Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (21)

Search Parameters:
Keywords = gossip networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 1564 KiB  
Article
RACER: A Lightweight Distributed Consensus Algorithm for the IoT with Peer-Assisted Latency-Aware Traffic Optimisation
by Zachary Auhl, Harsha Moraliyage, Naveen Chilamkurti and Damminda Alahakoon
Technologies 2025, 13(4), 151; https://doi.org/10.3390/technologies13040151 - 9 Apr 2025
Viewed by 664
Abstract
Internet-of-Things (IoT) devices are interconnected objects embedded with sensors and software, enabling data collection and exchange. These devices encompass a wide range of applications, from household appliances to industrial systems, designed to enhance connectivity and automation. In distributed IoT networks, achieving reliable decision-making [...] Read more.
Internet-of-Things (IoT) devices are interconnected objects embedded with sensors and software, enabling data collection and exchange. These devices encompass a wide range of applications, from household appliances to industrial systems, designed to enhance connectivity and automation. In distributed IoT networks, achieving reliable decision-making necessitates robust consensus mechanisms that allow devices to agree on a shared state of truth without reliance on central authorities. Such mechanisms are critical for ensuring system resilience under diverse operational conditions. Recent research has identified three common limitations in existing consensus mechanisms for IoT environments: dependence on synchronised networks and clocks, reliance on centralised coordinators, and suboptimal performance. To address these challenges, this paper introduces a novel consensus mechanism called Randomised Asynchronous Consensus with Efficient Real-time Sampling (RACER). The RACER framework eliminates the need for synchronised networks and clocks by implementing the Sequenced Probabilistic Double Echo (SPDE) algorithm, which operates asynchronously without timing assumptions. Furthermore, to mitigate the reliance on centralised coordinators, RACER leverages the SPDE gossip protocol, which inherently requires no leaders, combined with a lightweight transaction ordering mechanism optimised for IoT sensor networks. Rather than using a blockchain for transaction ordering, we opted for an eventually consistent transaction ordering mechanism to specifically deal with high churn, asynchronous networks and to allow devices to independently and deterministically order transactions. To enhance the throughput of IoT networks, this paper also proposes a complementary algorithm, Peer-assisted Latency-Aware Traffic Optimisation (PLATO), designed to maximise efficiency within RACER-based systems. The combination of RACER and PLATO is able to maintain a throughput of above 600 mb/s on a 100-node network, significantly outperforming the compared consensus mechanisms in terms of network node size and performance. Full article
(This article belongs to the Special Issue IoT-Enabling Technologies and Applications)
Show Figures

Figure 1

25 pages, 7838 KiB  
Article
Distributed Consensus Gossip-Based Data Fusion for Suppressing Incorrect Sensor Readings in Wireless Sensor Networks
by Martin Kenyeres, Jozef Kenyeres and Sepideh Hassankhani Dolatabadi
J. Low Power Electron. Appl. 2025, 15(1), 6; https://doi.org/10.3390/jlpea15010006 - 26 Jan 2025
Cited by 5 | Viewed by 1710
Abstract
Incorrect sensor readings can cause serious problems in Wireless Sensor Networks (WSNs), potentially disrupting the operation of the entire system. As shown in the literature, they can arise from various reasons; therefore, addressing this issue has been a significant challenge for the scientific [...] Read more.
Incorrect sensor readings can cause serious problems in Wireless Sensor Networks (WSNs), potentially disrupting the operation of the entire system. As shown in the literature, they can arise from various reasons; therefore, addressing this issue has been a significant challenge for the scientific community over the past few decades. In this paper, we examine the applicability of seven distributed consensus gossip-based algorithms for sensor fusion (namely, the Randomized Gossip algorithm, the Geographic Gossip algorithm, three initial configurations of the Broadcast Gossip algorithm, the Push-Sum protocol, and the Push-Pull protocol) to compensate for incorrect data in WSNs. More specifically, we consider a scenario where the sensor-measured data (measured by a set of independent sensor nodes) are skewed due to Gaussian noise with a various standard deviation σ, resulting in discrepancies between the measured values and the true value of observed physical quantities. Subsequently, the aforementioned algorithms are employed to mitigate this skewness in order to improve the accuracy of the measured data. In this paper, WSNs are modeled as random geometric graphs with various connectivity, and the performance of the algorithms is evaluated using two metrics (specifically, the mean square error (MSE) and the number of sent messages required for an algorithm to be completed). Based on the presented results, it is identified that all the examined algorithms can significantly suppress incorrect sensor readings (MSE without sensor fusion = −0.42 dB if σ = 1, and MSE without sensor fusion = 14.05 dB if σ = 5), and the best performance is achieved by PS in dense graphs and by GG in sparse graphs (both algorithms achieve the maximum precision MSE = −24.87 dB if σ = 1 and MSE = −21.02 dB if σ = 5). Additionally, the performance of the analyzed distributed consensus gossip algorithms is compared to the best deterministic consensus algorithm applied for the same purpose. Full article
Show Figures

