Home Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0
Article Open Access

Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0

  • Xinxin Liu EMAIL logo , Baojing Liu , Chenye Han and Wei Li
Published/Copyright: July 25, 2022
Become an author with De Gruyter Brill

Abstract

Internet of thing (IoT) building sensors can capture several types of building operations, performances, and conditions and send them to a central dashboard to analyze data to support decision-making. Traditionally, laptops and cell phones are the majority of Internet-connected devices. IoT tracking allows customers to close the distance between devices and enterprises by collecting and analyzing various IoT data through connected devices, customers, and applications on the network. There is a lack of requirements for IoT edge applications security and approval. There are no best practices regarding operations focused on IoT incidents. IoT elements are not covered by audit and logging requirements. In this article, a big data analytics-based customer operation (BDA-CO) system analyzes the operation. With the exponential rise in data usage, the explosive development in the IoT devices reflects the ideal overlap of big data growth with IoT. Big data analytics continuously evolving network raises trivial questions about the performance, distribution of data, analysis, and protection of data collection. IoT modifies almost all the construction industry characteristics. Human-centered artificial intelligence is described as systems that always improve because of human input while also delivering an effective experience between the human and the robotic. The IoT is the key factor that ensures greater building performance. It was the first evolution of technology in a long time to turn genuine inventions into an industry that depended heavily on paper and manual processes. The benefits of the IoT in construction are now quite obviously much heavier than those of current manual processes. As a result, more construction companies explore and incorporate IoT strategies to address their productivity challenges, increasing efficiencies and profits. The simulation analysis shows that the proposed BDA-CO model enhances the trust score of 98.5%, accuracy detection ratio of 93.4%, probability ratio of 97.6%, and security ratio of 98.7% and reduces the false negative ratio of 21.3%, response time of 10.5%, delay rate of 19.9%, and packet loss ratio of 15.4% when compared to other existing techniques.

1 Overview of the building management based on IoT and big data analytics

Cities are becoming more and more of a pivotal point for our societies and economies, predominantly due to ongoing urbanization and progressively knowledge-intensive economies and their increasing share of emissions and resource consumption [1]. In addition, the construction industry influences the living and working quality of all citizens. The building must thus include methods for minimizing its energy consumption and improving occupant comfort and productivity (including by integrating the energy sources for their energy sustainability) [2]. The number of Internet-linked devices and objects has recently surpassed the number of persons on Earth, designing the dawn of a modern era of the Internet of things (IoT). IoT is the fundamental enabler for smart settings that allow the interaction among intelligent objects and the successful integration into the digital world of actual information and knowledge [3]. Smart objects, instrumented with interaction and sensing abilities and identifying technologies, give a far more detailed way to gain information about the actual world than ever before that real-world entities, and other agents in intelligent ecosystems may be influenced in real time [4]. IoT devices have been rolling out mostly in industrial and business scenarios. Their potential for smart applications, which meet the demands of individual inhabitants, customer communities, or the wider community, is restricted and unclear to many individuals [5]. Releasing IoT’s full potential demands shifting beyond company-centric systems to a user-inclusive IoT system that encouraged IoT devices and contributed data flows from individuals [6]. This will enable us to open a range of new user-centered IoT data and initiate a unique production of high-value services for the public. In this view, the IoT paradigm’s fundamental strength lies in its substantial influence on various elements of potential consumers’ daily lives and behavior [7,8].

An accurate simulation model must be provided in a thorough description of the structure and its subsystems, yet it incorporates all those parts, which need the most effort [9]. IoT and big data are developing technologies that can be used to generate knowledge and support energy-efficient building applications. Building energy management relies heavily on accurate forecasts of heating and cooling needs. Correlation analysis is used to establish the input variables for the hybrid machine learning-based predictive model. The daily weather profile’s recurring patterns can be found using clustering analysis. As a result, the annual profile can be divided into various feature categories. In human-centered artificial intelligence (AI) for each group of weather profiles, IoT sensor data, building operation schedules, and heating/cooling demand are utilized for training the sub-artficial neural network predictive models.

The major contribution of this article is as follows:

  • Designing the big data analytics-based customer operation (BDA-CO) system for smart building management.

  • The scale of IoT applications is promoted, and the goal of IoT customer operations big data is realized.

  • The simulation analysis has been performed, and the recommended model increases the security rate, trust score, accurate detection ratio, and probability ratio and reduces the packet loss, delay, response time, and false negative ratio (FNR) compared to other popular models.

  • In the context of human-centered AI, algorithms must be created to understand that they are part of a bigger system that includes human beings.

The remainder of this study is structured as follows: Sections 1 and 2 deliberated the overview and related works on the smart building management system. In Section 3, the BDA-CO model has been recommended. In Section 4, numerical results have been executed. Finally, Section 5 concludes the research article.

2 Related works

Mohammed et al. [10] introduced the supervisory control and data acquisition (SCADA) system to optimize energy consumption and thermal comfort for intelligent building management systems. The key characteristic of the real-time model is to anticipate the inside building environment to regulate the interior heating system, ventilation, and air conditioning and use the maximum power consumption under the optimized air temperature value.

Harasymiuk et al. [11,12] suggested the terrestrial laser scanning (TLS) method for building management systems. 3D TLS is an advanced measuring technology that enables a great deal of data to be obtained in little time.

Yang et al. [13] proposed the IoT-oriented intelligent building management system (IoT-IBMS). The measurement of IoT characteristics to assess and determine management systems for intelligent building is integrated into an IoT-oriented decision-making model employing the multiple-criteria decision making procedure and incorporating the zero-one objectives in an optimal portfolio process an activity-based evaluation of costs and limitation resources. The fundamental involvement of this work is to develop novel decision models incorporating resource and costing requirements based on activities in IBM’s optimal selection of the portfolio [14].

