Search results for "Edge Computing"

showing 10 items of 42 documents

Robust Hand Gestures Recognition Using a Deep CNN and Thermal Images

2021

Medical systems and assistive technologies, human-computer interaction, human-robot interaction, industrial automation, virtual environment control, sign language translation, crisis and disaster management, entertainment and computer games, and so on all use RGB cameras for hand gesture recognition. However, their performance is limited especially in low-light conditions. In this paper, we propose a robust hand gesture recognition system based on high-resolution thermal imaging that is light-independent. A dataset of 14,400 thermal hand gestures is constructed, separated into two color tones. We also propose using a deep CNN to classify high-resolution hand gestures accurately. The propose…

Computer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONSign languagecomputer.software_genreAutomationVirtual machineGesture recognitionBenchmark (computing)RGB color modelComputer visionArtificial intelligenceElectrical and Electronic EngineeringbusinessInstrumentationcomputerEdge computingGestureIEEE Sensors Journal
researchProduct

Co-simulated Digital Twin on the Network Edge: the case of platooning

2022

This paper presents an approach to create high fidelity Digital-Twin models for distributed multi-agent cyber-physical systems based on the combination of simulating components, generated from different modeling languages, each tailored for the specific domain of the subsystem. The approach specifically addresses the wireless communication domain, exploiting a Python module as a simulating component to evaluate the impact of network delay among the distributed elements of the system under analysis. A case study with a platoon of four vehicles following a leading car, all modeled in Simulink, is used to show the applicability of the approach, allowing the comparison between a Vehicle-to-Vehi…

Digital Twinvehicle platoonSettore ING-INF/04 - AutomaticaSettore INF/01 - InformaticaDigital Twin co-simulation Edge computing vehicle platoonco-simulationEdge computingDigital Twin; co-simulation; Edge computing; vehicle platoon2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
researchProduct

Design and Implementation of Deep Learning Based Contactless Authentication System Using Hand Gestures

2021

Hand gestures based sign language digits have several contactless applications. Applications include communication for impaired people, such as elderly and disabled people, health-care applications, automotive user interfaces, and security and surveillance. This work presents the design and implementation of a complete end-to-end deep learning based edge computing system that can verify a user contactlessly using &lsquo

Edge deviceComputer Networks and CommunicationsComputer scienceSpeech recognitionlcsh:TK7800-8360securitySign languageVDP::Teknologi: 500::Elektrotekniske fag: 540edge computingCode (cryptography)ComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSElectrical and Electronic EngineeringEdge computingAuthenticationhand gestures recognitionArtificial neural networkbusiness.industryDeep learninglcsh:Electronicsdeep learningneural networkscontactless authenticationHardware and ArchitectureControl and Systems Engineeringcamera based authenticationSignal ProcessingArtificial intelligencebusinessGesture
researchProduct

Compression Methods for Microclimate Data Based on Linear Approximation of Sensor Data

2019

Edge computing is currently one of the main research topics in the field of Internet of Things. Edge computing requires lightweight and computationally simple algorithms for sensor data analytics. Sensing edge devices are often battery powered and have a wireless connection. In designing edge devices the energy efficiency needs to be taken into account. Pre-processing the data locally in the edge device reduces the amount of data and thus decreases the energy consumption of wireless data transmission. Sensor data compression algorithms presented in this paper are mainly based on data linearity. Microclimate data is near linear in short time window and thus simple linear approximation based …

Edge deviceenergiatehokkuusWireless networkComputer sciencesensoriverkot020206 networking & telecommunications02 engineering and technologyEnergy consumptioninternet of thingscompression algorithmedge computingalgoritmit0202 electrical engineering electronic engineering information engineeringElectronic engineeringesineiden internet020201 artificial intelligence & image processingLinear approximationEdge computingEfficient energy useData compression
researchProduct

Licensed and Unlicensed Spectrum Management for Energy-Efficient Cognitive M2M

2020

Edge computing has emerged as a promising solution for relieving the tension between resource-limited MTDs and computational-intensive tasks. To realize successful task offloading with limited spectrum, we focus on the cognitive machine-to-machine (CM2M) paradigm which enables a massive number of MTDs to either opportunistically use the licensed spectrum that is temporarily available, or to exploit the under-utilized unlicensed spectrum. We formulate the channel selection problem with both licensed and unlicensed spectrum as an adversarial multi-armed bandit (MAB) problem, and combine the exponential-weight algorithm for exploration and exploitation (EXP3) and Lyapunov optimization to devel…

