Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (70)

Search Parameters:
Keywords = proactive deployment

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 974 KiB  
Article
Generative AI-Enhanced Cybersecurity Framework for Enterprise Data Privacy Management
by Geeta Sandeep Nadella, Santosh Reddy Addula, Akhila Reddy Yadulla, Guna Sekhar Sajja, Mohan Meesala, Mohan Harish Maturi, Karthik Meduri and Hari Gonaygunta
Computers 2025, 14(2), 55; https://doi.org/10.3390/computers14020055 - 8 Feb 2025
Viewed by 744
Abstract
This study presents a Generative AI-Enhanced Cybersecurity Framework designed to strengthen enterprise data privacy management while improving threat detection accuracy and scalability. By leveraging Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and traditional anomaly detection methods, the framework generates synthetic datasets that mimic [...] Read more.
This study presents a Generative AI-Enhanced Cybersecurity Framework designed to strengthen enterprise data privacy management while improving threat detection accuracy and scalability. By leveraging Generative Adversarial Networks (GANs), Variational Autoencoders (VAEs), and traditional anomaly detection methods, the framework generates synthetic datasets that mimic real-world data, ensuring privacy and regulatory compliance. At its core, the anomaly detection engine integrates machine learning models, such as Random Forest and Support Vector Machines (SVMs), alongside deep learning techniques like Long Short-Term Memory (LSTM) networks, delivering robust performance across diverse domains. Experimental results demonstrate the framework’s adaptability and high performance in the financial sector (accuracy: 94%, recall: 95%), healthcare (accuracy: 96%, precision: 93%), and smart city infrastructures (accuracy: 91%, F1 score: 90%). The framework achieves a balanced trade-off between accuracy (0.96) and computational efficiency (processing time: 1.5 s per transaction), making it ideal for real-time enterprise deployments. Unlike analog systems that achieve > 0.99 accuracy at the cost of higher resource consumption and limited scalability, this framework emphasizes practical applications in diverse sectors. Additionally, it employs differential privacy, encryption, and data masking to ensure data security while addressing modern cybersecurity challenges. Future work aims to enhance real-time scalability further and explore reinforcement learning to advance proactive threat mitigation measures. This research provides a scalable, adaptive, and practical solution for enterprise-level cybersecurity and data privacy management. Full article
(This article belongs to the Special Issue Using New Technologies in Cyber Security Solutions (2nd Edition))
Show Figures

Figure 1

Figure 1
<p>Traditional methods.</p>
Full article ">Figure 2
<p>Proposed framework.</p>
Full article ">Figure 3
<p>Number of anomalies detected in three scenarios.</p>
Full article ">
25 pages, 4802 KiB  
Article
A Machine Learning Implementation to Predictive Maintenance and Monitoring of Industrial Compressors
by Ahmad Aminzadeh, Sasan Sattarpanah Karganroudi, Soheil Majidi, Colin Dabompre, Khalil Azaiez, Christopher Mitride and Eric Sénéchal
Sensors 2025, 25(4), 1006; https://doi.org/10.3390/s25041006 - 8 Feb 2025
Viewed by 670
Abstract
Integrating machine learning algorithms leveraged by advanced data acquisition systems is emerging as a pivotal approach in predictive maintenance. This paper presents the deployment of such an integration on an industrial air compressor unit. This research combines updated concepts from the Internet of [...] Read more.
Integrating machine learning algorithms leveraged by advanced data acquisition systems is emerging as a pivotal approach in predictive maintenance. This paper presents the deployment of such an integration on an industrial air compressor unit. This research combines updated concepts from the Internet of Things, machine learning, multi-sensor data collection, structured data mining, and cloud-based data analysis. To this end, temperature, pressure, and flow rate data were acquired from sensors in contact with the compressor. The observed data were sent to the Structured Query Language database. Then, a Linear Regression model was fitted to the training data, and the optimized model was stored for real-time inference. Afterward, structured data were passed through the model, and if the data exceeded the determined threshold, a warning email was sent to an operator. Adopting the Internet of Things enhances surveillance for specialists, decreasing the failure and damage probabilities. The model achieved 98% accuracy in the Mean Squared Error metric for our regression model. By analyzing the gathered data, the implemented system demonstrates the capabilities to predict potential equipment failures with promising accuracy, facilitating a shift from reactive to proactive maintenance strategies. The findings reveal substantial potential for improvements in maintenance efficiency, equipment uptime, and cost savings. Full article
(This article belongs to the Special Issue Sensors for Predictive Maintenance of Machines)
Show Figures

Figure 1

Figure 1
<p>The predictive maintenance data handling pipeline.</p>
Full article ">Figure 2
<p>Real-time monitoring pipeline for the industrial compressor.</p>
Full article ">Figure 3
<p>Machine learning algorithms.</p>
Full article ">Figure 4
<p>Data distribution before and after preprocessing including standardization, outlier removal, and missing value removal.</p>
Full article ">Figure 5
<p>Correlation heatmap between parameters.</p>
Full article ">Figure 6
<p>Mail notification instance when the model output exceeds the thresholds.</p>
Full article ">Figure 7
<p>Temperature evolution over time.</p>
Full article ">Figure 8
<p>Temperature monitoring of intercooler 1.</p>
Full article ">Figure 9
<p>Temperature monitoring of intercooler 2.</p>
Full article ">Figure 10
<p>Pressure monitoring and future prediction.</p>
Full article ">Figure 11
<p>Detected anomaly in input variables.</p>
Full article ">
17 pages, 3245 KiB  
Article
Enhancing Security in Software Design Patterns and Antipatterns: A Framework for LLM-Based Detection
by Roberto Andrade, Jenny Torres and Iván Ortiz-Garcés
Electronics 2025, 14(3), 586; https://doi.org/10.3390/electronics14030586 - 1 Feb 2025
Viewed by 622
Abstract
The detection of security vulnerabilities in software design patterns and antipatterns is crucial for maintaining robust and maintainable systems, particularly in dynamic Continuous Integration/Continuous Deployment (CI/CD) environments. Traditional static analysis tools, while effective for identifying isolated issues, often lack contextual awareness, leading to [...] Read more.
The detection of security vulnerabilities in software design patterns and antipatterns is crucial for maintaining robust and maintainable systems, particularly in dynamic Continuous Integration/Continuous Deployment (CI/CD) environments. Traditional static analysis tools, while effective for identifying isolated issues, often lack contextual awareness, leading to missed vulnerabilities and high rates of false positives. This paper introduces a novel framework leveraging Large Language Models (LLMs) to detect and mitigate security risks in design patterns and antipatterns. By analyzing relationships and behavioral dynamics in code, LLMs provide a nuanced, context-aware approach to identifying issues such as unauthorized state changes, insecure communication, and improper data handling. The proposed framework integrates key security heuristics—such as the principles of least privilege and input validation—to enhance LLM performance. An evaluation of the framework demonstrates its potential to outperform traditional tools in terms of accuracy and efficiency, enabling the proactive detection and remediation of vulnerabilities in real time. This study contributes to the field of software engineering by offering an innovative methodology for securing software systems using LLMs, promoting both academic research and practical application in industry settings. Full article
(This article belongs to the Special Issue Recent Advances of Software Engineering)
Show Figures

