2021
DOI: 10.1109/jiot.2020.3022941
|View full text |Cite
|
Sign up to set email alerts
|

A Graph-Based Fault-Tolerant Approach to Modeling QoS for IoT-Based Surveillance Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…If there are too many clusters, each cluster is connected to a cluster head, which is one of the devices operating in the cluster. The failure of cluster nodes is traced, and the cluster is dynamically adjusted through weighted graphs as proposed by Thomas et al [17]. The dynamically adjusted graphs are then treated as a linear model, and then FTA is constructed.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…If there are too many clusters, each cluster is connected to a cluster head, which is one of the devices operating in the cluster. The failure of cluster nodes is traced, and the cluster is dynamically adjusted through weighted graphs as proposed by Thomas et al [17]. The dynamically adjusted graphs are then treated as a linear model, and then FTA is constructed.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…IV 1 is zero because all vertices included in SV are activated in the first iteration. Therefore, CG can be expressed as Equation (10). Finally, CG is Equation (11) because n(SV)•(CG 1 + CA 1 + CS 1 ) is CSP by Equation (7).…”
Section: Algorithm 1 Gas Vertex-programmentioning
confidence: 99%
“…These dynamic graphs are used to analyze changes in real time to create business value [6][7][8]. For example, the correlations between objects in the Internet of things (IoT) or disaster management are illustrated using dynamic graphs and analyzed in real time to detect and forecast disasters [9][10][11]. In a social network, an interaction change between items or users is modeled as a dynamic graph, and an event is detected or a recommendation service is provided [12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…An indispensable aspect of data provenance is the location at which the data is captured. In many situations, the IoT data is only meaningful if correctly associated with the three-dimensional (3D) locations of the origin of the data, especially in many public safety and security related IoT applications [6], [7]. One of these application scenarios is inside an airplane, where a large number of IoT sensors can be deployed to tag and track safety devices and equipment.…”
Section: Introductionmentioning
confidence: 99%