Service deployment strategy for predictive analysis of FinTech IoT applications in edge networks
- Munusamy, Ambigavathi, Adhikari, Mainak, Balasubramanian, Venki, Khan, Mohammad, Menon, Varun, Rawat, Danda, Srirama, Satish
- Authors: Munusamy, Ambigavathi , Adhikari, Mainak , Balasubramanian, Venki , Khan, Mohammad , Menon, Varun , Rawat, Danda , Srirama, Satish
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Internet of Things Journal Vol. 10, no. 3 (2023), p. 2131-2140
- Full Text: false
- Reviewed:
- Description: The seamless integration of sensors and smart communication technologies has led to the development of various supporting systems for financial technology (FinTech). The emergence of the next-generation Internet of Things (Nx-IoT) for FinTech applications enhances the customer satisfaction ratio. The main research challenge for FinTech applications is to analyze the incoming tasks at the edge of the networks with minimum delay and power consumption while increasing the prediction accuracy. Motivated by the above-mentioned challenge, in this article, we develop a ranked-based service deployment strategy and an artificial intelligence technique for financial data analysis at edge networks. Initially, a risk-based task classification strategy has been developed for classifying the incoming financial tasks and providing the importance to the risk-based task for meeting users' satisfaction ratio. Besides that, an efficient service deployment strategy is developed using $Hall's$ theorem to assign the ranked-based financial data to the suitable edge or cloud servers with minimum delay and power consumption. Finally, the standard support vector machines (SVMs) algorithm is used at edge networks for analyzing the financial data with higher accuracy. The experimental results demonstrate the effectiveness of the proposed strategy and SVM model at edge networks over the baseline algorithms and classification models, respectively. © 2014 IEEE.
Emerging point of care devices and artificial intelligence : prospects and challenges for public health
- Stranieri, Andrew, Venkatraman, Sitalakshmi, Minicz, John, Zarnegar, Armita, Firmin, Sally, Balasubramanian, Venki, Jelinek, Herbert
- Authors: Stranieri, Andrew , Venkatraman, Sitalakshmi , Minicz, John , Zarnegar, Armita , Firmin, Sally , Balasubramanian, Venki , Jelinek, Herbert
- Date: 2022
- Type: Text , Journal article
- Relation: Smart Health Vol. 24, no. (2022), p.
- Full Text:
- Reviewed:
- Description: Risk assessments for numerous conditions can now be performed cost-effectively and accurately using emerging point of care devices coupled with machine learning algorithms. In this article, the case is advanced that point of care testing in combination with risk assessments generated with artificial intelligence algorithms, applied to the universal screening of the general public for multiple conditions at one session, represents a new kind of in-expensive screening that can lead to the early detection of disease and other public health benefits. A case study of a diabetes screening clinic in a rural area of Australia is presented to illustrate its benefits. Universal, poly-aetiological screening is shown to meet the ten World Health Organisation criteria for screening programmes. © Elsevier Inc.
- Authors: Stranieri, Andrew , Venkatraman, Sitalakshmi , Minicz, John , Zarnegar, Armita , Firmin, Sally , Balasubramanian, Venki , Jelinek, Herbert
- Date: 2022
- Type: Text , Journal article
- Relation: Smart Health Vol. 24, no. (2022), p.
- Full Text:
- Reviewed:
- Description: Risk assessments for numerous conditions can now be performed cost-effectively and accurately using emerging point of care devices coupled with machine learning algorithms. In this article, the case is advanced that point of care testing in combination with risk assessments generated with artificial intelligence algorithms, applied to the universal screening of the general public for multiple conditions at one session, represents a new kind of in-expensive screening that can lead to the early detection of disease and other public health benefits. A case study of a diabetes screening clinic in a rural area of Australia is presented to illustrate its benefits. Universal, poly-aetiological screening is shown to meet the ten World Health Organisation criteria for screening programmes. © Elsevier Inc.
