Pub Date : 2022-12-20DOI: 10.4108/eetinis.v9i4.2846
Vishal Sharma
Security and trust are the entangled role players in the future generation of wireless networks. Security in 5G networks is currently supported using several functions. Given the advantages of such a system, this article explores the functional security and trust for the 6G ecosystem with ultra-connectivity. Several associated challenges, application-specific domains, and consumer issues related to 6G security are discussed. The article highlights the network security-by-design and trust-by-design principles and performance expectations from the security protocols in supporting handover in an ultra-connected scenario. Finally, potential research directions are presented for a road towards the 6G ecosystem.
{"title":"Functional Security and Trust in Ultra-Connected 6G Ecosystem","authors":"Vishal Sharma","doi":"10.4108/eetinis.v9i4.2846","DOIUrl":"https://doi.org/10.4108/eetinis.v9i4.2846","url":null,"abstract":"Security and trust are the entangled role players in the future generation of wireless networks. Security in 5G networks is currently supported using several functions. Given the advantages of such a system, this article explores the functional security and trust for the 6G ecosystem with ultra-connectivity. Several associated challenges, application-specific domains, and consumer issues related to 6G security are discussed. The article highlights the network security-by-design and trust-by-design principles and performance expectations from the security protocols in supporting handover in an ultra-connected scenario. Finally, potential research directions are presented for a road towards the 6G ecosystem.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"27 1","pages":"e5"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90469939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-09DOI: 10.4108/eetinis.v9i4.2571
T. Dao, Hai-Yen Hoang, Van-Nhat Hoang, Duc-Tan Tran, D. Tran
There has been increasing interest in the application of artificial intelligence technologies to improve the quality of support services in healthcare. Some constraints, such as space, infrastructure, and environmental conditions, present challenges with assistive devices for humans. This paper proposed a wearable-based real-time human activity recognition system to monitor daily activities. The classification was done directly on the device, and the results could be checked over the internet. The accelerometer data collection application was developed on the device with a sampling frequency of 20Hz, and the random forest algorithm was embedded in the hardware. To improve the accuracy of the recognition system, a feature vector of 31 dimensions was calculated and used as an input per time window. Besides, the dynamic window method applied by the proposed model allowed us to change the data sampling time (1-3 seconds) and increase the performance of activity classification. The experiment results showed that the proposed system could classify 13 activities with a high accuracy of 99.4%. The rate of correctly classified activities was 96.1%. This work is promising for healthcare because of the convenience and simplicity of wearables.
{"title":"Human Activity Recognition System For Moderate Performance Microcontroller Using Accelerometer Data And Random Forest Algorithm","authors":"T. Dao, Hai-Yen Hoang, Van-Nhat Hoang, Duc-Tan Tran, D. Tran","doi":"10.4108/eetinis.v9i4.2571","DOIUrl":"https://doi.org/10.4108/eetinis.v9i4.2571","url":null,"abstract":"There has been increasing interest in the application of artificial intelligence technologies to improve the quality of support services in healthcare. Some constraints, such as space, infrastructure, and environmental conditions, present challenges with assistive devices for humans. This paper proposed a wearable-based real-time human activity recognition system to monitor daily activities. The classification was done directly on the device, and the results could be checked over the internet. The accelerometer data collection application was developed on the device with a sampling frequency of 20Hz, and the random forest algorithm was embedded in the hardware. To improve the accuracy of the recognition system, a feature vector of 31 dimensions was calculated and used as an input per time window. Besides, the dynamic window method applied by the proposed model allowed us to change the data sampling time (1-3 seconds) and increase the performance of activity classification. The experiment results showed that the proposed system could classify 13 activities with a high accuracy of 99.4%. The rate of correctly classified activities was 96.1%. This work is promising for healthcare because of the convenience and simplicity of wearables.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"5 1","pages":"e4"},"PeriodicalIF":0.0,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83648298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-21DOI: 10.4108/eetinis.v9i4.2218
Hung-Cuong Nguyen, Thu Ngan Dao, Ngoc Son Pham, Tran Long Dang, Trung Dung Nguyen, T. Truong
Nowadays, Virtual Reality is becoming more and more popular, and 360 video is a very important part of the system. 360 video transmission over the Internet faces many difficulties due to its large size. Therefore, to reduce the network bandwidth requirement of 360-degree video, Viewport Adaptive Streaming (VAS) was proposed. An important issue in VAS is how to estimate future user viewing direction. In this paper, we propose an algorithm called GLVP (GRU-LSTM-based-Viewport-Prediction) to estimate the typical view for the VAS system. The results show that our method can improve viewport estimation from 9.5% to near 20%compared with other methods.
