1
|
El Mawas Z, Cappelle C, Daher M, El Badaoui El Najjar M. Comparative Analysis of Centralized and Federated Learning Techniques for Sensor Diagnosis Applied to Cooperative Localization for Multi-Robot Systems. Sensors (Basel) 2023; 23:7351. [PMID: 37687806 PMCID: PMC10490537 DOI: 10.3390/s23177351] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/20/2023] [Revised: 08/10/2023] [Accepted: 08/17/2023] [Indexed: 09/10/2023]
Abstract
Cooperation in multi-vehicle systems has gained great interest, as it has potential and requires proving safety conditions and integration. To localize themselves, vehicles observe the environment using sensors with various technologies, each prone to faults that can degrade the performance and reliability of the system. In this paper, we propose the coupling of model-based and data-driven techniques in diagnosis to produce a fault-tolerant cooperative localization solution. Consequently, prior knowledge can guide a discriminative model that learns from a labeled dataset of appropriately injected sensor faults to effectively identify and flag erroneous readings. Going further in security, we conduct a comparative study on learning techniques: centralized and federated. In centralized learning, fault indicators generated by model-based techniques from all vehicles are collected to train a single model, while federating the learning allows local models to be trained on each vehicle individually without sharing anything but the models to be aggregated. Logistic regression is used for learning where parameters are established prior to learning and contingent upon the input dimensionality. We evaluate the faults detection performance considering diverse fault scenarios, aiming to test the effectiveness of each and assess their performance in the context of sensor faults detection within a multi-vehicle system.
Collapse
Affiliation(s)
- Zaynab El Mawas
- CRIStAL, Centre de Recherche en Informatique Signal et Automatique de Lille, University of Lille, CNRS, UMR 9189, F-59000 Lille, France; (C.C.); (M.E.B.E.N.)
| | - Cindy Cappelle
- CRIStAL, Centre de Recherche en Informatique Signal et Automatique de Lille, University of Lille, CNRS, UMR 9189, F-59000 Lille, France; (C.C.); (M.E.B.E.N.)
| | - Mohamad Daher
- Computer Science Department, Beirut Arab University, Beirut 1107, Lebanon;
| | - Maan El Badaoui El Najjar
- CRIStAL, Centre de Recherche en Informatique Signal et Automatique de Lille, University of Lille, CNRS, UMR 9189, F-59000 Lille, France; (C.C.); (M.E.B.E.N.)
| |
Collapse
|
2
|
Xie G, Fan D, Wang H, Zhu R, Mao J, Wang H. Strong Reliable Electrostatic Actuation Based on Self-Clearing Using a Thin Conductive Layer. Soft Robot 2023; 10:797-807. [PMID: 36854131 DOI: 10.1089/soro.2022.0132] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/02/2023] Open
Abstract
Electrostatic adhesion, as a promising actuation technique for soft robotics, severely suffers from the failure caused by the unpredictable electrical breakdown. This study proposes a novel self-clearing mechanism for electrostatic actuators, particularly for electrostatic adhesion. By simply employing an enough thin conductive layer (e.g., <7 μm for copper), this method can spontaneously clear the conductor around the breakdown sites effectively once breakdowns onset and survive the actuator shortly after the electrical damage. Compared with previous self-clearing methods, which typically rely on new specific materials, this mechanism is easy to operate and compatible with various materials and fabrication processes. In our tests, it can improve the maximum available voltage by 260% and the maximum electrostatic adhesive force by 276%. In addition, the robustness and repeatability of the self-clearing mechanism are validated by surviving consecutive breakdowns and self-clearing of 173 times during 65 min. This method is also demonstrated to be capable of recovering the electrostatic pad from severe physical damages such as punctures, penetrations, and cuttings successfully and enabling stable and reliable operation of the electrostatic clutch, or gripping, for example, even after the short-circuit takes place for hundreds of times. Therefore, the proposed self-clearing method sheds new light on high performance and more extensive practical applications of electrostatic actuators in the future.
Collapse
Affiliation(s)
- Guoyong Xie
- Shenzhen Key Laboratory of Biomimetic Robotics and Intelligent Systems, Department of Mechanical and Energy Engineering, Southern University of Science and Technology, Shenzhen, , China
| | - Dongliang Fan
- Shenzhen Key Laboratory of Biomimetic Robotics and Intelligent Systems, Department of Mechanical and Energy Engineering, Southern University of Science and Technology, Shenzhen, , China
- Guangdong Provincial Key Laboratory of Human-Augmentation and Rehabilitation Robotics in Universities, Southern University of Science and Technology, Shenzhen, China
| | - Huacen Wang
- Shenzhen Key Laboratory of Biomimetic Robotics and Intelligent Systems, Department of Mechanical and Energy Engineering, Southern University of Science and Technology, Shenzhen, , China
- Guangdong Provincial Key Laboratory of Human-Augmentation and Rehabilitation Robotics in Universities, Southern University of Science and Technology, Shenzhen, China
| | - Renjie Zhu
- Shenzhen Key Laboratory of Biomimetic Robotics and Intelligent Systems, Department of Mechanical and Energy Engineering, Southern University of Science and Technology, Shenzhen, , China
- Guangdong Provincial Key Laboratory of Human-Augmentation and Rehabilitation Robotics in Universities, Southern University of Science and Technology, Shenzhen, China
| | - Jianjun Mao
- Guangdong Provincial Key Laboratory of Human-Augmentation and Rehabilitation Robotics in Universities, Southern University of Science and Technology, Shenzhen, China
| | - Hongqiang Wang
- Shenzhen Key Laboratory of Biomimetic Robotics and Intelligent Systems, Department of Mechanical and Energy Engineering, Southern University of Science and Technology, Shenzhen, , China
- Guangdong Provincial Key Laboratory of Human-Augmentation and Rehabilitation Robotics in Universities, Southern University of Science and Technology, Shenzhen, China
- Southern Marine Science and Engineering Guangdong Laboratory (Guangzhou), Guangzhou, China
| |
Collapse
|
3
|
Tošić A, Vičič J, Burnard M, Mrissa M. A Blockchain Protocol for Real-Time Application Migration on the Edge. Sensors (Basel) 2023; 23:s23094448. [PMID: 37177653 PMCID: PMC10181778 DOI: 10.3390/s23094448] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/07/2023] [Revised: 04/20/2023] [Accepted: 04/28/2023] [Indexed: 05/15/2023]
Abstract
The Internet of Things (IoT) is experiencing widespread adoption across industry sectors ranging from supply chain management to smart cities, buildings, and health monitoring. However, most software architectures for the IoT deployment rely on centralized cloud computing infrastructures to provide storage and computing power, as cloud providers have high economic incentives to organize their infrastructure into clusters. Despite these incentives, there has been a recent shift from centralized to decentralized architectures that harness the potential of edge devices, reduce network latency, and lower infrastructure costs to support IoT applications. This shift has resulted in new edge computing architectures, but many still rely on centralized solutions for managing applications. A truly decentralized approach would offer interesting properties required for IoT use cases. In this paper, we introduce a decentralized architecture tailored for large-scale deployments of peer-to-peer IoT sensor networks and capable of run-time application migration. We propose a leader election consensus protocol for permissioned distributed networks that only requires one series of messages in order to commit to a change. The solution combines a blockchain consensus protocol using Verifiable Delay Functions (VDF) to achieve decentralized randomness, fault tolerance, transparency, and no single point of failure. We validate our solution by testing and analyzing the performance of our reference implementation. Our results show that nodes are able to reach consensus consistently, and the VDF proofs can be used as an entropy pool for decentralized randomness. We show that our system can perform autonomous real-time application migrations. Finally, we conclude that the implementation is scalable by testing it on 100 consensus nodes running 200 applications.
Collapse
Affiliation(s)
- Aleksandar Tošić
- InnoRenew CoE, Livade 6a, 6310 Izola, Slovenia
- Faculty of Mathematics, Natural Sciences and Information Technologies, University of Primorska, Glagoljaška 8, 6000 Koper, Slovenia
| | - Jernej Vičič
- InnoRenew CoE, Livade 6a, 6310 Izola, Slovenia
- Faculty of Mathematics, Natural Sciences and Information Technologies, University of Primorska, Glagoljaška 8, 6000 Koper, Slovenia
| | - Michael Burnard
- InnoRenew CoE, Livade 6a, 6310 Izola, Slovenia
- Institute Andrej Marušič, University of Primorska, Muzejski Trg 2, 6000 Koper, Slovenia
| | - Michael Mrissa
- InnoRenew CoE, Livade 6a, 6310 Izola, Slovenia
- Faculty of Mathematics, Natural Sciences and Information Technologies, University of Primorska, Glagoljaška 8, 6000 Koper, Slovenia
| |
Collapse
|
4
|
Sastry JKR, Ch B, Budaraju RR. Implementing Dual Base Stations within an IoT Network for Sustaining the Fault Tolerance of an IoT Network through an Efficient Path Finding Algorithm. Sensors (Basel) 2023; 23:4032. [PMID: 37112373 PMCID: PMC10146772 DOI: 10.3390/s23084032] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/16/2023] [Revised: 04/06/2023] [Accepted: 04/12/2023] [Indexed: 06/19/2023]
Abstract
The IoT networks for implementing mission-critical applications need a layer to effect remote communication between the cluster heads and the microcontrollers. Remote communication is affected through base stations using cellular technologies. Using a single base station in this layer is risky as the fault tolerance level of the network will be zero when the base stations break down. Generally, the cluster heads are within the base station spectrum, making seamless integration possible. Implementing a dual base station to cater for a breakdown of the first base station creates huge remoteness as the cluster heads are not within the spectrum of the second base station. Furthermore, using the remote base station involves huge latency affecting the performance of the IoT network. In this paper, a relay-based network is presented with intelligence to fetch the shortest path for communicating to reduce latency and sustain the fault tolerance capability of the IoT network. The results demonstrate that the technique improved the fault tolerance of the IoT network by 14.23%.
Collapse
Affiliation(s)
- J. K. R. Sastry
- Department of ECM, K L Deemed to be University, Vaddeswaram 522302, India;
| | - Bhupati Ch
- Department of ECM, K L Deemed to be University, Vaddeswaram 522302, India;
| | | |
Collapse
|
5
|
Kim H, Kim D. A Taxonomic Hierarchy of Blockchain Consensus Algorithms: An Evolutionary Phylogeny Approach. Sensors (Basel) 2023; 23:2739. [PMID: 36904940 PMCID: PMC10007454 DOI: 10.3390/s23052739] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/31/2023] [Revised: 02/24/2023] [Accepted: 02/27/2023] [Indexed: 06/18/2023]
Abstract
Countless endeavors have been undertaken to address the Byzantine Generals Problem, a generalization of the Two Generals Problem. The emergence of proof of work (PoW) for Bitcoin has led to various consensus algorithms diverging, and comparable existing consensus algorithms are being gradually utilized interchangeably, or only developed for each specific application domain. Our approach employs an evolutionary phylogeny method to classify blockchain consensus algorithms based on their historical development and current usage. To demonstrate the relatedness and lineage of distinct algorithms, as well as to support the recapitulation theory, which posits that the evolutionary history of its mainnets is mirrored in the development of an individual consensus algorithm, we present a taxonomy. We have created a comprehensive classification of past and present consensus algorithms that serves to organize this swift consensus algorithm evolution period. By recognizing similarities, we have compiled a list of different verified consensus algorithms and performed clustering on over 38 of these. Our new taxonomic tree presents five taxonomic ranks, including the evolutionary process and decision-making method, as a technique for analyzing correlation. Through the examination of the evolution and utilization of these algorithms, we have developed a systematic and hierarchical taxonomy that enables the grouping of consensus algorithms into distinct categories. The proposed method classifies various consensus algorithms according to taxonomic ranks and aims to reveal the direction of research on the application of blockchain consensus algorithms for each domain.
