Control systems and computer science are two distinct and important fields
of engineering. The development of cloud computing in computer science
has become an enabler for the widely used controller in control systems to
migrate to the cloud and has created a new field of research in cloud-based
control systems (CCS). The paper used the systematic literature review
approach to obtain insight into current CCS research. The objectives include
a review in areas such as the demographics, topics of the research,
evaluation method, and application domain. To that end, systematic
literature review (SLR) has been conducted. The study obtained 64 primary
studies from 581 articles. The CCS has a distinct characteristic; despite the
fact that the cloud and network dynamics system, when coupled with the
controlled plant, is inherently nonlinear, research efforts have used linear
models with optimal control to approach it successfully in a limited case of
control objectives. Furthermore, cloud-centric and cloud-fog network
architecture approaches are considered in the studies—whereas, the
quantitative method mainly uses simulation and discussion. Finally, the SLR
summarizes open challenges for CCS in the future.
Network control system (NCS) approaches for distributed closed-loop control systems have been established in industrial control. However, recent advancements in cloud computing provide scalable, elastic, and low-cost networked computing capabilities over the internet, which can be utilized as an extension of NCS, in this term, cloud-based control systems (CCS) with a potential replacement of the controller. The main objective of this research is to use bibliometric analysis to obtain insight into diachronic productivity, the significant effect of the published information on the research network, and research trends based on term co-occurrences of the CCS domain. The literature study employs the PRISMA method to construct necessary inclusion criteria such as keywords, databases, publication year, accessibility, and primary article, then Publish or Perish is used to generate RIS formatted file for network analysis of co-authorship and term co-occurrence with VOSviewer. The results showed that Yuanqing Xia was the most prolific author in terms of the total published article and total citations received, China was the country with the highest publication output, and Elsevier was the publisher with the most significant impact factor. CCS emerged in 2012, and current research trends include control system architecture, controller, algorithm, stability, and approach on intelligent manufacturing.
Cloud management and monitoring: a systematic mapping studynooriasukmaningtyas
A key component of ensuring that services are available on the cloud at the right time in the right manner is adequate cloud management. This makes it possible to provide services that meets user demands. The purpose of this research is to carry out a systematic study of management and monitoring on the cloud. Three facets were applied in conducting the categorization. These are the contribution, research, and topic facets. The purpose was to determine the level of work so far carried out in the field of cloud management. This enabled the creation of a pictorial representation of the research coverage. The result of the study showed that there are no opinion research on cloud management. Generally, articles on experience research, philosophical research and metric are the lowest at 6.62%, 4.41% and 1.90% respectively, while articles on models, solution research and evaluation research are the highest with 52.38%, 46.32% and 31.62% respectively. The outcome of this study will stimulate further research in the area cloud management and systematic studies.
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
This document discusses cyber threats and security approaches for cyber-physical systems (CPS). It first reviews studies on CPS security modeling and data management. It then discusses three main approaches for modeling and optimizing secure CPS: model-based design, platform-based design, and contract-based design. Next, it covers four methods for CPS risk assessment: expert elicitation models, attack graphs, game theory, and Petri nets. It concludes by discussing reachability analysis, controller synthesis, and vulnerability analysis techniques for verifying CPS models and properties.
A systematic mapping study of performance analysis and modelling of cloud sys...IJECEIAES
Cloud computing is a paradigm that uses utility-driven models in providing dynamic services to clients at all levels. Performance analysis and modelling is essential because of service level agreement guarantees. Studies on performance analysis and modelling are increasing in a productive manner on the cloud landscape on issues like virtual machines and data storage. The objective of this study is to conduct a systematic mapping study of performance analysis and modelling of cloud systems and applications. A systematic mapping study is useful in visualization and summarizing the research carried in an area of interest. The systematic study provided an overview of studies on this subject by using a structure, based on categorization. The results are presented in terms of research such as evaluation and solution, and contribution such as tools and method utilized. The results showed that there were more discussions on optimization in relation to tool, method and process with 6.42%, 14.29% and 7.62% respectively. In addition, analysis based on designs in terms of model had 14.29% and publication relating to optimization in terms of evaluation research had 9.77%, validation 7.52%, experience 3.01%, and solution 10.51%. Research gaps were identified and should motivate researchers in pursuing further research directions.
Architecting a machine learning pipeline for online traffic classification in...IAESIJAI
Precise traffic classification is essential to numerous network functionalities
such as routing, network management, and resource allocation. Traditional
classification techniques became insufficient due to the massive growth of
network traffic that requires high computational costs. The arising model of
software defined networking (SDN) has adjusted the network architecture to
get a centralized controller that preserves a global view over the entire
network. This paper proposes a model for SDN traffic classification based
on machine learning (ML) using the Spark framework. The proposed model
consists of two phases; learning and deployment. A ML pipeline is
constructed in the learning phase, consisting of a set of stages combined as a
single entity. Three ML models are built and evaluated; decision tree,
random forest, and logistic regression, for classifying a well-known 75
applications, including Google and YouTube, accurately and in a short time
scale. A dataset consisting of 3,577,296 flows with 87 features is used for
training and testing the models. The decision tree model is elected for
deployment according to the performance results, which indicate that it has
the best accuracy with 0.98. The performance of the proposed model is
compared with the state-of-the-art works, and better accuracy result is
reported.
Activity Context Modeling in Context-AwareEditor IJCATR
The explosion of mobile devices has fuelled the advancement of pervasive computing to provide personal assistance in this
information-driven world. Pervasive computing takes advantage of context-aware computing to track, use and adapt to contextual
information. The context that has attracted the attention of many researchers is the activity context. There are six major techniques that
are used to model activity context. These techniques are key-value, logic-based, ontology-based, object-oriented, mark-up schemes and
graphical. This paper analyses these techniques in detail by describing how each technique is implemented while reviewing their pros
and cons. The paper ends with a hybrid modeling method that fits heterogeneous environment while considering the entire of modeling
through data acquisition and utilization stages. The modeling stages of activity context are data sensation, data abstraction and
reasoning and planning. The work revealed that mark-up schemes and object-oriented are best applicable at the data sensation stage.
Key-value and object-oriented techniques fairly support data abstraction stage whereas the logic-based and ontology-based techniques
are the ideal techniques for reasoning and planning stage. In a distributed system, mark-up schemes are very useful in data
communication over a network and graphical technique should be used when saving context data into database.
Network control system (NCS) approaches for distributed closed-loop control systems have been established in industrial control. However, recent advancements in cloud computing provide scalable, elastic, and low-cost networked computing capabilities over the internet, which can be utilized as an extension of NCS, in this term, cloud-based control systems (CCS) with a potential replacement of the controller. The main objective of this research is to use bibliometric analysis to obtain insight into diachronic productivity, the significant effect of the published information on the research network, and research trends based on term co-occurrences of the CCS domain. The literature study employs the PRISMA method to construct necessary inclusion criteria such as keywords, databases, publication year, accessibility, and primary article, then Publish or Perish is used to generate RIS formatted file for network analysis of co-authorship and term co-occurrence with VOSviewer. The results showed that Yuanqing Xia was the most prolific author in terms of the total published article and total citations received, China was the country with the highest publication output, and Elsevier was the publisher with the most significant impact factor. CCS emerged in 2012, and current research trends include control system architecture, controller, algorithm, stability, and approach on intelligent manufacturing.
Cloud management and monitoring: a systematic mapping studynooriasukmaningtyas
A key component of ensuring that services are available on the cloud at the right time in the right manner is adequate cloud management. This makes it possible to provide services that meets user demands. The purpose of this research is to carry out a systematic study of management and monitoring on the cloud. Three facets were applied in conducting the categorization. These are the contribution, research, and topic facets. The purpose was to determine the level of work so far carried out in the field of cloud management. This enabled the creation of a pictorial representation of the research coverage. The result of the study showed that there are no opinion research on cloud management. Generally, articles on experience research, philosophical research and metric are the lowest at 6.62%, 4.41% and 1.90% respectively, while articles on models, solution research and evaluation research are the highest with 52.38%, 46.32% and 31.62% respectively. The outcome of this study will stimulate further research in the area cloud management and systematic studies.
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
This document discusses cyber threats and security approaches for cyber-physical systems (CPS). It first reviews studies on CPS security modeling and data management. It then discusses three main approaches for modeling and optimizing secure CPS: model-based design, platform-based design, and contract-based design. Next, it covers four methods for CPS risk assessment: expert elicitation models, attack graphs, game theory, and Petri nets. It concludes by discussing reachability analysis, controller synthesis, and vulnerability analysis techniques for verifying CPS models and properties.
A systematic mapping study of performance analysis and modelling of cloud sys...IJECEIAES
Cloud computing is a paradigm that uses utility-driven models in providing dynamic services to clients at all levels. Performance analysis and modelling is essential because of service level agreement guarantees. Studies on performance analysis and modelling are increasing in a productive manner on the cloud landscape on issues like virtual machines and data storage. The objective of this study is to conduct a systematic mapping study of performance analysis and modelling of cloud systems and applications. A systematic mapping study is useful in visualization and summarizing the research carried in an area of interest. The systematic study provided an overview of studies on this subject by using a structure, based on categorization. The results are presented in terms of research such as evaluation and solution, and contribution such as tools and method utilized. The results showed that there were more discussions on optimization in relation to tool, method and process with 6.42%, 14.29% and 7.62% respectively. In addition, analysis based on designs in terms of model had 14.29% and publication relating to optimization in terms of evaluation research had 9.77%, validation 7.52%, experience 3.01%, and solution 10.51%. Research gaps were identified and should motivate researchers in pursuing further research directions.
Architecting a machine learning pipeline for online traffic classification in...IAESIJAI
Precise traffic classification is essential to numerous network functionalities
such as routing, network management, and resource allocation. Traditional
classification techniques became insufficient due to the massive growth of
network traffic that requires high computational costs. The arising model of
software defined networking (SDN) has adjusted the network architecture to
get a centralized controller that preserves a global view over the entire
network. This paper proposes a model for SDN traffic classification based
on machine learning (ML) using the Spark framework. The proposed model
consists of two phases; learning and deployment. A ML pipeline is
constructed in the learning phase, consisting of a set of stages combined as a
single entity. Three ML models are built and evaluated; decision tree,
random forest, and logistic regression, for classifying a well-known 75
applications, including Google and YouTube, accurately and in a short time
scale. A dataset consisting of 3,577,296 flows with 87 features is used for
training and testing the models. The decision tree model is elected for
deployment according to the performance results, which indicate that it has
the best accuracy with 0.98. The performance of the proposed model is
compared with the state-of-the-art works, and better accuracy result is
reported.
Activity Context Modeling in Context-AwareEditor IJCATR
The explosion of mobile devices has fuelled the advancement of pervasive computing to provide personal assistance in this
information-driven world. Pervasive computing takes advantage of context-aware computing to track, use and adapt to contextual
information. The context that has attracted the attention of many researchers is the activity context. There are six major techniques that
are used to model activity context. These techniques are key-value, logic-based, ontology-based, object-oriented, mark-up schemes and
graphical. This paper analyses these techniques in detail by describing how each technique is implemented while reviewing their pros
and cons. The paper ends with a hybrid modeling method that fits heterogeneous environment while considering the entire of modeling
through data acquisition and utilization stages. The modeling stages of activity context are data sensation, data abstraction and
reasoning and planning. The work revealed that mark-up schemes and object-oriented are best applicable at the data sensation stage.
Key-value and object-oriented techniques fairly support data abstraction stage whereas the logic-based and ontology-based techniques
are the ideal techniques for reasoning and planning stage. In a distributed system, mark-up schemes are very useful in data
communication over a network and graphical technique should be used when saving context data into database.
Analysis and assessment software for multi-user collaborative cognitive radi...IJECEIAES
Computer simulations are without a doubt a useful methodology that allows to explore research queries and develop prototypes at lower costs and timeframes than those required in hardware processes. The simulation tools used in cognitive radio networks (CRN) are undergoing an active process. Currently, there is no stable simulator that enables to characterize every element of the cognitive cycle and the available tools are a framework for discrete-event software. This work presents the spectral mobility simulator in CRN called “App MultiColl-DCRN”, developed with MATLAB’s app designer. In contrast with other frameworks, the simulator uses real spectral occupancy data and simultaneously analyzes features regarding spectral mobility, decision-making, multi-user access, collaborative scenarios and decentralized architectures. Performance metrics include bandwidth, throughput level, number of failed handoffs, number of total handoffs, number of handoffs with interference, number of anticipated handoffs and number of perfect handoffs. The assessment of the simulator involves three scenarios: the first and second scenarios present a collaborative structure using the multi-criteria optimization and compromise solution (VIKOR) decision-making model and the naïve Bayes prediction technique respectively. The third scenario presents a multi-user structure and uses simple additive weighting (SAW) as a decision-making technique. The present development represents a contribution in the cognitive radio network field since there is currently no software with the same features.
This document provides a summary of a systematic review of authentication techniques for smart grids. The review analyzed 27 papers on smart grid authentication approaches and their effectiveness in mitigating certain attacks. The review found that password-based authentication is not optimal for smart grids as it does not provide mutual authentication. Certificate-less authentication was identified as an appropriate approach. Time-valid one-time signature schemes were also analyzed and found to be a theoretically optimal solution, but more research is needed. The review aims to identify optimized authentication solutions for smart grid components and analyze their effectiveness against different attack types to inform the design of improved authentication approaches.
The document summarizes three journal articles about grid and cloud computing.
The first journal investigates the benefits of grid computing technologies for high-performance computing. It uses a case study approach and experimental methodology. Three scenarios are modeled to test average job response times.
The second journal aims to develop a prototype integrating grid technologies with NASA's web GIS software. It determines integration models and system architecture through data gathering and analysis. Components are developed and tested within a virtual organization environment.
The third journal comprehensively compares grid and cloud computing concepts from different perspectives. It collects data through observations and content analysis of definitions to ensure cloud computing is not just a renaming of grid computing.
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...IJCNCJournal
This document summarizes a study on developing methods and algorithms for classifying data flows of cloud applications in the network of a virtual data center. The researchers developed a hybrid approach using data mining and machine learning methods to classify traffic flows in real-time. They created an algorithm for classifying and adaptively routing cloud application traffic flows, which was implemented as a module in the software-defined network controller. This solution aims to improve the efficiency of handling user requests to cloud applications and reduce response times.
