Next Article in Journal
Occupational Risk Prevention through Smartwatches: Precision and Uncertainty Effects of the Built-In Accelerometer
Next Article in Special Issue
Low-Power Low-Cost Wireless Flood Sensor for Smart Home Systems
Previous Article in Journal
Application of Improved Singular Spectrum Decomposition Method for Composite Fault Diagnosis of Gear Boxes
Previous Article in Special Issue
Wireless Temperature Sensor Based on a Nematic Liquid Crystal Cell as Variable Capacitance
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

D2R-TED: Data—Domain Reduction Model for Threshold-Based Event Detection in Sensor Networks

Department of Electronics and Computer Engineering, Edificio Leonardo da Vinci, Campus de Rabanales, Universidad de Córdoba, 14071 Córdoba, Spain
*
Author to whom correspondence should be addressed.
Submission received: 17 September 2018 / Revised: 23 October 2018 / Accepted: 2 November 2018 / Published: 6 November 2018
(This article belongs to the Special Issue State-of-the-Art Sensors Technology in Spain 2018)

Abstract

:
The reduction of sensor network traffic has become a scientific challenge. Different compression techniques are applied for this purpose, offering general solutions which try to minimize the loss of information. Here, a new proposal for traffic reduction by redefining the domains of the sensor data is presented. A configurable data reduction model is proposed focused on periodic duty–cycled sensor networks with events triggered by threshold. The loss of information produced by the model is analyzed in this paper in the context of event detection, an unusual approach leading to a set of specific metrics that enable the evaluation of the model in terms of traffic savings, precision, and recall. Different model configurations are tested with two experimental cases, whose input data are extracted from an extensive set of real data. In particular, two new versions of Send–on–Delta (SoD) and Predictive Sampling (PS) have been designed and implemented in the proposed data–domain reduction for threshold–based event detection (D2R-TED) model. The obtained results illustrate the potential usefulness of analyzing different model configurations to obtain a cost–benefit curve, in terms of traffic savings and quality of the response. Experiments show an average reduction of 76 % of network packages with an error of less than 1%. In addition, experiments show that the methods designed under the proposed D2R–TED model outperform the original event–triggered SoD and PS methods by 10 % and 16 % of the traffic savings, respectively. This model is useful to avoid network bottlenecks by applying the optimal configuration in each situation.

1. Introduction

Wireless sensor networks (WSN) have been widely used for monitoring environments. Nowadays, WSN are immersed in an exponential growth in many sectors of society such as e-health, industry, agriculture, or smart–cities, among others. Therefore, the amount of deployed devices is huge and increasing each day. However, as more nodes are included, larger data flows are produced. Networks get collapsed as they are not able to handle such amount of information. Thus, network traffic must be reduced.
One of the most common approaches to reduce traffic is by compression. According to Razzaque et al. [1], compression drastically reduces the energy costs, with benefits even greater than linear, since the congestion at the link-level is largely reduced, and, therefore, the effect is wider. In addition, these authors describe the compression in WSN in three levels: Sampling Compression (SC), Data Compression (DC), and Communication Compression (CC). The first type, SC, reduces the amount of sensing (or sampling) while keeping the loss of precision within an acceptable margin. Another strategy, DC, is to transform input data to a new data stream with fewer bits. They are mainly based on the fact that most data streams have redundant values and, thus, more efficient representations can be used. Finally, CC focuses on reducing the amount of communication messages (either transmissions or receptions). This last type is able to provide the largest energy savings, as communications are the most energy-consuming elements in most distributed systems.
Recent works in the state-of-the-art show that there are many lossless compression techniques used in WSN. These techniques are mainly combined with Data Gathering (DG) [2,3,4]. The goal of DG is to efficiently collect all the generated data from multiple deployed sensors in an environment. All of the collected data are usually sent to a central node, commonly called head cluster, where data are reconstructed. As identical sensors are placed to capture identical physical variables, there is a possibility of large data redundancy and, therefore, large savings can be achieved if compression techniques are applied. In fact, Data Gathering is combined with Compressed Sensing (CS) [5,6] to produce Compressive Data Gathering (CDG) [7,8,9]. This hybrid scheme interconnects the well-established foundations of CS, based on the representation of a sparse dimensional signal according to fewer projections of the same signal, and DG to collect data efficiently. In order not to lose any data when reconstructing the original signal in the head cluster, the selected CS methods tend to be lossless.
The CS algorithms usually have large computational requirements. However, sensors and their hosting devices are highly constrained in terms of computational power, energy, and bandwidth, as shown in Ref. [10]. Therefore, further lightweight algorithms are included. In this sense, lossy compression methods have usually lower computational requirements. Nevertheless, a trade-off between precision, computing power, and the rest of the constraints must be taken into consideration in the selection of the compression technique.
However, WSNs are not only used to collect data, but to provide responses. These networks are called Wireless Sensor and Actuator Networks (WSAN) [11]. The responses to the actuators are generated automatically according to the system state and the information acquired by the sensors. In these cases, the sensed data can be compressed to reduce the amount of the data sent through the network, but the reconstructed data may not need such accuracy, as long as the obtained response is the same as the one that would be obtained with the original data prior to any compression. Thus, in these cases, lossy compression can be applied, with larger traffic reduction rates and very similar, or even equal, responses.

Specifying the Scope of Interest

This work considers that the data can be further compressed if it is contextualized, that is, it is known what the extracted data is used for. Therefore, in order to be able to take advantage of the compression methods, this work focuses on deployments where data is acquired and analyzed to provide responses based on the detection of evaluable conditions. Thus, this work is interested in duty cycle-based WSN for condition evaluations on the sensed data. This is quite a common scheme, for instance, WSAN deployments have this type of approach: Nodes that provide information on a given environment, some decisions are made based on all the data acquired and other internal/external variables, and a response is sent to an actuator. This actuator may be applied on the same environment or in other different ones.
In most WSN deployments, the data is sent periodically, in time-triggered schemes. However, there is the possibility of enhancing the transmission process by sending information only when a relevant fact occurs. These mechanisms are included within the event–triggered schemes. Currently, there is much interest in these types of schemes in several fields of interest, for instance, in industrial event–oriented control [12,13], cooperative control of environmental monitoring [14], tracking trajectories of vehicles and robots [15,16], rule-based control of Smart–Homes [17], etc. Currently, large advances have been obtained with diverse variations of the event–triggered schemes, for example, by dynamic adaptive delta mechanisms [18].
The events may provoke responses, which are Boolean in most cases. Therefore, it is possible to analyze the accuracy of the outputs both of the original uncompressed and the event–triggered compressed streams of data. However, the most commonly used metrics in WSN [19] are not suitable by themselves alone for the described task, as they do not take into consideration the accuracy of the outputs in the value domain. In this case, two items must be taken into account: level and transitions. Level is related with the actual Boolean response, while transition deals with the instant where a change in level takes place.
Here, the scenario at hand uses the information to obtain Boolean results. Assuming the applicability of a data compression strategy, the question on its application is how it would affect the result. The analysis of these circumstances from a contextualized perspective, i.e., taking into account the system output, is the main motivation of this work. For example, if a temperature sensor is used to activate a ventilation system when it exceeds a certain threshold, any reduction of the amount of information about the temperature signal can change the triggering pattern of the fans, but it can also reduce the amount of data required for system operation. Therefore, any temperature value that will not change the system state may be ignored because they are not relevant for the output in most cases. This reduction of data is translated into a cost–benefit ratio, which emerges from the contextualized perspective. How to model it is a fundamental motivation of this work.
This paper is structured as follows: Section 2 provides an overview of event detection, compression techniques, and some related work. Section 3 lays the foundation for our proposal. Here, the mathematics behind the data reduction is described. It also describes the metrics for evaluating the data reduction, contextualized to the detection of threshold-based events. Section 4 addresses two case studies to exemplify data reduction with a simple configuration. The reduction process is analyzed in terms of traffic savings and response quality according to the proposed metrics. Section 5 proposes a comparative study to demonstrate the benefits of the model. The properties of the model are used to adapt two known event-based sampling techniques and improve them in the context of the evaluation of Boolean conditions. Finally, some conclusions and future work are pointed out in Section 6.

2. Background

WSNs are typically used to collect data from the environment on an ongoing basis. The simplest design is to provide all nodes with a cyclical routine of activation, reading, sending, and deactivation. Over time, the uses of WSNs have multiplied, and the solutions are increasingly sophisticated, generating a large variety of networks according to different criteria [10].
This work focuses on the use of WSNs for detecting threshold-based events, aiming to provide an analytic way to model data compression techniques in that scope, by contextualizing the effects of the compressed data on the Boolean result.
Thus, this work is based on two fundamental concepts: event detection and data compression techniques in WSNs. The following subsections delve into both in order to establish a more comprehensive framework. A third subsection describes the scope of this work as the combination of both concepts, specifying the cases of use and clarifying the specific goal.

2.1. Event Detection in WSN

An event is an occurrence or a significant activity that is unusual in relation to normal patterns of behavior [20,21]. Applying the concept to a physical environment, the distributed nature of the sensors combined with their reduced cost and size makes WSNs ideal for monitoring environments in order to detect events.
In Ref. [22], the authors point out the challenges of this task in WSNs by organizing them into four groups: context dependency, application criticality, heterogeneity and overcrowding of data sources, and network topology. In addition, they classify the methods into three groups: statistical, probabilistic, and based on automatic learning techniques and artificial intelligence. According to these authors, the most widely used technique is the detection of events based on a static threshold. It consists of the systematic checking of the condition to know whether the parameter value is within known ranges.
Threshold-based event detection has been used since the earliest declarative systems, which processed Boolean entries known as “facts” [23]. However, the technological framework of the Internet of Things (IoT) has brought about the need to rethink the computation of these Boolean variables in systems where the computational load is distributed in restricted processing cores. On the other hand, it has also brought the possibility of detecting events which are difficult to evaluate with classic centralized systems, e.g., early warning systems for which multiple sensors are required [24] or hazardous environment [25].
Detecting events with WSNs is a problem that has multiple approaches. For example, in Ref. [26], they classify different proposals according to whether the notification decision of the event is made on a sink node or on the node itself. However, the authors of [27] take into consideration the network architecture, the scope of the decision, and the nature of the detection algorithm.
Within the framework of event detection, it is important to note the appearance of Complex Event Processing (CEP) in recent years. This discipline arises from the need to enrich the semantics of conditions in declarative systems, and introduces the concept of a temporal and orderly succession of simple events [28]. The author of [29] proposes various techniques for performing CEP techniques at WSN. As mentioned above, the threshold event detection technique is widely used, a clear example of which is the need for simple event calculation to assess complex events.
The development of concrete applications for the detection of events in WSN or IoT is becoming increasingly importance in recent years [27,30,31,32,33,34,35]. These systems optimize the data transmission related to events by setting filters under different criteria, obtaining large reductions of traffic. As tailor-made solutions, they are an excellent example of good use of the network. However, this type of proposal requires specific analysis of each environment and network deployment in order to establish the general measurement of benefits.

