-
Parallel Segment Entanglement Swapping
Authors:
Binjie He,
Seng W. Loke,
Dong Zhang
Abstract:
In the noisy intermediate-scale quantum era, scientists are trying to improve the entanglement swapping success rate by researching anti-noise technology on the physical level, thereby obtaining a higher generation rate of long-distance entanglement. However, we may improve the generation rate from another perspective, which is studying an efficient entanglement swapping strategy. This paper analy…
▽ More
In the noisy intermediate-scale quantum era, scientists are trying to improve the entanglement swapping success rate by researching anti-noise technology on the physical level, thereby obtaining a higher generation rate of long-distance entanglement. However, we may improve the generation rate from another perspective, which is studying an efficient entanglement swapping strategy. This paper analyzes the challenges faced by existing entanglement swapping strategies, including the node allocation principle, time synchronization, and processing of entanglement swapping failure. We present Parallel Segment Entanglement Swapping (PSES) to solve these problems. The core idea of PSES is to segment the path and perform parallel entanglement swapping between segments to improve the generation rate of long-distance entanglement. We construct a tree-like model as the carrier of PSES and propose heuristic algorithms called Layer Greedy and Segment Greedy to transform the path into a tree-like model. Moreover, we realize the time synchronization and design the on-demand retransmission mechanism to process entanglement swapping failure. The experiments show that PSES performs superiorly to other entanglement swapping strategies, and the on-demand retransmission mechanism can reduce the average entanglement swapping time by 80% and the average entanglement consumption by 80%.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Indoor PM2.5 forecasting and the association with outdoor air pollution: a modelling study based on sensor data in Australia
Authors:
Wenhua Yu,
Bahareh Nakisa,
Seng W. Loke,
Svetlana Stevanovic,
Yuming Guo,
Mohammad Naim Rastgoo
Abstract:
Exposure to poor indoor air quality poses significant health risks, necessitating thorough assessment to mitigate associated dangers. This study aims to predict hourly indoor fine particulate matter (PM2.5) concentrations and investigate their correlation with outdoor PM2.5 levels across 24 distinct buildings in Australia. Indoor air quality data were gathered from 91 monitoring sensors in eight A…
▽ More
Exposure to poor indoor air quality poses significant health risks, necessitating thorough assessment to mitigate associated dangers. This study aims to predict hourly indoor fine particulate matter (PM2.5) concentrations and investigate their correlation with outdoor PM2.5 levels across 24 distinct buildings in Australia. Indoor air quality data were gathered from 91 monitoring sensors in eight Australian cities spanning 2019 to 2022. Employing an innovative three-stage deep ensemble machine learning framework (DEML), comprising three base models (Support Vector Machine, Random Forest, and eXtreme Gradient Boosting) and two meta-models (Random Forest and Generalized Linear Model), hourly indoor PM2.5 concentrations were predicted. The model's accuracy was evaluated using a rolling windows approach, comparing its performance against three benchmark algorithms (SVM, RF, and XGBoost). Additionally, a correlation analysis assessed the relationship between indoor and outdoor PM2.5 concentrations. Results indicate that the DEML model consistently outperformed benchmark models, achieving an R2 ranging from 0.63 to 0.99 and RMSE from 0.01 to 0.663 mg/m3 for most sensors. Notably, outdoor PM2.5 concentrations significantly impacted indoor air quality, particularly evident during events like bushfires. This study underscores the importance of accurate indoor air quality prediction, crucial for developing location-specific early warning systems and informing effective interventions. By promoting protective behaviors, these efforts contribute to enhanced public health outcomes.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
Building a Hierarchical Architecture and Communication Model for the Quantum Internet
Authors:
Binjie He,
Dong Zhang,
Seng W. Loke,
Shengrui Lin,
Luke Lu
Abstract:
The research of architecture has tremendous significance in realizing quantum Internet. Although there is not yet a standard quantum Internet architecture, the distributed architecture is one of the possible solutions, which utilizes quantum repeaters or dedicated entanglement sources in a flat structure for entanglement preparation & distribution. In this paper, we analyze the distributed archite…
▽ More
The research of architecture has tremendous significance in realizing quantum Internet. Although there is not yet a standard quantum Internet architecture, the distributed architecture is one of the possible solutions, which utilizes quantum repeaters or dedicated entanglement sources in a flat structure for entanglement preparation & distribution. In this paper, we analyze the distributed architecture in detail and demonstrate that it has three limitations: 1) possible high maintenance overhead, 2) possible low-performance entanglement distribution, and 3) unable to support optimal entanglement routing. We design a hierarchical quantum Internet architecture and a communication model to solve the problems above. We also present a W-state Based Centralized Entanglement Preparation & Distribution (W-state Based CEPD) scheme and a Centralized Entanglement Routing (CER) algorithm within our hierarchical architecture and perform an experimental comparison with other entanglement preparation & distribution schemes and entanglement routing algorithms within the distributed architecture. The evaluation results show that the entanglement distribution efficiency of hierarchical architecture is 11.5% higher than that of distributed architecture on average (minimum 3.3%, maximum 37.3%), and the entanglement routing performance of hierarchical architecture is much better than that of a distributed architecture according to the fidelity and throughput.
