The Investigation and Challenges of Advanced Applications Using Artificial IoT on Edge Computing
DOI:
https://doi.org/10.25212/lfu.qzj.8.2.55الملخص
The rapid development of Internet-of-Things (AIoT) systems that assess and respond intelligently to environmental stimuli without human participation has been substantially facilitated by the combined integration of AI and the IoT. However, the volume, velocity, and validity of data and catastrophic transmission latency make it difficult or impossible to process huge volumes of data on the cloud. Edge computing is a viable solution for these pressing problems. In the beginning it defines certain broad terms like "Internet of Things," "artificial intelligence," and "edge computing." Informed by these ideas, it investigates the broad architecture of AIoT, provides a real-world AIoT example to show how AI can be implemented in the real world, and analyzes promising AIoT use cases. In the other side, a general look at the state of the art in AI model inference and training at the network's edge have been showed. At the end, the remaining problems and potential future developments in this field are discussed in details. AIoT will also be accompanied with concerns such as security, data privacy, and ethical difficulties. The purpose of this research is to conduct an in-depth analysis of edge computing and the impact that AI has on the Internet of Things, a machine learning program determine how much data can be sent to the cloud with little loss of quality, AIoT architecture and provides a practical AIoT example to show how AI can be implemented in real-world. The analyzing results shows the uses, outcomes, and difficulties associated with AIoT and edge computing.
التنزيلات
المراجع
Amin, Syed Umar, and M. Shamim Hossain. 2021. “Edge Intelligence and Internet of Things in Healthcare: A Survey.” IEEE Access 9: 45–59.
Bangui, H., Rakrak, S., Raghay, S., & Buhnova, B. (2018). Moving to the edge-cloud-of-things: Recent advances and future research directions. Electronics, 7(11), 309. https://doi.org/10.3390/electronics7110309
Carvalho, Gonçalo, Bruno Cabral, Vasco Pereira, and Jorge Bernardino. 2020. “Computation Offloading in Edge Computing Environments Using Artificial Intelligence Techniques.” Engineering Applications of Artificial Intelligence 95(July): 103840. https://doi.org/10.1016/j.engappai.2020.103840.
Chen, Songlin et al. 2019. “Internet of Things Based Smart Grids Supported by Intelligent Edge Computing.” IEEE Access 7: 74089–102.
Cui, L., Yang, S., Chen, F., Ming, Z., Lu, N., & Qin, J. (2018). A survey on application of machine learning for Internet of Things. International Journal of Machine Learning and Cybernetics, 9(8), 1399-1417. https://doi.org/10.1007/s13042-018-0834-5
D., Dr. Sivaganesan. 2019. “Design and Development Ai-Enabled Edge Computing for Intelligent-Iot Applications.” Journal of Trends in Computer Science and Smart Technology 2019(02): 84–94.
Das, A. K., Zeadally, S., & He, D. (2018). Taxonomy and analysis of security protocols for Internet of Things. Future Generation Computer Systems, 89, 110-125. https://doi.org/10.1016/j.future.2018.06.027
Debauche, Olivier et al. 2020. “Edge Computing and Artificial Intelligence for Real-Time Poultry Monitoring.” Procedia Computer Science 175(2019): 534–41.
Din, I. U., Guizani, M., Rodrigues, J. J., Hassan, S., & Korotaev, V. V. (2019). Machine learning in the Internet of Things: Designed techniques for smart cities. Future Generation Computer Systems, 100, 826-843. https://doi.org/10.1016/j.future.2019.04.017
Deng, S., Zhao, H., Fang, W., Yin, J., Dustdar, S., & Zomaya, A. Y. (2020). Edge intelligence: The confluence of edge computing and artificial intelligence. IEEE InternetofThingsJournal,7(8),7457-7469. https://doi.org/10.1109/JIOT.2020.2984887
Dhuria, S., Gupta, A., & Singla, R. (2017). Review of pricing techniques in Cloud computing. In International Conference On “Recent Trends in Technology and its Impact on Economy of India”.
Fragkos, Georgios, Eirini Eleni Tsiropoulou, and Symeon Papavassiliou. 2020. “Artificial Intelligence Enabled Distributed Edge Computing for Internet of Things Applications.” Proceedings - 16th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2020: 450–57.
