期刊文献+
共找到1,536篇文章
< 1 2 77 >
每页显示 20 50 100
Associative Tasks Computing Offloading Scheme in Internet of Medical Things with Deep Reinforcement Learning
1
作者 Jiang Fan Qin Junwei +1 位作者 Liu Lei Tian Hui 《China Communications》 SCIE CSCD 2024年第4期38-52,共15页
The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-rel... The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-related coupling relationships, Io MT faces unprecedented challenges. Considering the associative connections among tasks, this paper proposes a computing offloading policy for multiple-user devices(UDs) considering device-to-device(D2D) communication and a multi-access edge computing(MEC)technique under the scenario of Io MT. Specifically,to minimize the total delay and energy consumption concerning the requirement of Io MT, we first analyze and model the detailed local execution, MEC execution, D2D execution, and associated tasks offloading exchange model. Consequently, the associated tasks’ offloading scheme of multi-UDs is formulated as a mixed-integer nonconvex optimization problem. Considering the advantages of deep reinforcement learning(DRL) in processing tasks related to coupling relationships, a Double DQN based associative tasks computing offloading(DDATO) algorithm is then proposed to obtain the optimal solution, which can make the best offloading decision under the condition that tasks of UDs are associative. Furthermore, to reduce the complexity of the DDATO algorithm, the cacheaided procedure is intentionally introduced before the data training process. This avoids redundant offloading and computing procedures concerning tasks that previously have already been cached by other UDs. In addition, we use a dynamic ε-greedy strategy in the action selection section of the algorithm, thus preventing the algorithm from falling into a locally optimal solution. Simulation results demonstrate that compared with other existing methods for associative task models concerning different structures in the Io MT network, the proposed algorithm can lower the total cost more effectively and efficiently while also providing a tradeoff between delay and energy consumption tolerance. 展开更多
关键词 associative tasks cache-aided procedure double deep Q-network internet of Medical things(IoMT) multi-access edge computing(MEC)
下载PDF
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine 被引量:1
2
作者 Haifeng Lin Qilin Xue +1 位作者 Jiayin Feng Di Bai 《Digital Communications and Networks》 SCIE CSCD 2023年第1期111-124,共14页
With the rapid development of the Internet of Things(IoT),there are several challenges pertaining to security in IoT applications.Compared with the characteristics of the traditional Internet,the IoT has many problems... With the rapid development of the Internet of Things(IoT),there are several challenges pertaining to security in IoT applications.Compared with the characteristics of the traditional Internet,the IoT has many problems,such as large assets,complex and diverse structures,and lack of computing resources.Traditional network intrusion detection systems cannot meet the security needs of IoT applications.In view of this situation,this study applies cloud computing and machine learning to the intrusion detection system of IoT to improve detection performance.Usually,traditional intrusion detection algorithms require considerable time for training,and these intrusion detection algorithms are not suitable for cloud computing due to the limited computing power and storage capacity of cloud nodes;therefore,it is necessary to study intrusion detection algorithms with low weights,short training time,and high detection accuracy for deployment and application on cloud nodes.An appropriate classification algorithm is a primary factor for deploying cloud computing intrusion prevention systems and a prerequisite for the system to respond to intrusion and reduce intrusion threats.This paper discusses the problems related to IoT intrusion prevention in cloud computing environments.Based on the analysis of cloud computing security threats,this study extensively explores IoT intrusion detection,cloud node monitoring,and intrusion response in cloud computing environments by using cloud computing,an improved extreme learning machine,and other methods.We use the Multi-Feature Extraction Extreme Learning Machine(MFE-ELM)algorithm for cloud computing,which adds a multi-feature extraction process to cloud servers,and use the deployed MFE-ELM algorithm on cloud nodes to detect and discover network intrusions to cloud nodes.In our simulation experiments,a classical dataset for intrusion detection is selected as a test,and test steps such as data preprocessing,feature engineering,model training,and result analysis are performed.The experimental results show that the proposed algorithm can effectively detect and identify most network data packets with good model performance and achieve efficient intrusion detection for heterogeneous data of the IoT from cloud nodes.Furthermore,it can enable the cloud server to discover nodes with serious security threats in the cloud cluster in real time,so that further security protection measures can be taken to obtain the optimal intrusion response strategy for the cloud cluster. 展开更多
