{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:15:30Z","timestamp":1761664530719},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T00:00:00Z","timestamp":1678060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Building Information Modeling) makes full use of cutting-edge theories and technologies in many domains such as health, environment, and information technology to provide a new way for engineers to design and build various healthy and green buildings. Specifically, sensors are playing an important role in achieving smart building goals by monitoring the surroundings of buildings, objects and people with the help of cloud computing technology. In addition, it is necessary to quickly determine the optimal sensor placement to save energy and minimize the number of sensors for a building, which is a de-trial task for the cloud platform due to the limited number of sensors available and massive candidate locations for each sensor. In this paper, we propose a Fast Sensor Placement Location Optimization approach (FSPLO) to solve the BIM problem in cloud-aided smart buildings. In particular, we quickly filter out the repeated candidate locations of sensors in FSPLO using Locality Sensitive Hashing (LSH) techniques to maintain only a small number of optimized locations for deploying sensors around buildings. In this way, we can significantly reduce the number of sensors used for health and green buildings. Finally, a set of simulation experiments demonstrates the excellent performance of our proposed FSPLO method.<\/jats:p>","DOI":"10.1186\/s13677-023-00410-0","type":"journal-article","created":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T20:02:26Z","timestamp":1678132946000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings"],"prefix":"10.1186","volume":"12","author":[{"given":"Min","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chengmin","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Xiaoran","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Huaizhen","family":"Kou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,6]]},"reference":[{"key":"410_CR1","doi-asserted-by":"publisher","unstructured":"Liu X, Gao A, Chen Cea (2023) Lightweight similarity checking for english literatures in mobile edge computing. J Cloud Comput 12(3). https:\/\/doi.org\/10.1186\/s13677-022-00384-5.","DOI":"10.1186\/s13677-022-00384-5"},{"key":"410_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3181136","author":"L Qi","year":"2022","unstructured":"Qi L, Liu Y, Zhang Y, Xu X, Bilal M, Song H (2022) Privacy-aware point-of-interest category recommendation in internet of things. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2022.3181136","journal-title":"IEEE Internet Things J"},{"key":"410_CR3","doi-asserted-by":"publisher","unstructured":"Zhao J, Wang W, Wang Dea (2022) Pmhe: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing. J Cloud Comput 11(96). https:\/\/doi.org\/10.1186\/s13677-022-00373-8.","DOI":"10.1186\/s13677-022-00373-8"},{"key":"410_CR4","doi-asserted-by":"publisher","unstructured":"Ilyas A, Alatawi M, Hamid Yea (2022) Software architecture for pervasive critical health monitoring system using fog computing. J Cloud Comput 11(84). https:\/\/doi.org\/10.1186\/s13677-022-00371-w.","DOI":"10.1186\/s13677-022-00371-w"},{"issue":"9","key":"410_CR5","doi-asserted-by":"publisher","first-page":"2427","DOI":"10.1109\/TMM.2018.2796246","volume":"20","author":"Y Li","year":"2018","unstructured":"Li Y, Liu J, Cao B, Wang C (2018) Joint optimization of radio and virtual machine resources with uncertain user demands in mobile cloud computing. IEEE Trans Multimedia 20(9):2427\u20132438","journal-title":"IEEE Trans Multimedia"},{"issue":"3","key":"410_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3447032","volume":"17","author":"X Xu","year":"2021","unstructured":"Xu X, Fang Z, Zhang J, He Q, Yu D, Qi L, Dou W (2021) Edge content caching with deep spatiotemporal residual network for iov in smart city. ACM Trans Sens Netw 17(3):1\u201333","journal-title":"ACM Trans Sens Netw"},{"key":"410_CR7","doi-asserted-by":"publisher","unstructured":"Gu R, Zhang K, Xu Z, Che Y, Fan B, Hou H, Dai H, Yi L, Ding Y, Chen G, et\u00a0al (2022) Fluid: Dataset abstraction and elastic acceleration for cloud-native deep learning training jobs. In: 2022 IEEE 38th International Conference on Data Engineering (ICDE), IEEE, pp 2182\u20132195. https:\/\/doi.org\/10.1109\/ICDE53745.2022.00209","DOI":"10.1109\/ICDE53745.2022.00209"},{"issue":"3","key":"410_CR8","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TSE.2017.2681667","volume":"44","author":"Y Wang","year":"2017","unstructured":"Wang Y, He Q, Ye D, Yang Y (2017) Formulating criticality-based cost-effective fault tolerance strategies for multi-tenant service-based systems. IEEE Trans Softw Eng 44(3):291\u2013307","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"410_CR9","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TPDS.2019.2938944","volume":"31","author":"Q