kumoh national institute of technology
Networked Systems Lab.

Alifia Putri Anantha, Philip Tobianto Daely, Jae-Min Lee, and Dong-Seong Kim, "Edge Computing-Based Anomaly Detection for Multi-Source Monitoring in Industrial Wireless Sensor Networks", ICTC 2020. (A)
By : Alifia Putri Anantha
Date : 2020-09-14
Views : 59

--------------- Reviews ------------------------------------

======= Review 1 =======

> *** Relevance: How well does the content fit the conference scope? Is this paper handling an important theme in this area?
Average (3)

> *** Completeness: Does this paper describe the problem clearly? Are the results of this paper reproducible via experiments (implementations, proofs)? How well is the result analysis done with the previous works? How clear is the paper's conclusion for the problem tackled?
Average (3)

> *** Originality: Does this paper include any novel approaches or new applications that have never been tried?
Good (4)

> *** Presentation: Are the title, abstract, and keywords appropriate? How proper is the organization and description method of this paper?
Good (4)

> *** Comments to authors: Please provide detailed comments to the authors.



> *** Recommendation: Please provide your overall recommendation on the acceptance of the paper. (Final acceptance decisions will also consider literal responses to the questions below.)
Accept (4)

======= Review 2 =======

> *** Relevance: How well does the content fit the conference scope? Is this paper handling an important theme in this area?
Excellent (5)

> *** Completeness: Does this paper describe the problem clearly? Are the results of this paper reproducible via experiments (implementations, proofs)? How well is the result analysis done with the previous works? How clear is the paper's conclusion for the problem tackled?
Average (3)

> *** Originality: Does this paper include any novel approaches or new applications that have never been tried?
Average (3)

> *** Presentation: Are the title, abstract, and keywords appropriate? How proper is the organization and description method of this paper?
Good (4)

> *** Comments to authors: Please provide detailed comments to the authors.

* Please give the algorithm of the multi-source anomaly detection.

* As an anomaly is detected. as shown in Figure 2, an early warning will be generated. Please specify where the early warning will be sent to.

* Please clearly describe how base stations conduct anomaly detection.

> *** Recommendation: Please provide your overall recommendation on the acceptance of the paper. (Final acceptance decisions will also consider literal responses to the questions below.)
Weak Accept (3)

======= Review 3 =======

> *** Relevance: How well does the content fit the conference scope? Is this paper handling an important theme in this area?
Good (4)

> *** Completeness: Does this paper describe the problem clearly? Are the results of this paper reproducible via experiments (implementations, proofs)? How well is the result analysis done with the previous works? How clear is the paper's conclusion for the problem tackled?
Good (4)

> *** Originality: Does this paper include any novel approaches or new applications that have never been tried?
Average (3)

> *** Presentation: Are the title, abstract, and keywords appropriate? How proper is the organization and description method of this paper?
Good (4)

> *** Comments to authors: Please provide detailed comments to the authors.

A timely topic has been investigated. However, the role of edge computing in this work should be detailed.

> *** Recommendation: Please provide your overall recommendation on the acceptance of the paper. (Final acceptance decisions will also consider literal responses to the questions below.)
Accept (4)