S&T | The Concept of Data Fusion in the Internet of Things

Data fusion in internet of things, it can reduce things networking traffic, reduce the energy consumption and enhance the accuracy of the results, optimize the perception that the network performance.

By Xiaotie Qina and Yuesheng Gub

S&T | The Concept of Data Fusion in the Internet of Things


The application prospect in the market with huge thing networking are buzzing the third wave of information technology, its one of the core technology on two wireless sensor networks with energy, storage capacity, computing power, communications bandwidth resource constraints of the salient characteristics of data fusion, implementation is the inevitable choice. This paper briefly describes the Internet of things in the characteristics of data acquisition and data fusion of things in the meaning and role of data fusion described things to be addressed key issues and requirements. Briefly describes the data fusion tree formation and fusion of the principles of TGA

Main text

Internet of things is connected with all kinds of wireless access network through the interface, and access the internet connected to objects, can achieve intelligent endowed with object communication and dialogue, also can realize the interaction between objects and object communication and dialogue. To the object have overall perception. To transfer data are reliable and intelligent processing ability of the information network by connecting object and the object[1].

In a Internet of Things, to perception nodes, nodes and gathering nodes and Between the control center, they not only need to communicate but also need do further treatment with the communication results. Therefore, data fusion is one of the most important technologies to internet of things. In internet of things, Using Radio frequency identification device, the global positioning system, laser scanner and all kinds of different devices, embedded software and hardware systems, and the modern network and wireless communication, distributed data processing, and many other technology. Collaboration is real-time monitoring, perception, collecting network distribution area of various environmental or monitoring object information. To realize things and material, including between people and objects of all kinds of interconnect. Combined with the Internet and formed a huge information network system. In the front of the networking of things, for example sensor network, in order to obtain accurate data, often need to deploy a lot of sensor nodes in monitoring area internal. In the sensor node monitoring range fold each other in order to enhance the whole network the accuracy of the information collected. Covered in high density areas, for the same object or event monitoring of adjacent nodes getting the report data, there will be a certain space correlation. As distance similar node the transmission has certain redundancy. If all nodes will be monitoring data sent to the focal point, it can cause the network bandwidth limited tremendous waste of resources. And large amounts of data transmission at the same time can also cause frequent conflict, reduce communication efficiency. In addition, data transmission when the main factors of node energy consumption, transmission of redundancy data will consume too much energy envoys from point, so as to shorten the life cycle of sensor network. Therefore, in a large sensor network, each node more data to jump transmission perception together before, need to node data fusion processing.

Author Artwork

In the process of information perception, make full use of local node of the computing power and storage capacity, for a lot of data or information processing, the combined from more effective and more in line with the needs of the user data process method. The study of data fusion technology in internet of things, in addition to the basic content of data fusion outside, need to focus on the choice of the points to fusion, fusion timing of data fusion and how to do data fusion. There is a close relationship between the choice of fusion node and the network layer routing protocol. Need to rely on a loop routing protocol data, and the use of some nodes routing structure as a data fusion node. Internet of things is just like the sensor network. It is a kind of jumped the organization network, perception area-based data aggregation node need cooperation. Especially in periodic monitoring applications, the need to consider it. Periodic perception node data. Adjacent rounds of data acquisition has some relevance, need information such as historical information to reduce the amount of data it. When determined the path of data aggregation and data fusion points after data fusion energy saving effect also and these data fusion nodes data fusion of waiting time before closely related. Need to know for how long, and what the data from node merge. Namely needs to determine the appropriate data fusion node data fusion opportunity.In a data fusion node, when and to what the received data fusion and forwarding, requires a combination of routing protocol to forward mechanism to consider. In data aggregation, need routing as far as possible to transfer some of the packet network nodes, and data fusion in these nodes. What kind of routing algorithm will directly affect the efficiency of data fusion. Data fusion is in order to adapt to a sensor network center for application in data from the fusion algorithm, the main focus on how to use local perception of processing power nodes, and then the data processing it, the focus is to reduce the data needs to be transmitted.

It needs to improve the efficiency of information from the perception in internet of things, and it will be based on data fusion triggered the connection. Considering the perception of the node will due to bad environmental factors or their energy exhausted and cause failure, so the case such as robustness and adaptability is to realize basic requirements for data fusion in internet of things.