Figure 1

Figure 1
<p>Comparison of the structure of design patterns and antipatterns in software development. Adapted from [<a href="#B1-electronics-14-00586" class="html-bibr">1</a>].</p>
Full article ">Figure 2
<p>This is an example of a code with the architectural antipattern Golden Hammer.</p>
Full article ">Figure 3
<p>CI/CD antipattern detection framework using LLMs.</p>
Full article ">Figure 4
<p>Script to evaluate code changes based on heuristic security.</p>
Full article ">Figure 5
<p>Script to send to LLM for antipattern detection.</p>
Full article ">Figure 6
<p>Yaml script to integrate with Github.</p>
Full article ">Figure 7
<p>Integration with cve details.</p>
Full article ">Figure 8
<p>Conceptual architecture of the LLM for antipattern detection.</p>
Full article ">
15 pages, 2785 KiB  
Article
Berth Allocation and Quay Crane Assignment Considering the Uncertain Maintenance Requirements
by Siwei Li and Liying Song
Appl. Sci. 2025, 15(2), 660; https://doi.org/10.3390/app15020660 - 11 Jan 2025
Viewed by 591
Abstract
The strategic optimization of a container terminal’s quayside assets, including the berth and quay cranes, is crucial for maximizing their deployment and utilization. The interrelated and complex challenges of Berth Allocation (BAP) and Quay Crane Scheduling (QCSP) are fundamental to enhancing the resilience [...] Read more.
The strategic optimization of a container terminal’s quayside assets, including the berth and quay cranes, is crucial for maximizing their deployment and utilization. The interrelated and complex challenges of Berth Allocation (BAP) and Quay Crane Scheduling (QCSP) are fundamental to enhancing the resilience of container ports, as berths and quay cranes constitute essential infrastructure. Efficient berth allocation and quay crane scheduling can mitigate operational disruptions, even in the face of maintenance or failures, thereby improving both operational reliability and resilience. However, previous studies have often overlooked the uncertainty associated with quay crane maintenance when planning these operations. This paper aims to minimize vessel turnaround time by accounting for the uncertain in quay crane maintenance activities. To address this novel problem, we propose a proactive-reactive method that incorporates a reliability-based model into the Swarm Optimization with Differential Evolution (SWO-DE) algorithm. Computational results confirm the practical relevance and effectiveness of our proposed solution methods for container terminals. Full article
(This article belongs to the Special Issue Future Transportation Systems: Efficiency and Reliability)
Show Figures

Figure 1

Figure 1
<p>Illustration of vessel processing with one QC under maintenance.</p>
Full article ">Figure 2
<p>Illustration of a processing schedule with QC maintenance activity.</p>
Full article ">Figure 3
<p>Flowchart of the SWO-DE heuristic method.</p>
Full article ">Figure 4
<p>Small-Scale Berth Allocation Scheme Comparing Scenarios with and Without Quay Crane Maintenance.</p>
Full article ">Figure 5
<p>Large-Scale Berth Allocation Scheme Comparing Scenarios with and Without Quay Crane Maintenance.</p>
Full article ">Figure 6
<p>Comparison of True and Predicted Cargo Amounts Using Random Forest Regression.</p>
Full article ">Figure 7
<p>Iterative curve of differential evolution algorithm.</p>
Full article ">Figure 8
<p>Sensitivity analysis of small scale.</p>
Full article ">Figure 9
<p>Sensitivity analysis of large scale.</p>
Full article ">
21 pages, 1040 KiB  
Article
AIDS-Based Cyber Threat Detection Framework for Secure Cloud-Native Microservices
by Heeji Park, Abir EL Azzaoui and Jong Hyuk Park
Electronics 2025, 14(2), 229; https://doi.org/10.3390/electronics14020229 - 8 Jan 2025
Viewed by 863
Abstract
Cloud-native architectures continue to redefine application development and deployment by offering enhanced scalability, performance, and resource efficiency. However, they present significant security challenges, particularly in securing inter-container communication and mitigating Distributed Denial of Service (DDoS) attacks in containerized microservices. This study proposes an [...] Read more.
Cloud-native architectures continue to redefine application development and deployment by offering enhanced scalability, performance, and resource efficiency. However, they present significant security challenges, particularly in securing inter-container communication and mitigating Distributed Denial of Service (DDoS) attacks in containerized microservices. This study proposes an Artificial Intelligence Intrusion Detection System (AIDS)-based cyber threat detection solution to address these critical security challenges inherent in cloud-native environments. By leveraging a Resilient Backpropagation Neural Network (RBN), the proposed solution enhances system security and resilience by effectively detecting and mitigating DDoS attacks in real time in both the network and application layers. The solution incorporates an Inter-Container Communication Bridge (ICCB) to ensure secure communication between containers. It also employs advanced technologies such as eXpress Data Path (XDP) and the Extended Berkeley Packet Filter (eBPF) for high-performance and low-latency security enforcement, thereby overcoming the limitations of existing research. This approach provides robust protection against evolving security threats while maintaining the dynamic scalability and efficiency of cloud-native architectures. Furthermore, the system enhances operational continuity through proactive monitoring and dynamic adaptability, ensuring effective protection against evolving threats while preserving the inherent scalability and efficiency of cloud-native environments. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed AIDS-based cyber threat detection framework.</p>
Full article ">Figure 2
<p>Inter-container communication bridge overview.</p>
Full article ">
20 pages, 3136 KiB  
Article
Generalized Distribution Network Data-Gathering Procedure for ADMS Deployment
by Duško Bekut, Goran Švenda, Sonja Kanjuh and Verica Koturević
Energies 2024, 17(23), 6020; https://doi.org/10.3390/en17236020 - 29 Nov 2024
Cited by 1 | Viewed by 556
Abstract
The implementation of advanced distribution management systems (ADMS) in today’s distribution networks (DNs) is critical for efficient operation. However, ADMS deployment poses significant challenges, particularly in gathering the extensive and diverse data required to model DNs. This paper presents a generalized, systematic, and [...] Read more.
The implementation of advanced distribution management systems (ADMS) in today’s distribution networks (DNs) is critical for efficient operation. However, ADMS deployment poses significant challenges, particularly in gathering the extensive and diverse data required to model DNs. This paper presents a generalized, systematic, and algorithm-driven procedure for optimizing the missing data-gathering process during ADMS deployment. The procedure identifies the required DN model data by layers, considers distribution power utility (DPU) data sources, identifies missing data, and evaluates methods and the missing data-gathering ways, considering cost, duration, and specific constraints for data gathering. The developed approach provides DPUs with a clear, structured, and proactive approach to data gathering, significantly reducing complexity and enhancing efficiency. The practical application of this procedure is demonstrated using a real-world unbalanced DN example from a North American DPU, showcasing its potential to streamline ADMS deployment and deliver tangible operational benefits. Full article
Show Figures

