You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

5 September 2022

A Fuzzy-Based Method for Objects Selection in Blockchain-Enabled Edge-IoT Platforms Using a Hybrid Multi-Criteria Decision-Making Model

,
,
and
1
Department of Mechanical Engineering, M.H. Saboo Siddik College of Engineering, University of Mumbai, 8, SabooSiddik Polytechnic Road, Mumbai 400 008, Maharashtra, India
2
Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz 1477893855, Iran
3
Department of Computer Engineering, Faculty of Engineering and Natural Sciences, Kadir Has University, Istanbul 34083, Turkey
4
Department of Computer Engineering, Nisantasi University, Istanbul 34467, Turkey
This article belongs to the Special Issue Secure Provisioning Services in Cloud-Edge Systems

Abstract

The broad availability of connected and intelligent devices has increased the demand for Internet of Things (IoT) applications that require more intense data storage and processing. However, cloud-based IoT systems are typically located far from end-users and face several issues, including high cloud server load, slow response times, and a lack of global mobility. Some of these flaws can be addressed with edge computing. In addition, node selection helps avoid common difficulties related to IoT, including network lifespan, allocation of resources, and trust in the acquired data by selecting the correct nodes at a suitable period. On the other hand, the IoT’s interconnection of edge and blockchain technologies gives a fresh perspective on access control framework design. This article provides a novel node selection approach for blockchain-enabled edge IoT that provides a quick and dependable node selection. Moreover, fuzzy logic to approximation logic was used to manage numerical and linguistic data simultaneously. In addition, the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), a powerful tool for examining Multi-Criteria Decision-Making (MCDM) problems, is used. The suggested fuzzy-based technique employs three input criteria to select the correct IoT node for a given mission in IoT-edge situations. The outcomes of the experiments indicate that the proposed framework enhances the parameters under consideration.

1. Introduction

Recently, many types of network-based systems have become prevalent, such as the Wireless Body Area Network (WBAN) [1], mobile networks [2], spatial-temporal networks [3], and the Internet of Things (IoT) [4]. Since the invention of the IoT by Kevin Ashton, the concept of IoT has become more prosperous and more powerful [5,6]. IoT has been described as a network in which different objects with exclusive identifiers and the capability to transmit data are interconnected without the need for human interaction over the Internet [7,8,9]. The rapid growth of 6G-enabled IoT has recently piqued academia and industry’s interest [10,11,12]. Further, the issues related to privacy, anomaly, and security are becoming essential as the applications become more prevalent [13,14,15,16]. Safe and robust communication and networks include authentication, data sharing, and analysis [17,18,19].
Blockchain is devised to present data availability and tamper resistance in a decentralized environment and an immutable that is tailored to increase IoT data integrity, security, and availability while optimizing IoT applications [20]. It is an encoded, dispersed ledger technology for building tamper-resistant real-time records which is applicable in many fields [21,22]. Furthermore, this platform provides a reliable environment for IoT devices by securely interconnecting them and protecting them from the adversarial attacks that plague centralized client/server models [23].
Moreover, the network of IoT is assorted for a particular action, meaning that specific IoT nodes will complete it better than others. The critical problem that has been considered in this paper is determining which nodes are best suited. Obtaining the right nodes at the right time and their selection helps mitigate common IoT-based concerns such as network lifespan, allocation of resources, and trust in the gathered data [24]. The issue of energy and routing could be solved by choosing the node rather than optimizing node numbers and their location [25]. In this case, the nodes can be organized in any order, and only a subsection of nodes is stimulated at any given time for a given mission. By selecting the appropriate subset of nodes based on the task criteria, node selection aids energy efficiency [26]. Furthermore, there is individual-based selection, in which every node is evaluated independently and the best nodes are selected, or group-based selection, in which possible clusters are evaluated as a whole and the finest set is selected. So, evaluations are focused on the task specifications and constraints [27]. The latest selection strategies, in particular, are not well-suited to localization tasks due to several flaws. First, the present selection methods concentrate on comprehensive environmental monitoring, making them less application-oriented [28]. The information gathered is not used in a response system to update the community of nodes, which could be critical for increasing the speed of localization. Most studies on the area of interest coverage in the literature are planned for nodes with sensing ranges. However, this is not true for all sensors, for example, radiation sensors, which do not have a range [29]. These flaws necessitate the use of a dynamic selection outline that acclimates to the localization mission and uses the gathered readings to update the node collection [30].
Fuzzy Logic (FL) is a method that employs approximation logic to manage linguistic and numerical data simultaneously [31,32]. To achieve an actual output and determine the details of the non-linear mapping, fuzzy logic works on stages of input likelihoods [33]. Furthermore, the models based on Markov Theory and Multi-Criteria Decision-Making (MCDM) have been used to solve engineering problems in science, technology, economics, and other fields in numerous studies [34,35,36]. However, MCDM models, which combine computational and mathematical methods to provide a subjective assessment of performance criteria by decision-makers, have emerged as a part of the process study. In addition, the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS), a powerful tool for examining Multi-Criteria Decision-Making (MCDM) problems, is used. TOPSIS has been widely utilized to tackle decision-making difficulties. This strategy is based on comparing all the possibilities in the issue. The TOPSIS approach provides the following advantages: Simplicity, rationality, comprehensibility, high computational efficiency, and the ability to quantify the relative performance of each choice in a simple mathematical form. Consequently, in this investigation, blockchain technology has been employed to improve the privacy and security of the system. Using an edge platform can also improve system efficiency, reduce latency, and improve performance. To select an appropriate node for a specific mission, the proposed fuzzy-based method uses three input parameters: IoT Node’s Free Buffer Space (INFBS), IoT Node’s Remaining Energy (INRE), and IoT Node’s Distance to Event (INDE). Using a hybrid MCDM model, the node selection issue in blockchain-enabled edge-IoT platforms using a fuzzy-based method has been analyzed. This investigation’s significant outcomes are listed below:
  • Proposing a secure framework for integrating edge and blockchain technologies into IoT networks to ensure data protection and energy efficiency.
  • Providing a platform for node selection for various IoT-edge frameworks.
  • Utilizing an edge platform to increase performance, decrease latency, and increase system efficiency.
  • Introducing a novel fuzzy-based method using a hybrid MCDM model.
  • Improving parameters such as INFBS, INRE, and INDE.
The rest of this article is organized in the following manner. Section 2 deals with the theoretical background. Section 3 covers the adopted methodology, Section 4 deals with results, and Section 5 discusses the conclusion and future scope.

