Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (107)

Search Parameters:
Keywords = multi-gateway

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 941 KiB  
Article
Embedding Tree-Based Intrusion Detection System in Smart Thermostats for Enhanced IoT Security
by Abbas Javed, Muhammad Naeem Awais, Ayyaz-ul-Haq Qureshi, Muhammad Jawad, Jehangir Arshad and Hadi Larijani
Sensors 2024, 24(22), 7320; https://doi.org/10.3390/s24227320 - 16 Nov 2024
Viewed by 262
Abstract
IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks. Intrusion detection systems (IDS) are designed to detect and respond to these threats in IoT environments. While [...] Read more.
IoT devices with limited resources, and in the absence of gateways, become vulnerable to various attacks, such as denial of service (DoS) and man-in-the-middle (MITM) attacks. Intrusion detection systems (IDS) are designed to detect and respond to these threats in IoT environments. While machine learning-based IDS have typically been deployed at the edge (gateways) or in the cloud, in the absence of gateways, the IDS must be embedded within the sensor nodes themselves. Available datasets mainly contain features extracted from network traffic at the edge (e.g., Raspberry Pi/computer) or cloud servers. We developed a unique dataset, named as Intrusion Detection in the Smart Homes (IDSH) dataset, which is based on features retrievable from microcontroller-based IoT devices. In this work, a Tree-based IDS is embedded into a smart thermostat for real-time intrusion detection. The results demonstrated that the IDS achieved an accuracy of 98.71% for binary classification with an inference time of 276 microseconds, and an accuracy of 97.51% for multi-classification with an inference time of 273 microseconds. Real-time testing showed that the smart thermostat is capable of detecting DoS and MITM attacks without relying on a gateway or cloud. Full article
(This article belongs to the Special Issue Sensor Data Privacy and Intrusion Detection for IoT Networks)
Show Figures

Figure 1

Figure 1
<p>Proposed architecture of embedded IDS for smart thermostats.</p>
Full article ">Figure 2
<p>Dataset collection on smart thermostats.</p>
Full article ">Figure 3
<p>Comparison of IDS implemented with quantization and without quantization.</p>
Full article ">Figure 4
<p>Comparison of IDS implemented with CatBoost and XGBoost on the smart thermostat.</p>
Full article ">
19 pages, 5647 KiB  
Article
Using DL Models in the Service Layer to Enhance the Fault Tolerance of IoT Networks
by Sastry Kodanda Rama Jammalamadaka, Bhupati Chokara, Sasi Bhanu Jammalamadaka and Balakrishna Kamesh Duvvuri
Electronics 2024, 13(22), 4334; https://doi.org/10.3390/electronics13224334 - 5 Nov 2024
Viewed by 417
Abstract
In an IoT network, the networked servers form a service layer, providing services to the users and the devices. The request to the service servers is routed through the gateway on one side of the services layer and the networked controllers on the [...] Read more.
In an IoT network, the networked servers form a service layer, providing services to the users and the devices. The request to the service servers is routed through the gateway on one side of the services layer and the networked controllers on the other side. Data are transported from the sensors/devices through cluster heads en route to base stations and the controllers to the service servers, where the data are processed and sent for storage in the cloud through gateways. When any device is broken down or becomes non-operational, the inputs are not sensed, creating a gap in the data. The data transmitted from the devices would then become an incomplete flow; such data are not suitable for undertaking data analytics or predictions. The missing data must be first identified as the data flow and estimated or predicated to complete the data before they are transmitted through the cloud for storage and subsequent retrievals. This paper proposes a recurrent (RNN) neural network to predict the missing data. Two models are tested to predict the missing data: the multi-layer perceptron (MLP) model and a long short-term memory (LSTM)-based RNN model. The RNN-based model provides 99.66% accurate data prediction compared to other models. Full article
Show Figures

Figure 1

Figure 1
<p>An example IoT network illustrating different layers.</p>
Full article ">Figure 2
<p>Overall methodology for effecting improvements in fault tolerance of the IoT network up to the service layer.</p>
Full article ">Figure 3
<p>Service architecture of an IoT network.</p>
Full article ">Figure 4
<p>The method handles missing data in the service layer.</p>
Full article ">Figure 5
<p>Prototype non-linear network.</p>
Full article ">Figure 6
<p>Linearized IoT network.</p>
Full article ">Figure 7
<p>FTA diagram for sample IoT network.</p>
Full article ">
33 pages, 20655 KiB  
Article
An Adaptive Data Rate Algorithm for Power-Constrained End Devices in Long Range Networks
by Honggang Wang, Baorui Zhao, Xiaolei Liu, Ruoyu Pan, Shengli Pang and Jiwei Song
Mathematics 2024, 12(21), 3371; https://doi.org/10.3390/math12213371 - 28 Oct 2024
Viewed by 509
Abstract
LoRa (long range) is a communication technology that employs chirp spread spectrum modulation. Among various low-power wide area network (LPWAN) technologies, LoRa offers unique advantages, including low power consumption, long transmission distance, strong anti-interference capability, and high network capacity. Addressing the issue of [...] Read more.
LoRa (long range) is a communication technology that employs chirp spread spectrum modulation. Among various low-power wide area network (LPWAN) technologies, LoRa offers unique advantages, including low power consumption, long transmission distance, strong anti-interference capability, and high network capacity. Addressing the issue of power-constrained end devices in IoT application scenarios, this paper proposes an adaptive data rate (ADR) algorithm for LoRa networks designed for power-constrained end devices (EDs). The algorithm evaluates the uplink communication link state between the EDs and the gateway (GW) by using a combined weighting method to comprehensively assess the signal-to-noise ratio (SNR), received signal strength indication (RSSI), and packet reception rate (PRR), and calculates a list of transmission power and data rates that ensure stable and reliable communication between the EDs and the GW. By using ED power consumption models, network throughput models, and ED latency models to evaluate network performance, the Zebra optimization algorithm is employed to find the optimal data rate for each ED under power-constrained conditions while maximizing network performance. Test results show that, in a single ED scenario, the average PRR achieved by the proposed ADR algorithm for power-constrained EDs in LoRa networks is 14% higher than that of the standard LoRaWAN ADR algorithm. In a multi-ED link scenario (50 end devices), the proposed method reduces the average power consumption of EDs by 10% compared to LoRaWAN ADR, achieves a network throughput of 6683 bps, and an average latency of 2.10 s, demonstrating superior performance overall. The proposed method shows unique advantages in LoRa networks with power-constrained EDs and a large number of EDs, as it not only reduces the average power consumption of the EDs but also optimizes network throughput and average latency. Full article
Show Figures

