Abstract
In the pervasive e-business applications covering large geographical areas and involving many RFID readers or sensors, broker deployment strategies have a direct effect on the deployment cost and collaboration efficiency. By analyzing the deployment cost and collaboration basis, this paper proposes a model for the broker deployment problem, and presents two heuristic algorithms for the multi-object optimization of broker deployment, where one is for the deployment area which contains the zones forbidden to place brokers in, and the other is for the deployment area without any forbidden zone. Experiments are conducted to demonstrate the effectiveness of the proposed algorithms. The experimental results also show the deployment algorithms have the advantage of being low cost of deployment. Moreover, the brokers deployed carry relatively balanced loads and messages are forwarded from an event source to a broker over a small number of hops.
Similar content being viewed by others
References
Kakousis K, Paspallis N, Papadopoulos G (2010) A survey of software adaptation in mobile and ubiquitous computing. Enterp Inf Syst 4(4):355–389
Kumar S, Kadow B, Lamkin M. Challenges with the introduction of radio-frequency identification systems into a manufacturer’s supply chain-a pilot study. Enterp Inf Syst. First published on: 20 January 2011 (iFirst) doi:10.1080/17517575.2010.536262
Zang C, Fan Y (2007) Complex event processing in enterprise information systems based on RFID. Enterp Inf Syst 1(1):3–23
Hsu C, Wallace W (2007) An industrial network flow information integration model for supply chain management and intelligent transportation. Enterp Inf Syst 1(3):327–351
Xu L (2011) Information architecture for supply chain quality management. Int J Prod Res 49(1):183–198
Wang L, Xu L, Liu R, Wang H (2010) An approach for moving object recognition based on BPR and CI. Inf Syst Front 12(2):141–148
Yuan R, Li Z, Guan X, Xu L (2010) An SVM-based machine learning method for accurate internet traffic classification. Inf Syst Front 12(2):149–156
Finkenzeller K (2003) RFID Handbook: fundamentals and applications in contactless smart cards and identification, 2nd edn. Wiley, Chichester, pp 326–328
ThingMagic Astra Integrated Reader. http://www.thingmagic.com/integrated-readers. Accessed 16 Jan 2010
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422
Li S, Wang X, Zhang D (2009) An adaptive distributed localisation in wireless sensor network. Enterp Inf Syst 3(2):117–132
Li S, Wang X, Zhang D (2008) Node localisation in wireless sensor network based on self-organising isometric embedding. Enterp Inf Syst 2(3):259–273
Russell SJ, Norvig P (2003) Artificial intelligence: a modern approach, 2nd edn. Prentice Hall, Upper Saddle River, pp 111–114
Okabe Ai, Boots B, Sugihara K, Chiu SN (2000) Spatial tessellations—concepts and applications of voronoi diagrams, 2nd edn. John Wiley, Chichester
Du D, Hwang F, Fortune S (1992) Voronoi diagrams and Delaunay triangulations. In: Euclidean geometry and computers
Hwang FK, Richards DS, Winter P (1992) The Steiner tree problem. In: Annals of discrete mathematics, vol 53. Elsevier, North-Holland
Hoareau D, Mahe′o Y (2008) Middleware support for the deployment of ubiquitous software components. In: Personal and ubiquitous computing, vol 12, Issue 2
Biagioni E, Sasaki G (2003) Wireless sensor placement for reliable and efficient data collection. In: the 36th annual hawaii international conference on system sciences
Zou Y, Chakrabarty K (2004) Sensor deployment and target localization in distributed sensor networks. In: ACM transactions on embedded computing systems, vol 3
Heo N, Varshney PK (2005) Energy-efficient deployment of Intelligent Mobile sensor networks. In: IEEE transactions on systems, man and cybernetics, vol 35, Issue 1
Clouqueur T, Phipatanasuphorn V, Ramanathan P, Saluja KK (2003) Sensor Deployment strategy for detection of targets traversing a region. In: Mobile networks and applications
Dijkstra E (1959). A note on two problems in connexion with graphs. In: Numerische Mathematik 1, pp. 269–271
Kruskal JB (1956) On the shortest spanning subtree of a graph and the traveling salesman problem. In: Proceedings of the american mathematical society, vol 7, No. 1, pp 48–50
Chew P: Voronoi Diagram/Delaunay Trigangulation. http://www.cs.cornell.edu/home/chew/Delaunay.html. Accessed 16 Jan 2010
Warme D, Winter P, Zachariasen M (2003) GeoSteiner: software for computing steiner trees. http://www.diku.dk/hjemmesider/ansatte/martinz/geosteiner/. Accessed 16 Jan 2010
Acknowledgments
This work was supported by the National Natural Science Foundation of China under Grant No. 60970027 and the National Hi-Tech Research and Development 863 Program of China under Grant No. 2008AA04A105.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Qian, Y., Jin, B. & Fang, W. Heuristic algorithms for effective broker deployment. Inf Technol Manag 12, 55–66 (2011). https://doi.org/10.1007/s10799-011-0095-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10799-011-0095-4