1
|
Gomes B, Soares C, Torres JM, Karmali K, Karmali S, Moreira RS, Sobral P. An Efficient Edge Computing-Enabled Network for Used Cooking Oil Collection. Sensors (Basel) 2024; 24:2236. [PMID: 38610447 PMCID: PMC11014347 DOI: 10.3390/s24072236] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/22/2024] [Revised: 03/21/2024] [Accepted: 03/28/2024] [Indexed: 04/14/2024]
Abstract
In Portugal, more than 98% of domestic cooking oil is disposed of improperly every day. This avoids recycling/reconverting into another energy. Is also may become a potential harmful contaminant of soil and water. Driven by the utility of recycled cooking oil, and leveraging the exponential growth of ubiquitous computing approaches, we propose an IoT smart solution for domestic used cooking oil (UCO) collection bins. We call this approach SWAN, which stands for Smart Waste Accumulation Network. It is deployed and evaluated in Portugal. It consists of a countrywide network of collection bin units, available in public areas. Two metrics are considered to evaluate the system's success: (i) user engagement, and (ii) used cooking oil collection efficiency. The presented system should (i) perform under scenarios of temporary communication network failures, and (ii) be scalable to accommodate an ever-growing number of installed collection units. Thus, we choose a disruptive approach from the traditional cloud computing paradigm. It relies on edge node infrastructure to process, store, and act upon the locally collected data. The communication appears as a delay-tolerant task, i.e., an edge computing solution. We conduct a comparative analysis revealing the benefits of the edge computing enabled collection bin vs. a cloud computing solution. The studied period considers four years of collected data. An exponential increase in the amount of used cooking oil collected is identified, with the developed solution being responsible for surpassing the national collection totals of previous years. During the same period, we also improved the collection process as we were able to more accurately estimate the optimal collection and system's maintenance intervals.
Collapse
Affiliation(s)
- Bruno Gomes
- Faculty of Science and Technology, University Fernando Pessoa, 4249-004 Porto, Portugal; (B.G.); (C.S.); (J.M.T.); (R.S.M.)
- Hardlevel—Renewable Energies, 4410-235 Vila Nova de Gaia, Portugal; (K.K.); (S.K.)
| | - Christophe Soares
- Faculty of Science and Technology, University Fernando Pessoa, 4249-004 Porto, Portugal; (B.G.); (C.S.); (J.M.T.); (R.S.M.)
- LIACC—Artificial Intelligence and Computer Science Laboratory, University of Porto, 4200-465 Porto, Portugal
| | - José Manuel Torres
- Faculty of Science and Technology, University Fernando Pessoa, 4249-004 Porto, Portugal; (B.G.); (C.S.); (J.M.T.); (R.S.M.)
- LIACC—Artificial Intelligence and Computer Science Laboratory, University of Porto, 4200-465 Porto, Portugal
| | - Karim Karmali
- Hardlevel—Renewable Energies, 4410-235 Vila Nova de Gaia, Portugal; (K.K.); (S.K.)
| | - Salim Karmali
- Hardlevel—Renewable Energies, 4410-235 Vila Nova de Gaia, Portugal; (K.K.); (S.K.)
| | - Rui S. Moreira
- Faculty of Science and Technology, University Fernando Pessoa, 4249-004 Porto, Portugal; (B.G.); (C.S.); (J.M.T.); (R.S.M.)
- LIACC—Artificial Intelligence and Computer Science Laboratory, University of Porto, 4200-465 Porto, Portugal
| | - Pedro Sobral
- Faculty of Science and Technology, University Fernando Pessoa, 4249-004 Porto, Portugal; (B.G.); (C.S.); (J.M.T.); (R.S.M.)
- LIACC—Artificial Intelligence and Computer Science Laboratory, University of Porto, 4200-465 Porto, Portugal
| |
Collapse
|
2
|
Rodríguez-Alonso C, Pena-Regueiro I, García Ó. Digital Twin Platform for Water Treatment Plants Using Microservices Architecture. Sensors (Basel) 2024; 24:1568. [PMID: 38475104 DOI: 10.3390/s24051568] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/04/2024] [Revised: 02/18/2024] [Accepted: 02/22/2024] [Indexed: 03/14/2024]
Abstract
The effects of climate change and the rapid growth of societies often lead to water scarcity and inadequate water quality, resulting in a significant number of diseases. The digitalization of infrastructure and the use of Digital Twins are presented as alternatives for optimizing resources and the necessary infrastructure in the water cycle. This paper presents a framework for the development of a Digital Twin platform for a wastewater treatment plant, based on a microservices architecture which optimized its design for edge computing implementation. The platform aims to optimize the operation and maintenance processes of the plant's systems, by employing machine learning techniques, process modeling and simulation, as well as leveraging the information contained in BIM models to support decision-making.
Collapse
Affiliation(s)
- Carlos Rodríguez-Alonso
- ESIT-Escuela Superior de Ingeniería y Tecnología, UNIR-International University of La Rioja, Av. de la Paz 137, 26006 Logroño, Spain
- Ayesa Ingeniería y Arquitectura, Calle Marie Curie 2, 41092 Sevilla, Spain
| | - Iván Pena-Regueiro
- ESIT-Escuela Superior de Ingeniería y Tecnología, UNIR-International University of La Rioja, Av. de la Paz 137, 26006 Logroño, Spain
| | - Óscar García
- ESIT-Escuela Superior de Ingeniería y Tecnología, UNIR-International University of La Rioja, Av. de la Paz 137, 26006 Logroño, Spain
| |
Collapse
|
3
|
Hernandez-Gonzalez NG, Montiel-Caminos J, Sosa J, Montiel-Nelson JA. An Edge Computing Application of Fundamental Frequency Extraction for Ocean Currents and Waves. Sensors (Basel) 2024; 24:1358. [PMID: 38474892 DOI: 10.3390/s24051358] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/05/2023] [Revised: 02/15/2024] [Accepted: 02/17/2024] [Indexed: 03/14/2024]
Abstract
This paper describes the design and optimization of a smart algorithm based on artificial intelligence to increase the accuracy of an ocean water current meter. The main purpose of water current meters is to obtain the fundamental frequency of the ocean waves and currents. The limiting factor in those underwater applications is power consumption and that is the reason to use only ultra-low power microcontrollers. On the other hand, nowadays extraction algorithms assume that the processed signal is defined in a fixed bandwidth. In our approach, belonging to the edge computing research area, we use a deep neural network to determine the narrow bandwidth for filtering the fundamental frequency of the ocean waves and currents on board instruments. The proposed solution is implemented on an 8 MHz ARM Cortex-M0+ microcontroller without a floating point unit requiring only 9.54 ms in the worst case based on a deep neural network solution. Compared to a greedy algorithm in terms of computational effort, our worst-case approach is 1.81 times faster than a fast Fourier transform with a length of 32 samples. The proposed solution is 2.33 times better when an artificial neural network approach is adopted.
Collapse
Affiliation(s)
- Nieves G Hernandez-Gonzalez
- Institute for Applied Microelectronics (IUMA), University of Las Palmas de Gran Canaria, 35015 Las Palmas de Gran Canaria, Spain
| | - Juan Montiel-Caminos
- Institute for Applied Microelectronics (IUMA), University of Las Palmas de Gran Canaria, 35015 Las Palmas de Gran Canaria, Spain
| | - Javier Sosa
- Institute for Applied Microelectronics (IUMA), University of Las Palmas de Gran Canaria, 35015 Las Palmas de Gran Canaria, Spain
| | - Juan A Montiel-Nelson
- Institute for Applied Microelectronics (IUMA), University of Las Palmas de Gran Canaria, 35015 Las Palmas de Gran Canaria, Spain
| |
Collapse
|
4
|
Alasmary H. ScalableDigitalHealth (SDH): An IoT-Based Scalable Framework for Remote Patient Monitoring. Sensors (Basel) 2024; 24:1346. [PMID: 38400504 PMCID: PMC10893503 DOI: 10.3390/s24041346] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/05/2023] [Revised: 02/04/2024] [Accepted: 02/16/2024] [Indexed: 02/25/2024]
Abstract
Addressing the increasing demand for remote patient monitoring, especially among the elderly and mobility-impaired, this study proposes the "ScalableDigitalHealth" (SDH) framework. The framework integrates smart digital health solutions with latency-aware edge computing autoscaling, providing a novel approach to remote patient monitoring. By leveraging IoT technology and application autoscaling, the "SDH" enables the real-time tracking of critical health parameters, such as ECG, body temperature, blood pressure, and oxygen saturation. These vital metrics are efficiently transmitted in real time to AWS cloud storage through a layered networking architecture. The contributions are two-fold: (1) establishing real-time remote patient monitoring and (2) developing a scalable architecture that features latency-aware horizontal pod autoscaling for containerized healthcare applications. The architecture incorporates a scalable IoT-based architecture and an innovative microservice autoscaling strategy in edge computing, driven by dynamic latency thresholds and enhanced by the integration of custom metrics. This work ensures heightened accessibility, cost-efficiency, and rapid responsiveness to patient needs, marking a significant leap forward in the field. By dynamically adjusting pod numbers based on latency, the system optimizes system responsiveness, particularly in edge computing's proximity-based processing. This innovative fusion of technologies not only revolutionizes remote healthcare delivery but also enhances Kubernetes performance, preventing unresponsiveness during high usage.
Collapse
Affiliation(s)
- Hisham Alasmary
- Department of Computer Science, College of Computer Science, King Khalid University, Abha 61421, Saudi Arabia
| |
Collapse
|
5
|
Gragnaniello M, Borghese A, Marrazzo VR, Maresca L, Breglio G, Irace A, Riccio M. Real-Time Myocardial Infarction Detection Approaches with a Microcontroller-Based Edge-AI Device. Sensors (Basel) 2024; 24:828. [PMID: 38339545 PMCID: PMC10856938 DOI: 10.3390/s24030828] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/31/2023] [Revised: 01/21/2024] [Accepted: 01/24/2024] [Indexed: 02/12/2024]
Abstract
Myocardial Infarction (MI), commonly known as heart attack, is a cardiac condition characterized by damage to a portion of the heart, specifically the myocardium, due to the disruption of blood flow. Given its recurring and often asymptomatic nature, there is the need for continuous monitoring using wearable devices. This paper proposes a single-microcontroller-based system designed for the automatic detection of MI based on the Edge Computing paradigm. Two solutions for MI detection are evaluated, based on Machine Learning (ML) and Deep Learning (DL) techniques. The developed algorithms are based on two different approaches currently available in the literature, and they are optimized for deployment on low-resource hardware. A feasibility assessment of their implementation on a single 32-bit microcontroller with an ARM Cortex-M4 core was examined, and a comparison in terms of accuracy, inference time, and memory usage was detailed. For ML techniques, significant data processing for feature extraction, coupled with a simpler Neural Network (NN) is involved. On the other hand, the second method, based on DL, employs a Spectrogram Analysis for feature extraction and a Convolutional Neural Network (CNN) with a longer inference time and higher memory utilization. Both methods employ the same low power hardware reaching an accuracy of 89.40% and 94.76%, respectively. The final prototype is an energy-efficient system capable of real-time detection of MI without the need to connect to remote servers or the cloud. All processing is performed at the edge, enabling NN inference on the same microcontroller.
Collapse
Affiliation(s)
| | | | | | | | | | | | - Michele Riccio
- Department of Electrical Engineering and Information Technology (DIETI), University of Naples Federico II, 80125 Naples, Italy; (M.G.); (A.B.); (V.R.M.); (L.M.); (G.B.); (A.I.)
| |
Collapse
|
6
|
Pascual-Saldaña H, Masip-Bruin X, Asensio A, Alonso A, Blanco I. Innovative Predictive Approach towards a Personalized Oxygen Dosing System. Sensors (Basel) 2024; 24:764. [PMID: 38339481 PMCID: PMC10857553 DOI: 10.3390/s24030764] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/29/2023] [Revised: 01/21/2024] [Accepted: 01/22/2024] [Indexed: 02/12/2024]
Abstract
Despite the large impact chronic obstructive pulmonary disease (COPD) that has on the population, the implementation of new technologies for diagnosis and treatment remains limited. Current practices in ambulatory oxygen therapy used in COPD rely on fixed doses overlooking the diverse activities which patients engage in. To address this challenge, we propose a software architecture aimed at delivering patient-personalized edge-based artificial intelligence (AI)-assisted models that are built upon data collected from patients' previous experiences along with an evaluation function. The main objectives reside in proactively administering precise oxygen dosages in real time to the patient (the edge), leveraging individual patient data, previous experiences, and actual activity levels, thereby representing a substantial advancement over conventional oxygen dosing. Through a pilot test using vital sign data from a cohort of five patients, the limitations of a one-size-fits-all approach are demonstrated, thus highlighting the need for personalized treatment strategies. This study underscores the importance of adopting advanced technological approaches for ambulatory oxygen therapy.
