Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

Challenges in representing information with augmented reality to support manual procedural tasks

  • Support of manual procedural tasks such as repair or maintenance is one of the most promising areas for the application of augmented reality in industry. However, it is not yet fully understood how information like work instructions or CAD models must be represented in a way that users are optimally supported in accomplishing this kind of tasks. As an approach to this research challenge, a conceptual framework for modelling information representation in augmented reality is presented here. It introduces the idea of information objects, which are physical and virtual objects that provide relevant information for completing work steps of a task. These can be distinguished into multiple classes based on the levels of spatial connection that information in augmented reality can have. The classes are then used to identify possible sources of sensory or cognitive e ort for a user that is caused by the way information objects are included in an augmented reality system and not by the complexity of the task to be performed. Based on these sources, information representation challenges are formulated that must be addressed when creating augmented reality based support systems for procedural tasks. The five identified challenges are clarity, consistency, visibility, orientation and information linking. For each of them, a detailed explanation is given and literature is collected that provides indications of what can be done to overcome them.

    Citation: Tobias Müller. Challenges in representing information with augmented reality to support manual procedural tasks[J]. AIMS Electronics and Electrical Engineering, 2019, 3(1): 71-97. doi: 10.3934/ElectrEng.2019.1.71

    Related Papers:

    [1] Kun Zhai, Qiang Ren, Junli Wang, Chungang Yan . Byzantine-robust federated learning via credibility assessment on non-IID data. Mathematical Biosciences and Engineering, 2022, 19(2): 1659-1676. doi: 10.3934/mbe.2022078
    [2] M Kumaresan, M Senthil Kumar, Nehal Muthukumar . Analysis of mobility based COVID-19 epidemic model using Federated Multitask Learning. Mathematical Biosciences and Engineering, 2022, 19(10): 9983-10005. doi: 10.3934/mbe.2022466
    [3] Yongjun Ren, Yan Leng, Yaping Cheng, Jin Wang . Secure data storage based on blockchain and coding in edge computing. Mathematical Biosciences and Engineering, 2019, 16(4): 1874-1892. doi: 10.3934/mbe.2019091
    [4] Songfeng Liu, Jinyan Wang, Wenliang Zhang . Federated personalized random forest for human activity recognition. Mathematical Biosciences and Engineering, 2022, 19(1): 953-971. doi: 10.3934/mbe.2022044
    [5] Dawei Li, Enzhun Zhang, Ming Lei, Chunxiao Song . Zero trust in edge computing environment: a blockchain based practical scheme. Mathematical Biosciences and Engineering, 2022, 19(4): 4196-4216. doi: 10.3934/mbe.2022194
    [6] Sonza Singh, Anne Marie France, Yao-Hsuan Chen, Paul G. Farnham, Alexandra M. Oster, Chaitra Gopalappa . Progression and transmission of HIV (PATH 4.0)-A new agent-based evolving network simulation for modeling HIV transmission clusters. Mathematical Biosciences and Engineering, 2021, 18(3): 2150-2181. doi: 10.3934/mbe.2021109
    [7] Yong Zhu, Zhipeng Jiang, Xiaohui Mo, Bo Zhang, Abdullah Al-Dhelaan, Fahad Al-Dhelaan . A study on the design methodology of TAC3 for edge computing. Mathematical Biosciences and Engineering, 2020, 17(5): 4406-4421. doi: 10.3934/mbe.2020243
    [8] Hui Du, Depeng Lu, Zhihe Wang, Cuntao Ma, Xinxin Shi, Xiaoli Wang . Fast clustering algorithm based on MST of representative points. Mathematical Biosciences and Engineering, 2023, 20(9): 15830-15858. doi: 10.3934/mbe.2023705
    [9] Xiangshuai Duan, Naiping Song, Fu Mo . An edge intelligence-enhanced quantitative assessment model for implicit working gain under mobile internet of things. Mathematical Biosciences and Engineering, 2023, 20(4): 7548-7564. doi: 10.3934/mbe.2023326
    [10] A. N. Licciardi Jr., L. H. A. Monteiro . A complex network model for a society with socioeconomic classes. Mathematical Biosciences and Engineering, 2022, 19(7): 6731-6742. doi: 10.3934/mbe.2022317
  • Support of manual procedural tasks such as repair or maintenance is one of the most promising areas for the application of augmented reality in industry. However, it is not yet fully understood how information like work instructions or CAD models must be represented in a way that users are optimally supported in accomplishing this kind of tasks. As an approach to this research challenge, a conceptual framework for modelling information representation in augmented reality is presented here. It introduces the idea of information objects, which are physical and virtual objects that provide relevant information for completing work steps of a task. These can be distinguished into multiple classes based on the levels of spatial connection that information in augmented reality can have. The classes are then used to identify possible sources of sensory or cognitive e ort for a user that is caused by the way information objects are included in an augmented reality system and not by the complexity of the task to be performed. Based on these sources, information representation challenges are formulated that must be addressed when creating augmented reality based support systems for procedural tasks. The five identified challenges are clarity, consistency, visibility, orientation and information linking. For each of them, a detailed explanation is given and literature is collected that provides indications of what can be done to overcome them.


    The emergence of the Internet of Things (IoT) and the widespread utilization of mobile devices with advanced computing capabilities have instigated the need for large-scale data acquisition. These data can be harnessed to train advanced artificial intelligence (AI) models that can provide various smart services, benefiting society in diverse aspects. Nevertheless, traditional data acquisition models that rely on centralized machine learning models entail security and privacy challenges and reduce participation in data contribution. Moreover, with the recent establishment of data privacy preservation regulations, such as the General Data Protection Regulation [1] and the Health Insurance Portability and Accountability act [2], the need for privacy-preserving AI has been continuously growing. Hence, federated learning (FL), which allows clients to train their data collaboratively without exposing their private data to each other, has become more prevalent as a promising approach for tackling privacy-preserving AI issues. The introduction of FL was first used by Google for Gboard's next-word prediction [3]. Subsequently, empowered by the success of Gboard, the utilization of FL was promoted in a myriad of applications, such as healthcare [4], industrial IoT [5], vehicular networks [6], finance [7] and so forth.

