Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (101)

Search Parameters:
Keywords = ubiquitous user model

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
42 pages, 9998 KiB  
Review
Routing Challenges and Enabling Technologies for 6G–Satellite Network Integration: Toward Seamless Global Connectivity
by Fatma Aktas, Ibraheem Shayea, Mustafa Ergen, Laura Aldasheva, Bilal Saoud, Akhmet Tussupov, Didar Yedilkhan and Saule Amanzholova
Technologies 2025, 13(6), 245; https://doi.org/10.3390/technologies13060245 - 12 Jun 2025
Viewed by 1437
Abstract
The capabilities of 6G networks surpass those of existing networks, aiming to enable seamless connectivity between all entities and users at any given time. A critical aspect of achieving enhanced and ubiquitous mobile broadband, as promised by 6G networks, is merging satellite networks [...] Read more.
The capabilities of 6G networks surpass those of existing networks, aiming to enable seamless connectivity between all entities and users at any given time. A critical aspect of achieving enhanced and ubiquitous mobile broadband, as promised by 6G networks, is merging satellite networks with land-based networks, which offers significant potential in terms of coverage area. Advanced routing techniques in next-generation network technologies, particularly when incorporating terrestrial and non-terrestrial networks, are essential for optimizing network efficiency and delivering promised services. However, the dynamic nature of the network, the heterogeneity and complexity of next-generation networks, and the relative distance and mobility of satellite networks all present challenges that traditional routing protocols struggle to address. This paper provides an in-depth analysis of 6G networks, addressing key enablers, technologies, commitments, satellite networks, and routing techniques in the context of 6G and satellite network integration. To ensure 6G fulfills its promises, the paper emphasizes necessary scenarios and investigates potential bottlenecks in routing techniques. Additionally, it explores satellite networks and identifies routing challenges within these systems. The paper highlights routing issues that may arise in the integration of 6G and satellite networks and offers a comprehensive examination of essential approaches, technologies, and visions required for future advancements in this area. 6G and satellite networks are associated with technical terms such as AI/ML, quantum computing, THz communication, beamforming, MIMO technology, ultra-wide band and multi-band antennas, hybrid channel models, and quantum encryption methods. These technologies will be utilized to enhance the performance, security, and sustainability of future networks. Full article
(This article belongs to the Section Information and Communication Technologies)
Show Figures

Figure 1

28 pages, 1162 KiB  
Article
AHP-Based Evaluation of Discipline-Specific Information Services in Academic Libraries Under Digital Intelligence
by Simeng Zhang, Tao Zhang and Xi Wang
Information 2025, 16(3), 245; https://doi.org/10.3390/info16030245 - 18 Mar 2025
Viewed by 716
Abstract
Over recent years, digital and intelligent technologies have been driving the transformation of discipline-specific information services in academic libraries toward user experience optimization and service innovation. This study constructs a quality evaluation framework for discipline-specific information services in academic libraries, incorporating digital-intelligence characteristics [...] Read more.
Over recent years, digital and intelligent technologies have been driving the transformation of discipline-specific information services in academic libraries toward user experience optimization and service innovation. This study constructs a quality evaluation framework for discipline-specific information services in academic libraries, incorporating digital-intelligence characteristics to provide theoretical references and evaluation guidelines for enhancing service quality and user satisfaction in an information-ubiquitous environment. Drawing on LibQual+TM, WebQUAL, and E-SERVQUAL service quality evaluation models and integrating expert interviews with the contextual characteristics of academic library discipline-specific information services, this study develops a comprehensive evaluation system comprising six dimensions—Perceived Information Quality, Information Usability, Information Security, Interactive Feedback, Tool Application, and User Experience—with fifteen specific indicators. The analytic hierarchy process (AHP) was applied to determine the weight of these indicators. To validate the practicality of the evaluation system, a fuzzy comprehensive evaluation method was employed for an empirical analysis using discipline-specific information services at Tsinghua University Library in China as a case study. The evaluation results indicate that the overall quality of discipline-specific information services at Tsinghua University Library is satisfactory, with Tool Application, Perceived Information Quality, and Information Usability identified as key factors influencing service quality. To further enhance discipline-specific information services in academic libraries, emphasis should be placed on service intelligence and precision-driven optimization, strengthening user experience, interaction and feedback mechanisms, and data security measures. These improvements will better meet the diverse needs of users and enhance the overall effectiveness of discipline-specific information services. Full article
Show Figures

