首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
Enhancing 5G network slicing for IoT traffic with a novel clustering framework 利用新颖的聚类框架加强 5G 网络切片,以实现物联网流量
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-06 DOI: 10.1016/j.pmcj.2024.101974

The current extensive deployment of IoT devices, crucial for enhancing smart computing applications in diverse domains, necessitates the utilization of essential 5G features, notably network slicing, to ensure the provision of distinct and reliable services. However, the voluminous, dynamic, and varied nature of IoT traffic introduces complexities in network flow classification, traffic analysis, and the accurate determination of network requirements. These complexities pose a significant challenge in effectively provisioning 5G network slices across various applications. To address this, we propose an innovative approach for network traffic classification, comprising a pipeline that integrates Principal Component Analysis (PCA) with KMeans clustering and the Hellinger distance measure. The application of PCA as the initial step effectively reduces the dimensionality of the data while retaining most of the original information, which significantly lowers the computational demands for the subsequent KMeans clustering phase. KMeans, an unsupervised learning method, eliminates the labor-intensive and error-prone process of data labeling. Following this, a Hellinger distance-based recursive KMeans algorithm is employed to merge similar clusters, aiding in the determination of the optimal number of clusters. This results in final clustering outcomes that are both compact and intuitively interpretable, overcoming the inherent limitations of the traditional KMeans algorithm, such as its sensitivity to initial conditions and the requirement for manually specifying the number of clusters. An evaluation of our method using a real-world IoT dataset has shown that our pipeline can efficiently represent the dataset in three distinct clusters. The characteristics of these clusters can be readily understood and directly correlated with various types of network slices in the 5G network, demonstrating the efficacy of our approach in managing the complexities of IoT traffic for 5G network slice provisioning.

目前,物联网设备的广泛部署对加强不同领域的智能计算应用至关重要,因此有必要利用基本的 5G 功能,特别是网络切片功能,以确保提供独特而可靠的服务。然而,物联网流量的海量、动态和多样化特性给网络流分类、流量分析和准确确定网络需求带来了复杂性。这些复杂性对在各种应用中有效配置 5G 网络切片构成了巨大挑战。为解决这一问题,我们提出了一种创新的网络流量分类方法,其中包括一个将主成分分析(PCA)与 KMeans 聚类和海灵格距离测量相结合的管道。作为初始步骤,PCA 的应用有效降低了数据维度,同时保留了大部分原始信息,这大大降低了后续 KMeans 聚类阶段的计算需求。KMeans 是一种无监督学习方法,省去了数据标注这一耗费大量人力且容易出错的过程。随后,采用基于海灵格距离的递归 KMeans 算法来合并相似的聚类,从而帮助确定聚类的最佳数量。这使得最终的聚类结果既紧凑又可直观地解释,克服了传统 KMeans 算法的固有局限性,如对初始条件的敏感性和手动指定聚类数量的要求。使用真实世界的物联网数据集对我们的方法进行的评估表明,我们的管道可以有效地将数据集表示为三个不同的簇。这些聚类的特征很容易理解,并与 5G 网络中各种类型的网络切片直接相关,这证明了我们的方法在管理物联网流量的复杂性以进行 5G 网络切片配置方面的功效。
{"title":"Enhancing 5G network slicing for IoT traffic with a novel clustering framework","authors":"","doi":"10.1016/j.pmcj.2024.101974","DOIUrl":"10.1016/j.pmcj.2024.101974","url":null,"abstract":"<div><p>The current extensive deployment of IoT devices, crucial for enhancing smart computing applications in diverse domains, necessitates the utilization of essential 5G features, notably network slicing, to ensure the provision of distinct and reliable services. However, the voluminous, dynamic, and varied nature of IoT traffic introduces complexities in network flow classification, traffic analysis, and the accurate determination of network requirements. These complexities pose a significant challenge in effectively provisioning 5G network slices across various applications. To address this, we propose an innovative approach for network traffic classification, comprising a pipeline that integrates Principal Component Analysis (PCA) with KMeans clustering and the Hellinger distance measure. The application of PCA as the initial step effectively reduces the dimensionality of the data while retaining most of the original information, which significantly lowers the computational demands for the subsequent KMeans clustering phase. KMeans, an unsupervised learning method, eliminates the labor-intensive and error-prone process of data labeling. Following this, a Hellinger distance-based recursive KMeans algorithm is employed to merge similar clusters, aiding in the determination of the optimal number of clusters. This results in final clustering outcomes that are both compact and intuitively interpretable, overcoming the inherent limitations of the traditional KMeans algorithm, such as its sensitivity to initial conditions and the requirement for manually specifying the number of clusters. An evaluation of our method using a real-world IoT dataset has shown that our pipeline can efficiently represent the dataset in three distinct clusters. The characteristics of these clusters can be readily understood and directly correlated with various types of network slices in the 5G network, demonstrating the efficacy of our approach in managing the complexities of IoT traffic for 5G network slice provisioning.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000993/pdfft?md5=35a9df2be399c91dc234552871f71dd2&pid=1-s2.0-S1574119224000993-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142001958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A stable and efficient dynamic ensemble method for pothole detection 一种稳定高效的坑洞检测动态集合方法
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-06 DOI: 10.1016/j.pmcj.2024.101973

