[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (674)

Search Parameters:
Keywords = iOS Mobile Applications

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
8 pages, 2328 KiB  
Proceeding Paper
Object Detection for Autonomous Logistics: A YOLOv4 Tiny Approach with ROS Integration and LOCO Dataset Evaluation
by Souhaila Khalfallah, Mohamed Bouallegue and Kais Bouallegue
Eng. Proc. 2024, 67(1), 65; https://doi.org/10.3390/engproc2024067065 - 12 Oct 2024
Viewed by 167
Abstract
This paper presents an object detection model for logistics-centered objects deployed and used by autonomous warehouse robots. Using the Robot Operating System (ROS) infrastructure, our work leverages the set of provided models and a dataset to create a complex system that can meet [...] Read more.
This paper presents an object detection model for logistics-centered objects deployed and used by autonomous warehouse robots. Using the Robot Operating System (ROS) infrastructure, our work leverages the set of provided models and a dataset to create a complex system that can meet the guidelines of the Autonomous Mobile Robots (AMRs). We describe an innovative method, and the primary emphasis is placed on the Logistics Objects in Context (LOCO) dataset. The importance is on training the model and determining optimal performance and accuracy for the implemented object detection task. Using neural networks as pattern recognition tools, we took advantage of the one-stage detection architecture YOLO that prioritizes speed and accuracy. Focusing on a lightweight variant of this architecture, YOLOv4 Tiny, we were able to optimize for deployment on resource-constrained edge devices without compromising detection accuracy, resulting in a significant performance boost over previous benchmarks. The YOLOv4 Tiny model was implemented with Darknet, especially for its adaptability to ROS Melodic framework and capability to fit edge devices. Notably, our network achieved a mean average precision (mAP) of 46% and an intersection over union (IoU) of 50%, surpassing the baseline metrics established by the initial LOCO study. These results demonstrate a significant improvement in performance and accuracy for real-world logistics applications of AMRs. Our contribution lies in providing valuable insights into the capabilities of AMRs within the logistics environment, thus paving the way for further advancements in this field. Full article
(This article belongs to the Proceedings of The 3rd International Electronic Conference on Processes)
Show Figures

Figure 1

Figure 1
<p>The different classes of the Logistics Objects in Context (LOCO) dataset: forklift (<b>a</b>), pallet (<b>b</b>), small load carrier (<b>c</b>), stilages (<b>d</b>) and transpallet (<b>e</b>).</p>
Full article ">Figure 2
<p>LOCO data distribution chart.</p>
Full article ">Figure 3
<p>Architecture (<b>a</b>), training the loco dataset on the yolov4-tiny (<b>b</b>), and YOLOv4 Tiny structure with ROS/Darknet integration (<b>c</b>), detected object with corresponding bounding boxes.</p>
Full article ">Figure 4
<p>Our approach object detection metrics: different class accuracy.</p>
Full article ">Figure 5
<p>Our approach object detection metrics: evaluation graphs (<b>a</b>), precision (<b>b</b>), recall (<b>c</b>), the mAP, and loss over iterations.</p>
Full article ">
23 pages, 2454 KiB  
Article
CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management
by Konstantinos Markantonakis, Ghada Arfaoui, Sarah Abu Ghazalah, Carlton Shepherd, Raja Naeem Akram and Damien Sauveron
Smart Cities 2024, 7(5), 2887-2909; https://doi.org/10.3390/smartcities7050112 - 8 Oct 2024
Viewed by 599
Abstract
The Consumer-Oriented Trusted Service Manager (CO-TSM) model has been recognised as a significant advancement in managing applications on Near Field Communication (NFC)-enabled mobile devices and multi-application smart cards. Traditional Trusted Service Manager (TSM) models, while useful, often result in market fragmentation and limit [...] Read more.
The Consumer-Oriented Trusted Service Manager (CO-TSM) model has been recognised as a significant advancement in managing applications on Near Field Communication (NFC)-enabled mobile devices and multi-application smart cards. Traditional Trusted Service Manager (TSM) models, while useful, often result in market fragmentation and limit widespread adoption due to their centralised control mechanisms. The CO-TSM model addresses these issues by decentralising management and offering greater flexibility and scalability, making it more adaptable to the evolving needs of embedded systems, particularly in the context of the Internet of Things (IoT) and Radio Frequency Identification (RFID) technologies. This paper provides a comprehensive analysis of the CO-TSM model, highlighting its application in various technological domains such as smart cards, HCE-based NFC mobile phones, TEE-enabled smart home IoT devices, and RFID-based smart supply chains. By evaluating the CO-TSM model’s architecture, implementation challenges, and practical deployment scenarios, this paper demonstrates how CO-TSM can overcome the limitations of traditional TSM approaches. The case studies presented offer practical insights into the model’s adaptability and effectiveness in real-world scenarios. Through this examination, the paper aims to underscore the CO-TSM model’s role in enhancing scalability, flexibility, and user autonomy in secure embedded device management, while also identifying areas for future research and development. Full article
Show Figures