Figure 1

16 pages, 546 KiB  
Article
Enhancing Small Language Models for Graph Tasks Through Graph Encoder Integration
by Dongryul Oh, Sujin Kang, Heejin Kim and Dongsuk Oh
Appl. Sci. 2025, 15(5), 2418; https://doi.org/10.3390/app15052418 - 24 Feb 2025
Viewed by 1537
Abstract
Small language models (SLMs) are increasingly utilized for on-device applications due to their ability to ensure user privacy, reduce inference latency, and operate independently of cloud infrastructure. However, their performance is often limited when processing complex data structures such as graphs, which are [...] Read more.
Small language models (SLMs) are increasingly utilized for on-device applications due to their ability to ensure user privacy, reduce inference latency, and operate independently of cloud infrastructure. However, their performance is often limited when processing complex data structures such as graphs, which are ubiquitous in real-world datasets like social networks and system interactions. Graphs inherently encode intricate structural dependencies, requiring models to effectively capture both local and global relationships. Traditional language models, designed primarily for text data, struggle to address these requirements, leading to suboptimal performance in graph-related tasks. To overcome this limitation, we propose a novel graph encoder-based prompt tuning framework which integrates a graph convolutional network (GCN) with a graph transformer. By leveraging the complementary strengths of the GCN for local structural modeling and the graph transformer for capturing global relationships, our method enables SLMs to effectively process graph data. This integration significantly enhances the ability of SLMs to handle graph-centric tasks while maintaining the efficiency required for resource-constrained devices. The experimental results show that our approach not only improves the performance of SLMs on various graph benchmarks but also achieves results which closely approach the performance of a large language model (LLM). This work highlights the potential of extending SLMs for graph-based applications and advancing the capabilities of on-device artificial intelligence. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

14 pages, 986 KiB  
Article
The Role of Technophilia and User Goals in the Intention to Use a Mobility Management Travel App
by João de Abreu e Silva and Julianno de Menezes Amorim
Sustainability 2024, 16(22), 9645; https://doi.org/10.3390/su16229645 - 5 Nov 2024
Viewed by 1240
Abstract
The ubiquitous use of mobile devices along with the amount of traffic, transportation services, and travel pattern data available has led to the emergence and deployment of smartphone applications for providing information about personal travel management. Several of these travel apps are aimed [...] Read more.
The ubiquitous use of mobile devices along with the amount of traffic, transportation services, and travel pattern data available has led to the emergence and deployment of smartphone applications for providing information about personal travel management. Several of these travel apps are aimed at voluntary travel behavior change (VTBC) to support and increase sustainable mobility, and have led to the development of research to investigate their influence on travel behavior. Here, the aim is to study the role of technophilia and goal-framing theory in the intention to adopt and situationally use a prospective VTBC travel app. A Structural Equation Model is developed with the aim of empirically testing a sample of 971 respondents collected in two suburban corridors in the Lisbon Metropolitan Area. The results support that goal-framing theory is important for explaining the adoption of VTBC travel apps. Gain and normative motives are more relevant than hedonic motives, pointing to the importance of their tangible benefits. Frequent car users may benefit from VTBC travel apps in terms of encouraging behavioral changes, supporting sustainable mobility management solutions. The results also outline the importance of technophilia and the current use of travel apps in influencing the intention to use VTBC apps. Full article
(This article belongs to the Section Sustainable Transportation)
Show Figures