Ramelan et al. [15] initialized the long range (LoRA) modulation and message queuing telemetry transport (MQTT) (LoRA-MQTT) protocol for Building Energy Monitoring and Controlling System. A series of sensors with a power source attached to the model through a microcontroller with LoRA communication interfaces are then termed nodes to deliver electrical power to energy monitoring systems.

In the study by Reddy [16], data scientists carried out the task by creating heuristic algorithms and models that will be useful in the future. Data science can be a lucrative professional path because of the combination of technology and concepts.

In this article, the BDA-CO model has been suggested to overcome the existing issues. Section 3 discusses the proposed BDA-CO model briefly.

3 Big data analytics-based customer operation

This article examined the efficacy of a trust calculation model for context-based assessment systems for the intelligent building projects, allowing the customer to trust the service provider in an IoT environment. The customer may select the best service provider based on the estimated trust score for every requested service. It is neither enough to send out the newest observation nor enough to communicate the web log-likelihood relationship for optimal detection with restricted communication. Nevertheless, the latter is not sufficiently near-optimal and global Hidden Markov model (HMM) avoids its high demands for communication. The proposed architecture uses sensors that execute an HMM algorithm independently to provide local estimations of the probability ratio of user status (presence or absence). According to a suggested new communication method, the individual sensors’ interaction is based on local confidence in their benefit and updates their estimates according to collaborative fusion functions.

Figure 1 shows the user data collection. The efficacy and application of such a system are strongly linked to the quality and interaction of its building pieces and different approaches to IoT design. This image discusses our practical experience with our IoT developers to introduce their unique ideas of a scalable and flexible IoT architecture. The graphic showing the architectural elements of an IoT system and how the information is being collected, stored, or processed reflects our approach to the IoT architecture.

Figure 1 
               User data collection.
Figure 1

User data collection.

Figure 2 shows how a user from here on interacts with this infrastructure. To define regulations about collecting and administering the information in the building, the BDA-OC building administrator uses the intelligent building management system (stage (1) in Figure 2). Based on these principles, the many sensors within the building are operated, and data are taken and stored from them, some of which may be associated with their residents (stage (2)) and captured to save data. The IoT Resource Registers (stage (4)) provide public access to these policies. IoT accessibility IoTA detects existing resource-related registrations. It receives machine-readable privacy policies that define resource practices near the user site in the building with their smartphone IoTA installed in it (stage (5)). The IoTA shows the user summaries of the relevant aspects of these rules (stage 6) by concentrating on a policy that respects the user’s privacy choices. The BDA-OC data protection model is used and learned over time. This can include gathering information and applying information-informing techniques (step (7)). If the policy identifies settings, IoTA can utilize knowledge about preferences of BDA-OC privacy to assist user-controlled configuration of these settings (step (8)). If there are further user location requests for service (phase (9)), the application will be handled according to BDA-desired OC’s settings for opting out of sharing locations; stage (10). Users built a machine-readable political language to record and transmit building policies of green building to the population to accomplish this interaction. The policy language transmits user preferences and settings to the intelligent building system using IoTA. In the interaction mentioned earlier, several parts might make a difference using language to market the building regulations (stage (4)) match them to user preferences (stage (5)).

Figure 2 
               Building-based user interaction.
Figure 2

Building-based user interaction.

The local individual nodes are based on an HMM, their best belief about the occupation. Then when required, data between sensors are transmitted. Figure 2 presents the overall architectural system for the suggested occupancy-based control technique.

The human presence as a Markovian on–off process in our prior study of the mixturistic fusion with two alternative user statements p s = 0 denotes the user absence, while p s = 1 reflects the user’s condition. The system (hidden) is unfamiliar with alternative user states through a different set of stochastic processes producing the presence detection system sequence. The resultant system is a HMM, which requires the following parameters to be specified.

Matrix of state transition likelihood: B = { B j i } , B j i = Q p s = i p s 1 = 1 . The probabilities of transition describe how space’s occupancy varies over time. Simply two transitional probabilities Q [ p s = 1 p s 1 = 0 ] and Q [ p s = 0 p s 1 = 1 ] have to be specified since it takes two alternative states to be considered.

Probability matrix for emission: A = { b j ( i ) } b j ( i ) = Q [ O S = j O S = i ] . The symbols O S seen are sensor readings that monitor the concealed states, and ultrasonic or passive infrared sensor sensor components provide measurements. Sensor measurements are often continually assessed variables such as the distance of a time of flight. However, the proposed BDA-OC transfers each continuous observation to a binary value for the simplification of the computation, namely, O S { 0 , 1 } . The probability matrix is therefore specified as follows:

(1) A = C 0 ( 0 ) C 0 ( 1 ) C 1 ( 0 ) C 1 ( 1 ) .

As shown in equation (1), emission probability has been calculated. The initial vector of probability status is expressed as π = π j . The starting state distribution specifies the occupancy probability for the initial s = 0 time before observation. The model’s hidden state and the input data’s observations are related, which is reflected in the emission probabilities that the model returns. A given set of hidden variables calculates the likelihood of seeing a certain variable at that value. Because of human-centered AI, which focuses on understanding human emotion, language, and human behavior, the potential of web applications is greatly increased.

The labeled observations and statements have been employed in a training stage to determine the HMM model parameters. In a given ρ = { B , A , π } , the probability for a partial sequence of observation till times s and state t as s, the forward-backward procedure calculates inductively for that model σ s ( i ) = Q [ p s = i , O 1 : S [ ρ ] ] :

(2) σ s ( i ) = a i ( O s ) j b ji σ s 1 ( j ) .

