09/10/2024


The explosive growth of the Internet of Things (IoT) applications has imposed a dramatic increase of network data and placed a high computation complexity across various connected devices. The IoT devices capture valuable information, which allows the industries or individual users to make critical live dependent decisions. Most of these IoT devices have resource constraints such as low CPU, limited memory, and low energy storage. Hence, these devices are vulnerable to cyber-attacks due to the lack of capacity to run existing general-purpose security software. It creates an inherent risk in IoT networks. The multi-access edge computing (MEC) platform has emerged to mitigate these constraints by relocating complex computing tasks from the IoT devices to the edge. Most of the existing related works are focusing on finding the optimized security solutions to protect the IoT devices. We believe distributed solutions leveraging MEC should draw more attention. This paper presents a comprehensive review of state-of-the-art network intrusion detection systems (NIDS) and security practices for IoT networks. We have analyzed the approaches based on MEC platforms and utilizing machine learning (ML) techniques. The paper also performs a comparative analysis on the public available datasets, evaluation metrics, and deployment strategies employed in the NIDS design. Finally, we propose an NIDS framework for IoT networks leveraging MEC.In this paper, we propose a new privatization mechanism based on a naive theory of a perturbation on a probability using wavelets, such as a noise perturbs the signal of a digital image sensor. Wavelets are employed to extract information from a wide range of types of data, including audio signals and images often related to sensors, as unstructured data. Specifically, the cumulative wavelet integral function is defined to build the perturbation on a probability with the help of this function. We show that an arbitrary distribution function additively perturbed is still a distribution function, which can be seen as a privatized distribution, with the privatization mechanism being a wavelet function. Thus, we offer a mathematical method for choosing a suitable probability distribution for data by starting from some guessed initial distribution. Examples of the proposed method are discussed. Computational experiments were carried out using a database-sensor and two related algorithms. Several knowledge areas can benefit from the new approach proposed in this investigation. The areas of artificial intelligence, machine learning, and deep learning constantly need techniques for data fitting, whose areas are closely related to sensors. Therefore, we believe that the proposed privatization mechanism is an important contribution to increasing the spectrum of existing techniques.In laser powder bed fusion (LPBF), melt pool instability can lead to the development of pores in printed parts, reducing the part's structural strength. While camera-based monitoring systems have been introduced to improve melt pool stability, these systems only measure melt pool stability in limited, indirect ways. We propose that melt pool stability can be improved by explicitly encoding stability into LPBF monitoring systems through the use of temporal features and pore density modelling. We introduce the temporal features, in the form of temporal variances of common LPBF monitoring features (e.g., melt pool area, intensity), to explicitly quantify printing stability. Furthermore, we introduce a neural network model trained to link these video features directly to pore densities estimated from the CT scans of previously printed parts. This model aims to reduce the number of online printer interventions to only those that are required to avoid porosity. These contributions are then implemented in a full LPBF monitoring system and tested on prints using 316L stainless steel. Results showed that our explicit stability quantification improved the correlation between our predicted pore densities and true pore densities by up to 42%.When performing multiple target detection, it is difficult to detect small and occluded targets in complex traffic scenes. To this end, an improved YOLOv4 detection method is proposed in this work. Firstly, the network structure of the original YOLOv4 is adjusted, and the 4× down-sampling feature map of the backbone network is introduced into the neck network of the YOLOv4 model to splice the feature map with 8× down-sampling to form a four-scale detection structure, which enhances the fusion of deep and shallow semantics information of the feature map to improve the detection accuracy of small targets. Then, the convolutional block attention module (CBAM) is added to the model neck network to enhance the learning ability for features in space and on channels. Lastly, the detection rate of the occluded target is improved by using the soft non-maximum suppression (Soft-NMS) algorithm based on the distance intersection over union (DIoU) to avoid deleting the bounding boxes. On the KITTI dataset, experimental evaluation is performed and the analysis results demonstrate that the proposed detection model can effectively improve the multiple target detection accuracy, and the mean average accuracy (mAP) of the improved YOLOv4 model reaches 81.23%, which is 3.18% higher than the original YOLOv4; and the computation speed of the proposed model reaches 47.32 FPS. Compared with existing popular detection models, the proposed model produces higher detection accuracy and computation speed.The blooming of internet of things (IoT) services calls for a paradigm shift in the design of communications systems. Short data packets sporadically transmitted by a multitude of low-cost low-power terminals require a radical change in relevant aspects of the protocol stack. For example, scheduling-based approaches may become inefficient at the medium access (MAC) layer, and alternatives such as uncoordinated access policies may be preferred. In this context random access (RA) in its simplest form, i.e., additive links on-line Hawaii area (ALOHA), may again