About this Journal Submit a Manuscript Table of Contents
International Journal of Distributed Sensor Networks
Volume 2013 (2013), Article ID 376931, 14 pages
http://dx.doi.org/10.1155/2013/376931
Research Article

Radial and Sigmoid Basis Function Neural Networks in Wireless Sensor Routing Topology Control in Underground Mine Rescue Operation Based on Particle Swarm Optimization

1Institute of System Engineering, Faculty of Science, Jiangsu University, 301 Xuefu, Zhenjiang 212013, China
2Department of Computer Science, Faculty of Applied Science, Kumasi Polytechnic, P.O. Box 854, Kumasi, Ghana
3College of Finance and Economics, Jiangsu University, 301 Xuefu, Zhenjiang 212013, China
4Computer Science and Technology, School of Computer Science and Telecommunication, Jiangsu University, 301 Xuefu, Zhenjiang 212013, China

Received 18 April 2013; Revised 5 July 2013; Accepted 19 July 2013

Academic Editor: Shuai Li

Copyright © 2013 Mary Opokua Ansong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The performance of a proposed compact radial basis function was compared with the sigmoid basis function and the gaussian-radial basis function neural networks in 3D wireless sensor routing topology control, in underground mine rescue operation. Optimised errors among other parameters were examined in addition to scalability and time efficiency. To make the routing path efficient in emergency situations, the sensor sequence and deployment as well as transmission range were carefully considered. In times of danger and unsafe situations, data-mule robot with Through The Earth (TTE) radio would be used to carry water, food, equipments, and so forth to miners underground and return with information. Using Matlab, the optimised vectors with high survival rate and fault tolerant, based on rock type, were generated as inputs for the neural networks. Particle swarm optimisation with adaptive mutation was used to train the neurons. Computer simulation results showed that the neural network learning algorithm minimized the error between the neural network output and the desired output such that final error values were either the same as the error goal or less than the error goal. Thus, the proposed algorithm shows high reliability and superior performance.

1. Introduction

There were massive mining incidences in 2002 according to the editorial team of disaster prevention and management report, disclosing an alarming rate of fatalities globally [1]. Mining methods in recent years have been greatly improved due to the provision of electronic monitoring of hazardous gas and provision of ventilation as well as safety lamps. Nonetheless, there are still significant mining risks such as flooding, fall of ground, underground fires, handling and use of cyanide, storage of and exposure to radiation materials, and other airborne pollution that need to be addressed. These have been responsible for a continuing series of environmental and health disasters, which cause great human tragedies and loss of life and undermine social or economic stability and sustainability [25]. Mining remains one of the most hazardous environmental occupations worldwide with underground coal and gold mines characterized by high accident rates even in relatively efficient mining operations [68]. In view of this, evacuation procedures and underground communication infrastructures are expected to be efficient, effective, and fault tolerant. The critical part of underground communication infrastructure is to reduce the response time and fatalities in emergency or evacuation situations and make human life rescue operations possible [9]. This can be achieved using wireless sensor networks (WSNs) which have the capability of monitoring complex phenomena, underground tunnels, underwater surveillance, high resolution, and harsh environments that are otherwise difficult to access [1012]. Wireless sensor networks have caused major paradigm shift in the area of communication and computation. It consists of a large number of low-powered sensor nodes, usually equipped with a wireless transceiver, a small microcontroller, an energy power source, and multitype sensors such as temperature, humidity, light, heat, pressure, sound, and motion [13]. The cost and size of these sensors have decreased with high communication accuracy and capabilities; some have energy harvesting features which capture and accumulate by-product energy and store it for later use [14, 15]. These sensors have made it possible for multihop transmission that conforms to underground tunnel structure and provides more scalability for communication system construction [16, 17].

To this end, we model the incident location as a pure random event and calculate the probability that communication chain through particular rock layers to the ground is not broken, and let neuron network memorize the complicated relationship; such that when real accident happens, the neural network resident in the robot is used to predict the probability based on the rock layer he sees instantly. If the result is positive, the robot waits to receive the rescue signal; otherwise, it moves deeper to the next layer and repeats the procedure.

However, large-scale networks such as WSN are usually associated with the challenge of scalability; that is, whether the system described will remain effective and reliable [18] with significant increase in nodes or users, without having to increase related time or hardware requirements such as memory and central processing unit (CPU). To mitigate this challenge, a distributed algorithm is required for parallel programming, which may lead to consensus problems, that is, the inability of the various processes to agree and communicate with one another on a single data value. A number of techniques with application to localization in a distributed, routing-free, and range-free wireless sensor networks have been proposed to solve this problem [1921]. The topology of a neural network can be recurrent or with feedback contained in the network from the output back to the input and feed-forward where the data flows from the input to the output units with no feedback connections. Artificial neural networks (ANN) or neural networks (NN) are learning algorithm used to minimize the error between the neural network output and desired output [22]. This is important where relationships exist between weights within the hidden and output layers and among weights of more hidden layers. Many researchers have come out with neural network predictive models in both sigmoid and radial basis functions with applications such as nonlinear transformation, extreme learning machine, and predicting accuracy in gene classification [2325]. Others focus on distributed estimation control fields to mitigate the execution problems, such as multiple redundant manipulators, cooperative task, and task execution [26, 27].

This paper compares the performance of compact radial basis function (CRBF) with the sigmoid basis function (SBF) and the Gaussian radial basis function (GRBF) neural networks on wireless sensor routing topology control based on Particle swarm optimization (PSO) in underground mine rescue operation. A scale-free wireless network topology environment was used. A significant discovery in the field of complex networks has shown that a large number of complex networks including the internet and worldwide network (www) are scale-free and their connectivity distributions are described by the power law of the form [28, 29]. This power-law distribution falls off more gradually than an exponential one, allowing for a few nodes of very large degree to exist. Even though scale-free networks could be more disjointed in the event of intentional attacks on their hubs, a random failure would most likely happen on nodes with low degree of connectivity and therefore not serious on connectivity.

The first section of this paper discusses significant risks in the mining industry which undermine social and economic stability and sustainability goals as well as loss of life and the need for a fault tolerant routing topology in emergency or evacuation situations, noting the challenges of scalability, distributed algorithm, parallel programming and consensus in communication. Section two focuses on methods and our approach, integrating PSO with threshold adaptive mutation in SBF, compact RBF, and gaussian RBF using mean square error for fitness evaluation. Section three deals with the results and discussion with real world application while the last section concludes the paper.

2. Deployment, Communication, and Transmission Reach

2.1. Sensor Deployment

Topological deployment of sensor nodes affects the performance of the routing protocol [30, 31]. The ratio of communication range to sensing range as well as the distance between sensor nodes can affect the network topology. In view of this, the sensor sequence matrix was generated for the sensors to be deployed, such that , , , , and ; and , to check the source node and destination node, respectively The sequence matrix () indicates the positions where sensors would be deployed and are explained as follows: for level 1, row 1, column 1 , level 1, row 2, column 1, and for th level, th row, and th column, respectively. Therefore for a , in an underground mine with dimensions of , , and for depth (level), row (length), and width (column), respectively, with -distant apart, suggests that 60 sensors will have to be deployed (Figure 1). The structure of the deployment with diamond, square and triangle shapes indicates the node location on each level, row, and column, respectively. The objective of the deployment is to help save trapped miners in an emergency evacuation situation.

376931.fig.001
Figure 1: Positions of deployed sensors for the levels, rows, and columns.
2.2. Communication and Transmission Reach

The TTE communication system transmits voice and data through solid earth, rock, and concrete and is suitable for challenging underground environments such as mines, tunnels, and subways. Figures 2(a)2(c) show the positions of the TTE as laid underground such as vertical-to-surface, horizontal between levels, and horizontal through obstruction, respectively. There were stationary sensor nodes monitoring carbon monooxide, temperature, and so forth as well as mobile sensors (humans and vehicles) distributed uniformly. Both stationary and mobile sensor nodes were connected to either the Access Point (AP) and/or Access Point Heads (AP Heads) based on transmission range requirements. The AP Heads serve as cluster leaders and are located in areas where the rock is relatively soft or has relatively better signal penetration. This will ensure that nodes are able to transmit the information they receive from APs and sensor nodes. The APs are connected to other APs or Through-The-Earth (TTE) in Figure 3.

fig2
Figure 2: TTE-two-way voice and data communication.
376931.fig.003
Figure 3: Topology structure of stationary and mobile sensors deployed.

The TTE is dropped through a drilled hole down 300 metres apart based on the rock type. The depth and rock type determine the required number of TTEs needed (Figure 4). Next the data mule is discharged to carry items such as food, water, and equipments to the miners underground and return with underground information to rescue team (Figure 5).

376931.fig.004
Figure 4: TTE radios dropped through drilled hole from surface to underground (300) meters.
376931.fig.005
Figure 5: Data mule sends radios, food, water, and so forth to and from miners and rescue team.

Minimizing the transmission range of wireless sensor networks is vital to the efficient routing of the network. This is because the amount of communication energy that each sensor consumes is highly related to its transmission range [3032]. The node signal reach (SRnode) is defined as the integration of the change of the minimum and maximum signal reach, taking into consideration the 6 cases of the rock structure β, where β lies between the soft rock (0.7) and the hardest rock (0.9) and is given as where and are minimum and maximum signal reach respectively and each represented as The relationship between rock hardness and the signal reach is a complicated nonlinear function, which is related to the skin depth of the rock with alternating currents concentrated in the outer region of a conductor (skin depth) by opposing internal magnetic fields as follows: for is material conductivity, is frequency, and is magnetic permeability.

The signal (-field) is attenuated by cube of distance () .

Table 1 identifies 6 common rocks found in mines in relation to hardness or softness of each rock.

tab1
Table 1: Common rocks found in typical mines in relation to hardness or softness.

For a connection to be made, the absolute difference between and should be less than the node signal reach (SRnode) and is represented as connection: Multihub wireless networks give rise to distinct challenges such as limited sensing and communication resources utilization [33]. The routing path has the constraints of maximum point to multipoint connection imposed on it (therefore each node will connect to APs/AP heads times to generate the routing path matrix, and the routing () for the transmission was given as for , is the multipoint (even) to allow bidirectional communication, and tracks the source and destination nodes, respectively. Consider

3. Network Fault Tolerant, Hardware, and Software Considerations

3.1. Network Fault Tolerant

Security and management schemes are critical issues in wireless sensor networks as it significantly affects the efficiency of the communication, and many key management schemes had been proposed to mitigate the constraints [33, 34]. As stated earlier, underground mines are characterized with high accident rates which pose great danger to the communication infrastructure. Accidents, such as fire, flooding, cave-ins, or gases can destroy base stations, communication or lighting systems. Battery drain and virus can cause sensors to die invariably creating potential danger to miners underground. Assuming a third failure rate as () affects the routing matrix () where is any random value within , the result would be an explosion matrix: In assessing the damage and generating the failed matrix (), limits were set to and for lower and higher limits, respectively. Therefore , such that if The exact element of figures is used in calculation for in the failed matrix. Elements are approximated to 2 decimal places for simplicity.

The failure that resulted from the random explosion is presented in a matrix (). Getting a new path for transmission, the failed matrix () was optimized as follows: The objective is to find a routing path that has the maximum survivability. The matrix elements “1s” and other fractions (0.5, 0.67, and 0.83) refer to the probability that data would be able to transmit to and from its source and destination, respectively. It also shows where a decision needs to be taken; for example, whether the same message should be sent twice or whether two nodes of 0.5 should send a one message. “0” means that the link is dead. Consider The survivability indicates a number of parallel connections () between every node to all the sink(s) and describes the success rate from each node to the sink(s), in most practical applications, more than one sink is used, and sink node is either through the fiber or TTE connection.

3.2. Hardware and Software Considerations

In real rescue situations, software and hardware, including radio frequency identification (RFID) [35], can fail as a result of accidents which can significantly affect the routing path and thwart the efforts of the rescue team. Equally, miners can make other mistakes in the face of accident that can compound the existing problem(s), especially where they find themselves more than 4,000 feet underground, as it is in one of the minefield used for this study. It is therefore imperative to consider such failures in developing rescue models. The RFID failure rate was formulated as The hardware survival rate was given as where , is errors or mistakes committed during an accident and , is the number of exits available. The database failure rate () is For particular mine, 6 common rocks found in typical coal mine are trained together. Data was collected from Wang Xing village, located in Xinzhen City, Henan Province, China.

An optimized vector , generated as the optimum set of transmission routing table that has the highest survival probability for data transmission, was given as where for the training.

is the number of safe exits available (that is available exit less errors). is an input vector for the neural network.

4. Related Work

Communication in the underground mine setting is relatively new compared with the long history of mining worldwide [34]. Transmitting data wirelessly impact significant benefits to those investigating buildings, thus allowing them to deploy sensors and monitor from a remote location [30, 36]. To effectively gain the needed results in the WSN, researchers have come out with a number of techniques to address the problem of topology control (TC). These include localization of nodes in 3D environment in terms of signal overhead (beacon), localization time, error and path-loss transmission range and total load each node experiences, and energy conservation [31, 37], among others. Power consumption management is very crucial in optimizing the efficiency and minimizing cost in wireless sensor networks [38]. In large mines, for instance, the number of sensors can quickly go up to 10s of 1000s, and the optimization calculation cannot be done on robot over the spot due to battery power constraints. To solve this problem, we employ neural network to do fast calculation on the spot and train the neurons ahead of time for each mine application.

5. System Model

In the generalized neural network models, the operation of a single neuron can be divided into a weighted sum and an output function as indicated in Figure 6.

376931.fig.006
Figure 6: Basic neural network structure.

The weighted sum computes the activation level of the neurons with the output function giving the actual output of the neuron. The initial inputs are summed together as , such that is weights of the neuron for the th input, and means that the activation level is scaled according to the output function. The sigmoid output function can be expressed as , is a positive constant which controls the slope or steepness of the sigmoid, and the sigmoid function amplifies and limits the small activation levels and high activation levels respectively. In practice the output of lies between ; however, for outputs that requires negative values, the hyperbolic tangent is used; , [3941].

For as the position of the th particle, is the input from (18), and, and are number of neurons at hidden and output layers, respectively. Consider The weights were given as There were two thresholds:

Evaluation of the Fitness Function. The architecture of the learning algorithm and the activation functions were included in the neural networks. Neurons are trained to process, store, recognize, and retrieve patterns or database entries to solve combinatorial optimization problems. After encoding the particles, the fitness function was then determined. The goodness of the fit was diagnosed using mean squared error (MSE) as where is number of samples, is the number of neuron at output layer, is the ideal value of th sample at th output, and is the actual value of th sample at th output. One has Neuron function -(sigmoid) is , is weight matrix, is input vector, and is threshold. The normal radial basis function for Gaussian is given as .

This involves additional square operation and poses computation burden. This paper proposed a compact radial basis function based on the Gaussian radial basis function and Helen’s [42] definition expressed as is weight matrix, is input vector, and is threshold. The resultant RBF for this paper was displayed as based on Helen’s definition [42]. The focus was on improving the radial basis function for the mine application.

Helen’s definition states that a function such that where and denotes the Euclidean norm with as an example of the RBF kernels. The global support for RBF radials or kernels has resulted in dense Gram matrices that can affect large datasets and therefore constructed the following two equations: and where , and is the positive part. The function is a sparsifying operator, which thresholds all the entries satisfying to zeros in the Gram matrix. The new kernel resulting from this construction preserves positive definiteness. This means that given any pair of inputs and where the shrinkage (the smaller ) is imposed on the function value ; the result is that the Gram matrices and can be either very similar or quite different, depending on the choice of .

6. Particle Swarm Optimization

Particle swarm optimization (PSO), an evolutionary algorithm, is a population-based stochastic optimization technique. The idea was conceived by an American researcher and social psychologist James Kennedy in the 1950s. He is known as an originator and researcher of particle swarm optimization. The theory is inspired by social behavior of bird flocking or fish schooling. The method falls within the category of Swarm intelligence for solving global optimization problems. Literature has shown that the PSO is an effective alternative to established evolutionary algorithms (GA) and retains the conceptual simplicity of the GA, much easier to implement and apply to real world complex problems with discrete, continuous, and nonlinear design parameters [43, 44]. Each particle within the swarm is given an initial random position and an initial speed of propagation. The position of the particle represents a solution to the problem as described in a matrix , where and represent the number of particles in the simulation and the number of dimensions of the problem, respectively [44, 45]. A random position representing a possible solution to the problem, with an initial associated velocity representing a function of the distance from the particle’s current position to the previous position of good fitness value, was given. A velocity matrix with the same dimensions as matrix described this. One has While moving in the search space, particles commit to memory the position of the best solution they have found. At each iteration of the algorithm, each particle moves with a speed that is a weighted sum of three components: the old speed and two other speed components which drive the particle towards the location in the search space, where the particle and neighbor particles, respectively, find the best solutions [46]. The personal best position can be represented by an matrix and the global best position is an -dimensional vector : All particles move towards the personal and the global best, with , , , and containing all the required information by the particle swarm algorithm. These matrices are updated on each successive iteration: and are constants set to 1.3 and 2, respectively, and are random numbers.

To prevent particles from not converging or converging at local minimum, an adaptive mutation according to threshold was introduced. Particles positions were updated with new value only when the new value is greater than the previous value. 20% of particles of those obtaining lower values were made to mutate for faster convergence; this is indicated by the flowchart in Figure 7 [47, 48].

376931.fig.007
Figure 7: PSO with adaptive mutation according to threshold.

7. Artificial Neural Networks (ANN)

Artificial neural networks (ANNs) are learning algorithm used to minimize the error between the neural network output and desired output. This is important where relationships exist between weights within the hidden and output layers, and among weights of more hidden layers. The architecture or model, the learning algorithm, and the activation functions are included in neural networks. Assuming the input layer has 4 neurons, output layer 3 neurons, and the hidden layer has 6 neurons, we can evolve other parameters in the feed-forward network to evolve the weight. So the particles would be in a group of weights, and there would be weights. This implies that the particle consists of 42 real numbers. The range of weight can be set to . After encoding the particles, the fitness function was determined using Matlab for the calculations. A 3-layered ANN was used to do the classification. The input layer takes the final survival vector (18), with a number of hidden layers and an output layer. The training simulated 6 cases at a time with the first case taking the relatively soft rock of , the hidden neurons taking the middle hardness of the rock, and the output layer taking the hardest of rock , such that . The structure of the PSO used is radial basis function (RBF) displayed in Figure 8 was used by Peng and Pan [37]. To train the neural networks, PSO runs six cases at a time, such that runs = round , is the dimension of the minefield, and 6 represents the number of cases of rock hardness (0.7–0.9) in each training.

376931.fig.008
Figure 8: Topological structure of the neural network training.

8. Results and Discussion

The result of the final survivability vector (18) was displayed as The objective was to find the routing path that has the maximum survivability. The elements “1s” and the fractions (0.5, 0.67, and 0.83) refer to the probability that data would be able to transmit to and from its source and destination. In this study transmission was made through the vector elements: if that element or node , where , else transmission was done by more than one node. It also shows where a decision needs to be taken. For example, whether the same message should be sent twice by a node or be sent by two nodes on the network. It describes the success rate from each node to the sink(s): in most practical applications, more than one sink is used, and sink node is either through the fiber or TTE connection.

Figure 9 shows the optimised error and survival probability for one run as follows: , , and . At rock hardness of 90% the survival probability was between 73 and 85%. In view of this the AP heads had to be positioned at areas where the rock is relatively soft. In addition, scalability of CRBF model to SBF and GRBF in relations to survival probability range was comparable. Robot location and rock type with their survival probability ranges are displayed in Table 2. The survival probability range also indicated its scalability at various robot locations, different sizes of sensor nodes, and at different types of rock softness/hardness. The proposed model CRBF competed favourably and better in some cases compared to the SBF and GRBF.

tab2
Table 2: Scalability of our model in relation to survival probability range, robot location, and rock type.
fig9
Figure 9: Optimised error and survival probability for CRBF, SBF, and GRBF.

The CPU time, memory allocated, and memory at peak period were generated by profiling during Matlab simulation and the details recorded after 10 runs for each model. The relationship between the CPU time, memory allocated, and memory at peak usage with respect to CRBF, SBF, and GRBF was expressed in a second-order polynomial given as where is time, is the coefficient of the polynomial, and the results were displayed in Table 3 and Figure 10. The CPU time recorded was 622.548 for CRBF, 698.722 for SBF, and 753.082 for GRBF. Comparing the three models the second- (2nd-) order polynomial was used for the analysis for CPU time. Memory allocation and memory used are better even with increase in sensor nodes.

tab3
Table 3: CPU time and memory efficiency of CRBF, SBF, and GRBF.
376931.fig.0010
Figure 10: CPU time and memory efficiency.

Other parameters assessed were the mean iteration, standard variance, standard deviation, and the convergence time. 3000 nodes divided into 300 nodes per simulation were performed for CRBF and SBF and GRBF. From Tables 4, 5, and 6, the standard variance for the CRBF of 32.52592 was more consistent with the dataset as compared to 33.14 for the SBF which was more dispersed.

tab4
Table 4: Average performance in various parameters of compact radial basis function (CRBF) with a target error of 0.01.
tab5
Table 5: Average performance of various parameters using sigmoid basis function (SBF) with a target error of 0.01.
tab6
Table 6: Average performance of various parameters using Gaussian radial basis function (GRBF) with a target error of 0.01.

Similarly, the time the particles took to converge in CRBF (92.5 seconds) was shorter than that of SBF (101.9 seconds) and GRBF (104 seconds). On the other hand the mean iteration of 17.528 and the standard deviation of 0.0337 in SBF showed more favorable results than that of CRBF which was 21.872 and 0.04315 and GRBF’s mean iteration of 26.224 and standard deviation of 0.0436, respectively. In addition the dataset of CRBF was more consistent than SBF and GRBF, which were more dispersed.

From Tables 46, the errors of the models were also accessed. The error goal was set at 0.01. The initial and final errors were analysed against the error goal for the same number of simulation in both cases. 60% of the results for RBF had 0.01 as the target set, with 20% having 0.012 (excess of 0.002) and the rest 0.015 and 0.019. However SBF met the target at 30%, with 20% having 0.012 (excess of 0.002), the remaining 50% obtained in excess of the above (0.005). Additionally the performance of the training in terms of the average optimised error was given as 0.011, 0.016, and 0.013 for CRBF, SBF, and GRBF respectively. This also confirms the CRBF superiority over the SBF and GRBF; the RBF’s accurateness over the SBF is also consistent with Hidayat and Ariwahjoedi [49]. From Figure 9 the initial errors of  (), (), and 0.08 were all reduced after the training to ( at point ), ( at point ), and at point .

The results of the general characteristics of the three models with a range of weight set at are presented in matrix , , and with the characteristic curves in Figure 11

376931.fig.0011
Figure 11: The structure of the CRBF, SBF, and GRBF.

The initial stage of the sigmoid function (SBF) grows relatively exponential as touches the 0, and then the growth begins to slow down towards saturation and stops at maturity as goes to 1 (Figure 11). The RBF rises from 0 to 1 and falls as goes to “10.” A combination of both functions, where goes close to negative 4 and intersects the Sigmoid curve at (1, 0.3679), improves the accuracy. Other studies such as velocity-field reconstruction in fluid structure [49] showed the flexibility of the SBF but indicated that the RBF gives better accuracy, attributable to the influence of function parameters.

The CRBF and SBF accelerate from the beginning to the peak and decrease as they get closer to the target. However the GRBF lagged a while at before rising and falling close to thereby reducing the survival probability range at that point.

9. Conclusion

In this study a scale-free wireless sensor routing topology control in 3-dimensional environment for an optimized path in underground mine rescue operation was discussed. Optimization was done numerically using Matlab simulation tool which generated the optimum set of routing table. Through particle swarm algorithm the neural network was trained for rescue operation. Results showed that the combined CRBF with PSO provided better results than SBF and PSO or GRBF and PSO in the neural training. The proposed model was relatively better in terms of scalability and CPU time efficiency. We have also shown that the model is fault tolerant and had a maximum survivability routing path for rescue operations. The model could serve as an alternative in rescue operations in the mining sector. We look forward to assess a hybrid of this algorithm with other parameters in future.

Acknowledgments

The authors would like to appreciate the immense contribution of the mining companies where the study was undertaken. The authors are grateful to these individuals for their immeasurable contributions to this work: Fred Attakuma, Patrick Addai, Isaac Owusu Kwankye, Thomas Kwaw Annan, Willet Agongo, Nathaniel Quansah, Francis Owusu Mensah, Clement Owusu-Asamoah, Joseph Adu-Mensah, Shadrack Aidoo, Martin Anokye, F. T. Oduro, Ernest Ekow Abano, and E. Omari-Siaw. This work was supported by the National Natural Science Foundation of China (no. 71271103) and by the Six Talents Peak Foundation of Jiangsu Province.

References

  1. Editorial Team, “The 3rd issue of volume 12,” Editorial Team, the 3rd issue of volume 12, Disaster Prevention and Management, September 2012, http://www.emeraldinsight.com/products/journals/journals.htm?id=dpm.
  2. G. Hilson, C. J. Hilson, and S. Pardie, “Improving awareness of mercury pollution in small-scale gold mining communities: challenges and ways forward in rural Ghana,” Environmental Research, vol. 103, no. 2, pp. 275–287, 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Şalap, M. O. Karslioǧlu, and N. Demirel, “Development of a GIS-based monitoring and management system for underground coal mining safety,” International Journal of Coal Geology, vol. 80, no. 2, pp. 105–112, 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. N. Amegbey, C. Ampong, and S. Ndur, “Water Pollution from mining in Prestea, Ghana,” in Proceedings of the 3rd International Conference on Environmental Issues and Waste Management in Energy and Mineral Production, pp. 179–184, Western Australia, 1994.
  5. H. Kucuker, “Occupational fatalities among coal mine workers in Zonguldak, Turkey, 1994–2003,” Occupational Medicine, vol. 56, no. 2, pp. 144–146, 2006. View at Publisher · View at Google Scholar · View at Scopus
  6. J. H. Saleh and A. M. Cummings, “Safety in the mining industry and the unfinished legacy of mining accidents: safety levers and defense-in-depth for addressing mining hazards,” Safety Science, vol. 49, no. 6, pp. 764–777, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Mainardi, “Earnings and work accident risk: a panel data analysis on mining,” Resources Policy, vol. 30, no. 3, pp. 156–167, 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. C. M. Coetzee and C. J. van Staden, “Disclosure responses to mining accidents: South African evidence,” Accounting Forum, vol. 35, no. 4, pp. 232–246, 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. A. R. Silva and M. C. Vuran, “Development of a testbed for wireless underground sensor networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 620307, 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Gu and T. He, “Bounding communication delay in energy harvesting sensor networks,” in Proceedings of the 30th IEEE International Conference on Distributed Computing Systems (ICDCS '10), pp. 837–847, IEEE Computer Society, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. D. Wu, L. Bao, and R. Li, “A holistic approach to wireless sensor network routing in underground tunnel environments,” Computer Communications, vol. 33, no. 13, pp. 1566–1573, 2010. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Heidemann, W. Ye, J. Wills, A. Syed, and Y. Li, “Research challenges and applications for underwater sensor networking,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '06), pp. 228–235, April 2006. View at Scopus
  13. S. Vupputuri, K. K. Rachuri, and C. Siva Ram Murthy, “Using mobile data collectors to improve network lifetime of wireless sensor networks with reliability constraints,” Journal of Parallel and Distributed Computing, vol. 70, no. 7, pp. 767–778, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. N. Edalat, “Resource management and task allocation in energy harvesting sensor networks.,” in Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM '12), San Francisco, Calif, USA, 2012.
  15. D. Niyato, M. M. Rashid, and V. K. Bhargava, “Wireless sensor networks with energy harvesting technologies: a game-theoretic approach to optimal energy management,” IEEE Wireless Communications, vol. 14, no. 4, pp. 90–96, 2007. View at Publisher · View at Google Scholar · View at Scopus
  16. M. C. Vuran and I. F. Akyildiz, “Channel model and analysis for wireless underground sensor networks in soil medium,” Physical Communication, vol. 3, no. 4, pp. 245–254, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. N. Meratnia, B. J. van der Zwaag, H. W. van Dijk, D. J. A. Bijwaard, and P. J. M. Havinga, “Sensor networks in the low lands,” Sensors, vol. 10, no. 9, pp. 8504–8525, 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. S. L. Goh and D. P. Mandic, “An augmented CRTRL for complex-valued recurrent neural networks,” Neural Networks, vol. 20, no. 10, pp. 1061–1066, 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Li and F. Qin, “A dynamic neural network approach for solving nonlinear inequalities defined on a graph and its application to distributed, routing-free, range-free localization of WSNs,” Neurocomputing, vol. 117, pp. 72–80, 2013.
  20. S. Li, Z. Wang, and Y. Li, “Using laplacian eigenmap as heuristic information to solve nonlinear constraints defined on a graph and its application in distributed range-free localization of wireless sensor networks,” Neural Processing Letters, vol. 37, pp. 411–424, 2013.
  21. S. Li, B. Liu, B. Chen, and Y. Lou, “Neural network based mobile phone localization using Bluetooth connectivity,” Neural Computing and Applications, pp. 1–9, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. L. A. B. Munoz and J. J. V. Ramosy, “Similarity-based heterogeneous neural networks,” Engineering Letters, vol. 14, no. 2, EL-14-2-13, 2007, (Advance online publication: 16 May 2007).
  23. F. Fernández-Navarro, C. Hervás-Martínez, P. A. Gutiérrez, J. M. Peña-Barragán, and F. López-Granados, “Parameter estimation of q-Gaussian radial basis functions neural networks with a hybrid algorithm for binary classification,” Neurocomputing, vol. 75, pp. 123–134, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. K. Leblebicioglu and U. Halici, “Infinite dimensional radial basis function neural networks for nonlinear transformations on function spaces,” Nonlinear Analysis: Theory, Methods and Applications, vol. 30, no. 3, pp. 1649–1654, 1997. View at Scopus
  25. F. Fernández-Navarro, C. Hervás-Martínez, J. Sanchez-Monedero, and P. A. Gutiérrez, “MELM-GRBF: a modified version of the extreme learning machine for generalized radial basis function neural networks,” Neurocomputing, vol. 74, no. 16, pp. 2502–2510, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. S. Li, S. Chen, B. Liu, Y. Li, and Y. Liang, “Decentralized kinematic control of a class of collaborative redundant manipulators via recurrent neural networks,” Neurocomputing, vol. 91, pp. 1–10, 2012. View at Publisher · View at Google Scholar · View at Scopus
  27. S. Li, H. Cui, Y. Li, B. Liu, and Y. Lou, “Decentralized control of collaborative redundant manipulators with partial command coverage via locally connected recurrent neural networks,” Neural Computing and Application, 2012. View at Publisher · View at Google Scholar
  28. A.-L. Barabási, R. Albert, and H. Jeong, “Mean-field theory for scale-free random networks,” Physica A, vol. 272, no. 1, pp. 173–187, 1999. View at Publisher · View at Google Scholar · View at Scopus
  29. S.-H. Yook, H. Jeong, and A.-L. Barabási, “Modeling the internet's large-scale topology,” Proceedings of the National Academy of Sciences of the United States of America, vol. 99, no. 21, pp. 13382–13386, 2002. View at Publisher · View at Google Scholar · View at Scopus
  30. K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc Networks, vol. 3, no. 3, pp. 325–349, 2005. View at Publisher · View at Google Scholar · View at Scopus
  31. S. Zarifzadeh, A. Nayyeri, and N. Yazdani, “Efficient construction of network topology to conserve energy in wireless ad hoc networks,” Computer Communications, vol. 31, no. 1, pp. 160–173, 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. Q. Ling, Y. Fu, and Z. Tian, “Localized sensor management for multi-target tracking in wireless sensor networks,” Information Fusion, vol. 12, no. 3, pp. 194–201, 2011. View at Publisher · View at Google Scholar · View at Scopus
  33. Y. Chen, C.-N. Chuah, and Q. Zhao, “Network configuration for optimal utilization efficiency of wireless sensor networks,” Ad Hoc Networks, vol. 6, no. 1, pp. 92–107, 2008. View at Publisher · View at Google Scholar · View at Scopus
  34. R. Riaz, A. Naureen, A. Akram, A. H. Akbar, K.-H. Kim, and H. Farooq Ahmed, “A unified security framework with three key management schemes for wireless sensor networks,” Computer Communications, vol. 31, no. 18, pp. 4269–4280, 2008. View at Publisher · View at Google Scholar · View at Scopus
  35. X. Feng, Z. Xiao, and X. Cui, “Improved RSSI algorithm for wireless sensor networks in 3D,” Journal of Computational Information Systems, vol. 7, no. 16, pp. 5866–5873, 2011. View at Scopus
  36. W.-S. Jang, W. M. Healy, and M. J. Skibniewski, “Wireless sensor networks as part of a web-based building environmental monitoring system,” Automation in Construction, vol. 17, no. 6, pp. 729–736, 2008. View at Publisher · View at Google Scholar · View at Scopus
  37. J. Peng and C. P. Y. Pan, “Particle swarm optimization RBF for gas emission prediction,” Journal of Safety Science and Technology, vol. 11, pp. 77–85, 2011.
  38. P. S. Sausen, M. A. Spohn, and A. Perkusich, “Broadcast routing in wireless sensor networks with dynamic power management and multi-coverage backbones,” Information Sciences, vol. 180, no. 5, pp. 653–663, 2010. View at Publisher · View at Google Scholar · View at Scopus
  39. T. M. Jamel and B. M. Khammas, “Implementation of a sigmoid activation function for neural network using FPGA,” in Proceedings of the 13th Scientific Conference of Al-Ma'moon University College, Baghdad, Iraq, 2012.
  40. P. S. Rajpal, K. S. Shishodia, and G. S. Sekhon, “An artificial neural network for modeling reliability, availability and maintainability of a repairable system,” Reliability Engineering and System Safety, vol. 91, no. 7, pp. 809–819, 2006. View at Publisher · View at Google Scholar · View at Scopus
  41. W. Duch and N. Jankowski, “Survey of neural transfer functions,” Neural Comping Surveys, vol. 2, pp. 163–212, 1999.
  42. H. H. Zhang, M. Genton, and P. Liu, “Compactly supported radial basis function kernels,” 2004.
  43. J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Proceedings of IEEE International Conference on Neural Networks, pp. 1942–1948, December 1995. View at Scopus
  44. R. C. Eberhart and Y. Shi, “Particle swarm optimization: developments, applications and resources,” in Proceedings of the Congress on Evolutionary Computation, vol. 1, pp. 81–86, May 2001. View at Scopus
  45. R. Malhotra and A. Negi, “Reliability modeling using particle swarm optimization,” International Journal of Systems Assurance Engineering and Management, 2013. View at Publisher · View at Google Scholar
  46. D. Gies and Y. Rahmat-Samii, “Particle swarm optimization for reconfigurable phase-differentiated array design,” Microwave and Optical Technology Letters, vol. 38, no. 3, pp. 168–175, 2003. View at Publisher · View at Google Scholar · View at Scopus
  47. J.-Y. Kim, H.-S. Lee, and J.-H. Park, “A modified particle swarm optimization for optimal power flow,” Journal of Electrical Engineering & Technology, vol. 2, no. 4, pp. 413–419, 2007.
  48. A. Alfi, “PSO with adaptive mutation and inertia weight and its application in parameter estimation of dynamic systems,” Acta Automatica Sinica, vol. 37, no. 5, pp. 541–549, 2011. View at Publisher · View at Google Scholar · View at Scopus
  49. M. I. P. Hidayat and B. Ariwahjoedi, “Model of neural networks with sigmoid and radial basis functions for velocity-field reconstruction in fluid-structure interaction problem,” Journal of Applied Sciences, vol. 11, no. 9, pp. 1587–1593, 2011. View at Publisher · View at Google Scholar · View at Scopus