As deliberated in equation (2), a partial probability observation sequence has been computed. The presence of the detection system enables each unique independent sensor to determine its optimal user status dynamically, whether present or absent in our example. The node predicts the likelihood of the user status given earlier user behavior knowledge. A single test node j estimates, in particular,

(3) Q [ ( p s = i | O 1 : S ( j ) ) ] = Q [ p s = i , O 1 : S ( j ) ] Q [ O 1 : S ( j ) ] .

As obtained in equation (3), two-state user behavior has been analyzed. Where j { 0 , 1 } two potential user states, the probability ratio p s is defined as the probability ratio in our prior work. Information gleaned from user behavior analytics tells us how people use the site. In examining them, one can learn more about how many people are visiting the site, which pages brought them there in the first place, and which pages they interact with. To extend the boundaries of online applications, developing machine intelligence with the primary purpose of understanding human behavior, emotion, and language is essential in human-centered AI.

(4) p s = Q [ p s = 1 , O 1 : s ] Q [ p s = 0 , O 1 : s ] .

As found in equation (4), the probability ratio has been obtained. This offers the absolute probability a lot more intuitive to deal with, making the priors a good element. When conducting a random experiment and looking at the probability ratio, one may determine how likely an event will occur. Enumeration or counting of the sample space becomes tiresome with infinite possible outcomes. Personalized customer experiences, web application automation, and web 4.0 goals can be achieved by utilizing human-centered AI better to understand end users’ deeper requirements and aspirations. In the probability ratio P s ( j ) of a test, the node is a statistic that indicates the degree of user belief in the particular sensor. Replacement (2) in (4) provides a straightforward technique to determine P s ( j ) as inductively,

(5) P s ( j ) = a 1 ( O s ) a 11 P s 1 ( j ) + b 01 a 0 ( O s ) a 10 P s 1 ( j ) + b 00 .

As initialized in equation (5), user inductively has been described. According to the following decision rule, user status can eventually be assessed/determined by every node. The paradigm, also known as inductive navigation, offers how to simplify software applications by dividing functions into screens or pages that are simple to explain and grasp. In addition to this, it aids in a more successful product development process that is more robust and scalable. There are many advancements in human-centered AI for web 4.0, and this special issue is designed to highlight these developments.

(6) P s = 1 , if log p s ( j ) > φ , 0 , if log p s ( j ) φ .

As calculated in equation (6), the decision rule has been discussed, where φ is a specified threshold for presence/absence. Normally, values of p s ( j ) span multiple magnitude orders. This enables us to set the threshold better using a logarithmic form to balance false positives and negatives. The researcher utilizes a decision rule to decide whether to accept or reject the null hypothesis. On the other hand, disruptive technologies are critical to successfully implementing web 4.0 in practice. This is where human-centered AI can make a difference for web 4.0.

In our opinion, a multisensory system where each sensor provides a status observation at each unit S, namely, observation O s ( j ) , which reflects the ith sensor observation at the time S. In our prior work, integrating many observations minimizes sensor uncertainty and boosts system efficiency on a wireless sensor network (WSN). The mathematical language communicate a test node j

(7) if log p s ( j ) > α trust local decision, if log p s ( j ) > α Data transmission .

As introduced, the threshold function in equation (7). The choice of α threshold defines the traffic load. No suitable fusion function E has been previously examined for restricted communication, to the best of our knowledge. The mathematical formulation of merging many sensor observations in an HMM framework is provided.

(8) p s ( j ) = Q [ p s = 1 O 1 : s ( 1 ) , , O 1 : s ( n ) ] Q [ p s = 0 O 1 : s ( 1 ) , , O 1 : s ( n ) ] .

As deliberated in equation (8), HMM multiple sensor observation has been performed, where the common probability ratio is P ( j ) and where n is the node number. The Bayes rule is applicable

(9) p s ( j ) = Q [ O 1 : s ( 1 ) , , O 1 : s ( n ) p s = 1 ] Q [ p s = 1 ] Q [ O 1 : s ( 1 ) , , O 1 : s ( n ) p s = 0 ] Q [ p s = 0 ] .

As shown in equation (9), Bayes rule has been discussed and conditional independence calculated in equation (10)

(10) p s ( j ) = p s ( 1 ) p s ( n ) D n 1 .

As obtained in equation (10), conditional independence has been calculated. This is a multiplication of the n individual probability ratio correction of n 1 times for the n-time usage of the preceding probability ratio d. This is an intuitive fusion formula. However, this formula requires conditional measurement independence Q [ p s ( 1 ) p s ( n ) p s ] = Q [ O s ( 1 ) p s , , O s ( n ) p s ] , which is unfortunately not a true assumption. It is acceptable in many instances that observational mistakes are conditionally independent to be assumed or approximated. Nevertheless, equation (10) demands the independence of prior data, say s 1 provides information about p s 1 ( 1 ) ; therefore, the likelihood of p s 1 ( 2 ) is influenced. The proposed still examine such a fusion E form, albeit technically not optimization extend the class beyond the intuitive one mentioned earlier.

(11) p s ( j ) = E ( p s ( 1 ) , p s ( 2 ) p s ( n ) ) .

As initialized in equation (11), the correction term has been computed. The number of time a person enters a room is equal to the number of times the person departs the room since the transitions between states is balanced, the ratio of the previous chances may be stated as follows:

(12) Q [ P s = 0 ] b 01 = b 10 Q [ P s = 1 ] D = b 01 b 10 .