2.2. Aggregation and Compression Techniques in WSNs

As mentioned above, a key aspect of this work is to reduce the use of the network accordingly. Here, the most relevant scientific contributions in the field of traffic data reduction WSNs are summarized.
Razzaque et al. [1] provided a survey in which compression techniques were classified into three types: Sampling Compression (SC), Data Compression (DC), and Communication Compression (CC).
Many WSN devices are designed to provide data periodically. Moreover, redundant sensors are usually deployed in an environment. Devices may combine their own data with the data received from others, either providing a stream of modified data, or a value, as the result of a mathematical operation. This is called Data Aggregation (DA). This aggregation results in a reduction of the transmitted data. This strategy can be included within the DC type, as it modifies the data to reduce the amount of data in the network, although some kind of computation and processing is applied in–route on the data.

2.2.1. Communication Compression

An interesting taxonomy of congestion control techniques in WSNs is proposed in Ref. [36]. These techniques are based on the detection or prediction of network congestion conditions and the application of more or less generic strategies to control the situation. This type of proposal is closely linked to infrastructure, and offers routing solutions in most cases. While the purpose of this work is not to control congestion (but to reduce traffic by limiting the loss of response quality), some strategies end up implementing traffic reduction policies to control congestion [37,38,39,40].

2.2.2. Data Compression

Solutions to the congestion problem consider the network as a service for data exchange, so they have no control over the sending data. However, there are data reduction techniques that work more closely with information. The authors of Ref. [41] delve deeper into predictive techniques for data reduction in WSNs, classifying models according to the prediction method and the network element where it is applied. The prediction models that are generated in the cluster head nodes [42,43,44], where correlation analysis techniques are used to assess the importance of the data, are particularly noteworthy.
Ikjune et al. [45] proposed an aggregation and compression data method to use in a solar–powered WSN. In it, nodes aggregate data to obtain maximum compression. Data are compressed using a lossless scheme (LZW coding). If the node has more energy coming from its solar panels than it can store in its batteries, aggregated data are sent. Otherwise, it just stops sending data, and just senses its environment, storing the values in its internal memory. This method makes use of the DC type, along with the DA mechanism. However, data are not processed in-route. In addition, the CC is connected to their internal energy status, and not to the Quality of Service (QoS) of the network.

2.2.3. Sampling Compression

As a reference work, the sampling techniques exposed in Ref. [46], a work that is framed in the discipline of control based on events, is worth highlighting. This article discusses the Send–on–Delta [47] technique, which is intended as a fixed increase in the magnitude of a signal whose consecutive samples must be tested in order to be taken into account. In the model proposed in this work, a similar mechanism is proposed but mathematically posed from the domain of system inputs definition, and not subject to static magnitudes.
An important line of research for compressing data is applying PCA to WSN [42,48], in order to reduce the amount of data transferred. There are many sensors providing data that may be correlated. If a PCA is applied to the acquired data space, the dimensionality of the data can be reduced to only a few representative values. The main use for this mechanism is to get rid of several sensors providing similar readings that can be correlated.
Shu et al. [49] proposed DDASA to improve the power efficiency while ensuring the accuracy of the data and have recently stated that “Data reduction exploits the fact that depending on the characteristics of the sampled data within the environment, some data could be redundant”. However, that DDASA algorithm differs substantially from the work presented in this manuscript. In DDASA, the sampling frequency is dynamically and explicitly modified.

2.2.4. Event-Triggered Sampling

In recent years, non-periodic signal sampling techniques have been developed. These techniques propose an alternative approach to determine the sampling instant, instead of the strictly temporal one. For this purpose, strategies based on events intrinsic to the evolution of the data are introduced.
The Send-On-Delta concept (SoD) is the simplest strategy. By means of this scheme, the sampling instant occurs when the magnitude of the difference between the signal value and the previous sample exceeds a confidence interval called delta [47]. This simple concept opened the door to a vast field of research under different topic names, such as event based sampling, Lebesgue sampling, magnitude based sampling, etc. [50,51].
Within the framework of automatic control engineering, event-based sampling techniques are still being developed nowadays. With the mathematical complexity that this discipline requires in terms of stability and convergence of control systems, the sampling criteria have been sophisticated by means of predictive techniques. A simple example of this type of input is Ref. [52], in which a linear predictor is used to establish the sampling instant with the estimated sample, instead of the previous sample.
Considering a distributed scenario where signal samples are sent for processing, these techniques have been considered for traffic reduction, since they limit the amount of network packets tolerating a certain loss of information. An example of this approach is proposed in Ref. [18], where a technique able to select dynamically the limits (delta) according to the available transmission-rate is introduced.

2.3. Discussion and Hypothesis

Reducing traffic in sensor networks is a goal that has been addressed from many perspectives. The wide variety of sensor networks results in a broad range of traffic reduction possibilities. To give a few examples: if the network is multihop, the routing policy can contemplate traffic reduction; if the sensor information has some redundancy, traffic can be reduced by aggregating data with space-time criteria; if the network does not have real-time requirements, buffering techniques can be used to collect data on the route, reducing sent packets, etc. In each of these examples, the logic of data reduction is based on a system feature that offers an opportunity to save traffic. This feature is a limiting factor, a requirement. Any data reduction technique is limited by the requirements of its scope.
This work focuses on sensor networks with very specific restrictions. The most important are the topology, the hierarchy of nodes, the timing, and the specific purpose of the data collection. In this framework, there is no information redundancy, there is no multi-hop, and the sensors have very little computational capacity. This means that techniques based on aggregation and compression are not the most suitable for this purpose.
Among the techniques reviewed, event-based sampling ones are applicable to the proposed scenario. They require little computational capacity, and traffic is avoided at the source, thus topology and hierarchy are not a problem. However, event-based sampling approaches are clearly oriented to automatic control engineering, being addressed from the mathematical requirements of this discipline, which requires demonstrating stability, convergence, and other concepts exclusive to its paradigm. This approach is difficult to adapt to other application scenarios, such as many areas of computing where there are no control loops and the versatility of abstraction is fundamental.
A common feature of the revised techniques is that the network has a general purpose, since the context of the data is not considered. In the case of error-tolerant techniques, these are measured as the difference in magnitude between the original data and those obtained after the technique reduction process. This concept of error is intrinsic to the measurement of a real-world signal, and is also decontextualized from the purpose of the information.
Inspired by event-based sampling techniques, this paper proposes a different approach to traffic reduction in sensor networks applied to threshold-based event detection. On the one hand, event-based sampling techniques are reformulated as software filters applied after a regular periodic sampling process, rather than as alternative sampling processes. This means that it is considered a periodic sampling process in the sensors, and the applied techniques will decide sample by sample whether it is sent or not. This approach seems to be simpler and closer to actual sensor network deployments. On the other hand, as part of this reformulation, the necessary abstraction is introduced to adapt the techniques to any data structure, not only to real numbers. This feature makes traffic reduction adjustable to any application, providing versatility. Finally, it is proposed to contextualize the use of information in order to optimize traffic avoidance. As mentioned above, the focus of this work are those networks that evaluate threshold-based events. Based on this knowledge, the concept of error can be redefined according to this context, enabling the definition of traffic avoidance techniques that take into account the system result. As a working hypothesis, let us consider that this approach would provide better cost–benefit rates in terms of traffic savings and errors.
The above approaches are integrated into a general model that can be instantiated for any reduction technique according to its limitations. This model defines the reduction technique using a generic and adaptable mathematical procedure. The effects of this reduction are measured using proposed metrics to take the Boolean result into account. The generic reduction model and the mentioned metrics are detailed in the following section.

3. Method

The study scope is based on those wireless sensor networks which are used for the computation of Boolean conditions. Under the proposed approach, the data flow can be represented as a network structure organized in a tree. The root node performs the calculation of the condition by applying an equation whose inputs are provided by the rest of nodes, directly or indirectly, as shown in Figure 1.
Some simplifications will be considered for this study:
  • Condition evaluation is performed periodically with a t s duty cycle period.
  • Between two consecutive evaluation instants, the nodes will send an update of their variable only if it has changed.
  • All inputs share the same data domain, defined by Φ .
Note that the condition evaluation involves a domain change that takes place at the root node, from Φ n to B (Boolean domain). This fact contextualizes the use of the input data, and it will allow us to define specific metrics for the analysis of the results.
This section is organized into two subsections. The first one describes a generic mathematical definition for the reduction of input data, with the aim of reducing network traffic. The second one proposes metrics for evaluating the response obtained as a result of this reduction in terms of message savings, precision, and recall.