3. Proposed Method

However, thanks to evolving edge device technology, the combination of blockchain and edge allows for secure network and computation access and control at the edges. Furthermore, since both blockchain and edge have a distributed structure, they are better suited to each other. As a result, incorporating edge and blockchain into IoT is advantageous, given the high-security requirements and intensive computation in IoT networks. In this research, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) is used for analyzing MCDM problems, which Lai and Liu [48] developed. This approach is constructed on the concept that the selected options must have the shortest distance to the positive ideal solution (which minimizes the criteria about cost (worst criteria) and maximizes the best measures) and the furthest distance to the negative ideal solution [49]. In TOPSIS, the weights of the measures and rankings of the options considered for the analysis are crisp numeric values. Hence, it does not consider the vagueness of human judgments.
Further, it may be noted that crisp values cannot evaluate real-life problems; therefore, using linguistic terms and further analyzing the fuzzy environment would yield better results [50]. Thus, the Fuzzy TOPSIS methodology has been employed in this research study. Moreover, the terminologies used in the TOPSIS methodology are indicated in Table 2.
Table 2. Notations list.
  • System architecture
This architecture has been split into three layers after integrating the edge platform and blockchain into the IoT system: Edge in the linked IoT devices on behalf of an IoT domain at the bottom, and cloud computing at the top. Figure 1 shows the proposed architecture of the blockchain-based IoT structure.
Figure 1. The proposed Blockchain-enabled IoT System’s architecture.
In this architecture, the IoT area has a conforming edge gateway that becomes a peer node in the blockchain network and communicates with the cloud via WiFi. If certain conditions are met, the gateway node will also act as an orderer node in the consensus process. Due to our design, IoT devices do not join the blockchain network as peer nodes. Instead, they connect to their domain’s edge gateway and exchange access control data with it via the lightweight MQTT protocol. Edge gateways can connect to the WiFi network and communicate with the cloud in milliseconds, thanks to the WiFi base station, which connects the edge and the cloud. For example, the industrial edge gateway can swiftly and securely access storage resources in the industrial cloud and provide essential data for remote monitoring.
The manager could modify the access control policy in our platform using the chain code and send it to the blockchain. A collection of subject–object access permissions is represented by every policy. The explicit content of the access control policy is kept in the state database, and transaction details are recorded in the ledger. As a result, the access control policy may be audited and traced. For behavior-gathering and credit computation, the edge gateway will initially use MQTT to regularly gather behavior information from IoT devices inside its area. The gateway subsequently standardizes the data before writing it to the blockchain to record its behavior. Finally, the gateway frequently checks the domain credit value, guiding dynamic node selection in the following consensus procedure. The handler could seek access permission for obtaining resources using chain code for user authorization. The chain code will verify access control restrictions once the user submits a request. The chain code will return the access authorization if the access request satisfies the policy’s properties. The user might then utilize the edge gateway to connect to IoT nodes.
Algorithm 1, used to determine the rank using a fuzzy-based hybrid MCDM approach, is as follows:
Algorithm 1. Proposed method
Step 0Determine the measures (INFBS, INRE, and INDE) and options (27) for the analysis.
Step 1Accept inputs or assignment ratings for three criteria and alternatives from the user
Step 2Formulate criteria and alternatives decision matrix showcasing the magnitudes of assignment ratings for INFBS, INRE, and INDE and 27 options.
Step 3Formulate the ‘fuzzy normalized decision matrix’ for the benefit and cost criteria using Equations (2) and (3), respectively.