Figure 1

22 pages, 635 KiB  
Article
DC-SoC: Optimizing a Blockchain Data Dissemination Model Based on Density Clustering and Social Mechanisms
by Xinhua Dong, Xiaohong Dang, Zhigang Xu, Kangze Ye, Hongmu Han and Enda Zheng
Appl. Sci. 2024, 14(21), 10058; https://doi.org/10.3390/app142110058 - 4 Nov 2024
Viewed by 1278
Abstract
Due to its partially decentralized and highly scalable features, the consortium blockchain has currently overtaken other blockchain technologies as the one most frequently used and studied across various industries. However, performance issues such as low transaction efficiency and redundant communication processes continue to [...] Read more.
Due to its partially decentralized and highly scalable features, the consortium blockchain has currently overtaken other blockchain technologies as the one most frequently used and studied across various industries. However, performance issues such as low transaction efficiency and redundant communication processes continue to hinder the development of consortium blockchains. In the Hyperledger Fabric consortium blockchain system, transaction efficiency is largely influenced by the consensus protocol and broadcast protocol. This paper introduces a novel consortium blockchain network model, DC-SoC, focused on optimizing broadcast protocols. By incorporating the concept of density clustering, a stable propagation structure is established for the blockchain network, thus optimizing data dissemination in the Gossip protocol. Additionally, the concept of social networks is integrated, using trustworthiness scores and economic incentives to evaluate node security. The experimental results demonstrate that when DC-SoC is applied in a large-scale consortium blockchain environment, it significantly improves communication performance between nodes and ensures transmission reliability. Full article
Show Figures

Figure 1

19 pages, 317 KiB  
Article
Decentralized Machine Learning Framework for the Internet of Things: Enhancing Security, Privacy, and Efficiency in Cloud-Integrated Environments
by José Gelson Gonçalves, Muhammad Shoaib Ayub, Ainur Zhumadillayeva, Kanagat Dyussekeyev, Sunggat Ayimbay, Muhammad Saadi, Renata Lopes Rosa and Demóstenes Zegarra Rodríguez
Electronics 2024, 13(21), 4185; https://doi.org/10.3390/electronics13214185 - 25 Oct 2024
Cited by 1 | Viewed by 1954
Abstract
The Internet of things (IoT) presents unique challenges for the deployment of machine learning (ML) models, particularly due to constraints on computational resources, the necessity for decentralized processing, and concerns regarding security and privacy in interconnected environments such as the Internet of cloud. [...] Read more.
The Internet of things (IoT) presents unique challenges for the deployment of machine learning (ML) models, particularly due to constraints on computational resources, the necessity for decentralized processing, and concerns regarding security and privacy in interconnected environments such as the Internet of cloud. In this paper, a novel decentralized ML framework is proposed for IoT environments characterized by wireless communication, dynamic data streams, and integration with cloud services. The framework integrates incremental learning algorithms with a robust decentralized model exchange protocol, ensuring that data privacy is preserved, while enabling IoT devices to participate in collaborative learning from distributed data across cloud networks. By incorporating a gossip-based communication protocol, the framework ensures energy-efficient, scalable, and secure model exchange, fostering effective knowledge sharing among devices, while addressing the potential security threats inherent in cloud-based IoT ecosystems. The framework’s performance was evaluated through simulations, demonstrating its ability to handle the complexities of real-time data processing in resource-constrained IoT environments, while also mitigating security and privacy risks within the Internet of cloud. Full article
Show Figures

