4.6 Article

Energy-Efficient Composite Event Detection in Wireless Sensor Networks

期刊

IEEE COMMUNICATIONS LETTERS
卷 22, 期 1, 页码 177-180

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/LCOMM.2017.2764458

关键词

Composite event detection; energy efficiency; WSN

资金

  1. National Natural Science Foundation of China [61502351]
  2. Luojia Young Scholar Funds of Wuhan University [1503/600400001]
  3. Chutian Scholars Program of Hubei, China

向作者/读者索取更多资源

Composite event detection is one of fundamental tasks for wireless sensor networks. In existing approaches, typically, a routing tree is used to enable information exchange among sensor nodes and collaborative detection of composite events. However, such a tree is not optimal in terms of energy efficiency, because the relations included in composite events have not been fully utilized. In this letter, we propose a new type of routing tree called event detection tree (EDT) to achieve energy-efficient composite event detection. EDT reduces the amount of data to be transmitted by aggregating data in to events, at the cost of an increased distance in the data transmission to achieve such aggregations. EDT achieves a tradeoff of them to minimize the overall energy consumption. Simulation results show that our approach outperforms existing approaches and yields energy savings of up to 20%.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Theory & Methods

A Survey on Wireless Device-free Human Sensing: Application Scenarios, Current Solutions, and Open Issues

Jiang Xiao, Huichuwu Li, Minrui Wu, Hai Jin, M. Jamal Deen, Jiannong Cao

Summary: This article introduces the latest research progress in wireless device-free human sensing (WDHS) technology, classifying the systems into different categories and discussing various sensing task types and motion granularity. The article also proposes a new research framework to summarize WDHS systems, and presents future research directions in terms of data collection, sensing methodology, performance evaluation, and application scenarios.

ACM COMPUTING SURVEYS (2023)

Article Computer Science, Information Systems

Personalized Federated Learning on Non-IID Data via Group-based Meta-learning

Lei Yang, Jiaming Huang, Wanyu Lin, Jiannong Cao

Summary: Personalized federated learning (PFL) provides personalized models that fit the local data distribution of each client. We propose a Group-based Federated Meta-Learning framework (G-FML) that adaptively divides clients into groups based on data distribution similarity to achieve personalized models. Experimental results show that our framework improves model accuracy by up to 13.15% compared to state-of-the-art federated meta-learning.

ACM TRANSACTIONS ON KNOWLEDGE DISCOVERY FROM DATA (2023)

Article Computer Science, Theory & Methods

Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions

Juncen Zhu, Jiannong Cao, Divya Saxena, Shan Jiang, Houda Ferradi

Summary: Federated learning is a privacy-preserving machine learning technique that trains models across multiple devices without exchanging local data samples. Existing centralized solutions have disadvantages, and blockchain has been identified as a potential solution. This work comprehensively surveys challenges, solutions, and future directions for blockchain-empowered federated learning.

ACM COMPUTING SURVEYS (2023)

Article Engineering, Electrical & Electronic

Consensus of Multiagent Systems With Intermittent Communication via Extended State Observer

Rongling Yu, Ping He, Heng Li, Jiannong Cao, Feiqi Deng

Summary: This article investigates the consensus problem of linear multi-agent systems (MASs) with unknown external disturbances under intermittent communication. Firstly, the distributed extended observer is utilized to observe the relative output information and unknown disturbance. Then, a distributed active disturbance rejection intermittent consensus protocol is proposed using the observer information. Finally, a simulation example is provided to demonstrate the effectiveness of the consensus protocol.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2023)

Article Computer Science, Hardware & Architecture

Revisiting ARM Debugging Features: Nailgun and its Defense

Zhenyu Ning, Chenxu Wang, Yinhua Chen, Fengwei Zhang, Jiannong Cao

Summary: Processors nowadays come with debugging features for program analysis, but the security of these features has been under-examined, especially with the introduction of a new debugging model by ARM. This article provides a comprehensive security analysis of ARM debugging features and discovers a new attacking surface that exists universally in platforms with ARM-A architecture. It also presents the Nailgun attack as an example, which exploits the debugging features to obtain sensitive information and execute arbitrary payloads. The article suggests potential mitigations and proposes a practical defense mechanism based on ARM virtualization technology.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2023)

Article Computer Science, Theory & Methods

Neighbor Graph Based Tensor Recovery For Accurate Internet Anomaly Detection

Xiaocan Li, Kun Xie, Xin Wang, Gaogang Xie, Kenli Li, Jiannong Cao, Dafang Zhang, Hongbo Jiang, Jigang Wen

Summary: This paper proposes a novel Graph-based Tensor Recovery model (Graph-TR) for accurate Internet anomaly detection. By incorporating non-linear proximity information using nearest neighbor graphs and graph Laplacian, the proposed approach outperforms state-of-the-art algorithms in terms of detection accuracy.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2023)

Article Computer Science, Theory & Methods

Tripartite Graph Aided Tensor Completion For Sparse Network Measurement

Xiaocan Li, Kun Xie, Xin Wang, Gaogang Xie, Kenli Li, Jiannong Cao, Dafang Zhang, Jigang Wen