Collapse
Affiliation(s)
- Heribert Pascual-Saldaña
- Advanced Network Architectures Lab (CRAAX), Universitat Politècnica de Catalunya, 08800 Vilanova i la Geltrú, Spain;
| | - Xavi Masip-Bruin
- Advanced Network Architectures Lab (CRAAX), Universitat Politècnica de Catalunya, 08800 Vilanova i la Geltrú, Spain;
| | - Adrián Asensio
- Advanced Network Architectures Lab (CRAAX), Universitat Politècnica de Catalunya, 08800 Vilanova i la Geltrú, Spain;
| | - Albert Alonso
- Fundació de Recerca Clínic Barcelona-Institut d’Investigacions Biomèdiques August Pi i Sunyer (IDIBAPS), 08036 Barcelona, Spain;
| | - Isabel Blanco
- Department of Pulmonary Medicine, Hospital Clínic, University of Barcelona, 08036 Barcelona, Spain;
| |
Collapse
|
7
|
Canavese D, Mannella L, Regano L, Basile C. Security at the Edge for Resource-Limited IoT Devices. Sensors (Basel) 2024; 24:590. [PMID: 38257680 PMCID: PMC10818527 DOI: 10.3390/s24020590] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/09/2023] [Revised: 01/08/2024] [Accepted: 01/12/2024] [Indexed: 01/24/2024]
Abstract
The Internet of Things (IoT) is rapidly growing, with an estimated 14.4 billion active endpoints in 2022 and a forecast of approximately 30 billion connected devices by 2027. This proliferation of IoT devices has come with significant security challenges, including intrinsic security vulnerabilities, limited computing power, and the absence of timely security updates. Attacks leveraging such shortcomings could lead to severe consequences, including data breaches and potential disruptions to critical infrastructures. In response to these challenges, this research paper presents the IoT Proxy, a modular component designed to create a more resilient and secure IoT environment, especially in resource-limited scenarios. The core idea behind the IoT Proxy is to externalize security-related aspects of IoT devices by channeling their traffic through a secure network gateway equipped with different Virtual Network Security Functions (VNSFs). Our solution includes a Virtual Private Network (VPN) terminator and an Intrusion Prevention System (IPS) that uses a machine learning-based technique called oblivious authentication to identify connected devices. The IoT Proxy's modular, scalable, and externalized security approach creates a more resilient and secure IoT environment, especially for resource-limited IoT devices. The promising experimental results from laboratory testing demonstrate the suitability of IoT Proxy to secure real-world IoT ecosystems.
Collapse
Affiliation(s)
- Daniele Canavese
- IRIT, CNRS, 118 Route de Narbonne, CEDEX 9, F-31062 Toulouse, France
| | - Luca Mannella
- Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy
| | - Leonardo Regano
- Dipartimento di Ingegneria Elettrica ed Elettronica, Università degli Studi di Cagliari, Piazza d’Armi, 09123 Cagliari, Italy
| | - Cataldo Basile
- Dipartimento di Automatica e Informatica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Turin, Italy
| |
Collapse
|
8
|
Salmi Y, Bogucka H. Poisoning Attacks against Communication and Computing Task Classification and Detection Techniques. Sensors (Basel) 2024; 24:338. [PMID: 38257431 DOI: 10.3390/s24020338] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/10/2023] [Revised: 12/20/2023] [Accepted: 12/30/2023] [Indexed: 01/24/2024]
Abstract
Machine learning-based classification algorithms allow communication and computing (2C) task offloading from the end devices to the edge computing network servers. In this paper, we consider task classification based on the hybrid k-means and k'-nearest neighbors algorithms. Moreover, we examine the poisoning attacks on such ML algorithms, namely noise-like jamming and targeted data feature falsification, and their impact on the effectiveness of 2C task allocation. Then, we also present two anomaly detection methods using noise training and the silhouette score test to detect the poisoned samples and mitigate their impact. Our simulation results show that these attacks have a fatal effect on classification in feature areas where the decision boundary is unclear. They also demonstrate the effectiveness of our countermeasures against the considered attacks.
Collapse
Affiliation(s)
- Younes Salmi
- Institute of Radiocommunications, Poznan University of Technology, 61-131 Poznan, Poland
| | - Hanna Bogucka
- Institute of Radiocommunications, Poznan University of Technology, 61-131 Poznan, Poland
| |
Collapse
|
9
|
Sheik AT, Maple C, Epiphaniou G, Dianati M. Securing Cloud-Assisted Connected and Autonomous Vehicles: An In-Depth Threat Analysis and Risk Assessment. Sensors (Basel) 2023; 24:241. [PMID: 38203103 DOI: 10.3390/s24010241] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/23/2023] [Revised: 12/04/2023] [Accepted: 12/14/2023] [Indexed: 01/12/2024]
Abstract
As threat vectors and adversarial capabilities evolve, Cloud-Assisted Connected and Autonomous Vehicles (CCAVs) are becoming more vulnerable to cyberattacks. Several established threat analysis and risk assessment (TARA) methodologies are publicly available to address the evolving threat landscape. However, these methodologies inadequately capture the threat data of CCAVs, resulting in poorly defined threat boundaries or the reduced efficacy of the TARA. This is due to multiple factors, including complex hardware-software interactions, rapid technological advancements, outdated security frameworks, heterogeneous standards and protocols, and human errors in CCAV systems. To address these factors, this study begins by systematically evaluating TARA methods and applying the Spoofing, Tampering, Repudiation, Information disclosure, Denial of service, and Elevation of privileges (STRIDE) threat model and Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD) risk assessment to target system architectures. This study identifies vulnerabilities, quantifies risks, and methodically examines defined data processing components. In addition, this study offers an attack tree to delineate attack vectors and provides a novel defense taxonomy against identified risks. This article demonstrates the efficacy of the TARA in systematically capturing compromised security requirements, threats, limits, and associated risks with greater precision. By doing so, we further discuss the challenges in protecting hardware-software assets against multi-staged attacks due to emerging vulnerabilities. As a result, this research informs advanced threat analyses and risk management strategies for enhanced security engineering of cyberphysical CCAV systems.
Collapse
Affiliation(s)
- Al Tariq Sheik
- Warwick Manufacturing Group (WMG), University of Warwick, Coventry CV4 7AL, UK
| | - Carsten Maple
- Warwick Manufacturing Group (WMG), University of Warwick, Coventry CV4 7AL, UK
| | - Gregory Epiphaniou
- Warwick Manufacturing Group (WMG), University of Warwick, Coventry CV4 7AL, UK
| | - Mehrdad Dianati
- Warwick Manufacturing Group (WMG), University of Warwick, Coventry CV4 7AL, UK
| |
Collapse
|
10
|
Jiménez-Sánchez J, Blanco-Carmona P, Hinojo-Montero JM, Palomo FR, Millán RL, Muñoz-Chavero F. Advanced System-on-Chip Field-Programmable-Gate-Array-Powered Data Acquisition System for Pixel Detectors. Sensors (Basel) 2023; 24:218. [PMID: 38203079 PMCID: PMC10781304 DOI: 10.3390/s24010218] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/31/2023] [Revised: 11/24/2023] [Accepted: 12/28/2023] [Indexed: 01/12/2024]
Abstract
Particle detector systems require data acquisition systems (DAQs) as their back-end. This paper presents a new edge-computing DAQ that is capable of handling multiple pixel detectors simultaneously and was designed for particle-tracking experiments. The system was designed for the ROC4SENS readout chip, but its control logic can be adapted for other pixel detectors. The DAQ was based on a system-on-chip FPGA (SoC FPGA), which includes an embedded microprocessor running a fully functional Linux system. An application using a client-server architecture was developed to facilitate remote control and data visualization. The comprehensive DAQ is very compact, thus reducing the typical hardware load in particle tracking experiments, especially during the obligatory characterization of particle telescopes.
Collapse
Affiliation(s)
- Jorge Jiménez-Sánchez
- Department of Electronic Engineering, University of Sevilla, 41092 Sevilla, Spain; (P.B.-C.); (J.M.H.-M.); (F.R.P.); (R.L.M.); (F.M.-C.)
| | | | | | | | | | | |
Collapse
|
11
|
Liu Y, Li Y, Cheng W, Wang W, Yang J. UAV-Assisted Cluster-Based Task Allocation for Mobile Crowdsensing in a Space-Air-Ground-Sea Integrated Network. Sensors (Basel) 2023; 24:208. [PMID: 38203071 PMCID: PMC10781310 DOI: 10.3390/s24010208] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/17/2023] [Revised: 12/24/2023] [Accepted: 12/27/2023] [Indexed: 01/12/2024]
Abstract
Mobile crowdsensing (MCS), which is a grassroots sensing paradigm that utilizes the idea of crowdsourcing, has attracted the attention of academics. More and more researchers have devoted themselves to adopting MCS in space-air-ground-sea integrated networks (SAGSINs). Given the dynamics of the environmental conditions in SAGSINs and the uncertainty of the sensing capabilities of mobile people, the quality and coverage of the sensed data change periodically. To address this issue, we propose a novel UAV-assisted cluster-based task allocation (UCTA) algorithm for MCS in SAGSINs in a two-stage process. We first introduce the edge nodes and establish a three-layer hierarchical system with UAV-assistance, called "Platform-Edge Cluster-Participants". Moreover, an edge-aided attribute-based cluster algorithm is designed, aiming at organizing tasks into clusters, which significantly diminishes both the communication overhead and computational complexity while enhancing the efficiency of task allocation. Subsequently, a greedy selection algorithm is proposed to select the final combination that performs the sensing task in each cluster. Extensive simulations are conducted comparing the developed algorithm with the other three benchmark algorithms, and the experimental results unequivocally endorse the superiority of our proposed UCTA algorithm.
Collapse
Affiliation(s)
- Yang Liu
- School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710129, China; (Y.L.)
| | - Yong Li
- School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710129, China; (Y.L.)
| | - Wei Cheng
- School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710129, China; (Y.L.)
| | - Weiguang Wang
- School of Information Engineering, Henan University of Science and Technology, Luoyang 471000, China
| | - Junhua Yang
- School of Electronic Engineering, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
| |
Collapse
|
12
|
Aldaej A, Ahanger TA, Ullah I. Deep Learning-Inspired IoT-IDS Mechanism for Edge Computing Environments. Sensors (Basel) 2023; 23:9869. [PMID: 38139716 PMCID: PMC10747713 DOI: 10.3390/s23249869] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/16/2023] [Revised: 12/05/2023] [Accepted: 12/13/2023] [Indexed: 12/24/2023]
Abstract
The Internet of Things (IoT) technology has seen substantial research in Deep Learning (DL) techniques to detect cyberattacks. Critical Infrastructures (CIs) must be able to quickly detect cyberattacks close to edge devices in order to prevent service interruptions. DL approaches outperform shallow machine learning techniques in attack detection, giving them a viable alternative for use in intrusion detection. However, because of the massive amount of IoT data and the computational requirements for DL models, transmission overheads prevent the successful implementation of DL models closer to the devices. As they were not trained on pertinent IoT, current Intrusion Detection Systems (IDS) either use conventional techniques or are not intended for scattered edge-cloud deployment. A new edge-cloud-based IoT IDS is suggested to address these issues. It uses distributed processing to separate the dataset into subsets appropriate to different attack classes and performs attribute selection on time-series IoT data. Next, DL is used to train an attack detection Recurrent Neural Network, which consists of a Recurrent Neural Network (RNN) and Bidirectional Long Short-Term Memory (LSTM). The high-dimensional BoT-IoT dataset, which replicates massive amounts of genuine IoT attack traffic, is used to test the proposed model. Despite an 85 percent reduction in dataset size made achievable by attribute selection approaches, the attack detection capability was kept intact. The models built utilizing the smaller dataset demonstrated a higher recall rate (98.25%), F1-measure (99.12%), accuracy (99.56%), and precision (99.45%) with no loss in class discrimination performance compared to models trained on the entire attribute set. With the smaller attribute space, neither the RNN nor the Bi-LSTM models experienced underfitting or overfitting. The proposed DL-based IoT intrusion detection solution has the capability to scale efficiently in the face of large volumes of IoT data, thus making it an ideal candidate for edge-cloud deployment.
Collapse
Affiliation(s)
- Abdulaziz Aldaej
- College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia
| | - Tariq Ahamed Ahanger
- Department of Management Information Systems, College of Business Administration (CoBA), Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia;
| | - Imdad Ullah
- School of Computer Science, Faculty of Engineering, The University of Sydney, Sydney, NSW 2006, Australia;
| |
Collapse
|
13
|
Xia C, Jin X, Xu C, Zeng P. Computational-Intelligence-Based Scheduling with Edge Computing in Cyber-Physical Production Systems. Entropy (Basel) 2023; 25:1640. [PMID: 38136521 PMCID: PMC10742592 DOI: 10.3390/e25121640] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/08/2023] [Revised: 12/03/2023] [Accepted: 12/08/2023] [Indexed: 12/24/2023]
Abstract
Real-time performance and reliability are two critical indicators in cyber-physical production systems (CPPS). To meet strict requirements in terms of these indicators, it is necessary to solve complex job-shop scheduling problems (JSPs) and reserve considerable redundant resources for unexpected jobs before production. However, traditional job-shop methods are difficult to apply under dynamic conditions due to the uncertain time cost of transmission and computation. Edge computing offers an efficient solution to this issue. By deploying edge servers around the equipment, smart factories can achieve localized decisions based on computational intelligence (CI) methods offloaded from the cloud. Most works on edge computing have studied task offloading and dispatching scheduling based on CI. However, few of the existing methods can be used for behavior-level control due to the corresponding requirements for ultralow latency (10 ms) and ultrahigh reliability (99.9999% in wireless transmission), especially when unexpected computing jobs arise. Therefore, this paper proposes a dynamic resource prediction scheduling (DRPS) method based on CI to achieve real-time localized behavior-level control. The proposed DRPS method primarily focuses on the schedulability of unexpected computing jobs, and its core ideas are (1) to predict job arrival times based on a backpropagation neural network and (2) to perform real-time migration in the form of human-computer interaction based on the results of resource analysis. An experimental comparison with existing schemes shows that our DRPS method improves the acceptance ratio by 25.9% compared to the earliest deadline first scheme.
Collapse
Affiliation(s)
- Changqing Xia
- State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China; (C.X.); (X.J.); (C.X.)
- Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China
- Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang 110016, China
| | - Xi Jin
- State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China; (C.X.); (X.J.); (C.X.)
- Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China
- Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang 110016, China
| | - Chi Xu
- State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China; (C.X.); (X.J.); (C.X.)
- Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China
- Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang 110016, China
| | - Peng Zeng
- State Key Laboratory of Robotics, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China; (C.X.); (X.J.); (C.X.)
