1
|
Yavari A, Harrison CJ, Gorji SA, Shafiei M. Hydrogen 4.0: A Cyber-Physical System for Renewable Hydrogen Energy Plants. SENSORS (BASEL, SWITZERLAND) 2024; 24:3239. [PMID: 38794094 PMCID: PMC11125211 DOI: 10.3390/s24103239] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/11/2024] [Revised: 05/02/2024] [Accepted: 05/14/2024] [Indexed: 05/26/2024]
Abstract
The demand for green hydrogen as an energy carrier is projected to exceed 350 million tons per year by 2050, driven by the need for sustainable distribution and storage of energy generated from sources. Despite its potential, hydrogen production currently faces challenges related to cost efficiency, compliance, monitoring, and safety. This work proposes Hydrogen 4.0, a cyber-physical approach that leverages Industry 4.0 technologies-including smart sensing, analytics, and the Internet of Things (IoT)-to address these issues in hydrogen energy plants. Such an approach has the potential to enhance efficiency, safety, and compliance through real-time data analysis, predictive maintenance, and optimised resource allocation, ultimately facilitating the adoption of renewable green hydrogen. The following sections break down conventional hydrogen plants into functional blocks and discusses how Industry 4.0 technologies can be applied to each segment. The components, benefits, and application scenarios of Hydrogen 4.0 are discussed while how digitalisation technologies can contribute to the successful integration of sustainable energy solutions in the global energy sector is also addressed.
Collapse
Affiliation(s)
- Ali Yavari
- School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC 3122, Australia; (C.J.H.); (M.S.)
- Hydrogen 4.0 Lab, Swinburne University of Technology, Melbourne, VIC 3122, Australia;
- 6G Research and Innovation Lab, Swinburne University of Technology, Melbourne, VIC 3122, Australia
| | - Christopher J. Harrison
- School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC 3122, Australia; (C.J.H.); (M.S.)
- Hydrogen 4.0 Lab, Swinburne University of Technology, Melbourne, VIC 3122, Australia;
- Department of Aerospace and Aviation, School of Engineering, Royal Melbourne Institute of Technology, Melbourne, VIC 3001, Australia
| | - Saman A. Gorji
- Hydrogen 4.0 Lab, Swinburne University of Technology, Melbourne, VIC 3122, Australia;
- School of Engineering, Deakin University, Melbourne, VIC 3122, Australia
| | - Mahnaz Shafiei
- School of Science, Computing and Engineering Technologies, Swinburne University of Technology, Melbourne, VIC 3122, Australia; (C.J.H.); (M.S.)
- Hydrogen 4.0 Lab, Swinburne University of Technology, Melbourne, VIC 3122, Australia;
| |
Collapse
|
2
|
Pan Z, Liao S, Sun W, Zhou H, Lin S, Chen D, Jiang S, Long H, Fan J, Deng F, Zhang W, Chen B, Wang J, Huang Y, Li J, Chen Y. Screening and early warning system for chronic obstructive pulmonary disease with obstructive sleep apnoea based on the medical Internet of Things in three levels of healthcare: protocol for a prospective, multicentre, observational cohort study. BMJ Open 2024; 14:e075257. [PMID: 38418236 PMCID: PMC10910414 DOI: 10.1136/bmjopen-2023-075257] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Submit a Manuscript] [Subscribe] [Scholar Register] [Received: 05/02/2023] [Accepted: 02/12/2024] [Indexed: 03/01/2024] Open
Abstract
INTRODUCTION Chronic obstructive pulmonary disease (COPD) and obstructive sleep apnoea (OSA) are prevalent respiratory diseases in China and impose significant burdens on the healthcare system. Moreover, the co-occurrence of COPD and OSA exacerbates clinical outcomes significantly. However, comprehensive epidemiological investigations in China remain scarce, and the defining characteristics of the population affected by COPD and OSA, alongside their intrinsic relationship, remain ambiguous. METHODS AND ANALYSIS We present a protocol for a prospective, multicentre, observational cohort study based on a digital health management platform across three different healthcare tiers in five sites among Chinese patients with COPD. The study aims to establish predicative models to identify OSA among patients with COPD and to predict the prognosis of overlap syndrome (OS) and acute exacerbations of COPD through the Internet of Things (IoT). Moreover, it aims to evaluate the feasibility, effectiveness and cost-effectiveness of IoT in managing chronic diseases within clinical settings. Participants will undergo baseline assessment, physical examination and nocturnal oxygen saturation measuring. Specific questionnaires screening for OSA will also be administered. Diagnostic lung function tests and polysomnography will be performed to confirm COPD and OSA, respectively. All patients will undergo scheduled follow-ups for 12 months to record the changes in symptoms, lung functions and quality of life. Primary outcomes include the prevalence and characteristics of OS, while secondary outcomes encompass OS prognosis and the feasibility of the management model in clinical contexts. A total of 682 patients with COPD will be recruited over 12-24 months. ETHICS AND DISSEMINATION The study has been approved by Peking University Third Hospital, and all study participants will provide written informed consent. Study results will be published in an appropriate journal and presented at national and international conferences, as well as relevant social media and various stakeholder engagement activities. TRIAL REGISTRATION NUMBER NCT04833725.
