• Title/Summary/Keyword: Edge computing.

Search Result 501, Processing Time 0.023 seconds

Task Scheduling in Fog Computing - Classification, Review, Challenges and Future Directions

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.89-100
    • /
    • 2022
  • With the advancement in the Internet of things Technology (IoT) cloud computing, billions of physical devices have been interconnected for sharing and collecting data in different applications. Despite many advancements, some latency - specific application in the real world is not feasible due to existing constraints of IoT devices and distance between cloud and IoT devices. In order to address issues of latency sensitive applications, fog computing has been developed that involves the availability of computing and storage resources at the edge of the network near the IoT devices. However, fog computing suffers from many limitations such as heterogeneity, storage capabilities, processing capability, memory limitations etc. Therefore, it requires an adequate task scheduling method for utilizing computing resources optimally at the fog layer. This work presents a comprehensive review of different task scheduling methods in fog computing. It analyses different task scheduling methods developed for a fog computing environment in multiple dimensions and compares them to highlight the advantages and disadvantages of methods. Finally, it presents promising research directions for fellow researchers in the fog computing environment.

Method of Knowledge Sharing Based on Multiple Ontology on the Distributed Web Environment (분산 웹 환경에서 다중 온톨로지를 기반으로 한 지식공유방식)

  • 김희수;배상현
    • Journal of Internet Computing and Services
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2001
  • This paper studies on Multiple Ontology to share and reuse know1edge stored in every system under the Distributed Web Environment using idle resource connected the Internet. Multiple Ontology is to convert to be able know1edge sharing between ontologies constructed by one and the other. This study focuses on as follows; To compose the Distributed Web Ontology multiple system, Construction Method of the Distributed Web Environment and Composition of Multiple Ontology for Know1edge sharing and reuse. System Composed by using the jini technology has constructed extension of heterogeneous systems and effective web computing environment. Also, through 'distribution operation, practical know1edge exchange among Multiple Ontologies under the Distributed Web Environment has been processed excellently.

  • PDF

Deep Learning based Loss Recovery Mechanism for Video Streaming over Mobile Information-Centric Network

  • Han, Longzhe;Maksymyuk, Taras;Bao, Xuecai;Zhao, Jia;Liu, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4572-4586
    • /
    • 2019
  • Mobile Edge Computing (MEC) and Information-Centric Networking (ICN) are essential network architectures for the future Internet. The advantages of MEC and ICN such as computation and storage capabilities at the edge of the network, in-network caching and named-data communication paradigm can greatly improve the quality of video streaming applications. However, the packet loss in wireless network environments still affects the video streaming performance and the existing loss recovery approaches in ICN does not exploit the capabilities of MEC. This paper proposes a Deep Learning based Loss Recovery Mechanism (DL-LRM) for video streaming over MEC based ICN. Different with existing approaches, the Forward Error Correction (FEC) packets are generated at the edge of the network, which dramatically reduces the workload of core network and backhaul. By monitoring network states, our proposed DL-LRM controls the FEC request rate by deep reinforcement learning algorithm. Considering the characteristics of video streaming and MEC, in this paper we develop content caching detection and fast retransmission algorithm to effectively utilize resources of MEC. Experimental results demonstrate that the DL-LRM is able to adaptively adjust and control the FEC request rate and achieve better video quality than the existing approaches.

Edge Computing based Escalator Anomaly Detection and Defect Classification using Machine Learning (머신러닝을 활용한 Edge 컴퓨팅 기반 에스컬레이터 이상 감지 및 결함 분류 시스템)

  • Lee, Se-Hoon;Kim, Ji-Tae;Lee, Tae-Hyeong;Kim, Han-Sol;Jung, Chan-Young;Park, Sang-Hyun;Kim, Pung-Il
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.13-14
    • /
    • 2020
  • 본 논문에서는 엣지 컴퓨팅 환경에서 머신러닝을 활용해 에스컬레이터 이상 감지 및 결함 분류를 하는 연구를 진행하였다. 엣지 컴퓨팅 기반 머신러닝을 사용해 에스컬레이터의 이상 감지 및 결함 분류를 위한 OneM2M환경을 구축하였으며 에스컬레이터에서 발생하는 소음에서 고장 유형에 따라 나타나는 주파수를 이용한다. Edge TPU를 활용해 엣지 컴퓨팅 시스템의 처리량을 최대화하고, 각 작업의 수행시간을 최소화함으로써 엣지 컴퓨팅 환경에서 이상 감지와 결함 분류를 수행할 수 있다.