Figure 1

21 pages, 3233 KiB  
Article
Sensor Fusion-Based Pulsed Controller for Low Power Solar-Charged Batteries with Experimental Tests: NiMH Battery as a Case Study
by Shyam Yadasu, Vinay Kumar Awaar, Vatsala Rani Jetti and Mohsen Eskandari
Batteries 2024, 10(9), 335; https://doi.org/10.3390/batteries10090335 - 21 Sep 2024
Cited by 1 | Viewed by 1381
Abstract
Solar energy is considered the major source of clean and ubiquitous renewable energy available on various scales in electric grids. In addition, solar energy is harnessed in various electronic devices to charge the batteries and power electronic equipment. Due to its ubiquitous nature, [...] Read more.
Solar energy is considered the major source of clean and ubiquitous renewable energy available on various scales in electric grids. In addition, solar energy is harnessed in various electronic devices to charge the batteries and power electronic equipment. Due to its ubiquitous nature, the corresponding market for solar-charged small-scale batteries is growing fast. The most important part to make the technology feasible is a portable battery charger and the associated controllers to automate battery charging. The charger should consider the case of charging to be convenient for the user and minimize battery degradation. However, the issue of slow charging and premature battery life loss plagues current industry standards or innovative battery technologies. In this paper, a new pulse charging technique is proposed that obviates battery deterioration and minimizes the overall charging loss. The solar-powered battery charger is prototyped and executed as a practical, versatile, and compact photovoltaic charge controller at cut rates. With the aid of sensor fusion, the charge controller is disconnected and reconnects the battery during battery overcharging and deep discharging conditions using sensors with relays. The laboratory model is tested using a less expensive PV panel, battery, and digital signal processor (DSP) controller. The charging behavior of the solar-powered PWM charge controller is studied compared with that of the constant voltage–constant current (CV–CC) method. The proposed method is pertinent for minimizing energy issues in impoverished places at a reasonable price. Full article
Show Figures

Figure 1

29 pages, 2443 KiB  
Article
User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks
by Farid Yessoufou, Salma Sassi, Elie Chicha, Richard Chbeir and Jules Degila
Future Internet 2024, 16(9), 311; https://doi.org/10.3390/fi16090311 - 28 Aug 2024
Viewed by 4250
Abstract
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geographic locations, has proven to be particularly [...] Read more.
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geographic locations, has proven to be particularly innovative. However, this trend raises significant privacy concerns, particularly regarding the precise geographic data required by these crowdsourcing platforms. Traditional methods, such as dummy locations, spatial cloaking, differential privacy, k-anonymity, and encryption, often fail to mitigate the risks associated with the continuous disclosure of location data. An unauthorized entity could access these data and infer personal information about individuals, such as their home address, workplace, religion, or political affiliations, thus constituting a privacy violation. In this paper, we propose a user mobility model designed to enhance location privacy protection by accurately identifying Points of Interest (POIs) and countering inference attacks. Our main contribution here focuses on user mobility modeling and the introduction of an advanced algorithm for precise POI identification. We evaluate our contributions using GPS data collected from 10 volunteers over a period of 3 months. The results show that our mobility model delivers significant performance and that our POI extraction algorithm outperforms existing approaches. Full article
Show Figures