- Key Laboratory of Networked Control Systems, Chinese Academy of Sciences, Shenyang 110016, China
- Institutes for Robotics and Intelligent Manufacturing, Chinese Academy of Sciences, Shenyang 110016, China
| |
Collapse
|
14
|
Khan AT, Jensen SM, Khan AR, Li S. Plant disease detection model for edge computing devices. Front Plant Sci 2023; 14:1308528. [PMID: 38143571 PMCID: PMC10748432 DOI: 10.3389/fpls.2023.1308528] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/06/2023] [Accepted: 11/22/2023] [Indexed: 12/26/2023]
Abstract
In this paper, we address the question of achieving high accuracy in deep learning models for agricultural applications through edge computing devices while considering the associated resource constraints. Traditional and state-of-the-art models have demonstrated good accuracy, but their practicality as end-user available solutions remains uncertain due to current resource limitations. One agricultural application for deep learning models is the detection and classification of plant diseases through image-based crop monitoring. We used the publicly available PlantVillage dataset containing images of healthy and diseased leaves for 14 crop species and 6 groups of diseases as example data. The MobileNetV3-small model succeeds in classifying the leaves with a test accuracy of around 99.50%. Post-training optimization using quantization reduced the number of model parameters from approximately 1.5 million to 0.93 million while maintaining the accuracy of 99.50%. The final model is in ONNX format, enabling deployment across various platforms, including mobile devices. These findings offer a cost-effective solution for deploying accurate deep-learning models in agricultural applications.
Collapse
Affiliation(s)
- Ameer Tamoor Khan
- Department of Plant and Environmental Science, University of Copenhagen, Copenhagen, Denmark
| | - Signe Marie Jensen
- Department of Plant and Environmental Science, University of Copenhagen, Copenhagen, Denmark
| | - Abdul Rehman Khan
- Department of Computer and Information Sciences, Pakistan Institute of Engineering and Applied Sciences, Islamabad, Pakistan
| | - Shuai Li
- Deparment of Information Technology and Electrical Engineering, University of Oulu, Oulu, Finland
| |
Collapse
|
15
|
Razaque A, Yoo J, Bektemyssova G, Alshammari M, Chinibayeva TT, Amanzholova S, Alotaibi A, Umutkulov D. Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology. Sensors (Basel) 2023; 23:9690. [PMID: 38139535 PMCID: PMC10747852 DOI: 10.3390/s23249690] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/26/2023] [Revised: 11/09/2023] [Accepted: 11/29/2023] [Indexed: 12/24/2023]
Abstract
Low-speed internet can negatively impact incident response by causing delayed detection, ineffective response, poor collaboration, inaccurate analysis, and increased risk. Slow internet speeds can delay the receipt and analysis of data, making it difficult for security teams to access the relevant information and take action, leading to a fragmented and inadequate response. All of these factors can increase the risk of data breaches and other security incidents and their impact on IoT-enabled communication. This study combines virtual network function (VNF) technology with software -defined networking (SDN) called virtual network function software-defined networking (VNFSDN). The adoption of the VNFSDN approach has the potential to enhance network security and efficiency while reducing the risk of cyberattacks. This approach supports IoT devices that can analyze large volumes of data in real time. The proposed VNFSDN can dynamically adapt to changing security requirements and network conditions for IoT devices. VNFSDN uses threat filtration and threat-capturing and decision-driven algorithms to minimize cyber risks for IoT devices and enhance network performance. Additionally, the integrity of IoT devices is safeguarded by addressing the three risk categories of data manipulation, insertion, and deletion. Furthermore, the prioritized delegated proof of stake (PDPoS) consensus variant is integrated with VNFSDN to combat attacks. This variant addresses the scalability issue of blockchain technology by providing a safe and adaptable environment for IoT devices that can quickly be scaled up and down to pull together the changing demands of the organization, allowing IoT devices to efficiently utilize resources. The PDPoS variant provides flexibility to IoT devices to proactively respond to potential security threats, preventing or mitigating the impact of cyberattacks. The proposed VNFSDN dynamically adapts to the changing security requirements and network conditions, improving network resiliency and enabling proactive threat detection. Finally, we compare the proposed VNFSDN to existing state-of-the-art approaches. According to the results, the proposed VNFSDN has a 0.08 ms minimum response time, a 2% packet loss rate, 99.5% network availability, a 99.36% threat detection rate, and a 99.77% detection accuracy with 1% malicious nodes.
Collapse
Affiliation(s)
- Abdul Razaque
- School of Computing, Gachon University, Seongnam 13120, Republic of Korea;
| | - Joon Yoo
- School of Computing, Gachon University, Seongnam 13120, Republic of Korea;
| | - Gulnara Bektemyssova
- Department of Computer Engineering and Information System, International Information Technology University, Almaty 050000, Kazakhstan; (T.T.C.); (D.U.)
| | - Majid Alshammari
- Computers and Information Technology College, Taif University, Taif 26571, Saudi Arabia;
| | - Tolganay T. Chinibayeva
- Department of Computer Engineering and Information System, International Information Technology University, Almaty 050000, Kazakhstan; (T.T.C.); (D.U.)
| | - Saule Amanzholova
- Department of Cybersecurity, International Information Technology University, Almaty 050000, Kazakhstan;
| | - Aziz Alotaibi
- Computers and Information Technology College, Taif University, Taif 26571, Saudi Arabia;
| | - Dauren Umutkulov
- Department of Computer Engineering and Information System, International Information Technology University, Almaty 050000, Kazakhstan; (T.T.C.); (D.U.)
| |
Collapse
|
16
|
Kiarashi Y, Saghafi S, Das B, Hegde C, Madala VSK, Nakum A, Singh R, Tweedy R, Doiron M, Rodriguez AD, Levey AI, Clifford GD, Kwon H. Graph Trilateration for Indoor Localization in Sparsely Distributed Edge Computing Devices in Complex Environments Using Bluetooth Technology. Sensors (Basel) 2023; 23:9517. [PMID: 38067890 PMCID: PMC10708633 DOI: 10.3390/s23239517] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/09/2023] [Revised: 11/16/2023] [Accepted: 11/17/2023] [Indexed: 12/18/2023]
Abstract
Spatial navigation patterns in indoor space usage can reveal important cues about the cognitive health of participants. In this work, we present a low-cost, scalable, open-source edge computing system using Bluetooth low energy (BLE) beacons for tracking indoor movements in a large, 1700 m2 facility used to carry out therapeutic activities for participants with mild cognitive impairment (MCI). The facility is instrumented with 39 edge computing systems, along with an on-premise fog server. The participants carry a BLE beacon, in which BLE signals are received and analyzed by the edge computing systems. Edge computing systems are sparsely distributed in the wide, complex indoor space, challenging the standard trilateration technique for localizing subjects, which assumes a dense installation of BLE beacons. We propose a graph trilateration approach that considers the temporal density of hits from the BLE beacon to surrounding edge devices to handle the inconsistent coverage of edge devices. This proposed method helps us tackle the varying signal strength, which leads to intermittent detection of beacons. The proposed method can pinpoint the positions of multiple participants with an average error of 4.4 m and over 85% accuracy in region-level localization across the entire study area. Our experimental results, evaluated in a clinical environment, suggest that an ordinary medical facility can be transformed into a smart space that enables automatic assessment of individuals' movements, which may reflect health status or response to treatment.
Collapse
Affiliation(s)
- Yashar Kiarashi
- Department of Biomedical Informatics, School of Medicine, Emory University, Atlanta, GA 30322, USA; (Y.K.); (S.S.); (H.K.)
| | - Soheil Saghafi
- Department of Biomedical Informatics, School of Medicine, Emory University, Atlanta, GA 30322, USA; (Y.K.); (S.S.); (H.K.)
| | - Barun Das
- Department of Biomedical Informatics, School of Medicine, Emory University, Atlanta, GA 30322, USA; (Y.K.); (S.S.); (H.K.)
| | - Chaitra Hegde
- School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA
| | | | - ArjunSinh Nakum
- School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA
| | - Ratan Singh
- School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA
| | - Robert Tweedy
- Department of Biomedical Informatics, School of Medicine, Emory University, Atlanta, GA 30322, USA; (Y.K.); (S.S.); (H.K.)
| | - Matthew Doiron
- Department of Neurology, School of Medicine, Emory University, Atlanta, GA 30322, USA (A.D.R.); (A.I.L.)
| | - Amy D. Rodriguez
- Department of Neurology, School of Medicine, Emory University, Atlanta, GA 30322, USA (A.D.R.); (A.I.L.)
| | - Allan I. Levey
- Department of Neurology, School of Medicine, Emory University, Atlanta, GA 30322, USA (A.D.R.); (A.I.L.)
| | - Gari D. Clifford
- Department of Biomedical Informatics, School of Medicine, Emory University, Atlanta, GA 30322, USA; (Y.K.); (S.S.); (H.K.)
- Department of Biomedical Engineering, Georgia Institute of Technology and Emory University, Atlanta, GA 30322, USA
| | - Hyeokhyen Kwon
- Department of Biomedical Informatics, School of Medicine, Emory University, Atlanta, GA 30322, USA; (Y.K.); (S.S.); (H.K.)
| |
Collapse
|
17
|
Alves MG, Chen GL, Kang X, Song GH. Reduced CPU Workload for Human Pose Detection with the Aid of a Low-Resolution Infrared Array Sensor on Embedded Systems. Sensors (Basel) 2023; 23:9403. [PMID: 38067779 PMCID: PMC10708851 DOI: 10.3390/s23239403] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/11/2023] [Revised: 11/12/2023] [Accepted: 11/22/2023] [Indexed: 12/18/2023]
Abstract
Modern embedded systems have achieved relatively high processing power. They can be used for edge computing and computer vision, where data are collected and processed locally, without the need for network communication for decision-making and data analysis purposes. Face detection, face recognition, and pose detection algorithms can be executed with acceptable performance on embedded systems and are used for home security and monitoring. However, popular machine learning frameworks, such as MediaPipe, require relatively high usage of CPU while running, even when idle with no subject in the scene. Combined with the still present false detections, this wastes CPU time, elevates the power consumption and overall system temperature, and generates unnecessary data. In this study, a low-cost low-resolution infrared thermal sensor array was used to control the execution of MediaPipe's pose detection algorithm using single-board computers, which only runs when the thermal camera detects a possible subject in its field of view. A lightweight algorithm with several filtering layers was developed, which allowed the effective detection and isolation of a person in the thermal image. The resulting hybrid computer vision proved effective in reducing the average CPU workload, especially in environments with low activity, almost eliminating MediaPipe's false detections, and reaching up to 30% power saving in the best-case scenario.
Collapse
Affiliation(s)
- Marcos G. Alves
- School of Computing and Data Engineering, NingboTech University, Ningbo 315100, China; (G.-L.C.); (X.K.); (G.-H.S.)
| | | | | | | |
Collapse
|
18
|
Zhang T, Jin X, Bai S, Peng Y, Li Y, Zhang J. Smart Public Transportation Sensing: Enhancing Perception and Data Management for Efficient and Safety Operations. Sensors (Basel) 2023; 23:9228. [PMID: 38005614 PMCID: PMC10674405 DOI: 10.3390/s23229228] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/09/2023] [Revised: 11/09/2023] [Accepted: 11/13/2023] [Indexed: 11/26/2023]
Abstract
The use of cloud computing, big data, IoT, and mobile applications in the public transportation industry has resulted in the generation of vast and complex data, of which the large data volume and data variety have posed several obstacles to effective data sensing and processing with high efficiency in a real-time data-driven public transportation management system. To overcome the above-mentioned challenges and to guarantee optimal data availability for data sensing and processing in public transportation perception, a public transportation sensing platform is proposed to collect, integrate, and organize diverse data from different data sources. The proposed data perception platform connects multiple data systems and some edge intelligent perception devices to enable the collection of various types of data, including traveling information of passengers and transaction data of smart cards. To enable the efficient extraction of precise and detailed traveling behavior, an efficient field-level data lineage exploration method is proposed during logical plan generation and is integrated into the FlinkSQL system seamlessly. Furthermore, a row-level fine-grained permission control mechanism is adopted to support flexible data management. With these two techniques, the proposed data management system can support efficient data processing on large amounts of data and conducts comprehensive analysis and application of business data from numerous different sources to realize the value of the data with high data safety. Through operational testing in real environments, the proposed platform has proven highly efficient and effective in managing organizational operations, data assets, data life cycle, offline development, and backend administration over a large amount of various types of public transportation traffic data.
Collapse
Affiliation(s)
- Tianyu Zhang
- Shenzhen International Graduate School, Tsinghua University, Shenzhen 518055, China;
| | - Xin Jin
- Shenzhen International Graduate School, Tsinghua University, Shenzhen 518055, China;
| | - Song Bai
- Hangzhou DTWave Technology Co., Ltd., Hangzhou 311100, China;
| | - Yuxin Peng
- College of Mathematics and Informatics, College of Software Engineering, South China Agricultural University, Guangzhou 510642, China;
| | - Ye Li
- Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China;
| | - Jun Zhang
- Shenzhen Institute of Beidou Applied Technology, Shenzhen 518055, China;
| |
Collapse
|
19
|
Oliveira M, Chauhan S, Pereira F, Felgueiras C, Carvalho D. Blockchain Protocols and Edge Computing Targeting Industry 5.0 Needs. Sensors (Basel) 2023; 23:9174. [PMID: 38005558 PMCID: PMC10674496 DOI: 10.3390/s23229174] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/01/2023] [Revised: 10/02/2023] [Accepted: 11/10/2023] [Indexed: 11/26/2023]
Abstract
"Industry 5.0" is the latest industrial revolution. A variety of cutting-edge technologies, including artificial intelligence, the Internet of Things (IoT), and others, come together to form it. Billions of devices are connected for high-speed data transfer, especially in a 5G-enabled industrial environment for information collection and processing. Most of the issues, such as access control mechanism, time to fetch the data from different devices, and protocols used, may not be applicable in the future as these protocols are based upon a centralized mechanism. This centralized mechanism may have a single point of failure along with the computational overhead. Thus, there is a need for an efficient decentralized access control mechanism for device-to-device (D2D) communication in various industrial sectors, for example, sensors in different regions may collect and process the data for making intelligent decisions. In such an environment, reliability, security, and privacy are major concerns as most of the solutions are based upon a centralized control mechanism. To mitigate the aforementioned issues, this paper provides the opportunities for and highlights some of the most impressive initiatives that help to curve the future. This new era will bring about significant changes in the way businesses operate, allowing them to become more cost-effective, more efficient, and produce higher-quality goods and services. As sensors are getting more accurate, cheaper, and have lower time responses, 5G networks are being integrated, and more industrial equipment and machinery are becoming available; hence, various sectors, including the manufacturing sector, are going through a significant period of transition right now. Additionally, the emergence of the cloud enables modern production models that use the cloud (both internal and external services), networks, and systems to leverage the cloud's low cost, scalability, increased computational power, real-time communication, and data transfer capabilities to create much smarter and more autonomous systems. We discuss the ways in which decentralized networks that make use of protocols help to achieve decentralization and how network meshes can grow to make things more secure, reliable, and cohere with these technologies, which are not going away anytime soon. We emphasize the significance of new design in regard to cybersecurity, data integrity, and storage by using straightforward examples that have the potential to lead to the excellence of distributed systems. This groundbreaking paper delves deep into the world of industrial automation and explores the possibilities to adopt blockchain for developing solutions for smart cities, smart homes, healthcare, smart agriculture, autonomous vehicles, and supply chain management within Industry 5.0. With an in-depth examination of various consensus mechanisms, readers gain a comprehensive understanding of the latest developments in this field. The paper also explores the current issues and challenges associated with blockchain adaptation for industrial automation and provides a thorough comparison of the available consensus, enabling end customers to select the most suitable one based on its unique advantages. Case studies highlight how to enable the adoption of blockchain in Industry 5.0 solutions effectively and efficiently, offering valuable insights into the potential challenges that lie ahead, particularly for smart industrial applications.
