99th, and 100th second), and the length of the 25th segment is 3 s (i.e. the 101st, 102nd, 103rd, and 104th second). So, the total length of these five segments is 19 s. During these 19 s, 9 locomotives are moving along tunnel. In Figure 4, we use the red lines to represent the time slots for each locomotive using. For example, we can see that the first locomotive transmits in the 85th second, 86th second, and a small part of 87th second and that several other locomotives transmit at the same time. For comparison, we draw Figure 5 to show the time segments division under SIC only scheme. Apparently, in this scheme, locomotives have less chances to transmit together. We only find concurrent transmission in five time slots among the total time slots in these five time segments. We also draw Figure 6 to show the time segments division under non-SIC scheme, and in this scheme, the opportunities for transmitting become worse. Apparently, the locomotives have more opportunities for transmitting under the SIC with power control scheme.
The locomotives’ transmitting time from the 85th second to the 104th second on the SIC with power control scheme.
The locomotives’ transmitting time from the 85th second to the 104th second on the SIC only scheme.
The locomotives’ transmitting time from the 85th second to the 104th second on the non-SIC scheme.
Results of all network instances
We consider networks with , or locomotives and generate different network instances randomly for each network size. Then, we calculate the value for each instance under three schemes and show the results in Figure 7. We can see the value for each instance by the SIC with power control scheme is improved significantly compared with the other two schemes (see Table 3).
Results of all network instances.
value and improvements for the four group instances.
Number oflocomotives
(SIC withpower control)
SIC only
non-SIC
Improvement
Improvement
20
3.25
2.62
123.9%
2.18
148.9%
30
3.47
2.81
123.8%
2.38
145.5%
40
2.68
2.05
130.4%
1.74
153.7%
50
2.59
1.98
131.0%
1.74
148.6%
SIC: successive interference cancellation.
Conclusion
Using SIC technique, an AP can receive multiple locomotives’ data simultaneously. In this article, based on SIC technique and power control, we designed an optimal communication algorithm for underground mine locomotive networks. We divided the whole scheduling time into many time segments and in each time segment, we got an LP formulation for our problem. Then, we designed an algorithm named max-SIC-set algorithm to solve the problem in polynomial time. Simulation results showed that our algorithm can improve the throughput significantly compared with the other two schemes: SIC only (without power control) and non-SIC (traditional approach).
Footnotes
Academic Editor: Wei Yu
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Natural Science Foundation of China (no 61370088 and 61501161) and International Science & Technology Cooperation Program of China (no. 2014DFB10060).
References
1.
DengQGWangYLiuMJ. Statistic analysis and enlightenment on coal mine accident of China from 2001–2013 periods. Coal Technol2014; 33(9): 73–75.
WangYFuY. Research on the signal centralization interlocking system in undermine transportation based on precise positioning. Electronic Technol2013; 40(2): 14–16.
4.
ChengSCaiZLiJ. Drawing dominant dataset from big sensory data in wireless sensor networks. In: Proceedings of the IEEE conference on computer communications, Hong Kong, China, 26 April–1 May 2015. New York: IEEE.
5.
ShiTChengSCaiZ. Adaptive connected dominating set discovering algorithm in energy-harvest sensor networks. In: Proceedings of the 35th annual IEEE international conference on computer communications, San Francisco, CA, 10–14 April 2016. New York: IEEE.
6.
BerglundTBrodnikAJonssonH. Planning smooth and obstacle-avoiding B-spline paths for autonomous mining vehicles. IEEE T Autom Sci Eng2010; 7(1): 167–172.
7.
WangHLiuRNiW. VANET modeling and clustering design under practical traffic, channel and mobility conditions. IEEE T Commun2015; 63(3): 870–881.
8.
HartensteinHLaberteauxKP. A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag2008; 46(6): 164–171.
9.
MiridakisNIVergadosDD. A survey on the successive interference cancellation performance for single-antenna and multiple-antenna OFDM systems. IEEE Commun Surv Tut2013; 15(1): 312–335.
10.
ZhangXHaenggiM. The performance of successive interference cancellation in random wireless networks. IEEE T Inform Theory2014; 60(10): 6368–6388.
11.