Figure 1

18 pages, 5527 KiB  
Article
Leveraging Off-the-Shelf WiFi for Contactless Activity Monitoring
by Zixuan Zhu, Wei Liu, Hao Zhang and Jinhu Lu
Electronics 2024, 13(17), 3351; https://doi.org/10.3390/electronics13173351 - 23 Aug 2024
Viewed by 1018
Abstract
Monitoring human activities, such as walking, falling, and jumping, provides valuable information for personalized health assistants. Existing solutions require the user to carry/wear certain smart devices to capture motion/audio data, use a high-definition camera to record video data, or deploy dedicated devices to [...] Read more.
Monitoring human activities, such as walking, falling, and jumping, provides valuable information for personalized health assistants. Existing solutions require the user to carry/wear certain smart devices to capture motion/audio data, use a high-definition camera to record video data, or deploy dedicated devices to collect wireless data. However, none of these solutions are widely adopted for reasons such as discomfort, privacy, and overheads. Therefore, an effective solution to provide non-intrusive, secure, and low-cost human activity monitoring is needed. In this study, we developed a contactless human activity monitoring system that utilizes channel state information (CSI) of the existing ubiquitous WiFi signals. Specifically, we deployed a low-cost commercial off-the-shelf (COTS) router as a transmitter and reused a desktop equipped with an Intel WiFi Link 5300 NIC as a receiver, allowing us to obtain CSI data that recorded human activities. To remove the outliers and ambient noise existing in raw CSI signals, an integrated filter consisting of Hampel, wavelet, and moving average filters was designed. Then, a new metric based on kurtosis and standard deviation was designed to obtain an optimal set of subcarriers that is sensitive to all target activities from the candidate 30 subcarriers. Finally, we selected a group of features, including time- and frequency-domain features, and trained a classification model to recognize different indoor human activities. Our experimental results demonstrate that the proposed system can achieve a mean accuracy of above 93%, even in the face of a long sensing distance. Full article
(This article belongs to the Special Issue Recent Research in Positioning and Activity Recognition Systems)
Show Figures

Figure 1

21 pages, 1479 KiB  
Article
Unlock Happy Interactions: Voice Assistants Enable Autonomy and Timeliness
by Linlin Mo, Liangbo Zhang, Xiaohui Sun and Zhimin Zhou
J. Theor. Appl. Electron. Commer. Res. 2024, 19(2), 1013-1033; https://doi.org/10.3390/jtaer19020053 - 30 Apr 2024
Cited by 4 | Viewed by 2558
Abstract
This study examines the effects of three interactive voice assistant (VA) features (responsiveness, ubiquitous connectivity, and personalization) on consumer happiness. An online survey was administered to 316 VA consumers, and the data were analyzed using structural equation modeling with SmartPLS 4 software. The [...] Read more.
This study examines the effects of three interactive voice assistant (VA) features (responsiveness, ubiquitous connectivity, and personalization) on consumer happiness. An online survey was administered to 316 VA consumers, and the data were analyzed using structural equation modeling with SmartPLS 4 software. The results indicate that VA responsiveness, ubiquitous connectivity, and personalization have significant effects on consumer happiness. This study also provides evidence that consumer happiness is influenced by VA features through the mediating roles of autonomy and timeliness. Notably, perceived privacy risk has a dual effect, negatively affecting happiness but positively moderating the relationship between autonomy and happiness, suggesting a complex interplay between benefits and concerns in user interactions with VAs. This study highlights the need for VA businesses to consider both the enhancing and mitigating factors of technology for user experiences. Furthermore, our findings have significant implications for VA businesses and executives, suggesting that improved interactions through these VA features can better serve consumers and enhance their experiences. Full article
(This article belongs to the Topic Consumer Psychology and Business Applications)
Show Figures

Figure 1

16 pages, 1807 KiB  
Article
Identifying Smartphone Users Based on Activities in Daily Living Using Deep Neural Networks
by Sakorn Mekruksavanich and Anuchit Jitpattanakul
Information 2024, 15(1), 47; https://doi.org/10.3390/info15010047 - 15 Jan 2024
Cited by 4 | Viewed by 2109
Abstract
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individuals store sensitive data on their devices like financial credentials and [...] Read more.
Smartphones have become ubiquitous, allowing people to perform various tasks anytime and anywhere. As technology continues to advance, smartphones can now sense and connect to networks, providing context-awareness for different applications. Many individuals store sensitive data on their devices like financial credentials and personal information due to the convenience and accessibility. However, losing control of this data poses risks if the phone gets lost or stolen. While passwords, PINs, and pattern locks are common security methods, they can still be compromised through exploits like smudging residue from touching the screen. This research explored leveraging smartphone sensors to authenticate users based on behavioral patterns when operating the device. The proposed technique uses a deep learning model called DeepResNeXt, a type of deep residual network, to accurately identify smartphone owners through sensor data efficiently. Publicly available smartphone datasets were used to train the suggested model and other state-of-the-art networks to conduct user recognition. Multiple experiments validated the effectiveness of this framework, surpassing previous benchmark models in this area with a top F1-score of 98.96%. Full article
Show Figures