Jain, R., & Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey. IEEE Communications Magazine, 51(11), 24-31. https://doi.org/10.1109/MCOM.2013.6658648
Ghosh, A., Chakraborty, D., & Law, A. (2018). Artificial intelligence in Internet of things. CAAI Transactions on Intelligence Technology, 3(4), 208-218. https://doi.org/10.1049/trit.2018.1008
Gillam, L., & Antonopoulos, N. (Eds.). (2017). Cloud computing: principles, systems and applications. Springer.
Hua, Haochen et al. 2022. “Edge Computing with Artificial Intelligence: A Machine Learning Perspective.” ACM Computing Surveys.
Khan, Fazlullah et al. 2021. “A Secured and Intelligent Communication Scheme for IIoT-Enabled Pervasive Edge Computing.” IEEE Transactions on Industrial Informatics 17(7): 5128–37.
Kirsch, C. F., & Ho, M. L. (2021, April). Advanced Magnetic Resonance Imaging of the Skull Base. In Seminars in Ultrasound, CT and MRI. WB Saunders. https://doi.org/10.1053/j.sult.2021.04.006
Makkar, Aaisha, Uttam Ghosh, and Pradip Kumar Sharma. 2021. “Artificial Intelligence and Edge Computing-Enabled Web Spam Detection for Next Generation IoT Applications.” IEEE Sensors Journal 21(22): 25352–61.
Nguyen, Dinh C. et al. 2021. “Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges.” IEEE Internet of Things Journal 8(16): 12806–25.
Ni, Jianbing, Kuan Zhang, Xiaodong Lin, and Xuemin Sherman Shen. 2018. “Securing Fog Computing for Internet of Things Applications: Challenges and Solutions.” IEEE Communications Surveys and Tutorials 20(1): 601–28.
Nguyen, Dinh C. et al. 2021. “Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges.” IEEE Internet of Things Journal 8(16): 12806–25.
Premsankar, G., Ghaddar, B., Di Francesco, M., & Verago, R. (2018, April). Efficient placement of edge computing devices for vehicular applications in smart cities. In NOMS 2018-2018 IEEE/IFIP Network Operations and ManagementSymposium(pp.1-9).IEEE. http://dx.doi.org/10.1109/NOMS.2018.8406256
Qi, Q., & Tao, F. (2019). A smart manufacturing service system based on edge computing, fog computing, and cloud computing. IEEE Access, 7, 86769-86777. https://dx.doi.org/10.3390%2Fs21113715
Ren, J., Guo, H., Xu, C., & Zhang, Y. (2017). Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Network, 31(5), 96-105.
https://doi.org/10.1109/MNET.2017.1700030
Sodhro, Ali Hassan, Sandeep Pirbhulal, and Victor Hugo C. De Albuquerque. 2019. “Artificial Intelligence-Driven Mechanism for Edge Computing-Based Industrial Applications.” IEEE Transactions on Industrial Informatics 15(7): 4235–43.
Satyanarayanan, M. (2017). The emergence of edge computing. Computer, 50(1), 30-39. https://doi.org/10.1109/MC.2017.9
Mohammadi, M., Al-Fuqaha, A., Sorour, S., & Guizani, M. (2018). Deep learning for IoT big data and streaming analytics: A survey. IEEE Communications Surveys & Tutorials, 20(4), 2923-2960. https://doi.org/10.1109/COMST.2018.2844341
Wang, L., Ranjan, R., Chen, J., & Benatallah, B. (Eds.). (2017). Cloud computing: methodology,systems,andapplications.CRCPress.https://doi.org/10.1201/b11149
Zeyu, Huang, Xia Geming, Wang Zhaohang, and Yuan Sen. 2020. “Survey on Edge Computing Security.” Proceedings - 2020 International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering, ICBAIE 2020: 96–105.
التنزيلات
منشور
كيفية الاقتباس
إصدار
القسم
الرخصة
هذا العمل مرخص بموجب Creative Commons Attribution 4.0 International License.
Qalaai Zanist Journal allows the author to retain the copyright in their articles. Articles are instead made available under a Creative Commons license to allow others to freely access, copy and use research provided the author is correctly attributed.
Creative Commons is a licensing scheme that allows authors to license their work so that others may re-use it without having to contact them for permission