4.7 Article

The role of big data analytics in industrial Internet of Things

出版社

ELSEVIER
DOI: 10.1016/j.future.2019.04.020

关键词

Internet of Things; Cyber-physical systems; Cloud computing; Analytics; Big data

资金

  1. Deanship of Scientific Research at King Saud University, Saudi Arabia [1435-051]

向作者/读者索取更多资源

Big data production in industrial Internet of Things (IIoT) is evident due to the massive deployment of sensors and Internet of Things (IoT) devices. However, big data processing is challenging due to limited computational, networking and storage resources at IoT device-end. Big data analytics (BDA) is expected to provide operational- and customer-level intelligence in IIoT systems. Although numerous studies on IIoT and BDA exist, only a few studies have explored the convergence of the two paradigms. In this study, we investigate the recent BDA technologies, algorithms and techniques that can lead to the development of intelligent IIoT systems. We devise a taxonomy by classifying and categorising the literature on the basis of important parameters (e.g. data sources, analytics tools, analytics techniques, requirements, industrial analytics applications and analytics types). We present the frameworks and case studies of the various enterprises that have benefited from BDA. We also enumerate the considerable opportunities introduced by BDA in IIoT. We identify and discuss the indispensable challenges that remain to be addressed, serving as future research directions. (C) 2019 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Artificial Intelligence

A smart healthcare framework for detection and monitoring of COVID-19 using IoT and cloud computing

Nidal Nasser, Qazi Emad-ul-Haq, Muhammad Imran, Asmaa Ali, Imran Razzak, Abdulaziz Al-Helali

Summary: This study proposes an intelligent healthcare system based on IoT-cloud technologies for real-time patient tracking and reliable COVID-19 detection. By utilizing deep learning algorithms and state-of-the-art classification techniques, the system achieves high accuracy and effectiveness in processing CT scan images.

NEURAL COMPUTING & APPLICATIONS (2023)

Review Computer Science, Information Systems

Blockchain for deep learning: review and open challenges

Muhammad Shafay, Raja Wasim Ahmad, Khaled Salah, Ibrar Yaqoob, Raja Jayaraman, Mohammed Omar

Summary: This paper explores the importance of integrating blockchain technology with deep learning and reviews existing literature on this topic. By devising a thematic taxonomy and discussing and comparing existing frameworks, this paper provides insights into the important research challenges in developing deep learning frameworks.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Computer Science, Artificial Intelligence

Automated methods for diagnosis of Parkinson's disease and predicting severity level

Zainab Ayaz, Saeeda Naz, Naila Habib Khan, Imran Razzak, Muhammad Imran

Summary: The recent advancements in information technology and bioinformatics have significantly contributed to medical sciences. Artificial intelligence has been widely utilized in the diagnosis of Parkinson's disease, with promising results achieved using different datasets and techniques.

NEURAL COMPUTING & APPLICATIONS (2023)

Article Automation & Control Systems

Data Evolution Governance for Ontology-Based Digital Twin Product Lifecycle Management

Zijie Ren, Jianhua Shi, Muhammad Imran

Summary: Product lifecycle management is an effective method for enhancing the market competitiveness of modern manufacturing industries. The digital twin, with its integration of physics and information systems, provides a technical means to integrate multisource information and overcome communication barriers in the lifecycle. However, there is a lack of focus on twin data and its evolution mechanisms, limiting the full potential of digital twin technology in global data resource management.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Information Systems

Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs

Muhammad Nouman, Umar Qasim, Hina Nasir, Abdullah Almasoud, Muhammad Imran, Nadeem Javaid

Summary: In this study, blockchain is used to register nodes and address security issues at Base Stations and Cluster Heads. A Machine Learning classifier called HGB is used to classify nodes as malicious or legitimate. Malicious nodes are revoked from the network, while legitimate nodes have their data stored in IPFS with their hashes stored in blockchain. Performance evaluation shows that HGB outperforms other classifiers and VBFT performs better than PoW. Furthermore, the proposed model efficiently detects malicious nodes and ensures secure data storage.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Blockchain and COVID-19 pandemic: applications and challenges

Raja Wasim Ahmad, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Samer Ellahham, Mohammed Omar

Summary: The emergence of COVID-19 in 2020 has had a global impact on the economy, health, and human lives. Existing healthcare systems have shown limitations in handling public health emergencies efficiently. Blockchain technology can assist in combating the pandemic by ensuring safe medical supplies, accurate identification of virus hotspots, and establishing data provenance for verifying the authenticity of personal protective equipment.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Article Automation & Control Systems

A Data Reporting Protocol With Revocable Anonymous Authentication for Edge-Assisted Intelligent Transport Systems

Yanping Wang, Xiaofen Wang, Hong-Ning Dai, Xiaosong Zhang, Muhammad Imran

Summary: Intelligent Transport Systems (ITS) have attracted attention due to advances in the Industrial Internet of Vehicles (IIoV). However, existing data reporting protocols for ITS have limitations in terms of storage, computation costs, and revocation of malicious users. This paper proposes a novel data reporting protocol for edge-assisted ITS that addresses these issues, achieving better performance and security.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Computer Science, Theory & Methods

Using NFTs for ownership management of digital twins and for proof of delivery of their physical assets

Haya R. Hasan, Mohammad Madine, Ibrar Yaqoob, Khaled Salah, Raja Jayaraman, Dragan Boscovic

Summary: A digital twin is a precise digital replica of a physical object or asset that helps manage, control, or monitor the real object. The current centralized systems for managing digital twins are not easily accessible. This paper proposes using non-fungible tokens (NFTs) to manage ownership of digital twins and provide proof of delivery of their physical assets in a decentralized, secure, traceable, and transparent manner. The solution involves representing digital twins and their sub-twins hierarchically using NFTs and sub-NFTs, and includes system architecture, algorithm implementation, smart contracts, testing, validation, security analysis, and generalization.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2023)

Article Chemistry, Multidisciplinary

Impact of Traditional and Embedded Image Denoising on CNN-Based Deep Learning

Roopdeep Kaur, Gour Karmakar, Muhammad Imran

Summary: This paper investigates the importance of denoising in digital image processing and compares the performance of traditional and embedded denoising methods. The experimental results show that traditional denoising methods have better accuracy, while embedded denoising methods have lower computational time.

APPLIED SCIENCES-BASEL (2023)

Article Computer Science, Information Systems

Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis

Sajid Ali, Omar Abusabha, Farman Ali, Muhammad Imran, Tamer Abuhmed

Summary: Despite the increasing threat of IoT-specific malware, assessing IoT systems' security and developing mitigation measures are critical. This study proposes a multitask DL model using LSTM for detecting IoT malware, achieving high accuracy in tasks of determining benign/malicious traffic and identifying malware types. Traffic data from 18 IoT devices were used for training and feature selection enhanced the model's performance.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2023)

Article Mathematics

An Optimized Hybrid Deep Intrusion Detection Model (HD-IDM) for Enhancing Network Security

Iftikhar Ahmad, Muhammad Imran, Abdul Qayyum, Muhammad Sher Ramzan, Madini O. Alassafi

Summary: This research proposes a new hybrid deep learning intrusion detection model called HD-IDM, which combines GRU and LSTM classifiers for analyzing network traffic. HD-IDM achieves remarkable performance on multiple datasets, with outstanding accuracy and precision for classification tasks. However, it has limitations such as the need for labeled data and potential challenges in handling new intrusion methods.

MATHEMATICS (2023)

Review Computer Science, Information Systems

Metaverse applications in smart cities: Enabling technologies, opportunities, challenges, and future directions

Ibrar Yaqoob, Khaled Salah, Raja Jayaraman, Mohammed Omar

Summary: In recent years, there has been a global trend towards the metaverse, which consists of immersive and interconnected digital spaces where users can interact through computer-generated environments. This paper discusses how leveraging the metaverse can revolutionize and reshape smart cities by stimulating innovations and bringing about significant improvements. It explores the key enabling technologies, benefits, and opportunities of implementing the metaverse in smart city applications, along with ongoing projects and case studies. The paper also highlights critical research challenges and outlines future directions for the development and integration of the metaverse with smart cities.

INTERNET OF THINGS (2023)

Article Computer Science, Information Systems

Using Blockchain for Enabling Transparent, Traceable, and Trusted University Ranking Systems

Ammar Battah, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Ashraf Khalil

Summary: Ranking systems are important for improving education quality and academic institution reputation. However, current systems lack transparency, traceability, and fairness, as they are managed centrally and rely on subjective indicators. This paper proposes a blockchain-based solution that provides transparent, traceable, and decentralized academic ranking systems. Smart contracts are developed to govern interactions and decentralized storage, oracles, and threshold encryption ensure secure data retrieval and sharing. The solution is evaluated based on cost, throughput, latency, and security, and all smart contract codes are publicly available on GitHub.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Dynamic behavior assessment protocol for secure Decentralized Federated Learning

Sajjad Khan, Jorao Gomes, Muhammad Habib ur ur Rehman, Davor Svetinovic

Summary: This paper presents a decentralized federated learning architecture that detects and eliminates participants with adaptive behavior by evaluating the quality of gradients. Experimental results show that the proposed protocol can effectively detect and eliminate participants with adaptive behavior, while centralized federated learning fails to do so.

INTERNET OF THINGS (2023)

Article Information Science & Library Science

Facilitating transmuters' acquisition of data scientist knowledge based on their educational backgrounds: state-of-the-practice and challenges

Muhammad Javed Ramzan, Saif Ur Rehman Khan, Inayat Ur-Rehman, Muhammad Habib Ur Rehman, Ehab Nabiel Al-khannaq

Summary: This study aims to guide transmuters in becoming data scientists by exploring the challenges faced by data scientists according to their educational backgrounds. The findings reveal significant variability in skill requirements and tool usage based on educational background, but regardless of academic background, data scientists spend more time analyzing data than operationalizing insight. The study provides suggestions for universities and online academies to recommend required knowledge for prospective students based on their educational background.

LIBRARY HI TECH (2023)

Editorial Material Computer Science, Theory & Methods

Artificial intelligence in biomedical big data and digital healthcare

Kiho Lim, Christian Esposito, Tian Wang, Chang Choi

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Cluster and cloud computing for life sciences

Jesus Carretero, Dagmar Krefting

Summary: Computational methods play a crucial role in bioinformatics and biomedicine, especially in managing large-scale data and simulating complex models. This special issue focuses on security and performance aspects in infrastructure, optimization for popular applications, and the integration of machine learning and data processing platforms to improve the efficiency and accuracy of bioinformatics.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Adaptive asynchronous federated learning

Renhao Lu, Weizhe Zhang, Qiong Li, Hui He, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Zenglin Xu, Mamoun Alazab

Summary: Federated Learning allows collaborative training of AI models with local data, and our proposed FedAAM scheme improves convergence speed and training efficiency through an adaptive weight allocation strategy and asynchronous global update rules.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

METSM: Multiobjective energy-efficient task scheduling model for an edge heterogeneous multiprocessor system

Qiangqiang Jiang, Xu Xin, Libo Yao, Bo Chen

Summary: This paper proposes a multi-objective energy-efficient task scheduling technique (METSM) for edge heterogeneous multiprocessor systems. A mathematical model is established for the task scheduling problem, and a problem-specific algorithm (IMO) is designed for optimizing task scheduling and resource allocation. Experimental results show that the proposed algorithm can achieve optimal Pareto fronts and significantly save time and power consumption.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Editorial Material Computer Science, Theory & Methods

Preface of special issue on heterogeneous information network embedding and applications

Weimin Li, Lu Liu, Kevin I. K. Wang, Qun Jin

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Group key management in the Internet of Things: Handling asynchronicity

Mohammed Riyadh Abdmeziem, Amina Ahmed Nacer, Nawfel Moundji Deroues

Summary: Internet of Things (IoT) devices have become ubiquitous and brought the need for group communications. However, security in group communications is challenging due to the asynchronous nature of IoT devices. This paper introduces an innovative approach using blockchain technology and smart contracts to ensure secure and scalable group communications.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Multi-task peer-to-peer learning using an encoder-only transformer model

