首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar mmDrive:使用毫米波传感器对驾驶员的注意力进行被动监测
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-23 DOI: 10.1016/j.pmcj.2024.101949
Argha Sen, Avijit Mandal, Prasenjit Karmakar, Anirban Das, Sandip Chakraborty

Detecting risky driving has been a significant area of focus in recent years. Nonetheless, devising a practical, effective, and unobtrusive solution remains a complex challenge. Presently available technologies predominantly rely on visual cues or physical proximity, complicating the sensing. With this incentive, we explore the possibility of utilizing mmWave radars exclusively to identify dangerous driving behaviors. Initially, we scrutinize the attributes of unsafe driving and pinpoint distinct patterns in range-doppler readings brought about by nine common risky driving manoeuvres. Subsequently, we create an innovative Fused-CNN model that identifies instances of hazardous driving amidst regular driving and categorizes nine distinct types of dangerous driving actions. After conducting thorough experiments involving seven volunteers driving in real-world settings, we note that our system accurately distinguishes risky driving actions with an average precision of approximately 97% with a deviation of ±2%. To underscore the significance of our approach, we also compare it against established state-of-the-art methods.

检测危险驾驶是近年来的一个重要关注领域。然而,设计一种实用、有效、不显眼的解决方案仍然是一项复杂的挑战。目前可用的技术主要依赖于视觉线索或物理距离,这使得传感变得更加复杂。在此激励下,我们探索了专门利用毫米波雷达识别危险驾驶行为的可能性。首先,我们仔细研究了不安全驾驶的属性,并指出了九种常见的危险驾驶动作所带来的范围-多普勒读数的独特模式。随后,我们创建了一个创新的融合-CNN 模型,该模型可识别常规驾驶中的危险驾驶实例,并对九种不同类型的危险驾驶行为进行分类。在对实际驾驶环境中的七名志愿者进行全面实验后,我们注意到,我们的系统能准确区分危险驾驶行为,平均精确度约为 97%,偏差为 ±2%。为了强调我们方法的重要性,我们还将其与现有的最先进方法进行了比较。
{"title":"Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar","authors":"Argha Sen,&nbsp;Avijit Mandal,&nbsp;Prasenjit Karmakar,&nbsp;Anirban Das,&nbsp;Sandip Chakraborty","doi":"10.1016/j.pmcj.2024.101949","DOIUrl":"10.1016/j.pmcj.2024.101949","url":null,"abstract":"<div><p>Detecting risky driving has been a significant area of focus in recent years. Nonetheless, devising a practical, effective, and unobtrusive solution remains a complex challenge. Presently available technologies predominantly rely on visual cues or physical proximity, complicating the sensing. With this incentive, we explore the possibility of utilizing mmWave radars exclusively to identify dangerous driving behaviors. Initially, we scrutinize the attributes of unsafe driving and pinpoint distinct patterns in range-doppler readings brought about by nine common risky driving manoeuvres. Subsequently, we create an innovative Fused-CNN model that identifies instances of hazardous driving amidst regular driving and categorizes nine distinct types of dangerous driving actions. After conducting thorough experiments involving seven volunteers driving in real-world settings, we note that our system accurately distinguishes risky driving actions with an average precision of approximately 97% with a deviation of <span><math><mrow><mo>±</mo><mn>2</mn><mtext>%</mtext></mrow></math></span>. To underscore the significance of our approach, we also compare it against established state-of-the-art methods.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"103 ","pages":"Article 101949"},"PeriodicalIF":4.3,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification CIU-L:用于人体识别的类递增学习和机器非学习被动传感系统
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-23 DOI: 10.1016/j.pmcj.2024.101947
Zhongcheng Wei , Wei Chen , Yunping Zhang , Bin Lian , Jijun Zhao

With the development of passive sensing technology, WiFi-based identification research has attracted much attention in areas such as human–computer interaction and home security. Although WiFi sensing-based human identification has achieved initial success, it is currently mainly applicable to scenarios where the user’s identity category is fixed and not applicable to scenarios where the user’s identity category changes frequently. In this paper, we propose an identification system (CIU-L) in a scenario where user’s identity categories frequently change, allowing for incremental registration and unregistration of identity categories. To the best of our knowledge, this is the first attempt to register and unregister user identity information under the previous identity category constraints. CIU-L proposes a training and updating strategy in the registration phase of new user to avoid catastrophic forgetting of old user’s identity information, and trains a targeted noise for the user to be unregistered in the unregistration phase of old user, achieving precise removal of the user to be unregistered without affecting the retained users. In addition, this paper presents adequate comparative experiments of CIU-L with other systems in the user identity category fixing scenario. The experimental results show that the average difference between CIU-L and other systems in terms of Accuracy, Precision, Recall and F1-Score is within 5% of each other, while running time and storage space are saved by more than 6 times, which is more capable of meeting the needs of identity recognition in real scenarios.