{"title":"An Accurate Viewport Estimation Method for 360 Video Streaming using Deep Learning","authors":"Hung-Cuong Nguyen, Thu Ngan Dao, Ngoc Son Pham, Tran Long Dang, Trung Dung Nguyen, T. Truong","doi":"10.4108/eetinis.v9i4.2218","DOIUrl":"https://doi.org/10.4108/eetinis.v9i4.2218","url":null,"abstract":"Nowadays, Virtual Reality is becoming more and more popular, and 360 video is a very important part of the system. 360 video transmission over the Internet faces many difficulties due to its large size. Therefore, to reduce the network bandwidth requirement of 360-degree video, Viewport Adaptive Streaming (VAS) was proposed. An important issue in VAS is how to estimate future user viewing direction. In this paper, we propose an algorithm called GLVP (GRU-LSTM-based-Viewport-Prediction) to estimate the typical view for the VAS system. The results show that our method can improve viewport estimation from 9.5% to near 20%compared with other methods.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"50 1","pages":"e2"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76576910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-09-02DOI: 10.4108/eetinis.v9i4.1415
Mircea Eugen Dodan, Quoc-Tuan Vien, Tuan T. Nguyen
Network traffic prediction (NTP) represents an essential component in planning large-scale networks which are in general unpredictable and must adapt to unforeseen circumstances. In small to medium-size networks, the administrator can anticipate the fluctuations in traffic without the need of using forecasting tools, but in the scenario of large-scale networks where hundreds of new users can be added in a matter of weeks, more efficient forecasting tools are required to avoid congestion and over provisioning. Network and hardware resources are however limited; and hence resource allocation is critical for the NTP with scalable solutions. To this end, in this paper, we propose an efficient NTP by optimizing recurrent neural networks (RNNs) to analyse the traffic patterns that occur inside flow time series, and predict future samples based on the history of the traffic that was used for training. The predicted traffic with the proposed RNNs is compared with the real values that are stored in the database in terms of mean squared error, mean absolute error and categorical cross entropy. Furthermore, the real traffic samples for NTP training are compared with those from other techniques such as auto-regressive moving average (ARIMA) and AdaBoost regressor to validate the effectiveness of the proposed method. It is shown that the proposed RNN achieves a better performance than both the ARIMA and AdaBoost regressor when more samples are employed.