become attractive as also proved by a number of technologies adopting it. The use of forward error correction (FEC) can improve its performance, yet a comprehensive analytical model including this aspect is still missing. In this paper, we provide a first attempt by deriving exact expressions for the packet loss rate and spectral efficiency of ALOHA with FEC, and extend the result also to time- and frequency-asynchronous ALOHA aided by FEC. We complement our study with extensive evaluations of the expressions for relevant cases of study, including an IoT system served by low-Earth orbit (LEO) satellites. Non-trivial outcomes show how time- and frequency-asynchronous ALOHA particularly benefit from the presence of FEC and become competitive with ALOHA.A piezoelectric actuator (PEA) has the characteristics of high control precision and no electromagnetic interference. To improve the degree of freedom (DOF) to adapt to more working scenes, a piezoelectric-electromagnetic hybrid-driven two-DOF actuator is proposed. The PEA adopts the composite structure of the lever amplification mechanism and triangular amplification mechanism. The structure effectively amplifies the output displacement of the piezoelectric stack and increases the clamping force between the driving foot and the mover. The electromagnetic actuator (EMA) adopts a multi-stage fractional slot concentrated winding permanent magnet synchronous actuator, which can better match the characteristics of PEA. The structure and working principle of the actuator are introduced, the dynamic analysis is carried out, and the factors affecting the clamping force are obtained. At the same time, the air gap magnetic field is analyzed, and the structural size of the actuator is optimized. The experiment shows that the maximum driving speed can reach 348 mm/s, the load capacity is 3 kg, the optimal initial rotor angle is 49°, the maximum torque is 2.9 N·m and the maximum speed is 9 rad/s, which proves the stability and feasibility of the actuator.Grating interferometers that use large two-dimensional grating splice modules for performing wide-range measurements have significant advantages for identifying the position of the wafer stage. However, the manufacturing process of large two-dimensional grating splice modules is very difficult. In contrast to existing redundant designs in the grating line dimension, we propose a novel interferometric reading head with a redundant design for obtaining wide-range displacement measurements. This interferometric reading head uses a one-dimensional grating splice module, and it was observed to be compatible with two orthogonal gratings. We designed a grating interferometer system composed of four reading heads to achieve a wide range of measurements and verified it using ZEMAX simulation. By conducting experiments, we were able to verify the compatibility of the reading head with gratings possessing different grating line directions; the measurement noise was found to be less than 0.3 nm.Electromyographic signals have been used with low-degree-of-freedom prostheses, and recently with multifunctional prostheses. Currently, they are also being used as inputs in the human-computer interface that controls interaction through hand gestures. Although there is a gap between academic publications on the control of an upper-limb prosthesis developed in laboratories and its service in the natural environment, there are attempts to achieve easier control using multiple muscle signals. This work contributes to this, using a database and biomechanical simulation software, both open access, to seek simplicity in the classifiers, anticipating their implementation in microcontrollers and their execution in real time. Fifteen predefined finger movements of the hand were identified using classic classifiers such as Bayes, linear and quadratic discriminant analysis. https://www.selleckchem.com/products/b02.html The idealized movements of the database were modeled with Opensim for visualization. Combinations of two preprocessing methods-the forward sequential selection method and the feature normalization method-were evaluated to increase the efficiency of these classifiers. The statistical methods of cross-validation, analysis of variance (ANOVA) and Duncan were used to validate the results. Furthermore, the classifier with the best recognition result was redesigned into a new feature space using the sparse matrix algorithm to improve it, and to determine which features can be eliminated without degrading the classification. The classifiers yielded promising results-the quadratic discriminant being the best, achieving an average recognition rate for each individual considered of 96.16%, and with 78.36% for the total sample group of the eight subjects, in an independent test dataset. The study ends with the visual analysis under Opensim of the classified movements, in which the usefulness of this simulation tool is appreciated by revealing the muscular participation, which can be useful during the design of a multifunctional prosthesis.Current step-count estimation techniques use either an accelerometer or gyroscope sensors to calculate the number of steps. However, because of smartphones unfixed placement and direction, their accuracy is insufficient. It is necessary to consider the impact of the carrying position on the accuracy of the pedometer algorithm, because of people carry their smartphones in various positions. Therefore, this study proposes a carrying-position independent ensemble step-counting algorithm suitable for unconstrained smartphones in different carrying positions. The proposed ensemble algorithm comprises a classification algorithm that identifies the carrying position of the smartphone, and a regression algorithm that considers the identified carrying position and calculates the number of steps. Furthermore, a data acquisition system that collects (i) label data in the form of the number of steps estimated from the Force Sensitive Resistor (FSR) sensors, and (ii) input data in the form of the three-axis acceleration data obtained from the smartphones is also proposed.