Pervasive and Mobile Computing最新文献

筛选
英文 中文
Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar mmDrive:使用毫米波传感器对驾驶员的注意力进行被动监测
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-05-23 DOI: 10.1016/j.pmcj.2024.101949
Argha Sen, Avijit Mandal, Prasenjit Karmakar, Anirban Das, Sandip Chakraborty
{"title":"Passive Monitoring of Dangerous Driving Behaviors Using mmWave Radar","authors":"Argha Sen,&nbsp;Avijit Mandal,&nbsp;Prasenjit Karmakar,&nbsp;Anirban Das,&nbsp;Sandip Chakraborty","doi":"10.1016/j.pmcj.2024.101949","DOIUrl":"10.1016/j.pmcj.2024.101949","url":null,"abstract":"<div><p>Detecting risky driving has been a significant area of focus in recent years. Nonetheless, devising a practical, effective, and unobtrusive solution remains a complex challenge. Presently available technologies predominantly rely on visual cues or physical proximity, complicating the sensing. With this incentive, we explore the possibility of utilizing mmWave radars exclusively to identify dangerous driving behaviors. Initially, we scrutinize the attributes of unsafe driving and pinpoint distinct patterns in range-doppler readings brought about by nine common risky driving manoeuvres. Subsequently, we create an innovative Fused-CNN model that identifies instances of hazardous driving amidst regular driving and categorizes nine distinct types of dangerous driving actions. After conducting thorough experiments involving seven volunteers driving in real-world settings, we note that our system accurately distinguishes risky driving actions with an average precision of approximately 97% with a deviation of <span><math><mrow><mo>±</mo><mn>2</mn><mtext>%</mtext></mrow></math></span>. To underscore the significance of our approach, we also compare it against established state-of-the-art methods.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"103 ","pages":"Article 101949"},"PeriodicalIF":4.3,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification CIU-L:用于人体识别的类递增学习和机器非学习被动传感系统
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-05-23 DOI: 10.1016/j.pmcj.2024.101947
Zhongcheng Wei , Wei Chen , Yunping Zhang , Bin Lian , Jijun Zhao
{"title":"CIU-L: A class-incremental learning and machine unlearning passive sensing system for human identification","authors":"Zhongcheng Wei ,&nbsp;Wei Chen ,&nbsp;Yunping Zhang ,&nbsp;Bin Lian ,&nbsp;Jijun Zhao","doi":"10.1016/j.pmcj.2024.101947","DOIUrl":"10.1016/j.pmcj.2024.101947","url":null,"abstract":"<div><p>With the development of passive sensing technology, WiFi-based identification research has attracted much attention in areas such as human–computer interaction and home security. Although WiFi sensing-based human identification has achieved initial success, it is currently mainly applicable to scenarios where the user’s identity category is fixed and not applicable to scenarios where the user’s identity category changes frequently. In this paper, we propose an identification system (CIU-L) in a scenario where user’s identity categories frequently change, allowing for incremental registration and unregistration of identity categories. To the best of our knowledge, this is the first attempt to register and unregister user identity information under the previous identity category constraints. CIU-L proposes a training and updating strategy in the registration phase of new user to avoid catastrophic forgetting of old user’s identity information, and trains a targeted noise for the user to be unregistered in the unregistration phase of old user, achieving precise removal of the user to be unregistered without affecting the retained users. In addition, this paper presents adequate comparative experiments of CIU-L with other systems in the user identity category fixing scenario. The experimental results show that the average difference between CIU-L and other systems in terms of Accuracy, Precision, Recall and F1-Score is within 5% of each other, while running time and storage space are saved by more than 6 times, which is more capable of meeting the needs of identity recognition in real scenarios.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"103 ","pages":"Article 101947"},"PeriodicalIF":4.3,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication BmmW:基于 DNN 的 BLE 和毫米波雷达联合系统,可通过面向目标的通信进行精确 3D 定位
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-05-18 DOI: 10.1016/j.pmcj.2024.101944
Peizheng Li , Jagdeep Singh , Han Cui , Carlo Alberto Boano
