Soft computing-enabled fuzzy-based approach to design access control mechanism for tele-robotic surgeries

被引:0
|
作者
Xiao, Yineng [1 ,2 ]
Zeng, Ting [3 ,5 ]
Ling, Cai-jin [4 ,5 ]
机构
[1] Nanjing Univ, Global Intellectual Property Inst, Suzhou, Peoples R China
[2] Peking Univ, Adv Inst Informat Technol, Hangzhou, Peoples R China
[3] Macau Univ Sci & Technol, Inst Syst Engn, Taipa, Macau, Peoples R China
[4] Macau Univ Sci & Technol, Sch CSE, Taipa, Macau, Peoples R China
[5] Guangdong Finance & Trade Vocat Coll, Sch IT, Guangzhou, Guangdong, Peoples R China
关键词
Tele-robotic surgery; Soft computing; Fuzzy logic; Machine learning; Inference engine;
D O I
10.1007/s00500-023-08842-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The application of soft computing techniques in tele-robotic surgery can offer various benefits such as enhancing the precision of robotic systems, reducing the impact of communication delays, and improving the safety and efficacy of surgical procedures. Fuzzy logic is used in this research to model the uncertain and imprecise nature of surgical data and to provide decision-making support for the surgical robot. Tele-robotic systems are being widely used for automated surgeries, medication, and diagnostics. As these technologies involve internet-connected devices, it is important to establish trust between them and implement access control methods to enhance security and usability. The proposed fuzzy-based approach improves energy efficiency and effectively assigns access rights while performing tele-robotic surgeries. Machine intelligence-based fuzzy logic is used to guide the robotic arm during surgery and to adjust the forces exerted by the robot based on the softness or hardness of the tissues being operated on. These systems also provide data security and low latency and secure communication solutions for the tele-robotics community. The proposed machine intelligence-based mechanism performs activities independently and intelligently to minimize the latency in response, to optimize the energy consumed during communication. To assign permissions based on the least privileges, the proposed fuzzy intelligence-based algorithm is developed, and its performance is evaluated in terms of denial of service, throughput, latency in response, and energy consumption. The simulated results reveal that the proposed FACM approach can achieve good throughput, minimize latency and optimize energy consumption during tele-robotic surgeries.
引用
收藏
页数:13
相关论文
共 13 条
  • [1] Design of Control Functions for an Internet-Based Tele-Robotic Laboratory
    Wollatz, L.
    Gallo, R.
    Laila, D. S.
    Ofoegbu, T. C.
    Kovalan, E.
    Sharkh, S. M.
    Thomas, K. S.
    [J]. 2014 EUROPEAN CONTROL CONFERENCE (ECC), 2014, : 832 - 837
  • [2] Fuzzy State Convergence Based Bilateral Control of a Tele-Robotic System in Unknown Environments
    Farooq, Umar
    Gu, Jason
    El-Hawary, M.
    Asad, M. Usman
    Rafiq, Faiqa
    [J]. PROCEEDINGS OF THE 2016 19TH INTERNATIONAL MULTI-TOPIC CONFERENCE (INMIC), 2016, : 170 - 175
  • [3] A Novel Quantum Hash-Based Attribute-Based Encryption Approach for Secure Data Integrity and Access Control in Mobile Edge Computing-Enabled Customer Behavior Analysis
    Singamaneni, Kranthi Kumar
    Muhammad, Ghulam
    Ali, Zulfiqar
    [J]. IEEE ACCESS, 2024, 12 : 37378 - 37397
  • [4] Design of tendon mechanism for soft wearable robotic hand and its fuzzy control using electromyogram sensor
    Yoon, Jin-Gon
    Lee, Min Cheol
    [J]. INTELLIGENT SERVICE ROBOTICS, 2021, 14 (02) : 119 - 128
  • [5] Design of tendon mechanism for soft wearable robotic hand and its fuzzy control using electromyogram sensor
    Jin-Gon Yoon
    Min Cheol Lee
    [J]. Intelligent Service Robotics, 2021, 14 : 119 - 128
  • [6] Adaptive fuzzy-based mixed H2/H∞ tracking control design in uncertain robotic systems
    Tseng, Chung-Shi
    Jan, Rong-Maw
    [J]. ASIAN JOURNAL OF CONTROL, 2007, 9 (03) : 242 - 256
  • [7] A trustworthy access control model for mobile cloud computing based on reputation and mechanism design
    Lin, Hui
    Xu, Li
    Huang, Xinyi
    Wu, Wei
    Huang, Yijie
    [J]. AD HOC NETWORKS, 2015, 35 : 51 - 64
  • [8] Consortium blockchain-enabled access control mechanism in edge computing based generic Internet of Things environment
    Saha, Sourav
    Chattaraj, Durbadal
    Bera, Basudeb
    Kumar Das, Ashok
    [J]. Transactions on Emerging Telecommunications Technologies, 2021, 32 (06)
  • [9] Consortium blockchain-enabled access control mechanism in edge computing based generic Internet of Things environment
    Saha, Sourav
    Chattaraj, Durbadal
    Bera, Basudeb
    Kumar Das, Ashok
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (06):
  • [10] Design of an adaptive fuzzy-neural inference system-based control approach for robotic manipulators
    Barhaghtalab, Mojtaba Hadi
    Sepestanaki, Mohammadreza Askari
    Mobayen, Saleh
    Jalilvand, Abolfazl
    Fekih, Afef
    Meigoli, Vahid
    [J]. APPLIED SOFT COMPUTING, 2023, 149