Figure 1

Figure 1
<p>Generic TSM deployment architecture.</p>
Full article ">Figure 2
<p>The TSM Deployment Models proposed by GlobalPlatform.</p>
Full article ">Figure 3
<p>GSMA’s TSM Proposal: Mode 1.</p>
Full article ">Figure 4
<p>GSMA’s TSM Proposal: Mode 2.</p>
Full article ">Figure 5
<p>GSMA’s TSM Proposal: Mode 3.</p>
Full article ">Figure 6
<p>Overview of the Consumer-Oriented Trusted Service Manager (CO-TSM) model.</p>
Full article ">Figure 7
<p>NFC-enabled Device Using SE- and HCE-based Card Emulation(Source: Smart Card Alliance [<a href="#B13-smartcities-07-00112" class="html-bibr">13</a>]).</p>
Full article ">Figure 8
<p>GlobalPlatform TEE hardware architecture (Source: GlobalPlatform Specification [<a href="#B15-smartcities-07-00112" class="html-bibr">15</a>]. Trusted components shown in blue; untrusted units are uncoloured.</p>
Full article ">Figure 9
<p>GlobalPlatform TEE software architecture (Source: GlobalPlatform Specifiation [<a href="#B16-smartcities-07-00112" class="html-bibr">16</a>].</p>
Full article ">Figure 10
<p>Ecosystem of a HCE-TEE enabled Device.</p>
Full article ">Figure 11
<p>Generic smart home architecture.</p>
Full article ">Figure 12
<p>Illustrative example of a smart supply chain with integrated RFID technology (Source: Gupta et al. [<a href="#B32-smartcities-07-00112" class="html-bibr">32</a>].</p>
Full article ">Figure 13
<p>Sequence diagram illustrating the ownership transfer process in a CO-TSM-based smart supply chain.</p>
Full article ">
14 pages, 1311 KiB  
Article
Decision Transformer-Based Efficient Data Offloading in LEO-IoT
by Pengcheng Xia, Mengfei Zang, Jie Zhao, Ting Ma, Jie Zhang, Changxu Ni, Jun Li and Yiyang Ni
Entropy 2024, 26(10), 846; https://doi.org/10.3390/e26100846 - 7 Oct 2024
Viewed by 367
Abstract
Recently, the Internet of Things (IoT) has witnessed rapid development. However, the scarcity of computing resources on the ground has constrained the application scenarios of IoT. Low Earth Orbit (LEO) satellites have drawn people’s attention due to their broader coverage and shorter transmission [...] Read more.
Recently, the Internet of Things (IoT) has witnessed rapid development. However, the scarcity of computing resources on the ground has constrained the application scenarios of IoT. Low Earth Orbit (LEO) satellites have drawn people’s attention due to their broader coverage and shorter transmission delay. They are capable of offloading more IoT computing tasks to mobile edge computing (MEC) servers with lower latency in order to address the issue of scarce computing resources on the ground. Nevertheless, it is highly challenging to share bandwidth and power resources among multiple IoT devices and LEO satellites. In this paper, we explore the efficient data offloading mechanism in the LEO satellite-based IoT (LEO-IoT), where LEO satellites forward data from the terrestrial to the MEC servers. Specifically, by optimally selecting the forwarding LEO satellite for each IoT task and allocating communication resources, we aim to minimize the data offloading latency and energy consumption. Particularly, we employ the state-of-the-art Decision Transformer (DT) to solve this optimization problem. We initially obtain a pre-trained DT through training on a specific task. Subsequently, the pre-trained DT is fine-tuned by acquiring a small quantity of data under the new task, enabling it to converge rapidly, with less training time and superior performance. Numerical simulation results demonstrate that in contrast to the classical reinforcement learning approach (Proximal Policy Optimization), the convergence speed of DT can be increased by up to three times, and the performance can be improved by up to 30%. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

Figure 1
<p>The data offloading of the LEO-IoT network.</p>
Full article ">Figure 2
<p>Decision Transformer model.</p>
Full article ">Figure 3
<p>Cumulative reward comparison of DT-FT and PPO in different scenarios.</p>
Full article ">Figure 4
<p>Latency comparison of DT-FT and PPO in different scenarios.</p>
Full article ">Figure 5
<p>Energy consumption comparisons of DT-FT and PPO in different scenarios.</p>
Full article ">Figure 6
<p>Latency and energy comparison of DT-FT and PPO in different <math display="inline"><semantics> <msub> <mi>P</mi> <mi>U</mi> </msub> </semantics></math>.</p>
Full article ">Figure 7
<p>Latency and energy comparison of DT-FT and PPO in different <math display="inline"><semantics> <msub> <mi>B</mi> <mrow> <mi>t</mi> <mi>o</mi> <mi>t</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">
26 pages, 2842 KiB  
Article
Industrial IoT-Based Energy Monitoring System: Using Data Processing at Edge
by Akseer Ali Mirani, Anshul Awasthi, Niall O’Mahony and Joseph Walsh
IoT 2024, 5(4), 608-633; https://doi.org/10.3390/iot5040027 - 28 Sep 2024
Viewed by 941
Abstract
Edge-assisted IoT technologies combined with conventional industrial processes help evolve diverse applications under the Industrial IoT (IIoT) and Industry 4.0 era by bringing cloud computing technologies near the hardware. The resulting innovations offer intelligent management of the industrial ecosystems, focusing on increasing productivity [...] Read more.
Edge-assisted IoT technologies combined with conventional industrial processes help evolve diverse applications under the Industrial IoT (IIoT) and Industry 4.0 era by bringing cloud computing technologies near the hardware. The resulting innovations offer intelligent management of the industrial ecosystems, focusing on increasing productivity and reducing running costs by processing massive data locally. In this research, we design, develop, and implement an IIoT and edge-based system to monitor the energy consumption of a factory floor’s stationary and mobile assets using wireless and wired energy meters. Once the edge receives the meter’s data, it stores the information in the database server, followed by the data processing method to find nine additional analytical parameters. The edge also provides a master user interface (UI) for comparative analysis and individual UI for in-depth energy usage insights, followed by activity and inactivity alarms and daily reporting features via email. Moreover, the edge uses a data-filtering technique to send a single wireless meter’s data to the cloud for remote energy and alarm monitoring per project scope. Based on the evaluation, the edge server efficiently processes the data with an average CPU utilization of up to 5.58% while avoiding measurement errors due to random power failures throughout the day. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed architecture for Industrial IoT-based energy monitoring system.</p>
Full article ">Figure 2
<p>Schematic diagram of electrical connections for a single channel of wired energy meter.</p>
Full article ">Figure 3
<p>Schematic diagram and junction box for wireless energy meter.</p>
Full article ">Figure 4
<p>Overview of software implementation at edge.</p>
Full article ">Figure 5
<p>Overview of wired energy meter integration with an edge instance.</p>
Full article ">Figure 6
<p>Overview of wireless energy meter integration with an edge instance.</p>
Full article ">Figure 7
<p>Overview of data filtering at the edge for cloud data.</p>
Full article ">Figure 8
<p>Approach to monitoring activity and inactivity events of devices at the edge.</p>
Full article ">Figure 9
<p>Hierarchy of user interface for energy monitoring at the edge.</p>
Full article ">Figure 10
<p>Overview of cloud features for energy monitoring.</p>
Full article ">Figure 11
<p>Overview of parameters calculation at edge.</p>
Full article ">Figure 12
<p>Master user interface for energy monitoring at the edge.</p>
Full article ">Figure 13
<p>User interface for a wireless energy meter sub-dashboard at the edge and in the cloud.</p>
Full article ">
19 pages, 535 KiB  
Article
Optimizing Convolutional Neural Network Architectures
by Luis Balderas, Miguel Lastra and José M. Benítez
Mathematics 2024, 12(19), 3032; https://doi.org/10.3390/math12193032 - 28 Sep 2024
Viewed by 837
Abstract
Convolutional neural networks (CNNs) are commonly employed for demanding applications, such as speech recognition, natural language processing, and computer vision. As CNN architectures become more complex, their computational demands grow, leading to substantial energy consumption and complicating their use on devices with limited [...] Read more.
Convolutional neural networks (CNNs) are commonly employed for demanding applications, such as speech recognition, natural language processing, and computer vision. As CNN architectures become more complex, their computational demands grow, leading to substantial energy consumption and complicating their use on devices with limited resources (e.g., edge devices). Furthermore, a new line of research seeking more sustainable approaches to Artificial Intelligence development and research is increasingly drawing attention: Green AI. Motivated by an interest in optimizing Machine Learning models, in this paper, we propose Optimizing Convolutional Neural Network Architectures (OCNNA). It is a novel CNN optimization and construction method based on pruning designed to establish the importance of convolutional layers. The proposal was evaluated through a thorough empirical study including the best known datasets (CIFAR-10, CIFAR-100, and Imagenet) and CNN architectures (VGG-16, ResNet-50, DenseNet-40, and MobileNet), setting accuracy drop and the remaining parameters ratio as objective metrics to compare the performance of OCNNA with the other state-of-the-art approaches. Our method was compared with more than 20 convolutional neural network simplification algorithms, obtaining outstanding results. As a result, OCNNA is a competitive CNN construction method which could ease the deployment of neural networks on the IoT or resource-limited devices. Full article
Show Figures

