Records with Subject: Information Management
Showing records 1 to 25 of 351. [First] Page: 1 2 3 4 5 Last
Security of Cyber-Physical Systems of Chemical Manufacturing Industries Based on Blockchain
Wu Deng, Wei Fan, Zhenzhen Li, Chi Cui, Xu Ji, Ge He
February 10, 2024 (v1)
Keywords: blockchain, chemical industrial manufacturing, cyber-physical system, information security
The traditional manufacturing systems are often enterprise-centric systems, whereas the modern chemical industry is oriented towards industrial chain integration. Enterprise entities present a loosely coupled state at the scale of the industrial chain, with decentralized characteristics. This poses greater challenges and requirements for the industrial safety system. Based on the characteristics of the chemical manufacturing industry and blockchain, the application of the information security of blockchain in the chemical manufacturing industry is studied herein and the cyber-physical systems security architecture model of dual blockchains is proposed. The first-layer blockchain is applied at the system’s core function level to solve security issues at the system level and provide security guarantees for communication, transactions, and billing between users and manufacturers. Meanwhile, the second layer involves the system resource layer, which not only solves the security problem of... [more]
Research on Metallurgical Saw Blade Surface Defect Detection Algorithm Based on SC-YOLOv5
Lili Meng, Xi Cui, Ran Liu, Zhi Zheng, Hongli Shao, Jinxiang Liu, Yao Peng, Lei Zheng
November 30, 2023 (v1)
Keywords: deep learning, defect detecting, lightweight, metallurgical saw blade, YOLOv5
Under the background of intelligent manufacturing, in order to solve the complex problems of manual detection of metallurgical saw blade defects in enterprises, such as real-time detection, false detection, and the detection model being too large to deploy, a study on a metallurgical saw blade surface defect detection algorithm based on SC-YOLOv5 is proposed. Firstly, the SC network is built by integrating coordinate attention (CA) into the Shufflenet-V2 network, and the backbone network of YOLOv5 is replaced by the SC network to improve detection accuracy. Then, the SIOU loss function is used in the YOLOv5 prediction layer to solve the angle problem between the prediction frame and the real frame. Finally, in order to ensure both accuracy and speed, lightweight convolution (GSConv) is used to replace the ordinary convolution module. The experimental results show that the mAP@0.5 of the improved YOLOv5 model is 88.5%, and the parameter is 31.1M. Compared with the original YOLOv5 model,... [more]
A Review of Pump Cavitation Fault Detection Methods Based on Different Signals
Xiaohui Liu, Jiegang Mou, Xin Xu, Zhi Qiu, Buyu Dong
August 3, 2023 (v1)
Keywords: artificial intelligent, cavitation state recognition, Fault Detection, feature extraction, sensors, signal processing
As one of the research hotspots in the field of pumps, cavitation detection plays an important role in equipment maintenance and cost-saving. Based on this, this paper analyzes detection methods of cavitation faults based on different signals, including vibration signals, acoustic emission signals, noise signals, and pressure pulsation signals. First, the principle of each detection method is introduced. Then, the research status of the four detection methods is summarized from the aspects of cavitation-induced signal characteristics, signal processing methods, feature extraction, intelligent algorithm identification of cavitation state, detection efficiency, and measurement point distribution position. Among these methods, we focus on the most widely used one, the vibration method. The advantages and disadvantages of various detection methods are analyzed and proposed: acoustic methods including noise and acoustic emission can detect early cavitation very well; the vibration method is... [more]
Blockchain-Based Decentralized Power Dispatching Model for Power Grids Integrated with Renewable Energy and Flexible Load
Lei Xu, Dong Yu, Jinyu Zhou, Chaowu Jin
July 4, 2023 (v1)
Keywords: blockchain, decentralized power dispatching model, flexible load, improved consensus algorithm, Renewable and Sustainable Energy, smart contract
To cope with the energy crisis and environmental pollution, the future development of the power system has to change towards a clean, low-carbon, flexible, and diversified direction. This paper proposes a decentralized power dispatching model based on blockchain technology to address the problems of uncertainty, privacy, security, and reliability in power dispatching systems containing renewable energy and flexible loads. Considering the uncertainty of wind, photovoltaic, and flexible load integration into the power grid, the total generation costs of the system are established, and the smart contracts of the decentralized power dispatching are proposed. The proof of work (PoW) consensus mechanism is improved in this paper. The hash operation that must be repeated in the PoW algorithm is replaced by an optimized computation process using a blockchain-based genetic algorithm (BD-GA). The proof of work-load-genetic algorithm-based (PoW-GAD) consensus algorithm is proposed. The decentrali... [more]
Special Issue “Active Flow Control Processes with Machine Learning and the Internet of Things”
Dipankar Deb, Valentina Emilia Balas, Mrinal Kaushik
June 13, 2023 (v1)
The desired changes in flow characteristics are obtained by flow control, which implies manipulating flow behavior such as drag reduction, mixing augmentation, or noise attenuation, employing active or passive devices [...]
Energy Storage Charging Pile Management Based on Internet of Things Technology for Electric Vehicles
Zhaiyan Li, Xuliang Wu, Shen Zhang, Long Min, Yan Feng, Zhouming Hang, Liqiu Shi
June 9, 2023 (v1)
Keywords: charging piles, cloud service platform, EV, integration of charging and storage, Internet of Things
The traditional charging pile management system usually only focuses on the basic charging function, which has problems such as single system function, poor user experience, and inconvenient management. In this paper, the battery energy storage technology is applied to the traditional EV (electric vehicle) charging piles to build a new EV charging pile with integrated charging, discharging, and storage; Multisim software is used to build an EV charging model in order to simulate the charge control guidance module. On this basis, combined with the research of new technologies such as the Internet of Things, cloud computing, embedded systems, mobile Internet, and big data, new design and construction methods of the energy storage charging pile management system for EV are explored. Moreover, K-Means clustering analysis method is used to analyze the charging habit. The functions such as energy storage, user management, equipment management, transaction management, and big data analysis ca... [more]
An Authenticated Group Shared Key Mechanism Based on a Combiner for Hash Functions over the Industrial Internet of Things
Waleed Ali, Adel Ali Ahmed
June 9, 2023 (v1)
Keywords: AGSK, ECDH, IIoT, random oracle model
The Industrial Internet of Things (IIoT) provides internet connectivity for instruments, digital machines, and any other manufactured object to enable intelligent industrial operations to achieve high productivity. Securing communications between IIoT devices remains a critical and challenging issue due to the resource-constrained and processing capabilities of sensing devices. Moreover, the traditional group shared key might implement complex mathematical operations that are not suitable for the limited recourse capability of the IIoT device. Furthermore, the standard Diffie−Hellman (DH) and elliptic curve Diffie−Hellman (ECDH), which are the most suited for tiny devices, only work between a pair of IIoT devices, while they are not designed to work among a group of IIoT devices. This paper proposes an authenticated group shared key (AGSK) mechanism that allows a set of industrial objects to establish a common session key over the IIoT. The proposed AGSK utilizes the combiner for the h... [more]
Exploring Relationships among Crude Oil, Bitcoin, and Carbon Dioxide Emissions: Quantile Mediation Analysis
Tzu-Kuang Hsu, Wan-Chu Lien, Yao-Hsien Lee
June 9, 2023 (v1)
Keywords: Brent crude (BRT), CO2 emissions, cryptocurrency, nonlinear inverted U-shaped curve, Renewable and Sustainable Energy
Crude oil, Bitcoin, and carbon dioxide emissions are major issues that are significantly impacting the global economy and environment. These three issues are complexly interlinked, with profound economic and environmental implications. In this study, we explore the correlation among these three issues and attempt to understand the influence of crude oil and Bitcoin on carbon dioxide emissions. We created a novel approach, named quantile mediation analysis, which blends mediation regression with quantile regression, enabling us to explore the influence of Brent crude oil on carbon dioxide emissions by considering the mediating impact of Bitcoin. According to the findings from using our new approach, the impact of Brent crude oil on carbon dioxide emissions is partly mediated by Bitcoin, and the association between Brent crude oil and carbon dioxide emissions involves both direct and indirect effects. Since the carbon dioxide generated by the extraction of crude oil and Bitcoin has a gre... [more]
Federated Learning and Blockchain-Enabled Intelligent Manufacturing for Sustainable Energy Production in Industry 4.0
Fanglei Sun, Zhifeng Diao
June 7, 2023 (v1)
Keywords: blockchain, federated learning, intelligent manufacturing, Renewable and Sustainable Energy
Intelligent manufacturing under Industry 4.0 assimilates sophisticated technologies and artificial intelligence for sustainable production and outcomes. Blockchain paradigms are coined with Industry 4.0 for concurrent and well-monitored flawless production. This article introduces Sustainable Production concerned with External Demands (SP-ED). This method is more specific about energy production and the distribution for flawless and outage-less supply. First, the energy demand is identified for internal and external users based on which sustainability is planned. Secondly, Ethereum blockchain monitoring for a similar production and demand satisfaction is coupled with the production system. From two perspectives, the monitoring and condition satisfaction processes are validated using federated learning (FL). The perspectives include demand distribution and production sustainability. In the demand distribution, the condition of meeting the actual requirement is validated. Contrarily, the... [more]
Multilayer Convolutional Processing Network Based Cryptography Mechanism for Digital Images Infosecurity
Chia-Hung Lin, Chia-Hung Wen, Hsiang-Yueh Lai, Ping-Tzan Huang, Pi-Yun Chen, Chien-Ming Li, Neng-Sheng Pai
June 7, 2023 (v1)
Keywords: diffusion method, multilayer convolutional processing network (MCPN), sine-power chaotic map (SPCM), spatial convolutional operation
Digital images can be easily shared or stored using different imaging devices, storage tools, and computer networks or wireless communication systems. However, these digital images, such as headshots or medical images, may contain private information. Hence, to protect the confidentiality, reliability, and availability of digital images on online processing applications, it is crucial to increase the infosecurity of these images. Therefore, an authorization encryption scheme should ensure a high security level of digital images. The present study aimed to establish a multilayer convolutional processing network (MCPN)-based cryptography mechanism for performing two-round image encryption and decryption processes. In the MCPN layer, two-dimensional (2D) spatial convolutional operations were used to extract the image features and perform scramble operations from grayscale to gray gradient values for the first-image encryption and second-image decryption processes, respectively. In the MCP... [more]
A Multi-Criteria Decision-Making Process for the Selection of an Efficient and Reliable IoT Application
Bader Alojaiman
June 7, 2023 (v1)
Keywords: fuzzy logic, internet of things, MCDM, recommender system, Vision 2030
Saudi Arabia initiated its much-anticipated Vision 2030 campaign, a long-term economic roadmap aimed at reducing the country’s reliance on oil. The vision, which is anticipated to be accomplished in the future, underlines compliance, fiscal, and strategy adjustments that will significantly affect all the important features of Saudi economic growth. Technology will be a critical facilitator, as well as controller, of the initiative’s significant transformation. Cloud computing, with the Internet of things (IoT), could make significant contributions to Saudi Vision 2030’s efficient governance strategy. There are multiple IoT applications that cover every part of everyday life, as well as enabling users to use a variety of IoT applications. Choosing the best IoT applications for specific customers is a difficult task. This paper concentrates on the Kingdom’s advancement towards a fresh, as well as enhanced, method of advancing the development phases pertaining to digital transformation, t... [more]
WT-YOLOX: An Efficient Detection Algorithm for Wind Turbine Blade Damage Based on YOLOX
Yuan Yao, Guozhong Wang, Jinhui Fan
May 23, 2023 (v1)
Keywords: cascaded feature fusion, focal loss, object detection, RepVGG, YOLO
Wind turbine blades will suffer various surface damages due to their operating environment and high-speed rotation. Accurate identification in the early stage of damage formation is crucial. The damage detection of wind turbine blades is a primarily manual operation, which has problems such as high cost, low efficiency, intense subjectivity, and high risk. The rise of deep learning provides a new method for detecting wind turbine blade damage. However, in detecting wind turbine blade damage in general network models, there will be an insufficient fusion of multiscale small target features. This paper proposes a lightweight cascaded feature fusion neural network model based on YOLOX. Firstly, the lightweight area of the backbone feature extraction network concerning the RepVGG network structure is enhanced, improving the model’s inference speed. Second, a cascaded feature fusion module is designed to cascade and interactively fuse multilevel features to enhance the small target area fea... [more]
Integrating Internet-of-Things-Based Houses into Demand Response Programs in Smart Grid
Walied Alharbi
May 23, 2023 (v1)
Keywords: flexibility, Internet of Things, load management, mathematical model
This paper presents a novel framework that mathematically and optimally quantifies demand response (DR) provisions, considering the power availability of Internet of Things (IoT)-based house load management for the provision of flexibility in the smart grid. The proposed framework first models house loads using IoT windows and occupant behavior, and then integrates IoT-based house loads into DR programs based on a novel mathematical optimization model to provide the optimal power flexibility considering the penetration of IoT-based houses in distribution systems. Numerical results that consider a 33-bus distribution system are reported and discussed to demonstrate the effectiveness of flexibility provisions, from integrating IoT-based houses into DR programs, on peak load reduction and system capacity enhancement.
Linearly Polarized Antenna Boosters versus Circularly Polarized Microstrip Patch Antennas for GPS Reception in IoT Devices
Jaime Gui, José L. Leiva, Aurora Andújar, Jaap Groot, Joan L. Pijoan, Jaume Anguera
May 2, 2023 (v1)
Keywords: antenna, antenna boosters, GPS, IoT, polarization, TTFF (time to first fix)
GPS has become an attractive feature for geolocalization enabling asset tracking IoT devices. GPS satellite antennas radiate RHCP (right-hand circularly polarized) electromagnetic waves; thus, the typical antenna at the receiver is also RHCP. However, when the orientation of the receiving device is random, linear polarization antennas operate better in terms of TTFF (time to first fix). Through field measurements (urban and field) and considering different positions of the device in a vehicle, an RHCP microstrip patch antenna and a linear non-resonant antenna element called an antenna booster were compared. TTFF averaged for several positions was 7 s better for the linearly polarized antenna booster than for the microstrip RHCP patch antenna. The results demonstrate that the behavior of the linear polarization antenna booster technology is more robust in terms of TTFF to the arbitrary position of the IoT device while keeping a small size and simplicity.sdf
Impact of a HVDC Link on the Reliability of the Bulk Nigerian Transmission Network
Omowumi Grace Olasunkanmi, Waliu O. Apena, Andrew R. Barron, Alvin Orbaek White, Grazia Todeschini
May 2, 2023 (v1)
Keywords: load-point indices, reliability, transmission network, VSC-HVDC
Regular and reliable access to energy is critical to the foundations of a stable and growing economy. The Nigerian transmission network generates more electricity than is consumed but, due to unpredicted outages, customers are often left without electrical power for several hours during the year. This paper aims to assess the present reliability indices of the Nigerian transmission network, and to determine the impact of HVDCs on system reliability. In the first part of this paper, the reliability of the Nigerian transmission system is quantified by building a model in DIgSILENT PowerFactory and carrying out a reliability study based on data provided by the Nigerian transmission-system operator. Both network indices and load-point indices are evaluated, and the weakest points in the network are identified. In the second part of the paper, an HVDC model is built and integrated into the existing network at the locations identified by the reliability study. A comparative study using two d... [more]
Diversification of Equipment in the IT Infrastructure of Enterprises in Central Pomerania in Poland
Jerzy Korczak, Dorota Janiszewska
April 28, 2023 (v1)
Keywords: Central Pomerania in Poland, enterprises, IT infrastructure
The IT infrastructure is the basis for the efficient and effective flow of logistic information between the individual elements of the logistical system. Therefore, the aim of this research was to assess the diversification of equipment in IT infrastructure in enterprises in Central Pomerania in Poland. The research was conducted in 2021 using the CAWI method. The research covers five categories of IT infrastructure: IT equipment, software/applications, means of communication, devices cooperating in the smart internet network and other devices. The study was conducted on a sample of 353 enterprises located in the area of Central Pomerania. The results of the conducted research indicate that the degree of use of the IT infrastructure in the analyzed enterprises varies. Taking into account the size of the enterprise, IT infrastructure is much more often used by large and medium enterprises than by small and micro enterprises. In addition, the results also show the diversification of the... [more]
Smart Contracts-Based Demand Response Bidding Mechanism to Enhance the Load Aggregator Model in Thailand
Anchisa Pinyo, Athikom Bangviwat
April 28, 2023 (v1)
Keywords: bidding, blockchain, demand response, load aggregator, smart contract, smart grids
In 2022, Thailand’s Demand Response (DR) business model was shifting from the Traditional Utility (TU) model to the Load Aggregator (LA) model in accordance with Thailand’s smart grid master plan. This research studied the current demand response model and mechanism to draw possible gaps in operations. This research deals with the data system owned by the individual load aggregator. The load aggregators collect meter data and evaluate demand adaptations before sending the results to claim compensation on behalf of their customers. This approach lacks transparency and facilitates distortion of the facts. Hence, this research introduces the data execution by smart contracts and data records on the blockchain that enhance transparent data sharing among multiple parties and maintain data integrity. Moreover, the proposed bidding algorithm allows customers to offer an expected price under the maximum incentive payment determined by the avoided costs of running the peaking power plants. Henc... [more]
Post-Consumer Plastic Waste Management: From Collection and Sortation to Mechanical Recycling
Katarzyna Bernat
April 28, 2023 (v1)
Keywords: advanced processes, automatization, collection systems, plastic packaging, plastic waste management, recyclables, sorting solutions, types of polymers
Challenges associated with plastic waste management range from littering to high collection costs to low recycling rates. Effective collection of plastics is obviously an important step in the management of plastic waste and has an impact on recycling rates. For this reason, several countries have transformed their collection systems in recent decades. Collecting more plastic packaging comes at a cost, as the feedstock for the sorting process becomes more complex and leads to cross-contamination within the sorted fractions. Therefore, a balance must be obtained between some elements, such as the design of packaging, collection and recycling rates, and finally, the quality of fractions that have been sorted. Further investment to improve pretreatment, sorting, and recycling technologies and simpler recyclable packaging designs are, therefore, key to further increasing plastic recycling rates. It is essential to possess more data, especially on the type of containers and plastics, and ex... [more]
Internet of Things: A Comprehensive Overview on Protocols, Architectures, Technologies, Simulation Tools, and Future Directions
Mohammad Mansour, Amal Gamal, Ahmed I. Ahmed, Lobna A. Said, Abdelmoniem Elbaz, Norbert Herencsar, Ahmed Soltan
April 28, 2023 (v1)
Keywords: application layer protocols, communication protocols, hybrid IoT protocols, Internet of Things, IoT challenges, IoT comparison, IoT hardware, network simulation tools
The Internet of Things (IoT) is a global network of interconnected computing, sensing, and networking devices that can exchange data and information via various network protocols. It can connect numerous smart devices thanks to recent advances in wired, wireless, and hybrid technologies. Lightweight IoT protocols can compensate for IoT devices with restricted hardware characteristics in terms of storage, Central Processing Unit (CPU), energy, etc. Hence, it is critical to identify the optimal communication protocol for system architects. This necessitates an evaluation of next-generation networks with improved characteristics for connectivity. This paper highlights significant wireless and wired IoT technologies and their applications, offering a new categorization for conventional IoT network protocols. It provides an in-depth analysis of IoT communication protocols with detailed technical information about their stacks, limitations, and applications. The study further compares indust... [more]
Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering
Andrey Privalov, Vera Lukicheva, Igor Kotenko, Igor Saenko
April 26, 2023 (v1)
Keywords: detection of cyberattacks, extreme filtering, fuzzy logic algorithm, traffic decomposition
The paper proposes a method for improving the accuracy of early detection of cyber attacks with a small impact, in which the mathematical expectation is a fraction of the total, and the pulse repetition period is quite long. Early detection of attacks against telecommunication networks is based on traffic analysis using extreme filtering. The algorithm of fuzzy logic for deciding on the results of extreme filtering is suggested. The results of an experimental evaluation of the proposed method are presented. They demonstrate that the method is sensitive even with minor effects. In order to eliminate the redundancy of the analyzed parameters, it is enough to use the standard deviation and the correlation interval for decision making.
A Survey on Enhanced Smart Micro-Grid Management System with Modern Wireless Technology Contribution
Lilia Tightiz, Hyosik Yang, Mohammad Jalil Piran
April 25, 2023 (v1)
Keywords: 5G, energy management system, IEC 61850, LoRa, micro-grid, multi-agent system
Micro-grid (MG) deployment has dramatically become more popular with the high penetration of renewable energy resources (RER). This trend brings with it the merits of independent power grid clean energy resource-based systems, and simultaneously the demerits of an unstable grid due to the intermittent nature of RER. Control and monitoring of MG through robust and ubiquitous communication system infrastructure is the solution to overcoming this intermittency. There has been an increasing focus in recent years on using wireless communication technologies as a prominent candidate in holistic proposal for the micro-grid management system (MGMS). The MGMS has been developed using the multi-agent system (MAS), multi-micro-grid (multi-MG), Internet of things (IoT) integration, and cloud concepts requiring new communication specifications, which can be satisfied by next-generation wireless technologies. There is, however, a lack of comprehensive corresponding investigation into management leve... [more]
Phasor Estimation of Transient Electrical Signals Composed of Harmonics and Interharmonics
Jon Vazquez, Jose Felix Miñambres, Miguel Angel Zorrozua, Jorge Lázaro
April 24, 2023 (v1)
Keywords: decaying dc offset, digital filter, fault localization, fault signal, harmonics identification, interharmonics identification, noisy signal, signal processing, transient event
Numerical relays have become essential tools for carrying out the protection and surveillance tasks of electrical power systems. These relays implement their functions from the phasors of the electrical network signals, estimated by digital processing using digital filters. Digital filters must meet certain requirements, such as providing a fast and effective response to increasingly complex transient signals made up of components that make the estimation process difficult. In addition to the decreasing exponential (decaying dc offset), harmonics, and signal noise, it must be added that the interharmonic components that in recent years have acquired great relevance, mainly because of the increase in non-linear loads and the extensive use of power electronic systems. The presence of these interharmonic components causes a poor response in most of the filters implemented today. This article presents the design of a new digital filter, C-CharmDF (Cleaned Characteristic Harmonic Digital Fi... [more]
Renewable Energy Sector in Bangladesh: The Current Scenario, Challenges and the Role of IoT in Building a Smart Distribution Grid
Abdul Hasib Siddique, Sumaiya Tasnim, Fahim Shahriyar, Mehedi Hasan, Khalid Rashid
April 24, 2023 (v1)
Keywords: distributed generation, hydro, Internet of Things, Nuclear, Renewable and Sustainable Energy, solar, Wind
Advancement in electricity is the key ingredient that can actively take part in alleviating poverty and drastically improve the socio-economic status of the people of Bangladesh. The incorporation of renewable energy sources would help the country meet the energy requirement as well as contribute positively towards building a sustainable planet. The paper has extensively discussed the potential aspects of renewable energy resources in Bangladesh and how the Internet of Things can facilitate the implementation of intermittent sources. The regulatory and socio-economic aspects of the renewable energy industry have been explored and sustainable solutions will be discussed to fast-track the process of integrating various renewable energy sources in the power grid to meet the energy demand. The paper discusses the challenges associated with the RE integration in Bangladesh’s power mix and tries to mitigate it through the IoT. Besides that, an RE map for Bangladesh along with prospective pow... [more]
Performance of the XMPP and the MQTT Protocols on IEC 61850-Based Micro Grid Communication Architecture
Hyun-Ji Jun, Hyo-Sik Yang
April 24, 2023 (v1)
Keywords: IEC 61850, Internet of Things, micro grid, MQTT, smart grid, XMPP
As micro grids are gradually being deployed in many areas, communication technology is becoming important for collecting data and controlling devices in micro grids. In a micro grid, various devices are distributed and perform their respective functions. These devices exchange information with each other and transmit information to the micro grid management system. This micro grid environment is similar to the IoT environment in which information is exchanged in the presence of a large number of devices. Recent studies have tried to apply various IoT protocols as a communication protocol in the micro grid. However, the data model used in current research is limited in proprietary data mapping. Recently, IEC TC 57 published another IEC 61850 series which maps the IEC 61850 services to XMPP (eXtensible Messaging Presence Protocol), which was the first IoT protocol mapping of IEC 61850. Few research has shown that the mapping of the IEC 61850 data model to the IoT protocol and communicati... [more]
Automated Testbench for Hybrid Machine Learning-Based Worst-Case Energy Consumption Analysis on Batteryless IoT Devices
Thomas Huybrechts, Philippe Reiter, Siegfried Mercelis, Jeroen Famaey, Steven Latré, Peter Hellinckx
April 21, 2023 (v1)
Keywords: automated testbench, batteryless devices, hybrid resource consumption analysis, Internet-of-Things, Machine Learning, Worst-Case Energy Consumption
Batteryless Internet-of-Things (IoT) devices need to schedule tasks on very limited energy budgets from intermittent energy harvesting. Creating an energy-aware scheduler allows the device to schedule tasks in an efficient manner to avoid power loss during execution. To achieve this, we need insight in the Worst-Case Energy Consumption (WCEC) of each schedulable task on the device. Different methodologies exist to determine or approximate the energy consumption. However, these approaches are computationally expensive and infeasible to perform on all type of devices; or are not accurate enough to acquire safe upper bounds. We propose a hybrid methodology that combines machine learning-based prediction on small code sections, called hybrid blocks, with static analysis to combine the predictions to a final upper bound estimation for the WCEC. In this paper, we present our work on an automated testbench for the Code Behaviour Framework (COBRA) that measures and profiles the upper bound ene... [more]
Showing records 1 to 25 of 351. [First] Page: 1 2 3 4 5 Last
[Show All Subjects]