Figure 1

22 pages, 461 KiB  
Article
The Power of Context: A Novel Hybrid Context-Aware Fake News Detection Approach
by Jawaher Alghamdi, Yuqing Lin and Suhuai Luo
Information 2024, 15(3), 122; https://doi.org/10.3390/info15030122 - 21 Feb 2024
Cited by 6 | Viewed by 3316
Abstract
The detection of fake news has emerged as a crucial area of research due to its potential impact on society. In this study, we propose a robust methodology for identifying fake news by leveraging diverse aspects of language representation and incorporating auxiliary information. [...] Read more.
The detection of fake news has emerged as a crucial area of research due to its potential impact on society. In this study, we propose a robust methodology for identifying fake news by leveraging diverse aspects of language representation and incorporating auxiliary information. Our approach is based on the utilisation of Bidirectional Encoder Representations from Transformers (BERT) to capture contextualised semantic knowledge. Additionally, we employ a multichannel Convolutional Neural Network (mCNN) integrated with stacked Bidirectional Gated Recurrent Units (sBiGRU) to jointly learn multi-aspect language representations. This enables our model to effectively identify valuable clues from news content while simultaneously incorporating content- and context-based cues, such as user posting behaviour, to enhance the detection of fake news. Through extensive experimentation on four widely used real-world datasets, our proposed framework demonstrates superior performance (↑3.59% (PolitiFact), ↑6.8% (GossipCop), ↑2.96% (FA-KES), and ↑12.51% (LIAR), considering both content-based features and additional auxiliary information) compared to existing state-of-the-art approaches, establishing its effectiveness in the challenging task of fake news detection. Full article
(This article belongs to the Special Issue Information Extraction and Language Discourse Processing)
Show Figures

Figure 1

22 pages, 1071 KiB  
Article
The Role of Gossiping in Information Dissemination over a Network of Agents
by Melih Bastopcu, Seyed Rasoul Etesami and Tamer Başar
Entropy 2024, 26(1), 9; https://doi.org/10.3390/e26010009 - 21 Dec 2023
Cited by 6 | Viewed by 2040
Abstract
We consider information dissemination over a network of gossiping agents. In this model, a source keeps the most up-to-date information about a time-varying binary state of the world, and n receiver nodes want to follow the information at the source as accurately as [...] Read more.
We consider information dissemination over a network of gossiping agents. In this model, a source keeps the most up-to-date information about a time-varying binary state of the world, and n receiver nodes want to follow the information at the source as accurately as possible. When the information at the source changes, the source first sends updates to a subset of mn nodes. Then, the nodes share their local information during the gossiping period, to disseminate the information further. The nodes then estimate the information at the source, using the majority rule at the end of the gossiping period. To analyze the information dissemination, we introduce a new error metric to find the average percentage of nodes that can accurately obtain the most up-to-date information at the source. We characterize the equations necessary to obtain the steady-state distribution for the average error and then analyze the system behavior under both high and low gossip rates. We develop an adaptive policy that the source can use to determine its current transmission capacity m based on its past transmission rates and the accuracy of the information at the nodes. Finally, we implement a clustered gossiping network model, to further improve the information dissemination. Full article
Show Figures