随着无源传感技术的发展,基于 WiFi 的身份识别研究在人机交互和家庭安防等领域备受关注。虽然基于 WiFi 传感的人机识别取得了初步成效,但目前主要适用于用户身份类别固定的场景,不适用于用户身份类别经常变化的场景。在本文中,我们提出了一种用户身份类别频繁变化场景下的识别系统(CIU-L),允许增量注册和取消注册身份类别。据我们所知,这是首次尝试在以前的身份类别限制下注册和取消注册用户身份信息。CIU-L 在新用户注册阶段提出了一种训练和更新策略,以避免老用户身份信息的灾难性遗忘,并在老用户注销阶段对要注销的用户进行有针对性的噪声训练,在不影响保留用户的情况下实现了对要注销用户的精确删除。此外,本文还充分展示了 CIU-L 与其他系统在用户身份类别固定场景下的对比实验。实验结果表明,CIU-L 与其他系统在准确率(Accuracy)、精确率(Precision)、召回率(Recall)和 F1 分数(F1-Score)上的平均差距都在 5%以内,而运行时间和存储空间则节省了 6 倍以上,更能满足实际场景中身份识别的需求。
{"title":"CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification","authors":"Zhongcheng Wei ,&nbsp;Wei Chen ,&nbsp;Yunping Zhang ,&nbsp;Bin Lian ,&nbsp;Jijun Zhao","doi":"10.1016/j.pmcj.2024.101947","DOIUrl":"10.1016/j.pmcj.2024.101947","url":null,"abstract":"<div><p>With the development of passive sensing technology, WiFi-based identification research has attracted much attention in areas such as human–computer interaction and home security. Although WiFi sensing-based human identification has achieved initial success, it is currently mainly applicable to scenarios where the user’s identity category is fixed and not applicable to scenarios where the user’s identity category changes frequently. In this paper, we propose an identification system (CIU-L) in a scenario where user’s identity categories frequently change, allowing for incremental registration and unregistration of identity categories. To the best of our knowledge, this is the first attempt to register and unregister user identity information under the previous identity category constraints. CIU-L proposes a training and updating strategy in the registration phase of new user to avoid catastrophic forgetting of old user’s identity information, and trains a targeted noise for the user to be unregistered in the unregistration phase of old user, achieving precise removal of the user to be unregistered without affecting the retained users. In addition, this paper presents adequate comparative experiments of CIU-L with other systems in the user identity category fixing scenario. The experimental results show that the average difference between CIU-L and other systems in terms of Accuracy, Precision, Recall and F1-Score is within 5% of each other, while running time and storage space are saved by more than 6 times, which is more capable of meeting the needs of identity recognition in real scenarios.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"103 ","pages":"Article 101947"},"PeriodicalIF":4.3,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication BmmW:基于 DNN 的 BLE 和毫米波雷达联合系统,可通过面向目标的通信进行精确 3D 定位
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-18 DOI: 10.1016/j.pmcj.2024.101944
Peizheng Li , Jagdeep Singh , Han Cui , Carlo Alberto Boano

Bluetooth Low Energy (BLE) has emerged as one of the reference technologies for the development of indoor localization systems, due to its increasing ubiquity, low-cost hardware, and to the introduction of direction-finding enhancements improving its ranging performance. However, the intrinsic narrowband nature of BLE makes this technology susceptible to multipath and channel interference. As a result, it is still challenging to achieve decimetre-level localization accuracy, which is necessary when developing location-based services for smart factories and workspaces. To address this challenge, we present BmmW, an indoor localization system that augments the ranging estimates obtained with BLE  5.1’s constant tone extension feature with mmWave radar measurements to provide 3D localization of a mobile tag with decimetre-level accuracy. Specifically, BmmW embeds a deep neural network (DNN) that is jointly trained with both BLE and mmWave measurements, practically leveraging the strengths of both technologies. In fact, mmWave radars can locate objects and people with decimetre-level accuracy, but their effectiveness in monitoring stationary targets and multiple objects is limited, and they also suffer from a fast signal attenuation limiting the usable range to a few meters. We evaluate BmmW’s performance experimentally, and show that its joint DNN training scheme allows to track mobile tags with a mean 3D localization accuracy of 10 cm when combining angle-of-arrival BLE measurements with mmWave radar data. We further assess two variations of BmmW: BmmW-Lite and BmmW-Lite+, both tailored for single-antenna BLE devices, which eliminates the necessity for bulky and expensive multi-antenna arrays and represents a cost-effective solution that is easy to integrate into compact IoT devices. In contrast to classic BmmW (which utilizes angle-of-arrival info), BmmW-Lite uses raw in-phase/quadrature (I/Q) measurements, and achieves a mean localization accuracy of 36 cm, thus facilitating precise object tracking in indoor environments even when using budget-friendly single-antenna BLE devices. BmmW-Lite+ extends BmmW-Lite by allowing the localization task to be transferred from the edge to the cloud due to device memory and power constraints. To this end, BmmW-Lite+ employs a goal-oriented communication paradigm that compresses initial BLE features into a more compact semantic format at the edge device, which allows to minimize the amount of data that needs to be sent to the cloud. Our experimental results show that BmmW-Lite+ can compress raw BLE features by up to 12% of their initial size (hence allowing to save network bandwidth and minimize energy consumption), with negligible impact on the localization accuracy.