Figure 1

Figure 1
<p>Pyramidal structure and layers of the DN model.</p>
Full article ">Figure 2
<p>Main steps of the data-gathering procedure.</p>
Full article ">Figure 3
<p>Optimization algorithm for missing data gathering.</p>
Full article ">Figure 4
<p>Part of the considered DN is displayed on the mimic board (the colored parts of the DN correspond to different HV/MV station areas).</p>
Full article ">
21 pages, 902 KiB  
Article
Sustainable Solutions to Safety Risks on Frozen Lakes Through Effective Risk Mitigation Using Crisis Management Logistics
by Oľga Glova Végsöová and Katarína Čerevková
Sustainability 2024, 16(22), 10020; https://doi.org/10.3390/su162210020 - 17 Nov 2024
Viewed by 788
Abstract
This article addresses the critical safety risks posed by the use of frozen lakes, risks which are increasingly exacerbated by the impacts of climate change. In Slovakia, where numerous water reservoirs are legally designated for year-round recreational and sporting activities, safeguarding public health [...] Read more.
This article addresses the critical safety risks posed by the use of frozen lakes, risks which are increasingly exacerbated by the impacts of climate change. In Slovakia, where numerous water reservoirs are legally designated for year-round recreational and sporting activities, safeguarding public health and safety necessitates innovative and sustainable approaches to risk mitigation in emergency management. Using the Jazero water reservoir as a case study, this paper demonstrates that the integration of comprehensive risk assessment, the strategic selection of rescue methods, and the deployment of advanced technical equipment for rescue teams are fundamental to ensuring a robust and efficient crisis management response. Through a comparative analysis of nine access routes, validated by tactical exercises and a detailed evaluation of three distinct rescue methods combined with different equipment types, this study reveals the critical role of optimized rescue strategies in reducing response times. Rescue operations were accelerated by at least 4.5 s, a significant reduction that could be the deciding factor between life and death in real-world scenarios. The proposed sustainable strategies for the Jazero reservoir are applicable to similar natural water bodies, underscoring the vital importance of proactive, data-driven, and adaptive crisis management systems in enhancing both immediate and long-term public safety. Full article
(This article belongs to the Special Issue Sustainable Risk Management)
Show Figures

Figure 1

Figure 1
<p>The process of a lake freezing.</p>
Full article ">Figure 2
<p>Effective resolution of a crisis situation on a frozen lake.</p>
Full article ">Figure 3
<p>Adjusted satellite image of the Jazero reservoir showing the possibility of access roads and parking possibilities for emergency vehicles.</p>
Full article ">Figure 4
<p>Adjusted satellite image of the Jazero reservoir showing available and fast routes for emergency vehicles.</p>
Full article ">
22 pages, 2426 KiB  
Article
A Novel Cloud-Enabled Cyber Threat Hunting Platform for Evaluating the Cyber Risks Associated with Smart Health Ecosystems
by Abdullah Alabdulatif and Navod Neranjan Thilakarathne
Appl. Sci. 2024, 14(20), 9567; https://doi.org/10.3390/app14209567 - 20 Oct 2024
Cited by 2 | Viewed by 1283
Abstract
The fast proliferation of Internet of Things (IoT) devices has dramatically altered healthcare, increasing the efficiency and efficacy of smart health ecosystems. However, this expansion has created substantial security risks, as cybercriminals increasingly target IoT devices in order to exploit their weaknesses and [...] Read more.
The fast proliferation of Internet of Things (IoT) devices has dramatically altered healthcare, increasing the efficiency and efficacy of smart health ecosystems. However, this expansion has created substantial security risks, as cybercriminals increasingly target IoT devices in order to exploit their weaknesses and relay critical health information. The rising threat landscape poses serious concerns across various domains within healthcare, where the protection of patient information and the integrity of medical devices are paramount. Smart health systems, while offering numerous benefits, are particularly vulnerable to cyber-attacks due to the integration of IoT devices and the vast amounts of data they generate. Healthcare providers, although unable to control the actions of cyber adversaries, can take proactive steps to secure their systems by adopting robust cybersecurity measures, such as strong user authentication, regular system updates, and the implementation of advanced security technologies. This research introduces a groundbreaking approach to addressing the cybersecurity challenges in smart health ecosystems through the deployment of a novel cloud-enabled cyber threat-hunting platform. This platform leverages deception technology, which involves creating decoys, traps, and false information to divert cybercriminals away from legitimate health data and systems. By using this innovative approach, the platform assesses the cyber risks associated with smart health systems, offering actionable recommendations to healthcare stakeholders on how to minimize cyber risks and enhance the security posture of IoT-enabled healthcare solutions. Overall, this pioneering research represents a significant advancement in safeguarding the increasingly interconnected world of smart health ecosystems, providing a promising strategy for defending against the escalating cyber threats faced by the healthcare industry. Full article
Show Figures