Collapse
Affiliation(s)
- Miguel Oliveira
- Aveiro-North Polytechnic School, University of Aveiro, 3720-511 Oliveira de Azeméis, Portugal
| | | | - Filipe Pereira
- Oporto Higher Institute of Engineering, Oporto Polytechnic School, 4249-015 Porto, Portugal; (F.P.); (C.F.)
| | - Carlos Felgueiras
- Oporto Higher Institute of Engineering, Oporto Polytechnic School, 4249-015 Porto, Portugal; (F.P.); (C.F.)
| | | |
Collapse
|
20
|
Zha W, Li H, Wu G, Zhang L, Pan W, Gu L, Jiao J, Zhang Q. Research on the Recognition and Tracking of Group-Housed Pigs' Posture Based on Edge Computing. Sensors (Basel) 2023; 23:8952. [PMID: 37960652 PMCID: PMC10649120 DOI: 10.3390/s23218952] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/21/2023] [Revised: 11/01/2023] [Accepted: 11/01/2023] [Indexed: 11/15/2023]
Abstract
The existing algorithms for identifying and tracking pigs in barns generally have a large number of parameters, relatively complex networks and a high demand for computational resources, which are not suitable for deployment in embedded-edge nodes on farms. A lightweight multi-objective identification and tracking algorithm based on improved YOLOv5s and DeepSort was developed for group-housed pigs in this study. The identification algorithm was optimized by: (i) using a dilated convolution in the YOLOv5s backbone network to reduce the number of model parameters and computational power requirements; (ii) adding a coordinate attention mechanism to improve the model precision; and (iii) pruning the BN layers to reduce the computational requirements. The optimized identification model was combined with DeepSort to form the final Tracking by Detecting algorithm and ported to a Jetson AGX Xavier edge computing node. The algorithm reduced the model size by 65.3% compared to the original YOLOv5s. The algorithm achieved a recognition precision of 96.6%; a tracking time of 46 ms; and a tracking frame rate of 21.7 FPS, and the precision of the tracking statistics was greater than 90%. The model size and performance met the requirements for stable real-time operation in embedded-edge computing nodes for monitoring group-housed pigs.
Collapse
Affiliation(s)
- Wenwen Zha
- School of Information and Computer, Anhui Agricultural University, Hefei 230036, China; (W.Z.); (G.W.); (W.P.); (L.G.)
| | - Hualong Li
- Institute of Intelligent Machines, Chinese Academy of Sciences, Hefei 230031, China;
| | - Guodong Wu
- School of Information and Computer, Anhui Agricultural University, Hefei 230036, China; (W.Z.); (G.W.); (W.P.); (L.G.)
| | - Liping Zhang
- Institute of Agricultural Economy and Information, Anhui Academy of Agricultural Sciences, Hefei 230031, China;
| | - Weihao Pan
- School of Information and Computer, Anhui Agricultural University, Hefei 230036, China; (W.Z.); (G.W.); (W.P.); (L.G.)
| | - Lichuan Gu
- School of Information and Computer, Anhui Agricultural University, Hefei 230036, China; (W.Z.); (G.W.); (W.P.); (L.G.)
| | - Jun Jiao
- School of Information and Computer, Anhui Agricultural University, Hefei 230036, China; (W.Z.); (G.W.); (W.P.); (L.G.)
| | - Qiang Zhang
- Department of Biosystems Engineering, University of Manitoba, Winnipeg, MB R3T 5V6, Canada
| |
Collapse
|
21
|
Leng J, Chen X, Zhao J, Wang C, Zhu J, Yan Y, Zhao J, Shi W, Zhu Z, Jiang X, Lou Y, Feng C, Yang Q, Xu F. A Light Vehicle License-Plate-Recognition System Based on Hybrid Edge-Cloud Computing. Sensors (Basel) 2023; 23:8913. [PMID: 37960612 PMCID: PMC10650870 DOI: 10.3390/s23218913] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/23/2023] [Revised: 10/06/2023] [Accepted: 10/10/2023] [Indexed: 11/15/2023]
Abstract
With the world moving towards low-carbon and environmentally friendly development, the rapid growth of new-energy vehicles is evident. The utilization of deep-learning-based license-plate-recognition (LPR) algorithms has become widespread. However, existing LPR systems have difficulty achieving timely, effective, and energy-saving recognition due to their inherent limitations such as high latency and energy consumption. An innovative Edge-LPR system that leverages edge computing and lightweight network models is proposed in this paper. With the help of this technology, the excessive reliance on the computational capacity and the uneven implementation of resources of cloud computing can be successfully mitigated. The system is specifically a simple LPR. Channel pruning was used to reconstruct the backbone layer, reduce the network model parameters, and effectively reduce the GPU resource consumption. By utilizing the computing resources of the Intel second-generation computing stick, the network models were deployed on edge gateways to detect license plates directly. The reliability and effectiveness of the Edge-LPR system were validated through the experimental analysis of the CCPD standard dataset and real-time monitoring dataset from charging stations. The experimental results from the CCPD common dataset demonstrated that the network's total number of parameters was only 0.606 MB, with an impressive accuracy rate of 97%.
Collapse
Affiliation(s)
- Jiancai Leng
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Xinyi Chen
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Jinzhao Zhao
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Chongfeng Wang
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Jianqun Zhu
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Yihao Yan
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Jiaqi Zhao
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Weiyou Shi
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Zhaoxin Zhu
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Xiuquan Jiang
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Yitai Lou
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Chao Feng
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| | - Qingbo Yang
- School of Mathematics and Statistics, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China
| | - Fangzhou Xu
- International School of Optoelectronic Engineering, Qilu University of Technology (Shandong Academy of Sciences), 3501 Daxue Road, Changqing District, Jinan 250300, China; (J.L.); (X.C.); (J.Z.); (C.W.); (J.Z.); (Y.Y.); (J.Z.); (W.S.); (Z.Z.); (X.J.); (Y.L.); (C.F.)
| |
Collapse
|
22
|
Tulkinbekov K, Kim DH. Data Modifications in Blockchain Architecture for Big-Data Processing. Sensors (Basel) 2023; 23:8762. [PMID: 37960462 PMCID: PMC10648256 DOI: 10.3390/s23218762] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/03/2023] [Revised: 10/21/2023] [Accepted: 10/25/2023] [Indexed: 11/15/2023]
Abstract
Due to the immutability of blockchain, the integration with big-data systems creates limitations on redundancy, scalability, cost, and latency. Additionally, large amounts of invaluable data result in the waste of energy and storage resources. As a result, the demand for data deletion possibilities in blockchain has risen over the last decade. Although several prior studies have introduced methods to address data modification features in blockchain, most of the proposed systems need shorter deletion delays and security requirements. This study proposes a novel blockchain architecture called Unlichain that provides data-modification features within public blockchain architecture. To achieve this goal, Unlichain employed a new indexing technique that defines the deletion time for predefined lifetime data. The indexing technique also enables the deletion possibility for unknown lifetime data. Unlichain employs a new metadata verification consensus among full and meta nodes to avoid delays and extra storage usage. Moreover, Unlichain motivates network nodes to include more transactions in a new block, which motivates nodes to scan for expired data during block mining. The evaluations proved that Unlichain architecture successfully enables instant data deletion while the existing solutions suffer from block dependency issues. Additionally, storage usage is reduced by up to 10%.
Collapse
Affiliation(s)
| | - Deok-Hwan Kim
- Department of Electrical and Computer Engineering, Inha University, Incheon 22212, Republic of Korea;
| |
Collapse
|
23
|
Molina-Rotger M, Morán A, Miranda MA, Alorda-Ladaria B. Remote fruit fly detection using computer vision and machine learning-based electronic trap. Front Plant Sci 2023; 14:1241576. [PMID: 37881610 PMCID: PMC10595146 DOI: 10.3389/fpls.2023.1241576] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/16/2023] [Accepted: 09/18/2023] [Indexed: 10/27/2023]
Abstract
Introduction Intelligent monitoring systems must be put in place to practice precision agriculture. In this context, computer vision and artificial intelligence techniques can be applied to monitor and prevent pests, such as that of the olive fly. These techniques are a tool to discover patterns and abnormalities in the data, which helps the early detection of pests and the prompt administration of corrective measures. However, there are significant challenges due to the lack of data to apply state of the art Deep Learning techniques. Methods This article examines the detection and classification of the olive fly using the Random Forest and Support Vector Machine algorithms, as well as their application in an electronic trap version based on a Raspberry Pi B+ board. Results The combination of the two methods is suggested to increase the accuracy of the classification results while working with a small training data set. Combining both techniques for olive fly detection yields an accuracy of 89.1%, which increases to 94.5% for SVM and 91.9% for RF when comparing all fly species to other insects. Discussion This research results reports a successful implementation of ML in an electronic trap system for olive fly detection, providing valuable insights and benefits. The opportunities of using small IoT devices for image classification opens new possibilities, emphasizing the significance of ML in optimizing resource usage and enhancing privacy protection. As the system grows by increasing the number of electronic traps, more data will be available. Therefore, it holds the potential to further enhance accuracy by learning from multiple trap systems, making it a promising tool for effective and sustainable fly population management.
Collapse
Affiliation(s)
- Miguel Molina-Rotger
- Industrial Engineering and Construction Department, University of the Balearic Islands, Palma, Spain
| | - Alejandro Morán
- Industrial Engineering and Construction Department, University of the Balearic Islands, Palma, Spain
| | - Miguel Angel Miranda
- Biology Department, University of the Balearic Islands, Palma, Spain
- Institute for Environmental Agro-Environmental Research and Water Economics, University of the Balearic Islands, Palma, Spain
| | - Bartomeu Alorda-Ladaria
- Industrial Engineering and Construction Department, University of the Balearic Islands, Palma, Spain
- Institute for Environmental Agro-Environmental Research and Water Economics, University of the Balearic Islands, Palma, Spain
- Health Science and Technology Cross-cutting Department, Balearic Islands Health Research Institute (IdISBa), Palma, Spain
| |
Collapse
|
24
|
Jin W, Hong YG, Song J, Kim J, Kim D. Transparent Rule Enablement Based on Commonization Approach in Heterogeneous IoT Edge Networks. Sensors (Basel) 2023; 23:8282. [PMID: 37837112 PMCID: PMC10575268 DOI: 10.3390/s23198282] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/04/2023] [Revised: 09/26/2023] [Accepted: 09/28/2023] [Indexed: 10/15/2023]
Abstract
The paradigm of the Internet of Things (IoT) and edge computing brings a number of heterogeneous devices to the network edge for monitoring and controlling the environment. For reacting to events dynamically and automatically in the environment, rule-enabled IoT edge platforms operate the deployed service scenarios at the network edge, based on filtering events to perform control actions. However, due to the heterogeneity of the IoT edge networks, deploying a consistent rule context for operating a consistent rule scenario on multiple heterogeneous IoT edge platforms is difficult because of the difference in protocols and data formats. In this paper, we propose a transparent rule enablement, based on the commonization approach, for enabling a consistent rule scenario in heterogeneous IoT edge networks. The proposed IoT Edge Rule Agent Platform (IERAP) deploys device proxies to share consistent rules with IoT edge platforms without considering the difference in protocols and data formats. Therefore, each device proxy only considers the translation of the corresponding platform-specific and common formats. Also, the rules are deployed by the corresponding device proxy, which enables rules to be deployed to heterogeneous IoT edge platforms to perform the consistent rule scenario without considering the format and underlying protocols of the destination platform.
Collapse
Affiliation(s)
- Wenquan Jin
- Department of Electronic & Communication Engineering, Engineering College, Yanbian University, Yanji 133002, China;
| | - Yong-Geun Hong
- Department of Artificial Intelligence & Convergence, Daejeon University, Daejeon 300716, Republic of Korea;
| | - Jaeseung Song
- Department of Computer and Information Security, Sejong University, Seoul 05006, Republic of Korea;
| | - Jaeho Kim
- Department of Electric Engineering, Sejong University, Seoul 05006, Republic of Korea;
| | - Dohyeun Kim
- Department of Computer Engineering, Jeju National University, Jeju 63243, Republic of Korea
| |
Collapse
|
25
|
Hornik J, Rachamim M, Graguer S. Fog computing: a platform for big-data marketing analytics. Front Artif Intell 2023; 6:1242574. [PMID: 37859937 PMCID: PMC10582701 DOI: 10.3389/frai.2023.1242574] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/19/2023] [Accepted: 09/14/2023] [Indexed: 10/21/2023] Open
Abstract
Marketing science embraces a wider variety of data types and measurement tools necessary for strategy, research, and applied decision making. Managing the marketing data generated by internet of things (IoT) sensors and actuators is one of the biggest challenges faced by marketing managers when deploying an IoT system. This short note shows how traditional cloud-based IoT systems are challenged by the large scale, heterogeneity, and high latency witnessed in some cloud ecosystems. It introduces researchers to one recent breakthrough, fog computing, an emerging concept that decentralizes applications, strategies, and data analytics into the network itself using a distributed and federated computing model. It transforms centralized cloud to distributed fog by bringing storage and computation closer to the user end. Fog computing is considered a novel marketplace phenomenon which can support AI and management strategies, especially for the design of "smart marketing".
