Showing 301 - 320 results of 418 for search '"edge computing"', query time: 0.06s Refine Results
  1. 301

    A model study of teaching method reform of computer laboratory course integrating internet of things technology. by Xiao Zhou, Ledan Qian, Haider Aziz, Marvin White

    Published 2024-01-01
    “…In addition, the service deployment method based on edge computing is proposed in this paper to obtain the best deployment strategy and reduce the latency of the algorithm. …”
    Get full text
    Article
  2. 302

    Intelligent Scheduling Method Supporting Stadium Sharing by Lei Fang

    Published 2021-01-01
    “…When using edge computing (EC) technology for service calculation, the mobile terminal needs to offload the service to the edge computing server. …”
    Get full text
    Article
  3. 303

    Joint optimization of transmission and edge offloading for energy-aware point cloud video streaming by LIU Wei, ZHU Yule, FU Chen, WANG Xi

    Published 2024-05-01
    “…To solve this problem, a point cloud video streaming transmission scheme assisted by mobile edge computing (MEC) was proposed, which offloaded part of computing tasks to the MEC server based on the access bandwidth and point cloud video content. …”
    Get full text
    Article
  4. 304

    Analysis and suggestions on the development of IoT technology by Wenke YU, Yuan CHENG, Fang LI, Qi ZHAO

    Published 2020-12-01
    “…The Internet of things (IoT) has been developing for a decade in China,which has rapidly evolved from the early sensor network technology,radio frequency identification (RFID) technology to the intelligent networking technology based on 5G.The Internet of everything is coming to our life.The application of IoT has also been gradually and comprehensively applied in from the area of financial IC card to the industry,government affairs,transportation,health care,education,and etc.The development of the IoT hot technologies represented by 5G and low-power wide-area network (LPWAN),and the deep integration of blockchain,edge computing and other technologies with the IoT,comprehensively promote the deep application of the IoT in the industry,which brings great development opportunities to all the industry.It was focused on the analysis of the status of 5G,IoT identification,edge computing,LPWAN,security technology,and etc.The development tendency of the IoT was also forecasted,and the corresponding policy suggestion to promote the development of IoT was put forward.…”
    Get full text
    Article
  5. 305

    Penerapan Machine Learning untuk Mengendalikan Parameter Budidaya Tanaman Hidroponik Berbasis Edge dan Cloud Computing by Helmy Helmy, Arif Nursyahid, Thomas Agung Setyawan

    Published 2024-08-01
    “…Dalam penelitian ini, pengendalian pH dan TDS menggunakan machine learning dengan metode regresi linear berganda serta teknologi edge computing dan cloud computing. Edge computing memungkinkan pemrosesan data real-time di perangkat sensor hidroponik, sedangkan cloud computing menyediakan kapasitas penyimpanan dan pemrosesan besar. …”
    Get full text
    Article
  6. 306

    Blockchain empowered 6G by Yueyue DAI, Ke ZHANG, Yan ZHANG

    Published 2020-03-01
    “…6G network not only explore higher communication rates but also combine with the emerging technologies such as cloud computing,edge computing,artificial intelligence,and big data,and use a new network architecture to achieve wider interconnection and interoperability across network and domains,and provide an intelligent,safe and efficient technical support for industrial Internet of things,smart cities,and intelligent transportation.Blockchain technology as a decentralized,open and transparent distributed ledger technology can provide strong security for 6G.The integration of blockchain technology and 6G network was studied.Firstly,the difference between 5G and 6G network and the challenges of 6G faced were given,and the research of blockchain technology in spectrum management,mobile edge computing and D2D communication was reviewed.Then,the integration of blockchain technology and 6G emerging network was explored.Thus,the technical challenges in terms of blockchain and the cloud-edge-device network,blockchain and federal learning,blockchain-based resource transactions,and lightweight blockchain for edge network were presented.The corresponding solutions were also given.…”
    Get full text
    Article
  7. 307

