Erkki Harjula

Erkki Harjula
University of Oulu · Centre for Wireless Communications (CWC)

Dr. (Tech)

About

96
Publications
76,808
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,339
Citations
Introduction
Additional affiliations
May 2000 - February 2016
University of Oulu
Position
  • Project Manager, Research Scientist

Publications

Publications (96)
Preprint
Full-text available
p>With the increasing connectivity of critical infrastructures through wireless technologies, the importance of edge computing is increasing many-folds. Edge computing has become an important phenomenon combining the strengths of distributed computing technologies with those of telecommunication technologies. Therefore, new technological breakthrou...
Preprint
Full-text available
p>With the increasing connectivity of critical infrastructures through wireless technologies, the importance of edge computing is increasing many-folds. Edge computing has become an important phenomenon combining the strengths of distributed computing technologies with those of telecommunication technologies. Therefore, new technological breakthrou...
Conference Paper
Full-text available
In the age of the Internet of Things (IoT) and the expanding computing continuum, it's crucial to manage and share resources at the edges of networks. This position paper presents a new concept known as 'semantic slicing'. This approach harnesses the power of artificial intelligence (AI), wireless networks, edge computing, and sensing technologies...
Article
Full-text available
Computational requirements for data processing at different stages of the radiology value chain are increasing. Cone beam computed tomography (CBCT) is a diagnostic imaging technique used in dental and extremity imaging, involving a highly demanding image reconstruction task. In turn, artificial intelligence (AI) assisted diagnostics are becoming i...
Preprint
Full-text available
p>In this article, the emerging security challenges in communications of technologies of Industry X are identified, discussed, and evaluated to motivate future research in this direction.</p
Preprint
Full-text available
p>In this article, the emerging security challenges in communications of technologies of Industry X are identified, discussed, and evaluated to motivate future research in this direction.</p
Conference Paper
Full-text available
Diagnostic imaging produces more data than ever for clinical decision-making, while related artificial intelligence (AI) solutions impose high demands for computational platforms. These challenges do not only concern diagnostic imaging, but also the healthcare digitalization in general. Cloud computing, a prominent technology to deal with the growi...
Article
Full-text available
Efficient resource usage in edge computing requires clever allocation of the workload of application components. In this paper, we show that under certain circumstances, the number of superfluous workload reallocations from one edge server to another may grow to a significant proportion of all user tasks—a phenomenon we present as a reallocation st...
Conference Paper
Full-text available
Secure and intelligent environments are crucial for fostering future IoT applications such as digital healthcare and Industry 4.0. Such smart environments must enable needed digital services to the respective users ubiquitously and fulfill critical requirements such as ensuring security, privacy, and low latency. This paper summarizes the dissertat...
Article
Full-text available
The novel concept of Factory-as-a-Service (FaaS) allows the agility of adapting the manufacturing process by identifying the industry's supply chain and user requirements. To cater to FaaS, flexibility in networking and cloud services is a must. 5G network slice broker is a third-party mediator that caters to networking resource demand from clients...
Article
Full-text available
According to World Health Organization (WHO), the worldwide prevalence of chronic diseases increases fast and new threats, such as Covid-19 pandemic, continue to emerge, while the aging population continues decaying the dependency ratio. These challenges will cause a huge pressure on the efficacy and cost-efficiency of healthcare systems worldwide....
Preprint
Full-text available
This article surveys the latest developments in the technological landscape that enables remote health care. First, the most important technologies that are crucial for remote health care such as 5G, medical IoT, big data analytics, machine learning, and distributed ledger technologies, etc., are outlined, and then a thorough survey on those techno...
Preprint
Full-text available
This article surveys the latest developments in the technological landscape that enables remote health care. First, the most important technologies that are crucial for remote health care such as 5G, medical IoT, big data analytics, machine learning, and distributed ledger technologies, etc., are outlined, and then a thorough survey on those techno...
Article
Full-text available
Remote health care is currently one of the most promising solutions to ensure a high level of treatment outcome, cost-efficiency and sustainability of the healthcare systems worldwide. Even though research on remote health care can be traced back to the early days of the Internet, the recent COVID-19 has necessitated further improvement in existing...