3.1. Data Reduction

One of the motivations of this work is to propose a solution which could be applicable to any system whose purpose and deployment fit in the above-described structure. For this reason, the reduction method is founded on the mathematical description of the domains of the data definition.
Consider the minimum network that fits into the structure described in Figure 1. A single root node called α β that evaluates a condition whose entries are provided by n nodes denoted by α i . The entire network can be modeled as a system with n inputs and an output in the following terms:
Definition 1.
Let Φ be the domain of the values of the system inputs, and let B be the Boolean domain {true, false}.
On that basis, the α β -node with n α -nodes as inputs can be described by a state function s : Φ n B Assuming that the α -nodes obtained their data samples at the same frequency f s = 1 / t s , the system results can be modelled during a time T by Equation (1):
s : Φ n B , φ M f · T × n Φ , b M f · T × 1 B b x = s φ x , 0 , φ x , 1 , φ x , n 1 ,
where M m × n D is a matrix of m rows and n columns of elements defined in D , and a x , y is the element at the row x and column y of a matrix a M m × n .
According to the simplification criteria outlined above, α -nodes only send data when information changes. Since the number of unsent packets due to repeated values is unknown, a maximum of n · f s · T network packets are sent in the T analysis period. Based on this approach, a mechanism to promote data repetition is proposed to introduce a reduction in network traffic.
Definition 2.
Focusing on this issue, R is introduced as the family of functions that, through a set of parameters defined by Δ, translate a set of j–values of Φ, Φ j , into a set of k–values of Φ , Φ k , j , k = 1 . As Φ tends to be a smaller set than Φ, these functions are called reduction functions in the rest of the paper:
R : Φ j × Δ Φ k Φ Φ .
Thus, giving a function r R and the domain of its parameters Δ r Δ , we obtain Φ r , the reduced input domain, as defined below:
r : Φ j × Δ r Φ r k Φ r Φ .
Furthermore, every δ r Δ r Δ generates a different vision of the Φ domain, as described by Equation (3). Figure 2 represents conceptually the reduction of Φ by an r R function and its Δ r parameters:
r : Φ j × δ r Φ r δ k Φ r δ Φ r Φ .
If an injective r function and a set of parameters Δ r are properly selected, in such a way that the resulting domains have different number of elements, a reduction process is obtained by ordering them by descending cardinality (shown in Figure 2). In this process, different elements of any domain correspond to a single element of the next one.
For the sake of simplicity, but without loss of generality, for the rest of the article, it will be assumed that j = k = 1 for the input domains, that is, only one input value is considered in the reduction functions. On this basis, given a sequence of values defined in Φ r δ i with no consecutively coincident values, it is possible that the same signal translated to Φ r δ i + 1 may present repetitions, especially if the sequence corresponds to a continuous signal and Φ r δ i elements are combined in Φ r δ i + 1 by proximity. At the same time, reducing the cardinality of the signal domain implies a loss of information that will provoke some alterations in data whose evaluation depends on this signal.
In order to show the general applicability of the proposed model and to help for a better understanding of this concept, the following example has been included. Let us consider the definition of Φ domain as triads of 1-byte-coded integers, representing the RGB color domain. In addition, consider a reduction function ( r ) that receives as a reduction parameter ( δ ) the number of bits to encode each integer of the triad.
Thus, for each δ < 8 , any result of r is within a new domain Φ δ Φ , Φ 8 = Φ being the original domain. Defining the set of possible reduction parameters in descending order ( Δ = 8 , 7 , 6 , 5 , 4 , 3 , 2 , 1 ) gives a scale of domains by cardinality as described in Figure 2.
The top of Figure 3 shows a representation of the reduced domains of the example for δ = 5 , δ = 3 , and δ = 1 , which are Φ 5 , Φ 3 , and Φ 1 , respectively. At the bottom of the figure, different versions of a X × Y matrix of colors are shown. That is an image, and each version is a representation of its pixels (colors) when they are defined in the corresponding domain. In the example described above, each value is a color, and this simplification has allowed the input domain to be represented in a figure. However, let us now consider the domain of X × Y matrix of values defined in Φ as input domain ( Φ : M X × Y Φ ) and the same reduction function and parameters applied to all pixels of the matrix. In this case, a time-ordered sequence of periodic values defined in Φ is a video, frame by frame. Coming back to the problem of reducing network traffic, it seems reasonable to assume that, if a remote camera implements this reduction procedure without sending duplicate frames, δ parameter will influence the consecutive equivalent frames statistics and, by extension, the network traffic. The question is how big its effect is, and the answer depends largely on what the camera is recording. The variability between consecutive frames will be much lower if the camera monitors a mall at night than if it records a bike ride from the helmet of the cyclist.
The rise of duplicates by reducing the domain cardinality and subsequent result alterations are phenomena with underlying probabilistic logic. However, the analysis would be too complex, since it would have to take into account different aspects, such as signal characteristics, the sequence of domains generated by r and Δ r , and all the calculations in which the signal is involved. If the possible reduction of all system signals is taken into account, it is analytically unaffordable. For this reason, this proposal bases the evaluation of the model on empirically obtained metrics detailed in the following subsection.

3.2. Metrics

The application of the data reduction method will have two consequences. First, the number of network packets will be reduced due to the promotion of duplicate values in the data streams in the α -nodes. Second, the evaluation of the condition in the α β -node will suffer alterations due to the loss of information. At this point, analytic methods to quantify both effects will be proposed.

3.2.1. Traffic Reduction Metrics

To obtain the amount of traffic avoided, a ratio between the number of variations present in the sample sequences at the α -nodes applying the reduction with respect to the number of variations that present the same sequences without reduction is proposed. The proposed metric is called Traffic Saving Ratio (TSR) and is defined as follows.
Definition 3.
Let φ M m × n ( Φ ) be a matrix of m rows and n columns of values defined in Φ, φ x , y being the element of the row x and the column y, and m = T × f s . Let us also define r R as the domain reduction function, and δ Δ r the selected reduction parameters. In addition, let be φ M m × n ( Φ r δ ) / φ x , y = r ( φ x , y , δ ) . The Traffic Saving Ratio (namely, TSR ) can be defined as the proportion of repetitions of values that appear using the reduced domain. The calculation procedure is stated in Equation (5). Equation (4) is required for TSR calculation, and it is a key part of the data reduction model, since it implements the equivalence criterion of two values defined in the Φ domain. As described in the previous section, this criterion is applied to consecutive values to avoid sending packets in case of equivalence. Note that modifying this equation allows the model to be extended, for example, to fuzzy logic:
eq φ 1 , φ 2 = 0 , i f   φ 1 = φ 2 , 1 , i f   φ 1 φ 2 ,
TSR = 1 i = 1 m 2 1 + j = 0 n 1 eq ( φ i 1 , j , φ i , j ) i = 1 m 2 1 + j = 0 n 1 eq ( φ i 1 , j , φ i , j ) .

3.2.2. Result Evaluation Metrics

To measure the effects on the result, it is interesting to briefly discuss the concept of error in this context. According to the condition Equation (1), the variables are values defined in Φ , and the result is a Boolean value. The error of Boolean values is not quantifiable in terms of magnitude or distance because there are only two possibilities: true or false. In this sense, in each sampling turn, the accuracy of the result can only be measured in terms of correct or incorrect. According to this logic, it is possible to calculate a simple statistic of the number of erroneous results obtained over a period of time. Definition 4 is based on this concept, which can be considered a starting point for the computation of the system precision.
Definition 4.
Based on Definition 3, let us define s : Φ n B as the condition function implemented in α β . In addition, let b , b B m / b x = s φ x , 0 , φ x , 1 , , φ x , n , b x = s φ x , 0 , φ x , 1 , , φ x , n be the system response using the original and the reduced input domain, respectively. Precision (namely, P ) can be defined as the proportion of condition results that, when evaluated with input data defined in the reduced domain, match those obtained when using the original domain. Equation (6) details the calculation:
P = 1 i = 0 m 1 b i b i m .
Although this metric is mathematically rigorous, the sample-by-sample evaluated precision is appropriate only if the input data are statistically independent in a sample-by-sample basis. Therefore, each sample is completely independent from the previous one and from the following one. In the scenarios of interest for this research, the input data are samples of continuous signals. Thus, input values correlate with their predecessors, in the same way that the resulting Boolean signal presents transitions between stable levels. In addition, if the reduction method is chosen appropriately, an input value reinterpreted in a reduced domain involves a limited variation from the original one. These facts make it reasonable to consider that most of the errors of the result signal will occur around the transitions, delaying them or bringing them forward in time. To illustrate this, Figure 4 represents on the left side a continuous signal ( F x ) and the result of an inequation applied to it ( F x > Threshold ). The same signal, but with its samples transferred to a reduced domain, is displayed on the right side. Below, the result of the same inequation for the reduced signal, highlighting the different samples with respect to the result obtained with the original signal is shown. As it can be observed, the differences are grouped around the transitions. This effect has such an important impact that it should be measured.
Based on this idea, the concept of error can be discussed in each application scenario. If the detection of the condition has no real-time requirements, a certain delay in transitions may be tolerable, not being considered an error. For example, returning to the example of the remote camera, if the condition is whether an image recognition algorithm detects a face or not, it may be acceptable for the detection to occur a few frames before or after. To give another example, a network for home automation control that measures the outside temperature to close windows or activate air conditioning can tolerate a delay of some sampling periods to perform the corresponding action.
Here, three metrics that consider this aspect are proposed. These metrics allow for a more descriptive analysis of the consequences of reducing traffic with the proposed method, including a variable, τ , that models the tolerable delay in each scenario. On the one hand, two of the metrics analyze the correspondence between the transitions of the original and the reduced signal. As transitions may appear on one of the signals without matching on the other, this can be analyzed in terms of precision (proportion of obtained transitions that are present in the original signal) and recall (proportion of transitions of the original signal that are obtained). On the other hand, a third metric analyzes the correspondence between signals outside the proximity of transitions, sample by sample.
These three metrics are called Transition Precision, Transition Recall, and Level Precision. For the sake of a better understanding of these, Figure 5 represents how the proposed metrics are calculated. For the computation of the transition metrics, the signal value changes are parsed one by one. This process is done with the original signal to obtain the Transition Recall, and with the reduced signal to obtain the Transition Precision. For each transition, it is checked whether there is an equivalent change in the other signal. By means of the parameter τ , a window of ± τ sampling periods is established, within which the equivalent transition will be considered as valid. In Figure 5A,B, this analysis is represented for τ = 0 (the most restrictive case) and for τ = 1 , respectively. All other signal samples that are not transitions and are not within any ± τ interval are taken into account in Level Precision metric. This metric evaluates the occurrence of situations such as those illustrated in Figure 5C, where the reduced signal presents erroneous states over time. To exemplify the importance of this metric, consider that two signals without transitions but with opposite values would present 100% transition precision and recall, but 0% level precision.
With regard to the interpretation of the metrics, if a training signal is properly selected, they can be interpreted as probabilities. Thus, the Transition precision is the probability that a transition obtained in the reduced signal would have been obtained without reducing it; the Transition recall is the probability that the transitions of the original signal will be detected in the reduced one; and Level Precision is the probability that the status of the reduced signal is correct after τ samples since the last transition. The level accuracy has a very interesting interpretation when this is maximum (100%). When this happens, it means that there are no errors outside the ± τ transition intervals, which means that the possible erroneous states of the reduced signal will not cover more than 2 τ + 1 samples. To understand this, note the upper right side of the illustration (Figure 5C). As it can be seen, with τ = 1 , a possible transition to an erroneous state that is not detected in the Level Precision, could not cover more than three samples, since a fourth erroneous sample would lay outside the ± τ intervals, and would be computed as an erroneous sample.
The three metrics calculations are detailed in Definitions 5 and 6.
Definition 5.
Based on Definition 4, let b T , b F , b T , and b F be the resulting signals of applying Equations (7) and (8) to b and b , respectively. These signals are transition masks to true and false and are used for the following metrics:
b B m b T B m b T i = b i i f   i = 0 , b i b i 1 · b i i f   i > 0 ,
b B m b F B m b F i = | b i 1 | i f   i = 0 , b i b i 1 · b i i f   i > 0 .
Definition 6.
According to Definition 5, τ N being the time offset tolerance margin in number of samples, let us define the Transition Precision (TP) as the proportion of error-free transitions in relation to the total number of reported transitions; the Transition Recall (TR) as the proportion of reported transitions in relation to the total number of transitions to be reported; and the Level Precision (LP) as the proportion of error-free samples measured outside ± τ interval of any transition. The calculation procedures are stated in Equations (9)–(11):
T P = 1 i = 0 m 1 b F i · b F i m i n j = i τ i + τ + 1 b F j , 1 + b T i · b T i m i n j = i τ i + τ + 1 b T j , 1 i = 0 m 1 b F i + b T i ,
T R = 1 i = 0 m 1 b F i · b F i m i n j = i τ i + τ + 1 b F j , 1 + b T i · b T i m i n j = i τ i + τ + 1 b T j , 1 i = 0 m 1 b F i + b T i ,
L P = 1 i = 0 m 1 b i b i · m i n j = i τ i + τ + 1 b T j + b F j + b T j + b F j , 1 1 i = 0 m 1 m i n j = i τ i + τ + 1 b T j + b F j + b T j + b F j , 1 1 .
As it can be seen, to characterize a system with these metrics, the non–reduced result is required. This implies the need for training data. The effectiveness of the method will depend on how well these data represent the overall behavior of the system.
Regarding the quality of the training data, it is reasonable to assume that the most favorable scenario is the evaluation of conditions based on periodic pattern parameters. For example, parameters related to biological activities influenced by circadian cycles, or meteorological parameters that depend on natural periods. However, since the circumstances that lead to traffic avoidance are not necessarily permanent, we suggest that the entire time of the unrestricted traffic network may be used to fine-tune the metrics to obtain the most reliable model possible.