Figure 1

Figure 1
<p>LoRaWAN network architecture.</p>
Full article ">Figure 2
<p>Link state scoring FAHP evaluation model.</p>
Full article ">Figure 3
<p>Network throughput variation with different SFs when CR = 4/5 and TP = 17 dBm.</p>
Full article ">Figure 4
<p>Physical diagram of ED hardware.</p>
Full article ">Figure 5
<p>ED normal operating state classification.</p>
Full article ">Figure 6
<p>ED failed data frame transmission state classification.</p>
Full article ">Figure 7
<p>Comparison of ED transmission power consumption at different data rates and transmission power levels.</p>
Full article ">Figure 8
<p>Relationship between the number of EDs and average latency at different SFs.</p>
Full article ">Figure 9
<p>Overall flowchart of the ADR algorithm.</p>
Full article ">Figure 10
<p>Schematic diagram of gateway hardware architecture.</p>
Full article ">Figure 11
<p>Physical image of the gateway.</p>
Full article ">Figure 12
<p>Schematic diagram of the ED hardware architecture.</p>
Full article ">Figure 13
<p>Physical image of the ED.</p>
Full article ">Figure 14
<p>Functional design of the NS.</p>
Full article ">Figure 15
<p>Schematic diagram of GW and ED distribution at different distances.</p>
Full article ">Figure 16
<p>PRR variation curve at different distances for different ADR algorithms of a single ED.</p>
Full article ">Figure 17
<p>Comparison of average PRR at different distances for different ADR algorithms of a single ED.</p>
Full article ">Figure 18
<p>Deployment distribution of GW and ED in the LoRa network.</p>
Full article ">Figure 19
<p>Actual deployment of GW and EDs.</p>
Full article ">Figure 20
<p>Comparison of average power consumption of EDs for different ADR algorithms.</p>
Full article ">Figure 21
<p>Comparison of network throughput and average latency of EDs for different ADR algorithms.</p>
Full article ">
45 pages, 1074 KiB  
Review
A Survey of Advanced Border Gateway Protocol Attack Detection Techniques
by Ben A. Scott, Michael N. Johnstone and Patryk Szewczyk
Sensors 2024, 24(19), 6414; https://doi.org/10.3390/s24196414 - 3 Oct 2024
Viewed by 786
Abstract
The Internet’s default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often contributing to an unacceptable computational cost. Efforts to detect anomalous activity in [...] Read more.
The Internet’s default inter-domain routing system, the Border Gateway Protocol (BGP), remains insecure. Detection techniques are dominated by approaches that involve large numbers of features, parameters, domain-specific tuning, and training, often contributing to an unacceptable computational cost. Efforts to detect anomalous activity in the BGP have been almost exclusively focused on single observable monitoring points and Autonomous Systems (ASs). BGP attacks can exploit and evade these limitations. In this paper, we review and evaluate categories of BGP attacks based on their complexity. Previously identified next-generation BGP detection techniques remain incapable of detecting advanced attacks that exploit single observable detection approaches and those designed to evade public routing monitor infrastructures. Advanced BGP attack detection requires lightweight, rapid capabilities with the capacity to quantify group-level multi-viewpoint interactions, dynamics, and information. We term this approach advanced BGP anomaly detection. This survey evaluates 178 anomaly detection techniques and identifies which are candidates for advanced attack anomaly detection. Preliminary findings from an exploratory investigation of advanced BGP attack candidates are also reported. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>BGP-speaking router.</p>
Full article ">Figure 2
<p>Noisy BGP hijack.</p>
Full article ">Figure 3
<p>Prefix hijack.</p>
Full article ">Figure 4
<p>Subprefix hijack.</p>
Full article ">Figure 5
<p>AS path forgery hijacks.</p>
Full article ">Figure 6
<p>BGP hijacks and interceptions to compromise CAs.</p>
Full article ">Figure 7
<p>MED modification.</p>
Full article ">Figure 8
<p>Attack was neither stored nor detected.</p>
Full article ">Figure 9
<p>BGP-speaking router control and data planes.</p>
Full article ">Figure 10
<p>MP leader–follower dynamics for BGP detection.</p>
Full article ">Figure 11
<p>MdRQA group anomaly detection.</p>
Full article ">Figure 12
<p>Trajectory in phase space of Lorenz Attractor.</p>
Full article ">
28 pages, 2513 KiB  
Article
ROS Gateway: Enhancing ROS Availability across Multiple Network Environments
by Byoung-Youl Song and Hoon Choi
Sensors 2024, 24(19), 6297; https://doi.org/10.3390/s24196297 - 29 Sep 2024
Viewed by 618
Abstract
As the adoption of large-scale model-based AI grows, the field of robotics is undergoing significant changes. The emergence of cloud robotics, where advanced tasks are offloaded to fog or cloud servers, is gaining attention. However, the widely used Robot Operating System (ROS) does [...] Read more.
As the adoption of large-scale model-based AI grows, the field of robotics is undergoing significant changes. The emergence of cloud robotics, where advanced tasks are offloaded to fog or cloud servers, is gaining attention. However, the widely used Robot Operating System (ROS) does not support communication between robot software across different networks. This paper introduces ROS Gateway, a middleware designed to improve the usability and extend the communication range of ROS in multi-network environments, which is important for processing sensor data in cloud robotics. We detail its structure, protocols, and algorithms, highlighting improvements over traditional ROS configurations. The ROS Gateway efficiently handles high-volume data from advanced sensors such as depth cameras and LiDAR, ensuring reliable transmission. Based on the rosbridge protocol and implemented in Python 3, ROS Gateway is compatible with rosbridge-based tools and runs on both x86 and ARM-based Linux environments. Our experiments show that the ROS Gateway significantly improves performance metrics such as topic rate and delay compared to standard ROS setups. We also provide predictive formulas for topic receive rates to guide the design and deployment of robotic applications using ROS Gateway, supporting performance estimation and system optimization. These enhancements are essential for developing responsive and intelligent robotic systems in dynamic environments. Full article
(This article belongs to the Section Sensors and Robotics)
Show Figures

Figure 1

Figure 1
<p>Example of a ROS-Based robotic application in cloud or fog Configuration. Subnet <math display="inline"><semantics> <mi>α</mi> </semantics></math> is a subnet to which multiple hosts that constitute cloud or fog computing are connected. Subnet <math display="inline"><semantics> <mi>β</mi> </semantics></math> is a subnet to which robots are connected, or a local host network within the robot. Subnet <math display="inline"><semantics> <mi>γ</mi> </semantics></math> is a subnet to which a control system consisting of multiple hosts in a remote location is connected, though not a subnet in which robots are included.</p>
Full article ">Figure 2
<p>The Gateway architecture. * The Client Worker is activated when a configuration that enables connectivity to a gateway in a different network is applied. ** Server Workers are initially created with a single process for receiving commands from external sources. Subsequently, a new process is assigned based on the client that establishes a connection.</p>
Full article ">Figure 3
<p>Comparison of ROS topic transmission rates for different configurations: The configurations include the use of ROS on a single device (<span class="html-italic">ros2-localhost</span>) and local subnet (<span class="html-italic">ros2-subnet</span>), the use of the Gateway on separate networks (<span class="html-italic">Gateway-pub-json, Gateway-sub-json, Gateway-sub-raw</span>), and the use of rosbridge on separate networks (<span class="html-italic">rosbridge-pub-json, rosbridge-sub-json, rosbridge-sub-raw</span>). The best performance for each configuration is plotted, with error bars representing the worst performance. Higher values indicate superior performance.</p>
Full article ">Figure 4
<p>Comparison of ROS topic transmission delay for different configurations: The configurations include the use of ROS on a single device (<span class="html-italic">ros2-localhost</span>) and local subnet (<span class="html-italic">ros2-subnet</span>), the use of the Gateway on separate networks (<span class="html-italic">Gateway-pub-json, Gateway-sub-json, Gateway-sub-raw</span>), and the use of rosbridge on separate networks (<span class="html-italic">rosbridge-pub-json, rosbridge-sub-json, rosbridge-sub-raw</span>). A log scale is used to illustrate the delay values. The minimum delay for each configuration is plotted, and the error bars represent the maximum delay. Lower values indicate better performance. The horizontal dashed lines on the graph represent the real-time limit delay at each occurrence rate.</p>
Full article ">Figure 5
<p>Observed topic rates by Gateway configurations and sensor publishing rates: The configurations include the use of ROS on a single device (<span class="html-italic">ros2-localhost</span>) and local subnet (<span class="html-italic">ros2-subnet</span>), as well as the use of the Gateway on each option. The best performance for each configuration is plotted, with error bars representing the worst performance. Higher values indicate superior performance.</p>
Full article ">Figure 6
<p>Observed topic delays by Gateway configurations and sensor publishing rates: The configurations include the use of ROS on a single device (<span class="html-italic">ros2-localhost</span>) and local subnet (<span class="html-italic">ros2-subnet</span>), as well as the use of the Gateway on each option. A log scale is used to illustrate the delay values. The minimum delay for each configuration is plotted, and the error bars represent the maximum delay. Lower values indicate better performance. The horizontal dashed lines on the graph represent the real-time limit delay at each occurrence rate.</p>
Full article ">Figure A1
<p>Topic task sequence diagram.</p>
Full article ">Figure A2
<p>Service task sequence diagram.</p>
Full article ">Figure A3
<p>Action task sequence diagram.</p>
Full article ">
19 pages, 39317 KiB  
Article
A Low-Cost Sensor Network for Monitoring Peatland
by Hazel Louise Mitchell, Simon J. Cox and Hugh G. Lewis
Sensors 2024, 24(18), 6019; https://doi.org/10.3390/s24186019 - 18 Sep 2024
Viewed by 753
Abstract
Peatlands across the world are vital carbon stores. However, human activities have caused the degradation of many sites, increasing their greenhouse gas emissions and vulnerability to wildfires. Comprehensive monitoring of peatlands is essential for their protection, tracking degradation and restoration, but current techniques [...] Read more.
Peatlands across the world are vital carbon stores. However, human activities have caused the degradation of many sites, increasing their greenhouse gas emissions and vulnerability to wildfires. Comprehensive monitoring of peatlands is essential for their protection, tracking degradation and restoration, but current techniques are limited by cost, poor reliability and low spatial or temporal resolution. This paper covers the research, development, deployment and performance of a resilient and modular multi-purpose wireless sensor network as an alternative means of monitoring peatlands. The sensor network consists of four sensor nodes and a gateway and measures temperature, humidity, soil moisture, carbon dioxide and methane. The sensor nodes transmit measured data over LoRaWAN to The Things Network every 30 min. To increase the maximum possible deployment duration, a novel datastring encoder was implemented which reduced the transmitted datastring length by 23%. This system was deployed in a New Forest (Hampshire, UK) peatland site for two months and collected more than 7500 measurements. This deployment demonstrated that low-cost sensor networks have the potential to improve the temporal and spatial resolution of peatland emission monitoring beyond what is achievable with traditional monitoring techniques. Full article
Show Figures

