-
Modern Computing: Vision and Challenges
Authors:
Sukhpal Singh Gill,
Huaming Wu,
Panos Patros,
Carlo Ottaviani,
Priyansh Arora,
Victor Casamayor Pujol,
David Haunschild,
Ajith Kumar Parlikad,
Oktay Cetinkaya,
Hanan Lutfiyya,
Vlado Stankovski,
Ruidong Li,
Yuemin Ding,
Junaid Qadir,
Ajith Abraham,
Soumya K. Ghosh,
Houbing Herbert Song,
Rizos Sakellariou,
Omer Rana,
Joel J. P. C. Rodrigues,
Salil S. Kanhere,
Schahram Dustdar,
Steve Uhlig,
Kotagiri Ramamohanarao,
Rajkumar Buyya
Abstract:
Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving and adapting to cover multifaceted societal niches. This has…
▽ More
Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving and adapting to cover multifaceted societal niches. This has led to new paradigms such as cloud, fog, edge computing, and the Internet of Things (IoT), which offer fresh economic and creative opportunities. Nevertheless, this rapid change poses complex research challenges, especially in maximizing potential and enhancing functionality. As such, to maintain an economical level of performance that meets ever-tighter requirements, one must understand the drivers of new model emergence and expansion, and how contemporary challenges differ from past ones. To that end, this article investigates and assesses the factors influencing the evolution of computing systems, covering established systems and architectures as well as newer developments, such as serverless computing, quantum computing, and on-device AI on edge devices. Trends emerge when one traces technological trajectory, which includes the rapid obsolescence of frameworks due to business and technical constraints, a move towards specialized systems and models, and varying approaches to centralized and decentralized control. This comprehensive review of modern computing systems looks ahead to the future of research in the field, highlighting key challenges and emerging trends, and underscoring their importance in cost-effectively driving technological progress.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
Design and Implementation of 5G eHealth Systems, Technologies, Use Cases and Future Challenges
Authors:
Di Zhang,
Joel J. P. C. Rodrigues,
Yunkai Zhai,
Takuro Sato
Abstract:
Fifth generation (5G) aims to connect massive devices with even higher reliability, lower latency and even faster transmission speed, which are vital for implementing the e-health systems. However, the current efforts on 5G e-health systems are still not enough to accomplish its full blueprint. In this article, we first discuss the related technologies from physical layer, upper layer and cross la…
▽ More
Fifth generation (5G) aims to connect massive devices with even higher reliability, lower latency and even faster transmission speed, which are vital for implementing the e-health systems. However, the current efforts on 5G e-health systems are still not enough to accomplish its full blueprint. In this article, we first discuss the related technologies from physical layer, upper layer and cross layer perspectives on designing the 5G e-health systems. We afterwards elaborate two use cases according to our implementations, i.e., 5G e-health systems for remote health and 5G e-health systems for Covid-19 pandemic containment. We finally envision the future research trends and challenges of 5G e-health systems.
△ Less
Submitted 10 July, 2021; v1 submitted 9 June, 2021;
originally announced June 2021.