{"title":"Internet Traffic Prediction Using Recurrent Neural Networks","authors":"Mircea Eugen Dodan, Quoc-Tuan Vien, Tuan T. Nguyen","doi":"10.4108/eetinis.v9i4.1415","DOIUrl":"https://doi.org/10.4108/eetinis.v9i4.1415","url":null,"abstract":"Network traffic prediction (NTP) represents an essential component in planning large-scale networks which are in general unpredictable and must adapt to unforeseen circumstances. In small to medium-size networks, the administrator can anticipate the fluctuations in traffic without the need of using forecasting tools, but in the scenario of large-scale networks where hundreds of new users can be added in a matter of weeks, more efficient forecasting tools are required to avoid congestion and over provisioning. Network and hardware resources are however limited; and hence resource allocation is critical for the NTP with scalable solutions. To this end, in this paper, we propose an efficient NTP by optimizing recurrent neural networks (RNNs) to analyse the traffic patterns that occur inside flow time series, and predict future samples based on the history of the traffic that was used for training. The predicted traffic with the proposed RNNs is compared with the real values that are stored in the database in terms of mean squared error, mean absolute error and categorical cross entropy. Furthermore, the real traffic samples for NTP training are compared with those from other techniques such as auto-regressive moving average (ARIMA) and AdaBoost regressor to validate the effectiveness of the proposed method. It is shown that the proposed RNN achieves a better performance than both the ARIMA and AdaBoost regressor when more samples are employed.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"40 1","pages":"e1"},"PeriodicalIF":0.0,"publicationDate":"2022-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79203487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-11DOI: 10.4108/eetinis.v9i32.1376
Dac-Binh Ha, Van-Truong Truong, Yoonill Lee
In this paper, we focus on the performance analysis and optimization of an RF energy harvesting (EH) mobile edge computing (MEC) network by the assistance of the intelligent reflecting surface (IRS) and non-orthogonal multiple access (NOMA) schemes. Specifically, a pair of users harvest RF energy from a hybrid access point (HAP) and offloads their tasks to the MEC server at HAP through wireless links by employing an IRS-aided and uplink NOMA scheme. To evaluate the performance of this proposed system, the closed-form expressions of successful computation and energy transfer efficiency probabilities are derived. We further formulate a multi-objective optimization problem and propose an algorithm to find the optimal energy harvesting time switching ratio value to achieve the best performance, namely SENSGA-II. Moreover, the impacts of the network parameters are provided to draw helpful insight into the system performance. Finally, the Monte-Carlo simulation results are shown to confirm the correctness of our analysis. The results have shown that the deployment of IRS can improve the performance of this considered RF EH NOMA system by increasing the number of reflecting elements.
{"title":"Intelligent Reflecting Surface assisted RF Energy Harvesting Mobile Edge Computing NOMA Networks: Performance Analysis and Optimization","authors":"Dac-Binh Ha, Van-Truong Truong, Yoonill Lee","doi":"10.4108/eetinis.v9i32.1376","DOIUrl":"https://doi.org/10.4108/eetinis.v9i32.1376","url":null,"abstract":"In this paper, we focus on the performance analysis and optimization of an RF energy harvesting (EH) mobile edge computing (MEC) network by the assistance of the intelligent reflecting surface (IRS) and non-orthogonal multiple access (NOMA) schemes. Specifically, a pair of users harvest RF energy from a hybrid access point (HAP) and offloads their tasks to the MEC server at HAP through wireless links by employing an IRS-aided and uplink NOMA scheme. To evaluate the performance of this proposed system, the closed-form expressions of successful computation and energy transfer efficiency probabilities are derived. We further formulate a multi-objective optimization problem and propose an algorithm to find the optimal energy harvesting time switching ratio value to achieve the best performance, namely SENSGA-II. Moreover, the impacts of the network parameters are provided to draw helpful insight into the system performance. Finally, the Monte-Carlo simulation results are shown to confirm the correctness of our analysis. The results have shown that the deployment of IRS can improve the performance of this considered RF EH NOMA system by increasing the number of reflecting elements.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"68 1","pages":"5"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87195717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-10DOI: 10.4108/eetinis.v9i32.1909
J. Liu, Yuwei Zhang, Jing Wang, Tao Cui, Lin Zhang, C. Li, Kai Chen, Huan-guang Huang, Xuan-Yue Zhou, Wei Zhou, Zhao Wang, Sun Li, Suili Feng, D. Xie, Dahua Fan, Jianghong Ou, Jiangtao Ou, Yun Li, Haige Xiang, Kaimeno Dube, Abbarbas Muazu, Nakilavai Rono, Yajuan Tang
Within this specific record, our group study the two-way interact body (TWRN) that has a number of amplify-and-forward (AF) relays. In that, the best one is actually really got to help the info communication among sources. A interact option is actually really according to the obsolete channel problem information (CSI) in addition to our group analyze its own very personal effect on the system effectiveness in the Rayleigh fading atmospheres. Especially, we extremely preliminary acquire a restricted decreased connected for the outage opportunity and afterward current an asymptotic assessment for greater signal-to-noise ratio (SNR). Our group extra acquire a restricted decreased connected along with an asymptotic result on the authorize error cost (SER). Originating got via these results, our group easily quickly obtain that body system range order remain at unity offered that the CSI is actually really obsolete. Relative results reveal the rigidness on the effectiveness bounds along with the effects of obsolete interact option on the body system effectiveness. Simulation outcomes are likewise offered to corroborate the scholastic evaluation.