As expressed in equation (12), prior probability has been evaluated to increase the trust score. This word can be seen as a correction term that prohibits duplicate counting of the priors by the function. Measurement merger formula: Experimentally, a simple averaging function had been an efficient functional fusion technology:

(13) p s ( j ) = avg ( p s ( 1 ) , p s ( 2 ) p s ( n ) ) .

As demonstrated in equation (13), average fusion has been formulated. The decision rule is the same as described.

Figure 3 illustrates building management. The most common way to address environmental issues is that intelligent construction designs are inherent solutions. They include optimum use of time, space and other resources available, increased usefulness, and the efficient use of materials and technology. Superior and exemplary use of the smart and automated IoT-based technologies are smart buildings. It comprises several structures (sensors, data sink nodes, server nodes, etc.) that automatically regulate different activities, including smart managing resources, conditioning systems, illuminating and fire sensing, security, and privacy. There is a hidden problem with their stability with the various environmental challenges. Some servers perform different procedures on these data sink nodes’ requests. Several disruptive technologies will be critical to successfully developing and deploying web 4.0 in practice. Human-centered AI can make a difference for web 4.0 in this specific area. Human-centered AI aims to design algorithms that learn from human inputs and collaboration.

Figure 3 
               Building management.
Figure 3

Building management.

The existing user experience of V B in connection with T i , a service provider offering T γ V j at location K y , is examined in our suggested BDA-CO model to use the intelligent building application in this context. It is F B j i represented. The suggested methodology has regarded user satisfaction (US) F B j i to have a value between 0 and 1, such that 0 is not satisfied, 0.5 is partly satisfactory, and 1, according to the current experience of interaction, is that the user is totally satisfied. Equation (14) demonstrates that σ B j i and γ B j i parameters have been adjusted based on confidence decay, incorporating F B j i experience with US. The term human-centered AI refers to AI systems that are constantly improved by the input of humans while also delivering a positive human–robot interaction. This type of human-centered AI pushes the bounds of previously limited AI solutions by producing machines that can understand human language, emotion, and behavior.

σ B j i = e ϕ Δ s × σ B j i + F B j i ,

(14) γ B j i = e ϕ Δ s × γ B j i + ( 1 F B j i ) .

As shown in equation (14) and Figure 4, US has been explored for accurate detection and less packet loss. Equation (14) explains that F B j i contributes to the successful CN experiences and that ( 1 F B j i ) offers adverse user experiences. σ B j i and γ B j i are updated with exponential decay e ϕ Δ s (old) to an old value in σ B j i (old), where ϕ is utilized as a decaying factor, a limited number produces a small decline in trust over time, and Δs is utilized for updating trust. As described in the equation, V B directs the confidence S B j i c in the T i service provider supplying T γ V j service is calculated. Content consumption and system interaction are two aspects of a computer application’s overall user experience. US is frequently employed as a proxy assessment of information system performance. For a system to be considered a successful one, it must positively impact the behavior of its users. Human-centered AI aids in the development of human-centered approaches to web 4.0.

(15) S B j i c = σ B j i σ B j i + γ B j i .

Figure 4 
               User satisfaction.
Figure 4

User satisfaction.

As deliberated in equation (15), direct trust has been discussed to increase the high-security rate. First, the estimate of σ B j i and γ B j i is one because no previous data are accessible. This method consists of two circuits where the first circuit runs m times and another loop is based on F B j i value. Its run-times hence are R ( m + b ) , 1 < b 300 , and the value of which varies depending on F B j i .

Service provider similarity S I B A S metric for service providers indicates that two V B and V A users receive the same server services. This allows V A to provide trustworthy suggestions on the Sj server, which may be considered if two clients are connected to the identical server under comparable conditions. In the initial step, the two V A and V B users transmitted their list S I I D B and S I I D A of their servers. The next binary size of S I I D A S I I D B by the vector of the two lists binary U T B and U T A . Given the cosine angle of U T B and U T A , the S I B A S cosine seamlessness metric is expressed as follows:

(16) S I B A S = U T B U T A U T B U T A .

As described in equation (16), service provider similarity has been expressed. The list includes the instance in which the estimated similitude index is 0.5−1 at that time. This filtered list will be transmitted to the service provider for context evaluation in the following phase. S I B A K , the similarity index, for the position of the service provider is generated to detect the customers of the K B j i t list, which is generated in equation (16). S I B A K is computed for the service provider. This list will be evaluated for customers that interact from a comparable place to V A with the service provider. The K B j i service provider list will be exchanged one by one by C N V A with all the V A j customers (member of the K B j i t list). The calculating methodology is described in equation (4) for the index of similarity S I B A K location of the service provider:

(17) S I B A K = U K B . U K A U K B . U K A .

As discussed in equation (17), service provider location similarity has been performed. This filtered list is submitted for contextual evaluation of services obtained from a service provider similarly positioned in the subsequent step. The similarity of service providers is supplied with the similarity index to calculate the kind of service. This is calculated to further assess the received list for its sort of similarity. The nodes that used the same sort of service as CNV A are then added. CNV A will swap its list of services with all V A j customers (from list K B i K ). The cosine resemblance is utilized to calculate the S I B A T γ V similarity index as shown in equation (17).

(18) S I B A T γ V = U Q B U Q A U Q B U Q A .

As explored in equation (18), service provider service similarity has been calculated. Based on the service similarity result of the recommended node, whether the node is included in the filtered list for a suggestion. The K B j A γ V = [ V A 1 , V A 2 ] node is listed where the calculated similarity value is in the 0.5–1 range. After all, similarity has been established, and the filtered list includes all nodes whose suggestions might be considered credible and comprise all nodes that obtain the K i access to T γ V j service from the T i service provider at a location like V B .