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVEIJNSA Journal
A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT). Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. It has considerably changed the power sector regarding operations, services optimization, power distribution, asset management and aided in engaging customers to reduce energy consumption. Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. This review discusses the security challenges posed by IoT in power generation and critical infrastructure. To achieve this, the authors present the various IoT applications, particularly on the grid infrastructure, from an empirical literature perspective. The authors concluded by discussing how the various entities in the sector can overcome these security challenges to ensure an exemplary future IoT implementation on the power critical infrastructure value chain.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
Controller selection in software defined networks using best-worst multi-crit...journalBEEI
This document discusses selecting the best SDN controller using a multi-criteria decision making approach. It identifies 7 candidate SDN controllers (NOX, POX, Beacon, Floodlight, Ryu, ODL, ONOS) and defines both quantitative and qualitative criteria to evaluate them, such as throughput, latency, APIs, programming language, and legacy network support. It proposes using the best-worst multi-criteria decision making (BWM) method to determine the weights of each criterion and ultimately select the best controller based on user requirements and preferences. An optimization approach is applied to evaluate the controllers' performance on key criteria and determine which controllers, ONOS and ODL, are the most robust options overall.
This document describes a scalable data management system implemented for managing large volumes of data collected from smart meters in an IoT network. The system receives data from smart meters daily, including electricity/gas consumption, voltage/current levels, battery status, etc. and generates reports. To improve performance for large networks, the system employs caching and indexing to reduce database queries. It also performs data preprocessing like deduplication and validation to reduce stored data volumes. Evaluation shows the system achieves significant performance gains in response times for queries on large datasets using these scalability methods.
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
This document analyzes security concerns and methodologies related to cloud computing. It begins with an abstract that introduces cloud computing and discusses security concerns with utilizing cloud-based services. The document then reviews literature on cloud computing fundamentals, performance, scalability, availability, and security challenges. It examines common security threats to cloud computing like data loss, malicious insiders, insecure interfaces, and account hijacking. The document also outlines requirements for security in cloud computing and analyzes cryptographic algorithms and their parameters that can help strengthen security. It concludes by comparing different cryptographic algorithms based on parameters like level of data protection and availability.
A predictive model for network intrusion detection using stacking approach IJECEIAES
This document presents a predictive stacking model for network intrusion detection using two machine learning datasets - UNSW NB-15 and UGR'16. The stacking approach uses logistic regression, K nearest neighbor, decision tree, and random forest classifiers at level 0, with random forest as the meta classifier. Feature selection is performed on UNSW NB-15 to identify the most important 16 features out of 47 using permutation feature importance. Hyperparameters of the classifiers are tuned to improve performance. The stacking model is implemented using the Graphlab Create machine learning platform and evaluated on the two datasets, showing reasonably good results with fewer misclassifications of attack types.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Petar Radanliev
We explore the potential and practical challenges in the use of artificial intelligence (AI) in cyber risk analytics, for improv- ing organisational resilience and understanding cyber risk. The research is focused on identifying the role of AI in con- nected devices such as Internet of Things (IoT) devices. Through literature review, we identify wide ranging and creative methodologies for cyber analytics and explore the risks of deliberately influencing or disrupting behaviours to socio- technical systems. This resulted in the modelling of the connections and interdependencies between a system’s edge components to both external and internal services and systems. We focus on proposals for models, infrastructures and frameworks of IoT systems found in both business reports and technical papers. We analyse this juxtaposition of related systems and technologies, in academic and industry papers published in the past 10 years. Then, we report the results of a qualitative empirical study that correlates the academic literature with key technological advances in connected devices. The work is based on grouping future and present techniques and presenting the results through a new con- ceptual framework. With the application of social science’s grounded theory, the framework details a new process for a prototype of AI-enabled dynamic cyber risk analytics at the edge.
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
This document proposes a new efficient solitude securing ranked keyword search technique for cloud computing. It presents a Multi-keyword Ranked Search over Encrypted Hierarchical Clustering Index (MRSE-HCI) architecture that uses quality hierarchical clustering to organize documents and support fast keyword searches in an encrypted cloud environment. The technique uses a minimum hash subtree to verify the correctness and freshness of search results to address integrity and security issues. Experimental results demonstrate that the proposed technique improves search efficiency, accuracy, and rank privacy compared to traditional methods.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
This paper proposes the use of design patterns in a marine research general information platform. The development of the platform refers to a design of complicated system architecture. Creation and execution of the research workflow nodes and designing of visualization library suited for marine users play an important role in the whole software architecture. This paper studies the requirements characteristic in marine research fields and has implemented a series of framework to solve these problems based on object-oriented and design patterns techniques. These frameworks make clear the relationship in all directions between modules and layers of software, which communicate through unified abstract interface and reduce the coupling between modules and layers. The building of these frameworks is importantly significant in advancing the reusability of software and strengthening extensibility and maintainability of the system.
The document provides information about seminars offered by Alidade Institute on topics related to defense, homeland security, and military operations. The seminars provide research and insights into emerging technical disciplines and their application to operational challenges. They are designed for military, civilian, and defense industry professionals and can be tailored for specific organizations or research topics. The seminars also cover quantitative techniques for analyzing cyber operations, network science fundamentals, operations research for unmanned systems, networked military systems, command and control network analysis, and adaptive logistics. Standard seminar pricing is listed.
Cobe framework cloud ontology blackboard environment for enhancing discovery ...ijccsa
The new relatively concept of cloud computing & its associated methodologies has many advantages in the
world of today. Such advantages range between providing solutions for integration of the miscellaneous
systems & presenting as well guarantees for distribution of searching means & integration of software
tools which are used by consumers & different providers. In this paper, we have constructed an ontologybased
cloud framework with a view to identifying its external agent’s interoperability. The proposed
framework has been designed using the blackboard design style. This framework is composed of mainly
two components: controller and cloud ontology blackboard environment. The function of the controller is
to interact with consumers after receipt of the subject request where it spontaneously uses the ontology
base to distribute it & constitute the required related responses whereas the function of the second
framework component is to interact with different cloud providers and systems, using the meta-ontology
framework to restructure data via using AI reasoning tools and map them to its corresponding
redistributed request. Finally, E-tourism case study can be applicable will be explored.
Blockchain-IoT supply chain: systematic literature reviewTELKOMNIKA JOURNAL
Since 2016, the implementation of blockchain in the supply chain has attracted wide interest among researchers. The creation and study of blockchain technology have grown at an exponential rate in the last decade. The supply chain would be a massive technological leap with the combination of blockchain technology that brings major changes to different facets of the industry, such as record immutability, improved traceability, quality assurance, improved knowledge flows, decentralized power structure, and decreased chances of fraud. With the growth in blockchain Internet-of-Thing (IoT) supply chain technologies, the security risk of implementing such technologies and methods to counter it has been largely discussed among researchers. This study analyses peer-reviewed literature attempting to use authentication in the blockchain-IoT supply chain to counter security risks in the technologies and provides a comprehensive analysis of the important feature when creating an authentication technique for the blockchain-IoT supply chain. Finally, the study discusses some of the problems and research objectives in the realm of authentication in the blockchain-IoT supply chain.
Because of the rapid growth in technology breakthroughs, including
multimedia and cell phones, Telugu character recognition (TCR) has recently
become a popular study area. It is still necessary to construct automated and
intelligent online TCR models, even if many studies have focused on offline
TCR models. The Telugu character dataset construction and validation using
an Inception and ResNet-based model are presented. The collection of 645
letters in the dataset includes 18 Achus, 38 Hallus, 35 Othulu, 34×16
Guninthamulu, and 10 Ankelu. The proposed technique aims to efficiently
recognize and identify distinctive Telugu characters online. This model's main
pre-processing steps to achieve its goals include normalization, smoothing,
and interpolation. Improved recognition performance can be attained by using
stochastic gradient descent (SGD) to optimize the model's hyperparameters.
Scientific workload execution on a distributed computing platform such as a
cloud environment is time-consuming and expensive. The scientific workload
has task dependencies with different service level agreement (SLA)
prerequisites at different levels. Existing workload scheduling (WS) designs
are not efficient in assuring SLA at the task level. Alongside, induces higher
costs as the majority of scheduling mechanisms reduce either time or energy.
In reducing, cost both energy and makespan must be optimized together for
allocating resources. No prior work has considered optimizing energy and
processing time together in meeting task level SLA requirements. This paper
presents task level energy and performance assurance-workload scheduling
(TLEPA-WS) algorithm for the distributed computing environment. The
TLEPA-WS guarantees energy minimization with the performance
requirement of the parallel application under a distributed computational
environment. Experiment results show a significant reduction in using energy
and makespan; thereby reducing the cost of workload execution in comparison
with various standard workload execution models.
More Related Content
Similar to Cloud-based control systems: a systematic literature review
Analysis and assessment software for multi-user collaborative cognitive radi...IJECEIAES
Computer simulations are without a doubt a useful methodology that allows to explore research queries and develop prototypes at lower costs and timeframes than those required in hardware processes. The simulation tools used in cognitive radio networks (CRN) are undergoing an active process. Currently, there is no stable simulator that enables to characterize every element of the cognitive cycle and the available tools are a framework for discrete-event software. This work presents the spectral mobility simulator in CRN called “App MultiColl-DCRN”, developed with MATLAB’s app designer. In contrast with other frameworks, the simulator uses real spectral occupancy data and simultaneously analyzes features regarding spectral mobility, decision-making, multi-user access, collaborative scenarios and decentralized architectures. Performance metrics include bandwidth, throughput level, number of failed handoffs, number of total handoffs, number of handoffs with interference, number of anticipated handoffs and number of perfect handoffs. The assessment of the simulator involves three scenarios: the first and second scenarios present a collaborative structure using the multi-criteria optimization and compromise solution (VIKOR) decision-making model and the naïve Bayes prediction technique respectively. The third scenario presents a multi-user structure and uses simple additive weighting (SAW) as a decision-making technique. The present development represents a contribution in the cognitive radio network field since there is currently no software with the same features.
This document provides a summary of a systematic review of authentication techniques for smart grids. The review analyzed 27 papers on smart grid authentication approaches and their effectiveness in mitigating certain attacks. The review found that password-based authentication is not optimal for smart grids as it does not provide mutual authentication. Certificate-less authentication was identified as an appropriate approach. Time-valid one-time signature schemes were also analyzed and found to be a theoretically optimal solution, but more research is needed. The review aims to identify optimized authentication solutions for smart grid components and analyze their effectiveness against different attack types to inform the design of improved authentication approaches.
The document summarizes three journal articles about grid and cloud computing.
The first journal investigates the benefits of grid computing technologies for high-performance computing. It uses a case study approach and experimental methodology. Three scenarios are modeled to test average job response times.
The second journal aims to develop a prototype integrating grid technologies with NASA's web GIS software. It determines integration models and system architecture through data gathering and analysis. Components are developed and tested within a virtual organization environment.
The third journal comprehensively compares grid and cloud computing concepts from different perspectives. It collects data through observations and content analysis of definitions to ensure cloud computing is not just a renaming of grid computing.
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...IJCNCJournal
This document summarizes a study on developing methods and algorithms for classifying data flows of cloud applications in the network of a virtual data center. The researchers developed a hybrid approach using data mining and machine learning methods to classify traffic flows in real-time. They created an algorithm for classifying and adaptively routing cloud application traffic flows, which was implemented as a module in the software-defined network controller. This solution aims to improve the efficiency of handling user requests to cloud applications and reduce response times.
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVEIJNSA Journal
A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT). Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. It has considerably changed the power sector regarding operations, services optimization, power distribution, asset management and aided in engaging customers to reduce energy consumption. Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. This review discusses the security challenges posed by IoT in power generation and critical infrastructure. To achieve this, the authors present the various IoT applications, particularly on the grid infrastructure, from an empirical literature perspective. The authors concluded by discussing how the various entities in the sector can overcome these security challenges to ensure an exemplary future IoT implementation on the power critical infrastructure value chain.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
Controller selection in software defined networks using best-worst multi-crit...journalBEEI
This document discusses selecting the best SDN controller using a multi-criteria decision making approach. It identifies 7 candidate SDN controllers (NOX, POX, Beacon, Floodlight, Ryu, ODL, ONOS) and defines both quantitative and qualitative criteria to evaluate them, such as throughput, latency, APIs, programming language, and legacy network support. It proposes using the best-worst multi-criteria decision making (BWM) method to determine the weights of each criterion and ultimately select the best controller based on user requirements and preferences. An optimization approach is applied to evaluate the controllers' performance on key criteria and determine which controllers, ONOS and ODL, are the most robust options overall.
This document describes a scalable data management system implemented for managing large volumes of data collected from smart meters in an IoT network. The system receives data from smart meters daily, including electricity/gas consumption, voltage/current levels, battery status, etc. and generates reports. To improve performance for large networks, the system employs caching and indexing to reduce database queries. It also performs data preprocessing like deduplication and validation to reduce stored data volumes. Evaluation shows the system achieves significant performance gains in response times for queries on large datasets using these scalability methods.
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
This document analyzes security concerns and methodologies related to cloud computing. It begins with an abstract that introduces cloud computing and discusses security concerns with utilizing cloud-based services. The document then reviews literature on cloud computing fundamentals, performance, scalability, availability, and security challenges. It examines common security threats to cloud computing like data loss, malicious insiders, insecure interfaces, and account hijacking. The document also outlines requirements for security in cloud computing and analyzes cryptographic algorithms and their parameters that can help strengthen security. It concludes by comparing different cryptographic algorithms based on parameters like level of data protection and availability.
A predictive model for network intrusion detection using stacking approach IJECEIAES
This document presents a predictive stacking model for network intrusion detection using two machine learning datasets - UNSW NB-15 and UGR'16. The stacking approach uses logistic regression, K nearest neighbor, decision tree, and random forest classifiers at level 0, with random forest as the meta classifier. Feature selection is performed on UNSW NB-15 to identify the most important 16 features out of 47 using permutation feature importance. Hyperparameters of the classifiers are tuned to improve performance. The stacking model is implemented using the Graphlab Create machine learning platform and evaluated on the two datasets, showing reasonably good results with fewer misclassifications of attack types.
Evaluation quality of service for internet of things based on fuzzy logic: a ...nooriasukmaningtyas
The development of the internet of thing (IoT) technology has become a major concern in sustainability of quality of service (SQoS) in terms of efficiency, measurement, and evaluation of services, such as our smart home case study. Based on several ambiguous linguistic and standard criteria, this article deals with quality of service (QoS). We used fuzzy logic to select the most appropriate and efficient services. For this reason, we have introduced a new paradigmatic approach to assess QoS. In this regard, to measure SQoS, linguistic terms were collected for identification of ambiguous criteria. This paper collects the results of other work to compare the traditional assessment methods and techniques in IoT. It has been proven that the comparison that traditional valuation methods and techniques could not effectively deal with these metrics. Therefore, fuzzy logic is a worthy method to provide a good measure of QoS with ambiguous linguistic and criteria. The proposed model addresses with constantly being improved, all the main axes of the QoS for a smart home. The results obtained also indicate that the model with its fuzzy performance importance index (FPII) has efficiently evaluate the multiple services of SQoS.
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Petar Radanliev
We explore the potential and practical challenges in the use of artificial intelligence (AI) in cyber risk analytics, for improv- ing organisational resilience and understanding cyber risk. The research is focused on identifying the role of AI in con- nected devices such as Internet of Things (IoT) devices. Through literature review, we identify wide ranging and creative methodologies for cyber analytics and explore the risks of deliberately influencing or disrupting behaviours to socio- technical systems. This resulted in the modelling of the connections and interdependencies between a system’s edge components to both external and internal services and systems. We focus on proposals for models, infrastructures and frameworks of IoT systems found in both business reports and technical papers. We analyse this juxtaposition of related systems and technologies, in academic and industry papers published in the past 10 years. Then, we report the results of a qualitative empirical study that correlates the academic literature with key technological advances in connected devices. The work is based on grouping future and present techniques and presenting the results through a new con- ceptual framework. With the application of social science’s grounded theory, the framework details a new process for a prototype of AI-enabled dynamic cyber risk analytics at the edge.
IRJET- An Efficient Solitude Securing Ranked Keyword Search TechniqueIRJET Journal
This document proposes a new efficient solitude securing ranked keyword search technique for cloud computing. It presents a Multi-keyword Ranked Search over Encrypted Hierarchical Clustering Index (MRSE-HCI) architecture that uses quality hierarchical clustering to organize documents and support fast keyword searches in an encrypted cloud environment. The technique uses a minimum hash subtree to verify the correctness and freshness of search results to address integrity and security issues. Experimental results demonstrate that the proposed technique improves search efficiency, accuracy, and rank privacy compared to traditional methods.
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
Internet of Things (IoT) offers reliable and seamless communication for the heterogeneous dynamic lowpower and lossy network (LLNs). To perform effective routing in IoT communication, LLN Routing Protocol (RPL) is developed for the tiny nodes to establish connection by using deflaut objective functions: OF0, MRHOF, for which resources are constraints like battery power, computation capacity, memory communication link impacts on varying traffic scenarios in terms of QoS metrics like packet delivery ratio, delay, secure communication channel. At present, conventional Internet of Things (IoT) are having secure communication channels issue for transmission of data between nodes. To withstand those issues, it is necessary to balance resource constraints of nodes in the network. In this paper, we developed a security algorithm for IoT networks with RPL routing. Initially, the constructed network in corporates optimizationbased deep learning (reinforcement learning) for route establishment in IoT. Upon the establishment of the route, the ClonQlearn based security algorithm is implemented for improving security which is based onaECC scheme for encryption and decryption of data. The proposed security technique incorporates reinforcement learning-based ClonQlearnintegrated with ECC (ClonQlearn+ECC) for random key generation. The proposed ClonQlearn+ECCexhibits secure data transmission with improved network performance when compared with the earlier works in simulation. The performance of network expressed that the proposed ClonQlearn+ECC increased the PDR of approximately 8% - 10%, throughput of 7% - 13%, end-to-end delay of 5% - 10% and power consumption variation of 3% - 7%.
DESIGN PATTERNS IN THE WORKFLOW IMPLEMENTATION OF MARINE RESEARCH GENERAL INF...AM Publications
This paper proposes the use of design patterns in a marine research general information platform. The development of the platform refers to a design of complicated system architecture. Creation and execution of the research workflow nodes and designing of visualization library suited for marine users play an important role in the whole software architecture. This paper studies the requirements characteristic in marine research fields and has implemented a series of framework to solve these problems based on object-oriented and design patterns techniques. These frameworks make clear the relationship in all directions between modules and layers of software, which communicate through unified abstract interface and reduce the coupling between modules and layers. The building of these frameworks is importantly significant in advancing the reusability of software and strengthening extensibility and maintainability of the system.
The document provides information about seminars offered by Alidade Institute on topics related to defense, homeland security, and military operations. The seminars provide research and insights into emerging technical disciplines and their application to operational challenges. They are designed for military, civilian, and defense industry professionals and can be tailored for specific organizations or research topics. The seminars also cover quantitative techniques for analyzing cyber operations, network science fundamentals, operations research for unmanned systems, networked military systems, command and control network analysis, and adaptive logistics. Standard seminar pricing is listed.
Cobe framework cloud ontology blackboard environment for enhancing discovery ...ijccsa
The new relatively concept of cloud computing & its associated methodologies has many advantages in the
world of today. Such advantages range between providing solutions for integration of the miscellaneous
systems & presenting as well guarantees for distribution of searching means & integration of software
tools which are used by consumers & different providers. In this paper, we have constructed an ontologybased
cloud framework with a view to identifying its external agent’s interoperability. The proposed
framework has been designed using the blackboard design style. This framework is composed of mainly
two components: controller and cloud ontology blackboard environment. The function of the controller is
to interact with consumers after receipt of the subject request where it spontaneously uses the ontology
base to distribute it & constitute the required related responses whereas the function of the second
framework component is to interact with different cloud providers and systems, using the meta-ontology
framework to restructure data via using AI reasoning tools and map them to its corresponding
redistributed request. Finally, E-tourism case study can be applicable will be explored.
Blockchain-IoT supply chain: systematic literature reviewTELKOMNIKA JOURNAL
Since 2016, the implementation of blockchain in the supply chain has attracted wide interest among researchers. The creation and study of blockchain technology have grown at an exponential rate in the last decade. The supply chain would be a massive technological leap with the combination of blockchain technology that brings major changes to different facets of the industry, such as record immutability, improved traceability, quality assurance, improved knowledge flows, decentralized power structure, and decreased chances of fraud. With the growth in blockchain Internet-of-Thing (IoT) supply chain technologies, the security risk of implementing such technologies and methods to counter it has been largely discussed among researchers. This study analyses peer-reviewed literature attempting to use authentication in the blockchain-IoT supply chain to counter security risks in the technologies and provides a comprehensive analysis of the important feature when creating an authentication technique for the blockchain-IoT supply chain. Finally, the study discusses some of the problems and research objectives in the realm of authentication in the blockchain-IoT supply chain.
Similar to Cloud-based control systems: a systematic literature review (20)
Because of the rapid growth in technology breakthroughs, including
multimedia and cell phones, Telugu character recognition (TCR) has recently
become a popular study area. It is still necessary to construct automated and
intelligent online TCR models, even if many studies have focused on offline
TCR models. The Telugu character dataset construction and validation using
an Inception and ResNet-based model are presented. The collection of 645
letters in the dataset includes 18 Achus, 38 Hallus, 35 Othulu, 34×16
Guninthamulu, and 10 Ankelu. The proposed technique aims to efficiently
recognize and identify distinctive Telugu characters online. This model's main
pre-processing steps to achieve its goals include normalization, smoothing,
and interpolation. Improved recognition performance can be attained by using
stochastic gradient descent (SGD) to optimize the model's hyperparameters.
Scientific workload execution on a distributed computing platform such as a
cloud environment is time-consuming and expensive. The scientific workload
has task dependencies with different service level agreement (SLA)
prerequisites at different levels. Existing workload scheduling (WS) designs
are not efficient in assuring SLA at the task level. Alongside, induces higher
costs as the majority of scheduling mechanisms reduce either time or energy.
In reducing, cost both energy and makespan must be optimized together for
allocating resources. No prior work has considered optimizing energy and
processing time together in meeting task level SLA requirements. This paper
presents task level energy and performance assurance-workload scheduling
(TLEPA-WS) algorithm for the distributed computing environment. The
TLEPA-WS guarantees energy minimization with the performance
requirement of the parallel application under a distributed computational
environment. Experiment results show a significant reduction in using energy
and makespan; thereby reducing the cost of workload execution in comparison
with various standard workload execution models.
Investigating human subjects is the goal of predicting human emotions in the
real world scenario. A significant number of psychological effects require
(feelings) to be produced, directly releasing human emotions. The
development of effect theory leads one to believe that one must be aware of
one's sentiments and emotions to forecast one's behavior. The proposed line
of inquiry focuses on developing a reliable model incorporating
neurophysiological data into actual feelings. Any change in emotional affect
will directly elicit a response in the body's physiological systems. This
approach is named after the notion of Gaussian mixture models (GMM). The
statistical reaction following data processing, quantitative findings on emotion
labels, and coincidental responses with training samples all directly impact the
outcomes that are accomplished. In terms of statistical parameters such as
population mean and standard deviation, the suggested method is evaluated
compared to a technique considered to be state-of-the-art. The proposed
system determines an individual's emotional state after a minimum of 6
iterative learning using the Gaussian expectation-maximization (GEM)
statistical model, in which the iterations tend to continue to zero error. Perhaps
each of these improves predictions while simultaneously increasing the
amount of value extracted.
Early diagnosis of cancers is a major requirement for patients and a
complicated job for the oncologist. If it is diagnosed early, it could have made
the patient more likely to live. For a few decades, fuzzy logic emerged as an
emphatic technique in the identification of diseases like different types of
cancers. The recognition of cancer diseases mostly operated with inexactness,
inaccuracy, and vagueness. This paper aims to design the fuzzy expert system
(FES) and its implementation for the detection of prostate cancer. Specifically,
prostate-specific antigen (PSA), prostate volume (PV), age, and percentage
free PSA (%FPSA) are used to determine prostate cancer risk (PCR), while
PCR serves as an output parameter. Mamdani fuzzy inference method is used
to calculate a range of PCR. The system provides a scale of risk of prostate
cancer and clears the path for the oncologist to determine whether their
patients need a biopsy. This system is fast as it requires minimum calculation
and hence comparatively less time which reduces mortality and morbidity and
is more reliable than other economic systems and can be frequently used by
doctors.
The biomedical profession has gained importance due to the rapid and accurate diagnosis of clinical patients using computer-aided diagnosis (CAD) tools.
The diagnosis and treatment of Alzheimer’s disease (AD) using complementary multimodalities can improve the quality of life and mental state of patients.
In this study, we integrated a lightweight custom convolutional neural network
(CNN) model and nature-inspired optimization techniques to enhance the performance, robustness, and stability of progress detection in AD. A multi-modal
fusion database approach was implemented, including positron emission tomography (PET) and magnetic resonance imaging (MRI) datasets, to create a fused
database. We compared the performance of custom and pre-trained deep learning models with and without optimization and found that employing natureinspired algorithms like the particle swarm optimization algorithm (PSO) algorithm significantly improved system performance. The proposed methodology,
which includes a fused multimodality database and optimization strategy, improved performance metrics such as training, validation, test accuracy, precision, and recall. Furthermore, PSO was found to improve the performance of
pre-trained models by 3-5% and custom models by up to 22%. Combining different medical imaging modalities improved the overall model performance by
2-5%. In conclusion, a customized lightweight CNN model and nature-inspired
optimization techniques can significantly enhance progress detection, leading to
better biomedical research and patient care.
Class imbalance is a pervasive issue in the field of disease classification from
medical images. It is necessary to balance out the class distribution while training a model. However, in the case of rare medical diseases, images from affected
patients are much harder to come by compared to images from non-affected
patients, resulting in unwanted class imbalance. Various processes of tackling
class imbalance issues have been explored so far, each having its fair share of
drawbacks. In this research, we propose an outlier detection based image classification technique which can handle even the most extreme case of class imbalance. We have utilized a dataset of malaria parasitized and uninfected cells. An
autoencoder model titled AnoMalNet is trained with only the uninfected cell images at the beginning and then used to classify both the affected and non-affected
cell images by thresholding a loss value. We have achieved an accuracy, precision, recall, and F1 score of 98.49%, 97.07%, 100%, and 98.52% respectively,
performing better than large deep learning models and other published works.
As our proposed approach can provide competitive results without needing the
disease-positive samples during training, it should prove to be useful in binary
disease classification on imbalanced datasets.
Recently, plant identification has become an active trend due to encouraging
results achieved in plant species detection and plant classification fields
among numerous available plants using deep learning methods. Therefore,
plant classification analysis is performed in this work to address the problem
of accurate plant species detection in the presence of multiple leaves together,
flowers, and noise. Thus, a convolutional neural network based deep feature
learning and classification (CNN-DFLC) model is designed to analyze
patterns of plant leaves and perform classification using generated finegrained feature weights. The proposed CNN-DFLC model precisely estimates
which the given image belongs to which plant species. Several layers and
blocks are utilized to design the proposed CNN-DFLC model. Fine-grained
feature weights are obtained using convolutional and pooling layers. The
obtained feature maps in training are utilized to predict labels and model
performance is tested on the Vietnam plant image (VPN-200) dataset. This
dataset consists of a total number of 20,000 images and testing results are
achieved in terms of classification accuracy, precision, recall, and other
performance metrics. The mean classification accuracy obtained using the
proposed CNN-DFLC model is 96.42% considering all 200 classes from the
VPN-200 dataset.
