{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:49:12Z","timestamp":1774630152155,"version":"3.50.1"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"15","license":[{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T00:00:00Z","timestamp":1754006400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"EPSRC PETRAS","award":["EP\/S035362\/1"],"award-info":[{"award-number":["EP\/S035362\/1"]}]},{"name":"National Edge Al Hub for Real Data","award":["EP\/Y028813\/1"],"award-info":[{"award-number":["EP\/Y028813\/1"]}]},{"name":"GCHQ National Resilience Fellowship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,8,1]]},"DOI":"10.1109\/jiot.2025.3569780","type":"journal-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T13:33:30Z","timestamp":1747229610000},"page":"29696-29712","source":"Crossref","is-referenced-by-count":5,"title":["Real-Time Anomaly Detection for Industrial Robotic Arms Using Edge Computing"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4878-2326","authenticated-orcid":false,"given":"Hakan","family":"Kayan","sequence":"first","affiliation":[{"name":"Computer Science and Informatics Department, Cardiff University, Cardiff, U.K."}]},{"given":"Ryan","family":"Heartfield","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Kingston University, Kingston upon Thames, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3597-2646","authenticated-orcid":false,"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Computer Science and Informatics Department, Cardiff University, Cardiff, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0396-633X","authenticated-orcid":false,"given":"Pete","family":"Burnap","sequence":"additional","affiliation":[{"name":"Computer Science and Informatics Department, Cardiff University, Cardiff, U.K."}]},{"given":"Charith","family":"Perera","sequence":"additional","affiliation":[{"name":"Computer Science and Informatics Department, Cardiff University, Cardiff, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420093612"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpe.2019.01.004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42559-7_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3510410"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3203245"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011726"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3284387"},{"key":"ref10","first-page":"517","article-title":"MicroNets: Neural network architectures for deploying TinyML applications on commodity microcontrollers","volume-title":"Proc. Mach. Learn. Syst.","volume":"3","author":"Banbury"},{"key":"ref11","volume-title":"Tinyml: Machine Learning With Tensorflow Lite on Arduino and Ultra-Low-Power Microcontrollers","author":"Warden","year":"2019"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3670414"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-021-01862-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3264888.3264894"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3569477"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA48937.2020.9248409"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ROMAN.2017.8172400"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.06.039"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/METROI4.2019.8792860"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIA.2020.2975488"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2021.3100622"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1115\/MSEC2017-2782"},{"key":"ref23","article-title":"Anomaly detection in large-scale cloud systems: An industry case and dataset","author":"Islam","year":"2024","journal-title":"arXiv:2411.09047"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2200120"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.109486"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2021.103509"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100461"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.11.019"},{"key":"ref29","first-page":"1","article-title":"Bringing machine learning to the deepest IoT edge with TinyML as-a-service","volume":"11","author":"Doyu","year":"2020","journal-title":"IEEE IoT Newslett."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/s23042344"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08337-2_6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN52387.2021.9533927"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MetroInd4.0IoT51437.2021.9488546"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps50303.2020.9367584"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0749-3_52"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.21437\/Interspeech.2020-1864"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/HEALTHCOM49281.2021.9399005"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET51692.2021.9419472"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/drones5040127"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347881"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN55119.2022.9829675"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/s22103838"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIIC54071.2022.9722636"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2023.105964"},{"key":"ref45","article-title":"FastFlow: Unsupervised anomaly detection and localization via 2D normalizing flows","author":"Yu","year":"2021","journal-title":"arXiv:2111.07677"},{"key":"ref46","article-title":"Convolutional networks for images, speech, and time series","volume-title":"The Handbook of Brain Theory and Neural Networks","author":"LeCun","year":"1995"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-018-1378-3"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.3390\/s18041055"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2018.08.035"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993335"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSURV.2016.7486356"},{"key":"ref53","article-title":"Computational complexity evaluation of neural network applications in signal processing","author":"Freire","year":"2022","journal-title":"arXiv:2206.12191"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098021"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4470-8_46"},{"key":"ref56","article-title":"Edge impulse: An MLOps platform for tiny machine learning","author":"Hymel","year":"2022","journal-title":"arXiv:2212.03332"},{"key":"ref57","volume-title":"STMicroelectronics nanoedge AI","year":"2023"},{"key":"ref58","volume-title":"Euler angles","author":"Weisstein","year":"2009"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/PerComWorkshops56833.2023.10150354"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.923738"},{"key":"ref61","volume-title":"Netron","year":"2024"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22362-4_19"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11096042\/11004009.pdf?arnumber=11004009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T21:33:53Z","timestamp":1764711233000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11004009\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,1]]},"references-count":62,"journal-issue":{"issue":"15"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3569780","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,1]]}}}