Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (247)

Search Parameters:
Keywords = federated deep learning

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 3664 KiB  
Article
Literacy Deep Reinforcement Learning-Based Federated Digital Twin Scheduling for the Software-Defined Factory
by Jangsu Ahn, Seongjin Yun, Jin-Woo Kwon and Won-Tae Kim
Electronics 2024, 13(22), 4452; https://doi.org/10.3390/electronics13224452 - 13 Nov 2024
Viewed by 328
Abstract
As user requirements become increasingly complex, the demand for product personalization is growing, but traditional hardware-centric production relies on fixed procedures that lack the flexibility to support diverse requirements. Although bespoke manufacturing has been introduced, it provides users with only a few standardized [...] Read more.
As user requirements become increasingly complex, the demand for product personalization is growing, but traditional hardware-centric production relies on fixed procedures that lack the flexibility to support diverse requirements. Although bespoke manufacturing has been introduced, it provides users with only a few standardized options, limiting its ability to meet a wide range of needs. To address this issue, a new manufacturing concept called the software-defined factory has emerged. It is an autonomous manufacturing system that provides reconfigurable manufacturing services to produce tailored products. Reinforcement learning has been suggested for flexible scheduling to satisfy user requirements. However, fixed rule-based methods struggle to accommodate conflicting needs. This study proposes a novel federated digital twin scheduling that combines large language models and deep reinforcement learning algorithms to meet diverse user requirements in the software-defined factory. The large language model-based literacy module analyzes requirements in natural language and assigns weights to digital twin attributes to achieve highly relevant KPIs, which are used to guide scheduling decisions. The deep reinforcement learning-based scheduling module optimizes scheduling by selecting the job and machine with the maximum reward. Different types of user requirements, such as reducing manufacturing costs and improving productivity, are input and evaluated by comparing the flow-shop scheduling with job-shop scheduling based on reinforcement learning. Experimental results indicate that in requirement case 1 (the manufacturing cost), the proposed method outperforms flow-shop scheduling by up to 14.9% and job-shop scheduling by 5.6%. For requirement case 2 (productivity), it exceeds the flow-shop method by up to 13.4% and the job-shop baseline by 7.2%. The results confirm that the literacy DRL scheduling proposed in this paper can handle the individual characteristics of requirements. Full article
(This article belongs to the Special Issue Metaverse and Digital Twins, 2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Concept of the software-defined factory.</p>
Full article ">Figure 2
<p>Scenarios for the software-defined factory.</p>
Full article ">Figure 3
<p>History of language model development.</p>
Full article ">Figure 4
<p>Literacy DRL-based scheduling behavior in the software-defined factory. Different colors represent types of digital twin attributes. Labels like “R” (Resource), “H” (Hardware Module), and “App” (Application) show the organization of different resources, hardware, and applications within the digital twin framework.</p>
Full article ">Figure 5
<p>Literacy DRL-based federated digital twin scheduling training steps. The colored action sets represent those selected through reinforcement learning during the training process, with the gray action sets indicating additional resources now being scheduled as part of the ongoing planning.</p>
Full article ">Figure 6
<p>Data flow mechanism of literacy module in scheduling.</p>
Full article ">Figure 7
<p>Requirement cases—KPIs relevance score comparison.</p>
Full article ">Figure 8
<p>Comparison of manufacturing costs for each scenario.</p>
Full article ">Figure 9
<p>Comparison of productivity for each scenario.</p>
Full article ">
23 pages, 448 KiB  
Article
Network-Based Intrusion Detection for Industrial and Robotics Systems: A Comprehensive Survey
by Richard Holdbrook, Olusola Odeyomi, Sun Yi and Kaushik Roy
Electronics 2024, 13(22), 4440; https://doi.org/10.3390/electronics13224440 - 13 Nov 2024
Viewed by 500
Abstract
In the face of rapidly evolving cyber threats, network-based intrusion detection systems (NIDS) have become critical to the security of industrial and robotic systems. This survey explores the specialized requirements, advancements, and challenges unique to deploying NIDS within these environments, where traditional intrusion [...] Read more.
In the face of rapidly evolving cyber threats, network-based intrusion detection systems (NIDS) have become critical to the security of industrial and robotic systems. This survey explores the specialized requirements, advancements, and challenges unique to deploying NIDS within these environments, where traditional intrusion detection systems (IDS) often fall short. This paper discusses NIDS methodologies, including machine learning, deep learning, and hybrid systems, which aim to improve detection accuracy, adaptability, and real-time response. Additionally, this paper addresses the complexity of industrial settings, limitations in current datasets, and the cybersecurity needs of cyber–physical Systems (CPS) and Industrial Control Systems (ICS). The survey provides a comprehensive overview of modern approaches and their suitability for industrial applications by reviewing relevant datasets, emerging technologies, and sector-specific challenges. This underscores the importance of innovative solutions, such as federated learning, blockchain, and digital twins, to enhance the security and resilience of NIDS in safeguarding industrial and robotic systems. Full article
(This article belongs to the Special Issue Machine Learning for Cybersecurity: Threat Detection and Mitigation)
Show Figures

Figure 1

Figure 1
<p>Architecture of NIDS in industrial and robotic systems.</p>
Full article ">Figure 2
<p>Challenges in industrial and robotics systems for NIDS.</p>
Full article ">
23 pages, 620 KiB  
Review
Systematic Review of Machine Learning and Deep Learning Techniques for Spatiotemporal Air Quality Prediction
by Israel Edem Agbehadji and Ibidun Christiana Obagbuwa
Atmosphere 2024, 15(11), 1352; https://doi.org/10.3390/atmos15111352 - 10 Nov 2024
Viewed by 786
Abstract
Background: Although computational models are advancing air quality prediction, achieving the desired performance or accuracy of prediction remains a gap, which impacts the implementation of machine learning (ML) air quality prediction models. Several models have been employed and some hybridized to enhance air [...] Read more.
Background: Although computational models are advancing air quality prediction, achieving the desired performance or accuracy of prediction remains a gap, which impacts the implementation of machine learning (ML) air quality prediction models. Several models have been employed and some hybridized to enhance air quality and air quality index predictions. The objective of this paper is to systematically review machine and deep learning techniques for spatiotemporal air prediction challenges. Methods: In this review, a methodological framework based on PRISMA flow was utilized in which the initial search terms were defined to guide the literature search strategy in online data sources (Scopus and Google Scholar). The inclusion criteria are articles published in the English language, document type (articles and conference papers), and source type (journal and conference proceedings). The exclusion criteria are book series and books. The authors’ search strategy was complemented with ChatGPT-generated keywords to reduce the risk of bias. Report synthesis was achieved by keyword grouping using Microsoft Excel, leading to keyword sorting in ascending order for easy identification of similar and dissimilar keywords. Three independent researchers were used in this research to avoid bias in data collection and synthesis. Articles were retrieved on 27 July 2024. Results: Out of 374 articles, 80 were selected as they were in line with the scope of the study. The review identified the combination of a machine learning technique and deep learning techniques for data limitations and processing of the nonlinear characteristics of air pollutants. ML models, such as random forest, and decision tree classifier were among the commonly used models for air quality index and air quality predictions, with promising performance results. Deep learning models are promising due to the hyper-parameter components, which consist of activation functions suitable for nonlinear spatiotemporal data. The emergence of low-cost devices for data limitations is highlighted, in addition to the use of transfer learning and federated learning models. Again, it is highlighted that military activities and fires impact the O3 concentration, and the best-performing models highlighted in this review could be helpful in developing predictive models for air quality prediction in areas with heavy military activities. Limitation: This review acknowledges methodological challenges in terms of data collection sources, as there are equally relevant materials on other online data sources. Again, the choice and use of keywords for the initial search and the creation of subsequent filter keywords limit the collection of other relevant research articles. Full article
(This article belongs to the Section Atmospheric Techniques, Instruments, and Modeling)
Show Figures