Collapse
Affiliation(s)
- Zihan Pan
- Pulmonary and Critical Care Medicine, Peking University Third Hospital, Beijing, China
- General Practice Medicine, Peking University First Hospital, Beijing, China
| | - Sha Liao
- Pulmonary and Critical Care Medicine, Peking University Third Hospital, Beijing, China
| | - Wanlu Sun
- Department of Pulmonary and Critical Care Medicine, Beijing Institute of Respiratory Medicine and Beijing Chao-Yang Hospital, Beijing, China
| | - Haoyi Zhou
- School of Software, Beihang University, Beijing, China
| | - Shuo Lin
- Air Liquide Healthcare (Beijing), Beijing, China
| | - Dian Chen
- Pulmonary and Critical Care Medicine, Peking University Third Hospital, Beijing, China
| | - Simin Jiang
- Pulmonary and Critical Care Medicine, Peking University Third Hospital, Beijing, China
| | - Huanyu Long
- Pulmonary and Critical Care Medicine, Peking University Third Hospital, Beijing, China
| | - Jing Fan
- Pulmonary and Critical Care Medicine, Peking University Third Hospital, Beijing, China
| | - Furong Deng
- Department of Occupational and Environmental Health Sciences, School of Public Health, Peking University, Beijing, China
| | - Wenlou Zhang
- Department of Occupational and Environmental Health Sciences, School of Public Health, Peking University, Beijing, China
| | - Baiqi Chen
- Department of Occupational and Environmental Health Sciences, School of Public Health, Peking University, Beijing, China
| | - Junyi Wang
- Pulmonary and Critical Care Medicine, Peking University Third Hospital, Beijing, China
- Department of Occupational and Environmental Health Sciences, School of Public Health, Peking University, Beijing, China
| | - Yongwei Huang
- Pulmonary and Critical Care Medicine, Peking University Third Hospital, Beijing, China
- Sleep Monitoring Center, Peking University Third Hospital, Beijing, China
| | - Jianxin Li
- School of Computer Science and Engineering, Beihang University, Beijing, China
| | - Yahong Chen
- Pulmonary and Critical Care Medicine, Peking University Third Hospital, Beijing, China
| |
Collapse
|
3
|
Zhang Y, Hu Y, Chen X. Context and Multi-Features-Based Vulnerability Detection: A Vulnerability Detection Frame Based on Context Slicing and Multi-Features. SENSORS (BASEL, SWITZERLAND) 2024; 24:1351. [PMID: 38474887 DOI: 10.3390/s24051351] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/20/2023] [Revised: 02/14/2024] [Accepted: 02/14/2024] [Indexed: 03/14/2024]
Abstract
With the increasing use of open-source libraries and secondary development, software projects face security vulnerabilities. Existing studies on source code vulnerability detection rely on natural language processing techniques, but they overlook the intricate dependencies in programming languages. To address this, we propose a framework called Context and Multi-Features-based Vulnerability Detection (CMFVD). CMFVD integrates source code graphs and textual sequences, using a novel slicing method called Context Slicing to capture contextual information. The framework combines graph convolutional networks (GCNs) and bidirectional gated recurrent units (BGRUs) with attention mechanisms to extract local semantic and syntactic information. Experimental results on Software Assurance Reference Datasets (SARDs) demonstrate CMFVD's effectiveness, achieving the highest F1-score of 0.986 and outperforming other models. CMFVD offers a promising approach to identifying and rectifying security flaws in large-scale codebases.