Figure 1

Figure 1
<p>Maps showing the location of the sensor node deployment. (<b>Top left</b>): location within England; (<b>Top Right</b>): regional site location; (<b>Bottom</b>): node locations within Dibden Bottom (Ordnance Survey Map Reference: SU3906).</p>
Full article ">Figure 2
<p>The overall architecture of the wireless sensor network. The local network of nodes (<b>left</b>) collects and transmits data to a gateway node, which forwards data to The Things Network via cellular networks. In the Cloud (<b>centre</b>), these data are again forwarded on to Thingspeak. Data on Thingspeak can then be viewed on a computer using WiFi (<b>right</b>).</p>
Full article ">Figure 3
<p>The architecture of the sensor nodes.</p>
Full article ">Figure 4
<p>Estimated methane concentration from the trained models for the reference sensor and the Node B field sensor during the pre-deployment calibration experiment.</p>
Full article ">Figure 5
<p>CO<sub>2</sub> sensor outputs from the pre-deployment calibration experiment. (<b>a</b>) Raw sensor outputs (<b>b</b>) Calibrated using relative scaling factors. The manufacturer’s stated deviation, 30 ppm + 3% of the measured value is indicated by the shaded region.</p>
Full article ">Figure 6
<p>A diagram showing the components of the standard hexadecimal encoding format.</p>
Full article ">Figure 7
<p>A photograph of Node C following deployment.</p>
Full article ">Figure 8
<p>Overview of the data collected by the sensor nodes across the two deployment periods, following error filtering.</p>
Full article ">Figure 9
<p>December 2021–January 2022 raw soil temperature data from nodes D &amp; E, annotated to highlight examples of each error type described in <a href="#sec3dot3dot2-sensors-24-06019" class="html-sec">Section 3.3.2</a>.</p>
Full article ">
16 pages, 5331 KiB  
Article
A Gateway API-Based Data Fusion Architecture for Automated User Interaction with Historical Handwritten Manuscripts
by Christos Spandonidis, Fotis Giannopoulos and Kyriakoula Arvaniti
Heritage 2024, 7(9), 4631-4646; https://doi.org/10.3390/heritage7090218 - 27 Aug 2024
Viewed by 586
Abstract
To preserve handwritten historical documents, libraries are choosing to digitize them, ensuring their longevity and accessibility. However, the true value of these digitized images lies in their transcription into a textual format. In recent years, various tools have been developed utilizing both traditional [...] Read more.
To preserve handwritten historical documents, libraries are choosing to digitize them, ensuring their longevity and accessibility. However, the true value of these digitized images lies in their transcription into a textual format. In recent years, various tools have been developed utilizing both traditional and AI-based models to address the challenges of deciphering handwritten texts. Despite their importance, there are still several obstacles to overcome, such as the need for scalable and modular solutions, as well as the ability to cater to a continuously growing user community autonomously. This study focuses on introducing a new information fusion architecture, specifically highlighting the Gateway API. Developed as part of the μDoc.tS research program, this architecture aims to convert digital images of manuscripts into electronic text, ensuring secure and efficient routing of requests from front-end applications to the back end of the information system. The validation of this architecture demonstrates its efficiency in handling a large volume of requests and effectively distributing the workload. One significant advantage of this proposed method is its compatibility with everyday devices, eliminating the need for extensive computational infrastructures. It is believed that the scalability and modularity of this architecture can pave the way for a unified multi-platform solution, connecting diverse user environments and databases. Full article
Show Figures

Figure 1

Figure 1
<p>The μDoc.tS information system architecture.</p>
Full article ">Figure 2
<p>The Ocelot architecture with Identity Server authorization.</p>
Full article ">Figure 3
<p>The API Gateway general architecture.</p>
Full article ">Figure 4
<p>Application certification request management process.</p>
Full article ">Figure 5
<p>Task sequence and method allocation for each task.</p>
Full article ">Figure 6
<p>System functionality user scenarios.</p>
Full article ">Figure 7
<p>Development package user scenarios.</p>
Full article ">Figure 8
<p>Script execution results with 100 concurrent users.</p>
Full article ">Figure 9
<p>Script execution results with 1000 concurrent users.</p>
Full article ">Figure 10
<p>Script execution results with 10,000 concurrent users.</p>
Full article ">
19 pages, 1186 KiB  
Article
PrismParser: A Framework for Implementing Efficient P4-Programmable Packet Parsers on FPGA
by Parisa Mashreghi-Moghadam, Tarek Ould-Bachir and Yvon Savaria
Future Internet 2024, 16(9), 307; https://doi.org/10.3390/fi16090307 - 27 Aug 2024
Viewed by 593
Abstract
The increasing complexity of modern networks and their evolving needs demand flexible, high-performance packet processing solutions. The P4 language excels in specifying packet processing in software-defined networks (SDNs). Field-programmable gate arrays (FPGAs) are ideal for P4-based packet parsers due to their reconfigurability and [...] Read more.
The increasing complexity of modern networks and their evolving needs demand flexible, high-performance packet processing solutions. The P4 language excels in specifying packet processing in software-defined networks (SDNs). Field-programmable gate arrays (FPGAs) are ideal for P4-based packet parsers due to their reconfigurability and ability to handle data transmitted at high speed. This paper introduces three FPGA-based P4-programmable packet parsing architectural designs that translate P4 specifications into adaptable hardware implementations called base, overlay, and pipeline, each optimized for different packet parsing performance. As modern network infrastructures evolve, the need for multi-tenant environments becomes increasingly critical. Multi-tenancy allows multiple independent users or organizations to share the same physical network resources while maintaining isolation and customized configurations. The rise of 5G and cloud computing has accelerated the demand for network slicing and virtualization technologies, enabling efficient resource allocation and management for multiple tenants. By leveraging P4-programmable packet parsers on FPGAs, our framework addresses these challenges by providing flexible and scalable solutions for multi-tenant network environments. The base parser offers a simple design for essential packet parsing, using minimal resources for high-speed processing. The overlay parser extends the base design for parallel processing, supporting various bus sizes and throughputs. The pipeline parser boosts throughput by segmenting parsing into multiple stages. The efficiency of the proposed approaches is evaluated through detailed resource consumption metrics measured on an Alveo U280 board, demonstrating throughputs of 15.2 Gb/s for the base design, 15.2 Gb/s to 64.42 Gb/s for the overlay design, and up to 282 Gb/s for the pipelined design. These results demonstrate a range of high performances across varying throughput requirements. The proposed approach utilizes a system that ensures low latency and high throughput that yields streaming packet parsers directly from P4 programs, supporting parsing graphs with up to seven transitioning nodes and four connections between nodes. The functionality of the parsers was tested on enterprise networks, a firewall, and a 5G Access Gateway Function graph. Full article
(This article belongs to the Special Issue Convergence of Edge Computing and Next Generation Networking)
Show Figures