-
Machine Learning and Soil Humidity Sensing: Signal Strength Approach
Authors:
Lea Dujić Rodić,
Tomislav Županović,
Toni Perković,
Petar Šolić,
Joel J. P. C. Rodrigues
Abstract:
The IoT vision of ubiquitous and pervasive computing gives rise to future smart irrigation systems comprising physical and digital world. Smart irrigation ecosystem combined with Machine Learning can provide solutions that successfully solve the soil humidity sensing task in order to ensure optimal water usage. Existing solutions are based on data received from the power hungry/expensive sensors t…
▽ More
The IoT vision of ubiquitous and pervasive computing gives rise to future smart irrigation systems comprising physical and digital world. Smart irrigation ecosystem combined with Machine Learning can provide solutions that successfully solve the soil humidity sensing task in order to ensure optimal water usage. Existing solutions are based on data received from the power hungry/expensive sensors that are transmitting the sensed data over the wireless channel. Over time, the systems become difficult to maintain, especially in remote areas due to the battery replacement issues with large number of devices. Therefore, a novel solution must provide an alternative, cost and energy effective device that has unique advantage over the existing solutions. This work explores a concept of a novel, low-power, LoRa-based, cost-effective system which achieves humidity sensing using Deep learning techniques that can be employed to sense soil humidity with the high accuracy simply by measuring signal strength of the given underground beacon device.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
Improving Smart Conference Participation through Socially-Aware Recommendation
Authors:
Nana Yaw Asabere,
Feng Xia,
Wei Wang,
Joel J. P. C. Rodrigues,
Filippo Basso,
Jianhua Ma
Abstract:
This research addresses recommending presentation sessions at smart conferences to participants. We propose a venue recommendation algorithm, Socially-Aware Recommendation of Venues and Environments (SARVE). SARVE computes correlation and social characteristic information of conference participants. In order to model a recommendation process using distributed community detection, SARVE further int…
▽ More
This research addresses recommending presentation sessions at smart conferences to participants. We propose a venue recommendation algorithm, Socially-Aware Recommendation of Venues and Environments (SARVE). SARVE computes correlation and social characteristic information of conference participants. In order to model a recommendation process using distributed community detection, SARVE further integrates the current context of both the smart conference community and participants. SARVE recommends presentation sessions that may be of high interest to each participant. We evaluate SARVE using a real world dataset. In our experiments, we compare SARVE to two related state-of-the-art methods, namely: Context-Aware Mobile Recommendation Services (CAMRS) and Conference Navigator (Recommender) Model. Our experimental results show that in terms of the utilized evaluation metrics: precision, recall, and f-measure, SARVE achieves more reliable and favorable social (relations and context) recommendation results.
△ Less
Submitted 8 August, 2020;
originally announced August 2020.
-
Formation of gigahertz pulse train by chirped terahertz pulses interference
Authors:
Xinrui Liu,
Maksim Melnik,
Egor Oparin,
Maria Zhukova,
Joel J. P. C. Rodrigues,
Anton Tcypkin,
Sergei Kozlov
Abstract:
The development of multiplexing information transmission technology in the THz band may accelerate the arrival of the 6G era. In this paper, has demonstrated the feasibility of forming a sequence of subpulses in the temporal domain and the corresponding quasidiscrete spectrum in the THz frequency range. It is shown that despite the fact that the THz pulse has an exponential chirp, there is a "link…
▽ More
The development of multiplexing information transmission technology in the THz band may accelerate the arrival of the 6G era. In this paper, has demonstrated the feasibility of forming a sequence of subpulses in the temporal domain and the corresponding quasidiscrete spectrum in the THz frequency range. It is shown that despite the fact that the THz pulse has an exponential chirp, there is a "linkage relation" between spectrum and temporal structures of the THz pulse train. This fact can be used for encoding information in THz pulses for implementation in 6G communication systems in the future.
△ Less
Submitted 16 October, 2019;
originally announced October 2019.
-
Physical-Layer Network Coding: An Efficient Technique for Wireless Communications
Authors:
**** Chen,
Zhaopeng Xie,
Yi Fang,
Zhifeng Chen,
Shahid Mumtaz,
Joel J. P. C. Rodrigues
Abstract:
As a subfield of network coding, physical-layer network coding (PNC) can effectively enhance the throughput of wireless networks by map** superimposed signals at receiver to other forms of user messages. Over the past twenty years, PNC has received significant research attention and has been widely studied in various communication scenarios, e.g., two-way relay communications (TWRC), nonorthogon…
▽ More
As a subfield of network coding, physical-layer network coding (PNC) can effectively enhance the throughput of wireless networks by map** superimposed signals at receiver to other forms of user messages. Over the past twenty years, PNC has received significant research attention and has been widely studied in various communication scenarios, e.g., two-way relay communications (TWRC), nonorthogonal multiple access (NOMA) in 5G networks, random access networks, etc. To ensure network reliability, channel-coded PNC is proposed and related communication techniques are investigated, such as the design of channel code, low-complexity decoding, and cross-layer design. In this article, we briefly review the variants of channel-coded PNC wireless communications with the aim of inspiring future research activities in this area. We also put forth open research problems along with a few selected research directions under PNC-aided frameworks.
