[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,359)

Search Parameters:
Keywords = network access control

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
29 pages, 2090 KiB  
Review
SDN-Based Integrated Satellite Terrestrial Cyber–Physical Networks with 5G Resilience Infrastructure: Future Trends and Challenges
by Oluwatobiloba Alade Ayofe, Kennedy Chinedu Okafor, Omowunmi Mary Longe, Christopher Akinyemi Alabi, Abdoulie Momodu Sunkary Tekanyi, Aliyu Danjuma Usman, Mu’azu Jibrin Musa, Zanna Mohammed Abdullahi, Ezekiel Ehime Agbon, Agburu Ogah Adikpe, Kelvin Anoh, Bamidele Adebisi, Agbotiname Lucky Imoize and Hajara Idris
Technologies 2024, 12(12), 263; https://doi.org/10.3390/technologies12120263 - 16 Dec 2024
Abstract
This paper reviews the state-of-the art technologies and techniques for integrating satellite and terrestrial networks within a 5G and Beyond Networks (5GBYNs). It highlights key limitations in existing architectures, particularly in addressing interoperability, resilience, and Quality of Service (QoS) for real-time applications. In [...] Read more.
This paper reviews the state-of-the art technologies and techniques for integrating satellite and terrestrial networks within a 5G and Beyond Networks (5GBYNs). It highlights key limitations in existing architectures, particularly in addressing interoperability, resilience, and Quality of Service (QoS) for real-time applications. In response, this work proposes a novel Software-Defined Networking (SDN)-based framework for reliable satellite–terrestrial integration. The proposed framework leverages intelligent traffic steering and dynamic access network selection to optimise real-time communications. By addressing gaps in the literature with a distributed SDN control approach spanning terrestrial and space domains, the framework enhances resilience against disruptions, such as natural disasters, while maintaining low latency and jitter. Future research directions are outlined to refine the design and explore its application in 6G systems. Full article
(This article belongs to the Section Information and Communication Technologies)
Show Figures

Figure 1

Figure 1
<p>Proposed parallel-oriented SDN-based ISTN design for a multi-connective UE.</p>
Full article ">Figure 2
<p>User-plane versus network-plane connectivity architecture.</p>
Full article ">Figure 3
<p>Types of satellites and their orbital positions [<a href="#B39-technologies-12-00263" class="html-bibr">39</a>].</p>
Full article ">Figure 4
<p>SDN versus traditional network architecture.</p>
Full article ">Figure 5
<p>Network function virtualisation versus physical network functions.</p>
Full article ">Figure 6
<p>A reliable SDN-based framework of real-time traffic steering.</p>
Full article ">
19 pages, 6588 KiB  
Article
Virtual Power Plant Reactive Power Voltage Support Strategy Based on Deep Reinforcement Learning
by Qihe Lou, Yanbin Li, Xi Chen, Dengzheng Wang, Yuntao Ju and Liu Han
Energies 2024, 17(24), 6268; https://doi.org/10.3390/en17246268 - 12 Dec 2024
Viewed by 265
Abstract
After the large-scale access of distributed power sources to the distribution network, significant high/low voltage problems have emerged. Using a virtual power plant to provide reactive power voltage regulation as an ancillary service effectively addresses voltage issues. However, since a third party manages [...] Read more.
After the large-scale access of distributed power sources to the distribution network, significant high/low voltage problems have emerged. Using a virtual power plant to provide reactive power voltage regulation as an ancillary service effectively addresses voltage issues. However, since a third party manages the virtual power plant and contains both discrete and continuous regulation devices internally, there is a need to consider privacy protection. To address this, a training method that requires minimal boundary information and reward–penalty information for interaction between discrete and continuous action agents is proposed. This method uses distributed two-layer multi-agent deep reinforcement learning for the virtual power plant’s reactive power voltage support strategy. By utilizing actual engineering data and comparing it with the “centralized training” framework algorithm, this study proves the effectiveness of the deep reinforcement learning training method and reactive power voltage control strategy. It demonstrates advantages such as protecting the privacy of the virtual power plant and low training difficulty. Full article
Show Figures

Figure 1

Figure 1
<p>“Centralized training, decentralized execution” framework.</p>
Full article ">Figure 2
<p>Proposed multi-agent DRL method algorithm.</p>
Full article ">Figure 3
<p>Improved North American 45-node system.</p>
Full article ">Figure 4
<p>Comparison of training results.</p>
Full article ">Figure 5
<p>Comparison of training result.</p>
Full article ">Figure 6
<p>Reactive power optimization results.</p>
Full article ">Figure 7
<p>Comparison of system voltage fluctuations before and after optimization.</p>
Full article ">Figure 8
<p>Voltage magnitude of phase A before and after optimization.</p>
Full article ">Figure 9
<p>Voltage magnitude of phase B before and after optimization.</p>
Full article ">Figure 10
<p>Voltage magnitude of phase C before and after optimization.</p>
Full article ">Figure 11
<p>Comparison of optimization results between the proposed method and mixed-integer dynamic optimization method.</p>
Full article ">Figure 12
<p>Training effects of each method under topology 2.</p>
Full article ">Figure 13
<p>Training effects of each method under topology 3.</p>
Full article ">
27 pages, 6869 KiB  
Article
Secure Aggregation-Based Big Data Analysis and Power Prediction Model for Photovoltaic Systems: A Multi-Layered Approach
by Qiwei Huang and Abubaker Wahaballa
Electronics 2024, 13(24), 4869; https://doi.org/10.3390/electronics13244869 - 10 Dec 2024
Viewed by 372
Abstract
This study presents a novel approach to enhancing the security and accuracy of photovoltaic (PV) power generation predictions through secure aggregation techniques. The research focuses on key stages of the PV data lifecycle, including data collection, transmission, storage, and analysis. To safeguard against [...] Read more.
This study presents a novel approach to enhancing the security and accuracy of photovoltaic (PV) power generation predictions through secure aggregation techniques. The research focuses on key stages of the PV data lifecycle, including data collection, transmission, storage, and analysis. To safeguard against potential attacks and prevent data leakage across these critical processes, Paillier and Brakerski–Gentry–Vaikuntanathan (BGV) homomorphic encryption methods are employed. By integrating the transport layer security (TLS) protocol with edge computing during data transmission, this study not only bolsters data security but also minimizes latency and mitigates threats. Robust strategies for key management, access control, and auditing are implemented to ensure monitored and restricted access, further enhancing system security. In the analysis phase, advanced models such as Long Short-Term Memory (LSTM) networks and Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) are utilized for precise time-series predictions of PV power output. The findings demonstrate the effectiveness of these methods in managing large-scale PV datasets while maintaining high prediction accuracy and strong security measures. Full article
(This article belongs to the Special Issue Novel Methods Applied to Security and Privacy Problems, Volume II)
Show Figures

