Professional Documents
Culture Documents
Abstract—Currently, the growth of the first generation Internet possible only after departing from traditional coding application
of Things (IoT) system for low-end devices having less memory and programming interface (API) methodology to hardware inten-
infrastructure is challenged due to the lack of engineering support sive algorithmic methodology in processor building blocks. IoT
in terms of architecture, technology, hardware, privacy, security,
and business. This paper discusses system engineering issues rel- infrastructure has been in the same transition phase and it is
evant in IoT processors and builds a case for exploring rough set necessary to explore this from various perspectives beyond the
as an approximate computing technique in next generation IoT routine themes such as business skills, IT skills, technology
hardware. The proposed approach has a potential of dealing with extensions, etc.
inconsistencies arising at layers in hardware infrastructure for IoT Before digging deeper into the link that exists between the
applications with a dominance at cloud and fog processing. The
authors bring out a research direction in IoT as an engineering processor architecture and its impact on IoT infrastructure, let
discipline with an emphasis on the impact of processor hardware us briefly discuss the real-time response as a basic challenge
extension. that leads to a significant departure from API coded software
Index Terms—Approximate computing, hardware design, incon-
to hardware instruction set support. The computing hardware
sistency, inconsistent information systems (IIS), indiscernibility, in- platforms presently deployed are oriented from a numerical
formation gain, Internet of Things (IoT), IoT hardware, missing number-crunching perspective. It is in this context that arith-
attribute, processor design, rough set technique (RST), smart city metic and logic unit (ALU) is the heart of any CPU. While
project (SCP), very large scale integration (VLSI). such limitation was discovered in the past and was substantially
overcome by the digital signal processing community almost
three decades ago by way of introducing a multiplier accumula-
I. INTRODUCTION
tor (MAC) unit as a building block, it remained unnoticed by a
NTERNET of Things (IoT) architecture can be visualized as
I a model composed of four layers (application layer, service
support layer, network layer, and device layer) [1]. The network
larger section of technology developers as DSP was catering to a
very small section of end products. Unlike this, IoT has a larger
impact.
layer provides relevant control functions for networking, mobil- The type of security attacks to IoT infrastructure reported [3]
ity management, authentication, and transport capabilities. The are indicative of the fact that merely continuing with the present
service support layer caters to the needs of organized services at approach is not useful. Furthermore, Meltdown and Spectre flaw
cloud/fog/edge interfaces in an integrated manner by providing affect all modern processors from Intel, ARM, etc. [4]. The ef-
seamless hierarchical reliability, availability, safety, and security fect is also felt on fog and edge devices including smart phones
features. These capabilities give rise to inconsistent information and tablets. Operating systems such as Windows, Linux, Mac
systems (IISs) [2] at every layer and the issues arising out of OS, Android, and iOS are exposed to such vulnerabilities. This
machine-to-machine and device-to-device communication. IoT is because of a speculative execution present on almost all the
protocols are inherently light weight type (e.g., 6LoPAN) and state of the art processors that in turn predict the command
involves automatic (without human intervention) processing of or execution path using privilege kernel memory. In the con-
large volume data sets in real time. The implementation of algo- text of IoT, this will result into security directed victimization,
rithms for handling IIS using traditional electronic data process- since most of the IoT operating systems such as mbed, Riot,
ing hardware suffers from nonavailability of specific hardware Contiki are derived from Linux philosophy. The vulnerabilities
instructions as a processor architecture support. The situation is are easily extended to the IoT operating system platforms too.
identical to the era when we did not have specific instructions To overcome these problems on PC and workstations, patches
(such as MMX) at a processor level to handle multimedia re- have been released. However, this is only a transition arrange-
sources. The complete emergence of e-learning, YouTube was ment unless hardware level solution for processor architecture
is incorporated into edge devices and fog platforms.