    Despite the benefits of general FL, the federated averaging (FedAvg) [8] approach, has suffered from poor convergence from the highly heterogeneous and non-independent nature of data distributions across clients [9]. A global model is trained using data from multiple clients; however, the data from each client are not necessarily identically distributed. This approach can lead to poor model performance for certain clients, whereby the negative impact can lead to the reluctance or refusal of clients to participate in the FL training process. Thus, the concept of personalized federated learning (PFL), as a variation of FL, was developed to alleviate the impact of non-identically and independently distributed (non-IID) data and statistical heterogeneity issues for the efficient creation of tailored models. PFL addresses these problems by personalizing the model for each client, considering the specific characteristics of their data. Moreover, it allows for better performance and increases clients' FL participation.

    One approach to PFL is clustering-based PFL [10], which enables personalization using a multi-model approach with group-level client interactions. By mapping client associations, this approach facilitates the learning of personalized models by each client in conjunction with affiliated clients within similar clusters. However, the existing cluster-based PFL method still depends on the centralized strategy where the server orchestrates all processes and requires high communication, incurring computational costs. To address these shortcomings, this study introduces a blockchain-enabled distributed edge cluster for PFL (BPFL) that exploits the benefits of two cutting-edge technologies, blockchain and edge computing, which have the potential to revolutionize the way data are stored, processed, and shared. Specifically, in clustering-based PFL, the integration of blockchain and edge computing enables the creation of clusters based on real-time data, eliminating the need for a central authority to manage and process the data, thereby providing a robust and decentralized solution for data management and processing. In this study, blockchain is used to enrich client privacy and security by recording all transactions in immutable distributed ledger networks to enhance efficient client selection and clustering. Blockchain can be utilized to establish a decentralized network of devices, where each device maintains a copy of the same data, making the process more resilient to data loss or tampering. Likewise, to offer appropriate storage and computation of PFL, we employ an edge computing system, where computational processing is locally performed in the edge infrastructure of PFL to be nearer to clients as data providers. Thus, this approach allows for faster and more efficient data processing and provides proper computation capability by improving real-time services while reducing the latency and bandwidth requirements of PFL.

    This paper is organized as follows. Section 2 provides background knowledge related to edge-AI, FL challenges, and blockchain. Section 3 explains the current works related to PFL. In Section 4, we present the proposed model which is based on a distributed edge cluster for PFL. In Section 5, numerical results of BPFL are discussed, and several related concerns are explored. Finally, Section 6 concludes the paper.

    In 2014, the European Telecommunications Standards Institute introduced the concept of edge computing to optimize the user experience through low latency, high bandwidth, and real-time communication capabilities [11]. Edge computing leverages local infrastructure to enhance response speed and minimize transmission latency during the transaction process by strategically placing the servers in the edge network [12], thus emphasizing proximity to end users [13]. Whereas, edge-AI, also known as edge intelligence, offers the utilization of AI technologies at the perimeter of a network as opposed to a centralized cloud infrastructure. Specifically, data collection, processing, transmission, and utilization occur at the network edge. The approach enables model training across network nodes, allowing the preservation of privacy and confidentiality [14,15]. Moreover, this approach can enhance the responsiveness and efficiency of the system by decreasing the volume of data that needs to be transmitted over the network [16,17,18]. Edge-AI has been increasingly gaining popularity in recent years in both industry and academia. Leading companies such as Google, Microsoft, Intel, and IBM have initiated pilot projects to showcase the benefits of edge computing in the last mile of AI [19].

    The traditional client-server architecture in machine learning involves training on a server, with clients providing the data. However, this approach raises privacy concerns. Clients serve only as providers of data, whereas the server also undertakes the task of data training and aggregation. Various concerns are associated with this classical machine learning strategy, in particular, regarding user privacy. To address this issue, Google introduced FedAvg, a novel communication-efficient optimization algorithm for FL. FedAvg, as outlined in [8], is an efficient method for the distribution-based training of models, allowing distributed mobile devices to collaborate in model training without centralizing the training data and keeping local data stored on mobile devices, thereby improving privacy by blocking access to local data. It also reduces the number of communication rounds, making it more efficient than conventional distributed methods.

    In the FedAvg algorithm, the server, acting as a model provider, initially sends the global model to the clients. Each client, as a participant user, downloads the global model from the central server, generates a model update by training the current global model on local data, and subsequently uploads the trained model to the aggregator server. The central server, then acting as an aggregator, gathers and aggregates all model updates from the clients to produce a new global model for the next iteration. Thus, FedAvg significantly enhances client privacy by blocking attacks from straightforward access to the local training data, as cited in [20]. FedAvg is much more communication-efficient than conventional distributed stochastic gradient descent because of fewer communication rounds. Furthermore, FedAvg frequently leads to improved performance, as demonstrated in various learning-related issues such as predictive models in health, low latency vehicle-to-vehicle communication, vocabulary estimation, and next-word prediction, as cited in [3,21,22,23].

    FL offers numerous benefits for various practical applications. However, the highly heterogeneous data distribution among clients also poses several challenges, leading to a lack of personalization and poor convergence. Specifically, the data distribution among clients is highly non-IID, which makes it challenging to train a single model with effective performance for all clients. The non-IID data also significantly affect the accuracy of FedAvg. Since the distribution of each local dataset differs significantly from the global distribution, the local objectives of each client are incompatible with the global optimum, which leads to a drift in local updates, causing each model to be updated towards its own local optimum, which may be far from the global optimum [24]. Especially if there are many significant local updates (i.e., an enormous number of local epochs), the averaged model might also be far from the global optimum [25,26]. Consequently, the convergence of the global model provides a substantially less accurate solution than that associated with the IID setting.

    In 2008, Bitcoin, a digital currency system based on blockchain technology, was proposed by Nakamoto for financial transactions. Blockchain is a technology that enables participating nodes to share and validate transactions on a network, which are then imprinted with timestamps and stored in an unchangeable database using a specific consensus mechanism. Blockchain has three primary features: decentralized storage, a distributed ledger, and the ability to support distributed services through the use of smart contracts [27]. Because of these benefits, many researchers from various fields are currently exploring the development of blockchain technology. The advantages of blockchain include anonymity and privacy for users, the immutability of stored data, a decentralized approach that eliminates single points of failure, transparency of transactions, as well as trustful and distributed transactions that do not require a central authority [5]. The feature of immutability ensures that data cannot be deleted or modified from the network, whereas the decentralized approach allows for open participation, provides immunity from particular attacks, and eliminates single points of failure, resulting in consistent, reliable, and widely accessible data, timestamped for recorded transactions. In addition, every user has access to transparent transactions, thereby enabling every node to share and validate transactions in a distributed manner [28].