关键词 internet of things Cloud computing Intrusion Prevention Intrusion Detection Extreme Learning Machine
下载PDF
Energy and Latency Optimization in Edge-Fog-Cloud Computing for the Internet of Medical Things
3
作者 Hatem A.Alharbi Barzan A.Yosuf +1 位作者 Mohammad Aldossary Jaber Almutairi 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期1299-1319,共21页
In this paper,the Internet ofMedical Things(IoMT)is identified as a promising solution,which integrates with the cloud computing environment to provide remote health monitoring solutions and improve the quality of ser... In this paper,the Internet ofMedical Things(IoMT)is identified as a promising solution,which integrates with the cloud computing environment to provide remote health monitoring solutions and improve the quality of service(QoS)in the healthcare sector.However,problems with the present architectural models such as those related to energy consumption,service latency,execution cost,and resource usage,remain a major concern for adopting IoMT applications.To address these problems,this work presents a four-tier IoMT-edge-fog-cloud architecture along with an optimization model formulated using Mixed Integer Linear Programming(MILP),with the objective of efficiently processing and placing IoMT applications in the edge-fog-cloud computing environment,while maintaining certain quality standards(e.g.,energy consumption,service latency,network utilization).A modeling environment is used to assess and validate the proposed model by considering different traffic loads and processing requirements.In comparison to the other existing models,the performance analysis of the proposed approach shows a maximum saving of 38%in energy consumption and a 73%reduction in service latency.The results also highlight that offloading the IoMT application to the edge and fog nodes compared to the cloud is highly dependent on the tradeoff between the network journey time saved vs.the extra power consumed by edge or fog resources. 展开更多
关键词 internet of medical things(IoMT) E-HEALTHCARE edge-fog-cloud computing remote monitoring energy consumption computation offloading
下载PDF
Joint Optimization of Energy Consumption and Network Latency in Blockchain-Enabled Fog Computing Networks
4
作者 Huang Xiaoge Yin Hongbo +3 位作者 Cao Bin Wang Yongsheng Chen Qianbin Zhang Jie 《China Communications》 SCIE CSCD 2024年第4期104-119,共16页
Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this pap... Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature. 展开更多
关键词 blockchain energy consumption fog computing network internet of things LATENCY
下载PDF
Stochastic programming based multi-arm bandit offloading strategy for internet of things
5
作者 Bin Cao Tingyong Wu Xiang Bai 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1200-1211,共12页
In order to solve the high latency of traditional cloud computing and the processing capacity limitation of Internet of Things(IoT)users,Multi-access Edge Computing(MEC)migrates computing and storage capabilities from... In order to solve the high latency of traditional cloud computing and the processing capacity limitation of Internet of Things(IoT)users,Multi-access Edge Computing(MEC)migrates computing and storage capabilities from the remote data center to the edge of network,providing users with computation services quickly and directly.In this paper,we investigate the impact of the randomness caused by the movement of the IoT user on decision-making for offloading,where the connection between the IoT user and the MEC servers is uncertain.This uncertainty would be the main obstacle to assign the task accurately.Consequently,if the assigned task cannot match well with the real connection time,a migration(connection time is not enough to process)would be caused.In order to address the impact of this uncertainty,we formulate the offloading decision as an optimization problem considering the transmission,computation and migration.With the help of Stochastic Programming(SP),we use the posteriori recourse to compensate for inaccurate predictions.Meanwhile,in heterogeneous networks,considering multiple candidate MEC servers could be selected simultaneously due to overlapping,we also introduce the Multi-Arm Bandit(MAB)theory for MEC selection.The extensive simulations validate the improvement and effectiveness of the proposed SP-based Multi-arm bandit Method(SMM)for offloading in terms of reward,cost,energy consumption and delay.The results showthat SMMcan achieve about 20%improvement compared with the traditional offloading method that does not consider the randomness,and it also outperforms the existing SP/MAB based method for offloading. 展开更多
关键词 Multi-access computing internet of things ofFLOADING Stochastic programming Multi-arm bandit
下载PDF
Lightweight Storage Framework for Blockchain-Enabled Internet of Things Under Cloud Computing
6
