Search results for "Edge device"
showing 10 items of 11 documents
Endpoint Admission Control over Assured Forwarding PHBs and Its Performance over RED Implementations
2001
The Assured Forwarding Per Hop Behavior (AF PHB) has been devised by the IETF Differentiated Services (DiffServ) working group to provide drop level differentiation. The intent of AF is to support services with different loss requirements, but with no strict delay and jitter guarantees. Another suggested use of AF is to provide differentiated support for traffic conforming to an edge conditioning/policing scheme with respect to nonconforming traffic. Scope of this paper is twofold. First, we show that, quite surprisingly, a standard AF PHB class is semantically capable of supporting per flow admission control. This is obtained by adopting the AF PHB as core routers forwarding mechanism in c…
Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures
2021
Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and surveillance. This work presents the design and implementation of a complete end-to-end deep learning based edge computing system that can verify a user contactlessly using &lsquo
Compression Methods for Microclimate Data Based on Linear Approximation of Sensor Data
2019
Edge computing is currently one of the main research topics in the field of Internet of Things. Edge computing requires lightweight and computationally simple algorithms for sensor data analytics. Sensing edge devices are often battery powered and have a wireless connection. In designing edge devices the energy efficiency needs to be taken into account. Pre-processing the data locally in the edge device reduces the amount of data and thus decreases the energy consumption of wireless data transmission. Sensor data compression algorithms presented in this paper are mainly based on data linearity. Microclimate data is near linear in short time window and thus simple linear approximation based …
Performance Analysis of Memory Cloning Solutions in Mobile Edge Computing
2018
This paper deals with the problem of service migration in the emerging scenarios of Mobile Edge Computing. Mobile edge computing is achieved by moving the traditional cloud infrastructures, exploited by many today applications, close to the network edge in order to reduce the response times in the so called tactile-internet. However, because of user mobility, such an application architecture may pose the problem of service migration in case of handover from one server site to another. After introducing the current solutions for dealing with service migration and, in particular, the approaches based on service decomposition into multiple layers, we quantify the migration time and the service…
Multicast access control concept for xDSL-customers
2006
Multicast is a tempting possibility for many broad- band services. It makes possible to deliver one data-stream to several receivers simultaneously. IP-Multicast is based on an open group concept. This means that it is possible for all the users to join the group and thus receive the data. The open concept is also the main reason why multicast has not been taken in wider use. There is two different solution to solve this problem, group access control and multicast data encryption. Group access control mechanisms focuses on restricting the group membership at the users edge device. Traffic encryption scheme relies on end-to-end encryption, so a key management architecture is also needed. We …
Energy-Efficient Protocol Design
2015
Recent studies have shown that the total energy consumed by the Internet has followed an increasing trend over the years. A considerable part of this energy is wasted due to an inefficient utilization of edge devices , that is, Personal Computers (PCs) and other user equipment in homes and offices. PCs are often left on even when they are not used (e.g., overnight or during weekends), while other edge devices, such as printers, IP phones, and displays, are typically kept always on , especially in public buildings. A number of solutions have been proposed for eliminating, or reducing, energy wastes caused by edge devices. In this chapter, we propose a general taxonomy for their classificatio…
Joint Radio and Computational Resource Allocation in IoT Fog Computing
2018
The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…
SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications
2020
Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…
Theoretical Game Approach for Mobile Users Resource Management in a Vehicular Fog Computing Environment
2018
Vehicular Cloud Computing (VCC) is envisioned as a promising approach to increase computation capabilities of vehicle devices for emerging resource-hungry mobile applications. In this paper, we introduce the new concept of Vehicular Fog Computing (VFC). The Fog Computing (FC) paradigm evolved and is employed to enhance the quality of cloud computing services by extending it to the edge of the network using one or more collaborative end-user clients or near-user edge devices. The VFC is similar to the VCC concept but uses vehicles resources located at the edge of the network in order to serve only local on-demand mobile applications. The aim of this paper is to resolve the problem of admissi…
Innovation in Neurosurgery: Integration Between Cutting-Edge Devices and "Old-Fashioned" Surgical Technique.
2019
n times of rapid scientific and technological progress, doctors must be able to pursue innovations. However, although clinical decision making can rely on new opportunities, the optimism should be tempered by equally newfangled limits, mainly of economic nature, that can bind medical management. The 3 cornerstones of medical progress are genomics, nanotechnologies, and robotics, the future of which lie in the integration among imaging, digital telemedicine, and artificial intelligence. With the aid of wireless and mobile technologies, the world of digital medicine is growing quickly. In this scenario, the simple control of vital signs no longer needs spatial relationship; the continuous con…