△ Less
Submitted 9 July, 2024; v1 submitted 18 February, 2024;
originally announced February 2024.
-
Predicting Next Useful Location With Context-Awareness: The State-Of-The-Art
Authors:
Alireza Nezhadettehad,
Arkady Zaslavsky,
Rakib Abdur,
Siraj Ahmed Shaikh,
Seng W. Loke,
Guang-Li Huang,
Alireza Hassani
Abstract:
Predicting the future location of mobile objects reinforces location-aware services with proactive intelligence and helps businesses and decision-makers with better planning and near real-time scheduling in different applications such as traffic congestion control, location-aware advertisements, and monitoring public health and well-being. The recent developments in the smartphone and location sen…
▽ More
Predicting the future location of mobile objects reinforces location-aware services with proactive intelligence and helps businesses and decision-makers with better planning and near real-time scheduling in different applications such as traffic congestion control, location-aware advertisements, and monitoring public health and well-being. The recent developments in the smartphone and location sensors technology and the prevalence of using location-based social networks alongside the improvements in artificial intelligence and machine learning techniques provide an excellent opportunity to exploit massive amounts of historical and real-time contextual information to recognise mobility patterns and achieve more accurate and intelligent predictions. This survey provides a comprehensive overview of the next useful location prediction problem with context-awareness. First, we explain the concepts of context and context-awareness and define the next location prediction problem. Then we analyse nearly thirty studies in this field concerning the prediction method, the challenges addressed, the datasets and metrics used for training and evaluating the model, and the types of context incorporated. Finally, we discuss the advantages and disadvantages of different approaches, focusing on the usefulness of the predicted location and identifying the open challenges and future work on this subject by introducing two potential use cases of next location prediction in the automotive industry.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
IoT-based Analysis for Smart Energy Management
Authors:
Guang-Li Huang,
Adnan Anwar,
Seng W. Loke,
Arkady Zaslavsky,
Jinho Choi
Abstract:
Smart energy management based on the Internet of Things (IoT) aims to achieve optimal energy utilization through real-time energy monitoring and analyses of power consumption patterns in IoT networks (e.g., residential homes and offices) supported by wireless technologies. This is of great significance for the sustainable development of energy. Energy disaggregation is an important technology to r…
▽ More
Smart energy management based on the Internet of Things (IoT) aims to achieve optimal energy utilization through real-time energy monitoring and analyses of power consumption patterns in IoT networks (e.g., residential homes and offices) supported by wireless technologies. This is of great significance for the sustainable development of energy. Energy disaggregation is an important technology to realize smart energy management, as it can determine the power consumption of each appliance from the total load (e.g., aggregated data). Also, it gives us clear insights into users' daily power-consumption-related behaviours, which can enhance their awareness of power-saving and lead them to a more sustainable lifestyle. This paper reviews the state-of-the-art algorithms for energy disaggregation and public datasets of power consumption. Also, potential use cases for smart energy management based on IoT networks are presented along with a discussion of open issues for future study.
△ Less
Submitted 25 August, 2023;
originally announced November 2023.