{"title":"Intelligent Bi-directional Relaying Communication for Edge Intelligence based Industrial IoT Networks","authors":"J. Liu, Yuwei Zhang, Jing Wang, Tao Cui, Lin Zhang, C. Li, Kai Chen, Huan-guang Huang, Xuan-Yue Zhou, Wei Zhou, Zhao Wang, Sun Li, Suili Feng, D. Xie, Dahua Fan, Jianghong Ou, Jiangtao Ou, Yun Li, Haige Xiang, Kaimeno Dube, Abbarbas Muazu, Nakilavai Rono, Yajuan Tang","doi":"10.4108/eetinis.v9i32.1909","DOIUrl":"https://doi.org/10.4108/eetinis.v9i32.1909","url":null,"abstract":"Within this specific record, our group study the two-way interact body (TWRN) that has a number of amplify-and-forward (AF) relays. In that, the best one is actually really got to help the info communication among sources. A interact option is actually really according to the obsolete channel problem information (CSI) in addition to our group analyze its own very personal effect on the system effectiveness in the Rayleigh fading atmospheres. Especially, we extremely preliminary acquire a restricted decreased connected for the outage opportunity and afterward current an asymptotic assessment for greater signal-to-noise ratio (SNR). Our group extra acquire a restricted decreased connected along with an asymptotic result on the authorize error cost (SER). Originating got via these results, our group easily quickly obtain that body system range order remain at unity offered that the CSI is actually really obsolete. Relative results reveal the rigidness on the effectiveness bounds along with the effects of obsolete interact option on the body system effectiveness. Simulation outcomes are likewise offered to corroborate the scholastic evaluation.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"33 1","pages":"4"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88427201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-04DOI: 10.4108/eetinis.v9i32.1125
Minh Le Nguyen, Cuong Nguyen, Hoa T. K. Tran
The most critical needs for wireless sensor networks (WSNs) are security, privacy, dependability, and autonomy. The networks might be vulnerable to hostile users and harmful usage if these problems are not ensured. Attacks and hazards are higher with centralized WSNs, particularly when data is shared with other businesses and sent between devices. In this paper, a WSN model with integrated blockchain security technology is proposed. Blockchains store the identity of each node. The validation is done by public blockchains and private blockchains. For sensor nodes, the authentication is implemented on the private blockchain. The public blockchain is used to authenticate cluster heads. Performing network attacks can easily be performed by unregistered nodes to access resources in the network. Broadcasting false information on the path of malicious nodes can increase packet latency and reduce packet delivery rate. In this paper, the model recommends the most secure nodes in the network to be used for secure routing. The main purpose is to reduce the attack of hackers from outside the network, improve the efficiency of detecting malicious nodes.
{"title":"A Framework of Deploying Blockchain in Wireless Sensor Networks","authors":"Minh Le Nguyen, Cuong Nguyen, Hoa T. K. Tran","doi":"10.4108/eetinis.v9i32.1125","DOIUrl":"https://doi.org/10.4108/eetinis.v9i32.1125","url":null,"abstract":"The most critical needs for wireless sensor networks (WSNs) are security, privacy, dependability, and autonomy. The networks might be vulnerable to hostile users and harmful usage if these problems are not ensured. Attacks and hazards are higher with centralized WSNs, particularly when data is shared with other businesses and sent between devices. In this paper, a WSN model with integrated blockchain security technology is proposed. Blockchains store the identity of each node. The validation is done by public blockchains and private blockchains. For sensor nodes, the authentication is implemented on the private blockchain. The public blockchain is used to authenticate cluster heads. Performing network attacks can easily be performed by unregistered nodes to access resources in the network. Broadcasting false information on the path of malicious nodes can increase packet latency and reduce packet delivery rate. In this paper, the model recommends the most secure nodes in the network to be used for secure routing. The main purpose is to reduce the attack of hackers from outside the network, improve the efficiency of detecting malicious nodes.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"196 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72893309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-21DOI: 10.4108/eetinis.v9i32.1058
Viet Hung Nguyen, Ngoc Nam Pham, T. Thang, Duy Tien Bui, Huu-Thanh Nguyen, T. Truong
Nowadays, omnidirectional content, which delivers 360-degree views of scenes, is a significant aspect of Virtual Reality systems. While 360 video requires a lot of bandwidth, users only see visible tiles, therefore a large amount of bitrate can be saved without affecting the user’s experience on the service. The fact leads to current video adaptation solutions to filter out superfluous parts and extraneous bandwidth. To form a good basis for these adaptations, it is necessary to understand human’s video quality perception. In our research, we contribute to building an effective omnidirectional video database that can be applied to study the effects of the five zones of the human retina. We also design a new video quality assessment method to analyze the impacts of those zones of a 360 video according to the human retina. The proposed scheme is found to outperform 22 current objective quality measures by 11 to 31% in terms of the PCC parameter.