4. Case Study

This section includes two experimental scenarios in which the model is applied and analyzed. Through these use cases, two objectives are intended. First, to exemplify the application of the model over actual and extensive data. Secondly, to test the potential use of the technique to reduce the traffic of a network in a saturation situation, knowing what proportion of traffic will be avoided and how many errors will be introduced into the system.
For these purposes, the data signals from the public repository of the Italian meteorological network Arpa Piemonte [53] are used. This repository contains nine years of hourly data from several stations, and has been considered adequate due to the abundance of quality data.
Each use case presents an experimental scenario consisting of a conditional expression involving signals from the repository. Each signal represents a network sensor, and each signal sample represents a sent data packet. The details of the reduction according to the model requirements are described for each scenario. In order to analyze the potential on–demand application of the model (the second objetive), the signals from the repository are split into two periods. The first period corresponds to the first year of data and is considered as a training period. It is assumed that during this period the data reduction process is modeled according to the results obtained. The remaining eight years are considered the test period. During this period, it is assumed that the network suffers saturation conditions, and the data reduction is applied according to the results of the training period. The comparison of the proposed metrics obtained in each of these periods constitutes an analysis of the repetitiveness of the model and, therefore, of its potential use on demand to reduce traffic knowing the consequences, which is the working hypothesis of these experiments.
First of all, let us briefly summarize the proposal to contextualize the study cases: the starting point is a network of sensors whose data is collected by a central node that evaluates a Boolean condition (called s function in this work). The model defines a procedure for reducing network packets by promoting repeated values, which are not sent. The starting point is an input data domain ( Φ ), which, using a reduction function (r) and a set of parameters ( Δ r ), gives rise to a domain scale Φ r (one for each δ r Δ r parameter) with different cardinalities. Using a set of ordered values defined in Φ , the reinterpretation of this information in any Φ r δ ( Φ r ) domain has two consequences: the promotion of duplicate values and the loss of information. Metrics have been proposed to model these effects.
According to the above, the model introduces some generalities that must be defined for each scenario: (1) input data domain Φ , (2) condition expression s, (3) sensor data for training and testing, (4) reduction function r, and (5) set of parameters for the reduction function Δ . These aspects are specified for each case study, which are detailed in the following subsections.

4.1. Case Study I

For this experimental environment, the model has been adapted for a condition tree involving two temperature sensors ((1) Φ = R ) and the sink node. The sink node periodically collects the information and checks whether one temperature is higher than the other ((2) s ( φ 1 , φ 2 ) = φ 1 > φ 2 ). The model metrics are calculated for two segments of these signals. The first segment is the first year of data, and corresponds to the time window considered for training. This training period is used to characterize the cost–benefit ratio in terms of traffic savings and errors introduced by the reduction technique in its different configurations. The second segment includes the remaining eight years, and its results are used to analyse the repeatability of the results obtained in the training period. Results of both periods are compared to discuss the hypothesis. The reduction function truncates the values to a multiple of a parameter, which is the temperature resolution ((4) r φ , δ r = Integer φ δ r · δ r ). The set of possible resolutions ( Δ ) is 0.1 , 0.25 , 0.5 , 1.0 , 2.5 , 0.1 being the original resolution (non-reduced case) (5). This scale is typical for oscilloscopes and measuring instruments. Regarding the sensor data, from the repository mentioned above, the temperature data from the Alessandria and Montaldo Scarampi stations were used. The selection criterion corresponds to the proportion of true and false in the results of the evaluation of the previously stated condition. Specifically, both signals are composed of 78,840 samples; the signal resulting from the condition, sample by sample, presents 7625 transitions; and the true and false balance is 53%/47%, respectively. For each δ Δ r , the values of the metrics given in Section 3.2 have been calculated for both training and experimental data.
The results are presented in a table for each metric. By columns, δ Δ r parameters from δ = 0.25 because δ = 0.1 models the original system state, with no reduction, in which case TSR = 0, LP = 1, TP = 1, and TR = 1. The last two rows show the absolute and relative error for each δ value ( ϵ and ϵ r ). In the case of LP, TP and TR, these errors are averaged ( ϵ ¯ and ϵ r ¯ ) and represented with standard deviation ( σ ). In addition, each τ value results in a row, and the last two columns represent the absolute and relative error averaged by each τ , with standard deviation as well. The cells in the body of the tables show two values separated by a slash (/): on the left, the result of the calculation with the training data, and on the right of the slash, the results applied to the experimental data (not including the data used for training). Relative errors are calculated considering the value obtained with the training data as the actual value.
Table 1 shows the traffic saving ratio metric (TSR), which has been calculated according to Equation (5). Table 2 shows the level precision, according to Equation (11). Table 3 shows the transition precision, according to Equation (9). Finally, Table 4 shows the transition recall, according to Equation (10). The last three metrics have been calculated with an offset tolerance interval ( τ ) from 0 to 9. The results are discussed below.
In general, the metrics calculated for the training data fit well with the calculations made for the experimental data. Absolute errors do not present a proportionality relationship with the parameters δ and τ , except for LP metric (Table 2), whose error increases as δ increases too. The largest errors in magnitude are presented by transition precision metric (TP, in Table 3), reaching 0.033 in the worst case. In addition, the greatest relative error is experienced by traffic saving ratio metric (TSR, Table 1), reaching 7.46% in the worst case scenario. As the magnitude of the current value (0.201 in the worst case) is close to 0, the relative error is high. Absolute errors in TSR are also reduced. It seems reasonable to conclude that the training data faithfully represent the experimental data, taking into account the magnitude of errors and that the training data consists of one year of data against eight years of experimentation.
As it was expected, the larger the δ , the larger the traffic saving (TSR, Table 1). Transition precision (TP) and recall (TR) metrics can be interpreted as a probability, since they are obtained from the casuistry of the training data. With this perspective, transition precision is the probability that a transition obtained with reduced input data according to δ would have been detected with non-reduced data with a time offset of no more than ± τ samples. In turn, transition recall is the probability that a transition that would have been detected with non-reduced data will be detected with reduced data according to δ with a time offset of no more than ± τ samples. It is interesting to note the significant increase in precision and recall experienced when comparing an absolutely rigorous approach, without tolerating delays ( τ = 0 ), to a more flexible approach tolerating delays ( τ > 0 ). The most pronounced increase occurred in the change from τ = 0 to τ = 1 , which suggests that a large part of the transitions that are not instantly detected are detected indeed with a temporal delay of one sampling period. This aspect confirms the grouping of errors around transitions, an effect that is illustrated in Figure 4.
Since it is a demonstrator, the numerical data does not deserve further attention. However, the potential of this proposal lies in the interpretation that can be made of its results. At this point, let us exemplify what the model provides to reduce network traffic. Suppose that the network in which this condition is implemented is overloaded for some reason, and it is urgent to reduce its traffic load by 15%. Also assume that the application tolerates a time delay of three sampling periods ( τ = 3 ). An operator or algorithm that controls the model will have the following information (involved values are marked in bold in the tables):
  • Table 1 reveals that δ = 0.5 will reduce traffic by 20.1%.
  • According to Table 3, each transition notified will have a 90.6% chance of being correct.
  • Likewise, according to Table 4 and under the same conditions, 94.7% of the transitions that would have been detected without reduction will be detected.
  • Table 2 reveals that 100% of the samples outside transitions ± τ sampling periods will be correct. This means that there are no erroneous values that remain more than seven samples over time ( 2 τ + 1 ).
These interpretations are based on the values obtained from the training data. Assuming that the reduction is carried out with these parameters during the whole period of experimentation, the following would have been achieved:
  • Reduced network traffic by 18.6% (1.5% lower than expected).
  • 91.2% of the transitions detected were correct (0.6% higher than expected).
  • 96% of the transitions that would have been detected without reduction were detected (1.3% higher than expected).
  • As it was expected, there were no erroneous values that remain more than seven samples over time.

4.2. Case Study II

This case study is based on a network of four sensors, two temperature sensors, and two wind speed sensors. Each pair of temperature and speed sensors is used to calculate wind chill (according to the classic Steadman formula [54]) and to compare them. It is intended to enrich the previous demonstrator with a more complex application example. The parameters of the model are as follows:
  • Input domain: Φ = R .
  • Condition state function: s ( t 1 , v 1 , t 2 , v 2 ) = ( 1.41 1.162 · v 1 + 0.98 · t 1 + 0.0124 · v 1 2 + 0.0185 · v 1 · t 1 ) ) > ( 1.41 1.162 · v 2 + 0.98 · t 2 + 0.0124 · v 2 2 + 0.0185 · v 2 · t 2 ) ) . This is the classic Steadman formula.
  • Input data: all data has been extracted from the repository of the Italian weather network Arpa Piemonte [53], used in the previous case study. Data from sensors t 1 and v 1 are extracted from the weather station located in Cameri. The data for t 2 and v 2 correspond to the station located in Boves. The training data correspond to the first year of data, the experimental data are the rest. These four signals are composed of 78840 samples; the signal resulting from the condition, sample by sample, presents 14015 transitions; and the true and false balance is 58%/42%, respectively.
  • Reduction function: r φ , δ r = Integer φ δ r · δ r .
  • Reduction parameters: Δ r = 0.1 , 0.25 , 0.5 , 1.0 .
From the results obtained, the traffic saving ratio metric (TSR) is represented in Table 5, similar to the previous study. Level precision (LP), transition precision (TP), and transition recall (TR) metrics are shown in graphs, presented in this order from left to right in Figure 6. The graphs show the τ –dependence of the metrics for each δ Δ (differentiated by color) with training and experimental data (differentiated by line type).
The results show that the training data fits well with the behavior of the system. The graphics offer a visual perspective that reveals the horizontal asymptotic shape of all curves, in the form y = 1 A · e B · x . This fact demonstrates from another perspective the grouping of errors around transitions.

5. Comparative Test

In order to adjust the reduction models according to the context in real time, the proposed method enables a scale of reduction configurations. Specifically, this work focuses on the context of Boolean expression evaluation. In this framework, the error according to system output is measured by specific metrics defined in Section 3.2.
This case study addresses a comparative analysis to understand the potential of contextualization. To this end, two known event-driven sampling techniques have been defined according to the model specifications. Then, for each of these techniques, an adaptive version has also been defined for comparison with the original. Adaptive versions use the reduction parameter scale provided by the model to conveniently optimize data reduction based on context. The following subsections detail the aspects of the experimental scenario.

5.1. Increasing Linear Threshold ‘K’

In this case study, temperature signals from the repository of the Italian weather network Arpa Piemonte [53] have been loaded to evaluate the expression T i [ n ] > K i [ n ] where i identifies each station. K i is a linear expression generated for each station according to Algorithm 1, ranging from the minimum to the maximum value of the signal, to eliminate possible biases in experimentation. Figure 7 represents the temperature signal corresponding to the Oropa station and the linear threshold K generated for it.
Algorithm 1: K i Generation Method
Sensors 18 03806 i001

5.2. Send–on–Delta and Predictive Sampling

In recent years, non-periodic sampling methods have been developed. These approaches are not based on a regular period of time to report a new sample, but on an event intrinsic to the signal itself. This concept has received different names: event based sampling, Lebesgue sampling, magnitude based sampling, etc.
Send-on-Delta (SoD) [47] is the simplest well known approach. Using the SoD concept, a continuous-time bandlimited signal x(t) is sampled and a new report is sent, when the value of the physical variable being sensed deviates from the value included in the most recent report by an interval of confidence ± Δ . Many other proposals are extended versions of this one, introducing estimation strategies to enrich this event condition detection. Predictive Sampling (PS) [52] was proposed as a simple example of this case, in which a linear predictor is used to trigger sampling if the value of the measured variable deviates from the estimated value by ± Δ .
Most event-based sampling techniques can be easily adapted to the definition of the proposed model if they are understood as filters. That is, it must be assumed that there is an internal process of periodic sampling in the sensors, after which the corresponding technique is applied to decide whether the samples are sent or not. For this scenario, two techniques have been adapted to the model: (a) SoD, and (b) Extended SoD with a linear predictor, which is called Predictive Sampling (PS). The prediction is carried out by linear regression by least squares of the N last samples. This method does not require much computing power, which enables its implementation in small sensors. Algorithms 2 and 3 correspond to the reduction functions for SoD and PS, respectively.
Algorithm 2: SoD Reduction Function
Sensors 18 03806 i002
Algorithm 3: PS Reduction Function
Sensors 18 03806 i003

5.3. Adaptive Versions of SoD and PS

According to Equations (2) and (3), giving a reduction function r R , Δ r is a set of reduction parameters, where each δ r Δ r generates Φ δ r data domain, with less cardinality than the original input domain, Φ . The definition of the Δ r set enables the implementation of a reduction scale change heuristic that opportunistically adapts to the context. Within this framework, a scale of reduction configurations and a simple method for its variation at runtime has been proposed in this subsection.
Previously, Algorithms 2 and 3 define the reduction function for the classic SoD and PS methods, respectively. These methods are evaluated in the sensors, which are in charge of filtering and sending the new samples of its signal. The reduction parameter change heuristic is a function located in the sink node, which is the node that uses the data for Boolean calculations and therefore provides context. This implies that each change in the reduction parameters implies a network packet sent from the sink node to the nodes. This traffic will be taken into account in the experiment, by adding the number of sink–to–sensor packets to the numerator of the Equation (5).
The adaptive versions of SoD (A-SoD) and PS (A-PS) implement the same reduction functions defined in Equations (2) and (3), respectively. Δ r is an ordered list of confidence intervals (different Δ values). The selection of parameter D is made according to Algorithm 4, which applies a distance criterion between the value of the signal and the threshold. In the algorithm, D is an ordered list of distances in magnitude corresponding to each δ r Δ r .
Algorithm 4: Reduction Parameter Change Heuristic
Sensors 18 03806 i004

5.4. Experiment Configuration and Results

The case study description leaves some parameters unspecified. In each of the techniques described (SoD, PS, A-SoD, and A-PS), the following remains to be determined:
  • SoD
    -
    Δ : Confidence interval in magnitude.
  • PS
    -
    Δ : Confidence interval in magnitude.
    -
    N: Number of previous samples for linear regression by least squares.
  • A-SoD
    -
    Δ r : Ordered list of confidence intervals δ r in magnitude.
    -
    D: Ordered list of distances between signal and threshold, each distance corresponding to a δ r Δ r parameter.
  • A-PS
    -
    Δ r : Ordered list of confidence intervals δ r in magnitude.
    -
    D: Ordered list of distances between signal and threshold, each distance corresponding to a δ r Δ r parameter.
    -
    N: Number of previous samples for linear regression by least squares.
Parameters Δ , N, Δ r , and D are established below, and applied indistinctly to the techniques that require them:
  • Δ = 0.5 ,
  • N = 5 ,
  • Δ r = 0.1 , 0.5 , 1.0 , 2.5 ,
  • D = 2 , 5 , 8 , 11 .
This configuration has been determined by trial and error with one year of data prior to the experiment. Parameter optimization requires in-depth analysis beyond the scope of this work. This case study aims to test the adaptability enabled by the proposed model. It is important to remark that the methods compared here are only examples of the use of the model, which is the main contribution of this work.
The results of the experiment can be seen in Figure 8, where there is a graph for each temperature signal of the repository, and one more with the average values of the metrics applied. Each graph shows the complementary values (for better visualization reasons) of traffic saving ratio TSR , TP , and TR (Equations (5), (9) and (10), respectively). These measurements represent the proportion of sent traffic ( 1 TSR ), and the proportion of erroneous transitions in terms of false positives ( 1 TP ) and false negatives ( 1 TR ). The level accuracy metric ( LP , Equation (11)) has not been represented because it has a value of 1 in all executions. This means that there are not extended periods of erroneous Boolean samples in either case. As can be observed, the graph of average results faithfully represents all specific cases. For this reason, the following observations are made on the average data of the experiment.
The average values of the experiment (central bar graph) reveal the results below. According to the proportion of traffic sent (1 − TSR), 31.5 % of network packets are sent by using SoD, while this amount is reduced to 20.5 % by using A-SoD, its adaptive version. The complementary values of this quantity ( 1 ( 1 TSR ) ) represent the TSR metric according to Equation (5), which expresses the proportion of traffic avoided. In this sense, the SoD technique achieves a Traffic Savings Ratio (TSR) of 68.5 % , while A-SoD achieves 79.5 % . That means an improvement of 16 % in this metric. In the case of comparing PS and A-PS in the same way, the TSR values obtained are 69 % and 76 % , respectively, which means an increase of 10 % with the adaptive version.
On the other hand, the values 1 − TP and 1 − TR in the graph represent a proportion of erroneous transitions. The first one (1 − TP) refers to false positives, i.e., transitions that occur but should not. The second (1 − TR) refers to false negatives, i.e., transitions that are expected to occur but do not. The complementary values ( 1 − (1 − TP) and 1 − (1 − TR) ) are the Transition Precision (TP, Equation (9)) and Transition Recall (TR, Equation (10)) metrics, respectively, and represent the proportion of successful transitions.
In terms of Transition Precision (TP), the comparison of SoD and A-SoD reveals an increase from 79.5 % to 95 % , respectively, an improvement of 19.5 % . In the case of comparing PS and A-PS, TP increases from 89 % to 99 % respectively, an improvement of 11 % . Finally, the Transition Recall (TR) obtained with SoD and A-SoD increases from 76 % to 94.5 % respectively, an improvement of 24 % . In addition, the TR metric obtained for PS and A-PS increases from 91.5 % to 99 % respectively, an improvement of 8 % .
It is important to emphasize the improvement achieved with the adaptability provided by the model. Especially noteworthy is the improvement in the proportions of erroneous transitions. In this aspect, using SoD, 20% of the detected transitions are erroneous, and 24% of the true transitions are not detected. With the adaptive version A-SoD, these proportions are reduced to 5%. Comparing PS and A-PS, these proportions go from 11% of erroneous detections and 8.5% of no detections, to less than 1% of both with A-PS, achieving an almost error-free system sending only 24% of the traffic.