Figure 1

17 pages, 5324 KiB  
Article
Design Considerations and Performance Evaluation of Gossip Routing in LoRa-Based Linear Networks
by Rao Muzamal Liaqat, Philip Branch and Jason But
Future Internet 2023, 15(11), 366; https://doi.org/10.3390/fi15110366 - 11 Nov 2023
Cited by 2 | Viewed by 2253
Abstract
Linear networks (sometimes called chain-type networks) occur frequently in Internet of Things (IoT) applications, where sensors or actuators are deployed along pipelines, roads, railways, mines, and international borders. LoRa, short for Long Range, is an increasingly important technology for the IoT with great [...] Read more.
Linear networks (sometimes called chain-type networks) occur frequently in Internet of Things (IoT) applications, where sensors or actuators are deployed along pipelines, roads, railways, mines, and international borders. LoRa, short for Long Range, is an increasingly important technology for the IoT with great potential for linear networking. Despite its potential, limited research has explored LoRa’s implementation in such networks. In this paper, we addressed two important issues related to LoRa linear networks. The first is contention, when multiple nodes attempt to access a shared channel. Although originally designed to deal with interference, LoRa’s technique of synchronisation with a transmission node permits a novel approach to contention, which we explored. The second issue revolves around routing, where linear networks permit simpler strategies, in contrast to the common routing complexities of mesh networks. We present gossip routing as a very lightweight approach to routing. All our evaluations were carried out using real equipment by developing real networks. We constructed networks of up to three hops in length and up to three nodes in width. We carried out experiments looking at contention and routing. We demonstrate using the novel approach that we could achieve up to 98% throughput. We compared its performance considering collocated scenarios that achieved 84% and 89% throughputby using relay widths of two and three at each hop, respectively. Lastly, we demonstrate the effectiveness of gossip routing by using various transmission probabilities. We noticed high performance up to 98% throughputat Tprob = 0.90 and Tprob = 0.80 by employing two and three active relay nodes, respectively. The experimental result showed that, at Tprob = 0.40, it achieved an average performance of 62.8% and 73.77% by using two and three active relay nodes, respectively. We concluded that LoRa is an excellent technology for Internet of Things applications where sensors and actuators are deployed in an approximately linear fashion. Full article
(This article belongs to the Special Issue Wireless Sensor Networks in the IoT)
Show Figures

Figure 1

22 pages, 2092 KiB  
Article
A Robust Sharding-Enabled Blockchain with Efficient Hashgraph Mechanism for MANETs
by Ruilin Lai, Gansen Zhao, Yale He and Zhihao Hou
Appl. Sci. 2023, 13(15), 8726; https://doi.org/10.3390/app13158726 - 28 Jul 2023
Cited by 3 | Viewed by 2070
Abstract
Blockchain establishes security and trust in mobile ad hoc networks (MANETs). Due to the decentralized and opportunistic communication characteristics of MANETs, hashgraph consensus is more applicable to the MANET-based blockchain. Sharding scales the consensus further through disjoint nodes in multiple shards simultaneously updating [...] Read more.
Blockchain establishes security and trust in mobile ad hoc networks (MANETs). Due to the decentralized and opportunistic communication characteristics of MANETs, hashgraph consensus is more applicable to the MANET-based blockchain. Sharding scales the consensus further through disjoint nodes in multiple shards simultaneously updating ledgers. However, the dynamic addition and deletion of nodes in a shard pose challenges regarding robustness and efficiency. Particularly, the shard is vulnerable to Sybil attacks and targeted attacks, and dishonest gossip reduces the efficiency of hashgraph consensus. Therefore, we proposed a behavior-based sharding hashgraph scheme. First, dishonest behaviors of nodes are recorded in a decentralized blacklist. Gossip information is sent to a reliable neighbor, and gossip information from another reliable neighbor is received. Second, a tree-assisted inter-sharding consensus is proposed to prevent Sybil attacks. The combination of shard recovery and reconfiguration based on node state is devised to prevent targeted attacks. Finally, we conducted the performance evaluation including security analysis and experimental evaluation to reveal the security and efficiency of the proposed scheme. Full article
Show Figures

Figure 1

32 pages, 717 KiB  
Article
Distribution of the Age of Gossip in Networks
by Mohamed A. Abd-Elmagid and Harpreet S. Dhillon
Entropy 2023, 25(2), 364; https://doi.org/10.3390/e25020364 - 16 Feb 2023
Cited by 19 | Viewed by 2391
Abstract
We study a general setting of gossip networks in which a source node forwards its measurements (in the form of status updates) about some observed physical process to a set of monitoring nodes according to independent Poisson processes. Furthermore, each monitoring node sends [...] Read more.
We study a general setting of gossip networks in which a source node forwards its measurements (in the form of status updates) about some observed physical process to a set of monitoring nodes according to independent Poisson processes. Furthermore, each monitoring node sends status updates about its information status (about the process observed by the source) to the other monitoring nodes according to independent Poisson processes. We quantify the freshness of the information available at each monitoring node in terms of Age of Information (AoI). While this setting has been analyzed in a handful of prior works, the focus has been on characterizing the average (i.e., marginal first moment) of each age process. In contrast, we aim to develop methods that allow the characterization of higher-order marginal or joint moments of the age processes in this setting. In particular, we first use the stochastic hybrid system (SHS) framework to develop methods that allow the characterization of the stationary marginal and joint moment generating functions (MGFs) of age processes in the network. These methods are then applied to derive the stationary marginal and joint MGFs in three different topologies of gossip networks, with which we derive closed-form expressions for marginal or joint high-order statistics of age processes, such as the variance of each age process and the correlation coefficients between all possible pairwise combinations of age processes. Our analytical results demonstrate the importance of incorporating the higher-order moments of age processes in the implementation and optimization of age-aware gossip networks rather than just relying on their average values. Full article
(This article belongs to the Special Issue Age of Information: Concept, Metric and Tool for Network Control)
Show Figures