(19) S B j i O = K B j i S I B A K B j i S I B A S B j i O .

As found in equation (19), indirect trust has been demonstrated. CNV B may now take into account the nodes specified in K B j A γ V s recommendations. Before taking any service from the supplier, any CN on the list can obtain confidence suggestions. CNV B will get suggestions from the context similar nodes, and it can choose the most suitable m-node suggestions based on the highest determined V B similitude value and is represented at K B j i . The indirect trust is calculated based on these variables, as described in equation (20).

(20) S B j i = τ S B j i c + ( 1 τ ) S B j i o .

As obtained in equation (20), total trust has been computed. K B j i is the list containing the L number of people with the greatest calculated similarity values, and S B j i c is user V A direct confidence in service provider T i at the K i service provider location T γ V j has an equation (4), calculated value. The ratio of calculated node similarity to the estimated overall similarity of all the recommended nodes is weighted according to each recommendation under consideration.

(21) D x , y ( x , y ) = d 2 d x d y D x , y ( x , y ) .

In equation (21), D x , y ( x , y ) represents trust between the database nodes and servers and d 2 states the indirect trust. Human-centered AI learns from human input and cooperation, concentrating on algorithms part of a larger, human-based system.

In Figure 5, the human-centered approach keeps humans in the loop when developing AI to monitor for bias in algorithmic choices. More objective decisions may be made by algorithms than those made by humans who are susceptible to bias, conflict of interest, or exhaustion. It has been argued that algorithmic decision-making can lead to privacy invasion, information asymmetry, opacity, and discrimination of some sort.

Figure 5 
               Human-centered AI.
Figure 5

Human-centered AI.

Figure 6 explores building-based user authentication. Big Data Analytics’ primary objective is to analyze vast amounts, including other data sources, and standard business intelligence tools cannot use in data-driven decision-making and data-driven applications. Data warehouse or business intelligence architectures are not altered by big data analytics. It adds new technologies and access ways better targeted to fulfill end users’ information needs, including business analysts and data scientists. The proposed BDA-CO model enhances the trust score, accuracy detection ratio, probability ratio, and security ratio, and reduces the FNR, response time, delay rate, and packet loss ratio.

Figure 6 
               Building-based user authentication.
Figure 6

Building-based user authentication.

4 Numerical results and discussion

4.1 Accurate detection ratio

Trust management and data security in intelligent buildings are sensitive, vital, and essential to achieving reliability and security. Intelligent buildings are one of the conspicuous and archetypal uses of IoT-based smart and automated systems. A prearranged structure comprises various resources (data sink node, server node, sensors) to automatically regulate different operations like intelligent resource management, fire detection, lighting, privacy, air conditioning, and security. The proposed BDA-CO model enhances the accurate detection ratio compared to other popular models. Figure 7 demonstrates the accurate detection ratio of the BDA-CO model.

Figure 7 
                  Accurate detection ratio.
Figure 7

Accurate detection ratio.

4.2 Probability rate

The transition likelihoods define how space changes occupancy over the period. Since this study assumes two probable states, two transition likelihoods must be stated. The first state distribution defines the occupancy likelihood at the preliminary period stage t = 0 , before any observation. The objective of the present prediction model is to permit every distinct autonomous sensor to vigorously compute, at each period unit, its good approximation of the customer state, in our case absence or presence. The node calculates the a posteriori likelihood of the customer state because of a priori knowledge of customer behavior. The number of times a consumer enters a room equals the number of times the consumer departs as transitions between states are balanced. Figure 8 validates the probability ratio of the recommended BDA-CO model.

Figure 8 
                  Probability ratio.
Figure 8

Probability ratio.

4.3 Response time ratio

The service provider’s feedback rating plays a crucial role in service computing. This feedback is delivered by the customer having direct communication with service providers, and it depends on some nonfunctional features. These features may contain response time, throughput, and accessibility of server to deliver requested services. Numerous trust management methods do not deliberate these nonfunctional features to contain settings while computing the server’s trust values. This study utilized the executed scenario’s response time the overall round trip time for request services. It is calculated as the overall period needed to request services and lastly accepts its response from service providers. Figure 9 illustrates the response time of the suggested BDA-CO method.

Figure 9 
                  Response time.
Figure 9

Response time.

4.4 Packet loss ratio

For a situation with several nodes making their noise observation, prediction can be attained if every node interchange every observation at each time unit. However, this leads to unnecessary communication loads. If sensor communication is reserved, it is an open question of what data nodes rather interchange. A pragmatic method could be to send the newest and a few current observations in each packet. However, this postures key computational and memory needs. This study quantifies the decrease in data interchange among nodes mainly as a key battery life extension. Hence, it decreases traffic load and decreases packet losses and interference because of the collision while preserving prediction performance. Figure 10 shows the packet loss ratio.

Figure 10 
                  Packet loss ratio.
Figure 10

Packet loss ratio.

4.5 Security rate

The building management system captures a digital depiction of a dynamically developing building at any point in period for goals like security and comfort based on big data analytics. This representation must contain different patterns that can disclose the presence or absence of individuals and their actions, potentially resultant in the disclosure of information that individuals may not feel comfortable revealing. Context defines meta-information about the building and the building management system that points customers to general information. This meta-information can contain a common description of data ownership and security of relevant data to the customers. The proposed BDA-CO model enhances the security rate in a smart building environment compared to other existing models (Figure 11).

Figure 11 
                  Security rate.
Figure 11

Security rate.