    PFL learning emerged as a response to the problems caused by the non-IID data distribution and statistical heterogeneity of the current FL. The use of FedAvg-based methods for non-IID data result in a decrease in accuracy due to client drift. To overcome these issues, two strategies have been proposed in [29], i.e., the global model personalization strategy, which involves training a single global model, and personalized model learning strategies, which involve training PFL models individually. Most personalization methods for the global FL model typically involve two distinct processes [30]: creating a global model through collaboration or using private client information to personalize the global model [31]. Essentially, PFL uses FedAvg as the standard approach for general FL training settings, with the added step of personalizing the global model using local client data after training. The personalized model strategy for learning aims to achieve PFL by applying different learning algorithms and modifying the FL aggregation process through similarity and architecture-based approaches. Furthermore, PFL seeks to train personalized models for a group of clients by utilizing the non-IID nature of all clients' private data while maintaining their privacy. Thus, to improve the practicality of PFL, the work in [32] suggested that the following three goals be simultaneously addressed: achieving rapid model convergence in a reduced number of training rounds, improving personalized models that benefit a large number of clients, and creating more accurate global models that aid clients with limited private data for personalization.

    Recently, research on PFL has been gaining popularity as it aims to address one of the main challenges of current FL. One of the earliest works on PFL was the manager, owner, consultant, helper, approver (MOCHA) framework which was proposed in 2017, as a multi-task learning approach [9]. MOCHA simultaneously learns client task settings and a similarity matrix, to address the issue of federated multi-task learning. The distributed multi-task issues addressed by MOCHA include fault tolerance, stragglers, and communication limitations. In addition, the authors of [10] proposed a context-based client clustering approach to facilitate multiple global models and handle changes in client populations over time. In this approach, FL models are trained for each homogeneous group of clients, whereby clients are divided into clusters based on the cosine similarity of the gradient updates from the clients. There are multiple methods for implementing the PFL framework, such as data augmentation [33], meta-learning [32], transfer learning [34], and fine-tuning [25]. It is worth noting that this study focuses on context-based client clustering with a multi-task approach.

    In this section, we introduce the BPFL approach, which combines the benefits of edge computing and blockchain technology to enable PFL through distributed edge clusters. Unlike traditional methods that rely on a single global model, our approach utilizes a multi-model approach with group-level client associations to achieve personalization. Blockchain technology is employed to securely store these models in a distributed manner with smart contracts to improve efficient client selection and clustering through the evaluation of client relationships. The proposed model utilizes a consortium blockchain to ensure that the participating edge clusters are preselected based on their trustworthiness, thereby enhancing the security and reliability of the overall system. Consortium blockchain guarantees the authenticity of the transactions and mitigates the risk of eavesdropping, tampering, and compromising of the BPFL network edge servers by malicious clients. To verify the validity of the transaction, we employed the proof of training quality concept, where the accuracy of the local model is the primary verification parameter [35]. Moreover, edge computing servers were utilized to reduce communication and computation costs by providing local storage, communication, and computation capabilities, allowing the computational processing to be conducted closer to clients as data providers. As illustrated in Figure 1, the proposed model comprises the steps of system initialization, collaborative edge cluster establishment, personalized local training models, and personalized global model aggregation. The specific procedures are explained in further detail as follows.

    Figure 1.  Distributed edge cluster for personalized federated learning.

    The initial model parameters of the global model (θin) are stored in a distributed ledger blockchain (which can be integrated with off-chain storage, e.g., the InterPlanetary File System (IPFS)) as the initial learning model process. It is maintained by edge servers that are placed throughout clusters. Then, the number of K clients (Ck) need to register to the BPFL system by sending asset statement (refers to [36]) validation with their pseudo-public key address PubpsC through Eq (4.1).

    Tx_Ck(Asset)=PubpsCk{(PubCk_Asset=PubHash(Ck_Asset),βj_Ck=(Hash(j).PubHash(Ck_Asset))Hash(Ck_Asset)),"Asset_sum"},where,PubpsCk{Pub1Sec_C,Pub2Sec_C,...,PubkSec_C} (4.1)

    Equation (4.1) describes the process of recording a client's asset information in the system, which includes the client's public key related to the asset pseudonym PubCk_Asset, as evidence that the client owns the asset βj_Ck, and general asset information "Asset_sum" (e.g., its format, topic, and data size). The public key and ownership proof are essential for verifying that the client owns the asset and keeping the asset information anonymous. These elements are created using a secure hash function Hash(Ck_Asset) to map the client's assets into unique public and private keys PubkSec_C to maintain the client's anonymity. In short, only validated clients can download θin and access the BPFL system.

    In this step, BPFL can distinguish incongruent clients after converging to a stationary point [10] as well as generate a multi-model method (θk) that is maintained by distributed edge servers. Hence, according to the client's asset statement, the collaborative edge clusters (ECli) are established based on the client's data distribution (Dk) similarity, where their datasets are non-IID. In this sense, BPFL splits the clients into two clusters (ECl1,ECl2) in a manner that optimizes the minimization of the maximum similarity between clients belonging to different clusters (see Eq (4.2)). Additionally, the group-level client similarity (δ) can be counted using specific partition techniques, such as Euclidean distance, cosine similarity, and Gaussian mixture. Our model relies on the cosine similarity technique (see Eq (4.3)).

    ECl1,ECl2argminECL1ECL2(maxδECl1,ECl2) (4.2)
    δC1,C2:=δ(wp1,wp2):=(wp1,wp2)wp1wp2 (4.3)

    In the pth iteration, Ck in each ECli downloads global parameter θpi from the blockchain and performs local training using their datasets Dk to obtain a personalized model (wpk) owned by client Ck by using the following formula [37]:

    wpk=argminwRdFi(w)+μ2αpwθpk (4.4)

    where Fi is a loss function associated with the ith data point on Ck; wRd encodes the parameters of local model w, μ represents the regularization parameter, and αp is the step size of gradient descent in iteration p.