Article
Full-text available
italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Edge Intelligence (EI) is an emerging computing and communication paradigm that enables Artificial Intelligence (AI) functionality at the network edge. In this article, we highlight EI as an emerging and important field of research, discuss the state o...
Article
Full-text available
5G enables the use of different types of services over the same physical infrastructure through the concepts and technologies of virtualization, softwarization, network slicing and cloud computing. Mobile Virtual Network Operators (MVNOs), using these concepts, provide an opportunity to share the same physical infrastructure among multiple operator...
Article
Full-text available
Effective, long-lasting Industrial IoT (IIoT) solutions start with short-term gains and progressively mature with added capabilities and value. The heterogeneous nature of IIoT devices and services suggests frequent changes in resource requirements for different services, applications, and use cases. With such unpredictability, resource orchestrati...
Article
Full-text available
Edge Computing is a novel computing paradigm moving server resources closer to end-devices. In the context of IoT, Edge Computing is a centric technology for enabling reliable, context-aware and low-latency services for several application areas such as smart healthcare, smart industry and smart cities. In our previous work, we have proposed a thre...
Conference Paper
Full-text available
Efficient service placement and workload allocation methods are necessary enablers for the actively studied topic of edge computing. In this paper, we show that under certain circumstances, the number of superfluous workload reallocations from one edge server to another may grow to a significant proportion of all user tasks – a phenomenon we presen...
Article
Full-text available
Multi-access Edge Computing (MEC) is recognised as a solution in future networks to offload computation and data storage from mobile and IoT devices to the servers at the edge of mobile networks. It reduces the network traffic and service latency compared to passing all data to cloud data centers while offering greater processing power than handlin...
Article
Full-text available
The rapid evolution of technology allows the healthcare sector to adopt intelligent, context-aware, secure, and ubiquitous healthcare services. Together with the global trend of an aging population, it has become highly important to propose value-creating, yet cost-efficient digital solutions for healthcare systems. These solutions should provide e...
Article
Full-text available
The deployment of edge computing infrastructure requires a careful placement of the edge servers, with an aim to improve application latencies and reduce data transfer load in opportunistic Internet of Things systems. In the edge server placement, it is important to consider computing capacity, available deployment budget, and hardware requirements...
Preprint
Full-text available
The rapid technology evolution allows the healthcare sector to adopt intelligent, context-aware, secure and ubiquitous healthcare services. Together with the global trend of aging population, it has become highly important to propose value-creating yet cost-efficient digital solutions to healthcare systems. These solutions should provide effective...
Chapter
The evolution from local toward virtualized data storage, computing, applications and services – in the forms of Internet of Things (IoT), Everything as a Service (EaaS), and Cloud computing – has changed the way of delivering digital services for consumers and businesses. These technologies have brought clear benefits over traditional systems, suc...
Article
Full-text available
With the rise of the Industrial Internet of Things (IIoT), there is an intense pressure on resource and performance optimization leveraging on existing technologies, such as Software Defined Networking (SDN), edge computing, and container orchestration. Industry 4.0 emphasizes the importance of lean and efficient operations for sustainable manufact...
Article
Full-text available
The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regard in different types of networks and networking technologies to meet the requirements of future comm...
Conference Paper
Full-text available
Software Defined Networking (SDN) has emerged as the most viable programmable network architecture to solve many challenges in legacy networks. SDN separates the network control plane from the data forwarding plane and logically centralizes the network control plane. The logically centralized control improves network management through global visib...
Article
Full-text available
Industry 4.0 has promised to bring new digital ecosystem for various key industrial applications in terms of providing secure, intelligent, autonomous and self-adaptive industrial IoT (IIoT) networks. Such industrial systems will be relatively more complex because of the involvement of the vast number of the heterogeneous sensors/devices and divers...
Preprint
The Internet of Things (IoT), hailed as the enabler of the next industrial revolution, will require ubiquitous connectivity, context-aware and dynamic service mobility, and extreme security through the wireless network infrastructure. Artificial Intelligence (AI), thus, will play a major role in the underlying network infrastructure. However, a num...