Figure 1

Figure 1
<p>PRISMA flowchart.</p>
Full article ">
28 pages, 57781 KiB  
Article
Edge Computing for Smart-City Human Habitat: A Pandemic-Resilient, AI-Powered Framework
by Atlanta Choudhury, Kandarpa Kumar Sarma, Debashis Dev Misra, Koushik Guha and Jacopo Iannacci
J. Sens. Actuator Netw. 2024, 13(6), 76; https://doi.org/10.3390/jsan13060076 - 6 Nov 2024
Viewed by 381
Abstract
The COVID-19 pandemic has highlighted the need for a robust medical infrastructure and crisis management strategy as part of smart-city applications, with technology playing a crucial role. The Internet of Things (IoT) has emerged as a promising solution, leveraging sensor arrays, wireless communication [...] Read more.
The COVID-19 pandemic has highlighted the need for a robust medical infrastructure and crisis management strategy as part of smart-city applications, with technology playing a crucial role. The Internet of Things (IoT) has emerged as a promising solution, leveraging sensor arrays, wireless communication networks, and artificial intelligence (AI)-driven decision-making. Advancements in edge computing (EC), deep learning (DL), and deep transfer learning (DTL) have made IoT more effective in healthcare and pandemic-resilient infrastructures. DL architectures are particularly suitable for integration into a pandemic-compliant medical infrastructures when combined with medically oriented IoT setups. The development of an intelligent pandemic-compliant infrastructure requires combining IoT, edge and cloud computing, image processing, and AI tools to monitor adherence to social distancing norms, mask-wearing protocols, and contact tracing. The proliferation of 4G and beyond systems including 5G wireless communication has enabled ultra-wide broadband data-transfer and efficient information processing, with high reliability and low latency, thereby enabling seamless medical support as part of smart-city applications. Such setups are designed to be ever-ready to deal with virus-triggered pandemic-like medical emergencies. This study presents a pandemic-compliant mechanism leveraging IoT optimized for healthcare applications, edge and cloud computing frameworks, and a suite of DL tools. The framework uses a composite attention-driven framework incorporating various DL pre-trained models (DPTMs) for protocol adherence and contact tracing, and can detect certain cyber-attacks when interfaced with public networks. The results confirm the effectiveness of the proposed methodologies. Full article
(This article belongs to the Section Big Data, Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Block diagram of the proposed approach.</p>
Full article ">Figure 2
<p>Schematic showing the connection of the IoT–edge computing node to the cloud server for monitoring of the compliance with face-mask-wearing and social distance norms and execute contact tracing.</p>
Full article ">Figure 3
<p>One of the edge nodes of the system.</p>
Full article ">Figure 4
<p>Schematic outlining the deployment of the edge computing nodes and connection with a cloud server as part of a residential block.</p>
Full article ">Figure 5
<p>Hybrid Multi-Head Attention Aided Hybrid Deep Network with Diffusion Stability (HMAAHDNDS).</p>
Full article ">Figure 6
<p>Block diagram of proposed contact-tracing technique.</p>
Full article ">Figure 7
<p>Examples of face masks datasets (<b>a</b>) with masks (<b>b</b>) without mask and (<b>c</b>) incorrect face mask.</p>
Full article ">Figure 8
<p>Datasets of (<b>a</b>) NG face masks and (<b>b</b>) Medical face masks.</p>
Full article ">Figure 9
<p>Model accuracy and loss of face-mask-wearing (<b>a</b>,<b>b</b>) ANN, (<b>c</b>,<b>d</b>) CNN, (<b>e</b>,<b>f</b>) VGG-16, (<b>g</b>,<b>h</b>) MobileNetV2 and (<b>i</b>,<b>j</b>) ResNet50.</p>
Full article ">Figure 10
<p>Face mask classification accuracy and loss: (<b>a</b>,<b>b</b>) ResNet-50, (<b>c</b>,<b>d</b>) mobileNetV2, (<b>e</b>,<b>f</b>) CNN.</p>
Full article ">Figure 11
<p>Incorrect face-mask-wearing accuracy and loss (<b>a</b>,<b>b</b>) MobileNetV2 (<b>c</b>,<b>d</b>) ResNet-50.</p>
Full article ">Figure 12
<p>Text-to-image transform for four different cases of wearing masks: (<b>a</b>) correctly wearing a mask, (<b>b</b>) mask under mouth, (<b>c</b>) mask above mouth, and (<b>d</b>) mask under nose.</p>
Full article ">
21 pages, 402 KiB  
Systematic Review
Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection
by Rafael Abreu, Emanuel Simão, Carlos Serôdio, Frederico Branco and António Valente
AI 2024, 5(4), 2279-2299; https://doi.org/10.3390/ai5040112 - 6 Nov 2024
Viewed by 1128
Abstract
Background: The Internet of Things (IoT) has improved many aspects that have impacted the industry and the people’s daily lives. To begin with, the IoT allows communication to be made across a wide range of devices, from household appliances to industrial machinery. This [...] Read more.
Background: The Internet of Things (IoT) has improved many aspects that have impacted the industry and the people’s daily lives. To begin with, the IoT allows communication to be made across a wide range of devices, from household appliances to industrial machinery. This connectivity allows for a better integration of the pervasive computing, making devices “smart” and capable of interacting with each other and with the corresponding users in a sublime way. However, the widespread adoption of IoT devices has introduced some security challenges, because these devices usually run in environments that have limited resources. As IoT technology becomes more integrated into critical infrastructure and daily life, the need for stronger security measures will increase. These devices are exposed to a variety of cyber-attacks. This literature review synthesizes the current research of artificial intelligence (AI) technologies to improve IoT security. This review addresses key research questions, including: (1) What are the primary challenges and threats that IoT devices face?; (2) How can AI be used to improve IoT security?; (3) What AI techniques are currently being used for this purpose?; and (4) How does applying AI to IoT security differ from traditional methods? Methods: We included a total of 33 peer-reviewed studies published between 2020 and 2024, specifically in journal and conference papers written in English. Studies irrelevant to the use of AI for IoT security, duplicate studies, and articles without full-text access were excluded. The literature search was conducted using scientific databases, including MDPI, ScienceDirect, IEEE Xplore, and SpringerLink. Results were synthesized through a narrative synthesis approach, with the help of the Parsifal tool to organize and visualize key themes and trends. Results: We focus on the use of machine learning, deep learning, and federated learning, which are used for anomaly detection to identify and mitigate the security threats inherent to these devices. AI-driven technologies offer promising solutions for attack detection and predictive analysis, reducing the need for human intervention more significantly. This review acknowledges limitations such as the rapidly evolving nature of IoT technologies, the early-stage development or proprietary nature of many AI techniques, the variable performance of AI models in real-world applications, and potential biases in the search and selection of articles. The risk of bias in this systematic review is moderate. While the study selection and data collection processes are robust, the reliance on narrative synthesis and the limited exploration of potential biases in the selection process introduce some risk. Transparency in funding and conflict of interest reporting reduces bias in those areas. Discussion: The effectiveness of these AI-based approaches can vary depending on the performance of the model and the computational efficiency. In this article, we provide a comprehensive overview of existing AI models applied to IoT security, including machine learning (ML), deep learning (DL), and hybrid approaches. We also examine their role in enhancing the detection accuracy. Despite all the advances, challenges still remain in terms of data privacy and the scalability of AI solutions in IoT security. Conclusion: This review provides a comprehensive overview of ML applications to enhance IoT security. We also discuss and outline future directions, emphasizing the need for collaboration between interested parties and ongoing innovation to address the evolving threat landscape in IoT security. Full article
Show Figures