Figure 1

17 pages, 622 KiB  
Article
An Event-Centric Knowledge Graph Approach for Public Administration as an Enabler for Data Analytics
by Dimitris Zeginis and Konstantinos Tarabanis
Computers 2024, 13(1), 17; https://doi.org/10.3390/computers13010017 - 5 Jan 2024
Cited by 5 | Viewed by 3106
Abstract
In a continuously evolving environment, organizations, including public administrations, need to quickly adapt to change and make decisions in real-time. This requires having a real-time understanding of their context that can be achieved by adopting an event-native mindset in data management which focuses [...] Read more.
In a continuously evolving environment, organizations, including public administrations, need to quickly adapt to change and make decisions in real-time. This requires having a real-time understanding of their context that can be achieved by adopting an event-native mindset in data management which focuses on the dynamics of change compared to the state-based traditional approaches. In this context, this paper proposes the adoption of an event-centric knowledge graph approach for the holistic data management of all data repositories in public administration. Towards this direction, the paper proposes an event-centric knowledge graph model for the domain of public administration that captures these dynamics considering events as first-class entities for knowledge representation. The development of the model is based on a state-of-the-art analysis of existing event-centric knowledge graph models that led to the identification of core concepts related to event representation, on a state-of-the-art analysis of existing public administration models that identified the core entities of the domain, and on a theoretical analysis of concepts related to events, public services, and effective public administration in order to outline the context and identify the domain-specific needs for event modeling. Further, the paper applies the model in the context of Greek public administration in order to validate it and showcase the possibilities that arise. The results show that the adoption of event-centric knowledge graph approaches for data management in public administration can facilitate data analytics, continuous integration, and the provision of a 360-degree-view of end-users. We anticipate that the proposed approach will also facilitate real-time decision-making, continuous intelligence, and ubiquitous AI. Full article
Show Figures

Figure 1

29 pages, 46840 KiB  
Article
An Advanced Software Platform and Algorithmic Framework for Mobile DBH Data Acquisition
by Jiaming Zhang, Hanyan Liang, Siyuan Tong, Yunhe Zhou and Jiangming Kan
Forests 2023, 14(12), 2334; https://doi.org/10.3390/f14122334 - 28 Nov 2023
Cited by 3 | Viewed by 1820
Abstract
Rapid and precise tree Diameter at Breast Height (DBH) measurement is pivotal in forest inventories. While the recent advancements in LiDAR and Structure from Motion (SFM) technologies have paved the way for automated DBH measurements, the significant equipment costs and the complexity of [...] Read more.
Rapid and precise tree Diameter at Breast Height (DBH) measurement is pivotal in forest inventories. While the recent advancements in LiDAR and Structure from Motion (SFM) technologies have paved the way for automated DBH measurements, the significant equipment costs and the complexity of operational procedures continue to constrain the ubiquitous adoption of these technologies for real-time DBH assessments. In this research, we introduce KAN-Forest, a real-time DBH measurement and key point localization algorithm utilizing RGB-D (Red, Green, Blue-Depth) imaging technology. Firstly, we improved the YOLOv5-seg segmentation module with a Channel and Spatial Attention (CBAM) module, augmenting its efficiency in extracting the tree’s edge features in intricate forest scenarios. Subsequently, we devised an image processing algorithm for real-time key point localization and DBH measurement, leveraging historical data to fine-tune current frame assessments. This system facilitates real-time image data upload via wireless LAN for immediate host computer processing. We validated our approach on seven sample plots, achieving bbAP50 and segAP50 scores of: 90.0%(+3.0%), 90.9%(+0.9%), respectively with the improved YOLOv5-seg model. The method exhibited a DBH estimation RMSE of 17.61∼54.96 mm (R2=0.937), and secured 78% valid DBH samples at a 59 FPS. Our system stands as a cost-effective, portable, and user-friendly alternative to conventional forest survey techniques, maintaining accuracy in real-time measurements compared to SFM- and LiDAR-based algorithms. The integration of WLAN and its inherent scalability facilitates deployment on Unmanned Ground Vehicles (UGVs) to improve the efficiency of forest inventory. We have shared the algorithms and datasets on Github for peer evaluations. Full article
(This article belongs to the Section Forest Inventory, Modeling and Remote Sensing)
Show Figures