  • PDF

Dynamic Scene Segmentation Algorithm Using a Cross Mask and Edge Information (Cross Mask와 에지 정보를 사용한 동영상 분할)

  • 강정숙;박래홍;이상욱
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.8
    • /
    • pp.1247-1256
    • /
    • 1989
  • In this paper, we propose the dynamic scene segmentation algorithm using a cross mask and edge information. This method, a combination of the conventioanl feature-based and pixel-based approaches, uses edges as features and determines moving pixels, with a cross mask centered on each edge pixel, by computing similarity measure between two consecutive image frames. With simple calcualtion the proposed method works well for image consisting of complex background or several moving objects. Also this method works satisfactorily in case of rotaitional motion.

  • PDF

A Study on the Improvement of Fire Alarm System in Special Buildings Using Beacons in Edge Computing Environment (에지 컴퓨팅 환경에서 비콘을 활용한 특수건물 화재 경보 시스템 개선 방안 연구)

  • Lee, Tae Gyu;Choi, Kyeong Seo;Shin, Youn Soon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.217-224
    • /
    • 2022
  • Today, with the development of technology and industry, fire accidents in special buildings are increasing as special buildings increase. However, despite the rapid development of information and communication technology, human casualties are steadily occurring due to the underdeveloped and ineffective indoor fire alarm system. In this study, we confirmed that the existing indoor fire alarm system using acoustic alarm could not deliver a sufficiently large alarm to the in-room personnel. To improve this, we designed and implemented a fire alarm system using edge computing and beacons. The proposed improved fire alarm system consists of terminal sensor nodes, edge nodes, a user application, and a server. The terminal sensor nodes collect indoor environment data and send it to the edge node, and the edge node monitors whether a fire occurs through the transmitted sensor value. In addition, the edge node continuously generate beacon signals to collect information of smart devices with user applications installed within the signal range, store them in a server database, and send application push-type fire alarms to all in-room personnel based on the collected user information. As a result of conducting a signal valid range measurement experiment in a university building with dense lecture rooms, it was confirmed that device information was normally collected within the beacon signal range of the edge node and a fire alarm was quickly sent to specific users. Through this, it was confirmed that the "blind spot problem of the alarm" was solved by flexibly collecting information of visitors that changes time to time and sending the alarm to a smart device very adjacent to the people. In addition, through the analysis of the experimental results, a plan to effectively apply the proposed fire alarm system according to the characteristics of the indoor space was proposed.

Quantum Computing Impact on SCM and Hotel Performance

  • Adhikari, Binaya;Chang, Byeong-Yun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.1-6
    • /
    • 2021
  • For competitive hotel business, the hotel must have a sound prediction capability to balance the demand and supply of hospitality products. To have a sound prediction capability in the hotel, it should be prepared to be equipped with a new technology such as quantum computing. The quantum computing is a brand new cutting-edge technology. It will change hotel business and even the whole world too. Therefore, we study the impact of quantum computing on supply chain management (SCM) and hotel performance. Toward the goal we have developed the research model including six constructs: quantum (computing) prediction, communication, supplier relationship, service quality, non-financial performance, and financial performance. The result of the study shows a significant influence of quantum (computing) prediction on hotel performance through the mediating role of SCM in the hotel. Quantum prediction is highly significant in enhancing the SCM in the hotel. However, the direct effect between the quantum prediction and hotel performance is not significant. The finding indicates that hotels which would install the quantum computing technology and utilize the quantum prediction could hugely benefit from the performance improvement.