    Scalable Low Power Accelerator for Sparse Recurrent Neural Network by Panshi JIN, Junjie LI, Jingyi WANG, Pengchong LI, Lei XING, Xiaodong LI

    Published 2023-12-01
    “…The use of edge computing devices in bank outlets for passenger flow analysis, security protection, risk prevention and control is increasingly widespread, among which the performance and power consumption of AI reasoning chips have become a very important factor in the selection of edge computing devices.Aiming at the problems of recurrent neural network, such as high power consumption, weak reasoning performance and low energy efficiency, which were caused by data dependence and low data reusability, this paper realized a sparse RNN low-power accelerator with scalable voltage by using FPGA, and verifies it on the edge design and calculation equipment.Firstly, the sparse -RNN was analyzed and the processing array was designed by network compression.Secondly, due to the unbalanced workload of sparse RNN, it introduced voltage scaling method to maintain low power consumption and high throughput.Experiments show that this method could significantly improve the RNN reasoning speed of the system and reduce the processing power consumption of the chip.…”
    Get full text
    Article
  8. 308

    IoT in Urban Traffic Prediction Development Case Studies and Future Trends by Wang Renhe

    Published 2025-01-01
    “…Finally, the future research direction and development trends are put forward. First, edge computing is introduced into the IOT, and edge computing is mixed with cloud computing to obtain a prediction system with better performance and lower robustness. …”
    Get full text
    Article
  9. 309

    Ensuring Reliable Network Communication and Data Processing in Internet of Things Systems with Prediction-Based Resource Allocation by Weronika Symbor, Łukasz Falas

    Published 2025-01-01
    “…The proposed method was developed for scenarios utilizing edge computing, e.g., autonomous vehicle data exchange, which can be susceptible to periodic resource demand fluctuations related to typical rush hours, predictable with the proposed approach. …”
    Get full text
    Article
  10. 310

    A novel lightweight model for tea disease classification based on feature reuse and channel focus attention mechanism by Junjie Liang, Renjie Liang, Dongxia Wang

    Published 2025-01-01
    “…Since ViT models has a higher model complexity than CNN models, leading running slow on edge computing devices. In view of this, we propose a lightweight model named Lightweight Tea Diseases Detection Network (LTDDN). …”
    Get full text
    Article
  11. 311

    Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things by A. Sasikumar, Logesh Ravi, Malathi Devarajan, A. Selvalakshmi, Abdulaziz Turki Almaktoom, Abdulaziz S. Almazyad, Guojiang Xiong, Ali Wagdy Mohamed

    Published 2024-01-01
    “…Smart logistic products have dramatically changed due to the prevalence of decentralized edge computing and blockchain in the industry sector. …”
    Get full text
    Article
  12. 312

    Research and application of big data platform technology based on multi-centre collaborative computing by RUAN Yilong, XU Xueling, FA Hu, DONG Silun, JIANG Lei, YANG Lei, YAN Yuanyuan

    Published 2024-05-01
    “…At present, the cloud edge computing big data platform has been applied in a variety of application scenes. …”
    Get full text
    Article
  13. 313

    A New Multiple-Distribution GAN Model to Solve Complexity in End-to-End Chromosome Karyotyping by Yirui Wu, Xiao Tan, Tong Lu

    Published 2020-01-01
    “…With significant development of Internet of medical things (IoMT) and cloud-fog-edge computing, medical industry is now involving medical big data to improve quality of service in patient care. …”
    Get full text
    Article
  14. 314

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…In this study, we present EdgeGuard, a novel decentralized architecture that combines blockchain technology, federated learning, and edge computing to address those challenges and coordinate medical resources across IoMT networks. …”
    Get full text
    Article
  15. 315

    5G-based smart airport network security scheme design and security analysis by Xinxin XING, Qingya ZUO, Jianwei LIU