-
Energy-Efficient UAV-Assisted IoT Data Collection via TSP-Based Solution Space Reduction
Authors:
Sivaram Krishnan,
Mahyar Nemati,
Seng W. Loke,
Jihong Park,
Jinho Choi
Abstract:
This paper presents a wireless data collection framework that employs an unmanned aerial vehicle (UAV) to efficiently gather data from distributed IoT sensors deployed in a large area. Our approach takes into account the non-zero communication ranges of the sensors to optimize the flight path of the UAV, resulting in a variation of the Traveling Salesman Problem (TSP). We prove mathematically that…
▽ More
This paper presents a wireless data collection framework that employs an unmanned aerial vehicle (UAV) to efficiently gather data from distributed IoT sensors deployed in a large area. Our approach takes into account the non-zero communication ranges of the sensors to optimize the flight path of the UAV, resulting in a variation of the Traveling Salesman Problem (TSP). We prove mathematically that the optimal waypoints for this TSP-variant problem are restricted to the boundaries of the sensor communication ranges, greatly reducing the solution space. Building on this finding, we develop a low-complexity UAV-assisted sensor data collection algorithm, and demonstrate its effectiveness in a selected use case where we minimize the total energy consumption of the UAV and sensors by jointly optimizing the UAV's travel distance and the sensors' communication ranges.
△ Less
Submitted 2 June, 2023;
originally announced June 2023.
-
Deakin RF-Sensing: Experiments on Correlated Knowledge Distillation for Monitoring Human Postures with Radios
Authors:
Shiva Raj Pokhrel,
Jonathan Kua,
Deol Satish,
Philip Williams,
Arkady Zaslavsky,
Seng W. Loke,
Jinho Choi
Abstract:
In this work, we propose and develop a simple experimental testbed to study the feasibility of a novel idea by coupling radio frequency (RF) sensing technology with Correlated Knowledge Distillation (CKD) theory towards designing lightweight, near real-time and precise human pose monitoring systems. The proposed CKD framework transfers and fuses pose knowledge from a robust "Teacher" model to a pa…
▽ More
In this work, we propose and develop a simple experimental testbed to study the feasibility of a novel idea by coupling radio frequency (RF) sensing technology with Correlated Knowledge Distillation (CKD) theory towards designing lightweight, near real-time and precise human pose monitoring systems. The proposed CKD framework transfers and fuses pose knowledge from a robust "Teacher" model to a parameterized "Student" model, which can be a promising technique for obtaining accurate yet lightweight pose estimates. To assure its efficacy, we implemented CKD for distilling logits in our integrated Software Defined Radio (SDR)-based experimental setup and investigated the RF-visual signal correlation. Our CKD-RF sensing technique is characterized by two modes - a camera-fed Teacher Class Network (e.g., images, videos) with an SDR-fed Student Class Network (e.g., RF signals). Specifically, our CKD model trains a dual multi-branch teacher and student network by distilling and fusing knowledge bases. The resulting CKD models are then subsequently used to identify the multimodal correlation and teach the student branch in reverse. Instead of simply aggregating their learnings, CKD training comprised multiple parallel transformations with the two domains, i.e., visual images and RF signals. Once trained, our CKD model can efficiently preserve privacy and utilize the multimodal correlated logits from the two different neural networks for estimating poses without using visual signals/video frames (by using only the RF signals).
△ Less
Submitted 10 October, 2023; v1 submitted 24 May, 2023;
originally announced May 2023.
-
Context Query Simulation for Smart Carparking Scenarios in the Melbourne CDB
Authors:
Shakthi Weerasinghe,
Arkaday Zaslavsky,
Alireza Hassani,
Seng W. Loke,
Alexey Medvedev,
Amin Abken
Abstract:
The rapid growth in Internet of Things (IoT) has ushered in the way for better context-awareness enabling more smarter applications. Although for the growth in the number of IoT devices, Context Management Platforms (CMPs) that integrate different domains of IoT to produce context information lacks scalability to cater to a high volume of context queries. Research in scalability and adaptation in…
▽ More
The rapid growth in Internet of Things (IoT) has ushered in the way for better context-awareness enabling more smarter applications. Although for the growth in the number of IoT devices, Context Management Platforms (CMPs) that integrate different domains of IoT to produce context information lacks scalability to cater to a high volume of context queries. Research in scalability and adaptation in CMPs are of significant importance due to this reason. However, there is limited methods to benchmarks and validate research in this area due to the lack of sizable sets of context queries that could simulate real-world situations, scenarios, and scenes. Commercially collected context query logs are not publicly accessible and deploying IoT devices, and context consumers in the real-world at scale is expensive and consumes a significant effort and time. Therefore, there is a need to develop a method to reliably generate and simulate context query loads that resembles real-world scenarios to test CMPs for scale. In this paper, we propose a context query simulator for the context-aware smart car parking scenario in Melbourne Central Business District in Australia. We present the process of generating context queries using multiple real-world datasets and publicly accessible reports, followed by the context query execution process. The context query generator matches the popularity of places with the different profiles of commuters, preferences, and traffic variations to produce a dataset of context query templates containing 898,050 records. The simulator is executable over a seven-day profile which far exceeds the simulation time of any IoT system simulator. The context query generation process is also generic and context query language independent.