蓝牙低功耗(BLE)因其日益普及、硬件成本低以及引入了提高测距性能的测向增强技术,已成为开发室内定位系统的参考技术之一。然而,BLE 固有的窄带特性使该技术容易受到多径和信道干扰的影响。因此,实现分米级定位精度仍具有挑战性,而这正是为智能工厂和工作空间开发定位服务所必需的。为了应对这一挑战,我们推出了 BmmW,这是一种室内定位系统,它利用毫米波雷达测量增强了通过 BLE 5.1 的恒定音调扩展功能获得的测距估计值,从而为移动标签提供分米级精度的三维定位。具体来说,BmmW 嵌入了一个深度神经网络(DNN),该网络通过 BLE 和毫米波测量进行联合训练,实际上充分利用了两种技术的优势。事实上,毫米波雷达能以分米级的精度定位物体和人员,但它们在监测静止目标和多个物体方面的效果有限,而且它们还受到快速信号衰减的影响,可用范围被限制在几米之内。我们通过实验对 BmmW 的性能进行了评估,结果表明其联合 DNN 训练方案可以在结合到达角 BLE 测量和毫米波雷达数据的情况下以 10 厘米的平均 3D 定位精度跟踪移动标签。我们进一步评估了 BmmW 的两种变体:BmmW-Lite 和 BmmW-Lite+,它们都是为单天线 BLE 设备量身定制的,无需使用笨重昂贵的多天线阵列,是一种易于集成到紧凑型物联网设备中的高性价比解决方案。与传统的 BmmW(使用到达角信息)不同,BmmW-Lite 使用原始的相位/正交(I/Q)测量,可实现 36 厘米的平均定位精度,因此即使使用经济实惠的单天线 BLE 设备,也能在室内环境中实现精确的目标跟踪。BmmW-Lite+ 对 BmmW-Lite 进行了扩展,由于设备内存和功耗的限制,它允许将定位任务从边缘转移到云端。为此,BmmW-Lite+ 采用了面向目标的通信范式,在边缘设备上将初始 BLE 特征压缩成更紧凑的语义格式,从而最大限度地减少需要发送到云端的数据量。我们的实验结果表明,BmmW-Lite+ 可以将原始 BLE 特征压缩到其初始大小的 12%(从而节省网络带宽并将能耗降至最低),而对定位精度的影响可以忽略不计。
{"title":"BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication","authors":"Peizheng Li ,&nbsp;Jagdeep Singh ,&nbsp;Han Cui ,&nbsp;Carlo Alberto Boano","doi":"10.1016/j.pmcj.2024.101944","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101944","url":null,"abstract":"<div><p>Bluetooth Low Energy (BLE) has emerged as one of the reference technologies for the development of indoor localization systems, due to its increasing ubiquity, low-cost hardware, and to the introduction of direction-finding enhancements improving its ranging performance. However, the intrinsic narrowband nature of BLE makes this technology susceptible to multipath and channel interference. As a result, it is still challenging to achieve decimetre-level localization accuracy, which is necessary when developing location-based services for smart factories and workspaces. To address this challenge, we present BmmW, an indoor localization system that augments the ranging estimates obtained with BLE<!--> <!--> <!-->5.1’s constant tone extension feature with mmWave radar measurements to provide 3D localization of a mobile tag with decimetre-level accuracy. Specifically, BmmW embeds a deep neural network (DNN) that is jointly trained with both BLE and mmWave measurements, practically leveraging the strengths of both technologies. In fact, mmWave radars can locate objects and people with decimetre-level accuracy, but their effectiveness in monitoring stationary targets and multiple objects is limited, and they also suffer from a fast signal attenuation limiting the usable range to a few meters. We evaluate BmmW’s performance experimentally, and show that its joint DNN training scheme allows to track mobile tags with a mean 3D localization accuracy of 10 cm when combining angle-of-arrival BLE measurements with mmWave radar data. We further assess two variations of BmmW: BmmW-<span>Lite</span> and BmmW-<span>Lite+</span>, both tailored for single-antenna BLE devices, which eliminates the necessity for bulky and expensive multi-antenna arrays and represents a cost-effective solution that is easy to integrate into compact IoT devices. In contrast to classic BmmW (which utilizes angle-of-arrival info), BmmW-<span>Lite</span> uses raw in-phase/quadrature (I/Q) measurements, and achieves a mean localization accuracy of 36 cm, thus facilitating precise object tracking in indoor environments even when using budget-friendly single-antenna BLE devices. BmmW-<span>Lite+</span> extends BmmW-<span>Lite</span> by allowing the localization task to be transferred from the edge to the cloud due to device memory and power constraints. To this end, BmmW-<span>Lite+</span> employs a goal-oriented communication paradigm that compresses initial BLE features into a more compact <em>semantic</em> format at the edge device, which allows to minimize the amount of data that needs to be sent to the cloud. Our experimental results show that BmmW-<span>Lite+</span> can compress raw BLE features by up to 12% of their initial size (hence allowing to save network bandwidth and minimize energy consumption), with negligible impact on the localization accuracy.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101944"},"PeriodicalIF":4.3,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141095201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of micro- vs. macro-flows management in QKD-secured edge computing QKD 安全边缘计算中的微观与宏观流量管理分析
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-16 DOI: 10.1016/j.pmcj.2024.101937
Claudio Cicconetti, Marco Conti, Andrea Passarella

Quantum Key Distribution (QKD) holds the promise of a secure exchange of cryptographic material between applications that have access to the same network of QKD nodes, interconnected through fiber optic or satellite links. Worldwide several such networks are being deployed at a metropolitan level, where edge computing is already offered by the telco operators to customers as a viable alternative to both cloud and on-premise hosting of computational resources. In this paper, we investigate the implications of enabling QKD for edge-native applications from a practical perspective of resource allocation in the QKD network and the edge infrastructure. Specifically, we consider the dichotomy between aggregating all the applications on the same source–destination path vs. adopting a more flexible micro-flow approach, inspired from Software Defined Networking (SDN) concepts. Our simulation results show that there is a fundamental trade-off between the efficient use of resources and the signaling overhead, which we managed to diminish with the use of suitable hybrid solutions.