{"title":"BmmW: A DNN-based joint BLE and mmWave radar system for accurate 3D localization with goal-oriented communication","authors":"Peizheng Li ,&nbsp;Jagdeep Singh ,&nbsp;Han Cui ,&nbsp;Carlo Alberto Boano","doi":"10.1016/j.pmcj.2024.101944","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101944","url":null,"abstract":"<div><p>Bluetooth Low Energy (BLE) has emerged as one of the reference technologies for the development of indoor localization systems, due to its increasing ubiquity, low-cost hardware, and to the introduction of direction-finding enhancements improving its ranging performance. However, the intrinsic narrowband nature of BLE makes this technology susceptible to multipath and channel interference. As a result, it is still challenging to achieve decimetre-level localization accuracy, which is necessary when developing location-based services for smart factories and workspaces. To address this challenge, we present BmmW, an indoor localization system that augments the ranging estimates obtained with BLE<!--> <!--> <!-->5.1’s constant tone extension feature with mmWave radar measurements to provide 3D localization of a mobile tag with decimetre-level accuracy. Specifically, BmmW embeds a deep neural network (DNN) that is jointly trained with both BLE and mmWave measurements, practically leveraging the strengths of both technologies. In fact, mmWave radars can locate objects and people with decimetre-level accuracy, but their effectiveness in monitoring stationary targets and multiple objects is limited, and they also suffer from a fast signal attenuation limiting the usable range to a few meters. We evaluate BmmW’s performance experimentally, and show that its joint DNN training scheme allows to track mobile tags with a mean 3D localization accuracy of 10 cm when combining angle-of-arrival BLE measurements with mmWave radar data. We further assess two variations of BmmW: BmmW-<span>Lite</span> and BmmW-<span>Lite+</span>, both tailored for single-antenna BLE devices, which eliminates the necessity for bulky and expensive multi-antenna arrays and represents a cost-effective solution that is easy to integrate into compact IoT devices. In contrast to classic BmmW (which utilizes angle-of-arrival info), BmmW-<span>Lite</span> uses raw in-phase/quadrature (I/Q) measurements, and achieves a mean localization accuracy of 36 cm, thus facilitating precise object tracking in indoor environments even when using budget-friendly single-antenna BLE devices. BmmW-<span>Lite+</span> extends BmmW-<span>Lite</span> by allowing the localization task to be transferred from the edge to the cloud due to device memory and power constraints. To this end, BmmW-<span>Lite+</span> employs a goal-oriented communication paradigm that compresses initial BLE features into a more compact <em>semantic</em> format at the edge device, which allows to minimize the amount of data that needs to be sent to the cloud. Our experimental results show that BmmW-<span>Lite+</span> can compress raw BLE features by up to 12% of their initial size (hence allowing to save network bandwidth and minimize energy consumption), with negligible impact on the localization accuracy.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101944"},"PeriodicalIF":4.3,"publicationDate":"2024-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141095201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of micro- vs. macro-flows management in QKD-secured edge computing QKD 安全边缘计算中的微观与宏观流量管理分析
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-05-16 DOI: 10.1016/j.pmcj.2024.101937
Claudio Cicconetti, Marco Conti, Andrea Passarella
{"title":"Analysis of micro- vs. macro-flows management in QKD-secured edge computing","authors":"Claudio Cicconetti,&nbsp;Marco Conti,&nbsp;Andrea Passarella","doi":"10.1016/j.pmcj.2024.101937","DOIUrl":"10.1016/j.pmcj.2024.101937","url":null,"abstract":"<div><p>Quantum Key Distribution (QKD) holds the promise of a secure exchange of cryptographic material between applications that have access to the same network of QKD nodes, interconnected through fiber optic or satellite links. Worldwide several such networks are being deployed at a metropolitan level, where edge computing is already offered by the telco operators to customers as a viable alternative to both cloud and on-premise hosting of computational resources. In this paper, we investigate the implications of enabling QKD for edge-native applications from a practical perspective of resource allocation in the QKD network and the edge infrastructure. Specifically, we consider the dichotomy between aggregating all the applications on the same source–destination path vs. adopting a more flexible micro-flow approach, inspired from Software Defined Networking (SDN) concepts. Our simulation results show that there is a fundamental trade-off between the efficient use of resources and the signaling overhead, which we managed to diminish with the use of suitable hybrid solutions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101937"},"PeriodicalIF":4.3,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000634/pdfft?md5=66f40de1122375679c5bab3134cbf374&pid=1-s2.0-S1574119224000634-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141046172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient estimator for source localization in WSNs using RSSD and TDOA measurements 使用 RSSD 和 TDOA 测量的 WSN 信号源定位高效估算器