△ Less
Submitted 13 February, 2023;
originally announced February 2023.
-
Towards Human-Centred Crowd Computing: Software for Better Use of Computational Resources
Authors:
Niroshinie Fernando,
Chetan Arora,
Seng W. Loke,
Lubna Alam,
Stephen La Macchia,
Helen Graesser
Abstract:
Internet-connected smart devices are increasing at an exponential rate. These powerful devices have created a yet-untapped pool of idle resources that can be utilised, among others, for processing data in resource-depleted environments. The idea of bringing together a pool of smart devices for ``crowd computing'' (CC) has been studied in the recent past from an infrastructural feasibility perspect…
▽ More
Internet-connected smart devices are increasing at an exponential rate. These powerful devices have created a yet-untapped pool of idle resources that can be utilised, among others, for processing data in resource-depleted environments. The idea of bringing together a pool of smart devices for ``crowd computing'' (CC) has been studied in the recent past from an infrastructural feasibility perspective. However, for the CC paradigm to be successful, numerous socio-technical and software engineering (SE), specifically the requirements engineering (RE)-related factors are at play and have not been investigated in the literature. In this paper, we motivate the SE-related aspects of CC and the ideas for implementing mobile apps required for CC scenarios. We present the results of a preliminary study on understanding the human aspects, incentives that motivate users, and CC app requirements, and present our future development plan in this relatively new field of research for SE applications.
△ Less
Submitted 11 February, 2023;
originally announced February 2023.
-
Poisoning Attacks and Defenses in Federated Learning: A Survey
Authors:
Subhash Sagar,
Chang-Sun Li,
Seng W. Loke,
Jinho Choi
Abstract:
Federated learning (FL) enables the training of models among distributed clients without compromising the privacy of training datasets, while the invisibility of clients datasets and the training process poses a variety of security threats. This survey provides the taxonomy of poisoning attacks and experimental evaluation to discuss the need for robust FL.
Federated learning (FL) enables the training of models among distributed clients without compromising the privacy of training datasets, while the invisibility of clients datasets and the training process poses a variety of security threats. This survey provides the taxonomy of poisoning attacks and experimental evaluation to discuss the need for robust FL.
△ Less
Submitted 13 January, 2023;
originally announced January 2023.
-
Reinforcement Learning Based Approaches to Adaptive Context Caching in Distributed Context Management Systems
Authors:
Shakthi Weerasinghe,
Arkady Zaslavsky,
Seng W. Loke,
Amin Abken,
Alireza Hassani
Abstract:
Performance metrics-driven context caching has a profound impact on throughput and response time in distributed context management systems for real-time context queries. This paper proposes a reinforcement learning based approach to adaptively cache context with the objective of minimizing the cost incurred by context management systems in responding to context queries. Our novel algorithms enable…
▽ More
Performance metrics-driven context caching has a profound impact on throughput and response time in distributed context management systems for real-time context queries. This paper proposes a reinforcement learning based approach to adaptively cache context with the objective of minimizing the cost incurred by context management systems in responding to context queries. Our novel algorithms enable context queries and sub-queries to reuse and repurpose cached context in an efficient manner. This approach is distinctive to traditional data caching approaches by three main features. First, we make selective context cache admissions using no prior knowledge of the context, or the context query load. Secondly, we develop and incorporate innovative heuristic models to calculate expected performance of caching an item when making the decisions. Thirdly, our strategy defines a time-aware continuous cache action space. We present two reinforcement learning agents, a value function estimating actor-critic agent and a policy search agent using deep deterministic policy gradient method. The paper also proposes adaptive policies such as eviction and cache memory scaling to complement our objective. Our method is evaluated using a synthetically generated load of context sub-queries and a synthetic data set inspired from real world data and query samples. We further investigate optimal adaptive caching configurations under different settings. This paper presents, compares, and discusses our findings that the proposed selective caching methods reach short- and long-term cost- and performance-efficiency. The paper demonstrates that the proposed methods outperform other modes of context management such as redirector mode, and database mode, and cache all policy by up to 60% in cost efficiency.
