1
|
Xie D, Xie Q. Internet of things-based study on online monitoring system of building equipment energy saving optimization control using building information modeling. Sci Prog 2024; 107:368504241228130. [PMID: 38689543 PMCID: PMC11320698 DOI: 10.1177/00368504241228130] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 05/02/2024]
Abstract
Smart building equipment monitoring is a well-established field focused on enhancing contemporary building comfort. The proliferation of Internet connectivity, facilitated by the internet of things (IoT), has transformed buildings from static structures into interactive environments. IoT has witnessed substantial growth across various aspects of daily life, from monitoring environmental conditions to managing building systems and storing data in the cloud. One critical application is the intelligent monitoring and control of building equipment, such as air conditioners, to optimize energy efficiency-a matter of increasing concern for building owners, design experts, and system integrators. Achieving comprehensive energy savings demands a meticulous approach to energy-efficient design and control. This paper's primary objective is to explore and analyze IoT-based energy-saving optimization techniques for intelligent building equipment, integrating building information modeling (BIM) technology. It particularly delves into the energy conservation control algorithm for air-conditioning systems. The research presents a challenge rooted in energy-saving optimization, established upon specific objective functions, followed by a detailed explanation of the energy-saving control algorithm. To validate their approach, the paper outlines a comprehensive experimental design. Over three sessions in August, they conducted control experiments in two distinct areas. Area 1 implemented the energy-saving control methodology discussed in the paper, utilizing virtual parameter enhancement mechanisms, while Area 2 adhered to conventional control methods. The results were enlightening. Area 1 demonstrated superior energy efficiency, consuming 735 kWh compared to Area 2's 819 kWh, signifying an impressive 11.43% reduction in energy consumption thanks to the optimized control strategy. This research underscores the practicality and significance of implementing IoT-based energy-saving strategies, with a focus on smart thermostats, HVAC controllers, and daylight sensors, in intelligent building equipment management to achieve substantial energy conservation gains.
Collapse
Affiliation(s)
- Dinglong Xie
- School of Civil Engineering and Architecture, Henan University, Kaifeng, Henan, China
| | - Qiusha Xie
- Minsheng College, Henan University, Kaifeng, Henan, China
| |
Collapse
|
2
|
Basheer S, Singh KU, Sharma V, Bhatia S, Pande N, Kumar A. A robust NIfTI image authentication framework to ensure reliable and safe diagnosis. PeerJ Comput Sci 2023; 9:e1323. [PMID: 37346677 PMCID: PMC10280420 DOI: 10.7717/peerj-cs.1323] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/05/2022] [Accepted: 03/10/2023] [Indexed: 06/23/2023]
Abstract
Advancements in digital medical imaging technologies have significantly impacted the healthcare system. It enables the diagnosis of various diseases through the interpretation of medical images. In addition, telemedicine, including teleradiology, has been a crucial impact on remote medical consultation, especially during the COVID-19 pandemic. However, with the increasing reliance on digital medical images comes the risk of digital media attacks that can compromise the authenticity and ownership of these images. Therefore, it is crucial to develop reliable and secure methods to authenticate these images that are in NIfTI image format. The proposed method in this research involves meticulously integrating a watermark into the slice of the NIfTI image. The Slantlet transform allows modification during insertion, while the Hessenberg matrix decomposition is applied to the LL subband, which retains the most energy of the image. The Affine transform scrambles the watermark before embedding it in the slice. The hybrid combination of these functions has outperformed previous methods, with good trade-offs between security, imperceptibility, and robustness. The performance measures used, such as NC, PSNR, SNR, and SSIM, indicate good results, with PSNR ranging from 60 to 61 dB, image quality index, and NC all close to one. Furthermore, the simulation results have been tested against image processing threats, demonstrating the effectiveness of this method in ensuring the authenticity and ownership of NIfTI images. Thus, the proposed method in this research provides a reliable and secure solution for the authentication of NIfTI images, which can have significant implications in the healthcare industry.