Step 4Develop the ‘fuzzy weighted normalized matrix’ using step 4 of the methodology, which considers the influence of the node selection possibility.
Step 5Compute the FPIS and FNIS using Equations (5) and (6), respectively.
Step 6Determine the distance from every option to the FPIS and FNIS employing Equations (7) and (8), respectively.
Step 7Determine CCi for each option employing Equation (9). The Cci weights help in identifying the ranks of the alternatives.
Step 8Determine the rank of alternatives based on the magnitude of the Cci.
Step 9Check if other options with high positions are feasible. If ‘No’ GOTO Step 3. If ‘Yes’ GOTO Step 10.
Step 10Print-Optimal node selection as output
Step 11STOP
On Hyperledger Fabric, the chain code may be thought of as a smart contract. The chain code is how the user interacts with the ledger. We may develop interfaces that fulfill specified logic functions for distinct chain codes with the aid of Fabric’s API. There are three sorts of chain codes in the proposed architecture. (1) The Policy Management Chaincode (PMC) adds and maintains access control policies based on the ABAC architecture in this work. Only policy managers, such as object owners, could perform it. The Environment Attribute (EA), Action Attribute (AA), Object Attribute (OA), and Subject Attribute (SA) are the four components of an access control policy. The subject, role, group, and domain are all part of the SA, representing the subject’s basic identity information. SubjectID distinguishes whether the topic is a user or a user’s device. As with OA, we choose two unique identifiers, ObjectID and MAC, as the object’s properties. The AA represents the permissions for a subject–object pair. We utilize an integer to signify various storage permissions (4—Read, 2—Write, 1—execute). The EA reflects the policy’s context condition. The item could only be accessed in a particular context by the subject. Each policy’s information will be kept in PMC. Given the lack of security protection, the system is exposed to infiltration. IoT devices with insufficient processing, memory, and resource availability are vulnerable to becoming tools for thieves to start nefarious conduct. This will cause the infected IoT system to behave abnormally, including deleting, changing, injecting, and retransmitting data packets, among other things. Further, the monitoring and recording of this data, linked with the access control system, for detecting harmful conduct, and its prevention from spreading as quickly as feasible may be performed.
  • Suggested method
TOPSIS with extended triangular functions was proposed by Chen [25], in which the distance between 2 triangular functions was calculated using the vertex method. So, if the 2 triangular functions are x = (a1, b1, c1) and y = (a2, b2, c2), then
d ( x , y ) = 1 3 [ ( a 1 a 2 ) 2 + ( b 1 b 2 ) 2 + ( c 1 c 2 ) 2
The framework used for this study is given in Figure 2. Further, the fuzzy TOPSIS methodology procedure has been detailed below, and a flowchart of the same is shown in Figure 3.
Figure 2. The framework used for the optimal node selection that indicates the evaluation criteria and the alternatives.
Figure 3. Flowchart of the fuzzy TOPSIS methodology.
  • Identify the measures and options for carrying out the analysis.
  • Assign ratings to the measures based on which alternatives would be ranked.
  • Formulate “R”.
    where R = [rij], for the ‘benefit criteria’
r ij = a i j c j * , b i j c j * , c i j c j * ;   c j * = max i c i j
Furthermore, for the cost criteria, we have Equation (3).
r ij = a j c i j * , a j b i j * , a j a i j * ;   c j = min i a i j
  • Compute “V”, where vij = rij * weight of the criteria (wj).
V = vij
2.
Using the following equations, calculate the Fuzzy Positive and Negative Ideal Solution (FPIS and FNIS).
A *   =   ( v 1 * ,   v 2 * ,   v n * ) , where ,   v j * = max i v i j 3
A = ( v 1 ,   v 2 ,   v n ) , where ,   v j = min i v i j 1
1.
Calculate the distance of every option from ‘FPIS’ and ‘FNIS’ employing Equations (7) and (8).
d i *   =   j = 1 n d v i j ,   v j *
d i   =   j = 1 n d v i j ,   v j
2.
Compute C C i for each option based on Equation (9).
C C i = d i d i + d i *
3.
Grade the options using the C C i values. The higher the intensity, the better the alternative.