Figure 1

Figure 1
<p>Example of an enterprise parsing graph.</p>
Full article ">Figure 2
<p>Proposed compilation workflow for generating control and configuration for the parser.</p>
Full article ">Figure 3
<p>Base Block.</p>
Full article ">Figure 4
<p>Protocol Navigator: Protocol Investigator with its Match Detector sub-block and Bitmap Generator.</p>
Full article ">Figure 5
<p>Overlay Block: In the multiplexer ID, the first digit indicates the parser block it belongs to, and the second digit indicates the multiplexer number, referred to in the text with a #.</p>
Full article ">Figure 6
<p>Overlay Block.</p>
Full article ">Figure 7
<p>Parser Pipeline Block.</p>
Full article ">Figure 8
<p>(<b>a</b>) Simple firewall graph. (<b>b</b>) Access Gateway Function flow graph.</p>
Full article ">
22 pages, 3177 KiB  
Article
Filamentous Fungi Associated with Disease Symptoms in Non-Native Giant Sequoia (Sequoiadendron giganteum) in Germany—A Gateway for Alien Fungal Pathogens?
by Gitta Jutta Langer, Steffen Bien and Johanna Bußkamp
Pathogens 2024, 13(9), 715; https://doi.org/10.3390/pathogens13090715 - 23 Aug 2024
Viewed by 781
Abstract
Filamentous fungi associated with disease symptoms in non-native giant sequoia (Sequoiadendron giganteum) in Germany were investigated in ten cases of disease in Northwest Germany. During the study period from 2018 to 2023, a total of 81 species of Dikaria were isolated [...] Read more.
Filamentous fungi associated with disease symptoms in non-native giant sequoia (Sequoiadendron giganteum) in Germany were investigated in ten cases of disease in Northwest Germany. During the study period from 2018 to 2023, a total of 81 species of Dikaria were isolated from woody tissue and needles of giant sequoia and morphotyped. Morphotypes were assigned to species designations based on ITS-sequence comparison and, in part, multi-locus phylogenetic analyses. Nine species were recognised as new reports for Germany or on giant sequoia: Amycosphaerella africana, Botryosphaeria parva, Coniochaeta acaciae, C. velutina, Muriformistrickeria rubi, Pestalotiopsis australis, P. monochaeta, Phacidiopycnis washingtonensis, and Rhizosphaera minteri. The threat posed to giant sequoia and other forest trees in Germany by certain, especially newly reported, fungal species is being discussed. The detection of a considerable number of new fungal records in the trees studied suggests that giant sequoia cultivation may be a gateway for alien fungal species in Germany. Full article
(This article belongs to the Special Issue Filamentous Fungal Pathogens: 2nd Edition)
Show Figures

Figure 1

Figure 1
<p><b>Cases of disease;</b> the small map at the bottom right shows Germany with its federal states with locations of giant sequoia stands with cases of disease and neighbouring countries, the North Sea and Baltic Sea are highlighted in blue, the supporting federal states of the NW-FVA are highlighted in darker gray, the area marked in red is zoomed out in the large map and displays the locations of the ten analysed forest stands (1–10, <a href="#pathogens-13-00715-t001" class="html-table">Table 1</a>) in Lower Saxony and Hesse. © GeoBasis-DE/BKG 2014 and © EuroGeographics.</p>
Full article ">Figure 2
<p>Various disease symptoms in giant sequoia. (<b>a</b>) Browning of shoots associated with <span class="html-italic">Amycosphaerella africana</span> and <span class="html-italic">Pestalotiopsis australis</span> in disease case 5; (<b>b</b>) browning of shoots associated with <span class="html-italic">Pestalotiopsis australis</span> and <span class="html-italic">Rhizosphaera minteri</span> in disease case 1; (<b>c</b>) browning of shoots where <span class="html-italic">Botryosphaeria dothidea</span> and <span class="html-italic">Neofusicoccum parvum</span> were isolated from disease case 10; (<b>d</b>–<b>f</b>) close-up of dying twigs from disease case 10; (<b>g</b>) wood discoloration; <span class="html-italic">Botryosphaeria dothidea</span> and <span class="html-italic">Pezicula neosporulosa</span> were isolated in disease case 9; (<b>h</b>) diseased needles of disease case 1; (<b>i</b>) close-up of wood discoloration associated with <span class="html-italic">Ophiostoma quercus</span> disease case 7; (<b>j</b>) stem disc from disease case 9; <span class="html-italic">Pezicula neospurolosa</span>, <span class="html-italic">Cantharellales</span> sp., and <span class="html-italic">Pezicula</span> sp. (<span class="html-italic">melanigena</span> or <span class="html-italic">radicicola</span>) were isolated.</p>
Full article ">Figure 3
<p>Phylogeny obtained by maximum likelihood analysis of the combined LSU-ITS-<span class="html-italic">TUB</span>-<span class="html-italic">EF1α</span> sequence alignment of species from <span class="html-italic">Pestalotiopsis</span>. ML bootstrap support values above 70% are shown at the nodes. <span class="html-italic">Pestalotiopsis furcata</span> strain MFLUCC12-0054 is used as the outgroup. Strains analysed in this study are emphasised in bold. Branches that are crossed by diagonal lines are shortened by 50%.</p>
Full article ">Figure 4
<p>Colony surfaces of isolated fungal species on MEA (<b>left</b>) and PDA (<b>right</b>) medium after 4 weeks. (<b>a</b>,<b>b</b>) <span class="html-italic">Amycosphaerella africana</span> strain NW-FVA 4336; (<b>c</b>,<b>d</b>) <span class="html-italic">Botryosphaeria dothidea</span> strain NW-FVA 9830; (<b>e</b>,<b>f</b>) <span class="html-italic">Coniochaeta acaciae</span> strain NW-FVA 9903; (<b>g</b>,<b>h</b>) <span class="html-italic">Ophiostoma quercus</span> strain NW-FVA 6920; (<b>i</b>,<b>j</b>) <span class="html-italic">Pestalotiopsis australis</span> strain NW-FVA 4349.</p>
Full article ">Figure 5
<p>Microscopic illustrations of selected fungal species. (<b>a</b>,<b>b</b>) Conidiomata of <span class="html-italic">Amycosphaerella africana</span> strain NW-FVA 4336; (<b>c</b>,<b>d</b>) conidiomata of <span class="html-italic">Coniochaeta acaciae</span> strain NW-FVA 9903; (<b>e</b>) conidiomata and (<b>f</b>) conidia of <span class="html-italic">Pestalotiopsis australis</span> strain NW-FVA 4349. Scale bars: (<b>a</b>,<b>c</b>) = 200 μm; (<b>b</b>,<b>d</b>) = 50 μm; (<b>e</b>) = 128 μm; (<b>f</b>) = 20 μm.</p>
Full article ">
17 pages, 3807 KiB  
Review
A Survey on IoT Application Architectures
by Abdulkadir Dauda, Olivier Flauzac and Florent Nolot
Sensors 2024, 24(16), 5320; https://doi.org/10.3390/s24165320 - 17 Aug 2024
Viewed by 1233
Abstract
The proliferation of the IoT has led to the development of diverse application architectures to optimize IoT systems’ deployment, operation, and maintenance. This survey provides a comprehensive overview of the existing IoT application architectures, highlighting their key features, strengths, and limitations. The architectures [...] Read more.
The proliferation of the IoT has led to the development of diverse application architectures to optimize IoT systems’ deployment, operation, and maintenance. This survey provides a comprehensive overview of the existing IoT application architectures, highlighting their key features, strengths, and limitations. The architectures are categorized based on their deployment models, such as cloud, edge, and fog computing approaches, each offering distinct advantages regarding scalability, latency, and resource efficiency. Cloud architectures leverage centralized data processing and storage capabilities to support large-scale IoT applications but often suffer from high latency and bandwidth constraints. Edge architectures mitigate these issues by bringing computation closer to the data source, enhancing real-time processing, and reducing network congestion. Fog architectures combine the strengths of both cloud and edge paradigms, offering a balanced solution for complex IoT environments. This survey also examines emerging trends and technologies in IoT application management, such as the solutions provided by the major IoT service providers like Intel, AWS, Microsoft Azure, and GCP. Through this study, the survey identifies latency, privacy, and deployment difficulties as key areas for future research. It highlights the need to advance IoT Edge architectures to reduce network traffic, improve data privacy, and enhance interoperability by developing multi-application and multi-protocol edge gateways for efficient IoT application management. Full article
(This article belongs to the Special Issue Cloud and Edge Computing for IoT Applications)
Show Figures

