Search results for "Edge device"

showing 10 items of 11 documents

Endpoint Admission Control over Assured Forwarding PHBs and Its Performance over RED Implementations

2001

The Assured Forwarding Per Hop Behavior (AF PHB) has been devised by the IETF Differentiated Services (DiffServ) working group to provide drop level differentiation. The intent of AF is to support services with different loss requirements, but with no strict delay and jitter guarantees. Another suggested use of AF is to provide differentiated support for traffic conforming to an edge conditioning/policing scheme with respect to nonconforming traffic. Scope of this paper is twofold. First, we show that, quite surprisingly, a standard AF PHB class is semantically capable of supporting per flow admission control. This is obtained by adopting the AF PHB as core routers forwarding mechanism in c…

Core routerEdge deviceDifferentiated servicesbusiness.industryComputer scienceQuality of serviceAdmission controlbusinessQueueComputer networkJitterHop (networking)
researchProduct

Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures

2021

Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and surveillance. This work presents the design and implementation of a complete end-to-end deep learning based edge computing system that can verify a user contactlessly using &lsquo

Edge deviceComputer Networks and CommunicationsComputer scienceSpeech recognitionlcsh:TK7800-8360securitySign languageVDP::Teknologi: 500::Elektrotekniske fag: 540edge computingCode (cryptography)ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSElectrical and Electronic EngineeringEdge computingAuthenticationhand gestures recognitionArtificial neural networkbusiness.industryDeep learninglcsh:Electronicsdeep learningneural networkscontactless authenticationHardware and ArchitectureControl and Systems Engineeringcamera based authenticationSignal ProcessingArtificial intelligencebusinessGesture
researchProduct

Compression Methods for Microclimate Data Based on Linear Approximation of Sensor Data

2019

Edge computing is currently one of the main research topics in the field of Internet of Things. Edge computing requires lightweight and computationally simple algorithms for sensor data analytics. Sensing edge devices are often battery powered and have a wireless connection. In designing edge devices the energy efficiency needs to be taken into account. Pre-processing the data locally in the edge device reduces the amount of data and thus decreases the energy consumption of wireless data transmission. Sensor data compression algorithms presented in this paper are mainly based on data linearity. Microclimate data is near linear in short time window and thus simple linear approximation based …

Edge deviceenergiatehokkuusWireless networkComputer sciencesensoriverkot020206 networking & telecommunications02 engineering and technologyEnergy consumptioninternet of thingscompression algorithmedge computingalgoritmit0202 electrical engineering electronic engineering information engineeringElectronic engineeringesineiden internet020201 artificial intelligence & image processingLinear approximationEdge computingEfficient energy useData compression
researchProduct

Performance Analysis of Memory Cloning Solutions in Mobile Edge Computing

2018

This paper deals with the problem of service migration in the emerging scenarios of Mobile Edge Computing. Mobile edge computing is achieved by moving the traditional cloud infrastructures, exploited by many today applications, close to the network edge in order to reduce the response times in the so called tactile-internet. However, because of user mobility, such an application architecture may pose the problem of service migration in case of handover from one server site to another. After introducing the current solutions for dealing with service migration and, in particular, the approaches based on service decomposition into multiple layers, we quantify the migration time and the service…

Mobile Edge Computing Internet of Things Live migrationMobile edge computingHandoverEdge deviceComputer sciencebusiness.industrySettore ING-INF/03 - TelecomunicazioniDistributed computingServerApplications architectureCloud computingbusiness
researchProduct

Multicast access control concept for xDSL-customers

2006

Multicast is a tempting possibility for many broad- band services. It makes possible to deliver one data-stream to several receivers simultaneously. IP-Multicast is based on an open group concept. This means that it is possible for all the users to join the group and thus receive the data. The open concept is also the main reason why multicast has not been taken in wider use. There is two different solution to solve this problem, group access control and multicast data encryption. Group access control mechanisms focuses on restricting the group membership at the users edge device. Traffic encryption scheme relies on end-to-end encryption, so a key management architecture is also needed. We …