Figure 1

Figure 1
<p>Distribution of the cyber-attacks in the healthcare industry worldwide (from October 2021 to September 2022).</p>
Full article ">Figure 2
<p>Key steps involved in the experiment.</p>
Full article ">Figure 3
<p>High-level diagram of the proposed cyber threat-hunting platform.</p>
Full article ">Figure 4
<p>Installing the honeypot server.</p>
Full article ">Figure 5
<p>Dashboard generated with Elastic Stack.</p>
Full article ">Figure 6
<p>Breakdown of attacks by the country of origin.</p>
Full article ">
20 pages, 2510 KiB  
Article
Anxiety among Medical Students Regarding Generative Artificial Intelligence Models: A Pilot Descriptive Study
by Malik Sallam, Kholoud Al-Mahzoum, Yousef Meteb Almutairi, Omar Alaqeel, Anan Abu Salami, Zaid Elhab Almutairi, Alhur Najem Alsarraf and Muna Barakat
Int. Med. Educ. 2024, 3(4), 406-425; https://doi.org/10.3390/ime3040031 - 9 Oct 2024
Viewed by 2352
Abstract
Despite the potential benefits of generative artificial intelligence (genAI), concerns about its psychological impact on medical students, especially about job displacement, are apparent. This pilot study, conducted in Jordan during July–August 2024, aimed to examine the specific fears, anxieties, mistrust, and ethical concerns [...] Read more.
Despite the potential benefits of generative artificial intelligence (genAI), concerns about its psychological impact on medical students, especially about job displacement, are apparent. This pilot study, conducted in Jordan during July–August 2024, aimed to examine the specific fears, anxieties, mistrust, and ethical concerns medical students harbor towards genAI. Using a cross-sectional survey design, data were collected from 164 medical students studying in Jordan across various academic years, employing a structured self-administered questionnaire with an internally consistent FAME scale—representing Fear, Anxiety, Mistrust, and Ethics—comprising 12 items, with 3 items for each construct. Exploratory and confirmatory factors analyses were conducted to assess the construct validity of the FAME scale. The results indicated variable levels of anxiety towards genAI among the participating medical students: 34.1% reported no anxiety about genAI‘s role in their future careers (n = 56), while 41.5% were slightly anxious (n = 61), 22.0% were somewhat anxious (n = 36), and 2.4% were extremely anxious (n = 4). Among the FAME constructs, Mistrust was the most agreed upon (mean: 12.35 ± 2.78), followed by the Ethics construct (mean: 10.86 ± 2.90), Fear (mean: 9.49 ± 3.53), and Anxiety (mean: 8.91 ± 3.68). Their sex, academic level, and Grade Point Average (GPA) did not significantly affect the students’ perceptions of genAI. However, there was a notable direct association between the students’ general anxiety about genAI and elevated scores on the Fear, Anxiety, and Ethics constructs of the FAME scale. Prior exposure to genAI and its previous use did not significantly modify the scores on the FAME scale. These findings highlight the critical need for refined educational strategies to address the integration of genAI into medical training. The results demonstrate notable anxiety, fear, mistrust, and ethical concerns among medical students regarding the deployment of genAI in healthcare, indicating the necessity of curriculum modifications that focus specifically on these areas. Interventions should be tailored to increase familiarity and competency with genAI, which would alleviate apprehensions and equip future physicians to engage with this inevitable technology effectively. This study also highlights the importance of incorporating ethical discussions into medical courses to address mistrust and concerns about the human-centered aspects of genAI. In conclusion, this study calls for the proactive evolution of medical education to prepare students for new AI-driven healthcare practices to ensure that physicians are well prepared, confident, and ethically informed in their professional interactions with genAI technologies. Full article
(This article belongs to the Special Issue New Advancements in Medical Education)
Show Figures

Figure 1

Figure 1
<p>The generative artificial intelligence (genAI) models used, as self-reported by this study’s participants.</p>
Full article ">Figure 2
<p>The Intraclass Correlation Coefficient (ICC) for the four FAME sub-scales’ items. Higher correlations are indicated by deeper shades of green.</p>
Full article ">Figure 3
<p>Scree plot representing the eigenvalues of the factors identified by the exploratory factor analysis (EFA).</p>
Full article ">Figure 4
<p>Path diagram of the two-factor confirmatory factor analysis (CFA) model. Fear and Anxiety (FA) and Mistrust and Ethics (ME). F: Fear; A: Anxiety; M: Mistrust; E: Ethics.</p>
Full article ">Figure 5
<p>Whisker plots for the distribution of the four FAME (Fear, Anxiety, Mistrust, and Ethics) constructs scores.</p>
Full article ">Figure 6
<p>Error bars showing the four FAME constructs scores stratified per the level of anxiety of the participating medical students towards generative artificial intelligence (genAI). CI: confidence interval for the mean.</p>
Full article ">
46 pages, 8707 KiB  
Article
Design and Enhancement of a Fog-Enabled Air Quality Monitoring and Prediction System: An Optimized Lightweight Deep Learning Model for a Smart Fog Environmental Gateway
by Divya Bharathi Pazhanivel, Anantha Narayanan Velu and Bagavathi Sivakumar Palaniappan
Sensors 2024, 24(15), 5069; https://doi.org/10.3390/s24155069 - 5 Aug 2024
Cited by 2 | Viewed by 1939
Abstract
Effective air quality monitoring and forecasting are essential for safeguarding public health, protecting the environment, and promoting sustainable development in smart cities. Conventional systems are cloud-based, incur high costs, lack accurate Deep Learning (DL)models for multi-step forecasting, and fail to optimize DL models [...] Read more.
Effective air quality monitoring and forecasting are essential for safeguarding public health, protecting the environment, and promoting sustainable development in smart cities. Conventional systems are cloud-based, incur high costs, lack accurate Deep Learning (DL)models for multi-step forecasting, and fail to optimize DL models for fog nodes. To address these challenges, this paper proposes a Fog-enabled Air Quality Monitoring and Prediction (FAQMP) system by integrating the Internet of Things (IoT), Fog Computing (FC), Low-Power Wide-Area Networks (LPWANs), and Deep Learning (DL) for improved accuracy and efficiency in monitoring and forecasting air quality levels. The three-layered FAQMP system includes a low-cost Air Quality Monitoring (AQM) node transmitting data via LoRa to the Fog Computing layer and then the cloud layer for complex processing. The Smart Fog Environmental Gateway (SFEG) in the FC layer introduces efficient Fog Intelligence by employing an optimized lightweight DL-based Sequence-to-Sequence (Seq2Seq) Gated Recurrent Unit (GRU) attention model, enabling real-time processing, accurate forecasting, and timely warnings of dangerous AQI levels while optimizing fog resource usage. Initially, the Seq2Seq GRU Attention model, validated for multi-step forecasting, outperformed the state-of-the-art DL methods with an average RMSE of 5.5576, MAE of 3.4975, MAPE of 19.1991%, R2 of 0.6926, and Theil’s U1 of 0.1325. This model is then made lightweight and optimized using post-training quantization (PTQ), specifically dynamic range quantization, which reduced the model size to less than a quarter of the original, improved execution time by 81.53% while maintaining forecast accuracy. This optimization enables efficient deployment on resource-constrained fog nodes like SFEG by balancing performance and computational efficiency, thereby enhancing the effectiveness of the FAQMP system through efficient Fog Intelligence. The FAQMP system, supported by the EnviroWeb application, provides real-time AQI updates, forecasts, and alerts, aiding the government in proactively addressing pollution concerns, maintaining air quality standards, and fostering a healthier and more sustainable environment. Full article
(This article belongs to the Special Issue Artificial Intelligence Methods for Smart Cities—2nd Edition)
Show Figures

