AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1.6 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

LSTM Network-Based Adaptation Approach for Dynamic Integration in Intelligent End-Edge-Cloud Systems

Graduate School, Angeles University Foundation, Angeles City 2009, Philippines, and also with Shandong Provincial University Laboratory for Protected Horticulture, Weifang University of Science and Technology, Weifang 262700, China
Graduate School, Angeles University Foundation, Angeles City 2009, Philippines
Show Author Information

Abstract

Edge computing, which migrates compute-intensive tasks to run on the storage resources of edge devices, efficiently reduces data transmission loss and protects data privacy. However, due to limited computing resources and storage capacity, edge devices fail to support real-time streaming data query and processing. To address this challenge, first, we propose a Long Short-Term Memory (LSTM) network-based adaptive approach in the intelligent end-edge-cloud system. Specifically, we maximize the Quality of Experience (QoE) of users by automatically adapting their resource requirements to the storage capacity of edge devices through an event mechanism. Second, to reduce the uncertainty and non-complete adaption of the edge device towards the user’s requirements, we use the LSTM network to analyze the storage capacity of the edge device in real time. Finally, the storage features of the edge devices are aggregated to the cloud to re-evaluate the comprehensive capability of the edge devices and ensure the fast response of the user devices during the dynamic adaptation matching process. A series of experimental results show that the proposed approach has superior performance compared with traditional centralized and matrix decomposition based approaches.

References

[1]

Z. Zhou, X. Chen, E. Li, L. Zeng, K. Luo, and J. Zhang, Edge intelligence: Paving the last mile of artificial intelligence with edge computing, Proc. IEEE, vol. 107, no. 8, pp. 1738–1762, 2019.

[2]

J. Chen and X. Ran, Deep learning with edge computing: A review, Proc. IEEE, vol. 107, no. 8, pp. 1655–1674, 2019.

[3]

S. Deng, H. Zhao, W. Fang, J. Yin, S. Dustdar, and A. Y. Zomaya, Edge intelligence: The confluence of edge computing and artificial intelligence, IEEE Internet Things J., vol. 7, no. 8, pp. 7457–7469, 2020.

[4]
L. Kong, G. Li, W. Rafique, S. Shen, Q. He, M. R. Khosravi, R. Wang, and L. Qi, Time-aware missing healthcare data prediction based on ARIMA model, IEEE/ACM Trans. Comput. Biol. Bioinf.
[5]

P. K. Ghosh, A. Chakraborty, M. Hasan, K. Rashid, and A. H. Siddique, Blockchain application in healthcare systems: A review, Systems, vol. 11, no. 1, p. 38, 2023.

[6]

J. K. Rajah, W. Chernicoff, C. J. Hutchison, P. Gonçalves, and B. Kopainsky, Enabling mobility: A simulation model of the health care system for major lower-limb amputees to assess the impact of digital prosthetics services, Systems, vol. 11, no. 1, p. 22, 2023.

[7]

Y. LeCun, Y. Bengio, and G. Hinton, Deep learning, Nature, vol. 521, no. 7553, pp. 436–444, 2015.

[8]
X. Zhou, Y. Li, and W. Liang, CNN-RNN based intelligent recommendation for online medical pre-diagnosis support, IEEE/ACM Trans. Comput. Biol. Bioinf., vol. 18, no. 3, pp. 912–921, 2021.
[9]

T. Li, X. Wang, Y. Yu, G. Yu, and X. Tong, Exploring the dynamic characteristics of public risk perception and emotional expression during the COVID-19 pandemic on Sina Weibo, Systems, vol. 11, no. 1, p. 45, 2023.

[10]

F. Wang, G. Li, Y. Wang, W. Rafique, M. R. Khosravi, G. Liu, Y. Liu, and L. Qi, Privacy-aware traffic flow prediction based on multi-party sensor data with zero trust in smart city, ACM Trans. Internet Technol., vol. 23, no. 3, p. 44, 2023.

[11]
D. Xu, T. Li, Y. Li, X. Su, S. Tarkoma, T. Jiang, J. Crowcroft, and P. Hui, Edge intelligence: Architectures, challenges, and applications, arXiv preprint arXiv: 2003.12172, 2020.
[12]
L. Kong, L. Wang, W. Gong, C. Yan, Y. Duan, and L. Qi, LSH-aware multitype health data prediction with privacy preservation in edge environment, World Wide Web, vol. 25, no. 5, pp. 1793–1808, 2022.
[13]

J. P. Vaara, T. Vasankari, H. J. Koski, and H. Kyröläinen, Awareness and knowledge of physical activity recommendations in young adult men, Front. Public Health, vol. 7, p. 310, 2019.