Article
Full-text available
The Internet of Things (IoT), hailed as the enabler of the next industrial revolution, will require ubiquitous connec-tivity, context-aware and dynamic service mobility, and extreme security through the wireless network infrastructure. Artificial Intelligence (AI), thus, will play a major role in the underlying network infrastructure. However, a nu...
Conference Paper
Full-text available
The recent IoT applications set strict requirements in terms of latency, scalability, security and privacy. The current IoT systems, where computation is done at data centers, provide typically very high computational and storage capacity but long routes between computational capacity and sensors/actuators make them unsuitable for latency-critical...
Conference Paper
Full-text available
Edge computing is a novel computing paradigm moving server resources closer to end-devices. It helps unleashing the full potential of high-performance access networks with respect to ultra-low latency and transfer rate and improve resilience to problems at core networks and data centers. Multiaccess Edge Computing (MEC), is a standard solution by E...
Conference Paper
Full-text available
Internet of Things (IoT), together with fifth-generation (5G) mobile systems and related enabling communication technologies, constantly contributing for the enhancement in various industrial applications and driving towards the vision of complete industrial automation. In this context, both Blockchain and Edge computing are considered as promising...
Technical Report
Full-text available
As fifth generation (5G) research is maturing towards a global standard, the research community must focus on the development of beyond-5G solutions and the 2030 era, i.e. 6G. It is not clear yet what 6G will entail. It will include relevant technologies considered too immature for 5G or which are outside the defined scope of 5G. This white pape...
Book
Full-text available
As fifth generation (5G) research is maturing towards a global standard, the research community has started to focus on the development of beyond-5G solutions and the 2030 era, i.e. 6G. In the future, our society will be increasingly digitised, hyper-connected and globally data driven. Many widely anticipated future services will be critically depe...
Article
Full-text available
In the envisioned ubiquitous world, services will follow users as they move across smart surroundings. Services are instantiated to users through the environment, appearing and disappearing as they move, which reduces the need for personal communication devices such as smartphones or tablets. To facilitate this development, service architectures ne...
Preprint
Full-text available
Edge computing in the Internet of Things brings applications and content closer to the users by introducing an additional computational layer at the network infrastructure, between cloud and the resource-constrained data producing devices and user equipment. This way, the opportunistic nature of the operational environment is addressed by introduci...
Preprint
Full-text available
Multi-Access Edge Computing (MEC) is a key enabling technology for Fifth Generation (5G) mobile networks. MEC facilitates distributed cloud computing capabilities and information technology service environment for applications and services at the edges of mobile networks. This architectural modification serves to reduce congestion, latency, and imp...
Conference Paper
Full-text available
Edge and fog computing, prominent parts of the up-coming 5G mobile networks and future 6G technologies, promise to reduce applications' latencies, improve controls on privacy, and reduce network bandwidth usage. The promises are delivered by pulling computations from the remote cloud to close to the devices, where data is generated and applications...
Conference Paper
Full-text available
Edge computing, a key part of the upcoming 5G mobile networks and future 6G technologies, promises to distribute cloud applications while providing more bandwidth and reducing latencies [1]. The promises are delivered by moving application-specific computations between the cloud, the data producing devices, and the network infrastructure components...
Article
Full-text available
With the recent advancements in sensor and communication technologies, the world is facing a digital transition where nearby environments are intelligent enough to provide user-intended services without using any hand-held gadgets. This article proposes applying a three-tier communication and service architecture for such gadget-free environment, i...
Conference Paper
Full-text available
Blockchain is so far well-known for its potential applications in financial and banking sector. However, blockchain as a decentralized and distributed technology can be utilized as a powerful tool for immense daily life applications. Healthcare is one of the prominent applications area among others where blockchain is supposed to make a strong impa...
Article
Full-text available
Virtualization enabled by container-based technologies is a recently emerging concept in the integration of Internet of Things (IoT) and Cloud computing. Due of their lightweight nature, container-based virtualization tools improve manageability of Cloud-based IoT solutions by making it possible to update application software on the fly. Although d...
Article
Full-text available
Video surveillance is one of the promising applications of the Internet of Things (IoT) paradigm. We see heterogeneous deployment of sensor platforms in a multi-tier network architecture as key enabler for energy optimization of battery powered high-quality video surveillance applications. In this paper, we propose a heterogeneous Wireless Multimed...