6. Conclusions and Future Work

This paper proposes a data reduction model in sensor networks for a specific application: the evaluation of Boolean conditions. Within this framework, the proposal is based on two fundamental concepts, abstraction and contextualization.
Abstraction is achieved through a generic data filter definition to be implemented in the sensors, which avoids the limitation of working with real numbers. For this purpose, the proposed methodology works with data domains and reduction and equivalence functions to be defined.
Contextualization is addressed by specific metrics, which compare the original Boolean response of a system to the characteristics of the study, with the Boolean response of the system when input signals are reduced. From this comparison, relevant information about the quality of the response is extracted. From this comparison, three percentage measurements are extracted. These values describe different aspects related to the quality of the response, obtaining a more descriptive Boolean error concept.
Taking all this into account, the following hypothesis is put forward: by contextualising the use of data for Boolean calculations, more aggressive reduction techniques can be considered, achieving a more favourable cost–benefit ratio in terms of traffic savings and errors.
In order to test the proposal, two case studies and a comparative test have been carried out. For use cases, a simple quantization filter has been applied for the evaluation of a two-input condition. The input values have been taken, sample by sample, from signals of an extensive repository. Different quantizations were used to characterize the result of the system with a training data window, according to the proposed metrics. Finally, the same analysis was carried out for the rest of the data, comparing the results obtained. The result of both case studies reveals that the training window is valid for characterizing the system. This conclusion is demonstrated by the small variation in the measurements obtained with the rest of the data. These variations are in the range [0.3%, 3.1%] for TP (Table 3), [0.3%, 1.5%] for TR (Table 4), [0.3%, 1.5%] for TSR (Table 1), and [0%, 1.2%] for LP (Table 2). On the other hand, the proposed metrics provide a more accurate interpretation of the variation in system response. Specifically, the interpretation of τ reveals that erroneous samples of system response with reduced inputs tend to concentrate around transitions from the original response. In addition, the smallest τ that makes L P 0 limits the maximum period of consecutive erroneous samples, which is an important feature of the system behavior. Case study 2 shows that the system is capable of working effectively with complex mathematical expressions, which opens the door to future developments.
On the other hand, the comparative study uses the methodology to develop adaptive techniques that maximize the savings-error ratio. In order to test the feasibility of this concept, two known event-based sampling schemes (Send–on–Delta and Predictive Sampling) and their respective adaptive versions have been implemented using the data–domain reduction for threshold–based event detection (D2R–TED) model. Here, the signals from the repository have been compared sample by sample with an increasing linear threshold that spans the entire signal range. Adaptive versions apply a simple heuristic based on a threshold distance criterion to change the reduction parameters. Despite the simplicity of the adaptability method, the results (Figure 8) show that adaptive techniques implemented using a D2R–TED model improve approximately in a range between 10 % and 16 % the traffic savings obtained by the non-adaptive techniques. Moreover, the Transition Precision and Recall of the A-SoD and A-PS show larger improvements from the standard methods. For instance, for Transition Precision, A-SoD improves SoD approximately in a 19.5 % , and A-PS shows an improvement of 11 % with PS. In Transition Recall, the improvements are 24 % and 8 % , for A-SoD and A-PS, respectively. Furthermore, the A-PS is able to reduce the errors almost to 0 by sending approximately 23 % of network packets.
As a general conclusion, the model and the proposed metrics provide an efficient framework for the definition of data filters in sensor networks where the sink node calculates Boolean conditions. The abstraction provided by D2R–TED enables scenarios where information packages are modeled as data structures, providing the versatility inherent to computer science. The reduction and equivalence functions (Equations (3) and (4), respectively) can be redefined to establish convenient criteria in each case, opening the door to future research in areas such as vision, classification, tracking, fuzzy logic, etc. In particular, smart camera deployments can take advantage of the D2R–TED model, following a similar approach to the example shown in Figure 3.

Author Contributions

F.L.-G. conceived the idea, developed the algorithm, carried out the experiments, and wrote the manuscript. J.M.P. participated in the conceptualization and formal analysis of the proposal and the discussion of the experimental results, and collaborated in the writing of the manuscript. J.O. participated in discussions, collaborated in the writing of the manuscript, and supervised the work.

