IEEE Open Journal of the Computer Society最新文献

筛选
英文 中文
Multivariate Constrained Elastic Matching With Application in Real-Time Energy Disaggregation 多元约束弹性匹配及其在实时能量分解中的应用
IEEE Open Journal of the Computer Society Pub Date : 2025-09-11 DOI: 10.1109/OJCS.2025.3609195
Pascal A. Schirmer;Dimitrios Kolosov;Iosif Mporas
{"title":"Multivariate Constrained Elastic Matching With Application in Real-Time Energy Disaggregation","authors":"Pascal A. Schirmer;Dimitrios Kolosov;Iosif Mporas","doi":"10.1109/OJCS.2025.3609195","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3609195","url":null,"abstract":"Non-Intrusive Load Monitoring (NILM) aims to estimate the power consumption of electrical appliances from the aggregated power consumption. While recent machine learning approaches have demonstrated very high disaggregation accuracies, ensuring real-time capability is crucial in NILM’s hardware implementations. We propose a constrained elastic matching approach for NILM to reduce execution time significantly. Our approach was tested on two datasets (REDD and AMPds2). The reported performance is on average 93.2% in terms of estimation accuracy for deferrable loads using the AMPds2 dataset. The proposed approach reduces execution time by a factor of ten compared to unconstrained elastic matching techniques, achieving per-frame inference times of 3.5–12.1 ms depending on the hardware platform and model size. Memory usage for the largest model is approximately 7.5 MB, and reducing the model to 10% of reference signatures lowers active power consumption from 12.1 W to 5.2 W, representing a 57% energy saving with minimal accuracy loss. Furthermore, the proposed approach has been evaluated on five different microprocessors, demonstrating consistent runtime reduction and enabling real-time implementation of elastic matching based NILM with large reference databases.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1475-1487"},"PeriodicalIF":0.0,"publicationDate":"2025-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11159158","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LightPUF-IIoT: A Lightweight PUF-Based Authentication Scheme With Real-Time Detection of Rogue Devices in Fog-Assisted IIoT Data Sharing LightPUF-IIoT:一种基于puf的轻量级认证方案,可在雾辅助IIoT数据共享中实时检测流氓设备
IEEE Open Journal of the Computer Society Pub Date : 2025-09-09 DOI: 10.1109/OJCS.2025.3607984
Somchart Fugkeaw;Archawit Changtor;Thanabordee Maneerat;Pakapon Rattanasrisuk;Kittipat Tangtanawirut
{"title":"LightPUF-IIoT: A Lightweight PUF-Based Authentication Scheme With Real-Time Detection of Rogue Devices in Fog-Assisted IIoT Data Sharing","authors":"Somchart Fugkeaw;Archawit Changtor;Thanabordee Maneerat;Pakapon Rattanasrisuk;Kittipat Tangtanawirut","doi":"10.1109/OJCS.2025.3607984","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3607984","url":null,"abstract":"The Industrial Internet of Things (IIoT) generates a vast volume of sensitive data that demands not only confidentiality but also authenticity and integrity—especially in large-scale deployments. Ensuring that data originates from trusted devices is critical; however, existing authentication mechanisms often lack scalability and effective revocation support. To address these challenges, we propose <bold>LightPUF-IIoT</b>, a secure and lightweight authentication scheme designed for fog-assisted IIoT data sharing. The scheme leverages <bold>Physical Unclonable Functions (PUFs)</b> and <bold>Non-Interactive Zero-Knowledge Proofs (NIZKPs)</b> to enable scalable, group-based authentication for devices and fog nodes. By binding authenticated identities to cryptographic tokens used during data transmission, LightPUF-IIoT ensures data authenticity and supports real-time rogue device detection. The scheme also includes efficient mechanisms for device revocation and secure token regeneration. Experimental results show that LightPUF-IIoT provides strong security guarantees with minimal resource overhead and significantly outperforms existing approaches in terms of computational cost, scalability, and authentication throughput.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1438-1450"},"PeriodicalIF":0.0,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11153801","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Modal Attention Networks for Multi-Modal Anomaly Detection in System Software 系统软件中多模态异常检测的跨模态注意网络
