2023
DOI: 10.3390/electronics12010217
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Adaptive Systems for Industrial Internet of Things Using Reinforcement Algorithm

Abstract: Agile product development cycles and re-configurable Industrial Internet of Things (IIoT) allow more flexible and resilient industrial production systems that can handle a broader range of challenges and improve their productivity. Reinforcement Learning (RL) was shown to be able to support industrial production systems to be flexible and resilient to respond to changes in real time. This study examines the use of RL in a wide range of adaptive cognitive systems with IIoT-edges in manufacturing processes. We p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…The authors have proposed a comprehensive combination of traditional and Quantum Neural Network/ML (QNN) techniques as part of AIML in the IOMT vulnerability assessment. Specifically, the protection of sensitive and private data at multiple levels can start from storing data in distributed cloud nodes and then fuse heterogeneous IOMT data by using ML classification algorithms such as QNN to predict which vulnerability in IOMT-based network traffic is a malicious attack [109,110]. In [111], the authors highlight types of cybersecurity attacks related to the IOT, especially those using RFID and WSN technologies, which are the basic technologies used in IOT applications.…”
Section: Artificial Intelligence and Machine Learning For Strengtheni...mentioning
confidence: 99%
“…The authors have proposed a comprehensive combination of traditional and Quantum Neural Network/ML (QNN) techniques as part of AIML in the IOMT vulnerability assessment. Specifically, the protection of sensitive and private data at multiple levels can start from storing data in distributed cloud nodes and then fuse heterogeneous IOMT data by using ML classification algorithms such as QNN to predict which vulnerability in IOMT-based network traffic is a malicious attack [109,110]. In [111], the authors highlight types of cybersecurity attacks related to the IOT, especially those using RFID and WSN technologies, which are the basic technologies used in IOT applications.…”
Section: Artificial Intelligence and Machine Learning For Strengtheni...mentioning
confidence: 99%
“…Recent years have witnessed the rapid growth of the Internet of Things (IoT), where different types of real-world elements such as wearable sensors are connected and allowed to autonomously interact with each other, promoting the development of fields such as Healthcare IoT [1], smart cities [2], industrial IoT [3], etc. Continuous-Flow Microfluidic Biochips (CFMBs) have received widespread attention due to their miniaturization and integration.…”
Section: Introductionmentioning
confidence: 99%
“…In this context, the decentralized machine learning (ML) paradigm, particularly reinforcement learning (RL), emerges as a transformative approach for addressing the challenges posed by dynamic wireless environments [8]. Unlike traditional centralized methods, decentralized ML empowers individual devices to autonomously adapt and optimize resource allocations based on real-time interactions and experiences [9]. The following sections delve into the intricacies of decentralized ML with RL, highlighting its benefits and introducing a novel decentralized RL model tailored for dynamic resource optimization in wireless networks.…”
Section: Introductionmentioning
confidence: 99%