Roads can develop potholes over time, posing hazards to traffic. However, regular road damage inspections is challenging due to the high cost of road surveys. By applying object detection models on footage acquired from dashboard cameras installed in garbage trucks that operate across the city, we can conduct road surveys at a low cost. In our previous work we introduced the Ensemble of Classification Mechanisms (ECM), which suppresses false positives by cross-verifying objects detected by an object detection model using a different image classification model. However, ECM faces challenges in achieving both fast inference speed and high detection performance simultaneously. It also struggles in environments where roads vary in their suitability for false positive suppression. To address these issues, we propose the Dynamic Ensemble of Classification Mechanisms (DynamicECM). This approach utilizes ECM selectively, enabling stable inference with minimal false positive suppression. To evaluate our new method, we constructed an evaluation dataset comprising objects that cause false positives in pothole detection. Our experiments demonstrate that ECM achieves higher precision, average precision (AP), and F1 scores compared to existing methods. Furthermore, DynamicECM improves the trade-off between speed and detection performance, outperforming ECM, and achieves stable inference even in challenging datasets where ECM would falter. Our method is highly scalable and expected to contribute to the stability and efficiency of inference across various object detection models. In our previous work we developed an Ensemble of Classification Mechanisms (ECM), which suppresses false positives by rechecking objects detected by an object detector with a different image classification model. However, ECM cannot achieve both fast inference speed and high detection performance at the same time. It also struggles in environments that have a mixture of roads suitable for false positive suppression and unsuited for false positive suppression. To solve these problems, we propose “Dynamic Ensemble of Classification Mechanisms”. Since this method uses ECM only when deemed necessary, stable inference can be achieved efficiently without excessive suppression of false positives. In order to evaluate our new method, we constructed an evaluation dataset that includes objects that cause false positives in pothole detection. Our evaluation experiments show that ECM achieves higher precision, AP, and F1 compared to existing methods. In addition, DynamicECM improves the trade-off between speed and detection performance better than ECM, and achieves stable inference on datasets that would ECM would struggle on. Our method is highly scalable and expected to contribute to the stability and efficiency of inference for various object detection models.

随着时间的推移,道路会出现坑洼,对交通造成危害。然而,由于道路勘测费用高昂,定期检查道路损坏情况具有挑战性。通过对安装在城市各处垃圾车上的仪表盘摄像头获取的画面应用物体检测模型,我们可以以较低的成本进行道路勘测。在之前的工作中,我们引入了分类机制组合(ECM),它通过使用不同的图像分类模型交叉验证物体检测模型检测到的物体,从而抑制误报。然而,ECM 在同时实现快速推理和高检测性能方面面临挑战。此外,在道路对抑制误报的适用性不尽相同的环境中,ECM 也很难发挥作用。为了解决这些问题,我们提出了动态分类机制组合(DynamicECM)。这种方法有选择性地利用 ECM,从而实现了稳定的推理和最小的误报抑制。为了评估我们的新方法,我们构建了一个评估数据集,其中包括在坑洞检测中造成误报的物体。实验证明,与现有方法相比,ECM 获得了更高的精度、平均精度 (AP) 和 F1 分数。此外,DynamicECM 改善了速度和检测性能之间的权衡,其性能优于 ECM,即使在 ECM 会出现问题的具有挑战性的数据集中,也能实现稳定的推理。我们的方法具有很强的可扩展性,有望提高各种物体检测模型推理的稳定性和效率。在我们之前的工作中,我们开发了一种分类机制组合(ECM),它通过使用不同的图像分类模型重新检查物体检测器检测到的物体来抑制误报。然而,ECM 无法同时实现快速推理和高检测性能。此外,在适合抑制误报和不适合抑制误报的道路混杂的环境中,ECM 也很难发挥作用。为了解决这些问题,我们提出了 "分类机制动态组合"。由于这种方法只在认为必要时才使用 ECM,因此可以高效地实现稳定推理,而不会过度抑制误报。为了评估我们的新方法,我们构建了一个评估数据集,其中包括在坑洞检测中会导致误报的对象。我们的评估实验表明,与现有方法相比,ECM 实现了更高的精度、AP 和 F1。此外,DynamicECM 比 ECM 更好地改善了速度和检测性能之间的权衡,并在 ECM 难以处理的数据集上实现了稳定的推理。我们的方法具有很强的可扩展性,有望提高各种物体检测模型推理的稳定性和效率。
{"title":"A stable and efficient dynamic ensemble method for pothole detection","authors":"","doi":"10.1016/j.pmcj.2024.101973","DOIUrl":"10.1016/j.pmcj.2024.101973","url":null,"abstract":"<div><p>Roads can develop potholes over time, posing hazards to traffic. However, regular road damage inspections is challenging due to the high cost of road surveys. By applying object detection models on footage acquired from dashboard cameras installed in garbage trucks that operate across the city, we can conduct road surveys at a low cost. In our previous work we introduced the Ensemble of Classification Mechanisms (ECM), which suppresses false positives by cross-verifying objects detected by an object detection model using a different image classification model. However, ECM faces challenges in achieving both fast inference speed and high detection performance simultaneously. It also struggles in environments where roads vary in their suitability for false positive suppression. To address these issues, we propose the Dynamic Ensemble of Classification Mechanisms (DynamicECM). This approach utilizes ECM selectively, enabling stable inference with minimal false positive suppression. To evaluate our new method, we constructed an evaluation dataset comprising objects that cause false positives in pothole detection. Our experiments demonstrate that ECM achieves higher precision, average precision (AP), and F1 scores compared to existing methods. Furthermore, DynamicECM improves the trade-off between speed and detection performance, outperforming ECM, and achieves stable inference even in challenging datasets where ECM would falter. Our method is highly scalable and expected to contribute to the stability and efficiency of inference across various object detection models. In our previous work we developed an Ensemble of Classification Mechanisms (ECM), which suppresses false positives by rechecking objects detected by an object detector with a different image classification model. However, ECM cannot achieve both fast inference speed and high detection performance at the same time. It also struggles in environments that have a mixture of roads suitable for false positive suppression and unsuited for false positive suppression. To solve these problems, we propose “Dynamic Ensemble of Classification Mechanisms”. Since this method uses ECM only when deemed necessary, stable inference can be achieved efficiently without excessive suppression of false positives. In order to evaluate our new method, we constructed an evaluation dataset that includes objects that cause false positives in pothole detection. Our evaluation experiments show that ECM achieves higher precision, AP, and F1 compared to existing methods. In addition, DynamicECM improves the trade-off between speed and detection performance better than ECM, and achieves stable inference on datasets that would ECM would struggle on. Our method is highly scalable and expected to contribute to the stability and efficiency of inference for various object detection models.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142049781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GTDIM: Grid-based Two-stage Dynamic Incentive Mechanism for Mobile Crowd Sensing GTDIM:基于网格的移动人群感知两阶段动态激励机制
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-11 DOI: 10.1016/j.pmcj.2024.101964