作者 Xinyi Qing Baopeng Ye +3 位作者 Yuanquan Shi Tao Li Yuling Chen Lei Liu 《Computers, Materials & Continua》 SCIE EI 2023年第5期3607-3624,共18页
Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the ... Due to its decentralized,tamper-proof,and trust-free characteristics,blockchain is used in the Internet of Things(IoT)to guarantee the reliability of data.However,some technical flaws in blockchain itself prevent the development of these applications,such as the issue with linearly growing storage capacity of blockchain systems.On the other hand,there is a lack of storage resources for sensor devices in IoT,and numerous sensor devices will generate massive data at ultra-high speed,which makes the storage problem of the IoT enabled by blockchain more prominent.There are various solutions to reduce the storage burden by modifying the blockchain’s storage policy,but most of them do not consider the willingness of peers.In attempt to make the blockchain more compatible with the IoT,this paper proposes a storage optimization scheme that revisits the system data storage problem from amore practically oriented standpoint.Peers will only store transactional data that they are directly involved in.In addition,a transaction verification model is developed to enable peers to undertake transaction verification with the aid of cloud computing,and an incentive mechanism is premised on the storage optimization scheme to assure data integrity.The results of the simulation experiments demonstrate the proposed scheme’s advantage in terms of storage and throughput. 展开更多
关键词 Blockchain internet of things storage optimization transaction verification cloud computing incentive mechanism
下载PDF
Internet of robotic things for mobile robots:Concepts,technologies,challenges,applications,and future directions
7
作者 Homayun Kabir Mau-Luen Tham Yoong Choon Chang 《Digital Communications and Networks》 SCIE CSCD 2023年第6期1265-1290,共26页
Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sen... Nowadays,Multi Robotic System(MRS)consisting of different robot shapes,sizes and capabilities has received significant attention from researchers and are being deployed in a variety of real-world applications.From sensors and actuators improved by communication technologies to powerful computing systems utilizing advanced Artificial Intelligence(AI)algorithms have rapidly driven the development of MRS,so the Internet of Things(IoT)in MRS has become a new topic,namely the Internet of Robotic Things(IoRT).This paper summarizes a comprehensive survey of state-of-the-art technologies for mobile robots,including general architecture,benefits,challenges,practical applications,and future research directions.In addition,remarkable research of i)multirobot navigation,ii)network architecture,routing protocols and communications,and iii)coordination among robots as well as data analysis via external computing(cloud,fog,edge,edge-cloud)are merged with the IoRT architecture according to their applicability.Moreover,security is a long-term challenge for IoRT because of various attack vectors,security flaws,and vulnerabilities.Security threats,attacks,and existing solutions based on IoRT architectures are also under scrutiny.Moreover,the identification of environmental situations that are crucial for all types of IoRT applications,such as the detection of objects,human,and obstacles,is also critically reviewed.Finally,future research directions are given by analyzing the challenges of IoRT in mobile robots. 展开更多
关键词 Multi Robotic System(MRS) internet of things(IoT) internet of Robotic things(IoRT) Cloud computing Artificial intelligence(AI) Machine learning(ML) Reinforcement learning(RL)
下载PDF
Joint optimization of serving node selection and wireless resources allocation for transactions data in mobile blockchain enhanced Internet of Things
8
作者 尹玉峰 WU Wenjun +3 位作者 GAO Yang JIN Kaiqi ZHANG Yanhua SUN Teng 《High Technology Letters》 EI CAS 2023年第2期181-193,共13页
With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is ... With the increased emphasis on data security in the Internet of Things(IoT), blockchain has received more and more attention.Due to the computing consuming characteristics of blockchain, mobile edge computing(MEC) is integrated into IoT.However, how to efficiently use edge computing resources to process the computing tasks of blockchain from IoT devices has not been fully studied.In this paper, the MEC and blockchain-enhanced IoT is considered.The transactions recording the data or other application information are generated by the IoT devices, and they are offloaded to the MEC servers to join the blockchain.The practical Byzantine fault tolerance(PBFT) consensus mechanism is used among all the MEC servers which are also the blockchain nodes, and the latency of the consensus process is modeled with the consideration of characteristics of the wireless network.The joint optimization problem of serving base station(BS) selection and wireless transmission resources allocation is modeled as a Markov decision process(MDP), and the long-term system utility is defined based on task reward, credit value, the latency of infrastructure layer and blockchain layer, and computing cost.A double deep Q learning(DQN) based transactions offloading algorithm(DDQN-TOA) is proposed, and simulation results show the advantages of the proposed algorithm in comparison to other methods. 展开更多