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-05-11 DOI: 10.1016/j.pmcj.2024.101936
Yuanyuan Zhang , T. Aaron Gulliver , Huafeng Wu , Xiaojun Mei , Jiping Li , Fuqiang Lu , Weijun Wang
{"title":"An efficient estimator for source localization in WSNs using RSSD and TDOA measurements","authors":"Yuanyuan Zhang ,&nbsp;T. Aaron Gulliver ,&nbsp;Huafeng Wu ,&nbsp;Xiaojun Mei ,&nbsp;Jiping Li ,&nbsp;Fuqiang Lu ,&nbsp;Weijun Wang","doi":"10.1016/j.pmcj.2024.101936","DOIUrl":"10.1016/j.pmcj.2024.101936","url":null,"abstract":"<div><p>Range-based localization has received considerable attention in wireless sensor networks due to its ability to efficiently locate the unknown source of a signal. However, the localization accuracy with a single set of measurements may be inadequate, especially in dynamic and noisy environments. To mitigate this problem, received signal strength difference (RSSD) and time difference of arrival (TDOA) measurements are used to develop an efficient estimator to reduce the bias and improve localization accuracy. First, the RSSD/TDOA-based maximum likelihood (ML) localization problem is transformed into a hybrid information nonnegative constrained least squares (HI-NCLS) framework. Then, this framework is used to develop an effective bias-reduction localization approach (BRLA) with a two-step linearization process. The first step employs a linear solving method (LSM) which exploits an active set method to obtain a sub-optimal estimator. The second step uses a bias reduction method (BRM) to mitigate the correlation from linearization and a weighted instrumental variables matrix (IVM) which is weakly correlated with the noise but strongly correlated with the data matrix (DM) is used in place of the DM. Performance results are presented which demonstrate that the proposed BRLA provides better localization performance than state-of-the-art methods in the literature.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101936"},"PeriodicalIF":4.3,"publicationDate":"2024-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141051391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure 在没有专用基础设施的情况下利用人群轨迹数据估算交通流量
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-05-07 DOI: 10.1016/j.pmcj.2024.101935
Subhrasankha Dey , Martin Tomko , Stephan Winter , Niloy Ganguly
{"title":"Traffic count estimation using crowd-sourced trajectory data in the absence of dedicated infrastructure","authors":"Subhrasankha Dey ,&nbsp;Martin Tomko ,&nbsp;Stephan Winter ,&nbsp;Niloy Ganguly","doi":"10.1016/j.pmcj.2024.101935","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101935","url":null,"abstract":"<div><p>Traffic count (or link count) data represents the cumulative traffic in the lanes between two consecutive signalised intersections. Typically, dedicated infrastructure-based sensors are required for link count data collection. The lack of adequate data collection infrastructure leads to lack of link count data for numerous cities, particularly those in low- and middle-income countries. Here, we address the research problem of link count estimation using crowd-sourced trajectory data to reduce the reliance on any dedicated infrastructure. A stochastic queue discharge model is developed to estimate link counts at signalised intersections taking into account the sparsity and low penetration rate (i.e., the percentage of vehicles with known trajectory) brought on by crowdsourcing. The issue of poor penetration rate is tackled by constructing synthetic trajectories entirely from known trajectories. The proposed model further provides a methodology for estimating the delay resulting from the start-up loss time of the vehicles in the queue under unknown traffic conditions. The proposed model is implemented and validated with real-world data at a signalised intersection in Kolkata, India. Validation results demonstrate that the model can estimate link count with an average accuracy score of 82% with a very low penetration rate (not in the city, but at the intersection) of 5.09% in unknown traffic conditions, which is yet to be accomplished in the current state-of-the-art.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101935"},"PeriodicalIF":4.3,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224000610/pdfft?md5=d66231587fa7d814a717bc910b36c35b&pid=1-s2.0-S1574119224000610-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140951446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CMFogV: Proactive content migration for multi-level fog computing CMFogV:多级雾计算的主动内容迁移