Figure 1

Figure 1
<p>A photovoltaic (PV) system architecture.</p>
Full article ">Figure 2
<p>A PV system that is connected to the grid without a battery.</p>
Full article ">Figure 3
<p>Correspondence between five types of data and two encryption algorithms in photovoltaic power generation systems.</p>
Full article ">Figure 4
<p>Parallel encryption process of Paillier.</p>
Full article ">Figure 5
<p>j-th internal step of the SHA-256 compression function.</p>
Full article ">Figure 6
<p>(<b>a</b>) Mean imputation diagram. (<b>b</b>) Graph showing the trend of photovoltaic power generation.</p>
Full article ">Figure 7
<p>Trend chart of photovoltaic power generation from 00:00 to 24:00 over 4 days.</p>
Full article ">Figure 8
<p>Diagram of K-means clustering in extreme data scenarios.</p>
Full article ">Figure 9
<p>Histogram of the K-means++ clustering in typical data situations.</p>
Full article ">Figure 10
<p>Different K values for clustering.</p>
Full article ">Figure 11
<p>Visualization of K-means++ cluster results.</p>
Full article ">Figure 12
<p>The heatmap of influencing factors in each clustering model.</p>
Full article ">Figure 13
<p>Cluster assignment diagram.</p>
Full article ">Figure 14
<p>The modal functions obtained from 3 iterations of CEEMDAN decomposition.</p>
Full article ">Figure 15
<p>Comparison of the modal functions obtained from 3 iterations of CEEMDAN decomposition with the original function.</p>
Full article ">Figure 16
<p>Hidden layer structure diagram.</p>
Full article ">Figure 17
<p>LSTM network structure diagram.</p>
Full article ">Figure 18
<p>Comparison of ultra-short-term point prediction results with actual outcomes across five different typical clustering scenarios.</p>
Full article ">
24 pages, 9424 KiB  
Article
A Novel IoT-Based Controlled Islanding Strategy for Enhanced Power System Stability and Resilience
by Aliaa A. Okasha, Diaa-Eldin A. Mansour, Ahmed B. Zaky, Junya Suehiro and Tamer F. Megahed
Smart Cities 2024, 7(6), 3871-3894; https://doi.org/10.3390/smartcities7060149 - 10 Dec 2024
Viewed by 647
Abstract
Intentional controlled islanding (ICI) is a crucial strategy to avert power system collapse and blackouts caused by severe disturbances. This paper introduces an innovative IoT-based ICI strategy that identifies the optimal location for system segmentation during emergencies. Initially, the algorithm transmits essential data [...] Read more.
Intentional controlled islanding (ICI) is a crucial strategy to avert power system collapse and blackouts caused by severe disturbances. This paper introduces an innovative IoT-based ICI strategy that identifies the optimal location for system segmentation during emergencies. Initially, the algorithm transmits essential data from phasor measurement units (PMUs) to the IoT cloud. Subsequently, it calculates the coherency index among all pairs of generators. Leveraging IoT technology increases system accessibility, enabling the real-time detection of changes in network topology post-disturbance and allowing the coherency index to adapt accordingly. A novel algorithm is then employed to group coherent generators based on relative coherency index values, eliminating the need to transfer data points elsewhere. The “where to island” subproblem is formulated as a mixed integer linear programming (MILP) model that aims to boost system transient stability by minimizing power flow interruptions in disconnected lines. The model incorporates constraints on generators’ coherency, island connectivity, and node exclusivity. The subsequent layer determines the optimal generation/load actions for each island to prevent system collapse post-separation. Signals from the IoT cloud are relayed to the circuit breakers at the terminals of the optimal cut-set to establish stable isolated islands. Additionally, controllable loads and generation controllers receive signals from the cloud to execute load and/or generation adjustments. The proposed system’s performance is assessed on the IEEE 39-bus system through time-domain simulations on DIgSILENT PowerFactory connected to the ThingSpeak cloud platform. The simulation results demonstrate the effectiveness of the proposed ICI strategy in boosting power system stability. Full article
(This article belongs to the Special Issue Next Generation of Smart Grid Technologies)
Show Figures