Figure 1

Figure 1
<p>Bar chart of selected vs. accepted articles.</p>
Full article ">Figure 2
<p>PRISMA 2020 diagram.</p>
Full article ">
18 pages, 718 KiB  
Article
Dynamic Black-Box Model Watermarking for Heterogeneous Federated Learning
by Yuying Liao, Rong Jiang and Bin Zhou
Electronics 2024, 13(21), 4306; https://doi.org/10.3390/electronics13214306 - 1 Nov 2024
Viewed by 483
Abstract
Heterogeneous federated learning, as an innovative variant of federated learning, aims to break through the constraints of vanilla federated learning on the consistency of model architectures to better accommodate the heterogeneity in mobile computing scenarios. It introduces heterogeneous and personalized local models, which [...] Read more.
Heterogeneous federated learning, as an innovative variant of federated learning, aims to break through the constraints of vanilla federated learning on the consistency of model architectures to better accommodate the heterogeneity in mobile computing scenarios. It introduces heterogeneous and personalized local models, which effectively accommodates the heterogeneous data distributions and hardware resource constraints of individual clients, and thus improves computation and communication efficiency. However, it poses a challenge to model ownership protection, as watermarks embedded in the global model are corrupted to varying degrees when they are migrated to a user’s heterogeneous model and cannot continue to provide complete ownership protection in the local models. To tackle these issues, we propose a dynamic black-box model watermarking method for heterogeneous federated learning, PWFed. Specifically, we design an innovative dynamic watermark generation method which is based on generative adversarial network technology and is capable of generating watermark samples that are virtually indistinguishable from the original carriers. This approach effectively solves the limitation of the traditional black-box watermarking technique, which only considers static watermarks, and makes the generated watermarks significantly improved in terms of stealthiness and difficult to detect by potential model thieves, thus enhancing the robustness of the watermarks. In addition, we design two watermark embedding strategies with different granularities in the heterogeneous federated learning environment. During the watermark extraction and validation phase, PWFed accesses watermark samples claiming ownership of the model through an API interface and analyzes the differences between their output and the expected labels. Our experimental results show that PWFed achieves a 99.9% watermark verification rate with only a 0.1–4.8% sacrifice of main task accuracy on the CIFAR10 dataset. Full article
Show Figures

Figure 1

Figure 1
<p>Limitations of existing watermarking methods in heterogeneous federated learning. Watermarks embedded in the global model are damaged when the model is distributed.</p>
Full article ">Figure 2
<p>Fine-grained watermark embedding: After global model aggregation is complete, ➀ the server performs personalization on each local model. Then, ➁ the server uses the watermark sample generator <math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">G</mi> <mi>W</mi> </msub> </semantics></math> to generate the corresponding watermark samples and ➂ embeds the watermarks to each personalized models.</p>
Full article ">Figure 3
<p>Coarse-grained watermark embedding: ➀ Server searchs the target neurons in the global parameter space for watermark embedding and ➁ uses the watermark sample generator <math display="inline"><semantics> <msub> <mi mathvariant="bold-italic">G</mi> <mi>W</mi> </msub> </semantics></math> to generate the watermark samples. ➂ The server carefully embeds the watermark into the target neurons before performing the personalization and sending back the local models.</p>
Full article ">Figure 4
<p>Examples of the original samples (<b>a</b>) and the corresponding watermark samples of PWFed (<b>b</b>), Waffle (<b>c</b>), and BadNets (<b>d</b>).</p>
Full article ">Figure 5
<p>Interference of fine-tuning (<b>a</b>) and pruning (<b>b</b>) on PWFed.</p>
Full article ">Figure 5 Cont.
<p>Interference of fine-tuning (<b>a</b>) and pruning (<b>b</b>) on PWFed.</p>
Full article ">
22 pages, 765 KiB  
Article
A Federated Reinforcement Learning Framework via a Committee Mechanism for Resource Management in 5G Networks
by Jaewon Jeong and Joohyung Lee
Sensors 2024, 24(21), 7031; https://doi.org/10.3390/s24217031 - 31 Oct 2024
Viewed by 437
Abstract
This paper proposes a novel decentralized federated reinforcement learning (DFRL) framework that integrates deep reinforcement learning (DRL) with decentralized federated learning (DFL). The DFRL framework boosts efficient virtual instance scaling in Mobile Edge Computing (MEC) environments for 5G core network automation. It enables [...] Read more.
This paper proposes a novel decentralized federated reinforcement learning (DFRL) framework that integrates deep reinforcement learning (DRL) with decentralized federated learning (DFL). The DFRL framework boosts efficient virtual instance scaling in Mobile Edge Computing (MEC) environments for 5G core network automation. It enables multiple MECs to collaboratively optimize resource allocation without centralized data sharing. In this framework, DRL agents in each MEC make local scaling decisions and exchange model parameters with other MECs, rather than sharing raw data. To enhance robustness against malicious server attacks, we employ a committee mechanism that monitors the DFL process and ensures reliable aggregation of local gradients. Extensive simulations were conducted to evaluate the proposed framework, demonstrating its ability to maintain cost-effective resource usage while significantly reducing blocking rates across diverse traffic conditions. Furthermore, the framework demonstrated strong resilience against adversarial MEC nodes, ensuring reliable operation and efficient resource management. These results validate the framework’s effectiveness in adaptive and efficient resource management, particularly in dynamic and varied network scenarios. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Overall architecture of the proposed framework.</p>
Full article ">Figure 2
<p>The neural network for the policy <math display="inline"><semantics> <mi>π</mi> </semantics></math> takes the state as input and produces the action probabilities for that specific state. The connections correspond to the weights in <math display="inline"><semantics> <mi>θ</mi> </semantics></math>, and the nodes in the hidden layer apply a non-linear activation function.</p>
Full article ">Figure 3
<p>Proposed committee mechanism.</p>
Full article ">Figure 4
<p>Average reward with proposed DFRL framework.</p>
Full article ">Figure 5
<p>The value of <math display="inline"><semantics> <msubsup> <mi>λ</mi> <mi>t</mi> <mi>eval</mi> </msubsup> </semantics></math>.</p>
Full article ">Figure 6
<p>Scaling performance of proposed DFRL framework. (<b>a</b>) Pod count <math display="inline"><semantics> <msub> <mi>d</mi> <mi>on</mi> </msub> </semantics></math>. (<b>b</b>) Blocking rate <math display="inline"><semantics> <mover accent="true"> <mi>b</mi> <mo stretchy="false">^</mo> </mover> </semantics></math>.</p>
Full article ">Figure 7
<p>Mean reward results using a different distribution of arrival rate.</p>
Full article ">Figure 8
<p>Boxplot showing the distribution of mean rewards across different committee and aggregator ratio. The boxes represent the interquartile range (IQR), with the median indicated by the horizontal line inside each box. Whiskers extend to 1.5 times the IQR. (<b>a</b>) Different committee ratio. (<b>b</b>) Different aggregator ratio.</p>
Full article ">Figure 9
<p>Boxplot showing the distribution of mean rewards across different malicious MEC ratios compared with committee-based and non-committee-based DFRL frameworks.</p>
Full article ">
26 pages, 2854 KiB  
Article
Federated Deep Learning Model for False Data Injection Attack Detection in Cyber Physical Power Systems
by Firdous Kausar, Sambrdhi Deo, Sajid Hussain and Zia Ul Haque
Energies 2024, 17(21), 5337; https://doi.org/10.3390/en17215337 - 26 Oct 2024
Viewed by 660
Abstract
Cyber-physical power systems (CPPS) integrate information and communication technology into conventional electric power systems to facilitate bidirectional communication of information and electric power between users and power grids. Despite its benefits, the open communication environment of CPPS is vulnerable to various security attacks. [...] Read more.
Cyber-physical power systems (CPPS) integrate information and communication technology into conventional electric power systems to facilitate bidirectional communication of information and electric power between users and power grids. Despite its benefits, the open communication environment of CPPS is vulnerable to various security attacks. This paper proposes a federated deep learning-based architecture to detect false data injection attacks (FDIAs) in CPPS. The proposed work offers a strong, decentralized alternative with the ability to boost detection accuracy while maintaining data privacy, presenting a significant opportunity for real-world applications in the smart grid. This framework combines state-of-the-art machine learning and deep learning models, which are used in both centralized and federated learning configurations, to boost the detection of false data injection attacks in cyber-physical power systems. In particular, the research uses a multi-stage detection framework that combines several models, including classic machine learning classifiers like Random Forest and ExtraTrees Classifiers, and deep learning architectures such as Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU). The results demonstrate that Bidirectional GRU and LSTM models with attention layers in a federated learning setup achieve superior performance, with accuracy approaching 99.8%. This approach enhances both detection accuracy and data privacy, offering a robust solution for FDIA detection in real-world smart grid applications. Full article
(This article belongs to the Special Issue Research on Security and Data Protection for Energy Systems)
Show Figures

Figure 1

Figure 1
<p>False Data Injection Attack in CPPS.</p>
Full article ">Figure 2
<p>Federated Learning Architecture.</p>
Full article ">Figure 3
<p>Box Plot.</p>
Full article ">Figure 4
<p>Current Voltage distributions. (<b>a</b>) Distribution of Current (R1-PM4:I). (<b>b</b>) Distribution of Voltage Magnitude (R1-PM1:V).</p>
Full article ">Figure 5
<p>Distribution of Events Before and After Class Balancing Using SMOTE. (<b>a</b>) Distribution of Natural Vs Attack events before class balancing. (<b>b</b>) Class distribution after Oversampling using SMOTE.</p>
Full article ">Figure 6
<p>Bidirectional GRU/LSTM with attention layer Model.</p>
Full article ">Figure 7
<p>Receiver Operator Characteristic (ROC) curves of ML models.</p>
Full article ">Figure 8
<p>Comparison of Training Accuracy and Loss Across Various Federated Deep Learning Models.</p>
Full article ">
39 pages, 7800 KiB  
Article
FLCMC: Federated Learning Approach for Chinese Medicinal Text Classification
by Guang Hu and Xin Fang
Entropy 2024, 26(10), 871; https://doi.org/10.3390/e26100871 - 17 Oct 2024
Viewed by 543
Abstract
Addressing the privacy protection and data sharing issues in Chinese medical texts, this paper introduces a federated learning approach named FLCMC for Chinese medical text classification. The paper first discusses the data heterogeneity issue in federated language modeling. Then, it proposes two perturbed [...] Read more.
Addressing the privacy protection and data sharing issues in Chinese medical texts, this paper introduces a federated learning approach named FLCMC for Chinese medical text classification. The paper first discusses the data heterogeneity issue in federated language modeling. Then, it proposes two perturbed federated learning algorithms, FedPA and FedPAP, based on the self-attention mechanism. In these algorithms, the self-attention mechanism is incorporated within the model aggregation module, while a perturbation term, which measures the differences between the client and the server, is added to the local update module along with a customized PAdam optimizer. Secondly, to enable a fair comparison of algorithms’ performance, existing federated algorithms are improved by integrating a customized Adam optimizer. Through experiments, this paper first conducts experimental analyses on hyperparameters, data heterogeneity, and validity on synthetic datasets, which proves that the proposed federated learning algorithm has significant advantages in classification performance and convergence stability when dealing with heterogeneous data. Then, the algorithm is applied to Chinese medical text datasets to verify its effectiveness on real datasets. The comparative analysis of algorithm performance and communication efficiency shows that the algorithm exhibits strong generalization ability on deep learning models for Chinese medical texts. As for the synthetic dataset, upon comparing with comparison algorithms FedAvg, FedProx, FedAtt, and their improved versions, the experimental results show that for data with general heterogeneity, both FedPA and FedPAP show significantly more accurate and stable convergence behavior. On the real Chinese medical dataset of doctor–patient conversations, IMCS-V2, with logistic regression and long short-term memory network as training models, the experiment results show that in comparison to the above three comparison algorithms and their improved versions, FedPA and FedPAP both possess the best accuracy performance and display significantly more stable and accurate convergence behavior, proving that the method in this paper has better classification effects for Chinese medical texts. Full article
(This article belongs to the Section Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>High-level view of FedPAP.</p>
Full article ">Figure 2
<p>Encoder–decoder architecture diagram.</p>
Full article ">Figure 3
<p>Self-attention weight federated aggregation structure diagram.</p>
Full article ">Figure 4
<p>Preprocessing text data fields.</p>
Full article ">Figure 5
<p>Distribution of sample size across different clients.</p>
Full article ">Figure 6
<p>Distribution of the number of categories.</p>
Full article ">Figure 7
<p>Hyperparameter default value: algorithm comparison chart.</p>
Full article ">Figure 8
<p>FedAtt stepsize hyperparameter: experimental result chart.</p>
Full article ">Figure 9
<p>FedAtt seed hyperparameter: experimental result chart.</p>
Full article ">Figure 10
<p>FedAtt num _rounds hyperparameter: experimental result chart.</p>
Full article ">Figure 11
<p>FedPA mu hyperparameter: experimental result chart. (<b>a</b>) mu set to 0.001, 0.01, 0.1 and 1; (<b>b</b>) mu set to 0.01, 0.03, 0.05 and 0.08; (<b>c</b>) mu set to 0.01and 0.03.</p>
Full article ">Figure 12
<p>SGD algorithm comparison result chart.</p>
Full article ">Figure 13
<p>Comparison results of different heterogeneous datasets. (<b>a</b>) <span class="html-italic">synthenic IID</span>; (<b>b</b>) <span class="html-italic">synthenic</span>(0, 0); (<b>c</b>) <span class="html-italic">synthenic</span>(0.5, 0.5); (<b>d</b>) <span class="html-italic">synthenic</span>(1, 1).</p>
Full article ">Figure 14
<p>Experimental analysis of effectiveness of Adam algorithm. (<b>a</b>) FedAvg vs. FedAvgS vs. FedAvgT; (<b>b</b>) FedProx vs. FedProxP; (<b>c</b>) FedAtt vs. FedAttS; (<b>d</b>) FedPA vs. FedPAP.</p>
Full article ">Figure 15
<p>Adam algorithm performance: test analysis.</p>
Full article ">Figure 16
<p>FedPAP mu hyperparameter: experimental result chart.</p>
Full article ">Figure 17
<p>FedAtt stepsize hyperparameter: experimental result chart.</p>
Full article ">Figure 18
<p>FedAtt seed hyperparameter: experimental result chart.</p>
Full article ">Figure 19
<p>Logistic regression model classification performance results chart.</p>
Full article ">Figure 20
<p>LSTM model + SGD classification: performance result chart.</p>
Full article ">Figure 21
<p>LSTM model + Adam classification: performance result chart.</p>
Full article ">
39 pages, 21483 KiB  
Article
SPM-FL: A Federated Learning Privacy-Protection Mechanism Based on Local Differential Privacy
by Zhiyan Chen and Hong Zheng
Electronics 2024, 13(20), 4091; https://doi.org/10.3390/electronics13204091 - 17 Oct 2024
Viewed by 636
Abstract
Federated learning is a widely applied distributed machine learning method that effectively protects client privacy by sharing and computing model parameters on the server side, thus avoiding the transfer of data to third parties. However, information such as model weights can still be [...] Read more.
Federated learning is a widely applied distributed machine learning method that effectively protects client privacy by sharing and computing model parameters on the server side, thus avoiding the transfer of data to third parties. However, information such as model weights can still be analyzed or attacked, leading to potential privacy breaches. Traditional federated learning methods often disturb models by adding Gaussian or Laplacian noise, but under smaller privacy budgets, the large variance of the noise adversely affects model accuracy. To address this issue, this paper proposes a Symmetric Partition Mechanism (SPM), which probabilistically perturbs the sign of local model weight parameters before model aggregation. This mechanism satisfies strict ϵ-differential privacy, while introducing a variance constraint mechanism that effectively reduces the impact of noise interference on model performance. Compared with traditional methods, SPM generates smaller variance under the same privacy budget, thereby improving model accuracy and being applicable to scenarios with varying numbers of clients. Through theoretical analysis and experimental validation on multiple datasets, this paper demonstrates the effectiveness and privacy-protection capabilities of the proposed mechanism. Full article
(This article belongs to the Special Issue AI-Based Solutions for Cybersecurity)
Show Figures

Figure 1

Figure 1
<p>Federated learning framework with local differential privacy protection.</p>
Full article ">Figure 2
<p>The impact of model weights on variance under different privacy budgets [<a href="#B26-electronics-13-04091" class="html-bibr">26</a>].</p>
Full article ">Figure 3
<p>Comparative analysis of model accuracy for different mechanisms under the limited client scenario of the MNIST dataset [<a href="#B26-electronics-13-04091" class="html-bibr">26</a>].</p>
Full article ">Figure 4
<p>Comparative analysis of model accuracy for different mechanisms under the limited client scenario of the Fashion-MNIST dataset [<a href="#B26-electronics-13-04091" class="html-bibr">26</a>].</p>
Full article ">Figure 5
<p>Comparative analysis of model accuracy for different mechanisms under the limited client scenario of the CIFAR-10 dataset (Model 1) [<a href="#B26-electronics-13-04091" class="html-bibr">26</a>].</p>
Full article ">Figure 6
<p>Comparative analysis of model accuracy for different mechanisms under the limited client scenario of the CIFAR-10 dataset (Model 2) [<a href="#B26-electronics-13-04091" class="html-bibr">26</a>].</p>
Full article ">Figure 7
<p>Comparative analysis of model accuracy for different mechanisms under the multi-client scenario of the MNIST dataset [<a href="#B26-electronics-13-04091" class="html-bibr">26</a>].</p>
Full article ">Figure 8
<p>Comparative analysis of model accuracy for different mechanisms under the multi-client scenario of the Fashion-MNIST dataset [<a href="#B26-electronics-13-04091" class="html-bibr">26</a>].</p>
Full article ">Figure 9
<p>Comparative analysis of model accuracy for different mechanisms under the multi-client scenario of the CIFAR-10 dataset (Model 1) [<a href="#B26-electronics-13-04091" class="html-bibr">26</a>].</p>
Full article ">Figure 10
<p>Comparative analysis of model accuracy for different mechanisms in the multi-client scenario of the CIFAR-10 dataset (Model 2) [<a href="#B26-electronics-13-04091" class="html-bibr">26</a>].</p>
Full article ">Figure 11
<p>Variation trend of model accuracy under different privacy budgets in different client scenarios for the MNIST dataset.</p>
Full article ">Figure 12
<p>Variation trend of model accuracy under different privacy budgets in different client scenarios for the Fashion-MNIST dataset.</p>
Full article ">Figure 12 Cont.
<p>Variation trend of model accuracy under different privacy budgets in different client scenarios for the Fashion-MNIST dataset.</p>
Full article ">Figure 13
<p>Variation trend of model accuracy under different privacy budgets in different client scenarios for the CIFAR-10 dataset (Model 1).</p>
Full article ">Figure 13 Cont.
<p>Variation trend of model accuracy under different privacy budgets in different client scenarios for the CIFAR-10 dataset (Model 1).</p>
Full article ">Figure 14
<p>Variation Trend of model accuracy under different privacy budgets in different client scenarios for the CIFAR-10 dataset (Model 2).</p>
Full article ">Figure 14 Cont.
<p>Variation Trend of model accuracy under different privacy budgets in different client scenarios for the CIFAR-10 dataset (Model 2).</p>
Full article ">Figure 15
<p>DLG attack effect on the model under different privacy budgets for the MNIST dataset.</p>
Full article ">Figure 16
<p>DLG attack effect on the model under different privacy budgets for the Fashion-MNIST dataset.</p>
Full article ">Figure 17
<p>DLG attack effect on the model under different privacy budgets for the CIFAR-10 dataset (Model 1).</p>
Full article ">Figure 18
<p>DLG attack effect on the model under different privacy budgets for the CIFAR-10 dataset (Model 2).</p>
Full article ">
17 pages, 1040 KiB  
Article
Enhancing Heart Disease Prediction with Federated Learning and Blockchain Integration
by Yazan Otoum, Chaosheng Hu, Eyad Haj Said and Amiya Nayak
Future Internet 2024, 16(10), 372; https://doi.org/10.3390/fi16100372 - 14 Oct 2024
Viewed by 786
Abstract
Federated learning offers a framework for developing local models across institutions while safeguarding sensitive data. This paper introduces a novel approach for heart disease prediction using the TabNet model, which combines the strengths of tree-based models and deep neural networks. Our study utilizes [...] Read more.
Federated learning offers a framework for developing local models across institutions while safeguarding sensitive data. This paper introduces a novel approach for heart disease prediction using the TabNet model, which combines the strengths of tree-based models and deep neural networks. Our study utilizes the Comprehensive Heart Disease and UCI Heart Disease datasets, leveraging TabNet’s architecture to enhance data handling in federated environments. Horizontal federated learning was implemented using the federated averaging algorithm to securely aggregate model updates across participants. Blockchain technology was integrated to enhance transparency and accountability, with smart contracts automating governance. The experimental results demonstrate that TabNet achieved the highest balanced metrics score of 1.594 after 50 epochs, with an accuracy of 0.822 and an epsilon value of 6.855, effectively balancing privacy and performance. The model also demonstrated strong accuracy with only 10 iterations on aggregated data, highlighting the benefits of multi-source data integration. This work presents a scalable, privacy-preserving solution for heart disease prediction, combining TabNet and blockchain to address key healthcare challenges while ensuring data integrity. Full article
Show Figures

Figure 1

Figure 1
<p>Horizontal federated learning system overview.</p>
Full article ">Figure 2
<p>Decision tree with DNN architecture.</p>
Full article ">Figure 3
<p>TabNet model architecture.</p>
Full article ">Figure 4
<p>Feature transformer architecture.</p>
Full article ">Figure 5
<p>Attentive transformer structure.</p>
Full article ">Figure 6
<p>Training accuracy and loss on the UCI dataset over multiple epochs.</p>
Full article ">Figure 7
<p>Training accuracy and loss on the Cleveland dataset over multiple epochs.</p>
Full article ">Figure 8
<p>Training accuracy and loss on the aggregated dataset.</p>
Full article ">Figure 9
<p>Testing accuracy of the UCI dataset across various epochs.</p>
Full article ">Figure 10
<p>Testing accuracy of the Cleveland dataset across various epochs.</p>
Full article ">Figure 11
<p>Testing accuracy of the aggregated dataset.</p>
Full article ">Figure 12
<p>Testing of UCI data in terms of balanced metrics and accuracy.</p>
Full article ">Figure 13
<p>Testing of Cleveland data in terms of balanced metrics and epsilon.</p>
Full article ">
31 pages, 5936 KiB  
Article
Advanced Optimization Techniques for Federated Learning on Non-IID Data
by Filippos Efthymiadis, Aristeidis Karras, Christos Karras and Spyros Sioutas
Future Internet 2024, 16(10), 370; https://doi.org/10.3390/fi16100370 - 13 Oct 2024
Viewed by 744
Abstract
Federated learning enables model training on multiple clients locally, without the need to transfer their data to a central server, thus ensuring data privacy. In this paper, we investigate the impact of Non-Independent and Identically Distributed (non-IID) data on the performance of federated [...] Read more.
Federated learning enables model training on multiple clients locally, without the need to transfer their data to a central server, thus ensuring data privacy. In this paper, we investigate the impact of Non-Independent and Identically Distributed (non-IID) data on the performance of federated training, where we find a reduction in accuracy of up to 29% for neural networks trained in environments with skewed non-IID data. Two optimization strategies are presented to address this issue. The first strategy focuses on applying a cyclical learning rate to determine the learning rate during federated training, while the second strategy develops a sharing and pre-training method on augmented data in order to improve the efficiency of the algorithm in the case of non-IID data. By combining these two methods, experiments show that the accuracy on the CIFAR-10 dataset increased by about 36% while achieving faster convergence by reducing the number of required communication rounds by 5.33 times. The proposed techniques lead to improved accuracy and faster model convergence, thus representing a significant advance in the field of federated learning and facilitating its application to real-world scenarios. Full article
(This article belongs to the Special Issue Distributed Storage of Large Knowledge Graphs with Mobility Data)
Show Figures

Figure 1

Figure 1
<p>Example of application of the above augmentation techniques to a random CIFAR-10 image.</p>
Full article ">Figure 2
<p>Illustration of the proposed methodology architecture.</p>
Full article ">Figure 3
<p>MNIST IID vs. MNIST non-IID with fixed learning rate.</p>
Full article ">Figure 4
<p>Fashion MNIST IID vs. Fashion MNIST non-IID with fixed learning rate.</p>
Full article ">Figure 5
<p>CIFAR-10 IID vs. CIFAR-10 non-IID with fixed learning rate.</p>
Full article ">Figure 6
<p>Learning rate range test for MNIST.</p>
Full article ">Figure 7
<p>MNIST non-IID with fixed learning rate vs. MNIST non-IID with cyclical learning rate.</p>
Full article ">Figure 8
<p>Learning rate range test for fashion MNIST.</p>
Full article ">Figure 9
<p>Fashion MNIST non-IID with fixed learning rate vs. Fashion MNIST non-IID with CLR.</p>
Full article ">Figure 10
<p>Learning rate range test for CIFAR-10.</p>
Full article ">Figure 11
<p>CIFAR-10 non-IID with fixed learning rate vs. CIFAR-10 non-IID with CLR.</p>
Full article ">Figure 12
<p>CIFAR-10 Fixed LR vs. CIFAR-10 CLR vs. CIFAR-10 CLR + PreTrained.</p>
Full article ">
27 pages, 4378 KiB  
Article
Reputation-Driven Asynchronous Federated Learning for Optimizing Communication Efficiency in Big Data Labeling Systems
by Xuanzhu Sheng, Chao Yu, Yang Zhou and Xiaolong Cui
Mathematics 2024, 12(18), 2932; https://doi.org/10.3390/math12182932 - 20 Sep 2024
Viewed by 489
Abstract
With the continuous improvement of the performance of artificial intelligence and neural networks, a new type of computing architecture-edge computing, came into being. However, when the scale of hybrid intelligent edge systems expands, there are redundant communications between the node and the parameter [...] Read more.
With the continuous improvement of the performance of artificial intelligence and neural networks, a new type of computing architecture-edge computing, came into being. However, when the scale of hybrid intelligent edge systems expands, there are redundant communications between the node and the parameter server; the cost of these redundant communications cannot be ignored. This paper proposes a reputation-based asynchronous model update scheme and formulates the federated learning scheme as an optimization problem. First, the explainable reputation consensus mechanism for hybrid intelligent labeling systems communication is proposed. Then, during the process of local intelligent data annotation, significant challenges in consistency, personalization, and privacy protection posed by the federated recommendation system prompted the development of a novel federated recommendation framework utilizing a graph neural network. Additionally, the method of information interaction model fusion was adopted to address data heterogeneity and enhance the uniformity of distributed intelligent annotation. Furthermore, to mitigate communication delays and overhead, an asynchronous federated learning mechanism was devised based on the proposed reputation consensus mechanism. This mechanism leverages deep reinforcement learning to optimize the selection of participating nodes, aiming to maximize system utility and streamline data sharing efficiency. Lastly, integrating the learned models into blockchain technology and conducting validation ensures the reliability and security of shared data. Numerical findings underscore that the proposed federated learning scheme achieves higher learning accuracy and enhances communication efficiency. Full article
(This article belongs to the Special Issue New Advances of Operations Research and Analysis)
Show Figures

Figure 1

Figure 1
<p>Distributed data center computing architecture diagram.</p>
Full article ">Figure 2
<p>The proposed framework for distributed training based on graph convolutional networks.</p>
Full article ">Figure 3
<p>The proposed flexible proof of reputation mechanism based on a private model, public data, private data, and renew data.</p>
Full article ">Figure 4
<p>The reputation-based explainability fusion diagram based on the attention GCN network.</p>
Full article ">Figure 5
<p>This is a data sharing process figure.</p>
Full article ">Figure 6
<p>The accuracy value with the change of epoch from zero to fifty showed an upward trend and tended to be stable at about 98%.</p>
Full article ">Figure 7
<p>The loss function with the change of epoch from zero to fifty showed a downward trend and leveled off at about 53%.</p>
Full article ">Figure 8
<p>As the epoch varies from 0 to 30, the global accuracy varies with epoch from 0 to 30, and the model needs to be fused and interacted five times in 30 iterations, but the accuracy cannot be maintained.</p>
Full article ">Figure 9
<p>The fused consensus graph fluctuates up and down as the epoch changes from 0 to 30 but is guaranteed to stay above 95%, and through the fusion mechanism, the model only needs to fuse and interact four times to reach the goal.</p>
Full article ">Figure 10
<p>The updating epochs for different companies.</p>
Full article ">Figure 11
<p>Corresponds to the aforementioned <a href="#mathematics-12-02932-f009" class="html-fig">Figure 9</a>, with the respective labels (<b>a</b>), (<b>b</b>), (<b>c</b>), and (<b>d</b>) representing the numerical values 1, 2, 3, and 4, respectively.</p>
Full article ">Figure 12
<p>The accuracy of compared methods.</p>
Full article ">
17 pages, 4471 KiB  
Article
Machine Learning Applications in Prediction Models for COVID-19: A Bibliometric Analysis
by Hai Lv, Yangyang Liu, Huimin Yin, Jingzhi Xi and Pingmin Wei
Information 2024, 15(9), 575; https://doi.org/10.3390/info15090575 - 18 Sep 2024
Viewed by 1296
Abstract
The COVID-19 pandemic has had a profound impact on global health, inspiring the widespread use of machine learning in combating the disease, particularly in prediction models. This study aimed to assess academic publications utilizing machine learning prediction models to combat COVID-19. We analyzed [...] Read more.
The COVID-19 pandemic has had a profound impact on global health, inspiring the widespread use of machine learning in combating the disease, particularly in prediction models. This study aimed to assess academic publications utilizing machine learning prediction models to combat COVID-19. We analyzed 2422 original articles published between 2020 and 2023 with bibliometric tools such as Histcite Pro 2.1, Bibliometrix, CiteSpace, and VOSviewer. The United States, China, and India emerged as the most prolific countries, with Stanford University producing the most publications and Huazhong University of Science and Technology receiving the most citations. The National Natural Science Foundation of China and the National Institutes of Health have made significant contributions to this field. Scientific Reports is the most frequent journal for publishing these articles. Current research focuses on deep learning, federated learning, image classification, air pollution, mental health, sentiment analysis, and drug repurposing. In conclusion, this study provides detailed insights into the key authors, countries, institutions, funding agencies, and journals in the field, as well as the most frequently used keywords. Full article
(This article belongs to the Special Issue Real-World Applications of Machine Learning Techniques)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>The flowchart for publication selection in this study.</p>
Full article ">Figure 2
<p>Basic information on the bibliometric analysis included.</p>
Full article ">Figure 3
<p>Overall publication trends and citations, 2020–2023.</p>
Full article ">Figure 4
<p>Author collaboration network analysis using VOSviewer.</p>
Full article ">Figure 5
<p>Visual maps of international cooperation between the countries.</p>
Full article ">Figure 6
<p>Visual map of collaborating institutions.</p>
Full article ">Figure 7
<p>Co-occurrence analysis of keywords based on VOSviewer.</p>
Full article ">Figure 8
<p>Keyword clustering maps for 2020, 2021, 2022, and 2023 based on CiteSpace.</p>
Full article ">
28 pages, 24699 KiB  
Article
Enhancing Autism Spectrum Disorder Classification with Lightweight Quantized CNNs and Federated Learning on ABIDE-1 Dataset
by Simran Gupta, Md. Rahad Islam Bhuiyan, Sadia Sultana Chowa, Sidratul Montaha, Rashik Rahman, Sk. Tanzir Mehedi and Ziaur Rahman
Mathematics 2024, 12(18), 2886; https://doi.org/10.3390/math12182886 - 16 Sep 2024
Viewed by 890
Abstract
Autism spectrum disorder (ASD) is a complex neurodevelopmental condition that presents significant diagnostic challenges due to its varied symptoms and nature. This study aims to improve ASD classification using advanced deep learning techniques applied to neuroimaging data. We developed an automated system leveraging [...] Read more.
Autism spectrum disorder (ASD) is a complex neurodevelopmental condition that presents significant diagnostic challenges due to its varied symptoms and nature. This study aims to improve ASD classification using advanced deep learning techniques applied to neuroimaging data. We developed an automated system leveraging the ABIDE-1 dataset and a novel lightweight quantized one-dimensional (1D) Convolutional Neural Network (Q-CNN) model to analyze fMRI data. Our approach employs the NIAK pipeline with multiple brain atlases and filtering methods. Initially, the Regions of Interest (ROIs) are converted into feature vectors using tangent space embedding to feed into the Q-CNN model. The proposed 1D-CNN is quantized through Quantize Aware Training (QAT). As the quantization method, int8 quantization is utilized, which makes it both robust and lightweight. We propose a federated learning (FL) framework to ensure data privacy, which allows decentralized training across different data centers without compromising local data security. Our findings indicate that the CC200 brain atlas, within the NIAK pipeline’s filt-global filtering methods, provides the best results for ASD classification. Notably, the ASD classification outcomes have achieved a significant test accuracy of 98% using the CC200 and filt-global filtering techniques. To the best of our knowledge, this performance surpasses previous studies in the field, highlighting a notable enhancement in ASD detection from fMRI data. Furthermore, the FL-based Q-CNN model demonstrated robust performance and high efficiency on a Raspberry Pi 4, underscoring its potential for real-world applications. We exhibit the efficacy of the Q-CNN model by comparing its inference time, power consumption, and storage requirements with those of the 1D-CNN, quantized CNN, and the proposed int8 Q-CNN models. This research has made several key contributions, including the development of a lightweight int8 Q-CNN model, the application of FL for data privacy, and the evaluation of the proposed model in real-world settings. By identifying optimal brain atlases and filtering methods, this study provides valuable insights for future research in the field of neurodevelopmental disorders. Full article
(This article belongs to the Special Issue Advances in Mathematics Computation for Software Engineering)
Show Figures

Figure 1

Figure 1
<p>Proposed methodology diagram.</p>
Full article ">Figure 2
<p>Comparative analysis of functional connectomes in Autism Spectrum Disorder (ASD) and control participants.</p>
Full article ">Figure 3
<p>The architecture of proposed CNN model.</p>
Full article ">Figure 4
<p>The architecture of proposed Q-CNN. (<b>a</b>) Dense layer before quantization. (<b>b</b>) Dense layer after quantization.</p>
Full article ">Figure 5
<p>Federated learning framework based on CXR images where each client represents a hospital.</p>
Full article ">Figure 6
<p>Confusion matrix for CC200 atlas in filt-global filtering method.</p>
Full article ">Figure 7
<p>Accuracy and loss curve of CC200 atlas with TFLite Quantized CNN model in filt-global method.</p>
Full article ">Figure 8
<p>Confusion matrix for CC200 atlas in filt-noglobal filtering method.</p>
Full article ">Figure 9
<p>Accuracy and loss curves of CC200 atlas with Int8 Quantized CNN model in filt-noglobal method.</p>
Full article ">Figure 10
<p>Confusion matrix for CC200 atlas in nofilt-global filtering method.</p>
Full article ">Figure 11
<p>Accuracy and loss curves of CC200 atlas with Int8 Quantized CNN mod in nofilt-global method.</p>
Full article ">Figure 12
<p>Confusion matrix for CC200 atlas in nofilt-noglobal filtering method.</p>
Full article ">Figure 13
<p>Loss and accuracy curves of CC200 atlas with Int8 Quantized CNN mod in nofilt-noglobal method.</p>
Full article ">Figure 14
<p>Illustration of Flash Occupancy, Average Inference time, and Average power consumptions of pipelines.</p>
Full article ">
Back to TopTop