The true integration of electronics into textiles requires the fabrication of devices directly on the fibre itself using high-performance materials that allow seamless incorporation into fabrics.Woven electronics and ...The true integration of electronics into textiles requires the fabrication of devices directly on the fibre itself using high-performance materials that allow seamless incorporation into fabrics.Woven electronics and opto-electronics,attained by intertwined fibres with complementary functions are the emerging and most ambitious technological and scientific frontier.Here we demonstrate graphene-enabled functional devices directly fabricated on textile fibres and attained by weaving graphene electronic fibres in a fabric.Capacitive touch-sensors and light-emitting devices were produced using a roll-to-roll-compatible patterning technique,opening new avenues for woven textile electronics.Finally,the demonstration of fabric-enabled pixels for displays and position sensitive functions is a gateway for novel electronic skin,wearable electronic and smart textile applications.展开更多
The CASTOR-K code is a hybrid magnetohydrodynamic (MHD)-drift kinetic code developed for the study of MHD modes in the presence of energetic ion populations. It allows a fast assessment of the linear stability of th...The CASTOR-K code is a hybrid magnetohydrodynamic (MHD)-drift kinetic code developed for the study of MHD modes in the presence of energetic ion populations. It allows a fast assessment of the linear stability of the modes, as well as an accurate calculation of damping due to thermal species (Landau damping). These capabilities make the code an invaluable tool for parametric studies and data analysis. In recent years, CASTOR-K has been mostly used to analyze JET data, including the identification of mechanisms involved in the expulsion of energetic ions from the plasma. However, in order to prepare the code to be used for a wider range of tokamaks including ITER, the code is being subject to a series of important improvements. These improvements aim not only to introduce new physics in the code but also to make it capable of exchanging data with other codes through its integration in modelling infrastructures. In this paper a description of the CASTOR-K code is presented, as well as a summary of the most important results obtained with this code and a description of the new improvements being implemented.展开更多
Following the progression in Internet of Things(IoT) and 5G communication networks, the traditional cloud computing model have shifted to fog computing. Fog computing provides mobile computing, network control and sto...Following the progression in Internet of Things(IoT) and 5G communication networks, the traditional cloud computing model have shifted to fog computing. Fog computing provides mobile computing, network control and storage to the network edges to assist latency critical and computation-intensive applications. Moreover, security features are improved in fog paradigm by processing critical data on edge devices instead of data centres outside the control plane of users. However, fog network deployment imposes many challenges including resource allocation, privacy of users, non-availability of programming model and testing software and support for the heterogenous networks. This article highlights these challenges and their potential solutions in detail. This article also discusses threetier fog network architecture, its standardization and benefits in detail. The proposed resource allocation mechanism for three tier fog networks based on swap matching is described. Results show that by practicing the proposed resource allocation mechanism, maximum throughput with reduced latency is achieved.展开更多
In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of th...In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire network.Nevertheless,it creates a significant loophole for the manifestation of a distributed denial of service(DDoS)attack straightforwardly.Furthermore,recently a Distributed Reflected Denial of Service(DRDoS)attack,an unusual DDoS attack,has been detected.However,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem.Moreover,recently the high frequencies of DDoS attacks have increased dramatically.In this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed.Our proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS occurrence.The obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN.展开更多
Bat algorithm(BA)is an eminent meta-heuristic algorithm that has been widely used to solve diverse kinds of optimization problems.BA leverages the echolocation feature of bats produced by imitating the bats’searching...Bat algorithm(BA)is an eminent meta-heuristic algorithm that has been widely used to solve diverse kinds of optimization problems.BA leverages the echolocation feature of bats produced by imitating the bats’searching behavior.BA faces premature convergence due to its local search capability.Instead of using the standard uniform walk,the Torus walk is viewed as a promising alternative to improve the local search capability.In this work,we proposed an improved variation of BA by applying torus walk to improve diversity and convergence.The proposed.Modern Computerized Bat Algorithm(MCBA)approach has been examined for fifteen well-known benchmark test problems.The finding of our technique shows promising performance as compared to the standard PSO and standard BA.The proposed MCBA,BPA,Standard PSO,and Standard BA have been examined for well-known benchmark test problems and training of the artificial neural network(ANN).We have performed experiments using eight benchmark datasets applied from the worldwide famous machine-learning(ML)repository of UCI.Simulation results have shown that the training of an ANN with MCBA-NN algorithm tops the list considering exactness,with more superiority compared to the traditional methodologies.The MCBA-NN algorithm may be used effectively for data classification and statistical problems in the future.展开更多
