1
|
Zhang W, Liu Z, Jiang Y, Chen W, Zhao B, Yang K. Self-balancing Incremental Broad Learning System with privacy protection. Neural Netw 2024; 178:106436. [PMID: 38908165 DOI: 10.1016/j.neunet.2024.106436] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/05/2023] [Revised: 04/23/2024] [Accepted: 06/05/2024] [Indexed: 06/24/2024]
Abstract
Incremental learning algorithms have been developed as an efficient solution for fast remodeling in Broad Learning Systems (BLS) without a retraining process. Even though the structure and performance of broad learning are gradually showing superiority, private data leakage in broad learning systems is still a problem that needs to be solved. Recently, Multiparty Secure Broad Learning System (MSBLS) is proposed to allow two clients to participate training. However, privacy-preserving broad learning across multiple clients has received limited attention. In this paper, we propose a Self-Balancing Incremental Broad Learning System (SIBLS) with privacy protection by considering the effect of different data sample sizes from clients, which allows multiple clients to be involved in the incremental learning. Specifically, we design a client selection strategy to select two clients in each round by reducing the gap in the number of data samples in the incremental updating process. To ensure the security under the participation of multiple clients, we introduce a mediator in the data encryption and feature mapping process. Three classical datasets are used to validate the effectiveness of our proposed SIBLS, including MNIST, Fashion and NORB datasets. Experimental results show that our proposed SIBLS can have comparable performance with MSBLS while achieving better performance than federated learning in terms of accuracy and running time.
Collapse
Affiliation(s)
- Weiwen Zhang
- School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, 510006, China.
| | - Ziyu Liu
- School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, 510006, China.
| | - Yifeng Jiang
- School of Computer Science and Technology, Guangdong University of Technology, Guangzhou, 510006, China.
| | - Wuxing Chen
- School of Future Technology, South China University of Technology, Guangzhou, 510006, China.
| | - Bowen Zhao
- Guangzhou Institute of Technology, Xidian University, Guangzhou, 510555, China.
| | - Kaixiang Yang
- School of Computer Science and Engineering, South China University of Technology, Guangzhou, 510006, China.
| |
Collapse
|
2
|
Ju D, Kim S. Volatile tin oxide memristor for neuromorphic computing. iScience 2024; 27:110479. [PMID: 39129832 PMCID: PMC11315111 DOI: 10.1016/j.isci.2024.110479] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2024] [Revised: 07/03/2024] [Accepted: 07/06/2024] [Indexed: 08/13/2024] Open
Abstract
The rise of neuromorphic systems has addressed the shortcomings of current computing architectures, especially regarding energy efficiency and scalability. These systems use cutting-edge technologies such as Pt/SnOx/TiN memristors, which efficiently mimic synaptic behavior and provide potential solutions to modern computing challenges. Moreover, their unipolar resistive switching ability enables precise modulation of the synaptic weights, facilitating energy-efficient parallel processing that is similar to biological synapses. Additionally, memristors' spike-rate-dependent plasticity enhances the adaptability of neural circuits, offering promising applications in intelligent computing. Integrating memristors into edge computing architectures further highlights their importance in tackling the security and efficiency issues associated with conventional cloud computing models.
Collapse
Affiliation(s)
- Dongyeol Ju
- Division of Electronics and Electrical Engineering, Dongguk University, Seoul 04620, Republic of Korea
| | - Sungjun Kim
- Division of Electronics and Electrical Engineering, Dongguk University, Seoul 04620, Republic of Korea
| |
Collapse
|
3
|
Zhang Z, Li J, Li Y, He Y. Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes. SENSORS (BASEL, SWITZERLAND) 2024; 24:2989. [PMID: 38793843 PMCID: PMC11125071 DOI: 10.3390/s24102989] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/01/2024] [Revised: 04/28/2024] [Accepted: 05/06/2024] [Indexed: 05/26/2024]
Abstract
Edge computing provides higher computational power and lower transmission latency by offloading tasks to nearby edge nodes with available computational resources to meet the requirements of time-sensitive tasks and computationally complex tasks. Resource allocation schemes are essential to this process. To allocate resources effectively, it is necessary to attach metadata to a task to indicate what kind of resources are needed and how many computation resources are required. However, these metadata are sensitive and can be exposed to eavesdroppers, which can lead to privacy breaches. In addition, edge nodes are vulnerable to corruption because of their limited cybersecurity defenses. Attackers can easily obtain end-device privacy through unprotected metadata or corrupted edge nodes. To address this problem, we propose a metadata privacy resource allocation scheme that uses searchable encryption to protect metadata privacy and zero-knowledge proofs to resist semi-malicious edge nodes. We have formally proven that our proposed scheme satisfies the required security concepts and experimentally demonstrated the effectiveness of the scheme.