The authors, therefore, re-explore the International Telegraph
Manuscript received February 3, 2018; revised May 25, 2018 and November Union—Telecommunication Standardization Sector (ITU-T)
9, 2018; accepted December 24, 2018. (Corresponding author: Vanita Agarwal.) approach as shown in Fig. 1 for assessing information systems
The authors are with the Department of Electronics and Telecommunication, inconsistencies at different layers from IoT hardware perspec-
College of Engineering Pune, Pune 411005, India (e-mail:,vsa.extc@coep.ac.in;
rap.extc@coep.ac.in; abpatki.extc@coep.ac.in). tive. It is, therefore, necessary to deviate from the number-
Digital Object Identifier 10.1109/JSYST.2018.2890571 crunching perspective of computing hardware and dwell into
1937-9234 © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
TABLE I
VARIOUS HARDWARE AND SOFTWARE SOLUTIONS FOR IOT REFERENCE
MODEL POSSESSING INCONSISTENCIES
Fig. 1. IoT environment establishing the need for eliminating the inconsisten-
cies at layers as hardware infrastructure.
Thus, an integrated view toward systems and humans is a present software implementation seems to be too
prerequisite for efficient human machine systems for successful slow (such as theoretical analysis) to use in IoT
smart city projects. The authors were exploring these issues applications and needs development of hardware
from academic and technology view point and it emerged that specific modules.
the IoT infrastructure was the primary concern. There is a lack 3) Scalable data analytic and event processing en-
of adequate hardware support. In this context, the developments gine are required on the cloud side as well as
on machine learning algorithms by Google and the subsequent the premise/gateways with a variety of SDKs and
progress achieved were revealed by Google [9] through their communication agents, data caching and bandwidth
proprietary tensor processing unit (TPU) hardware unit. TPU is management as a different layer and levels of the
a trend toward approximate computing. hierarchy. The sensor data should be combined to
infer an event (complex event processing—CEP)
and respond to them as quickly as possible. An
A. Challenges for the IoT Community RST for detection oriented CEP exists.
Various challenges in achieving characteristics and require- 4) Power down logic—with the new generation of IoT
ments for the IoT community are summarized in the following. things, low capacity (mAH) battery operated sen-
1) Characteristic of IoT Systems: sors are available which are resource constrained.
1) Workload is related to organization, recognition, 5) Machine intelligence quotient (MIQ) is a product
mining, search, analytic, and inference. The focus specification for IoT system. A fuzzy logic can be
is diverting from calculating numerically precise used for MIQ measurements. Standardization is a
results to correctness, which produces quite good prerequisite for successful IoT smart cities.
results to produce an acceptable user experience. 6) The new in-memory streaming technologies that
The problem with an IoT System is that today’s change the rate are required for some IoT
computers are designed to compute precise results applications.
even when it is not necessary. 7) Encryption/decryption (AES or DES)—Sensor
2) Big data in part is dirty, non-homogeneous, and in- level crypto security and/or hardware level crypto
secure. The associated computer architecture such processors should be used to prevent attack at the
as storage, information processing and analysis in edge. The scope of approximate computing us-
real time of time-series data [10], and possibility ing RSTs is an emerging potential technology be-
of missing data attributes is a matter of concern. cause of the constant use of passwords and cryp-
The problem here is that IT industry is not geared tographic keys buried in a computer’s kernel is a
up for embracing artificial intelligence (AI) through real-time probabilistic computation of Fuzzy hash-
hardware. ing that facilitates computation of lower approxi-
3) The traditional IT cloud and its ecosystem is only mation and upper approximation using elementary
60–70% similar to IoT cloud and its ecosystem. set (ES) of the kernel memory snapshot. This con-
The seemingly ready IoT cloud can be rendered text triggered piece wise hashes will be used in
almost useless due to the 30–40% difference for combination with the instruction set of rough set
all the applications. The problem here is that the processor specifically when missing attributes are
traditional IT cloud, web, or mobility applications generated [14].