Figure 1

Figure 1
<p>The proposed IoT-based controlled islanding strategy.</p>
Full article ">Figure 2
<p>Flow chart of the clustering algorithm.</p>
Full article ">Figure 3
<p>Rotor angles of generators under disturbances in the first case study.</p>
Full article ">Figure 4
<p>Electrical frequency of generators in the first case study.</p>
Full article ">Figure 5
<p>Rotor speed of generators in the first case study.</p>
Full article ">Figure 6
<p>Voltage magnitude of the PV buses in the first case study.</p>
Full article ">Figure 7
<p>Test system after applying ICI in the first scenario.</p>
Full article ">Figure 8
<p>Generators’ rotor angle following ICI in the first case study.</p>
Full article ">Figure 9
<p>Generators’ rotor speed following ICI in the first case study.</p>
Full article ">Figure 10
<p>Voltage magnitude of the PV buses following ICI in the first case study.</p>
Full article ">Figure 11
<p>Frequency of generating units after ICI in the first case study.</p>
Full article ">Figure 12
<p>Rotor angles of generators under the second scenario.</p>
Full article ">Figure 13
<p>Rotor speed of generators under the second case study.</p>
Full article ">Figure 14
<p>Frequency of generators under the second case study.</p>
Full article ">Figure 15
<p>Terminal voltages of generators under the second case study.</p>
Full article ">Figure 16
<p>Intentional controlled islanding in the second scenario.</p>
Full article ">Figure 17
<p>Rotor angle post-controlled islanding in the second scenario.</p>
Full article ">Figure 18
<p>Rotor speed post-controlled islanding in the second scenario.</p>
Full article ">Figure 19
<p>Frequency of generators post-controlled islanding in the second scenario.</p>
Full article ">Figure 20
<p>Voltage magnitude of PV buses post-controlled islanding in the second scenario.</p>
Full article ">
25 pages, 1778 KiB  
Article
Efficient User Pairing and Resource Optimization for NOMA-OMA Switching Enabled Dynamic Urban Vehicular Networks
by Aravindh Balaraman, Shigeo Shioda, Yonggang Kim, Yohan Kim and Taewoon Kim
Electronics 2024, 13(23), 4834; https://doi.org/10.3390/electronics13234834 - 7 Dec 2024
Viewed by 425
Abstract
Vehicular communication is revolutionizing transportation by enhancing passenger experience and improving safety through seamless message exchanges with nearby vehicles and roadside units (RSUs). To accommodate the growing number of vehicles in dense urban traffic with limited channel availability, non-orthogonal multiple access (NOMA) is [...] Read more.
Vehicular communication is revolutionizing transportation by enhancing passenger experience and improving safety through seamless message exchanges with nearby vehicles and roadside units (RSUs). To accommodate the growing number of vehicles in dense urban traffic with limited channel availability, non-orthogonal multiple access (NOMA) is a promising solution due to its ability to improve spectral efficiency by sharing channels among multiple users. However, to completely leverage NOMA on mobile vehicular networks, a chain of operations and resources must be optimized, including vehicle user (VU) and RSU association, channel assignment, and optimal power control. In contrast, traditional orthogonal multiple access (OMA) allocates separate channels to users, simplifying management but falling short in high-density environments. Additionally, enabling NOMA-OMA switching can further enhance the system performance while significantly increasing the complexity of the optimization task. In this study, we propose an optimized framework to jointly utilize the power domain NOMA in a vehicular network, where dynamic NOMA-OMA switching is enabled, by integrating the optimization of vehicle-to-RSU association, channel assignment, NOMA-OMA switching, and transmit power allocation into a single solution. To handle the complexity of these operations, we also propose simplified formulations that make the solution practical for real-time applications. The proposed framework reduces total power consumption by up to 27% compared to Util&LB/opt, improves fairness in user association by 18%, and operates efficiently with minimal computational overhead. These findings highlight the potential of the proposed framework to enhance communication performance in dynamic, densely populated urban environments. Full article
(This article belongs to the Special Issue Wireless Sensor Network: Latest Advances and Prospects)
Show Figures

Figure 1

Figure 1
<p>Assumed power domain NOMA system where a vehicular user receives downlink service from its associated roadside unit with dynamic NOMA-OMA switching and resource optimization.</p>
Full article ">Figure 2
<p>Flowchart of the proposed approach that consists of two phases to jointly optimize association, channel assignment, NOMA-OMA switching and transmit power allocation.</p>
Full article ">Figure 3
<p>An example urban intersection road scenario with five RSUs and twenty vehicle users denoted by black circles and red triangles, respectively.</p>
Full article ">Figure 4
<p>Mean total power consumption for a simple and stationary configuration with a single channel with respect to the number of VUs on the network.</p>
Full article ">Figure 5
<p>Mean association fairness performance for a simple, stationary configuration with a single channel with respect to the number of VUs on the network.</p>
Full article ">Figure 6
<p>Mean proportion of the NOMA channels for a simple, stationary configuration with a single channel with respect to the number of VUs on the network.</p>
Full article ">Figure 7
<p>Mean total power consumption for a complex, stationary configuration with twenty VUs and three channels.</p>
Full article ">Figure 8
<p>Mean association fairness performance for a complex, stationary configuration with twenty VUs and three channels.</p>
Full article ">Figure 9
<p>Mean proportion of the NOMA channels for a complex, stationary configuration with twenty VUs and three channels.</p>
Full article ">Figure 10
<p>Accumulated total power consumption for a long-term complex, mobile configuration with twenty VUs and three channels where each time step spans 100 ms.</p>
Full article ">Figure 11
<p>Comparison of the time taken to solve the considered problems with varying numbers of vehicular users on a single-channel stationary configuration.</p>
Full article ">Figure 12
<p>Comparison of the time taken to solve the considered problems with twenty users on a three-channel mobile and stationary configuration.</p>
Full article ">
20 pages, 2647 KiB  
Article
Research on Distributed Secure Storage Framework of Industrial Internet of Things Data Based on Blockchain
by Hongliang Tian and Guangtao Huang
Electronics 2024, 13(23), 4812; https://doi.org/10.3390/electronics13234812 - 6 Dec 2024
Viewed by 531
Abstract
The conventional centralized Industrial Internet of Things (IIoT) framework is plagued by issues like subpar security performance and challenges related to storage expansion. This paper proposes a two-tier distributed secure storage framework based on blockchain for IIoT data. The authors first introduce the [...] Read more.
The conventional centralized Industrial Internet of Things (IIoT) framework is plagued by issues like subpar security performance and challenges related to storage expansion. This paper proposes a two-tier distributed secure storage framework based on blockchain for IIoT data. The authors first introduce the two-layer framework, which includes the edge network layer and the blockchain storage layer. The nodes in the edge network layer are classified into administrator nodes and ordinary nodes. It provides a lower latency network environment compared to cloud computing to preprocess raw industrial data. The blockchain storage layer provides storage space to keep data secure and traceable. Secondly, the authors propose a differentiated storage solution. Based on the timestamps of industrial data and the specific media access control (MAC) address, the Universally Unique Identifier (UUID) of the raw data is generated and uploaded to the blockchain for secure storage. Encrypt the corresponding raw data using the elliptic curve cryptography algorithm, and then upload it to InterPlanetary File System (IPFS) to expand the storage capacity of the blockchain. Deploy a smart contract on the blockchain to compare UUIDs for consistency in an automated, lightweight method to determine data integrity. Finally, we analyze the advantages brought by the integration of blockchain and IIoT. Additionally, the authors design comparative tests on different storage methods. The results prove that the security of this paper’s scheme is improved, and the storage performance is extended. Noteworthy enhancements include heightened throughput of data uploaded to the blockchain and minimized delay overhead. Full article
Show Figures