Collapse
Affiliation(s)
- Zihou Zhang
- School of Computer Engineering and Science, Shanghai University, Shanghai 200444, China; (Z.Z.); (J.L.); (Y.L.)
- Science and Technology on Communication Security Laboratory, Chengdu 610041, China
| | - Jiangtao Li
- School of Computer Engineering and Science, Shanghai University, Shanghai 200444, China; (Z.Z.); (J.L.); (Y.L.)
- Science and Technology on Communication Security Laboratory, Chengdu 610041, China
| | - Yufeng Li
- School of Computer Engineering and Science, Shanghai University, Shanghai 200444, China; (Z.Z.); (J.L.); (Y.L.)
| | - Yuanhang He
- No. 30 Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China
| |
Collapse
|
4
|
Ayub Khan A, Laghari AA, M. Baqasah A, Alroobaea R, Almadhor A, Avelino Sampedro G, Kryvinska N. Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput Sci 2024; 10:e1933. [PMID: 38660154 PMCID: PMC11041953 DOI: 10.7717/peerj-cs.1933] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/20/2023] [Accepted: 02/18/2024] [Indexed: 04/26/2024]
Abstract
The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and fog computing-enabled connected devices and nodes has changed our lifestyle nowadays. Due to this, the increased rate of device sales and utilization increases the demand for edge computing technology with collaborative procedures. However, there is a well-established paradigm designed to optimize various distinct quality-of-service requirements, including bandwidth, latency, transmission power, delay, duty cycle, throughput, response, and edge sense, and bring computation and data storage closer to the devices and edges, along with ledger security and privacy during transmission. In this article, we present a systematic review of blockchain Hyperledger enabling fog and edge computing, which integrates as an outsourcing computation over the serverless consortium network environment. The main objective of this article is to classify recently published articles and survey reports on the current status in the domain of edge distributed computing and outsourcing computation, such as fog and edge. In addition, we proposed a blockchain-Hyperledger Sawtooth-enabled serverless edge-based distributed outsourcing computation architecture. This theoretical architecture-based solution delivers robust data security in terms of integrity, transparency, provenance, and privacy-protected preservation in the immutable storage to store the outsourcing computational ledgers. This article also highlights the changes between the proposed taxonomy and the current system based on distinct parameters, such as system security and privacy. Finally, a few open research issues and limitations with promising future directions are listed for future research work.
Collapse
Affiliation(s)
- Abdullah Ayub Khan
- Department of Computer Science, Benazir Bhutto Shaheed University Lyari, Karachi, Sindh, Pakistan
- Department of Computer Science, Sindh Madressatul Islam University, Karachi, Sindh, Pakistan
| | | | - Abdullah M. Baqasah
- Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
| | - Roobaea Alroobaea
- Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia
| | - Ahmad Almadhor
- Department of Computer Engineering and Networks, College of Computer and Information Sciences, Jouf University, Sakaka, Saudi Arabia
| | - Gabriel Avelino Sampedro
- Center for Computational Imaging and Visual Innovations, De La Salle University, Manila, Philippines
- Faculty of Information and Communication Studies, University of the Philippines Open University, Los Baños, Philippines
| | - Natalia Kryvinska
- Department of Information Management and Business Systems, Faculty of Management, Comenius University Bratislava, Bratislava, Slovakia
| |
Collapse
|
5
|
A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2022.11.169] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/24/2022]
|
6
|
Factorization of Broad Expansion for Broad Learning System. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2023.02.048] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/17/2023]
|
7
|
Ren CE, Zhang J, Guan Y. Prescribed Performance Bipartite Consensus Control for Stochastic Nonlinear Multiagent Systems Under Event-Triggered Strategy. IEEE TRANSACTIONS ON CYBERNETICS 2023; 53:468-482. [PMID: 34818200 DOI: 10.1109/tcyb.2021.3119066] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
In this article, the event-triggered bipartite consensus problem for stochastic nonlinear multiagent systems (MASs) with unknown dead-zone input under the prescribed performance is studied. To surmount the influence of the dead-zone input, the dead-zone model is transformed into a linear term and a disturbance term. Meanwhile, the prescribed tracking performance is realized by developing a speed function, which means that all tracking errors of MASs can converge to a predefined set in a given finite time. Moreover, the unknown nonlinear dynamics are approximated by fuzzy-logic systems. By combining the dynamic surface approach and the Lyapunov stability theory, we design an adaptive event-triggered control algorithm, such that the bipartite consensus problem of stochastic nonlinear MASs can be achieved, and all signals are semiglobally uniformly ultimately bounded in probability of the closed-loop systems. Finally, simulation examples are proposed to verify the feasibility of the algorithm.