[14]
C. Janiesch, P. Zschech, and K. Heinrich, Machine learning and deep learning, Electronic Markets, vol. 31, no. 3, pp. 685–695, 2021.
[15]

Y. Yu, X. Si, C. Hu, and J. Zhang, A review of recurrent neural networks: LSTM cells and network architectures, Neural Comput., vol. 31, no. 7, pp. 1235–1270, 2019.

[16]

E. K. Lua, X. Zhou, J. Crowcroft, and P. Van Mieghem, Scalable multicasting with network-aware geometric overlay, Comput. Commun., vol. 31, no. 3, pp. 464–488, 2008.

[17]

Y. Han, C. Liu, S. Su, M. Zhu, Z. Zhang, and S. Zhang, A proactive service model facilitating stream data fusion and correlation, Int. J. Web Ser. Res., vol. 14, no. 3, pp. 1–16, 2017.

[18]

Y. Xu, Z. Feng, X. Zhou, M. Xing, H. Wu, X. Xue, S. Chen, C. Wang, and L. Qi, Attention-based neural networks for trust evaluation in online social networks, Inf. Sci., vol. 630, pp. 507–522, 2023.

[19]

Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, A survey on mobile edge computing: The communication perspective, IEEE Commun. Surv. Tutorials, vol. 19, no. 4, pp. 2322–2358, 2017.

[20]
M. Zhang, J. Cao, Y. Sahni, Q. Chen, S. Jiang, and T. Wu, EaaS: A service-oriented edge computing framework towards distributed intelligence, in Proc. 2022 IEEE Int. Conf. Service-Oriented System Engineering, Newark, CA, USA, 2022, pp. 165–175.
[21]
X. Xu, S. Huang, L. Feagan, Y. Chen, Y. Qiu, and Y. Wang, EAaaS: Edge analytics as a service, in Proc. 2017 IEEE Int. Conf. Web Services, Honolulu, HI, USA, 2017, pp. 349–356.
[22]
Y. Xu, Z. Feng, X. Xue, S. Chen, H. Wu, X. Zhou, M. Xing, and H. Chen, MemTrust: Find deep trust in your mind, in Proc. 2021 IEEE Int. Conf. Web Services, Chicago, IL, USA, 2021, pp. 598–607.
[23]

M. D. de Assunção, A. da Silva Veith, and R. Buyya, Distributed data stream processing and edge computing: A survey on resource elasticity and future directions, J. Netw. Comput. Appl., vol. 103, pp. 1–17, 2018.

[24]

Q. Zhang, X. Zhang, H. Hu, C. Li, Y. Lin, and R. Ma, Sports match prediction model for training and exercise using attention-based LSTM network, Digital Commun. Netw., vol. 8, no. 4, pp. 508–515, 2022.

[25]

D. Deng, X. Li, V. Menon, J. Piran, H. Chen, and M. A. Jan, Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks, Digital Commun. Netw., vol. 8, no. 4, pp. 415–421, 2022.

[26]

S. Davy, J. Famaey, J. Serrat, J. L. Gorricho, A. Miron, M. Dramitinos, P. M. Neves, S. Latre, and E. Goshen, Challenges to support edge-as-a-service, IEEE Commun. Mag., vol. 52, no. 1, pp. 132–139, 2014.

[27]

M. K. Hussein, M. H. Mousa, and M. A. Alqarni, A placement architecture for a container as a service (CaaS) in a cloud environment, J. Cloud Comput., vol. 8, p. 7, 2019.

[28]
E. G. Renart, J. Diaz-Montes, and M. Parashar, Data-driven stream processing at the edge, in Proc. IEEE 1 st Int. Conf. Fog and Edge Computing, Madrid, Spain, 2017, pp. 31–40.
[29]

X. Wang, L. T. Yang, X. Xie, J. Jin, and M. J. Deen, A cloud-edge computing framework for cyber-physical-social services, IEEE Commun. Mag., vol. 55, no. 11, pp. 80–85, 2017.

[30]

X. Wang, L. T. Yang, J. Feng, X. Chen, and M. J. Deen, A tensor-based big service framework for enhanced living environments, IEEE Cloud Comput., vol. 3, no. 6, pp. 36–43, 2016.

[31]

Y. Xu, L. Qi, W. Dou, and J. Yu, Privacy-preserving and scalable service recommendation based on SimHash in a distributed cloud environment, Complexity, vol. 2017, p. 3437854, 2017.