Big data as a service (BDaaS) platform is widely used by various
organizations for handling and processing the high volume of data generated
from different internet of things (IoT) devices. Data generated from these IoT
devices are kept in the form of big data with the help of cloud computing
technology. Researchers are putting efforts into providing a more secure and
protected access environment for the data available on the cloud. In order to
create a safe, distributed, and decentralised environment in the cloud,
blockchain technology has emerged as a useful tool. In this research paper, we
have proposed a system that uses blockchain technology as a tool to regulate
data access that is provided by BDaaS platforms. We are securing the access
policy of data by using a modified form of ciphertext policy-attribute based
encryption (CP-ABE) technique with the help of blockchain technology. For
secure data access in BDaaS, algorithms have been created using a mix of CPABE with blockchain technology. Proposed smart contract algorithms are
implemented using Eclipse 7.0 IDE and the cloud environment has been
simulated on CloudSim tool. Results of key generation time, encryption time,
and decryption time has been calculated and compared with access control
mechanism without blockchain technology.
Internet of things (IoT) has become one of the eminent phenomena in human
life along with its collaboration with wireless sensor networks (WSNs), due
to enormous growth in the domain; there has been a demand to address the
various issues regarding it such as energy consumption, redundancy, and
overhead. Data aggregation (DA) is considered as the basic mechanism to
minimize the energy efficiency and communication overhead; however,
security plays an important role where node security is essential due to the
volatile nature of WSN. Thus, we design and develop proximate node aware
secure data aggregation (PNA-SDA). In the PNA-SDA mechanism, additional
data is used to secure the original data, and further information is shared with
the proximate node; moreover, further security is achieved by updating the
state each time. Moreover, the node that does not have updated information is
considered as the compromised node and discarded. PNA-SDA is evaluated
considering the different parameters like average energy consumption, and
average deceased node; also, comparative analysis is carried out with the
existing model in terms of throughput and correct packet identification.
Drones provide an alternative progression in protection submissions since
they are capable of conducting autonomous seismic investigations. Recent
advancement in unmanned aerial vehicle (UAV) communication is an internet
of a drone combined with 5G networks. Because of the quick utilization of
rapidly progressed registering frameworks besides 5G officialdoms, the
information from the user is consistently refreshed and pooled. Thus, safety
or confidentiality is vital among clients, and a proficient substantiation
methodology utilizing a vigorous sanctuary key. Conventional procedures
ensure a few restrictions however taking care of the assault arrangements in
information transmission over the internet of drones (IOD) environmental
frameworks. A unique hyperelliptical curve (HEC) cryptographically based
validation system is proposed to provide protected data facilities among
drones. The proposed method has been compared with the existing methods
in terms of packet loss rate, computational cost, and delay and thereby
provides better insight into efficient and secure communication. Finally, the
simulation results show that our strategy is efficient in both computation and
communication.
Monitoring behavior, numerous actions, or any such information is considered
as surveillance and is done for information gathering, influencing, managing,
or directing purposes. Citizens employ surveillance to safeguard their
communities. Governments do this for the purposes of intelligence collection,
including espionage, crime prevention, the defense of a method, a person, a
group, or an item; or the investigation of criminal activity. Using an internet
of things (IoT) rover, the area will be secured with better secrecy and
efficiency instead of humans, will provide an additional safety step. In this
paper, there is a discussion about an IoT rover for remote surveillance based
around a Raspberry Pi microprocessor which will be able to monitor a
closed/open space. This rover will allow safer survey operations and would
help to reduce the risks involved with it.
In a world where climate change looms large the spotlight often shines on
greenhouse gases, but the shadow of man-made aerosols should not be
underestimated. These tiny particles play a pivotal role in disrupting Earth's
radiative equilibrium, yet many mysteries surround their influence on various
physical aspects of our planet. The root of these mysteries lies in the limited
data we have on aerosol sources, formation processes, conversion dynamics,
and collection methods. Aerosols, composed of particulate matter (PM),
sulfates, and nitrates, hold significant sway across the hemisphere. Accurate
measurement demands the refinement of in-situ, satellite, and ground-based
techniques. As aerosols interact intricately with the environment, their full
impact remains an enigma. Enter a groundbreaking study in Morocco that
dared to compare an internet of thing (IoT) system with satellite-based
atmospheric models, with a focus on fine particles below 10 and 2.5
micrometers in diameter. The initial results, particularly in regions abundant
with extraction pits, shed light on the IoT system's potential to decode
aerosols' role in the grand narrative of climate change. These findings inspire
hope as we confront the formidable global challenge of climate change.
The use of technology has a significant impact to reduce the consequences of
accidents. Sensors, small components that detect interactions experienced by
various components, play a crucial role in this regard. This study focuses on
how the MPU6050 sensor module can be used to detect the movement of
people who are falling, defined as the inability of the lower body, including
the hips and feet, to support the body effectively. An airbag system is
proposed to reduce the impact of a fall. The data processing method in this
study involves the use of a threshold value to identify falling motion. The
results of the study have identified a threshold value for falling motion,
including an acceleration relative (AR) value of less than or equal to 0.38 g,
an angle slope of more than or equal to 40 degrees, and an angular velocity
of more than or equal to 30 °/s. The airbag system is designed to inflate
faster than the time of impact, with a gas flow rate of 0.04876 m3
/s and an
inflating time of 0.05 s. The overall system has a specificity value of 100%,
a sensitivity of 85%, and an accuracy of 94%.
The fundamental principle of the paper is that the soil moisture sensor obtains
the moisture content level of the soil sample. The water pump is automatically
activated if the moisture content is insufficient, which causes water to flow
into the soil. The water pump is immediately turned off when the moisture
content is high enough. Smart home, smart city, smart transportation, and
smart farming are just a few of the new intelligent ideas that internet of things
(IoT) includes. The goal of this method is to increase productivity and
decrease manual labour among farmers. In this paper, we present a system for
monitoring and regulating water flow that employs a soil moisture sensor to
keep track of soil moisture content as well as the land’s water level to keep
track of and regulate the amount of water supplied to the plant. The device
also includes an automated led lighting system.
In order to provide sensing services to low-powered IoT devices, wireless sensor networks (WSNs) organize specialized transducers into networks. Energy usage is one of the most important design concerns in WSN because it is very hard to replace or recharge the batteries in sensor nodes. For an energy-constrained network, the clustering technique is crucial in preserving battery life. By strategically selecting a cluster head (CH), a network's load can be balanced, resulting in decreased energy usage and extended system life. Although clustering has been predominantly used in the literature, the concept of chain-based clustering has not yet been explored. As a result, in this paper, we employ a chain-based clustering architecture for data dissemination in the network. Furthermore, for CH selection, we employ the coati optimisation algorithm, which was recently proposed and has demonstrated significant improvement over other optimization algorithms. In this method, the parameters considered for selecting the CH are energy, node density, distance, and the network’s average energy. The simulation results show tremendous improvement over the competitive cluster-based routing algorithms in the context of network lifetime, stability period (first node dead), transmission rate, and the network's power reserves.
The construction industry is an industry that is always surrounded by
uncertainties and risks. The industry is always associated with a threatindustry which has a complex, tedious layout and techniques characterized by
unpredictable circumstances. It comprises a variety of human talents and the
coordination of different areas and activities associated with it. In this
competitive era of the construction industry, delays and cost overruns of the
project are often common in every project and the causes of that are also
common. One of the problems which we are trying to cater to is the improper
handling of materials at the construction site. In this paper, we propose
developing a system that is capable of tracking construction material on site
that would benefit the contractor and client for better control over inventory
on-site and to minimize loss of material that occurs due to theft and misplacing
of materials.
Today, health monitoring relies heavily on technological advancements. This
study proposes a low-power wide-area network (LPWAN) based, multinodal
health monitoring system to monitor vital physiological data. The suggested
system consists of two nodes, an indoor node, and an outdoor node, and the
nodes communicate via long range (LoRa) transceivers. Outdoor nodes use an
MPU6050 module, heart rate, oxygen pulse, temperature, and skin resistance
sensors and transmit sensed values to the indoor node. We transferred the data
received by the master node to the cloud using the Adafruit cloud service. The
system can operate with a coverage of 4.5 km, where the optimal distance
between outdoor sensor nodes and the indoor master node is 4 km. To further
predict fall detection, various machine learning classification techniques have
been applied. Upon comparing various classifier techniques, the decision tree
method achieved an accuracy of 0.99864 with a training and testing ratio of
70:30. By developing accurate prediction models, we can identify high-risk
individuals and implement preventative measures to reduce the likelihood of
a fall occurring. Remote monitoring of the health and physical status of elderly
people has proven to be the most beneficial application of this technology.
The effectiveness of adaptive filters are mainly dependent on the design
techniques and the algorithm of adaptation. The most common adaptation
technique used is least mean square (LMS) due its computational simplicity.
The application depends on the adaptive filter configuration used and are well
known for system identification and real time applications. In this work, a
modified delayed μ-law proportionate normalized least mean square
(DMPNLMS) algorithm has been proposed. It is the improvised version of the
µ-law proportionate normalized least mean square (MPNLMS) algorithm.
The algorithm is realized using Ladner-Fischer type of parallel prefix
logarithmic adder to reduce the silicon area. The simulation and
implementation of very large-scale integration (VLSI) architecture are done
using MATLAB, Vivado suite and complementary metal–oxide–
semiconductor (CMOS) 90 nm technology node using Cadence RTL and
Genus Compiler respectively. The DMPNLMS method exhibits a reduction
in mean square error, a higher rate of convergence, and more stability. The
synthesis results demonstrate that it is area and delay effective, making it
practical for applications where a faster operating speed is required.
The increasing demand for faster, robust, and efficient device development of enabling technology to mass production of industrial research in circuit design deals with challenges like size, efficiency, power, and scalability. This paper, presents a design and analysis of low power high speed full adder using negative capacitance field effecting transistors. A comprehensive study is performed with adiabatic logic and reversable logic. The performance of full adder is studied with metal oxide field effect transistor (MOSFET) and negative capacitance field effecting (NCFET). The NCFET based full adder offers a low power and high speed compared with conventional MOSFET. The complete design and analysis are performed using cadence virtuoso. The adiabatic logic offering low delay of 0.023 ns and reversable logic is offering low power of 7.19 mw.
The global agriculture system faces significant challenges in meeting the
growing demand for food production, particularly given projections that the
world's population will reach 70% by 2050. Hydroponic farming is an
increasingly popular technique in this field, offering a promising solution to
these challenges. This paper will present the improvement of the current
traditional hydroponic method by providing a system that can be used to
monitor and control the important element in order to help the plant grow up
smoothly. This proposed system is quite efficient and user-friendly that can
be used by anyone. This is a combination of a traditional hydroponic system,
an automatic control system and a smartphone. The primary objective is to
develop a smart system capable of monitoring and controlling potential
hydrogen (pH) levels, a key factor that affects hydroponic plant growth.
Ultimately, this paper offers an alternative approach to address the challenges
of the existing agricultural system and promote the production of clean,
disease-free, and healthy food for a better future.
More from International Journal of Reconfigurable and Embedded Systems (20)
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
A review on techniques and modelling methodologies used for checking electrom...
Cloud-based control systems: a systematic literature review
1. International Journal of Reconfigurable and Embedded Systems (IJRES)
Vol. 12, No. 1, March 2023, pp. 135~148
ISSN: 2089-4864, DOI: 10.11591/ijres.v12.i1.pp135-148 135
Journal homepage: http://ijres.iaescore.com
Cloud-based control systems: a systematic literature review
Santo Wijaya1,2
, Arief Ramadhan2
, Andhika1
1
Software Engineering Department, Polytechnic Meta Industry Cikarang, Bekasi, Indonesia
2
Computer Science Department, Doctor of Computer Science, Bina Nusantara University, Jakarta, Indonesia
Article Info ABSTRACT
Article history:
Received Nov 15, 2022
Revised Dec 10, 2022
Accepted Dec 26, 2022
Control systems and computer science are two distinct and important fields
of engineering. The development of cloud computing in computer science
has become an enabler for the widely used controller in control systems to
migrate to the cloud and has created a new field of research in cloud-based
control systems (CCS). The paper used the systematic literature review
approach to obtain insight into current CCS research. The objectives include
a review in areas such as the demographics, topics of the research,
evaluation method, and application domain. To that end, systematic
literature review (SLR) has been conducted. The study obtained 64 primary
studies from 581 articles. The CCS has a distinct characteristic; despite the
fact that the cloud and network dynamics system, when coupled with the
controlled plant, is inherently nonlinear, research efforts have used linear
models with optimal control to approach it successfully in a limited case of
control objectives. Furthermore, cloud-centric and cloud-fog network
architecture approaches are considered in the studies—whereas, the
quantitative method mainly uses simulation and discussion. Finally, the SLR
summarizes open challenges for CCS in the future.
Keywords:
Cloud-based control systems
Control algorithm
Demographics
Network architecture
System model
Systematic literature review
This is an open access article under the CC BY-SA license.
Corresponding Author:
Santo Wijaya
Software Engineering Department, Polytechnic Meta Industry Cikarang
Inti 1 Blok C1 no 7, Lippo Cikarang, Bekasi 17550, Indonesia
Email: santo.wijaya@politeknikmeta.ac.id
1. INTRODUCTION
There are several types of controllers in the industrial control systems, such as programmable logic
controllers (PLC), distributed control systems (DCS), supervisory control, and data acquisition (SCADA).
These controllers serve a distinct function based on computer integrated manufacturing (CIM). The CIM is
often depicted as level 2 of automation-based or field-level control in the American National Standards
Institute (ANSI)/international society of automation (ISA)-95 model [1]. However, recent research studies
revealed a lack of development of the hardware capacity, which is a constrained device. As a result, it creates
problems in the currently diversified complex industrial control requirements and increases the demand for
connectivity [2].
Nowadays, industrial revolution 4.0 emerged with an intelligent factory, and several researchers
introduced a cyber-physical system (CPS), an integration concept of cyber parts and physical parts with the
Internet. Also, an internet of things (IoT) paradigm has been introduced to connect 'things' or 'hardware'
through the internet. Additionally, the rapid development of cloud computing in providing on-demand elastic
service with almost unlimited resource allocation has become a core technology in recent years [3]. More and
more devices, an estimated 50 billion devices in 2020, connected to the internet recently. Thus, extensive
data will be gathered and stored for further data analytics. The control systems must cope with the enormous
amount of data from different data gatherers, such as radio-frequency identification readers and wireless
2. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 1, March 2023: 135-148
136
sensor networks. In this scenario, the need for high-quality and real-time control systems will surpass the
capabilities of legacy network topology since the big data in control systems will raise the network
communication load and processing burden. As a solution, a new paradigm called cloud-based control
systems (CCS) is being studied, combining the strengths of networked control and cloud computing
technologies [4], [5].