    Algorithm 1 A summary of the BPFL algorithm. Di is the local datasets; K number of clients Ck; number of iteration, p; E is the number of local epochs; and η is learning rate.
    1:  procedure EdgeServerUpdate:
    2:      ECLi initialize θin       *the initial models are stored in the blockchain
    3:     for each round p = 1, 2, ..., P do
    4:       CKmax(Tx_Ck(Asset))
    5:        ECl1,ECl2argminECL1ECL2(maxδECl1,ECl2)       *similarity-based clients clustering
    6:       for each client iCK in parallel do
    7:          wpk UserUpdate(i,wp)       * updates the personalized model
    8:         θ(p+1)iθpi+ki=1|Dk||D|wpk       *aggregating the gathered models
    9:        end for
    10:     end for
    11:  end procedure
    12:  procedure ClientUpdate: (i,wp)
    13:     //Executes on client i
    14:      wpkwp
    15:      for each local epoch j from 1 to E do
    16:        for each batch b={x,y} of Di do
    17:          wpkargminwRdFi(w)+μ2αpwθpk;       * local training of personalized model
    18:       end for
    19:      end for
    20:     return wpk for aggregation
    21:  end procedure
    22:  procedure Incentive_Mechanism(Incv_Ck)       *incentivized using Ethereum platform
    23:      ECLi collects the list of participating clients C1,C2,...,Ck
    24:     for C1,C2,...,Ck;ECLi do
    25:        ECLi ConfirmTransaction H(wp1,wp2,...,wPk)       *ECLi has the list of clients
    26:       Incv_Ck are given to C1,C2,...,Ck       *the rewards are distributed to the clients
    27:      end for
    28:  end procedure

     | Show Table
    DownLoad: CSV

    After the clients collaboratively upload their wpk to the distributed edge cluster, the cluster global model aggregation is executed as follows:

    θ(p+1)i=θpi+ki=1|Dk||D|wpk (4.5)

    where θ(p+1)i is a new personalized global model obtained for the next iteration (p+1). In this step, all participants in the BPFL system can download θ(p+1)i through the distributed ledger blockchain. Consequently, iterations continue until the model achieves precise accuracy or reaches the maximum number of iterations. Finally, clients are incentivized through the implementation of a smart contract blockchain, whereby they are rewarded for fulfilling the transaction requirements of the BPFL platform. The incentive, represented by Incv_Ck, is calculated based on the following formula [38]:

    Incv_Ck=icontribCkθ(p+1)i (4.6)

    where contribCk is the contribution of client Ck to θ(p+1)i. Later, Incv_Ck is automatically distributed to participating clients once θ(p+1)i has been generated, thus providing a decentralized and responsive system. A summary of the BPFL framework can be found in Algorithm 1.

    This section describes the implementation of the proposed model which forms a distributed edge clustering framework to realize PFL by leveraging the merits of blockchain and EC. The modified National Institute of Standards and Technology (MNIST) [39] datasets were used with 10.000 images for the test set and 60.000 images for the training set. Our preliminary research compared the performance of IID and non-IID data distributions among clients through two different models of MNIST, i.e., a basic two-layer multilayer perceptron (MLP; also known as MNIST 2NN) and a convolutional neural network (CNN) comprising two 5 × 5 convolution layers. Figure 2 shows the loss from 50 epochs of training with a learning rate of 0.01 for both MLP and CNN models. The loss in the non-IID setting is higher than that of IID because of the unbalanced and highly heterogeneous nature of client data. The impact of non-IID data is further reflected in poor convergence and a decline in performance accuracy, as depicted in Figure 3. The accuracy is observed to be at its lowest at epoch 5, reaching 61.48%, as opposed to an accuracy of 95.03% in the IID setting.

    Figure 2.  Training loss of 50 epochs for MLP and CNN models.
    Figure 3.  Accuracy performance results on IID and Non-IID setting.

    To create a BPFL framework that leverages blockchain technology, we adopted a consortium setting [40] that harnesses the power of blockchain to perform decentralized PFL transactions, assess participant contributions to the global model with transparency, and establish a decentralized incentive system. The distribution of edge cluster contributions towards generating the global PFL model based on the Ethereum platform is depicted in Figure 4. We designed three distinct collaborative ECLi edge clusters, ECL1, ECL2, and ECL3, which work collaboratively to train FL models using their personalized models and local datasets. Upon creating a new personalized global model, the incentive is distributed to the edge clusters based on the recorded contribution of each cluster in the blockchain's distributed ledger. Figure 5 shows that, on average, BPFL achieves better performance accuracy than existing works. In summary, BPFL seeks to motivate clients possessing heterogeneous data to actively participate in preserving PFL and improve system performance.

    Figure 4.  Distribution of edge cluster contributions towards generating the global model PFL based on Ethereum platform.
    Figure 5.  Performance accuracy comparison.

    The study of PFL is the latest trend addressing the issue of statistical heterogeneity of non-IID data distributions, which is one of the primary challenges of the existing FL approach. Even though the PFL approach is advantageous compared to the general FL framework of FedAvg, there are some significant challenges, especially regarding the data privacy risk of clients during the model training process. Therefore, to enhance security and privacy in PFL, we introduced BPFL, which exploits the concept of distributed edge clusters to leverage the merits of edge computing and blockchain technology. Table 1 provides a theoretical summary of the advantages of BPFL compared to current PFL clustering techniques.

    Table 1.  Summary of BPFL advantages compared to current PFL techniques.
    Key parameters Smith et al. [9] Sattler et al. [10] This work
    Computation and communication cost High High Low
    Works on non-convex setting No Yes Yes
    Multiple global model setting Not investigated Not investigated Yes
    Distributed edge cluster Not applied Not applied Yes
    Privacy guarantees Not investigated Yes Yes
    Asset statement Not applied Not applied Yes
    Incentive mechanism Not applied Not applied Applied

     | Show Table
    DownLoad: CSV

    Nevertheless, to strengthen and achieve a robust PFL technique, further work is required to investigate the potential attacks and defenses originating from the more complex protocols and structures of PFL. To protect the client's sensitive data from various threats, several privacy techniques might be leveraged, such as differential privacy, homomorphic encryption, secure multiparty computation, and a trusted execution environment. In addition, the development of a reliable incentive mechanism can be studied to maintain fairness and motivate client contributions. The scalability of blockchain is another aspect that requires attention. The main issue with a fully distributed ledger network is that every node must agree on the complete state of the ledger, which leads to challenges such as limited scalability and longer transaction delays as the network expands. However, representative datasets are essential for developing the PFL field. Datasets with more modalities (sensor signals, video, and audio) and involving a more comprehensive assortment of machine learning tasks from practical applications are required to further PFL research. Additionally, performance benchmarking is another critical aspect for the long-term expansion of the PFL research domain.

    This study introduced a blockchain-enabled distributed edge cluster approach for PFL, exploiting the benefits of blockchain and edge computing. Blockchain protects client privacy and security by recording all transactions in immutable distributed ledger networks, thereby enhancing efficient client selection and clustering. Similarly, an edge computing system offers appropriate storage and computation, whereby computational processing is locally performed in the edge infrastructure to be nearer to clients. Thus, this system provides proper computation capability and improves real-time services and low-latency communication of PFL. As challenges for future study directions in the PFL field, privacy-preserving, trustworthy PFL, as well as representative datasets and benchmarks are suggested.

    This research was supported by the MSIT (Ministry of Science and ICT), Republic of Korea, under the ITRC (Information Technology Research Center) support program (IITP-2022-2020-0-01797) supervised by the IITP (Institute for Information & Communications Technology Planning & Evaluation) and partially supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. 2021R1I1A3046590).

    The authors declare there is no conflict of interest.



    [1] Azuma R, Baillot Y, Behringer R, et al. (2001) Recent advances in augmented reality. IEEE Comput Graph 21: 34–47.
    [2] Azuma R and Furmanski C (2003) Evaluating label placement for augmented reality view management. In Proceedings of the 2nd IEEE/ACM international Symposium on Mixed and Augmented Reality, pp. 66–75, IEEE Computer Society.
    [3] Avery B, Sandor C and Thomas BH (2009) Improving spatial perception for augmented reality x-ray vision. In Virtual Reality Conference, 2009. VR 2009. IEEE, pp. 79–82, IEEE.
    [4] Azuma RT (1997) A survey of augmented reality. Presence: Teleoperators and virtual environments 6: 355–385. doi: 10.1162/pres.1997.6.4.355
    [5] Bell B, Feiner S and Höllerer T (2001) View management for virtual and augmented reality. In Proceedings of the 14th annual ACM symposium on User interface software and technology, pp. 101–110, ACM.
    [6] Bane R and Höllerer T (2004) Interactive tools for virtual x-ray vision in mobile augmented reality. In Proceedings of the 3rd IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 231–239, IEEE.
    [7] Bell B, Höllerer T and Feiner S (2002) An annotated situation-awareness aid for augmented reality. In Proceedings of the 15th annual ACM symposium on User interface software and technology, pp. 213–216, ACM.
    [8] Biederman I (1987) Recognition-by-components: a theory of human image understanding. Psychol rev 94: 115–117. doi: 10.1037/0033-295X.94.2.115
    [9] Bowman DA, Kruijff E, LaViola Jr JJ, et al. (2001) An introduction to 3-d user interface design. Presence: Teleoperators and virtual environments 10: 96–108. doi: 10.1162/105474601750182342
    [10] Bichlmeier C and Navab N (2006) Virtual window for improved depth perception in medical ar. In International Workshop on Augmented Reality environments for Medical Imaging and Computeraided Surgery (AMI-ARCS), Citeseer.
    [11] Biocca FA, Owen CB, Tang A, et al. (2007) Attention issues in spatial information systems: Directing mobile users' visual attention using augmented reality. J Manage Inform Syst 23: 163– 184. doi: 10.2753/MIS0742-1222230408
    [12] Bach C and Scapin DL (2003) Ergonomic criteria adapted to human virtual environment interaction. In Proceedings of the 15th Conference on l'Interaction Homme-Machine, pp. 24–31, ACM.
    [13] Bork F, Schnelzer C, Eck U, et al. (2018) Towards efficient visual guidance in limited field-of-view head-mounted displays. IEEE T Vis Comput Gr 24: 2983–2992. doi: 10.1109/TVCG.2018.2868584
    [14] Biocca FA, Tang A, Owen CB, et al. (2006) Attention funnel: omnidirectional 3d cursor for mobile augmented reality platforms. In Proceedings of the SIGCHI conference on Human Factors in computing systems, pp. 1115–1122, ACM.
    [15] Coelho EM, MacIntyre B and Julier SJ (2004) Osgar: A scene graph with uncertain transformations. In Proceedings of the 3rd IEEE/ACM International Symposium on Mixed and Augmented Reality, pp. 6–15, IEEE Computer Society.
    [16] Chen J, Pyla PS and Bowman DA (2004) Testbed evaluation of navigation and text display techniques in an information-rich virtual environment. In Virtual Reality, 2004. Proceedings. IEEE, pp. 181–289, IEEE.
    [17] Cutting JE (2003) Reconceiving perceptual space. Perceiving Pictures: An Interdisciplinary Approach to Pictorial Space, pp. 215–238.
    [18] Cutting JE and Vishton PM (1995) Perceiving layout and knowing distances: The integration, relative potency, and contextual use of different information about depth. Perception of Space and Motion, pp. 69–117.
    [19] Debernardis S, Fiorentino M, Gattullo M, et al. (2014) Text readability in head-worn displays: Color and style optimization in video versus optical see-through devices. IEEE T Vis Comput Gr 20: 125–139. doi: 10.1109/TVCG.2013.86
    [20] Dünser A, Grasset R, Seichter H, et al. (2007) Applying hci principles to ar systems design.
    [21] DiVerdi S, Höllerer T and Schreyer R (2004) Level of detail interfaces. In Proceedings of the 3rd IEEE/ACM International Symposium on Mixed and Augmented Reality, pp. 300–301, IEEE Computer Society.
    [22] Drascic D and Milgram P (1996) Perceptual issues in augmented reality. In Stereoscopic Displays and Virtual Reality Systems III, Vol. 2653, pp. 123–135, International Society for Optics and Photonics.
    [23] Dauenhauer R and Müller T (2016) An evaluation of information connection in augmented reality for 3d scenes with occlusion. In Proceedings of the 15th IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 235–237, IEEE.
    [24] Darken RP, Sullivan JA and Lennerton M (2003) A chromakey augmented virtual environment for deployable training.
    [25] Elmqvist N, Assarsson U and Tsigas P (2007) Employing dynamic transparency for 3d occlusion management: Design issues and evaluation. Human-Computer Interaction–INTERACT 2007, pp. 532–545.
    [26] Ellis SR, Breant F, Manges B, et al. (1997) Factors influencing operator interaction with virtual objects viewed via head-mounted see-through displays: viewing conditions and rendering latency. In Virtual Reality Annual International Symposium, 1997., IEEE 1997, pp. 138–145.
    [27] Ellis SR, Wolfram A and Adelstein BD (2002) Three dimensional tracking in augmented environments: user performance trade-offs between system latency and update rate. In Proceedings of the Human Factors and Ergonomics Society annual meeting, Vol. 46, pp. 2149–2153, Sage CA: Los Angeles, CA: SAGE Publications.
    [28] Furmanski C, Azuma R and DailyM(2002) Augmented-reality visualizations guided by cognition: Perceptual heuristics for combining visible and obscured information. In Proceedings of the first International Symposium on Mixed and Augmented Reality (ISMAR), pp. 215–320, IEEE.
    [29] Fairchild MD (2013) Color appearance models. John Wiley & Sons.
    [30] Fischer J, Bartz D and Straber W (2005) Stylized augmented reality for improved immersion. In IEEE Proceedings. VR 2005. Virtual Reality, 2005., pp. 195–202, IEEE.
    [31] Fiorentino M, Debernardis S, Uva AE, et al. (2013) Augmented reality text style readability with see-through head-mounted displays in industrial context. Presence: Teleoperators and Virtual Environments 22: 171–190. doi: 10.1162/PRES_a_00146
    [32] Feng Y (2008) Estimation of light source environment for illumination consistency of augmented reality. Congress on Image and Signal Processing 3: 771–775.
    [33] Flatla DR and Gutwin C (2010) Individual models of color differentiation to improve interpretability of information visualization. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2563–2572, ACM.
    [34] Feiner S, MacIntyre B, Höllerer T, et al. (1997) A touring machine: Prototyping 3d mobile augmented reality systems for exploring the urban environment. Digest of Papers. First International Symposium on Wearable Computers 1: 74–81.
    [35] Franklin M (2006) The lessons learned in the application of augmented reality. Technical report.
    [36] Gavish N, Gutierrez T, Webel S, et al. (2011) Design guidelines for the development of virtual reality and augmented reality training systems for maintenance and assembly tasks. The International Conference of the SKILLS 2011 1: 29.
    [37] Grasset R, Langlotz T, Kalkofen D, et al. (2012) Image-driven view management for augmented reality browsers. In Mixed and Augmented Reality (ISMAR), 2012 IEEE International Symposium on, pp. 177–186, IEEE.
    [38] Gagne RM and Rohwer WD (1969) Instructional psychology. Annual Review of Psychology 20: 381–418. doi: 10.1146/annurev.ps.20.020169.002121
    [39] Gabbard JL, Swan JE, Hix D, et al. (2005) An empirical user-based study of text drawing styles and outdoor background textures for augmented reality. In Virtual Reality, 2005. Proceedings. VR 2005. IEEE, pp. 11–18, IEEE.
    [40] Gabbard JL, Swan JE and Hix D (2006) The effects of text drawing styles, background textures, and natural lighting on text legibility in outdoor augmented reality. Presence: Teleoperators and Virtual Environments 15: 16–32. doi: 10.1162/pres.2006.15.1.16
    [41] Gabbard JL, Swan JE, Hix D, et al. (2007) Active text drawing styles for outdoor augmented reality: A user-based study and design implications. In Virtual Reality Conference, 2007. VR'07. IEEE, pp. 35–42, IEEE.
    [42] Gabbard JL, Swan JE, Zedlitz J, et al. (2010) More than meets the eye: An engineering study to empirically examine the blending of real and virtual color spaces. In Virtual Reality Conference (VR), 2010 IEEE, pp. 79–86, IEEE.
    [43] HallerM(2004) Photorealism or/and non-photorealism in augmented reality. In Proceedings of the 2004 ACM SIGGRAPH international conference on Virtual Reality continuum and its applications in industry, pp. 189–196, ACM.
    [44] Henderson SJ and Feiner S (2009) Evaluating the benefits of augmented reality for task localization in maintenance of an armored personnel carrier turret. In 2009 8th IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 135–144, IEEE.
    [45] Henderson SJ and Feiner SK (2011) Augmented reality in the psychomotor phase of a procedural task. In 2011 10th IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 191–200, IEEE.
    [46] Holloway RL (1997) Registration error analysis for augmented reality. Presence: Teleoperators and Virtual Environments 6: 413–432. doi: 10.1162/pres.1997.6.4.413
    [47] Hirsh IJ and Sherrick Jr CE (1961) Perceived order in different sense modalities. Journal of experimental psychology 62: 423. doi: 10.1037/h0045283
    [48] Itoh Y, Dzitsiuk M, Amano T, et al. (2015) Semi-parametric color reproduction method for optical see-through head-mounted displays. IEEE T Vis Comput Gr 21: 1269–1278. doi: 10.1109/TVCG.2015.2459892
    [49] Johnson LG, Edwards P and Hawkes D (2003) Surface transparency makes stereo overlays unpredictable: the implications for augmented reality. Studies in health technology and informatics 94: 131–136.
    [50] Jacobs K and Loscos C (2006) Classification of illumination methods for mixed reality. Computer Graphics Forum 25: 29–51. doi: 10.1111/j.1467-8659.2006.00816.x
    [51] Julier S, Lanzagorta M, Baillot Y, et al. (2000) Information filtering for mobile augmented reality. In Augmented Reality, 2000. (ISAR 2000). Proceedings. IEEE and ACM International Symposium on, pp. 3–11, IEEE.
    [52] Jones JA, Swan II JE, Singh G, et al. (2008) The effects of virtual reality, augmented reality, and motion parallax on egocentric depth perception. In Proceedings of the 5th symposium on Applied perception in graphics and visualization, pp. 9–14, ACM.
    [53] Jerome C and Witmer B (2005) The perception and estimation of egocentric distance in real and augmented reality environments. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 49, pp. 2249–2252. Sage CA: Los Angeles, CA: SAGE Publications.
    [54] Kalkofen D, Mendez E and Schmalstieg D (2007) Interactive focus and context visualization for augmented reality. In Proceedings of the 2007 6th IEEE and ACM International Symposium on Mixed and Augmented Reality, pp. 1–10, IEEE Computer Society.
    [55] King GR, Piekarski W and Thomas BH (2005) Arvino-outdoor augmented reality visualisation of viticulture gis data. In Mixed and Augmented Reality, 2005. Proceedings. Fourth IEEE and ACM International Symposium on, pp. 52–55, IEEE.
    [56] Kruijff E, Swan JE and Feiner S (2010) Perceptual issues in augmented reality revisited. In Proceedings of the 2010 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 3–12, IEEE.
    [57] Knöpfle C, Weidenhausen J, Chauvigné L, et al. (2005) Template based authoring for ar based service scenarios. In IEEE Proceedings. VR 2005. Virtual Reality, 2005, pp. 249–252, IEEE.
    [58] Livingston MA, Ai Z and Decker JW (2009) A user study towards understanding stereo perception in head-worn augmented reality displays. In Proceedings of the 8th IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 53–56, IEEE.
    [59] Livingston MA, Barrow JH and Sibley CM (2009) Quantification of contrast sensitivity and color perception using head-worn augmented reality displays. In Virtual Reality Conference, 2009. VR 2009. IEEE, pp. 115–122, IEEE.
    [60] Lerotic M, Chung AJ, Mylonas G, et al. (2007) Pq-space based non-photorealistic rendering for augmented reality. In International Conference on Medical Image Computing and Computer- Assisted Intervention, pp. 102–109, Springer.
    [61] Livingston MA, Garrett WF, Hirota G, et al. (1996) Technologies for augmented reality systems: Realizing ultrasound-guided needle biopsies. In Proceedings of the 23rd annual conference on computer graphics and interactive techniques, pp. 439–446, ACM.
    [62] Livingston MA, Gabbard JL, Swan II JE, et al. (2013) Basic perception in head-worn augmented reality displays. In Human factors in augmented reality environments, pp. 35–65, Springer.
    [63] Livingston MA (2006) Quantification of visual capabilities using augmented reality displays. In Proceedings of the 2006 IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 3–12, IEEE.
    [64] Livingston MA, Swan II JE, Gabbard JL, et al. (2003) Resolving multiple occluded layers in augmented reality. In Proceedings of the 2nd IEEE/ACM International Symposium on Mixed and Augmented Reality, pp. 56–65, IEEE.
    [65] Leykin A and Tuceryan M (2004) Automatic determination of text readability over textured backgrounds for augmented reality systems. In Proceedings of the 3rd IEEE/ACM International Symposium on Mixed and Augmented Reality, pp. 224–230, IEEE.
    [66] MacIntyre B and Coelho EM (2000) Adapting to dynamic registration errors using level of error (loe) filtering. In Augmented Reality, 2000.(ISAR 2000). Proceedings. IEEE and ACM International Symposium on, pp. 85–88, IEEE.
    [67] Müller T and Dauenhauer R (2016) A taxonomy for information linking in augmented reality. In International Conference on Augmented Reality, Virtual Reality and Computer Graphics, pp. 368–387, Springer.
    [68] Marner MR, Irlitti A and Thomas BH (2013) Improving procedural task performance with augmented reality annotations. In Proceedings of the 12th IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 39–48, IEEE.
    [69] Müller T and Rieger T (2015) Arpml: The augmented reality process modeling language. In of the 14th IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 160–163, IEEE.
    [70] Madsen JB, Tatzqern M, Madsen CB, et al. (2016) Temporal coherence strategies for augmented reality labeling. IEEE T Vis Comput Gr 22: 1415–1423. doi: 10.1109/TVCG.2016.2518318
    [71] Müller T (2015) Towards a framework for information presentation in augmented reality for the support of procedural tasks. In International Conference on Augmented and Virtual Reality, pp. 490–497, Springer.
    [72] Milgram P, Zhai S, Drascic D, et al. (1993) Applications of augmented reality for humanrobot communication. In Intelligent Robots and Systems' 93, IROS'93. Proceedings of the 1993 IEEE/RSJ International Conference on, Vol. 3, pp. 1467–1472, IEEE.
    [73] Ng A, Lepinski J, Wigdor D, et al. (2012) Designing for low-latency direct-touch input. In Proceedings of the 25th annual ACM symposium on User interface software and technology, pp. 453–464, ACM.
    [74] Neumann U and Majoros A (1998) Cognitive, performance, and systems issues for augmented reality applications in manufacturing and maintenance. In Virtual Reality Annual International Symposium, 1998. Proceedings., IEEE 1998, pp. 4–11, IEEE.
    [75] Peterson SD, Axholt M, Cooper M, et al. (2009) Visual clutter management in augmented reality: Effects of three label separation methods on spatial judgments. In 3D User Interfaces, 2009. 3DUI 2009. IEEE Symposium on, pp. 111–118, IEEE.
    [76] Peterson S, Axholt M and Ellis SR (2008) Managing visual clutter: A generalized technique for label segregation using stereoscopic disparity. In Virtual Reality Conference, 2008. VR'08. IEEE, pp. 169–176, IEEE.
    [77] Peterson SD, Axholt M and Ellis SR (2008) Label segregation by remapping stereoscopic depth in far-field augmented reality. In Proceedings of the 7th IEEE/ACM International Symposium on Mixed and Augmented Reality, pp. 143–152, IEEE.
    [78] Polys NF, Bowman DA and North C (2011) The role of depth and gestalt cues in information-rich virtual environments. International Journal of Human-computer Studies 69: 30–51. doi: 10.1016/j.ijhcs.2010.05.007
    [79] Polys NF, Kim S and Bowman DA (2007) Effects of information layout, screen size, and field of view on user performance in information-rich virtual environments. Comput Animat Virt W 18: 19–38. doi: 10.1002/cav.159
    [80] Pöppel E (1997) A hierarchical model of temporal perception. Trends Cogn Sci 1: 56–61. doi: 10.1016/S1364-6613(97)01008-5
    [81] Robertson CM, MacIntyre B and Walker BN (2008) An evaluation of graphical context when the graphics are outside of the task area. In Proceedings of the 7th IEEE/ACM International Symposium on Mixed and Augmented Reality, pp. 73–76, IEEE.
    [82] Robertson CM, MacIntyre B andWalker BN (2009) An evaluation of graphical context as a means for ameliorating the effects of registration error. IEEE T Vis Comput Gr 15: 179–192. doi: 10.1109/TVCG.2008.100
    [83] Rosten E, Reitmayr G and Drummond T (2005) Real-time video annotations for augmented reality. International Symposium on Visual Computing, pp. 294–302, Springer, Berlin, Heidelberg.
    [84] Smallman HS and Boynton RM (1993) On the usefulness of basic colour coding in an information display. Displays 14: 158–165. doi: 10.1016/0141-9382(93)90037-6
    [85] Sielhorst T, Bichlmeier C, Heining SM, et al. (2006) Depth perception–a major issue in medical ar: evaluation study by twenty surgeons. In International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 364–372, Springer.
    [86] Sandor C, Cunningham A, Dey A, et al. (2010) An augmented reality x-ray system based on visual saliency. In Proceedings of the 9th IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 27–36, IEEE.
    [87] Schnabel MA (2009) Framing mixed realities. In Mixed Reality In Architecture, Design And Construction, pp. 3–11, Springer.
    [88] Sandor C, Dey A, Cunningham A, et al. (2010) Egocentric space-distorting visualizations for rapid environment exploration in mobile mixed reality. In Virtual Reality Conference (VR), 2010 IEEE, pp. 47–50, IEEE.
    [89] Syberfeldt A, Danielsson O, Holm M, et al. (2015) Visual assembling guidance using augmented reality. Procedia Manufacturing 1: 98–109. doi: 10.1016/j.promfg.2015.09.068
    [90] Stanimirovic D, Damasky N, Webel S, et al. (2014) A mobile augmented reality system to assist auto mechanics. In Proceedings of the 13th IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 305–306, IEEE.
    [91] Schinke T, Henze N and Boll S (2010) Visualization of off-screen objects in mobile augmented reality. In Proceedings of the 12th international conference on Human computer interaction with mobile devices and services, pp. 313–316, ACM.
    [92] Swan JE, Jones A, Kolstad E, et al. (2007) Egocentric depth judgments in optical, see-through augmented reality. IEEE T Vis Comput Gr 13: 429–442. doi: 10.1109/TVCG.2007.1035
    [93] Schwerdtfeger B and Klinker G (2008) Supporting order picking with augmented reality. In Proceedings of the 7th IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 91–94, IEEE.
    [94] Sugano N, Kato H and Tachibana K ((2003) The effects of shadow representation of virtual objects in augmented reality. In Proceedings of the second IEEE International Symposium on Mixed and Augmented Reality (ISMAR), pp. 76–83, IEEE.
    [95] Shibata F, Nakamoto H, Sasaki R, et al. (2008) A view management method for mobile mixed reality systems. In IPT/EGVE, pp. 17–24.
    [96] Stock I andWeber M (2006) Authoring technical documentation using a generic document model. In Proceedings of the 24th Annual ACM International Conference on Design of Communication, SIGDOC '06, pp. 172–179, ACM.
    [97] Thanedar V and Höllerer T (2004) Semi-automated placement of annotations in videos. Univ California, Santa Barbara, CA, USA, Tech Rep 11.
    [98] Tang A, Owen C, Biocca F, et al. (2003) Comparative effectiveness of augmented reality in object assembly. In Proceedings of the SIGCHI conference on Human factors in computing systems, pp. 73–80, ACM.
    [99] Tönnis M, Plecher DA and Klinker G (2013) Representing information–classifying the augmented reality presentation space. Computers & Graphics 37: 997–1011.
    [100] Tümler J Dissertation: Untersuchungen zu nutzerbezogenen und technischen aspekten beim langzeiteinsatz mobiler augmented reality systeme in industriellen anwendungen.
    [101] Vincent T, Nigay L and Kurata T (2012) Classifying handheld augmented reality: Three categories linked by spatial mappings. In Workshop on Classifying the AR Presentation Space at ISMAR 2012.
    [102] Webel S, Bockholt U, Engelke T, et al. (2011) Augmented reality training for assembly and maintenance skills. In BIO web of conferences, Vol. 1, p. 97, EDP Sciences.
    [103] Webel S, Bockholt U, Engelke T, et al. (2013) An augmented reality training platform for assembly and maintenance skills. Robot Auton Syst 61: 398–403. doi: 10.1016/j.robot.2012.09.013
    [104] Webel S, Bockholt U and Keil J (2011) Design criteria for ar-based training of maintenance and assembly tasks. In International Conference on Virtual and Mixed Reality, pp. 123–132, Springer.
    [105] Wither J, DiVerdi S and Höllerer T (2009) Annotation in outdoor augmented reality. Computers & Graphics 33: 679–689.
    [106] Yeh M and Wickens CD (2000) Attention and trust biases in the design of augmented reality displays. Technical report, Aviation Research Lab, University of Illinois, Urbana-Champaign, Savoy, Illinois.
  • This article has been cited by:

    1. Fahad Sabah, Yuwen Chen, Zhen Yang, Muhammad Azam, Nadeem Ahmad, Raheem Sarwar, Model optimization techniques in personalized federated learning: A survey, 2024, 243, 09574174, 122874, 10.1016/j.eswa.2023.122874
    2. Muhammad Firdaus, Kyung-Hyune Rhee, 2023, Towards Trustworthy Collaborative Healthcare Data Sharing, 979-8-3503-3748-8, 4059, 10.1109/BIBM58861.2023.10385319
    3. Meriem Arbaoui, Mohamed-el-Amine Brahmia, Abdellatif Rahmoun, Mourad Zghal, Federated Learning Survey: A Multi-Level Taxonomy of Aggregation Techniques, Experimental Insights, and Future Frontiers, 2024, 2157-6904, 10.1145/3678182
    4. Fahad Sabah, Yuwen Chen, Zhen Yang, Abdul Raheem, Muhammad Azam, Nadeem Ahmad, Raheem Sarwar, FairDPFL-SCS: Fair Dynamic Personalized Federated Learning with strategic client selection for improved accuracy and fairness, 2025, 115, 15662535, 102756, 10.1016/j.inffus.2024.102756
    5. Jong Hyuk Park, Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities, 2024, 21, 1551-0018, 7012, 10.3934/mbe.2024307
    6. Saprunov Vadim, Muhammad Firdaus, Kyung-Hyune Rhee, Privacy-Preserving Decentralized Biometric Identity Verification in Car-Sharing System, 2024, 11, 2383-7632, 17, 10.33851/JMIS.2024.11.1.17
    7. Qian Zhuohao, Muhammad Firdaus, Siwan Noh, Kyung-Hyune Rhee, A Blockchain-Based Auditable Semi-Asynchronous Federated Learning for Heterogeneous Clients, 2023, 11, 2169-3536, 133394, 10.1109/ACCESS.2023.3335603
    8. Fahad Sabah, Yuwen Chen, Zhen Yang, Abdul Raheem, Muhammad Azam, Nadeem Ahmad, Raheem Sarwar, Communication optimization techniques in Personalized Federated Learning: Applications, challenges and future directions, 2025, 117, 15662535, 102834, 10.1016/j.inffus.2024.102834
  • Reader Comments
  • © 2019 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(7069) PDF downloads(1763) Cited by(9)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog