Heuristic algorithms for effective broker deployment

In the pervasive e-business applications covering large geographical areas and involving many RFID readers or sensors, broker deployment strategies have a direct effect on the deployment cost and collaboration efficiency. By analyzing the deployment cost and collaboration basis, this paper proposes a model for the broker deployment problem, and presents two heuristic algorithms for the multi-object optimization of broker deployment, where one is for the deployment area which contains the zones forbidden to place brokers in, and the other is for the deployment area without any forbidden zone. Experiments are conducted to demonstrate the effectiveness of the proposed algorithms. The experimental results also show the deployment algorithms have the advantage of being low cost of deployment. Moreover, the brokers deployed carry relatively balanced loads and messages are forwarded from an event source to a broker over a small number of hops.

[1]  Yushun Fan,et al.  Complex event processing in enterprise information systems based on RFID , 2007, Enterp. Inf. Syst..

[2]  Xiaohong Guan,et al.  An SVM-based machine learning method for accurate internet traffic classification , 2010, Inf. Syst. Frontiers.

[3]  Shancang Li,et al.  Node localisation in wireless sensor network based on self-organising isometric embedding , 2008, Enterp. Inf. Syst..

[4]  Steven Fortune,et al.  Voronoi Diagrams and Delaunay Triangulations , 2004, Handbook of Discrete and Computational Geometry, 2nd Ed..

[5]  Shancang Li,et al.  An adaptive distributed localisation in wireless sensor network , 2009, Enterp. Inf. Syst..

[6]  Cheng Hsu,et al.  An industrial network flow information integration model for supply chain management and intelligent transportation , 2007, Enterp. Inf. Syst..

[7]  Pramod K. Varshney,et al.  Energy-efficient deployment of Intelligent Mobile sensor networks , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[8]  Atsuyuki Okabe,et al.  Spatial Tessellations: Concepts and Applications of Voronoi Diagrams , 1992, Wiley Series in Probability and Mathematical Statistics.

[9]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[10]  Li Wang,et al.  An approach for moving object recognition based on BPR and CI , 2010, Inf. Syst. Frontiers.

[11]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[12]  Li D. Xu Information architecture for supply chain quality management , 2011 .

[13]  Parameswaran Ramanathan,et al.  Sensor Deployment Strategy for Detection of Targets Traversing a Region , 2003, Mob. Networks Appl..

[14]  Yves Mahéo,et al.  Middleware support for the deployment of ubiquitous software components , 2008, Personal and Ubiquitous Computing.

[15]  Krishnendu Chakrabarty,et al.  Sensor deployment and target localization in distributed sensor networks , 2004, TECS.

[16]  Galen H. Sasaki,et al.  Wireless sensor placement for reliable and efficient data collection , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[17]  J. Kruskal On the shortest spanning subtree of a graph and the traveling salesman problem , 1956 .

[18]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[19]  F. Hwang,et al.  The Steiner Tree Problem , 2012 .

[20]  George Angelos Papadopoulos,et al.  Please Scroll down for Article Enterprise Information Systems a Survey of Software Adaptation in Mobile and Ubiquitous Computing a Survey of Software Adaptation in Mobile and Ubiquitous Computing , 2022 .

[21]  Klaus Finkenzeller,et al.  Book Reviews: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, 2nd ed. , 2004, ACM Queue.

[22]  Sameer Kumar,et al.  Challenges with the introduction of radio-frequency identification systems into a manufacturer's supply chain – a pilot study , 2011, Enterp. Inf. Syst..