Figure 1

Figure 1
<p>IoT cloud architecture showing device-cloud connectivity options.</p>
Full article ">Figure 2
<p>ITU-T Y.2060 IoT Reference Model [<a href="#B15-sensors-24-05320" class="html-bibr">15</a>].</p>
Full article ">Figure 3
<p>IoT cloud architecture.</p>
Full article ">Figure 4
<p>Intel reference architecture for IoT infrastructure [<a href="#B19-sensors-24-05320" class="html-bibr">19</a>].</p>
Full article ">Figure 5
<p>AWS IoT Greengrass stream manager [<a href="#B20-sensors-24-05320" class="html-bibr">20</a>].</p>
Full article ">Figure 6
<p>Azure IoT reference architecture [<a href="#B21-sensors-24-05320" class="html-bibr">21</a>].</p>
Full article ">Figure 7
<p>Google Cloud Platform IoT architecture [<a href="#B22-sensors-24-05320" class="html-bibr">22</a>].</p>
Full article ">Figure 8
<p>IoT Edge architecture.</p>
Full article ">Figure 9
<p>Proposed multi-app multi-protocol edge gateway [<a href="#B7-sensors-24-05320" class="html-bibr">7</a>].</p>
Full article ">Figure 10
<p>IoT Fog architecture.</p>
Full article ">Figure 11
<p>IoT protocol stack; standards IEEE 802.11 [<a href="#B39-sensors-24-05320" class="html-bibr">39</a>]; IEEE 802.15.1 [<a href="#B40-sensors-24-05320" class="html-bibr">40</a>]; IEEE 802.15.4 [<a href="#B41-sensors-24-05320" class="html-bibr">41</a>].</p>
Full article ">
46 pages, 8707 KiB  
Article
Design and Enhancement of a Fog-Enabled Air Quality Monitoring and Prediction System: An Optimized Lightweight Deep Learning Model for a Smart Fog Environmental Gateway
by Divya Bharathi Pazhanivel, Anantha Narayanan Velu and Bagavathi Sivakumar Palaniappan
Sensors 2024, 24(15), 5069; https://doi.org/10.3390/s24155069 - 5 Aug 2024
Viewed by 1311
Abstract
Effective air quality monitoring and forecasting are essential for safeguarding public health, protecting the environment, and promoting sustainable development in smart cities. Conventional systems are cloud-based, incur high costs, lack accurate Deep Learning (DL)models for multi-step forecasting, and fail to optimize DL models [...] Read more.
Effective air quality monitoring and forecasting are essential for safeguarding public health, protecting the environment, and promoting sustainable development in smart cities. Conventional systems are cloud-based, incur high costs, lack accurate Deep Learning (DL)models for multi-step forecasting, and fail to optimize DL models for fog nodes. To address these challenges, this paper proposes a Fog-enabled Air Quality Monitoring and Prediction (FAQMP) system by integrating the Internet of Things (IoT), Fog Computing (FC), Low-Power Wide-Area Networks (LPWANs), and Deep Learning (DL) for improved accuracy and efficiency in monitoring and forecasting air quality levels. The three-layered FAQMP system includes a low-cost Air Quality Monitoring (AQM) node transmitting data via LoRa to the Fog Computing layer and then the cloud layer for complex processing. The Smart Fog Environmental Gateway (SFEG) in the FC layer introduces efficient Fog Intelligence by employing an optimized lightweight DL-based Sequence-to-Sequence (Seq2Seq) Gated Recurrent Unit (GRU) attention model, enabling real-time processing, accurate forecasting, and timely warnings of dangerous AQI levels while optimizing fog resource usage. Initially, the Seq2Seq GRU Attention model, validated for multi-step forecasting, outperformed the state-of-the-art DL methods with an average RMSE of 5.5576, MAE of 3.4975, MAPE of 19.1991%, R2 of 0.6926, and Theil’s U1 of 0.1325. This model is then made lightweight and optimized using post-training quantization (PTQ), specifically dynamic range quantization, which reduced the model size to less than a quarter of the original, improved execution time by 81.53% while maintaining forecast accuracy. This optimization enables efficient deployment on resource-constrained fog nodes like SFEG by balancing performance and computational efficiency, thereby enhancing the effectiveness of the FAQMP system through efficient Fog Intelligence. The FAQMP system, supported by the EnviroWeb application, provides real-time AQI updates, forecasts, and alerts, aiding the government in proactively addressing pollution concerns, maintaining air quality standards, and fostering a healthier and more sustainable environment. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