He","year":"2019","unstructured":"He Q, Cui G, Zhang X, Chen F, Deng S, Jin H, Li Y, Yang Y (2019) A game-theoretical approach for user allocation in edge computing environment. IEEE Trans Parallel Distrib Syst 31(3):515\u2013529","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"8","key":"410_CR10","doi-asserted-by":"publisher","first-page":"5790","DOI":"10.1109\/TII.2020.3047675","volume":"17","author":"X Zhou","year":"2020","unstructured":"Zhou X, Liang W, Shimizu S, Ma J, Jin Q (2020) Siamese neural network based few-shot learning for anomaly detection in industrial cyber-physical systems. IEEE Trans Ind Inform 17(8):5790\u20135798","journal-title":"IEEE Trans Ind Inform"},{"issue":"16","key":"410_CR11","doi-asserted-by":"publisher","first-page":"12588","DOI":"10.1109\/JIOT.2021.3077449","volume":"8","author":"X Zhou","year":"2021","unstructured":"Zhou X, Xu X, Liang W, Zeng Z, Yan Z (2021) Deep-learning-enhanced multitarget detection for end-edge-cloud surveillance in smart iot. IEEE Internet Things J 8(16):12588\u201312596","journal-title":"IEEE Internet Things J"},{"key":"410_CR12","doi-asserted-by":"publisher","unstructured":"Lai P, He Q, Abdelrazek M, Chen F, Hosking J, Grundy J, Yang Y (2018) Optimal edge user allocation in edge computing with variable sized vector bin packing. In: International Conference on Service-Oriented Computing, Springer, pp 230\u2013245. https:\/\/doi.org\/10.1007\/978-3-030-03596-9_15","DOI":"10.1007\/978-3-030-03596-9_15"},{"issue":"2","key":"410_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3401979","volume":"17","author":"X Xu","year":"2021","unstructured":"Xu X, Fang Z, Qi L, Zhang X, He Q, Zhou X (2021) Tripres: Traffic flow prediction driven resource reservation for multimedia iov with edge computing. ACM Trans Multimed Comput Commun Appl (TOMM) 17(2):1\u201321","journal-title":"ACM Trans Multimed Comput Commun Appl (TOMM)"},{"issue":"5","key":"410_CR14","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.3390\/s18051381","volume":"18","author":"K Weekly","year":"2018","unstructured":"Weekly K, Jin M, Zou H, Hsu C, Soyza C, Bayen A, Spanos C (2018) Building-in-briefcase: A rapidly-deployable environmental sensor suite for the smart building. Sensors 18(5):1381","journal-title":"Sensors"},{"key":"410_CR15","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.enbuild.2018.08.039","volume":"179","author":"C Papatsimpa","year":"2018","unstructured":"Papatsimpa C, Linnartz J (2018) Propagating sensor uncertainty to better infer office occupancy in smart building control. Energy Build 179:73\u201382","journal-title":"Energy Build"},{"issue":"1","key":"410_CR16","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1080\/22348972.2018.1462608","volume":"8","author":"X Jin","year":"2018","unstructured":"Jin X, Wang G, Song Y, Sun C (2018) Smart building energy management based on network occupancy sensing. J Int Counc Electr Eng 8(1):30\u201336","journal-title":"J Int Counc Electr Eng"},{"key":"410_CR17","doi-asserted-by":"publisher","unstructured":"Aizpuru J, Jentsch R, \u0160ipeti\u0107 M, Zucker G (2020) Implementation of a virtual occupancy sensor for smart building support. J Facility Manag 1(20). https:\/\/doi.org\/10.34749\/jfm.2020.4571","DOI":"10.34749\/jfm.2020.4571"},{"key":"410_CR18","doi-asserted-by":"publisher","unstructured":"Brennan C, Taylor GW, Spachos P (2018) Distributed sensor network for indirect occupancy measurement in smart buildings. In: 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC), IEEE, pp 1290\u20131295. https:\/\/doi.org\/10.1109\/IWCMC.2018.8450386","DOI":"10.1109\/IWCMC.2018.8450386"},{"key":"410_CR19","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"AP Plageras","year":"2018","unstructured":"Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor big data collection-processing and analysis in smart buildings. Futur Gener Comput Syst 82:349\u2013357","journal-title":"Futur Gener Comput Syst"},{"key":"410_CR20","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.future.2020.08.014","volume":"114","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Pan J, Qi L, He Q (2021) Privacy-preserving quality prediction for edge-based iot services. Futur Gener Comput Syst 114:336\u2013348","journal-title":"Futur Gener Comput Syst"},{"key":"410_CR21","doi-asserted-by":"publisher","first-page":"95987","DOI":"10.1109\/ACCESS.2019.2929550","volume":"7","author":"K Zhang","year":"2019","unstructured":"Zhang K, Yang K, Li S, Jing D, Chen HB (2019) ANN-based outlier detection for wireless sensor networks in smart buildings. IEEE Access 7:95987\u201395997","journal-title":"IEEE Access"},{"issue":"4","key":"410_CR22","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1007\/s12083-019-00805-4","volume":"13","author":"S Famila","year":"2020","unstructured":"Famila S, Jawahar A, Sariga A, Shankar K (2020) Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments. Peer Peer Netw Applic 