Showing 321 - 340 results of 418 for search '"edge computing"', query time: 0.05s Refine Results
  1. 321

    Low-power edge detection based on ferroelectric field-effect transistor by Jiajia Chen, Jiacheng Xu, Jiani Gu, Bowen Chen, Hongrui Zhang, Haoji Qian, Huan Liu, Rongzong Shen, Gaobo Lin, Xiao Yu, Miaomiao Zhang, Yi’an Ding, Yan Liu, Jianshi Tang, Huaqiang Wu, Chengji Jin, Genquan Han

    Published 2025-01-01
    “…However, efficient edge detection is difficult in a resource-constrained environment, especially edge-computing hardware. Here, we report a low-power edge detection hardware system based on HfO2-based ferroelectric field-effect transistor, which is one of the most potential non-volatile memories for energy-efficient computing. …”
    Get full text
    Article
  2. 322

    Digital research and implementation of cloud-network planning of telecom operators by Xiaoming XIONG, Jing ZHAO

    Published 2022-11-01
    “…Based on the perspective of digital transformation of telecom operators, a data-driven cloud-network development planning system was proposed systematically, six key digital capabilities were built, and a cloud-network planning digital platform was designed and implemented, which could be used for scenarios such as fine planning of target networks, accurate prediction of edge computing, etc., and the application prospects of digital twins in the field of future cloud-network planning were discussed.The proposed system has guiding and reference significance for operators to promote cloud-network integration strategies and promote high-quality development.…”
    Get full text
    Article
  3. 323

    Convergence of telco cloud and bearer network based computing power network orchestration by Chang CAO, Shuai ZHANG, Ying LIU, Xiongyan TANG

    Published 2020-07-01
    “…Facing the combination of computing and network connection in the future network,and the development trend of computing and network integration,a computing power network orchestration model based on centralized and distributed control schemes was proposed.From the perspective of solution analysis,the computing power network orchestration scheme based on the convergence of telco cloud and bearer network can meet the future business needs of mobile edge computing (MEC) site better.With scheduling capabilities coordinated for both computing and networking,the network’s perception of services can be optimized.The specific choice of centralized or distributed control scheme is closely related to the operator’s telco cloud capabilities and the evolution stage of the bearer network.…”
    Get full text
    Article
  4. 324

    Review of 5Gmobile communication technology standard by Ying DU, Hao ZHU, Hongmei YANG, Zhiqin WANG, Yang XU

    Published 2018-08-01
    “…The industry is working togetheRto create 5G technology standard,which shouldmeet the needs ofmobile broadband and internet of things.Recently,3GPP declares the first 5G standard which supports the standalone deployment frozen.5G supports wider bandwidth,low latency,flexible configuration.New service-based architecture is designed for 5G,which supports important service capabilities,e.g.network slice,edge computing.5G standards were introduced,including new radio,new core and security.In the end,the trends of 5G standard were summarized.…”
    Get full text
    Article
  5. 325

    Development of visual surveillance standardization by Yuan ZHANG, Ning CAO, Doudou HU

    Published 2018-10-01
    “…The standardization of visual surveillance in major standard organizations both domestic and international was focused on,and the progress of the visual surveillance standards in ITU-T,ONVIF,IEC,ISO,PSIA,HDcctv,IEEE,3GPP,ETSI,TC100,CCSA,AVS and National Information Technical Standardization Committee was introduced.The latest development in standardization area such as visual surveillance systems,architecture,terminals,codecs,intelligent applications,big data applications,cloud storage,cloud computing,edge storage and edge computing were introduced.On this basis,the future research areas of product development and standardization of visual surveillance were discussed.The visual surveillance standardization roadmap was laid out,and the future visual surveillance standardization and research fields were proposed.…”
    Get full text
    Article
  6. 326

    Development of industrial internet platform and its security challenges by Rongrong JIANG, Zhengqiu WENG, Tieming CHEN

    Published 2020-03-01
    “…The deep integration of the internet and traditional industries promotes the rapid development of the industrial internet.Key factors such as digitization,networking,and intelligence have made the industrial internet platform a new infrastructure project,and new technologies like identification systems,edge computing,and digital twin have emerged.Industrial internet platforms also bring new security challenges (e.g.…”
    Get full text
    Article
  7. 327

    Enhanced-mobile ubiquitous smart environment——the super state of Internet of things by Ping ZHANG, Shilin LI, Zheng HU