Figure 1

Figure 1
<p>OCNNA applied to VGG-16. Given the output from the <span class="html-italic">i</span>-th convolutional layer, PCA, Frobenius norm, and Coefficient of Variation are applied to identify the most significant filters. The <span class="html-italic">k</span>-th percentile of filters, in terms of importance, are selected, generating a new model whose <span class="html-italic">i</span>-th convolutional layer is a optimized version of the original one. This approach is applied to every convolutional filter.</p>
Full article ">Figure 2
<p>OCNNA provides a single number for this filter which reflects its importance. This process is iterated over all filters from a layer and their <span class="html-italic">k</span>-th percentile in terms of significance will form part of the new model.</p>
Full article ">Figure 3
<p>Sensitivity study of <span class="html-italic">k</span> percentile of significance for ResNet-50 and Imagenet dataset. The left <span class="html-italic">Y</span>-axis shows test accuracy, and the right <span class="html-italic">Y</span>-axis shows the remaining parameters ratio. The base accuracy is <math display="inline"><semantics> <mrow> <mn>75.4</mn> <mo>%</mo> </mrow> </semantics></math>. As we can see, when <math display="inline"><semantics> <mrow> <mi>k</mi> <mo>=</mo> <mn>40</mn> </mrow> </semantics></math> (40-th percentile), we obtain a significant reduction in parameters (remaining <math display="inline"><semantics> <mrow> <mn>37.44</mn> <mo>%</mo> </mrow> </semantics></math>) with an accuracy drop of <math display="inline"><semantics> <mrow> <mn>0.57</mn> <mo>%</mo> </mrow> </semantics></math>.</p>
Full article ">
33 pages, 17633 KiB  
Article
Comparison of Deep Learning Models for Multi-Crop Leaf Disease Detection with Enhanced Vegetative Feature Isolation and Definition of a New Hybrid Architecture
by Sajjad Saleem, Muhammad Irfan Sharif, Muhammad Imran Sharif, Muhammad Zaheer Sajid and Francesco Marinello
Agronomy 2024, 14(10), 2230; https://doi.org/10.3390/agronomy14102230 - 27 Sep 2024
Viewed by 936
Abstract
Agricultural productivity is one of the critical factors towards ensuring food security across the globe. However, some of the main crops, such as potato, tomato, and mango, are usually infested by leaf diseases, which considerably lower yield and quality. The traditional practice of [...] Read more.
Agricultural productivity is one of the critical factors towards ensuring food security across the globe. However, some of the main crops, such as potato, tomato, and mango, are usually infested by leaf diseases, which considerably lower yield and quality. The traditional practice of diagnosing disease through visual inspection is labor-intensive, time-consuming, and can lead to numerous errors. To address these challenges, this study evokes the AgirLeafNet model, a deep learning-based solution with a hybrid of NASNetMobile for feature extraction and Few-Shot Learning (FSL) for classification. The Excess Green Index (ExG) is a novel approach that is a specified vegetation index that can further the ability of the model to distinguish and detect vegetative properties even in scenarios with minimal labeled data, demonstrating the tremendous potential for this application. AgirLeafNet demonstrates outstanding accuracy, with 100% accuracy for potato detection, 92% for tomato, and 99.8% for mango leaves, producing incredibly accurate results compared to the models already in use, as described in the literature. By demonstrating the viability of a deep learning/IoT system architecture, this study goes beyond the current state of multi-crop disease detection. It provides practical, effective, and efficient deep-learning solutions for sustainable agricultural production systems. The innovation of the model emphasizes its multi-crop capability, precision in results, and the suggested use of ExG to generate additional robust disease detection methods for new findings. The AgirLeafNet model is setting an entirely new standard for future research endeavors. Full article
(This article belongs to the Section Precision and Digital Agriculture)
Show Figures

