[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (194)

Search Parameters:
Keywords = smart logistics system

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 2139 KiB  
Article
A Decision Support Model for Lean Supply Chain Management in City Multifloor Manufacturing Clusters
by Bogusz Wiśnicki, Tygran Dzhuguryan, Sylwia Mielniczuk, Ihor Petrov and Liudmyla Davydenko
Sustainability 2024, 16(20), 8801; https://doi.org/10.3390/su16208801 - 11 Oct 2024
Viewed by 839
Abstract
City manufacturing has once again become one of the priority areas for the sustainable development of smart cities thanks to the use of a wide range of green technologies and, first of all, additive technologies. Shortening the supply chain between producers and consumers [...] Read more.
City manufacturing has once again become one of the priority areas for the sustainable development of smart cities thanks to the use of a wide range of green technologies and, first of all, additive technologies. Shortening the supply chain between producers and consumers has significant effects on economic, social, and environmental dimensions. Zoning of city multifloor manufacturing (CMFM) in areas with a compact population in large cities in the form of clusters with their own city logistics nodes (CLNs) creates favorable conditions for promptly meeting the needs of citizens for goods of everyday demand and for passenger and freight transportation. City multifloor manufacturing clusters (CMFMCs) have been already studied quite a lot for their possible uses; nevertheless, an identified research gap is related to supply chain design efficiency concerning CMFMCs. Thus, the main objective of this study was to explore the possibilities of lean supply chain management (LSCM) as the integrated application of lean manufacturing (LM) approaches and I4.0 technologies for customer-centric value stream management based on eliminating all types of waste, reducing the use of natural and energy resources, and continuous improvement of processes related to logistics activities. This paper presents a decision support model for LSCM in CMFMCs, which is a mathematical deterministic model. This model justifies the minimization of the number of road transport transfers within the urban area and the amount of stock that is stored in CMFMC buildings and in CLNs, and also regulating supplier lead time. The model was verified and validated using appropriately selected test data based on the case study, which was designed as a typical CMFM manufacturing system with various parameters of CMFMCs and urban freight transport frameworks. The feasibility of using the proposed model for value stream mapping (VSM) and managing logistics processes and inventories in clusters is discussed. The findings can help decisionmakers and researchers improve the planning and management of logistics processes and inventory in clusters, even in the face of unexpected disruptions. Full article
Show Figures

Figure 1

Figure 1
<p>Scheme of a large city with CMFMCs, roads, and rail network for freight transport.</p>
Full article ">Figure 2
<p>Supply chain of CMFMCs within a large city.</p>
Full article ">Figure 3
<p>Stages of LSCM continuous process based on the VSM method.</p>
Full article ">Figure 4
<p>CMFM cluster delivery system.</p>
Full article ">Figure 5
<p>Number of e-truck transfers to the CLN in relation to the number of CMFMBs in the cluster.</p>
Full article ">Figure 6
<p>The volume of ITRs that are stored overnight in the CLN in relation to the e-truck cargo capacity utilization variant—daily and 365-day average data.</p>
Full article ">
22 pages, 2756 KiB  
Article
Evaluation of the Smart Logistics Based on the SLDI Model: Evidence from China
by Yan Liu and Jiaqi Zhao
Systems 2024, 12(10), 405; https://doi.org/10.3390/systems12100405 - 30 Sep 2024
Viewed by 489
Abstract
Smart logistics (SL) reflects the digital transformation of the logistics industry, which is key for economic development. Most evaluations are based on the application of technology in SL, and few studies have evaluated SL from a comprehensive perspective. The paper builds the SL [...] Read more.
Smart logistics (SL) reflects the digital transformation of the logistics industry, which is key for economic development. Most evaluations are based on the application of technology in SL, and few studies have evaluated SL from a comprehensive perspective. The paper builds the SL development index (SLDI) model from five dimensions based on the driving force, pressure, state, impact, and response (DPSIR) model and identifies the indicator weight by the entropy weight technique. The paper employs the ETDK method, a combined quantitative approach that incorporates entropy weight (E), the technique for order preference by similarity to an ideal solution (TOPSIS) (T), the Dagum Gini coefficient (D), and Kernel density estimation (K), to calculate the closeness degree, analyze spatial-temporal differentiation, and explain the distribution characteristics using data from China spanning 2013 to 2021. The findings show that (1) The SL evaluation is multidimensional and cannot be evaluated only based on technical indicators. A comprehensive evaluation indicator system is necessary. (2) A combined quantitative approach can measure SL development from multiple perspectives and get a clearer picture of the characteristics and regional differences of SL. (3) Influenced by economic development, infrastructure, regional clusters, location, talent, etc., the overall SL development is improving yearly, but SL development in different regions is unbalanced and has different distribution characteristics. The SLDI model developed in this paper will provide a more scientific and reasonable tool for comprehensively evaluating SL. The findings are helpful in proposing suggestions and optimization approaches for subsequent research on SL evaluation and development. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Research design.</p>
Full article ">Figure 2
<p>Changes of differences in the group of SL development in China.</p>
Full article ">Figure 3
<p>Changes of inter-group differences in SL development in China.</p>
Full article ">Figure 4
<p>Contribution rate of differences in SL development in China.</p>
Full article ">Figure 5
<p>Kernel density chart of the SLDI in China from 2013 to 2021.</p>
Full article ">Figure 6
<p>Kernel density chart of the SLDI by region from 2013 to 2021.</p>
Full article ">
33 pages, 21369 KiB  
Article
A Simulation-Based Study on Securing Data Sharing for Situational Awareness in a Port Accident Case
by Juhani Latvakoski, Adil Umer, Topias Nykänen, Jyrki Tihinen and Aleksi Talman
Systems 2024, 12(10), 389; https://doi.org/10.3390/systems12100389 - 25 Sep 2024
Viewed by 568
Abstract
The cyber–physical systems (CPSs) of various stakeholders from the mobility, logistics, and security sectors are needed to enable smart and secure situational awareness operations in a port environment. The motivation for this research arises from the challenges caused by some unexpected events, such [...] Read more.
The cyber–physical systems (CPSs) of various stakeholders from the mobility, logistics, and security sectors are needed to enable smart and secure situational awareness operations in a port environment. The motivation for this research arises from the challenges caused by some unexpected events, such as accidents, in such a multi-stakeholder critical environment. Due to the scale, complexity, and cost and safety challenges, a simulation-based approach was selected as the basis for the study. Prototype-level experimental solutions for dataspaces for secure data sharing and visualization of situational awareness were developed. The secure data-sharing solution relies on the application of verifiable credentials (VCs) to ensure that data consumers have the required access rights to the data/information shared by the data prosumer. A 3D virtual digital twin model is applied for visualizing situational awareness for people in the port. The solutions were evaluated in a simulation-based execution of an accident scenario where a forklift catches fire while loading a docked ship in a port environment. The simulation-based approach and the provided solutions proved to be practical and enabled the smooth study of disaster-type situations. The realized concept of dataspaces is successfully applied here for both daily routine operations and information sharing during accidents in the simulation-based environment. During the evaluation, needs for future research related to perception, comprehension, projection, trust, and security as well as performance and quality of experience were detected. Especially, distributed and secure viewpoints of objects and stakeholders toward real-time situational awareness seem to require further studies. Full article
Show Figures

Figure 1

Figure 1
<p>A view to the main research question—a sample view of the problems of secure data sharing for situational awareness of a critical CPS area. The situational awareness representation in the figure is based on the Endsley model [<a href="#B11-systems-12-00389" class="html-bibr">11</a>].</p>
Full article ">Figure 2
<p>Sequence diagram depicting the sequence of events to handle a port accident scenario: forklift catches fire while loading a docked ship.</p>
Full article ">Figure 3
<p>Core components of a dataspace.</p>
Full article ">Figure 4
<p>Data exchange between a provider and a consumer happens in a peer-to-peer fashion. The provider enforces data usage policies before transferring data to the consumer. The data exchange transaction is recorded to the logging service by both the provider and the consumer, which could be used for conflict resolution in the future.</p>
Full article ">Figure 5
<p>A view to securing situational awareness.</p>
Full article ">Figure 6
<p>Dataspace core architecture. The technical environment of each dataspace participant includes a data asset layer, web application programing interfaces with access and usage policies, a local catalog of data offerings, self-description of the participant itself and their offerings, a verifiable credentials service, and a credential wallet. Moreover, dataspace federation services include the verifiable credentials service, a message broker hub, a registry service, and a federated catalog service.</p>
Full article ">Figure 7
<p>Flow of acquiring dataspace membership.</p>
Full article ">Figure 8
<p>Synchronization of the federated catalog with the local catalog of a data provider.</p>
Full article ">Figure 9
<p>Process of data exchange contract between the data provider and the consumer.</p>
Full article ">Figure 10
<p>Process of data exchange between the data provider and the consumer.</p>
Full article ">Figure 11
<p>Catalog list example of a data provider.</p>
Full article ">Figure 12
<p>Form to create a data catalog entry.</p>
Full article ">Figure 13
<p>Image of the basic harbor photogrammetry mesh with no textures highlighted inside Blender.</p>
Full article ">Figure 14
<p>A view to the 3D model of the Oulu Port area inside the Unity engine.</p>
Full article ">Figure 15
<p>Unity editor view of Sim Object Data script and its associated variables on a simulation object. For simplicity, variables only handled as integers and strings.</p>
Full article ">Figure 16
<p>Simulated emergency services stakeholder inside Unity. Shows the data received by the emergency services from other stakeholders at emergency level 4.</p>
Full article ">Figure 17
<p>Snippet of scenario manager script defining what happens at phase four of the scenario.</p>
Full article ">Figure 18
<p>Snippet from the data manager script.</p>
Full article ">Figure 19
<p>Basic overview of the player view and user interface.</p>
Full article ">Figure 20
<p>Dashboard application landing page.</p>
Full article ">Figure 21
<p>Supervisory view of the map of the Port of Oulu with markers.</p>
Full article ">Figure 22
<p>Pop-up with the attributes of a map marker.</p>
Full article ">Figure 23
<p>A view of the simulation set-up for validation. The upper part shows digital twin of the simulation set-up, with the port environment view, simulated user interface of a single person acting with a vehicle, and supervisory dashboard showing the presence and locations of the physical assets included in the simulation. The lower part visualizes the five simulated stakeholders’ systems and federated dataspace services for data sharing required by the execution of the port accident scenario.</p>
Full article ">Figure 24
<p>A sample dataspace membership-related verifiable credential within the OpenID Connect log in endpoint.</p>
Full article ">
24 pages, 732 KiB  
Article
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
by Neder Karmous, Mohamed Ould-Elhassen Aoueileyine, Manel Abdelkader, Lamia Romdhani and Neji Youssef
Sensors 2024, 24(15), 5022; https://doi.org/10.3390/s24155022 - 3 Aug 2024
Cited by 1 | Viewed by 1034
Abstract
The number of connected devices or Internet of Things (IoT) devices has rapidly increased. According to the latest available statistics, in 2023, there were approximately 17.2 billion connected IoT devices; this is expected to reach 25.4 billion IoT devices by 2030 and grow [...] Read more.
The number of connected devices or Internet of Things (IoT) devices has rapidly increased. According to the latest available statistics, in 2023, there were approximately 17.2 billion connected IoT devices; this is expected to reach 25.4 billion IoT devices by 2030 and grow year over year for the foreseeable future. IoT devices share, collect, and exchange data via the internet, wireless networks, or other networks with one another. IoT interconnection technology improves and facilitates people’s lives but, at the same time, poses a real threat to their security. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks are considered the most common and threatening attacks that strike IoT devices’ security. These are considered to be an increasing trend, and it will be a major challenge to reduce risk, especially in the future. In this context, this paper presents an improved framework (SDN-ML-IoT) that works as an Intrusion and Prevention Detection System (IDPS) that could help to detect DDoS attacks with more efficiency and mitigate them in real time. This SDN-ML-IoT uses a Machine Learning (ML) method in a Software-Defined Networking (SDN) environment in order to protect smart home IoT devices from DDoS attacks. We employed an ML method based on Random Forest (RF), Logistic Regression (LR), k-Nearest Neighbors (kNN), and Naive Bayes (NB) with a One-versus-Rest (OvR) strategy and then compared our work to other related works. Based on the performance metrics, such as confusion matrix, training time, prediction time, accuracy, and Area Under the Receiver Operating Characteristic curve (AUC-ROC), it was established that SDN-ML-IoT, when applied to RF, outperforms other ML algorithms, as well as similar approaches related to our work. It had an impressive accuracy of 99.99%, and it could mitigate DDoS attacks in less than 3 s. We conducted a comparative analysis of various models and algorithms used in the related works. The results indicated that our proposed approach outperforms others, showcasing its effectiveness in both detecting and mitigating DDoS attacks within SDNs. Based on these promising results, we have opted to deploy SDN-ML-IoT within the SDN. This implementation ensures the safeguarding of IoT devices in smart homes against DDoS attacks within the network traffic. Full article
(This article belongs to the Special Issue AI Technology for Cybersecurity and IoT Applications)
Show Figures

Figure 1

Figure 1
<p>IoT device subscribes to a specific topic from the host publisher.</p>
Full article ">Figure 2
<p>IoT device publishes a message to a specific topic for subscriber hosts.</p>
Full article ">Figure 3
<p>DDoS attacks in SDN.</p>
Full article ">Figure 4
<p>ML-based SDN Ryu controller framework for securing smart homes.</p>
Full article ">Figure 5
<p>DDoS attack label details.</p>
Full article ">Figure 6
<p>Top ten features selection using RFE module.</p>
Full article ">Figure 7
<p>Activity diagram of SDN-ML-IoT method to monitor traffic.</p>
Full article ">Figure 8
<p>Subscribe to legitimate traffic for smart coffee IoT device.</p>
Full article ">Figure 9
<p>Temperature and humidity IoT device publishes legitimate traffic.</p>
Full article ">Figure 10
<p>Detecting DDoS attacks targeting IoT devices.</p>
Full article ">Figure 11
<p>Mitigating DDoS attacks targeting IoT devices.</p>
Full article ">
21 pages, 3111 KiB  
Article
Transforming E-Commerce Logistics: Sustainable Practices through Autonomous Maritime and Last-Mile Transportation Solutions
by Nistor Andrei, Cezar Scarlat and Alexandra Ioanid
Logistics 2024, 8(3), 71; https://doi.org/10.3390/logistics8030071 - 15 Jul 2024
Cited by 1 | Viewed by 1363
Abstract
The logistics landscape in e-commerce is undergoing a profound transformation toward sustainability and autonomy. This paper explores the implementation of autonomous maritime and last-mile transportation solutions to optimize the entire logistics chain from factory to customer. Building on the lessons learned from the [...] Read more.
The logistics landscape in e-commerce is undergoing a profound transformation toward sustainability and autonomy. This paper explores the implementation of autonomous maritime and last-mile transportation solutions to optimize the entire logistics chain from factory to customer. Building on the lessons learned from the maritime industry’s digital transformation, the study identifies key features and proposes a forward-looking autonomous maritime and last-mile transportation system. Emphasizing the role of geospatial technologies, the proposed system employs GIS-based electronic route optimization for efficient goods delivery, integrating onboard and ashore GIS-based sensors for enhanced location precision. A case study was built to analyze the implementation of autonomous means of transport along the route of a product from factory to customer. The integration of autonomous systems shows substantial improvements in logistics performance. Synchromodal logistics and smart steaming techniques can be utilized to optimize transportation routes, resulting in reduced fuel consumption and emissions. The findings reveal that autonomous maritime and last-mile transport systems can significantly enhance the efficiency, flexibility and sustainability of e-commerce logistics. The study emphasizes the need for advanced technological integration and provides a comprehensive framework for future research and practical applications in the logistics industry. Full article
(This article belongs to the Special Issue Sustainable E-commerce, Supply Chains and Logistics)
Show Figures

Figure 1

Figure 1
<p>Transportation process of goods, divided into segments.</p>
Full article ">Figure 2
<p>Vessel traffic system components and the interactions between them and the subcomponents [<a href="#B24-logistics-08-00071" class="html-bibr">24</a>].</p>
Full article ">Figure 3
<p>Vessel traffic system bow sensor coverage requirements.</p>
Full article ">Figure 4
<p>The proposed architecture for the recurrent neural network [<a href="#B24-logistics-08-00071" class="html-bibr">24</a>].</p>
Full article ">Figure 5
<p>The flowchart diagram illustrating the calculation algorithm, and the process in each layer of the proposed RNN.</p>
Full article ">Figure 6
<p>The proposed architecture for the federated network.</p>
Full article ">Figure 7
<p>Flowchart for multi-modal delivery network.</p>
Full article ">Figure 8
<p>Diagram that illustrates cybersecurity measures for autonomous transportation means.</p>
Full article ">
16 pages, 6613 KiB  
Article
Innovative AI-Enhanced Ice Detection System Using Graphene-Based Sensors for Enhanced Aviation Safety and Efficiency
by Dario Farina, Hatim Machrafi, Patrick Queeckers, Patrice D. Dongo and Carlo Saverio Iorio
Nanomaterials 2024, 14(13), 1135; https://doi.org/10.3390/nano14131135 - 1 Jul 2024
Viewed by 1129
Abstract
Ice formation on aircraft surfaces poses significant safety risks, and current detection systems often struggle to provide accurate, real-time predictions. This paper presents the development and comprehensive evaluation of a smart ice control system using a suite of machine learning models. The system [...] Read more.
Ice formation on aircraft surfaces poses significant safety risks, and current detection systems often struggle to provide accurate, real-time predictions. This paper presents the development and comprehensive evaluation of a smart ice control system using a suite of machine learning models. The system utilizes various sensors to detect temperature anomalies and signal potential ice formation. We trained and tested supervised learning models (Logistic Regression, Support Vector Machine, and Random Forest), unsupervised learning models (K-Means Clustering), and neural networks (Multilayer Perceptron) to predict and identify ice formation patterns. The experimental results demonstrate that our smart system, driven by machine learning, accurately predicts ice formation in real time, optimizes deicing processes, and enhances safety while reducing power consumption. This solution holds the potential for improving ice detection accuracy in aviation and other critical industries requiring robust predictive maintenance. Full article
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Setup of the graphene-based ice detection system. (<b>b</b>) Flowchart of the smart ice detection and control system.</p>
Full article ">Figure 2
<p>Temperature profiles captured via thermocouples: (<b>a</b>) Icing formation with stages like supercooled water and latent heat release annotated. (<b>b</b>) Temperature profile indicating ice detection and subsequent melting via resistance activation. (<b>c</b>) Cyclic phases have no ice formation. (<b>d</b>) Temperature profiles without ice formation.</p>
Full article ">Figure 3
<p>Schematic of the smart ice detection and control system illustrating the connections between the Arduino Mega 2560, Raspberry Pi, relays, temperature sensors, and graphene resistance heating element.</p>
Full article ">Figure 4
<p>(<b>a</b>) Definition of peak properties. (<b>b</b>) Ice detection point.</p>
Full article ">Figure 5
<p>Ice detection using K-Means algorithm.</p>
Full article ">Figure 6
<p>(<b>a</b>) Sensor output showing temperature data and ice detection indication in the Python 3.7 shell. (<b>b</b>) Temperature profiles with Temp1 (red line) and Temp2 (blue line); the circled area indicates ice formation. (<b>c</b>) LCD display and blue LED light confirming ice detection. (<b>d</b>) Prepreg setup with visible ice formation over the sensing area illustrating the graphene-based sensors’ ability to detect ice.</p>
Full article ">Figure 7
<p>Heatmap comparing the performance of six machine learning algorithms across four metrics.</p>
Full article ">Figure 8
<p>Receiver Operating Characteristic curve for all classifier models.</p>
Full article ">
19 pages, 6054 KiB  
Article
Smart Electric Three-Wheeled Unit for the Manufacturing Industry
by Juraj Kováč, Peter Malega and Jozef Svetlík
Appl. Sci. 2024, 14(11), 4933; https://doi.org/10.3390/app14114933 - 6 Jun 2024
Viewed by 688
Abstract
This article presents the design of a smart three-wheeled unit for the manufacturing industry with the aim of optimizing and automating internal logistical processes. It presents an innovative solution that combines the advantages of mobility, intelligent transportation technology, and smart devices to ensure [...] Read more.
This article presents the design of a smart three-wheeled unit for the manufacturing industry with the aim of optimizing and automating internal logistical processes. It presents an innovative solution that combines the advantages of mobility, intelligent transportation technology, and smart devices to ensure the efficient movement of materials and raw materials in manufacturing facilities. The article describes the design, production, and testing of the tricycle in a real manufacturing environment of the production system and the testing of the proposed smart devices. It evaluates the advantages of the electric smart tricycle, including increased efficiency, reduced costs, and more flexible production processes. The results of this study suggest that the intelligent three-wheeled unit represents a promising technological innovation with the potential to increase competitiveness and productivity in manufacturing enterprises. Full article
Show Figures

Figure 1

Figure 1
<p>First version of the frame. Reprinted with permission from Ref. [<a href="#B31-applsci-14-04933" class="html-bibr">31</a>]. Copyright 2020 Lukáč, M.: Design of an intelligent three-wheeled unit for the manufacturing industry.</p>
Full article ">Figure 2
<p>Second version of the frame.</p>
Full article ">Figure 3
<p>Height of the fork holder placement.</p>
Full article ">Figure 4
<p>Placement of the seat. Reprinted with permission from Ref. [<a href="#B31-applsci-14-04933" class="html-bibr">31</a>]. Copyright 2020 Lukáč, M.: Design of an intelligent three-wheeled unit for the manufacturing industry.</p>
Full article ">Figure 5
<p>Placement of the motor holder.</p>
Full article ">Figure 6
<p>Motor holder drawing. Reprinted with permission from Ref. [<a href="#B31-applsci-14-04933" class="html-bibr">31</a>]. Copyright 2020 Lukáč, M.: Design of an intelligent three-wheeled unit for the manufacturing industry. Legend to <a href="#applsci-14-04933-f006" class="html-fig">Figure 6</a>: A—the arms of the holder; B, C—internal reinforcements of the holder; D—clamping eye.</p>
Full article ">Figure 7
<p>Control unit and Bafang 750 W BBS-02 motor (Suzhou Bafang Electric Motor Science—Technology Co., Ltd., Suzhou, China).</p>
Full article ">Figure 8
<p>Rear 22-tooth wheel.</p>
Full article ">Figure 9
<p>Rear wheels.</p>
Full article ">Figure 10
<p>Part of the rear shaft.</p>
Full article ">Figure 11
<p>Bearing housing.</p>
Full article ">Figure 12
<p>Shaft and rear bearing. Reprinted with permission from Ref. [<a href="#B31-applsci-14-04933" class="html-bibr">31</a>]. Copyright 2020 Lukáč, M.: Design of an intelligent three-wheeled unit for the manufacturing industry.</p>
Full article ">Figure 13
<p>Rear shaft—drive part. Reprinted with permission from Ref. [<a href="#B31-applsci-14-04933" class="html-bibr">31</a>]. Copyright 2020 Lukáč, M.: Design of an intelligent three-wheeled unit for the manufacturing industry.</p>
Full article ">Figure 14
<p>Three-dimensional model of the tricycle’s construction and its physical realization. Reprinted with permission from Ref. [<a href="#B31-applsci-14-04933" class="html-bibr">31</a>]. Copyright 2020 Lukáč, M.: Design of an intelligent three-wheeled unit for the manufacturing industry.</p>
Full article ">Figure 15
<p>Display device.</p>
Full article ">Figure 16
<p>Environmental sensors.</p>
Full article ">Figure 17
<p>Front camera—Mio MiVue 788.</p>
Full article ">Figure 18
<p>Rear camera—Mio MiVue A30.</p>
Full article ">Figure 19
<p>Tensometric sensor.</p>
Full article ">Figure 20
<p>Testing the tricycle at the Technical University of Košice.</p>
Full article ">Figure 21
<p>Testing tensometric sensors during material transportation.</p>
Full article ">
16 pages, 1888 KiB  
Article
Detecting False Data Injection Attacks Using Machine Learning-Based Approaches for Smart Grid Networks
by MD Jainul Abudin, Surmila Thokchom, R. T. Naayagi and Gayadhar Panda
Appl. Sci. 2024, 14(11), 4764; https://doi.org/10.3390/app14114764 - 31 May 2024
Cited by 1 | Viewed by 1011
Abstract
Current electricity sectors will be unable to keep up with commercial and residential customers’ increasing demand for data-enabled power systems. Therefore, next-generation power systems must be developed. It is possible for the smart grid, an advanced power system of the future, to make [...] Read more.
Current electricity sectors will be unable to keep up with commercial and residential customers’ increasing demand for data-enabled power systems. Therefore, next-generation power systems must be developed. It is possible for the smart grid, an advanced power system of the future, to make decisions, estimate loads, and execute other data-related jobs. Customers can adjust their needs in smart grid systems by monitoring bill information. Due to their reliance on data networks, smart grids are vulnerable to cyberattacks that could compromise billing data and cause power outages and other problems. A false data injection attack (FDIA) is a significant attack that targets the corruption of state estimation vectors. The primary goal of this paper is to show the impact of an FDIA attack on a power dataset and to use machine learning algorithms to detect the attack; to achieve this, the Python software is used. In the experiment, we used the power dataset from the IoT server of a 10 KV solar PV system (to mimic a smart grid system) in a controlled laboratory environment to test the effect of FDIA and detect this anomaly using a machine learning approach. Different machine learning models were used to detect the attack and find the most suitable approach to achieve this goal. This paper compares machine learning algorithms (such as random forest, isolation forest, logistic regression, decision tree, autoencoder, and feed-forward neural network) in terms of their effectiveness in detecting false data injection attacks (FDIAs). The highest F1 score of 0.99 was achieved by the decision tree algorithm, which was closely followed by the logistic regression method, which had an F1 score of 0.98. These algorithms also demonstrated high precision, recall, and model accuracy, demonstrating their efficacy in detecting FDIAs. The research presented in this paper indicates that combining logistic regression and decision tree in an ensemble leads to significant performance enhancements. The resulting model achieves an impressive accuracy of 0.99, a precision of 1, and an F1 score of 1. Full article
(This article belongs to the Special Issue Electric Power Applications II)
Show Figures

Figure 1

Figure 1
<p>Cyberattack scenario in smart grid.</p>
Full article ">Figure 2
<p>Machine learning process [<a href="#B18-applsci-14-04764" class="html-bibr">18</a>,<a href="#B19-applsci-14-04764" class="html-bibr">19</a>,<a href="#B20-applsci-14-04764" class="html-bibr">20</a>].</p>
Full article ">Figure 3
<p>The steps involved in the overall process.</p>
Full article ">Figure 4
<p>Voltage magnitude before attack.</p>
Full article ">Figure 5
<p>The voltage magnitude curve after the attack.</p>
Full article ">Figure 6
<p>A snapshot (output figure from Python interface) of the Gp3Ph (grid power three-phase) curve before and after the attack.</p>
Full article ">Figure 7
<p>Performance evaluation.</p>
Full article ">
17 pages, 2381 KiB  
Article
Deep Neural Network-Based Smart Grid Stability Analysis: Enhancing Grid Resilience and Performance
by Pranobjyoti Lahon, Aditya Bihar Kandali, Utpal Barman, Ruhit Jyoti Konwar, Debdeep Saha and Manob Jyoti Saikia
Energies 2024, 17(11), 2642; https://doi.org/10.3390/en17112642 - 29 May 2024
Cited by 1 | Viewed by 1021
Abstract
With the surge in population growth, the demand for electricity has escalated, necessitating efficient solutions to enhance the reliability and security of electrical systems. Smart grids, functioning as self-sufficient systems, offer a promising avenue by facilitating bi-directional communication between producers and consumers. Ensuring [...] Read more.
With the surge in population growth, the demand for electricity has escalated, necessitating efficient solutions to enhance the reliability and security of electrical systems. Smart grids, functioning as self-sufficient systems, offer a promising avenue by facilitating bi-directional communication between producers and consumers. Ensuring the stability and predictability of smart grid operations is paramount to evaluating their efficacy and usability. Machine learning emerges as a crucial tool for decision-making amidst fluctuating consumer demand and power supplies, thereby bolstering the stability and reliability of smart grids. This study explores the performance of various machine learning classifiers in predicting the stability of smart grid systems. Utilizing a smart grid dataset obtained from the University of California’s machine learning repository, classifiers such as logistic regression (LR), XGBoost, linear support vector machine (Linear SVM), and SVM with radial basis function (SVM-RBF) were evaluated. Evaluation metrics, including accuracy, precision, recall, and F1 score, were employed to assess classifier performance. The results demonstrate high accuracy across all models, with the Deep Neural Network (DNN) model achieving the highest accuracy of 99.5%. Additionally, LR, linear SVM, and SVM-RBF exhibited comparable accuracy levels of 98.9%, highlighting their efficacy in smart grid stability prediction. These findings underscore the utility of machine learning techniques in enhancing the reliability and efficiency of smart grid systems. Full article
(This article belongs to the Section A1: Smart Grids and Microgrids)
Show Figures

Figure 1

Figure 1
<p>Proposed methodology.</p>
Full article ">Figure 2
<p>Four-node star network.</p>
Full article ">Figure 3
<p>Feature Importance for Smart Grid Stability.</p>
Full article ">Figure 4
<p>Plot of stable and unstable smart grid features.</p>
Full article ">Figure 5
<p>The DNN structure for stability analysis of a smart grid.</p>
Full article ">Figure 6
<p>Graphical views of the result analysis of logistic regression, XGBoost, and SVM for the stability of the smart grid.</p>
Full article ">Figure 7
<p>Training and testing accuracy and loss of DNN for smart grid stability analysis.</p>
Full article ">
15 pages, 8702 KiB  
Article
Enhanced Scheduling of AI Applications in Multi-Tenant Cloud Using Genetic Optimizations
by Seokmin Kwon and Hyokyung Bahn
Appl. Sci. 2024, 14(11), 4697; https://doi.org/10.3390/app14114697 - 29 May 2024
Viewed by 978
Abstract
The artificial intelligence (AI) industry is increasingly integrating with diverse sectors such as smart logistics, FinTech, entertainment, and cloud computing. This expansion has led to the coexistence of heterogeneous applications within multi-tenant systems, presenting significant scheduling challenges. This paper addresses these challenges by [...] Read more.
The artificial intelligence (AI) industry is increasingly integrating with diverse sectors such as smart logistics, FinTech, entertainment, and cloud computing. This expansion has led to the coexistence of heterogeneous applications within multi-tenant systems, presenting significant scheduling challenges. This paper addresses these challenges by exploring the scheduling of various machine learning workloads in large-scale, multi-tenant cloud systems that utilize heterogeneous GPUs. Traditional scheduling strategies often struggle to achieve satisfactory results due to low GPU utilization in these complex environments. To address this issue, we propose a novel scheduling approach that employs a genetic optimization technique, implemented within a process-oriented discrete-event simulation framework, to effectively orchestrate various machine learning tasks. We evaluate our approach using workload traces from Alibaba’s MLaaS cluster with over 6000 heterogeneous GPUs. The results show that our scheduling improves GPU utilization by 12.8% compared to Round-Robin scheduling, demonstrating the effectiveness of the solution in optimizing cloud-based GPU scheduling. Full article
(This article belongs to the Special Issue Artificial Intelligence Applications in Industry)
Show Figures

Figure 1

Figure 1
<p>The basic architecture of the proposed scheduling system.</p>
Full article ">Figure 2
<p>Hierarchical structure of jobs, tasks, and task instances in our scheduling.</p>
Full article ">Figure 3
<p>Overview of proposed genetic algorithm.</p>
Full article ">Figure 4
<p>Encoding of our genetic algorithm.</p>
Full article ">Figure 5
<p>Fitness value as population size is varied.</p>
Full article ">Figure 5 Cont.
<p>Fitness value as population size is varied.</p>
Full article ">Figure 6
<p>Tournament selection used in our genetic algorithm.</p>
Full article ">Figure 7
<p>Crossover and mutation operations used in our genetic algorithms.</p>
Full article ">Figure 8
<p>Fitness value as crossover operation is varied.</p>
Full article ">Figure 9
<p>Fitness values of proposed genetic algorithm as generation evolves.</p>
Full article ">Figure 10
<p>Comparison of GPU utilization.</p>
Full article ">Figure 11
<p>Comparison of completion time.</p>
Full article ">Figure 12
<p>Average slowdown as scheduling algorithm is varied.</p>
Full article ">
30 pages, 5234 KiB  
Article
Optimizing Last-Mile Delivery: A Multi-Criteria Approach with Automated Smart Lockers, Capillary Distribution and Crowdshipping
by Bartosz Sawik
Logistics 2024, 8(2), 52; https://doi.org/10.3390/logistics8020052 - 8 May 2024
Cited by 3 | Viewed by 4374
Abstract
Background: This publication presents a review, multiple criteria optimization models, and a practical example pertaining to the integration of automated smart locker systems, capillary distribution networks, crowdshipping, last-mile delivery and supply chain management. This publication addresses challenges in logistics and transportation, aiming [...] Read more.
Background: This publication presents a review, multiple criteria optimization models, and a practical example pertaining to the integration of automated smart locker systems, capillary distribution networks, crowdshipping, last-mile delivery and supply chain management. This publication addresses challenges in logistics and transportation, aiming to enhance efficiency, reduce costs and improve customer satisfaction. This study integrates automated smart locker systems, capillary distribution networks, crowdshipping, last-mile delivery and supply chain management. Methods: A review of the existing literature synthesizes key concepts, such as facility location problems, vehicle routing problems and the mathematical programming approach, to optimize supply chain operations. Conceptual optimization models are formulated to solve the complex decision-making process involved in last-mile delivery, considering multiple objectives, including cost minimization, delivery time optimization, service level minimization, capacity optimization, vehicle minimization and resource utilization. Results: The multiple criteria approaches combine the vehicle routing problem and facility location problem, demonstrating the practical applicability of the proposed methodology in a real-world case study within a logistics company. Conclusions: The execution of multi-criteria models optimizes automated smart locker deployment, capillary distribution design, crowdshipping and last-mile delivery strategies, showcasing its effectiveness in the logistics sector. Full article
Show Figures

Figure 1

Figure 1
<p>Automated smart lockers for package delivery.</p>
Full article ">Figure 2
<p>Automated smart lockers for: books (<b>a</b>), flowers (<b>b</b>), food (<b>c</b>) and laundry (<b>d</b>) delivery.</p>
Full article ">Figure 3
<p>Example of the automated smart locker location of the facility location problem, taking only into account the distance from the distribution facility to the customer.</p>
Full article ">Figure 4
<p>Demography density of the city of Wroclaw, Poland.</p>
Full article ">Figure 5
<p>Monthly expected demand representation.</p>
Full article ">Figure 6
<p>Population and e-shopper growth.</p>
Full article ">Figure 7
<p>Number of automated smart locker users.</p>
Full article ">Figure 8
<p>Parcel demand evolution.</p>
Full article ">Figure 9
<p>Evolution of the number of lockers.</p>
Full article ">Figure 10
<p>Opening cost evolution.</p>
Full article ">Figure 11
<p>Closing cost evolution.</p>
Full article ">Figure 12
<p>Cost of locker maintenance.</p>
Full article ">Figure 13
<p>Service cost evolution.</p>
Full article ">Figure 14
<p>Distribution of the total costs.</p>
Full article ">Figure 15
<p>Total cost evolution.</p>
Full article ">
445 KiB  
Proceeding Paper
Agroforestry as a Climate-Smart Strategy: Examining the Factors Affecting Farmers’ Adoption
by Md. Manik Ali, Abinash Chandra Pal, Md. Shafiqul Bari, Md. Lutfor Rahman and Israt Jahan Sarmin
Biol. Life Sci. Forum 2024, 30(1), 29; https://doi.org/10.3390/IOCAG2023-17340 - 18 Apr 2024
Viewed by 458
Abstract
Agroforestry production systems have shown growing adoption in Bangladesh, offering ecological and economic benefits in the face of climate change. This study investigates the scale of agroforestry adoption, investment returns, factors influencing uptake, and challenges faced by farmers. Using a multistage random sample [...] Read more.
Agroforestry production systems have shown growing adoption in Bangladesh, offering ecological and economic benefits in the face of climate change. This study investigates the scale of agroforestry adoption, investment returns, factors influencing uptake, and challenges faced by farmers. Using a multistage random sample of 340 respondents, we find that while 75% of farmers are aware of agroforestry, adoption remains limited. Our analysis focuses on specific tree–crop combinations favored by farmers as agroforestry practices. The results demonstrate that, in cropland agroforestry, Eucalyptus tree with rice (69.05% adoption rate) is predominant, while homestead/orchard system agroforestry favors mango tree intercropped with potato (73.33%). Financial and investment analyses using Benefit–Cost Ratio (BCR), Net Present Value (NPV), and Internal Rate of Return (IRR) prove that agroforestry is a more favorable alternative for farmers considering adoption, as it provides superior BCR, NPV, and IRR. For example, litchi-based agroforestry systems with vegetables like brinjal (eggplant), potato, and chilies offer higher NPVs (19.00, 19.73, and 18.46, respectively) and IRRs (54.45, 68.00, and 47.19, respectively) compared to monocropping where NPV was 14.38. A binary logistic model reveals that larger farm sizes, younger respondents, higher education levels, training experiences, more frequent extension visits, and improved market access positively influence agroforestry adoption. The study also identifies key challenges for farmers using the Problem Facing Index (PFI). The most significant obstacles include lack of training facilities (PFI-894), shortage of skilled labor (PFI-687), and insufficient technical expertise (PFI-647). Therefore, to promote wider adoption, targeted training programs that address the identified challenges are crucial. It will empower farmers to reap the tangible benefits of agroforestry as a sustainable and climate-smart agricultural practice. Full article
(This article belongs to the Proceedings of The 2nd International Online Conference on Agriculture)
Show Figures

Figure 1

Figure 1
<p>Graph showing different problems faced by the farmers for agroforestry adoption. Notes: 1= less productive than a monoculture; 2 = insects and pests are harbored; 3 = allelopathic impact; 4 = land damaged by quickly spreading roots; 5 = trees falling on crops; 6 = absence of skilled labor; 7 = inadequate facilities’ training; 8 = lack of land availability; 9 = issues with thieves; 10 = absence of marketing infrastructure; 11 = insufficient expertise and technical assistance; 12 = lack of access to high-quality seedlings; and 13 = absence of quality fungicides, insecticides, and fertilizers.</p>
Full article ">
22 pages, 5812 KiB  
Article
Multi-Objective Task-Aware Offloading and Scheduling Framework for Internet of Things Logistics
by Asif Umer, Mushtaq Ali, Ali Imran Jehangiri, Muhammad Bilal and Junaid Shuja
Sensors 2024, 24(8), 2381; https://doi.org/10.3390/s24082381 - 9 Apr 2024
Cited by 2 | Viewed by 1064
Abstract
IoT-based smart transportation monitors vehicles, cargo, and driver statuses for safe movement. Due to the limited computational capabilities of the sensors, the IoT devices require powerful remote servers to execute their tasks, and this phenomenon is called task offloading. Researchers have developed efficient [...] Read more.
IoT-based smart transportation monitors vehicles, cargo, and driver statuses for safe movement. Due to the limited computational capabilities of the sensors, the IoT devices require powerful remote servers to execute their tasks, and this phenomenon is called task offloading. Researchers have developed efficient task offloading and scheduling mechanisms for IoT devices to reduce energy consumption and response time. However, most research has not considered fault-tolerance-based job allocation for IoT logistics trucks, task and data-aware scheduling, priority-based task offloading, or multiple-parameter-based fog node selection. To overcome the limitations, we proposed a Multi-Objective Task-Aware Offloading and Scheduling Framework for IoT Logistics (MT-OSF). The proposed model prioritizes the tasks into delay-sensitive and computation-intensive tasks using a priority-based offloader and forwards the two lists to the Task-Aware Scheduler (TAS) for further processing on fog and cloud nodes. The Task-Aware Scheduler (TAS) uses a multi-criterion decision-making process, i.e., the analytical hierarchy process (AHP), to calculate the fog nodes’ priority for task allocation and scheduling. The AHP decides the fog nodes’ priority based on node energy, bandwidth, RAM, and MIPS power. Similarly, the TAS also calculates the shortest distance between the IoT-enabled vehicle and the fog node to which the IoT tasks are assigned for execution. A task-aware scheduler schedules delay-sensitive tasks on nearby fog nodes while allocating computation-intensive tasks to cloud data centers using the FCFS algorithm. Fault-tolerant manager is used to check task failure; if any task fails, the proposed system re-executes the tasks, and if any fog node fails, the proposed system allocates the tasks to another fog node to reduce the task failure ratio. The proposed model is simulated in iFogSim2 and demonstrates a 7% reduction in response time, 16% reduction in energy consumption, and 22% reduction in task failure ratio in comparison to Ant Colony Optimization and Round Robin. Full article
Show Figures

Figure 1

Figure 1
<p>IoT-enabled vehicle.</p>
Full article ">Figure 2
<p>IoT Task Manager (Smart gateway).</p>
Full article ">Figure 3
<p>AHP for fog priorities calculation.</p>
Full article ">Figure 4
<p>MT-OSF Task-Aware Scheduler.</p>
Full article ">Figure 5
<p>Response time of fog nodes.</p>
Full article ">Figure 6
<p>Response time comparison of computation-intensive tasks on cloud nodes.</p>
Full article ">Figure 7
<p>Energy consumption comparison of delay-sensitive tasks on fog node.</p>
Full article ">Figure 8
<p>Energy consumption of computation-intensive tasks on cloud nodes.</p>
Full article ">Figure 9
<p>IoT task failure ratio with and without fault tolerance.</p>
Full article ">Figure 10
<p>Response time comparison of the proposed model for delay-sensitive tasks.</p>
Full article ">Figure 11
<p>Response time comparison of the proposed model for computation-intensive tasks.</p>
Full article ">Figure 12
<p>Energy consumption comparison of delay-sensitive tasks on fog nodes.</p>
Full article ">Figure 13
<p>Energy consumption of computation-intensive tasks on cloud nodes.</p>
Full article ">
18 pages, 1062 KiB  
Review
Logistics Service Provider Lifecycle Model in Industry 4.0: A Review
by Sunida Tiwong, Manuel Woschank, Sakgasem Ramingwong and Korrakot Yaibuathet Tippayawong
Appl. Sci. 2024, 14(6), 2324; https://doi.org/10.3390/app14062324 - 10 Mar 2024
Cited by 1 | Viewed by 1508
Abstract
Supply chain and logistics management is of tremendous importance for multinational organizations. Logistics Service Providers (LSPs) provide logistics services and smooth logistics operations between suppliers, manufacturers, distributors, and customers. This paper uses a Systematic Literature Review (SLR) to identify the current trends and [...] Read more.
Supply chain and logistics management is of tremendous importance for multinational organizations. Logistics Service Providers (LSPs) provide logistics services and smooth logistics operations between suppliers, manufacturers, distributors, and customers. This paper uses a Systematic Literature Review (SLR) to identify the current trends and future developments of LSPs and the underlying (smart) logistics operations connected to the concept of lifecycle management. An SLR review was conducted to identify relevant research papers in the areas of LSPs and logistics lifecycle management. Out of 288 papers analyzed, 81 were identified as highly appropriate for in-depth analysis. The LSP Lifecycle Model (LSLM) was then developed by combining logistics service characteristics and the lifecycle management concept, including Product Lifecycle Management (PLM), Service Lifecycle Management (SLM), and Product Service System (PSS). The LSLM consists of three phases: The Beginning of Life (BOL), the Middle of Life (MOL), and the End of Life (EOL). The LSLM is characterized by three phases, eight criteria, and seventeen sub-criteria. This paper aims to fulfil customer requirements through a product or service in the whole lifecycle of the logistics service provider. The findings further present an adaptable LSLM by focusing on various logistics services and integrating sustainability factors to meet market trends. Logistics cost factors can also be used to evaluate logistics services in the MOL stage. The EOL shows the trend of risk management, evaluation, and decomposition, which is determined by new or re-designed logistics products and services. Full article
(This article belongs to the Special Issue Digital and Sustainable Manufacturing in Industry 4.0)
Show Figures

Figure 1

Figure 1
<p>Number of papers published in Scopus from 2010 to 2024.</p>
Full article ">Figure 2
<p>The details of the identified literature by country/territory and subject areas.</p>
Full article ">Figure 3
<p>The LSLM criteria and sub-criteria.</p>
Full article ">
21 pages, 2841 KiB  
Article
Detection of Malicious Threats Exploiting Clock-Gating Hardware Using Machine Learning
by Nuri Alperen Kose, Razaq Jinad, Amar Rasheed, Narasimha Shashidhar, Mohamed Baza and Hani Alshahrani
Sensors 2024, 24(3), 983; https://doi.org/10.3390/s24030983 - 2 Feb 2024
Viewed by 1306
Abstract
Embedded system technologies are increasingly being incorporated into manufacturing, smart grid, industrial control systems, and transportation systems. However, the vast majority of today’s embedded platforms lack the support of built-in security features which makes such systems highly vulnerable to a wide range of [...] Read more.
Embedded system technologies are increasingly being incorporated into manufacturing, smart grid, industrial control systems, and transportation systems. However, the vast majority of today’s embedded platforms lack the support of built-in security features which makes such systems highly vulnerable to a wide range of cyber-attacks. Specifically, they are vulnerable to malware injection code that targets the power distribution system of an ARM Cortex-M-based microcontroller chipset (ARM, Cambridge, UK). Through hardware exploitation of the clock-gating distribution system, an attacker is capable of disabling/activating various subsystems on the chip, compromising the reliability of the system during normal operation. This paper proposes the development of an Intrusion Detection System (IDS) capable of detecting clock-gating malware deployed on ARM Cortex-M-based embedded systems. To enhance the robustness and effectiveness of our approach, we fully implemented, tested, and compared six IDSs, each employing different methodologies. These include IDSs based on K-Nearest Classifier, Random Forest, Logistic Regression, Decision Tree, Naive Bayes, and Stochastic Gradient Descent. Each of these IDSs was designed to identify and categorize various variants of clock-gating malware deployed on the system. We have analyzed the performance of these IDSs in terms of detection accuracy against various types of clock-gating malware injection code. Power consumption data collected from the chipset during normal operation and malware code injection attacks were used for models’ training and validation. Our simulation results showed that the proposed IDSs, particularly those based on K-Nearest Classifier and Logistic Regression, were capable of achieving high detection rates, with some reaching a detection rate of 0.99. These results underscore the effectiveness of our IDSs in protecting ARM Cortex-M-based embedded systems against clock-gating malware. Full article
(This article belongs to the Special Issue AI Technology for Cybersecurity and IoT Applications)
Show Figures

Figure 1

Figure 1
<p>System architecture and attack models.</p>
Full article ">Figure 2
<p>Hardware component.</p>
Full article ">Figure 3
<p>Code sample for Power Hungry malware utilizing SIM-SCGC* register contents (Rasheed et al. (2021) [<a href="#B1-sensors-24-00983" class="html-bibr">1</a>]).</p>
Full article ">Figure 4
<p>Code example for disabling PIT-off malware using the contents of SIM-SCGC6 registers (Rasheed et al. (2021) [<a href="#B1-sensors-24-00983" class="html-bibr">1</a>]).</p>
Full article ">Figure 5
<p>Code Example for uart killer malware leveraging SIM-SCGC4 register contents (Rasheed et al. (2021) [<a href="#B1-sensors-24-00983" class="html-bibr">1</a>]).</p>
Full article ">Figure 6
<p>Code sample for <math display="inline"><semantics> <mrow> <msup> <mi>I</mi> <mn>2</mn> </msup> <mi>C</mi> </mrow> </semantics></math> killer malware utilizing SIM-SCGC4 register contents (Rasheed et al. (2021) [<a href="#B1-sensors-24-00983" class="html-bibr">1</a>]).</p>
Full article ">Figure 7
<p>The methodology of the proposed Intrusion Detection System (IDS) for malware detection on embedded systems.</p>
Full article ">Figure 8
<p>Scatter plot of the malware types and normal operations.</p>
Full article ">Figure 9
<p>Decision Tree.</p>
Full article ">Figure 10
<p>K-Nearest Neighbors.</p>
Full article ">Figure 11
<p>Linear Regression.</p>
Full article ">Figure 12
<p>Naive Bayes.</p>
Full article ">Figure 13
<p>Random Forest.</p>
Full article ">Figure 14
<p>Stochastic Gradient Descent.</p>
Full article ">Figure 15
<p>Confusion matrices for machine learning models.</p>
Full article ">
Back to TopTop