Advanced Metering Infrastructure(AMI)forms an important part in Smart Grids.Routing the data effectively from smart meters to the Edge/Fog node requires an efficient routing protocol.Routing Protocol for Low Power Los...Advanced Metering Infrastructure(AMI)forms an important part in Smart Grids.Routing the data effectively from smart meters to the Edge/Fog node requires an efficient routing protocol.Routing Protocol for Low Power Lossy Area Network(RPL)is a standard routing protocol for IPv6 over Low Power Personal Area Network(6LoWPAN).In a Power Distribution system all the smart meters together form 6LoWPAN network.They communicate with the fog router,which acts as the 6LoWPAN gateway.ContikiRPL was evaluated using Cooja Network simulator for a power distribution network topology.The nodes which were far away from the fog node gave low Packet Delivery Ratio(PDR)and large End to End delay.This paper proposes an aggregation RPL scheme by modifying the existing Contiki RPL.The smart meter nodes communicate to the aggregator,which communicates to the fog node.The results show that the aggregation scheme has 35.6%increase in PDR,lesser hop count and 13.24%decrease in End to End delay on an average compared to existing RPL.展开更多
The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via ...The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters.展开更多
The rapid growth in hardware technologies and the fourth industrial revolution-Industry 4.0 have enabled the Internet of Things(IoT)to be smarter.One of the main drivers in Industry 4.0 is smart and secured Industrial...The rapid growth in hardware technologies and the fourth industrial revolution-Industry 4.0 have enabled the Internet of Things(IoT)to be smarter.One of the main drivers in Industry 4.0 is smart and secured Industrial IoT(IIoT)[1].The IIoT results from the widespread use of computers and the interconnectedness of machines.It has made software a crucial tool for almost every industry,from bakeries and arts to manufacturing facilities and healthcare systems[2].The IIoT devices can be mobile and geographically distributed over a long distance,which exposes them to network disturbances,Quality of Service(QoS)degradation,and security vulnerabilities.In addition,the IIoT is a complex network at a large scale,and there is a dire need for network architecture and protocol design to accommodate these diverse domains and competencies and handle the increasing levels of complexity.Therefore,in this special issue,we aim to focus on the challenges of network architectures and communication protocol design in the context of the smart industry.This special issue has attracted numerous high-quality research articles and has accepted fourteen research papers[3–16].展开更多
Forested areas are extremely vulnerable to disasters leading to environmental destruction.Forest Fire is one among them which requires immediate attention.There are lot of works done by authors where Wireless Sensors ...Forested areas are extremely vulnerable to disasters leading to environmental destruction.Forest Fire is one among them which requires immediate attention.There are lot of works done by authors where Wireless Sensors and IoT have been used for forest fire monitoring.So,towards monitoring the forest fire and managing the energy efficiently in IoT,Energy Efficient Routing Protocol for Low power lossy networks(E-RPL)was developed.There were challenges about the scalability of the network resulting in a large end-to-end delay and less packet delivery which led to the development of Aggregator-based Energy Efficient RPL with Data Compression(CAAERPL).Though CAA-ERPL proved effective in terms of reduced packet delivery,less energy consumption,and increased packet delivery ratio for varying number of nodes,there is still challenge in the selection of aggregator which is based purely on probability percentage of nodes.There has been research work where fuzzy logic been employed for Mobile Ad-hoc Routing,RPL routing and cluster head selection in Wireless Sensor.There has been no work where fuzzy logic is employed for aggregator selection in Energy Efficient RPL.So accordingly,we here have proposed Fuzzy Based Aggregator selection in Energy-efficient RPL for region thereby forming DODAG for communicating to Fog/Edge.We here have developed fuzzy inference rules for selecting the aggregator based on strength which takes residual power,Node degree,and Expected Transmission Count(ETX)as input metrics.The Fuzzy Aggregator Energy Efficient RPL(FA-ERPL)based on fuzzy inference rules were analysed against E-RPL in terms of scalability(First and Half Node die),Energy Consumption,and aggregator node energy deviation.From the analysis,it was found that FA-ERPL performed better than E-RPL.These were simulated using MATLAB and results.展开更多
Over the past few decades, there has been a revolution in ICT, and this has led to the evolution of wireless sensor networks (WSN), in particular, wireless body area networks. Such networks comprise a specialized co...Over the past few decades, there has been a revolution in ICT, and this has led to the evolution of wireless sensor networks (WSN), in particular, wireless body area networks. Such networks comprise a specialized collection of sensor nodes (SNs) that may be deployed randomly in a body area network to collect data from the human body. In a health monitoring system, it may be es-sential to maintain constant environmental conditions within a specific area in the hospital. In this paper, we propose a tempera-ture-monitoring system and describe a case study of a health-monitoring system for patents critically ill with the same disease and in the same environment. We propose Enhanced LEACH Selective Cluster (E-LEACH-SC) routing protocol for monitoring the tem-perature of an area in a hospital. We modified existing Selective Cluster LEACH protocol by using a fixed-distance-based thresh-old to divide the coverage region in two subregions. Direct data transmission and selective cluster-based data transmission ap-proaches were used to provide short-range and long-distance coverage for the collection of data from the body of ill patients. Ex-tensive simulations were run by varying the ratio of node densities of the two subregions in the health-monitoring system. Last Node Alive (LNA), which is a measure of network lifespan, was the parameter for evaluating the performance of the proposed scheme. The simulation results show that the proposed scheme significantly increases network lifespan compared with traditional LEACH and LEACH-SC protocols, which by themselves improve the overall performance of the health-monitoring system.展开更多
基金support from:the European Commission(H2020-MSCA-IF-2015-704963 and FP7-ICT-2013-613024-GRASP)the European Union Erasmus+programme,the UK Engineering and Physical Sciences Research Council(EPSRC)(Grants no.EP/K017160/1,EP/K010050/1,EP/M001024/1,EP/M002438/1)+2 种基金the Royal Society international Exchanges Scheme 2016/R1,the Leverhulme Trust(Grant“Quantum Revolution”)the Portuguese Foundation for Science and Technology(FCT),co-financed by FEDER(PT2020 Partnership Agreement)under contracts IF/01088/2014,BI/UI89/2015,and POCI-01-0145-FEDER-007679(Ref.UID/CTM/50011/2013).
文摘The true integration of electronics into textiles requires the fabrication of devices directly on the fibre itself using high-performance materials that allow seamless incorporation into fabrics.Woven electronics and opto-electronics,attained by intertwined fibres with complementary functions are the emerging and most ambitious technological and scientific frontier.Here we demonstrate graphene-enabled functional devices directly fabricated on textile fibres and attained by weaving graphene electronic fibres in a fabric.Capacitive touch-sensors and light-emitting devices were produced using a roll-to-roll-compatible patterning technique,opening new avenues for woven textile electronics.Finally,the demonstration of fabric-enabled pixels for displays and position sensitive functions is a gateway for novel electronic skin,wearable electronic and smart textile applications.
基金funding from the Euratom research and training programme 2014-2018 under grant agreement No 633053financial suppport from "Fundao para a Ciencia e Tecnologia" through project PestOE/SADG/LA0010/2013
文摘The CASTOR-K code is a hybrid magnetohydrodynamic (MHD)-drift kinetic code developed for the study of MHD modes in the presence of energetic ion populations. It allows a fast assessment of the linear stability of the modes, as well as an accurate calculation of damping due to thermal species (Landau damping). These capabilities make the code an invaluable tool for parametric studies and data analysis. In recent years, CASTOR-K has been mostly used to analyze JET data, including the identification of mechanisms involved in the expulsion of energetic ions from the plasma. However, in order to prepare the code to be used for a wider range of tokamaks including ITER, the code is being subject to a series of important improvements. These improvements aim not only to introduce new physics in the code but also to make it capable of exchanging data with other codes through its integration in modelling infrastructures. In this paper a description of the CASTOR-K code is presented, as well as a summary of the most important results obtained with this code and a description of the new improvements being implemented.
文摘Following the progression in Internet of Things(IoT) and 5G communication networks, the traditional cloud computing model have shifted to fog computing. Fog computing provides mobile computing, network control and storage to the network edges to assist latency critical and computation-intensive applications. Moreover, security features are improved in fog paradigm by processing critical data on edge devices instead of data centres outside the control plane of users. However, fog network deployment imposes many challenges including resource allocation, privacy of users, non-availability of programming model and testing software and support for the heterogenous networks. This article highlights these challenges and their potential solutions in detail. This article also discusses threetier fog network architecture, its standardization and benefits in detail. The proposed resource allocation mechanism for three tier fog networks based on swap matching is described. Results show that by practicing the proposed resource allocation mechanism, maximum throughput with reduced latency is achieved.
基金TM R&D Sdn Bhd fully supports this research work under Project RDTC160902.S.C.Tan and Z.Yusoff received the fund.Sponsors’Website:https://www.tmrnd.com.my.
文摘In the design and planning of next-generation Internet of Things(IoT),telecommunication,and satellite communication systems,controller placement is crucial in software-defined networking(SDN).The programmability of the SDN controller is sophisticated for the centralized control system of the entire network.Nevertheless,it creates a significant loophole for the manifestation of a distributed denial of service(DDoS)attack straightforwardly.Furthermore,recently a Distributed Reflected Denial of Service(DRDoS)attack,an unusual DDoS attack,has been detected.However,minimal deliberation has given to this forthcoming single point of SDN infrastructure failure problem.Moreover,recently the high frequencies of DDoS attacks have increased dramatically.In this paper,a smart algorithm for planning SDN smart backup controllers under DDoS attack scenarios has proposed.Our proposed smart algorithm can recommend single or multiple smart backup controllers in the event of DDoS occurrence.The obtained simulated results demonstrate that the validation of the proposed algorithm and the performance analysis achieved 99.99%accuracy in placing the smart backup controller under DDoS attacks within 0.125 to 46508.7 s in SDN.
基金The APC was funded by PPPI,University Malaysia Sabah,KK,Sabah,Malaysia,https://www.ums.edu.my.
文摘Bat algorithm(BA)is an eminent meta-heuristic algorithm that has been widely used to solve diverse kinds of optimization problems.BA leverages the echolocation feature of bats produced by imitating the bats’searching behavior.BA faces premature convergence due to its local search capability.Instead of using the standard uniform walk,the Torus walk is viewed as a promising alternative to improve the local search capability.In this work,we proposed an improved variation of BA by applying torus walk to improve diversity and convergence.The proposed.Modern Computerized Bat Algorithm(MCBA)approach has been examined for fifteen well-known benchmark test problems.The finding of our technique shows promising performance as compared to the standard PSO and standard BA.The proposed MCBA,BPA,Standard PSO,and Standard BA have been examined for well-known benchmark test problems and training of the artificial neural network(ANN).We have performed experiments using eight benchmark datasets applied from the worldwide famous machine-learning(ML)repository of UCI.Simulation results have shown that the training of an ANN with MCBA-NN algorithm tops the list considering exactness,with more superiority compared to the traditional methodologies.The MCBA-NN algorithm may be used effectively for data classification and statistical problems in the future.
基金National Funding from the FCT- Fundacao Para a Ciencia e a Tecnologia through the UID/ EEA/50008/2019 Project by Brazilian National Council for Scientific and Technological Development via Grant No. 309335/2017-5
文摘Advanced Metering Infrastructure(AMI)forms an important part in Smart Grids.Routing the data effectively from smart meters to the Edge/Fog node requires an efficient routing protocol.Routing Protocol for Low Power Lossy Area Network(RPL)is a standard routing protocol for IPv6 over Low Power Personal Area Network(6LoWPAN).In a Power Distribution system all the smart meters together form 6LoWPAN network.They communicate with the fog router,which acts as the 6LoWPAN gateway.ContikiRPL was evaluated using Cooja Network simulator for a power distribution network topology.The nodes which were far away from the fog node gave low Packet Delivery Ratio(PDR)and large End to End delay.This paper proposes an aggregation RPL scheme by modifying the existing Contiki RPL.The smart meter nodes communicate to the aggregator,which communicates to the fog node.The results show that the aggregation scheme has 35.6%increase in PDR,lesser hop count and 13.24%decrease in End to End delay on an average compared to existing RPL.
基金The authors would like to thank the reviewers and the Associate Editor for their valuable suggestions that helped in improving the quality,readability and presentation of the paper.This work was supported by FCT/MCTES through national funds and when applicable co-funded EU funds under the Project UIDB/50008/2020by the Brazilian National Council for Research and Development(CNPq)via Grants No.431726/2018-3 and 313036/2020-9.
文摘The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters.