    Published 2018-03-01
    “…Enhanced-mobile ubiquitous smart environment (E-MUSE) was proposed as the super state of Internet of things (IoT),which was also the evolution of mobile ubiquitous service environment (MUSE) in the epoch of IoT.E-MUSE is a mobile,ubiquitous and intelligent information environment that runs on 5G ubiquitous network and takes 5G technology as the core.The physical structure and connotation framework of E-MUSE were defined.Around IoT,cloud-fog-edge computing,artificial intelligence,etc.,the function of these new technologies in E-MUSE were discussed.Finally,some new application based on E-MUSE was discussed.…”
    Get full text
    Article
  8. 328

    Discussion on the common sense of the Internet of things by Yu SUN

    Published 2020-12-01
    “…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
    Get full text
    Article
  9. 329

    A survey on joint optimization of MEC caching and transcoding for video streaming by Jia LI, Renchao XIE, Qingmin JIA, Tao HUANG, Yunjie LIU, Li SUN

    Published 2018-08-01
    “…To deal with the huge challenges in futuremobile networks,the industry has proposed adaptive bit rate(ABR)technology andmobile edge computing(MEC),aiming to provide users with diverse services of high quality of experience,low latency and high bandwidth.Combining ABR and MEC to optimize the distribution of video content has been quite important for improving network performance and quality of experience.Especially,the joint optimization of network resources has arisen as an essential research topic.An overview of MEC was firstly given,and then the existing work in the industry on the joint optimization problem of MEC caching and transcoding oriented to adaptive streaming was analyzed and compared.Finally,the existing challenges in the future were summarized.…”
    Get full text
    Article
  10. 330

    Research on MEC traffic offloading scheme in 5G smart campus business scenarios by Ling LI, Hua WANG

    Published 2022-01-01
    “…MEC (multi-access edge computing) is one of the key technologies of 5G.Through the integration of communication and computing technologies, service localization and close deployment can be realized.At present, 5G smart campus has spawned many new application scenarios.The key step to construct the 5G smart campus is how to offload user data to the MEC platform to realize the deep integration of technology and business.Firstly, the overall architecture of 5G smart campus was introduced.Then, three traffic offloading technologies and their advantages and disadvantages were expounded.Finally, the scheme selection of traffic offloading in campus resource visits, access to electronic resources, smart education and campus security monitoring was discussed.It is expected to provide theoretical support for the upcoming construction of 5G smart campus.…”
    Get full text
    Article
  11. 331

    Computation task offloading algorithm and system level simulation for vehicles by Qicheng ZENG, Yuxuan SUN, Sheng ZHOU

    Published 2019-09-01
    “…With the development of autonomous driving and vehicular network,more and more vehicles will have powerful computing capabilities and connection with each other via wireless network.These computing resources can not only be applied to automatic driving,but also provide a wide range of edge computing services.Aiming at the task offloading among vehicles,a distributed task offloading algorithm based on online learning was proposed to minimize the average offloading delay.Furthermore,a system-level simulation platform was built to evaluate the impact of vehicle density and number of tasks on the average offloading delay in both highway and urban scenarios.The results provide a reference for the resource allocation and deployment of task offloading in different traffic situations.…”
    Get full text
    Article
  12. 332

    Security risk analysis of power 5G hybrid networking by Xiaojian ZHANG, Jiaxuan FEI, Haitao JIANG, Qigui YAO

    Published 2022-01-01
    “…5G communication technology provides strong support for the power internet of things, and it also introduces new security challenges in the application process of the power industry.Starting from the analysis of the needs of the power 5G business, five 5G networking deployment and construction plans were proposed, and a comparative analysis of them was conducted in security and cost.And then, a hybrid networking architecture of 5G and power communication networks was proposed, and the 5G network slicing architecture was re-segmented according to business scenarios.Finally, from the four parts of terminal access, edge computing, network channel and core network, the security risks introduced by 5G technology were analyzed in detail.…”
    Get full text
    Article
  13. 333

    Task offloading and resource allocation in NOMA-based ultra-dense MEC networks by Yun SHENG, Chen XU, Guangyuan ZHENG

    Published 2022-02-01
    “…In order to improve spectrum efficiency and meet the service demands of massive users, a non-orthogonal multiple access (NOMA)-based ultra-dense mobile edge computing (MEC) system was considered.In order to solve the serious communication interference caused by simultaneous offloading of multiple users and make efficient use of edge server resources, a joint task offloading and resource allocation scheme was proposed to minimize the system energy consumption while meeting the quality of service (QoS) of all users.Offloading decision, power control, computation resource and subchannel resource allocation were jointly considered in the proposed scheme.Simulations results show that the proposed scheme can efficiently lower system energy consumption compared to the other offloading schemes.…”
    Get full text
    Article
  14. 334