△ Less
Submitted 23 July, 2019; v1 submitted 21 July, 2019;
originally announced July 2019.
-
An Efficient Blockchain-based Hierarchical Authentication Mechanism for Energy Trading in V2G Environment
Authors:
Sahil Garg,
Kuljeet Kaur,
Georges Kaddoum,
François Gagnon,
Joel J. P. C. Rodrigues
Abstract:
Vehicle-to-grid (V2G) networks have emerged as a new technology in modern electric power transmission networks. It allows bi-directional flow of communication and electricity between electric vehicles (EVs) and the Smart Grid (SG), in order to provide more sophisticated energy trading. However, due to the involvement of a huge amount of trading data and the presence of untrusted entities in the vi…
▽ More
Vehicle-to-grid (V2G) networks have emerged as a new technology in modern electric power transmission networks. It allows bi-directional flow of communication and electricity between electric vehicles (EVs) and the Smart Grid (SG), in order to provide more sophisticated energy trading. However, due to the involvement of a huge amount of trading data and the presence of untrusted entities in the visiting networks, the underlying V2G infrastructure suffers from various security and privacy challenges. Although, several solutions have been proposed in the literature to address these problems, issues like lack of mutual authentication and anonymity, incapability to protect against several attack vectors, generation of huge overhead, and dependency on centralized infrastructures make security and privacy issues even more challenging. To address the above mentioned problems, in this paper, we propose a blockchain oriented hierarchical authentication mechanism for rewarding EVs. The overall process is broadly classified into the following phases: 1) System Initialization, 2) Registration, 3) Hierarchical Mutual Authentication, and 4) Consensus; wherein blockchain's distributed ledger has been employed for transaction execution in distributed V2G environments while Elliptic curve cryptography (ECC) has been used for hierarchical authentication. The designed hierarchical authentication mechanism has been employed to preserve the anonymity of EVs and support mutual authentication between EVs, charging stations (CSs) and the central aggregator (CAG). Additionally, it also supports minimal communicational and computational overheads on resource constrained EVs. Further, formal security verification of the proposed scheme on widely accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool validates its safeness against different security attacks.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
Socially-Aware Venue Recommendation for Conference Participants
Authors:
Feng Xia,
Nana Yaw Asabere,
Joel J. P. C. Rodrigues,
Filippo Basso,
Nakema Deonauth,
Wei Wang
Abstract:
Current research environments are witnessing high enormities of presentations occurring in different sessions at academic conferences. This situation makes it difficult for researchers (especially juniors) to attend the right presentation session(s) for effective collaboration. In this paper, we propose an innovative venue recommendation algorithm to enhance smart conference participation. Our pro…
▽ More
Current research environments are witnessing high enormities of presentations occurring in different sessions at academic conferences. This situation makes it difficult for researchers (especially juniors) to attend the right presentation session(s) for effective collaboration. In this paper, we propose an innovative venue recommendation algorithm to enhance smart conference participation. Our proposed algorithm, Social Aware Recommendation of Venues and Environments (SARVE), computes the Pearson Correlation and social characteristic information of conference participants. SARVE further incorporates the current context of both the smart conference community and participants in order to model a recommendation process using distributed community detection. Through the integration of the above computations and techniques, we are able to recommend presentation sessions of active participant presenters that may be of high interest to a particular participant. We evaluate SARVE using a real world dataset. Our experimental results demonstrate that SARVE outperforms other state-of-the-art methods.
△ Less
Submitted 24 December, 2013;
originally announced December 2013.