A survey of CCS employed on intelligent and connected vehicles (ICV) is discussed in [6]. It
investigated the CCS paradigm, from cloud-based application to core technology development related to
ICV, in terms of the possibility as an enabler of high-level autonomous driving to improve safety and
optimize traffic flow. Another review of a practical case study of CCS for smart communities is discussed in
[7]. It elaborated on the foundation for India's cloud computing-based innovative community services. It
showed broad implications for the future of the IoT and may be used for healthcare, energy-efficient systems,
and smart cities. A literature review on cloud computing regarding elasticity, provisioning, and model
classification is discussed in [8]. Finally, a comprehensive bibliometric analysis of the CCS is discussed in
[9], and this paper is an extended work of the author.
The novelty of this SLR study is threefold. First, the SLR method employed the goal-question-
metric approach [10] to quantify the review metric in this study and combined it with the Kitchenham
method [11] to ensure the validity and repeatability of the review results. Second, the study uses the approach
to obtain insight into current CCS research and its perspective on the article's demographics, current research
states, evaluation method, and application domain. Third, the SLR provides insight into architecture, control
algorithms, and system modeling perspectives.
The structure of the paper is as follows: section 2 outlines the research method, and section 3 offers
result analysis and discussion. Next, the specific findings from the study that aided us in identifying pertinent
research issues for future research are detailed in section 4. Finally, section 5 summarizes the survey's
conclusions.
2. RESEARCH METHOD
The goal of the SLR based on the goal-question-metric approach is as: i) purpose: understand and
clusterize, ii) issue: perspective of cloud-based control system, iii) object: ingredient of cloud-based control
system and iv) viewpoint: researcher standpoint.
The SLR is conducted based on the guideline described by Kitchenham. Research questions (RQ)
are formulated to achieve the overall goal of this study as:
RQ1: how are the demographics state of research?
RQ2: what topics are mainly discussed in the CCS research?
RQ3: what types of assessments are used to evaluate the proposed method?
RQ4: what kind of application domain has been considered?
The RQ1 objective is to provide a general demographics overview of the current state-of-the-art
research in the CCS field. Importantly, it provides insight into diachronic productivity, author network, and
the community interested in CCS. The RQ2 is formulated to identify the scope of studies related to the CCS
field, especially cloud architecture, control strategy, and network, which are the essential ingredients of the
CCS framework. The RQ3 gives insight into the proposed method evaluation technique to show its
effectiveness. Finally, the RQ4 provides information on the application domain considered in the obtained
articles.
The SLR method steps start with database source selection, as shown in Figure 1. We selected
SCOPUS, ScienceDirect, IEEE Xplore, and ACM Digital Library databases. Then the second step is to
establish a keywords string based on the RQs. The string contains keywords, such as "cloud-based control",
"algorithm", "system", "architecture", "controller" combined as a search string to look-up up the related
articles in the selected databases. Finally, articles sources selection is started manually to establish the
combination of the strings. It is done by selecting a related paper that discusses the CCS domain in terms of
cloud architecture, control strategy, or network, which is published in high-impact journals or received high
citations per year, such as [12]–[15]. Then, a quasi-gold standard method [16] is used to start pilot searches
on SCOPUS, IEEE Xplore, and ScienceDirect databases. The suggested method consists of a collection of
previously published research and related quasi-sensitivity to the search process for measuring search
performance. The obtained keywords from the method were then applied to the article title and abstract with
the following search string: (("cloud-based control" OR "cloud control") AND ("algorithm" OR "system" OR
"architecture" OR "controller")). The mentioned search string is a refined version to obtain the selected
articles and a minimal number of the remaining articles.
In step three, we used the refined search string for an automatic search in all selected databases and
set up inclusion criteria to get the SLR's final list of articles. In the auto search criteria, we only selected
3. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Cloud-based control systems: a systematic literature review (Santo Wijaya)
137
publication years from 2012, when the CCS paradigm was introduced by Xia [17], to 2022 and research
published in journals or proceedings. As a result, there were 581 articles collected. The study set up three
inclusion criteria (IC) as follows, IC1 discussed or mentioned cloud-based control systems in terms of
algorithm, system, architecture, and controller in the title, abstract, and keywords of the article; IC2 article
that is primary study, accessible, and written in English; IC3 merge and remove the duplicate article. For
example, if the article is found in proceedings and journals, then we remove the article from proceedings. If
the article is found in two databases, then we remove the article from the database with fewer citations. The
exclude criteria is the negation of the inclusion criteria written above. Finally, the list of articles for the SLR
consists of 64 references after inclusion criteria were applied. Table 1 shows the total articles based on
database sources.
Figure 1. SLR steps used in the study
Table 1. Total articles based on database sources
No Database sources Auto-search IC1 IC2 IC3
1 SCOPUS 170 65 39 39
2 ScienceDirect 235 20 17 11
3 IEEE Xplore 118 44 44 13
4 ACM Digital Library 58 3 2 1
Total 581 132 102 64
Next, we defined quantitative metrics that will be used to answer the research questions, as shown in
Table 2. The result and analysis of these quantitative metrics are explained in the next section. Herewith, we
also describe briefly explain the different metrics (M). M01, M02, and M03 provide information on the
published articles from 2012 to 2021, cited per year, and how the co-authorship network developed and its
influence. M04 provides information on the venue of the article publication and insight into which academic
community is interested in the field. Additionally, M05 provides information on the main research topic:
cloud architecture, control algorithm, network, or other elements that can emerge from the result analysis.
Cloud architecture scope means the proposed method in cloud computing and information systems. Control
algorithm scope means the proposed method in control theory and system modeling. M06 provides
information on the clusterized perspective of the control algorithm and architecture-related topics, such as i)
cloud, network, and plant uncertainties, ii) control strategy and structure, iii) privacy, security and encryption,
and iv) self-learning and data-driven modeling. M07 provides information on the system model used to
calculate the required control action. M08 provides information on the controller type and objective used in
Start
Step 1
Selection of Database & Publication Year
(SCOPUS, Science Direct, IEEEXplore, ACM Digital Library) 2012-2021
Establish Keywords for Auto Search
(("cloud-based control" OR"cloud control") AND ("algorithm" OR"system" OR
"architecture" OR"controller"))
Conduct auto search with the selected keywords in the selected database
#581 records screened and identified
Step 2
Step 3
Step 4
Eligibility related to IC1 – CCSterms in the title, abstract, and keyword
#132 records included
Eligibility related to IC2 – primary study, accessible, and written in English
#102 records included
Eligibility related to IC3 – remove duplicate record
#64 records included
Summarize search results
Finish
4. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 1, March 2023: 135-148
138
the articles, specifically on the topic of the control algorithm. M09 provides information on the assessment
method used to verify the proposed novelty: discussion, experiment with use-case, or simulation. Finally,
M10 provides information on the application domain or practical use case used in the articles to support the
effectiveness of the proposed method.
Table 2. Quantitative metrics
ID Field metric Usage ID Field metric Usage
M01 Diachronic productivity RQ1 M07 System modeling RQ2
M02 Citations per year RQ1 M08 Control algorithm and objective RQ2
M03 Author network RQ1 M09 Assessment RQ3
M04 Publication venue RQ1 M10 Application domain RQ4
M05 Engineering perspective RQ2
M06 Control and architecture perspective RQ2
3. RESULTS AND DISCUSSION
3.1. Answering RQ1: articles demographics
Figure 2 shows the diachronic productivity of primary studies per year by journal and proceedings
(metric M01). It is observed that 84.38% of articles were published in the last five years, although the CCS
paradigm was introduced in 2012, with articles spanning nine years. Furthermore, it showed that the CCS
field is gaining interest, although there was a slight decline in publications in 2021 due to the COVID-19
pandemic. Several articles have claimed that significant elements of CCS, such as big data processing
capability [14], [18], [19], leverage control performance with low cost [20], [21], control-as-a-service
flexibility [12], [22]–[24]. Additionally, the obtained research articles are clusterized by the number of
citations received per year (metric M02), as shown in Table 3. It can be concluded that the influential
research topic discussed on matters are cloud architecture, control algorithms, and network security
correlated with the basic ingredients of the CCS paradigm.
Figure 2. M01: Diachronic productivity of CCS
Table 3. M02: articles with a minimum of 10 citations received per year
Topic Reference Citation/year
Cloud architecture for flexible service [12] 15.00
System stability and data processing [25] 14.00
Secured control algorithm [26] 13.00
Data-driven control algorithm [27] 11.00
Cloud architecture and control algorithm [14] 10.14
Next, VOSviewer [28] generates the co-authorship network and observes the relationship between
the author and the most influential author, as shown in Figure 3. There are 180 authors within the selected 64
articles, and the largest set of a connected network consists of 41 authors (metric M03). It can be observed
that the author of the three most cited articles in metric M02 is also in the author network of metric M03 and
their influence on other 38 authors [14], [26], [29]. This largest set of the author-connected network was
separated into 6 clusters representing the individual publication cluster in which the author's name was
mentioned. The circle size represents the total number of publications for each author. For example, cluster 1
(yellow color) consists of authors name Xia, Y.; Ali, Y.; Hammad, A.; Zhan, Y.; Ma, L.; Vasilakos, A.V.
0
10
20
30
40
50
60
70
0
2
4
6
8
10
12
14
16
18
20
2012 2013 2014 2015 2016 2017 2018 2019 2020 2021
Accumulated
Articles
Number
of
Articles
Publication Year
Diachronic Productivity
Journal Proceedings Total
5. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Cloud-based control systems: a systematic literature review (Santo Wijaya)
139
published [30]–[32]. Xia, Y. has the biggest circle size due to his contribution with other authors in different
clusters too, which are: (1) Xia, Y.; Ma, L. collaborated with Gao, R. from cluster 3 (dark blue color) in [33],
(2) Xia, Y. also collaborated with authors from cluster 2 (light blue color) in [34], (3) Xia, Y. also
collaborated with Yan, C.; Li, Y. from cluster 4 (green color) in [35], [36], (4) Xia, Y. also collaborated with
authors in cluster 6 (purple color) in [21], [26], [37], [38].
Lastly, it can be observed that the publication venues (metric M04) were scattered over different
venues, as shown in Table 4. The quantitative metric of publication venue is separated into two parts:
proceeding venue and journal venues, and it has a total of 39 articles and 25 articles, respectively. IFAC has
published articles in the proceeding venues, followed by CCC, CDC, and CAC. Each venue published three
articles; CPS published two articles, while the other 21 articles were published in the 21 conference venues.
Three IEEE journals each published two articles in the journal venues, and one ScienceDirect journal
published 1 article, while the other 17 articles were published in the 17 separate journal venues. From the
respected venue's subject area or categories, it can be noticed that the control/industrial/systems engineering
community is interested in exploring this ensemble domain between cloud computing in computer science
and control systems.
Figure 3. M03: author network
Table 4. M04: publication venues
Publication venues Publisher ΣArticles
Proceedings 39
IFAC (International Federation of Automatic Control) ScienceDirect 7
CCC (Chinese Control Conference) IEEE 3
CDC (Conference on Decision and Control) IEEE 3
CAC (Chinese Automation Congress) IEEE 3
CPS (Industrial Cyber-Physical Systems) IEEE 2
21 Conference Venues 1
Journals 25
IEEE Access IEEE 2
IEEE Transactions on Industrial Informatics IEEE 2
IEEE Transactions on Systems, Man, and Cybernetics: Systems IEEE 2
Robotics and Computer-Integrated Manufacturing ScienceDirect 2
17 Journal Venues 1
3.2. Answering RQ2: states of current research
Figure 4 shows statistic results on metric to answer RQ2. First, M05 is observed in Figure 4(a) that
the control algorithm leads the research topic in CCS with 29 articles. Then, it consists of [13], [18], [22],
6. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 1, March 2023: 135-148
140
[26], [27], [31], [33], [34], [36]–[56]. Then, followed by cloud architecture with 14 articles [12], [19], [20],
[23], [24], [57]–[65]. After that, it is followed by an integrated approach to cloud architecture and control
algorithm with 16 articles [5], [14], [17], [21], [25], [30], [35], [66]–[74].
Meanwhile, three articles studied network communication. First, in the data transfer mechanism, it
has been shown that the general transmission control protocol (TCP)/user datagram protocol
(UDP)/Websocket protocol is unsuitable, considering the average round trip time (RTT) is slower than the
control cycle time, and additional mechanisms need to be considered [75]. Then, The identification of
challenges related to a communication protocol, gateway and network address translation (NAT) setup, data
forwarding rules, and network time delay in the initial phase of CCS implementation [32]. Lastly, an
experiment with a use-case on network response between two cloud-center on different continents showed
that distance between a controlled plant and cloud center is essential due to network latency [15].
Specifically, one article discussed the ontology of cloud-based control systems to integrate control-
over-the-cloud with cyber-physical systems (CPS) and internet of things (IoT). The proposed method consists
of three components: core components, data manager, event and context manager to create a control-as-a-
service (CaaS) model, and feasibility is shown with use case application in supply chain temperature control
[76]. Moreover, one article proposed a virtual environment to emulate CCS with use-case in cyber attack and
response [77]. Notably, a cloud virtual-environment to emulate CCS is also an important field of research
because it accelerates the speed of CCS research to get better implementation results.
