Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (15)

Search Parameters:
Keywords = trustable computing

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 6684 KB  
Article
Modeling the Spreading of Fake News Through the Interactions Between Human Heuristics and Recommender Systems
by Franco Bagnoli, Tijan Juraj Cvetković, Andrea Guazzini, Pietro Lió and Riccardo Romei
Information 2026, 17(4), 314; https://doi.org/10.3390/info17040314 - 24 Mar 2026
Viewed by 197
Abstract
In many cases, the pieces of information at our disposal (messages) come from a recommender source, which can be either an official news system, a large language model or simply a social network. Often, also, these messages are build so as to promote [...] Read more.
In many cases, the pieces of information at our disposal (messages) come from a recommender source, which can be either an official news system, a large language model or simply a social network. Often, also, these messages are build so as to promote their active spreading, which, on the other hand, has a positive effect on one’s own popularity. However, the content of the message can be false, giving origin to a phenomenon analogous to the spreading of a disease. In principle, there is always the possibility of checking the correctness of the message by “investing” some time, so we can say that this checking has a cost. We develop a simple model based on the mechanism of “risk perception” (propensity to check the falseness of a message) and mutual trustability (affinity), based on the average number of fake messages received and checked. On the other side, the probability of emitting a fake message is inversely proportional to one’s risk perception and the affinity among agents is also exploited by the recommender system. We aim at investigating this process with the goal of deriving methods for identifying the penetration level of fake news from behavioral patterns of users. This model represents an integration of cognitive psychology with computational agent-based modeling. Full article
Show Figures

Graphical abstract

18 pages, 488 KB  
Article
Shuffle Model of Differential Privacy: Numerical Composition for Federated Learning
by Shaowei Wang, Sufen Zeng, Jin Li, Shaozheng Huang and Yuyang Chen
Appl. Sci. 2025, 15(3), 1595; https://doi.org/10.3390/app15031595 - 5 Feb 2025
Cited by 1 | Viewed by 3263
Abstract
In decentralized scenarios without fully trustable parties (e.g., in mobile edge computing or IoT environments), the shuffle model has recently emerged as a promising paradigm for differentially private federated learning. Despite many efforts of privacy accounting for federated learning with many sequential rounds [...] Read more.
In decentralized scenarios without fully trustable parties (e.g., in mobile edge computing or IoT environments), the shuffle model has recently emerged as a promising paradigm for differentially private federated learning. Despite many efforts of privacy accounting for federated learning with many sequential rounds in the shuffle model, they suffer from generality and tightness. For example, existing accounting methods are targeted to single-message shuffle protocols (which have intrinsic utility barriers compared to multi-message ones), and are untight for the commonly used vector randomized response randomizer. As countermeasures, we first present a tight total variation characterization of vector randomized response randomizers in the shuffle model, which demonstrates over 20% budget conservation. We then unify the representation of single-message and multi-message shuffle protocols and derive their privacy loss distribution (PLD). The PLDs are finally composed by Fourier analysis to obtain the overall privacy loss of many sequential rounds in the shuffle model. Through simulations in federated decision tree building and federated deep learning, we show that our approach saves up to 80% budget when compared to existing methods. Full article
(This article belongs to the Special Issue Information Security Technology for the Internet of Things)
Show Figures

Figure 1

21 pages, 565 KB  
Article
Secure Computing for Fog-Enabled Industrial IoT
by Ahmad Naseem Alvi, Bakhtiar Ali, Mohamed Saad Saleh, Mohammed Alkhathami, Deafallah Alsadie and Bushra Alghamdi
Sensors 2024, 24(7), 2098; https://doi.org/10.3390/s24072098 - 25 Mar 2024
Cited by 9 | Viewed by 2380
Abstract
Smart cities are powered by several new technologies to enhance connectivity between devices and develop a network of connected objects which can lead to many smart industrial applications. This network known as the Industrial Internet of Things (IIoT) consists of sensor nodes that [...] Read more.
Smart cities are powered by several new technologies to enhance connectivity between devices and develop a network of connected objects which can lead to many smart industrial applications. This network known as the Industrial Internet of Things (IIoT) consists of sensor nodes that have limited computing capacity and are sometimes not able to execute intricate industrial tasks within their stipulated time frame. For faster execution, these tasks are offloaded to nearby fog nodes. Internet access and the diverse nature of network types make IIoT nodes vulnerable and are under serious malicious attacks. Malicious attacks can cause anomalies in the IIoT network by overloading complex tasks, which can compromise the fog processing capabilities. This results in an increased delay of task computation for trustworthy nodes. To improve the task execution capability of the fog computing node, it is important to avoid complex offloaded tasks due to malicious attacks. However, even after avoiding the malicious tasks, if the offloaded tasks are too complex for the fog node to execute, then the fog nodes may struggle to process all legitimate tasks within their stipulated time frame. To address these challenges, the Trust-based Efficient Execution of Offloaded IIoT Trusted tasks (EEOIT) is proposed for fog nodes. EEOIT proposes a mechanism to detect malicious nodes as well as manage the allocation of computing resources so that IIoT tasks can be completed in the specified time frame. Simulation results demonstrate that EEOIT outperforms other techniques in the literature in an IIoT setting with different task densities. Another significant feature of the proposed EEOIT technique is that it enhances the computation of trustable tasks in the network. The results show that EEOIT entertains more legitimate nodes in executing their offloaded tasks with more executed data, with reduced time and with increased mean trust values as compared to other schemes. Full article
(This article belongs to the Special Issue Advances in Wireless Ad-Hoc and Sensor Networks towards 6G)
Show Figures

Figure 1

30 pages, 5533 KB  
Review
Modeling of Biomass Gasification: From Thermodynamics to Process Simulations
by Vera Marcantonio, Luisa Di Paola, Marcello De Falco and Mauro Capocelli
Energies 2023, 16(20), 7042; https://doi.org/10.3390/en16207042 - 11 Oct 2023
Cited by 28 | Viewed by 8740
Abstract
Biomass gasification has obtained great interest over the last few decades as an effective and trustable technology to produce energy and fuels with net-zero carbon emissions. Moreover, using biomass waste as feedstock enables the recycling of organic wastes and contributing to circular economy [...] Read more.
Biomass gasification has obtained great interest over the last few decades as an effective and trustable technology to produce energy and fuels with net-zero carbon emissions. Moreover, using biomass waste as feedstock enables the recycling of organic wastes and contributing to circular economy goals, thus reducing the environmental impacts of waste management. Even though many studies have already been carried out, this kind of process must still be investigated and optimized, with the final aim of developing industrial plants for different applications, from hydrogen production to net-negative emission strategies. Modeling and development of process simulations became an important tool to investigate the chemical and physical behavior of plants, allowing raw optimization of the process and defining heat and material balances of plants, as well as defining optimal geometrical parameters with cost- and time-effective approaches. The present review paper focuses on the main literature models developed until now to describe the biomass gasification process, and in particular on kinetic models, thermodynamic models, and computational fluid dynamic models. The aim of this study is to point out the strengths and the weakness of those models, comparing them and indicating in which situation it is better to use one approach instead of another. Moreover, theoretical shortcut models and software simulations not explicitly addressed by prior reviews are taken into account. For researchers and designers, this review provides a detailed methodology characterization as a guide to develop innovative studies or projects. Full article
(This article belongs to the Collection Feature Papers in Bio-Energy)
Show Figures

Figure 1

18 pages, 1250 KB  
Article
Trustability for Resilient Internet of Things Services on 5G Multiple Access Edge Cloud Computing
by Suleyman Uslu, Davinder Kaur, Mimoza Durresi and Arjan Durresi
Sensors 2022, 22(24), 9905; https://doi.org/10.3390/s22249905 - 16 Dec 2022
Cited by 18 | Viewed by 2753
Abstract
Billions of Internet of Things (IoT) devices and sensors are expected to be supported by fifth-generation (5G) wireless cellular networks. This highly connected structure is predicted to attract different and unseen types of attacks on devices, sensors, and networks that require advanced mitigation [...] Read more.
Billions of Internet of Things (IoT) devices and sensors are expected to be supported by fifth-generation (5G) wireless cellular networks. This highly connected structure is predicted to attract different and unseen types of attacks on devices, sensors, and networks that require advanced mitigation strategies and the active monitoring of the system components. Therefore, a paradigm shift is needed, from traditional prevention and detection approaches toward resilience. This study proposes a trust-based defense framework to ensure resilient IoT services on 5G multi-access edge computing (MEC) systems. This defense framework is based on the trustability metric, which is an extension of the concept of reliability and measures how much a system can be trusted to keep a given level of performance under a specific successful attack vector. Furthermore, trustability is used as a trade-off with system cost to measure the net utility of the system. Systems using multiple sensors with different levels of redundancy were tested, and the framework was shown to measure the trustability of the entire system. Furthermore, different types of attacks were simulated on an edge cloud with multiple nodes, and the trustability was compared to the capabilities of dynamic node addition for the redundancy and removal of untrusted nodes. Finally, the defense framework measured the net utility of the service, comparing the two types of edge clouds with and without the node deactivation capability. Overall, the proposed defense framework based on trustability ensures a satisfactory level of resilience for IoT on 5G MEC systems, which serves as a trade-off with an accepted cost of redundant resources under various attacks. Full article
(This article belongs to the Special Issue Recent Advances in Next Generation Wireless Sensor and Mesh Networks)
Show Figures

Figure 1

18 pages, 1185 KB  
Review
Hybrid Deep Learning Techniques for Predicting Complex Phenomena: A Review on COVID-19
by Mohammad (Behdad) Jamshidi, Sobhan Roshani, Fatemeh Daneshfar, Ali Lalbakhsh, Saeed Roshani, Fariborz Parandin, Zahra Malek, Jakub Talla, Zdeněk Peroutka, Alireza Jamshidi, Farimah Hadjilooei and Pedram Lalbakhsh
AI 2022, 3(2), 416-433; https://doi.org/10.3390/ai3020025 - 6 May 2022
Cited by 23 | Viewed by 7098
Abstract
Complex phenomena have some common characteristics, such as nonlinearity, complexity, and uncertainty. In these phenomena, components typically interact with each other and a part of the system may affect other parts or vice versa. Accordingly, the human brain, the Earth’s global climate, the [...] Read more.
Complex phenomena have some common characteristics, such as nonlinearity, complexity, and uncertainty. In these phenomena, components typically interact with each other and a part of the system may affect other parts or vice versa. Accordingly, the human brain, the Earth’s global climate, the spreading of viruses, the economic organizations, and some engineering systems such as the transportation systems and power grids can be categorized into these phenomena. Since both analytical approaches and AI methods have some specific characteristics in solving complex problems, a combination of these techniques can lead to new hybrid methods with considerable performance. This is why several types of research have recently been conducted to benefit from these combinations to predict the spreading of COVID-19 and its dynamic behavior. In this review, 80 peer-reviewed articles, book chapters, conference proceedings, and preprints with a focus on employing hybrid methods for forecasting the spreading of COVID-19 published in 2020 have been aggregated and reviewed. These documents have been extracted from Google Scholar and many of them have been indexed on the Web of Science. Since there were many publications on this topic, the most relevant and effective techniques, including statistical models and deep learning (DL) or machine learning (ML) approach, have been surveyed in this research. The main aim of this research is to describe, summarize, and categorize these effective techniques considering their restrictions to be used as trustable references for scientists, researchers, and readers to make an intelligent choice to use the best possible method for their academic needs. Nevertheless, considering the fact that many of these techniques have been used for the first time and need more evaluations, we recommend none of them as an ideal way to be used in their project. Our study has shown that these methods can hold the robustness and reliability of statistical methods and the power of computation of DL ones. Full article
(This article belongs to the Special Issue Feature Papers for AI)
Show Figures

Figure 1

15 pages, 3769 KB  
Article
Visual Navigation and Path Tracking Using Street Geometry Information for Image Alignment and Servoing
by Ayham Shahoud, Dmitriy Shashev and Stanislav Shidlovskiy
Drones 2022, 6(5), 107; https://doi.org/10.3390/drones6050107 - 27 Apr 2022
Cited by 17 | Viewed by 6542
Abstract
Single camera-based navigation systems need information from other sensors or from the work environment to produce reliable and accurate position measurements. Providing such trustable, accurate, and available information in the environment is very important. The work highlights that the availability of well-described streets [...] Read more.
Single camera-based navigation systems need information from other sensors or from the work environment to produce reliable and accurate position measurements. Providing such trustable, accurate, and available information in the environment is very important. The work highlights that the availability of well-described streets in urban environments can be exploited by drones for navigation and path tracking purposes, thus benefitting from such structures is not limited to only automated driving cars. While the drone position is continuously computed using visual odometry, scene matching is used to correct the position drift depending on some landmarks. The drone path is defined by several waypoints, and landmarks centralized by those waypoints are carefully chosen in the street intersections. The known streets’ geometry and dimensions are used to estimate the image scale and orientation which are necessary for images alignment, to compensate for the visual odometry drift, and to pass closer to the landmark center by the visual servoing process. Probabilistic Hough transform is used to detect and extract the street borders. The system is realized in a simulation environment consisting of the Robot Operating System ROS, 3D dynamic simulator Gazebo, and IRIS drone model. The results prove the suggested system efficiency with a 1.4 m position RMS error. Full article
(This article belongs to the Section Drone Design and Development)
Show Figures

Figure 1

22 pages, 39051 KB  
Article
Multilevel Central Trust Management Approach for Task Scheduling on IoT-Based Mobile Cloud Computing
by Abid Ali, Muhammad Munawar Iqbal, Harun Jamil, Habib Akbar, Ammar Muthanna, Meryem Ammi and Maha M. Althobaiti
Sensors 2022, 22(1), 108; https://doi.org/10.3390/s22010108 - 24 Dec 2021
Cited by 27 | Viewed by 5030
Abstract
With the increasing number of mobile devices and IoT devices across a wide range of real-life applications, our mobile cloud computing devices will not cope with this growing number of audiences soon, which implies and demands the need to shift to fog computing. [...] Read more.
With the increasing number of mobile devices and IoT devices across a wide range of real-life applications, our mobile cloud computing devices will not cope with this growing number of audiences soon, which implies and demands the need to shift to fog computing. Task scheduling is one of the most demanding scopes after the trust computation inside the trustable nodes. The mobile devices and IoT devices transfer the resource-intensive tasks towards mobile cloud computing. Some tasks are resource-intensive and not trustable to allocate to the mobile cloud computing resources. This consequently gives rise to trust evaluation and data sync-up of devices joining and leaving the network. The resources are more intensive for cloud computing and mobile cloud computing. Time, energy, and resources are wasted due to the nontrustable nodes. This research article proposes a multilevel trust enhancement approach for efficient task scheduling in mobile cloud environments. We first calculate the trustable tasks needed to offload towards the mobile cloud computing. Then, an efficient and dynamic scheduler is added to enhance the task scheduling after trust computation using social and environmental trust computation techniques. To improve the time and energy efficiency of IoT and mobile devices using the proposed technique, the energy computation and time request computation are compared with the existing methods from literature, which identified improvements in the results. Our proposed approach is centralized to tackle constant SyncUPs of incoming devices’ trust values with mobile cloud computing. With the benefits of mobile cloud computing, the centralized data distribution method is a positive approach. Full article
Show Figures

Figure 1

24 pages, 7925 KB  
Article
Improving the Efficiency of Maritime Infrastructures through a BIM-Based Building Energy Modelling Approach: A Case Study in Naples, Italy
by Giovanni Barone, Annamaria Buonomano, Cesare Forzano, Giovanni Francesco Giuzio and Adolfo Palombo
Energies 2021, 14(16), 4854; https://doi.org/10.3390/en14164854 - 9 Aug 2021
Cited by 28 | Viewed by 4108
Abstract
Worldwide, the design, renovation, and sustainable management of port buildings play a crucial role for sustainability. In this framework, a computer simulation of a building’s thermal behaviour is an almost mandatory tool for making informed decisions. However, the development of a building energy [...] Read more.
Worldwide, the design, renovation, and sustainable management of port buildings play a crucial role for sustainability. In this framework, a computer simulation of a building’s thermal behaviour is an almost mandatory tool for making informed decisions. However, the development of a building energy model is a challenging task that could discourage its adoption. A possible solution would be to exploit an existing Building Information Modeling (BIM) model to automatically generate an accurate and flexible Building Energy Modeling (BEM) one. Such a method, which can substantially improve decision-making processes, still presents some issues and needs to be further investigated, as also detectable from the literature on the topic. In this framework, a novel workflow to extrapolate BIM data for energy simulation is proposed and analysed in this paper. Here, the BIM to BEM approach was tested as a useful tool for the maritime industry to improve the implementation of effective energy-saving measures. Specifically, in order to prove the capabilities of the proposed method, a maritime passenger station in Naples was chosen as case study and investigated by comparing different strategies to reduce the annual primary energy consumption. The optimal level of modelling detail required by a trustable building energy assessment was also investigated. By the proposed method, interesting primary energy savings (ranging from 24 to 41%) are achieved and CO2 emissions avoided (ranging from 16 to 34 tons CO2/year) for the investigated building, proving the potential of this approach. Definitely, this paper proves the validity of the proposed methodology and emphasizes its numerous benefits towards the achievements of the most modern sustainability standards. Full article
(This article belongs to the Special Issue Challenges and Research Trends of Building Energy Performance)
Show Figures

Figure 1

23 pages, 13001 KB  
Article
A Quasi-Static Quantitative Ultrasound Elastography Algorithm Using Optical Flow
by Raphael Lamprecht, Florian Scheible, Marion Semmler and Alexander Sutor
Sensors 2021, 21(9), 3010; https://doi.org/10.3390/s21093010 - 25 Apr 2021
Cited by 8 | Viewed by 4468
Abstract
Ultrasound elastography is a constantly developing imaging technique which is capable of displaying the elastic properties of tissue. The measured characteristics could help to refine physiological tissue models, but also indicate pathological changes. Therefore, elastography data give valuable insights into tissue properties. This [...] Read more.
Ultrasound elastography is a constantly developing imaging technique which is capable of displaying the elastic properties of tissue. The measured characteristics could help to refine physiological tissue models, but also indicate pathological changes. Therefore, elastography data give valuable insights into tissue properties. This paper presents an algorithm that measures the spatially resolved Young’s modulus of inhomogeneous gelatin phantoms using a CINE sequence of a quasi-static compression and a load cell measuring the compressing force. An optical flow algorithm evaluates the resulting images, the stresses and strains are computed, and, conclusively, the Young’s modulus and the Poisson’s ratio are calculated. The whole algorithm and its results are evaluated by a performance descriptor, which determines the subsequent calculation and gives the user a trustability index of the modulus estimation. The algorithm shows a good match between the mechanically measured modulus and the elastography result—more precisely, the relative error of the Young’s modulus estimation with a maximum error 35%. Therefore, this study presents a new algorithm that is capable of measuring the elastic properties of gelatin specimens in a quantitative way using only the image data. Further, the computation is monitored and evaluated by a performance descriptor, which measures the trustability of the results. Full article
(This article belongs to the Special Issue State-of-the-Art Sensors Technology)
Show Figures

Figure 1

14 pages, 2533 KB  
Article
A Lightweight Blockchain-Based IoT Identity Management Approach
by Mohammed Amine Bouras, Qinghua Lu, Sahraoui Dhelim and Huansheng Ning
Future Internet 2021, 13(2), 24; https://doi.org/10.3390/fi13020024 - 22 Jan 2021
Cited by 92 | Viewed by 9460
Abstract
Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy issues that are tied to [...] Read more.
Identity management is a fundamental feature of Internet of Things (IoT) ecosystem, particularly for IoT data access control. However, most of the actual works adopt centralized approaches, which could lead to a single point of failure and privacy issues that are tied to the use of a trusted third parties. A consortium blockchain is an emerging technology that provides a neutral and trustable computation and storage platform that is suitable for building identity management solutions for IoT. This paper proposes a lightweight architecture and the associated protocols for consortium blockchain-based identity management to address privacy, security, and scalability issues in a centralized system for IoT. Besides, we implement a proof-of-concept prototype and evaluate our approach. We evaluate our work by measuring the latency and throughput of the transactions while using different query actions and payload sizes, and we compared it to other similar works. The results show that the approach is suitable for business adoption. Full article
(This article belongs to the Special Issue Distributed Ledger Technologies for IoT and Softwarized Networks)
Show Figures

Figure 1

18 pages, 868 KB  
Article
Goat Milk Nutritional Quality Software-Automatized Individual Curve Model Fitting, Shape Parameters Calculation and Bayesian Flexibility Criteria Comparison
by María Gabriela Pizarro Inostroza, Francisco Javier Navas González, Vincenzo Landi, Jose Manuel León Jurado, Juan Vicente Delgado Bermejo, Javier Fernández Álvarez and María del Amparo Martínez Martínez
Animals 2020, 10(9), 1693; https://doi.org/10.3390/ani10091693 - 18 Sep 2020
Cited by 16 | Viewed by 3490
Abstract
SPSS syntax was described to evaluate the individual performance of 49 linear and non-linear models to fit the milk component evolution curve of 159 Murciano-Granadina does selected for genotyping analyses. Peak and persistence for protein, fat, dry matter, lactose, and somatic cell counts [...] Read more.
SPSS syntax was described to evaluate the individual performance of 49 linear and non-linear models to fit the milk component evolution curve of 159 Murciano-Granadina does selected for genotyping analyses. Peak and persistence for protein, fat, dry matter, lactose, and somatic cell counts were evaluated using 3107 controls (3.91 ± 2.01 average lactations/goat). Best-fit (adjusted R2) values (0.548, 0.374, 0.429, and 0.624 for protein, fat, dry matter, and lactose content, respectively) were reached by the five-parameter logarithmic model of Ali and Schaeffer (ALISCH), and for the three-parameter model of parabolic yield-density (PARYLDENS) for somatic cell counts (0.481). Cross-validation was performed using the Minimum Mean-Square Error (MMSE). Model comparison was performed using Residual Sum of Squares (RSS), Mean-Squared Prediction Error (MSPE), adjusted R2 and its standard deviation (SD), Akaike (AIC), corrected Akaike (AICc), and Bayesian information criteria (BIC). The adjusted R2 SD across individuals was around 0.2 for all models. Thirty-nine models successfully fitted the individual lactation curve for all components. Parametric and computational complexity promote variability-capturing properties, while model flexibility does not significantly (p > 0.05) improve the predictive and explanatory potential. Conclusively, ALISCH and PARYLDENS can be used to study goat milk composition genetic variability as trustable evaluation models to face future challenges of the goat dairy industry. Full article
(This article belongs to the Special Issue Animal Products Quality and Characterization)
Show Figures

Figure 1

26 pages, 3201 KB  
Article
A Modular IoT Hardware Platform for Distributed and Secured Extreme Edge Computing
by Pablo Merino, Gabriel Mujica, Jaime Señor and Jorge Portilla
Electronics 2020, 9(3), 538; https://doi.org/10.3390/electronics9030538 - 24 Mar 2020
Cited by 22 | Viewed by 6249
Abstract
The hardware of networked embedded sensor nodes is in continuous evolution, from those 8-bit MCUs-based platforms such as Mica, up to powerful Edge nodes that even include custom hardware devices, such as FPGAs in the Cookies platform. This evolution process comes up with [...] Read more.
The hardware of networked embedded sensor nodes is in continuous evolution, from those 8-bit MCUs-based platforms such as Mica, up to powerful Edge nodes that even include custom hardware devices, such as FPGAs in the Cookies platform. This evolution process comes up with issues related to the deployment of the Internet of Things, particularly in terms of performance and communication bottlenecks. Moreover, the associated integration process from the Edge up to the Cloud layer opens new security concerns that are key to assure the end-to-end trustability and interoperability. This work tackles these questions by proposing a novel embedded Edge platform based on an EFR32 SoC from Silicon Labs with Contiki-NG OS that includes an ARM Cortex M4 MCU and an IEEE 802.15.4 transceiver, used for resource-constrained low-power communication capabilities. This IoT Edge node integrates security by hardware, adding support for confidentiality, integrity and availability, making this Edge node ultra-secure for most of the common attacks in wireless sensor networks. Part of this security relies on an energy-efficient hardware accelerator that handles identity authentication, session key creation and management. Furthermore, the modular hardware platform aims at providing reliability and robustness in low-power distributed sensing application contexts on what is called the Extreme Edge, and for that purpose a lightweight multi-hop routing strategy for supporting dynamic discovery and interaction among participant devices is fully presented. This embedded algorithm has served as the baseline end-to-end communication capability to validate the IoT hardware platform through intensive experimental tests in a real deployment scenario. Full article
(This article belongs to the Special Issue Recent Advances in Embedded Computing, Intelligence and Applications)
Show Figures