Figure 1

22 pages, 11823 KiB  
Article
Adaptive Smart eHealth Framework for Personalized Asthma Attack Prediction and Safe Route Recommendation
by Eman Alharbi, Asma Cherif and Farrukh Nadeem
Smart Cities 2023, 6(5), 2910-2931; https://doi.org/10.3390/smartcities6050130 - 20 Oct 2023
Cited by 6 | Viewed by 2789
Abstract
Recently, there has been growing interest in using smart eHealth systems to manage asthma. However, limitations still exist in providing smart services and accurate predictions tailored to individual patients’ needs. This study aims to develop an adaptive ubiquitous computing framework that leverages different [...] Read more.
Recently, there has been growing interest in using smart eHealth systems to manage asthma. However, limitations still exist in providing smart services and accurate predictions tailored to individual patients’ needs. This study aims to develop an adaptive ubiquitous computing framework that leverages different bio-signals and spatial data to provide personalized asthma attack prediction and safe route recommendations. We proposed a smart eHealth framework consisting of multiple layers that employ telemonitoring application, environmental sensors, and advanced machine-learning algorithms to deliver smart services to the user. The proposed smart eHealth system predicts asthma attacks and uses spatial data to provide a safe route that drives the patient away from any asthma trigger. Additionally, the framework incorporates an adaptation layer that continuously updates the system based on real-time environmental data and daily bio-signals reported by the user. The developed telemonitoring application collected a dataset containing 665 records used to train the prediction models. The testing result demonstrates a remarkable 98% accuracy in predicting asthma attacks with a recall of 96%. The eHealth system was tested online by ten asthma patients, and its accuracy achieved 94% of accuracy and a recall of 95.2% in generating safe routes for asthma patients, ensuring a safer and asthma-trigger-free experience. The test shows that 89% of patients were satisfied with the safer recommended route than their usual one. This research contributes to enhancing the capabilities of smart healthcare systems in managing asthma and improving patient outcomes. The adaptive feature of the proposed eHealth system ensures that the predictions and recommendations remain relevant and personalized to the current conditions and needs of the individual. Full article
(This article belongs to the Topic Artificial Intelligence Models, Tools and Applications)
Show Figures

Figure 1

27 pages, 4863 KiB  
Article
Identifying Critical Drivers of Mango, Tomato, and Maize Postharvest Losses (PHL) in Low-Income Countries and Predicting Their Impact
by Hory Chikez, Dirk Maier, Sigurdur Olafsson and Steve Sonka
Agriculture 2023, 13(10), 1912; https://doi.org/10.3390/agriculture13101912 - 29 Sep 2023
Viewed by 1699
Abstract
Several studies have identified a host of factors to be considered when attempting to reduce food postharvest loss (PHL). However, very few studies have ranked those factors by their importance in driving PHL. This study used the Random Forest model to rank the [...] Read more.
Several studies have identified a host of factors to be considered when attempting to reduce food postharvest loss (PHL). However, very few studies have ranked those factors by their importance in driving PHL. This study used the Random Forest model to rank the critical drivers of PHL in maize, mango, and tomato, cultivated in Tanzania, Kenya, and Nigeria, respectively. The study then predicted the maize, mango, and tomato PHLs by changing the levels of the most critical drivers of PHL and the number of farmers at each level. The results indicate that the most critical drivers of PHL consist of pre-harvest and harvest variables in the field, such as the quantity of maize harvested in the maize value chain, the method used to know when to begin mango harvest, and the type of pest that attacks plants in the tomato value chain. Furthermore, changes in the levels of a critical driver and changes in the number of smallholder farmers at a given level both have an impact on PHL, although the impact of the former is much higher than the latter. This study also revealed that the critical drivers of PHL can be categorized as either passive and difficult to manipulate, such as the geographic area within which a smallholder farmer lives, or active and easier to control, such as services provided by the Rockefeller Foundation YieldWise Initiative. Moreover, the affiliation of smallholder farmers to the YieldWise Initiative and a smallholder farmer’s geographic location are ubiquitous critical drivers across all three value chains. Finally, an online dashboard was created to allow users to explore further the relationship between several critical drivers, the PHL of each crop, and a desired number of smallholder farmers. Full article
Show Figures

