Skip to main content
Log in

Heuristic algorithms for effective broker deployment

  • Published:
Information Technology and Management Aims and scope Submit manuscript

Abstract

In the pervasive e-business applications covering large geographical areas and involving many RFID readers or sensors, broker deployment strategies have a direct effect on the deployment cost and collaboration efficiency. By analyzing the deployment cost and collaboration basis, this paper proposes a model for the broker deployment problem, and presents two heuristic algorithms for the multi-object optimization of broker deployment, where one is for the deployment area which contains the zones forbidden to place brokers in, and the other is for the deployment area without any forbidden zone. Experiments are conducted to demonstrate the effectiveness of the proposed algorithms. The experimental results also show the deployment algorithms have the advantage of being low cost of deployment. Moreover, the brokers deployed carry relatively balanced loads and messages are forwarded from an event source to a broker over a small number of hops.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Kakousis K, Paspallis N, Papadopoulos G (2010) A survey of software adaptation in mobile and ubiquitous computing. Enterp Inf Syst 4(4):355–389

    Article  Google Scholar 

  2. Kumar S, Kadow B, Lamkin M. Challenges with the introduction of radio-frequency identification systems into a manufacturer’s supply chain-a pilot study. Enterp Inf Syst. First published on: 20 January 2011 (iFirst) doi:10.1080/17517575.2010.536262

  3. Zang C, Fan Y (2007) Complex event processing in enterprise information systems based on RFID. Enterp Inf Syst 1(1):3–23

    Article  Google Scholar 

  4. Hsu C, Wallace W (2007) An industrial network flow information integration model for supply chain management and intelligent transportation. Enterp Inf Syst 1(3):327–351

    Article  Google Scholar 

  5. Xu L (2011) Information architecture for supply chain quality management. Int J Prod Res 49(1):183–198

    Article  Google Scholar 

  6. Wang L, Xu L, Liu R, Wang H (2010) An approach for moving object recognition based on BPR and CI. Inf Syst Front 12(2):141–148

    Article  Google Scholar 

  7. Yuan R, Li Z, Guan X, Xu L (2010) An SVM-based machine learning method for accurate internet traffic classification. Inf Syst Front 12(2):149–156

    Article  Google Scholar 

  8. Finkenzeller K (2003) RFID Handbook: fundamentals and applications in contactless smart cards and identification, 2nd edn. Wiley, Chichester, pp 326–328

    Google Scholar 

  9. ThingMagic Astra Integrated Reader. http://www.thingmagic.com/integrated-readers. Accessed 16 Jan 2010

  10. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422

    Article  Google Scholar 

  11. Li S, Wang X, Zhang D (2009) An adaptive distributed localisation in wireless sensor network. Enterp Inf Syst 3(2):117–132

    Article  Google Scholar 

  12. Li S, Wang X, Zhang D (2008) Node localisation in wireless sensor network based on self-organising isometric embedding. Enterp Inf Syst 2(3):259–273

    Article  Google Scholar 

  13. Russell SJ, Norvig P (2003) Artificial intelligence: a modern approach, 2nd edn. Prentice Hall, Upper Saddle River, pp 111–114

    Google Scholar 

  14. Okabe Ai, Boots B, Sugihara K, Chiu SN (2000) Spatial tessellations—concepts and applications of voronoi diagrams, 2nd edn. John Wiley, Chichester

    Google Scholar 

  15. Du D, Hwang F, Fortune S (1992) Voronoi diagrams and Delaunay triangulations. In: Euclidean geometry and computers

  16. Hwang FK, Richards DS, Winter P (1992) The Steiner tree problem. In: Annals of discrete mathematics, vol 53. Elsevier, North-Holland

  17. Hoareau D, Mahe′o Y (2008) Middleware support for the deployment of ubiquitous software components. In: Personal and ubiquitous computing, vol 12, Issue 2

  18. Biagioni E, Sasaki G (2003) Wireless sensor placement for reliable and efficient data collection. In: the 36th annual hawaii international conference on system sciences

  19. Zou Y, Chakrabarty K (2004) Sensor deployment and target localization in distributed sensor networks. In: ACM transactions on embedded computing systems, vol 3

  20. Heo N, Varshney PK (2005) Energy-efficient deployment of Intelligent Mobile sensor networks. In: IEEE transactions on systems, man and cybernetics, vol 35, Issue 1

  21. Clouqueur T, Phipatanasuphorn V, Ramanathan P, Saluja KK (2003) Sensor Deployment strategy for detection of targets traversing a region. In: Mobile networks and applications

  22. Dijkstra E (1959). A note on two problems in connexion with graphs. In: Numerische Mathematik 1, pp. 269–271

  23. Kruskal JB (1956) On the shortest spanning subtree of a graph and the traveling salesman problem. In: Proceedings of the american mathematical society, vol 7, No. 1, pp 48–50

  24. Chew P: Voronoi Diagram/Delaunay Trigangulation. http://www.cs.cornell.edu/home/chew/Delaunay.html. Accessed 16 Jan 2010

  25. Warme D, Winter P, Zachariasen M (2003) GeoSteiner: software for computing steiner trees. http://www.diku.dk/hjemmesider/ansatte/martinz/geosteiner/. Accessed 16 Jan 2010

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant No. 60970027 and the National Hi-Tech Research and Development 863 Program of China under Grant No. 2008AA04A105.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Beihong Jin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Qian, Y., Jin, B. & Fang, W. Heuristic algorithms for effective broker deployment. Inf Technol Manag 12, 55–66 (2011). https://doi.org/10.1007/s10799-011-0095-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10799-011-0095-4

Keywords

Navigation