Figure 1

Figure 1
<p>IIoT System Structure.</p>
Full article ">Figure 2
<p>Data security architecture of IIoT based on blockchain.</p>
Full article ">Figure 3
<p>Data processing process.</p>
Full article ">Figure 4
<p>Basic structure of UUID.</p>
Full article ">Figure 5
<p>The process of generating a UUID.</p>
Full article ">Figure 6
<p>Data encryption and decryption process.</p>
Full article ">Figure 7
<p>Data storage and query process.</p>
Full article ">Figure 8
<p>Execution logic of smart contract.</p>
Full article ">Figure 9
<p>Comparison of UUIDs by smart contract.</p>
Full article ">Figure 10
<p>Comparison of different encryption algorithms.</p>
Full article ">Figure 11
<p>Results of throughput comparison experiments.</p>
Full article ">Figure 12
<p>Spend time when asset = 18.</p>
Full article ">
21 pages, 22783 KiB  
Article
A Latency Composition Analysis for Telerobotic Performance Insights Across Various Network Scenarios
by Nick Bray, Matthew Boeding, Michael Hempel, Hamid Sharif, Tapio Heikkilä, Markku Suomalainen and Tuomas Seppälä
Future Internet 2024, 16(12), 457; https://doi.org/10.3390/fi16120457 - 4 Dec 2024
Viewed by 369
Abstract
Telerobotics involves the operation of robots from a distance, often using advanced communication technologies combining wireless and wired technologies and a variety of protocols. This application domain is crucial because it allows humans to interact with and control robotic systems safely and from [...] Read more.
Telerobotics involves the operation of robots from a distance, often using advanced communication technologies combining wireless and wired technologies and a variety of protocols. This application domain is crucial because it allows humans to interact with and control robotic systems safely and from a distance, often performing activities in hazardous or inaccessible environments. Thus, by enabling remote operations, telerobotics not only enhances safety but also expands the possibilities for medical and industrial applications. In some use cases, telerobotics bridges the gap between human skill and robotic precision, making the completion of complex tasks requiring high accuracy possible without being physically present. With the growing availability of high-speed networks around the world, especially with the advent of 5G cellular technologies, applications of telerobotics can now span a gamut of scenarios ranging from remote control in the same room to robotic control across the globe. However, there are a variety of factors that can impact the control precision of the robotic platform and user experience of the teleoperator. One such critical factor is latency, especially across large geographical areas or complex network topologies. Consequently, military telerobotics and remote operations, for example, rely on dedicated communications infrastructure for such tasks. However, this creates a barrier to entry for many other applications and domains, as the cost of dedicated infrastructure would be prohibitive. In this paper, we examine the network latency of robotic control over shared network resources in a variety of network settings, such as a local network, access-controlled networks through Wi-Fi and cellular, and a remote transatlantic connection between Finland and the United States. The aim of this study is to quantify and evaluate the constituent latency components that comprise the control feedback loop of this telerobotics experience—of a camera feed for an operator to observe the telerobotic platform’s environment in one direction and the control communications from the operator to the robot in the reverse direction. The results show stable average round-trip latency of 6.6 ms for local network connection, 58.4 ms when connecting over Wi-Fi, 115.4 ms when connecting through cellular, and 240.7 ms when connecting from Finland to the United States over a VPN access-controlled network. These findings provide a better understanding of the capabilities and performance limitations of conducting telerobotics activities over commodity networks, and lay the foundation of our future work to use these insights for optimizing the overall user experience and the responsiveness of this control loop. Full article
(This article belongs to the Special Issue Advances and Perspectives in Human-Computer Interaction II)
Show Figures

Figure 1

Figure 1
<p>Photo of Baxter robot.</p>
Full article ">Figure 2
<p>Timing diagram and request/response flow between client, host, and robotic platform.</p>
Full article ">Figure 3
<p>Network diagram of wired non-VPN University network connection scenario.</p>
Full article ">Figure 4
<p>Network diagram of Lab Wi-Fi-to-University network connection scenario including VPN.</p>
Full article ">Figure 5
<p>Network diagram of Mobile Hotspot-to-University network connection scenario including VPN.</p>
Full article ">Figure 6
<p>Network diagram of overseas network connection scenario including VPN.</p>
Full article ">Figure 7
<p>Box plot of latency over University network.</p>
Full article ">Figure 8
<p>Box plot of latency for Lab Wi-Fi-to-University network connection scenario including VPN.</p>
Full article ">Figure 9
<p>Box plot of latency from Mobile Hotspot-to-University network connection scenario including VPN.</p>
Full article ">Figure 10
<p>A map showing the endpoint locations of our overseas tests between UNL and VTT.</p>
Full article ">Figure 11
<p>Box Plot of Latency from Transatlantic Network Connection scenario and Edge VPN.</p>
Full article ">Figure 12
<p>IK Solver latency comparison for all tested network scenarios.</p>
Full article ">Figure 13
<p>Move Request latency comparison.</p>
Full article ">Figure 14
<p>Box plot of camera feed latency across different network scenarios.</p>
Full article ">Figure 15
<p>Box plot comparison of the client’s request duration across different network scenarios.</p>
Full article ">
21 pages, 4796 KiB  
Article
Prediction and Control of Existing High-Speed Railway Tunnel Deformation Induced by Shield Undercrossing Based on BO-XGboost
by Ruizhen Fei, Hongtao Wu and Limin Peng
Sustainability 2024, 16(23), 10563; https://doi.org/10.3390/su162310563 - 2 Dec 2024
Viewed by 598
Abstract
The settlement of existing high-speed railway tunnels due to adjacent excavations is a complex phenomenon influenced by multiple factors, making accurate estimation challenging. To address this issue, a prediction model combining extreme gradient boosting (XGBoost) with Bayesian optimization (BO), namely BO-XGBoost, was developed. [...] Read more.
The settlement of existing high-speed railway tunnels due to adjacent excavations is a complex phenomenon influenced by multiple factors, making accurate estimation challenging. To address this issue, a prediction model combining extreme gradient boosting (XGBoost) with Bayesian optimization (BO), namely BO-XGBoost, was developed. Its predictive performance was evaluated against conventional models, such as artificial neural networks (ANNs), support vector machines (SVMs), and vanilla XGBoost. The BO-XGBoost model showed superior results, with evaluation metrics of MAE = 0.331, RMSE = 0.595, and R2 = 0.997. In addition, the BO-XGBoost model enhanced interpretability through an accessible analysis of feature importance, identifying volume loss as the most critical factor affecting settlement predictions. Using the prediction model and a particle swarm optimization (PSO) algorithm, a hybrid framework was established to adjust the operational parameters of a shield tunneling machine in the Changsha Metro Line 3 project. This framework facilitates the timely optimization of operational parameters and the implementation of protective measures to mitigate excessive settlement. With this framework’s assistance, the maximum settlements of the existing tunnel in all typical sections were strictly controlled within safety criteria. As a result, the corresponding environmental impact was minimized and resource management was optimized, ensuring construction safety, operational efficiency, and long-term sustainability. Full article
Show Figures