Figure 1

19 pages, 1176 KiB  
Article
Constrained DRL for Energy Efficiency Optimization in RSMA-Based Integrated Satellite Terrestrial Network
by Qingmiao Zhang, Lidong Zhu, Yanyan Chen and Shan Jiang
Sensors 2023, 23(18), 7859; https://doi.org/10.3390/s23187859 - 13 Sep 2023
Cited by 3 | Viewed by 1656
Abstract
To accommodate the requirements of extensive coverage and ubiquitous connectivity in 6G communications, satellite plays a more significant role in it. As users and devices explosively grow, new multiple access technologies are called for. Among the new candidates, rate splitting multiple access (RSMA) [...] Read more.
To accommodate the requirements of extensive coverage and ubiquitous connectivity in 6G communications, satellite plays a more significant role in it. As users and devices explosively grow, new multiple access technologies are called for. Among the new candidates, rate splitting multiple access (RSMA) shows great potential. Since satellites are power-limited, we investigate the energy-efficient resource allocation in the integrated satellite terrestrial network (ISTN)-adopting RSMA scheme in this paper. However, this non-convex problem is challenging to solve using conventional model-based methods. Because this optimization task has a quality of service (QoS) requirement and continuous action/state space, we propose to use constrained soft actor-critic (SAC) to tackle it. This policy-gradient algorithm incorporates the Lagrangian relaxation technique to convert the original constrained problem into a penalized unconstrained one. The reward is maximized while the requirements are satisfied. Moreover, the learning process is time-consuming and unnecessary when little changes in the network. So, an on–off mechanism is introduced to avoid this situation. By calculating the difference between the current state and the last one, the system will decide to learn a new action or take the last one. The simulation results show that the proposed algorithm can outperform other benchmark algorithms in terms of energy efficiency while satisfying the QoS constraint. In addition, the time consumption is lowered because of the on–off design. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

17 pages, 3268 KiB  
Article
Spot Market Cloud Orchestration Using Task-Based Redundancy and Dynamic Costing
by Vyas O’Neill and Ben Soh
Future Internet 2023, 15(9), 288; https://doi.org/10.3390/fi15090288 - 27 Aug 2023
Cited by 2 | Viewed by 1644
Abstract
Cloud computing has become ubiquitous in the enterprise environment as its on-demand model realizes technical and economic benefits for users. Cloud users demand a level of reliability, availability, and quality of service. Improvements to reliability generally come at the cost of additional replication. [...] Read more.
Cloud computing has become ubiquitous in the enterprise environment as its on-demand model realizes technical and economic benefits for users. Cloud users demand a level of reliability, availability, and quality of service. Improvements to reliability generally come at the cost of additional replication. Existing approaches have focused on the replication of virtual environments as a method of improving the reliability of cloud services. As cloud systems move towards microservices-based architectures, a more granular approach to replication is now possible. In this paper, we propose a cloud orchestration approach that balances the potential cost of failure with the spot market running cost, optimizing the resource usage of the cloud system. We present the results of empirical testing we carried out using a simulator to compare the outcome of our proposed approach to a control algorithm based on a static reliability requirement. Our empirical testing showed an improvement of between 37% and 72% in total cost over the control, depending on the specific characteristics of the cloud models tested. We thus propose that in clouds where the cost of failure can be reasonably approximated, our approach may be used to optimize the cloud redundancy configuration to achieve a lower total cost. Full article
Show Figures

Figure 1

Back to TopTop