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-05-03 DOI: 10.1016/j.pmcj.2024.101933
Marcelo C. Araújo, Luiz F. Bittencourt
{"title":"CMFogV: Proactive content migration for multi-level fog computing","authors":"Marcelo C. Araújo,&nbsp;Luiz F. Bittencourt","doi":"10.1016/j.pmcj.2024.101933","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101933","url":null,"abstract":"<div><p>The popularization of Fog Computing has provided the foundation for a computational environment better suited to applications demanding low communication latency. However, Fog environments has limited resources and restricted coverage areas, besides the user mobility that needs continuous migrations to maintain accessible and nearby content. To enable applications to harness the low latency offered by Fog, it is crucial to develop migration strategies capable of addressing the complexities of the Fog environment while ensuring content availability regardless of user location. This work proposes CMFog<span><math><msub><mrow></mrow><mrow><mi>V</mi></mrow></msub></math></span>, a proactive content migration strategy that leverages mobility prediction in a multi-level fog. Our results show that CMFog<span><math><msub><mrow></mrow><mrow><mi>V</mi></mrow></msub></math></span> is able to provide enhanced flexibility in the migration decision process across a wide diversity of scenario.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101933"},"PeriodicalIF":4.3,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140893235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks 针对无线机器人网络的具有自适应碰撞缓解功能的邻居发现协议
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-05-03 DOI: 10.1016/j.pmcj.2024.101934
Zhiyong Lin , Congming Yi , Zongheng Wei , Jianfeng Wen , Qingji Wen , Qinglin Liu , Hai Liu
{"title":"A neighbor discovery protocol with adaptive collision alleviation for wireless robotic networks","authors":"Zhiyong Lin ,&nbsp;Congming Yi ,&nbsp;Zongheng Wei ,&nbsp;Jianfeng Wen ,&nbsp;Qingji Wen ,&nbsp;Qinglin Liu ,&nbsp;Hai Liu","doi":"10.1016/j.pmcj.2024.101934","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101934","url":null,"abstract":"<div><p>Recently, several movement control algorithms have been proposed to move robots to the desired locations and complete various collaborative tasks. These algorithms usually require information exchange among robots, which in turn relies on efficient neighbor discovery. However, neighbor discovery of robots is a challenging problem due to limited communication range and beacon collision. Here, how to set the time slot length and contention window to alleviate the beacon collisions is a major issue: too large or too small slot length and contention window values cannot achieve good performance in the robotic network. Therefore, we propose a neighbor discovery protocol with an adaptive collision alleviation mechanism, i.e. ND-ACA. ND-ACA adopts a simple mechanism to detect and avoid potential collisions before sending beacon, and adaptively adjusts both slot length and backoff window according to the number of historical beacon collections and beacon collisions. Extensive simulation results show the efficiency of our proposed approach. To the best of our knowledge, this is the first work in the literature that explore the joint implementation effects that simultaneously consider the robot mobility model and neighbor discovery.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101934"},"PeriodicalIF":4.3,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140843787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable and adaptive computation offload strategy with load and cost coordination for edge computing 针对边缘计算的可靠自适应计算卸载策略与负载和成本协调
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-04-30 DOI: 10.1016/j.pmcj.2024.101932
Weicheng Tang , Donghui Gao , Siyu Yu , Jianbo Lu , Zhiyong Wei , Zhanrong Li , Ningjiang Chen