文摘The rapid growth in hardware technologies and the fourth industrial revolution-Industry 4.0 have enabled the Internet of Things(IoT)to be smarter.One of the main drivers in Industry 4.0 is smart and secured Industrial IoT(IIoT)[1].The IIoT results from the widespread use of computers and the interconnectedness of machines.It has made software a crucial tool for almost every industry,from bakeries and arts to manufacturing facilities and healthcare systems[2].The IIoT devices can be mobile and geographically distributed over a long distance,which exposes them to network disturbances,Quality of Service(QoS)degradation,and security vulnerabilities.In addition,the IIoT is a complex network at a large scale,and there is a dire need for network architecture and protocol design to accommodate these diverse domains and competencies and handle the increasing levels of complexity.Therefore,in this special issue,we aim to focus on the challenges of network architectures and communication protocol design in the context of the smart industry.This special issue has attracted numerous high-quality research articles and has accepted fourteen research papers[3–16].
基金This work is partially funded by FCT/MCTES through national funds and,when applicable,co-funded EU funds under the Project UIDB/50008/2020Ministry of Science and Higher Education of the Russian Federation,Grant 08-08by the Brazilian National Council for Scientific and Technological Development-CNPq,via Grant No.313036/2020-9.
文摘Forested areas are extremely vulnerable to disasters leading to environmental destruction.Forest Fire is one among them which requires immediate attention.There are lot of works done by authors where Wireless Sensors and IoT have been used for forest fire monitoring.So,towards monitoring the forest fire and managing the energy efficiently in IoT,Energy Efficient Routing Protocol for Low power lossy networks(E-RPL)was developed.There were challenges about the scalability of the network resulting in a large end-to-end delay and less packet delivery which led to the development of Aggregator-based Energy Efficient RPL with Data Compression(CAAERPL).Though CAA-ERPL proved effective in terms of reduced packet delivery,less energy consumption,and increased packet delivery ratio for varying number of nodes,there is still challenge in the selection of aggregator which is based purely on probability percentage of nodes.There has been research work where fuzzy logic been employed for Mobile Ad-hoc Routing,RPL routing and cluster head selection in Wireless Sensor.There has been no work where fuzzy logic is employed for aggregator selection in Energy Efficient RPL.So accordingly,we here have proposed Fuzzy Based Aggregator selection in Energy-efficient RPL for region thereby forming DODAG for communicating to Fog/Edge.We here have developed fuzzy inference rules for selecting the aggregator based on strength which takes residual power,Node degree,and Expected Transmission Count(ETX)as input metrics.The Fuzzy Aggregator Energy Efficient RPL(FA-ERPL)based on fuzzy inference rules were analysed against E-RPL in terms of scalability(First and Half Node die),Energy Consumption,and aggregator node energy deviation.From the analysis,it was found that FA-ERPL performed better than E-RPL.These were simulated using MATLAB and results.
基金partially supported by Instituto de Telecomunicaōes, Next Generation Networks and Applications Group (Net GNA), Covilh Delegation,by Government of Russian Federation, Grant 074-U01National Funding from the FCT-Fundao para a Ciência e Tecnologia through the Pest-OE/EEI/LA0008/2013 Project
文摘Over the past few decades, there has been a revolution in ICT, and this has led to the evolution of wireless sensor networks (WSN), in particular, wireless body area networks. Such networks comprise a specialized collection of sensor nodes (SNs) that may be deployed randomly in a body area network to collect data from the human body. In a health monitoring system, it may be es-sential to maintain constant environmental conditions within a specific area in the hospital. In this paper, we propose a tempera-ture-monitoring system and describe a case study of a health-monitoring system for patents critically ill with the same disease and in the same environment. We propose Enhanced LEACH Selective Cluster (E-LEACH-SC) routing protocol for monitoring the tem-perature of an area in a hospital. We modified existing Selective Cluster LEACH protocol by using a fixed-distance-based thresh-old to divide the coverage region in two subregions. Direct data transmission and selective cluster-based data transmission ap-proaches were used to provide short-range and long-distance coverage for the collection of data from the body of ill patients. Ex-tensive simulations were run by varying the ratio of node densities of the two subregions in the health-monitoring system. Last Node Alive (LNA), which is a measure of network lifespan, was the parameter for evaluating the performance of the proposed scheme. The simulation results show that the proposed scheme significantly increases network lifespan compared with traditional LEACH and LEACH-SC protocols, which by themselves improve the overall performance of the health-monitoring system.