△ Less
Submitted 9 February, 2023; v1 submitted 22 December, 2022;
originally announced December 2022.
-
From Traditional Adaptive Data Caching to Adaptive Context Caching: A Survey
Authors:
Shakthi Weerasinghe,
Arkady Zaslavsky,
Seng W. Loke,
Alireza Hassani,
Amin Abken,
Alexey Medvedev
Abstract:
Context information is in demand more than ever with the rapid increase in the number of context-aware Internet of Things applications developed worldwide. Research in context and context-awareness is being conducted to broaden its applicability in light of many practical and technical challenges. One of the challenges is improving performance when responding to a large number of context queries.…
▽ More
Context information is in demand more than ever with the rapid increase in the number of context-aware Internet of Things applications developed worldwide. Research in context and context-awareness is being conducted to broaden its applicability in light of many practical and technical challenges. One of the challenges is improving performance when responding to a large number of context queries. Context Management Platforms that infer and deliver context to applications measure this problem using Quality of Service (QoS) parameters. Although caching is a proven way to improve QoS, transiency of context and features such as variability and heterogeneity of context queries pose an additional real-time cost management problem. This paper presents a critical survey of the state-of-the-art in adaptive data caching with the objective of developing a body of knowledge in cost- and performance-efficient adaptive caching strategies. We comprehensively survey a large number of research publications and evaluate, compare, and contrast different techniques, policies, approaches, and schemes in adaptive caching. Our critical analysis is motivated by the focus on adaptively caching context as a core research problem. A formal definition for adaptive context caching is then proposed, followed by identified features and requirements of a well-designed, objective optimal adaptive context caching strategy.
△ Less
Submitted 9 February, 2023; v1 submitted 21 November, 2022;
originally announced November 2022.
-
From Distributed Quantum Computing to Quantum Internet Computing: an Overview
Authors:
Seng W. Loke
Abstract:
The possibility of quantum computing has been proposed decades ago, at least as far back as the 1980s, and distributed quantum computing has been studied around two decades ago. Recent times have seen experimental successes and advances in quantum computer hardware and in quantum networking, leading towards the quantum Internet. We provide in this paper an overview of concepts and ideas in distrib…
▽ More
The possibility of quantum computing has been proposed decades ago, at least as far back as the 1980s, and distributed quantum computing has been studied around two decades ago. Recent times have seen experimental successes and advances in quantum computer hardware and in quantum networking, leading towards the quantum Internet. We provide in this paper an overview of concepts and ideas in distributed quantum computing since over two decades ago as well as look at recent efforts in the area, and consider how, with the development of the quantum Internet, distributed quantum computing is evolving into quantum Internet computing.
△ Less
Submitted 24 August, 2022; v1 submitted 22 August, 2022;
originally announced August 2022.
-
The Rise of Quantum Internet Computing
Authors:
Seng W. Loke
Abstract:
This article highlights quantum Internet computing as referring to distributed quantum computing over the quantum Internet, analogous to (classical) Internet computing involving (classical) distributed computing over the (classical) Internet. Relevant to quantum Internet computing would be areas of study such as quantum protocols for distributed nodes using quantum information for computations, qu…
▽ More
This article highlights quantum Internet computing as referring to distributed quantum computing over the quantum Internet, analogous to (classical) Internet computing involving (classical) distributed computing over the (classical) Internet. Relevant to quantum Internet computing would be areas of study such as quantum protocols for distributed nodes using quantum information for computations, quantum cloud computing, delegated verifiable blind or private computing, non-local gates, and distributed quantum applications, over Internet-scale distances.
△ Less
Submitted 1 August, 2022;
originally announced August 2022.
-
A Unified Approach to Semantic Information and Communication based on Probabilistic Logic
Authors:
Jinho Choi,
Seng W. Loke,
Jihong Park
Abstract:
Traditionally, studies on technical communication (TC) are based on stochastic modeling and manipulation. This is not sufficient for semantic communication (SC) where semantic elements are logically connected, rather than stochastically correlated. To fill this void, by leveraging a logical programming language called probabilistic logic (ProbLog), we propose a unified approach to semantic informa…
▽ More
Traditionally, studies on technical communication (TC) are based on stochastic modeling and manipulation. This is not sufficient for semantic communication (SC) where semantic elements are logically connected, rather than stochastically correlated. To fill this void, by leveraging a logical programming language called probabilistic logic (ProbLog), we propose a unified approach to semantic information and communication through the interplay between TC and SC. On top of the well-established existing TC layer, we introduce a SC layer that utilizes knowledge bases of communicating parties for the exchange of semantic information. These knowledge bases are logically described, manipulated, and exploited using ProbLog. To make these SC and TC layers interact, we propose various measures based on the entropy of a clause in a knowledge base. These measures allow us to delineate various technical issues on SC such as a message selection problem for improving the knowledge base at a receiver. Extending this, we showcase selected examples in which SC and TC layers interact with each other while taking into account constraints on physical channels and efficiently utilizing channel resources.