Collapse
Affiliation(s)
- Yulin Zhang
- School of Cyber Science and Engineering, Sichuan University, Chengdu 610207, China
| | - Yong Hu
- School of Cyber Science and Engineering, Sichuan University, Chengdu 610207, China
| | - Xiao Chen
- School of Cyber Science and Engineering, Sichuan University, Chengdu 610207, China
| |
Collapse
|
4
|
Alamri FS, Haseeb K, Saba T, Lloret J, Jimenez JM. Multimedia IoT-surveillance optimization model using mobile-edge authentic computing. MATHEMATICAL BIOSCIENCES AND ENGINEERING : MBE 2023; 20:19174-19190. [PMID: 38052595 DOI: 10.3934/mbe.2023847] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/07/2023]
Abstract
Smart technologies are advancing the development of cutting-edge systems by exploring the future network. The Internet of Things (IoT) and many multimedia sensors interact with each other for collecting and transmitting visual data. However, managing enormous amounts of data from numerous network devices is one of the main research challenges. In this context, various IoT systems have been investigated and have provided efficient data retrieval and processing solutions. For multimedia systems, however, controlling inefficient bandwidth utilization and ensuring timely transmission of vital information are key research concerns. Moreover, to transfer multimedia traffic while balancing communication costs for the IoT system, a sustainable solution with intelligence in real-life applications is demanded. Furthermore, trust must be formed for technological advancement to occur; such an approach provides the smart communication paradigm with the incorporation of edge computing. This study proposed a model for optimizing multimedia using a combination of edge computing intelligence and authentic strategies. Mobile edges analyze network states to discover the system's status and minimize communication disruptions. Moreover, direct and indirect authentication determines the reliability of data forwarders and network stability. The proposed authentication approach minimizes the possibility of data compromise and increases trust in multimedia surveillance systems. Using simulation testing, the proposed model outperformed other comparable work in terms of byte delivery, packet overhead, packet delay, and data loss metrics.
Collapse
Affiliation(s)
- Faten S Alamri
- Department of Mathematical Sciences, College of Science, Princess Nourah Bint Abdulrahman University, P.O.Box 84428, Riyadh, 11671, Saudi Arabia
| | - Khalid Haseeb
- Artificial Intelligence & Data Analytics (AIDA) Lab CCIS, Prince Sultan University, Riyadh 12435, Saudi Arabia
| | - Tanzila Saba
- Artificial Intelligence & Data Analytics (AIDA) Lab CCIS, Prince Sultan University, Riyadh 12435, Saudi Arabia
| | - Jaime Lloret
- Instituto de Investigación para la Gestión Integrada de Zonas Costeras, Universitat Politenica de Valencia, 46730, Gandia, València, Spain
| | - Jose M Jimenez
- Instituto de Investigación para la Gestión Integrada de Zonas Costeras, Universitat Politenica de Valencia, 46730, Gandia, València, Spain
| |
Collapse
|
5
|
Kumar MS, Karri GR. EEOA: Cost and Energy Efficient Task Scheduling in a Cloud-Fog Framework. SENSORS (BASEL, SWITZERLAND) 2023; 23:2445. [PMID: 36904650 PMCID: PMC10007055 DOI: 10.3390/s23052445] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/23/2022] [Revised: 02/16/2023] [Accepted: 02/20/2023] [Indexed: 06/18/2023]
Abstract
Cloud-fog computing is a wide range of service environments created to provide quick, flexible services to customers, and the phenomenal growth of the Internet of Things (IoT) has produced an immense amount of data on a daily basis. To complete tasks and meet service-level agreement (SLA) commitments, the provider assigns appropriate resources and employs scheduling techniques to efficiently manage the execution of received IoT tasks in fog or cloud systems. The effectiveness of cloud services is directly impacted by some other important criteria, such as energy usage and cost, which are not taken into account by many of the existing methodologies. To resolve the aforementioned problems, an effective scheduling algorithm is required to schedule the heterogeneous workload and enhance the quality of service (QoS). Therefore, a nature-inspired multi-objective task scheduling algorithm called the electric earthworm optimization algorithm (EEOA) is proposed in this paper for IoT requests in a cloud-fog framework. This method was created using the combination of the earthworm optimization algorithm (EOA) and the electric fish optimization algorithm (EFO) to improve EFO's potential to be exploited while looking for the best solution to the problem at hand. Concerning execution time, cost, makespan, and energy consumption, the suggested scheduling technique's performance was assessed using significant instances of real-world workloads such as CEA-CURIE and HPC2N. Based on simulation results, our proposed approach improves efficiency by 89%, energy consumption by 94%, and total cost by 87% over existing algorithms for the scenarios considered using different benchmarks. Detailed simulations demonstrate that the suggested approach provides a superior scheduling scheme with better results than the existing scheduling techniques.
Collapse
|