Conference Paper
In this demo we present an energy efficient motion detection mechanism for a high-resolution wireless (battery powered) surveillance camera node. We use Raspberry Pi (RPi) as a camera sensor node to demonstrate two scenarios. In the first scenario, the RPi performs motion detection using Pyro-electric InfraRed (PIR) sensor, while in the latter we u...
Article
In this article, we propose an energy-aware load monitoring model, called e-Mon, for enabling energy-aware load balancing in Peer-to-Peer (P2P) systems. P2P is a scalable and self-organizing technology for utilizing computational resources of the end-user devices for the benefit of a computing system. In P2P systems, the need for fair balance of lo...
Research
Full-text available
draft-jimenez-distributed-resource-directory-00
Research
draft-jimenez-distributed-resource-directory-00
Conference Paper
Full-text available
With the introduction of novel standardized web technologies such as WebGL, 3D virtual environments (VEs) are making their way into the web. Concurrently, resource rich mobile devices, such as smartphones and tablets, have become the primary access medium for the web. This paper introduces a method called RADE that enables resource-aware P2P-assist...
Conference Paper
Full-text available
In this paper, we propose a novel architecture, called ADHT, that allows the participation of wireless and constrained-capacity M2M devices in a P2P overlay without compromising their battery life. The approach makes P2P-based networking feasible in scenarios where dedicated super-peer nodes are not available or not feasible to use, e.g. when all t...
Conference Paper
Full-text available
Augmented reality (AR) is a promising technology for building applications in an Internet of Things (IoT) environ-ment, utilized for visualizing information provided by IoT devices. In this paper, we enable Web-based mobile AR applications with mobile agents in a resource-oriented IoT system architecture. We present an adaptable mobile agent compos...
Chapter
Full-text available
We propose mobile agents for enabling interoperability and global intelligence with smart objects in the Internet of Things, with heterogeneous low-power resource-constrained devices where the systems span over disparate networks and protocols. As the Internet of Things systems are in continuous transition, requiring software adaptation and system...
Conference Paper
Full-text available
We demonstrate interoperable mobile agents for language- and platform-independent wireless sensor network programming, with low-power resource-constrained embedded devices as static nodes and Android-based smartphones as mobile nodes, over disparate networks: 6LoWPAN and Wi-Fi. Representational state transfer architectural principles are applied in...
Conference Paper
Full-text available
We demonstrate interoperable mobile agents to integrate Internet of Things and wireless sensor networks with resource-constrained low-power embedded networked devices. We introduce adaptable composition for the mobile agent, complying with the Representational State Transfer principles, which are then used for agent migration, controlling the agent...
Conference Paper
Full-text available
Abstract—Machine-to-Machine (M2M) communications emerge to achieve ubiquitous communications among all the devices. One challenging problem in M2M applications is to discover the resources provided by the devices efficiently. This challenge arises from two perspectives: (1) a large number of heterogeneous devices co-exist and most of them are const...
Data
Full-text available
The IP-based Internet of Things (IoT) stands for the universal interconnection of smart objects and back end users with the help of IP protocols. Secure key management among the smart objects is an important aspect of IoT security. Due to the high levels of resource constraints of the devices in terms of memory, battery capacity and CPU power, and...
Conference Paper
Full-text available
The Internet of Things presents the user with a novel means of communicating with the Web world through ubiquitous object-enabled networks. Cloud Computing enables a convenient, on demand and scalable network access to a shared pool of configurable computing resources. This paper mainly focuses on a common approach to integrate the Internet of Thin...
Article
Full-text available
Peer-to-Peer (P2P) networks are becoming eminent platforms for both distributed computing and interpersonal communication. Their role in contemporary multimedia content delivery and communication systems is strong, as witnessed by many popular applications and services. Groups in P2P systems can originate from the relations between humans, or they...
Article
Full-text available
Super-peer overlay provides an efficient way to run applications by exploring the heterogeneity of nodes in a Peer-to-Peer overlay network. Identifying nodes with high capacity as super-peers plays an important role in improving the performance of P2P applications, such as live streaming. In this paper, we present a super-peer selection algorithm (...