Figure 1
<p>Post-training optimization methods provided by TensorFlow.</p>
Full article ">Figure 2
<p>A three-layered Fog Computing-based architecture of the proposed system.</p>
Full article ">Figure 3
<p>Hardware of the proposed FAQMP system. (<b>a</b>) Air Quality Monitoring (AQM) Sensor Node. (<b>b</b>) Smart Fog Environmental Gateway (SFEG).</p>
Full article ">Figure 4
<p>Architecture and data flow of the proposed Fog-enabled Air Quality Monitoring and Prediction (FAQMP) System.</p>
Full article ">Figure 5
<p>DL model deployment pipeline after model quantization.</p>
Full article ">Figure 6
<p>Real-time alerts triggered by anomalous AQI Levels via email.</p>
Full article ">Figure 7
<p>Graphical User Interface of the EnviroWeb application displaying the live pollutants, Air Quality Index (AQI) level, and recommendations for citizens in real time.</p>
Full article ">Figure 8
<p>City-wide implementation of the proposed FAQMP system.</p>
Full article ">Figure 9
<p>GRU architecture.</p>
Full article ">Figure 10
<p>Architecture of the Sequence-to-Sequence GRU Attention mechanism.</p>
Full article ">Figure 11
<p>Steps involved in multivariate multi-step air quality forecasting.</p>
Full article ">Figure 12
<p>Error metrics of DL models to forecast PM<sub>2.5</sub> over twelve time steps (t1–t12). (<b>a</b>) RMSE comparison; (<b>b</b>) MAE comparison; (<b>c</b>) MAPE comparison.</p>
Full article ">Figure 13
<p>Performance metrics of DL models to forecast PM<sub>2.5</sub> over twelve time steps (t1–t12). (<b>a</b>) R<sup>2</sup> comparison; (<b>b</b>) Theil’s U1 comparison.</p>
Full article ">Figure 14
<p>Error metrics of DL models to forecast PM<sub>10</sub> over twelve time steps (t1–t12). (<b>a</b>) RMSE comparison; (<b>b</b>) MAE comparison; (<b>c</b>) MAPE comparison.</p>
Full article ">Figure 15
<p>Performance metrics of DL models to forecast PM<sub>10</sub> over twelve time steps (t1–t12). (<b>a)</b> R<sup>2</sup> comparison; (<b>b</b>) Theil’s U1 comparison.</p>
Full article ">Figure 16
<p>Performance metrics (RMSE, MAE, MAPE, R<sup>2</sup>, and U1) of the compared models across all pollutants (PM2.5, PM10, NO2, SO2, CO, and O3) over 12 time steps (t1–t12): (<b>a</b>) Average RMSE; (<b>b</b>) Average MAE; (<b>c</b>) Average MAPE; (<b>d</b>) Average R<sup>2</sup>; (<b>e</b>) Average Theil’s U1; and Model 1—GRU, Model 2—LSTM-GRU, Model 3—Seq2Seq GRU, Model 4—GRU Autoencoder, Model 5—GRU-LSTM Autoencoder, Model 6—GRU Attention, Model 7—LSTM-GRU Attention, Model 8—Seq2Seq LSTM Attention, Model 9—Seq2Seq Bi-LSTM Attention, and Our model—Seq2Seq GRU Attention.</p>
Full article ">Figure 17
<p>TensorFlow Lite models—file size comparison.</p>
Full article ">
26 pages, 8942 KiB  
Article
Energy Management of Green Port Multi-Energy Microgrid Based on Fuzzy Logic Control
by Yu Deng and Jingang Han
Energies 2024, 17(14), 3601; https://doi.org/10.3390/en17143601 - 22 Jul 2024
Viewed by 890
Abstract
The green port multi-energy microgrid, featuring renewable energy generation, hydrogen energy, and energy storage systems, is an important gateway to achieve the net-zero emission goal. But there are many forms of energy in green port multi-energy microgrid systems, the power fluctuates frequently, and [...] Read more.
The green port multi-energy microgrid, featuring renewable energy generation, hydrogen energy, and energy storage systems, is an important gateway to achieve the net-zero emission goal. But there are many forms of energy in green port multi-energy microgrid systems, the power fluctuates frequently, and the port loads with large fluctuations and fast changes. These factors can easily lead to the problem of the state of charge exceeding the limit of the energy storage system. To distribute the fluctuating power in the green port multi-energy microgrid system reasonably and maintain the state of charge (SOC) of the hybrid energy storage system in an moderate range, an energy management strategy (EMS) based on dual-stage fuzzy control with a low pass-filter algorithm is proposed in this paper. First, the mathematical model of a green port multi-energy microgrid system is established. Then, fuzzy rules are designed, and the dual-stage fuzzy controller is used to change the time constant of the low-pass filter (LPF) and modify the initial power distribution by an LPF algorithm. Finally, simulation models are built in Matlab 2016a/Simulink. The simulation results demonstrate that, compared with other algorithms under the control of the EMS proposed in this paper, the high-frequency component in the flywheel power is smaller, and the SOC of the supercapacitor is maintained in a reasonable range of 34–78%, which extends the lifespan of the flywheel and supercapacitor. Additionally, it has a faster automatic adjustment ability for the state of charge of the energy storage system, which is conducive to better maintaining the stable operation of green port multi-energy microgrid systems. Full article
(This article belongs to the Section A1: Smart Grids and Microgrids)
Show Figures

Figure 1

Figure 1
<p>Green port multi-energy microgrid system and EMS.</p>
Full article ">Figure 2
<p>Equivalent electrical circuit of PV cells.</p>
Full article ">Figure 3
<p>Power–wind speed diagram of generator.</p>
Full article ">Figure 4
<p>Solar irradiance and wind speed within a day.</p>
Full article ">Figure 5
<p>Schematic diagram of a craning cycle.</p>
Full article ">Figure 6
<p>Power curve of craning cycle of quay crane.</p>
Full article ">Figure 7
<p>Number of berthing ships at port.</p>
Full article ">Figure 8
<p>Load power of port.</p>
Full article ">Figure 9
<p>Structure diagram of DSFCLPF-EMS.</p>
Full article ">Figure 10
<p>(<b>a</b>) Input membership function of FSFC; (<b>b</b>) Output membership function of FSFC.</p>
Full article ">Figure 11
<p>(<b>a</b>) Input membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>P</mi> </mrow> <mrow> <mi>sc</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>b</b>) input membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="italic">SOC</mi> </mrow> <mrow> <mi>sc</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>c</b>) input membership function <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>d</b>) output membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>k</mi> </mrow> <mrow> <mi>sc</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 11 Cont.
<p>(<b>a</b>) Input membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>P</mi> </mrow> <mrow> <mi>sc</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>b</b>) input membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="italic">SOC</mi> </mrow> <mrow> <mi>sc</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>c</b>) input membership function <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>d</b>) output membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>k</mi> </mrow> <mrow> <mi>sc</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure 12
<p>Simulation model of the green port multi-energy microgrid system.</p>
Full article ">Figure 13
<p>Load power and grid power of port.</p>
Full article ">Figure 14
<p>Power of hybrid energy storage system.</p>
Full article ">Figure 15
<p>The time constant and the power of the supercapacitor and flywheel.</p>
Full article ">Figure 16
<p>(<b>a</b>) Change rate of flywheel power of DSFCLPF algorithm; (<b>b</b>) Change rate of flywheel power of WPD; (<b>c</b>) Change rate of flywheel power of SFC.</p>
Full article ">Figure 17
<p>(<b>a</b>) SOC of supercapacitor of DSFCLPF algorithm; (<b>b</b>) SOC of supercapacitor of WPD; (<b>c</b>) SOC of supercapacitor of SFC.</p>
Full article ">Figure 18
<p>SOC change in supercapacitor for extreme value of initial SOC. (<b>a</b>) Initial SOC is 10%; (<b>b</b>) initial SOC is 90%.</p>
Full article ">Figure 19
<p>SOC of supercapacitor within one month.</p>
Full article ">Figure 20
<p>Change rate of flywheel power within one month.</p>
Full article ">Figure A1
<p>(<b>a</b>) Input membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>P</mi> </mrow> <mrow> <mi>fly</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>b</b>) input membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="italic">SOC</mi> </mrow> <mrow> <mi>fly</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>c</b>) input membership function <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>d</b>) output membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>k</mi> </mrow> <mrow> <mi>fly</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">Figure A1 Cont.
<p>(<b>a</b>) Input membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>P</mi> </mrow> <mrow> <mi>fly</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>b</b>) input membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="italic">SOC</mi> </mrow> <mrow> <mi>fly</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>c</b>) input membership function <math display="inline"><semantics> <mrow> <mi>T</mi> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>; (<b>d</b>) output membership function <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>k</mi> </mrow> <mrow> <mi>fly</mi> </mrow> </msub> <mo>(</mo> <mi>t</mi> <mo>)</mo> </mrow> </semantics></math>.</p>
Full article ">
19 pages, 2039 KiB  
Article
A Nature-Inspired Approach to Energy-Efficient Relay Selection in Low-Power Wide-Area Networks (LPWAN)
by Anna Strzoda and Krzysztof Grochla
Sensors 2024, 24(11), 3348; https://doi.org/10.3390/s24113348 - 23 May 2024
Viewed by 702
Abstract
Despite the ability of Low-Power Wide-Area Networks to offer extended range, they encounter challenges with coverage blind spots in the network. This article proposes an innovative energy-efficient and nature-inspired relay selection algorithm for LoRa-based LPWAN networks, serving as a solution for challenges related [...] Read more.
Despite the ability of Low-Power Wide-Area Networks to offer extended range, they encounter challenges with coverage blind spots in the network. This article proposes an innovative energy-efficient and nature-inspired relay selection algorithm for LoRa-based LPWAN networks, serving as a solution for challenges related to poor signal range in areas with limited coverage. A swarm behavior-inspired approach is utilized to select the relays’ localization in the network, providing network energy efficiency and radio signal extension. These relays help to bridge communication gaps, significantly reducing the impact of coverage blind spots by forwarding signals from devices with poor direct connectivity with the gateway. The proposed algorithm considers critical factors for the LoRa standard, such as the Spreading Factor and device energy budget analysis. Simulation experiments validate the proposed scheme’s effectiveness in terms of energy efficiency under diverse multi-gateway (up to six gateways) network topology scenarios involving thousands of devices (1000–1500). Specifically, it is verified that the proposed approach outperforms a reference method in preventing battery depletion of the relays, which is vital for battery-powered IoT devices. Furthermore, the proposed heuristic method achieves over twice the speed of the exact method for some large-scale problems, with a negligible accuracy loss of less than 2%. Full article
(This article belongs to the Special Issue Nature-Inspired Algorithms for Sensor Networks and Image Processing)
Show Figures