In internet of things, because of perception of communication between the nodes may cause interference, and networking information perception may be no accuracy, so pay more attention to solving the related data ambiguity. In internet of things, network nodes energy Co., LTD, del and send and receive data node energy consumption far outweigh the computing and storage energy consumption. We need to consider the perception of the energy consumption and energy node balance, how to choose the right to study and solve the fusion processing nodes. Only to solve the technical index, we can acquire the correct and effective data.

Data fusion algorithm is the basic content of the fusion processing, it is many-dimensions nput data fusion in different level with different mathematical method, and it is the clustering processing method. At present, according to data fusion in the sensor network , the researches focus on the data fusion routing protocol both at home and abroad. Based on data fusion tree is to compare the routing protocols of the typical data fusion routing algorithms, it is the key to how to construct data fusion tree.

When a sensor nets, base station or collect data gathering node is through reverse multicast tree from the perception of the form of scattered data gathering up gradually nodes. When each perception node to sudden emergencies, monitoring data transmission path form a tree reverse multicast tree, the number is data fusion tree. We can structure data fusion center tree through the shortest path tree or recently source node algorithm. The shortest path tree from the base station or focal point to recent source node ACTS as the fusion center node. All the other perception node first put the data collected the minimal hop along the path to the node, then sent by the node will be merged data base station or gathering of hair to node. Once you have identified the fusion center node tree is determined, the integration of basic down. CNS algorithm is actually a fusion of priority data fusion tree structure algorithm, in the specific implementation we need to know which nodes from gathering node recently, and other source node to the node routing information. In the middle of the upper nodes are data fusion. When all source nodes of the shortest path are determined,fusion tree has the basic form. SPT data fusion algorithm and the number of points are random, it is actually a routing priority trees make a data fusion algorithm, and is easy to realize in the specific implementation, distributed can draw lessons from Ad Hoc network when routing protocol thought.

TGA (of aggregation) is a kind of data-centric fusion tree based on data fusion routing algorithms, mainly by inquires the distribution and data receiving of two stages. Inquires the distributing stages: gathering node send inquires the perception node, requested and complete data fusion tree structure, the gathering node to adjacent nodes through radio data fusion tree structure news to construct the assemble the node is the root of the trees, the tectonic news data fusion contained in the hierarchical information in tree node, have not joined the node to data fusion tree after receipt, tectonic information for constructing the level set the level value plus 1 news, and will construct news for father sent node set node. In data collection phase, along the collected data nodes father node direction sent to data fusion the roots of a tree node. Node to adjacent node radio while the tectonic news; Data receiving stages: each node of the data collected after fusion of the structure by sending gathering data fusion tree data fusion tree node, and in each of the father node must gather all the child nodes of data and fusion to data fusion trees along the fusion data sent to converge node. Meta can use database query language, complete the COUNT, MIN, MAX, from the AVERAGE wait for basic, data fusion operation. Meta's weakness is vulnerable to network topology structure dynamic changes and the influence of link failures should periodically, gathered node tree structure news radio data fusion to maintain data fusion trees, to adapt to changes in the network topology institutions. When the network topology structure, such news frequent change of transmission will consume too much energy, shorten the life cycle of sensor network.

Directional Diffusion (DD) : Diffusion-ship is a kind of typical data-centric based on data fusion algorithm fusion tree. The directional diffusion routing fusion algorithm data fusion including interest spread, interest gradient establish and data sent through three stages.

When gathering to collect data, nodes at first to broadcast the sensor node net Interest news (macro), interesting Message describes gathering node interested data types and data acquisition methods in receiving the information such as the Interest, the nodes, but also the news to the nearby nodes radio interesting Message. Node according to accept degrees aode interesting message establish interest gradient, contains the node used in interest gradient the next jump forward packets of information, the interest gradient node is according to the message sending node energy, communication ability, position adjustment factors. When interest diffusion process, each node will end according to interest gradient value choosing an "enhanced path" as data transmission path. When the node with interest to collect data, matching the data sent to enhance path next jump node. Accept nodes via caching mechanism to reduce data redundancy, when data accept node receiving data and preservation found in cached repetitive already forwarding data will not be forwarding, to reduce redundant data delivery.