    Published 2023-10-01
    “…To meet the security requirements of smart airports, a 5G-based smart airport network security solution was proposed.The security characteristics and security requirements of the 5G scenario in smart airport were analyzed, and the pain points of security requirements in the current scenario were summarized in five aspects:unified security management and control, network slicing security, security monitoring and early warning, edge computing security, and IoT-aware node security.And then a 5G network security system was designed for smart airports.The functional components of this system included 5G network unified security management and control functions for ubiquitous networks, lightweight 5G network identity authentication and authentication functions, 5G network slice security protection for multi-service requirements, 5G network security monitoring and early warning based on big data analysis, integrated security protection function based on edge computing, and sensory node security protection function based on device behavior analysis.This comprehensive approach built an all-in-one security platform covering business encryption, network security, terminal trustworthiness, identity trustworthiness, and security management and control.Additionally, the potential counterfeit base station attacks in the existing 5G authentication and key agreement (AKA) were analyzed.Due to the lack of authenticity verification of the messages forwarded by the SN, the attacker can pretend to be the real SN to communicate with the UE and the HN, thus carrying out the base station masquerading attack.This kind of attack may lead to the leakage of smart airport network data, and encounter problems such as tampering and deception by opponents.Aiming at the network security requirements of smart airports and the security issues of 5G authentication and key agreement protocol, an improved 5G authentication and key agreement protocol was designed.Formal security models, security goal definitions, and analysis were performed to ensure the robustness and effectiveness of the protocol against attacks.…”
    Get full text
    Article
  16. 316

    Evaluation of the Cost of Intelligent Upgrades of Transportation Infrastructure for Intelligent Connected Vehicles by Zongwei Liu, Haokun Song, Hong Tan, Han Hao, Fuquan Zhao

    Published 2022-01-01
    “…The costs of RSUs, LIDARS, and edge computing servers as well as data transmission rate of 5G are key elements affecting the costs of intelligent upgrades of transportation infrastructure.…”
    Get full text
    Article
  17. 317

    A Comparison of Penguin Swarm Optimization Algorithms for Enhancing Network Throughput by Talha Akhtar, Najmi Ghani Haider, Nadeem Kafi Khan, Rashid Uddin

    Published 2024-12-01
    “…With its ability to deliver computing and storage resources at the network's edge, close to device terminals and users, edge computing is an evolving distributed computing approach well-suited for facilitating extensive management of smart devices in the future smart grid. …”
    Get full text
    Article
  18. 318

    Analysis and development suggestions of operators in the field of industrial internet identification analysis system by Yufei CUI, Yunyong ZHANG, Di ZHANG, Xiaoxia WANG, Siyu PAN, Kun LI

    Published 2020-02-01
    “…With the development of industrial internet technology,5G and edge computing,countries have put forward their own industrial Internet development strategies and construction of industrial Internet platform.Cloud edge collaborative industrial Internet platform is an important part of the development of industrial Internet.The way of industrial Internet cloud edge collaboration was introduced,the problems in the process of cloud edge collaboration were expounded,and practices were taken based on data collaboration and model collaboration.…”
    Get full text
    Article
  19. 319

    A solution for intelligent park based on 5G MEC by Xiaoli FENG, Chen LIU, Liwei ZHANG, Xiaoyun WANG

    Published 2022-05-01
    “…Beside the normal consumers, 5G will be applied in the industry manufacture, chemical industry, and power energy, etc.How to exploit the 5G, multi-access edge computing (MEC) and other technologies to satisfy the digital transformation of enterprise becomes a hot topic.Therefore, the 5G MEC-based intelligent park solution was proposed based on the different scenarios.Secure fixed and mobile connection with high bandwidth, and flexible computation infrastructure for applications was provided.Secondly, according to the various scenarios, the corresponding solution was presented.In addition, the detailed deployment scheme of the project was discussed for the future deployment.…”
    Get full text
    Article
  20. 320

    5G MEC system security capability deployment scheme by Yunyi LIU, Jianmin ZHANG, Xiaoli FENG, Liwei ZHANG

    Published 2022-11-01
    “…Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development.…”
    Get full text
    Article