Figure 1

Figure 1
<p>The schematic diagram of the XGBoost model.</p>
Full article ">Figure 2
<p>Boxplot diagrams of some important variables: (<b>a</b>) vertical distance between existing tunnel axis and ground surface; (<b>b</b>) grouting pressure; (<b>c</b>) cutterhead diameter; and (<b>d</b>) maximum settlement of existing high-speed railway tunnel.</p>
Full article ">Figure 3
<p>Pair-wise correlation between variables.</p>
Full article ">Figure 4
<p>Pearson correlation coefficients of selected input features.</p>
Full article ">Figure 5
<p>Comparison between real settlements and predictions using multivariate regression model.</p>
Full article ">Figure 6
<p>Distribution of prediction error.</p>
Full article ">Figure 7
<p>Performance of different ML models on training and test sets: (<b>a</b>) unoptimized ANN; (<b>b</b>) optimal ANN; (<b>c</b>) unoptimized SVM; (<b>d</b>) optimal SVM; (<b>e</b>) unoptimized XGBoost; and (<b>f</b>) optimal XGBoost.</p>
Full article ">Figure 8
<p>Distribution of prediction error: (<b>a</b>) unoptimized ANN; (<b>b</b>) optimal ANN; (<b>c</b>) unoptimized SVM; (<b>d</b>) optimal SVM; (<b>e</b>) unoptimized XGBoost; and (<b>f</b>) optimal XGBoost.</p>
Full article ">Figure 9
<p>Comparisons of model performance: (<b>a</b>) MAE; (<b>b</b>) RMSE; (<b>c</b>) R<sup>2</sup>; and (<b>d</b>) modeling time.</p>
Full article ">Figure 10
<p>Comparisons of model performance: (<b>a</b>) MAE; (<b>b</b>) RMSE; and (<b>c</b>) R<sup>2</sup>.</p>
Full article ">Figure 11
<p>Relative importance of input variables.</p>
Full article ">Figure 12
<p>Plan of Changsha Metro Line 3 undercrossing the Liuyang River high-speed railway tunnel.</p>
Full article ">Figure 13
<p>Geological profile of construction site.</p>
Full article ">Figure 14
<p>Monitoring settlement of existing tunnel in optimized sections.</p>
Full article ">
16 pages, 1124 KiB  
Article
Hybrid CNN-GRU Model for Real-Time Blood Glucose Forecasting: Enhancing IoT-Based Diabetes Management with AI
by Reem Ibrahim Alkanhel, Hager Saleh, Ahmed Elaraby, Saleh Alharbi, Hela Elmannai, Saad Alaklabi, Saeed Hamood Alsamhi and Sherif Mostafa
Sensors 2024, 24(23), 7670; https://doi.org/10.3390/s24237670 - 30 Nov 2024
Viewed by 599
Abstract
For people with diabetes, controlling blood glucose level (BGL) is a significant issue since the disease affects how the body metabolizes food, which makes careful insulin regulation necessary. Patients have to manually check their blood sugar levels, which can be laborious and inaccurate. [...] Read more.
For people with diabetes, controlling blood glucose level (BGL) is a significant issue since the disease affects how the body metabolizes food, which makes careful insulin regulation necessary. Patients have to manually check their blood sugar levels, which can be laborious and inaccurate. Many variables affect BGL changes, making accurate prediction challenging. To anticipate BGL many steps ahead, we propose a novel hybrid deep learning model framework based on Gated Recurrent Units (GRUs) and Convolutional Neural Networks (CNNs), which can be integrated into the Internet of Things (IoT)-enabled diabetes management systems, improving prediction accuracy and timeliness by allowing real-time data processing on edge devices. While the GRU layer records temporal relationships and sequence information, the CNN layer analyzes the incoming data to extract significant features. Using a publicly accessible type 1 diabetes dataset, the hybrid model’s performance is compared to that of the standalone Long Short-Term Memory (LSTM), CNN, and GRU models. The findings show that the hybrid CNN-GRU model performs better than the single models, indicating its potential to significantly improve real-time BGL forecasting in IoT-based diabetes management systems. Full article
(This article belongs to the Special Issue Artificial Intelligence and Edge Computing in IoT-Based Applications)
Show Figures

