Mingzhou Yang, Bharat Jayaprakash, Subhankar Ghosh, Hyeonjung Tari Jung, Matthew Eagon, William F. Northrop, Shashi Shekhar
{"title":"Climate smart computing: A perspective","authors":"Mingzhou Yang, Bharat Jayaprakash, Subhankar Ghosh, Hyeonjung Tari Jung, Matthew Eagon, William F. Northrop, Shashi Shekhar","doi":"10.1016/j.pmcj.2025.102019","DOIUrl":"10.1016/j.pmcj.2025.102019","url":null,"abstract":"<div><div>Climate change is a societal grand challenge and many nations have signed the Paris Agreement (2015) aiming for net-zero emissions. The computing community has an opportunity to contribute significantly to addressing climate change across all its dimensions, including understanding, resilience, mitigation, and adaptation. Traditional computing methods face major challenges. For example, machine learning is overwhelmed due to non-stationarity (e.g., climate change), data paucity (e.g., rare climate events), the high cost of ground truth collection, and the need to observe natural laws (e.g., conservation of mass). This paper shares a perspective on a range of climate-smart computing challenges and opportunities based on multi-decade scholarly activities and acknowledges the broader societal debate on climate solutions. Moreover, it envisions advancements in computing methods specifically designed to tackle the challenges posed by climate change. It calls for a broad array of computer science strategies and innovations to be developed to address the multifaceted challenges of climate change.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"108 ","pages":"Article 102019"},"PeriodicalIF":3.0,"publicationDate":"2025-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143395036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Real-time skeleton-based fall detection algorithm based on temporal convolutional networks and transformer encoder","authors":"Xiaoqun Yu , Chenfeng Wang , Wenyu Wu , Shuping Xiong","doi":"10.1016/j.pmcj.2025.102016","DOIUrl":"10.1016/j.pmcj.2025.102016","url":null,"abstract":"<div><div>As the population of older individuals living independently rises, coupled with the heightened risk of falls among this demographic, the need for automatic fall detection systems becomes increasingly urgent to ensure timely medical intervention. Computer vision (CV)-based methodologies have emerged as a preferred approach among researchers due to their contactless and pervasive nature. However, existing CV-based solutions often suffer from either poor robustness or prohibitively high computational requirements, impeding their practical implementation in elderly living environments. To address these challenges, we introduce TCNTE, a real-time skeleton-based fall detection algorithm that combines Temporal Convolutional Network (TCN) with Transformer Encoder (TE). We also successfully mitigate the severe class imbalance issue by implementing weighted focal loss. Cross-validation on multiple publicly available vision-based fall datasets demonstrates TCNTE's superiority over individual models (TCN and TE) and existing state-of-the-art fall detection algorithms, achieving remarkable accuracies (front view of UP-Fall: 99.58 %; side view of UP-Fall: 98.75 %; Le2i: 97.01 %; GMDCSA-24: 92.99 %) alongside practical viability. Visualizations using t-distributed stochastic neighbor embedding (t-SNE) reveal TCNTE's superior separation margin and cohesive clustering between fall and non-fall classes compared to TCN and TE. Crucially, TCNTE is designed for pervasive deployment in mobile and resource-constrained environments. Integrated with YOLOv8 pose estimation and BoT-SORT human tracking, the algorithm operates on NVIDIA Jetson Orin NX edge device, achieving an average frame rate of 19 fps for single-person and 17 fps for two-person scenarios. With its validated accuracy and impressive real-time performance, TCNTE holds significant promise for practical fall detection applications in older adult care settings.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"107 ","pages":"Article 102016"},"PeriodicalIF":3.0,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143155592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Iratxe Landa , Guillermo Diaz , Iker Sobron , Iñaki Eizmendi , Manuel Velez
{"title":"Machinery detection by impulsive noise recognition using WiFi sensing","authors":"Iratxe Landa , Guillermo Diaz , Iker Sobron , Iñaki Eizmendi , Manuel Velez","doi":"10.1016/j.pmcj.2025.102018","DOIUrl":"10.1016/j.pmcj.2025.102018","url":null,"abstract":"<div><div>Engines and electrical devices in operation generate electromagnetic pulses, also called impulsive noise (IN), that interfere with wireless signals. The IN shall affect the channel estimation process and is, therefore, present in the channel state information (CSI) provided by wireless receivers. In this paper, impulsive noise (IN) is used as a fingerprint of electrical devices to identify the IN sources that interfere with a WiFi signal, taking into account that each individual machine has a unique pattern of impulsive noise. In this sense, the WiFi CSI provides valuable information to recognize the IN sources through deep learning (DL) strategies. Two DL models have been proposed and tested on two experimental data sets for multiclass and multilabel analysis; in multiclass, devices can operate alone during the measurement, and in multilabel, multiple devices can work simultaneously in a more realistic scenario. The model transferability between location and days has also been evaluated by analyzing two different IN feature sets for device classification with the Few-shot-learning (FSL) model. Results show that the proposed DL models can recognize multiple devices working simultaneously through the IN and also offer an acceptable transferability performance (<span><math><mo>∼</mo></math></span> 80% accuracy for a five-class problem).</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"107 ","pages":"Article 102018"},"PeriodicalIF":3.0,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143348979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vincent Bode , Carsten Trinitis , Martin Schulz , David Buettner , Tobias Preclik
{"title":"Advancing user-space networking for DDS message-oriented middleware: Further extensions","authors":"Vincent Bode , Carsten Trinitis , Martin Schulz , David Buettner , Tobias Preclik","doi":"10.1016/j.pmcj.2025.102013","DOIUrl":"10.1016/j.pmcj.2025.102013","url":null,"abstract":"<div><div>Due to the flexibility it offers, publish–subscribe messaging middleware is a popular choice in Industrial IoT (IIoT) applications. The Data Distribution Service (DDS) is a widely used industry standard for these systems with a focus on versatility and extensibility, implemented by multiple vendors and present in myriad deployments across industries like aerospace, healthcare and industrial automation. However, many IoT scenarios require real-time capabilities for deployments with rigid timing, reliability and resource constraints, while publish–subscribe mechanisms currently rely on components that are not strictly real-time capable, such as the Linux networking stack, making it hard to provide robust performance guarantees without large safety margins.</div><div>In order to make publish–subscribe approaches viable and efficient also in such real-time scenarios, we introduce user-space DDS networking transport extensions, allowing us to fast-track the communication hot path by bypassing the Linux kernel. For this purpose, we extend the best-performing vendor implementation from a previous study, CycloneDDS, to include modules for two widespread user-space networking technologies, the Data Plane Development Kit (DPDK) and the eXpress Data Path (XDP). Building on this, we additionally offer two more extensions to the second most performant implementation FastDDS, also based on DPDK and XDP, and realize novel optimizations not present in the original extension implementations. We evaluate each extension’s performance benefits against four existing DDS implementations (OpenDDS, RTI Connext, FastDDS and CycloneDDS). The DPDK-based and XDP-based extensions offer a performance benefit of 31%–38% and 18%–22% reduced mean latency, respectively, as well as an increase in bandwidth and sample rate throughput of at least 160%, while reducing the latency bound by at least 93%, demonstrating the performance and dependability advantages of circumventing the kernel for real-time communications.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"107 ","pages":"Article 102013"},"PeriodicalIF":3.0,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143356384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sunho Lim , Ingyu Lee , Gyu Sang Choi , Jinseok Chae , Ellora Ashish , Eric Ward , Cong Pu
{"title":"FastPlan: A three-step framework for accelerating drone-centric search operations in post-disaster relief","authors":"Sunho Lim , Ingyu Lee , Gyu Sang Choi , Jinseok Chae , Ellora Ashish , Eric Ward , Cong Pu","doi":"10.1016/j.pmcj.2025.102017","DOIUrl":"10.1016/j.pmcj.2025.102017","url":null,"abstract":"<div><div>Commercially well-known drones are increasingly popular and have been deployed in post-disaster relief to support traditional search and rescue operations. However, there are still barriers to conducting a drone-centric search operation, including but not limited to operational difficulty for non-professional drone pilots, inefficient pre-planned path, and more importantly initial setup delay. In this paper, we propose a small-scale prototype of a mobile framework, called <em>FastPlan</em>, to facilitate the development for expediting drone-centric search decisions and operations. The basic idea is to automate the required search operations with no or minimized user intervention. The framework consists of three major operations: map extraction, clustering, and path planning. We extract a set of target POIs and metadata from a public map (i.e., Google Maps) integrated with a customized local database to decide where and what to search. Then we deploy simple density-based clustering and search priority-based path planning strategies to efficiently group and cover the POIs. The framework can be extended flexibly by replacing individual operations with an alternative depending on the search priority, like a Lego block. We implement the framework as an Android-based mobile software (App) for a proof-of-the-concept and conduct extensive simulation experiments for performance evaluation. We analyze the different performance behavior and their implication and applicability. The results indicate that the proposed framework can be a viable approach to post-disaster relief.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"107 ","pages":"Article 102017"},"PeriodicalIF":3.0,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143155593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acquila Santos Rocha , Billy Anderson Pinheiro , Weverton Cordeiro , Vinicius C.M. Borges