Collapse
Affiliation(s)
- Shakila Basheer
- Department of Information Systems, College of Computer and Information Science, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
| | - Kamred Udham Singh
- Department of Computer Science and Information Engineering, National Cheng Kung University, Tai-nan, Taiwan, Taiwan
- School of Computing, Graphic Era Hill University, Dehradun, India
| | | | - Surbhi Bhatia
- King Faisal University, Al Hasa, Saudi Arabia
- Department of Data Science, School of Science, Engineering and Environment, University of Salford, Manchester, United Kingdom
| | - Nilesh Pande
- School of Technology Pandit Deendayal Energy University Gandhinagar, Gandhinagar, India
| | | |
Collapse
|
3
|
Yang X, Ren N, Chen A, Wang Z, Wang C. HSC-MET: Heterogeneous signcryption scheme supporting multi-ciphertext equality test for Internet of Drones. PLoS One 2022; 17:e0274695. [PMID: 36173984 PMCID: PMC9522033 DOI: 10.1371/journal.pone.0274695] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/02/2022] [Accepted: 09/01/2022] [Indexed: 11/19/2022] Open
Abstract
Internet of Drones (IoD) is considered as a network and management architecture, which can enable unmanned aerial vehicles (UAVs) to collect data in controlled areas and conduct access control for UAVs. However, the current cloud-assisted IoD scheme cannot efficiently achieve secure communication between heterogeneous cryptosystems, and does not support multi-ciphertext equality tests. To improve the security and performance of traditional schemes, we propose a heterogeneous signcryption scheme (HSC-MET) that supports multi-ciphertext equality test. In this paper, we use a multi-ciphertext equality test technique to achieve multi-user simultaneous retrieval of multiple ciphertexts safely and efficiently. In addition, we adopt heterogeneous signcryption technology to realize secure data communication from public key infrastructure (PKI) to certificateless cryptography (CLC). At the same time, the proposed scheme based on the computation without bilinear pairing, which greatly reduces the computational cost. According to the security and performance analysis, under the random oracle model (ROM), the confidentiality, unforgeability and number security of HSC-MET are proved based on the computational Diffie-Hellman (CDH) problem.
Collapse
Affiliation(s)
- Xiaodong Yang
- Department of Computer Science and Engineering, Northwest Normal University, Lanzhou, Gansu, China
- * E-mail:
| | - Ningning Ren
- Department of Computer Science and Engineering, Northwest Normal University, Lanzhou, Gansu, China
| | - Aijia Chen
- Department of Computer Science and Engineering, Northwest Normal University, Lanzhou, Gansu, China
| | - Zhisong Wang
- Department of Computer Science and Engineering, Northwest Normal University, Lanzhou, Gansu, China
| | - Caifen Wang
- Department of Big Data and Internet, Shenzhen Technology University, Shenzhen, Guangdong, China
| |
Collapse
|
4
|
Comparison of IoT Communication Protocols Using Anomaly Detection with Security Assessments of Smart Devices. Processes (Basel) 2022. [DOI: 10.3390/pr10101952] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022] Open
Abstract
The authors implemented an attack scenario that involved simulating attacks to compromise node and sensor data. This research proposes a framework with algorithms that generates automated malicious commands which conform to device protocol standards and bypass compromise detection. The authors performed attack-detection testing with three different home setup simulations and referred to Accuracy of Detection, Ease of Precision, and Attack Recall, with the F1-Score as the parameter. The results obtained for anomaly detection of IoT logs and messages used K-Nearest Neighbor, Multilayer Perceptron, Logistic Regression, Random Forest, and linear Support Vector Classifier models. The attack results presented false-positive responses with and without the proposed framework and false-negative responses for different models. This research calculated Precision, Accuracy, F1-Score, and Recall as attack-detection performance models. Finally, the authors evaluated the performance of the proposed IoT communication protocol attack framework by evaluating a range of anomalies and compared them with the maliciously generated log messages. IoT Home #1 results in which the model involving an IP Camera and NAS device traffic displayed 97.7% Accuracy, 96.54% Precision, 97.29% Recall, and 96.88% F1-Score. This demonstrated that the model classified the Home #1 dataset consistently.