△ Less
Submitted 1 May, 2022;
originally announced May 2022.
-
A Unified View on Semantic Information and Communication: A Probabilistic Logic Approach
Authors:
Jinho Choi,
Seng W. Loke,
Jihong Park
Abstract:
This article aims to provide a unified and technical approach to semantic information, communication, and their interplay through the lens of probabilistic logic. To this end, on top of the existing technical communication (TC) layer, we additionally introduce a semantic communication (SC) layer that exchanges logically meaningful clauses in knowledge bases. To make these SC and TC layers interact…
▽ More
This article aims to provide a unified and technical approach to semantic information, communication, and their interplay through the lens of probabilistic logic. To this end, on top of the existing technical communication (TC) layer, we additionally introduce a semantic communication (SC) layer that exchanges logically meaningful clauses in knowledge bases. To make these SC and TC layers interact, we propose various measures based on the entropy of a clause in a knowledge base. These measures allow us to delineate various technical issues on SC such as a message selection problem for improving the knowledge at a receiver. Extending this, we showcase selected examples in which SC and TC layers interact with each other while taking into account constraints on physical channels.
△ Less
Submitted 15 January, 2022;
originally announced January 2022.
-
Designed to Cooperate: A Kant-Inspired Ethic of Machine-to-Machine Cooperation
Authors:
Seng W. Loke
Abstract:
This position paper highlights an ethic of machine-to-machine cooperation and machine pro-sociality, and argues that machines capable of autonomous sensing, decision-making and action, such as automated vehicles and urban robots, owned and used by different self-interested parties, and having their own agendas (or interests of their owners) should be designed and built to be cooperative in their b…
▽ More
This position paper highlights an ethic of machine-to-machine cooperation and machine pro-sociality, and argues that machines capable of autonomous sensing, decision-making and action, such as automated vehicles and urban robots, owned and used by different self-interested parties, and having their own agendas (or interests of their owners) should be designed and built to be cooperative in their behaviours, especially if they share public spaces. That is, by design, the machine should first cooperate, and then only consider alternatives if there are problems. It is argued that being cooperative is not only important for their improved functioning, especially, when they use shared resources (e.g., parking spaces, public roads, curbside space and walkways), but also as a favourable requirement analogous to how humans cooperating with other humans can be advantageous and often viewed favourably. The usefulness of such machine-to-machine cooperation are illustrated via examples including cooperative crowdsourcing, cooperative traffic routing and parking as well as futuristic scenarios involving urban robots for delivery and shopping. It is argued that just as privacy-by-design and security-by-design are important considerations, in order to yield systems that fulfil ethical requirements, cooperative-by-design should also be an imperative for autonomous systems that are separately owned but co-inhabit the same spaces and use common resources. If a machine using shared public spaces is not cooperative, as one might expect, then it is not only anti-social but not behaving ethically. It is also proposed that certification for urban robots that operate in public could be explored.
△ Less
Submitted 30 November, 2022; v1 submitted 28 September, 2021;
originally announced September 2021.