Collapse
|
6
|
Shahid MA, Alam MM, Su’ud MM. Achieving Reliability in Cloud Computing by a Novel Hybrid Approach. Sensors (Basel) 2023; 23:1965. [PMID: 36850563 PMCID: PMC9961964 DOI: 10.3390/s23041965] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/15/2023] [Revised: 01/27/2023] [Accepted: 02/01/2023] [Indexed: 06/18/2023]
Abstract
Cloud computing (CC) benefits and opportunities are among the fastest growing technologies in the computer industry. Cloud computing's challenges include resource allocation, security, quality of service, availability, privacy, data management, performance compatibility, and fault tolerance. Fault tolerance (FT) refers to a system's ability to continue performing its intended task in the presence of defects. Fault-tolerance challenges include heterogeneity and a lack of standards, the need for automation, cloud downtime reliability, consideration for recovery point objects, recovery time objects, and cloud workload. The proposed research includes machine learning (ML) algorithms such as naïve Bayes (NB), library support vector machine (LibSVM), multinomial logistic regression (MLR), sequential minimal optimization (SMO), K-nearest neighbor (KNN), and random forest (RF) as well as a fault-tolerance method known as delta-checkpointing to achieve higher accuracy, lesser fault prediction error, and reliability. Furthermore, the secondary data were collected from the homonymous, experimental high-performance computing (HPC) system at the Swiss Federal Institute of Technology (ETH), Zurich, and the primary data were generated using virtual machines (VMs) to select the best machine learning classifier. In this article, the secondary and primary data were divided into two split ratios of 80/20 and 70/30, respectively, and cross-validation (5-fold) was used to identify more accuracy and less prediction of faults in terms of true, false, repair, and failure of virtual machines. Secondary data results show that naïve Bayes performed exceptionally well on CPU-Mem mono and multi blocks, and sequential minimal optimization performed very well on HDD mono and multi blocks in terms of accuracy and fault prediction. In the case of greater accuracy and less fault prediction, primary data results revealed that random forest performed very well in terms of accuracy and fault prediction but not with good time complexity. Sequential minimal optimization has good time complexity with minor differences in random forest accuracy and fault prediction. We decided to modify sequential minimal optimization. Finally, the modified sequential minimal optimization (MSMO) algorithm with the fault-tolerance delta-checkpointing (D-CP) method is proposed to improve accuracy, fault prediction error, and reliability in cloud computing.
Collapse
Affiliation(s)
- Muhammad Asim Shahid
- Malaysian Institute of Information Technology, Universiti Kuala Lumpur, Kuala Lumpur 50250, Malaysia
| | - Muhammad Mansoor Alam
- Malaysian Institute of Information Technology, Universiti Kuala Lumpur, Kuala Lumpur 50250, Malaysia
- Faculty of Computing, Riphah International University, Sector I-14, Hajj Complex, Islamabad 46000, Pakistan
- School of Computer Science, University of Technology Sydney, 15 Broadway, Ultimo, NSW 2007, Australia
- Persiaran Multimedia, Multimedia University, Cyberjaya 63100, Malaysia
| | | |
Collapse
|
7
|
Buchanan E, Alden K, Pomfret A, Timmis J, Tyrrell AM. A study of error diversity in robotic swarms for task partitioning in foraging tasks. Front Robot AI 2023; 9:904341. [PMID: 36686209 PMCID: PMC9845931 DOI: 10.3389/frobt.2022.904341] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/25/2022] [Accepted: 12/08/2022] [Indexed: 01/05/2023] Open
Abstract
Often in swarm robotics, an assumption is made that all robots in the swarm behave the same and will have a similar (if not the same) error model. However, in reality, this is not the case, and this lack of uniformity in the error model, and other operations, can lead to various emergent behaviors. This paper considers the impact of the error model and compares robots in a swarm that operate using the same error model (uniform error) against each robot in the swarm having a different error model (thus introducing error diversity). Experiments are presented in the context of a foraging task. Simulation and physical experimental results show the importance of the error model and diversity in achieving the expected swarm behavior.
Collapse
Affiliation(s)
- Edgar Buchanan
- School of Physics, Engineering and Technology, University of York, York, United Kingdom,*Correspondence: Edgar Buchanan, ; Andy M. Tyrrell,
| | - Kieran Alden
- School of Physics, Engineering and Technology, University of York, York, United Kingdom
| | - Andrew Pomfret
- School of Physics, Engineering and Technology, University of York, York, United Kingdom
| | - Jon Timmis
- School of Computer Science, University of Sunderland, Sunderland, United Kingdom
| | - Andy M. Tyrrell
- School of Physics, Engineering and Technology, University of York, York, United Kingdom,*Correspondence: Edgar Buchanan, ; Andy M. Tyrrell,
| |
Collapse
|
8
|
Putra RVW, Hanif MA, Shafique M. RescueSNN: enabling reliable executions on spiking neural network accelerators under permanent faults. Front Neurosci 2023; 17:1159440. [PMID: 37123371 PMCID: PMC10130579 DOI: 10.3389/fnins.2023.1159440] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/05/2023] [Accepted: 03/24/2023] [Indexed: 05/02/2023] Open
Abstract
To maximize the performance and energy efficiency of Spiking Neural Network (SNN) processing on resource-constrained embedded systems, specialized hardware accelerators/chips are employed. However, these SNN chips may suffer from permanent faults which can affect the functionality of weight memory and neuron behavior, thereby causing potentially significant accuracy degradation and system malfunctioning. Such permanent faults may come from manufacturing defects during the fabrication process, and/or from device/transistor damages (e.g., due to wear out) during the run-time operation. However, the impact of permanent faults in SNN chips and the respective mitigation techniques have not been thoroughly investigated yet. Toward this, we propose RescueSNN, a novel methodology to mitigate permanent faults in the compute engine of SNN chips without requiring additional retraining, thereby significantly cutting down the design time and retraining costs, while maintaining the throughput and quality. The key ideas of our RescueSNN methodology are (1) analyzing the characteristics of SNN under permanent faults; (2) leveraging this analysis to improve the SNN fault-tolerance through effective fault-aware mapping (FAM); and (3) devising lightweight hardware enhancements to support FAM. Our FAM technique leverages the fault map of SNN compute engine for (i) minimizing weight corruption when mapping weight bits on the faulty memory cells, and (ii) selectively employing faulty neurons that do not cause significant accuracy degradation to maintain accuracy and throughput, while considering the SNN operations and processing dataflow. The experimental results show that our RescueSNN improves accuracy by up to 80% while maintaining the throughput reduction below 25% in high fault rate (e.g., 0.5 of the potential fault locations), as compared to running SNNs on the faulty chip without mitigation. In this manner, the embedded systems that employ RescueSNN-enhanced chips can efficiently ensure reliable executions against permanent faults during their operational lifetime.
Collapse
Affiliation(s)
- Rachmad Vidya Wicaksana Putra
- Embedded Computing Systems, Institute of Computer Engineering, Technische Universität Wien (TU Wien), Vienna, Austria
- *Correspondence: Rachmad Vidya Wicaksana Putra
| | - Muhammad Abdullah Hanif
- eBrain Lab, Division of Engineering, New York University Abu Dhabi (NYUAD), Abu Dhabi, United Arab Emirates
| | - Muhammad Shafique
- eBrain Lab, Division of Engineering, New York University Abu Dhabi (NYUAD), Abu Dhabi, United Arab Emirates
| |
Collapse
|
9
|
Mir TS, Liaqat HB, Kiren T, Sana MU, Alvarez RM, Miró Y, Pascual Barrera AE, Ashraf I. Antifragile and Resilient Geographical Information System Service Delivery in Fog Computing. Sensors (Basel) 2022; 22:8778. [PMID: 36433374 PMCID: PMC9696224 DOI: 10.3390/s22228778] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/19/2022] [Revised: 11/09/2022] [Accepted: 11/09/2022] [Indexed: 06/16/2023]
Abstract
The demand for cloud computing has drastically increased recently, but this paradigm has several issues due to its inherent complications, such as non-reliability, latency, lesser mobility support, and location-aware services. Fog computing can resolve these issues to some extent, yet it is still in its infancy. Despite several existing works, these works lack fault-tolerant fog computing, which necessitates further research. Fault tolerance enables the performing and provisioning of services despite failures and maintains anti-fragility and resiliency. Fog computing is highly diverse in terms of failures as compared to cloud computing and requires wide research and investigation. From this perspective, this study primarily focuses on the provision of uninterrupted services through fog computing. A framework has been designed to provide uninterrupted services while maintaining resiliency. The geographical information system (GIS) services have been deployed as a test bed which requires high computation, requires intensive resources in terms of CPU and memory, and requires low latency. Keeping different types of failures at different levels and their impacts on service failure and greater response time in mind, the framework was made anti-fragile and resilient at different levels. Experimental results indicate that during service interruption, the user state remains unaffected.
Collapse
Affiliation(s)
- Tahira Sarwar Mir
- Department of Computer Science, University of Gujrat, Gujrat 50700, Pakistan
| | - Hannan Bin Liaqat
- Department of Information Sciences, University of Education, Lahore 41000, Pakistan
| | - Tayybah Kiren
- Department of Computer Science (RCET), University of Engineering and Technology, Lahore 54890, Pakistan
| | - Muhammad Usman Sana
- Department of Information Technology, University of Gujrat, Gujrat 50700, Pakistan
| | - Roberto Marcelo Alvarez
- Higher Polytechnic School, Universidad Europea del Atlántico, Isabel Torres 21, 39011 Santander, Spain
- Project Management, Universidad Internacional Iberoamericana, Arecibo, PR 00613, USA
- Department of Project Management, Universidade Internacional do Cuanza, Cuito, Bié, Angola
| | - Yini Miró
- Higher Polytechnic School, Universidad Europea del Atlántico, Isabel Torres 21, 39011 Santander, Spain
- Department of Project Management, Universidade Internacional do Cuanza, Cuito, Bié, Angola
- Department of Project Management, Universidad Internacional Iberoamericana, Campeche 24560, Mexico
| | - Alina Eugenia Pascual Barrera
- Higher Polytechnic School, Universidad Europea del Atlántico, Isabel Torres 21, 39011 Santander, Spain
- Department of Project Management, Universidad Internacional Iberoamericana, Campeche 24560, Mexico
- Fundación Universitaria Internacional de Colombia, Bogotá 111311, Colombia
| | - Imran Ashraf
- Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Korea
| |
Collapse
|
10
|
Aravind K, Maddikunta PKR. Dingo Optimization Based Cluster Based Routing in Internet of Things. Sensors (Basel) 2022; 22:8064. [PMID: 36298413 PMCID: PMC9611236 DOI: 10.3390/s22208064] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/19/2022] [Revised: 10/11/2022] [Accepted: 10/17/2022] [Indexed: 06/16/2023]
Abstract
The Wireless Sensor Network (WSN) is a collection of distinct, geographically distributed, Internet-connected sensors, which is capable of processing, analyzing, storing, and exchanging collected information. However, the Internet of Things (IoT) devices in the network are equipped with limited resources and minimal computing capability, resulting in energy conservation problems. Although clustering is an efficient method for energy saving in network nodes, the existing clustering algorithms are not effective due to the short lifespan of a network, an unbalanced load among the network nodes, and increased end-to-end delays. Hence, this paper proposes a novel cluster-based approach for IoT using a Self-Adaptive Dingo Optimizer with Brownian Motion (SDO-BM) technique to choose the optimal cluster head (CH) considering the various constraints such as energy, distance, delay, overhead, trust, Quality of Service (QoS), and security (high risk, low risk, and medium risk). If the chosen optimal CH is defective, then fault tolerance and energy hole mitigation techniques are used to stabilize the network. Eventually, analysis is done to ensure the progression of the SADO-BM model. The proposed model provides optimal results compared to existing models.
Collapse
Affiliation(s)
- Kalavagunta Aravind
- School of Information Technology and Engineering, Vellore Institute of Technology and Engineering, Vellore 632014, India
| | - Praveen Kumar Reddy Maddikunta
- School of Information Technology and Engineering, Vellore Institute of Technology and Engineering, Vellore 632014, India
| |
Collapse
|
11
|
Ballesteros A, Barranco M, Proenza J, Almeida L, Pozo F, Palmer-Rodríguez P. An Infrastructure for Enabling Dynamic Fault Tolerance in Highly-Reliable Adaptive Distributed Embedded Systems Based on Switched Ethernet. Sensors (Basel) 2022; 22:7099. [PMID: 36146448 PMCID: PMC9505247 DOI: 10.3390/s22187099] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/31/2022] [Revised: 09/05/2022] [Accepted: 09/08/2022] [Indexed: 06/16/2023]
Abstract
Distributed Embedded Systems (DESs) carrying out critical tasks must be highly reliable and hard in real-time. Moreover, to operate in dynamic operational contexts in an effective and efficient manner, they must also be adaptive. Adaptivity is particularly interesting from a dependability perspective, as it can be used to develop dynamic fault tolerance mechanisms, which, in combination with static ones, make it possible to provide better and more efficient fault tolerance. However, constructing a DES with such complexity presents many challenges. This is because all the mechanisms that support fault tolerance, real-time, and adaptivity must be designed to operate in a coordinated manner. This paper presents the Dynamic Fault Tolerance for Flexible Time-Triggered Ethernet (DFT4FTT), a self-reconfigurable infrastructure for implementing highly reliable adaptive DES. Here, we describe the design of its hardware and software architecture and the main set of mechanisms, with a focus on fault tolerance.
Collapse
Affiliation(s)
- Alberto Ballesteros
- Departament de Matemàtiques i Informàtica, Universitat Illes Balears, 07122 Palma de Mallorca, Spain
| | - Manuel Barranco
- Departament de Matemàtiques i Informàtica, Universitat Illes Balears, 07122 Palma de Mallorca, Spain
| | - Julián Proenza
- Departament de Matemàtiques i Informàtica, Universitat Illes Balears, 07122 Palma de Mallorca, Spain
| | - Luís Almeida
- CISTER Research Center in Real-Time and Embedded Computing Systems, 4200-135 Porto, Portugal
- FEUP Faculdade de Engenharia da Universidade do Porto, 4200-465 Porto, Portugal
| | | | - Pere Palmer-Rodríguez
- Departament de Matemàtiques i Informàtica, Universitat Illes Balears, 07122 Palma de Mallorca, Spain
| |
Collapse
|
12
|
Du J, Li X, He J. A Hierarchical Network with Fault Tolerance by a Multi-Factor Method for Neighborhood Area Network in Smart Grid. Sensors (Basel) 2022; 22:6218. [PMID: 36015979 PMCID: PMC9415371 DOI: 10.3390/s22166218] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/21/2022] [Revised: 08/07/2022] [Accepted: 08/16/2022] [Indexed: 06/15/2023]
Abstract
The neighborhood area network of a smart grid usually has hierarchical wireless communication. Due to forwarding and processing more data, the upper-layer nodes are more likely to suffer congestion and energy exhaustion. This phenomenon leads to the failure of uploading data to the control center. To solve this problem, this paper proposes a scheme for constructing a multi-factor fault-tolerant hierarchical network. This scheme firstly defines a criterion for the generation of redundant links by multi-factor method in a hierarchical wireless network with the characteristics of the neighborhood area network. Then the redundant links are used to reconstruct the existing topology of the neighborhood area network for improving fault tolerance. Finally, a greedy routing algorithm is put forward to select a proper data transmission path by bypassing low energy nodes, further reducing the failure of uploading data to the control center. The simulation results show that the proposed scheme can effectively improve the fault tolerance of the network topology of the wireless neighborhood area network and balance the network energy consumption. Compared with the original scheme, the proposed scheme improves the fault tolerance by 35% and the relative transmission rate by 21%.
Collapse
Affiliation(s)
- Jiatao Du
- School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China
| | - Xiaohui Li
- School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China
- Engineering Research Center for Metallurgical Automation and Measurement Technology of Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China
| | - Jie He
- School of Information Science and Engineering, Wuhan University of Science and Technology, Wuhan 430081, China
- Engineering Research Center for Metallurgical Automation and Measurement Technology of Ministry of Education, Wuhan University of Science and Technology, Wuhan 430081, China
| |
Collapse
|
13
|
Shaukat M, Alasmary W, Alanazi E, Shuja J, Madani SA, Hsu CH. Balanced Energy-Aware and Fault-Tolerant Data Center Scheduling. Sensors (Basel) 2022; 22:s22041482. [PMID: 35214384 PMCID: PMC8876709 DOI: 10.3390/s22041482] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/08/2021] [Revised: 02/08/2022] [Accepted: 02/08/2022] [Indexed: 11/20/2022]
Abstract
Fault tolerance, performance, and throughput have been major areas of research and development since the evolution of large-scale networks. Internet-based applications are rapidly growing, including large-scale computations, search engines, high-definition video streaming, e-commerce, and video on demand. In recent years, energy efficiency and fault tolerance have gained significant importance in data center networks and various studies directed the attention towards green computing. Data centers consume a huge amount of energy and various architectures and techniques have been proposed to improve the energy efficiency of data centers. However, there is a tradeoff between energy efficiency and fault tolerance. The objective of this study is to highlight a better tradeoff between the two extremes: (a) high energy efficiency and (b) ensuring high availability through fault tolerance and redundancy. The main objective of the proposed Energy-Aware Fault-Tolerant (EAFT) approach is to keep one level of redundancy for fault tolerance while scheduling resources for energy efficiency. The resultant energy-efficient data center network provides availability as well as fault tolerance at reduced operating cost. The main contributions of this article are: (a) we propose an Energy-Aware Fault-Tolerant (EAFT) data center network scheduler; (b) we compare EAFT with energy efficient resource scheduling techniques to provide analysis of parameters such as, workload distribution, average task per servers, and energy consumption; and (c) we highlight effects of energy efficiency techniques on the network performance of the data center.
Collapse
Affiliation(s)
- Muhammad Shaukat
- Department of Computer Science, COMSATS University Islamabad, Abbottabad Campus, Abbottabad 22060, Pakistan; (M.S.); (J.S.); (S.A.M.)
| | - Waleed Alasmary
- Computer Engineering Department, College of Computer and Information Systems, Umm Al-Qura University, Makkah 21955, Saudi Arabia;
| | - Eisa Alanazi
- Department of Computer Science, Umm Al-Qura University, Makkah 21955, Saudi Arabia;
| | - Junaid Shuja
- Department of Computer Science, COMSATS University Islamabad, Abbottabad Campus, Abbottabad 22060, Pakistan; (M.S.); (J.S.); (S.A.M.)
| | - Sajjad A. Madani
- Department of Computer Science, COMSATS University Islamabad, Abbottabad Campus, Abbottabad 22060, Pakistan; (M.S.); (J.S.); (S.A.M.)
| | - Ching-Hsien Hsu
- Department of Computer Science and Information Engineering, Asia University, Taichung City 41354, Taiwan
- Department of Medical Research, China Medical University Hospital, China Medical University, Taichung City 406040, Taiwan
- Guangdong-Hong Kong-Macao Joint Laboratory for Intelligent Micro-Nano Optoelectronic Technology, School of Mathematics and Big Data, Foshan University, Foshan 528000, China
- Correspondence:
| |
Collapse
|
14
|
Melo M, Aquino G. FaTEMa: A Framework for Multi-Layer Fault Tolerance in IoT Systems. Sensors (Basel) 2021; 21:7181. [PMID: 34770488 DOI: 10.3390/s21217181] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/09/2021] [Revised: 10/07/2021] [Accepted: 10/11/2021] [Indexed: 11/17/2022]
Abstract
Fault tolerance in IoT systems is challenging to overcome due to its complexity, dynamicity, and heterogeneity. IoT systems are typically designed and constructed in layers. Every layer has its requirements and fault tolerance strategies. However, errors in one layer can propagate and cause effects on others. Thus, it is impractical to consider a centralized fault tolerance approach for an entire system. Consequently, it is vital to consider multiple layers in order to enable collaboration and information exchange when addressing fault tolerance. The purpose of this study is to propose a multi-layer fault tolerance approach, granting interconnection among IoT system layers, allowing information exchange and collaboration in order to attain the property of dependability. Therefore, we define an event-driven framework called FaTEMa (Fault Tolerance Event Manager) that creates a dedicated fault-related communication channel in order to propagate events across the levels of the system. The implemented framework assist with error detection and continued service. Additionally, it offers extension points to support heterogeneous communication protocols and evolve new capabilities. Our empirical results show that introducing FaTEMa provided improvements to the error detection and error resolution time, consequently improving system availability. In addition, the use of Fatema provided a reliability improvement and a reduction in the number of failures produced.
Collapse
|
15
|
Khalilpour Akram V, Akusta Dagdeviren Z, Dagdeviren O, Challenger M. PINC: Pickup Non-Critical Node Based k-Connectivity Restoration in Wireless Sensor Networks. Sensors (Basel) 2021; 21:6418. [PMID: 34640738 DOI: 10.3390/s21196418] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/01/2021] [Revised: 09/18/2021] [Accepted: 09/20/2021] [Indexed: 11/17/2022]
Abstract
A Wireless Sensor Network (WSN) is connected if a communication path exists among each pair of sensor nodes (motes). Maintaining reliable connectivity in WSNs is a complicated task, since any failure in the nodes can cause the data transmission paths to break. In a k-connected WSN, the connectivity survives after failure in any k-1 nodes; hence, preserving the k-connectivity ensures that the WSN can permit k-1 node failures without wasting the connectivity. Higher k values will increase the reliability of a WSN against node failures. We propose a simple and efficient algorithm (PINC) to accomplish movement-based k-connectivity restoration that divides the nodes into the critical, which are the nodes whose failure reduces k, and non-critical groups. The PINC algorithm pickups and moves the non-critical nodes when a critical node stops working. This algorithm moves a non-critical node with minimum movement cost to the position of the failed mote. The measurements obtained from the testbed of real IRIS motes and Kobuki robots, along with extensive simulations, revealed that the PINC restores the k-connectivity by generating optimum movements faster than its competitors.
Collapse
|
16
|
Brunner V, Siegl M, Geier D, Becker T. Challenges in the Development of Soft Sensors for Bioprocesses: A Critical Review. Front Bioeng Biotechnol 2021; 9:722202. [PMID: 34490228 PMCID: PMC8417948 DOI: 10.3389/fbioe.2021.722202] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/08/2021] [Accepted: 08/03/2021] [Indexed: 01/10/2023] Open
Abstract
Among the greatest challenges in soft sensor development for bioprocesses are variable process lengths, multiple process phases, and erroneous model inputs due to sensor faults. This review article describes these three challenges and critically discusses the corresponding solution approaches from a data scientist’s perspective. This main part of the article is preceded by an overview of the status quo in the development and application of soft sensors. The scope of this article is mainly the upstream part of bioprocesses, although the solution approaches are in most cases also applicable to the downstream part. Variable process lengths are accounted for by data synchronization techniques such as indicator variables, curve registration, and dynamic time warping. Multiple process phases are partitioned by trajectory or correlation-based phase detection, enabling phase-adaptive modeling. Sensor faults are detected by symptom signals, pattern recognition, or by changing contributions of the corresponding sensor to a process model. According to the current state of the literature, tolerance to sensor faults remains the greatest challenge in soft sensor development, especially in the presence of variable process lengths and multiple process phases.
Collapse
Affiliation(s)
- Vincent Brunner
- Chair of Brewing and Beverage Technology, Technical University of Munich, Freising, Germany
| | - Manuel Siegl
- Chair of Brewing and Beverage Technology, Technical University of Munich, Freising, Germany
| | - Dominik Geier
- Chair of Brewing and Beverage Technology, Technical University of Munich, Freising, Germany
| | - Thomas Becker
- Chair of Brewing and Beverage Technology, Technical University of Munich, Freising, Germany
| |
Collapse
|
17
|
Gu S, Geng M, Lan L. Attention-Based Fault-Tolerant Approach for Multi-Agent Reinforcement Learning Systems. Entropy (Basel) 2021; 23:1133. [PMID: 34573757 DOI: 10.3390/e23091133] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/08/2021] [Revised: 08/23/2021] [Accepted: 08/25/2021] [Indexed: 11/28/2022]
Abstract
The aim of multi-agent reinforcement learning systems is to provide interacting agents with the ability to collaboratively learn and adapt to the behavior of other agents. Typically, an agent receives its private observations providing a partial view of the true state of the environment. However, in realistic settings, the harsh environment might cause one or more agents to show arbitrarily faulty or malicious behavior, which may suffice to allow the current coordination mechanisms fail. In this paper, we study a practical scenario of multi-agent reinforcement learning systems considering the security issues in the presence of agents with arbitrarily faulty or malicious behavior. The previous state-of-the-art work that coped with extremely noisy environments was designed on the basis that the noise intensity in the environment was known in advance. However, when the noise intensity changes, the existing method has to adjust the configuration of the model to learn in new environments, which limits the practical applications. To overcome these difficulties, we present an Attention-based Fault-Tolerant (FT-Attn) model, which can select not only correct, but also relevant information for each agent at every time step in noisy environments. The multihead attention mechanism enables the agents to learn effective communication policies through experience concurrent with the action policies. Empirical results showed that FT-Attn beats previous state-of-the-art methods in some extremely noisy environments in both cooperative and competitive scenarios, much closer to the upper-bound performance. Furthermore, FT-Attn maintains a more general fault tolerance ability and does not rely on the prior knowledge about the noise intensity of the environment.
Collapse
|
18
|
Wang Q, Mu H. Privacy-Preserving and Lightweight Selective Aggregation with Fault-Tolerance for Edge Computing-Enhanced IoT. Sensors (Basel) 2021; 21:s21165369. [PMID: 34450808 PMCID: PMC8398313 DOI: 10.3390/s21165369] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/12/2021] [Revised: 07/23/2021] [Accepted: 08/06/2021] [Indexed: 11/16/2022]
Abstract
Edge computing has been introduced to the Internet of Things (IoT) to meet the requirements of IoT applications. At the same time, data aggregation is widely used in data processing to reduce the communication overhead and energy consumption in IoT. Most existing schemes aggregate the overall data without filtering. In addition, aggregation schemes also face huge challenges, such as the privacy of the individual IoT device's data or the fault-tolerant and lightweight requirements of the schemes. In this paper, we present a privacy-preserving and lightweight selective aggregation scheme with fault tolerance (PLSA-FT) for edge computing-enhanced IoT. In PLSA-FT, selective aggregation can be achieved by constructing Boolean responses and numerical responses according to specific query conditions of the cloud center. Furthermore, we modified the basic Paillier homomorphic encryption to guarantee data privacy and support fault tolerance of IoT devices' malfunctions. An online/offline signature mechanism is utilized to reduce computation costs. The system characteristic analyses prove that the PLSA-FT scheme achieves confidentiality, privacy preservation, source authentication, integrity verification, fault tolerance, and dynamic membership management. Moreover, performance evaluation results show that PLSA-FT is lightweight with low computation costs and communication overheads.
Collapse
|
19
|
Han K, Chen C, Chen M, Wang Z. Constrained Active Fault Tolerant Control Based on Active Fault Diagnosis and Interpolation Optimization. Entropy (Basel) 2021; 23:e23080924. [PMID: 34441064 PMCID: PMC8391791 DOI: 10.3390/e23080924] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/24/2021] [Revised: 07/14/2021] [Accepted: 07/15/2021] [Indexed: 11/16/2022]
Abstract
A new active fault tolerant control scheme based on active fault diagnosis is proposed to address the component/actuator faults for systems with state and input constraints. Firstly, the active fault diagnosis is composed of diagnostic observers, constant auxiliary signals, and separation hyperplanes, all of which are designed offline. In online applications, only a single diagnostic observer is activated to achieve fault detection and isolation. Compared with the traditional multi-observer parallel diagnosis methods, such a design is beneficial to improve the diagnostic efficiency. Secondly, the active fault tolerant control is composed of outer fault tolerant control, inner fault tolerant control and a linear-programming-based interpolation control algorithm. The inner fault tolerant control is determined offline and satisfies the prescribed optimal control performance requirement. The outer fault tolerant control is used to enlarge the feasible region, and it needs to be determined online together with the interpolation optimization. In online applications, the updated state estimates trigger the adjustment of the interpolation algorithm, which in turn enables control reconfiguration by implicitly optimizing the dynamic convex combination of outer fault tolerant control and inner fault tolerant control. This control scheme contributes to further reducing the computational effort of traditional constrained predictive fault tolerant control methods. In addition, each pair of inner fault tolerant control and diagnostic observer is designed integratedly to suppress the robust interaction influences between estimation error and control error. The soft constraint method is further integrated to handle some cases that lead to constraint violations. The effectiveness of these designs is finally validated by a case study of a wastewater treatment plant model.
Collapse
|
20
|
Ali A, Iqbal MM, Jamil H, Qayyum F, Jabbar S, Cheikhrouhou O, Baz M, Jamil F. An Efficient Dynamic-Decision Based Task Scheduler for Task Offloading Optimization and Energy Management in Mobile Cloud Computing. Sensors (Basel) 2021; 21:4527. [PMID: 34282786 DOI: 10.3390/s21134527] [Citation(s) in RCA: 14] [Impact Index Per Article: 4.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/27/2021] [Revised: 06/19/2021] [Accepted: 06/25/2021] [Indexed: 01/09/2023]
Abstract
Restricted abilities of mobile devices in terms of storage, computation, time, energy supply, and transmission causes issues related to energy optimization and time management while processing tasks on mobile phones. This issue pertains to multifarious mobile device-related dimensions, including mobile cloud computing, fog computing, and edge computing. On the contrary, mobile devices’ dearth of storage and processing power originates several issues for optimal energy and time management. These problems intensify the process of task retaining and offloading on mobile devices. This paper presents a novel task scheduling algorithm that addresses energy consumption and time execution by proposing an energy-efficient dynamic decision-based method. The proposed model quickly adapts to the cloud computing tasks and energy and time computation of mobile devices. Furthermore, we present a novel task scheduling server that performs the offloading computation process on the cloud, enhancing the mobile device’s decision-making ability and computational performance during task offloading. The process of task scheduling harnesses the proposed empirical algorithm. The outcomes of this study enable effective task scheduling wherein energy consumption and task scheduling reduces significantly.
Collapse
|
21
|
Vihman L, Kruusmaa M, Raik J. Systematic Review of Fault Tolerant Techniques in Underwater Sensor Networks. Sensors (Basel) 2021; 21:3264. [PMID: 34066834 DOI: 10.3390/s21093264] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/26/2021] [Revised: 04/30/2021] [Accepted: 05/02/2021] [Indexed: 11/17/2022]
Abstract
Sensor networks provide services to a broad range of applications ranging from intelligence service surveillance to weather forecasting. While most of the sensor networks are terrestrial, Underwater Sensor Networks (USN) are an emerging area. One of the unavoidable and increasing challenges for modern USN technology is tolerating faults, i.e., accepting that hardware is imperfect, and coping with it. Fault Tolerance tends to have more impact in underwater than in terrestrial environment as the latter is generally more forgiving. Moreover, reaching the malfunctioning devices for replacement and maintenance under water is harder and more costly. The current paper is the first to provide an overview of fault-tolerant, particularly cross-layer fault-tolerant, techniques in USNs. In the paper, we present a systematic survey of the techniques, introduce a taxonomy of the Fault Tolerance tasks, present a categorized list of articles, and list the open research issues within the area.
Collapse
|
22
|
Álvarez I, Furió I, Proenza J, Barranco M. Design and Experimental Evaluation of the Proactive Transmission of Replicated Frames Mechanism over Time-Sensitive Networking. Sensors (Basel) 2021; 21:s21030756. [PMID: 33498693 PMCID: PMC7865987 DOI: 10.3390/s21030756] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2020] [Revised: 01/18/2021] [Accepted: 01/20/2021] [Indexed: 11/16/2022]
Abstract
In recent years the Time-Sensitive Networking (TSN) Task Group (TG) has been working on proposing a series of standards to provide Ethernet with hard real-time guarantees, online management of the traffic and fault tolerance mechanisms. In this way the TG expects to create the network technology of future novel applications with real-time and reliability requirements. TSN proposes using spatial redundancy to increase the reliability of Ethernet networks, but using spatial redundancy to tolerate temporary faults is not a cost-effective solution. For this reason, we propose to use time redundancy to tolerate temporary faults in the links of TSN-based networks. Specifically, we have proposed the Proactive Transmission of Replicated Frames (PTRF) mechanism, which consists in transmitting several copies of each frame in a preventive manner. In this article we present for the first time a detailed description of the mechanism, with the three different approaches we have designed. We also present the implementation of PTRF in a real TSN prototype. Furthermore, we carry out a qualitative comparison of the different approaches of the mechanism and we experimentally evaluate the approaches of the mechanism in a quantitative manner from three perspectives: the end-to-end delay, the jitter and the bandwidth consumption.
Collapse
Affiliation(s)
- Inés Álvarez
- Department of Mathematics and Informatics, University of the Balearic Islands (UIB), 07122 Palma de Mallorca, Spain
| | - Ignasi Furió
- Department of Mathematics and Informatics, University of the Balearic Islands (UIB), 07122 Palma de Mallorca, Spain
| | - Julián Proenza
- Department of Mathematics and Informatics, University of the Balearic Islands (UIB), 07122 Palma de Mallorca, Spain
| | - Manuel Barranco
- Department of Mathematics and Informatics, University of the Balearic Islands (UIB), 07122 Palma de Mallorca, Spain
| |
Collapse
|
23
|
Khorsheed MB, Zainel QM, Hassen OA, Darwish SM. The Application of Fractal Transform and Entropy for Improving Fault Tolerance and Load Balancing in Grid Computing Environments. Entropy (Basel) 2020; 22:e22121410. [PMID: 33333717 PMCID: PMC7765137 DOI: 10.3390/e22121410] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/13/2020] [Revised: 11/27/2020] [Accepted: 11/29/2020] [Indexed: 11/16/2022]
Abstract
This paper applies the entropy-based fractal indexing scheme that enables the grid environment for fast indexing and querying. It addresses the issue of fault tolerance and load balancing-based fractal management to make computational grids more effective and reliable. A fractal dimension of a cloud of points gives an estimate of the intrinsic dimensionality of the data in that space. The main drawback of this technique is the long computing time. The main contribution of the suggested work is to investigate the effect of fractal transform by adding R-tree index structure-based entropy to existing grid computing models to obtain a balanced infrastructure with minimal fault. In this regard, the presented work is going to extend the commonly scheduling algorithms that are built based on the physical grid structure to a reduced logical network. The objective of this logical network is to reduce the searching in the grid paths according to arrival time rate and path's bandwidth with respect to load balance and fault tolerance, respectively. Furthermore, an optimization searching technique is utilized to enhance the grid performance by investigating the optimum number of nodes extracted from the logical grid. The experimental results indicated that the proposed model has better execution time, throughput, makespan, latency, load balancing, and success rate.
Collapse
Affiliation(s)
- Murad B. Khorsheed
- College of Administration & Economics, University of Kirkuk, Kirkuk 36001, Iraq;
| | - Qasim M. Zainel
- College of Physical Education and Sports Sciences, University of Kirkuk, Kirkuk 36001, Iraq;
| | - Oday A. Hassen
- Computer Science and Information Technology, University of Wasit, Al Kut 52001, Iraq;
| | - Saad M. Darwish
- Department of Information Technology, Institute of Graduate Studies and Research, Alexandria University, 163 Horreya Avenue, El–Shatby, Alexandria 21526, Egypt
- Correspondence: ; Tel.: +20-122-263-2369
| |
Collapse
|
24
|
Rashid M, Baloch NK, Shafique MA, Hussain F, Saleem S, Zikria YB, Yu H. Fault-Tolerant Network-On-Chip Router Architecture Design for Heterogeneous Computing Systems in the Context of Internet of Things. Sensors (Basel) 2020; 20:s20185355. [PMID: 32962030 PMCID: PMC7570890 DOI: 10.3390/s20185355] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/08/2020] [Revised: 09/06/2020] [Accepted: 09/15/2020] [Indexed: 06/11/2023]
Abstract
Network-on-chip (NoC) architectures have become a popular communication platform for heterogeneous computing systems owing to their scalability and high performance. Aggressive technology scaling makes these architectures prone to both permanent and transient faults. This study focuses on the tolerance of a NoC router to permanent faults. A permanent fault in a NoC router severely impacts the performance of the entire network. Thus, it is necessary to incorporate component-level protection techniques in a router. In the proposed scheme, the input port utilizes a bypass path, virtual channel (VC) queuing, and VC closing strategies. Moreover, the routing computation stage utilizes spatial redundancy and double routing strategies, and the VC allocation stage utilizes spatial redundancy. The switch allocation stage utilizes run-time arbiter selection. The crossbar stage utilizes a triple bypass bus. The proposed router is highly fault-tolerant compared with the existing state-of-the-art fault-tolerant routers. The reliability of the proposed router is 7.98 times higher than that of the unprotected baseline router in terms of the mean-time-to-failure metric. The silicon protection factor metric is used to calculate the protection ability of the proposed router. Consequently, it is confirmed that the proposed router has a greater protection ability than the conventional fault-tolerant routers.
Collapse
Affiliation(s)
- Muhammad Rashid
- Department of Computer Engineering, University of Engineering & Technology, Taxila 47050, Pakistan; (M.R.); (N.K.B.); (F.H.); (S.S.)
| | - Naveed Khan Baloch
- Department of Computer Engineering, University of Engineering & Technology, Taxila 47050, Pakistan; (M.R.); (N.K.B.); (F.H.); (S.S.)
| | - Muhammad Akmal Shafique
- Department of Electrical Engineering, University of Engineering & Technology, Taxila 47050, Pakistan;
| | - Fawad Hussain
- Department of Computer Engineering, University of Engineering & Technology, Taxila 47050, Pakistan; (M.R.); (N.K.B.); (F.H.); (S.S.)
| | - Shahroon Saleem
- Department of Computer Engineering, University of Engineering & Technology, Taxila 47050, Pakistan; (M.R.); (N.K.B.); (F.H.); (S.S.)
| | - Yousaf Bin Zikria
- Department of Information and Communication Engineering, Yeungnam University, Gyeongsan-si 38541, Korea
| | - Heejung Yu
- Department of Electronics and Information Engineering, Korea University, Sejong 30019, Korea
| |
Collapse
|
25
|
Bossard A, Kaneko K. Cluster-Fault Tolerant Routing in a Torus. Sensors (Basel) 2020; 20:E3286. [PMID: 32526955 DOI: 10.3390/s20113286] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/14/2020] [Revised: 06/03/2020] [Accepted: 06/03/2020] [Indexed: 11/23/2022]
Abstract
The number of Internet-connected devices grows very rapidly, with even fears of running out of available IP addresses. It is clear that the number of sensors follows this trend, thus inducing large sensor networks. It is insightful to make the comparison with the huge number of processors of modern supercomputers. In such large networks, the problem of node faults necessarily arises, with faults often happening in clusters. The tolerance to faults, and especially cluster faults, is thus critical. Furthermore, thanks to its advantageous topological properties, the torus interconnection network has been adopted by the major supercomputer manufacturers of the recent years, thus proving its applicability. Acknowledging and embracing these two technological and industrial aspects, we propose in this paper a node-to-node routing algorithm in an n-dimensional
k-ary torus that is tolerant to faults. Not only is this algorithm tolerant to faulty nodes, it also tolerates faulty node clusters. The described algorithm selects a fault-free path of length at most n(2k+⌊k/2⌋−2) with an O(n2k2|F|) worst-case time complexity with F the set of faulty nodes induced by the faulty clusters.
Collapse
|
26
|
Tang Y, Chen M, Wang C, Luo L, Li J, Lian G, Zou X. Recognition and Localization Methods for Vision-Based Fruit Picking Robots: A Review. Front Plant Sci 2020; 11:510. [PMID: 32508853 PMCID: PMC7250149 DOI: 10.3389/fpls.2020.00510] [Citation(s) in RCA: 76] [Impact Index Per Article: 19.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/14/2019] [Accepted: 04/06/2020] [Indexed: 05/13/2023]
Abstract
The utilization of machine vision and its associated algorithms improves the efficiency, functionality, intelligence, and remote interactivity of harvesting robots in complex agricultural environments. Machine vision and its associated emerging technology promise huge potential in advanced agricultural applications. However, machine vision and its precise positioning still have many technical difficulties, making it difficult for most harvesting robots to achieve true commercial applications. This article reports the application and research progress of harvesting robots and vision technology in fruit picking. The potential applications of vision and quantitative methods of localization, target recognition, 3D reconstruction, and fault tolerance of complex agricultural environment are focused, and fault-tolerant technology designed for utilization with machine vision and robotic systems are also explored. The two main methods used in fruit recognition and localization are reviewed, including digital image processing technology and deep learning-based algorithms. The future challenges brought about by recognition and localization success rates are identified: target recognition in the presence of illumination changes and occlusion environments; target tracking in dynamic interference-laden environments, 3D target reconstruction, and fault tolerance of the vision system for agricultural robots. In the end, several open research problems specific to recognition and localization applications for fruit harvesting robots are mentioned, and the latest development and future development trends of machine vision are described.
Collapse
Affiliation(s)
- Yunchao Tang
- College of Urban and Rural Construction, Zhongkai University of Agriculture and Engineering, Guangzhou, China
| | - Mingyou Chen
- Key Laboratory of Key Technology on Agricultural Machine and Equipment, College of Engineering, South China Agricultural University, Guangzhou, China
| | - Chenglin Wang
- College of Mechanical and Electrical Engineering, Chongqing University of Arts and Sciences, Chongqing, China
| | - Lufeng Luo
- College of Mechanical and Electrical Engineering, Foshan University, Foshan, China
| | - Jinhui Li
- Key Laboratory of Key Technology on Agricultural Machine and Equipment, College of Engineering, South China Agricultural University, Guangzhou, China
| | - Guoping Lian
- Department of Chemical and Process Engineering, University of Surrey, Guildford, United Kingdom
| | - Xiangjun Zou
- Key Laboratory of Key Technology on Agricultural Machine and Equipment, College of Engineering, South China Agricultural University, Guangzhou, China
| |
Collapse
|
27
|
Ryvkin M, Slesarenko V, Cherkaev A, Rudykh S. Fault-tolerant elastic-plastic lattice material. Philos Trans A Math Phys Eng Sci 2020; 378:20190107. [PMID: 31760907 PMCID: PMC6894527 DOI: 10.1098/rsta.2019.0107] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 07/22/2019] [Indexed: 06/10/2023]
Abstract
The paper describes a fault-tolerant design of a special two-dimensional beam lattice. The morphology of such lattices was suggested in the theoretical papers (Cherkaev and Ryvkin 2019 Arch. Appl. Mech. 89, 485-501; Cherkaev and Ryvkin 2019 Arch. Appl. Mech. 89, 503-519), where its superior properties were found numerically. The proposed design consists of beam elements with two different thicknesses; the lattice is macro-isotropic and stretch dominated. Here, we experimentally verify the fault-tolerant properties of these lattices. The specimens were three-dimensional-printed from the VeroWhite elastoplastic material. The lattice is subjected to uniaxial tensile loading. Due to its morphology, the failed beams are evenly distributed in the lattice at the initial stage of damage; at this stage, the material remains intact, preserves its bearing ability, and supports relatively high strains before the final failure. At the initial phase of damage, the thinner beams buckle; then another group of separated thin beams plastically yield and rupture. The fatal macro-crack propagates after the distributed damage reaches a critical level. This initial distributed damage stage allows for a better energy absorption rate before the catastrophic failure of the structure. The experimental results are supported by simulations which confirm that the proposed fault-tolerant material possesses excellent energy absorption properties thanks to the distributed damage stage phenomenon. This article is part of the theme issue 'Modelling of dynamic phenomena and localization in structured media (part 2)'.
Collapse
Affiliation(s)
- Michael Ryvkin
- School of Mechanical Engineering, Tel Aviv University, Ramat Aviv 69978, Israel
| | - Viacheslav Slesarenko
- Faculty of Aerospace Engineering, Technion, Haifa, Israel
- Lavrentyev Institute of Hydrodynamics SB RAS, Novosibirsk, 630090, Russia
| | - Andrej Cherkaev
- Department of Mathematics, University of Utah, Salt Lake City, UT 94112, USA
| | - Stephan Rudykh
- Department of Mechanical Engineering, University of Wisconsin–Madison, Madison, WI, USA
| |
Collapse
|
28
|
Kim SY, Kang CH, Song JW. 1-point RANSAC UKF with Inverse Covariance Intersection for Fault Tolerance. Sensors (Basel) 2020; 20:E353. [PMID: 31936384 DOI: 10.3390/s20020353] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/11/2019] [Revised: 01/03/2020] [Accepted: 01/07/2020] [Indexed: 11/20/2022]
Abstract
The fault tolerance estimation method is proposed to maintain reliable correspondences between sensor data and estimation performance regardless of the number of valid measurements. The proposed method is based on the 1-point random sample consensus (RANSAC) unscented Kalman filter (UKF), and the inverse covariance intersection (ICI)-based data fusion method is added to the update process in the proposed algorithm. To verify the performance of the proposed algorithm, two analyses are performed with respect to the degree of measurement error reduction and accuracy of generated information. In addition, experiments are conducted using the dead reckoning (DR)/global positioning system (GPS) navigation system with a barometric altimeter to confirm the performance of fault tolerance in the altitude. It is confirmed that the proposed algorithm maintains estimation performance when there are not enough valid measurements.
Collapse
|
29
|
Melo DR, Zeferino CA, Dilillo L, Bezerra EA. Maximizing the Inner Resilience of a Network-on-Chip through Router Controllers Design. Sensors (Basel) 2019; 19:E5416. [PMID: 31835325 DOI: 10.3390/s19245416] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/19/2019] [Revised: 11/27/2019] [Accepted: 11/29/2019] [Indexed: 11/21/2022]
Abstract
Reducing component size and increasing the operating frequency of integrated circuits makes the Systems-on-Chip (SoCs) more susceptible to faults. Faults can cause errors, and errors can be propagated and lead to a system failure. SoCs employing many cores rely on a Network-on-Chip (NoC) as the interconnect architecture. In this context, this study explores alternatives to implement the flow regulation, routing, and arbitration controllers of an NoC router aiming at minimizing error propagation. For this purpose, a router with Finite-State Machine (FSM)-based controllers was developed targeting low use of logical resources and design flexibility for implementation in FPGA devices. We elaborated and compared the synthesis and simulation results of architectures that vary their controllers on Moore and Mealy FSMs, as well as the Triple Modular Redundancy (TMR) hardening application. Experimental results showed that the routing controller was the most critical one and that migrating a Moore to a Mealy controller offered a lower error propagation rate and higher performance than the application of TMR. We intended to use the proposed router architecture to integrate cores in a fault-tolerant NoC-based system for data processing in harsh environments, such as in space applications.
Collapse
|
30
|
Hindu SK, Hyder W, Luque-Nieto MA, Poncela J, Otero P. Self-Organizing and Scalable Routing Protocol (SOSRP) for Underwater Acoustic Sensor Networks. Sensors (Basel) 2019; 19:E3130. [PMID: 31315200 DOI: 10.3390/s19143130] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/17/2019] [Revised: 06/27/2019] [Accepted: 07/13/2019] [Indexed: 11/18/2022]
Abstract
Underwater Acoustic Sensor Networks (UASN) have two important limitations: a very aggressive (marine) environment, and the use of acoustic signals. This means that the techniques for terrestrial wireless sensor networks (WSN) are not applicable. This paper proposes a routing protocol called “Self-Organizing and Scalable Routing Protocol” (SOSRP) which is decentralized and based on tables residing in each node. A combination of the hop value to the collector node and the distance is used as a criterion to create routes leading to the sink node. The expected functions of the protocol include self-organization of the routes, tolerance to failures and detection of isolated nodes. Through the implementation of SOSRP in Matlab and a model of propagation and energy being appropriate for marine environment, performance results are obtained in different scenarios (varying both nodes and transmission range) that include parameters such as end-to-end packet delay, consumption of energy or length of the created routes (with and without failure). The results obtained show a stable, reliable and suitable operation for the deployment and operation of nodes in UASN networks.
Collapse
|
31
|
Zhang L, Cui Y, Xiong Z, Liu J, Lai J, Lv P. Research on Adaptive Multi-Source Information Fault-Tolerant Navigation Method Based on No-Reference System Diagnosis. Sensors (Basel) 2019; 19:s19132911. [PMID: 31266169 PMCID: PMC6651474 DOI: 10.3390/s19132911] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/07/2019] [Revised: 06/11/2019] [Accepted: 06/21/2019] [Indexed: 11/16/2022]
Abstract
In order to obtain accurate and optimized navigation sensor information, it is necessary to study information fusion and fault diagnosis with high reliability, high precision and high autonomy, and then to propose a rapid and accurate intelligent decision-making scheme based on multi-source and heterogeneous navigation information. In view of the existing fault-tolerant navigation federated filter structure, the method of assuming the reference system (inertial navigation system) to be fault-free and then diagnosing the measuring sensor fault is generally adopted. Considering that the structure of the filter can't detect and isolate the faults of the inertial navigation system, the performance of the MEMS inertial navigation system declines due to complex environments resulting from vibrations and temperature changes; additionally, external interference may lead to the direct failure of the MEMS inertial device. Therefore, this paper studies a fault-tolerant navigation method based on a no-reference system. For the sensor sub-system of a custom micro air vehicle (MAV), a fault detection method based on a reference-free system is proposed. Based on the fault type analysis, some improvements have been made to the existing residual chi-square detection method, and an interactive residual fault detection method with distributed states is proposed. On this basis, aiming at the characteristics of a reference-free system, the weight distribution scheme of the reference system and the tested systems are studied, and a self-regulation filter fusion and fault detection method based on reference-free system is designed.
Collapse
Affiliation(s)
- Ling Zhang
- College of Automation Engineering, Nanjing University of Aeronautics & Astronautics, Nanjing 210016, China
- Jiangsu Key Laboratory of Internet of Things and Control Technologies, Nanjing 211106, China
| | - Yuchen Cui
- College of Automation Engineering, Nanjing University of Aeronautics & Astronautics, Nanjing 210016, China
- Jiangsu Key Laboratory of Internet of Things and Control Technologies, Nanjing 211106, China
| | - Zhi Xiong
- College of Automation Engineering, Nanjing University of Aeronautics & Astronautics, Nanjing 210016, China.
- Jiangsu Key Laboratory of Internet of Things and Control Technologies, Nanjing 211106, China.
| | - Jianye Liu
- College of Automation Engineering, Nanjing University of Aeronautics & Astronautics, Nanjing 210016, China
- Jiangsu Key Laboratory of Internet of Things and Control Technologies, Nanjing 211106, China
| | - Jizhou Lai
- College of Automation Engineering, Nanjing University of Aeronautics & Astronautics, Nanjing 210016, China
- Jiangsu Key Laboratory of Internet of Things and Control Technologies, Nanjing 211106, China
| | - Pin Lv
- College of Automation Engineering, Nanjing University of Aeronautics & Astronautics, Nanjing 210016, China
- Jiangsu Key Laboratory of Internet of Things and Control Technologies, Nanjing 211106, China
| |
Collapse
|
32
|
Du B, Shi Z, Song J, Wang H, Han L. A Fault-Tolerant Data Fusion Method of MEMS Redundant Gyro System Based on Weighted Distributed Kalman Filtering. Micromachines (Basel) 2019; 10:E278. [PMID: 31035461 DOI: 10.3390/mi10050278] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/26/2019] [Revised: 04/22/2019] [Accepted: 04/25/2019] [Indexed: 11/16/2022]
Abstract
The application of the Micro Electro-mechanical System (MEMS) inertial measurement unit has become a new research hotspot in the field of inertial navigation. In order to solve the problems of the poor accuracy and stability of MEMS sensors, the redundant design is an effective method under the restriction of current technology. The redundant data processing is the most important part in the MEMS redundant inertial navigation system, which includes the processing of abnormal data and the fusion estimation of redundant data. A developed quality index of the MEMS gyro measurement data is designed by the parity vector and the covariance matrix of the distributed Kalman filtering. The weight coefficients of gyros are calculated according to this index. The fault-tolerant fusion estimation of the redundant data is realized through the framework of the distributed Kalman filtering. Simulation experiments are conducted to test the performance of the new method with different types of anomalies.
Collapse
|
33
|
Sasikumar D, Kumar A. A Novel Defect Tolerance Scheme for Nanocrossbar Architectures with Enhanced Efficiency. Micromachines (Basel) 2018; 10:mi10010014. [PMID: 30591637 PMCID: PMC6357020 DOI: 10.3390/mi10010014] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/22/2018] [Revised: 12/11/2018] [Accepted: 12/14/2018] [Indexed: 11/17/2022]
Abstract
The semiconductor industry is now facing challenges to keep pace with Moore’s law and this leads to the requirement of new materials and newer technological devices. Molecular switch-based nanodevices are one of the promising areas because of their ultimate size and miniaturisation potential. These nanodevices are built through a self-assembled bottom-up manufacturing method in which the possibility of external intervention is negligible. This leads to a considerable yield loss due to defective device production and the traditional test-and-throw faulty device approach will not hold well. Design of fault-tolerant devices are the only possible solution. A widely studied nanodevice is nanocrossbar architectures and their fault tolerance can be designed by exploiting the programmable logic array’s fault tolerance schemes. A defect-unaware fault tolerance scheme is developed in this work based on the bipartite graph analogy of crossbar architectures. The newly-designed algorithm can eliminate more than one node in each iteration and, hence, a defect-free subcrossbar can be obtained much faster compared to the existing algorithms. A comparison with the existing defect-unaware fault-tolerant methods with this newly-developed algorithm shows a better yield in most of the cases.
Collapse
Affiliation(s)
- Devisree Sasikumar
- Electrical and Electronics Engineering, BITS Pilani, Dubai Campus, Dubai 345055, United Arab Emirates.
| | - Anand Kumar
- Electrical and Electronics Engineering, BITS Pilani, Dubai Campus, Dubai 345055, United Arab Emirates.
| |
Collapse
|
34
|
Abstract
Modern supercomputers include hundreds of thousands of processors and they are thus massively parallel systems. The interconnection network of a system is in charge of mutually connecting these processors. Recently, the torus has become a very popular interconnection network topology. For example, the Fujitsu K, IBM Blue Gene/L, IBM Blue Gene/P, and Cray Titan supercomputers all rely on this topology. The pairwise disjoint-path routing problem in a torus network is addressed in this paper. This fundamental problem consists of the selection of mutually vertex disjoint paths between given vertex pairs. Proposing a solution to this problem has critical implications, such as increased system dependability and more efficient data transfers, and provides concrete implementation of green and sustainable computing as well as security, privacy, and trust, for instance, for the Internet of Things (IoT). Then, the correctness and complexities of the proposed routing algorithm are formally established. Precisely, in an n-dimensional k-ary torus ( n < k , k ≥ 5 ), the proposed algorithm connects c ( c ≤ n ) vertex pairs with mutually vertex-disjoint paths of lengths at most 2 k ( c - 1 ) + n ⌊ k / 2 ⌋ , and the worst-case time complexity of the algorithm is O ( n c 4 ) . Finally, empirical evaluation of the proposed algorithm is conducted in order to inspect its practical behavior.
Collapse
Affiliation(s)
- Antoine Bossard
- Graduate School of Science, Kanagawa University, Kanagawa 259-1293, Japan.
| | - Keiichi Kaneko
- Graduate School of Engineering, Tokyo University of Agriculture and Technology, Tokyo 184-8588, Japan.
| |
Collapse
|
35
|
Belem Pacheco LA, Pelinson Alchieri EA, Mendez Barreto PAS. Device-Based Security to Improve User Privacy in the Internet of Things †. Sensors (Basel) 2018; 18:s18082664. [PMID: 30110880 PMCID: PMC6111884 DOI: 10.3390/s18082664] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/29/2018] [Revised: 07/10/2018] [Accepted: 07/12/2018] [Indexed: 11/16/2022]
Abstract
The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.
Collapse
|
36
|
Conrad J, Chamberland C, Breuckmann NP, Terhal BM. The small stellated dodecahedron code and friends. Philos Trans A Math Phys Eng Sci 2018; 376:20170323. [PMID: 29807900 PMCID: PMC5990658 DOI: 10.1098/rsta.2017.0323] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 03/16/2018] [Indexed: 05/13/2023]
Abstract
We explore a distance-3 homological CSS quantum code, namely the small stellated dodecahedron code, for dense storage of quantum information and we compare its performance with the distance-3 surface code. The data and ancilla qubits of the small stellated dodecahedron code can be located on the edges respectively vertices of a small stellated dodecahedron, making this code suitable for three-dimensional connectivity. This code encodes eight logical qubits into 30 physical qubits (plus 22 ancilla qubits for parity check measurements) in contrast with one logical qubit into nine physical qubits (plus eight ancilla qubits) for the surface code. We develop fault-tolerant parity check circuits and a decoder for this code, allowing us to numerically assess the circuit-based pseudo-threshold.This article is part of a discussion meeting issue 'Foundations of quantum mechanics and their impact on contemporary society'.
Collapse
Affiliation(s)
- J Conrad
- JARA Institute for Quantum Information, RWTH Aachen University, Aachen 52056, Germany
| | - C Chamberland
- Institute for Quantum Computing and Department of Physics and Astronomy, University of Waterloo, Waterloo, Ontario, Canada N2L 3G1
| | - N P Breuckmann
- Department of Physics and Astronomy, University College London, London WC1E 6BT, UK
| | - B M Terhal
- QuTech, Delft University of Technology, PO Box 5046, 2600 GA Delft, The Netherlands
- Institute for Theoretical Nanoelectronics, Forschungszentrum Juelich, 52425 Juelich, Germany
| |
Collapse
|
37
|
ElHady NE, Provost J. A Systematic Survey on Sensor Failure Detection and Fault-Tolerance in Ambient Assisted Living. Sensors (Basel) 2018; 18:E1991. [PMID: 29933622 DOI: 10.3390/s18071991] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/13/2018] [Revised: 06/19/2018] [Accepted: 06/20/2018] [Indexed: 11/17/2022]
Abstract
Ambient Assisted Living (AAL) systems aim to enable the elderly people to stay active and live independently into older age by monitoring their behaviour, provide the needed assistance and detect early signs of health status deterioration. Non-intrusive sensors are preferred by the elderly to be used for the monitoring purposes. However, false positive or negative triggers of those sensors could lead to a misleading interpretation of the status of the elderlies. This paper presents a systematic literature review of the sensor failure detection and fault tolerance in AAL equipped with non-intrusive, event-driven, binary sensors. The existing works are discussed, and the limitations and research gaps are highlighted.
Collapse
|
38
|
Rodríguez A, Valverde J, Portilla J, Otero A, Riesgo T, de la Torre E. FPGA-Based High-Performance Embedded Systems for Adaptive Edge Computing in Cyber-Physical Systems: The ARTICo³ Framework. Sensors (Basel) 2018; 18:s18061877. [PMID: 29890644 PMCID: PMC6022175 DOI: 10.3390/s18061877] [Citation(s) in RCA: 48] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/06/2018] [Revised: 06/05/2018] [Accepted: 06/05/2018] [Indexed: 11/16/2022]
Abstract
Cyber-Physical Systems are experiencing a paradigm shift in which processing has been relocated to the distributed sensing layer and is no longer performed in a centralized manner. This approach, usually referred to as Edge Computing, demands the use of hardware platforms that are able to manage the steadily increasing requirements in computing performance, while keeping energy efficiency and the adaptability imposed by the interaction with the physical world. In this context, SRAM-based FPGAs and their inherent run-time reconfigurability, when coupled with smart power management strategies, are a suitable solution. However, they usually fail in user accessibility and ease of development. In this paper, an integrated framework to develop FPGA-based high-performance embedded systems for Edge Computing in Cyber-Physical Systems is presented. This framework provides a hardware-based processing architecture, an automated toolchain, and a runtime to transparently generate and manage reconfigurable systems from high-level system descriptions without additional user intervention. Moreover, it provides users with support for dynamically adapting the available computing resources to switch the working point of the architecture in a solution space defined by computing performance, energy consumption and fault tolerance. Results show that it is indeed possible to explore this solution space at run time and prove that the proposed framework is a competitive alternative to software-based edge computing platforms, being able to provide not only faster solutions, but also higher energy efficiency for computing-intensive algorithms with significant levels of data-level parallelism.
Collapse
Affiliation(s)
- Alfonso Rodríguez
- Centro de Electrónica Industrial, Universidad Politécnica de Madrid, José Gutiérrez Abascal 2, 28006 Madrid, Spain.
| | - Juan Valverde
- United Technologies Research Centre (UTRC), Penrose Wharf, Cork T23 XN53, Ireland.
| | - Jorge Portilla
- Centro de Electrónica Industrial, Universidad Politécnica de Madrid, José Gutiérrez Abascal 2, 28006 Madrid, Spain.
| | - Andrés Otero
- Centro de Electrónica Industrial, Universidad Politécnica de Madrid, José Gutiérrez Abascal 2, 28006 Madrid, Spain.
| | - Teresa Riesgo
- Centro de Electrónica Industrial, Universidad Politécnica de Madrid, José Gutiérrez Abascal 2, 28006 Madrid, Spain.
| | - Eduardo de la Torre
- Centro de Electrónica Industrial, Universidad Politécnica de Madrid, José Gutiérrez Abascal 2, 28006 Madrid, Spain.
| |
Collapse
|
39
|
Furquim G, Filho GPR, Jalali R, Pessin G, Pazzi RW, Ueyama J. How to Improve Fault Tolerance in Disaster Predictions: A Case Study about Flash Floods Using IoT, ML and Real Data. Sensors (Basel) 2018; 18:s18030907. [PMID: 29562657 PMCID: PMC5877203 DOI: 10.3390/s18030907] [Citation(s) in RCA: 23] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/17/2017] [Revised: 02/28/2018] [Accepted: 03/01/2018] [Indexed: 12/01/2022]
Abstract
The rise in the number and intensity of natural disasters is a serious problem that affects the whole world. The consequences of these disasters are significantly worse when they occur in urban districts because of the casualties and extent of the damage to goods and property that is caused. Until now feasible methods of dealing with this have included the use of wireless sensor networks (WSNs) for data collection and machine-learning (ML) techniques for forecasting natural disasters. However, there have recently been some promising new innovations in technology which have supplemented the task of monitoring the environment and carrying out the forecasting. One of these schemes involves adopting IP-based (Internet Protocol) sensor networks, by using emerging patterns for IoT. In light of this, in this study, an attempt has been made to set out and describe the results achieved by SENDI (System for dEtecting and forecasting Natural Disasters based on IoT). SENDI is a fault-tolerant system based on IoT, ML and WSN for the detection and forecasting of natural disasters and the issuing of alerts. The system was modeled by means of ns-3 and data collected by a real-world WSN installed in the town of São Carlos - Brazil, which carries out the data collection from rivers in the region. The fault-tolerance is embedded in the system by anticipating the risk of communication breakdowns and the destruction of the nodes during disasters. It operates by adding intelligence to the nodes to carry out the data distribution and forecasting, even in extreme situations. A case study is also included for flash flood forecasting and this makes use of the ns-3 SENDI model and data collected by WSN.
Collapse
Affiliation(s)
- Gustavo Furquim
- Federal Institute of Education, Science, and Technology of São Paulo (IFSP), Sao Paulo, CEP: 14801-600, Brazil.
- University of Ontario Institute of Technology (UOIT), Oshawa, ON L1H 7K4, Canada.
| | - Geraldo P R Filho
- Institute of Mathematics and Computer Science (ICMC), University of Sao Paulo (USP), Sao Carlos, São Paulo, CEP: 13566-590, Brazil.
| | - Roozbeh Jalali
- University of Ontario Institute of Technology (UOIT), Oshawa, ON L1H 7K4, Canada.
| | - Gustavo Pessin
- Polytechnic School, Universidade do Vale do Rio dos Sinos, São Leopoldo, RS, CEP: 93.022-750, Brazil.
| | - Richard W Pazzi
- University of Ontario Institute of Technology (UOIT), Oshawa, ON L1H 7K4, Canada.
| | - Jó Ueyama
- Institute of Mathematics and Computer Science (ICMC), University of Sao Paulo (USP), Sao Carlos, São Paulo, CEP: 13566-590, Brazil.
| |
Collapse
|
40
|
Jin L, Liao B, Liu M, Xiao L, Guo D, Yan X. Different-Level Simultaneous Minimization Scheme for Fault Tolerance of Redundant Manipulator Aided with Discrete-Time Recurrent Neural Network. Front Neurorobot 2017; 11:50. [PMID: 28955217 PMCID: PMC5601992 DOI: 10.3389/fnbot.2017.00050] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/15/2017] [Accepted: 08/28/2017] [Indexed: 11/13/2022] Open
Abstract
By incorporating the physical constraints in joint space, a different-level simultaneous minimization scheme, which takes both the robot kinematics and robot dynamics into account, is presented and investigated for fault-tolerant motion planning of redundant manipulator in this paper. The scheme is reformulated as a quadratic program (QP) with equality and bound constraints, which is then solved by a discrete-time recurrent neural network. Simulative verifications based on a six-link planar redundant robot manipulator substantiate the efficacy and accuracy of the presented acceleration fault-tolerant scheme, the resultant QP and the corresponding discrete-time recurrent neural network.
Collapse
Affiliation(s)
- Long Jin
- School of Information Science and Engineering, Lanzhou UniversityLanzhou, China
| | - Bolin Liao
- College of Information Science and Engineering, Jishou UniversityJishou, China
| | - Mei Liu
- School of Information Science and Engineering, Lanzhou UniversityLanzhou, China
| | - Lin Xiao
- College of Information Science and Engineering, Jishou UniversityJishou, China
| | - Dongsheng Guo
- School of Information Science and Engineering, Huaqiao UniversityXiamen, China
| | - Xiaogang Yan
- Department of Computer Science, University of OtagoDunedin, New Zealand
| |
Collapse
|
41
|
Silva F, Correia L, Christensen AL. Evolutionary online behaviour learning and adaptation in real robots. R Soc Open Sci 2017; 4:160938. [PMID: 28791130 PMCID: PMC5541525 DOI: 10.1098/rsos.160938] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/19/2016] [Accepted: 06/28/2017] [Indexed: 05/26/2023]
Abstract
Online evolution of behavioural control on real robots is an open-ended approach to autonomous learning and adaptation: robots have the potential to automatically learn new tasks and to adapt to changes in environmental conditions, or to failures in sensors and/or actuators. However, studies have so far almost exclusively been carried out in simulation because evolution in real hardware has required several days or weeks to produce capable robots. In this article, we successfully evolve neural network-based controllers in real robotic hardware to solve two single-robot tasks and one collective robotics task. Controllers are evolved either from random solutions or from solutions pre-evolved in simulation. In all cases, capable solutions are found in a timely manner (1 h or less). Results show that more accurate simulations may lead to higher-performing controllers, and that completing the optimization process in real robots is meaningful, even if solutions found in simulation differ from solutions in reality. We furthermore demonstrate for the first time the adaptive capabilities of online evolution in real robotic hardware, including robots able to overcome faults injected in the motors of multiple units simultaneously, and to modify their behaviour in response to changes in the task requirements. We conclude by assessing the contribution of each algorithmic component on the performance of the underlying evolutionary algorithm.
Collapse
Affiliation(s)
- Fernando Silva
- Bio-inspired Computation and Intelligent Machines Lab, 1649-026 Lisboa, Portugal
- BioISI, Faculdade de Ciências, Universidade de Lisboa, 1749-016 Lisboa, Portugal
- Instituto de Telecomunicações, 1049-001 Lisboa, Portugal
| | - Luís Correia
- BioISI, Faculdade de Ciências, Universidade de Lisboa, 1749-016 Lisboa, Portugal
| | - Anders Lyhne Christensen
- Bio-inspired Computation and Intelligent Machines Lab, 1649-026 Lisboa, Portugal
- Instituto de Telecomunicações, 1049-001 Lisboa, Portugal
- Instituto Universitário de Lisboa (ISCTE-IUL), 1649-026 Lisboa, Portugal
| |
Collapse
|
42
|
Alshinina R, Elleithy K. Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks. Sensors (Basel) 2017; 17:E536. [PMID: 28282896 DOI: 10.3390/s17030536] [Citation(s) in RCA: 24] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/29/2016] [Revised: 02/26/2017] [Accepted: 03/03/2017] [Indexed: 11/17/2022]
Abstract
Wireless Sensor Networks (WSNs) have become essential components for a variety of environmental, surveillance, military, traffic control, and healthcare applications. These applications face critical challenges such as communication, security, power consumption, data aggregation, heterogeneities of sensor hardware, and Quality of Service (QoS) issues. Service-Oriented Architecture (SOA) is a software architecture that can be integrated with WSN applications to address those challenges. The SOA middleware bridges the gap between the high-level requirements of different applications and the hardware constraints of WSNs. This survey explores state-of-the-art approaches based on SOA and Service-Oriented Middleware (SOM) architecture that provide solutions for WSN challenges. The categories of this paper are based on approaches of SOA with and without middleware for WSNs. Additionally, features of SOA and middleware architectures for WSNs are compared to achieve more robust and efficient network performance. Design issues of SOA middleware for WSNs and its characteristics are also highlighted. The paper concludes with future research directions in SOM architecture to meet all requirements of emerging application of WSNs.
Collapse
|
43
|
Feng L, Guo S, Sun J, Yu P, Li W. A Fault Tolerance Mechanism for On-Road Sensor Networks. Sensors (Basel) 2016; 16:s16122059. [PMID: 27918483 PMCID: PMC5191040 DOI: 10.3390/s16122059] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/24/2016] [Revised: 11/21/2016] [Accepted: 11/29/2016] [Indexed: 06/06/2023]
Abstract
On-Road Sensor Networks (ORSNs) play an important role in capturing traffic flow data for predicting short-term traffic patterns, driving assistance and self-driving vehicles. However, this kind of network is prone to large-scale communication failure if a few sensors physically fail. In this paper, to ensure that the network works normally, an effective fault-tolerance mechanism for ORSNs which mainly consists of backup on-road sensor deployment, redundant cluster head deployment and an adaptive failure detection and recovery method is proposed. Firstly, based on the N - x principle and the sensors' failure rate, this paper formulates the backup sensor deployment problem in the form of a two-objective optimization, which explains the trade-off between the cost and fault resumption. In consideration of improving the network resilience further, this paper introduces a redundant cluster head deployment model according to the coverage constraint. Then a common solving method combining integer-continuing and sequential quadratic programming is explored to determine the optimal location of these two deployment problems. Moreover, an Adaptive Detection and Resume (ADR) protocol is deigned to recover the system communication through route and cluster adjustment if there is a backup on-road sensor mismatch. The final experiments show that our proposed mechanism can achieve an average 90% recovery rate and reduce the average number of failed sensors at most by 35.7%.