量子密钥分发(QKD)有望在可访问同一 QKD 节点网络(通过光纤或卫星链路互连)的应用程序之间安全交换加密材料。在全球范围内,有几个这样的网络正在大都市一级部署,电信运营商已经向客户提供边缘计算服务,作为云计算和内部计算资源托管的可行替代方案。在本文中,我们将从 QKD 网络和边缘基础设施资源分配的实际角度出发,研究启用 QKD 对边缘本地应用的影响。具体来说,我们考虑了在同一源-目的路径上聚合所有应用与采用更灵活的微流方法(受软件定义网络(SDN)概念的启发)之间的对立。我们的仿真结果表明,在有效利用资源和信令开销之间存在着根本性的权衡,而通过使用合适的混合解决方案,我们成功地降低了信令开销。
{"title":"Analysis of micro- vs. macro-flows management in QKD-secured edge computing","authors":"Claudio Cicconetti,&nbsp;Marco Conti,&nbsp;Andrea Passarella","doi":"10.1016/j.pmcj.2024.101937","DOIUrl":"10.1016/j.pmcj.2024.101937","url":null,"abstract":"<div><p>Quantum Key Distribution (QKD) holds the promise of a secure exchange of cryptographic material between applications that have access to the same network of QKD nodes, interconnected through fiber optic or satellite links. Worldwide several such networks are being deployed at a metropolitan level, where edge computing is already offered by the telco operators to customers as a viable alternative to both cloud and on-premise hosting of computational resources. In this paper, we investigate the implications of enabling QKD for edge-native applications from a practical perspective of resource allocation in the QKD network and the edge infrastructure. Specifically, we consider the dichotomy between aggregating all the applications on the same source–destination path vs. adopting a more flexible micro-flow approach, inspired from Software Defined Networking (SDN) concepts. Our simulation results show that there is a fundamental trade-off between the efficient use of resources and the signaling overhead, which we managed to diminish with the use of suitable hybrid solutions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101937"},"PeriodicalIF":4.3,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000634/pdfft?md5=66f40de1122375679c5bab3134cbf374&pid=1-s2.0-S1574119224000634-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141046172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements 使用 RSSD 和 TDOA 测量的 WSN 信号源定位高效估算器
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-11 DOI: 10.1016/j.pmcj.2024.101936
Yuanyuan Zhang , T. Aaron Gulliver , Huafeng Wu , Xiaojun Mei , Jiping Li , Fuqiang Lu , Weijun Wang

Range-based localization has received considerable attention in wireless sensor networks due to its ability to efficiently locate the unknown source of a signal. However, the localization accuracy with a single set of measurements may be inadequate, especially in dynamic and noisy environments. To mitigate this problem, received signal strength difference (RSSD) and time difference of arrival (TDOA) measurements are used to develop an efficient estimator to reduce the bias and improve localization accuracy. First, the RSSD/TDOA-based maximum likelihood (ML) localization problem is transformed into a hybrid information nonnegative constrained least squares (HI-NCLS) framework. Then, this framework is used to develop an effective bias-reduction localization approach (BRLA) with a two-step linearization process. The first step employs a linear solving method (LSM) which exploits an active set method to obtain a sub-optimal estimator. The second step uses a bias reduction method (BRM) to mitigate the correlation from linearization and a weighted instrumental variables matrix (IVM) which is weakly correlated with the noise but strongly correlated with the data matrix (DM) is used in place of the DM. Performance results are presented which demonstrate that the proposed BRLA provides better localization performance than state-of-the-art methods in the literature.

基于范围的定位由于能够有效定位未知信号源而在无线传感器网络中受到广泛关注。然而,单组测量的定位精度可能不够,尤其是在动态和高噪声环境中。为缓解这一问题,利用接收信号强度差(RSSD)和到达时间差(TDOA)测量来开发一种有效的估计器,以减少偏差并提高定位精度。首先,基于 RSSD/TDOA 的最大似然(ML)定位问题被转化为混合信息非负约束最小二乘法(HI-NCLS)框架。然后,利用这一框架开发出一种有效的减少偏差定位方法 (BRLA),其线性化过程分为两步。第一步采用线性求解方法(LSM),利用主动集方法获得次优估计值。第二步采用减少偏差法(BRM)来减轻线性化产生的相关性,并使用与噪声相关性较弱但与数据矩阵(DM)相关性较强的加权工具变量矩阵(IVM)来代替 DM。性能结果表明,与文献中最先进的方法相比,拟议的 BRLA 能够提供更好的定位性能。
{"title":"An efficient estimator for source localization in WSNs using RSSD and TDOA measurements","authors":"Yuanyuan Zhang ,&nbsp;T. Aaron Gulliver ,&nbsp;Huafeng Wu ,&nbsp;Xiaojun Mei ,&nbsp;Jiping Li ,&nbsp;Fuqiang Lu ,&nbsp;Weijun Wang","doi":"10.1016/j.pmcj.2024.101936","DOIUrl":"10.1016/j.pmcj.2024.101936","url":null,"abstract":"<div><p>Range-based localization has received considerable attention in wireless sensor networks due to its ability to efficiently locate the unknown source of a signal. However, the localization accuracy with a single set of measurements may be inadequate, especially in dynamic and noisy environments. To mitigate this problem, received signal strength difference (RSSD) and time difference of arrival (TDOA) measurements are used to develop an efficient estimator to reduce the bias and improve localization accuracy. First, the RSSD/TDOA-based maximum likelihood (ML) localization problem is transformed into a hybrid information nonnegative constrained least squares (HI-NCLS) framework. Then, this framework is used to develop an effective bias-reduction localization approach (BRLA) with a two-step linearization process. The first step employs a linear solving method (LSM) which exploits an active set method to obtain a sub-optimal estimator. The second step uses a bias reduction method (BRM) to mitigate the correlation from linearization and a weighted instrumental variables matrix (IVM) which is weakly correlated with the noise but strongly correlated with the data matrix (DM) is used in place of the DM. Performance results are presented which demonstrate that the proposed BRLA provides better localization performance than state-of-the-art methods in the literature.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101936"},"PeriodicalIF":4.3,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141051391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure 在没有专用基础设施的情况下利用人群轨迹数据估算交通流量
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-07 DOI: 10.1016/j.pmcj.2024.101935
Subhrasankha Dey , Martin Tomko , Stephan Winter , Niloy Ganguly