13(4):1071\u20131079","journal-title":"Peer Peer Netw Applic"},{"issue":"16","key":"410_CR23","doi-asserted-by":"publisher","first-page":"3127","DOI":"10.3390\/rs13163127","volume":"13","author":"R Rabiee","year":"2021","unstructured":"Rabiee R, Karlsson J (2021) Multi-bernoulli tracking approach for occupancy monitoring of smart buildings using low-resolution infrared sensor array. Remote Sens 13(16):3127","journal-title":"Remote Sens"},{"issue":"17","key":"410_CR24","doi-asserted-by":"publisher","first-page":"4717","DOI":"10.3390\/s20174717","volume":"20","author":"KRC Boni","year":"2020","unstructured":"Boni KRC, Xu L, Chen Z, Baddoo TD (2020) A security concept based on scaler distribution of a novel intrusion detection device for wireless sensor networks in a smart environment. Sensors 20(17):4717","journal-title":"Sensors"},{"key":"410_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3173053","author":"D Zhou","year":"2022","unstructured":"Zhou D, Xue X, Zhou Z (2022) Sle2: The improved social learning evolution model of cloud manufacturing service ecosystem. IEEE Trans Ind Inform. https:\/\/doi.org\/10.1109\/TII.2022.3173053","journal-title":"IEEE Trans Ind Inform"},{"issue":"3","key":"410_CR26","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/TETC.2020.3005610","volume":"9","author":"Y Xu","year":"2020","unstructured":"Xu Y, Zhang C, Wang G, Qin Z, Zeng Q (2020) A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans Emerg Top Comput 9(3):1421\u20131432","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"3","key":"410_CR27","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TSC.2018.2830773","volume":"14","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Cui G, Deng S, Chen F, Wang Y, He Q (2018) Efficient query of quality correlation for service composition. IEEE Trans Serv Comput 14(3):695\u2013709","journal-title":"IEEE Trans Serv Comput"},{"key":"410_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3136967","author":"H Dai","year":"2021","unstructured":"Dai H, Wang X, Lin X, Gu R, Shi S, Liu Y, Dou W, Chen G (2021) Placing wireless chargers with limited mobility. IEEE Trans Mob Comput. https:\/\/doi.org\/10.1109\/TMC.2021.3136967","journal-title":"IEEE Trans Mob Comput"},{"issue":"5","key":"410_CR29","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1109\/TSC.2019.2891517","volume":"14","author":"Y Zhang","year":"2019","unstructured":"Zhang Y, Wang K, He Q, Chen F, Deng S, Zheng Z, Yang Y (2019) Covering-based web service quality prediction via neighborhood-aware matrix factorization. IEEE Trans Serv Comput 14(5):1333\u20131344","journal-title":"IEEE Trans Serv Comput"},{"issue":"2","key":"410_CR30","first-page":"289","volume":"13","author":"Y Xu","year":"2019","unstructured":"Xu Y, Ren J, Zhang Y, Zhang C, Shen B, Zhang Y (2019) Blockchain empowered arbitrable data auditing scheme for network storage as a service. IEEE Trans Serv Comput 13(2):289\u2013300","journal-title":"IEEE Trans Serv Comput"},{"key":"410_CR31","doi-asserted-by":"publisher","unstructured":"Qi L, Yang Y, Zhou X, Rafique W, Ma J (2022) Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0. IEEE Trans Ind Inform 18(9):6503\u20136511. https:\/\/doi.org\/10.1109\/TII.2021.3139363","DOI":"10.1109\/TII.2021.3139363"},{"issue":"2","key":"410_CR32","doi-asserted-by":"publisher","first-page":"181","DOI":"10.23919\/ICN.2020.0014","volume":"1","author":"S Nath","year":"2020","unstructured":"Nath S, Wu J (2020) Deep reinforcement learning for dynamic computation offloading and resource allocation in cache-assisted mobile edge computing systems. Intell Converg Netw 1(2):181\u2013198","journal-title":"Intell Converg Netw"},{"issue":"1","key":"410_CR33","doi-asserted-by":"publisher","first-page":"66","DOI":"10.23919\/ICN.2020.0023","volume":"2","author":"B Hartpence","year":"2021","unstructured":"Hartpence B, Kwasinski A (2021) CNN and MLP neural network ensembles for packet classification and adversary defense. Intell Converg Netw 2(1):66\u201382","journal-title":"Intell Converg Netw"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00410-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-023-00410-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-023-00410-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,6]],"date-time":"2023-03-06T20:02:33Z","timestamp":1678132953000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-023-00410-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,6]]},"references-count":33,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["410"],"URL":"https:\/\/doi.org\/10.1186\/s13677-023-00410-0","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,3,6]]},"assertion":[{"value":"21 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 February 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"All authors agree on the submission and publication of this paper.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare that they have no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"31"}}