cloud use much bigger devices with more resources In the context of processing the real-time streaming data,
on the cloud side [11]. Table II shows the sizes of cache, memory, etc., present in
4) Information overload due to handling of large the latest processors for processing the ever increasing trillions
databases is currently suffering from a surplus of data. For the real-time requirement, the data needs to be
amount of irrelevant data [12]. processed at fog and edge interface. There is a never ending
2) Requirement of IoT Systems: requirement of bigger cache and memory for processing tril-
1) Large scope computing implies fractal loading as lions of data. Therefore, cache and memory that are installed
against large scale computing. Fractal loading im- today will be “limited” in size after a year. By using bigger size
plies the coexistence of different but related things memory and cache day by day, IoT edge based devices will
(data formats) at different levels of scale, opposing become power hungry system. Fig. 2 shows the orthogonality
the maximization of the capacity of uniform com- (neither similarity nor overlap) at the architecture level in IoT
munication channels dedicated to a single type of hardware. To achieve the quality attributes in design, implemen-
exchange. tation, and deployment; the architecture of processors, sensors,
2) Information gain is a useful indicator to decide wireless sensor networks, and power supply systems are dif-
whether particular data must be available in the ferent. Merely scaling the existing systems will not serve the
database (for processing/computation) or can it be current day issues and/or problems arising out of the character-
partitioned out (for storage and retrieval). This con- istics and requirements of IoT systems. These two issues have
cept can be utilized to reduce the cloud process- not been addressed adequately.
ing computational load and to restore to edge/fog The high speed processing and/or multicore processing can
computing [13]. The problem therefore is that the never be a solution to seamless implementation at fog/edge
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
TABLE II
LATEST PROCESSOR SPECIFICATIONS SUCH AS CLOCK SPEED, MEMORY SIZES,
CACHE SIZES, PROCESSOR CORES, AND THERMAL DESIGN POWER
of sensor nodes and enhanced cloud utilization [18]. While these initiatives. The issue of human behavior modeling has to be
are significant contributions for heavily dominated sensor-based addressed as it is not the case of providing human interface
IoT infrastructures, the gap exists in the context of uncertain- through GUI enriched with multimedia support. The case of
ties arising out of the data flow in IoT cloud and fog systems. introducing fractal-based support therefore is illustrated in the
While the amount of energy consumed vis-a-vis traffic rate have context of which data virtualization and image processing are
been examined, the processing incompetency of the present IoT to be considered.
CPU/processor hardware still remains an unexplored area. En-
ergy efficient hardware or software and its availability in com-
mon IoT architectures has not been addressed for processor de- B. IoT Deployment for Smart City Projects
sign in the context of instruction set and support for IoT specific Data over collection for smart city projects appears to be a
programming languages. The green perspective of IoT cannot source of victimization. Li et al. propose inclusive cloud ori-
be restricted only through cosmetic approaches [19] that can ented security solutions for smart city data [22]. This may be
lead to scalability concerns. Thus, the processor level support acceptable at consumer IoT installations but not for industry
is important. It is in this context that the rough set hardware co- because the issues such as tracking location, accessing photos,
processor is used as approximate computing for dealing with and address book are not relevant in industrial environment. As
IoT data analytic using IISs. factory automation by the next generation will be real time fo-
To appreciate case studies highlighted in Section III, the re- cused, approximate computing oriented fog-based services will
searchers emphasize on creating a small footprint for computa- have dominance in industrial IoT.
tion at instruction level. The information processing community For smart cities, the concept of focusing on smart communi-
emphasizes on processor with RAM, hard disk, network infras- cation to support value added services has been projected [23].
tructure, and operating system integration to support hardware. A Web service approach is proposed for urban IoT environment
Whereas, the computational workload emphasizes on reducing using CoAP protocols. This study considers processing require-
the computational footprint irrespective of the supported RAM, ment but not cognitive fractal based computational load. Human
hard disk, and network infrastructure. behavior is not modeled to support its interface and integration
The recent trends are indicators for enriching approximate with image processing. As the road traffic moves, an image as
computing. Power efficiency is a primary concern of IoT-related data virtualization gets generated instead of image processing
applications, both at the sensor node and on its cloud-computing because of the inherent limitation in the existing image pro-
counterpart [20]. Symbolic aggregate approximation computing cessing technique deployed. ARM cortex R52 is used to exploit
provides solutions to many challenges associated with current full potential of devices with hyper visors to manage safety
data mining tasks [21]. While the above recent trends are es- and security. Cortex R52 does not support Lower approxima-
sentially algorithmic approaches in IoT analytic due to big data, tion LA and Upper approximation UA and similar instructions
hardware approach is necessary to have a substantial impact (basic concepts of RST [24]) and thus not suitable for reducing
(large population if sensor clusters are present due to wireless computational footprints.