Collapse
Affiliation(s)
- Jacob Hornik
- Coller School of Management, Tel-Aviv University, Tel Aviv, Israel
| | - Matti Rachamim
- School of Business Administration, Bar-Ilan University, Ramat Gan, Israel
| | | |
Collapse
|
26
|
Yuan J, Zhang Y, Wei C, Zhu R. A Fully Self-Powered Wearable Leg Movement Sensing System for Human Health Monitoring. Adv Sci (Weinh) 2023; 10:e2303114. [PMID: 37590377 PMCID: PMC10582417 DOI: 10.1002/advs.202303114] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/15/2023] [Revised: 07/18/2023] [Indexed: 08/19/2023]
Abstract
Energy-autonomous wearable human activity monitoring is imperative for daily healthcare, benefiting from long-term sustainable uses. Herein, a fully self-powered wearable system, enabling real-time monitoring and assessments of human multimodal health parameters including knee joint movement, metabolic energy, locomotion speed, and skin temperature, which are fully self-powered by highly-efficient flexible thermoelectric generators (f-TEGs) is proposed and developed. The wearable system is composed of f-TEGs, fabric strain sensors, ultra-low-power edge computing, and Bluetooth. The f-TEGs worn on the leg not only harvest energy from body heat and supply power sustainably for the whole monitoring system, but also serve as zero-power motion sensors to detect limb movement and skin temperature. The fabric strain sensor made by printing PEDOT: PSS on pre-stretched nylon fiber-wrapped rubber band enables high-fidelity and ultralow-power measurements on highly-dynamic knee movements. Edge computing is elaborately designed to estimate multimodal health parameters including time-varying metabolic energy in real-time, which are wirelessly transmitted via Bluetooth. The whole monitoring system is operated automatically and intelligently, works sustainably in both static and dynamic states, and is fully self-powered by the f-TEGs.
Collapse
Affiliation(s)
- Jinfeng Yuan
- State Key Laboratory of Precision Measurement Technology and InstrumentsDepartment of Precision InstrumentTsinghua UniversityBeijing100084China
| | - Yuzhong Zhang
- State Key Laboratory of Precision Measurement Technology and InstrumentsDepartment of Precision InstrumentTsinghua UniversityBeijing100084China
| | - Caise Wei
- State Key Laboratory of Precision Measurement Technology and InstrumentsDepartment of Precision InstrumentTsinghua UniversityBeijing100084China
| | - Rong Zhu
- State Key Laboratory of Precision Measurement Technology and InstrumentsDepartment of Precision InstrumentTsinghua UniversityBeijing100084China
| |
Collapse
|
27
|
Yan R, Gu Y, Zhang Z, Jiao S. Vehicle Trajectory Prediction Method for Task Offloading in Vehicular Edge Computing. Sensors (Basel) 2023; 23:7954. [PMID: 37766013 PMCID: PMC10536581 DOI: 10.3390/s23187954] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/03/2023] [Revised: 09/15/2023] [Accepted: 09/16/2023] [Indexed: 09/29/2023]
Abstract
Real-time computation tasks in vehicular edge computing (VEC) provide convenience for vehicle users. However, the efficiency of task offloading seriously affects the quality of service (QoS). The predictive-mode task offloading is limited by computation resources, storage resources and the timeliness of vehicle trajectory data. Meanwhile, machine learning is difficult to deploy on edge servers. In this paper, we propose a vehicle trajectory prediction method based on the vehicle frequent pattern for task offloading in VEC. First, in the initialization stage, a T-pattern prediction tree (TPPT) is constructed based on the historical vehicle trajectory data. Secondly, when predicting the vehicle trajectory, the vehicle frequent itemset with the largest vehicle trajectory support is found in the vehicle frequent itemset of the TPPT. Finally, in the update stage, the TPPT is updated in real time with the predicted vehicle trajectory results. Meanwhile, based on the proposed prediction method, the strategies of task offloading and optimization algorithm are designed to minimize energy consumption with time constraints. The experiments are carried out on real-vehicle datasets and the Capital Bikeshare datasets. The results show that compared with the baseline T-pattern method, the accuracy of the prediction method is improved by more than 10% and the prediction efficiency is improved by more than 6.5 times. The vehicle trajectory prediction method based on the vehicle frequent pattern has high accuracy and prediction efficiency, which can solve the problem of vehicle trajectory prediction for task offloading.
Collapse
Affiliation(s)
- Ruibin Yan
- College of Information and Cyber Security, People's Public Security University of China, Beijing 102600, China
| | - Yijun Gu
- College of Information and Cyber Security, People's Public Security University of China, Beijing 102600, China
| | - Zeyu Zhang
- College of Information and Cyber Security, People's Public Security University of China, Beijing 102600, China
| | - Shouzhong Jiao
- College of Information and Cyber Security, People's Public Security University of China, Beijing 102600, China
| |
Collapse
|
28
|
Zhang J, Yang L, Tang Y, Jin M, Wang S. A Novel Edge Cache-Based Private Set Intersection Protocol via Lightweight Oblivious PRF. Entropy (Basel) 2023; 25:1347. [PMID: 37761646 PMCID: PMC10529067 DOI: 10.3390/e25091347] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/12/2023] [Revised: 09/01/2023] [Accepted: 09/12/2023] [Indexed: 09/29/2023]
Abstract
With the rapid development of edge computing and the Internet of Things, the problem of information resource sharing can be effectively solved through multi-party collaboration, but the risk of data leakage is also increasing. To address the above issues, we propose an efficient multi-party private set intersection (MPSI) protocol via a multi-point oblivious pseudorandom function (OPRF). Then, we apply it to work on a specific commercial application: edge caching. The proposed MPSI uses oblivious transfer (OT) together with a probe-and-XOR of strings (PaXoS) as the main building blocks. It not only provides one-sided malicious security, but also achieves a better balance between communication and computational overhead. From the communication pattern perspective, the client only needs to perform OT with the leader and send a data structure PaXoS to the designated party, making the protocol extremely efficient. Moreover, in the setting of edge caching, many parties hold a set of items containing an identity and its associated value. All parties can identify a set of the most frequently accessed common items without revealing the underlying data.
Collapse
Affiliation(s)
| | | | - Yongli Tang
- College of Software, Henan Polytechnic University, Jiaozuo 454000, China
| | | | | |
Collapse
|
29
|
Urblik L, Kajati E, Papcun P, Zolotova I. A Modular Framework for Data Processing at the Edge: Design and Implementation. Sensors (Basel) 2023; 23:7662. [PMID: 37688118 PMCID: PMC10490771 DOI: 10.3390/s23177662] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/28/2023] [Revised: 08/26/2023] [Accepted: 09/02/2023] [Indexed: 09/10/2023]
Abstract
There is a rapid increase in the number of edge devices in IoT solutions, generating vast amounts of data that need to be processed and analyzed efficiently. Traditional cloud-based architectures can face latency, bandwidth, and privacy challenges when dealing with this data flood. There is currently no unified approach to the creation of edge computing solutions. This work addresses this problem by exploring containerization for data processing solutions at the network's edge. The current approach involves creating a specialized application compatible with the device used. Another approach involves using containerization for deployment and monitoring. The heterogeneity of edge environments would greatly benefit from a universal modular platform. Our proposed edge computing-based framework implements a streaming extract, transform, and load pipeline for data processing and analysis using ZeroMQ as the communication backbone and containerization for scalable deployment. Results demonstrate the effectiveness of the proposed framework, making it suitable for time-sensitive IoT applications.
Collapse
Affiliation(s)
- Lubomir Urblik
- Department of Cybernetics and Artificial Intelligence, Faculty of EE & Informatics, Technical University of Kosice, 042 00 Kosice, Slovakia; (E.K.); (P.P.)
| | | | | | - Iveta Zolotova
- Department of Cybernetics and Artificial Intelligence, Faculty of EE & Informatics, Technical University of Kosice, 042 00 Kosice, Slovakia; (E.K.); (P.P.)
| |
Collapse
|
30
|
Qiu S, Zhao J, Zhang X, Li A, Wang Y, Chen F. Cluster Head Selection Method for Edge Computing WSN Based on Improved Sparrow Search Algorithm. Sensors (Basel) 2023; 23:7572. [PMID: 37688024 PMCID: PMC10490593 DOI: 10.3390/s23177572] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/20/2023] [Revised: 08/16/2023] [Accepted: 08/25/2023] [Indexed: 09/10/2023]
Abstract
Sensor nodes are widely distributed in the Internet of Things and communicate with each other to form a wireless sensor network (WSN), which plays a vital role in people's productivity and life. However, the energy of WSN nodes is limited, so this paper proposes a two-layer WSN system based on edge computing to solve the problems of high energy consumption and short life cycle of WSN data transmission and establishes wireless energy consumption and distance optimization models for sensor networks. Specifically, we propose the optimization objective of balancing load and distance factors. We adopt an improved sparrow search algorithm to evenly distribute sensor nodes in the system to reduce resource consumption, consumption, and network life. Through the simulation experiment, our method is illustrated, effectively reducing the network's energy consumption by 26.8% and prolonging the network's life cycle.
Collapse
Affiliation(s)
- Shaoming Qiu
- Communication and Network Laboratory, Dalian University, Dalian 116622, China (F.C.)
| | - Jiancheng Zhao
- Communication and Network Laboratory, Dalian University, Dalian 116622, China (F.C.)
| | - Xuecui Zhang
- North Automatic Control Technology Institute, Taiyuan 030006, China
| | - Ao Li
- Communication and Network Laboratory, Dalian University, Dalian 116622, China (F.C.)
| | - Yahui Wang
- Communication and Network Laboratory, Dalian University, Dalian 116622, China (F.C.)
| | - Fen Chen
- Communication and Network Laboratory, Dalian University, Dalian 116622, China (F.C.)
| |
Collapse
|
31
|
Żyliński M, Nassibi A, Mandic DP. Design and Implementation of an Atrial Fibrillation Detection Algorithm on the ARM Cortex-M4 Microcontroller. Sensors (Basel) 2023; 23:7521. [PMID: 37687975 PMCID: PMC10490693 DOI: 10.3390/s23177521] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/21/2023] [Revised: 08/25/2023] [Accepted: 08/26/2023] [Indexed: 09/10/2023]
Abstract
At present, a medium-level microcontroller is capable of performing edge computing and can handle the computation of neural network kernel functions. This makes it possible to implement a complete end-to-end solution incorporating signal acquisition, digital signal processing, and machine learning for the classification of cardiac arrhythmias on a small wearable device. In this work, we describe the design and implementation of several classifiers for atrial fibrillation detection on a general-purpose ARM Cortex-M4 microcontroller. We used the CMSIS-DSP library, which supports Naïve Bayes and Support Vector Machine classifiers, with different kernel functions. We also developed Python scripts to automatically transfer the Python model (trained in Scikit-learn) to the C environment. To train and evaluate the models, we used part of the data from the PhysioNet/Computing in Cardiology Challenge 2020 and performed simple classification of atrial fibrillation based on heart-rate irregularity. The performance of the classifiers was tested on a general-purpose ARM Cortex-M4 microcontroller (STM32WB55RG). Our study reveals that among the tested classifiers, the SVM classifier with RBF kernel function achieves the highest accuracy of 96.9%, sensitivity of 98.4%, and specificity of 95.8%. The execution time of this classifier was 720 μs per recording. We also discuss the advantages of moving computing tasks to edge devices, including increased power efficiency of the system, improved patient data privacy and security, and reduced overall system operation costs. In addition, we highlight a problem with false-positive detection and unclear significance of device-detected atrial fibrillation.
Collapse
Affiliation(s)
- Marek Żyliński
- Department of Electrical and Electronic Engineering, Imperial College London, London SW7 2AZ, UK; (A.N.); (D.P.M.)
| | | | | |
Collapse
|
32
|
Alotaibi B. A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. Sensors (Basel) 2023; 23:7470. [PMID: 37687926 PMCID: PMC10490764 DOI: 10.3390/s23177470] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/10/2023] [Revised: 08/20/2023] [Accepted: 08/24/2023] [Indexed: 09/10/2023]
Abstract
The Industrial Internet of Things (IIoT) paradigm is a key research area derived from the Internet of Things (IoT). The emergence of IIoT has enabled a revolution in manufacturing and production, through the employment of various embedded sensing devices connected by an IoT network, along with a collection of enabling technologies, such as artificial intelligence (AI) and edge/fog computing. One of the unrivaled characteristics of IIoT is the inter-connectivity provided to industries; however, this characteristic might open the door for cyber-criminals to launch various attacks. In fact, one of the major challenges hindering the prevalent adoption of the IIoT paradigm is IoT security. Inevitably, there has been an inevitable increase in research proposals over the last decade to overcome these security concerns. To obtain an overview of this research area, conducting a literature survey of the published research is necessary, eliciting the various security requirements and their considerations. This paper provides a literature survey of IIoT security, focused on the period from 2017 to 2023. We identify IIoT security threats and classify them into three categories, based on the IIoT layer they exploit to launch these attacks. Additionally, we characterize the security requirements that these attacks violate. Finally, we highlight how emerging technologies, such as AI and edge/fog computing, can be adopted to address security concerns and enhance IIoT security.