Robert Sajina, Nikola Tankovic, Ivo Ipsic

Summary: This paper presents and evaluates a novel approach that utilizes an encoder-only transformer model to enable collaboration between agents learning two distinct NLP tasks. The evaluation results demonstrate that collaboration among agents, even when working towards separate objectives, can result in mutual benefits.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

On the impact of event-driven architecture on performance: An exploratory study

Hebert Cabane, Kleinner Farias

Summary: Event-driven architecture has been widely adopted in the software industry for its benefits in software modularity and performance. However, there is a lack of empirical evidence to support its impact on performance. This study compares the performance of an event-driven application with a monolithic application and finds that the monolithic architecture consumes fewer computational resources and has better response times.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Federated Deep Learning for Wireless Capsule Endoscopy Analysis: Enabling Collaboration Across Multiple Data Centers for Robust Learning of Diverse Pathologies

Haroon Wahab, Irfan Mehmood, Hassan Ugail, Javier Del Ser, Khan Muhammad

Summary: Wireless capsule endoscopy (WCE) is a revolutionary diagnostic method for small bowel pathology. However, the manual analysis of WCE videos is cumbersome and the privacy concerns of WCE data hinder the adoption of AI-based diagnoses. This study proposes a federated learning framework for collaborative learning from multiple data centers, demonstrating improved anomaly classification performance while preserving data privacy.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

A sustainable Bitcoin blockchain network through introducing dynamic block size adjustment using predictive analytics

Maruf Monem, Md Tamjid Hossain, Md. Golam Rabiul Alam, Md. Shirajum Munir, Md. Mahbubur Rahman, Salman A. AlQahtani, Samah Almutlaq, Mohammad Mehedi Hassan

Summary: Bitcoin, the largest cryptocurrency, faces challenges in broader adaption due to long verification times and high transaction fees. To tackle these issues, researchers propose a learning framework that uses machine learning to predict the ideal block size in each block generation cycle. This model significantly improves the block size, transaction fees, and transaction approval rate of Bitcoin, addressing the long wait time and broader adaption problem.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Leveraging a visual language for the awareness-based design of interaction requirements in digital twins

Rafael Duque, Crescencio Bravo, Santos Bringas, Daniel Postigo

Summary: This paper introduces the importance of user interfaces for digital twins and presents a technique called ADD for modeling requirements of Human-DT interaction. A study is conducted to assess the feasibility and utility of ADD in designing user interfaces, using the virtualization of a natural space as a case study.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Performance analysis of parallel composite service-based applications in clouds

Xiulin Li, Li Pan, Wei Song, Shijun Liu, Xiangxu Meng

Summary: This article proposes a novel multiclass multi-pool analytical model for optimizing the quality of composite service applications deployed in the cloud. By considering embarrassingly parallel services and using differentiated parallel processing mechanisms, the model provides accurate prediction results and significantly reduces job response time.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

Unraveling the MEV enigma: ABI-free detection model using Graph Neural Networks

Seongwan Park, Woojin Jeong, Yunyoung Lee, Bumho Son, Huisu Jang, Jaewook Lee

Summary: In this paper, a novel MEV detection model called ArbiNet is proposed, which offers a low-cost and accurate solution for MEV detection without requiring knowledge of smart contract code or ABIs.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

ExDe: Design space exploration of scheduler architectures and mechanisms for serverless data-processing

Sacheendra Talluri, Nikolas Herbst, Cristina Abad, Tiziano De Matteis, Alexandru Iosup

Summary: Serverless computing is increasingly used in data-processing applications. This paper presents ExDe, a framework for systematically exploring the design space of scheduling architectures and mechanisms, to help system designers tackle complexity.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)

Article Computer Science, Theory & Methods

FedBnR: Mitigating federated learning Non-IID problem by breaking the skewed task and reconstructing representation

Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu

Summary: This paper introduces a Federated Learning framework called FedBnR to address the issue of potential data heterogeneity in distributed entities. By breaking up the original task into multiple subtasks and reconstructing the representation using feature extractors, the framework improves the learning performance on heterogeneous datasets.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2024)