{"title":"Retina-based quality assessment of tile-coded 360-degree videos","authors":"Viet Hung Nguyen, Ngoc Nam Pham, T. Thang, Duy Tien Bui, Huu-Thanh Nguyen, T. Truong","doi":"10.4108/eetinis.v9i32.1058","DOIUrl":"https://doi.org/10.4108/eetinis.v9i32.1058","url":null,"abstract":"Nowadays, omnidirectional content, which delivers 360-degree views of scenes, is a significant aspect of Virtual Reality systems. While 360 video requires a lot of bandwidth, users only see visible tiles, therefore a large amount of bitrate can be saved without affecting the user’s experience on the service. The fact leads to current video adaptation solutions to filter out superfluous parts and extraneous bandwidth. To form a good basis for these adaptations, it is necessary to understand human’s video quality perception. In our research, we contribute to building an effective omnidirectional video database that can be applied to study the effects of the five zones of the human retina. We also design a new video quality assessment method to analyze the impacts of those zones of a 360 video according to the human retina. The proposed scheme is found to outperform 22 current objective quality measures by 11 to 31% in terms of the PCC parameter.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"7 1","pages":"2"},"PeriodicalIF":0.0,"publicationDate":"2022-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84424860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fault detection plays an important role in the daily maintenance of power electric system. Big data and knowledge graph (KG) have been proposed by researchers to solve many problems in industrial Internet of Things, which also give lots of potentials in improving the performance of fault detection for electric power systems. In particular, this paper analyzes a distributed knowledge graph framework for fault detection in the electric power systems, where multiple devices train their local detection models used for fault detection assisted with a central server. Each device owns its local data set composed of historical fault information and current device state, which can be used to train a local model for fault detection. To enhance the detection performance, the distributed devices interact with each other in the KG framework, where the devices ought to achieve the regional computation in addition to the model aggregation within a specified latency threshold. Through searching for the vibrant qualities together with determined ability at the devices, we enhance the knowledge graph framework by the optimum variety of energetic devices together with the restriction of latency as well as data transmission. Particularly, two data transmission bandwidth allocation (BA) schemes are developed for the distributed knowledge graph framework, through which scheme I is actually bared after the instantaneous device state information (DSI), and scheme II utilizes particle swarm optimization (PSO) technique along with the statistical DSI. The results of simulation on the examination as well as convergence are lastly demonstrated to show the advantages of the proposed distributed KG framework in the fault detection for the electric power systems.