关键词 internet of things(IoT) mobile edge computing(MEC) blockchain deep reinforcement learning(DRL)
下载PDF
Edge Cloud Selection in Mobile Edge Computing(MEC)-Aided Applications for Industrial Internet of Things(IIoT)Services
9
作者 Dae-Young Kim SoYeon Lee +1 位作者 MinSeung Kim Seokhoon Kim 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2049-2060,共12页
In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to im... In many IIoT architectures,various devices connect to the edge cloud via gateway systems.For data processing,numerous data are delivered to the edge cloud.Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency.There are two types of costs for this kind of IoT network:a communication cost and a computing cost.For service efficiency,the communication cost of data transmission should be minimized,and the computing cost in the edge cloud should be also minimized.Therefore,in this paper,the communication cost for data transmission is defined as the delay factor,and the computing cost in the edge cloud is defined as the waiting time of the computing intensity.The proposed method selects an edge cloud that minimizes the total cost of the communication and computing costs.That is,a device chooses a routing path to the selected edge cloud based on the costs.The proposed method controls the data flows in a mesh-structured network and appropriately distributes the data processing load.The performance of the proposed method is validated through extensive computer simulation.When the transition probability from good to bad is 0.3 and the transition probability from bad to good is 0.7 in wireless and edge cloud states,the proposed method reduced both the average delay and the service pause counts to about 25%of the existing method. 展开更多
关键词 Industrial internet of things(IIoT)network IIoT service mobile edge computing(MEC) edge cloud selection MEC-aided application
下载PDF
IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems
10
作者 Dinesh Mavaluru Chettupally Anil Carie +4 位作者 Ahmed I.Alutaibi Satish Anamalamudi Bayapa Reddy Narapureddy Murali Krishna Enduri Md Ezaz Ahmed 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1487-1503,共17页
In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises e... In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises essential components such as base stations,edge servers,and numerous IIoT devices characterized by limited energy and computing capacities.The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption.The system operates in discrete time slots and employs a quasi-static approach,with a specific focus on the complexities of task partitioning and the management of constrained resources within the IIoT context.This study makes valuable contributions to the field by enhancing the understanding of resourceefficient management and task allocation,particularly relevant in real-time industrial applications.Experimental results indicate that our proposed algorithmsignificantly outperforms existing approaches,reducing queue backlog by 45.32% and 17.25% compared to SMRA and ACRA while achieving a 27.31% and 74.12% improvement in Qn O.Moreover,the algorithmeffectively balances complexity and network performance,as demonstratedwhen reducing the number of devices in each group(Ng)from 200 to 50,resulting in a 97.21% reduction in complexity with only a 7.35% increase in energy consumption.This research offers a practical solution for optimizing IIoT networks in real-time industrial settings. 展开更多
关键词 internet of things edge computing ofFLOADING NOMA
下载PDF
SCIRD: Revealing Infection of Malicious Software in Edge Computing-Enabled IoT Networks
11
作者 Jiehao Ye Wen Cheng +3 位作者 Xiaolong Liu Wenyi Zhu Xuan’ang Wu Shigen Shen 《Computers, Materials & Continua》 SCIE EI 2024年第5期2743-2769,共27页
The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which ... The Internet of Things(IoT)has characteristics such as node mobility,node heterogeneity,link heterogeneity,and topology heterogeneity.In the face of the IoT characteristics and the explosive growth of IoT nodes,which brings about large-scale data processing requirements,edge computing architecture has become an emerging network architecture to support IoT applications due to its ability to provide powerful computing capabilities and good service functions.However,the defense mechanism of Edge Computing-enabled IoT Nodes(ECIoTNs)is still weak due to their limited resources,so that they are susceptible to malicious software spread,which can compromise data confidentiality and network service availability.Facing this situation,we put forward an epidemiology-based susceptible-curb-infectious-removed-dead(SCIRD)model.Then,we analyze the dynamics of ECIoTNs with different infection levels under different initial conditions