Collapse
Affiliation(s)
- Bandar Alotaibi
- Department of Information Technology, University of Tabuk, Tabuk 47731, Saudi Arabia
| |
Collapse
|
33
|
Chin CL, Lin CC, Wang JW, Chin WC, Chen YH, Chang SW, Huang PC, Zhu X, Hsu YL, Liu SH. A Wearable Assistant Device for the Hearing Impaired to Recognize Emergency Vehicle Sirens with Edge Computing. Sensors (Basel) 2023; 23:7454. [PMID: 37687910 PMCID: PMC10490602 DOI: 10.3390/s23177454] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/07/2023] [Revised: 08/21/2023] [Accepted: 08/24/2023] [Indexed: 09/10/2023]
Abstract
Wearable assistant devices play an important role in daily life for people with disabilities. Those who have hearing impairments may face dangers while walking or driving on the road. The major danger is their inability to hear warning sounds from cars or ambulances. Thus, the aim of this study is to develop a wearable assistant device with edge computing, allowing the hearing impaired to recognize the warning sounds from vehicles on the road. An EfficientNet-based, fuzzy rank-based ensemble model was proposed to classify seven audio sounds, and it was embedded in an Arduino Nano 33 BLE Sense development board. The audio files were obtained from the CREMA-D dataset and the Large-Scale Audio dataset of emergency vehicle sirens on the road, with a total number of 8756 files. The seven audio sounds included four vocalizations and three sirens. The audio signal was converted into a spectrogram by using the short-time Fourier transform for feature extraction. When one of the three sirens was detected, the wearable assistant device presented alarms by vibrating and displaying messages on the OLED panel. The performances of the EfficientNet-based, fuzzy rank-based ensemble model in offline computing achieved an accuracy of 97.1%, precision of 97.79%, sensitivity of 96.8%, and specificity of 97.04%. In edge computing, the results comprised an accuracy of 95.2%, precision of 93.2%, sensitivity of 95.3%, and specificity of 95.1%. Thus, the proposed wearable assistant device has the potential benefit of helping the hearing impaired to avoid traffic accidents.
Collapse
Affiliation(s)
- Chiun-Li Chin
- Department of Medical Informatics, Chung Shan Medical University, Taichung 40201, Taiwan; (C.-L.C.); (C.-C.L.); (J.-W.W.); (W.-C.C.); (Y.-H.C.); (S.-W.C.); (P.-C.H.)
| | - Chia-Chun Lin
- Department of Medical Informatics, Chung Shan Medical University, Taichung 40201, Taiwan; (C.-L.C.); (C.-C.L.); (J.-W.W.); (W.-C.C.); (Y.-H.C.); (S.-W.C.); (P.-C.H.)
| | - Jing-Wen Wang
- Department of Medical Informatics, Chung Shan Medical University, Taichung 40201, Taiwan; (C.-L.C.); (C.-C.L.); (J.-W.W.); (W.-C.C.); (Y.-H.C.); (S.-W.C.); (P.-C.H.)
| | - Wei-Cheng Chin
- Department of Medical Informatics, Chung Shan Medical University, Taichung 40201, Taiwan; (C.-L.C.); (C.-C.L.); (J.-W.W.); (W.-C.C.); (Y.-H.C.); (S.-W.C.); (P.-C.H.)
| | - Yu-Hsiang Chen
- Department of Medical Informatics, Chung Shan Medical University, Taichung 40201, Taiwan; (C.-L.C.); (C.-C.L.); (J.-W.W.); (W.-C.C.); (Y.-H.C.); (S.-W.C.); (P.-C.H.)
| | - Sheng-Wen Chang
- Department of Medical Informatics, Chung Shan Medical University, Taichung 40201, Taiwan; (C.-L.C.); (C.-C.L.); (J.-W.W.); (W.-C.C.); (Y.-H.C.); (S.-W.C.); (P.-C.H.)
| | - Pei-Chen Huang
- Department of Medical Informatics, Chung Shan Medical University, Taichung 40201, Taiwan; (C.-L.C.); (C.-C.L.); (J.-W.W.); (W.-C.C.); (Y.-H.C.); (S.-W.C.); (P.-C.H.)
| | - Xin Zhu
- Division of Information Systems, School of Computer Science and Engineering, The University of Aizu, Aizu-Wakamatsu 965-8580, Fukushima, Japan;
| | - Yu-Lun Hsu
- Bachelor’s Program of Sports and Health Promotion, Fo Guang University, Yilan 26247, Taiwan;
| | - Shing-Hong Liu
- Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 41349, Taiwan
| |
Collapse
|
34
|
Almudayni Z, Soh B, Li A. Enhancing Energy Efficiency and Fast Decision Making for Medical Sensors in Healthcare Systems: An Overview and Novel Proposal. Sensors (Basel) 2023; 23:7286. [PMID: 37631822 PMCID: PMC10458451 DOI: 10.3390/s23167286] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 08/01/2023] [Revised: 08/14/2023] [Accepted: 08/18/2023] [Indexed: 08/27/2023]
Abstract
In the realm of the Internet of Things (IoT), a network of sensors and actuators collaborates to fulfill specific tasks. As the demand for IoT networks continues to rise, it becomes crucial to ensure the stability of this technology and adapt it for further expansion. Through an analysis of related works, including the feedback-based optimized fuzzy scheduling approach (FOFSA) algorithm, the adaptive task allocation technique (ATAT), and the osmosis load balancing algorithm (OLB), we identify their limitations in achieving optimal energy efficiency and fast decision making. To address these limitations, this research introduces a novel approach to enhance the processing time and energy efficiency of IoT networks. The proposed approach achieves this by efficiently allocating IoT data resources in the Mist layer during the early stages. We apply the approach to our proposed system known as the Mist-based fuzzy healthcare system (MFHS) that demonstrates promising potential to overcome the existing challenges and pave the way for the efficient industrial Internet of healthcare things (IIoHT) of the future.
Collapse
Affiliation(s)
- Ziyad Almudayni
- Department of Computer Science and Information Technology, School of Computing, Engineering and Mathematical Sciences, La Trobe University, Bundoora, VIC 3086, Australia;
| | - Ben Soh
- Department of Computer Science and Information Technology, School of Computing, Engineering and Mathematical Sciences, La Trobe University, Bundoora, VIC 3086, Australia;
| | - Alice Li
- La Trobe Business School, La Trobe University, Bundoora, VIC 3086, Australia;
| |
Collapse
|
35
|
Srinivasagan R, Mohammed M, Alzahrani A. TinyML-Sensor for Shelf Life Estimation of Fresh Date Fruits. Sensors (Basel) 2023; 23:7081. [PMID: 37631618 PMCID: PMC10457898 DOI: 10.3390/s23167081] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/22/2023] [Revised: 08/02/2023] [Accepted: 08/08/2023] [Indexed: 08/27/2023]
Abstract
Fresh dates have a limited shelf life and are susceptible to spoilage, which can lead to economic losses for producers and suppliers. The problem of accurate shelf life estimation for fresh dates is essential for various stakeholders involved in the production, supply, and consumption of dates. Modified atmosphere packaging (MAP) is one of the essential methods that improves the quality and increases the shelf life of fresh dates by reducing the rate of ripening. Therefore, this study aims to apply fast and cost-effective non-destructive techniques based on machine learning (ML) to predict and estimate the shelf life of stored fresh date fruits under different conditions. Predicting and estimating the shelf life of stored date fruits is essential for scheduling them for consumption at the right time in the supply chain to benefit from the nutritional advantages of fresh dates. The study observed the physicochemical attributes of fresh date fruits, including moisture content, total soluble solids, sugar content, tannin content, pH, and firmness, during storage in a vacuum and MAP at 5 and 24 ∘C every 7 days to determine the shelf life using a non-destructive approach. TinyML-compatible regression models were employed to predict the stages of fruit development during the storage period. The decrease in the shelf life of the fruits begins when they transition from the Khalal stage to the Rutab stage, and the shelf life ends when they start to spoil or ripen to the Tamr stage. Low-cost Visible-Near-Infrared (VisNIR) spectral sensors (AS7265x-multi-spectral) were used to capture the internal physicochemical attributes of the fresh fruit. Regression models were employed for shelf life estimation. The findings indicated that vacuum and modified atmosphere packaging with 20% CO2 and N balance efficiently increased the shelf life of the stored fresh fruit to 53 days and 44 days, respectively, when maintained at 5 ∘C. However, the shelf life decreased to 44 and 23 days when the vacuum and modified atmosphere packaging with 20% CO2 and N balance were maintained at room temperature (24 ∘C). Edge Impulse supports the training and deployment of models on low-cost microcontrollers, which can be used to predict real-time estimations of the shelf life of fresh dates using TinyML sensors.
Collapse
Affiliation(s)
- Ramasamy Srinivasagan
- Department of Computer Engineering, College of Computer Sciences and Information Technology, King Faisal University, Al Hofuf 36362, Saudi Arabia;
| | - Maged Mohammed
- Date Palm Research Center of Excellence, King Faisal University, Al Hofuf 36362, Saudi Arabia;
- Agricultural and Biosystems Engineering Department, Faculty of Agriculture, Menoufia University, Shebin El Koum 32514, Egypt
| | - Ali Alzahrani
- Department of Computer Engineering, College of Computer Sciences and Information Technology, King Faisal University, Al Hofuf 36362, Saudi Arabia;
| |
Collapse
|
36
|
Qiu X, Yu J, Zhuang W, Li G, Sun X. Channel Prediction-Based Security Authentication for Artificial Intelligence of Things. Sensors (Basel) 2023; 23:6711. [PMID: 37571494 PMCID: PMC10422243 DOI: 10.3390/s23156711] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/29/2023] [Revised: 07/15/2023] [Accepted: 07/24/2023] [Indexed: 08/13/2023]
Abstract
The emerging physical-layer unclonable attribute-aided authentication (PLUA) schemes are capable of outperforming traditional isolated approaches, with the advantage of having reliable fingerprints. However, conventional PLUA methods face new challenges in artificial intelligence of things (AIoT) applications owing to their limited flexibility. These challenges arise from the distributed nature of AIoT devices and the involved information, as well as the requirement for short end-to-end latency. To address these challenges, we propose a security authentication scheme that utilizes intelligent prediction mechanisms to detect spoofing attack. Our approach is based on a dynamic authentication method using long short term memory (LSTM), where the edge computing node observes and predicts the time-varying channel information of access devices to detect clone nodes. Additionally, we introduce a Savitzky-Golay filter-assisted high order cumulant feature extraction model (SGF-HOCM) for preprocessing channel information. By utilizing future channel attributes instead of relying solely on previous channel information, our proposed approach enables authentication decisions. We have conducted extensive experiments in actual industrial environments to validate our prediction-based security strategy, which has achieved an accuracy of 97%.
Collapse
Affiliation(s)
- Xiaoying Qiu
- School of Information and Management, Beijing Information Science & Technology University, Beijing 100192, China; (W.Z.); (G.L.); (X.S.)
| | - Jinwei Yu
- School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China;
| | - Wenying Zhuang
- School of Information and Management, Beijing Information Science & Technology University, Beijing 100192, China; (W.Z.); (G.L.); (X.S.)
| | - Guangda Li
- School of Information and Management, Beijing Information Science & Technology University, Beijing 100192, China; (W.Z.); (G.L.); (X.S.)
| | - Xuan Sun
- School of Information and Management, Beijing Information Science & Technology University, Beijing 100192, China; (W.Z.); (G.L.); (X.S.)
| |
Collapse
|
37
|
Kang H, Ai L, Zhen Z, Lu B, Man Z, Yi P, Li M, Lin L. A Novel Deep Learning Model for Accurate Pest Detection and Edge Computing Deployment. Insects 2023; 14:660. [PMID: 37504666 PMCID: PMC10380246 DOI: 10.3390/insects14070660] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/12/2023] [Revised: 06/30/2023] [Accepted: 07/10/2023] [Indexed: 07/29/2023]
Abstract
In this work, an attention-mechanism-enhanced method based on a single-stage object detection model was proposed and implemented for the problem of rice pest detection. A multi-scale feature fusion network was first constructed to improve the model's predictive accuracy when dealing with pests of different scales. Attention mechanisms were then introduced to enable the model to focus more on the pest areas in the images, significantly enhancing the model's performance. Additionally, a small knowledge distillation network was designed for edge computing scenarios, achieving a high inference speed while maintaining a high accuracy. Experimental verification on the IDADP dataset shows that the model outperforms current state-of-the-art object detection models in terms of precision, recall, accuracy, mAP, and FPS. Specifically, a mAP of 87.5% and an FPS value of 56 were achieved, significantly outperforming other comparative models. These results sufficiently demonstrate the effectiveness and superiority of the proposed method.
Collapse
Affiliation(s)
- Huangyi Kang
- College of Information and Electrical Engineering, China Agricultural University, Beijing 100083, China
| | - Luxin Ai
- College of Plant Protection, China Agricultural University, Beijing 100083, China
| | - Zengyi Zhen
- College of Information and Electrical Engineering, China Agricultural University, Beijing 100083, China
| | - Baojia Lu
- Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
| | - Zhangli Man
- College of Plant Protection, China Agricultural University, Beijing 100083, China
| | - Pengyu Yi
- College of Information and Electrical Engineering, China Agricultural University, Beijing 100083, China
| | - Manzhou Li
- College of Plant Protection, China Agricultural University, Beijing 100083, China
| | - Li Lin
- College of Information and Electrical Engineering, China Agricultural University, Beijing 100083, China
| |
Collapse
|
38
|
Yang Y, Lv S, Li X, Wang X, Wang Q, Yuan Y, Liang S, Zhang F. An Ultra-Low-Power Analog Multiplier-Divider Compatible with Digital Code for RRAM-Based Computing-in-Memory Macros. Micromachines (Basel) 2023; 14:1482. [PMID: 37512793 PMCID: PMC10383279 DOI: 10.3390/mi14071482] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/07/2023] [Revised: 07/17/2023] [Accepted: 07/18/2023] [Indexed: 07/30/2023]
Abstract
This manuscript presents an ultra-low-power analog multiplier-divider compatible with digital code words, which is applicable to the integrated structure of resistive random-access memory (RRAM)-based computing-in-memory (CIM) macros. Current multiplication and division are accomplished by a current-mirror-based structure. Compared with digital dividers to achieve higher precision and operation speed, analog dividers present the advantages of a reduced power consumption and a simple circuit structure in lower precision operations, thus improving the energy efficiency. Designed and fabricated in a 55 nm CMOS process, the proposed work is capable of achieving 8-bit precision for analog current multiplication and division operations. Measurement results show that the signal delay is 1 μs when performing 8-bit operation, with a bandwidth of 1.4 MHz. The power consumption is less than 6.15 μW with a 1.2 V supply voltage. The proposed multiplier-divider can increase the operation capacity by dividing the input current and digital code while reducing the power consumption and complexity required by division, which can be further utilized in real-time operation of edge computing devices.
Collapse
Affiliation(s)
- Yiming Yang
- School of Integrated Circuits and Electronics, Beijing Institute of Technology, Beijing 100081, China
| | - Shidong Lv
- School of Integrated Circuits and Electronics, Beijing Institute of Technology, Beijing 100081, China
| | - Xiaoran Li
- School of Integrated Circuits and Electronics, Beijing Institute of Technology, Beijing 100081, China
- BIT Chongqing Institute of Microelectronics and Microsystems, Chongqing 401332, China
| | - Xinghua Wang
- School of Integrated Circuits and Electronics, Beijing Institute of Technology, Beijing 100081, China
- BIT Chongqing Institute of Microelectronics and Microsystems, Chongqing 401332, China
- Yangtze Delta Region Academy of Beijing Institute of Technology, Jiaxing 314000, China
| | - Qian Wang
- School of Integrated Circuits and Electronics, Beijing Institute of Technology, Beijing 100081, China
| | - Yiyang Yuan
- Institute of Microelectronics, Chinese Academy of Sciences, Beijing 100029, China
| | - Sen Liang
- School of Integrated Circuits and Electronics, Beijing Institute of Technology, Beijing 100081, China
| | - Feng Zhang
- Institute of Microelectronics, Chinese Academy of Sciences, Beijing 100029, China
| |
Collapse
|
39
|
Montiel-Caminos J, Hernandez-Gonzalez NG, Sosa J, Montiel-Nelson JA. Integer Arithmetic Algorithm for Fundamental Frequency Identification of Oceanic Currents. Sensors (Basel) 2023; 23:6549. [PMID: 37514843 PMCID: PMC10383303 DOI: 10.3390/s23146549] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/28/2023] [Revised: 07/07/2023] [Accepted: 07/17/2023] [Indexed: 07/30/2023]
Abstract
Underwater sensor networks play a crucial role in collecting valuable data to monitor offshore aquaculture infrastructures. The number of deployed devices not only impacts the bandwidth for a highly constrained communication environment, but also the cost of the sensor network. On the other hand, industrial and literature current meters work as raw data loggers, and most of the calculations to determine the fundamental frequencies are performed offline on a desktop computer or in the cloud. Belonging to the edge computing research area, this paper presents an algorithm to extract the fundamental frequencies of water currents in an underwater sensor network deployed in offshore aquaculture infrastructures. The target sensor node is based on a commercial ultra-low-power microcontroller. The proposed fundamental frequency identification algorithm only requires the use of an integer arithmetic unit. Our approach exploits the mathematical properties of the finite impulse response (FIR) filtering in the integer domain. The design and implementation of the presented algorithm are discussed in detail in terms of FIR tuning/coefficient selection, memory usage and variable domain for its mathematical formulation aimed at reducing the computational effort required. The approach is validated using a shallow water current model and real-world raw data from an offshore aquaculture infrastructure. The extracted frequencies have a maximum error below a 4%.
Collapse
Affiliation(s)
- Juan Montiel-Caminos
- Institute for Applied Microelectronics (IUMA), University of Las Palmas de Gran Canaria, 35015 Las Palmas de Gran Canaria, Spain
| | - Nieves G Hernandez-Gonzalez
- Institute for Applied Microelectronics (IUMA), University of Las Palmas de Gran Canaria, 35015 Las Palmas de Gran Canaria, Spain
| | - Javier Sosa
- Institute for Applied Microelectronics (IUMA), University of Las Palmas de Gran Canaria, 35015 Las Palmas de Gran Canaria, Spain
| | - Juan A Montiel-Nelson
- Institute for Applied Microelectronics (IUMA), University of Las Palmas de Gran Canaria, 35015 Las Palmas de Gran Canaria, Spain
| |
Collapse
|
40
|
Xue J, Xie L, Chen F, Wu L, Tian Q, Zhou Y, Ying R, Liu P. EdgeMap: An Optimized Mapping Toolchain for Spiking Neural Network in Edge Computing. Sensors (Basel) 2023; 23:6548. [PMID: 37514842 PMCID: PMC10383546 DOI: 10.3390/s23146548] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/28/2023] [Revised: 07/13/2023] [Accepted: 07/18/2023] [Indexed: 07/30/2023]
Abstract
Spiking neural networks (SNNs) have attracted considerable attention as third-generation artificial neural networks, known for their powerful, intelligent features and energy-efficiency advantages. These characteristics render them ideally suited for edge computing scenarios. Nevertheless, the current mapping schemes for deploying SNNs onto neuromorphic hardware face limitations such as extended execution times, low throughput, and insufficient consideration of energy consumption and connectivity, which undermine their suitability for edge computing applications. To address these challenges, we introduce EdgeMap, an optimized mapping toolchain specifically designed for deploying SNNs onto edge devices without compromising performance. EdgeMap consists of two main stages. The first stage involves partitioning the SNN graph into small neuron clusters based on the streaming graph partition algorithm, with the sizes of neuron clusters limited by the physical neuron cores. In the subsequent mapping stage, we adopt a multi-objective optimization algorithm specifically geared towards mitigating energy costs and communication costs for efficient deployment. EdgeMap-evaluated across four typical SNN applications-substantially outperforms other state-of-the-art mapping schemes. The performance improvements include a reduction in average latency by up to 19.8%, energy consumption by 57%, and communication cost by 58%. Moreover, EdgeMap exhibits an impressive enhancement in execution time by a factor of 1225.44×, alongside a throughput increase of up to 4.02×. These results highlight EdgeMap's efficiency and effectiveness, emphasizing its utility for deploying SNN applications in edge computing scenarios.
Collapse
Affiliation(s)
- Jianwei Xue
- School of Electronic and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
| | - Lisheng Xie
- School of Electronic and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
| | - Faquan Chen
- School of Electronic and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
| | - Liangshun Wu
- School of Electronic and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
| | - Qingyang Tian
- School of Electronic and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
| | - Yifan Zhou
- School of Electronic and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
| | - Rendong Ying
- School of Electronic and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
| | - Peilin Liu
- School of Electronic and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
| |
Collapse
|
41
|
Rostkowska M, Skrzypczyński P. Optimizing Appearance-Based Localization with Catadioptric Cameras: Small-Footprint Models for Real-Time Inference on Edge Devices. Sensors (Basel) 2023; 23:6485. [PMID: 37514780 PMCID: PMC10385632 DOI: 10.3390/s23146485] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/18/2023] [Revised: 07/14/2023] [Accepted: 07/15/2023] [Indexed: 07/30/2023]
Abstract
This paper considers the task of appearance-based localization: visual place recognition from omnidirectional images obtained from catadioptric cameras. The focus is on designing an efficient neural network architecture that accurately and reliably recognizes indoor scenes on distorted images from a catadioptric camera, even in self-similar environments with few discernible features. As the target application is the global localization of a low-cost service mobile robot, the proposed solutions are optimized toward being small-footprint models that provide real-time inference on edge devices, such as Nvidia Jetson. We compare several design choices for the neural network-based architecture of the localization system and then demonstrate that the best results are achieved with embeddings (global descriptors) yielded by exploiting transfer learning and fine tuning on a limited number of catadioptric images. We test our solutions on two small-scale datasets collected using different catadioptric cameras in the same office building. Next, we compare the performance of our system to state-of-the-art visual place recognition systems on the publicly available COLD Freiburg and Saarbrücken datasets that contain images collected under different lighting conditions. Our system compares favourably to the competitors both in terms of the accuracy of place recognition and the inference time, providing a cost- and energy-efficient means of appearance-based localization for an indoor service robot.
Collapse
Affiliation(s)
- Marta Rostkowska
- Institute of Robotics and Machine Intelligence, Poznan University of Technology, 60-965 Poznan, Poland
| | - Piotr Skrzypczyński
- Institute of Robotics and Machine Intelligence, Poznan University of Technology, 60-965 Poznan, Poland
| |
Collapse
|
42
|
Navaz AN, Serhani MA, El Kassabi HT, Taleb I. Empowering Patient Similarity Networks through Innovative Data-Quality-Aware Federated Profiling. Sensors (Basel) 2023; 23:6443. [PMID: 37514736 PMCID: PMC10384464 DOI: 10.3390/s23146443] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/13/2023] [Revised: 07/12/2023] [Accepted: 07/13/2023] [Indexed: 07/30/2023]
Abstract
Continuous monitoring of patients involves collecting and analyzing sensory data from a multitude of sources. To overcome communication overhead, ensure data privacy and security, reduce data loss, and maintain efficient resource usage, the processing and analytics are moved close to where the data are located (e.g., the edge). However, data quality (DQ) can be degraded because of imprecise or malfunctioning sensors, dynamic changes in the environment, transmission failures, or delays. Therefore, it is crucial to keep an eye on data quality and spot problems as quickly as possible, so that they do not mislead clinical judgments and lead to the wrong course of action. In this article, a novel approach called federated data quality profiling (FDQP) is proposed to assess the quality of the data at the edge. FDQP is inspired by federated learning (FL) and serves as a condensed document or a guide for node data quality assurance. The FDQP formal model is developed to capture the quality dimensions specified in the data quality profile (DQP). The proposed approach uses federated feature selection to improve classifier precision and rank features based on criteria such as feature value, outlier percentage, and missing data percentage. Extensive experimentation using a fetal dataset split into different edge nodes and a set of scenarios were carefully chosen to evaluate the proposed FDQP model. The results of the experiments demonstrated that the proposed FDQP approach positively improved the DQ, and thus, impacted the accuracy of the federated patient similarity network (FPSN)-based machine learning models. The proposed data-quality-aware federated PSN architecture leveraging FDQP model with data collected from edge nodes can effectively improve the data quality and accuracy of the federated patient similarity network (FPSN)-based machine learning models. Our profiling algorithm used lightweight profile exchange instead of full data processing at the edge, which resulted in optimal data quality achievement, thus improving efficiency. Overall, FDQP is an effective method for assessing data quality in the edge computing environment, and we believe that the proposed approach can be applied to other scenarios beyond patient monitoring.
Collapse
Affiliation(s)
- Alramzana Nujum Navaz
- Department of Computer Science and Software Engineering, College of Information Technology, UAE University, Al Ain P.O. Box 15551, United Arab Emirates
| | - Mohamed Adel Serhani
- College of Computing and Informatics, Sharjah University, Sharjah P.O. Box 27272, United Arab Emirates
| | - Hadeel T El Kassabi
- Faculty of Applied Sciences & Technology, Humber College Institute of Technology & Advanced Learning, Toronto, ON M9W 5L7, Canada
| | - Ikbal Taleb
- College of Technological Innovation, Zayed University, Abu Dhabi P.O. Box 144534, United Arab Emirates
| |
Collapse
|
43
|
Park J, Hong J, Shim W, Jung DJ. Multi-Object Tracking on SWIR Images for City Surveillance in an Edge-Computing Environment. Sensors (Basel) 2023; 23:6373. [PMID: 37514671 PMCID: PMC10385020 DOI: 10.3390/s23146373] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/26/2023] [Revised: 07/07/2023] [Accepted: 07/09/2023] [Indexed: 07/30/2023]
Abstract
Although Short-Wave Infrared (SWIR) sensors have advantages in terms of robustness in bad weather and low-light conditions, the SWIR images have not been well studied for automated object detection and tracking systems. The majority of previous multi-object tracking studies have focused on pedestrian tracking in visible-spectrum images, but tracking different types of vehicles is also important in city-surveillance scenarios. In addition, the previous studies were based on high-computing-power environments such as GPU workstations or servers, but edge computing should be considered to reduce network bandwidth usage and privacy concerns in city-surveillance scenarios. In this paper, we propose a fast and effective multi-object tracking method, called Multi-Class Distance-based Tracking (MCDTrack), on SWIR images of city-surveillance scenarios in a low-power and low-computation edge-computing environment. Eight-bit integer quantized object detection models are used, and simple distance and IoU-based similarity scores are employed to realize effective multi-object tracking in an edge-computing environment. Our MCDTrack is not only superior to previous multi-object tracking methods but also shows high tracking accuracy of 77.5% MOTA and 80.2% IDF1 although the object detection and tracking are performed on the edge-computing device. Our study results indicate that a robust city-surveillance solution can be developed based on the edge-computing environment and low-frame-rate SWIR images.
Collapse
Affiliation(s)
- Jihun Park
- A2Mind Inc., Daejeon 34087, Republic of Korea
| | | | - Wooil Shim
- A2Mind Inc., Daejeon 34087, Republic of Korea
| | | |
Collapse
|
44
|
Kovalenko M, Przewozny D, Eisert P, Bosse S, Chojecki P. Data Fusion for Cross-Domain Real-Time Object Detection on the Edge. Sensors (Basel) 2023; 23:6138. [PMID: 37447986 DOI: 10.3390/s23136138] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/30/2023] [Revised: 06/22/2023] [Accepted: 06/29/2023] [Indexed: 07/15/2023]
Abstract
We investigate an edge-computing scenario for robot control, where two similar neural networks are running on one computational node. We test the feasibility of using a single object-detection model (YOLOv5) with the benefit of reduced computational resources against the potentially more accurate independent and specialized models. Our results show that using one single convolutional neural network (for object detection and hand-gesture classification) instead of two separate ones can reduce resource usage by almost 50%. For many classes, we observed an increase in accuracy when using the model trained with more labels. For small datasets (a few hundred instances per label), we found that it is advisable to add labels with many instances from another dataset to increase detection accuracy.
Collapse
Affiliation(s)
| | | | - Peter Eisert
- Fraunhofer Heinrich Hertz Institute, 10587 Berlin, Germany
| | | | - Paul Chojecki
- Fraunhofer Heinrich Hertz Institute, 10587 Berlin, Germany
| |
Collapse
|
45
|
Fereira R, Ranaweera C, Lee K, Schneider JG. Energy Efficient Node Selection in Edge-Fog-Cloud Layered IoT Architecture. Sensors (Basel) 2023; 23:6039. [PMID: 37447888 DOI: 10.3390/s23136039] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/04/2023] [Revised: 06/24/2023] [Accepted: 06/27/2023] [Indexed: 07/15/2023]
Abstract
Internet of Things (IoT) architectures generally focus on providing consistent performance and reliable communications. The convergence of IoT, edge, fog, and cloud aims to improve the quality of service of applications, which does not typically emphasize energy efficiency. Considering energy in IoT architectures would reduce the energy impact from billions of IoT devices. The research presented in this paper proposes an optimization framework that considers energy consumption of nodes when selecting a node for processing an IoT request in edge-fog-cloud layered architecture. The IoT use cases considered in this paper include smart grid, autonomous vehicles, and eHealth. The proposed framework is evaluated using CPLEX simulations. The results provide insights into mechanisms that can be used to select nodes energy-efficiently whilst meeting the application requirements and other network constraints in multi-layered IoT architectures.
Collapse
Affiliation(s)
- Rolden Fereira
- School of Information Technology, Deakin University, Geelong, VIC 3220, Australia
| | - Chathurika Ranaweera
- School of Information Technology, Deakin University, Geelong, VIC 3220, Australia
| | - Kevin Lee
- School of Information Technology, Deakin University, Geelong, VIC 3220, Australia
| | - Jean-Guy Schneider
- Faculty of Information Technology, Monash University, Clayton, VIC 3168, Australia
| |
Collapse
|
46
|
Wang WH, Hsu WS. Integrating Artificial Intelligence and Wearable IoT System in Long-Term Care Environments. Sensors (Basel) 2023; 23:5913. [PMID: 37447763 DOI: 10.3390/s23135913] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/06/2023] [Revised: 06/09/2023] [Accepted: 06/20/2023] [Indexed: 07/15/2023]
Abstract
With the rapid advancement of information and communication technology (ICT), big data, and artificial intelligence (AI), intelligent healthcare systems have emerged, including the integration of healthcare systems with capital, the introduction of healthcare systems into long-term care institutions, and the integration of measurement data for care or exposure. These systems provide comprehensive communication and home exposure reports and enable the involvement of rehabilitation specialists and other experts. Silver technology enables the realization of health management in long-term care services, workplace care, and health applications, facilitating disease prevention and control, improving disease management, reducing home isolation, alleviating family burden in terms of nursing, and promoting health and disease control. Research and development efforts in forward-looking cross-domain precision health technology, system construction, testing, and integration are carried out. This integrated project consists of two main components. The Integrated Intelligent Long-Term Care Service Management System focuses on building a personalized care service system for the elderly, encompassing health, nutrition, diet, and health education aspects. The Wearable Internet of Things Care System primarily supports the development of portable physiological signal detection devices and electronic fences.
Collapse
Affiliation(s)
- Wei-Hsun Wang
- Department of Orthopedic Surgery, Changhua Christian Hospital, Changhua 500209, Taiwan
- Department of Golden-Ager Industry Management, Chaoyang University of Technology, Taichung 413310, Taiwan
- College of Medicine, National Chung Hsing University, Taichung 402202, Taiwan
| | - Wen-Shin Hsu
- Department of Medical Information, Chung Shan Medical University, Taichung 402201, Taiwan
- Informatics Office Technology, Chung Shan Medical University Hospital, Taichung 402201, Taiwan
| |
Collapse
|
47
|
Li H, Liu X, Zhao W. Research on Lightweight Microservice Composition Technology in Cloud-Edge Device Scenarios. Sensors (Basel) 2023; 23:5939. [PMID: 37447786 DOI: 10.3390/s23135939] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/31/2023] [Revised: 06/22/2023] [Accepted: 06/23/2023] [Indexed: 07/15/2023]
Abstract
In recent years, cloud-native technology has become popular among Internet companies. Microservice architecture solves the complexity problem for multiple service methods by decomposing a single application so that each service can be independently developed, independently deployed, and independently expanded. At the same time, domestic industrial Internet construction is still in its infancy, and small and medium-sized enterprises still face many problems in the process of digital transformation, such as difficult resource integration, complex control equipment workflow, slow development and deployment process, and shortage of operation and maintenance personnel. The existing traditional workflow architecture is mainly aimed at the cloud scenario, which consumes a lot of resources and cannot be used in resource-limited scenarios at the edge. Moreover, traditional workflow is not efficient enough to transfer data and often needs to rely on various storage mechanisms. In this article, a lightweight and efficient workflow architecture is proposed to optimize the defects of these traditional workflows by combining cloud-edge scene. By orchestrating a lightweight workflow engine with a Kubernetes Operator, the architecture can significantly reduce workflow execution time and unify data flow between cloud microservices and edge devices.
Collapse
Affiliation(s)
- Hanqi Li
- School of Electronics and Information Engineering, Tongji University, Shanghai 200092, China
| | - Xianhui Liu
- School of Electronics and Information Engineering, Tongji University, Shanghai 200092, China
| | - Weidong Zhao
- School of Electronics and Information Engineering, Tongji University, Shanghai 200092, China
| |
Collapse
|
48
|
Javed F, Khan ZA, Rizwan S, Shahzadi S, Chaudhry NR, Iqbal M. A Novel Energy-Efficient Reservation System for Edge Computing in 6G Vehicular Ad Hoc Network. Sensors (Basel) 2023; 23:5817. [PMID: 37447666 DOI: 10.3390/s23135817] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/30/2023] [Revised: 05/25/2023] [Accepted: 05/30/2023] [Indexed: 07/15/2023]
Abstract
The roadside unit (RSU) is one of the fundamental components in a vehicular ad hoc network (VANET), where a vehicle communicates in infrastructure mode. The RSU has multiple functions, including the sharing of emergency messages and the updating of vehicles about the traffic situation. Deploying and managing a static RSU (sRSU) requires considerable capital and operating expenditures (CAPEX and OPEX), leading to RSUs that are sparsely distributed, continuous handovers amongst RSUs, and, more importantly, frequent RSU interruptions. At present, researchers remain focused on multiple parameters in the sRSU to improve the vehicle-to-infrastructure (V2I) communication; however, in this research, the mobile RSU (mRSU), an emerging concept for sixth-generation (6G) edge computing vehicular ad hoc networks (VANETs), is proposed to improve the connectivity and efficiency of communication among V2I. In addition to this, the mRSU can serve as a computing resource for edge computing applications. This paper proposes a novel energy-efficient reservation technique for edge computing in 6G VANETs that provides an energy-efficient, reservation-based, cost-effective solution by introducing the concept of the mRSU. The simulation outcomes demonstrate that the mRSU exhibits superior performance compared to the sRSU in multiple aspects. The mRSU surpasses the sRSU with a packet delivery ratio improvement of 7.7%, a throughput increase of 5.1%, a reduction in end-to-end delay by 4.4%, and a decrease in hop count by 8.7%. The results are generated across diverse propagation models, employing realistic urban scenarios with varying packet sizes and numbers of vehicles. However, it is important to note that the enhanced performance parameters and improved connectivity with more nodes lead to a significant increase in energy consumption by 2%.
Collapse
Affiliation(s)
- Farhan Javed
- Department of Electrical and Computer Engineering, COMSATS University Islamabad, Attock Campus, Attock 43600, Pakistan
| | - Zuhaib Ashfaq Khan
- School of Architecture, Technology, and Engineering (ATE), University of Brighton, Brighton BN2 4AT, UK
| | - Shahzad Rizwan
- Department of Computer Science, COMSATS University Islamabad, Attock Campus, Attock 43600, Pakistan
| | - Sonia Shahzadi
- Department of Computer Science, University of Gujrat, Gujrat 50700, Pakistan
| | | | - Muddesar Iqbal
- Renewable Energy Laboratory, Communications and Networks Engineering Department, College of Engineering, Prince Sultan University, Riyadh 11586, Saudi Arabia
| |
Collapse
|
49
|
Prauzek M, Kucova T, Konecny J, Adamikova M, Gaiova K, Mikus M, Pospisil P, Andriukaitis D, Zilys M, Martinkauppi B, Koziorek J. IoT Sensor Challenges for Geothermal Energy Installations Monitoring: A Survey. Sensors (Basel) 2023; 23:5577. [PMID: 37420742 DOI: 10.3390/s23125577] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/17/2023] [Revised: 05/25/2023] [Accepted: 06/07/2023] [Indexed: 07/09/2023]
Abstract
Geothermal energy installations are becoming increasingly common in new city developments and renovations. With a broad range of technological applications and improvements in this field, the demand for suitable monitoring technologies and control processes for geothermal energy installations is also growing. This article identifies opportunities for the future development and deployment of IoT sensors applied to geothermal energy installations. The first part of the survey describes the technologies and applications of various sensor types. Sensors that monitor temperature, flow rate and other mechanical parameters are presented with a technological background and their potential applications. The second part of the article surveys Internet-of-Things (IoT), communication technology and cloud solutions applicable to geothermal energy monitoring, with a focus on IoT node designs, data transmission technologies and cloud services. Energy harvesting technologies and edge computing methods are also reviewed. The survey concludes with a discussion of research challenges and an outline of new areas of application for monitoring geothermal installations and innovating technologies to produce IoT sensor solutions.
Collapse
Affiliation(s)
- Michal Prauzek
- Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 708 00 Ostrava, Czech Republic
| | - Tereza Kucova
- Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 708 00 Ostrava, Czech Republic
| | - Jaromir Konecny
- Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 708 00 Ostrava, Czech Republic
| | - Monika Adamikova
- Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 708 00 Ostrava, Czech Republic
| | - Karolina Gaiova
- Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 708 00 Ostrava, Czech Republic
| | - Miroslav Mikus
- Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 708 00 Ostrava, Czech Republic
| | - Pavel Pospisil
- Department of Geotechnics and Underground Engineering, VSB-Technical University of Ostrava, 708 00 Ostrava, Czech Republic
| | - Darius Andriukaitis
- Department of Electronics Engineering, Kaunas University of Technology, 44249 Kaunas, Lithuania
| | - Mindaugas Zilys
- Department of Electronics Engineering, Kaunas University of Technology, 44249 Kaunas, Lithuania
| | | | - Jiri Koziorek
- Department of Cybernetics and Biomedical Engineering, VSB-Technical University of Ostrava, 708 00 Ostrava, Czech Republic
| |
Collapse
|
50
|
Iqbal F, Altaf A, Waris Z, Aray DG, Flores MAL, Díez IDLT, Ashraf I. Blockchain-Modeled Edge-Computing-Based Smart Home Monitoring System with Energy Usage Prediction. Sensors (Basel) 2023; 23:s23115263. [PMID: 37299993 DOI: 10.3390/s23115263] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/26/2023] [Revised: 05/25/2023] [Accepted: 05/29/2023] [Indexed: 06/12/2023]
Abstract
Internet of Things (IoT) has made significant strides in energy management systems recently. Due to the continually increasing cost of energy, supply-demand disparities, and rising carbon footprints, the need for smart homes for monitoring, managing, and conserving energy has increased. In IoT-based systems, device data are delivered to the network edge before being stored in the fog or cloud for further transactions. This raises worries about the data's security, privacy, and veracity. It is vital to monitor who accesses and updates this information to protect IoT end-users linked to IoT devices. Smart meters are installed in smart homes and are susceptible to numerous cyber attacks. Access to IoT devices and related data must be secured to prevent misuse and protect IoT users' privacy. The purpose of this research was to design a blockchain-based edge computing method for securing the smart home system, in conjunction with machine learning techniques, in order to construct a secure smart home system with energy usage prediction and user profiling. The research proposes a blockchain-based smart home system that can continuously monitor IoT-enabled smart home appliances such as smart microwaves, dishwashers, furnaces, and refrigerators, among others. An approach based on machine learning was utilized to train the auto-regressive integrated moving average (ARIMA) model for energy usage prediction, which is provided in the user's wallet, to estimate energy consumption and maintain user profiles. The model was tested using the moving average statistical model, the ARIMA model, and the deep-learning-based long short-term memory (LSTM) model on a dataset of smart-home-based energy usage under changing weather conditions. The findings of the analysis reveal that the LSTM model accurately forecasts the energy usage of smart homes.
Collapse
Affiliation(s)
- Faiza Iqbal
- Department of Computer Science, University of Engineering & Technology (UET), Lahore 54890, Pakistan
| | - Ayesha Altaf
- Department of Computer Science, University of Engineering & Technology (UET), Lahore 54890, Pakistan
| | - Zeest Waris
- Department of Computer Science, University of Engineering & Technology (UET), Lahore 54890, Pakistan
| | - Daniel Gavilanes Aray
- Research Group on Foods, Universidad Europea del Atlántico, Isabel Torres 21, 39011 Santander, Spain
- Research Group on Foods, Universidad Internacional Iberoamericana Arecibo, Arecibo, PR 00613, USA
- Universidade Internacional do Cuanza, Cuito EN250, Bié, Angola
| | - Miguel Angel López Flores
- Research Group on Foods, Universidad Europea del Atlántico, Isabel Torres 21, 39011 Santander, Spain
- Universidad Internacional Iberoamericana, Campeche 24560, Mexico
- Instituto Politécnico Nacional, UPIICSA, Ciudad de México 04510, Mexico
| | - Isabel de la Torre Díez
- Department of Signal Theory, Communications and Telematics Engineering, Unviersity of Valladolid, Paseo de Belén, 15, 47011 Valladolid, Spain
| | - Imran Ashraf
- Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Republic of Korea
| |
Collapse
|