Summary: This paper studies a novel sparse measurement scheduling problem in network management. By taking advantage of low-rank features and using tensor completion, the authors propose a scheme that can accurately obtain complete network-wide monitoring data with a low sampling ratio. Experimental results show that their approach outperforms other tensor completion algorithms in terms of sample efficiency.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Group Consensus of Second-Order Sample MASs via Distributed Event-Triggered Mechanism

Zengcheng Sun, Ping He, Heng Li, Jiannong Cao, Feiqi Deng

Summary: The group consensus of second-order sample multi-agent systems is investigated using a distributed event-triggered mechanism. A consensus protocol is proposed, which is updated only when the event-triggered condition is met and the update only depends on the data collected at the moment of triggering. The sufficient condition for group consensus is obtained, and a differential equation is constructed to avoid the Zeno phenomenon and obtain a minimum positive and lower bound for any two trigger time intervals. The effectiveness is verified through a simulation example.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS (2023)

Article Automation & Control Systems

EID-GAN: Generative Adversarial Nets for Extremely Imbalanced Data Augmentation

Wei Li, Jinlin Chen, Jiannong Cao, Chao Ma, Jia Wang, Xiaohui Cui, Ping Chen

Summary: In this article, a new augmentation model called EID-GANs is proposed to address the extremely imbalanced data augmentation problem. The model utilizes a new penalty function to guide the generator in learning the features of outliers and incorporates outlier detectors for evaluating the availability of generated instances. Experimental results demonstrate that EID-GAN outperforms existing augmentation models on different imbalanced datasets.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Engineering, Civil

High-Efficiency Blockchain-Based Supply Chain Traceability

Hanqing Wu, Shan Jiang, Jiannong Cao

Summary: Supply chain traceability requires transparency, authenticity, and high efficiency in product tracking. Blockchain has been widely adopted for transparency and authenticity, but the efficiency issue has been overlooked.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Computer Science, Hardware & Architecture

PDPChain: A Consortium Blockchain-Based Privacy Protection Scheme for Personal Data

Wei Liang, Yang Yang, Ce Yang, Yonghua Hu, Songyou Xie, Kuan-Ching Li, Jiannong Cao

Summary: The article introduces the personal data privacy protection scheme PDPChain based on consortium blockchain, which uses an improved Paillier homomorphic encryption mechanism and CP-ABE to achieve fine-grained access control, ensuring user privacy and security. Experimental results validate the effectiveness of the scheme in reducing encryption and decryption time.

IEEE TRANSACTIONS ON RELIABILITY (2023)

Article Computer Science, Artificial Intelligence

Time-Aware Dynamic Graph Embedding for Asynchronous Structural Evolution

Yu Yang, Hongzhi Yin, Jiannong Cao, Tong Chen, Quoc Viet Hung Nguyen, Xiaofang Zhou, Lei Chen

Summary: Dynamic graphs are graphs whose structure changes over time. Existing approaches only consider dynamic graphs as a sequence of changes in vertex connections, ignoring the asynchronous nature of the dynamics where the evolution of each local structure starts at different times and lasts for various durations. To address this, we propose a novel representation of dynamic graphs as temporal edge sequences associated with joining time of vertices (ToV) and timespan of edges (ToE). We also introduce a time-aware Transformer to embed the dynamic connections and ToEs into learned vertex representations, along with encoding time-sensitive information. Our approach outperforms the state-of-the-art in various graph mining tasks and is efficient for embedding large-scale dynamic graphs.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2023)

Article Computer Science, Information Systems

Reliable Dynamic Service Chain Scheduling in 5G Networks

Lei Yang, Junzhong Jia, Hongcai Lin, Jiannong Cao

Summary: This paper focuses on the problem of Service Function Chain (SFC) scheduling in the dynamic 5G network environment. It formulates the problem as a mixed integer non-linear programming and proposes a reinforcement learning method to increase the success rate of SFC requests.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Theory & Methods

Reaching agreement in the presence of contention-related crash failures

Anais Durand, Michel Raynal, Gadi Taubenfeld

Summary: This article presents a new restriction of the classical basic computational model for solving consensus in asynchronous distributed systems. It introduces the concept of lambda-constrained crashes and shows that consensus can be achieved by enriching the system with objects of consensus number x >= 1. The article also presents algorithms for solving consensus under different conditions and discusses the impossibility results for the number of lambda-constrained failures that can be tolerated.

THEORETICAL COMPUTER SCIENCE (2023)

Article Computer Science, Hardware & Architecture

Accelerating DNN Inference With Reliability Guarantee in Vehicular Edge Computing

Kai Liu, Chunhui Liu, Guozhi Yan, Victor C. S. Lee, Jiannong Cao

Summary: This paper explores the acceleration of Deep Neural Network (DNN) inference in Vehicular Edge Computing (VEC) while ensuring reliability. The authors analyze the need for balancing DNN inference acceleration and reliability in VEC and propose a cooperative partitioning and offloading (CPO) problem. They also introduce two approximation algorithms, SA(3) and FMtR, for maximizing inference reliability. Simulation results demonstrate the effectiveness of the proposed solutions.

IEEE-ACM TRANSACTIONS ON NETWORKING (2023)

暂无数据