Figure 1

Figure 1
<p>Comparison of Deep Learning vs. Machine Learning methods in plant disease detection.</p>
Full article ">Figure 2
<p>Workflow of Proposed Methodology.</p>
Full article ">Figure 3
<p>Different classes of potato leaf diseases, including healthy leaves and those infected by early blight and late blight. Images show the visual difference between healthy and diseased leaves, which helps the model in its classification process.</p>
Full article ">Figure 4
<p>The few classes of tomato leaf diseases showcasing healthy leaves, along with those affected by bacteria spot, early blight, and late blight diseases. Examples like these help in model development for the differentiation of various disease symptoms of tomato plants.</p>
Full article ">Figure 5
<p>Several classes of mango leaf diseases, from healthy to infected by anthracnose or bacterial canker. The variety in the visual presentation underlines the versatility of the model in the way it can detect diseases across a wide range of crops.</p>
Full article ">Figure 6
<p>Representation of the Different Leaf Disease images dataset.</p>
Full article ">Figure 7
<p>The visualization of the applied preprocessing technique on Potato Leaf Disease.</p>
Full article ">Figure 8
<p>The visualization of the applied preprocessing technique on Tomato Leaf Disease.</p>
Full article ">Figure 9
<p>The visualization of the applied preprocessing technique on Mango Leaf Disease.</p>
Full article ">Figure 10
<p>The model architecture diagram considering NASNetMobile for feature extraction and a multi-feature fusion network with prototypical networks for classification.</p>
Full article ">Figure 11
<p>The accuracy comparison of different deep learning models.</p>
Full article ">Figure 12
<p>The comparison of all models using ROC and AUC.</p>
Full article ">Figure 13
<p>The training and validation accuracy and loss of the proposed model with the Potato Plant dataset.</p>
Full article ">Figure 14
<p>The confusion matrix for Potato Plant dataset.</p>
Full article ">Figure 15
<p>The training validation accuracy and loss on the Potato Village dataset.</p>
Full article ">Figure 16
<p>The confusion matrix for Potato Village Dataset [<a href="#B26-agronomy-14-02230" class="html-bibr">26</a>].</p>
Full article ">Figure 17
<p>The training validation accuracy and loss on the Tomato Dataset [<a href="#B27-agronomy-14-02230" class="html-bibr">27</a>].</p>
Full article ">Figure 18
<p>The confusion matrix for Tomato Dataset.</p>
Full article ">Figure 19
<p>The training validation accuracy and loss on the Mango Dataset [<a href="#B28-agronomy-14-02230" class="html-bibr">28</a>].</p>
Full article ">Figure 20
<p>The confusion matrix for Mango Dataset [<a href="#B28-agronomy-14-02230" class="html-bibr">28</a>].</p>
Full article ">Figure 21
<p>The accuracy Comparison of Deep Learning Models for Agricultural Disease Detection.</p>
Full article ">Figure 22
<p>ROC and AUC for Hypothetical Models.</p>
Full article ">
15 pages, 474 KiB  
Article
Federated Learning in Dynamic and Heterogeneous Environments: Advantages, Performances, and Privacy Problems
by Fabio Liberti, Davide Berardi and Barbara Martini
Appl. Sci. 2024, 14(18), 8490; https://doi.org/10.3390/app14188490 - 20 Sep 2024
Viewed by 1406
Abstract
Federated Learning (FL) represents a promising distributed learning methodology particularly suitable for dynamic and heterogeneous environments characterized by the presence of Internet of Things (IoT) devices and Edge Computing infrastructures. In this context, FL allows you to train machine learning models directly on [...] Read more.
Federated Learning (FL) represents a promising distributed learning methodology particularly suitable for dynamic and heterogeneous environments characterized by the presence of Internet of Things (IoT) devices and Edge Computing infrastructures. In this context, FL allows you to train machine learning models directly on edge devices, mitigating data privacy concerns and reducing latency due to transmitting data to central servers. However, the heterogeneity of computational resources, the variability of network connections, and the mobility of IoT devices pose significant challenges to the efficient implementation of FL. This work explores advanced techniques for dynamic model adaptation and heterogeneous data management in edge computing scenarios, proposing innovative solutions to improve the robustness and efficiency of federated learning. We present an innovative solution based on Kubernetes which enables the fast application of FL models to Heterogeneous Architectures. Experimental results demonstrate that our proposals can improve the performance of FL in IoT and edge environments, offering new perspectives for the practical implementation of decentralized intelligent systems. Full article
Show Figures

Figure 1

Figure 1
<p>Schema of implementation using k3s. The k3s worker can be any architecture compatible with Kubernetes, with heterogeneous architecture. For instance, in our implementation, k3s workers are ARM virtual machines running in a cloud provider (Oracle).</p>
Full article ">Figure 2
<p>Analysis of the performance of the system over 150 epochs in terms of accuracy and loss over five different datasets and with clients varying from two to fifty.</p>
Full article ">Figure 3
<p>Comparison of the accuracy of federated and centralized learning systems with similar works.</p>
Full article ">
21 pages, 5155 KiB  
Article
YOLOv8-E: An Improved YOLOv8 Algorithm for Eggplant Disease Detection
by Yuxi Huang, Hong Zhao and Jie Wang
Appl. Sci. 2024, 14(18), 8403; https://doi.org/10.3390/app14188403 - 18 Sep 2024
Viewed by 556
Abstract
During the developmental stages, eggplants are susceptible to diseases, which can impact crop yields and farmers’ economic returns. Therefore, timely and effective detection of eggplant diseases is crucial. Deep learning-based object detection algorithms can automatically extract features from images of eggplants affected by [...] Read more.
During the developmental stages, eggplants are susceptible to diseases, which can impact crop yields and farmers’ economic returns. Therefore, timely and effective detection of eggplant diseases is crucial. Deep learning-based object detection algorithms can automatically extract features from images of eggplants affected by diseases. However, eggplant disease images captured in complex farmland environments present challenges such as varying disease sizes, occlusion, overlap, and small target detection, making it difficult for existing deep-learning models to achieve satisfactory detection performance. To address this challenge, this study proposed an optimized eggplant disease detection algorithm, YOLOv8-E, based on You Only Look Once version 8 nano (YOLOv8n). Firstly, we integrate switchable atrous convolution (SAConv) into the C2f module to design the C2f_SAConv module, replacing some of the C2f modules in the backbone network of YOLOv8n, enabling our proposed algorithm to better extract eggplant disease features. Secondly, to facilitate the deployment of the detection model on mobile devices, we reconstruct the Neck network of YOLOv8n using the SlimNeck module, making the model lighter. Additionally, to tackle the issue of missing small targets, we embed the large separable kernel attention (LSKA) module within SlimNeck, enhancing the model’s attention to fine-grained information. Lastly, we combined intersection over union with auxiliary bounding box (Inner-IoU) and minimum point distance intersection over union (MPDIoU), introducing the Inner-MPDIoU loss to speed up convergence of the model and raise detection precision of overlapped and occluded targets. Ablation studies demonstrated that, compared to YOLOv8n, the mean average precision (mAP) and F1 score of YOLOv8-E reached 79.4% and 75.7%, respectively, which obtained a 5.5% increment and a 4.5% increase, while also reducing the model size and computational complexity. Furthermore, YOLOv8-E achieved higher detection performance than other mainstream algorithms. YOLOv8-E exhibits significant potential for practical application in eggplant disease detection. Full article
Show Figures