Figure 1

Figure 1
<p>Post-training optimization methods provided by TensorFlow.</p>
Full article ">Figure 2
<p>A three-layered Fog Computing-based architecture of the proposed system.</p>
Full article ">Figure 3
<p>Hardware of the proposed FAQMP system. (<b>a</b>) Air Quality Monitoring (AQM) Sensor Node. (<b>b</b>) Smart Fog Environmental Gateway (SFEG).</p>
Full article ">Figure 4
<p>Architecture and data flow of the proposed Fog-enabled Air Quality Monitoring and Prediction (FAQMP) System.</p>
Full article ">Figure 5
<p>DL model deployment pipeline after model quantization.</p>
Full article ">Figure 6
<p>Real-time alerts triggered by anomalous AQI Levels via email.</p>
Full article ">Figure 7
<p>Graphical User Interface of the EnviroWeb application displaying the live pollutants, Air Quality Index (AQI) level, and recommendations for citizens in real time.</p>
Full article ">Figure 8
<p>City-wide implementation of the proposed FAQMP system.</p>
Full article ">Figure 9
<p>GRU architecture.</p>
Full article ">Figure 10
<p>Architecture of the Sequence-to-Sequence GRU Attention mechanism.</p>
Full article ">Figure 11
<p>Steps involved in multivariate multi-step air quality forecasting.</p>
Full article ">Figure 12
<p>Error metrics of DL models to forecast PM<sub>2.5</sub> over twelve time steps (t1–t12). (<b>a</b>) RMSE comparison; (<b>b</b>) MAE comparison; (<b>c</b>) MAPE comparison.</p>
Full article ">Figure 13
<p>Performance metrics of DL models to forecast PM<sub>2.5</sub> over twelve time steps (t1–t12). (<b>a</b>) R<sup>2</sup> comparison; (<b>b</b>) Theil’s U1 comparison.</p>
Full article ">Figure 14
<p>Error metrics of DL models to forecast PM<sub>10</sub> over twelve time steps (t1–t12). (<b>a</b>) RMSE comparison; (<b>b</b>) MAE comparison; (<b>c</b>) MAPE comparison.</p>
Full article ">Figure 15
<p>Performance metrics of DL models to forecast PM<sub>10</sub> over twelve time steps (t1–t12). (<b>a)</b> R<sup>2</sup> comparison; (<b>b</b>) Theil’s U1 comparison.</p>
Full article ">Figure 16
<p>Performance metrics (RMSE, MAE, MAPE, R<sup>2</sup>, and U1) of the compared models across all pollutants (PM2.5, PM10, NO2, SO2, CO, and O3) over 12 time steps (t1–t12): (<b>a</b>) Average RMSE; (<b>b</b>) Average MAE; (<b>c</b>) Average MAPE; (<b>d</b>) Average R<sup>2</sup>; (<b>e</b>) Average Theil’s U1; and Model 1—GRU, Model 2—LSTM-GRU, Model 3—Seq2Seq GRU, Model 4—GRU Autoencoder, Model 5—GRU-LSTM Autoencoder, Model 6—GRU Attention, Model 7—LSTM-GRU Attention, Model 8—Seq2Seq LSTM Attention, Model 9—Seq2Seq Bi-LSTM Attention, and Our model—Seq2Seq GRU Attention.</p>
Full article ">Figure 17
<p>TensorFlow Lite models—file size comparison.</p>
Full article ">
21 pages, 3333 KiB  
Article
Assessment of the Technical Impacts of Electric Vehicle Penetration in Distribution Networks: A Focus on System Management Strategies Integrating Sustainable Local Energy Communities
by Samuel Borroy Vicente, Gregorio Fernández, Noemi Galan, Andrés Llombart Estopiñán, Matteo Salani, Marco Derboni, Vincenzo Giuffrida and Luis Hernández-Callejo
Sustainability 2024, 16(15), 6464; https://doi.org/10.3390/su16156464 - 28 Jul 2024
Cited by 5 | Viewed by 2026
Abstract
Aligned with the objectives of the energy transition, the increased penetration levels of electric vehicles as part of the electrification of economy, especially within the framework of local energy communities and distributed energy resources, are crucial in shaping sustainable and decentralized energy systems. [...] Read more.
Aligned with the objectives of the energy transition, the increased penetration levels of electric vehicles as part of the electrification of economy, especially within the framework of local energy communities and distributed energy resources, are crucial in shaping sustainable and decentralized energy systems. This work aims to assess the impact of escalating electric vehicles’ deployment on sustainable local energy community-based low-voltage distribution networks. Through comparative analyses across various levels of electric vehicle integration, employing different charging strategies and system management approaches, the research highlights the critical role of active system management instruments such as smart grid monitoring and active network management tools, which significantly enhance the proactive management capabilities of distribution system operators. The findings demonstrate that increased electric vehicle penetration rates intensify load violations, which strategic electric vehicle charging management can significantly mitigate, underscoring the necessity of load management strategies in alleviating grid stress in the context assessed. This study highlights the enhanced outcomes derived from active system management strategies which foster collaboration among distribution system operators, demand aggregators, and local energy communities’ managers within a local flexibility market framework. The results of the analysis illustrate that this proactive and cooperative approach boosts system flexibility and effectively averts severe grid events, which otherwise would likely occur. The findings reveal the need for an evolution towards more predictive and proactive system management in electricity distribution, emphasizing the significant benefits of fostering robust partnerships among actors to ensure grid stability amid rising electric vehicle integration. Full article
Show Figures