IEEE Open Journal of the Computer Society Pub Date : 2025-09-09 DOI: 10.1109/OJCS.2025.3607975
Suchuan Xing;Yihan Wang
{"title":"Cross-Modal Attention Networks for Multi-Modal Anomaly Detection in System Software","authors":"Suchuan Xing;Yihan Wang","doi":"10.1109/OJCS.2025.3607975","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3607975","url":null,"abstract":"Anomaly detection in system software traditionally relies on single-modal algorithms that analyze either discrete log events or continuous performance metrics in isolation, potentially missing complex anomalies that manifest across both modalities. We present a novel deep learning framework that leverages cross-modal attention mechanisms to jointly model log sequences and performance metrics for enhanced anomaly detection. Our method proposes Long Short-Term Memory (LSTM) networks to capture temporal dependencies in log event sequences and Temporal Convolutional Networks (TCNs) to model performance metric time series. The core innovation lies in our Cross-Modal Attention Mechanism, which dynamically weighs log events and metric features based on inter-modal relationships, enabling the detection of subtle anomalies that require contextual information from both data sources. Unlike conventional multi-modal fusion techniques that merely concatenate features, our attention mechanism explicitly models the dependencies between log patterns and metric behaviors, allowing the network to focus on relevant log events during metric anomalies and vice versa. We conduct comprehensive experiments on public datasets including HDFS and BGL logs paired with cloud computing performance metrics, as well as real-world cloud environments. Our method achieves significant improvements over single-modal baselines, with F1-scores increasing by 12.3% on average across datasets. Ablation studies confirm the effectiveness of the cross-modal attention mechanism, while real-time deployment experiments using Apache Flink demonstrate practical applicability with sub-second latency. The proposed framework addresses a critical gap in system software monitoring by providing a principled approach to multi-modal anomaly detection that scales to enterprise-level deployments.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1463-1474"},"PeriodicalIF":0.0,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11153984","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Three-Stage Hybrid RIS for Energy-Efficient and High-Performance Wireless Networks 节能和高性能无线网络的自适应三级混合RIS
IEEE Open Journal of the Computer Society Pub Date : 2025-08-28 DOI: 10.1109/OJCS.2025.3603234
Muhammad Iqbal;Tabinda Ashraf;Jen-Yi Pan
{"title":"Adaptive Three-Stage Hybrid RIS for Energy-Efficient and High-Performance Wireless Networks","authors":"Muhammad Iqbal;Tabinda Ashraf;Jen-Yi Pan","doi":"10.1109/OJCS.2025.3603234","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3603234","url":null,"abstract":"Reconfigurable Intelligent Surfaces (RIS) have emerged as a transformative solution for enhancing spectral and energy efficiency in wireless networks. However, conventional RIS architectures, whether passive or active, face significant limitations due to trade-offs involving power consumption, signal amplification, and deployment complexity. This article aims to overcome these limitations by developing an adaptive RIS architecture suitable for diverse transmission conditions. We propose a novel three-stage hybrid RIS system that dynamically switches among active, passive, and dormant modes based on channel quality and transmit power thresholds. A joint optimization framework is developed to enable adaptive mode selection, beamforming, and RIS configuration. This framework integrates mode-aware control logic and fractional programming to maximize system-wide sum-rate performance while minimizing energy consumption. Extensive simulations across varying propagation scenarios confirm that the proposed hybrid RIS outperforms conventional RIS designs in both spectral and energy efficiency. The results show that active mode yields high gains in low-power or obstructed channels, passive mode supports energy-efficient reflection under moderate conditions, and the dormant mode effectively conserves energy in high-power environments. Overall, the three-stage hybrid RIS architecture provides a robust, flexible, and high-performance solution, making it a promising candidate for future 6G wireless systems.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1451-1462"},"PeriodicalIF":0.0,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11142651","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaussian Kernel-Based LSH for High-Dimensional Similarity Search 基于高斯核的LSH高维相似性搜索