Collapse
|
5
|
Kaushik K, Bhardwaj A, Dahiya S, Maashi MS, Al Moteri M, Aljebreen M, Bharany S. Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices. SENSORS (BASEL, SWITZERLAND) 2022; 22:7318. [PMID: 36236418 PMCID: PMC9570861 DOI: 10.3390/s22197318] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/01/2022] [Revised: 09/14/2022] [Accepted: 09/22/2022] [Indexed: 06/16/2023]
Abstract
Businesses need to use sentiment analysis, powered by artificial intelligence and machine learning to forecast accurately whether or not consumers are satisfied with their offerings. This paper uses a deep learning model to analyze thousands of reviews of Amazon Alexa to predict customer sentiment. The proposed model can be directly applied to any company with an online presence to detect customer sentiment from their reviews automatically. This research aims to present a suitable method for analyzing the users' reviews of Amazon Echo and categorizing them into positive or negative thoughts. A dataset containing reviews of 3150 users has been used in this research work. Initially, a word cloud of positive and negative reviews was plotted, which gave a lot of insight from the text data. After that, a deep learning model using a multinomial naive Bayesian classifier was built and trained using 80% of the dataset. Then the remaining 20% of the dataset was used to test the model. The proposed model gives 93% accuracy. The proposed model has also been compared with four models used in the same domain, outperforming three.
Collapse
Affiliation(s)
- Keshav Kaushik
- School of Computer Science, University of Petroleum and Energy Studies, Dehradun 248007, India
| | - Akashdeep Bhardwaj
- School of Computer Science, University of Petroleum and Energy Studies, Dehradun 248007, India
| | - Susheela Dahiya
- School of Computer Science, University of Petroleum and Energy Studies, Dehradun 248007, India
| | - Mashael S. Maashi
- Software Engineering Department, College of Computer and Information Sciences, King Saud University, Riyadh 11451, Saudi Arabia
| | - Moteeb Al Moteri
- Department of Management Information System, College of Business Administration, King Saud University, P.O. Box 28095, Riyadh 11437, Saudi Arabia
| | - Mohammed Aljebreen
- Department of Computer Science, Community College, King Saud University, P.O. Box 28095, Riyadh 11437, Saudi Arabia
| | - Salil Bharany
- Department of Computer Engineering & Technology, Guru Nanak Dev University, Amritsar 143005, India
| |
Collapse
|
6
|
Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions. INFORMATION 2022. [DOI: 10.3390/info13100442] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022] Open
Abstract
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users’ credentials and sensitive information. Therefore, this study employed RSA and ElGamal cryptographic algorithms with the application of SHA-256 for digital signature formulation to enhance security and validate the sharing of sensitive information. Security is increasingly becoming a complex task to achieve. The goal of this study is to be able to authenticate shared data with the application of the SHA-256 function to the cryptographic algorithms. The methodology employed involved the use of C# programming language for the implementation of the RSA and ElGamal cryptographic algorithms using the SHA-256 hash function for digital signature. The experimental result shows that the RSA algorithm performs better than the ElGamal during the encryption and signature verification processes, while ElGamal performs better than RSA during the decryption and signature generation process.
Collapse
|
7
|
Abstract
Forest fires are a significant threat to the ecological system’s stability. Several attempts have been made to detect forest fires using a variety of approaches, including optical fire sensors, and satellite-based technologies, all of which have been unsuccessful. In today’s world, research on flying ad hoc networks (FANETs) is a thriving field and can be used successfully. This paper describes a unique clustering approach that identifies the presence of a fire zone in a forest and transfers all sensed data to a base station as soon as feasible via wireless communication. The fire department takes the required steps to prevent the spread of the fire. It is proposed in this study that an efficient clustering approach be used to deal with routing and energy challenges to extend the lifetime of an unmanned aerial vehicle (UAV) in case of forest fires. Due to the restricted energy and high mobility, this directly impacts the flying duration and routing of FANET nodes. As a result, it is vital to enhance the lifetime of wireless sensor networks (WSNs) to maintain high system availability. Our proposed algorithm EE-SS regulates the energy usage of nodes while taking into account the features of a disaster region and other factors. For firefighting, sensor nodes are placed throughout the forest zone to collect essential data points for identifying forest fires and dividing them into distinct clusters. All of the sensor nodes in the cluster communicate their packets to the base station continually through the cluster head. When FANET nodes communicate with one another, their transmission range is constantly adjusted to meet their operating requirements. This paper examines the existing clustering techniques for forest fire detection approaches restricted to wireless sensor networks and their limitations. Our newly designed algorithm chooses the most optimum cluster heads (CHs) based on their fitness, reducing the routing overhead and increasing the system’s efficiency. Our proposed method results from simulations are compared with the existing approaches such as LEACH, LEACH-C, PSO-HAS, and SEED. The evaluation is carried out concerning overall energy usage, residual energy, the count of live nodes, the network lifetime, and the time it takes to build a cluster compared to other approaches. As a result, our proposed EE-SS algorithm outperforms all the considered state-of-art algorithms.
