{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T03:48:36Z","timestamp":1747194516534,"version":"3.40.5"},"reference-count":39,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p> This article introduces a time-selective strategy for enhancing temporal consistency of input data for multi-sensor data fusion for in-network data processing in ad hoc wireless sensor networks. Detecting and handling complex time-variable (real-time) situations require methodical consideration of temporal aspects, especially in ad hoc wireless sensor network with distributed asynchronous and autonomous nodes. For example, assigning processing intervals of network nodes, defining validity and simultaneity requirements for data items, determining the size of memory required for buffering the data streams produced by ad hoc nodes and other relevant aspects. The data streams produced periodically and sometimes intermittently by sensor nodes arrive to the fusion nodes with variable delays, which results in sporadic temporal order of inputs. Using data from individual nodes in the order of arrival (i.e. freshest data first) does not, in all cases, yield the optimal results in terms of data temporal consistency and fusion accuracy. We propose time-selective data fusion strategy, which combines temporal alignment, temporal constraints and a method for computing delay of sensor readings, to allow fusion node to select the temporally compatible data from received streams. A real-world experiment (moving vehicles in urban environment) for validation of the strategy demonstrates significant improvement of the accuracy of fusion results. <\/jats:p>","DOI":"10.1177\/1550147718811302","type":"journal-article","created":{"date-parts":[[2018,11,22]],"date-time":"2018-11-22T06:04:14Z","timestamp":1542866654000},"page":"155014771881130","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Time-selective data fusion for in-network processing in ad hoc wireless sensor networks"],"prefix":"10.1177","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8678-0295","authenticated-orcid":false,"given":"Jaanus","family":"Kaugerand","sequence":"first","affiliation":[{"name":"Research Laboratory for Proactive Technologies, Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Johannes","family":"Ehala","sequence":"additional","affiliation":[{"name":"Research Laboratory for Proactive Technologies, Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"Leo","family":"M\u00f5tus","sequence":"additional","affiliation":[{"name":"Research Laboratory for Proactive Technologies, Tallinn University of Technology, Tallinn, Estonia"}]},{"given":"J\u00fcrgo-S\u00f6ren","family":"Preden","sequence":"additional","affiliation":[{"name":"Thinnect, Inc., Sunnyvale, CA, USA"}]}],"member":"179","published-online":{"date-parts":[[2018,11,21]]},"reference":[{"first-page":"158","volume-title":"Proceedings of the 2015 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision","author":"Preden JS","key":"bibr1-1550147718811302"},{"key":"bibr2-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1201\/b11371"},{"key":"bibr3-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.12.006"},{"issue":"1","key":"bibr4-1550147718811302","first-page":"686578","volume":"13","author":"Ehala J","year":"2017","journal-title":"Int J Distrib Sens N"},{"first-page":"198","volume-title":"Proceedings of the 2012 IEEE international multi-disciplinary conference on cognitive methods in situation awareness and decision support (CogSIMA)","author":"Preden JS","key":"bibr5-1550147718811302"},{"key":"bibr6-1550147718811302","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.25.107"},{"key":"bibr7-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20062-0_6"},{"key":"bibr8-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1350-9_2"},{"key":"bibr9-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.10.003"},{"volume-title":"Timing analysis of real-time software","year":"1994","author":"M\u00f5tus L","key":"bibr10-1550147718811302"},{"key":"bibr11-1550147718811302","doi-asserted-by":"publisher","DOI":"10.3390\/s150202964"},{"key":"bibr12-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2363950"},{"issue":"1","key":"bibr13-1550147718811302","first-page":"46","volume":"3","author":"Zhao G.","year":"2011","journal-title":"Netw Protocol Algorithm"},{"key":"bibr14-1550147718811302","first-page":"284","volume-title":"Proceedings of the 6th international conference on mobile computing and ubiquitous networking (ICMU)","volume":"12","author":"Hiromori A","year":"2012"},{"key":"bibr15-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2240617"},{"key":"bibr16-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2159845"},{"first-page":"423","volume-title":"Proceedings of the IEEE 6th international conference on mobile Ad hoc and sensor systems (MASS\u201909)","author":"Oliver RS","key":"bibr17-1550147718811302"},{"volume":"8742","volume-title":"Proceedings of the international conference on SPIE defense, security, and sensing","author":"Preden J","key":"bibr18-1550147718811302"},{"key":"bibr19-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8237-7"},{"journal-title":"Technical report, TinyOS Core Working Group, Berkeley, CA","year":"2008","author":"Maroti M","key":"bibr20-1550147718811302"},{"key":"bibr21-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00116"},{"key":"bibr22-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.08.001"},{"key":"bibr23-1550147718811302","doi-asserted-by":"publisher","DOI":"10.3390\/s16081316"},{"key":"bibr24-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2017.03.006"},{"first-page":"76","volume-title":"Proceedings of the 1st international workshop on database technology and applications","author":"Shi Y","key":"bibr25-1550147718811302"},{"first-page":"77","volume-title":"Proceedings of the 10th IEEE international conference on control and automation (ICCA)","author":"Xiaoliang F","key":"bibr26-1550147718811302"},{"key":"bibr27-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2015.068617"},{"first-page":"1","volume-title":"Proceedings of the 6th annual international mobile and ubiquitous systems: networking services (MobiQuitous)","author":"Bahrepour M","key":"bibr28-1550147718811302"},{"first-page":"1","volume-title":"Proceedings of the 11th international conference on distributed computing in sensor systems (DCOSS)","author":"Lai S","key":"bibr29-1550147718811302"},{"key":"bibr30-1550147718811302","first-page":"103","volume-title":"Proceedings of the 5th international conference on sensor technologies and applications (SENSORCOMM)","volume":"2011","author":"Jacoub JK"},{"key":"bibr31-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.09.011"},{"first-page":"1303","volume-title":"Proceedings of the 32nd annual IEEE international conference on computer software and applications (COMPSAC\u201908)","author":"Dearle A","key":"bibr32-1550147718811302"},{"key":"bibr33-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2161237"},{"first-page":"1","volume-title":"Proceedings of the IEEE military communications conference (MILCOM)","author":"M\u00f5tus L","key":"bibr34-1550147718811302"},{"key":"bibr35-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28971-7_9"},{"key":"bibr36-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1280904"},{"key":"bibr37-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2360460"},{"key":"bibr38-1550147718811302","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/938698"},{"first-page":"422","volume-title":"Proceedings of the 7th international conference on system of systems engineering (SoSE)","author":"M\u00f5tus L","key":"bibr39-1550147718811302"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718811302","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718811302","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718811302","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T04:29:18Z","timestamp":1607315358000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718811302"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":39,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1177\/1550147718811302"],"URL":"https:\/\/doi.org\/10.1177\/1550147718811302","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2018,11]]}}}