IEEE Open Journal of the Computer Society Pub Date : 2025-08-25 DOI: 10.1109/OJCS.2025.3602355
Masrat Rasool;Khelil Kassoul;Samir Brahim Belhaouari
{"title":"Gaussian Kernel-Based LSH for High-Dimensional Similarity Search","authors":"Masrat Rasool;Khelil Kassoul;Samir Brahim Belhaouari","doi":"10.1109/OJCS.2025.3602355","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3602355","url":null,"abstract":"High-dimensional similarity search remains a critical challenge in machine learning, particularly when data lie on complex, non-linear manifolds that undermine the effectiveness of classical Locality-Sensitive Hashing (LSH). This work introduces Gaussian LSH, a kernel-based hashing framework that integrates over-clustering with Gaussian probability density modelling to improve locality preservation while maintaining computational efficiency. The method generates compact binary codes from a hybrid kernel–PDF score and supports scalable GPU-accelerated indexing for large datasets. Empirical evaluations across multiple visual and textual benchmarks demonstrate consistent improvements in recall and query latency compared to representative LSH variants and approximate nearest neighbour libraries. Gaussian LSH achieves recall gains of up to <inline-formula><tex-math>$text{9},text{pp}$</tex-math></inline-formula> and latency reductions of up to <inline-formula><tex-math>$4.3times$</tex-math></inline-formula>, with benefits sustained across a range of code lengths. These results highlight the approach’s scalability and accuracy, supporting its use in medium- to large-scale similarity retrieval tasks across diverse data domains.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1402-1413"},"PeriodicalIF":0.0,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11134766","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TACS-Net: Temporal-Aware Customer Segmentation Network TACS-Net:时间感知客户细分网络
IEEE Open Journal of the Computer Society Pub Date : 2025-08-22 DOI: 10.1109/OJCS.2025.3601668
Abu Sadat Mohammad Shaker;Md Tohidul Islam;A T M Omor Faruq;Hritika Barua;Uland Rozario;M. F. Mridha;Md. Jakir Hossen
{"title":"TACS-Net: Temporal-Aware Customer Segmentation Network","authors":"Abu Sadat Mohammad Shaker;Md Tohidul Islam;A T M Omor Faruq;Hritika Barua;Uland Rozario;M. F. Mridha;Md. Jakir Hossen","doi":"10.1109/OJCS.2025.3601668","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3601668","url":null,"abstract":"Customer segmentation is essential for personalized marketing, customer retention, and strategic decision-making. Traditional segmentation methods, such as k-Means and Gaussian Mixture Models, rely on static features and fail to capture the evolving nature of customer behavior. Existing methods also struggle to account for temporal dynamics, limiting their effectiveness in fast-changing markets. This article proposes TACS-Net, a Temporal-Aware Customer Segmentation Network that dynamically models behavioral shifts using Temporal Convolutional Networks (TCN), Transformers, and a Recurrent Clustering Algorithm (RCA). TACS-Net adapts to changes in customer purchasing patterns over time, offering superior segmentation accuracy and stability. It integrates short- and long-term behavioral modeling, providing a robust, real-time framework for continuous customer profiling. Evaluation on two real-world datasets (CSD1 and CSD2) demonstrates that TACS-Net achieves a silhouette score of 0.55 on CSD1 and 0.54 on CSD2, outperforming traditional baselines. The model also shows higher temporal stability, with 84.3% and 83.7% of customers retaining their segment over one month in CSD1 and CSD2, respectively, compared to 72.1% and 74.0% with k-Means. Explainability analysis using SHAP reveals key factors driving segmentation, such as spending score, purchase frequency, and last purchase amount. While TACS-Net outperforms existing methods in clustering quality and stability, its higher computational cost calls for further optimization.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1426-1437"},"PeriodicalIF":0.0,"publicationDate":"2025-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11134290","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extractive Text Summarization Using Formality of Language 运用语言形式进行文本摘要提取