A novel dynamic software-defined networking approach to neutralize traffic burst
- Sharma, Aakanksha, Balasubramanian, Venki, Kamruzzaman, Joarder
- Authors: Sharma, Aakanksha , Balasubramanian, Venki , Kamruzzaman, Joarder
- Date: 2023
- Type: Text , Journal article
- Relation: Computers Vol. 12, no. 7 (2023), p.
- Full Text:
- Reviewed:
- Description: Software-defined networks (SDN) has a holistic view of the network. It is highly suitable for handling dynamic loads in the traditional network with a minimal update in the network infrastructure. However, the standard SDN architecture control plane has been designed for single or multiple distributed SDN controllers facing severe bottleneck issues. Our initial research created a reference model for the traditional network, using the standard SDN (referred to as SDN hereafter) in a network simulator called NetSim. Based on the network traffic, the reference models consisted of light, modest and heavy networks depending on the number of connected IoT devices. Furthermore, a priority scheduling and congestion control algorithm is proposed in the standard SDN, named extended SDN (eSDN), which minimises congestion and performs better than the standard SDN. However, the enhancement was suitable only for the small-scale network because, in a large-scale network, the eSDN does not support dynamic SDN controller mapping. Often, the same SDN controller gets overloaded, leading to a single point of failure. Our literature review shows that most proposed solutions are based on static SDN controller deployment without considering flow fluctuations and traffic bursts that lead to a lack of load balancing among the SDN controllers in real-time, eventually increasing the network latency. Therefore, to maintain the Quality of Service (QoS) in the network, it becomes imperative for the static SDN controller to neutralise the on-the-fly traffic burst. Thus, our novel dynamic controller mapping algorithm with multiple-controller placement in the SDN is critical to solving the identified issues. In dSDN, the SDN controllers are mapped dynamically with the load fluctuation. If any SDN controller reaches its maximum threshold, the rest of the traffic will be diverted to another controller, significantly reducing delay and enhancing the overall performance. Our technique considers the latency and load fluctuation in the network and manages the situations where static mapping is ineffective in dealing with the dynamic flow variation. © 2023 by the authors.
- Authors: Sharma, Aakanksha , Balasubramanian, Venki , Kamruzzaman, Joarder
- Date: 2023
- Type: Text , Journal article
- Relation: Computers Vol. 12, no. 7 (2023), p.
- Full Text:
- Reviewed:
- Description: Software-defined networks (SDN) has a holistic view of the network. It is highly suitable for handling dynamic loads in the traditional network with a minimal update in the network infrastructure. However, the standard SDN architecture control plane has been designed for single or multiple distributed SDN controllers facing severe bottleneck issues. Our initial research created a reference model for the traditional network, using the standard SDN (referred to as SDN hereafter) in a network simulator called NetSim. Based on the network traffic, the reference models consisted of light, modest and heavy networks depending on the number of connected IoT devices. Furthermore, a priority scheduling and congestion control algorithm is proposed in the standard SDN, named extended SDN (eSDN), which minimises congestion and performs better than the standard SDN. However, the enhancement was suitable only for the small-scale network because, in a large-scale network, the eSDN does not support dynamic SDN controller mapping. Often, the same SDN controller gets overloaded, leading to a single point of failure. Our literature review shows that most proposed solutions are based on static SDN controller deployment without considering flow fluctuations and traffic bursts that lead to a lack of load balancing among the SDN controllers in real-time, eventually increasing the network latency. Therefore, to maintain the Quality of Service (QoS) in the network, it becomes imperative for the static SDN controller to neutralise the on-the-fly traffic burst. Thus, our novel dynamic controller mapping algorithm with multiple-controller placement in the SDN is critical to solving the identified issues. In dSDN, the SDN controllers are mapped dynamically with the load fluctuation. If any SDN controller reaches its maximum threshold, the rest of the traffic will be diverted to another controller, significantly reducing delay and enhancing the overall performance. Our technique considers the latency and load fluctuation in the network and manages the situations where static mapping is ineffective in dealing with the dynamic flow variation. © 2023 by the authors.