Funding

This research was partly funded by the Spanish Government grant number DPI2013-47347-C2-2-R and Advanced Informatics Research Group TIC–252.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Razzaque, M.A.; Bleakley, C.; Dobson, S. Compression in wireless sensor networks. ACM Trans. Sens. Netw. 2013, 10, 1–44. [Google Scholar] [CrossRef] [Green Version]
  2. Li, Z.; Liu, Y.; Ma, M.; Liu, A.; Zhang, X.; Luo, G. MSDG: A novel green data gathering scheme for wireless sensor networks. Comput. Netw. 2018, 142, 223–239. [Google Scholar] [CrossRef]
  3. Luo, W.; Gu, B.; Lin, G. Communication scheduling in data gathering networks of heterogeneous sensors with data compression: Algorithms and empirical experiments. Eur. J. Oper. Res. 2018, 271, 462–473. [Google Scholar] [CrossRef]
  4. Luo, W.; Xu, Y.; Gu, B.; Tong, W.; Goebel, R.; Lin, G. Algorithms for Communication Scheduling in Data Gathering Network with Data Compression. Algorithmica 2018, 80, 3158–3176. [Google Scholar] [CrossRef]
  5. Donoho, D. Compressed sensing. IEEE Trans. Inf. Theory 2006, 52, 1289–1306. [Google Scholar] [CrossRef]
  6. Baraniuk, R.; Candes, E.; Nowak, R.; Vetterli, M. Compressive Sampling [From the Guest Editors]. IEEE Signal Process. Mag. 2008, 25, 12–13. [Google Scholar] [CrossRef] [Green Version]
  7. Kulshrestha, J.; Mishra, M.K. Energy balanced data gathering approaches in wireless sensor networks using mixed-hop communication. Computing 2018, 100, 1033–1058. [Google Scholar] [CrossRef]
  8. Zhang, P.; Wang, J.; Guo, K. Compressive sensing and random walk based data collection in wireless sensor networks. Comput. Commun. 2018, 129, 43–53. [Google Scholar] [CrossRef]
  9. Zhang, C.; Li, O.; Liu, G.; Li, M.; Zhang, C.; Li, O.; Liu, G.; Li, M. A Practical Data-Gathering Algorithm for Lossy Wireless Sensor Networks Employing Distributed Data Storage and Compressive Sensing. Sensors 2018, 18, 3221. [Google Scholar] [CrossRef] [PubMed]
  10. Mottola, L. Programming Wireless Sensor Networks: Fundamental Concepts and State of the Art. ACM Comput. Surv. 2011, 5, 1–51. [Google Scholar] [CrossRef] [Green Version]
  11. Blanco, J.; García, A.; Morenas, J.; Blanco, J.; García, A.; de las Morenas, J. Design and Implementation of a Wireless Sensor and Actuator Network to Support the Intelligent Control of Efficient Energy Usage. Sensors 2018, 18, 1892. [Google Scholar] [CrossRef] [PubMed]
  12. Dhar, N.K.; Verma, N.K.; Behera, L. Adaptive Critic-Based Event-Triggered Control for HVAC System. IEEE Trans. Ind. Inform. 2018, 14, 178–188. [Google Scholar] [CrossRef]
  13. Peng, C.; Tian, E.; Zhang, J.; Du, D. Decentralized event-triggering communication scheme for large-scale systems under network environments. Inf. Sci. 2017, 380, 132–144. [Google Scholar] [CrossRef]
  14. Hu, Y.; Lu, Q.; Hu, Y.; Hu, Y.; Lu, Q.; Hu, Y. Event-Based Communication and Finite-Time Consensus Control of Mobile Sensor Networks for Environmental Monitoring. Sensors 2018, 18, 2547. [Google Scholar] [CrossRef] [PubMed]
  15. Espinosa Zapata, F.; Lázaro Galilea, J.L.; Olivares Bueno, J. Proyecto ALCOR: Contribuciones a la Optimización del Guiado Remoto de Robots en Espacios Inteligentes. Rev. Iberoam. Autom. Inform. Ind. 2018, 15, 416–426. [Google Scholar] [CrossRef]
  16. Martínez-Rey, M.; Espinosa, F.; Gardel, A.; Santos, C. On-Board Event-Based State Estimation for Trajectory Approaching and Tracking of a Vehicle. Sensors 2015, 15, 14569–14590. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Barsocchi, P.; Calabrò, A.; Ferro, E.; Gennaro, C.; Marchetti, E.; Vairo, C. Boosting a Low-Cost Smart Home Environment with Usage and Access Control Rules. Sensors 2018, 18, 1886. [Google Scholar] [CrossRef] [PubMed]
  18. Diaz-Cacho, M.; Delgado, E.; Barreiro, A.; Falcón, P. Basic Send-on-Delta Sampling for Signal Tracking-Error Reduction. Sensors 2017, 17, 312. [Google Scholar] [CrossRef] [PubMed]
  19. Yuan, D.; Kanhere, S.S.; Hollick, M. Instrumenting Wireless Sensor Networks—A survey on the metrics that matter. Pervasive Mob. Comput. 2017, 37, 45–62. [Google Scholar] [CrossRef]
  20. Kerman, M.C.; Jiang, W.; Blumberg, A.F.; Buttrey, S.E. Event detection challenges, methods, and applications in natural and artificial systems. In Proceedings of the 14th International Command & Control Research and Technology Symposium, Washington, DC, USA, 15–17 June 2009. [Google Scholar]
  21. Antonopoulos, C.; Dima, S.M.; Koubias, S. Event Identification in Wireless Sensor Networks. In Components and Services for IoT Platforms; Springer International Publishing: Cham, Switzerland, 2017; pp. 187–210. [Google Scholar]
  22. Nasridinov, A.; Ihm, S.Y.; Jeong, Y.S.; Park, Y.H. Event detection in wireless sensor networks: Survey and challenges. In Mobile, Ubiquitous, and Intelligent Computing; Lecture Notes in Electrical Engineering; Springer: Berlin/Heidelberg, Germany, 2014; Volume 274, pp. 585–591. [Google Scholar]
  23. Badica, C.; Braubach, L.; Paschke, A. Rule-based distributed and agent systems. In Rule-Based Reasoning, Programming, and Applications; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2011; Volume 6826, pp. 3–28. [Google Scholar]
  24. Lara, R.; Benítez, D.; Member, S.; Caamaño, A.; Zennaro, M.; Rojo-álvarez, J.L.; Member, S. On Real-Time Performance Evaluation of Volcano-Monitoring Systems With Wireless Sensor Networks. IEEE Sens. J. 2015, 15, 3514–3523. [Google Scholar] [CrossRef]
  25. Moridi, M.A.; Sharifzadeh, M.; Kawamura, Y.; Jang, H.D. Development of wireless sensor networks for underground communication and monitoring systems (the cases of underground mine environments). Tunn. Undergr. Space Technol. 2018, 73, 127–138. [Google Scholar] [CrossRef]
  26. Priya, K.C.K.; Terence, S. A Survey on Event Detection and Transmission Protocols in an Event Driven Wireless Sensor Network. Int. J. Comput. Appl. 2012, 58, 12–18. [Google Scholar]
  27. Wittenburg, G.; Dziengel, N.; Adler, S.; Kasmi, Z.; Ziegert, M.; Schiller, J. Cooperative event detection in wireless sensor networks. IEEE Commun. Mag. 2012, 50, 124–131. [Google Scholar] [CrossRef]
  28. Wang, F.; Liu, S.; Liu, P.; Bai, Y. Bridging physical and virtual worlds: Complex event processing for RFID data streams. In Advances in Database Technology; Springer: Berlin/Heidelberg, Germany, 2006; pp. 588–607. [Google Scholar]
  29. Zoumboulakis, M.; Roussos, G. Complex Event Detection in Extremely Resource-Constrained Wireless Sensor Networks. Mob. Netw. Appl. 2011, 16, 194–213. [Google Scholar] [CrossRef]
  30. Ghosh, R.; Simmhan, Y. Distributed Scheduling of Event Analytics across Edge and Cloud. ACM Trans. Cyber-Phys. Syst. 2018, 2, 1–28. [Google Scholar] [CrossRef]
  31. Choochotkaew, S.; Yamaguchi, H.; Higashino, T.; Shibuya, M.; Hasegawa, T. EdgeCEP: Fully-Distributed Complex Event Processing on IoT Edges. In Proceedings of the 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS), Ottawa, ON, Canada, 5–7 June 2017; pp. 121–129. [Google Scholar]
  32. Dziengel, N.; Seiffert, M.; Ziegert, M.; Adler, S.; Pfeiffer, S.; Schiller, J. Deployment and evaluation of a fully applicable distributed event detection system in Wireless Sensor Networks. Ad Hoc Netw. 2016, 37, 160–182. [Google Scholar] [CrossRef]
  33. Wang, Y.; Wang, D.; Chen, F.; Fang, W. Efficient event detection using self-learning threshold for wireless sensor networks. Wirel. Netw. 2015, 21, 1783–1799. [Google Scholar] [CrossRef]
  34. Xue, W.; Luo, Q.; Wu, H. Pattern-based event detection in sensor networks. Distrib. Parallel Databases 2012, 30, 27–62. [Google Scholar] [CrossRef]
  35. Wittenburg, G.; Dziengel, N.; Wartenburger, C.; Schiller, J. A system for distributed event detection in wireless sensor networks. In Proceedings of the 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, Stockholm, Sweden, 12–16 April 2010; p. 94. [Google Scholar]
  36. Shah, S.A.; Nazir, B.; Khan, I.A. Congestion control algorithms in wireless sensor networks: Trends and opportunities. J. King Saud Univ. Comput. Inf. Sci. 2017, 29, 236–245. [Google Scholar] [CrossRef]
  37. Sun, H. Wireless Sensor Traffic Information Collection System Based on Congestion Control Algorithm. Int. J. Online Eng. 2017, 13, 144–151. [Google Scholar] [CrossRef] [Green Version]
  38. Rajan, A.U.; SV, K.R.; Jeyasekar, A.; Lattanze, A.J. Energy-efficient predictive congestion control for wireless sensor networks. IET Wirel. Sens. Syst. 2015, 5, 115–123. [Google Scholar] [CrossRef]
  39. Lee, D.; Chung, K. Adaptive duty-cycle based congestion control for home automation networks. IEEE Trans. Consum. Electron. 2010, 56, 42–47. [Google Scholar] [CrossRef]
  40. Paek, J.; Govindan, R. RCRT: Rate-controlled reliable transport for wireless sensor networks. In Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, Sydney, Australia, 6–9 November 2007; p. 305. [Google Scholar]
  41. Dias, G.M.; Bellalta, B.; Oechsner, S. A Survey about Prediction-Based Data Reduction in Wireless Sensor Networks. ACM Comput. Surv. 2016, 49, 58. [Google Scholar] [CrossRef]
  42. Yin, Y.; Liu, F.; Zhou, X.; Li, Q. An Efficient Data Compression Model Based on Spatial Clustering and Principal Component Analysis in Wireless Sensor Networks. Sensors 2015, 15, 19443–19465. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  43. Malik, H.; Malik, A.S.; Roy, C.K. A methodology to optimize query in wireless sensor networks using historical data. J. Ambient Intell. Humaniz. Comput. 2011, 2, 227–238. [Google Scholar] [CrossRef]
  44. Yann-Ael, L.; Gianluca, B. Round Robin Cycle for Predictions in Wireless Sensor Networks. In Proceedings of the 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Melbourne, Australia, 5–8 December 2005; pp. 253–258. [Google Scholar]
  45. Yoon, I.; Kim, H.; Noh, D.K. Adaptive Data Aggregation and Compression to Improve Energy Utilization in Solar-Powered Wireless Sensor Networks. Sensors 2017, 17, 1226. [Google Scholar] [CrossRef] [PubMed]
  46. Sijs, J.; Kester, L.; Noack, B. A study on event triggering criteria for estimation. In Proceedings of the 17th International Conference on Information Fusion, Salamanca, Spain, 7–10 July 2014. [Google Scholar]