4. Results

In this study, for selecting a proper IoT node, three parameters, namely INFBS, INRE, and INDE, have been considered. Furthermore, the fuzzy TOPSIS methodology has been used to rank the IoT node possibilities. Table 3 highlights the parameters, term sets, and triangular fuzzy membership functions.
Table 3. Parameters along with their term sets and membership functions.
As discussed earlier in the research methodology section, in the Fuzzy TOPSIS approach, the relative importance of the parameters is considered for ranking the alternatives. Hence, the linguistic terms indicating the relative importance of the parameters have been shown in Table 3, along with their membership functions. Figure 4 represents the Fuzzy triangular membership functions for INRE, INFBS, and INDE, and their relative importance. Table 4 indicates the linguistic terms for the INSPs, their codes, and corresponding triangular fuzzy membership functions. For INSPs, seven levels have been considered, namely “Extremely Low: EL”, “Very Low: VL”, “Low: L”, “Moderate: M”, “High: H”, “Very High: VH”, and “Extremely High: EH”. Later, the fuzzy rule base was developed, as shown in Table 5, reflecting each criterion’s nature and selection possibilities (See Figure 5). Out of three parameters, INRE and INFBS are the benefit parameters, whereas INDE is the cost criterion. It may be noted that the weights of the selection possibilities should be considered for ranking the node possibilities, along with the relative importance of the selected attributes. Table 6 shows the decision matrix with 27 selection possibilities indicating fuzzy weights of the measures chosen and the node numbers.
Figure 4. Fuzzy triangular membership functions for INRE, INFBS, and INDE, and their relative importance.
Table 4. Term sets and membership functions for node selection possibilities.
Table 5. Fuzzy rule base.
Figure 5. Fuzzy triangular membership functions for INSP.
Table 6. Decision matrix.
A fuzzy normalized decision matrix is shown in Table 7, which was developed using Equations (2) and (3). In addition, in this table, weights of the INSP are indicated, which were taken into account for developing the fuzzy weighted normalized decision matrix shown in Table 8. This table considered weights of relative importance and weights of the selection possibilities, i.e., vij = rij *weight of the criteria (wj)*weight of the selection possibility (ws). Moreover, the FPIS and FNIS values are shown in Table 8, which were calculated using Equations (5) and (6). The distance of each node from the FPIS (〖d_i〗^*) and FNIS (〖d_i〗^-) was computed by employing Equation (1), Equation (7), and Equation (8) and all the values of distances are shown in Table 9. These (〖d_i〗^* and 〖d_i〗^-) values help in calculating the Closeness Coefficients (CCi) using Equation (9), which helps in identifying the ranks of the 27 alternatives. The CCi of all the node numbers is given in Table 9, along with their ranks. It may be inferred from Table 9 that node numbers 27, 18, 17, 9, and 8 have the highest potential for selection as their weights (w27 = 0.960246, w18 = 0.875025, w3 = 0.744288, w9 = 0.677472, and w8 = 0.662365, respectively) are close to the positive ideal solution. On the other hand, node numbers 22, 20, 19, 10, and 1 are the least preferred numbers as their weights, i.e., w22 = 0.087472, w20 = 0.068519, w19 = 0.05284, w10 = 0.050204, and w1 = 0.029671, respectively, are considerably distant from the FPIS.
Table 7. Normalized Fuzzy decision matrix.
Table 8. Weighted normalized Fuzzy decision matrix.
Table 9. Distance from a positive and negative ideal solution and ranks of the node possibilities.

5. Conclusions, Limitations, and Future Directions of Research

One of the most crucial IoT problems in real-world applications is object selection based on customer demand. Effective object selection, identification, and selection of relevant nodes are required to achieve optimal performance. As a result, experts may easily comprehend diverse views on IoT object selection methods. The findings of this work will also aid academics and provide insight into future research topics in this discipline. Furthermore, the disadvantages and benefits of the suggested method were examined, paving the way for the future development of more efficient and practical processes for object selection in IoT contexts. Therefore, fuzzy TOPSIS is a powerful approach for effective decision-making; however, the findings of this study may be validated by employing other tools, namely AHP, ANP, VIKOR, and ELECTRE, in the fuzzy environment. Moreover, a hybrid approach is used to validate and improve the accuracy of the results. In addition, after integrating the edge platform and blockchain into the IoT system, we divided this architecture into three layers: Edge in the center-connected IoT devices on behalf of an IoT domain at the bottom and cloud computing at the top. However, the IoT’s deep integration of edge and blockchain technologies offers a new access control framework design approach. Therefore, this study proposes a unique node selection framework for blockchain-enabled edge IoT that implements a fast and reliable node selection technique. In addition, we developed a hybrid MCDM model mechanism that can dynamically pick select nodes to obtain a rapid and reliable result using the fuzzy approach. In this study, three evaluation criteria, namely INRE, INFBS, and INDE, have been considered, and the Fuzzy TOPSIS approach was used to rank the IoT node alternatives. The results of the experiments indicate that the suggested framework improves the parameters under evaluation.
However, the data storage optimization of blockchain nodes for IoT is not the subject of this article. Instead, we intended to investigate several optimization strategies to lessen the future framework’s expanding storage load. Furthermore, in upcoming studies, the number of criteria may increase, increasing the number of node possibilities. This would make the model more robust and reliable. Moreover, GUI-based simulations could be carried out. Finally, using machine learning techniques for defect prediction of IoT nodes will be interesting in the future [51].

Author Contributions

Conceptualization, N.J.N. and A.H.; methodology, B.B.G.; software, B.B.G.; validation, N.J.N. and M.U.; formal analysis, B.B.G.; investigation, B.B.G., A.H., N.J.N. and M.U.; writing—review and editing, B.B.G., A.H., N.J.N. and M.U. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

All data are reported in the paper.

Acknowledgments

Authors would like to thank editors and anonymous reviewers for their valuable input which has improved the quality of the manuscript substantially. Also, the authors thank Vaibhav Narwane for guiding them through the fuzzy approach.

Conflicts of Interest

The authors declare no competing interest.