Figure 1

Figure 1
<p>Stages of model development for blood glucose level monitoring.</p>
Full article ">Figure 2
<p>Proposed model for forecasting BGL.</p>
Full article ">Figure 3
<p>Comparing hybrid models for forecasting 5 min, 15 min, and 20 min.</p>
Full article ">Figure 4
<p>Comparing hybrid models for forecasting 25 min, 30 min, and 60 min.</p>
Full article ">
21 pages, 7852 KiB  
Article
MEC Server Status Optimization Framework for Energy Efficient MEC Systems by Taking a Deep-Learning Approach
by Minseok Koo and Jaesung Park
Future Internet 2024, 16(12), 441; https://doi.org/10.3390/fi16120441 - 28 Nov 2024
Viewed by 386
Abstract
Reducing energy consumption in a MEC (Multi-Access Edge Computing) system is a critical goal, both for lowering operational expenses and promoting environmental sustainability. In this paper, we focus on the problem of managing the sleep state of MEC servers (MECSs) to decrease the [...] Read more.
Reducing energy consumption in a MEC (Multi-Access Edge Computing) system is a critical goal, both for lowering operational expenses and promoting environmental sustainability. In this paper, we focus on the problem of managing the sleep state of MEC servers (MECSs) to decrease the overall energy consumption of a MEC system while providing users acceptable service delays. The proposed method achieves this objective through dynamic orchestration of MECS activation states based on systematic analysis of workload distribution patterns. To facilitate this optimization, we formulate the MECS sleep control mechanism as a constrained combinatorial optimization problem. To resolve the formulated problem, we take a deep-learning approach. We develop a task arrival rate predictor using a spatio-temporal graph convolution network (STGCN). We then integrate this predicted information with the queue length distribution to form the input state for our deep reinforcement learning (DRL) agent. To verify the effectiveness of our proposed framework, we conduct comprehensive simulation studies incorporating real-world operational datasets, with comparative evaluation against established metaheuristic optimization techniques. The results indicate that our method demonstrates robust performance in MECS state optimization, maintaining operational efficiency despite prediction uncertainties. Accordingly, the proposed approach yields substantial improvements in system performance metrics, including enhanced energy utilization efficiency, decreased service delay violation rate, and reduced computational latency in operational state determination. Full article
(This article belongs to the Special Issue Convergence of IoT, Edge and Cloud Systems)
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>Operation outline of a controller.</p>
Full article ">Figure 3
<p>Block diagram of the STGCN workload predictor.</p>
Full article ">Figure 4
<p>DQN agent model parameterized by <math display="inline"><semantics> <mi>θ</mi> </semantics></math> for determining <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Simulation topology.</p>
Full article ">Figure 6
<p>Box plot for the Hanmming distance between <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math> obtained by <math display="inline"><semantics> <mrow> <mi>E</mi> <msub> <mi>S</mi> <mi>R</mi> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>η</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math> determined by each method.</p>
Full article ">Figure 7
<p>Comparison of the distribution of <math display="inline"><semantics> <mrow> <mi>ζ</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Comparison of the distribution of the longest <math display="inline"><semantics> <mrow> <msub> <mi>δ</mi> <mi>i</mi> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p>
Full article ">Figure 9
<p><math display="inline"><semantics> <mrow> <mi>η</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math> match rate according to the Euclidean distance between <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>λ</mi> <mo stretchy="false">˜</mo> </mover> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mover accent="true"> <mi>λ</mi> <mo stretchy="false">^</mo> </mover> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math> (i.e., <math display="inline"><semantics> <mrow> <msub> <mi>d</mi> <mi>λ</mi> </msub> <mrow> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </mrow> </semantics></math>).</p>
Full article ">
15 pages, 4070 KiB  
Article
Hierarchical Security Authentication with Attention-Enhanced Convolutional Network for Internet of Things
by Xiaoying Qiu, Guangxu Zhao, Jinwei Yu, Wenbao Jiang, Zhaozhong Guo and Maozhi Xu
Electronics 2024, 13(23), 4699; https://doi.org/10.3390/electronics13234699 - 28 Nov 2024
Viewed by 546
Abstract
As security authentication issues continue to arise in future wireless communication networks, researchers are working hard to further improve authentication techniques. Recently, physical layer authentication (PLA) has received widespread attention for its lightweight nature compared to traditional encryption methods based on keys and [...] Read more.
As security authentication issues continue to arise in future wireless communication networks, researchers are working hard to further improve authentication techniques. Recently, physical layer authentication (PLA) has received widespread attention for its lightweight nature compared to traditional encryption methods based on keys and blockchain. However, the existing PLA mechanisms based on a fixed decision threshold have low reliability in dynamic environments. Moreover, PLA solutions are typically based on binary authentication, and these binary-type schemes cannot provide different levels of access control. To address these challenges, this article introduces the concept of hierarchical security authentication, aiming to achieve multi-level secure authorization access. In order to further improve the accuracy of identity verification, we design an Attention-Enhanced Convolutional Network (AECN) model that integrates the attention mechanism. Specifically, by introducing a confidence score branch, the proposed AECN-based PLA scheme completes authentication without a threshold, thus avoiding the issues stemming from inappropriate threshold settings in conventional PLA schemes. The simulation results show that our proposed AECN framework outperforms existing algorithms at different levels of security authentication. Full article
(This article belongs to the Special Issue Artificial Intelligence in Cyberspace Security)
Show Figures