  47. Miskowicz, M. Send-on-delta concept: An event-based data reporting strategy. Sensors 2006, 6, 49–63. [Google Scholar] [CrossRef]
  48. Le Borgne, Y.A.; Raybaud, S.; Bontempi, G. Distributed Principal Component Analysis for Wireless Sensor Networks. Sensors 2008, 8, 4821–4850. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  49. Shu, T.; Xia, M.; Chen, J.; de Silva, C. An Energy Efficient Adaptive Sampling Algorithm in a Sensor Network for Automated Water Quality Monitoring. Sensors 2017, 17, 2551. [Google Scholar] [CrossRef] [PubMed]
  50. Peng, C.; Li, F. A survey on recent advances in event-triggered communication and control. Inf. Sci. 2018, 457–458, 113–125. [Google Scholar] [CrossRef]
  51. Miskowicz, M. Event-based sampling strategies in networked control systems. In Proceedings of the 2014 10th IEEE Workshop on Factory Communication Systems (WFCS 2014), Toulouse, France, 5–7 May 2014. [Google Scholar]
  52. Suh, Y.S. Send-On-Delta Sensor Data Transmission With A Linear Predictor. Sensors 2007, 7, 537–547. [Google Scholar] [CrossRef] [Green Version]
  53. Department of Forecasting Systems, Regional Agency and Environmental Protection of Piedmont, Italy. Meteorological Data From Arpa Piemonte Weather Stations, Italy, 2017. Available online: http://www.arpa.piemonte.it/rischinaturali/accesso-ai-dati/opendata/elenco_meteo.html?delta=0 (accessed on 6 November 2018).
  54. Quayle, R.G.; Steadman, R.G. The Steadman Wind Chill: An Improvement over Present Scales. Weather Forecast. 1998, 13, 1187–1193. [Google Scholar] [CrossRef]
Figure 1. Tree structure.
Figure 1. Tree structure.
Sensors 18 03806 g001
Figure 2. Φ domain reduced to a set of Φ r δ domains (j = k = 1).
Figure 2. Φ domain reduced to a set of Φ r δ domains (j = k = 1).
Sensors 18 03806 g002
Figure 3. Example of RGB color domain reduction. Components of color coded with 5, 3 and 1 bit.
Figure 3. Example of RGB color domain reduction. Components of color coded with 5, 3 and 1 bit.
Sensors 18 03806 g003
Figure 4. Upper left: Original signal F ( x ) , in black; and a constant threshold (Threshold), in red. Bootom left: Boolean response of the condition ( F ( x ) > Threshold ) applied to the original signal and threshold. Upper right: Reduced signal F ( x ) , in black; and a constant threshold (Threshold), in red. Bootom left: Boolean response of the condition ( F ( x ) > Threshold ) applied to the reduced signal and threshold. In red, Boolean variations with the obtained in the bottom left image.
Figure 4. Upper left: Original signal F ( x ) , in black; and a constant threshold (Threshold), in red. Bootom left: Boolean response of the condition ( F ( x ) > Threshold ) applied to the original signal and threshold. Upper right: Reduced signal F ( x ) , in black; and a constant threshold (Threshold), in red. Bootom left: Boolean response of the condition ( F ( x ) > Threshold ) applied to the reduced signal and threshold. In red, Boolean variations with the obtained in the bottom left image.
Sensors 18 03806 g004
Figure 5. Illustration of the metrics analysis process. (A) Transition recall analysis with τ = 0 . In red, unmatched transitions; (B) transition recall analysis with τ = 1 . In green, matched transitions; (C) extended transition recall analysis with τ = 1 . In green, matched transitions; in red, unmatched transitions; in purple, unmatched samples.
Figure 5. Illustration of the metrics analysis process. (A) Transition recall analysis with τ = 0 . In red, unmatched transitions; (B) transition recall analysis with τ = 1 . In green, matched transitions; (C) extended transition recall analysis with τ = 1 . In green, matched transitions; in red, unmatched transitions; in purple, unmatched samples.
Sensors 18 03806 g005
Figure 6. Case study II. LP, TP, and TR metrics for training and experimental data.
Figure 6. Case study II. LP, TP, and TR metrics for training and experimental data.
Sensors 18 03806 g006
Figure 7. Representation of increasing linear threshold ‘K’, defined for the temperature signal extracted from the Oropa station.
Figure 7. Representation of increasing linear threshold ‘K’, defined for the temperature signal extracted from the Oropa station.
Sensors 18 03806 g007
Figure 8. Case study III. With event-based sampling techniques SoD, PS, A-SoD, and A-PS previously detailed, the condition T i > K i has been evaluated for each temperature signal of each station of the Arpa Piemonte repository [53]. The resulting Boolean signals are analyzed through metrics described in Section 3.2 for comparison purposes. The numeric identifier of each station in the repository is as follows: Oropa 0, Cameri 1, Alessandria 2, Vercelli 3, Pallanza 4, Montaldo Scarampi 5, and Bobes 6.
Figure 8. Case study III. With event-based sampling techniques SoD, PS, A-SoD, and A-PS previously detailed, the condition T i > K i has been evaluated for each temperature signal of each station of the Arpa Piemonte repository [53]. The resulting Boolean signals are analyzed through metrics described in Section 3.2 for comparison purposes. The numeric identifier of each station in the repository is as follows: Oropa 0, Cameri 1, Alessandria 2, Vercelli 3, Pallanza 4, Montaldo Scarampi 5, and Bobes 6.
Sensors 18 03806 g008
Table 1. Case study I. Traffic Saving Ratio (TSR).
Table 1. Case study I. Traffic Saving Ratio (TSR).
δ = 0.25 δ = 0.5 δ = 0.75 δ = 1 δ = 2.5
0.069/0.0660.201/0.1860.307/0.2910.393/0.3730.677/0.666
ϵ 0.0030.0150.0160.0200.011
ϵ r 4.35%7.46%5.21%5.09%1.62%
Table 2. Case study I. Level Precision (LP).
Table 2. Case study I. Level Precision (LP).
δ = 0.25 δ = 0.5 δ = 0.75 δ = 1 δ = 2.5 ϵ ¯ ( σ ) ϵ r ¯ ( σ )
τ = 00.999/0.9990.995/0.9940.986/0.9820.971/0.9680.832/0.8350.002 (0.001)0.24% (0.16%)
τ = 11.000/1.0000.999/0.9980.996/0.9930.989/0.9850.871/0.8810.004 (0.003)0.39% (0.40%)
τ = 21.000/1.0000.999/0.9990.998/0.9950.993/0.9900.886/0.8930.003 (0.003)0.28% (0.29%)
τ = 31.000/1.0001.000/1.0000.999/0.9960.995/0.9920.891/0.8950.002 (0.002)0.21% (0.18%)
τ = 41.000/1.0001.000/1.0001.000/0.9970.997/0.9940.884/0.8920.003 (0.003)0.30% (0.33%)
τ = 51.000/1.0001.000/1.0001.000/0.9980.998/0.9940.871/0.8840.004 (0.005)0.42% (0.56%)
τ = 61.000/1.0001.000/1.0001.000/0.9980.999/0.9950.859/0.8740.004 (0.006)0.47% (0.66%)
τ = 71.000/1.0001.000/1.0001.000/0.9991.000/0.9960.849/0.8670.005 (0.007)0.52% (0.81%)
τ = 81.000/1.0001.000/1.0001.000/0.9991.000/0.9970.846/0.8660.005 (0.008)0.55% (0.91%)
τ = 91.000/1.0001.000/1.0001.000/1.0001.000/0.9980.848/0.8680.004 (0.008)0.51% (0.93%)
ϵ ¯ ( σ )0.000 (0.000)0.000 (0.000)0.002 (0.001)0.003 (0.001)0.012 (0.006)
ϵ r ¯ ( σ )0.00% (0.00%)0.02% (0.04%)0.22% (0.12%)0.33% (0.06%)1.37% (0.72%)
Table 3. Case study I. Transition Precision (TP).
Table 3. Case study I. Transition Precision (TP).
δ = 0.25 δ = 0.5 δ = 0.75 δ = 1 δ = 2.5 ϵ ¯ ( σ ) ϵ r ¯ ( σ )
τ = 00.910/0.9060.743/0.7480.555/0.6000.474/0.4910.189/0.2000.016 (0.015)3.73% (2.96%)
τ = 10.959/0.9500.863/0.8630.738/0.7520.662/0.6760.396/0.3660.013 (0.010)2.51% (2.64%)
τ = 20.966/0.9630.890/0.8920.774/0.8030.722/0.7370.500/0.4750.015 (0.011)2.27% (1.88%)
τ = 30.973/0.9710.906/0.9120.804/0.8380.753/0.7780.573/0.5520.018 (0.012)2.42% (1.65%)
τ = 40.974/0.9750.913/0.9270.821/0.8640.778/0.8120.624/0.6180.020 (0.016)2.44% (2.00%)
τ = 50.979/0.9790.920/0.9380.848/0.8840.799/0.8370.666/0.6770.021 (0.015)2.52% (1.75%)
τ = 60.980/0.9810.930/0.9470.861/0.8960.820/0.8570.707/0.7250.022 (0.013)2.61% (1.59%)
τ = 70.984/0.9840.935/0.9540.873/0.9080.832/0.8740.735/0.7680.026 (0.015)3.12% (1.86%)
τ = 80.988/0.9850.941/0.9590.891/0.9200.847/0.8870.766/0.7990.025 (0.013)2.90% (1.62%)
τ = 90.990/0.9870.949/0.9650.900/0.9320.853/0.9010.790/0.8280.027 (0.016)3.20% (1.96%)
ϵ ¯ ( σ )0.003 (0.002)0.011 (0.007)0.033 (0.008)0.031 (0.012)0.023 (0.010)
ϵ r ¯ ( σ )0.27% (0.01%)1.29% (0.09%)4.19% (0.64%)4.23% (0.83%)4.52% (2.61%)
Table 4. Case study I. Transition Recall (TR).
Table 4. Case study I. Transition Recall (TR).
δ = 0.25 δ = 0.5 δ = 0.75 δ = 1 δ = 2.5 ϵ ¯ ( σ ) ϵ r ¯ ( σ )
τ = 00.917/0.9270.786/0.7980.668/0.6860.590/0.5870.277/0.2960.012 (0.006)2.54% (2.28%)
τ = 10.967/0.9730.913/0.9210.888/0.8600.825/0.8070.580/0.5410.020 (0.012)2.71% (2.21%)
τ = 20.979/0.9830.926/0.9470.917/0.9020.876/0.8640.691/0.6680.015 (0.007)1.80% (0.97%)
τ = 30.988/0.9860.947/0.9600.937/0.9240.904/0.8970.755/0.7380.010 (0.005)1.20% (0.69%)
τ = 40.989/0.9890.954/0.9680.947/0.9400.916/0.9190.790/0.7840.006 (0.005)0.66% (0.49%)
τ = 50.991/0.9900.964/0.9730.954/0.9490.937/0.9310.836/0.8170.008 (0.006)0.89% (0.74%)
τ = 60.991/0.9910.974/0.9770.960/0.9560.950/0.9430.852/0.8440.004 (0.003)0.48% (0.33%)
τ = 70.992/0.9930.974/0.9810.963/0.9640.955/0.9520.869/0.8630.004 (0.002)0.39% (0.27%)
τ = 80.995/0.9940.978/0.9850.968/0.9700.963/0.9600.884/0.8790.004 (0.002)0.38% (0.23%)
τ = 90.996/0.9950.982/0.9880.975/0.9740.967/0.9670.898/0.8920.003 (0.003)0.30% (0.28%)
ϵ ¯ ( σ )0.003 (0.003)0.010 (0.005)0.009 (0.008)0.006 (0.005)0.015 (0.010)
ϵ r ¯ ( σ )0.27% (0.01%)1.07% (0.07%)1.04% (0.13%)0.71% (0.12%)2.24% (1.07%)
Table 5. Case study II. Traffic Saving Ratio (TSR).
Table 5. Case study II. Traffic Saving Ratio (TSR).
δ = 0.25 δ = 0.5 δ = 0.75 δ = 1
0.062/0.0690.194/0.2110.332/0.3420.430/0.440
ϵ 0.0070.0170.0100.010
ϵ r 11.29%8.76%3.01%2.33%

Share and Cite

MDPI and ACS Style

Leon-Garcia, F.; Palomares, J.M.; Olivares, J. D2R-TED: Data—Domain Reduction Model for Threshold-Based Event Detection in Sensor Networks. Sensors 2018, 18, 3806. https://0-doi-org.brum.beds.ac.uk/10.3390/s18113806

AMA Style

Leon-Garcia F, Palomares JM, Olivares J. D2R-TED: Data—Domain Reduction Model for Threshold-Based Event Detection in Sensor Networks. Sensors. 2018; 18(11):3806. https://0-doi-org.brum.beds.ac.uk/10.3390/s18113806

Chicago/Turabian Style

Leon-Garcia, Fernando, Jose Manuel Palomares, and Joaquin Olivares. 2018. "D2R-TED: Data—Domain Reduction Model for Threshold-Based Event Detection in Sensor Networks" Sensors 18, no. 11: 3806. https://0-doi-org.brum.beds.ac.uk/10.3390/s18113806

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop