Skip to main navigation menu Skip to main content Skip to site footer

POSSIBILITIES OF OPTIMAL ALGORITHMS FOR INTERNET OF THINGS NETWORK

Affiliation
Alfraganus University image/svg+xml
Alfraganus University image/svg+xml

Abstract

The article outlines the features of working with Internet of Things sensor networks as a monitoring infrastructure for continuous objects. It describes basic approaches to improve the accuracy and energy efficiency of these types of systems. A method for optimizing algorithms for determining the boundaries of continuous objects in the Internet of Things network is proposed. This approach is based on classifying regions around boundary nodes and subregions with low probability of events. The results show that optimization of the hungry algorithm can be used to activate a certain number of neighboring nodes in relevant sub-areas of the IoT network. Thus, this approach makes it possible to clarify the boundaries of objects using data from activated sensors of Internet of Things network nodes. In addition, the text builds a mathematical model that gives better object detection accuracy with less load on the hardware platform. If you need to correct plagiarism in this text, it is recommended to rephrase and rework the sentences, add your unique content and links to sources of information.

Keywords

Internet of Things, sensor networks, edge detection, greedy algorithms


References

  1. Kavitha B.C., Vallikannu R. IoT based intelligent industry monitoring system. In: 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), 2019. Рp. 63–65
  2. Diao J., Zhao D., Tang J., Cheng Z., Zhou Z., 2019. Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks. Security, Privacy, and Anonymity in Computation, Communication, and Storage Lecture Notes in Computer Science, 265 –278. doi: 10.1007/978-3-030-24900-7_22
  3. Xiong S., Ni Q., Wang X., Su Y. A connectivity enhancement scheme based on link transformation in IoT sensing networks. IEEE Internet Things J., 2017. 4(6), 2297–2308
  4. Yates D.J., Xu J., 2010. Sensor Field Resource Management for Sensor Network Data Mining. Intelligent Techniques for Warehousing and Mining Sensor Network Data, 280 – 304. doi: 10.4018/978-1-60566-328-9.CH013
  5. Wu Y., Rowe A., 2011. Logic-Based Programming for Wireless Sensor-Ac- tivator Networks, 2011 IEEE/ACM Second International Conference on Cyber-Phys- ical Systems. doi: 10.1109/ICCPS.2011.31
  6. Ahmadi H., Bouallegue R., 2015. Comparative study of learning-based lo- calization algorithms for Wireless Sensor Networks: Support Vector regression, Neu- ral Network and Naпve Bayes. 2015 International Wireless Communications and Mo- bile Computing Conference (IWCMC). doi: 10.1109/IWCMC.2015.7289314
  7. Qihua W., Ge G., Lijie C., Xufeng X., 2015. Scheduling strategy for Hidden Markov Model in wireless sensor network. 2015 34th Chinese Control Conference (CCC). doi: 10.1109/CHICCc.2015.7260879
  8. Ni J., Li Z., Xie S., Jia C., 2018. Toxic Gas Leak Monitoring Alarm System Based on Wireless Sensor Network. 2018 37th Chinese Control Conference (CCC). doi: 10.23919/CHICC.2018.8483568
  9. Chao C., Jiao S., Zhang S., Liu W., Feng L., Wang Y. TripImputor: realtime imputing taxi trip purpose leveraging multi-sourced urban data. IEEE Trans. Intell. Transp. Syst., 2018. 99, 1 –13
  10. Nguyen D., Phung P.H., 2017. A Reliable and Efficient Wireless Sensor Network System for Water Quality Monitoring. 2017 International Conference on In- telligent Environments (IE). doi: 10.1109/IE.2017.34. 28
  11. Shu L., Chen Y., Sun Z., Tong F., Mukherjee M. Detecting the dangerous area of toxic gases with wireless sensor networks. IEEE Trans. Emerg. Top. Com- put., 2017
  12. Lei F., Yao L., Zhao D., Duan Y. Energy-efficient abnormal nodes detection and handlings in wireless sensor networks. IEEE Access 5, 2017. 3393 –3409
  13. Diao J., Zhao D., Tang J., Cheng Z., Zhou Z., 2019. Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks. Security, Privacy, and Anonymity in Computation, Communication, and Storage Lecture Notes in Computer Science, 265 –278. doi: 10.1007/978-3-030-24900-7_22
  14. Heinzelman W.B., Chandrakasan A.P., Balakrishnan H. An application specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun., 2002. 1 (4), 660 –670
  15. https://cyberleninka.ru/article/n/algoritmy-klassifikatsii-obektov-setey-inter- neta-veschey-na-osnove-zhadnyh-algoritmov/viewer

Downloads

Download data is not yet available.

Similar Articles

You may also start an advanced similarity search for this article.