Figure 1

12 pages, 318 KiB  
Article
Kurdish Refugee Beliefs about Mental Health and Help-Seeking: A Community-Engaged Research Study in Tennessee
by Leah S. Branam, Ismail Yigit, Sipal Haji, Jennifer Clark and Jessica M. Perkins
Int. J. Environ. Res. Public Health 2023, 20(2), 1224; https://doi.org/10.3390/ijerph20021224 - 10 Jan 2023
Cited by 4 | Viewed by 4415
Abstract
Refugee populations exhibit high rates of PTSD, anxiety, depression, and psychological distress, but are less likely to receive care than the general population. Perceptions among the Kurdish refugee community about causes and consequences of mental illness symptoms and perceived barriers to help-seeking are [...] Read more.
Refugee populations exhibit high rates of PTSD, anxiety, depression, and psychological distress, but are less likely to receive care than the general population. Perceptions among the Kurdish refugee community about causes and consequences of mental illness symptoms and perceived barriers to help-seeking are understudied. This community-engaged research study conducted in-depth interviews with Kurdish refugees from Iraq to explore their beliefs about drivers of mental illness and seeking help for mental health. Iterative thematic analysis of transcripts from ten participants indicated four key themes: (1) social network loss due to resettlement causes poor mental health; (2) socioeconomic status loss due to unrecognized professional qualifications puts strain on mental health; (3) social stigma about mental health and fears about disclosure of mental health issues within community and subsequent negative gossip prevent help-seeking; and (4) social interaction may alleviate mental illness symptoms. Overall, Kurdish refugees perceived social factors as major drivers of mental illness symptoms and barriers to help-seeking in their community. However, while participants believed that the general community attitude was against help-seeking, most participants personally expressed support of anyone in their community needing to see a mental health professional. Future research should assess the extent to which perceived community norms differ from aggregated personal help-seeking attitudes and behaviors among Kurdish refugees from Iraq in the United States. Full article
(This article belongs to the Special Issue Health and Well-Being in Vulnerable Communities)
28 pages, 441 KiB  
Article
A Comparative Study of Machine Learning and Deep Learning Techniques for Fake News Detection
by Jawaher Alghamdi, Yuqing Lin and Suhuai Luo
Information 2022, 13(12), 576; https://doi.org/10.3390/info13120576 - 12 Dec 2022
Cited by 56 | Viewed by 11772
Abstract
Efforts have been dedicated by researchers in the field of natural language processing (NLP) to detecting and combating fake news using an assortment of machine learning (ML) and deep learning (DL) techniques. In this paper, a review of the existing studies is conducted [...] Read more.
Efforts have been dedicated by researchers in the field of natural language processing (NLP) to detecting and combating fake news using an assortment of machine learning (ML) and deep learning (DL) techniques. In this paper, a review of the existing studies is conducted to understand and curtail the dissemination of fake news. Specifically, we conducted a benchmark study using a wide range of (1) classical ML algorithms such as logistic regression (LR), support vector machines (SVM), decision tree (DT), naive Bayes (NB), random forest (RF), XGBoost (XGB) and an ensemble learning method of such algorithms, (2) advanced ML algorithms such as convolutional neural networks (CNNs), bidirectional long short-term memory (BiLSTM), bidirectional gated recurrent units (BiGRU), CNN-BiLSTM, CNN-BiGRU and a hybrid approach of such techniques and (3) DL transformer-based models such as BERTbase and RoBERTabase. The experiments are carried out using different pretrained word embedding methods across four well-known real-world fake news datasets—LIAR, PolitiFact, GossipCop and COVID-19—to examine the performance of different techniques across various datasets. Furthermore, a comparison is made between context-independent embedding methods (e.g., GloVe) and the effectiveness of BERTbase—contextualised representations in detecting fake news. Compared with the state of the art’s results across the used datasets, we achieve better results by solely relying on news text. We hope this study can provide useful insights for researchers working on fake news detection. Full article
(This article belongs to the Special Issue Advanced Natural Language Processing and Machine Translation)
Show Figures

Figure 1

22 pages, 848 KiB  
Review
A Survey on Network Optimization Techniques for Blockchain Systems
by Robert Antwi, James Dzisi Gadze, Eric Tutu Tchao, Axel Sikora, Henry Nunoo-Mensah, Andrew Selasi Agbemenu, Kwame Opunie-Boachie Obour Agyekum, Justice Owusu Agyemang, Dominik Welte and Eliel Keelson
Algorithms 2022, 15(6), 193; https://doi.org/10.3390/a15060193 - 4 Jun 2022
Cited by 23 | Viewed by 7783
Abstract
The increase of the Internet of Things (IoT) calls for secure solutions for industrial applications. The security of IoT can be potentially improved by blockchain. However, blockchain technology suffers scalability issues which hinders integration with IoT. Solutions to blockchain’s scalability issues, such as [...] Read more.
The increase of the Internet of Things (IoT) calls for secure solutions for industrial applications. The security of IoT can be potentially improved by blockchain. However, blockchain technology suffers scalability issues which hinders integration with IoT. Solutions to blockchain’s scalability issues, such as minimizing the computational complexity of consensus algorithms or blockchain storage requirements, have received attention. However, to realize the full potential of blockchain in IoT, the inefficiencies of its inter-peer communication must also be addressed. For example, blockchain uses a flooding technique to share blocks, resulting in duplicates and inefficient bandwidth usage. Moreover, blockchain peers use a random neighbor selection (RNS) technique to decide on other peers with whom to exchange blockchain data. As a result, the peer-to-peer (P2P) topology formation limits the effective achievable throughput. This paper provides a survey on the state-of-the-art network structures and communication mechanisms used in blockchain and establishes the need for network-based optimization. Additionally, it discusses the blockchain architecture and its layers categorizes existing literature into the layers and provides a survey on the state-of-the-art optimization frameworks, analyzing their effectiveness and ability to scale. Finally, this paper presents recommendations for future work. Full article
(This article belongs to the Special Issue Advances in Blockchain Architecture and Consensus)
Show Figures

Figure 1

20 pages, 14422 KiB  
Article
A Novel Blockchain-Based Healthcare System Design and Performance Benchmarking on a Multi-Hosted Testbed
by Nihar Ranjan Pradhan, Akhilendra Pratap Singh, Sahil Verma, Kavita, Navneet Kaur, Diptendu Sinha Roy, Jana Shafi, Marcin Wozniak and Muhammad Fazal Ijaz
Sensors 2022, 22(9), 3449; https://doi.org/10.3390/s22093449 - 30 Apr 2022
Cited by 38 | Viewed by 4569
Abstract
As a result of the proliferation of digital and network technologies in all facets of modern society, including the healthcare systems, the widespread adoption of Electronic Healthcare Records (EHRs) has become the norm. At the same time, Blockchain has been widely accepted as [...] Read more.
As a result of the proliferation of digital and network technologies in all facets of modern society, including the healthcare systems, the widespread adoption of Electronic Healthcare Records (EHRs) has become the norm. At the same time, Blockchain has been widely accepted as a potent solution for addressing security issues in any untrusted, distributed, decentralized application and has thus seen a slew of works on Blockchain-enabled EHRs. However, most such prototypes ignore the performance aspects of proposed designs. In this paper, a prototype for a Blockchain-based EHR has been presented that employs smart contracts with Hyperledger Fabric 2.0, which also provides a unified performance analysis with Hyperledger Caliper 0.4.2. The additional contribution of this paper lies in the use of a multi-hosted testbed for the performance analysis in addition to far more realistic Gossip-based traffic scenario analysis with Tcpdump tools. Moreover, the prototype is tested for performance with superior transaction ordering schemes such as Kafka and RAFT, unlike other literature that mostly uses SOLO for the purpose, which accounts for superior fault tolerance. All of these additional unique features make the performance evaluation presented herein much more realistic and hence adds hugely to the credibility of the results obtained. The proposed framework within the multi-host instances continues to behave more successfully with high throughput, low latency, and low utilization of resources for opening, querying, and transferring transactions into a healthcare Blockchain network. The results obtained in various rounds of evaluation demonstrate the superiority of the proposed framework. Full article
(This article belongs to the Topic Computational Intelligence for Virus and Bacteria Detection in Multi Surface Environments)
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

24 pages, 3778 KiB  
Article
Evaluation of the Leak Detection Performance of Distributed Kalman Filter Algorithms in WSN-Based Water Pipeline Monitoring of Plastic Pipes
by Valery Nkemeni, Fabien Mieyeville and Pierre Tsafack
Computation 2022, 10(4), 55; https://doi.org/10.3390/computation10040055 - 30 Mar 2022
Cited by 2 | Viewed by 2977
Abstract
Water is a basic necessity and one of the most valuable resources for human living. Sadly, large quantities of treated water get lost daily worldwide, especially in developing countries, through leaks in the water distribution network. Wireless sensor network-based water pipeline monitoring (WWPM) [...] Read more.
Water is a basic necessity and one of the most valuable resources for human living. Sadly, large quantities of treated water get lost daily worldwide, especially in developing countries, through leaks in the water distribution network. Wireless sensor network-based water pipeline monitoring (WWPM) systems using low-cost micro-electro-mechanical systems (MEMS) accelerometers have become popular for real-time leak detection due to their low-cost and low power consumption, but they are plagued with high false alarm rates. Recently, the distributed Kalman filter (DKF) has been shown to improve the leak detection reliability of WWPM systems using low-cost MEMS accelerometers. However, the question of which DKF is optimal in terms of leak detection reliability and energy consumption is still unanswered. This study evaluates and compares the leak detection reliability of three DKF algorithms, selected from distributed data fusion strategies based on diffusion, gossip and consensus. In this study, we used a combined approach involving simulations and laboratory experiments. The performance metrics used for the comparison include sensitivity, specificity and accuracy. The laboratory results revealed that the event-triggered diffusion-based DKF is optimal, having a sensitivity value of 61%, a specificity value of 93%, and an accuracy of 90%. It also has a lower communication burden and is less affected by packet loss, making it more responsive to real-time leak detection. Full article
Show Figures

Figure 1

22 pages, 1980 KiB  
Article
Comparative Study of Distributed Consensus Gossip Algorithms for Network Size Estimation in Multi-Agent Systems
by Martin Kenyeres and Jozef Kenyeres
Future Internet 2021, 13(5), 134; https://doi.org/10.3390/fi13050134 - 18 May 2021
Cited by 18 | Viewed by 4525
Abstract
Determining the network size is a critical process in numerous areas (e.g., computer science, logistic, epidemiology, social networking services, mathematical modeling, demography, etc.). However, many modern real-world systems are so extensive that measuring their size poses a serious challenge. Therefore, the algorithms for [...] Read more.
Determining the network size is a critical process in numerous areas (e.g., computer science, logistic, epidemiology, social networking services, mathematical modeling, demography, etc.). However, many modern real-world systems are so extensive that measuring their size poses a serious challenge. Therefore, the algorithms for determining/estimating this parameter in an effective manner have been gaining popularity over the past decades. In the paper, we analyze five frequently applied distributed consensus gossip-based algorithms for network size estimation in multi-agent systems (namely, the Randomized gossip algorithm, the Geographic gossip algorithm, the Broadcast gossip algorithm, the Push-Sum protocol, and the Push-Pull protocol). We examine the performance of the mentioned algorithms with bounded execution over random geometric graphs by applying two metrics: the number of sent messages required for consensus achievement and the estimation precision quantified as the median deviation from the real value of the network size. The experimental part consists of two scenarios—the consensus achievement is conditioned by either the values of the inner states or the network size estimates—and, in both scenarios, either the best-connected or the worst-connected agent is chosen as the leader. The goal of this paper is to identify whether all the examined algorithms are applicable to estimating the network size, which algorithm provides the best performance, how the leader selection can affect the performance of the algorithms, and how to most effectively configure the applied stopping criterion. Full article
(This article belongs to the Special Issue Modern Trends in Multi-Agent Systems)
Show Figures

Graphical abstract

Back to TopTop