scholarly journals Latency-Optimal Computational Offloading Strategy for Sensitive Tasks in Smart Homes

Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2347
Author(s):  
Yanyan Wang ◽  
Lin Wang ◽  
Ruijuan Zheng ◽  
Xuhui Zhao ◽  
Muhua Liu

In smart homes, the computational offloading technology of edge cloud computing (ECC) can effectively deal with the large amount of computation generated by smart devices. In this paper, we propose a computational offloading strategy for minimizing delay based on the back-pressure algorithm (BMDCO) to get the offloading decision and the number of tasks that can be offloaded. Specifically, we first construct a system with multiple local smart device task queues and multiple edge processor task queues. Then, we formulate an offloading strategy to minimize the queue length of tasks in each time slot by minimizing the Lyapunov drift optimization problem, so as to realize the stability of queues and improve the offloading performance. In addition, we give a theoretical analysis on the stability of the BMDCO algorithm by deducing the upper bound of all queues in this system. The simulation results show the stability of the proposed algorithm, and demonstrate that the BMDCO algorithm is superior to other alternatives. Compared with other algorithms, this algorithm can effectively reduce the computation delay.

Author(s):  
Swathi Kommamuri ◽  
P. Sureshbabu

Power system stability improvement by a coordinate Design ofThyristor Controlled Series Compensator (TCSC) controller is addressed in this paper.Particle Swarm Optimization (PSO) technique is employed for optimization of the parameterconstrained nonlinear optimization problem implemented in a simulation environment. The proposed controllers are tested on a weakly connected power system. The non-linear simulation results are presented. The eigenvalue analysis and simulation results show the effectiveness and robustness of proposed controllers to improve the stability performance of power system by efficient damping of low frequency oscillations under various disturbances.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1488
Author(s):  
JiHyeon Oh ◽  
SungJin Yu ◽  
JoonYoung Lee ◽  
SeungHwan Son ◽  
MyeongHyun Kim ◽  
...  

With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.


Author(s):  
Chun Zhao ◽  
Mo Chen ◽  
Lihui Wang ◽  
Lin Zhang

By the developing and the application of cloud manufacturing, many new business modes based on the IoT, CPS, cloud computing are springing up. It is worthwhile to model a new business mode simulate it to verify the feasibility. In this paper, with a demand of smart devices from a fresh-mix drink company, service agents are used for modeling and a basic comparison model is proposed for the negotiation between service providers to vote for the service provider that best suits the consumer’s demand. A simulation platform that originates from cloud manufacturing is used to simulate the drink ordering, provider negotiation and provider recommendation. Simulation results show that consumers can obtain expected drinks after the negotiations and votes made by providers. Moreover, the system can recommend drinks with different freshness depending on the expiration parameter set by the company.


2021 ◽  
Vol 13 (7) ◽  
pp. 3744
Author(s):  
Mingcheng Zhu ◽  
Shouqian Li ◽  
Xianglong Wei ◽  
Peng Wang

Fishbone-shaped dikes are always built on the soft soil submerged in the water, and the soft foundation settlement plays a key role in the stability of these dikes. In this paper, a novel and simple approach was proposed to predict the soft foundation settlement of fishbone dikes by using the extreme learning machine. The extreme learning machine is a single-hidden-layer feedforward network with high regression and classification prediction accuracy. The data-driven settlement prediction models were built based on a small training sample size with a fast learning speed. The simulation results showed that the proposed methods had good prediction performances by facilitating comparisons of the measured data and the predicted data. Furthermore, the final settlement of the dike was predicted by using the models, and the stability of the soft foundation of the fishbone-shaped dikes was assessed based on the simulation results of the proposed model. The findings in this paper suggested that the extreme learning machine method could be an effective tool for the soft foundation settlement prediction and assessment of the fishbone-shaped dikes.


2011 ◽  
Vol 58-60 ◽  
pp. 1018-1024
Author(s):  
Feng Ye ◽  
Gui Chen Xu ◽  
Di Kang Zhu

This paper reviews several current methods of calculating buffer on the basis of pointing out each merits and pitfalls and then introduces Bayesian statistical approach to CCS / BM domain to calculate the size of the project buffer, to overcome that the current method of the buffer calculation is too subjective and the defect on lacking of practical application. In Crystal Ball, we compare the simulation results of implementation process on the benchmark of C&PM, RESM and SM. The results show that the buffer using this method can ensure the stability of the project’s completion probability, and this method has great flexibility.


2014 ◽  
Vol 2014 ◽  
pp. 1-11 ◽  
Author(s):  
Bin Wang ◽  
Yuangui Zhou ◽  
Jianyi Xue ◽  
Delan Zhu

We focus on the synchronization of a wide class of four-dimensional (4-D) chaotic systems. Firstly, based on the stability theory in fractional-order calculus and sliding mode control, a new method is derived to make the synchronization of a wide class of fractional-order chaotic systems. Furthermore, the method guarantees the synchronization between an integer-order system and a fraction-order system and the synchronization between two fractional-order chaotic systems with different orders. Finally, three examples are presented to illustrate the effectiveness of the proposed scheme and simulation results are given to demonstrate the effectiveness of the proposed method.


2013 ◽  
Vol 756-759 ◽  
pp. 3466-3470
Author(s):  
Xu Min Song ◽  
Qi Lin

The trajcetory plan problem of spece reandezvous mission was studied in this paper using nolinear optimization method. The optimization model was built based on the Hills equations. And by analysis property of the design variables, a transform was put forward , which eliminated the equation and nonlinear constraints as well as decreaseing the problem dimensions. The optimization problem was solved using Adaptive Simulated Annealing (ASA) method, and the rendezvous trajectory was designed.The method was validated by simulation results.


Author(s):  
Vahid Bahrami ◽  
Ahmad Kalhor ◽  
Mehdi Tale Masouleh

This study intends to investigate a dynamic modeling and design of controller for a planar serial chain, performing 2-DoF, in interaction with a cable-driven robot. The under study system can be used as a rehabilitation setup which is helpful for those with arm disability. The latter goal can be achieved by applying the positive tensions of the cable-driven robot which are designed based on feedback linearization approach. To this end, the system dynamics formulation is developed using Lagrange approach and then the so-called Wrench-Closure Workspace (WCW) analysis is performed. Moreover, in the feedback linearization approach, the PD and PID controllers are used as auxiliary controllers input and the stability of the system is guaranteed as a whole. From the simulation results it follows that, in the presence of bounded disturbance based on Roots Mean Square Error (RMSE) criteria, the PID controller has better performance and tracking error of the 2-DoF robot joints are improved 15.29% and 24.32%, respectively.


2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Yi Cui ◽  
Xintong Fang ◽  
Gaoqi Liu ◽  
Bin Li

<p style='text-indent:20px;'>Unmanned Aerial Vehicles (UAVs) have been extensively studied to complete the missions in recent years. The UAV trajectory planning is an important area. Different from the commonly used methods based on path search, which are difficult to consider the UAV state and dynamics constraints, so that the planned trajectory cannot be tracked completely. The UAV trajectory planning problem is considered as an optimization problem for research, considering the dynamics constraints of the UAV and the terrain obstacle constraints during flight. An hp-adaptive Radau pseudospectral method based UAV trajectory planning scheme is proposed by taking the UAV dynamics into account. Numerical experiments are carried out to show the effectiveness and superior of the proposed method. Simulation results show that the proposed method outperform the well-known RRT* and A* algorithm in terms of tracking error.</p>


Sign in / Sign up

Export Citation Format

Share Document