Figure 1

19 pages, 458 KB  
Article
Optimal Computational Power Allocation in Multi-Access Mobile Edge Computing for Blockchain
by Yuan Wu, Xiangxu Chen, Jiajun Shi, Kejie Ni, Liping Qian, Liang Huang and Kuan Zhang
Sensors 2018, 18(10), 3472; https://doi.org/10.3390/s18103472 - 15 Oct 2018
Cited by 19 | Viewed by 4672
Abstract
Blockchain has emerged as a decentralized and trustable ledger for recording and storing digital transactions. The mining process of Blockchain, however, incurs a heavy computational workload for miners to solve the proof-of-work puzzle (i.e., a series of the hashing computation), which is prohibitive [...] Read more.
Blockchain has emerged as a decentralized and trustable ledger for recording and storing digital transactions. The mining process of Blockchain, however, incurs a heavy computational workload for miners to solve the proof-of-work puzzle (i.e., a series of the hashing computation), which is prohibitive from the perspective of the mobile terminals (MTs). The advanced multi-access mobile edge computing (MEC), which enables the MTs to offload part of the computational workloads (for solving the proof-of-work) to the nearby edge-servers (ESs), provides a promising approach to address this issue. By offloading the computational workloads via multi-access MEC, the MTs can effectively increase their successful probabilities when participating in the mining game and gain the consequent reward (i.e., winning the bitcoin). However, as a compensation to the ESs which provide the computational resources to the MTs, the MTs need to pay the ESs for the corresponding resource-acquisition costs. Thus, to investigate the trade-off between obtaining the computational resources from the ESs (for solving the proof-of-work) and paying for the consequent cost, we formulate an optimization problem in which the MTs determine their acquired computational resources from different ESs, with the objective of maximizing the MTs’ social net-reward in the mining process while keeping the fairness among the MTs. In spite of the non-convexity of the formulated problem, we exploit its layered structure and propose efficient distributed algorithms for the MTs to individually determine their optimal computational resources acquired from different ESs. Numerical results are provided to validate the effectiveness of our proposed algorithms and the performance of our proposed multi-access MEC for Blockchain. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

22 pages, 1209 KB  
Article
Distributed Pedestrian Detection Alerts Based on Data Fusion with Accurate Localization
by Fernando García, Felipe Jiménez, José Javier Anaya, José María Armingol, José Eugenio Naranjo and Arturo De la Escalera
Sensors 2013, 13(9), 11687-11708; https://doi.org/10.3390/s130911687 - 4 Sep 2013
Cited by 31 | Viewed by 9813
Abstract
Among Advanced Driver Assistance Systems (ADAS) pedestrian detection is a common issue due to the vulnerability of pedestrians in the event of accidents. In the present work, a novel approach for pedestrian detection based on data fusion is presented. Data fusion helps to [...] Read more.
Among Advanced Driver Assistance Systems (ADAS) pedestrian detection is a common issue due to the vulnerability of pedestrians in the event of accidents. In the present work, a novel approach for pedestrian detection based on data fusion is presented. Data fusion helps to overcome the limitations inherent to each detection system (computer vision and laser scanner) and provides accurate and trustable tracking of any pedestrian movement. The application is complemented by an efficient communication protocol, able to alert vehicles in the surroundings by a fast and reliable communication. The combination of a powerful location, based on a GPS with inertial measurement, and accurate obstacle localization based on data fusion has allowed locating the detected pedestrians with high accuracy. Tests proved the viability of the detection system and the efficiency of the communication, even at long distances. By the use of the alert communication, dangerous situations such as occlusions or misdetections can be avoided. Full article
(This article belongs to the Special Issue State-of-the-Art Sensors Technology in Spain 2013)
Show Figures

Back to TopTop