Collapse
|
8
|
Zhao Z, Ren Y, Mu C, Zou T, Hong KS. Adaptive Neural-Network-Based Fault-Tolerant Control for a Flexible String With Composite Disturbance Observer and Input Constraints. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:12843-12853. [PMID: 34232904 DOI: 10.1109/tcyb.2021.3090417] [Citation(s) in RCA: 11] [Impact Index Per Article: 5.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
We propose an adaptive neural-network-based fault-tolerant control scheme for a flexible string considering the input constraint, actuator gain fault, and external disturbances. First, we utilize a radial basis function neural network to compensate for the actuator gain fault. In addition, an observer is used to handle composite disturbances, including unknown approximation errors and boundary disturbances. Then, an auxiliary system eliminates the effect of the input constraint. By integrating the composite disturbance observer and auxiliary system, adaptive fault-tolerant boundary control is achieved for an uncertain flexible string. Under rigorous Lyapunov stability analysis, the vibration scope of the flexible string is guaranteed to remain within a small compact set. Numerical simulations verify the high control performance of the proposed control scheme.
Collapse
|
9
|
Kim BH, Jo S, Choi S. ALIS: Learning Affective Causality Behind Daily Activities From a Wearable Life-Log System. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:13212-13224. [PMID: 34495859 DOI: 10.1109/tcyb.2021.3106638] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
Human emotions and behaviors are reciprocal components that shape each other in everyday life. While the past research on each element has made use of various physiological sensors in many ways, their interactive relationship in the context of daily life has not yet been explored. In this work, we present a wearable affective life-log system (ALIS) that is robust as well as easy to use in daily life to accurately detect emotional changes and determine the cause-and-effect relationship between emotions and emotional situations in users' lives. The proposed system records how a user feels in certain situations during long-term activities using physiological sensors. Based on the long-term monitoring, the system analyzes how the contexts of the user's life affect his/her emotional changes and builds causal structures between emotions and observable behaviors in daily situations. Furthermore, we demonstrate that the proposed system enables us to build causal structures to find individual sources of mental relief suited to negative situations in school life.
Collapse
|
10
|
Li Z, Li G, Wu X, Kan Z, Su H, Liu Y. Asymmetric Cooperation Control of Dual-Arm Exoskeletons Using Human Collaborative Manipulation Models. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:12126-12139. [PMID: 34637389 DOI: 10.1109/tcyb.2021.3113709] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
The exoskeleton is mainly used by subjects who suffer muscle injury to enhance motor ability in the daily life environment. Previous research seldom considers extending human collaboration skills to human-robot collaborations. In this article, two models, that is: 1) the following the better model and 2) the interpersonal goal integration model, are designed to facilitate the human-human collaborative manipulation in tracking a moving target. Integrated with dual-arm exoskeletons, these two models can enable the robot to successfully perform target tracking with two human partners. Specifically, the manipulation workspace of the human-exoskeleton system is divided into a human region and a robot region. In the human region, the human acts as the leader during cooperation, while, in the robot region, the robot takes the leading role. A novel region-based Barrier Lyapunov function (BLF) is then designed to handle the change of leader roles between the human and the robot and ensures the operation within the constrained human and robot regions when driving the dual-arm exoskeleton to track the moving target. The designed adaptive controller ensures the convergence of tracking errors in the presence of region switches. Experiments are performed on the dual-arm robotic exoskeleton for the subject with muscle damage or some degree of motor dysfunctions to evaluate the proposed controller in tracking a moving target, and the experimental results demonstrate the effectiveness of the developed control.