to obtain the dynamic differential equations.Additionally,we establish the presence of equilibrium states in the SCIRD model.Furthermore,we conduct an analysis of the model’s stability and examine the conditions under which malicious software will either spread or disappear within Edge Computing-enabled IoT(ECIoT)networks.Lastly,we validate the efficacy and superiority of the SCIRD model through MATLAB simulations.These research findings offer a theoretical foundation for suppressing the propagation of malicious software in ECIoT networks.The experimental results indicate that the theoretical SCIRD model has instructive significance,deeply revealing the principles of malicious software propagation in ECIoT networks.This study solves a challenging security problem of ECIoT networks by determining the malicious software propagation threshold,which lays the foundation for buildingmore secure and reliable ECIoT networks. 展开更多
关键词 Edge computing internet of things malicious software propagation model HETEROGENEITY
下载PDF
Deployment of Edge Computing Nodes in IoT:Effective Implementation of Simulated Annealing Method Based on User Location
12
作者 Junhui Zhao Ziyang Zhang +2 位作者 Zhenghao Yi Xiaoting Ma Qingmiao Zhang 《China Communications》 SCIE CSCD 2024年第1期279-296,共18页
Edge computing paradigm for 5G architecture has been considered as one of the most effective ways to realize low latency and highly reliable communication,which brings computing tasks and network resources to the edge... Edge computing paradigm for 5G architecture has been considered as one of the most effective ways to realize low latency and highly reliable communication,which brings computing tasks and network resources to the edge of network.The deployment of edge computing nodes is a key factor affecting the service performance of edge computing systems.In this paper,we propose a method for deploying edge computing nodes based on user location.Through the combination of Simulation of Urban Mobility(SUMO)and Network Simulator-3(NS-3),a simulation platform is built to generate data of hotspot areas in Io T scenario.By effectively using the data generated by the communication between users in Io T scenario,the location area of the user terminal can be obtained.On this basis,the deployment problem is expressed as a mixed integer linear problem,which can be solved by Simulated Annealing(SA)method.The analysis of the results shows that,compared with the traditional method,the proposed method has faster convergence speed and better performance. 展开更多
关键词 deployment problem edge computing internet of things machine learning
下载PDF
Edge of Things Inspired Robust Intrusion Detection Framework for Scalable and Decentralized Applications
13
作者 Abdulaziz Aldribi Aman Singh Jose Brensa 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3865-3881,共17页
Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications.Internet of Things(IoT),fog computing,edge computing,cloud computing,and the edge ... Ubiquitous data monitoring and processing with minimal latency is one of the crucial challenges in real-time and scalable applications.Internet of Things(IoT),fog computing,edge computing,cloud computing,and the edge of things are the spine of all real-time and scalable applications.Conspicuously,this study proposed a novel framework for a real-time and scalable application that changes dynamically with time.In this study,IoT deployment is recommended for data acquisition.The Pre-Processing of data with local edge and fog nodes is implemented in this study.The thresholdoriented data classification method is deployed to improve the intrusion detection mechanism’s performance.The employment of machine learningempowered intelligent algorithms in a distributed manner is implemented to enhance the overall response rate of the layered framework.The placement of respondent nodes near the framework’s IoT layer minimizes the network’s latency.For economic evaluation of the proposed framework with minimal efforts,EdgeCloudSim and FogNetSim++simulation environments are deployed in this study.The experimental results confirm the robustness of the proposed system by its improvised threshold-oriented data classification and intrusion detection approach,improved response rate,and prediction mechanism.Moreover,the proposed layered framework provides a robust solution for real-time and scalable applications that changes dynamically with time. 展开更多
关键词 internet of things(IoT) Edge of things(EoT) fog computing cloud computing SCALABLE DECENTRALIZED
下载PDF
Time to forge ahead:The Internet of Things for healthcare
14
作者 Denzil Furtado Andre F.Gygax +1 位作者 Chien Aun Chan Ashley I.Bush 《Digital Communications and Networks》 SCIE CSCD 2023年第1期223-235,共13页
Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to over... Situated at the intersection of technology and medicine,the Internet of Things(IoT)holds the promise of addressing some of healthcare's most pressing challenges,from medical error,to chronic drug shortages,to overburdened hospital systems,to dealing with the COVID-19 pandemic.However,despite considerable recent technological advances,the pace of successful implementation of promising IoT healthcare initiatives has been slow.To inspire more productive collaboration,we present here a simple—but surprisingly underrated—problemoriented approach to developing healthcare technologies.To further assist in this effort,we reviewed the various commercial,regulatory,social/cultural,and technological factors in the development of the IoT.We propose that fog computing—a technological paradigm wherein the burden of computing is shifted from a centralized cloud server closer to the data source—offers the greatest promise for building a robust and scalable healthcare IoT ecosystem.To this end,we explore the key enabling technologies that underpin the fog architecture,from the sensing layer all the way up to the cloud.It is our hope that ongoing advances in sensing,communications,cryptography,storage,machine learning,and artificial intelligence will be leveraged in meaningful ways to generate unprecedented medical intelligence and thus drive improvements in the health of many people. 展开更多
关键词 internet of things Healthcare Information Fog computing Artificial intelligence Machine learning Big data COVID-19 pandemic
下载PDF
Improvements in Weather Forecasting Technique Using Cognitive Internet of Things
15
作者 Kaushlendra Yadav Anuj Singh Arvind Kumar Tiwari 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3767-3782,共16页
Forecasting the weather is a challenging task for human beings because of the unpredictable nature of the climate.However,effective forecasting is vital for the general growth of a country due to the significance of w... Forecasting the weather is a challenging task for human beings because of the unpredictable nature of the climate.However,effective forecasting is vital for the general growth of a country due to the significance of weather forecasting in science and technology.The primary motivation behind this work is to achieve a higher level of forecasting accuracy to avoid any damage.Currently,most weather forecasting work is based on initially observed numerical weather data that cannot fully cover the changing essence of the atmosphere.In this work,sensors are used to collect real-time data for a particular location to capture the varying nature of the atmosphere.Our solution can give the anticipated results with the least amount of human engagement by combining human intelligence and machine learning with the help of the cognitive Internet of Things.The Authors identified weatherrelated parameters such as temperature,humidity,wind speed,and rainfall and then applied cognitive data collection methods to train and validate their findings.In addition,the Authors have examined the efficacy of various machine learning algorithms by using them on both data sets i.e.,pre-recorded metrological data sets and live sensor data sets collected from multiple locations.The Authors noticed that the results were superior on the sensor data.The Authors developed ensemble learning model using stacked method that achieved 99.25%accuracy,99%recall,99%precision,and 99%F1-score for Sensor data.It also achieved 85%accuracy,86%recall,85%precision,and 86%F1 score for Australian rainfall data. 展开更多
关键词 internet of things machine learning weather forecast cognitive computing PREDICTORS
下载PDF
Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme
16
作者 Geetanjali Rathee Razi Iqbal Adel Khelifi 《Computers, Materials & Continua》 SCIE EI 2021年第8期2755-2769,共15页
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ... Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach. 展开更多
关键词 pervasive computing vehicular networks SECURITY TRUST decision schemes trusted internet of vehicles big data
下载PDF
Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City
17
作者 Muhammad Usman Tariq Muhammad Babar +3 位作者 Mian Ahmad Jan Akmal Saeed Khattak Mohammad Dahman Alshehri Abid Yahya 《Computers, Materials & Continua》 SCIE EI 2021年第4期625-639,共15页
The world is rapidly changing with the advance of information technology.The expansion of the Internet of Things(IoT)is a huge step in the development of the smart city.The IoT consists of connected devices that trans... The world is rapidly changing with the advance of information technology.The expansion of the Internet of Things(IoT)is a huge step in the development of the smart city.The IoT consists of connected devices that transfer information.The IoT architecture permits on-demand services to a public pool of resources.Cloud computing plays a vital role in developing IoT-enabled smart applications.The integration of cloud computing enhances the offering of distributed resources in the smart city.Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability,security,performance,condentiality,and privacy.The key reason for cloud-and IoT-enabled smart city application failure is improper security practices at the early stages of development.This article proposes a framework to collect security requirements during the initial development phase of cloud-assisted IoT-enabled smart city applications.Its three-layered architecture includes privacy preserved stakeholder analysis(PPSA),security requirement modeling and validation(SRMV),and secure cloud-assistance(SCA).A case study highlights the applicability and effectiveness of the proposed framework.A hybrid survey enables the identication and evaluation of signicant challenges. 展开更多