Figure 1

Figure 1
<p>One-line diagram of the LV topology of the Urban Network. Supply points are represented by dots along the LV lines (to enhance clarity, each LV line is depicted in a different color). PV units’ locations are highlighted in blue color.</p>
Full article ">Figure 2
<p>Example of two charging profiles (unmanaged vs. economic charging management) of an EV connected in the evening at 19:00.</p>
Full article ">Figure 3
<p>Conceptual representation of active system management strategy. Voltage (V) and load level (L) limits are relative to nominal values.</p>
Full article ">Figure 4
<p>Overload results comparison. Left side: month analysis results for BAU framework. Right side: day analysis results comparing BAU and active system management frameworks.</p>
Full article ">
28 pages, 5240 KiB  
Article
Multi-Hospital Management: Combining Vital Signs IoT Data and the Elasticity Technique to Support Healthcare 4.0
by Gabriel Souto Fischer, Gabriel de Oliveira Ramos, Cristiano André da Costa, Antonio Marcos Alberti, Dalvan Griebler, Dhananjay Singh and Rodrigo da Rosa Righi
IoT 2024, 5(2), 381-408; https://doi.org/10.3390/iot5020019 - 8 Jun 2024
Cited by 3 | Viewed by 1947
Abstract
Smart cities can improve the quality of life of citizens by optimizing the utilization of resources. In an IoT-connected environment, people’s health can be constantly monitored, which can help identify medical problems before they become serious. However, overcrowded hospitals can lead to long [...] Read more.
Smart cities can improve the quality of life of citizens by optimizing the utilization of resources. In an IoT-connected environment, people’s health can be constantly monitored, which can help identify medical problems before they become serious. However, overcrowded hospitals can lead to long waiting times for patients to receive treatment. The literature presents alternatives to address this problem by adjusting care capacity to demand. However, there is still a need for a solution that can adjust human resources in multiple healthcare settings, which is the reality of cities. This work introduces HealCity, a smart-city-focused model that can monitor patients’ use of healthcare settings and adapt the allocation of health professionals to meet their needs. HealCity uses vital signs (IoT) data in prediction techniques to anticipate when the demand for a given environment will exceed its capacity and suggests actions to allocate health professionals accordingly. Additionally, we introduce the concept of multilevel proactive human resources elasticity in smart cities, thus managing human resources at different levels of a smart city. An algorithm is also devised to automatically manage and identify the appropriate hospital for a possible future patient. Furthermore, some IoT deployment considerations are presented based on a hardware implementation for the proposed model. HealCity was evaluated with four hospital settings and obtained promising results: Compared to hospitals with rigid professional allocations, it reduced waiting time for care by up to 87.62%. Full article
Show Figures

Figure 1

Figure 1
<p>Problem use-case example of a scenario where there is an inefficient static allocation of attendants in two hospitals. The level of dissatisfaction is higher in rooms that have fewer attendants available, and it is easy to see that idle attendants in a room could easily go to rooms with greater need. Additionally, we have people with health problems at home or at work who can sometimes end up heading to one of these two hospitals.</p>
Full article ">Figure 2
<p>Smart city hierarchical tree-based structure view with a focus on monitoring patients’ health parameters. People wear sensors that transmit health parameters to a fog-cloud infrastructure that provides health information directly to healthcare settings. In this structure, citizens are at the lowest level, interacting with edge devices, while hospitals are at the highest level, interacting with data already processed by the cloud infrastructure.</p>
Full article ">Figure 3
<p>Architectural components and network topology in HealCity model with a (i) web service; (ii) HealCity service for information processing and decision-making; (iii) a sensor network to capture citizens’ vital signs and locations; and (iv) hospital managers, patients and people in general, or human resources.</p>
Full article ">Figure 4
<p>HealCity Model Architecture Overview, illustrating the data trajectory beginning in the Capture module, which assimilates users’ movement data via RTLS sensors. These data are subsequently processed across various designated modules, culminating in the display of elasticity notifications within the HealCity app.</p>
Full article ">Figure 5
<p>HealCity model inputs and outputs.</p>
Full article ">Figure 6
<p>HealCity’s scalable hierarchical solution, where we can add more hospitals under any fog node and as many fog nodes as needed.</p>
Full article ">Figure 7
<p>Multilevel Proactive Elasticity of Human Resources in Smart Cities example with (i) room-level proactive elasticity, (ii) hospital-level proactive elasticity, and (iii) regional-level proactive elasticity.</p>
Full article ">Figure 8
<p>Proactive elasticity acts to anticipate the care waiting time, so the allocation and deallocation of human resources are carried out in advance prior to the achievement of predetermined thresholds.</p>
Full article ">Figure 9
<p>Regional-Level Proactive Elasticity fluxogram.</p>
Full article ">Figure 10
<p>Example of patient with altered vital signs in a smart city with three hospitals available. Even if there are hospitals closer, the most suitable for the patient is the farthest away.</p>
Full article ">Figure 11
<p>A graphical illustration of the wave workloads used in HealCity evaluation (based on Rostirolla et al. [<a href="#B54-IoT-05-00019" class="html-bibr">54</a>]).</p>
Full article ">Figure 12
<p>Maximum waiting time at the hospital for each of the proposed scenarios, S1 (in red), S2 (in orange), and S3 (in green), for (<b>a</b>) Hospital 1, (<b>b</b>) Hospital 2, (<b>c</b>) Hospital 3 and (<b>d</b>) Hospital 4, and average of maximum waiting time at (<b>e</b>) Smart City.</p>
Full article ">Figure 13
<p>Human resources cost compared with the average of maximum waiting time at the smart city in (<b>a</b>) S1 and S3 and (<b>b</b>) S2 and S3.</p>
Full article ">Figure 14
<p>Elastic number of human resources used compared with average of maximum waiting time at the smart city in S3.</p>
Full article ">Figure 15
<p>Intermec IF2 RFID reader installed in the Internet of Things and Distributed Applications laboratory of the PPGCA at Unisinos where in (<b>A</b>) the antenna was installed above the door and in (<b>B</b>) the antenna was installed next to the door.</p>
Full article ">Figure 16
<p>RFID-tags reading area around the Intermec IF2 reader antenna.</p>
Full article ">Figure 17
<p>RFID-tags front reading area of the Intermec IF2 reader antenna.</p>
Full article ">Figure 18
<p>Proposed installation of the Intermec IF2 reader antennas in two scenarios: (<b>A</b>) with a single door and (<b>B</b>) with a double door, where in both examples the doors are 2.1 m high.</p>
Full article ">
20 pages, 7114 KiB  
Article
COVID-19 Vaccination Reporting and Adverse Event Analysis in Taiwan
by Wan-Chung Hu, Sheng-Kang Chiu, Ying-Fei Yang and Sher Singh
Vaccines 2024, 12(6), 591; https://doi.org/10.3390/vaccines12060591 - 29 May 2024
Viewed by 5859
Abstract
The COVID-19 pandemic necessitated an urgent global response in vaccine deployment, achieving over 70.6% global vaccination coverage with at least one dose. This study focuses on Taiwan’s vaccine administration and adverse event reporting, set against a global backdrop. Using data from Taiwan’s Vaccine [...] Read more.
The COVID-19 pandemic necessitated an urgent global response in vaccine deployment, achieving over 70.6% global vaccination coverage with at least one dose. This study focuses on Taiwan’s vaccine administration and adverse event reporting, set against a global backdrop. Using data from Taiwan’s Vaccine Adverse Event Reporting System (VAERS) and global vaccination data, this study investigates vaccine safety and the public health implications of vaccination strategies from local and global perspectives. Taiwan’s proactive approach, resulting in high vaccination rates, provides a case study for the monitoring and management of vaccine-related adverse events. This study offers insights into the safety profiles of various COVID-19 vaccines and further explores the implications of adverse event reporting rates for vaccine policy and public health strategies. The comparative analysis reveals that, while vaccination has been effective in controlling the virus’s spread, safety monitoring remains critical for maintaining public trust. It underscores the necessity of enhanced surveillance and the importance of transparent and tailored risk communication to support informed public health decisions. The findings aim to contribute to the global dialogue on vaccine safety, equitable distribution, evidence-based policy-making, and development of mitigation measures with consideration of local demographics in the ongoing fight against COVID-19. Full article
(This article belongs to the Special Issue COVID-19 Vaccination, Role of Vaccines and Global Health)
Show Figures