It can be observed that the motivation to apply [control algorithm] and [integrated cloud architecture
with control algorithm] may be an interesting topic to investigate further since 45 out of 64 articles discussed
it. Figure 4(b)-(d) shows an overview of metrics M06-M08. As can be shown in Figure 4(b), from the control
perspective (metric M06), it is divided into 4 clusters of sub-topics. Furthermore, it is notable that the topics
of [control strategy & structure] and [privacy, security, and encryption] received the most interest, with 15
articles discussing the topic, respectively. Then followed by [cloud, network, & plant uncertainties] with
eight articles, and [self-learning & data-driven modeling] with seven articles. Therefore, the definitions for
each cluster are as follows: i) the control strategy and structure included the article that proposed a control
algorithm and cloud structure for system performance; ii) the privacy, security, and encryption included the
article that proposed a control algorithm considering cyber attack threat in the network; iii) the cloud
network, and plant uncertainties included the article that proposed a control algorithm considering network
congestion and controlled plant uncertainties, such as time-delay, data-packet loss, and latency; and iv) the
self-learning and data-driven modeling included the article that proposed specific system model that is
derived from the system's input and output data in order to create adaptable control action depending on the
environment dynamics.
Figure 4(c) shows system modeling (metric M07); it is clusterized into three categories of a system
model: white-box or analytical model, black-box or data-driven model, and hybrid model. Most articles used
the white-box model with 38 articles and the black-box model with seven articles. Within the white-box
model, 22 articles used a linear time-invariant model with state-space representation, and 16 articles used a
linear time-variant model considering time delay in the derivation of the model. Meanwhile, within the black-
box model, it is notable that the general linear regression model is commonly used by four articles [33], [44],
[52], [68]. Then one article was used to support the vector regression model [69], 1 article used AnYa fuzzy
rule-based model [41], and 1 article used a custom black-box model [18].
Control algorithm objectives are clustered into three categories: disturbance rejection, optimization,
and regulatory. Disturbance rejection works to correct deviation from the given trajectory caused by
unknown disturbances or uncertainties. Optimization deals with finding a control action that optimizes an
objective function with input, output, or state constraints. Regulatory calculates control action for setpoint
tracking to improve system performance. Figure 4(d) shows the control algorithm type and objective (M08).
It is notable that optimal control, including model predictive control (MPC) and linear quadratic regulator
(LQR) or Gaussian (LQG), are commonly used in the CCS derivation and can be found in 34 articles.
Followed by proportional, integral, derivative (PID) control found in 5 articles, rule-based control found in 4
articles, and robust control found in 2 articles. Finally, optimization (16 articles) and regulatory (11 articles)
control objectives are found evenly distributed in the [optimal control, MPC, and LQR/LQG] algorithm.
Figure 5 shows correlation results between metrics to answer RQ2. Figure 5(a) shows the correlation
between metric M06 and metric M07. Figure 5(b) shows the correlation between metrics M06 and M08.
Notably, in eight articles, M06–cloud, network and plant uncertainties used the M07; white-box linear time-
variant model. It can also be observed that all articles also used an optimal control algorithm correlated with
metric M08. The authors [13], [56], [74] use LQR/LQG control algorithm with an optimization approach.
Optimal control uses an optimization approach to optimize cloud allocation scheduling [35]. Optimal control
and MPC as an offloading strategy to calculate control parameters in the cloud and then update it to local
control under 'cloud-fog control system architecture' are proposed in [30], [46]. It offers a solution to the
7. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Cloud-based control systems: a systematic literature review (Santo Wijaya)
141
latency problem and de-coupling nonlinearities between plant and network to simplify the problem. A state
estimator or observer has been introduced in the proposed method to estimate the system's state and mitigate
network delay or noises [35], [68], [74].
(a)
(b)
(c) (d)
Figure 4. Statistic results on metric to answer RQ2 (a) M05: engineering perspective, (b) M06: control and
architecture perspective, (c) M07: system modelling, and (d) M08: control algorithm type and objective
Meanwhile, it is notable that M06 control strategy and structure used M07–white-box linear time-
invariant model in 11 articles and a linear time-variant model in 4 articles. Regulatory and optimization
objectives with MPC control algorithms are commonly used in correlation with metric M08. System
performance in regulatory-based with offloading strategy was discussed in [27], [40], [42], [51]. Rule-based
control with fuzzy integrated with PID control structure was proposed by [25], [53] for control in an elevator
building and unmanned aerial vehicles (UAV) systems. Mahmoud and Xia [21] proposed an architecture of
control strategy that considers convergence between the sampling period, network congestion, and system
performance.
Moreover, it can be observed that M06–privacy, security, and encryption used M07–white-box
linear time-invariant and linear time-variant models evenly distributedly. The disturbance rejection control
objective in the control algorithm is mainly considered in correlation with metric M08. Cyber attacks from
the network can be considered a disturbance to the controlled system. MPC control algorithm in the cloud
with redundancy in local control and use of switching mechanism if no optimized solution is found in the
system under distributed denial of system (DDoS) attack [31]. DoS attack in [26], [36] and advanced
persistent threat in [38] as a type of Stackelberg game is proposed to design a robust control system. On the
other hand, the encryption method for preventing data breaches has also been considered with the Pailier
encryption [54]. The alternating direct method of multipliers method is proposed by [50]. The proximal
gradient method was used by [49] to calculate the control algorithm without decrypting the data.
14
29
16
1
3
1
0
5
10
15
20
25
30
#articles
8
15 15
7
0
2
4
6
8
10
12
14
16
Cloud, Network,
& Plant
uncertainties
Control Strategy
& Structure
Privacy, security,
& Encryption
Self-learning &
Data-driven
modeling
#articles
7
38
1
1
4
1
22
16
0 20 40
Total
AnYa Fuzzy Rule Based
Custom
General Linear Regression
Support Vector Regression
Total
Linear time-invariant
Linear time-variant
Black-box
Model
White-box
model
#articles
3
1 1 1
3
1
7
5
4
9
1
4
1
1
3
0
2
4
6
8
10
12
14
16
18
20
MPC Optimal
Control
PID Control Robust
Control
LQR/ LQG Rule-based
Control
#articles
Disturbance Rejection Optimization Regulatory
8. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 1, March 2023: 135-148
142
Lastly, it is notable that M06; self-learning and data-driven modeling used the M07–black box
model and the general linear regression method is commonly used. Regarding metric M08, optimal control
and MPC are mostly used control algorithms. Although this sub-topic received less research interest, deriving
a control algorithm with a black-box model is one of the best approaches to realizing CCS. It is well known
that the network and cloud system consist of unmodeled dynamics and uncertainties. If we add this up with
plant nonlinearities, it creates a complex model that compromises the accuracy of the white-box linear or
nonlinear model in processing the system's state [33], [68], [69]. The general linear regression model used
input-output data of the heating, ventilation, and air-conditioning (HVAC)-controlled plant to calculate
optimal control with particle swarm optimization (PSO) proposed by [52]. The same model in [33], [68] used
the MPC algorithm to provide accurate real-time control and reduce the effects of network delay or data loss.
Support vector regression model with deep learning method and employed MPC algorithm to accurately
predict traffic network and congestion [69].
3.3. Answering RQ3: assessment method on the proposed model
Figure 6 shows statistic results on metric to answer RQ3. As the CCS domain is still in its early
stage, it is notable from the assessment method (metric M09) used in the literature primarily by simulation
that can be found in 31 articles and discussion with formal mathematical modeling and analysis in 16 articles.
Although this is an expected outcome, it is also a formal realization in the CCS domain from control theory
or system community, especially in mathematical modeling. On the other hand, there are also attempts to
realize the effectiveness of the proposed method using an experiment with a use-case found in 17 articles, as
(a)
(b)
Figure 5. Correlation results between metrics to answer RQ2 (a) M06: control perspective–M07: system
modelling and (b) M06: control perspective–M08: control algorithm type and objective
8
15 15
7
0
8
11
4
9
6
1 1
4
1
0
2
4
6
8
10
12
14
16
Total Linear time-
invariant
Linear time-
variant
Total Linear time-
invariant
Linear time-
variant
Total Linear time-
invariant
Linear time-
variant
Total AnYa Fuzzy
Rule Based
Custom General
Linear
Regression
Support
Vector
Regression
White-box model White-box model White-box model Black-box Model
Cloud, Network, & Plant uncertainties Control Strategy & Structure Privacy, security, & Encryption Self-learning & Data-driven modeling
#articles
10
3
1 1 1
3
1
6
1
2
3
5
4
1
2
1 1
3
1
2
2
1 1
10
5
2
1
2
3
1 1 1
4
2
1 1
0
1
2
3
4
5
6
7
8
9
10
Total
MPC
Optimal
Control
LQR/
LQG
Total
MPC
Optimal
Control
PID
Control
LQR/
LQG
Rule-based
Control
Total
MPC
Optimal
Control
PID
Control
Robust
Control
LQR/
LQG
Rule-based
Control
Total
MPC
Optimal
Control
PID
Control
Rule-based
Control
Cloud, Network, & Plant
uncertainties
Control Strategy & Structure Privacy, security, & Encryption Self-learning & Data-driven modeling
#articles
Disturbance Rejection
Optimization
Regulatory
9. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Cloud-based control systems: a systematic literature review (Santo Wijaya)
143
shown in Figure 6(a). Figure 6(b) shows the correlation between metrics M05 and M09. It can be observed
that articles with control algorithm topics used the simulation to assess their proposed method evaluation.
The simulation assessment shows the effectiveness of the proposed control algorithm compared to previous
research with time-series response over a given simulation time. On the other hand, articles on cloud
architecture used discussion with formal analysis to show the proposed framework.
(a) (b)
Figure 6. Statistic results on metric to answer RQ3 (a) M09: assessment method and M05: engineering
perspective – M09: assessment method
3.4. Answering RQ4: type of application domain
Figure 7 shows statistic results on metric to answer RQ4. Figure 7(a) shows the selected article's
application domain (metric M10). Notably, 28 articles used a general system, and these articles did not
specifically discuss the application domain. Then, 15 articles discussed networked multi-agent systems
(NMAS) in the application domain, such as UAV, traffic networks, and flow. Then it is followed by 14
articles that discuss manufacturing, robotics in the application domain, such as discrete manufacturing, robot
control, and machine tool. Finally, seven articles discuss energy management systems (EMS), such as
HVAC, heat pumps, building elevators, and solar electrical generation. based on the correlation between
metric M05 and metric M10, it is notable that articles with topics of [control algorithm] and [integrated
architecture & control algorithm] mostly used the general approach of the application domain, as shown in
Figure 7(b). On the other hand, there is a balance in topics [control algorithm], [integrated architecture &
control algorithm], and [cloud architecture] for articles that discuss the specific application domain, such as
[manufacturing, robotics] and [NMAS]. Hence, it is important to have a combined approach between cloud
architecture and control algorithm to implement the proposed method appropriately.
16
17
31
0
5
10
15
20
25
30
35
Discussion Experiment
with Use-case
Simulation
#articles
0
5
10
15
20
25
30
35
Discussion Experiment with
Use-case
Simulation
9
3 1
3
6
20
3 6
8
1 2
1
#articles
Ontology of Cloud-based Control
Network Communication
Integrated Architecture & Algorithm
Emulator
Control Algorithm
Cloud Architecture
(a) (b)
Figure 7. Statistic results on metric to answer RQ4 (a) M10: application domain and (b) M05: engineering
perspective–M10: application domain
28
7
15 14
0
5
10
15
20
25
30
#articles
3
4
6
15
5
5
4
1 6
2
6
3
2
1
1
0 5 10 15 20 25 30
General
Energy Management Systems
Networked Multi-Agent Systems
Manufacturing, Robotics
#articles
Cloud Architecture Control Algorithm
Emulator Integrated Architecture & Algorithm
Network Communication Ontology of Cloud-based Control
10. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 1, March 2023: 135-148
144
3.5. Challenges for future research
An overview of several challenges found during data analysis and answering the research questions
is presented. Finally, it is clusterized in particular perspective challenges for control engineers, network and
cloud engineers, and others interested in studying the CCS domain. The challenges for future research are
clusterized into 4 clusters, such as i) emulator, ii) cloud architectures, networks and ontology, iii) system
models, and iv) controllers.
3.5.1. Emulator
Notably, only one article proposed this topic [77]. In contrast, it is well known that a simulation
environment is an indispensable tool for helping researchers evaluate the effectiveness of one's proposed
method. Especially an emulator that can perform simulation for the CCS domain, including plant, network,
and cloud dynamics systems. For example, it is essential to evaluate disturbance rejection and how the
system performs with the proposed method in case of a cyber attack. Furthermore, there is much interest in
designing virtual testbeds in cloud computing fields [78], [79] for cloud resource allocation and control of the
cloud. However, the research topic is still wide open for an emulator in CCS or control-over-the-cloud
domain.
3.5.2. Cloud architectures, networks and ontology
The review result shows that the distance between the cloud center and the controlled plant is an
essential dependent variable due to network latency. In the controlled plant, where sampling time is critical,
the author suggests bringing the cloud near the plant. Hence it is the best approach to employ fog or edge
computing architecture. Currently, fog or edge computing is a hot topic in the IoT domain; this includes
classification problems in selecting a wide variety of technology for network transport protocol, security
encryption, and management. The cloud offers elasticity and flexibility regarding its virtualization or
containerization function with unlimited resource allocation so that complex calculations of the control
algorithm can be realized. However, cloud and network are hard-coupling dynamics systems, creating a
challenge in realizing CCS. Open questions include: What is the sufficient cloud architecture condition to
realize flexible control-as-a-service (CaaS)? How do we classify and process complex traffic data efficiently?
How to integrate with the plant's legacy architecture? What is the best approach for selecting network
protocol?
3.5.3. System models
The review results indicate that most derivations of the control algorithm employed simple linear
time-invariant or linear time-variant models, excluding the self-learning and data-driven modeling sub-topic.
The challenging aspect of the linear model is its inaccuracy when the system is subject to nonlinearity or
uncertain behavior of disturbances. With the 'cloud-fog' approach, the simple linear model is still considered
as it operates in the local control where the control object is the plant itself. However, it needs a new
modeling approach with the 'cloud-centric' approach as the control object includes the network's dynamic. It
is well known that the network and cloud system consist of unmodeled dynamics and uncertainties. Data-
driven modeling, where identification of the model is based on input-output, offers an advantage compared to
the white-box simple linear model. Currently, it receives less research interest, but it would be interesting to
investigate such models with better accuracy. A neural-network model approach with a deep learning method
to train the model is one of the candidates, as it inherently has a nonlinear neuron network. However, they are
complex to build and require a sufficient background in computer science.
3.5.4. Controllers
Most articles selected optimal control, including MPC and LQR/LQG, with several control
strategies and architecture depending on the control objective. Concretizing the control architecture in the
real-case implementation remains an open problem for future research; the current quantitative method to
show the control method's effectiveness mainly employs a simulation approach with a numerical example.
From the security perspective, an approach to calculating control action with the data remaining in an
encrypted state offers an intuitive solution to the system's cyber security. However, the solution is
computationally heavy. Open questions include: Are the currently proposed method scalable to real-case
problems? What control strategy offers the best approach in the 'cloud-centric' and the 'cloud-fog'
approaches? What is the possibility of an artificial intelligence approach offering a novel model and control
(especially MPC) integration as it works better at predictive analytics?
11. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Cloud-based control systems: a systematic literature review (Santo Wijaya)
145
4. CONCLUSION
This study presented the findings of a thorough evaluation with a systematic literature review to
offer a perspective on the CCS domain. The study's findings indicate that CCS research is still in the early
stage of development. While the number of research is still limited, it has seen an exponential increase in
research interest over the past five years. Additionally, it has been discovered that Xia Y. is the most prolific
author with the most extensive co-authorship network. Also, the control/industrial/systems engineering
community is interested in exploring this ensemble domain between cloud computing in computer science
and control systems. Notably, five top-cited articles discussed topics as follows: cloud architecture flexibility,
control stability, secured control algorithm, and data-driven control system.
The engineering perspectives are clusterized into six categories. cloud architecture, control
algorithm, and integrated cloud architecture with control algorithm are the most discussed topics. This
finding is in line with the five top-cited topics. The assessment method is still commonly used in simulation
and discussion with formal modeling and analysis. However, several studies showed potential
implementation in NMAS, manufacturing, and EMS. A more detailed study of the control algorithm is
clustered into i) cloud, network and plant uncertainties; ii) control strategy and architecture; iii) privacy,
security and encryption; iv) data-driven and self-learning modeling. From a modeling perspective, most
studies employed a linear time-variant or linear time-invariant model, which is a white-box approach to
modeling. Although it is well known that the network and cloud system consists of unmodeled nonlinear
dynamics and uncertainties, using a linear model raises the question of how well it will perform in a real-
world application. Several authors have started employing data-driven and self-learning modeling and have
shown a promising approach. From a security perspective, an intuitive way to secure the system using direct
calculation of encrypted data in the control algorithm has a computationally heavy drawback. From an
architecture perspective, the 'cloud-fog' approach solves the latency problem and de-coupling nonlinearities
between plant and network to simplify the problem. A novel 'cloud-centric' approach is preferable as it
removes the redundancy of constrained devices in fog computing. In the control perspective, optimal control
(including MPC and LQR/LQG) shows controller guarantees to three objectives: disturbance rejection,
regulation, and optimization.
In conclusion, the CCS domain is an ensemble of two disciplines: cloud computing in computer
science and control systems. Historically, these disciplines have operated in distinct fields. Nevertheless,
advancement in cloud computing offers benefits in the area lacking control system development.
Furthermore, progress in these CCS fields requires an open mind toward each discipline. Therefore, this
systematic literature review result offers perspective to the researcher that hopefully will catalyze more study
and investigation in this challenging area. The literature review's objective is ensured by following a
thorough systematic approach. However, the extent of this literature review is limited to the following
subjects. First, it is acknowledged that there is a possibility that primary studies missed out by limiting the
automatic search to the four selected databases, and the logical combination of keywords selection,
respectively. Then the inclusion criteria, which include i) selecting only English-written articles, and ii)
selecting only journals and proceedings articles, might cause missing primary studies too.
REFERENCES
[1] S. Jaskó, A. Skrop, T. Holczinger, T. Chován, and J. Abonyi, “Development of manufacturing execution systems in accordance
with Industry 4.0 requirements: A review of standard- and ontology-based methodologies and tools,” Computers in Industry, vol.
123, no. 2, p. 103300, Dec. 2020, doi: 10.1016/j.compind.2020.103300.
[2] J. Mocnej, M. Miškuf, P. Papcun, and I. Zolotová, “Impact of edge computing paradigm on energy consumption in IoT,” in 15th
IFAC Conference on Programmable Devices and Embedded Systems PDeS 2018, 2018, vol. 51, no. 6, pp. 162–167. doi:
10.1016/j.ifacol.2018.07.147.
[3] J. Bughin, M. Chui, and J. Manyika, “Clouds, big data, and smart assets: Ten tech-enabled business trends to watch,” McKinsey
Quarterly. pp. 1–14, 2010.
[4] J. Li, L. Lyu, X. Liu, X. Zhang, and X. Lyu, “FLEAM: A federated learning empowered architecture to mitigate DDoS in
industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp. 4059–4068, Jun. 2022, doi:
10.1109/TII.2021.3088938.
[5] M. S. Mahmoud, “Cloud-based control systems: basics and beyond,” Journal of Physics: Conference Series, vol. 1334, no. 1,
2019, doi: 10.1088/1742-6596/1334/1/012006.
[6] W. Chu, Q. Wuniri, X. Du, Q. Xiong, T. Huang, and K. Li, “Cloud control system architectures, technologies and applications on
intelligent and connected vehicles: a review,” Chinese Journal of Mechanical Engineering, vol. 34, no. 1, p. 139, Dec. 2021, doi:
10.1186/s10033-021-00638-4.
[7] M. Mital, A. K. Pani, S. Damodaran, and R. Ramesh, “Cloud based management and control system for smart communities: A
practical case study,” Computers in Industry, vol. 74, pp. 162–172, Dec. 2015, doi: 10.1016/j.compind.2015.06.009.
[8] G. Bharanidharan and S. Jayalakshmi, “Elastic resource allocation, provisioning and models classification on cloud computing a
literature review,” in 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), Mar.
2021, pp. 1909–1915. doi: 10.1109/ICACCS51430.2021.9442018.
12. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 1, March 2023: 135-148
146
[9] S. Wijaya, H. L. H. S. Warnars, F. L. Gaol, and B. Soewito, “Cloud-based control system: a bibliometric analysis,” Telkomnika
(Telecommunication Computing Electronics and Control), vol. 20, no. 6, pp. 1357–1367, Dec. 2022, doi:
10.12928/TELKOMNIKA.v20i6.23666.
[10] V. R. Basili and G. Caldiera, “The goal question metric approach,” Encyclopedia of Software Engineering - 2 Volume Set, vol. 2.
pp. 528–532, 2000. doi: 10.1.1.104.8626.
[11] B. Kitchenham, O. P. Brereton, D. Budgen, M. Turner, J. Bailey, and S. Linkman, “Systematic literature reviews in software
engineering – A systematic literature review,” Information and Software Technology, vol. 51, no. 1, pp. 7–15, Jan. 2009, doi:
10.1016/j.infsof.2008.09.009.
[12] T. Goldschmidt, S. Hauck-Stattelmann, S. Malakuti, and S. Grüner, “Container-based architecture for flexible industrial control
applications,” Journal of Systems Architecture, vol. 84, pp. 28–36, Mar. 2018, doi: 10.1016/j.sysarc.2018.03.002.
[13] S. Guan and S. Niu, “Stability-based controller design of cloud control system with uncertainties,” IEEE Access, vol. 9, pp.
29056–29070, 2021, doi: 10.1109/ACCESS.2021.3059766.
[14] Y. Xia, “Cloud control systems,” IEEE/CAA Journal of Automatica Sinica, vol. 2, no. 2, pp. 134–142, Apr. 2015, doi:
10.1109/JAS.2015.7081652.
[15] J. Schlechtendahl, F. Kretschmer, Z. Sang, A. Lechler, and X. Xu, “Extended study of network capability for cloud based control
systems,” Robotics and Computer-Integrated Manufacturing, vol. 43, pp. 89–95, Feb. 2017, doi: 10.1016/j.rcim.2015.10.012.
[16] H. M. Zhang and M. A. Babar, “On searching relevant studies in software engineering,” in EASE’10: Proceedings of the 14th
international conference on Evaluation and Assessment in Software Engineering, Apr. 2010, pp. 111–120. doi:
10.14236/ewic/EASE2010.14.
[17] Y. Xia, “From networked control systems to cloud control systems,” in Chinese Control Conference, CCC, 2012, pp. 5878–5883.
[18] Z. Li, A. Alsabbagh, and C. Ma, “A cloud-based energy management framework with local redundancy control capability,” in
Proceedings - 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems, ICPS 2021, May 2021, pp. 873–
878. doi: 10.1109/ICPS49255.2021.9468249.
[19] D. A. Tomzik and X. W. Xu, “Requirements for a cloud-based control system interacting with soft bodies,” in 2017 24th
International Conference on Mechatronics and Machine Vision in Practice (M2VIP), Nov. 2017, vol. 2017-Decem, pp. 1–5. doi:
10.1109/M2VIP.2017.8211512.
[20] C. E. Okwudire, X. Lu, G. Kumaravelu, and H. Madhyastha, “A three-tier redundant architecture for safe and reliable cloud-based
CNC over public internet networks,” Robotics and Computer-Integrated Manufacturing, vol. 62, p. 101880, Apr. 2020, doi:
10.1016/j.rcim.2019.101880.
[21] M. S. Mahmoud and Y. Xia, “The interaction between control and computing theories: New approaches,” International Journal
of Automation and Computing, vol. 14, no. 3, pp. 254–274, Jun. 2017, doi: 10.1007/s11633-017-1070-2.
[22] P. Papcun, E. Kajati, C. Liu, R. Y. Zhong, and I. Zolotova, “Cloud-based control of industrial cyber-physical systems,” in The
48th International Conference on Computers and Industrial Engineering (CIE 48), 2018, pp. 1–14.
[23] T. Goldschmidt, M. K. Murugaiah, C. Sonntag, B. Schlich, S. Biallas, and P. Weber, “Cloud-based control: A multi-tenant,
horizontally scalable soft-PLC,” in Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015,
Jun. 2015, pp. 909–916. doi: 10.1109/CLOUD.2015.124.
[24] C. Prehofer and A. Zoitl, “Towards flexible and adaptive productions systems based on virtual cloud-based control,” in
Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA), Sep. 2014, pp. 1–4. doi:
10.1109/ETFA.2014.7005330.
[25] F. Luo, C. Jiang, S. Yu, J. Wang, Y. Li, and Y. Ren, “Stability of cloud-based UAV systems supporting big data acquisition and
processing,” IEEE Transactions on Cloud Computing, vol. 7, no. 3, pp. 866–877, Jul. 2019, doi: 10.1109/TCC.2017.2696529.
[26] H. Yang, S. Ju, Y. Xia, and J. Zhang, “Predictive cloud control for networked multi-agent systems with quantized signals under
DoS attacks,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 51, no. 2, pp. 1345–1353, Feb. 2021, doi:
10.1109/TSMC.2019.2896087.
[27] T. M. Kneiske, M. Braun, and D. I. Hidalgo-Rodriguez, “A new combined control algorithm for PV-CHP hybrid systems,”
Applied Energy, vol. 210, pp. 964–973, Jan. 2018, doi: 10.1016/j.apenergy.2017.06.047.
[28] N. J. van Eck and L. Waltman, “Software survey: VOSviewer, a computer program for bibliometric mapping,” Scientometrics,
vol. 84, no. 2, pp. 523–538, Aug. 2010, doi: 10.1007/s11192-009-0146-3.
[29] P. Hu, H. Ning, T. Qiu, Y. Xu, X. Luo, and A. K. Sangaiah, “A unified face identification and resolution scheme using cloud
computing in Internet of Things,” Future Generation Computer Systems, vol. 81, pp. 582–592, Apr. 2018, doi:
10.1016/j.future.2017.03.030.
[30] Y. Zhan, Y. Xia, and A. V. Vasilakos, “Future directions of networked control systems: A combination of cloud control and fog
control approach,” Computer Networks, vol. 161, pp. 235–248, Oct. 2019, doi: 10.1016/j.comnet.2019.07.004.
[31] Y. Ali, Y. Xia, L. Ma, and A. Hammad, “Secure design for cloud control system against distributed denial of service attack,”
Control Theory and Technology, vol. 16, no. 1, pp. 14–24, 2018, doi: 10.1007/s11768-018-8002-8.
[32] L. Ma, Y. Xia, Y. Ali, and Y. Zhan, “Engineering problems in initial phase of cloud control system,” in 2017 36th Chinese
Control Conference (CCC), Jul. 2017, pp. 7892–7896. doi: 10.23919/ChiCC.2017.8028603.
[33] R. Gao, Y. Xia, and L. Ma, “A new approach of cloud control systems: CCSs based on data-driven predictive control,” in
Proceedings - 2017 Chinese Automation Congress, CAC 2017, Oct. 2017, vol. 2017-Janua, pp. 3419–3422. doi:
10.1109/CAC.2017.8243371.
[34] Y. Ali et al., “Solutions verification for cloud-based networked control system using Karush-Kuhn-Tucker conditions,” in
Proceedings 2018 Chinese Automation Congress, CAC 2018, Nov. 2019, pp. 1385–1389. doi: 10.1109/CAC.2018.8623109.
[35] C. Yan, Y. Li, and Y. Xia, “Analysis and design for intelligent manufacturing cloud control systems,” in 2020 Chinese
Automation Congress (CAC), Nov. 2020, pp. 7174–7179. doi: 10.1109/CAC51589.2020.9327056.
[36] H. Yuan, Y. Xia, M. Lin, H. Yang, and R. Gao, “Dynamic pricing-based resilient strategy design for cloud control system under
jamming attack,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 50, no. 1, pp. 111–122, Jan. 2020, doi:
10.1109/TSMC.2019.2952467.
[37] L. Li, X. Wang, Y. Xia, and H. Yang, “Predictive cloud control for multiagent systems with stochastic event-triggered schedule,”
ISA Transactions, vol. 94, pp. 70–79, Nov. 2019, doi: 10.1016/j.isatra.2019.04.011.
[38] H. Yuan, Y. Xia, J. Zhang, H. Yang, and M. S. Mahmoud, “Stackelberg-game-based defense analysis against advanced persistent
threats on cloud control system,” IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1571–1580, Mar. 2020, doi:
10.1109/TII.2019.2925035.
[39] Y. Kawano, K. Kashima, and M. Cao, “A fundamental performance limit of cloud-based control in terms of differential privacy
level,” 21st IFAC World Congress, vol. 53, no. 2. pp. 11018–11023, 2020. doi: 10.1016/j.ifacol.2020.12.220.
13. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864
Cloud-based control systems: a systematic literature review (Santo Wijaya)
147
[40] A. Alessandretti and A. P. Aguiar, “A model predictive cloud-based control scheme for trajectory-tracking: Effects of round-trip
time over-estimates,” in 2018 13th APCA International Conference on Control and Soft Computing (CONTROLO), Jun. 2018, pp.
183–188. doi: 10.1109/CONTROLO.2018.8516416.
[41] B. Costa, I. Skrjanc, S. Blazic, and P. Angelov, “A practical implementation of self-evolving cloud-based control of a pilot plant,”
in 2013 IEEE International Conference on Cybernetics (CYBCO), Jun. 2013, pp. 7–12. doi: 10.1109/CYBConf.2013.6617464.
[42] D. Lee and F. P. Tsai, “Air conditioning energy saving from cloud-based artificial intelligence: Case study of a split-type air
conditioner,” Energies, vol. 13, no. 8, p. 2001, Apr. 2020, doi: 10.3390/en13082001.
[43] A. R. Pedram, T. Tanaka, and M. Hale, “Bidirectional information flow and the roles of privacy masks in cloud-based control,” in
2019 IEEE Information Theory Workshop, ITW 2019, Aug. 2019, pp. 1–5. doi: 10.1109/ITW44776.2019.8989371.
[44] B. Lindemann, C. Karadogan, N. Jazdi, M. Liewald, and M. Weyrich, “Cloud-based control approach in discrete manufacturing
using a self-learning architecture,” in 3rd IFAC Conference on Embedded Systems, Computational Intelligence and Telematics in
Control CESCIT 2018, 2018, vol. 51, no. 10, pp. 163–168. doi: 10.1016/j.ifacol.2018.06.255.
[45] D. Coupek, A. Lechler, and A. Verl, “Cloud-based control for downstream defect reduction in the production of electric motors,”
in 2016 International Conference on Electrical Systems for Aircraft, Railway, Ship Propulsion and Road Vehicles & International
Transportation Electrification Conference (ESARS-ITEC), Nov. 2016, vol. 53, no. 6, pp. 1–6. doi: 10.1109/ESARS-
ITEC.2016.7841361.
[46] P. Skarin, J. Eker, and K.-E. Årzén, “Cloud-based model predictive control with variable horizon,” in 21st IFAC World Congress,
2020, vol. 53, no. 2, pp. 6993–7000. doi: 10.1016/j.ifacol.2020.12.437.
[47] T. Tanaka, M. Skoglund, H. Sandberg, and K. H. Johansson, “Directed information and privacy loss in cloud-based control,” in
2017 American Control Conference (ACC), May 2017, pp. 1666–1672. doi: 10.23919/ACC.2017.7963192.
[48] M. S. Daru and T. Jager, “Encrypted cloud-based control using secret sharing with one-time pads,” in 2019 IEEE 58th Conference
on Decision and Control (CDC), Dec. 2019, vol. 2019-Decem, pp. 7215–7221. doi: 10.1109/CDC40024.2019.9029342.
[49] M. S. Darup, A. Redder, and D. E. Quevedo, “Encrypted cloud-based MPC for linear systems with input constraints,” in 6th IFAC
Conference on Nonlinear Model Predictive Control NMPC 2018, 2018, vol. 51, no. 20, pp. 535–542. doi:
10.1016/j.ifacol.2018.11.035.
[50] M. S. Darup, “Encrypted MPC based on ADMM real-time iterations,” 21st IFAC World Congress, vol. 53, no. 2, pp. 3508–3514,
2020, doi: 10.1016/j.ifacol.2020.12.1708.
[51] P. Skarin and K.-E. Arzen, “Explicit MPC recovery for cloud control systems,” in 2021 60th IEEE Conference on Decision and
Control (CDC), Dec. 2021, vol. 2021, pp. 5394–5401. doi: 10.1109/CDC45484.2021.9683307.
[52] R. Yang and L. Wang, “Implementing intelligent water loop heat pump controller on cloud for sustainable buildings,” in
Proceedings - 2019 IEEE International Conference on Industrial Cyber Physical Systems, ICPS 2019, May 2019, pp. 179–184.
doi: 10.1109/ICPHYS.2019.8780321.
[53] S. Kantawong and R. Kanchanawiboon, “Multipath tall building elevator module for flexible transport system with PLC based on
cloud control,” in 2017 International Electrical Engineering Congress (iEECON), Mar. 2017, pp. 1–4. doi:
10.1109/IEECON.2017.8075900.
[54] F. Farokhi, I. Shames, and N. Batterham, “Secure and private cloud-based control using semi-homomorphic encryption,” in : 6th
IFAC Workshop on Distributed Estimation and Control in Networked Systems NECSYS 2016, 2016, vol. 49, no. 22, pp. 163–168.
doi: 10.1016/j.ifacol.2016.10.390.
[55] R. Mahfouzi, A. Aminifar, S. Samii, P. Eles, and Z. Peng, “Secure cloud control using verifiable computation,” in 2021 IEEE
International Conference on Omni-Layer Intelligent Systems, COINS 2021, Aug. 2021, pp. 1–6. doi:
10.1109/COINS51742.2021.9524115.
[56] S. Guan and S. Niu, “Stability-based controller with uncertain parameters for cloud control system,” in 2020 Chinese Control And
Decision Conference (CCDC), Aug. 2020, pp. 3842–3846. doi: 10.1109/CCDC49329.2020.9164370.
[57] Z. Wang, S. Yang, X. Xiang, A. Vasilijević, N. Mišković, and Ð. Nađ, “Cloud-based remote control framework for unmanned
surface vehicles,” 21st IFAC World Congress, vol. 53, no. 2, pp. 14564–14569, 2020, doi: 10.1016/j.ifacol.2020.12.1462.
[58] G. Adamson, L. Wang, and P. Moore, “Feature-based function block control framework for manufacturing equipment in cloud
environments,” International Journal of Production Research, vol. 57, no. 12, pp. 3954–3974, Jun. 2019, doi:
10.1080/00207543.2018.1542178.
[59] R. Langmann and M. Stiller, “The PLC as a smart service in industry 4.0 production systems,” Applied Sciences (Switzerland),
vol. 9, no. 18, p. 3815, Sep. 2019, doi: 10.3390/app9183815.
[60] S. Kim, “An effective sensor cloud control scheme based on a two-stage game approach,” IEEE Access, vol. 6, pp. 20430–20439,
2018, doi: 10.1109/ACCESS.2018.2815578.
[61] C. Hinze, W. Xu, A. Lechler, and A. Verl, “A cloud-based control architecture design for the interaction of industrial robots with
soft objects,” in 2017 24th International Conference on Mechatronics and Machine Vision in Practice (M2VIP), Nov. 2017, vol.
2017-Decem, pp. 1–6. doi: 10.1109/M2VIP.2017.8211438.
[62] C. Hong and D. Shi, “A cloud-based control system architecture for multi-UAV,” in Proceedings of the 3rd International
Conference on Robotics, Control and Automation - ICRCA ’18, 2018, pp. 25–30. doi: 10.1145/3265639.3265652.
[63] D. A. Tomzik and X. W. Xu, “Architecture of a cloud-based control system decentralised at field level,” in 2018 IEEE 14th
International Conference on Automation Science and Engineering (CASE), Aug. 2018, vol. 2018-Augus, pp. 353–358. doi:
10.1109/COASE.2018.8560418.
[64] S. Majumder and M. S. Prasad, “Cloud based control for unmanned aerial vehicles,” in 2016 3rd International Conference on
Signal Processing and Integrated Networks (SPIN), Feb. 2016, pp. 421–424. doi: 10.1109/SPIN.2016.7566731.
[65] E. Sun, Z. Chen, and J. Cai, “Cloud control platform of vehicle and road collaborative and its implementation on intelligent
networked vehicles,” in 2021 IEEE International Conference on Emergency Science and Information Technology (ICESIT), Nov.
2021, pp. 274–276. doi: 10.1109/ICESIT53460.2021.9696550.
[66] E. Biyik, J. D. Brooks, H. Sehgal, J. Shah, and S. Gency, “Cloud-based model predictive building thermostatic controls of
commercial buildings: Algorithm and implementation,” in 2015 American Control Conference (ACC), Jul. 2015, vol. 2015-July,
pp. 1683–1688. doi: 10.1109/ACC.2015.7170975.
[67] P. Skarin, W. Tarneberg, K.-E. Arzen, and M. Kihl, “Control-over-the-cloud: A performance study for cloud-native, critical
control systems,” in 2020 IEEE/ACM 13th International Conference on Utility and Cloud Computing (UCC), Dec. 2020, pp. 57–
66. doi: 10.1109/UCC48980.2020.00025.
[68] H. Tan, Y. Wang, H. Zhong, M. Wu, and Y. Jiang, “Coordination of low-power nonlinear multi-agent systems using cloud
computing and a data-driven hybrid predictive control method,” Control Engineering Practice, vol. 108, p. 104722, Mar. 2021,
doi: 10.1016/j.conengprac.2020.104722.
14. ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 12, No. 1, March 2023: 135-148
148
[69] M. Shengdong, X. Zhengxian, and T. Yixiang, “Intelligent traffic control system based on cloud computing and big data mining,”
IEEE Transactions on Industrial Informatics, vol. 15, no. 12, pp. 6583–6592, Dec. 2019, doi: 10.1109/TII.2019.2929060.
[70] J. Wang, C. Jiang, Z. Ni, S. Guan, S. Yu, and Y. Ren, “Reliability of cloud controlled multi-UAV systems for on-demand
services,” in GLOBECOM 2017 - 2017 IEEE Global Communications Conference, Dec. 2017, vol. 2018-Janua, pp. 1–6. doi:
10.1109/GLOCOM.2017.8254452.
[71] B. Wu, X. Wu, and J. Yang, “Research on architecture and time-delay of metallurgical industry cloud control system,” in
Proceedings - 2020 Chinese Automation Congress, CAC 2020, Nov. 2020, pp. 7321–7326. doi:
10.1109/CAC51589.2020.9326864.
[72] S. Guan and X. Dong, “An architecture of cloud control system and its application in greenhouse environment,” in Chinese
Control Conference, CCC, Jul. 2019, vol. 2019-July, pp. 2829–2834. doi: 10.23919/ChiCC.2019.8865349.
[73] L. Jiang, R. Tan, X. Lou, and G. Lin, “On lightweight privacy-preserving collaborative learning for internet-of-things objects,” in
IoTDI 2019 - Proceedings of the 2019 Internet of Things Design and Implementation, Apr. 2019, pp. 70–81. doi:
10.1145/3302505.3310070.
[74] A. Papacharalampopoulos, J. Stavridis, P. Stavropoulos, and G. Chryssolouris, “Cloud-based control of thermal based
manufacturing processes,” Procedia CIRP, vol. 55, pp. 254–259, 2016, doi: 10.1016/j.procir.2016.09.036.
[75] J. Schlechtendahl, F. Kretschmer, A. Lechler, and A. Verl, “Communication mechanisms for cloud based machine controls,”
Procedia CIRP, vol. 17, pp. 830–834, 2014, doi: 10.1016/j.procir.2014.01.074.
[76] M. Lyu, F. Biennier, and P. Ghodous, “Integration of ontologies to support Control as a Service in an Industry 4.0 context,”
Service Oriented Computing and Applications, vol. 15, no. 2, pp. 127–140, Jun. 2021, doi: 10.1007/s11761-021-00317-1.
[77] A. F. Murillo, L. F. Cómbita, A. C. Gonzalez, S. Rueda, A. A. Cardenas, and N. Quijano, “A virtual environment for industrial
control systems: A nonlinear use-case in attack detection, identification, and response,” in Proceedings of the 4th Annual
Industrial Control System Security Workshop on - ICSS ’18, 2018, pp. 25–32. doi: 10.1145/3295453.3295457.
[78] J. Larrea, M. K. Marina, and J. Van der Merwe, “Nervion: a cloud native RAN emulator for scalable and flexible mobile core
evaluation,” in Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, Oct. 2021, pp.
736–748. doi: 10.1145/3447993.3483248.
[79] F. N. N. Farias, A. O. Junior, L. da Costa, B. A. Pinheiro, and A. J. G. Abelem, “vSDNEmul: a software-defined network
emulator based on container virtualization,” International journal of simulation: systems, science & technology, pp. 736–748,
Aug. 2019, doi: 10.5013/IJSSST.a.20.04.07.
BIOGRAPHIES OF AUTHORS
Santo Wijaya received a bachelor’s degree in Physics Engineering from the
Institute of Technology of Bandung, Indonesia, in 2004 and received the M.Eng. (Master of
Engineering) degree in Electrical Engineering from the Chulalongkorn University, Thailand, in
2010. He is currently a doctoral candidate in Computer Science at Bina Nusantara University.
His current research interests include deep learning for control systems,
model-based control systems, cyber-physical systems, digital twin, and software engineering.
He can be contacted at email: santo.wijaya@politeknikmeta.ac.id.
Arief Ramadhan is a Researcher and Senior Lecturer in the Doctor of Computer
Science Program at Bina Nusantara University, Indonesia. He teaches and supervises doctoral
dissertations on several topics, including business intelligence, information systems, enterprise
architecture, information technology, gamification, e-business, e-tourism, e-government, e-
learning, metaverse, and data analytics. He can be contacted at email: arieframadhan@ieee.org
Andhika is a lecturer at Polytechnic Meta Industry Cikarang. He received a
bachelor’s degree in Computer Science from the University of Putra Indonesia, Indonesia, in
2013. Then he also received his Master's degree in Computer Science from the University of
Putra Indonesia in 2016. His current research interests include mobile computing, online
education, motion imaging, food technology, and e-computing (E-Learning, E-Government, E-
Commerce). He can be contacted at email: andhika@politeknikmeta.ac.id.