4.6 False negative ratio

The FNR is the overall period that the proposed that BDA-CO incorrectly assumed nonpresence standardized over the overall presence period. Therefore, utilizing a logarithmic form permits us to modify the threshold better to trade-off false negatives and false positives. The FNR can be inferred as an extent that reproduces user discomfort or annoyance. The average power usage per desk is simply an average daily energy use per luminaire. Manual control shows how users handle a lighting system. This research assumes that the first time an individual enters the room, the lights turn on, and finally when the individual departs the room, the lights will be switched off. This situation is the basis of our comparison. An ideal classifier decreases the usage of lighting systems for energy purposes (light activated if the user is present; zero false negative rate). Figure 12 shows the FNR.

Figure 12 
                  False negative ratio.
Figure 12

False negative ratio.

4.7 Trust score

The trust scores for services are computed on the user’s preceding interface and suggestions from the same users. This study offers context-based trust management solutions for intelligent building applications that can utilize customers’ undeviating proficiencies determined via a service retrieved in various environments. The malicious nodes are strained out in an unintended trust evaluation progression that their recommendation does not have any critical influence on overall trust scores. Our services assortment process is exceptional in terms of data assortment. The data utilized in the service assortment procedure depend on the contextual data of service providers, which is utilized to be dynamic in trust evaluation. Figure 13 displays the trust score ratio of the suggested BDA-CO model.

Figure 13 
            Trust score rate.
Figure 13

Trust score rate.

Table 1 signifies the delay rate of the suggested BDA-CO model. Smart monitoring systems, like automated lighting systems, in which the time delay among the response of this automated system and the activities executed can decrease any energy savings, while a speedy response can produce incompetent activities. Although these monitoring systems contribute to the energy efficiency of an infrastructure that integrates actuators with sensors to manage and change the total energy usage, they demand considerable investments in intelligent infrastructures. These networks typically limit their sustainability due to their costs and difficulties.

Table 1

Delay rate

Number of devices SCADA TLS IoT-IBMS LoRA-MQTT BDA-CO
10 67.9 68.2 65.9 63.8 58.9
20 64.2 65.4 63.3 60.2 55.3
30 60.4 64.5 66.1 68.3 53.3
40 54.5 56.7 57.2 58.4 45.3
50 50.6 53.9 52.4 55.5 41.4
60 48.8 49.8 47.6 44.6 38.4
70 42.9 43.7 45.4 42.8 33.6
80 41.8 54.5 39.6 32.7 27.7
90 34.5 35.2 36.7 38.9 21.8
100 33.2 35.3 27.8 28.2 19.9

Table 2 compares the performance of existing technology with the proposed method. Because they need significant investments in intelligent infrastructures, these monitoring systems can help improve infrastructure’s energy efficiency by integrating actuators with sensors to regulate and adjust the total energy use. In building, current manual techniques are clearly outperformed by the IoT. Human-centered AI learns from human input and cooperation, concentrating on algorithms part of a larger, human-based system. The term human-centered AI refers to AI systems that are constantly improved by the input of humans while also delivering a positive human–robot interaction.

Table 2

Comparison of performance

Number of dataset SCADA TLS IoT-IBMS BDA-CO
10 30.01 38.33 35.14 36.56
20 34.51 39.45 41.24 20.6
30 41.36 34.15 34.19 46.99
40 20.21 29.47 43.76 62.62
50 42.56 56.33 69.33 69.34
60 33.98 47.14 36.54 41.98
70 51.54 21.89 56.39 36.41
80 67.22 65.25 65.25 59.89
90 72.36 82.66 66.15 83.57

The proposed BDA-CO model enhances the trust score, accuracy detection ratio, probability ratio, and security ratio and reduces the FNR, response time, delay rate, and packet loss ratio when compared to other existing SCADA, TLS, IoT-IBMS, and LoRA-MQTT methods.

5 Conclusion

This article introduced and investigated the effectiveness of the contextual evaluation system model in determining consumer confidence in intelligent building applications in IoT service providers. The consumer may choose the best service provider for every service requested based on the assessed trust value. It is not enough to communicate the newest observation or simply provide the logic ratio to optimize detection and restricted communication. Nevertheless, this article finds that the latter is relatively near the optimal global HMM, which does not need much communication. The proposed architecture consists of sensors that automatically execute an HMM algorithm to determine the user probability ratio (presence or absence). In addition, as the volume of data generated by IoT sensors grows, so does the difficulty of managing and protecting that data. Data must be protected against unwanted access to function properly. Developing an effective cyber security strategy for a future big data platform will assure data privacy and the uncompromising behavior of its stakeholders. Human-centered AI helps scientists and industry experts to produce powerful tools, convenient web apps, well-designed web services, and products that better serve the requirements of humans. According to a suggested new communication method, the individual sensors’ communication is based on local confidence in their user state and updates their estimates according to collaborative fusion functions.