References

  1. Liu, K.; Ke, F.; Huang, X.; Yu, R.; Lin, F.; Wu, Y.; Ng, D.W.K. DeepBAN: A temporal convolution-based communication framework for dynamic WBANs. IEEE Trans. Commun. 2021, 69, 6675–6690. [Google Scholar] [CrossRef]
  2. Heidari, A.; Navimipour, N.J.; Unal, M.; Toumaj, S. Machine learning applications for COVID-19 outbreak management. Neural Comput. Appl. 2022, 34, 15313–15348. [Google Scholar] [CrossRef] [PubMed]
  3. Luo, G.; Zhang, H.; Yuan, Q.; Li, J.; Wang, F.Y. ESTNet: Embedded Spatial-Temporal Network for Modeling Traffic Flow Dynamics. IEEE Trans. Intell. Transp. Syst. 2022, 1–12. [Google Scholar] [CrossRef]
  4. Kong, H.; Lu, L.; Yu, J.; Chen, Y.; Tang, F. Continuous authentication through finger gesture interaction for smart homes using WiFi. IEEE Trans. Mob. Comput. 2020, 20, 3148–3162. [Google Scholar] [CrossRef]
  5. Heidari, A.; Jamali, M.A.J.; Navimipour, N.J.; Akbarpour, S. Deep Q-Learning Technique for Offloading Offline/Online Computation in Blockchain-Enabled Green IoT-Edge Scenarios. Appl. Sci. 2022, 12, 8232. [Google Scholar] [CrossRef]
  6. Cao, B.; Zhang, Y.; Zhao, J.; Liu, X.; Skonieczny, Ł.; Lv, Z. Recommendation Based on Large-Scale Many-Objective Optimization for the Intelligent Internet of Things System. IEEE Internet Things J. 2022, 9, 15030–15038. [Google Scholar] [CrossRef]
  7. Cao, B.; Sun, Z.; Zhang, J.; Gu, Y. Resource allocation in 5G IoV architecture based on SDN and fog-cloud computing. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3832–3840. [Google Scholar] [CrossRef]
  8. Cao, B.; Gu, Y.; Lv, Z.; Yang, S.; Zhao, J.; Li, Y. RFID Reader Anticollision Based on Distributed Parallel Particle Swarm Optimization. IEEE Internet Things J. 2021, 8, 3099–3107. [Google Scholar] [CrossRef]
  9. Cao, K.; Ding, H.; Wang, B.; Lv, L.; Tian, J.; Wei, Q.; Gong, F. Enhancing Physical Layer Security for IoT with Non-Orthogonal Multiple Access Assisted Semi-Grant-Free Transmission. IEEE Internet Things J. 2022, 1–13. [Google Scholar] [CrossRef]
  10. Lv, Z.; Qiao, L.; You, I. 6G-enabled network in box for internet of connected vehicles. IEEE Trans. Intell. Transp. Syst. 2020, 22, 5275–5282. [Google Scholar] [CrossRef]
  11. Cao, B.; Fan, S.; Zhao, J.; Tian, S.; Zheng, Z.; Yan, Y.; Yang, P. Large-scale many-objective deployment optimization of edge servers. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3841–3849. [Google Scholar] [CrossRef]
  12. Heidari, A.; Navimipour, N.J.; Unal, M. The History of Computing in Iran (Persia)—Since the Achaemenid Empire. Technologies 2022, 10, 94. [Google Scholar] [CrossRef]
  13. Lv, Z.; Li, Y.; Feng, H.; Lv, H. Deep learning for security in digital twins of cooperative intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 2021, 1–10. [Google Scholar] [CrossRef]
  14. Heidari, A.; Toumaj, S.; Navimipour, N.J.; Unal, M. A privacy-aware method for COVID-19 detection in chest CT images using lightweight deep conventional neural network and blockchain. Comput. Biol. Med. 2022, 145, 105461. [Google Scholar] [CrossRef]
  15. Wang, H.; Gao, Q.; Li, H.; Wang, H.; Yan, L.; Liu, G. A Structural Evolution-Based Anomaly Detection Method for Generalized Evolving Social Networks. Comput. J. 2022, 65, 1189–1199. [Google Scholar] [CrossRef]
  16. Yang, W.; Chen, X.; Xiong, Z.; Xu, Z.; Liu, G.; Zhang, X. A privacy-preserving aggregation scheme based on negative survey for vehicle fuel consumption data. Inf. Sci. 2021, 570, 526–544. [Google Scholar] [CrossRef]
  17. Chen, H.; Xiong, Y.; Li, S.; Song, Z.; Hu, Z.; Liu, F. Multi-Sensor Data Driven with PARAFAC-IPSO-PNN for Identification of Mechanical Nonstationary Multi-Fault Mode. Machines 2022, 10, 155. [Google Scholar] [CrossRef]
