2,501 research outputs found

    Task allocation to actors in wireless sensor actor networks: an energy and time aware technique

    Get PDF
    AbstractTask allocation is a critical issue in proper engineering of cooperative applications in embedded systems with latency and energy constraints, as in wireless sensor and actor networks (WSANs). Existing task allocation algorithms are mostly concerned with energy savings and ignore time constraints and thus increase the makespan of tasks in the network as well as the probability of malfunctioning of the network. In this paper we take both energy awareness and reduction of actor tasks’ times to completion in WSANs into account and propose a two-phase task allocation technique based on Queuing theory. In the first phase, tasks are equally assigned to actors just to measure the capability of each actor to perform the assigned tasks. Tasks are then allocated to actors according to their measured capabilities in such a way to reduce the total completion times of all tasks in the network. The results of simulations on typical scenarios shows 45% improvement in the makespan of tasks in a network compared to the wellknown opportunistic load balancing (OLB) task allocation algorithm that is generally used in distributed systems. It is shown that our algorithms provide better tradeoffs between load balancing and completion times of all tasks in a WSAN compared to OLB

    Towards adaptive actors for scalable iot applications at the edge

    Get PDF
    Traditional device-cloud architectures are not scalable to the size of future IoT deployments. While edge and fog-computing principles seem like a tangible solution, they increase the programming effort of IoT systems, do not provide the same elasticity guarantees as the cloud and are of much greater hardware heterogeneity. Future IoT applications will be highly distributed and place their computational tasks on any combination of end-devices (sensor nodes, smartphones, drones), edge and cloud resources in order to achieve their application goals. These complex distributed systems require a programming model that allows developers to implement their applications in a simple way (i.e., focus on the application logic) and an execution framework that runs these applications resiliently with a high resource efficiency, while maximizing application utility. Towards such distributed execution runtime, we propose Nandu, an actor based system that adapts and migrates tasks dynamically using developer provided hints as seed information. Nandu allows developers to focus on sequential application logic and transforms their application into distributed, adaptive actors. The resulting actors support fine-grained entry points for the execution environment. These entry points allow local schedulers to adapt actors seamlessly to the current context, while optimizing the overall application utility according to developer provided requirements

    An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT.

    Get PDF
    Social Edge Service (SES) is an emerging mechanism in the Social Internet of Things (SIoT) orchestration for effective user-centric reliable communication and computation. The services are affected by active and/or passive attacks such as replay attacks, message tampering because of sharing the same spectrum, as well as inadequate trust measurement methods among intelligent devices (roadside units, mobile edge devices, servers) during computing and content-sharing. These issues lead to computation and communication overhead of servers and computation nodes. To address this issue, we propose the HybridgrAph-Deep-learning (HAD) approach in two stages for secure communication and computation. First, the Adaptive Trust Weight (ATW) model with relation-based feedback fusion analysis to estimate the fitness-priority of every node based on directed graph theory to detect malicious nodes and reduce computation and communication overhead. Second, a Quotient User-centric Coeval-Learning (QUCL) mechanism to formulate secure channel selection, and Nash equilibrium method for optimizing the communication to share data over edge devices. The simulation results confirm that our proposed approach has achieved effective communication and computation performance, and enhanced Social Edge Services (SES) reliability than state-of-the-art approaches

    Energy Aware Algorithms for managing Wireless Sensor Networks

    Get PDF
    While the majority of the current Wireless Sensor Networks (WSNs) research has prioritized either the coverage of the monitored area or the energy efficiency of the network, it is clear that their relationship must be further studied in order to find optimal solutions that balance the two factors. Higher degrees of redundancy can be attained by increasing the number of active sensors monitoring a given area which results in better performance. However, this in turn increases the energy being consumed. In our research, we focus on attaining a solution that considers several optimization parameters such as the percentage of coverage, quality of coverage and energy consumption. The problem is modeled using a bipartite graph and employs an evolutionary algorithm to handle the activation and deactivation of the sensors. An accelerated version of the algorithm is also presented; this algorithm attempts to cleverly mutate the string being considered after analyzing the desired output conditions and performs a calculated crossover depending on the fitness of the parent strings. This results in a quicker convergence and a considerable reduction in the search time for attaining the desired solutions. Proficient cluster formation in wireless sensor networks reduces the total energy consumed by the network and prolongs the life of the network. There are various clustering approaches proposed, depending on the application and the objective to be attained. There are situations in which sensors are randomly dispersed over the area to be monitored. In our research, we also propose a solution for such scenarios using heterogeneous networks where a network has to self-organize itself depending on the physical allocations of sensors, cluster heads etc. The problem is modeled using a multi-stage graph and employs combinatorial algorithms to determine which cluster head a particular sensor would report to and which sink node a cluster head would report to. The solution proposed provides flexibility so that it can be applied to any network irrespective of density of resources deployed in the network. Finally we try to analyze how the modification of the sequence of execution of the two methods modifies the results. We also attempt to diagnose the reasons responsible for it and conclude by highlighting the advantages of each of the sequence

    Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems

    Full text link
    Intelligent transportation systems (ITSs) have been fueled by the rapid development of communication technologies, sensor technologies, and the Internet of Things (IoT). Nonetheless, due to the dynamic characteristics of the vehicle networks, it is rather challenging to make timely and accurate decisions of vehicle behaviors. Moreover, in the presence of mobile wireless communications, the privacy and security of vehicle information are at constant risk. In this context, a new paradigm is urgently needed for various applications in dynamic vehicle environments. As a distributed machine learning technology, federated learning (FL) has received extensive attention due to its outstanding privacy protection properties and easy scalability. We conduct a comprehensive survey of the latest developments in FL for ITS. Specifically, we initially research the prevalent challenges in ITS and elucidate the motivations for applying FL from various perspectives. Subsequently, we review existing deployments of FL in ITS across various scenarios, and discuss specific potential issues in object recognition, traffic management, and service providing scenarios. Furthermore, we conduct a further analysis of the new challenges introduced by FL deployment and the inherent limitations that FL alone cannot fully address, including uneven data distribution, limited storage and computing power, and potential privacy and security concerns. We then examine the existing collaborative technologies that can help mitigate these challenges. Lastly, we discuss the open challenges that remain to be addressed in applying FL in ITS and propose several future research directions
    • …
    corecore