  1. Conflict of interest: The authors state no conflict of interest.

References

[1] Salhaoui M, Guerrero-González A, Arioua M, Ortiz FJ, El Oualkadi A, Torregrosa CL. Smart industrial iot monitoring and control system based on UAV and cloud computing applied to a concrete plant. Sensors. 2019;19(15):3316.10.3390/s19153316Search in Google Scholar PubMed PubMed Central

[2] Lu Y, Xu X. Cloud-based manufacturing equipment and big data analytics to enable on-demand manufacturing services. Robot Computer-Integrated Manuf. 2019;57:92–102.10.1016/j.rcim.2018.11.006Search in Google Scholar

[3] Ren S, Zhang Y, Liu Y, Sakao T, Huisingh D, Almeida CM. A comprehensive review of big data analytics throughout product lifecycle to support sustainable smart manufacturing: A framework, challenges and future research directions. J Clean Prod. 2019;210:1343–65.10.1016/j.jclepro.2018.11.025Search in Google Scholar

[4] You Z, Wu C. A framework for data-driven informatization of the construction company. Adv Eng Inform. 2019;39:269–77.10.1016/j.aei.2019.02.002Search in Google Scholar

[5] Anshari M, Almunawar MN, Lim SA, Al-Mudimigh A. Customer relationship management and big data enabled: Personalization & customization of services. Appl Comput Inform. 2019;15(2):94–101.10.1016/j.aci.2018.05.004Search in Google Scholar

[6] Zahid AH, Iliyasu AM, Ahmad M, Shaban MMU, Arshad MJ, Alhadawi HS, et al. A novel construction of dynamic S-Box with high nonlinearity using heuristic evolution. IEEE Access. 2021;9:67797–812.10.1109/ACCESS.2021.3077194Search in Google Scholar

[7] Manogaran G, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C. A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gener Computer Syst. 2018;82:375–87.10.1016/j.future.2017.10.045Search in Google Scholar

[8] Behera RK, Reddy KHK, Sinha, Roy D. Modeling and assessing reliability of service-oriented Internet of things. Int J Computers Appl. 2019;41(3):195–206.10.1080/1206212X.2017.1420589Search in Google Scholar

[9] Yang A, Li Y, Kong F, Wang G, Chen E. Security control redundancy allocation technology and security keys based on internet of things. IEEE Access. 2018;6:50187–96.10.1109/ACCESS.2018.2868951Search in Google Scholar

[10] Mohammed SA, Awad OA, Radhi AM. Optimization of energy consumption and thermal comfort for intelligent building management system using genetic algorithm. Indonesian J Electr Eng Computer Sci. 2020;20(3):1613–25.10.11591/ijeecs.v20.i3.pp1613-1625Search in Google Scholar

[11] Harasymiuk J, Pawlowicz JA, Szafranko E. The TLS method as an element of the building management system. IOP Conf Series: Mater Sci Eng. 2019 (September);603:052054.10.1088/1757-899X/603/5/052054Search in Google Scholar

[12] Yin N. A big data analysis method based on modified collaborative filtering recommendation algorithms. Open Phys. 2019;17(1):966–74.10.1515/phys-2019-0102Search in Google Scholar

[13] Yang CH, Lee KC, Li SE. A mixed activity-based costing and resource constraint optimal decision model for IoT-oriented intelligent building management system portfolios. Sustain Cities Soc. 2020;60:102142.10.1016/j.scs.2020.102142Search in Google Scholar

[14] Al-Shawakfa E, Alsghaier H. An empirical study of cloud computing and big data analytics. Int J Innovative Comput Appl. 2018;9(3):180–8.10.1504/IJICA.2018.093736Search in Google Scholar

[15] Ramelan A, Adriyanto F, Hermanu BAC, Ibrahim MH, Saputro JS, Setiawan O. IoT Based Building Energy Monitoring and Controlling System Using LoRa Modulation and MQTT Protocol. IOP Conf Series: Mater Sci Eng. 2021, March;1096(1):012069. IOP Publishing.10.1088/1757-899X/1096/1/012069Search in Google Scholar

[16] Reddy R. Research on data science, data analytics and big data. SSRN Electron J. 2020;9(5):99–105.Search in Google Scholar

Received: 2022-01-11
Revised: 2022-02-17
Accepted: 2022-06-07
Published Online: 2022-07-25

© 2022 Xinxin Liu et al., published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Articles in the same Issue