{"title":"Reliable and adaptive computation offload strategy with load and cost coordination for edge computing","authors":"Weicheng Tang ,&nbsp;Donghui Gao ,&nbsp;Siyu Yu ,&nbsp;Jianbo Lu ,&nbsp;Zhiyong Wei ,&nbsp;Zhanrong Li ,&nbsp;Ningjiang Chen","doi":"10.1016/j.pmcj.2024.101932","DOIUrl":"https://doi.org/10.1016/j.pmcj.2024.101932","url":null,"abstract":"<div><p>There are several important factors to consider in edge computing systems including latency, reliability, power consumption, and queue load. Task replication requires additional energy costs in mobile edge offloading scenarios based on master-slave replication for fault tolerance. Excessive task offloading may lead to a sharp increase in the total energy consumption of the system including replication costs. Conversely, new tasks cannot enter the waiting queue and are lost, resulting in reliability issues. This paper proposes an adaptive task offloading strategy for balancing the edge node queue load and offloading cost (Lyapunov and Differential Evolution based Offloading schedule strategy, LDEO). The LDEO strategy innovatively customizes the Lyapunov drift-plus-penalty function by incorporating replication redundancy offloading costs to establish a balance model between the queue load and offloading cost. The LDEO strategy computes the optimal offloading decisions with dynamic adjustment characteristics by integrating a low-complexity differential evolution method, aiming to find the optimal balance point that minimizes the offloading cost while maintaining reliability performance. The experimental results show that compared with the existing strategies, LDEO strategy effectively reduces the redundancy of fault tolerance cost and the waiting time under the condition of ensuring that the task will not be discarded over time. It stabilizes the queue length in a reasonable range, controls the waiting time and loss rate of tasks, reduces the extra energy consumption paid by replication redundancy, and effectively realizes the optimal balance under multiple conditions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"102 ","pages":"Article 101932"},"PeriodicalIF":4.3,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141068466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmAuto: A domain-specific-language for application development in smart environments SmAuto:用于智能环境应用程序开发的特定领域语言
IF 4.3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2024-04-21 DOI: 10.1016/j.pmcj.2024.101931
Konstantinos Panayiotou, Constantine Doumanidis, Emmanouil Tsardoulias, Andreas L. Symeonidis
{"title":"SmAuto: A domain-specific-language for application development in smart environments","authors":"Konstantinos Panayiotou,&nbsp;Constantine Doumanidis,&nbsp;Emmanouil Tsardoulias,&nbsp;Andreas L. Symeonidis","doi":"10.1016/j.pmcj.2024.101931","DOIUrl":"10.1016/j.pmcj.2024.101931","url":null,"abstract":"<div><p>A common problem in the development of Internet-of-Things (IoT) and Cyber-Physical System (CPS) applications is the complexity of these domains, due to their hybrid and distributed nature in multiple layers (hardware, network, communication, application etc.). Apart from other issues, this inherent complexity often gives room for implementation errors, which can be in many cases fatal and drive the application and/or the system to undesired states. The current work aspires to alleviate this problem by introducing a low-code approach for building IoT and CPS applications. We argue that, through the proposed approach it is possible to lower development time and risk (errors/bug-related ones) and allow a wide range of end-users to build and monitor applications for state-of-the-art domains, such as smart home and smart industry. In this context, Model-Driven Engineering (MDE) approaches are explored and <em>SmAuto</em>, a Domain-specific Language (DSL) is proposed for creating and executing automation tasks for smart environments. Through <em>SmAuto</em> it is possible to handle the heterogeneity and complexity issues of the IoT and CPS domains, this way allowing end-users are non-technical application experts to build well-designed and properly functioning smart applications. The proposed DSL implements a Sense-Think-Act-Communicate model for smart environments and enables the creation, validation, and dynamic execution of composite automation models in physical, virtual and hybrid environments, while it also enables automated code generation of virtual entities for verification purposes. By using layered abstractions to automate the development process, end-users can concentrate on the real problem instead of dwelling into technical details, thus increasing their productivity. The results of the empirical evaluation and the comparison to existing approaches show that <em>SmAuto</em> can make application development more rigorous, improves productivity of end-users including non-experts, i.e. citizen developers and satisfies several functional and non-functional requirements of modern DSLs, such as tool support, modular deployment, reusability, availability and extensibility.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"101 ","pages":"Article 101931"},"PeriodicalIF":4.3,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140790904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信