Traffic count (or link count) data represents the cumulative traffic in the lanes between two consecutive signalised intersections. Typically, dedicated infrastructure-based sensors are required for link count data collection. The lack of adequate data collection infrastructure leads to lack of link count data for numerous cities, particularly those in low- and middle-income countries. Here, we address the research problem of link count estimation using crowd-sourced trajectory data to reduce the reliance on any dedicated infrastructure. A stochastic queue discharge model is developed to estimate link counts at signalised intersections taking into account the sparsity and low penetration rate (i.e., the percentage of vehicles with known trajectory) brought on by crowdsourcing. The issue of poor penetration rate is tackled by constructing synthetic trajectories entirely from known trajectories. The proposed model further provides a methodology for estimating the delay resulting from the start-up loss time of the vehicles in the queue under unknown traffic conditions. The proposed model is implemented and validated with real-world data at a signalised intersection in Kolkata, India. Validation results demonstrate that the model can estimate link count with an average accuracy score of 82% with a very low penetration rate (not in the city, but at the intersection) of 5.09% in unknown traffic conditions, which is yet to be accomplished in the current state-of-the-art.

交通流量计数(或链路计数)数据表示两个连续信号交叉口之间车道上的累计交通流量。通常情况下,链路计数数据收集需要专用的基础设施传感器。由于缺乏足够的数据收集基础设施,许多城市,尤其是中低收入国家的城市,都缺乏链路计数数据。在此,我们探讨了利用人群轨迹数据估算链路计数的研究问题,以减少对任何专用基础设施的依赖。考虑到众包带来的稀疏性和低渗透率(即已知轨迹车辆的百分比),我们开发了一种随机队列排放模型,用于估算信号交叉口的链接计数。通过完全根据已知轨迹构建合成轨迹,解决了渗透率低的问题。所提出的模型还提供了一种方法,用于估算在未知交通条件下队列中车辆的启动损失时间所导致的延迟。在印度加尔各答的一个信号灯路口,利用实际数据对所提出的模型进行了实施和验证。验证结果表明,在未知交通状况下,该模型能够以 82% 的平均准确率估算链路数,并且渗透率非常低(不是在城市中,而是在交叉路口),仅为 5.09%,这在当前最先进的技术中尚属首次。
{"title":"Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure","authors":"Subhrasankha Dey ,&nbsp;Martin Tomko ,&nbsp;Stephan Winter ,&nbsp;Niloy Ganguly","doi":"10.1016/j.pmcj.2024.101935","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101935","url":null,"abstract":"<div><p>Traffic count (or link count) data represents the cumulative traffic in the lanes between two consecutive signalised intersections. Typically, dedicated infrastructure-based sensors are required for link count data collection. The lack of adequate data collection infrastructure leads to lack of link count data for numerous cities, particularly those in low- and middle-income countries. Here, we address the research problem of link count estimation using crowd-sourced trajectory data to reduce the reliance on any dedicated infrastructure. A stochastic queue discharge model is developed to estimate link counts at signalised intersections taking into account the sparsity and low penetration rate (i.e., the percentage of vehicles with known trajectory) brought on by crowdsourcing. The issue of poor penetration rate is tackled by constructing synthetic trajectories entirely from known trajectories. The proposed model further provides a methodology for estimating the delay resulting from the start-up loss time of the vehicles in the queue under unknown traffic conditions. The proposed model is implemented and validated with real-world data at a signalised intersection in Kolkata, India. Validation results demonstrate that the model can estimate link count with an average accuracy score of 82% with a very low penetration rate (not in the city, but at the intersection) of 5.09% in unknown traffic conditions, which is yet to be accomplished in the current state-of-the-art.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101935"},"PeriodicalIF":4.3,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000610/pdfft?md5=d66231587fa7d814a717bc910b36c35b&pid=1-s2.0-S1574119224000610-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140951446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CMFogV: Proactive content migration for multi-level fog computing CMFogV:多级雾计算的主动内容迁移
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-03 DOI: 10.1016/j.pmcj.2024.101933
Marcelo C. Araújo, Luiz F. Bittencourt

The popularization of Fog Computing has provided the foundation for a computational environment better suited to applications demanding low communication latency. However, Fog environments has limited resources and restricted coverage areas, besides the user mobility that needs continuous migrations to maintain accessible and nearby content. To enable applications to harness the low latency offered by Fog, it is crucial to develop migration strategies capable of addressing the complexities of the Fog environment while ensuring content availability regardless of user location. This work proposes CMFogV, a proactive content migration strategy that leverages mobility prediction in a multi-level fog. Our results show that CMFogV is able to provide enhanced flexibility in the migration decision process across a wide diversity of scenario.

雾计算的普及为建立更适合要求低通信延迟的应用的计算环境奠定了基础。然而,雾环境的资源有限,覆盖范围受限,而且用户流动性大,需要不断迁移以保持内容的可访问性和邻近性。为使应用程序能够利用雾环境提供的低延迟,关键是要制定迁移策略,既能解决雾环境的复杂性,又能确保内容的可用性,而不受用户位置的影响。本研究提出了 CMFogV,这是一种利用多级雾中移动性预测的主动内容迁移策略。我们的研究结果表明,CMFogV 能够在多种场景下为迁移决策过程提供更高的灵活性。
{"title":"CMFogV: Proactive content migration for multi-level fog computing","authors":"Marcelo C. Araújo,&nbsp;Luiz F. Bittencourt","doi":"10.1016/j.pmcj.2024.101933","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101933","url":null,"abstract":"<div><p>The popularization of Fog Computing has provided the foundation for a computational environment better suited to applications demanding low communication latency. However, Fog environments has limited resources and restricted coverage areas, besides the user mobility that needs continuous migrations to maintain accessible and nearby content. To enable applications to harness the low latency offered by Fog, it is crucial to develop migration strategies capable of addressing the complexities of the Fog environment while ensuring content availability regardless of user location. This work proposes CMFog<span><math><msub><mrow></mrow><mrow><mi>V</mi></mrow></msub></math></span>, a proactive content migration strategy that leverages mobility prediction in a multi-level fog. Our results show that CMFog<span><math><msub><mrow></mrow><mrow><mi>V</mi></mrow></msub></math></span> is able to provide enhanced flexibility in the migration decision process across a wide diversity of scenario.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101933"},"PeriodicalIF":4.3,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140893235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks 针对无线机器人网络的具有自适应碰撞缓解功能的邻居发现协议
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-03 DOI: 10.1016/j.pmcj.2024.101934
Zhiyong Lin , Congming Yi , Zongheng Wei , Jianfeng Wen , Qingji Wen , Qinglin Liu , Hai Liu

Recently, several movement control algorithms have been proposed to move robots to the desired locations and complete various collaborative tasks. These algorithms usually require information exchange among robots, which in turn relies on efficient neighbor discovery. However, neighbor discovery of robots is a challenging problem due to limited communication range and beacon collision. Here, how to set the time slot length and contention window to alleviate the beacon collisions is a major issue: too large or too small slot length and contention window values cannot achieve good performance in the robotic network. Therefore, we propose a neighbor discovery protocol with an adaptive collision alleviation mechanism, i.e. ND-ACA. ND-ACA adopts a simple mechanism to detect and avoid potential collisions before sending beacon, and adaptively adjusts both slot length and backoff window according to the number of historical beacon collections and beacon collisions. Extensive simulation results show the efficiency of our proposed approach. To the best of our knowledge, this is the first work in the literature that explore the joint implementation effects that simultaneously consider the robot mobility model and neighbor discovery.

最近,人们提出了几种移动控制算法,用于将机器人移动到所需位置并完成各种协作任务。这些算法通常需要机器人之间进行信息交换,而信息交换又依赖于高效的邻居发现。然而,由于通信范围有限和信标碰撞,机器人的邻居发现是一个具有挑战性的问题。在这里,如何设置时隙长度和争用窗口以减少信标碰撞是一个重要问题:时隙长度和争用窗口值过大或过小都无法在机器人网络中实现良好的性能。因此,我们提出了一种具有自适应碰撞缓解机制的邻居发现协议,即 ND-ACA。ND-ACA 采用一种简单的机制来检测和避免发送信标前的潜在碰撞,并根据历史信标收集数和信标碰撞数自适应地调整时隙长度和后退窗口。广泛的仿真结果表明了我们提出的方法的效率。据我们所知,这是文献中首次探讨同时考虑机器人移动模型和邻居发现的联合实施效果。
{"title":"A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks","authors":"Zhiyong Lin ,&nbsp;Congming Yi ,&nbsp;Zongheng Wei ,&nbsp;Jianfeng Wen ,&nbsp;Qingji Wen ,&nbsp;Qinglin Liu ,&nbsp;Hai Liu","doi":"10.1016/j.pmcj.2024.101934","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101934","url":null,"abstract":"<div><p>Recently, several movement control algorithms have been proposed to move robots to the desired locations and complete various collaborative tasks. These algorithms usually require information exchange among robots, which in turn relies on efficient neighbor discovery. However, neighbor discovery of robots is a challenging problem due to limited communication range and beacon collision. Here, how to set the time slot length and contention window to alleviate the beacon collisions is a major issue: too large or too small slot length and contention window values cannot achieve good performance in the robotic network. Therefore, we propose a neighbor discovery protocol with an adaptive collision alleviation mechanism, i.e. ND-ACA. ND-ACA adopts a simple mechanism to detect and avoid potential collisions before sending beacon, and adaptively adjusts both slot length and backoff window according to the number of historical beacon collections and beacon collisions. Extensive simulation results show the efficiency of our proposed approach. To the best of our knowledge, this is the first work in the literature that explore the joint implementation effects that simultaneously consider the robot mobility model and neighbor discovery.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101934"},"PeriodicalIF":4.3,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140843787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable and adaptive computation offload strategy with load and cost coordination for edge computing 针对边缘计算的可靠自适应计算卸载策略与负载和成本协调
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-30 DOI: 10.1016/j.pmcj.2024.101932
Weicheng Tang , Donghui Gao , Siyu Yu , Jianbo Lu , Zhiyong Wei , Zhanrong Li , Ningjiang Chen

There are several important factors to consider in edge computing systems including latency, reliability, power consumption, and queue load. Task replication requires additional energy costs in mobile edge offloading scenarios based on master-slave replication for fault tolerance. Excessive task offloading may lead to a sharp increase in the total energy consumption of the system including replication costs. Conversely, new tasks cannot enter the waiting queue and are lost, resulting in reliability issues. This paper proposes an adaptive task offloading strategy for balancing the edge node queue load and offloading cost (Lyapunov and Differential Evolution based Offloading schedule strategy, LDEO). The LDEO strategy innovatively customizes the Lyapunov drift-plus-penalty function by incorporating replication redundancy offloading costs to establish a balance model between the queue load and offloading cost. The LDEO strategy computes the optimal offloading decisions with dynamic adjustment characteristics by integrating a low-complexity differential evolution method, aiming to find the optimal balance point that minimizes the offloading cost while maintaining reliability performance. The experimental results show that compared with the existing strategies, LDEO strategy effectively reduces the redundancy of fault tolerance cost and the waiting time under the condition of ensuring that the task will not be discarded over time. It stabilizes the queue length in a reasonable range, controls the waiting time and loss rate of tasks, reduces the extra energy consumption paid by replication redundancy, and effectively realizes the optimal balance under multiple conditions.

边缘计算系统需要考虑几个重要因素,包括延迟、可靠性、功耗和队列负载。在基于主从复制容错的移动边缘卸载场景中,任务复制需要额外的能源成本。过度的任务卸载可能会导致系统总能耗(包括复制成本)急剧增加。相反,新任务无法进入等待队列而丢失,从而导致可靠性问题。本文提出了一种平衡边缘节点队列负载和卸载成本的自适应任务卸载策略(基于 Lyapunov 和差分进化的卸载计划策略,LDEO)。LDEO 策略通过结合复制冗余卸载成本,创新性地定制了 Lyapunov 漂移加惩罚函数,从而建立了队列负载与卸载成本之间的平衡模型。LDEO 策略通过集成低复杂度的微分演化方法,计算出具有动态调整特性的最优卸载决策,旨在找到最优平衡点,在保持可靠性能的同时使卸载成本最小。实验结果表明,与现有的策略相比,LDEO 策略在保证任务不被长期丢弃的前提下,有效降低了容错成本的冗余度,减少了等待时间。它将队列长度稳定在合理范围内,控制了任务的等待时间和丢失率,减少了复制冗余付出的额外能耗,有效实现了多种条件下的最优平衡。
{"title":"Reliable and adaptive computation offload strategy with load and cost coordination for edge computing","authors":"Weicheng Tang ,&nbsp;Donghui Gao ,&nbsp;Siyu Yu ,&nbsp;Jianbo Lu ,&nbsp;Zhiyong Wei ,&nbsp;Zhanrong Li ,&nbsp;Ningjiang Chen","doi":"10.1016/j.pmcj.2024.101932","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101932","url":null,"abstract":"<div><p>There are several important factors to consider in edge computing systems including latency, reliability, power consumption, and queue load. Task replication requires additional energy costs in mobile edge offloading scenarios based on master-slave replication for fault tolerance. Excessive task offloading may lead to a sharp increase in the total energy consumption of the system including replication costs. Conversely, new tasks cannot enter the waiting queue and are lost, resulting in reliability issues. This paper proposes an adaptive task offloading strategy for balancing the edge node queue load and offloading cost (Lyapunov and Differential Evolution based Offloading schedule strategy, LDEO). The LDEO strategy innovatively customizes the Lyapunov drift-plus-penalty function by incorporating replication redundancy offloading costs to establish a balance model between the queue load and offloading cost. The LDEO strategy computes the optimal offloading decisions with dynamic adjustment characteristics by integrating a low-complexity differential evolution method, aiming to find the optimal balance point that minimizes the offloading cost while maintaining reliability performance. The experimental results show that compared with the existing strategies, LDEO strategy effectively reduces the redundancy of fault tolerance cost and the waiting time under the condition of ensuring that the task will not be discarded over time. It stabilizes the queue length in a reasonable range, controls the waiting time and loss rate of tasks, reduces the extra energy consumption paid by replication redundancy, and effectively realizes the optimal balance under multiple conditions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101932"},"PeriodicalIF":4.3,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141068466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmAuto: A domain-specific-language for application development in smart environments SmAuto:用于智能环境应用程序开发的特定领域语言
IF 4.3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-21 DOI: 10.1016/j.pmcj.2024.101931
Konstantinos Panayiotou, Constantine Doumanidis, Emmanouil Tsardoulias, Andreas L. Symeonidis