  18. Heidari, A.; Navimipour, N.J.; Unal, M. Applications of ML/DL in the management of smart cities and societies based on new trends in information technologies: A systematic literature review. Sustain. Cities Soc. 2022, 85, 104089. [Google Scholar] [CrossRef]
  19. Zhang, L.; Gao, T.; Cai, G.; Hai, K.L. Research on electric vehicle charging safety warning model based on back propagation neural network optimized by improved gray wolf algorithm. J. Energy Storage 2022, 49, 104092. [Google Scholar] [CrossRef]
  20. Gupta, B.B.; Li, K.C.; Leung, V.C.; Psannis, K.E.; Yamaguchi, S. Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J. Autom. Sin. 2021, 8, 1877–1890. [Google Scholar]
  21. Kumar, R.; Tripathi, R. DBTP2SF: A deep blockchain-based trustworthy privacy-preserving secured framework in industrial internet of things systems. Trans. Emerg. Telecommun. Technol. 2021, 32, e4222. [Google Scholar] [CrossRef]
  22. Yan, L.; Yin-He, S.; Qian, Y.; Zhi-Yu, S.; Chun-Zi, W.; Zi-Yun, L. Method of reaching consensus on probability of food safety based on the integration of finite credible data on block chain. IEEE Access 2021, 9, 123764–123776. [Google Scholar] [CrossRef]
  23. Jan, M.A.; Cai, J.; Gao, X.C.; Khan, F.; Mastorakis, S.; Usman, M.; Alazab, M.; Watters, P. Security and blockchain convergence with Internet of Multimedia Things: Current trends, research challenges and future directions. J. Netw. Comput. Appl. 2021, 175, 102918. [Google Scholar] [CrossRef] [PubMed]
  24. Alagha, A.; Singh, S.; Mizouni, R.; Ouali, A.; Otrok, H. Data-driven dynamic active node selection for event localization in IoT applications-a case study of radiation localization. IEEE Access 2019, 7, 16168–16183. [Google Scholar] [CrossRef]
  25. Xiao, Y.; Zuo, X.; Huang, J.; Konak, A.; Xu, Y. The continuous pollution routing problem. Appl. Math. Comput. 2020, 387, 125072. [Google Scholar] [CrossRef]
  26. Sun, G.; Cong, Y.; Wang, Q.; Zhong, B.; Fu, Y. Representative task self-selection for flexible clustered lifelong learning. IEEE Trans. Neural Netw. Learn. Syst. 2020, 33, 1467–1481. [Google Scholar] [CrossRef]
  27. Shukla, A.; Tripathi, S. An effective relay node selection technique for energy efficient WSN-assisted IoT. Wirel. Pers. Commun. 2020, 112, 2611–2641. [Google Scholar] [CrossRef]
  28. Luo, J.; Wu, D.; Pan, C.; Zha, J. Optimal energy strategy for node selection and data relay in WSN-based IoT. Mob. Netw. Appl. 2015, 20, 169–180. [Google Scholar] [CrossRef]
  29. Cao, B.; Li, M.; Liu, X.; Zhao, J.; Cao, W.; Lv, Z. Many-Objective Deployment Optimization for a Drone-Assisted Camera Network. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2756–2764. [Google Scholar] [CrossRef]
  30. Bouazza, H.; Said, B.; Laallam, F.Z. A hybrid IoT services recommender system using Social IoT. J. King Saud Univ. Comput. Inf. Sci. 2022, 34 Pt B, 5633–5645. [Google Scholar] [CrossRef]
  31. Zhang, L.; Zheng, H.; Cai, G.; Zhang, Z.; Wang, X.; Koh, L.H. Power-frequency oscillation suppression algorithm for AC microgrid with multiple virtual synchronous generators based on fuzzy inference system. IET Renew. Power Gener. 2022, 16, 1589–1601. [Google Scholar] [CrossRef]
  32. Chen, H.; Li, S. Multi-Sensor Fusion by CWT-PARAFAC-IPSO-SVM for Intelligent Mechanical Fault Diagnosis. Sensors 2022, 22, 3647. [Google Scholar] [CrossRef] [PubMed]
  33. Liu, F.; Zhang, G.; Lu, J. Multisource heterogeneous unsupervised domain adaptation via fuzzy relation neural networks. IEEE Trans. Fuzzy Syst. 2020, 29, 3308–3322. [Google Scholar] [CrossRef]
  34. Zhang, X.; Lu, J.; Peng, Y. Hybrid MCDM model for location of logistics hub: A case in China under the belt and road initiative. IEEE Access 2021, 9, 41227–41245. [Google Scholar] [CrossRef]