{"title":"Big Data and Knowledge Graph Based Fault Diagnosis for Electric Power Systems","authors":"Yuzhong Zhou, Zhèng-Hóng Lin, Liang Tu, Yufei Song, Zhengrong Wu","doi":"10.4108/eetinis.v9i32.1268","DOIUrl":"https://doi.org/10.4108/eetinis.v9i32.1268","url":null,"abstract":"Fault detection plays an important role in the daily maintenance of power electric system. Big data and knowledge graph (KG) have been proposed by researchers to solve many problems in industrial Internet of Things, which also give lots of potentials in improving the performance of fault detection for electric power systems. In particular, this paper analyzes a distributed knowledge graph framework for fault detection in the electric power systems, where multiple devices train their local detection models used for fault detection assisted with a central server. Each device owns its local data set composed of historical fault information and current device state, which can be used to train a local model for fault detection. To enhance the detection performance, the distributed devices interact with each other in the KG framework, where the devices ought to achieve the regional computation in addition to the model aggregation within a specified latency threshold. Through searching for the vibrant qualities together with determined ability at the devices, we enhance the knowledge graph framework by the optimum variety of energetic devices together with the restriction of latency as well as data transmission. Particularly, two data transmission bandwidth allocation (BA) schemes are developed for the distributed knowledge graph framework, through which scheme I is actually bared after the instantaneous device state information (DSI), and scheme II utilizes particle swarm optimization (PSO) technique along with the statistical DSI. The results of simulation on the examination as well as convergence are lastly demonstrated to show the advantages of the proposed distributed KG framework in the fault detection for the electric power systems.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"73 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2022-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80540298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-08DOI: 10.4108/eetinis.v9i31.960
Jun Liu, Yuwei Zhang, Jing Wang, Tao Cui, Lin Zhang, C. Li, Kai Chen, Sun Li, Sunli Feng, Dongqing Xie, Dahua Fan, Jianghong Ou, Yun Li, Haige Xiang, Kaimeno Dube, Abbarbas Muazu, Nakilavai Rono, Fusheng Zhu, Liming Chen, Wenvong Zhou, Zhusong Liu
This paper studies one typical mobile edge computing (MEC) system, where a single user has some intensively calculating tasks to be computed by M edge nodes (ENs) with much more powerful calculating capability. In particular, unmanned aerial vehicle (UAV) can act as the ENs due to its flexibility and high mobility in the deployment. For this system, we propose several EN selection criteria to improve the system whole performance of computation and communication. Specifically, criterion I selects the best EN based on maximizing the received signal-to-noise ratio (SNR) at the EN, criterion II performs the selection according to the most powerful calculating capability, while criterion III chooses one EN randomly. For each EN selection criterion, we perform the system performance evaluation by analyzing outage probability (OP) through deriving some analytical expressions. From these expressions, we can obtain some meaningful insights regarding how to design the MEC system. We finally perform some simulation results to demonstrate the effectiveness of the proposed MEC network. In particular, criterion I can exploit the full diversity order equal to M.
{"title":"Outage Probability Analysis for UAV-Aided Mobile Edge Computing Networks","authors":"Jun Liu, Yuwei Zhang, Jing Wang, Tao Cui, Lin Zhang, C. Li, Kai Chen, Sun Li, Sunli Feng, Dongqing Xie, Dahua Fan, Jianghong Ou, Yun Li, Haige Xiang, Kaimeno Dube, Abbarbas Muazu, Nakilavai Rono, Fusheng Zhu, Liming Chen, Wenvong Zhou, Zhusong Liu","doi":"10.4108/eetinis.v9i31.960","DOIUrl":"https://doi.org/10.4108/eetinis.v9i31.960","url":null,"abstract":"This paper studies one typical mobile edge computing (MEC) system, where a single user has some intensively calculating tasks to be computed by M edge nodes (ENs) with much more powerful calculating capability. In particular, unmanned aerial vehicle (UAV) can act as the ENs due to its flexibility and high mobility in the deployment. For this system, we propose several EN selection criteria to improve the system whole performance of computation and communication. Specifically, criterion I selects the best EN based on maximizing the received signal-to-noise ratio (SNR) at the EN, criterion II performs the selection according to the most powerful calculating capability, while criterion III chooses one EN randomly. For each EN selection criterion, we perform the system performance evaluation by analyzing outage probability (OP) through deriving some analytical expressions. From these expressions, we can obtain some meaningful insights regarding how to design the MEC system. We finally perform some simulation results to demonstrate the effectiveness of the proposed MEC network. In particular, criterion I can exploit the full diversity order equal to M.","PeriodicalId":33474,"journal":{"name":"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems","volume":"2016 1","pages":"4"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86695050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}