Mobile Crowd Sensing (MCS) technology, as an emerging data collection paradigm, offers distinct advantages, particularly in applications like smart city management. However, existing researches inadequately address the comprehensive solution to the problem of reliable task allocation according to the requirements such as task budget, sensory data quality, and real-time data collection, especially under varying participant engagement in MCS systems. To bridge this gap, we propose the Grid-based Two-stage Dynamic Incentive Mechanism (GTDIM). In the first stage, the Candidate Participant Set (CPS) establishment phase, participants receive compensation for collecting sensory data when a sufficient number are available. When participants are insufficient, additional rewards inspired by the grid division of sensing areas are progressively offered to attract more participants. In the subsequent stage, utilizing the established CPS, participants are selected through a greedy algorithm based on the newly devised Participant Matching Index (PMI), which integrates various participant features. Extensive simulation results reveal the impact of PMI on participant selection. Numerical findings conclusively demonstrate GTDIM’s superior performance over baseline incentive mechanisms in terms of task assignment ratio, participant payment, and especially when dealing with larger sensing tasks.

移动人群感知(MCS)技术作为一种新兴的数据收集模式,具有明显的优势,尤其是在智能城市管理等应用中。然而,现有的研究还不足以全面解决根据任务预算、感知数据质量和实时数据采集等要求进行可靠任务分配的问题,尤其是在 MCS 系统中参与者参与度不同的情况下。为了弥补这一不足,我们提出了基于网格的两阶段动态激励机制(GTDIM)。在第一阶段,即候选参与者集(CPS)建立阶段,当有足够数量的参与者时,参与者会因收集感官数据而获得补偿。当参与者不足时,受网格划分感知区域的启发,会逐步提供额外奖励,以吸引更多参与者。在随后的阶段,利用已建立的 CPS,通过基于新设计的参与者匹配指数(PMI)的贪婪算法选择参与者,该指数综合了参与者的各种特征。广泛的模拟结果揭示了 PMI 对参与者选择的影响。数值结果确凿地证明了 GTDIM 在任务分配比例、参与者报酬,尤其是在处理大型传感任务时的表现优于基准激励机制。
{"title":"GTDIM: Grid-based Two-stage Dynamic Incentive Mechanism for Mobile Crowd Sensing","authors":"","doi":"10.1016/j.pmcj.2024.101964","DOIUrl":"10.1016/j.pmcj.2024.101964","url":null,"abstract":"<div><p>Mobile Crowd Sensing (MCS) technology, as an emerging data collection paradigm, offers distinct advantages, particularly in applications like smart city management. However, existing researches inadequately address the comprehensive solution to the problem of reliable task allocation according to the requirements such as task budget, sensory data quality, and real-time data collection, especially under varying participant engagement in MCS systems. To bridge this gap, we propose the Grid-based Two-stage Dynamic Incentive Mechanism (GTDIM). In the first stage, the Candidate Participant Set (CPS) establishment phase, participants receive compensation for collecting sensory data when a sufficient number are available. When participants are insufficient, additional rewards inspired by the grid division of sensing areas are progressively offered to attract more participants. In the subsequent stage, utilizing the established CPS, participants are selected through a greedy algorithm based on the newly devised Participant Matching Index (PMI), which integrates various participant features. Extensive simulation results reveal the impact of PMI on participant selection. Numerical findings conclusively demonstrate GTDIM’s superior performance over baseline incentive mechanisms in terms of task assignment ratio, participant payment, and especially when dealing with larger sensing tasks.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141711433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WiCAR: A class-incremental system for WiFi activity recognition WiCAR:用于 WiFi 活动识别的类递增系统
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.pmcj.2024.101963
Zhihua Li , Shuli Ning , Bin Lian , Chao Wang , Zhongcheng Wei

The proposal of Integrated Sensing and Communications has once again drawn researchers’ attention to WiFi sensing, propelling applications based on WiFi sensing into an advanced stage. However, the current field of activity recognition only identifies fixed categories of activities, neglecting the growing demand for perceiving activity types in real applications over time. In response to the issue, we present WiCAR, a WiFi activity recognition system designed for class incremental scenarios. WiCAR takes antenna array-fused image data as input, employing the Wi-RA model with parallel stacked activation functions as its backbone network. To alleviate the typical catastrophic forgetting issue in class-incremental learning, WiCAR employs a strategy of replaying known data. Additionally, we adopts knowledge distillation to improve accuracy among old samples during the incremental process. To tackle the imbalance in the number of samples between old and new classes, the model is updated through weight alignment. This serious of strategies endows the system with the capability to progressively learn and handle new classes. We conducted extensive experiments to evaluate the system performance. The experimental results demonstrate that our system exhibits excellent performance regardless of the number of tasks, whether tasks are uniform or non-uniform, and the order of task arrivals. The highest average accuracy reaches 96.429%, and even in the presence of six incremental stages, the average accuracy remains at 92.867%.

综合传感与通信 "的提出再次吸引了研究人员对 WiFi 传感的关注,推动基于 WiFi 传感的应用进入高级阶段。然而,目前的活动识别领域只能识别固定类别的活动,而忽视了在实际应用中对随时间变化的活动类型的感知这一日益增长的需求。针对这一问题,我们提出了 WiCAR,一个专为类别递增场景设计的 WiFi 活动识别系统。WiCAR 以天线阵列融合图像数据为输入,采用具有并行堆叠激活函数的 Wi-RA 模型作为骨干网络。为了缓解类递增学习中典型的灾难性遗忘问题,WiCAR 采用了重放已知数据的策略。此外,我们还采用了知识蒸馏技术,以提高增量过程中旧样本的准确性。为了解决新旧类之间样本数量不平衡的问题,我们通过权重对齐来更新模型。这一系列策略赋予了系统逐步学习和处理新类别的能力。我们进行了大量实验来评估系统性能。实验结果表明,无论任务数量多少、任务是均匀的还是非均匀的、任务到达的顺序如何,我们的系统都表现出了卓越的性能。最高平均准确率达到 96.429%,即使在有六个增量阶段的情况下,平均准确率也保持在 92.867%。
{"title":"WiCAR: A class-incremental system for WiFi activity recognition","authors":"Zhihua Li ,&nbsp;Shuli Ning ,&nbsp;Bin Lian ,&nbsp;Chao Wang ,&nbsp;Zhongcheng Wei","doi":"10.1016/j.pmcj.2024.101963","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101963","url":null,"abstract":"<div><p>The proposal of Integrated Sensing and Communications has once again drawn researchers’ attention to WiFi sensing, propelling applications based on WiFi sensing into an advanced stage. However, the current field of activity recognition only identifies fixed categories of activities, neglecting the growing demand for perceiving activity types in real applications over time. In response to the issue, we present WiCAR, a WiFi activity recognition system designed for class incremental scenarios. WiCAR takes antenna array-fused image data as input, employing the Wi-RA model with parallel stacked activation functions as its backbone network. To alleviate the typical catastrophic forgetting issue in class-incremental learning, WiCAR employs a strategy of replaying known data. Additionally, we adopts knowledge distillation to improve accuracy among old samples during the incremental process. To tackle the imbalance in the number of samples between old and new classes, the model is updated through weight alignment. This serious of strategies endows the system with the capability to progressively learn and handle new classes. We conducted extensive experiments to evaluate the system performance. The experimental results demonstrate that our system exhibits excellent performance regardless of the number of tasks, whether tasks are uniform or non-uniform, and the order of task arrivals. The highest average accuracy reaches 96.429%, and even in the presence of six incremental stages, the average accuracy remains at 92.867%.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent defense strategies: Comprehensive attack detection in VANET with deep reinforcement learning 智能防御策略:利用深度强化学习在 VANET 中进行全面攻击检测
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-20 DOI: 10.1016/j.pmcj.2024.101962
Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi

Vehicular Ad Hoc Network (VANET) facilitates the exchange of vehicular information through Vehicle-to-Vehicle (V2V) communication, contributing to Cooperative Intelligent Transportation Systems (C-ITS). The transmitted messages among vehicles are vulnerable to various security threats executed by malicious insider nodes. The dynamic VANET necessitates context-aware solutions for detecting various security attacks. Existing learning and deterministic mechanisms showed high detection accuracy for attacks on which they were trained explicitly for large datasets. Therefore, we propose an intelligent framework utilizing Deep Reinforcement Learning (DRL) for attack detection in evolving scenarios and mitigate the need for extensive training datasets. Our approach employs a Deep Q Network (DQN) trained on a compact dataset encompassing multiple attacks. The trained model is then applied to an unknown and extensive dataset, detecting various attacks with high accuracy. Notably, the model autonomously updates itself upon observing changes in the network context. This framework represents a promising security solution that is effective and adaptable for V2V communication in VANET.

车载 Ad Hoc 网络(VANET)通过车对车(V2V)通信促进了车辆信息的交换,为合作式智能交通系统(C-ITS)做出了贡献。车辆间传输的信息容易受到内部恶意节点的各种安全威胁。动态的 VANET 需要能感知上下文的解决方案来检测各种安全攻击。现有的学习和确定性机制在大型数据集上对经过明确训练的攻击显示出很高的检测精度。因此,我们提出了一种利用深度强化学习(DRL)的智能框架,用于在不断变化的场景中检测攻击,并减少对大量训练数据集的需求。我们的方法采用了在包含多种攻击的紧凑型数据集上训练的深度 Q 网络 (DQN)。然后将训练好的模型应用于未知的大量数据集,从而高精度地检测出各种攻击。值得注意的是,该模型能在观察到网络环境变化时自主更新。该框架是一种很有前途的安全解决方案,对 VANET 中的 V2V 通信既有效又适用。
{"title":"Intelligent defense strategies: Comprehensive attack detection in VANET with deep reinforcement learning","authors":"Rukhsar Sultana,&nbsp;Jyoti Grover,&nbsp;Meenakshi Tripathi","doi":"10.1016/j.pmcj.2024.101962","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101962","url":null,"abstract":"<div><p>Vehicular Ad Hoc Network (VANET) facilitates the exchange of vehicular information through Vehicle-to-Vehicle (V2V) communication, contributing to Cooperative Intelligent Transportation Systems (C-ITS). The transmitted messages among vehicles are vulnerable to various security threats executed by malicious insider nodes. The dynamic VANET necessitates context-aware solutions for detecting various security attacks. Existing learning and deterministic mechanisms showed high detection accuracy for attacks on which they were trained explicitly for large datasets. Therefore, we propose an intelligent framework utilizing Deep Reinforcement Learning (DRL) for attack detection in evolving scenarios and mitigate the need for extensive training datasets. Our approach employs a Deep Q Network (DQN) trained on a compact dataset encompassing multiple attacks. The trained model is then applied to an unknown and extensive dataset, detecting various attacks with high accuracy. Notably, the model autonomously updates itself upon observing changes in the network context. This framework represents a promising security solution that is effective and adaptable for V2V communication in VANET.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141480439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Localizing unknown nodes with an FPGA-enhanced edge computing UAV in wireless sensor networks: Implementation and evaluation 在无线传感器网络中使用 FPGA 增强型边缘计算无人机定位未知节点:实施与评估
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-19 DOI: 10.1016/j.pmcj.2024.101961
Rahma Mani , Antonio Rios-Navarro , Jose Luis Sevillano Ramos , Noureddine Liouane

Great interest is directed toward real-time applications to determine the exact location of sensor nodes deployed in an area of interest. In this paper, we present a novel approach using a combination of the Kalman filter and regularized bounding box method for localizing unknown nodes in an area using an FPGA-enhanced edge computing UAV whose trajectory is known and is represented as the position of many anchors. The UAV is equipped with a GPS system that allows it to gather location data of sensor nodes as it moves around its environment. We employ a regularized bounding box to predict the positions of the unknown nodes using regularization factors and we use the Kalman filter algorithm to smooth and improve the accuracy of the sensor nodes to be localized. In order to localize the unknown nodes, the UAV receives the number of hops from each node and uses this information as input to the localization algorithm. Furthermore, the use of an FPGA board allows for real-time processing of sensory data, enabling the UAV to make fast and accurate decisions in dynamic environments. The localization algorithm was implemented on the FPGA board “Zynq MiniZed 7007s evaluation board” using Xilinx blocks in Simulink, and the generated code was converted into VHDL using Xilinx System Generator. The algorithm was simulated and synthesized using “Vivado” software. In fact, the proposed system was evaluated by comparing the performances achieved through two different implementations: Hardware and Software implementation. In effect, the performance of FPGA hardware implementation presents a new achievement in localization due to its easy testing and fast implementation. Our results show that this approach can efficiently locate unknown nodes with good latency and high accuracy. In fact, the execution time of the FPGA-integrated algorithm is reduced by about 60 times compared to the software implementation and the power consumption is about 100 mW, which proves the suitability of FPGA for localization in WSNs, offering a promising solution for various mobile WSN applications.

人们对实时应用中确定部署在相关区域的传感器节点的确切位置非常感兴趣。在本文中,我们提出了一种结合卡尔曼滤波器和正则化边界框方法的新方法,利用 FPGA 增强型边缘计算无人机定位区域内的未知节点,该无人机的轨迹是已知的,并表示为许多锚点的位置。无人飞行器配备了 GPS 系统,可在环境中移动时收集传感器节点的位置数据。我们采用正则化边界框,利用正则化因子预测未知节点的位置,并使用卡尔曼滤波算法来平滑和提高待定位传感器节点的精度。为了定位未知节点,无人飞行器接收来自每个节点的跳数,并将此信息作为定位算法的输入。此外,使用 FPGA 板可以实时处理传感数据,使无人机能够在动态环境中做出快速、准确的决策。使用 Simulink 中的 Xilinx 模块在 FPGA 板 "Zynq MiniZed 7007s 评估板 "上实现了定位算法,并使用 Xilinx System Generator 将生成的代码转换为 VHDL。使用 "Vivado "软件对算法进行了仿真和综合。事实上,通过比较两种不同实现方式的性能,对所提出的系统进行了评估:硬件实现和软件实现。实际上,FPGA 硬件实现的性能因其易于测试和快速实现而在定位方面取得了新的成就。我们的结果表明,这种方法可以有效地定位未知节点,具有良好的延迟性和较高的准确性。事实上,与软件实现相比,FPGA 集成算法的执行时间缩短了约 60 倍,功耗约为 100 mW,这证明了 FPGA 适用于 WSN 中的定位,为各种移动 WSN 应用提供了一个前景广阔的解决方案。
{"title":"Localizing unknown nodes with an FPGA-enhanced edge computing UAV in wireless sensor networks: Implementation and evaluation","authors":"Rahma Mani ,&nbsp;Antonio Rios-Navarro ,&nbsp;Jose Luis Sevillano Ramos ,&nbsp;Noureddine Liouane","doi":"10.1016/j.pmcj.2024.101961","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101961","url":null,"abstract":"<div><p>Great interest is directed toward real-time applications to determine the exact location of sensor nodes deployed in an area of interest. In this paper, we present a novel approach using a combination of the Kalman filter and regularized bounding box method for localizing unknown nodes in an area using an FPGA-enhanced edge computing UAV whose trajectory is known and is represented as the position of many anchors. The UAV is equipped with a GPS system that allows it to gather location data of sensor nodes as it moves around its environment. We employ a regularized bounding box to predict the positions of the unknown nodes using regularization factors and we use the Kalman filter algorithm to smooth and improve the accuracy of the sensor nodes to be localized. In order to localize the unknown nodes, the UAV receives the number of hops from each node and uses this information as input to the localization algorithm. Furthermore, the use of an FPGA board allows for real-time processing of sensory data, enabling the UAV to make fast and accurate decisions in dynamic environments. The localization algorithm was implemented on the FPGA board “Zynq MiniZed 7007s evaluation board” using Xilinx blocks in Simulink, and the generated code was converted into VHDL using Xilinx System Generator. The algorithm was simulated and synthesized using “Vivado” software. In fact, the proposed system was evaluated by comparing the performances achieved through two different implementations: Hardware and Software implementation. In effect, the performance of FPGA hardware implementation presents a new achievement in localization due to its easy testing and fast implementation. Our results show that this approach can efficiently locate unknown nodes with good latency and high accuracy. In fact, the execution time of the FPGA-integrated algorithm is reduced by about 60 times compared to the software implementation and the power consumption is about 100 mW, which proves the suitability of FPGA for localization in WSNs, offering a promising solution for various mobile WSN applications.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000865/pdfft?md5=4248b9a002154820ef25d24827509c64&pid=1-s2.0-S1574119224000865-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prioritization-based delay sensitive task offloading in SDN-integrated mobile IoT network 集成 SDN 的移动物联网网络中基于优先级的延迟敏感任务卸载
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-06-12 DOI: 10.1016/j.pmcj.2024.101960
Simran Chaudhary, Fatema Kapadia, Avinesh Singh, Nidhi Kumari, Prasanta K. Jana

Due to enormous growth of Internet of Things (IoT) in the last decade, the amount of data generated through smart devices is increasing exponentially. Fog computing has emerged as a potential technology to deal such a huge volume of data in which task offloading is the most important aspect which has attracted significant attention. Many research works have been carried out, however, task offloading with latency sensitivity, reliability and result migration over a mobile user environment is still not widely addressed. In this paper, we propose a method for delay-sensitive and fault minimized task offloading for service requests made through a mobile/vehicular end user environment implemented via Software Defined Network (SDN) controllers integrated with the fog layer. This is a novel multi-phased model involving determining the optimal number of SDN controllers, clustering of the fog nodes (FNs) on the basis of SDN proximities, task prioritization and Gravitational Search Algorithm (GSA) based target FN selection. The simulation outcomes of our proposed approach show that there is a reduction in delay by around 23%–30% and around 60%–80% lesser number of tasks unassigned in each round as compared to two base algorithms.

由于过去十年来物联网(IoT)的迅猛发展,智能设备产生的数据量呈指数级增长。雾计算已成为处理如此海量数据的一种潜在技术,其中任务卸载是最重要的方面,引起了人们的极大关注。目前已经开展了许多研究工作,但在移动用户环境中,具有延迟敏感性、可靠性和结果迁移性的任务卸载问题仍未得到广泛解决。在本文中,我们提出了一种方法,通过与雾层集成的软件定义网络(SDN)控制器,对通过移动/车载终端用户环境发出的服务请求进行延迟敏感和故障最小化的任务卸载。这是一个新颖的多阶段模型,涉及确定 SDN 控制器的最佳数量、基于 SDN 邻近性的雾节点(FN)聚类、任务优先级和基于引力搜索算法(GSA)的目标 FN 选择。我们提出的方法的模拟结果表明,与两种基本算法相比,延迟减少了约 23%-30%,每轮未分配任务的数量减少了约 60%-80%。
{"title":"Prioritization-based delay sensitive task offloading in SDN-integrated mobile IoT network","authors":"Simran Chaudhary,&nbsp;Fatema Kapadia,&nbsp;Avinesh Singh,&nbsp;Nidhi Kumari,&nbsp;Prasanta K. Jana","doi":"10.1016/j.pmcj.2024.101960","DOIUrl":"10.1016/j.pmcj.2024.101960","url":null,"abstract":"<div><p>Due to enormous growth of Internet of Things (IoT) in the last decade, the amount of data generated through smart devices is increasing exponentially. Fog computing has emerged as a potential technology to deal such a huge volume of data in which task offloading is the most important aspect which has attracted significant attention. Many research works have been carried out, however, task offloading with latency sensitivity, reliability and result migration over a mobile user environment is still not widely addressed. In this paper, we propose a method for delay-sensitive and fault minimized task offloading for service requests made through a mobile/vehicular end user environment implemented via Software Defined Network (SDN) controllers integrated with the fog layer. This is a novel multi-phased model involving determining the optimal number of SDN controllers, clustering of the fog nodes (FNs) on the basis of SDN proximities, task prioritization and Gravitational Search Algorithm (GSA) based target FN selection. The simulation outcomes of our proposed approach show that there is a reduction in delay by around 23%–30% and around 60%–80% lesser number of tasks unassigned in each round as compared to two base algorithms.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141398460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme 使用基于完全同态的 SE (FHSE) 方案进行物联网数据加密和基于短语搜索的高效处理
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-06 DOI: 10.1016/j.pmcj.2024.101952
S. Hamsanandhini, P. Balasubramanie

In this study, the Efficient Multikeyword Fully Homomorphic Search Encryption (EMK-FHSE) model is proposed to improve cloud storage security for sensitive data. When fully homomorphic encryption (FHE) and search encryption (SE) technologies are coupled, Fully Homomorphic Search Encryption (FHSE) is a strategy that realizes the shared information's controlled privacy and search security. As more and more encrypted data is kept on cloud servers (CSs), a single-keyword SE approach may cause multiple keyword index duplication concerns, making it challenging for CSs to search for the encrypted information. To reduce these problems, a novel efficiency bottleneck has been developed. An Adaptive Privacy-Preserving Fuzzy Multi-Keyword Search (APPFMK) approach is presented to address the difficulties of low search effectiveness in a single-keyword searching strategy and the high processing cost of the existing multi-keyword schemes. Cloud servers (CS) hold enormous volumes of encrypted data, and the necessary encrypted index is transmitted to the closest edge node (EN) to enable multi-keyword searches and supported decryption. According to security research, the EMK-FHSE multi-keyword index is safe in distinguishability under chosen keyword attacks. The results section compares the proposed model's search, storage, trapdoor, calculation, storage and validation times to those of several other models. The proposed model could achieve the following values: 60.81 kb for storage, 10.92 for the trapdoor, 6.85 ms for search, 0.44 ms for computation cost by changing the keyword in a trapdoor, 156.31 ms for computation cost by changing the keyword in a dictionary, 0.44 kb for storage cost by changing the keyword in a trapdoor, 1.81 kb for storage cost by changing the keyword in a dictionary and 0.016seconds for verification time, respectively.

本研究提出了高效多词全同态搜索加密(EMK-FHSE)模型,以提高敏感数据的云存储安全性。全同态加密(FHE)和搜索加密(SE)技术结合后,全同态搜索加密(FHSE)是一种实现共享信息隐私可控和搜索安全的策略。随着越来越多的加密数据被保存在云服务器(CS)上,单关键词 SE 方法可能会引起多个关键词索引重复的问题,使 CS 在搜索加密信息时面临挑战。为了减少这些问题,我们开发了一种新的效率瓶颈。本文提出了一种自适应隐私保护模糊多关键词搜索(APPFMK)方法,以解决单关键词搜索策略搜索效率低和现有多关键词方案处理成本高的难题。云服务器(CS)拥有海量加密数据,必要的加密索引被传输到最近的边缘节点(EN),以实现多关键词搜索并支持解密。根据安全研究,EMK-FHSE 多关键词索引在所选关键词攻击下的可区分性是安全的。结果部分比较了拟议模型与其他几个模型的搜索、存储、陷阱门、计算、存储和验证时间。建议的模型可以达到以下值:存储时间为 60.81 kb,陷阱门时间为 10.92,搜索时间为 6.85 ms,改变陷阱门关键词的计算成本为 0.44 ms,改变字典关键词的计算成本为 156.31 ms,改变陷阱门关键词的存储成本为 0.44 kb,改变字典关键词的存储成本为 1.81 kb,验证时间为 0.016 秒。
{"title":"IoT data encryption and phrase search-based efficient processing using a Fully Homomorphic-based SE (FHSE) scheme","authors":"S. Hamsanandhini,&nbsp;P. Balasubramanie","doi":"10.1016/j.pmcj.2024.101952","DOIUrl":"10.1016/j.pmcj.2024.101952","url":null,"abstract":"<div><p>In this study, the Efficient Multikeyword Fully Homomorphic Search Encryption (EMK-FHSE) model is proposed to improve cloud storage security for sensitive data. When fully homomorphic encryption (FHE) and search encryption (SE) technologies are coupled, Fully Homomorphic Search Encryption (FHSE) is a strategy that realizes the shared information's controlled privacy and search security. As more and more encrypted data is kept on cloud servers (CSs), a single-keyword SE approach may cause multiple keyword index duplication concerns, making it challenging for CSs to search for the encrypted information. To reduce these problems, a novel efficiency bottleneck has been developed. An Adaptive Privacy-Preserving Fuzzy Multi-Keyword Search (APPFMK) approach is presented to address the difficulties of low search effectiveness in a single-keyword searching strategy and the high processing cost of the existing multi-keyword schemes. Cloud servers (CS) hold enormous volumes of encrypted data, and the necessary encrypted index is transmitted to the closest edge node (EN) to enable multi-keyword searches and supported decryption. According to security research, the EMK-FHSE multi-keyword index is safe in distinguishability under chosen keyword attacks. The results section compares the proposed model's search, storage, trapdoor, calculation, storage and validation times to those of several other models. The proposed model could achieve the following values: 60.81 kb for storage, 10.92 for the trapdoor, 6.85 ms for search, 0.44 ms for computation cost by changing the keyword in a trapdoor, 156.31 ms for computation cost by changing the keyword in a dictionary, 0.44 kb for storage cost by changing the keyword in a trapdoor, 1.81 kb for storage cost by changing the keyword in a dictionary and 0.016seconds for verification time, respectively.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141399409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A toolkit for localisation queries 本地化查询工具包
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2024-05-28 DOI: 10.1016/j.pmcj.2024.101946
Gabriele Marini , Jorge Goncalves , Eduardo Velloso , Raja Jurdak , Vassilis Kostakos

While UbiComp research has steadily improved the performance of localisation systems, the analysis of such datasets remains largely unaddressed. In this paper, we present a tool to facilitate querying and analysis of localisation time-series with a focus on semantic localisation. Drawing on well-established models to represent movement and mobility, we first develop a query language for localisation datasets. We then develop a software library in R that implements this querying. We use case studies to demonstrate how our programming tool can be used to query localisation datasets. Our work addresses an important gap in localisation research, by providing a flexible tool that can model and analyse localisation data programmatically and in real time.

尽管 UbiComp 研究已稳步提高了定位系统的性能,但此类数据集的分析问题在很大程度上仍未得到解决。在本文中,我们提出了一种工具,以促进对定位时间序列的查询和分析,重点关注语义定位。我们首先借鉴了代表运动和移动性的成熟模型,为定位数据集开发了一种查询语言。然后,我们用 R 语言开发了一个软件库来实现这种查询。我们通过案例研究来演示如何使用我们的编程工具来查询定位数据集。我们的工作解决了本地化研究中的一个重要空白,提供了一种灵活的工具,能够以编程方式实时对本地化数据进行建模和分析。
{"title":"A toolkit for localisation queries","authors":"Gabriele Marini ,&nbsp;Jorge Goncalves ,&nbsp;Eduardo Velloso ,&nbsp;Raja Jurdak ,&nbsp;Vassilis Kostakos","doi":"10.1016/j.pmcj.2024.101946","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101946","url":null,"abstract":"<div><p>While UbiComp research has steadily improved the performance of localisation systems, the analysis of such datasets remains largely unaddressed. In this paper, we present a tool to facilitate querying and analysis of localisation time-series with a focus on semantic localisation. Drawing on well-established models to represent movement and mobility, we first develop a query language for localisation datasets. We then develop a software library in R that implements this querying. We use case studies to demonstrate how our programming tool can be used to query localisation datasets. Our work addresses an important gap in localisation research, by providing a flexible tool that can model and analyse localisation data programmatically and in real time.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000725/pdfft?md5=a76dc096127a400e97ecb6f76c49be0a&pid=1-s2.0-S1574119224000725-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141324735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces OcAPO:在开放式共享工作空间中进行细粒度占用感知、经验驱动的 PDC 控制
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-28 DOI: 10.1016/j.pmcj.2024.101945
Anuradha Ravi , Dulaj Sanjaya Weerakoon , Archan Misra

Passive Displacement Cooling (PDC) is a relatively recent technology gaining attention as a means of significantly reducing building energy consumption overheads, especially in tropical climates. PDC eliminates the use of mechanical fans, instead using chilled-water heat exchangers to perform convective cooling. In this paper, we identify and characterize the impact of several key parameters affecting occupant comfort in a 1000m2 open-floor area (consisting of multiple zones) of a ZEB (Zero Energy Building) deployed with PDC units and tackle the problem of setting the temperature setpoint of the PDC units to assure occupant thermal comfort and yet conserve energy. We tackle two key practical challenges: (a) the zone-level (i.e., occupant-experienced) temperature differs significantly, depending on occupancy levels, from that measured by the ceiling-mounted thermal sensors that drive the PDC control loop, (b) sparsely deployed sensors are unable to capture the often-significant differences in ambient temperature across neighboring zones. Using extensive real-world coarser-grained measurement data (collected over 60 days under varying occupancy conditions), (a) we first uncover the various parameters that affect the occupant-level ambient temperature, and then (b) devise a trace-based model that helps identify the optimum combination of PDC setpoints, collectively across multiple zones, while accommodating variations in the occupancy levels and weather conditions. Using this trace-based model, our OcAPO system can assure ambient temperature experienced by occupants within a tolerance of 0.3°C. In contrast, the existing approach of occupancy-agnostic, rule-based setpoint control violates this tolerance interval more than 80% of the time. However, this initial model requires unnecessary and continual database lookups and is unable to derive finer-grained setpoints, thereby potentially missing opportunities for additional energy savings. We thus collected data for another 15 days, with finer-grained setpoint control in increments of 0.2 under varying occupancy conditions in the second phase. To determine PDC setpoints efficiently, we subsequently used the empirical data to train a KNN-based regression model. Additional studies on our real-world testbed demonstrate the regressor-based OcAPO approach is able to assure occupant-level ambient temperature within a narrow 0.2°C tolerance. We also demonstrate that the regression version of OcAPO can reduce the opening percentage of PDC valves (an in

被动置换冷却(PDC)是一种相对较新的技术,作为一种大幅降低建筑能耗开销的手段,尤其是在热带气候条件下,该技术日益受到关注。PDC 无需使用机械风扇,而是使用冷水热交换器进行对流冷却。在本文中,我们确定并描述了影响使用 PDC 设备的 ZEB(零能耗建筑)1000 平方米开放地板区域(由多个区域组成)中居住舒适度的几个关键参数的影响,并解决了如何设置 PDC 设备温度设定点以确保居住者热舒适度并节约能源的问题。我们解决了两个关键的实际挑战:(a)根据占用水平,区域级(即居住者体验)温度与天花板安装的热传感器测量到的温度存在显著差异,而天花板安装的热传感器可驱动 PDC 控制回路;(b)稀疏部署的传感器无法捕捉相邻区域间环境温度的显著差异。利用广泛的实际粗粒度测量数据(在不同占用条件下收集了 60 天),(a) 我们首先发现了影响占用级环境温度的各种参数,然后 (b) 设计了一个基于轨迹的模型,该模型可帮助确定多个区域的 PDC 设定点的最佳组合,同时适应占用级别和天气条件的变化。利用这一基于轨迹的模型,我们的 OcAPO 系统可以确保居住者所感受到的环境温度在 0.3°C 的容差范围内。相比之下,现有的与占用无关、基于规则的设定点控制方法在 80% 以上的时间里都会违反这个容差范围。然而,这种初始模型需要进行不必要的、持续的数据库查询,而且无法推导出更精细的设定点,因此有可能错失额外的节能机会。因此,我们又收集了 15 天的数据,在第二阶段的不同占用条件下,以 0.2∘的增量进行更精细的设定点控制。为了有效确定 PDC 设定点,我们随后使用经验数据训练了一个基于 KNN 的回归模型。在我们的实际测试平台上进行的其他研究表明,基于回归器的 OcAPO 方法能够确保在 0.2°C 的较小容差范围内保持住户级环境温度。我们还证明,与基于跟踪的模型相比,回归版 OcAPO 可以在低入住率情况下将 PDC 阀门的开启百分比(间接代表能耗)降低 58.9%。
{"title":"OcAPO: Fine-grained occupancy-aware, empirically-driven PDC control in open-plan, shared workspaces","authors":"Anuradha Ravi ,&nbsp;Dulaj Sanjaya Weerakoon ,&nbsp;Archan Misra","doi":"10.1016/j.pmcj.2024.101945","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101945","url":null,"abstract":"<div><p>Passive Displacement Cooling (PDC) is a relatively recent technology gaining attention as a means of significantly reducing building energy consumption overheads, especially in tropical climates. PDC eliminates the use of mechanical fans, instead using chilled-water heat exchangers to perform convective cooling. In this paper, we identify and characterize the impact of several key parameters affecting occupant comfort in a <span><math><mrow><mn>1000</mn><mspace></mspace><msup><mrow><mi>m</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></math></span> open-floor area (consisting of multiple zones) of a ZEB (Zero Energy Building) deployed with PDC units and tackle the problem of setting the temperature setpoint of the PDC units to assure occupant thermal comfort and yet conserve energy. We tackle two key practical challenges: (a) the zone-level (i.e., occupant-experienced) temperature differs significantly, depending on occupancy levels, from that measured by the ceiling-mounted thermal sensors that drive the PDC control loop, (b) sparsely deployed sensors are unable to capture the often-significant differences in ambient temperature across neighboring zones. Using extensive real-world coarser-grained measurement data (collected over 60 days under varying occupancy conditions), (a) we first uncover the various parameters that affect the occupant-level ambient temperature, and then (b) devise a trace-based model that helps identify the optimum combination of PDC setpoints, collectively across multiple zones, while accommodating variations in the occupancy levels and weather conditions. Using this trace-based model, our <em>OcAPO</em> system can assure ambient temperature experienced by occupants within a tolerance of <span><math><mrow><mspace></mspace><mn>0</mn><mo>.</mo><mn>3</mn><mspace></mspace><mo>°</mo><mi>C</mi></mrow></math></span>. In contrast, the existing approach of occupancy-agnostic, rule-based setpoint control violates this tolerance interval more than 80% of the time. However, this initial model requires unnecessary and continual database lookups and is unable to derive finer-grained setpoints, thereby potentially missing opportunities for additional energy savings. We thus collected data for another 15 days, with finer-grained setpoint control in increments of 0.2<span><math><msup><mrow></mrow><mrow><mo>∘</mo></mrow></msup></math></span> under varying occupancy conditions in the second phase. To determine PDC setpoints efficiently, we subsequently used the empirical data to train a KNN-based regression model. Additional studies on our real-world testbed demonstrate the regressor-based <em>OcAPO</em> approach is able to assure occupant-level ambient temperature within a narrow <span><math><mrow><mspace></mspace><mn>0</mn><mo>.</mo><mn>2</mn><mspace></mspace><mo>°</mo><mi>C</mi></mrow></math></span> tolerance. We also demonstrate that the regression version of <em>OcAPO</em> can reduce the opening percentage of PDC valves (an in","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1