MulticastEdge deviceProtocol Independent Multicastbusiness.industrycomputer.internet_protocolComputer scienceInter-domainQuality of serviceDistance Vector Multicast Routing ProtocolIPTVContent delivery networkAdmission controlSource-specific multicastInternet Group Management ProtocolReliable multicastMulticast addressIP multicastXcastbusinessKey managementcomputerPragmatic General MulticastComputer networkCCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.
researchProduct

Energy-Efficient Protocol Design

2015

Recent studies have shown that the total energy consumed by the Internet has followed an increasing trend over the years. A considerable part of this energy is wasted due to an inefficient utilization of edge devices , that is, Personal Computers (PCs) and other user equipment in homes and offices. PCs are often left on even when they are not used (e.g., overnight or during weekends), while other edge devices, such as printers, IP phones, and displays, are typically kept always on , especially in public buildings. A number of solutions have been proposed for eliminating, or reducing, energy wastes caused by edge devices. In this chapter, we propose a general taxonomy for their classificatio…

Power-aware ProtocolsPower managementEdge devicebusiness.industryComputer sciencePower Management On-demand Wake-up Magic Packet Proxying Network Connectivity Proxy Context-aware Power Management Power-aware ProtocolsMagic PacketEnergy consumptionOn-demand Wake-upProxyingUser equipmentPower ManagementTaxonomy (general)Network Connectivity ProxyContext-aware Power ManagementThe InternetbusinessEnergy (signal processing)Computer networkEfficient energy use
researchProduct

Joint Radio and Computational Resource Allocation in IoT Fog Computing

2018

The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…

Service (systems architecture)IoTEdge deviceComputer Networks and CommunicationsComputer scienceDistributed computingAerospace Engineeringresource allocationCloud computing02 engineering and technologyresursointiComputational resource0203 mechanical engineeringUser experience design0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringstudent project allocationmatching theoryta113ta213business.industry020302 automobile design & engineering020206 networking & telecommunicationsService providerAutomotive EngineeringResource allocationEnhanced Data Rates for GSM Evolutionfog computingbusinessIEEE Transactions on Vehicular Technology
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

Theoretical Game Approach for Mobile Users Resource Management in a Vehicular Fog Computing Environment

2018

Vehicular Cloud Computing (VCC) is envisioned as a promising approach to increase computation capabilities of vehicle devices for emerging resource-hungry mobile applications. In this paper, we introduce the new concept of Vehicular Fog Computing (VFC). The Fog Computing (FC) paradigm evolved and is employed to enhance the quality of cloud computing services by extending it to the edge of the network using one or more collaborative end-user clients or near-user edge devices. The VFC is similar to the VCC concept but uses vehicles resources located at the edge of the network in order to serve only local on-demand mobile applications. The aim of this paper is to resolve the problem of admissi…

game theoryEdge deviceComputer science[SPI] Engineering Sciences [physics]Distributed computingmobile computingresource allocationCloud computing02 engineering and technologyFog ComputingVehicular Fog Computingdecision makingScheduling (computing)symbols.namesakeAuthor Keywords Cloud ComputingMobile applications0202 electrical engineering electronic engineering information engineeringResource managementEdge computing020203 distributed computingbusiness.industryQuality of service020208 electrical & electronic engineeringcloud computingComputational modelingAdmission controlEdge computingNash equilibriumPotential Game Theorysymbolsquality of servicevehicular ad hoc networksbusinessGamesGame theory
researchProduct

Innovation in Neurosurgery: Integration Between Cutting-Edge Devices and "Old-Fashioned" Surgical Technique.

2019

n times of rapid scientific and technological progress, doctors must be able to pursue innovations. However, although clinical decision making can rely on new opportunities, the optimism should be tempered by equally newfangled limits, mainly of economic nature, that can bind medical management. The 3 cornerstones of medical progress are genomics, nanotechnologies, and robotics, the future of which lie in the integration among imaging, digital telemedicine, and artificial intelligence. With the aid of wireless and mobile technologies, the world of digital medicine is growing quickly. In this scenario, the simple control of vital signs no longer needs spatial relationship; the continuous con…

medicine.medical_specialtyEdge devicebusiness.industrymedicineMEDLINESurgeryNeurology (clinical)NeurosurgerybusinessInnovation glioma spinal cordSurgeryWorld neurosurgery
researchProduct