A common problem in the development of Internet-of-Things (IoT) and Cyber-Physical System (CPS) applications is the complexity of these domains, due to their hybrid and distributed nature in multiple layers (hardware, network, communication, application etc.). Apart from other issues, this inherent complexity often gives room for implementation errors, which can be in many cases fatal and drive the application and/or the system to undesired states. The current work aspires to alleviate this problem by introducing a low-code approach for building IoT and CPS applications. We argue that, through the proposed approach it is possible to lower development time and risk (errors/bug-related ones) and allow a wide range of end-users to build and monitor applications for state-of-the-art domains, such as smart home and smart industry. In this context, Model-Driven Engineering (MDE) approaches are explored and SmAuto, a Domain-specific Language (DSL) is proposed for creating and executing automation tasks for smart environments. Through SmAuto it is possible to handle the heterogeneity and complexity issues of the IoT and CPS domains, this way allowing end-users are non-technical application experts to build well-designed and properly functioning smart applications. The proposed DSL implements a Sense-Think-Act-Communicate model for smart environments and enables the creation, validation, and dynamic execution of composite automation models in physical, virtual and hybrid environments, while it also enables automated code generation of virtual entities for verification purposes. By using layered abstractions to automate the development process, end-users can concentrate on the real problem instead of dwelling into technical details, thus increasing their productivity. The results of the empirical evaluation and the comparison to existing approaches show that SmAuto can make application development more rigorous, improves productivity of end-users including non-experts, i.e. citizen developers and satisfies several functional and non-functional requirements of modern DSLs, such as tool support, modular deployment, reusability, availability and extensibility.

开发物联网(IoT)和网络物理系统(CPS)应用的一个常见问题是这些领域的复杂性,因为它们具有多层次(硬件、网络、通信、应用等)的混合和分布式性质。除其他问题外,这种固有的复杂性往往会给实施错误提供空间,而这种错误在很多情况下是致命的,会将应用和/或系统推向不期望的状态。目前的工作旨在通过引入低代码方法来构建物联网和 CPS 应用程序,从而缓解这一问题。我们认为,通过所提出的方法,有可能降低开发时间和风险(错误/与错误相关的风险),并允许广泛的最终用户为智能家居和智能工业等最先进的领域构建和监控应用程序。在此背景下,对模型驱动工程(MDE)方法进行了探索,并提出了用于创建和执行智能环境自动化任务的特定领域语言(DSL)SmAuto。通过 SmAuto,可以处理物联网和 CPS 领域的异构性和复杂性问题,从而使终端用户(非技术应用专家)能够构建设计良好、功能正常的智能应用。拟议的 DSL 实现了智能环境的 "感知-思考-行动-交流 "模型,能够在物理、虚拟和混合环境中创建、验证和动态执行复合自动化模型,同时还能自动生成用于验证目的的虚拟实体代码。通过使用分层抽象实现开发过程自动化,终端用户可以专注于真正的问题,而不是纠缠于技术细节,从而提高工作效率。实证评估结果以及与现有方法的比较表明,SmAuto 可以使应用程序开发更加严谨,提高包括非专业人员(即公民开发人员)在内的最终用户的工作效率,并满足现代 DSL 的一些功能性和非功能性要求,如工具支持、模块化部署、可重用性、可用性和可扩展性。
{"title":"SmAuto: A domain-specific-language for application development in smart environments","authors":"Konstantinos Panayiotou,&nbsp;Constantine Doumanidis,&nbsp;Emmanouil Tsardoulias,&nbsp;Andreas L. Symeonidis","doi":"10.1016/j.pmcj.2024.101931","DOIUrl":"10.1016/j.pmcj.2024.101931","url":null,"abstract":"<div><p>A common problem in the development of Internet-of-Things (IoT) and Cyber-Physical System (CPS) applications is the complexity of these domains, due to their hybrid and distributed nature in multiple layers (hardware, network, communication, application etc.). Apart from other issues, this inherent complexity often gives room for implementation errors, which can be in many cases fatal and drive the application and/or the system to undesired states. The current work aspires to alleviate this problem by introducing a low-code approach for building IoT and CPS applications. We argue that, through the proposed approach it is possible to lower development time and risk (errors/bug-related ones) and allow a wide range of end-users to build and monitor applications for state-of-the-art domains, such as smart home and smart industry. In this context, Model-Driven Engineering (MDE) approaches are explored and <em>SmAuto</em>, a Domain-specific Language (DSL) is proposed for creating and executing automation tasks for smart environments. Through <em>SmAuto</em> it is possible to handle the heterogeneity and complexity issues of the IoT and CPS domains, this way allowing end-users are non-technical application experts to build well-designed and properly functioning smart applications. The proposed DSL implements a Sense-Think-Act-Communicate model for smart environments and enables the creation, validation, and dynamic execution of composite automation models in physical, virtual and hybrid environments, while it also enables automated code generation of virtual entities for verification purposes. By using layered abstractions to automate the development process, end-users can concentrate on the real problem instead of dwelling into technical details, thus increasing their productivity. The results of the empirical evaluation and the comparison to existing approaches show that <em>SmAuto</em> can make application development more rigorous, improves productivity of end-users including non-experts, i.e. citizen developers and satisfies several functional and non-functional requirements of modern DSLs, such as tool support, modular deployment, reusability, availability and extensibility.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"101 ","pages":"Article 101931"},"PeriodicalIF":4.3,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140790904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1