-
Internet of Things in Space: A Review of Opportunities and Challenges from Satellite-Aided Computing to Digitally-Enhanced Space Living
Authors:
Jonathan Kua,
Chetan Arora,
Seng W. Loke,
Niroshinie Fernando,
Chathurika Ranaweera
Abstract:
Recent scientific and technological advancements driven by the Internet of Things (IoT), Machine Learning (ML) and Artificial Intelligence (AI), distributed computing and data communication technologies have opened up a vast range of opportunities in many scientific fields - spanning from fast, reliable and efficient data communication to large-scale cloud/edge computing and intelligent big data a…
▽ More
Recent scientific and technological advancements driven by the Internet of Things (IoT), Machine Learning (ML) and Artificial Intelligence (AI), distributed computing and data communication technologies have opened up a vast range of opportunities in many scientific fields - spanning from fast, reliable and efficient data communication to large-scale cloud/edge computing and intelligent big data analytics. Technological innovations and developments in these areas have also enabled many opportunities in the space industry. The successful Mars landing of NASA's Perseverance rover on February 18, 2021 represents another giant leap for mankind in space exploration. Emerging research and developments of connectivity and computing technologies in IoT for space/non-terrestrial environments is expected to yield significant benefits in the near future. This survey paper presents a broad overview of the area and provides a look-ahead of the opportunities made possible by IoT and space-based technologies. We first survey the current developments of IoT and space industry, and identify key challenges and opportunities in these areas. We then review the state-of-the-art and discuss future opportunities for IoT developments, deployment and integration to support future endeavours in space exploration.
△ Less
Submitted 10 September, 2021;
originally announced September 2021.
-
Robot-Friendly Cities
Authors:
Seng W. Loke
Abstract:
Robots are increasingly tested in public spaces, towards a future where urban environments are not only for humans but for autonomous systems. While robots are promising, for convenience and efficiency, there are challenges associated with building cities crowded with machines. This paper provides an overview of the problems and some solutions, and calls for greater attention on this matter.
Robots are increasingly tested in public spaces, towards a future where urban environments are not only for humans but for autonomous systems. While robots are promising, for convenience and efficiency, there are challenges associated with building cities crowded with machines. This paper provides an overview of the problems and some solutions, and calls for greater attention on this matter.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Towards Robotic Things in Society
Authors:
Seng W. Loke
Abstract:
Emerging are so-called smart things embedded with computational, sensing, networking and actuation capabilities, from smart bins to smart park benches, as well as the proliferation of autonomous vehicles and robots in an increasingly wide range of applications. This is not only an increased in automation affecting and hopefully improving daily life, but also calls for thinking about what a society…
▽ More
Emerging are so-called smart things embedded with computational, sensing, networking and actuation capabilities, from smart bins to smart park benches, as well as the proliferation of autonomous vehicles and robots in an increasingly wide range of applications. This is not only an increased in automation affecting and hopefully improving daily life, but also calls for thinking about what a society saturated with such robotic things (i.e., smart things and robots) might look like. This paper discusses five aspects of a vision of Internet connected robotic things (or Internet of Robotic Things (IoRT)) occupying and operating in public spaces, from streets, parks to shopping malls. We discuss, highlighting issues, with the notion of an entourage of drones and robots accompanying people in public places, the idea of creating environments or envelopes suitable for robot function, the idea of societies of robotic things, and governance for robotic things in public spaces.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Achieving Ethical Algorithmic Behaviour in the Internet-of-Things: a Review
Authors:
Seng W. Loke
Abstract:
The Internet-of-Things is emerging as a vast inter-connected space of devices and things surrounding people, many of which are increasingly capable of autonomous action, from automatically sending data to cloud servers for analysis, changing the behaviour of smart objects, to changing the physical environment. A wide range of ethical concerns has arisen in their usage and development in recent yea…
▽ More
The Internet-of-Things is emerging as a vast inter-connected space of devices and things surrounding people, many of which are increasingly capable of autonomous action, from automatically sending data to cloud servers for analysis, changing the behaviour of smart objects, to changing the physical environment. A wide range of ethical concerns has arisen in their usage and development in recent years. Such concerns are exacerbated by the increasing autonomy given to connected things. This paper reviews, via examples, the landscape of ethical issues, and some recent approaches to address these issues, concerning connected things behaving autonomously, as part of the Internet-of-Things. We consider ethical issues in relation to device operations and accompanying algorithms. Examples of concerns include unsecured consumer devices, data collection with health related Internet-of-Things, hackable vehicles and behaviour of autonomous vehicles in dilemma situations, accountability with Internet-of-Things systems, algorithmic bias, uncontrolled cooperation among things, and automation affecting user choice and control. Current ideas towards addressing a range of ethical concerns are reviewed and compared, including programming ethical behaviour, whitebox algorithms, blackbox validation, algorithmic social contracts, enveloping IoT systems, and guidelines and code of ethics for IoT developers - a suggestion from the analysis is that a multi-pronged approach could be useful, based on the context of operation and deployment.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Cooperative Automated Vehicles: a Review of Opportunities and Challenges in Socially Intelligent Vehicles Beyond Networking
Authors:
Seng W. Loke
Abstract:
The connected automated vehicle has been often touted as a technology that will become pervasive in society in the near future. One can view an automated vehicle as having Artificial Intelligence (AI) capabilities, being able to self-drive, sense its surroundings, recognise objects in its vicinity, and perform reasoning and decision-making.