Survey : self-empowered wireless sensor networks security taxonomy, challenges, and future research directions
- Adil, Muhammad, Menon, Varun, Balasubramanian, Venki, Alotaibi, Sattam, Song, Houbing, Jin, Zhanpeng, Farouk, Ahmed
- Authors: Adil, Muhammad , Menon, Varun , Balasubramanian, Venki , Alotaibi, Sattam , Song, Houbing , Jin, Zhanpeng , Farouk, Ahmed
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Sensors Journal Vol. 23, no. 18 (2023), p. 20519-20535
- Full Text:
- Reviewed:
- Description: In the recent past, patient-wearable devices and implantable biosensors revealed exponential growth in digital healthcare, because they have the capability to allow access to information anywhere and every time to improve the life standard of multifarious disease-affected patients followed by healthy people. Following these advantages, digital healthcare demands a secure wireless communication infrastructure for interconnected self-empowered biosensor devices to maintain the trust of patients, doctors, pharmacologists, nursing staff, and other associated stakeholders. Several authentications, privacy, and data preservation schemes had been used in the literature to ensure the security of this emerging technology, but with time, these counteraction prototypes become vulnerable to new security threats, as the hackers work tirelessly to compromise them and steal the legitimate information of user's or disrupt the operation of an employed self-empowered wireless sensor network (SWSN). To discuss the security problems of SWSN applications, in this review article, we have presented a detailed survey of the present literature from 2019 to 2022, to familiarize the readers with different security threats and their counteraction schemes. Following this, we will highlight the pros and cons of these countermeasure techniques in the context of SWSN security requirements to underscore their limitations. Thereafter, we will follow-up on the underlined limitations to discuss the open security challenges of SWSNs that need the concerned authorities' attention. Based on this, we will pave a road map for future research work that could be useful for every individual associated with this technology. For the novelty and uniqueness of this work, we will make a comparative analysis with present survey papers published on this topic to answer the question of reviewers, readers, editors, and students why this article is in time and needed in the presence of rival papers. © 2022 IEEE.
- Authors: Adil, Muhammad , Menon, Varun , Balasubramanian, Venki , Alotaibi, Sattam , Song, Houbing , Jin, Zhanpeng , Farouk, Ahmed
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Sensors Journal Vol. 23, no. 18 (2023), p. 20519-20535
- Full Text:
- Reviewed:
- Description: In the recent past, patient-wearable devices and implantable biosensors revealed exponential growth in digital healthcare, because they have the capability to allow access to information anywhere and every time to improve the life standard of multifarious disease-affected patients followed by healthy people. Following these advantages, digital healthcare demands a secure wireless communication infrastructure for interconnected self-empowered biosensor devices to maintain the trust of patients, doctors, pharmacologists, nursing staff, and other associated stakeholders. Several authentications, privacy, and data preservation schemes had been used in the literature to ensure the security of this emerging technology, but with time, these counteraction prototypes become vulnerable to new security threats, as the hackers work tirelessly to compromise them and steal the legitimate information of user's or disrupt the operation of an employed self-empowered wireless sensor network (SWSN). To discuss the security problems of SWSN applications, in this review article, we have presented a detailed survey of the present literature from 2019 to 2022, to familiarize the readers with different security threats and their counteraction schemes. Following this, we will highlight the pros and cons of these countermeasure techniques in the context of SWSN security requirements to underscore their limitations. Thereafter, we will follow-up on the underlined limitations to discuss the open security challenges of SWSNs that need the concerned authorities' attention. Based on this, we will pave a road map for future research work that could be useful for every individual associated with this technology. For the novelty and uniqueness of this work, we will make a comparative analysis with present survey papers published on this topic to answer the question of reviewers, readers, editors, and students why this article is in time and needed in the presence of rival papers. © 2022 IEEE.
- «
- ‹
- 1
- ›
- »