Internet of Things in Business Transformation

Здесь есть возможность читать онлайн «Internet of Things in Business Transformation» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Internet of Things in Business Transformation: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Internet of Things in Business Transformation»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The objective of this book is to teach what IoT is, how it works, and how it can be successfully utilized in business. This book helps to develop and implement a powerful IoT strategy for business transformation as well as project execution. Digital change, business creation/change and upgrades in the ways and manners in which we work, live, and engage with our clients and customers, are all enveloped by the Internet of Things which is now named “Industry 5.0” or “Industrial Internet of Things. The sheer number of IoT(a billion+), demonstrates the advent of an advanced business society led by sustainable robotics and business intelligence. This book will be an indispensable asset in helping businesses to understand the new technology and thrive.

Internet of Things in Business Transformation — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Internet of Things in Business Transformation», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

A Balanced Energy Consumption (BEC) protocol is designed by [4]. In this protocol the relay node is selected with cost function which is based on distance of node form sink. To distribute load uniformly each relay node is selected for a specific round. Nodes nearer to the sink can transmit data immediately to the sink, otherwise data is passed to closest relay node. A threshold value of residual energy is also fixed on meeting the threshold value node only send critical data to sink. A simulation study has shown the better performance in term of network lifetime. Another attempt to achieve better throughput in terms of energy-consumption is achieved in heterogeneous WBAN [5]. It also works on the same principal. Residual energy, data rate and distance from sink, is the basic selection criteria for selection of relay node. Key requirement of any WBAN is minimum delay and energy efficiency. To improve the clustering in WBAN a load balancing and position adaptive technique is proposed by [6]. For the selection of cluster head the author used probability distribution method. A centralized clustering method is proposed by [7] to optimize the consumption of energy in WBAN. The cluster tree based structure is designed for the formation of uniform clusters.

An adaptive routing protocol is deployed by the author in [8]. The channel/link information is used for the purpose of selection of best relay nods for reduction of energy consumption per bit. Sender node only sends the data to sink, by relies on nodes only when the link quality is up to the predefined level of threshold. Otherwise it transmits information to the sink, directly. Omar Smail et al. , proposed an energy efficient routing protocol for WBANs [9]. They use residual energy to increase network lifetime. This method used to select energy efficient stable links. In [10] a fuzzy adoptive routing protocol is proposed. It uses clustering mechanism for direct communication with sink node. In decision of forwarding it takes in account the criticality and location. Another routing protocol is proposed by [11] in which routing is managed by mobile-sink, it discovers the shortest route among numerous unequal clusters. This makes sure to avoid the energy hole problem in the network. Results have shown that this clustering technique performed well. A secure cluster base strategy for both inter-WBAN and intra-BAN is purposed by [12]. For intra-WBAN they used to generate a pairwise (PV) key. The best thing about PV is the keys generation on both sending and receiving end is the same. In the result of the highly dynamic nature of the human body, generated PV is time-variant. In inter-BAN communication, clusters are formed on the bases of two parameters (residual energy and distance). The node which has more energy is more likely to form clusters, in the same way, the node that is more closer to the RBS will have a high probability of becoming the cluster head. Some other authors also used genetic algorithms in WBAN [13–16]. A concept of a virtual cluster is given by [17], they form clusters only among intra-BAN nodes. Although nodes in intra-BAN are fairly close to each other, but due to energy limitation in sensors nodes, this technique gave remarkable results.

3.3 Clustering Technique

By creation of the long-lasting clusters, frequent path search is reduced. We are considering the scenario where multiple WBANs are present. Instead of having a connection of each WBAN with RBS, we considered some of the WBANs are not in the range of RBS. Each WBAN consist of one Personal Server (PS) and multiple sensor nodes. The sensor nodes pass their collected data to the PS and this PS is responsible for further transmission. In our purposed technique PS of different WBANs form clusters. Each cluster contains a cluster head and cluster members (CM) in its vicinity. CH is a selected PS of a WBAN within the WBANs of a cluster. Now all other WBANs will be connected to the CH, multiple CHs of different WBANs can have hop-to-hop communication, and this way data is passed to the nearest AP.

Our communication can be classified into following hierarchal groups.

Sensor node to PS

PS(CM) to CH

CH to RBS

Figure 3.2is describing the actual working of the clustering technique. WBANs of cluster “A” and its CH are not in the range of RBS. But cluster “B” is in the vicinity of RBS, so cluster “B” is capable of communication with RBS. In this case, cluster “A” required the help of cluster “B”. Members of cluster “A” have a direct link with A’s cluster head, further CH-A can establish a connection with CH-B. It is a simple mechanism of clusters communication.

Figure 32 InterWBAN clustering 331 Evolutionary Algorithms For cluster - фото 21

Figure 3.2 Inter-WBAN clustering.

3.3.1 Evolutionary Algorithms

For cluster formation in our purpose methodology we are using Evolutionary algorithms. These nature inspired algorithms form multiple solutions the most efficient and the optimized solution is selected among all solutions. For NP-hard problem there is no known polynomial algorithm so time for finding solution grows exponentially with the size of problem. For solving these problems, we define the desired criterion where our algorithm should terminate. Our defined problem (Clustering in inter-WBAN) is also an NP-hard, as we need to find optimum clusters with multiple nodes and multiple parameters. Most real word problems may have to achieve multi-objective, these objectives may be different in nature. Multi-objectives problems required simultaneous optimization. Each objective is achieved with its specific objective function. These objective functions are measured in different units, and usually, they are conflicting and competing. Suppose we want to buy a railway ticket with low cost and less time to reach the destination. It is a fact that with cheap ticket, railway service will be compromised, and will stop on every station and cost more time. On the other hand, an expansive ticket train may cost less time to reach the destination. Multi-objective functions with conflicting objectives raise the set of optimal solutions, as no single solution can be considered to be best, with respect to all objectives. These solutions can be classified on as dominated and no-dominated sets Figure 3.3.

Figure 33 Flow chart of proposed scheme a Fitness Calculation Evolutionary - фото 22

Figure 3.3 Flow chart of proposed scheme.

a) Fitness Calculation

Evolutionary algorithms are used to find a different solution. Every solution generally signified as a string of binary numbers (Chromosome). To come up with the best solution it is required to test all these solutions. For this purpose, we need to identify the score of each solution to find how closely it meets the overall specified desired result. This score is generated by the application of fitness function.

b) Local Best/Global Best

We calculate two values local best and global best, the local best value of everyone, if the current value of velocity of an individual is better than older value, the local best value will be replaced with the new one, otherwise, remain the same. The same goes for the global best value. Global best value is the best value among all the solution sets till now.

3.4 Implementation Steps

Our algorithm consists of two parts. The first part is network creation part, where we specify the basic parameters. Our network is a grid of 1 km × 1 km in size. We specified the transmission ranges from 2, 4, 6, 8, 10 and alternatively we run it with number of nodes from 50, 100, 200, 250, and 300. Network creation part randomly deploys the nodes on the grid. Once the network is created, Evolutionary algorithms start to find optimum clusters. In our experimentation, we used three algorithms,

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Internet of Things in Business Transformation»

Представляем Вашему вниманию похожие книги на «Internet of Things in Business Transformation» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Internet of Things in Business Transformation»

Обсуждение, отзывы о книге «Internet of Things in Business Transformation» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x