Figure 1

Figure 1
<p>System model.</p>
Full article ">Figure 2
<p>Overall framework of hierarchical security authentication scheme.</p>
Full article ">Figure 3
<p>Architecture of Hierarchical Security Authenticator.</p>
Full article ">Figure 4
<p>The proposed attention module.</p>
Full article ">Figure 5
<p>Loss of AECN and CNN.</p>
Full article ">Figure 6
<p>Authentication accuracy of AECN and CNN at authentication level N = 5 and N = 10.</p>
Full article ">Figure 7
<p>Precision rate of AECN and CNN at authentication level N = 5.</p>
Full article ">Figure 8
<p>Recall rate of AECN and CNN at authentication level N = 5.</p>
Full article ">Figure 9
<p>Precision rate of AECN and CNN at authentication level N = 10.</p>
Full article ">Figure 10
<p>Recall rate of AECN and CNN at authentication level N = 10.</p>
Full article ">
18 pages, 14562 KiB  
Article
A Rotating Tidal Current Controller and Energy Router Siting and Capacitation Method Considering Spatio-Temporal Distribution
by Junqing Jia, Jia Zhou, Yuan Gao, Chen Shao, Junda Lu and Jiaoxin Jia
Energies 2024, 17(23), 5919; https://doi.org/10.3390/en17235919 - 26 Nov 2024
Viewed by 512
Abstract
As the proportion of new energy access increases year by year, the resulting energy imbalance and voltage/trend distribution complexity of the distribution network system in the spatio-temporal dimension become more and more prominent. The joint introduction of electromagnetic rotary power flow controller (RPFC) [...] Read more.
As the proportion of new energy access increases year by year, the resulting energy imbalance and voltage/trend distribution complexity of the distribution network system in the spatio-temporal dimension become more and more prominent. The joint introduction of electromagnetic rotary power flow controller (RPFC) and energy router (ER) can improve the high proportion of new active distribution network (ADN) consumption and power supply reliability from both spatial and temporal dimensions. To this end, the paper proposes an ADN expansion planning method considering RPFC and ER access. A two-layer planning model for RPFC and ER based on spatio-temporal characteristics is established, with the upper model being the siting and capacity-setting layer, which takes the investment and construction cost of RPFC and ER as the optimization objective, and the lower model being the optimal operation layer, which takes the lowest operating cost of the distribution network as the objective. The planning model is solved by a hybrid optimization algorithm with improved particle swarm and second-order cone planning. The proposed planning model and solving algorithm are validated with the IEEE33 node example, and the results show that the joint access of RPFC and ER can effectively improve the spatial-temporal distribution of voltage in the distribution network and has the lowest equivalent annual value investment and operation cost. Full article
Show Figures

Figure 1

Figure 1
<p>ADN expansion planning scheme considering RPFC and ER accesses.</p>
Full article ">Figure 2
<p>Framework of the RPFC and ER two-tier coordinated planning models.</p>
Full article ">Figure 3
<p>Solving two-layer planning model based on IPSO and SOCP.</p>
Full article ">Figure 4
<p>Classical particle swarm algorithm movement.</p>
Full article ">Figure 5
<p>Flowchart for solving the bilayer model.</p>
Full article ">Figure 6
<p>IEEE33 node active distribution network with DGs.</p>
Full article ">Figure 7
<p>Distribution network voltage and line loss without RPFC and ER participation. (<b>a</b>) Typical day 1; (<b>b</b>) Typical day 2; (<b>c</b>) Typical day 3; (<b>d</b>) Typical day 4.</p>
Full article ">Figure 8
<p>Voltage and line loss of the distribution network with only RPFC installed. (<b>a</b>) Typical day 1; (<b>b</b>) Typical day 2; (<b>c</b>) Typical day 3; (<b>d</b>) Typical day4.</p>
Full article ">Figure 8 Cont.
<p>Voltage and line loss of the distribution network with only RPFC installed. (<b>a</b>) Typical day 1; (<b>b</b>) Typical day 2; (<b>c</b>) Typical day 3; (<b>d</b>) Typical day4.</p>
Full article ">Figure 9
<p>Voltage and line loss of the distribution network with RPFC and ER installed together. (<b>a</b>) Typical day 1; (<b>b</b>) Typical day 2; (<b>c</b>) Typical day 3; (<b>d</b>) Typical day 4.</p>
Full article ">Figure 9 Cont.
<p>Voltage and line loss of the distribution network with RPFC and ER installed together. (<b>a</b>) Typical day 1; (<b>b</b>) Typical day 2; (<b>c</b>) Typical day 3; (<b>d</b>) Typical day 4.</p>
Full article ">Figure 10
<p>RPFC operation regulation under optimized regulation strategy. (<b>a</b>) Interconnection node active power; (<b>b</b>) Interconnection node reactive power.</p>
Full article ">Figure 11
<p>RPFC and ER operation under optimized regulation strategy. (<b>a</b>) Interconnection node active power; (<b>b</b>) Interconnection node reactive power; (<b>c</b>) Power exchange at ER access nodes.</p>
Full article ">Figure 12
<p>Comparison of Algorithm Convergence Curves.</p>
Full article ">Figure 13
<p>Comparison of Algorithm Box Plots.</p>
Full article ">
17 pages, 4486 KiB  
Article
Carbon-Efficient Scheduling in Fresh Food Supply Chains with a Time-Window-Constrained Deep Reinforcement Learning Model
by Yuansu Zou, Qixian Gao, Hao Wu and Nianbo Liu
Sensors 2024, 24(23), 7461; https://doi.org/10.3390/s24237461 - 22 Nov 2024
Viewed by 331
Abstract
Intelligent Transportation Systems (ITSs) leverage Internet of Things (IoT) technology to facilitate smart interconnectivity among vehicles, infrastructure, and users, thereby optimizing traffic flow. This paper constructs an optimization model for the fresh food supply chain distribution route of fresh products, considering factors such [...] Read more.
Intelligent Transportation Systems (ITSs) leverage Internet of Things (IoT) technology to facilitate smart interconnectivity among vehicles, infrastructure, and users, thereby optimizing traffic flow. This paper constructs an optimization model for the fresh food supply chain distribution route of fresh products, considering factors such as carbon emissions, time windows, and cooling costs. By calculating carbon emission costs through carbon taxes, the model aims to minimize distribution costs. With a graph attention network structure adopted to describe node locations, accessible paths, and data with collection windows for path planning, it integrates to solve for the optimal distribution routes, taking into account carbon emissions and cooling costs under varying temperatures. Extensive simulation experiments and comparative analyses demonstrate that the proposed time-window-constrained reinforcement learning model provides effective decision-making information for optimizing fresh product fresh food supply chain transportation and distribution, controlling logistics costs, and reducing carbon emissions. Full article
(This article belongs to the Special Issue Feature Papers in the Internet of Things Section 2024)
Show Figures