Figure 1

Figure 1
<p>Edge weight function (<a href="#FD12-sensors-24-03348" class="html-disp-formula">12</a>) distribution depending on SF parameters <math display="inline"><semantics> <mrow> <mi>S</mi> <msub> <mi>F</mi> <mrow> <mi>u</mi> <mi>w</mi> </mrow> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>S</mi> <msub> <mi>F</mi> <mrow> <mi>w</mi> <mi>g</mi> </mrow> </msub> </mrow> </semantics></math> for weak node <math display="inline"><semantics> <mrow> <mi>u</mi> <mo>∈</mo> <msub> <mi>U</mi> <mi>H</mi> </msub> </mrow> </semantics></math> and relay candidate <math display="inline"><semantics> <mrow> <mi>w</mi> <mo>∈</mo> <msub> <mi>W</mi> <mi>H</mi> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 2
<p>Distribution of ACO’s mean solution quality, depending on the problem’s size and method’s hyperparameters (<math display="inline"><semantics> <mi>α</mi> </semantics></math> and <math display="inline"><semantics> <mi>β</mi> </semantics></math>). Sparse and complete bipartite graphs are included in the results.</p>
Full article ">Figure 3
<p>Convergence of the ACO algorithm for problems of varying sizes, specifically, the mean and standard deviations of the best solution at each iteration: (<b>a</b>) convergence of ACO for a relatively small complete graph (graph density 100%) <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>U</mi> <mi>H</mi> </msub> <mrow> <mo>|</mo> <mo>=</mo> <mo>|</mo> </mrow> <msub> <mi>W</mi> <mi>H</mi> </msub> <mrow> <mo>|</mo> <mo>=</mo> <mn>100</mn> </mrow> </mrow> </semantics></math> and (<b>b</b>) convergence of ACO for a medium-sized sparse graph (graph density 10%) <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>U</mi> <mi>H</mi> </msub> <mrow> <mo>|</mo> <mo>=</mo> <mo>|</mo> </mrow> <msub> <mi>W</mi> <mi>H</mi> </msub> <mrow> <mo>|</mo> <mo>=</mo> <mn>1000</mn> </mrow> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>Change in device battery level consumption during the network’s operation over a 10-year period. The figures show the battery life for relay devices and other network end devices. (<b>a</b>) ACO relay selection method; (<b>b</b>) EK relay selection method; (<b>c</b>) reference relay selection method [<a href="#B21-sensors-24-03348" class="html-bibr">21</a>]. In the figure, the depletion of the battery of one of the selected relay devices is visible. The curve at the bottom of the chart that dips below zero in the 50th month corresponds to a relay device that has run out of battery.</p>
Full article ">
30 pages, 7313 KiB  
Article
Rapid Approximation of Low-Thrust Spacecraft Reachable Sets within Complex Two-Body and Cislunar Dynamics
by Sean Bowerfind and Ehsan Taheri
Aerospace 2024, 11(5), 380; https://doi.org/10.3390/aerospace11050380 - 9 May 2024
Cited by 1 | Viewed by 1654
Abstract
The reachable set of controlled dynamical systems is the set of all reachable states from an initial condition over a certain time horizon, subject to operational constraints and exogenous disturbances. In astrodynamics, rapid approximation of reachable sets is invaluable for trajectory planning, collision [...] Read more.
The reachable set of controlled dynamical systems is the set of all reachable states from an initial condition over a certain time horizon, subject to operational constraints and exogenous disturbances. In astrodynamics, rapid approximation of reachable sets is invaluable for trajectory planning, collision avoidance, and ensuring safe and optimal performance in complex dynamics. Leveraging the connection between minimum-time trajectories and the boundary of reachable sets, we propose a sampling-based method for rapid and efficient approximation of reachable sets for finite- and low-thrust spacecraft. The proposed method combines a minimum-time multi-stage indirect formulation with the celebrated primer vector theory. Reachable sets are generated under two-body and circular restricted three-body (CR3B) dynamics. For the two-body dynamics, reachable sets are generated for (1) the heliocentric phase of a benchmark Earth-to-Mars problem, (2) two scenarios with uncertainties in the initial position and velocity of the spacecraft at the time of departure from Earth, and (3) a scenario with a bounded single impulse at the time of departure from Earth. For the CR3B dynamics, several cislunar applications are considered, including L1 Halo orbit, L2 Halo orbit, and Lunar Gateway 9:2 NRHO. The results indicate that low-thrust spacecraft reachable sets coincide with invariant manifolds existing in multi-body dynamical environments. The proposed method serves as a valuable tool for qualitatively analyzing the evolution of reachable sets under complex dynamics, which would otherwise be either incoherent with existing grid-based reachability approaches or computationally intractable with a complete Hamilton–Jacobi–Bellman method. Full article
Show Figures