Rather than being stand alone, we examine the need for…
▽ More
The connected automated vehicle has been often touted as a technology that will become pervasive in society in the near future. One can view an automated vehicle as having Artificial Intelligence (AI) capabilities, being able to self-drive, sense its surroundings, recognise objects in its vicinity, and perform reasoning and decision-making.
Rather than being stand alone, we examine the need for automated vehicles to cooperate and interact within their socio-cyber-physical environments, including the problems cooperation will solve, but also the issues and challenges. We review current work in cooperation for automated vehicles, based on selected examples from the literature. We conclude noting the need for the ability to behave cooperatively as a form of social-AI capability for automated vehicles, beyond sensing the immediate environment and beyond the underlying networking technology.
△ Less
Submitted 22 May, 2019; v1 submitted 1 October, 2017;
originally announced October 2017.
-
The Internet of Flying-Things: Opportunities and Challenges with Airborne Fog Computing and Mobile Cloud in the Clouds
Authors:
Seng W. Loke
Abstract:
This paper focuses on services and applications provided to mobile users using airborne computing infrastructure. We present concepts such as drones-as-a-service and fly-in,fly-out infrastructure, and note data management and system design issues that arise in these scenarios. Issues of Big Data arising from such applications, optimising the configuration of airborne and ground infrastructure to p…
▽ More
This paper focuses on services and applications provided to mobile users using airborne computing infrastructure. We present concepts such as drones-as-a-service and fly-in,fly-out infrastructure, and note data management and system design issues that arise in these scenarios. Issues of Big Data arising from such applications, optimising the configuration of airborne and ground infrastructure to provide the best QoS and QoE, situation-awareness, scalability, reliability, scheduling for efficiency, interaction with users and drones using physical annotations are outlined.
△ Less
Submitted 16 July, 2015;
originally announced July 2015.
-
EcoHomeHelper: An Expert System to Empower End-Users in Climate Change Action
Authors:
Matt Donato,
Seng W. Loke
Abstract:
Climate change has been a popular topic for a number of years now. Computer Science has contributed to aiding humanity in reducing energy requirements and consequently global warming. Much of this work is through calculators which determine a user's carbon footprint. However there are no expert systems which can offer advice in an efficient and time saving way. There are many publications which do…
▽ More
Climate change has been a popular topic for a number of years now. Computer Science has contributed to aiding humanity in reducing energy requirements and consequently global warming. Much of this work is through calculators which determine a user's carbon footprint. However there are no expert systems which can offer advice in an efficient and time saving way. There are many publications which do offer advice on reducing greenhouse gas (GHG) emissions but to find the advice the reader seeks will involve reading a lot of irrelevant material. This work built an expert system (which we call EcoHomeHelper) and attempted to show that it is useful in changing people's behaviour with respect to their GHG emissions and that they will be able to find the information in a more efficient manner. Twelve participants were used. Seven of which used the program and five who read and attempted to find advice by reading from a list. The application itself has current implementations and the concept further developed, has applications for the future.
△ Less
Submitted 8 June, 2010;
originally announced June 2010.
-
Secure Prolog-Based Mobile Code
Authors:
Seng Wai Loke,
Andrew Davison
Abstract:
LogicWeb mobile code consists of Prolog-like rules embedded in Web pages, thereby adding logic programming behaviour to those pages. Since LogicWeb programs are downloaded from foreign hosts and executed locally, there is a need to protect the client from buggy or malicious code. A security model is crucial for making LogicWeb mobile code safe to execute. This paper presents such a model, which…
▽ More
LogicWeb mobile code consists of Prolog-like rules embedded in Web pages, thereby adding logic programming behaviour to those pages. Since LogicWeb programs are downloaded from foreign hosts and executed locally, there is a need to protect the client from buggy or malicious code. A security model is crucial for making LogicWeb mobile code safe to execute. This paper presents such a model, which supports programs of varying trust levels by using different resource access policies. The implementation of the model derives from an extended operational semantics for the LogicWeb language, which provides a precise meaning of safety.
△ Less
Submitted 7 June, 2004;
originally announced June 2004.