Collapse
|
11
|
Hu S, Han J, Rong L, Zong Q, Dai M. Research on user satisfaction of sports and healthcare integration system in post-pandemic era. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2022. [DOI: 10.3233/jifs-221533] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Abstract
After COVID-19, some initiatives such as Healthy China, and Smart Living have been widely mentioned. This study explored the factors influencing user satisfaction in sports and healthcare integration services to help system builders and interaction designers better seek opportunities and directions for systems construction. Based on grounded theory method, conducted semi-structured interviews with people who have home exercise needs, and then summarised the influencing factors after coding the raw information level by level. It applied the user experience honeycomb to classify potential variables, used principal component analysis (PCA) to extract representative evaluation indicators as observed variables, and followed the construction of a theoretical model of the satisfaction factors. The structural equation model (SEM) was validated and analyzed to prove its scientific validity and reasonableness. Research showed that the core factors affecting the user experience of sports and healthcare integration system include usefulness, interactivity, usability, credibility, and findability, all of which have a positive and significant impact on user satisfaction. According to the results of empirical analysis, A multidimensional design strategy for sports and healthcare integration system is proposed to provide a reference for improving user satisfaction.
Collapse
Affiliation(s)
- Shan Hu
- School of Industrial Design, Hubei University of Technology, Wuhan, Hubei, China
| | - Jialin Han
- School of Industrial Design, Hubei University of Technology, Wuhan, Hubei, China
| | - Lingda Rong
- School of Industrial Design, Hubei University of Technology, Wuhan, Hubei, China
| | - Qiwei Zong
- School of Industrial Design, Hubei University of Technology, Wuhan, Hubei, China
| | | |
Collapse
|
12
|
Guo J, Ding X, Wang T, Jia W. Combinatorial resources auction in decentralized edge-thing systems using blockchain and differential privacy. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.05.128] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
13
|
Otero A, Félix P, Márquez DG, García CA, Caffarena G. A fault-tolerant clustering algorithm for processing data from multiple streams. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2021.10.049] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
14
|
Wang H, Liu W, Xiong NN, Zhang S, Wang T. LIAA: A listen interval adaptive adjustment scheme for green communication in event-sparse IoT systems. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2021.10.045] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
15
|
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.08.007] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
|
16
|
Fu X, Li W, Yang Y. Exploring the impact of node mobility on cascading failures in spatial networks. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.06.067] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
17
|
Bombiński S, Kossakowska J, Nejman M, Haber RE, Castaño F, Fularski R. Needs, Requirements and a Concept of a Tool Condition Monitoring System for the Aerospace Industry. SENSORS 2021; 21:s21155086. [PMID: 34372330 PMCID: PMC8347660 DOI: 10.3390/s21155086] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/10/2021] [Revised: 07/02/2021] [Accepted: 07/08/2021] [Indexed: 11/16/2022]
Abstract
In this paper, we describe the needs and specific requirements of the aerospace industry in the field of metal machining; specifically, the concept of an edge-computing-based production supervision system for the aerospace industry using a tool and cutting process condition monitoring system. The new concept was developed based on experience gained during the implementation of research projects in Poland’s Aviation Valley at aerospace plants such as Pratt & Whitney and Lockheed Martin. Commercial tool condition monitoring (TCM) and production monitoring systems do not effectively meet the requirements and specificity of the aerospace industry. The main objective of the system is real-time diagnostics and sharing of data, knowledge, and system configurations among technologists, line bosses, machine tool operators, and quality control. The concept presented in this paper is a special tool condition monitoring system comprising a three-stage (natural wear, accelerated wear, and catastrophic tool failure) set of diagnostic algorithms designed for short-run machining and aimed at protecting the workpiece from damage by a damaged or worn tool.
Collapse
Affiliation(s)
- Sebastian Bombiński
- Faculty of Mechanical Engineering, Kazimierz Pulaski University of Technology and Humanities in Radom, 26-610 Radom, Poland
- Correspondence:
| | - Joanna Kossakowska
- Dept. of Automation and Metal Cutting, Warsaw University of Technology, 02-524 Warsaw, Poland; (J.K.); (M.N.)
| | - Mirosław Nejman
- Dept. of Automation and Metal Cutting, Warsaw University of Technology, 02-524 Warsaw, Poland; (J.K.); (M.N.)
| | - Rodolfo E. Haber
- Centre for Automation and Robotics, Spanish National Research Council-Technical University of Madrid, 28500 Madrid, Spain; (R.E.H.); (F.C.)
| | - Fernando Castaño
- Centre for Automation and Robotics, Spanish National Research Council-Technical University of Madrid, 28500 Madrid, Spain; (R.E.H.); (F.C.)
| | | |
Collapse
|