IEEE Open Journal of the Computer Society Pub Date : 2025-08-20 DOI: 10.1109/OJCS.2025.3600632
Harsh Mehta;Santosh Kumar Bharti;Nishant Doshi
{"title":"Extractive Text Summarization Using Formality of Language","authors":"Harsh Mehta;Santosh Kumar Bharti;Nishant Doshi","doi":"10.1109/OJCS.2025.3600632","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3600632","url":null,"abstract":"Automatic text summarization has been a prominent research topic for over a decade, aiming to distill concise summaries from extensive textual documents. This study introduces a novel approach addressing the intricacies of morphologically rich Indo-Iranian languages. We propose a unique method that leverages linguistic formality to guide summary generation. Building on an existing formality formula designed for English, we adapt and extend it for the structural characteristics of Indo-Iranian languages, which follow the Subject-Object-Verb (SOV) order. Our refined formula demonstrates a 7.28% improvement in formality scores compared to informal texts, validated through statistical significance testing. To assess sentence formality, we use our custom formula alongside additional features such as Shannon entropy scores and numeric token presence, combining these into a comprehensive sentence evaluation metric. Using this framework, we generate extractive summaries of Gujarati texts. Comparative evaluations at 20% and 30% compression ratios reveal that our method outperforms existing baselines, with ROUGE-1 score improvements of 14.63% at 30% and 28.60% at 20% compression. For reproducibility and further exploration, all experimental data and source code are made publicly available.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1414-1425"},"PeriodicalIF":0.0,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11130639","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FERO: Efficient Deep Reinforcement Learning based UAV Obstacle Avoidance at the Edge FERO:基于高效深度强化学习的无人机边缘避障
IEEE Open Journal of the Computer Society Pub Date : 2025-08-20 DOI: 10.1109/OJCS.2025.3600916
Patrick McEnroe;Shen Wang;Madhusanka Liyanage
{"title":"FERO: Efficient Deep Reinforcement Learning based UAV Obstacle Avoidance at the Edge","authors":"Patrick McEnroe;Shen Wang;Madhusanka Liyanage","doi":"10.1109/OJCS.2025.3600916","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3600916","url":null,"abstract":"With the expanding use of unmanned aerial vehicles (UAVs) across various fields, efficient obstacle avoidance has become increasingly crucial. This UAV obstacle avoidance can be achieved through deep reinforcement learning (DRL) algorithms deployed directly on-device (i.e., at the edge). However, practical deployment is constrained by high training time and high inference latency. In this paper, we propose methods to improve DRL-based UAV obstacle avoidance efficiency through improving both training efficiency and inference latency. To reduce inference latency, we employ input dimension reduction, streamlining the state representation to enable faster decision-making. For training time reduction, we leverage transfer learning, allowing the obstacle avoidance models to rapidly adapt to new environments without starting from scratch. To show the generalizability of our methods, we applied them to a discrete action space dueling double deep Q-network (D3QN) model and a continuous action space soft actor critic (SAC) model. Inference results are evaluated on both an NVIDIA Jetson Nano edge device and a NVIDIA Jetson Orin Nano edge device and we propose a combined method called FERO which combines state space reduction, transfer learning, and conversion to TensorRT for optimum deployment on NVIDIA Jetson devices. For our individual methods and combined method, we demonstrate reductions in training and inference times with minimal compromise in obstacle avoidance performance.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1378-1389"},"PeriodicalIF":0.0,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11130910","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Extreme Order Statistics of Multimodal Mixture Distributions for Complexity Analysis of Semi-Steady-State Jaya Algorithm 用多模态混合分布的极值阶统计量分析半稳态Jaya算法的复杂度