Figure 1

Figure 1
<p>Categories in the eggplant disease dataset.</p>
Full article ">Figure 2
<p>Structure of YOLOv8n.</p>
Full article ">Figure 3
<p>Structure of C2f module.</p>
Full article ">Figure 4
<p>Structure of YOLOv8-E.</p>
Full article ">Figure 5
<p>Structure of SAConv.</p>
Full article ">Figure 6
<p>Comparison of C2f module and C2f_SAConv module.</p>
Full article ">Figure 7
<p>Structure of GSConv.</p>
Full article ">Figure 8
<p>Structure of VOVGSCSP.</p>
Full article ">Figure 9
<p>Structure of LSKA.</p>
Full article ">Figure 10
<p>Schematic diagram of Inner-MPDIoU.</p>
Full article ">Figure 11
<p>Loss and mAP@0.5 comparison of YOLOv8n and YOLOv8-E.</p>
Full article ">Figure 12
<p>Confusion matrix comparison of YOLOv8n and YOLOv8-E.</p>
Full article ">Figure 13
<p>Heat map comparison of YOLOv8n and YOLOv8-E (YOLOv8n in the middle, YOLOv8-E on the right).</p>
Full article ">Figure 14
<p>Heat map comparison of different improved models.</p>
Full article ">Figure 15
<p>Comparison of visual results of YOLOv8n and YOLOv8-E. (<b>a</b>) Visual result of YOLOv8n. (<b>b</b>) Visual result of YOLOv8-E.</p>
Full article ">
25 pages, 2396 KiB  
Article
Internet of Conscious Things: Ontology-Based Social Capabilities for Smart Objects
by Michele Ruta, Floriano Scioscia, Giuseppe Loseto, Agnese Pinto, Corrado Fasciano, Giovanna Capurso and Eugenio Di Sciascio
Future Internet 2024, 16(9), 327; https://doi.org/10.3390/fi16090327 - 8 Sep 2024
Viewed by 589
Abstract
Emerging distributed intelligence paradigms for the Internet of Things (IoT) call for flexible and dynamic reconfiguration of elementary services, resources and devices. In order to achieve such capability, this paper faces complex interoperability and autonomous decision problems by proposing a thorough framework based [...] Read more.
Emerging distributed intelligence paradigms for the Internet of Things (IoT) call for flexible and dynamic reconfiguration of elementary services, resources and devices. In order to achieve such capability, this paper faces complex interoperability and autonomous decision problems by proposing a thorough framework based on the integration of the Semantic Web of Things (SWoT) and Social Internet of Things (SIoT) paradigms. SWoT enables low-power knowledge representation and autonomous reasoning at the edge of the network through carefully optimized inference services and engines. This layer provides service/resource management and discovery primitives for a decentralized collaborative social protocol in the IoT, based on the Linked Data Notifications(LDN) over Linked Data Platform on Constrained Application Protocol (LDP-CoAP). The creation and evolution of friend and follower relationships between pairs of devices is regulated by means of novel dynamic models assessing trust as a usefulness reputation score. The close SWoT-SIoT integration overcomes the functional limitations of existing proposals, which focus on either social device or semantic resource management only. A smart mobility case study on Plug-in Electric Vehicles (PEVs) illustrates the benefits of the proposal in pervasive collaborative scenarios, while experiments show the computational sustainability of the dynamic relationship management approach. Full article
(This article belongs to the Special Issue Social Internet of Things (SIoT))
Show Figures

Figure 1

Figure 1
<p>Semantic Web of Things architecture for SIoT.</p>
Full article ">Figure 2
<p>Social IoT framework and interaction model.</p>
Full article ">Figure 3
<p>Reference ontology-based data modeling.</p>
Full article ">Figure 4
<p>Distributed service/resource discovery.</p>
Full article ">Figure 5
<p>Sample network with loosely connected nodes.</p>
Full article ">Figure 6
<p>Social smart mobility scenario.</p>
Full article ">Figure 7
<p>Electric taxi profile semantic description.</p>
Full article ">Figure 8
<p>Semantic annotations of taxi request and friends’ services.</p>
Full article ">Figure 9
<p>Semantic description of selected service.</p>
Full article ">Figure 10
<p>Test results for small-size networks. Legend denotes values of parameters for each configuration (&lt;generation algorithm&gt;_&lt;number of nodes&gt;_&lt;request rate&gt;).</p>
Full article ">Figure 11
<p>Test results for medium-size networks. Legend denotes values of parameters for each configuration (&lt;generation algorithm&gt;_&lt;number of nodes&gt;_&lt;request rate&gt;).</p>
Full article ">Figure 12
<p>Test results for large-size networks. Legend denotes values of parameters for each configuration (&lt;generation algorithm&gt;_&lt;number of nodes&gt;_&lt;request rate&gt;).</p>
Full article ">Figure 13
<p>Comparison of dynamic (this paper) vs. static [<a href="#B9-futureinternet-16-00327" class="html-bibr">9</a>] relationship management.</p>
Full article ">
30 pages, 24993 KiB  
Article
Multi-Objective Optimization of Orchestra Scheduler for Traffic-Aware Networks
by Niharika Panda, Supriya Muthuraman and Atis Elsts
Smart Cities 2024, 7(5), 2542-2571; https://doi.org/10.3390/smartcities7050099 - 6 Sep 2024
Viewed by 875
Abstract
The Internet of Things (IoT) presents immense opportunities for driving Industry 4.0 forward. However, in scenarios involving networked control automation, ensuring high reliability and predictable latency is vital for timely responses. To meet these demands, the contemporary wireless protocol time-slotted channel hopping (TSCH), [...] Read more.
The Internet of Things (IoT) presents immense opportunities for driving Industry 4.0 forward. However, in scenarios involving networked control automation, ensuring high reliability and predictable latency is vital for timely responses. To meet these demands, the contemporary wireless protocol time-slotted channel hopping (TSCH), also referred to as IEEE 802.15.4-2015, relies on precise transmission schedules to prevent collisions and achieve consistent end-to-end traffic flow. In the realm of diverse IoT applications, this study introduces a new traffic-aware autonomous multi-objective scheduling function called OPTIMAOrchestra. This function integrates slotframe and channel management, adapts to varying network sizes, supports mobility, and reduces collision risks. The effectiveness of two versions of OPTIMAOrchestra is extensively evaluated through multi-run experiments, each spanning up to 3600 s. It involves networks ranging from small-scale setups to large-scale deployments with 111 nodes. Homogeneous and heterogeneous network topologies are considered in static and mobile environments, where the nodes within a network send packets to the server with the same and different application packet intervals. The results demonstrate that OPTIMAOrchestra_ch4 achieves a current consumption of 0.72 mA while maintaining 100% reliability and 0.86 mA with a 100% packet delivery ratio in static networks. Both proposed Orchestra variants in mobile networks achieve 100% reliability, with current consumption recorded at 6.36 mA. Minimum latencies of 0.073 and 0.02 s are observed in static and mobile environments, respectively. On average, a collision rate of 5% is recorded for TSCH and RPL communication, with a minimum of 0% collision rate observed in the TSCH broadcast in mobile networks. Overall, the proposed OPTIMAOrchestra scheduler outperforms existing schedulers regarding network efficiency, time, and usability, significantly improving reliability while maintaining a balanced latency–energy trade-off. Full article
Show Figures

Figure 1

Figure 1
<p>Work flow.</p>
Full article ">Figure 2
<p>Traffic-aware scheduling taxonomy.</p>
Full article ">Figure 3
<p>Different network topologies. (<b>a</b>) Modified smart home optimized path; (<b>b</b>) 10 clusters, 10 nodes; (<b>c</b>) heterogeneous.</p>
Full article ">Figure 4
<p>Slotting in four physical channels.</p>
Full article ">Figure 5
<p>Slotting in 11 physical channels.</p>
Full article ">Figure 6
<p>Different topologies. (<b>a</b>) 10 clusters, 10 nodes with mobile nodes; (<b>b</b>) 50 clusters, 10 nodes; (<b>c</b>) 100 clusters, 10 nodes.</p>
Full article ">Figure 7
<p>Reliability in static smart homes. (<b>a</b>) Basic smart home; (<b>b</b>) average smart home; (<b>c</b>) advanced smart home.</p>
Full article ">Figure 8
<p>Reliability in mobile smart homes. (<b>a</b>) Basic smart home; (<b>b</b>) average smart home; (<b>c</b>) advanced smart home.</p>
Full article ">Figure 9
<p>Latency across static smart homes. (<b>a</b>) Basic smart home; (<b>b</b>) average smart home; (<b>c</b>) advanced smart home.</p>
Full article ">Figure 10
<p>Latency across mobile smart homes. (<b>a</b>) Basic smart home; (<b>b</b>) average smart home; (<b>c</b>) advanced smart home.</p>
Full article ">Figure 11
<p>Current consumption across static smart homes. (<b>a</b>) Basic smart home; (<b>b</b>) average smart home; (<b>c</b>) advanced smart home.</p>
Full article ">Figure 12
<p>Current Consumption across mobile smart homes. (<b>a</b>) Basic smart home; (<b>b</b>) average smart home; (<b>c</b>) advanced smart home.</p>
Full article ">Figure 13
<p>Performance metrics in static evolving networks. (<b>a</b>) Packet delivery ratio; (<b>b</b>) latency; (<b>c</b>) current consumption.</p>
Full article ">Figure 14
<p>Performance metrics in mobile evolving networks. (<b>a</b>) Packet delivery ratio; (<b>b</b>) latency; (<b>c</b>) current consumption.</p>
Full article ">Figure 15
<p>Collision in static evolving networks.</p>
Full article ">Figure 16
<p>Collision in mobile evolving networks.</p>
Full article ">Figure 17
<p>Homogeneous topology performance. Similar vs. varying application packet intervals in static and mobile environments.</p>
Full article ">Figure 18
<p>Collision rate comparison in homogeneous topologies: static vs. mobile environments with varying packet intervals.</p>
Full article ">Figure 19
<p>Analysis of static heterogeneous topologies: impact of varying packet intervals.</p>
Full article ">Figure 20
<p>Collision rate analysis in static heterogeneous topologies: effect of variable packet intervals.</p>
Full article ">Figure 21
<p>Analysis of mobile heterogeneous topologies: impact of varying packet intervals.</p>
Full article ">Figure 22
<p>Collision rate analysis in mobile heterogeneous topologies: effect of variable packet intervals.</p>
Full article ">
14 pages, 1355 KiB  
Article
Efficient Collaborative Edge Computing for Vehicular Network Using Clustering Service
by Ali Al-Allawee, Pascal Lorenz and Alhamza Munther
Network 2024, 4(3), 390-403; https://doi.org/10.3390/network4030018 - 6 Sep 2024
Viewed by 711
Abstract
Internet of Vehicles applications are known to be critical and time-sensitive. The value proposition of edge computing comprises its lower latency, advantageous bandwidth consumption, privacy, management, efficiency of treatments, and mobility, which aim to improve vehicular and traffic services. Successful stories have been [...] Read more.
Internet of Vehicles applications are known to be critical and time-sensitive. The value proposition of edge computing comprises its lower latency, advantageous bandwidth consumption, privacy, management, efficiency of treatments, and mobility, which aim to improve vehicular and traffic services. Successful stories have been observed between IoV and edge computing to support smooth mobility and the use of local resources. However, vehicle travel, especially due to high-speed movement and intersections, can result in IoV devices losing connection and/or processing with high latency. This paper proposes a Cluster Collaboration Vehicular Edge Computing (CCVEC) framework that aims to guarantee and enhance the connectivity between vehicle sensors and the cloud by utilizing the edge computing paradigm in the middle. The objectives are achieved by utilizing the cluster management strategies deployed between cloud and edge computing servers. The framework is implemented in OpenStack cloud servers and evaluated by measuring the throughput, latency, and memory parameters in two different scenarios. The results obtained show promising indications in terms of latency (approximately 390 ms of the ideal status) and throughput (30 kB/s) values, and thus appears acceptable in terms of performance as well as memory. Full article
(This article belongs to the Special Issue Convergence of Edge Computing and Next Generation Networking)
Show Figures

Figure 1

Figure 1
<p>Edge vs. cloud server.</p>
Full article ">Figure 2
<p>Architecture of vehicular edge computing.</p>
Full article ">Figure 3
<p>CCVEC framework components.</p>
Full article ">Figure 4
<p>Passing messages.</p>
Full article ">Figure 5
<p>Testing scenario: (<b>a</b>) VM to VM with the same network; (<b>b</b>) VM to VM with a different network.</p>
Full article ">Figure 6
<p>Round trip time in ms (latency) for scenario 1.</p>
Full article ">Figure 7
<p>Throughput (kB/s) in scenario 1.</p>
Full article ">Figure 8
<p>Memory usage (%) in scenario 1.</p>
Full article ">Figure 9
<p>Round trip time in ms (latency) for scenario 2.</p>
Full article ">Figure 10
<p>Throughput (kB/s) in scenario 2.</p>
Full article ">Figure 11
<p>Memory usage (%) in scenario 2.</p>
Full article ">
17 pages, 4715 KiB  
Article
IoT-MFaceNet: Internet-of-Things-Based Face Recognition Using MobileNetV2 and FaceNet Deep-Learning Implementations on a Raspberry Pi-400
by Ahmad Saeed Mohammad, Thoalfeqar G. Jarullah, Musab T. S. Al-Kaltakchi, Jabir Alshehabi Al-Ani and Somdip Dey
J. Low Power Electron. Appl. 2024, 14(3), 46; https://doi.org/10.3390/jlpea14030046 - 5 Sep 2024
Viewed by 50204
Abstract
IoT applications revolutionize industries by enhancing operations, enabling data-driven decisions, and fostering innovation. This study explores the growing potential of IoT-based facial recognition for mobile devices, a technology rapidly advancing within the interconnected IoT landscape. The investigation proposes a framework called IoT-MFaceNet (Internet-of-Things-based [...] Read more.
IoT applications revolutionize industries by enhancing operations, enabling data-driven decisions, and fostering innovation. This study explores the growing potential of IoT-based facial recognition for mobile devices, a technology rapidly advancing within the interconnected IoT landscape. The investigation proposes a framework called IoT-MFaceNet (Internet-of-Things-based face recognition using MobileNetV2 and FaceNet deep-learning) utilizing pre-existing deep-learning methods, employing the MobileNetV2 and FaceNet algorithms on both ImageNet and FaceNet databases. Additionally, an in-house database is compiled, capturing data from 50 individuals via a web camera and 10 subjects through a smartphone camera. Pre-processing of the in-house database involves face detection using OpenCV’s Haar Cascade, Dlib’s CNN Face Detector, and Mediapipe’s Face. The resulting system demonstrates high accuracy in real-time and operates efficiently on low-powered devices like the Raspberry Pi 400. The evaluation involves the use of the multilayer perceptron (MLP) and support vector machine (SVM) classifiers. The system primarily functions as a closed set identification system within a computer engineering department at the College of Engineering, Mustansiriyah University, Iraq, allowing access exclusively to department staff for the department rapporteur room. The proposed system undergoes successful testing, achieving a maximum accuracy rate of 99.976%. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed Framework (IoT-MFaceNet): where (<b>A</b>) represents the image database, (<b>B</b>) represents the labeled faces in the wild (LFW) database, (<b>C</b>) represents the in-house database with 50 subjects for the web camera, with 10 subjects, (<b>D</b>) represents the in-house database with 10 subjects for a smartphone camera, (<b>E</b>) represents pre-processing, (<b>F</b>) represents pre-trained deep learning, including (<b>F1</b>) the MobileNetV2 technique (<b>F2</b>) and the FaceNet technique, (<b>G</b>) represents the evaluation process represented by the Raspberry Pi type 400, (<b>H</b>) represents classification, and (<b>I</b>) represents the identified person displayed by exploiting the mobile application.</p>
Full article ">Figure 2
<p>The architecture of the MobileNetV2 technique (<b>a</b>) and the architecture of VGG16 and VGG19 of the FaceNet technique (<b>b</b>).</p>
Full article ">Figure 3
<p>Performance of the different models in FPS, where the FPS results are the average FPS of 100 recorded frames. Three different custom-made tops were used to test the proposed performance using the custom-trained CNN with MobileNetV2. The first top has three hidden layers with 384 neurons each, making it the largest custom-made top for MobileNetV2 in this example (384-384-384). The second top, with a configuration of 192-256-128, is the second largest custom-made top. The third top, with a configuration of 128-128-128, is the smallest custom-made top. Additionally, TensorFlow-lite quantization was applied to all three networks.</p>
Full article ">Figure 4
<p>Size of the models created on disk in MB.</p>
Full article ">Figure 5
<p>The hardware design. (<b>A</b>) Example of the hardware connection. The hardware system combines an ultrasonic sensor and webcam to measure and monitor subject distance, capturing images for face recognition. Optimal recognition occurs at distances below 80 cm, with lower confidence beyond that, signaled on the GUI. (<b>B</b>) An instance of the system operating with two subjects is evident. The system accurately identifies the faces of Thoalfeqar and Humam. Both serve as representatives of the fourth class in the Department of Computer Engineering at Mustansiriyah University. Typically, class representatives, including Thoalfeqar and Humam, have access to the department’s rapporteur room along with the department’s staff.</p>
Full article ">Figure 6
<p>The receiver operating characteristic (ROC) without optimization for a custom-trained CNN using MobileNetV2 with an MLP classifier for (<b>a</b>) (128-128-128) custom-made top, (<b>b</b>) (192-256-128) custom-made top, and (<b>c</b>) (384-384-384) custom-made top.</p>
Full article ">Figure 7
<p>The receiver operating characteristic (ROC) with optimization for a custom-trained CNN using MobileNetV2 with an MLP classifier (<b>a</b>) (128-128-128) custom-made top, (<b>b</b>) (192-256-128) custom-made top, and (<b>c</b>) (384-384-384) custom-made top.</p>
Full article ">Figure 8
<p>The receiver operating characteristic (ROC) for the FaceNet with the SVM classifier.</p>
Full article ">
29 pages, 2443 KiB  
Article
User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks
by Farid Yessoufou, Salma Sassi, Elie Chicha, Richard Chbeir and Jules Degila
Future Internet 2024, 16(9), 311; https://doi.org/10.3390/fi16090311 - 28 Aug 2024
Viewed by 2704
Abstract
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geographic locations, has proven to be particularly [...] Read more.
With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’ geographic locations, has proven to be particularly innovative. However, this trend raises significant privacy concerns, particularly regarding the precise geographic data required by these crowdsourcing platforms. Traditional methods, such as dummy locations, spatial cloaking, differential privacy, k-anonymity, and encryption, often fail to mitigate the risks associated with the continuous disclosure of location data. An unauthorized entity could access these data and infer personal information about individuals, such as their home address, workplace, religion, or political affiliations, thus constituting a privacy violation. In this paper, we propose a user mobility model designed to enhance location privacy protection by accurately identifying Points of Interest (POIs) and countering inference attacks. Our main contribution here focuses on user mobility modeling and the introduction of an advanced algorithm for precise POI identification. We evaluate our contributions using GPS data collected from 10 volunteers over a period of 3 months. The results show that our mobility model delivers significant performance and that our POI extraction algorithm outperforms existing approaches. Full article
Show Figures

Figure 1

Figure 1
<p>Motivating scenario.</p>
Full article ">Figure 2
<p>Flow of the proposed approach.</p>
Full article ">Figure 3
<p>Location data preprocessing steps.</p>
Full article ">Figure 4
<p>Example of Alice’s graph generation.</p>
Full article ">Figure 5
<p>Influence diagram.</p>
Full article ">Figure 6
<p>Screenshot of the mobile application.</p>
Full article ">Figure 7
<p>Example of data points on the map.</p>
Full article ">Figure 8
<p>Runtime execution for reduced graph creation.</p>
Full article ">Figure 9
<p>Precision scores obtained.</p>
Full article ">Figure 10
<p>Recall scores obtained.</p>
Full article ">Figure 11
<p>F1POI scores obtained.</p>
Full article ">Figure 12
<p>Precision, recall, F1POI score for DJ cluster obtained.</p>
Full article ">
23 pages, 1362 KiB  
Article
Joint Optimization of Service Migration and Resource Allocation in Mobile Edge–Cloud Computing
by Zhenli He, Liheng Li, Ziqi Lin, Yunyun Dong, Jianglong Qin and Keqin Li
Algorithms 2024, 17(8), 370; https://doi.org/10.3390/a17080370 - 21 Aug 2024
Viewed by 700
Abstract
In the rapidly evolving domain of mobile edge–cloud computing (MECC), the proliferation of Internet of Things (IoT) devices and mobile applications poses significant challenges, particularly in dynamically managing computational demands and user mobility. Current research has partially addressed aspects of service migration and [...] Read more.
In the rapidly evolving domain of mobile edge–cloud computing (MECC), the proliferation of Internet of Things (IoT) devices and mobile applications poses significant challenges, particularly in dynamically managing computational demands and user mobility. Current research has partially addressed aspects of service migration and resource allocation, yet it often falls short in thoroughly examining the nuanced interdependencies between migration strategies and resource allocation, the consequential impacts of migration delays, and the intricacies of handling incomplete tasks during migration. This study advances the discourse by introducing a sophisticated framework optimized through a deep reinforcement learning (DRL) strategy, underpinned by a Markov decision process (MDP) that dynamically adapts service migration and resource allocation strategies. This refined approach facilitates continuous system monitoring, adept decision making, and iterative policy refinement, significantly enhancing operational efficiency and reducing response times in MECC environments. By meticulously addressing these previously overlooked complexities, our research not only fills critical gaps in the literature but also enhances the practical deployment of edge computing technologies, contributing profoundly to both theoretical insights and practical implementations in contemporary digital ecosystems. Full article
(This article belongs to the Collection Feature Papers in Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

Figure 1
<p>An example of an MECC environment.</p>
Full article ">Figure 2
<p>An example of the migration process.</p>
Full article ">Figure 3
<p>Training of A2C-based dynamic migration and resource allocation algorithm.</p>
Full article ">Figure 4
<p>The impact of the number of ESs on average response delay.</p>
Full article ">Figure 5
<p>The impact of the number of ESs on failure rate.</p>
Full article ">Figure 6
<p>The impact of the time constraint on average response delay.</p>
Full article ">Figure 7
<p>The impact of the time constraint on failure rate.</p>
Full article ">Figure 8
<p>The impact of the number of users on average response delay.</p>
Full article ">Figure 9
<p>Decision-making duration for each step.</p>
Full article ">Figure 10
<p>The impact of the number of users on failure rate.</p>
Full article ">Figure 11
<p>The impact of data size on average response delay.</p>
Full article ">Figure 12
<p>The impact of data size on average failure rate.</p>
Full article ">Figure 13
<p>The impact of network scale expansion in an environment with 40 users and 20 ESs. (<b>a</b>) Average response delay. (<b>b</b>) Average failure rate.</p>
Full article ">
28 pages, 16028 KiB  
Article
Open-Source Internet of Things-Based Supervisory Control and Data Acquisition System for Photovoltaic Monitoring and Control Using HTTP and TCP/IP Protocols
by Wajahat Khalid, Mohsin Jamil, Ashraf Ali Khan and Qasim Awais
Energies 2024, 17(16), 4083; https://doi.org/10.3390/en17164083 - 16 Aug 2024
Cited by 1 | Viewed by 3930
Abstract
This study presents a cost-effective IoT-based Supervisory Control and Data Acquisition system for the real-time monitoring and control of photovoltaic systems in a rural Pakistani community. The system utilizes the Blynk platform with Arduino Nano, GSM SIM800L, and ESP-32 microcontrollers. The key components [...] Read more.
This study presents a cost-effective IoT-based Supervisory Control and Data Acquisition system for the real-time monitoring and control of photovoltaic systems in a rural Pakistani community. The system utilizes the Blynk platform with Arduino Nano, GSM SIM800L, and ESP-32 microcontrollers. The key components include a ZMPT101B voltage sensor, ACS712 current sensors, and a Maximum Power Point Tracking module for optimizing power output. The system operates over both Global System for Mobile Communications and Wi-Fi networks, employing universal asynchronous receiver–transmitter serial communication and using the transmission control protocol/Internet protocol and hypertext transfer protocol for data exchange. Testing showed that the system consumes only 3.462 W of power, making it highly efficient. With an implementation cost of CAD 35.52, it offers an affordable solution for rural areas. The system achieved an average data transmission latency of less than 2 s over Wi-Fi and less than 5 s over GSM, ensuring timely data updates and control. The Blynk 2.0 app provides data retention capabilities, allowing users to access historical data for performance analysis and optimization. This open-source SCADA system demonstrates significant potential for improving efficiency and user engagement in renewable energy management, offering a scalable solution for global applications. Full article
Show Figures

Figure 1

Figure 1
<p>Electricity demand and generation of Pakistan [<a href="#B7-energies-17-04083" class="html-bibr">7</a>].</p>
Full article ">Figure 2
<p>(<b>a</b>) Structure of SCADA system. (<b>b</b>) Layer scheme of SCADA system.</p>
Full article ">Figure 3
<p>Site overview from Google Maps [<a href="#B27-energies-17-04083" class="html-bibr">27</a>].</p>
Full article ">Figure 4
<p>Brief of the proposed SCADA system.</p>
Full article ">Figure 5
<p>Pin layout of Arduino Nano [<a href="#B29-energies-17-04083" class="html-bibr">29</a>].</p>
Full article ">Figure 6
<p>Pin layout of the ESP32 [<a href="#B38-energies-17-04083" class="html-bibr">38</a>].</p>
Full article ">Figure 7
<p>Flow chart of SCADA system process.</p>
Full article ">Figure 8
<p>Circuit diagram of proposed SCADA system using Arduino Nano and GSM Sim800L (SIMCom Wireless Solutions, Shanghai, China).</p>
Full article ">Figure 9
<p>Blynk app setup using Arduino Nano and GSM SIM800L.</p>
Full article ">Figure 10
<p>Hardware setup using Arduino Nano and GSM SIM800L.</p>
Full article ">Figure 11
<p>Display of FID’s values on LCD.</p>
Full article ">Figure 12
<p>PV system FID values on the Blynk app dashboard.</p>
Full article ">Figure 13
<p>PV system FID monitoring on the Blynk app mobile interface.</p>
Full article ">Figure 14
<p>Circuit diagram of proposed SCADA system using Arduino Nano and ESP-32.</p>
Full article ">Figure 15
<p>PV panel installation on the rooftop of the ECE building.</p>
Full article ">Figure 16
<p>Experimental setup at MUN ECE building.</p>
Full article ">Figure 17
<p>FID parameters on the LCD in the “OFF” state.</p>
Full article ">Figure 18
<p>Status of Blynk web dashboard interface in “OFF” and “ON” states.</p>
Full article ">Figure 19
<p>Monitoring and control of PV system on Blynk console dashboard using ESP-32 and Arduino Nano.</p>
Full article ">Figure 20
<p>PV system parameters under reduced sunlight.</p>
Full article ">Figure 21
<p>Status of DC Voltage and DC.</p>
Full article ">Figure 22
<p>Notification of PV system parameters via SMS under testing conditions.</p>
Full article ">Figure 23
<p>Arduino IDE code of the Twilio API.</p>
Full article ">
Back to TopTop