[32]

H. Cai, V. W. Zheng, and K. C. C. Chang, A comprehensive survey of graph embedding: Problems, techniques, and applications, IEEE Trans. Knowl. Data Eng., vol. 30, no. 9, pp. 1616–1637, 2018.

[33]

A. Sherstinsky, Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network, Phys. D: Nonlinear Phenom., vol. 404, p. 132306, 2020.

[34]

F. Tacchino, P. Barkoutsos, C. Macchiavello, I. Tavernelli, D. Gerace, and D. Bajoni, Quantum implementation of an artificial feed-forward neural network, Quantum Sci. Technol., vol. 5, no. 4, p. 044010, 2020.

[35]
C. Luo, J. Zhan, X. Xue, L. Wang, R. Ren, and Q. Yang, Cosine normalization: Using cosine similarity instead of dot product in neural networks, in Proc. 27 th Int. Conf. Artificial Neural Networks, Rhodes, Greece, 2018, pp. 382–391.
[36]

A. O. Almagrabi and A. Bashir, A classification-based privacy-preserving decision-making for secure data sharing in internet of things assisted applications, Digital Commun. Netw., vol. 8, no. 4, pp. 436–445, 2022.

[37]

C. Wang, X. Wu, G. Liu, T. Deng, K. Peng, and S. Wan, Safeguarding cross-silo federated learning with local differential privacy, Digital Commun. Netw., vol. 8, no. 4, pp. 446–454, 2022.

[38]

Y. Zheng, Z. Li, X. Xu, and Q. Zhao, Dynamic defenses in cyber security: Techniques, methods and challenges, Digital Commun. Netw., vol. 8, no. 4, pp. 422–435, 2022.

[39]
S. Pesme and N. Flammarion, Online robust regression via SGD on the ℓ1 loss, in Proc. 34 th Int. Conf. Neural Information Processing Systems, Vancouver, Canada, 2020, p. 214.
[40]

X. Luo, W. Qin, A. Dong, K. Sedraoui, and M. Zhou, Efficient and high-quality recommendations via momentum-incorporated parallel stochastic gradient descent-based learning, IEEE/CAA J. Autom. Sin., vol. 8, no. 2, pp. 402–411, 2021.

[41]

L. Qi, W. Lin, X. Zhang, W. Dou, X. Xu, and J. Chen, A correlation graph based approach for personalized and compatible web APIs recommendation in mobile APP development, IEEE Trans. Knowl. Data Eng., vol. 35, no. 6, pp. 5444–5457, 2023.

[42]
J. Tang, H. Gao, H. Liu, and A. Das Sarma, eTrust: Understanding trust evolution in an online world, in Proc. 18 th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Beijing, China, 2012, pp. 253–261.
[43]

S. Lipošek, J. Planinšec, B. Leskošek, and A. Pajtler, Physical activity of university students and its relation to physical fitness and academic success, Ann. Kinesiologiae, vol. 9, no. 2, pp. 89–104, 2019.

[44]

S. Lai, K. Liu, S. He, and J. Zhao, How to generate a good word embedding, IEEE Intell. Syst., vol. 31, no. 6, pp. 5–14, 2016.

[45]

F. Wang, H. Zhu, G. Srivastava, S. Li, M. R. Khosravi, and L. Qi, Robust collaborative filtering recommendation with user-item-trust records, IEEE Trans. Comput. Soc. Syst., vol. 9, no. 4, pp. 986–996, 2022.

[46]
Y. Yang, X. Yang, M. Heidari, M. A. Khan, G. Srivastava, M. R. Khosravi, and L. Qi, ASTREAM: Data-stream-driven scalable anomaly detection with accuracy guarantee in IIoT environment, IEEE Trans. Netw. Sci. Eng., vol. 10, no. 5, pp. 3007–3016, 2023.
[47]

L. Qi, Y. Yang, X. Zhou, W. Rafique, and J. Ma, Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0, IEEE Trans. Ind. Inf., vol. 18, no. 9, pp. 6503–6511, 2022.

Tsinghua Science and Technology
Pages 1219-1231
Cite this article:
Yang X, Esquivel JA. LSTM Network-Based Adaptation Approach for Dynamic Integration in Intelligent End-Edge-Cloud Systems. Tsinghua Science and Technology, 2024, 29(4): 1219-1231. https://doi.org/10.26599/TST.2023.9010086

572

Views

144

Downloads

4

Crossref

1

Web of Science

1

Scopus

0

CSCD

Altmetrics

Received: 22 June 2023
Revised: 26 July 2023
Accepted: 10 August 2023
Published: 09 February 2024
© The Author(s) 2024.

The articles published in this open access journal are distributed under the terms of theCreative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return