Collapse
|
8
|
A Novel Optimization for GPU Mining Using Overclocking and Undervolting. SUSTAINABILITY 2022. [DOI: 10.3390/su14148708] [Citation(s) in RCA: 9] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/27/2023]
Abstract
Cryptography and associated technologies have existed for a long time. This field is advancing at a remarkable speed. Since the inception of its initial application, blockchain has come a long way. Bitcoin is a cryptocurrency based on blockchain, also known as distributed ledger technology (DLT). The most well-known cryptocurrency for everyday use is Bitcoin, which debuted in 2008. Its success ushered in a digital revolution, and it currently provides security, decentralization, and a reliable data transport and storage mechanism to various industries and companies. Governments and developing enterprises seeking a competitive edge have expressed interest in Bitcoin and other cryptocurrencies due to the rapid growth of this recent technology. For computer experts and individuals looking for a method to supplement their income, cryptocurrency mining has become a big source of anxiety. Mining is a way of resolving mathematical problems based on the processing capacity and speed of the computers employed to solve them in return for the digital currency incentives. Herein, we have illustrated benefits of utilizing GPUs (graphical processing units) for cryptocurrency mining and compare two methods, namely overclocking and undervolting, which are the superior techniques when it comes to GPU optimization. The techniques we have used in this paper will not only help the miners to gain profits while mining cryptocurrency but also solve a major flaw; in order to mitigate the energy and resources that are consumed by the mining hardware, we have designed the mining hardware to simultaneously run longer and consume much less electricity. We have also compared our techniques with other popular techniques that are already in existence with respect to GPU mining.
Collapse
|
9
|
Efficient Middleware for the Portability of PaaS Services Consuming Applications among Heterogeneous Clouds. SENSORS 2022; 22:s22135013. [PMID: 35808508 PMCID: PMC9269862 DOI: 10.3390/s22135013] [Citation(s) in RCA: 16] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/22/2022] [Revised: 06/23/2022] [Accepted: 06/30/2022] [Indexed: 12/10/2022]
Abstract
Cloud providers create a vendor-locked-in environment by offering proprietary and non-standard APIs, resulting in a lack of interoperability and portability among clouds. To overcome this deterrent, solutions must be developed to exploit multiple clouds efficaciously. This paper proposes a middleware platform to mitigate the application portability issue among clouds. A literature review is also conducted to analyze the solutions for application portability. The middleware allows an application to be ported on various platform-as-a-service (PaaS) clouds and supports deploying different services of an application on disparate clouds. The efficiency of the abstraction layer is validated by experimentation on an application that uses the message queue, Binary Large Objects (BLOB), email, and short message service (SMS) services of various clouds via the proposed middleware against the same application using these services via their native code. The experimental results show that adding this middleware mildly affects the latency, but it dramatically reduces the developer’s overhead of implementing each service for different clouds to make it portable.
Collapse
|
10
|
A Systematic Survey on Energy-Efficient Techniques in Sustainable Cloud Computing. SUSTAINABILITY 2022. [DOI: 10.3390/su14106256] [Citation(s) in RCA: 17] [Impact Index Per Article: 8.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Global warming is one of the most compelling environmental threats today, as the rise in energy consumption and CO2 emission caused a dreadful impact on our environment. The data centers, computing devices, network equipment, etc., consume vast amounts of energy that the thermal power plants mainly generate. Primarily fossil fuels like coal and oils are used for energy generation in these power plants that induce various environmental problems such as global warming ozone layer depletion, which can even become the cause of premature deaths of living beings. The recent research trend has shifted towards optimizing energy consumption and green fields since the world recognized the importance of these concepts. This paper aims to conduct a complete systematic mapping analysis on the impact of high energy consumption in cloud data centers and its effect on the environment. To answer the research questions identified in this paper, one hundred nineteen primary studies published until February 2022 were considered and further categorized. Some new developments in green cloud computing and the taxonomy of various energy efficiency techniques used in data centers have also been discussed. It includes techniques like VM Virtualization and Consolidation, Power-aware, Bio-inspired methods, Thermal-management techniques, and an effort to evaluate the cloud data center’s role in reducing energy consumption and CO2 footprints. Most of the researchers proposed software level techniques as with these techniques, massive infrastructures are not required as compared with hardware techniques, and it is less prone to failure and faults. Also, we disclose some dominant problems and provide suggestions for future enhancements in green computing.
Collapse
|