ShiLShiYWeiZ. The power control strategy for mine locomotive wireless network based on successive interference cancellation. In: Proceedings of the international conference on wireless algorithms, systems, and applications, Bozeman, MT, 8–10 August 2016. Berlin: Springer.
12.
LieMEnjieDQiyanF. Underground moving target positioning and historical trajectory extraction based on Wi-Fi and WebGI. Geogr Geoinf Sci2013; 28(3): 109–110.
13.
ChiHZhanKShiB. Automatic guidance of underground mining vehicles using laser sensors. Tunn Undergr Sp Tech2012; 27(1): 142–148.
14.
LiMLiuY. Underground coal mine monitoring with wireless sensor networks. ACM T Sensor Network2009; 5(2): 1–29.
15.
MisraPKanhereSOstryD. Safety assurance and rescue communication systems in high-stress environments: a mining case study. IEEE Commun Mag2010; 48(4): 66–73.
16.
GeBZhangSX. Research on precise positioning technology of mine locomotive unmanned systems. Appl Mech Mater2013; 397(11): 1602–1605.
17.
YaoYRaoLLiuX. Performance and reliability analysis of IEEE 802.11p safety communication in a highway environment. IEEE T Veh Technol2013; 62(9): 4198–4262.
ChengSCaiZLiJ. Curve query processing in wireless sensor networks. IEEE T Veh Technol2015; 64(11): 5198–5209.
20.
AmadeoMCampoloCMolinaroA. Enhancing IEEE 802.11p/WAVE to provide infotainment applications in VANETs. Ad Hoc Netw2012; 10(2): 253–269.
21.
NabilAHouYTZhuR. Recent advances in interference management for wireless networks. IEEE Network2015; 29(5): 83–89.
22.
VerduS. Multiuser detection. Cambridge: Cambridge University Press, 1998.
23.
BosisioRSpagnoliniU. Interference coordination vs. interference randomization in multicell 3GPP LTE system. In: Proceedings of the IEEE wireless communications and networking conference, Las Vegas, NV, 31 March–3 April 2008, pp.824–829. New York: IEEE.
24.
AndrewsJG. Interference cancellation for cellular systems: a contemporary overview. IEEE Wirel Commun Mag2005; 12: 19–29.
25.
PatelPHoltzmanJ. Performance comparison of a DS/CDMA system using a successive interference cancellation (IC) scheme and a parallel IC scheme under fading. In: Proceedings of the IEEE international conference on serving humanity through communications, New Orleans, LA, 1–5 May 1994, pp.510–514. New York: IEEE.
26.
WangXPoorHV. Iterative (Turbo) soft interference cancellation and decoding for coded CDMA. IEEE T Wirel Commun1999; 47(7): 1046–1061.
27.
ToumpisSGoldsmithAJ. Capacity regions for wireless ad hoc networks. IEEE T Wirel Commun2003; 2(4); 736–748.
28.
FrengerPOrtenPOttossonT. Code-spread CDMA with interference cancellation. IEEE J Sel Areas Commun1999; 17(12): 2090–2095.
29.
ShiLHanJShiY. Cross-layer optimization for wireless sensor network with multi-packet reception. In: Proceedings of the 5th international ICST conference on communications and networking in China, Beijing, China, 25–27 August 2010, pp.1–5. New York: IEEE.
30.
GelalEPelechrinisKKimTS. Topology control for effective interference cancellation in multi-user MIMO networks. In: Proceedings of the IEEE INFOCOM, San Diego, CA, 14–19 March 2010. New York: IEEE.
31.
JiangCShiYHouYT. Squeezing the most out of interference: an optimization framework for joint interference exploitation and avoidance. In: Proceedings of the IEEE INFOCOM, Orlando, FL, 25–30 March 2012. New York: IEEE.
32.
ShiLShiYYeYX. An efficient interference management framework for multi-hop wireless networks. In: Proceedings of the IEEE wireless communications and networking conference, Shanghai, China, 7–10 April 2013. New York: IEEE.
33.
WuLHanJWeiX. The mine locomotive wireless network strategy based on successive interference cancellation. Sensors2015; 15(11): 28257–28270.
34.
KhachiyanLG. Polynomial algorithms in linear programming. USSR Comp Math Math+1980; 20(1): 53–72.