Figure 1

Figure 1
<p>Taiwan COVID-19 vaccine program timeline.</p>
Full article ">Figure 2
<p>Daily COVID-19 vaccine doses administered with a 7-day rolling average. All doses, including boosters, are counted individually. (Results were analyzed by Our World in Data (<a href="https://ourworldindata.org/explorers/coronavirus-data-explorer?yScale=log&amp;zoomToSelection=true&amp;facet=none&amp;uniformYAxis=0&amp;country=OWID_WRL~TWN&amp;pickerSort=asc&amp;pickerMetric=location&amp;hideControls=false&amp;Metric=Vaccine+doses&amp;Interval=7-day+rolling+average&amp;Relative+to+Population=false&amp;Color+by+test+positivity=false" target="_blank">https://ourworldindata.org/explorers/coronavirus-data-explorer?yScale=log&amp;zoomToSelection=true&amp;facet=none&amp;uniformYAxis=0&amp;country=OWID_WRL~TWN&amp;pickerSort=asc&amp;pickerMetric=location&amp;hideControls=false&amp;Metric=Vaccine+doses&amp;Interval=7-day+rolling+average&amp;Relative+to+Population=false&amp;Color+by+test+positivity=false</a>, accessed on 14 February 2024) based on the original study [<a href="#B15-vaccines-12-00591" class="html-bibr">15</a>]).</p>
Full article ">Figure 3
<p>Total COVID-19 vaccine doses administered per 100 people. All doses, including boosters, are counted individually. (Results were analyzed by Our World in Data, “Cumulative COVID-19 vaccinations per 100 people” [dataset] (<a href="https://ourworldindata.org/grapher/covid-vaccination-doses-per-capita?country=TWN~OWID_ASI~OWID_WRL~OWID_EUR~OWID_OCE~OWID_NAM~AUS~OWID_AFR~OWID_SAM" target="_blank">https://ourworldindata.org/grapher/covid-vaccination-doses-per-capita?country=TWN~OWID_ASI~OWID_WRL~OWID_EUR~OWID_OCE~OWID_NAM~AUS~OWID_AFR~OWID_SAM</a>, accessed on 15 February 2024) based on the original study [<a href="#B15-vaccines-12-00591" class="html-bibr">15</a>]).</p>
Full article ">Figure 4
<p>Share of people who received at least one dose of COVID-19 vaccine. Total number of people who received at least one vaccine dose, divided by the total population of the country. (Results were analyzed by Our World in Data, “people_vaccinated_per_hundred” [dataset] (<a href="https://ourworldindata.org/grapher/share-people-vaccinated-covid?country=TWN~OWID_WRL~OWID_ASI" target="_blank">https://ourworldindata.org/grapher/share-people-vaccinated-covid?country=TWN~OWID_WRL~OWID_ASI</a>, accessed on 16 February 2024) based on the original study [<a href="#B15-vaccines-12-00591" class="html-bibr">15</a>]).</p>
Full article ">Figure 5
<p>COVID-19 vaccination coverage worldwide. Share of people who received at least one dose of COVID-19 vaccine. (Results were analyzed by Our World in Data, “% of population with ≥1 dose” [dataset] (<a href="https://ourworldindata.org/grapher/covid-people-vaccinated-marimekko" target="_blank">https://ourworldindata.org/grapher/covid-people-vaccinated-marimekko</a>), accessed on 16 February 2024).</p>
Full article ">Figure 6
<p>Estimated cumulative excess deaths per 100,000 people during COVID-19, Taiwan. (Results were analyzed by Our World in Data (<a href="https://ourworldindata.org/explorers/coronavirus-data-explorer?tab=chart&amp;zoomToSelection=true&amp;facet=none&amp;coutry=TWN~OWID_EUR~OWID_ASI~OWID_OCE~OWID_SAM~OWID_AFR~OWID_NAM&amp;pickerSort=asc&amp;pickerMetric=location&amp;hideControls=true&amp;Metric=Excess+mortality+%28estimates%29&amp;Interval=Cumulative&amp;Relative+to+Population=true&amp;Color+by+test+positivity=true" target="_blank">https://ourworldindata.org/explorers/coronavirus-data-explorer?tab=chart&amp;zoomToSelection=true&amp;facet=none&amp;coutry=TWN~OWID_EUR~OWID_ASI~OWID_OCE~OWID_SAM~OWID_AFR~OWID_NAM&amp;pickerSort=asc&amp;pickerMetric=location&amp;hideControls=true&amp;Metric=Excess+mortality+%28estimates%29&amp;Interval=Cumulative&amp;Relative+to+Population=true&amp;Color+by+test+positivity=true</a>) based on The Economist (2022) and the WHO COVID-19 Dashboard, accessed on 16 February 2024). For countries that did not report all-cause mortality data for a given week, an estimate is shown, with uncertainty interval. If reported data are available, that value only is shown. On the map, only the central estimate is shown.</p>
Full article ">Figure 7
<p>Notification of serious adverse vaccine reactions in Taiwan from 22 March 2021 to 30 September 2023. Data source: COVID-19 Vaccine Adverse Event Notification Information Report, Taiwan Food and Drug Administration, <a href="https://www.fda.gov.tw/tc/includes/GetFile.ashx?id=f638331478640715627&amp;type=2&amp;cid=45553" target="_blank">https://www.fda.gov.tw/tc/includes/GetFile.ashx?id=f638331478640715627&amp;type=2&amp;cid=45553</a>, accessed on 15 February 2024.</p>
Full article ">Figure 8
<p>Cumulative reporting of adverse events of special concern in Taiwan in the period of (<b>a</b>) 22 March 2021 to 30 September 2023 and (<b>b</b>) 12 January 2023 to 31 December 2023. Data source: COVID-19 Vaccine Adverse Event Notification Information Report, Taiwan Food and Drug Administration.</p>
Full article ">
22 pages, 8538 KiB  
Article
Enhancing Data Preservation and Security in Industrial Control Systems through Integrated IOTA Implementation
by Iuon-Chang Lin, Pai-Ching Tseng, Pin-Hsiang Chen and Shean-Juinn Chiou
Processes 2024, 12(5), 921; https://doi.org/10.3390/pr12050921 - 30 Apr 2024
Cited by 4 | Viewed by 1207
Abstract
Within the domain of industrial control systems, safeguarding data integrity stands as a pivotal endeavor, especially in light of the burgeoning menace posed by malicious tampering and potential data loss. Traditional data storage paradigms, tethered to physical hard disks, are fraught with inherent [...] Read more.
Within the domain of industrial control systems, safeguarding data integrity stands as a pivotal endeavor, especially in light of the burgeoning menace posed by malicious tampering and potential data loss. Traditional data storage paradigms, tethered to physical hard disks, are fraught with inherent susceptibilities, underscoring the pressing need for the deployment of resilient preservation frameworks. This study delves into the transformative potential offered by distributed ledger technology (DLT), with a specific focus on IOTA, within the expansive landscape of the Internet of Things (IoT). Through a meticulous examination of the intricacies inherent to data transmission protocols, we present a novel paradigm aimed at fortifying data security. Our approach advocates for the strategic placement of IOTA nodes on lower-level devices, thereby streamlining the transmission pathway and curtailing vulnerabilities. This concerted effort ensures the seamless preservation of data confidentiality and integrity from inception to storage, bolstering trust in the convergence of IoT and DLT technologies. By embracing proactive measures, organizations can navigate the labyrinthine terrain of data management, effectively mitigate risks, and cultivate an environment conducive to innovation and progress. Full article
(This article belongs to the Special Issue Process Automation and Smart Manufacturing in Industry 4.0/5.0)
Show Figures