Smartphone-based structural crack detection using pruned fully convolutional networks and edge computing

  • Ye, X.W.;Li, Z.X.;Jin, T.
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.141-151
    • /
    • 2022
  • In recent years, the industry and research communities have focused on developing autonomous crack inspection approaches, which mainly include image acquisition and crack detection. In these approaches, mobile devices such as cameras, drones or smartphones are utilized as sensing platforms to acquire structural images, and the deep learning (DL)-based methods are being developed as important crack detection approaches. However, the process of image acquisition and collection is time-consuming, which delays the inspection. Also, the present mobile devices such as smartphones can be not only a sensing platform but also a computing platform that can be embedded with deep neural networks (DNNs) to conduct on-site crack detection. Due to the limited computing resources of mobile devices, the size of the DNNs should be reduced to improve the computational efficiency. In this study, an architecture called pruned crack recognition network (PCR-Net) was developed for the detection of structural cracks. A dataset containing 11000 images was established based on the raw images from bridge inspections. A pruning method was introduced to reduce the size of the base architecture for the optimization of the model size. Comparative studies were conducted with image processing techniques (IPTs) and other DNNs for the evaluation of the performance of the proposed PCR-Net. Furthermore, a modularly designed framework that integrated the PCR-Net was developed to realize a DL-based crack detection application for smartphones. Finally, on-site crack detection experiments were carried out to validate the performance of the developed system of smartphone-based detection of structural cracks.

Railway sleeper crack recognition based on edge detection and CNN

  • Wang, Gang;Xiang, Jiawei
    • Smart Structures and Systems
    • /
    • v.28 no.6
    • /
    • pp.779-789
    • /
    • 2021
  • Cracks in railway sleeper are an inevitable condition and has a significant influence on the safety of railway system. Although the technology of railway sleeper condition monitoring using machine learning (ML) models has been widely applied, the crack recognition accuracy is still in need of improvement. In this paper, a two-stage method using edge detection and convolutional neural network (CNN) is proposed to reduce the burden of computing for detecting cracks in railway sleepers with high accuracy. In the first stage, the edge detection is carried out by using the 3×3 neighborhood range algorithm to find out the possible crack areas, and a series of mathematical morphology operations are further used to eliminate the influence of noise targets to the edge detection results. In the second stage, a CNN model is employed to classify the results of edge detection. Through the analysis of abundant images of sleepers with cracks, it is proved that the cracks detected by the neighborhood range algorithm are superior to those detected by Sobel and Canny algorithms, which can be classified by proposed CNN model with high accuracy.

Joint wireless and computational resource allocation for ultra-dense mobile-edge computing networks

  • Liu, Junyi;Huang, Hongbing;Zhong, Yijun;He, Jiale;Huang, Tiancong;Xiao, Qian;Jiang, Weiheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.3134-3155
    • /
    • 2020
  • In this paper, we study the joint radio and computational resource allocation in the ultra-dense mobile-edge computing networks. In which, the scenario which including both computation offloading and communication service is discussed. That is, some mobile users ask for computation offloading, while the others ask for communication with the minimum communication rate requirements. We formulate the problem as a joint channel assignment, power control and computational resource allocation to minimize the offloading cost of computing offloading, with the precondition that the transmission rate of communication nodes are satisfied. Since the formulated problem is a mixed-integer nonlinear programming (MINLP), which is NP-hard. By leveraging the particular mathematical structure of the problem, i.e., the computational resource allocation variable is independent with other variables in the objective function and constraints, and then the original problem is decomposed into a computational resource allocation subproblem and a joint channel assignment and power allocation subproblem. Since the former is a convex programming, the KKT (Karush-Kuhn-Tucker) conditions can be used to find the closed optimal solution. For the latter, which is still NP-hard, is further decomposed into two subproblems, i.e., the power allocation and the channel assignment, to optimize alternatively. Finally, two heuristic algorithms are proposed, i.e., the Co-channel Equal Power allocation algorithm (CEP) and the Enhanced CEP (ECEP) algorithm to obtain the suboptimal solutions. Numerical results are presented at last to verify the performance of the proposed algorithms.