    Research and verification of cement smart factory solution based on 5G MEC by Bo GAO, Ke MA, Jianmin ZHANG, Guirong DENG, Zhenhan ZANG

    Published 2022-12-01
    “…With the continuous advancement of the new industrialization process, how 5G can empower industrial digital transformation and help enterprises achieve industrial upgrading has received more and more attention.According to the cement production process, the demand of the industry was analyzed, a cement smart factory solution based on 5G multi-access edge computing (MEC) was proposed, and typical 5G application scenarios were given.Combined with actual commercial cases, the detailed deployment networking and security protection solutions were introduced, and the significant effect of the solution in helping enterprises to reduce costs and increase efficiency was verified.It provided a reference for the 5G MEC scenario application in the cement building materials industry and even the process industry.…”
    Get full text
    Article
  15. 335

    Survey of federated learning research by Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE

    Published 2021-10-01
    “…Federated learning has rapidly become a research hotspot in the field of security machine learning in recent years because it can train the global optimal model collaboratively without the need for multiple data source aggregation.Firstly, the federated learning framework, algorithm principle and classification were summarized.Then, the main threats and challenges it faced, were analysed indepth the comparative analysis of typical research programs in the three directions of communication efficiency, privacy and security, trust and incentive mechanism was focused on, and their advantages and disadvantages were pointed out.Finally, Combined with application of edge computing, blockchain, 5G and other emerging technologies to federated learning, its future development prospects and research hotspots was prospected.…”
    Get full text
    Article
  16. 336

    Task distribution offloading algorithm of vehicle edge network based on DQN by Haitao ZHAO, Tangwei ZHANG, Yue CHEN, Houlin ZHAO, Hongbo ZHU

    Published 2020-10-01
    “…In order to achieve the best balance between latency,computational rate and energy consumption,for a edge access network of IoV,a distribution offloading algorithm based on deep Q network (DQN) was considered.Firstly,these tasks of different vehicles were prioritized according to the analytic hierarchy process (AHP),so as to give different weights to the task processing rate to establish a relationship model.Secondly,by introducing edge computing based on DQN,the task offloading model was established by making weighted sum of task processing rate as optimization goal,which realized the long-term utility of strategies for offloading decisions.The performance evaluation results show that,compared with the Q-learning algorithm,the average task processing delay of the proposed method can effectively improve the task offload efficiency.…”
    Get full text
    Article
  17. 337

    Research on service-driven network technologies for space-air-ground-sea integration by FAN Kexin, AN Lirong, ZHANG Qinyu

    Published 2024-06-01
    “…Then, driven by the demand for carrying massive diverse services, key network technologies, including network slicing, mobile edge computing, and communication-sensing-computing integration, were investigated. …”
    Get full text
    Article
  18. 338

    Research on the Edge Resource Allocation and Load Balancing Algorithm Based on Vehicle Trajectory by Shuxu Zhao, Xinyuan Chen, Xiaolong Wang

    Published 2022-01-01
    “…Edge computing empowers the IoV to achieve performance requirements such as low latency and high computational load for in-vehicle services. …”
    Get full text
    Article
  19. 339

    6G endogenous security:architecture and key technologies by Yang LIU, Mugen PENG

    Published 2020-01-01
    “…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
    Get full text
    Article
  20. 340

    UAV-assisted MEC systems: architecture, key technology, and future challenges by Tiankui ZHANG, Yu XU, Yuanwei LIU, Dingcheng YANG, Yuanhong REN

    Published 2022-08-01
    “…With the fast deployment of 5G and the on-going development of 6G, unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) technology has significant advantages in the terms of overcoming the geographic restrictions, addressing the computational requirements of terminal devices, and enhancing the task offloading rate of the systems, which attracts wide attentions in academia and industry.The concept and the technique advantages of the UAV-assisted MEC systems were firstly clarified, and a general UAV-assisted MEC architecture was proposed, along with the definition of each function module.Then the classic application scenarios were summarized, and the existing key techniques were sorted out, based on which the design methods for the UAV-assisted MEC were achieved.Finally, the research directions and the potential challenges in the future were prospected and clarified.…”
    Get full text
    Article