Enabling edge computing-based coverage hole detection framework for lossless data tracking
Abstract
Countries throughout the world were experimenting with novel approaches to prevent the spreading of the Coronavirus pandemic illness (COVID-19). The use of IoT and cloud computing for data collection and analysis to avoid disease transmission via smartphone applications was a significant hurdle. Existing cloud services that are that retain the information of the victim to address severe challenges such as excessive latency and poor spectral performance. Furthermore, the likelihood of coverage gaps might result in the loss of genuine data, leading the technology to present inaccurate data. Motivated to solve these challenges, this paper addresses a new edge computing framework with a coverage hole detection module to detect and prevent the primary spread of pandemics like COVID-19 in an energy-efficient way. Experimental results exhibit excellent performance in terms of energy consumption under edge based and cloud based scenarios in the existence of coverage holes. The experimental findings demonstrate that the proposed structure has improved energy economy and reduced time to process while detecting coverage holes accurately.
Keywords
Full Text:
PDFReferences
1. Tong A, Sorrell TC, Black AJ, et al. Research priorities for COVID-19 sensor technology. Nature Biotechnology 2021; 39(2): 144–147. doi: 10.1038/s41587-021-00816-8
2. Rothan HA, Byrareddy SN. The epidemiology and pathogenesis of coronavirus disease (COVID-19) outbreak. Journal of Autoimmunity 2020; 109: 102433. doi: 10.1016/j.jaut.2020.102433
3. Zafari A, Zurita-Milla R, Izquierdo-Verdiguier E. Evaluating the performance of a random forest kernel for land cover classification. Remote Sensing 2019; 11(5): 575. doi: 10.3390/rs11050575
4. Schaid DJ, Tong X, Batzler A, et al. Multivariate generalized linear model for genetic pleiotropy. Biostatistics 2019; 20(1): 111–128. doi: 10.1093/biostatistics/kxx067
5. Alam MGR, Munir MS, Uddin MZ, et al. Edge-of-things computing framework for cost-effective provisioning of healthcare data. Journal of Parallel and Distributed Computing 2019; 123: 54–60. doi: 10.1016/j.jpdc.2018.08.011
6. Gupta R, Bedi M, Goyal P, et al. Analysis of COVID-19 tracking tool in India: Case study of Aarogya Setu mobile application. Digital Government: Research and Practice 2020; 1(4): 1–8. doi: 10.1145/3416088
7. Safavat S, Sapavath NN, Rawat DB. Recent advances in mobile edge computing and content caching. Digital Communications and Networks 2020; 6(2): 189–194. doi: 10.1016/j.dcan.2019.08.004
8. Mharsi N, Hadji M. A mathematical programming approach for full coverage hole optimization in Cloud Radio Access Networks. Computer Networks 2019; 150: 117–126. doi: 10.1016/j.comnet.2018.12.015
9. Deng X, Xu M, Yang LT, et al. Energy balanced dispatch of mobile edge nodes for confident information coverage hole repairing in IoT. IEEE Internet of Things Journal 2019; 6(3): 4782–4790. doi: 10.1109/JIOT.2018.2869110
10. Sodhro AH, Luo Z, Sangaiah AK, Baik SW. Mobile edge computing based QoS optimization in medical healthcare applications. International Journal of Information Management 2019; 45: 308–318. doi: 10.1016/j.ijinfomgt.2018.08.004
11. Wang J, Ju C, Kim H, et al. A mobile assisted coverage hole patching scheme based on particle swarm optimization for WSNs. Cluster Computing 2019; 22(3): 1787–1795. doi: 10.1007/s10586-017-1586-9
12. Wang X, He X, Feng F, et al. TEM: Tree-enhanced embedding model for explainable recommendation. In: Proceedings of the 2018 World Wide Web Conference; 23–27 April 2018; Lyon, France.