Collapse
Affiliation(s)
- Lei Feng
- State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunication, Beijing 100876, China.
| | - Shaoyong Guo
- State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunication, Beijing 100876, China.
| | - Jialu Sun
- State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunication, Beijing 100876, China.
| | - Peng Yu
- State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunication, Beijing 100876, China.
| | - Wenjing Li
- State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunication, Beijing 100876, China.
| |
Collapse
|
44
|
Ren H, Li H, Liang X, He S, Dai Y, Zhao L. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees. Sensors (Basel) 2016; 16:E1463. [PMID: 27626417 DOI: 10.3390/s16091463] [Citation(s) in RCA: 17] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/25/2016] [Revised: 08/25/2016] [Accepted: 08/26/2016] [Indexed: 11/17/2022]
Abstract
With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.
Collapse
|
45
|
Su F, Yuan P, Wang Y, Zhang C. The superior fault tolerance of artificial neural network training with a fault/noise injection-based genetic algorithm. Protein Cell 2016; 7:735-748. [PMID: 27502185 PMCID: PMC5055486 DOI: 10.1007/s13238-016-0302-5] [Citation(s) in RCA: 12] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/20/2016] [Accepted: 07/12/2016] [Indexed: 02/05/2023] Open
Abstract
Artificial neural networks (ANNs) are powerful computational tools that are designed to replicate the human brain and adopted to solve a variety of problems in many different fields. Fault tolerance (FT), an important property of ANNs, ensures their reliability when significant portions of a network are lost. In this paper, a fault/noise injection-based (FIB) genetic algorithm (GA) is proposed to construct fault-tolerant ANNs. The FT performance of an FIB-GA was compared with that of a common genetic algorithm, the back-propagation algorithm, and the modification of weights algorithm. The FIB-GA showed a slower fitting speed when solving the exclusive OR (XOR) problem and the overlapping classification problem, but it significantly reduced the errors in cases of single or multiple faults in ANN weights or nodes. Further analysis revealed that the fit weights showed no correlation with the fitting errors in the ANNs constructed with the FIB-GA, suggesting a relatively even distribution of the various fitting parameters. In contrast, the output weights in the training of ANNs implemented with the use the other three algorithms demonstrated a positive correlation with the errors. Our findings therefore indicate that a combination of the fault/noise injection-based method and a GA is capable of introducing FT to ANNs and imply that the distributed ANNs demonstrate superior FT performance.
Collapse
Affiliation(s)
- Feng Su
- Robotics Institute, Beihang University, Beijing, 100191, China.,State Key Laboratory of Membrane Biology, School of Life Sciences, Beijing, 100871, China.,PKU-IDG/McGovern Institute for Brain Research, Peking University, Beijing, 100871, China
| | - Peijiang Yuan
- Robotics Institute, Beihang University, Beijing, 100191, China
| | - Yangzhen Wang
- State Key Laboratory of Membrane Biology, School of Life Sciences, Beijing, 100871, China.,PKU-IDG/McGovern Institute for Brain Research, Peking University, Beijing, 100871, China
| | - Chen Zhang
- State Key Laboratory of Membrane Biology, School of Life Sciences, Beijing, 100871, China. .,PKU-IDG/McGovern Institute for Brain Research, Peking University, Beijing, 100871, China.
| |
Collapse
|
46
|
Zeng Y, Xu L, Chen Z. Fault-Tolerant Algorithms for Connectivity Restoration in Wireless Sensor Networks. Sensors (Basel) 2015; 16:E3. [PMID: 26703616 DOI: 10.3390/s16010003] [Citation(s) in RCA: 16] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/26/2015] [Revised: 12/07/2015] [Accepted: 12/16/2015] [Indexed: 11/18/2022]
Abstract
As wireless sensor network (WSN) is often deployed in a hostile environment, nodes in the networks are prone to large-scale failures, resulting in the network not working normally. In this case, an effective restoration scheme is needed to restore the faulty network timely. Most of existing restoration schemes consider more about the number of deployed nodes or fault tolerance alone, but fail to take into account the fact that network coverage and topology quality are also important to a network. To address this issue, we present two algorithms named Full 2-Connectivity Restoration Algorithm (F2CRA) and Partial 3-Connectivity Restoration Algorithm (P3CRA), which restore a faulty WSN in different aspects. F2CRA constructs the fan-shaped topology structure to reduce the number of deployed nodes, while P3CRA constructs the dual-ring topology structure to improve the fault tolerance of the network. F2CRA is suitable when the restoration cost is given the priority, and P3CRA is suitable when the network quality is considered first. Compared with other algorithms, these two algorithms ensure that the network has stronger fault-tolerant function, larger coverage area and better balanced load after the restoration.
Collapse
|
47
|
Wu Z, Xiong N, Huang Y, Xu D, Hu C. Optimizing the Reliability and Performance of Service Composition Applications with Fault Tolerance in Wireless Sensor Networks. Sensors (Basel) 2015; 15:28193-223. [PMID: 26561818 DOI: 10.3390/s151128193] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/22/2015] [Revised: 10/18/2015] [Accepted: 11/02/2015] [Indexed: 11/17/2022]
Abstract
The services composition technology provides flexible methods for building service composition applications (SCAs) in wireless sensor networks (WSNs). The high reliability and high performance of SCAs help services composition technology promote the practical application of WSNs. The optimization methods for reliability and performance used for traditional software systems are mostly based on the instantiations of software components, which are inapplicable and inefficient in the ever-changing SCAs in WSNs. In this paper, we consider the SCAs with fault tolerance in WSNs. Based on a Universal Generating Function (UGF) we propose a reliability and performance model of SCAs in WSNs, which generalizes a redundancy optimization problem to a multi-state system. Based on this model, an efficient optimization algorithm for reliability and performance of SCAs in WSNs is developed based on a Genetic Algorithm (GA) to find the optimal structure of SCAs with fault-tolerance in WSNs. In order to examine the feasibility of our algorithm, we have evaluated the performance. Furthermore, the interrelationships between the reliability, performance and cost are investigated. In addition, a distinct approach to determine the most suitable parameters in the suggested algorithm is proposed.
Collapse
|
48
|
Huang Y, Martínez JF, Sendra J, López L. Resilient Wireless Sensor Networks Using Topology Control: A Review. Sensors (Basel) 2015; 15:24735-70. [PMID: 26404272 PMCID: PMC4634502 DOI: 10.3390/s151024735] [Citation(s) in RCA: 18] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/06/2015] [Revised: 08/14/2015] [Accepted: 09/08/2015] [Indexed: 11/16/2022]
Abstract
Wireless sensor networks (WSNs) may be deployed in failure-prone environments, and WSNs nodes easily fail due to unreliable wireless connections, malicious attacks and resource-constrained features. Nevertheless, if WSNs can tolerate at most losing k − 1 nodes while the rest of nodes remain connected, the network is called k − connected. k is one of the most important indicators for WSNs’ self-healing capability. Following a WSN design flow, this paper surveys resilience issues from the topology control and multi-path routing point of view. This paper provides a discussion on transmission and failure models, which have an important impact on research results. Afterwards, this paper reviews theoretical results and representative topology control approaches to guarantee WSNs to be k − connected at three different network deployment stages: pre-deployment, post-deployment and re-deployment. Multi-path routing protocols are discussed, and many NP-complete or NP-hard problems regarding topology control are identified. The challenging open issues are discussed at the end. This paper can serve as a guideline to design resilient WSNs.
Collapse
Affiliation(s)
- Yuanjiang Huang
- Centro de Investigación en Tecnologías Software y Sistemas Multimedia para la Sostenibilidad (CITSEM), Campus Sur Universidad Politécnica de Madrid (UPM), Ctra. de Valencia, km. 7. 28031 Madrid, Spain.
| | - José-Fernán Martínez
- Centro de Investigación en Tecnologías Software y Sistemas Multimedia para la Sostenibilidad (CITSEM), Campus Sur Universidad Politécnica de Madrid (UPM), Ctra. de Valencia, km. 7. 28031 Madrid, Spain.
| | - Juana Sendra
- Centro de Investigación en Tecnologías Software y Sistemas Multimedia para la Sostenibilidad (CITSEM), Campus Sur Universidad Politécnica de Madrid (UPM), Ctra. de Valencia, km. 7. 28031 Madrid, Spain.
| | - Lourdes López
- Centro de Investigación en Tecnologías Software y Sistemas Multimedia para la Sostenibilidad (CITSEM), Campus Sur Universidad Politécnica de Madrid (UPM), Ctra. de Valencia, km. 7. 28031 Madrid, Spain.
| |
Collapse
|
49
|
Lin C, Wu G, Pirozmand P. GTRF: a game theory approach for regulating node behavior in real-time wireless sensor networks. Sensors (Basel) 2015; 15:12932-58. [PMID: 26053745 PMCID: PMC4507704 DOI: 10.3390/s150612932] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/28/2015] [Revised: 05/11/2015] [Accepted: 05/29/2015] [Indexed: 12/03/2022]
Abstract
The selfish behaviors of nodes (or selfish nodes) cause packet loss, network congestion or even void regions in real-time wireless sensor networks, which greatly decrease the network performance. Previous methods have focused on detecting selfish nodes or avoiding selfish behavior, but little attention has been paid to regulating selfish behavior. In this paper, a Game Theory-based Real-time & Fault-tolerant (GTRF) routing protocol is proposed. GTRF is composed of two stages. In the first stage, a game theory model named VA is developed to regulate nodes’ behaviors and meanwhile balance energy cost. In the second stage, a jumping transmission method is adopted, which ensures that real-time packets can be successfully delivered to the sink before a specific deadline. We prove that GTRF theoretically meets real-time requirements with low energy cost. Finally, extensive simulations are conducted to demonstrate the performance of our scheme. Simulation results show that GTRF not only balances the energy cost of the network, but also prolongs network lifetime.
Collapse
Affiliation(s)
- Chi Lin
- School of Software, Dalian University of Technology, Road No. 8, Development Zone, Dalian 116620, China.
| | - Guowei Wu
- School of Software, Dalian University of Technology, Road No. 8, Development Zone, Dalian 116620, China.
| | - Poria Pirozmand
- School of Software, Dalian University of Technology, Road No. 8, Development Zone, Dalian 116620, China.
| |
Collapse
|
50
|
Climent S, Capella JV, Meratnia N, Serrano JJ. Underwater sensor networks: a new energy efficient and robust architecture. Sensors (Basel) 2012; 12:704-31. [PMID: 22368492 DOI: 10.3390/s120100704] [Citation(s) in RCA: 40] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/30/2011] [Revised: 01/05/2012] [Accepted: 01/09/2012] [Indexed: 11/30/2022]
Abstract
The specific characteristics of underwater environments introduce new challenges for networking protocols. In this paper, a specialized architecture for underwater sensor networks (UWSNs) is proposed and evaluated. Experiments are conducted in order to analyze the suitability of this protocol for the subaquatic transmission medium. Moreover, different scheduling techniques are applied to the architecture in order to study their performance. In addition, given the harsh conditions of the underwater medium, different retransmission methods are combined with the scheduling techniques. Finally, simulation results illustrate the performance achievements of the proposed protocol in end-to-end delay, packet delivery ratio and energy consumption, showing that this protocol can be very suitable for the underwater medium.
Collapse
|