关键词 SECURITY PRIVACY smart city internet of things cloud computing
下载PDF
Supply and Demand Oriented Energy Management in the Internet of Things
18
作者 Qingjuan Li Hong Liu +3 位作者 Huansheng Ning Yang Fu Songde Hu Shunkun Yang 《Advances in Internet of Things》 2016年第1期1-17,共17页
The Internet of Things (IoT) is emerging as an attractive paradigm involving physical perceptions, cyber interactions, social correlations and even cognitive thinking through a cyber-physical-social-thinking hyperspac... The Internet of Things (IoT) is emerging as an attractive paradigm involving physical perceptions, cyber interactions, social correlations and even cognitive thinking through a cyber-physical-social-thinking hyperspace. In this context, energy management with the purposes of energy saving and high efficiency is a challenging issue. In this work, a taxonomy model is established in reference to the IoT layers (i.e., sensor-actuator layer, network layer, and application layer), and IoT energy management is addressed from the perspectives of supply and demand to achieve green perception, communication, and computing. A smart home scenario is presented as a case study involving the main enabling technologies with supply-side, demand-side, and supply-demand balance considerations, and open issues in the field of IoT energy management are also discussed. 展开更多
关键词 internet of things internet of Energy Energy Management Smart Home COMMUNICATION Green computing
下载PDF
Dynamic Task Offloading for Digital Twin-Empowered Mobile Edge Computing via Deep Reinforcement Learning 被引量:1
19
作者 Ying Chen Wei Gu +2 位作者 Jiajie Xu Yongchao Zhang Geyong Min 《China Communications》 SCIE CSCD 2023年第11期164-175,共12页
Limited by battery and computing re-sources,the computing-intensive tasks generated by Internet of Things(IoT)devices cannot be processed all by themselves.Mobile edge computing(MEC)is a suitable solution for this pro... Limited by battery and computing re-sources,the computing-intensive tasks generated by Internet of Things(IoT)devices cannot be processed all by themselves.Mobile edge computing(MEC)is a suitable solution for this problem,and the gener-ated tasks can be offloaded from IoT devices to MEC.In this paper,we study the problem of dynamic task offloading for digital twin-empowered MEC.Digital twin techniques are applied to provide information of environment and share the training data of agent de-ployed on IoT devices.We formulate the task offload-ing problem with the goal of maximizing the energy efficiency and the workload balance among the ESs.Then,we reformulate the problem as an MDP problem and design DRL-based energy efficient task offloading(DEETO)algorithm to solve it.Comparative experi-ments are carried out which show the superiority of our DEETO algorithm in improving energy efficiency and balancing the workload. 展开更多
关键词 deep reinforcement learning digital twin internet of things mobile edge computing
下载PDF
Cache in fog computing design,concepts,contributions,and security issues in machine learning prospective
20
作者 Muhammad Ali Naeem Yousaf Bin Zikria +3 位作者 Rashid Ali Usman Tariq Yahui Meng Ali Kashif Bashir 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1033-1052,共20页
The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promisi... The massive growth of diversified smart devices and continuous data generation poses a challenge to communication architectures.To deal with this problem,communication networks consider fog computing as one of promising technologies that can improve overall communication performance.It brings on-demand services proximate to the end devices and delivers the requested data in a short time.Fog computing faces several issues such as latency,bandwidth,and link utilization due to limited resources and the high processing demands of end devices.To this end,fog caching plays an imperative role in addressing data dissemination issues.This study provides a comprehensive discussion of fog computing,Internet of Things(IoTs)and the critical issues related to data security and dissemination in fog computing.Moreover,we determine the fog-based caching schemes and contribute to deal with the existing issues of fog computing.Besides,this paper presents a number of caching schemes with their contributions,benefits,and challenges to overcome the problems and limitations of fog computing.We also identify machine learning-based approaches for cache security and management in fog computing,as well as several prospective future research directions in caching,fog computing,and machine learning. 展开更多
关键词 internet of things Cloud computing Fog computing CACHING LATENCY
下载PDF
上一页 1 2 77 下一页 到第
使用帮助 返回顶部