IEEE Open Journal of the Computer Society Pub Date : 2025-08-18 DOI: 10.1109/OJCS.2025.3599786
Uday K. Chakraborty;Cezary Z. Janikow
{"title":"Using Extreme Order Statistics of Multimodal Mixture Distributions for Complexity Analysis of Semi-Steady-State Jaya Algorithm","authors":"Uday K. Chakraborty;Cezary Z. Janikow","doi":"10.1109/OJCS.2025.3599786","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3599786","url":null,"abstract":"Computational complexity analysis of an algorithm is an integral part of understanding and applying that algorithm. For stochastic, adaptive heuristics in non-convex optimization, however, complexity analysis is often difficult. This article derives, for the first time in the literature, the complexity of the semi-steady-state Jaya algorithm (which is a recently developed variant of the Jaya algorithm) without the unimodality assumption. The Jaya algorithm, and its improvement, the semi-steady-state Jaya, are among the newest metaheuristics in population-based, nature-inspired optimization methods. In black-box function optimization, stochastic models of evolutionary and non-evolutionary heuristics often study the search process as sampling from distributions that are difficult to estimate. Unimodal distributions used for this purpose are easy to analyze but are necessarily restrictive. In this article, we model multimodality using mixtures of unimodal densities. For multimodal mixtures of uniform densities and, separately, of exponential densities (with different location parameters for the mixture components), analytical expressions, many of them closed-form, are derived for (i) the expectation of the largest order statistic for samples from the mixture; (ii) asymptotics of the above expectation for the large-sample case; (iii) survival probability corresponding to the (asymptotic) expected value of the largest order statistic; and (iv) asymptotics of sums of survival probabilities. The above quantities are used in a stochastic model of the semi-steady-state Jaya algorithm, obtaining the (asymptotic) expectation of the number of updates of the best individual in a population of the algorithm, which in turn is used in the derivation of the computational complexity of the algorithm.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1390-1401"},"PeriodicalIF":0.0,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11127039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Production Lines for Industrial 5.0 Automation: An Intent-Based Approach 面向工业5.0自动化的可重构生产线:基于意图的方法
IEEE Open Journal of the Computer Society Pub Date : 2025-08-14 DOI: 10.1109/OJCS.2025.3599219
Engin Zeydan;Josep Mangues;Suayb S. Arslan;Yekta Turk;Tharaka Hewa;Madhusanka Liyanage;Aidan O'Mahony
{"title":"Reconfigurable Production Lines for Industrial 5.0 Automation: An Intent-Based Approach","authors":"Engin Zeydan;Josep Mangues;Suayb S. Arslan;Yekta Turk;Tharaka Hewa;Madhusanka Liyanage;Aidan O'Mahony","doi":"10.1109/OJCS.2025.3599219","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3599219","url":null,"abstract":"Reconfigurable production lines empowered by an intent-based approach and next-generation wireless networks can be a cornerstone of the transformative Industry 5.0 paradigm. This article presents a novel framework for developing an intent-based reconfigurable production line enriched with blockchain technology. By using blockchain as an enabler for decentralization, the proposed approach aims to integrate security and efficiency into the fabric of industrial automation. Experimental evaluations confirm the effectiveness of the proposed approach (in terms of scalability and latency) and highlight its strengths and potential for improvement. To be more precise, the blockchain systems are 85 to 95 seconds faster than the cloud service for 50 simultaneous transactions and offer around 69% lower latency at maximum utilization with 10 000 events. Important challenges such as integration into the existing infrastructure, security, standardization and energy efficiency are highlighted and recommendations for overcoming these hurdles are also given at the end of the article.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1341-1352"},"PeriodicalIF":0.0,"publicationDate":"2025-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11125895","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信