sensor networks). The current hardware and software technologies do not make
computing image analytic possible for real-time image process-
III. CASE STUDY ing that forces human behavior modeling. Hardware architec-
tural support to compute progression of fractal dimension at
This section discusses some case studies where the RST could
periodic time intervals on data has to be deployed to eliminate
be used to further illustrate our vision of the next generation IoT
the human. To computer fractals and meeting the real-time re-
hardware. Most of these activities can be undertaken only after
quirements, computational load using procedural programming
an adequate IoT hardware support is available.
languages leads to multicore hardware platforms unless resorted
to declarative programming. It is therefore not possible to meet
A. Research Directions for IoT cognitive computational requirement of IoT deployment. Thus,
Research in IoT emphasizes on massive scaling, architec- there is a basic need to design new hardware architectures. To
ture, robustness security, and human in the loop [8], integrating facilitate fractal related computation, rough set concepts using
technological support. It leads to initiatives to lower approximation LA and upper approximations UA have to
1) extend existing technologies to adapt to IoT environments; iteratively followed.
2) model human behavior to incorporate human in the loop Smart city transportation—Fig. 4 shows the evolving plot at
control; a visualization console for a city transport network in which an
3) major initiative to deploy IoT systems success- exact position of a bus can be traced, showing its starting to
fully. end destinations with an image evolving over a period of 30–45
The first initiative leads to a transition from IT to IoT us- min. The visualization console displays real-time sensor data
ing micro controller and embedded processor however serving minimizing the human in the IoT loop. The fractal dimension
a limited purpose to create confidence in prototype develop- of the real-time transport data for different buses needs to be
ment. Unless substantiated with impact oriented major mod- compared with the fractal dimension of a permanent road struc-
ification, it cannot lead to the targeted growth in IoT sector ture, which is a prerequisite for a road transport system and is a
which themes around a qualitative change physical systems. The must for one way traffic, enhancing signal waiting time for the
smart vision has to address challenges to integrate all the three selected routes on specified hours.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
TABLE VI
COMPARISON OF HARDWARE PLATFORMS FOR EDGE COMPUTING
B. Indiscernibility
Indiscernibility is similarity, where similar objects are col-
lected in a set. The objects are classified into groups based on TABLE IX
the attributes/features. Objects belonging to the same category REDUCTS GENERATED USING ROSE SOFTWARE FOR INCONSISTENT
DATA IN TABLE VII
are considered to be indistinguishable to each other [41].
C. Approximation
In the algebraic space, RST approximates given concept(s)
using lower and upper sets of the concept(s), which are as
follows.
1) Lower approximation and positive region (LA ): The ele-
ments that doubtlessly belong to the set. TABLE X
CORE GENERATED USING ROSE SOFTWARE FOR INCONSISTENT
2) Upper approximation (UA ): The elements that possibly DATA IN TABLE VII
belong to the set.
The boundary region: Boundary region = UA –LA .
Set X is CRISP (Exact with respect to R), if the boundary
region of X is empty.
Set X is ROUGH (Inexact with respect to R), if the boundary TABLE XI
region of X is nonempty. CLASSIFICATION RESULTS USING ROSE SOFTWARE FOR INCONSISTENT
DATA IN TABLE VII
D. Accuracy of Approximation
Accuracy measure α R(X): A measure of how closely the
rough set R is approximating the target set X [37].
α R(X) = UA /LA
If α R(X) = 1, the R-borderline region of X is empty and the
set X is R-definable (i.e., X is crisp with respect to R). If α R(X)
TABLE XII
< 1, the set X has some non-empty R-borderline region and X RULES GENERATION USING ROSE SOFTWARE FOR INCONSISTENT
is R-undefinable (i.e., X is rough with respect to R). DATA IN TABLE VII
E. Rule Generation
Decision rules that are minimal and yet describe the data
accurately are obtained during this process.
REFERENCES
[1] ITU-T, Overview of the Internet of Things: Next Generation Net-
works Framework and Functional Architecture Models. Jun. 2012.
[Online]. Available: https://www.itu.int/rec/T-REC-Y.2060-201206-I, Ac-
cessed: Jul. 1, 2016.
[2] Z. Pawlak, “Rough sets,” Int. J. Comput. Inf. Sci., vol. 11, no. 5, pp. 341–
356, 1982.
[3] M. Batty, Confronting Vulnerability and Violence in Urban
Another focus area of the proposed architecture will be in the Cities, 2016. [Online]. Available: www.spatialcomplexity.info/archives/
author/michael, Accessed: Jul. 1, 2016.
form of extending the support to communication for ITU-T rep- [4] Peter Bright, “Meltdown” and “Spectre”: Every Modern Processor
resentation of IoT structure. The limitation of device-to-device has Unfixable Security Flaws, 2018. [Online]. Available: https://
(D-2-D) communication [55] in the context of authenticating arstechnica.com/gadgets/2018/01/meltdown-and-spectre-every-modern-
processor-has-unfixable-security-flaws/, Accessed Jan. 9, 2018.
devices is an ignored aspect because of heterogeneous mix of [5] Z. Pawlak, “Rough classifications,” Int. J. Man Mach. Stud., vol. 20, pp.
devices and network provider. To solve this issue, a software- 469–483, 1984.
based module running on fog platform is proposed which will [6] Z. Pawlak, Rough Sets: Theoretical Aspects of Reasoning About Data.
Norwell, MA, USA: Kluwer, 1991.
make use of lower and upper approximation features to identify [7] O. Hahm, E. Baccelli, H. Petersen, and N. Tsiftes, “Operating systems for
and configure in real-time smaller subsections of D-2-D com- low-end devices in the internet of things: A survey,” IEEE Internet Things
munication segments. Thus, the existing limitations of hardware J., vol. 3, no. 5, pp. 720–734, Oct. 2016.
[8] J. A. Stankovic, “Research directions for the internet of things,” IEEE
level approach at device level gets partially resolved and allows Internet Things J., vol. 1, no. 1, pp. 3–9, Feb. 2014.
us to address the issues arising out of the diverse networks and [9] M. Abadi et al., “TensorFlow: Large-scale machine learning on hetero-
networking standards, heterogeneity of devices including unpre- geneous distributed systems,” White Paper, 2015.
[10] T. C. Fu, “A review on time series data mining,” Eng. Appl. Artif. Intell.,
dictable mobility of devices. Such situation needs RST hardware vol. 24, pp. 164–181, 2011.
that provides instruction set architecture support. Table XIV [11] K. Karimi, IT Cloud vs IoT Cloud, 2018. [Online]. Available:
shows the proposed RST hardware database command set. http://blog.atmel.com/2015/04/07/it-cloud-vs-iot-cloud/, Accessed: Oct.
20, 2016.
[12] S. Kapoor, T. Gupta, A. B. Patki, and R. C. Meharde, “Applications of
VII. CONCLUSION information gain methodology for corporate databases,” in Proc. 3rd Int.
Conf. Comput. Model. Simul., 2011, Paper S080.
While the paper brings out main contribution of this topic for [13] W. Shi, J. Cao, Q. Zhang, Y. Li, and L. Xu, “Edge computing: Vision and
challenges,” IEEE Internet Things J., vol. 3, no. 5, pp. 637–646, Oct. 2016.
IoT hardware platforms, it discusses the need for a deviation [14] J. Kornblum, “Identifying almost identical files using context triggered
from using commercially available off the shelf processors in piecewise hashing,” in Proc. Digit. Forensic Res. Conf., 2006, pp. S91–
the system level digital transformation. S97.
[15] H. Esmaeilzadeh, E. Blem, R. St. Amant, K. Sankaralingam, and
There is a need to strengthen processor design for AI and D. Burger, “Dark silicon and the end of multicore scaling,” in Proc. 38th
cognitive informatics to meet the new challenges. It is totally Int. Symp. Comput. Archit., 2011, pp. 365–376.
missing in the present generation IoT hardware. [16] J. Adwani, “Code profiling for RST algorithm on DSP and embedded
processors,” M. Eng. Thesis, Electronics & Telecommunication, College
In this paper, the authors have carried out a study to justify Eng. Pune, Pune, India, 2017.
that rough set has a potential of reducing computational foot- [17] K. Roy and A. Raghunathan, “Approximate computing: An energy-
print at instruction level by dealing with concept generation to efficient computing technique for error resilient applications,” in Proc.
IEEE Comput. Soc. Annu. Symp., 2015, pp. 473–475.
formulate rule bases. Thus, RST can be considered as a po- [18] N. Kaur and S. K. Sood, “An energy-efficient architecture for the internet
tential direction for approximate computing technique for IoT of things (IoT),” IEEE Syst. J., vol. 11, no. 2, pp. 796–805, Jun. 2017.
applications. Introduction of instruction set for LA , UA at hard- [19] F. Karim Shaikh, S. Zeadally, and E. Exposito, “Enabling technologies
for green Internet of Things,” IEEE Syst. J., vol. 11, no. 2, pp. 983–994,
ware will facilitate efficient computation for IoT from systems Jun. 2017.
perspective. [20] DATE17, “Special session on approximate computing for IoT,” in Proc.
Rough set can also provide specialized hardware support for ICLAB, 2017.
[21] E. Keogh, J. Lin, and A. Fu, “HOT SAX: Efficiently finding the most
missing attribute, redundancy isolation for data storage, infor- unusual time series subsequence,” in Proc. 5th IEEE Int. Conf. Data
mation overloading, energy efficient (portable devices) for the Mining, 2005, pp. 226–233.
next generation IoT hardware exploration. Separate hardware [22] Y. Li, W. Dai, Z. Ming, and M. Qiu, “Privacy protection for preventing
data over-collection in smart city,” IEEE Trans. Comput., vol. 65, no. 5,
based on RST for IoT needs to work in tune with various oper- pp. 1339–1350, May 2016.
ating systems for IoT devices such as Contiki, RIOT, TinyOS, [23] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of
FreeRTOS, etc. Driver development feasibility is required for Things for smart cities,” IEEE Internet Things J., vol. 1, no. 1, pp. 22–32,
Feb. 2014.
running these operating systems. The proposed developments in [24] T. Munakata, “Rough sets” in Fundamentals of the New Artificial Intelli-
IoT hardware will lead to strengthening the cognitive computing gence Neural, Evolutionary, Fuzzy and More, 2nd ed. Berlin, Germany:
support in IoT systems. Springer, 2008, pp. 162–202.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
[25] Google Maps, Pune city BRTS Network Maps. 2016. [On- [49] A. Kanasugi and M. Matsumoto, “Design and implementation of rough
line]. Available: www.masterplansindia.com/maharashtra/route-map- rules generation from logical rules on FPGA board,” in Rough Sets
pune-brts-corridors, Accessed: Oct. 20, 2016. and Intelligent Systems Paradigms. Berlin, Germany: Springer, 2007,
[26] J. Wannenburg and R. Malekian, “Physical activity recognition from pp. 594–602.
smartphone accelerometer data for user context awareness sensing,” [50] G. Sun, X. Qi, and Y. Zhang, “A FPGA based implementation of rough
IEEE Trans. Syst., Man, Cybern., Syst., vol. 47, no. 12, pp. 3142–3149, set theory,” in Proc. Control Decis. Conf., 2011, pp. 2561–2564.
Dec. 2017. [51] K. S. Tiwari and A. Kothari, “Design and implementation of rough set
[27] T. Luo et al., “DaDianNao: A neural network supercomputer,” IEEE co-processor on FPGA,” Int. J. Innov. Comput. Inf. Control., vol. 11, no. 2,
Trans. Comput., vol. 66, no. 1, pp. 73–88, Jan. 2017. pp. 641–656, 2015.
[28] F. Sun, G. Huang, Q. M. Jonathan Wu, S. Song, and D. C. Wunsch II, [52] S. Jaroslaw, M. Kopczynski, and T. Grzes, “The first step toward proces-
“Efficient and rapid machine learning algorithms for big data and dynamic sor for rough set methods,” Fundamenta Informaticae, vol. 127, no. 1,
varying systems,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 47, no. 10, pp. 429–443, 2013.
pp. 2625–2626, Oct. 2017. [53] T. Grzes, M. Kopczyski, and J. Stepaniuk, “FPGA in rough set based
[29] S. M. Shaaban and H. A. Nabwey, “Transformer fault diagnosis method core and reduct computation,” in Rough Sets and Knowledge Technology.
based on rough set and generalized distribution table,” Int. J. Intell. Eng. Germany: Springer, 2013, pp. 263–270.
Syst., vol. 5, no. 2, pp. 17–24, 2012. [54] M. Kopczynski, T. Grzes, and J. Stepaniuk, “Generating core in rough
[30] S. Kumar Khaitan and J. D. McCalley, “Design techniques and applica- set theory: Design and implementation on FPGA,” in Rough Sets and
tions of cyberphysical systems: A survey,” IEEE Syst. J., vol. 9, no. 2, Intelligent Systems Paradigms. Berlin, Germany: Springer, 2014, pp. 209–
pp. 350–365, Jun. 2015. 216.
[31] Gartner, IoT Adoption Is Driving the Use of Platform as a Service, 2016. [55] O. Bello and S. Zeadally, “Intelligent device-to-device communication
[Online]. Available: http://www.gartner.com/newsroom/id/3241817, Ac- in the internet of things,” IEEE Syst. J., vol. 10, no. 3, pp. 1172–1182,
cessed: Oct. 20, 2016. Sep. 2016.
[32] A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and Q. Z. Sheng, “IoT
middleware: A survey on issues and enabling technologies,” IEEE Internet
Things J., vol. 4, no. 1, pp. 1–20, Feb. 2017. Vanita Agarwal (M’17) received M.Tech. degree in
[33] W. Wong, What is Inside an IoT Chip? What Does an IoT SoC Need? microelectronics and VLSI design from the Indian
Everything From Embedded Security and Communications to Neural Institute of Technology Bombay, Mumbai, India.
Network and More, 2016. [Online]. Available: http://electronicdesign. She works currently as an Assistant Professor of
com/iot/what-inside-iot-chip, Accessed: Oct. 20, 2016. electronics and telecommunication with the College
[34] J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, “Twenty security con- of Engineering Pune, Pune, India. She has around
siderations for cloud-supported internet of things,” IEEE Internet Things 10 years of experience in teaching and research.
J., vol. 3, no. 3, pp. 269–284, Jun. 2016. Her areas of interests include microelectronics, VLSI
[35] X. Wang, A. Mueen, H. Ding, G. Trajcevski, P. Scheuermann, and design and technology, CMOS process integration,
E. Keogh, “Experimental comparison of representation methods and dis- and artificial intelligence. She is currently guiding
tance measures for time series data,” Data Mining Knowl. Discovery, M.Tech. students in the related areas.
vol. 26, no. 2, pp. 275–309, 2013.
[36] Research and Markets, Embedded Internet of Things (IoT) Ecosys-
tem: Next Gen Embedded System Hardware, Software, Tools, and
Operating Systems 2016-2021, 2016. [Online]. Available: http:// Rajendrakumar A. Patil (M’10) received the Ph.D.
www.researchandmarkets.com/research/cqnpdc/embedded-internet, Ac- degree from the Indian Institute of Technology Bom-
cessed: Nov. 20, 2016. bay, Mumbai, India.
[37] S. ThamaraiSelvi, “Estimating job execution time and handling missing He works as an Associate Professor of electronics
job requirements using rough set in grid scheduling,” in Proc. Int. Conf. and telecommunication with the College of Engineer-
Comput. Des. Appl., 2010, pp. V4-295–V4-299. ing Pune, Pune, India. He has around 32 years of
[38] N. Verma et al., “Rough set techniques for 24 Hour knowledge factory,” experience in teaching and research. His areas of
in Proc. 5th Nat. Conf./INDIACom-2011 Comput. Nat. Develop. 2011. interest include communication engineering, next
[39] A. B. Patki and S. Verma, “Implementing data mining software modules generation wireless network protocols, cross layer
using rough set techniques,” in Proc. Nat. Conf. Recent Develop. Comput. protocol optimization, co-operative relay networks,
Appl., 2009, pp. 443–452. cognitive radio, and performance modeling of net-
[40] T. Patki, A. Kapoor, and S. Khurana, “Analytical methodologies in works. He is currently guiding M.Tech. and Ph.D. students in the related areas.
soft computing: Rough sets techniques,” Tech. Rep. no. DIT/ SD(ABP)
MSIT/05, 2005.
[41] User’s Guide, ROSE 2—Rough Set Data Explorer. 2016, Accessed: Nov.
20, 2016. Arunkumar B. Patki received the M.Tech. degree
[42] A. Galetsas, “Statistical data on network security,” European Commission, in computer from the Indian Institute of Technology
Information Society and Media Directorate—General, Emerging Tech- (IIT) Kharagpur, Kharagpur, India, in 1975.
nologies and Infrastructures Security, Tech. Rep. no. ag/statistics v2.0, During 1972–1973, he worked as a faculty with
2007, Accessed: Nov. 20, 2016. the Government College of Engineering, Amravati,
[43] L. Jiye and N. Cercone, “Assigning missing attribute values based on India. During 1975–1977, he worked as a Project
rough sets theory,” in Proc. IEEE Int. Conf. Granular Comput., 2006, Officer with the IIT Kharagpur on hardware/software
pp. 607–610. R&D projects. In March 1977, he was employed with
[44] K. S. Tiwari and A. Kothari, “Design and implementation of rough set Ministry of Electronics and Information Technology
algorithms on FPGA: A survey,” Int. J. Adv. Res. Artif. Intell., vol. 3, no. 9, (erstwhile Department of Electronics), Government
pp. 14–23, 2014. of India and superannuated in March 2010 as a Senior
[45] Z. Pawlak, “Elementary rough set granules: Toward a rough set processor,” Director/Scientist-G and HoD. He has worked in various capacities on several
in Rough-Neural Computing Cognitive Technologies. Berlin, Germany: projects in the areas of artificial intelligence, software technology parks, etc. He
Springer, 2004, pp. 5–13. was instrumental in spearheading post-legislation activities of IT Act, 2000. He
[46] M. Mieczyslaw and H. Rybinski, “Towards a parallel rough set computer,” has been trained in VLSI design at Lund University, Lund, Sweden, and Mentor
in Rough Sets, Fuzzy Sets and Knowledge Discovery. Berlin, Germany: Graphics, Wilsonville, OR, USA. He is currently guiding B.Tech and M.Tech.
Springer, 1994, pp. 434–443. students at COEP. He has authored or coauthored more than 80 international
[47] T. Lewis, M. Perkowski, and L. Jozwiak, “Learning in hardware: Archi- publications. His current research areas include IoT, soft computing for infor-
tecture and implementation of an FPGA-based rough set machine,” in mation mining, and evidence based software engineering.
Proc. 25th IEEE EUROMICRO Conf., 1999, pp. 326–334. Prof. Patki has been a Referee for IEEE TRANSACTIONS ON RELIABILITY
[48] A. Kanasugi, “A design of architecture for rough set processor,” in Rough for more than 20 years. He holds a copyright for Fuzzy Logic Based Operating
Set Theory and Granular Computing. Berlin, Germany: Springer, 2003. Software. He has been a member of Scientists Selection Committees in DRDO.