Figure 1

Figure 1
<p>Flowchart for a multi-stage formulation.</p>
Full article ">Figure 2
<p>Normalized synodic coordinate system for the CR3BP models.</p>
Full article ">Figure 3
<p>Flowchart for the reachable set approximation algorithm.</p>
Full article ">Figure 4
<p>Position reachable set over a 200-day time horizon with 5000 sample trajectories.</p>
Full article ">Figure 5
<p>Minimum-time trajectory and thrust vector solved with CasaDi.</p>
Full article ">Figure 6
<p>Evolution of velocity reachable set vs. different time horizons.</p>
Full article ">Figure 6 Cont.
<p>Evolution of velocity reachable set vs. different time horizons.</p>
Full article ">Figure 7
<p>Reachable set over a 307-day time horizon with 5000 samples.</p>
Full article ">Figure 8
<p>Depiction of the Earth-to-Mars position reachable set.</p>
Full article ">Figure 9
<p>Comparison of position reachable sets over a 200-day time horizon with 5000 samples with different initial types of uncertainties. (<b>a</b>) With uncertainties on the initial position and velocity vectors as defined in Equation (<a href="#FD19-aerospace-11-00380" class="html-disp-formula">19</a>). (<b>b</b>) With an initial impulse maneuver as defined in Equations (<a href="#FD25-aerospace-11-00380" class="html-disp-formula">25</a>) and (<a href="#FD26-aerospace-11-00380" class="html-disp-formula">26</a>).</p>
Full article ">Figure 10
<p>L1 point reachable sets with increasing time-horizon values.</p>
Full article ">Figure 10 Cont.
<p>L1 point reachable sets with increasing time-horizon values.</p>
Full article ">Figure 11
<p>Position reachable set over a 150 h (6.25 days) time horizon with 2000 samples.</p>
Full article ">Figure 12
<p>Position reachable set over a 350 h time horizon with 10,000 samples.</p>
Full article ">Figure 13
<p>Position reachable set over a 75 h time horizon with 2000 samples. (<b>a</b>) Three-dimensional view of the position reachable set. (<b>b</b>) XY view of the position reachable set.</p>
Full article ">Figure 14
<p>Stable and unstable invariant manifolds of the Earth–Moon L2 Halo orbit.</p>
Full article ">Figure 15
<p>Reachable set overlaid with invariant manifolds for the 350 h L2 reference orbit.</p>
Full article ">Figure 15 Cont.
<p>Reachable set overlaid with invariant manifolds for the 350 h L2 reference orbit.</p>
Full article ">
23 pages, 7032 KiB  
Article
Control Strategy for Building Air Conditioning Cluster Loads Participating in Demand Response Based on Cyber-Physical System
by Xiaoling Yuan, Hao Cao, Zheng Chen, Jieyan Xu and Haoming Liu
Energies 2024, 17(6), 1291; https://doi.org/10.3390/en17061291 - 7 Mar 2024
Viewed by 990
Abstract
In recent years, with rising urbanization and ongoing adjustments in industrial structures, there has been a growing dependence on public buildings. The load of public buildings gradually becomes the main component of the peak load in summer, among which the load of air [...] Read more.
In recent years, with rising urbanization and ongoing adjustments in industrial structures, there has been a growing dependence on public buildings. The load of public buildings gradually becomes the main component of the peak load in summer, among which the load of air conditioning is particularly prominent. To clarify the key problems and solutions to these challenges, this study proposes a multi-objective optimization control strategy for building air conditioning cluster participation in demand response based on Cyber-Physical System (CPS) architecture. In a three-layer typical CPS architecture, the unit level of the CPS achieves dynamic information perception of air conditioning clusters through smart energy terminals. An air conditioning load model based on the multiple parameter types of air conditioning compressors is presented. Then, the system level of the CPS fuses multiple pieces of information through smart energy gateways, analyzing the potential for air conditioning clusters when they participate in demand response. The system of system level (SoS level) of the CPS deploys a multi-objective optimization control strategy which includes the uncertainty of the initial states of air conditioning clusters within the intelligent building energy management system. The optimal model takes into account the differences in the environmental conditions of each individual air conditioning unit within the cluster and sets different operating modes for each unit to achieve load reduction while maintaining temperatures within a comfortable range for the human body. The Multi-Objective Particle Swarm Optimization (MOPSO) algorithm based on Pareto frontiers is applied to solve this optimization control strategy and to optimize the operational parameters of the air conditioning clusters. A comparative analysis is conducted with single-objective optimization results obtained using the traditional Particle Swarm Optimization (PSO) algorithm. The case study results indicate that the proposed multi-objective optimization control strategy can effectively improve the thermal comfort of the human body towards the controlled temperatures of air conditioning clusters while meeting the accuracy of demand response. In the solution phase, the highest temperature within the air conditioning clusters is 24 °C and the lowest temperature is 23 °C. Adopting the proposed multi-objective optimization control strategy, the highest temperature is 26 °C and the lowest temperature is 23.5 °C within the clusters and the accuracy of demand response is up to 92%. Compared to the traditional PSO algorithm, the MOPSO algorithm has advantages in convergence and optimization precision for solving the proposed multi-objective optimization control strategy. Full article
(This article belongs to the Special Issue Machine Learning for Cyber-Physical Energy Systems)
Show Figures

Figure 1

Figure 1
<p>A diagram of a multi-level control system of the CPS for the air conditioning clusters.</p>
Full article ">Figure 2
<p>The relationship between the refrigeration capacity and the energy efficiency ratio.</p>
Full article ">Figure 3
<p>The relationship between power and the indoor temperature.</p>
Full article ">Figure 4
<p>The diagram of the Pareto solution set.</p>
Full article ">Figure 5
<p>The flowchart of the MOPSO algorithm.</p>
Full article ">Figure 6
<p>The temperature change of each room as the set temperature of the air conditioning clusters is 23 °C.</p>
Full article ">Figure 7
<p>The temperature and power variations of the air conditioning clusters when the temperature is set from 23 °C to 24 °C.</p>
Full article ">Figure 8
<p>The state of the cluster of air conditioning unit running for 60 min. (<b>a</b>) The changes in temperature of each room. (<b>b</b>) The changes in power of each air conditioning unit.</p>
Full article ">Figure 9
<p>Scenario 1. (<b>a</b>) The changes in temperature of each room. (<b>b</b>) The changes in power of each air conditioning unit.</p>
Full article ">Figure 10
<p>The operational state of an air conditioning unit in Scenario 1. (<b>a</b>) The change in temperature of the room. (<b>b</b>) The change in power of the air conditioning unit.</p>
Full article ">Figure 11
<p>The instantaneous state of all air conditioning units at a certain moment in Scenario 1. (<b>a</b>) The changes in temperature of each room. (<b>b</b>) The changes in power of each air conditioning unit.</p>
Full article ">Figure 12
<p>Comparison of total power of air conditioning clusters in Scenario 1.</p>
Full article ">Figure 13
<p>Scenario 2. (<b>a</b>) The changes in temperature of each room. (<b>b</b>) The changes in power of each air conditioning unit.</p>
Full article ">Figure 14
<p>The operational state of an air conditioning unit in Scenario 2. (<b>a</b>) The changes in temperature of room. (<b>b</b>) The changes in power of each air conditioning unit.</p>
Full article ">Figure 15
<p>The instantaneous state of all air conditioning units at a certain moment in Scenario 2. (<b>a</b>) The changes in temperature of each room. (<b>b</b>) The changes in power of each air conditioning units.</p>
Full article ">Figure 16
<p>Comparison of total power of air conditioning clusters in Scenario 2.</p>
Full article ">Figure 17
<p>Scenario 3. (<b>a</b>) The changes in temperature of each room. (<b>b</b>) The changes in power of each air conditioning unit.</p>
Full article ">Figure 18
<p>The operational state of an air conditioning unit in Scenario 3. (<b>a</b>) The changes in temperature of each room. (<b>b</b>) The changes in power of each air conditioning unit.</p>
Full article ">Figure 19
<p>The instantaneous state of all air conditioning units at a certain moment in Scenario 3. (<b>a</b>) The changes in temperature of each room. (<b>b</b>) The changes in power of each air conditioning unit.</p>
Full article ">Figure 20
<p>Comparison of total power of air conditioning clusters in Scenario 3.</p>
Full article ">
Back to TopTop