Figure 1

Figure 1
<p>Overview of fresh food supply environment.</p>
Full article ">Figure 2
<p>The proposed RL framework.</p>
Full article ">Figure 3
<p>Path planning using the DRL algorithm.</p>
Full article ">Figure 4
<p>Path planning using the GLS algorithm.</p>
Full article ">
16 pages, 1109 KiB  
Article
A Receiver-Driven Named Data Networking (NDN) Congestion Control Method Based on Reinforcement Learning
by Ruijuan Zheng, Bohan Zhang, Xuhui Zhao, Lin Wang and Qingtao Wu
Electronics 2024, 13(23), 4609; https://doi.org/10.3390/electronics13234609 - 22 Nov 2024
Viewed by 440
Abstract
Named data networking (NDN) is a novel networking paradigm characterized by in-network caching, receiver-driven communication, and multi-source, multi-path data retrieval, which poses new challenges for congestion control. Existing work has largely focused on receiver-driven mechanisms. Due to delays in obtaining network control information [...] Read more.
Named data networking (NDN) is a novel networking paradigm characterized by in-network caching, receiver-driven communication, and multi-source, multi-path data retrieval, which poses new challenges for congestion control. Existing work has largely focused on receiver-driven mechanisms. Due to delays in obtaining network control information (timeouts, NACKs) within NDN, consumers are unable to access the network congestion status from this information in a timely manner. To address the issues above, this paper combines the Q-learning algorithm with the NDN architecture, proposing Q-NDN. In Q-NDN, consumers can dynamically adjust the congestion window (cwnd) through the real-time monitoring of network status, leveraging the Q-learning algorithm, achieving automatic congestion control for the NDN architecture. Additionally, this paper introduces content popularity-based traffic scheduling for multi-user scenarioswhich adjusts the transmission rates of content with different popularity levels to maintain a dynamic balance in the network. The experimental results show that Q-NDN can converge quickly, make full use of bandwidth resources, and keep the packet loss rate to 0 in the basic network topology. In competing network topologies, Q-NDN can rapidly address conflict issues, efficiently utilize bandwidth resources, and maintain a relatively low packet loss rate. Full article
Show Figures

Figure 1

Figure 1
<p>Architecture of Q-NDN.</p>
Full article ">Figure 2
<p>Basic functionality of the sliding window.</p>
Full article ">Figure 3
<p>Q-NDN algorithm process.</p>
Full article ">Figure 4
<p>Basic network topology.</p>
Full article ">Figure 5
<p>Competitive network topology.</p>
Full article ">Figure 6
<p>Experimental results for basic network topology.</p>
Full article ">Figure 7
<p>Experimental results for competitive network topology.</p>
Full article ">
20 pages, 4602 KiB  
Article
Low-Cost Solution for Air Quality Monitoring: Unmanned Aerial System and Data Transmission via LoRa Protocol
by Francisco David Parra-Medina, Manuel Andrés Vélez-Guerrero and Mauro Callejas-Cuervo
Sustainability 2024, 16(22), 10108; https://doi.org/10.3390/su162210108 - 20 Nov 2024
Viewed by 769
Abstract
For both human health and the environment, air pollution is a serious concern. However, the available air quality monitoring networks have important limitations, such as the high implementation costs, limited portability, and considerable operational complexity. In this context, unmanned aerial systems (UASs) are [...] Read more.
For both human health and the environment, air pollution is a serious concern. However, the available air quality monitoring networks have important limitations, such as the high implementation costs, limited portability, and considerable operational complexity. In this context, unmanned aerial systems (UASs) are emerging as a useful technological alternative due to their ability to cover large distances and access areas that are difficult or impossible for humans to reach. This article presents the development of an integrated platform that combines an unmanned aerial system (UAS) with specialized sensors to measure key parameters in relation to air quality, such as carbon monoxide (CO), ozone (O3), and nitrogen dioxide (NO2). In addition, a web application called PTECA is developed to visualize the data gathered by the wireless sensor array in real time. The platform incorporates a system that allows real-time tracking of the UAS route and measurement values during sample collection, employing the LoRa communication protocol. This solution represents a low-cost alternative that mitigates some of the limitations of traditional monitoring networks by offering greater portability and accessibility in terms of data collection. Preliminary tests successfully demonstrate the viability of the proposed system in a controlled airspace using geofencing. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Implementation of the general architecture of the described platform, including its hardware and software components, distributed in an aerial system and a ground system. (<b>b</b>) Block diagram showing the logical connection between its components.</p>
Full article ">Figure 2
<p>(<b>a</b>) Frontal view of the implemented UAS, showing the battery pack, propellers, landing gear, and electronic speed controllers (ESCs). (<b>b</b>) Top view of the implemented UAS, without the propellers and battery pack, allowing for a clear view of the APM flight controller module.</p>
Full article ">Figure 3
<p>(<b>a</b>) Sensor payload arrangement, suspended by a one-meter ribbon cable. (<b>b</b>) Payload components: GPS A1035, MQ7 (CO), MQ131 (O<sub>3</sub>), and MICS6814 (NO<sub>2</sub>).</p>
Full article ">Figure 4
<p>(<b>a</b>) General architecture and communication process of the PTECA application. (<b>b</b>) Application deployment process.</p>
Full article ">Figure 5
<p>(<b>a</b>) Outdoor UAS assembly and test, following the established design and operation parameters. (<b>b</b>) Flight protocol and platform data collection.</p>
Full article ">Figure 6
<p>Open field test with the aerial system on the ground, verifying the operation of the platform before the sampling flight.</p>
Full article ">Figure 7
<p>(<b>a</b>) Behavior of air quality measurements in the selected area. (<b>b</b>) Map of the UAV trajectory with the GPS waypoints, showing the location and capture time during sampling.</p>
Full article ">Figure 7 Cont.
<p>(<b>a</b>) Behavior of air quality measurements in the selected area. (<b>b</b>) Map of the UAV trajectory with the GPS waypoints, showing the location and capture time during sampling.</p>
Full article ">
Back to TopTop