  35. Liu, S.; Zhang, J.; Niu, B.; Liu, L.; He, X. A novel hybrid multi-criteria group decision-making approach with intuitionistic fuzzy sets to design reverse supply chains for COVID-19 medical waste recycling channels. Comput. Ind. Eng. 2022, 169, 108228. [Google Scholar] [CrossRef]
  36. Ban, Y.; Liu, M.; Wu, P.; Yang, B.; Liu, S.; Yin, L.; Zheng, W. Depth Estimation Method for Monocular Camera Defocus Images in Microscopic Scenes. Electronics 2022, 11, 2012. [Google Scholar] [CrossRef]
  37. Wu, X.; Zheng, W.; Chen, X.; Zhao, Y.; Yu, T.; Mu, D. Improving high-impact bug report prediction with combination of interactive machine learning and active learning. Inf. Softw. Technol. 2021, 133, 106530. [Google Scholar] [CrossRef]
  38. Wu, X.; Zheng, W.; Xia, X.; Lo, D. Data quality matters: A case study on data label correctness for security bug report prediction. IEEE Trans. Softw. Eng. 2021, 48, 2541–2556. [Google Scholar] [CrossRef]
  39. Cao, B.; Zhao, J.; Lv, Z.; Yang, P. Diversified personalized recommendation optimization based on mobile data. IEEE Trans. Intell. Transp. Syst. 2020, 22, 2133–2139. [Google Scholar] [CrossRef]
  40. Yu, J.; Lu, L.; Chen, Y.; Zhu, Y.; Kong, L. An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing. IEEE Trans. Mob. Comput. 2019, 20, 337–351. [Google Scholar] [CrossRef]
  41. Qureshi, M.N.; Kumar, P.; Kumar, D. Framework for benchmarking logistics performance using fuzzy AHP. Int. J. Bus. Perform. Supply Chain. Model. 2009, 1, 82–98. [Google Scholar] [CrossRef]
  42. Wudhikarn, R.; Chakpitak, N.; Neubert, G. Improving the strategic benchmarking of intellectual capital management in logistics service providers. Sustainability 2020, 12, 10174. [Google Scholar] [CrossRef]
  43. Riaz, N.; Qaisar, S.; Ali, M.; Naeem, M. Node selection and utility maximization for mobile edge computing–driven IoT. Trans. Emerg. Telecommun. Technol. 2022, 33, e3704. [Google Scholar] [CrossRef]
  44. Redhu, S.; Anupam, M.; Hegde, R.M. Optimal relay node selection for robust data forwarding over time-varying IoT networks. IEEE Trans. Veh. Technol. 2019, 68, 9178–9190. [Google Scholar] [CrossRef]
  45. Cuka, M.; Elmazi, D.; Ikeda, M.; Matsuo, K.; Barolli, L.; Takizawa, M. Application of fuzzy logic for IoT node elimination and selection in opportunistic networks: Performance evaluation of two fuzzy-based systems. World Wide Web 2021, 24, 929–940. [Google Scholar] [CrossRef]
  46. Lu, M.; Wudhikarn, R. Using the best-worst method to develop intellectual capital indicators in financial service company. In Proceedings of the 2020 Joint International Conference on Digital Arts, Media and Technology with ECTI Northern Section Conference on Electrical, Electronics, Computer and Telecommunications Engineering (ECTI DAMT & NCON), Chiang Rai, Thailand, 26–28 January 2022; IEEE: New York, NY, USA, 2022. [Google Scholar]
  47. Redhu, S.; Hegde, R.M. Optimal relay node selection in time-varying IoT networks using apriori contact pattern information. Ad Hoc Netw. 2020, 98, 102065. [Google Scholar] [CrossRef]
  48. Lai, Y.-J.; Liu, T.-Y.; Hwang, C.-L. Topsis for MODM. Eur. J. Oper. Res. 1994, 76, 486–500. [Google Scholar] [CrossRef]
  49. Bhattacharya, R.; Raut, R.D.; Gardas, B.B.; Kamble, S.S. Sustainable partner selection: An integrated AHP-TOPSIS approach. Int. J. Oper. Res. 2020, 39, 205–236. [Google Scholar] [CrossRef]
  50. Kumar, S.; Barman, A.G. Fuzzy TOPSIS and fuzzy VIKOR in selecting green suppliers for sponge iron and steel manufacturing. Soft Comput. 2021, 25, 6505–6525. [Google Scholar] [CrossRef]
  51. Zheng, W.; Shen, T.; Chen, X.; Deng, P. Interpretability application of the Just-in-Time software defect prediction model. J. Syst. Softw. 2022, 188, 111245. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.