Figure 1

Figure 1
<p>Cipher Feedback (CFB) mode encryption.</p>
Full article ">Figure 2
<p>The technique relationships of our proposed architecture.</p>
Full article ">Figure 3
<p>A flowchart of creating and setting up an IOTA node in a container.</p>
Full article ">Figure 4
<p>Proposed system architecture to ensure data integrity.</p>
Full article ">Figure 5
<p>Sequence diagram for non-confidential data upload.</p>
Full article ">Figure 6
<p>Proposed method based on CFB encryption.</p>
Full article ">Figure 7
<p>Sequence diagram for non-confidential data retrieval.</p>
Full article ">Figure 8
<p>Sequence diagram for uploading confidential data.</p>
Full article ">Figure 9
<p>Sequence diagram for confidential data retrieval.</p>
Full article ">Figure 10
<p>Sequence diagram for large data upload.</p>
Full article ">Figure 11
<p>Sequence diagram for large data retrieval.</p>
Full article ">Figure 12
<p>IOTA node built with Docker.</p>
Full article ">Figure 13
<p>Data on IOTA.</p>
Full article ">Figure 14
<p>ARP spoofing implementation by the attacker.</p>
Full article ">Figure 15
<p>Victim of ARP spoofing.</p>
Full article ">Figure 16
<p>The captured packet by the attacker.</p>
Full article ">Figure 17
<p>The computation time of data upload.</p>
Full article ">Figure 18
<p>The computational time of data retrieval.</p>
Full article ">
25 pages, 815 KiB  
Article
Enhancing Safety in IoT Systems: A Model-Based Assessment of a Smart Irrigation System Using Fault Tree Analysis
by Alhassan Abdulhamid, Md Mokhlesur Rahman, Sohag Kabir and Ibrahim Ghafir
Electronics 2024, 13(6), 1156; https://doi.org/10.3390/electronics13061156 - 21 Mar 2024
Cited by 6 | Viewed by 2184
Abstract
The agricultural industry has the potential to undergo a revolutionary transformation with the use of Internet of Things (IoT) technology. Crop monitoring can be improved, waste reduced, and efficiency increased. However, there are risks associated with system failures that can lead to significant [...] Read more.
The agricultural industry has the potential to undergo a revolutionary transformation with the use of Internet of Things (IoT) technology. Crop monitoring can be improved, waste reduced, and efficiency increased. However, there are risks associated with system failures that can lead to significant losses and food insecurity. Therefore, a proactive approach is necessary to ensure the effective safety assessment of new IoT systems before deployment. It is crucial to identify potential causes of failure and their severity from the conceptual design phase of the IoT system within smart agricultural ecosystems. This will help prevent such risks and ensure the safety of the system. This study examines the failure behaviour of IoT-based Smart Irrigation Systems (SIS) to identify potential causes of failure. This study proposes a comprehensive Model-Based Safety Analysis (MBSA) framework to model the failure behaviour of SIS and generate analysable safety artefacts of the system using System Modelling Language (SysML). The MBSA approach provides meticulousness to the analysis, supports model reuse, and makes the development of a Fault Tree Analysis (FTA) model easier, thereby reducing the inherent limitations of informal system analysis. The FTA model identifies component failures and their propagation, providing a detailed understanding of how individual component failures can lead to the overall failure of the SIS. This study offers valuable insights into the interconnectedness of various component failures by evaluating the SIS failure behaviour through the FTA model. This study generates multiple minimal cut sets, which provide actionable insights into designing dependable IoT-based SIS. This analysis identifies potential weak points in the design and provides a foundation for safety risk mitigation strategies. This study emphasises the significance of a systematic and model-driven approach to improving the dependability of IoT systems in agriculture, ensuring sustainable and safe implementation. Full article
(This article belongs to the Collection Electronics for Agriculture)
Show Figures

Figure 1

Figure 1
<p>Example of a Petri Net model.</p>
Full article ">Figure 2
<p>Example of a fault tree.</p>
Full article ">Figure 3
<p>SysML Diagrams.</p>
Full article ">Figure 4
<p>Proposed MBSA framework.</p>
Full article ">Figure 5
<p>Architecture of an IoT-based Smart Irrigation System.</p>
Full article ">Figure 6
<p>Block definition diagram model of an IoT-based Smart Irrigation System.</p>
Full article ">Figure 7
<p>Internal block diagram model of an IoT-based Smart Irrigation System.</p>
Full article ">Figure 8
<p>Example of failure annotation, (<b>a</b>) failure annotation of a temperature sensor and (<b>b</b>) failure annotation of a power source.</p>
Full article ">Figure 9
<p>Mapping of component state machine diagram to component fault tree for (<b>a</b>) a temperature sensor and (<b>b</b>) a power source.</p>
Full article ">Figure 10
<p>Fault tree generated for IoT-enabled SIS.</p>
Full article ">
Back to TopTop