{"title":"TrustMD — A multi-layer framework for domain, edge and D2D caching based on trust dissemination and blockchain","authors":"Acquila Santos Rocha , Billy Anderson Pinheiro , Weverton Cordeiro , Vinicius C.M. Borges","doi":"10.1016/j.pmcj.2025.102015","DOIUrl":"10.1016/j.pmcj.2025.102015","url":null,"abstract":"<div><div>Device-to-Device communication (D2D), combined with edge caching and distinct domains, is a promising approach for offloading data from wireless mobile networks. However, user security is still an open issue in D2D communication. Security vulnerabilities remain possible as a side effect of enabling straightforward, direct, and spontaneous interactions between untrustworthy users. To address this issue, this work involves designing TrustMD (Trust Multiple Domain), a multi-layer framework combining diverse technologies inspired by blockchain and trust management to develop a secure and scalable framework for multi-domain, edge, and D2D caching layers. Specifically, TrustMD combines edge trust storage with blockchain for distributed storage management in a multi-layer architecture designed to store trust control data in edge efficiently and D2D networks across different domains. Our experiments with TrustMD showed a significant improvement in data goodput, reaching as high as 95% of the total network throughput. In contrast, state-of-the-art approaches without trust control dissemination achieved at most 80%. Even though we observed a 7% increase in D2D overhead, TrustMD can effectively control latency levels. TrustMD managed security effectively without compromising network performance, reducing false negative rates up to 31% in the best-case scenario. TrustMD offers a scalable and effective security solution that boosts network performance and ensures robust protection.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"107 ","pages":"Article 102015"},"PeriodicalIF":3.0,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143376981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing crowdsourcing through skill and willingness-aligned task assignment with workforce composition balance","authors":"Riya Samanta , Soumya K. Ghosh , Sajal K. Das","doi":"10.1016/j.pmcj.2025.102012","DOIUrl":"10.1016/j.pmcj.2025.102012","url":null,"abstract":"<div><div>Crowdsourcing platforms face critical challenges in task assignment and workforce retention, particularly in aligning complex, skill-intensive tasks with crowd-worker willingness and potential while ensuring workforce diversity and balanced composition. This study introduces the Skill-Aligned Task Assignment and Potential-Aware Workforce Composition (SATA-PAW) framework to address these challenges. The proposed framework formulates the Task Assignment with Workforce Composition Balance (TACOMB) problem as a multi-constraint optimization task, aiming to maximize net utility under task budget constraints while promoting balanced workforce composition. SATA-PAW integrates two novel algorithms, Skill-Aligned Task Assignment (SATA), which optimizes task-worker matching by considering skills, willingness, and budget constraints, and Potential-Aware Workforce Composition (PAW), which leverages satisfaction score and latent potential to retain skilled workers and improve workforce diversity. Experimental evaluations on real-world (UpWork) and synthetic datasets demonstrate SATA-PAW’s superiority over five state-of-the-art methods. The results highlight SATA-PAW’s ability to integrate human-centric factors with efficient optimization, setting a new benchmark for skill-oriented task assignment and balanced workforce composition in crowdsourcing systems.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"107 ","pages":"Article 102012"},"PeriodicalIF":3.0,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143155954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Youwang Sun , Chunhua Jin , Xinying Liu , Lingwen Kong , Changhui Yu , Guanhua Chen , Liqing Chen
{"title":"Vspp: Verifiable, shareable, and privacy-preserving access control scheme for IoV","authors":"Youwang Sun , Chunhua Jin , Xinying Liu , Lingwen Kong , Changhui Yu , Guanhua Chen , Liqing Chen","doi":"10.1016/j.pmcj.2025.102014","DOIUrl":"10.1016/j.pmcj.2025.102014","url":null,"abstract":"<div><div>Internet of Vehicles (IoV) is a specialized application of Internet of Things (IoT), which interconnects vehicles and cloud platforms by using various communication devices and computing technologies to realize the transmission and sharing of vehicle information and enhance the driving experience. However, vehicle users face challenges in identity, data, and inside security when using IoV. In order to solve these problems, we propose a verifiable, shareable, and privacy-preserving access control scheme for IoV. In our scheme, we use zero-knowledge proof (ZKP) to ensure the security of user identity. More specifically, it can enable user anonymity and authenticity without revealing any additional information associated with the user. Meanwhile, we employ proxy re-encryption (PRE) to provide confidential sharing and secure the operation of data. In addition, we use the cryptographic reverse firewall (CRF) to ensure users’ internal security. It can prevent algorithm substitution attacks while ensuring chosen plaintext attack security. Finally, compared to other schemes, our scheme not only enables anonymity, traceability, unlinkability, and confidentiality but is also resistant to insider attacks. Performance evaluation shows that our scheme surpasses the other schemes in terms of time and storage costs.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"107 ","pages":"Article 102014"},"PeriodicalIF":3.0,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143387009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giacomo Longo , Alessandro Cantelli-Forti , Enrico Russo , Francesco Lupia , Martin Strohmeier , Andrea Pugliese
{"title":"Collective victim counting in post-disaster response: A distributed, power-efficient algorithm via BLE spontaneous networks","authors":"Giacomo Longo , Alessandro Cantelli-Forti , Enrico Russo , Francesco Lupia , Martin Strohmeier , Andrea Pugliese","doi":"10.1016/j.pmcj.2024.101997","DOIUrl":"10.1016/j.pmcj.2024.101997","url":null,"abstract":"<div><div>Accurately determining the number of people affected by emergencies is essential for deploying effective response measures during disasters. Traditional solutions like cellular and Wi-Fi networks are often rendered ineffective during such emergencies due to widespread infrastructure damage or non-functional connectivity, prompting the exploration of more resilient methods. This paper proposes a novel solution utilizing Bluetooth Low Energy (BLE) technology and decentralized networks composed entirely of mobile and wearable devices to count individuals autonomously without reliance on external communication equipment or specialized personnel. This count leverages uncoordinated relayed communication among devices within these networks, enabling us to extend our counting capabilities well beyond the direct range of rescuers. A formally evaluated, experimentally validated, and privacy-preserving counting algorithm that demonstrates rapid convergence and high accuracy even in large-scale scenarios is employed.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"106 ","pages":"Article 101997"},"PeriodicalIF":3.0,"publicationDate":"2024-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142757430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Fahim Mostafa , Mohamed Abdel-Kader , Yasser Gadallah
{"title":"Three-dimensional spectrum coverage gap map construction in cellular networks: A non-linear estimation approach","authors":"Ahmed Fahim Mostafa , Mohamed Abdel-Kader , Yasser Gadallah","doi":"10.1016/j.pmcj.2024.101998","DOIUrl":"10.1016/j.pmcj.2024.101998","url":null,"abstract":"<div><div>Data collection techniques can be used to determine the coverage conditions of a cellular communication network within a given area. In such tasks, the data acquisition process faces significant challenges for larger or inaccessible locations. Such challenges can be alleviated through the use of unmanned aerial vehicles (UAVs). This way, data acquisition obstacles can be overcome to acquire and process the necessary data points with relative ease to estimate a full area coverage map for the concerned network. In this study, we formulate the problem of deploying a UAV to acquire the minimum possible measurement data points in a geographical region for the purpose of constructing a full communication coverage gap map for this region. We then devise an estimation model that utilizes the measured data samples and determines the noise/loss levels of the communication links at the other unvisited spots of the region accordingly. The proposed estimation model is based on a cascade-forward neural network to allow for both nonlinear and direct linear relationships between the input data and the output estimations. We further investigate the conventional method of using linear regression estimators to decide on the received power levels at the different locations of the examined area. Our simulation evaluations show that the proposed nonlinear estimator outperforms the conventional linear regression technique in terms of the communication coverage error level while using the minimum possible collected data points. These minimum data points are then used in constructing a complete coverage gap map visualization that demonstrates the overall network service conditions within the surveyed region.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"106 ","pages":"Article 101998"},"PeriodicalIF":3.0,"publicationDate":"2024-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142758973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}