13. Matasci G, Hermosilla T, Wulder MA, et al. Large-area mapping of Canadian boreal forest cover, height, biomass and other structural attributes using Landsat composites and lidar plots. Remote Sensing of Environment 2018; 209: 90–106. doi: 10.1016/j.rse.2017.12.020
14. Pham M, Mengistu Y, Do H, Sheng W. Delivering home healthcare through a cloud-based smart home environment (CoSHE). Future Generation Computer Systems 2018; 81: 129–140. doi: 10.1016/j.future.2017.10.040
15. Chen M, Li W, Hao Y, et al. Edge cognitive computing based smart healthcare system. Future Generation Computer Systems 2018; 86: 403–411. doi: 10.1016/j.future.2018.03.054
16. Ai Y, Peng M, Zhang K. Edge computing technologies for internet of things: A primer. Digital Communications and Networks 2018; 4(2): 77–86. doi: 10.1016/j.dcan.2017.07.001
17. Verma P, Sood SK. Fog assisted-IoT enabled patient health monitoring in smart homes. IEEE Internet of Things Journal 2018; 5(3): 1789–1796. doi: 10.1109/jiot.2018.2803201
18. Koriem SM, Bayoumi MA. Detecting and measuring holes in Wireless Sensor Network. Journal of King Saud University—Computer and Information Sciences 2020; 32(8): 909–916. doi: 10.1016/j.jksuci.2018.08.001
19. Qiu C, Shen H, Chen K. An energy-efficient and distributed cooperation mechanism for k-coverage hole detection and healing in WSNs. In: Proceedings of 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems; 19–22 October 2015; Dallas, TX, USA.
20. Verma M, Sharma S. A greedy approach for coverage hole detection and restoration in wireless sensor networks. Wireless Personal Communications 2018; 101(4): 75–86. doi: 10.1007/s11277-018-5668-7
21. Khedr AM, Osamy W, Salim A. Distributed coverage hole detection and recovery scheme for heterogeneous wireless sensor networks. Computer Communications 2018; 124: 61–75. doi: 10.1016/j.comcom.2018.04.002
22. Pant Di, Verma S, Dhuliya P. A study on disaster detection and management using WSN in himalayan region of uttarakhand. In: Proceedings of 2017 3rd International Conference on Advances in Computing, Communication and Automation (Fall); 15–16 September 2017; Dehradun, India.
23. Isravel DP, Arulkumar D, Angelin AC. Cyber security threats and risk mitigation measures in internet of things. International Journal of Civil Engineering and Technology 2018; 9(10): 1619–1628.
24. Robert William J, Anitha Christy Angelin P. Investigations on graph-based boundary detection for hole estimation in wireless sensor networks. In: Proceedings of 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA); 29–31 March 2018.
25. Angelin ACP, Isravel DP, Arulkumar D. Throughput intensification for IoT based subversive drainage monitoring applications in wireless sensor networks. International Journal of Civil Engineering and Technology 2018; 9(11): 2186–2196.
26. Sareen S, Gupta SK, Sood SK. An intelligent and secure system for predicting and preventing Zika virus outbreak using Fog computing. Enterprise Information Systems 2017; 11(9): 1436–1456. doi: 10.1080/17517575.2016.1277558
27. Yu W, Liang F, He X, et al. A survey on the edge computing for the Internet of Things. IEEE Access 2017; 6: 6900–6919. doi: 10.1109/ACCESS.2017.2778504
28. Soundarya A, Santhi V. An efficient algorithm for coverage hole detection and healing in wireless sensor networks. In: Proceedings of 2017 1st International Conference on Electronics, Materials Engineering and Nano-Technology (IEMENTech); 28–29 April 2017; Kolkata, India.
29. Amgoth T, Jana PK. Coverage hole detection and restoration algorithm for wireless sensor networks. Peer-to-Peer Networking and Applications 2017; 10(1): 66–78. doi: 10.1007/s12083-015-0407-2
30. Khalifa B, Al Aghbari Z, Khedr AM, Abawajy JH. Coverage hole repair in WSNs using cascaded neighbor intervention. IEEE Sensors Journal 2017; 17(21): 7209–7216. doi: 10.1109/JSEN.2017.2755122
31. Abdellatief W, Abdelkader H, Hadhoud M. An energy-efficient coverage hole detection technique for randomly deployed wireless sensor networks. In: Proceedings of 2016 11th International Conference on Computer Engineering and Systems (ICCES); 20–21 December 2016; Cairo, Egypt.
DOI: https://doi.org/10.32629/jai.v7i1.845
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Anitha Christy Angelin, Salaja Silas
License URL: https://creativecommons.org/licenses/by-nc/4.0/