• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Hao, Wang Rui, Sun Rongli, Xiao Kejiang, Cui Li. DSlT: An Evidence Reasoning Method for Information Fusion in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 972-982. DOI: 10.7544/issn1000-1239.2015.20131527
Citation: Chen Hao, Wang Rui, Sun Rongli, Xiao Kejiang, Cui Li. DSlT: An Evidence Reasoning Method for Information Fusion in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2015, 52(4): 972-982. DOI: 10.7544/issn1000-1239.2015.20131527

DSlT: An Evidence Reasoning Method for Information Fusion in Wireless Sensor Networks

More Information
  • Published Date: March 31, 2015
  • Information fusion in wireless sensor networks has recently been a focal point of research, meanwhile with many research challenges. The major challenges include the problem of high conflicting information fusion processing and the requirement for light-weight algorithms with low computational complexity. In the paper, an evidence reasoning method based on the logic expression, namely DSlT, is proposed. By definition of the new combination rule of evidence based on the logic operation and by strict reservation of local conflict, DSlT deals with high conflicting information fusion. By defining new focal elements, the combination amount of focal elements is lowered greatly. Accordingly, the computation cost is reduced dramatically. To verify the performance of DSlT, we conduct two experiments. The first example experiment shows that our approach can effectively deal with high conflicting information fusion. Additionally, compared with DSmT, the computation cost of DSlT is reduced by 81.08% in the process of 3-dimensional evidence fusion. In the real scene experiment, vehicle classification is the application background. The traffic information acquisition platform based on an image sensor network is used for collecting image data of vehicles. The comparison results further indicate the efficiency and advancement of DSlT. The experiments fully reveal the potential application prospect of DSlT in the research field of information fusion in wireless sensor networks.
  • Related Articles

    [1]Gan Chenquan, Fu Xiang, Feng Qingdong, Zhu Qingyi. A Lightweight Image-Text Sentiment Analysis Model Based on Public Emotion Feature Compression and Fusion[J]. Journal of Computer Research and Development, 2023, 60(5): 1099-1110. DOI: 10.7544/issn1000-1239.202111218
    [2]Liu Yifan, Xu Kun. A Survey on Many-Lights Rendering Methods[J]. Journal of Computer Research and Development, 2020, 57(1): 17-31. DOI: 10.7544/issn1000-1239.2020.20190208
    [3]Wang Yue, Fan Kai. Ultra-Lightweight RFID Electronic Ticket Authentication Scheme in IoT[J]. Journal of Computer Research and Development, 2018, 55(7): 1432-1439. DOI: 10.7544/issn1000-1239.2018.20180075
    [4]Li Xuejun, Xu Jia, Zhu Erzhou, Zhang Yiwen. A Novel Computation Method for Adaptive Inertia Weight of Task Scheduling Algorithm[J]. Journal of Computer Research and Development, 2016, 53(9): 1990-1999. DOI: 10.7544/issn1000-1239.2016.20151175
    [5]He Wangquan, Wei Di, Quan Jianxiao, Wu Wei, Qi Fengbin. Dynamic Task Scheduling Model and Fault-Tolerant via Queuing Theory[J]. Journal of Computer Research and Development, 2016, 53(6): 1271-1280. DOI: 10.7544/issn1000-1239.2016.20148445
    [6]Zheng Fang, Shen Li, Li Hongliang, Xie Xianghui. Lightweight Error Recovery Techniques of Many-Core Processor in High Performance Computing[J]. Journal of Computer Research and Development, 2015, 52(6): 1316-1328. DOI: 10.7544/issn1000-1239.2015.20150119
    [7]Xu Qingui, Qin Yong, Yang Taolan. Light-Weight Integrity Monitoring Based on Hashing Time Validity[J]. Journal of Computer Research and Development, 2015, 52(3): 702-717. DOI: 10.7544/issn1000-1239.2015.20131382
    [8]Jin Yongming, Wu Qiying, Shi Zhiqiang, Lu Xiang, Sun Limin. RFID Lightweight Authentication Protocol Based on PRF[J]. Journal of Computer Research and Development, 2014, 51(7): 1506-1514.
    [9]Tang Liangrui, Chen Yuanyuan, and Feng Sen. A Chain Routing Algorithm Based on Evidence Theory in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(7): 1362-1369.
    [10]Xu Shukui, Zhang Jun, Tu Dan, and Li Guohui. Inheritance, Subversion and Transcendence—Computational Photography[J]. Journal of Computer Research and Development, 2012, 49(1): 128-143.

Catalog

    Article views (1228) PDF downloads (627) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return