Directional diffusion algorithm by functional features without the node way to getting the whole network flood topology information, only through the interaction with neighbors node can build and interest gradient and used for data forwarding enhancement path, improve the network resource utilization. But directional diffusion algorithm also need periodic updates data fusion tree, to adapt to the dynamic change of network topology.


In short, through data fusion in internet of things, it can reduce things networking traffic, reduce the energy consumption and enhance the accuracy of the results, optimize the perception that the network performance.  

About The Authors:

Xiaotie Qina - Library, Chongqing University of Science & Technology, Chongqing, 401331, China
Yuesheng Gub - Henan Institute of Science & Technology, Xinxiang, 453003China

Publication Details:

1877-7058 © 2011 Published by Elsevier Ltd, Open access under CC BY-NC-ND license, doi:10.1016/j.proeng.2011.08.567 / Download The Paper - LINK


[1]LiuHuaJun. Internet of things architecture research [J].journal of Chinese new communication, 2010 (5) „

[2]lee. Wireless sensor network theory, technology and implementation [M].beijing: national defense industry press, 2008 „

[3]YangWanHai. Multisensor data fusion theory and its application [M]. Southwest: xian university of electronic science and technology press, 2004 „

 [4][U.S.] Klein, Lawrence A. The multisensor data fusion theory and application [M]. DaiYaPing, etc. Beijing: Peking up, translation polytechnic university press, 2004 „

[5]ChenLinXing. Wireless sensor network technology and application [M].beijing: electronic industry press, 2009 „

[6]Hongbo, HuangStudying on internet of things based on fingerprint identification . ICCASM 2010 - 2010 International Conference on Computer Application and System Modeling, Proceedings, v 14, p V14628-V14630, 2010 „

[7]Huang, Yinghui .Descriptive models for Internet of things. Proceedings of 2010 International Conference on Intelligent Control and Information Processing, ICICIP 2010, n PART 2, p 483-486, 2010, „

[8]Song, Zhexuan.Semantic middleware for the internet of things. 2010 Internet of Things, IoT 2010, 2010, 2010 Internet of Things, IoT 2010 „

[9]Wu, Miao.Research on the architecture of Internet of Things. ICACTE 2010 - 2010 3rd International Conference on Advanced Computer Theory and Engineering, Proceedings, v 5, p V5484-V5487, 2010 „

[10]Atzori, Luigi.The Internet of Things: A survey. Computer Networks, v 54, n 15, p 2787-2805, October 2010 

-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,11,Accidents,22,Activism,1,Adani Group,6,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,113,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,83,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,71,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,57,Austria,1,Automation,13,Automotive,131,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,105,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1222,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,56,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Chemistry,1,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,585,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,26,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,45,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,17,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,116,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,3,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,2,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,4,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,Ebrahim Raisi,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,111,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,55,Education,67,EFTA,1,Egypt,27,Election Disinformation,1,Elections,46,Electric Vehicle,15,Electricity,7,Electronics,9,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,15,European Union,234,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1387,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,60,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,34,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,23,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,8,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,10,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,71,Ghana,3,Gibratar,1,Gig economy,1,Glaciology,1,Global Perception,1,Global Trade,97,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,Government Bond,1,GPS,1,Greater Asia,178,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,2,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,670,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,28,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,7,Indonesia,20,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,207,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,92,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,83,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,11,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,57,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,3,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Aviation,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1281,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Noble Prize,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,54,North Korea,59,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,5,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,384,Oil Gas,7,Oil Price,74,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,130,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,697,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,Preprint,1,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,13,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,8,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,7,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,50,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,318,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,400,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,21,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,48,South Asia,478,South China Sea,36,South East Asia,77,South Korea,63,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,34,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,656,Think Tank,317,Tibet,3,TikTok,2,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,20,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,26,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,84,United Nations,28,United States,767,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,33,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
IndraStra Global: S&T | The Concept of Data Fusion in the Internet of Things
S&T | The Concept of Data Fusion in the Internet of Things
Data fusion in internet of things, it can reduce things networking traffic, reduce the energy consumption and enhance the accuracy of the results, optimize the perception that the network performance.
IndraStra Global
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content