Exploitbusiness.industryComputer scienceReliability (computer networking)Lyapunov optimizationbusinessSelection algorithmSpectrum managementEdge computingCommunication channelEfficient energy useComputer network
researchProduct

A Comprehensive Utility Function for Resource Allocation in Mobile Edge Computing

2020

In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility function for resource allocation in MEC. The utility function considers the heterogeneous nature of applications that a UE offloads to MES. The proposed utility function considers all important parameters, including CPU, RAM, hard disk space, required time, and distance, to calculate a more realis…

FOS: Computer and information sciencesComputer sciencemedia_common.quotation_subjectG.3Cloud computingComputer Science - Networking and Internet ArchitectureC.2.3BiomaterialsC.2.1Resource (project management)Electrical and Electronic EngineeringFunction (engineering)media_commonNetworking and Internet Architecture (cs.NI)Mobile edge computingbusiness.industryEnergy consumptionComputer Science ApplicationsTask (computing)User equipmentMechanics of MaterialsModeling and SimulationResource allocationG.3; C.2.3; C.2.1business46FxxComputer networkComputers, Materials & Continua
researchProduct

A Trusted Hybrid Learning Approach to Secure Edge Computing

2021

Securing edge computing has drawn much attention due to the vital role of edge computing in Fifth Generation (5G) wireless networks. Artificial Intelligence (AI) has been adopted to protect networks against attackers targeting the connected edge devices or the wireless channel. However, the proposed detection mechanisms could generate a high false detection rate, especially against unknown attacks defined as zero-day threats. Thereby, we propose and conceive a new hybrid learning security framework that combines the expertise of security experts and the strength of machine learning to protect the edge computing network from known and unknown attacks, while minimizing the false detection rat…

Intrustion Detection: Computer science [C05] [Engineering computing & technology]Monitoringbusiness.industryComputer scienceFeature extractionHybrid learningServersHybrid learning: Sciences informatiques [C05] [Ingénierie informatique & technologie]Computer Science ApplicationsImage edge detectionHuman-Computer Interaction[SPI]Engineering Sciences [physics]Hardware and ArchitectureServerSecurityEdge ComputingFeature extractionEnginesElectrical and Electronic Engineeringbusiness5GEdge computingComputer network
researchProduct

A Simulation-based Performance Evaluation of Heuristics for Dew Computing

2021

Job schedulerScheduling heuristicsComputer engineeringComputer scienceDewcomputer.software_genreHeuristicsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Mobile deviceSimulation basedcomputerEdge computingProceedings of the Annual Hawaii International Conference on System Sciences
researchProduct

A Task Execution Scheme for Dew Computing with State-of-the-Art Smartphones

2021

The computing resources of today’s smartphones are underutilized most of the time. Using these resources could be highly beneficial in edge computing and fog computing contexts, for example, to support urban services for citizens. However, new challenges, especially regarding job scheduling, arise. Smartphones may form ad hoc networks, but individual devices highly differ in computational capabilities and (tolerable) energy usage. We take into account these particularities to validate a task execution scheme that relies on the computing power that clusters of mobile devices could provide. In this paper, we expand the study of several practical heuristics for job scheduling including executi…

Job schedulerTK7800-8360Computer Networks and CommunicationsComputer scienceWireless ad hoc networkdew computingcomputer.software_genresmartphoneScheduling (computing)Task (computing)edge computingscheduling heuristicsHardware and ArchitectureControl and Systems EngineeringHuman–computer interactionMiddlewareSignal ProcessingElectrical and Electronic EngineeringElectronicsjob schedulingHeuristicsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Mobile devicecomputerEdge computingElectronics
researchProduct

Dynamic Resource Allocation and Computation Offloading for Edge Computing System

2020

In this work, we propose a dynamic optimization scheme for an edge computing system with multiple users, where the radio and computational resources, and offloading decisions, can be dynamically allocated with the variation of computation demands, radio channels and the computation resources. Specifically, with the objective to minimize the energy consumption of the considered system, we propose a joint computation offloading, radio and computational resource allocation algorithm based on Lyapunov optimization. Through minimizing the derived upper bound of the Lyapunov drift-plus-penalty function, the main problem is divided into several sub-problems at each time slot and are addressed sepa…

Lyapunov functionMathematical optimizationComputer scienceComputation020206 networking & telecommunicationsLyapunov optimizationEdge computing02 engineering and technologyEnergy consumptionDynamic computation offloadingComputational resourcesymbols.namesake0202 electrical engineering electronic engineering information engineeringsymbolsResource allocationComputation offloadingSDG 7 - Affordable and Clean EnergyResource allocationLyapunov optimizationEdge computing
researchProduct