  1. Research Articles
  2. Construction of 3D model of knee joint motion based on MRI image registration
  3. Evaluation of several initialization methods on arithmetic optimization algorithm performance
  4. Application of visual elements in product paper packaging design: An example of the “squirrel” pattern
  5. Deep learning approach to text analysis for human emotion detection from big data
  6. Cognitive prediction of obstacle's movement for reinforcement learning pedestrian interacting model
  7. The application of neural network algorithm and embedded system in computer distance teach system
  8. Machine translation of English speech: Comparison of multiple algorithms
  9. Automatic control of computer application data processing system based on artificial intelligence
  10. A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing
  11. Application of mining algorithm in personalized Internet marketing strategy in massive data environment
  12. On the correction of errors in English grammar by deep learning
  13. Research on intelligent interactive music information based on visualization technology
  14. Extractive summarization of Malayalam documents using latent Dirichlet allocation: An experience
  15. Conception and realization of an IoT-enabled deep CNN decision support system for automated arrhythmia classification
  16. Masking and noise reduction processing of music signals in reverberant music
  17. Cat swarm optimization algorithm based on the information interaction of subgroup and the top-N learning strategy
  18. State feedback based on grey wolf optimizer controller for two-wheeled self-balancing robot
  19. Research on an English translation method based on an improved transformer model
  20. Short-term prediction of parking availability in an open parking lot
  21. PUC: parallel mining of high-utility itemsets with load balancing on spark
  22. Image retrieval based on weighted nearest neighbor tag prediction
  23. A comparative study of different neural networks in predicting gross domestic product
  24. A study of an intelligent algorithm combining semantic environments for the translation of complex English sentences
  25. IoT-enabled edge computing model for smart irrigation system
  26. A study on automatic correction of English grammar errors based on deep learning
  27. A novel fingerprint recognition method based on a Siamese neural network
  28. A hidden Markov optimization model for processing and recognition of English speech feature signals
  29. Crime reporting and police controlling: Mobile and web-based approach for information-sharing in Iraq
  30. Convex optimization for additive noise reduction in quantitative complex object wave retrieval using compressive off-axis digital holographic imaging
  31. CRNet: Context feature and refined network for multi-person pose estimation
  32. Improving the efficiency of intrusion detection in information systems
  33. Research on reform and breakthrough of news, film, and television media based on artificial intelligence
  34. An optimized solution to the course scheduling problem in universities under an improved genetic algorithm
  35. An adaptive RNN algorithm to detect shilling attacks for online products in hybrid recommender system
  36. Computing the inverse of cardinal direction relations between regions
  37. Human-centered artificial intelligence-based ice hockey sports classification system with web 4.0
  38. Construction of an IoT customer operation analysis system based on big data analysis and human-centered artificial intelligence for web 4.0
  39. An improved Jaya optimization algorithm with ring topology and population size reduction
  40. Review Articles
  41. A review on voice pathology: Taxonomy, diagnosis, medical procedures and detection techniques, open challenges, limitations, and recommendations for future directions
  42. An extensive review of state-of-the-art transfer learning techniques used in medical imaging: Open issues and challenges
  43. Special Issue: Explainable Artificial Intelligence and Intelligent Systems in Analysis For Complex Problems and Systems
  44. Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction
  45. Evaluating OADM network simulation and an overview based metropolitan application
  46. Radiography image analysis using cat swarm optimized deep belief networks
  47. Comparative analysis of blockchain technology to support digital transformation in ports and shipping
  48. IoT network security using autoencoder deep neural network and channel access algorithm
  49. Large-scale timetabling problems with adaptive tabu search
  50. Eurasian oystercatcher optimiser: New meta-heuristic algorithm
  51. Trip generation modeling for a selected sector in Baghdad city using the artificial neural network
  52. Trainable watershed-based model for cornea endothelial cell segmentation
  53. Hessenberg factorization and firework algorithms for optimized data hiding in digital images
  54. The application of an artificial neural network for 2D coordinate transformation
  55. A novel method to find the best path in SDN using firefly algorithm
  56. Systematic review for lung cancer detection and lung nodule classification: Taxonomy, challenges, and recommendation future works
  57. Special Issue on International Conference on Computing Communication & Informatics
  58. Edge detail enhancement algorithm for high-dynamic range images
  59. Suitability evaluation method of urban and rural spatial planning based on artificial intelligence
  60. Writing assistant scoring system for English second language learners based on machine learning
  61. Dynamic evaluation of college English writing ability based on AI technology
  62. Image denoising algorithm of social network based on multifeature fusion
  63. Automatic recognition method of installation errors of metallurgical machinery parts based on neural network
  64. An FCM clustering algorithm based on the identification of accounting statement whitewashing behavior in universities
  65. Emotional information transmission of color in image oil painting
  66. College music teaching and ideological and political education integration mode based on deep learning
  67. Behavior feature extraction method of college students’ social network in sports field based on clustering algorithm
  68. Evaluation model of multimedia-aided teaching effect of physical education course based on random forest algorithm
  69. Venture financing risk assessment and risk control algorithm for small and medium-sized enterprises in the era of big data
  70. Interactive 3D reconstruction method of fuzzy static images in social media
  71. The impact of public health emergency governance based on artificial intelligence
  72. Optimal loading method of multi type railway flatcars based on improved genetic algorithm
  73. Special Issue: Evolution of Smart Cities and Societies using Emerging Technologies
  74. Data mining applications in university information management system development
  75. Implementation of network information security monitoring system based on adaptive deep detection
  76. Face recognition algorithm based on stack denoising and self-encoding LBP
  77. Research on data mining method of network security situation awareness based on cloud computing
  78. Topology optimization of computer communication network based on improved genetic algorithm
  79. Implementation of the Spark technique in a matrix distributed computing algorithm
  80. Construction of a financial default risk prediction model based on the LightGBM algorithm
  81. Application of embedded Linux in the design of Internet of Things gateway
  82. Research on computer static software defect detection system based on big data technology
  83. Study on data mining method of network security situation perception based on cloud computing
  84. Modeling and PID control of quadrotor UAV based on machine learning
  85. Simulation design of automobile automatic clutch based on mechatronics
  86. Research on the application of search algorithm in computer communication network
  87. Special Issue: Artificial Intelligence based Techniques and Applications for Intelligent IoT Systems
  88. Personalized recommendation system based on social tags in the era of Internet of Things
  89. Supervision method of indoor construction engineering quality acceptance based on cloud computing
  90. Intelligent terminal security technology of power grid sensing layer based upon information entropy data mining
  91. Deep learning technology of Internet of Things Blockchain in distribution network faults
  92. Optimization of shared bike paths considering faulty vehicle recovery during dispatch
  93. The application of graphic language in animation visual guidance system under intelligent environment
  94. Iot-based power detection equipment management and control system
  95. Estimation and application of matrix eigenvalues based on deep neural network
  96. Brand image innovation design based on the era of 5G internet of things
  97. Special Issue: Cognitive Cyber-Physical System with Artificial Intelligence for Healthcare 4.0.
  98. Auxiliary diagnosis study of integrated electronic medical record text and CT images
  99. A hybrid particle swarm optimization with multi-objective clustering for dermatologic diseases diagnosis
  100. An efficient recurrent neural network with ensemble classifier-based weighted model for disease prediction
  101. Design of metaheuristic rough set-based feature selection and rule-based medical data classification model on MapReduce framework
Downloaded on 10.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jisys-2022-0067/html
Scroll to top button