期刊文献+
共找到1,710篇文章
< 1 2 86 >
每页显示 20 50 100
Optimized Energy Efficient Strategy for Data Reduction Between Edge Devices in Cloud-IoT
1
作者 Dibyendu Mukherjee Shivnath Ghosh +4 位作者 Souvik Pal D.Akila N.Z.Jhanjhi Mehedi Masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2022年第7期125-140,共16页
Numerous Internet of Things(IoT)systems produce massive volumes of information that must be handled and answered in a quite short period.The growing energy usage related to the migration of data into the cloud is one ... Numerous Internet of Things(IoT)systems produce massive volumes of information that must be handled and answered in a quite short period.The growing energy usage related to the migration of data into the cloud is one of the biggest problems.Edge computation helps users unload the workload again from cloud near the source of the information that must be handled to save time,increase security,and reduce the congestion of networks.Therefore,in this paper,Optimized Energy Efficient Strategy(OEES)has been proposed for extracting,distributing,evaluating the data on the edge devices.In the initial stage of OEES,before the transmission state,the data gathered from edge devices are supported by a fast error like reduction that is regarded as the largest energy user of an IoT system.The initial stage is followed by the reconstructing and the processing state.The processed data is transmitted to the nodes through controlled deep learning techniques.The entire stage of data collection,transmission and data reduction between edge devices uses less energy.The experimental results indicate that the volume of data transferred decreases and does not impact the professional data performance and predictive accuracy.Energy consumption of 7.38 KJ and energy conservation of 55.57 kJ was found in the proposed OEES scheme.Predictive accuracy is 97.5 percent,data performance rate was 97.65 percent,and execution time is 14.49 ms. 展开更多
关键词 Energy efficient internet of things TRANSMISSION performance cloud computing edge devices
下载PDF
Security Implications of Edge Computing in Cloud Networks 被引量:1
2
作者 Sina Ahmadi 《Journal of Computer and Communications》 2024年第2期26-46,共21页
Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this r... Security issues in cloud networks and edge computing have become very common. This research focuses on analyzing such issues and developing the best solutions. A detailed literature review has been conducted in this regard. The findings have shown that many challenges are linked to edge computing, such as privacy concerns, security breaches, high costs, low efficiency, etc. Therefore, there is a need to implement proper security measures to overcome these issues. Using emerging trends, like machine learning, encryption, artificial intelligence, real-time monitoring, etc., can help mitigate security issues. They can also develop a secure and safe future in cloud computing. It was concluded that the security implications of edge computing can easily be covered with the help of new technologies and techniques. 展开更多
关键词 edge Computing cloud Networks Artificial Intelligence Machine Learning cloud Security
下载PDF
Policy Network-Based Dual-Agent Deep Reinforcement Learning for Multi-Resource Task Offloading in Multi-Access Edge Cloud Networks
3
作者 Feng Chuan Zhang Xu +2 位作者 Han Pengchao Ma Tianchun Gong Xiaoxue 《China Communications》 SCIE CSCD 2024年第4期53-73,共21页
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n... The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC networks can support a wide range of applications. MEC networks can also leverage various types of resources, including computation resources, network resources, radio resources,and location-based resources, to provide multidimensional resources for intelligent applications in 5/6G.However, tasks generated by users often consist of multiple subtasks that require different types of resources. It is a challenging problem to offload multiresource task requests to the edge cloud aiming at maximizing benefits due to the heterogeneity of resources provided by devices. To address this issue,we mathematically model the task requests with multiple subtasks. Then, the problem of task offloading of multi-resource task requests is proved to be NP-hard. Furthermore, we propose a novel Dual-Agent Deep Reinforcement Learning algorithm with Node First and Link features(NF_L_DA_DRL) based on the policy network, to optimize the benefits generated by offloading multi-resource task requests in MEC networks. Finally, simulation results show that the proposed algorithm can effectively improve the benefit of task offloading with higher resource utilization compared with baseline algorithms. 展开更多
关键词 benefit maximization deep reinforcement learning multi-access edge cloud task offloading
下载PDF
Cloud control for IIoT in a cloud-edge environment
4
作者 YAN Ce XIA Yuanqing +1 位作者 YANG Hongjiu ZHAN Yufeng 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期1013-1027,共15页
The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for... The industrial Internet of Things(IIoT)is a new indus-trial idea that combines the latest information and communica-tion technologies with the industrial economy.In this paper,a cloud control structure is designed for IIoT in cloud-edge envi-ronment with three modes of 5G.For 5G based IIoT,the time sensitive network(TSN)service is introduced in transmission network.A 5G logical TSN bridge is designed to transport TSN streams over 5G framework to achieve end-to-end configuration.For a transmission control protocol(TCP)model with nonlinear disturbance,time delay and uncertainties,a robust adaptive fuzzy sliding mode controller(AFSMC)is given with control rule parameters.IIoT workflows are made up of a series of subtasks that are linked by the dependencies between sensor datasets and task flows.IIoT workflow scheduling is a non-deterministic polynomial(NP)-hard problem in cloud-edge environment.An adaptive and non-local-convergent particle swarm optimization(ANCPSO)is designed with nonlinear inertia weight to avoid falling into local optimum,which can reduce the makespan and cost dramatically.Simulation and experiments demonstrate that ANCPSO has better performances than other classical algo-rithms. 展开更多
关键词 5G and time sensitive network(TSN) industrial Internet of Things(IIoT)workflow transmission control protocol(TCP)flows control cloud edge collaboration multi-objective optimal scheduling
下载PDF
A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks 被引量:7
5
作者 Alanoud Alhussain Heba Kurdi Lina Altoaimy 《Computers, Materials & Continua》 SCIE EI 2019年第6期805-815,共11页
Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.... Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems. 展开更多
关键词 Trust management neural networks peer to peer machine learning edge devices
下载PDF
Quantum-Edge Cloud Computing for IoT: Bridging the Gap between Cloud, Edge, and Quantum Technologies
6
作者 Shahanaz Akter Md. Khairul Islam Bhuiyan +3 位作者 Md. Bahauddin Badhon Habib Md. Hasan Fatema Akter Mohammad Nahid Ul Islam 《Advances in Internet of Things》 2024年第4期99-120,共22页
The rapid expansion of the Internet of Things (IoT) has driven the need for advanced computational frameworks capable of handling the complex data processing and security challenges that modern IoT applications demand... The rapid expansion of the Internet of Things (IoT) has driven the need for advanced computational frameworks capable of handling the complex data processing and security challenges that modern IoT applications demand. However, traditional cloud computing frameworks face significant latency, scalability, and security issues. Quantum-Edge Cloud Computing (QECC) offers an innovative solution by integrating the computational power of quantum computing with the low-latency advantages of edge computing and the scalability of cloud computing resources. This study is grounded in an extensive literature review, performance improvements, and metrics data from Bangladesh, focusing on smart city infrastructure, healthcare monitoring, and the industrial IoT sector. The discussion covers vital elements, including integrating quantum cryptography to enhance data security, the critical role of edge computing in reducing response times, and cloud computing’s ability to support large-scale IoT networks with its extensive resources. Through case studies such as the application of quantum sensors in autonomous vehicles, the practical impact of QECC is demonstrated. Additionally, the paper outlines future research opportunities, including developing quantum-resistant encryption techniques and optimizing quantum algorithms for edge computing. The convergence of these technologies in QECC has the potential to overcome the current limitations of IoT frameworks, setting a new standard for future IoT applications. 展开更多
关键词 Quantum-edge cloud Computing (QECC) Internet of Things (IoT) Low Latency Quantum Computing (QC) Scalable cloud Services
下载PDF
A Review in the Core Technologies of 5G: Device-to-Device Communication, Multi-Access Edge Computing and Network Function Virtualization 被引量:2
7
作者 Ruixuan Tu Ruxun Xiang +1 位作者 Yang Xu Yihan Mei 《International Journal of Communications, Network and System Sciences》 2019年第9期125-150,共26页
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ... 5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances. 展开更多
关键词 5th Generation Network VIRTUALIZATION device-To-device COMMUNICATION Base STATION Direct COMMUNICATION INTERFERENCE Multi-Access edge COMPUTING Mobile edge COMPUTING
下载PDF
Accurate threat hunting in industrial internet of things edge devices
8
作者 Abbas Yazdinejad Behrouz Zolfaghari +3 位作者 Ali Dehghantanha Hadis Karimipour Gautam Srivastava Reza M.Parizi 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1123-1130,共8页
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and processing.Any kind of malicious or abnormal fu... Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and processing.Any kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire IIoT.Moreover,they can allow malicious software installed on end nodes to penetrate the network.This paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge devices.The proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority voting.Experimental evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision. 展开更多
关键词 IIoT Threat hunting edge devices Multi-class anomalies Ensemble methods
下载PDF
LG电子选用Analog Devices和TTPCom的无线技术为手机加入EDGE功能
9
《电信科学》 北大核心 2004年第3期88-88,共1页
关键词 LG电子公司 Analog devices TTPCom公司 无线技术 手机 edge功能
下载PDF
RF MICRO DEVICES推出用于GSM/GPRS/EDGE应用的收发器产品
10
《电信技术》 2003年第1期88-88,共1页
关键词 RF MICRO deviceS GSM GPRS edge 收发器
下载PDF
基于KubeEdge的全国气象监视数据采集软件设计
11
作者 白金婷 罗飞 +5 位作者 孙超 张喜 罗谦 徐达 郭聪 段明静 《计算机技术与发展》 2024年第8期67-72,共6页
为解决气象综合业务实时监控系统(简称“天镜”)对全国气象监视数据采集汇聚安全性、高效性、灵活可管控能力不足的问题,更好地满足全国气象业务集中监视需求,基于“云边协同”的边缘计算KubeEdge架构设计并实现了“天镜”全国气象监视... 为解决气象综合业务实时监控系统(简称“天镜”)对全国气象监视数据采集汇聚安全性、高效性、灵活可管控能力不足的问题,更好地满足全国气象业务集中监视需求,基于“云边协同”的边缘计算KubeEdge架构设计并实现了“天镜”全国气象监视数据采集汇聚软件。国家级“天镜”采用KubeEdge内部通道传递应用程序的控制命令和状态信息,采用气象国省宽带网传输监视数据;采用脚本实现云边端离线自动部署;采用Harbor管理和分发镜像;基于KubeEdge的命令和状态信息实现节点、设备和任务的可视化管控,一体化管控全国边缘节点和采集任务,支持监视任务和数据上传的动态调整。实验结果表明,基于KubeEdge的全国气象监视数据采集汇聚软件有效提高了全国气象监视数据采集汇聚效率和灵活可管控能力,保障了数据传输的安全性。目前该软件已应用于各省(区、市)气象高质量发展通信网络指标评估、全国“天擎”集中监视、全国空间天气全链路状态监视,并取得了良好的业务效益。 展开更多
关键词 边缘计算 Kubeedge 云边协同 数据采集汇聚 灵活可管控 数据传输
下载PDF
gEdge:基于容器技术的云边协同的异构计算框架
12
作者 汪沄 汤冬劼 +2 位作者 郭开诚 戚正伟 管海兵 《计算机学报》 EI CAS CSCD 北大核心 2024年第8期1883-1900,共18页
由于按需灵活配置、高可用性、高资源利用率等优点,云计算技术成为过去十年的主流计算范式.随着万物互联时代的到来,单独依赖云计算技术已经无法满足数以亿计的IoT设备及其数据流量的需求.边缘计算可以被看作是云计算的进化,它因5G网络... 由于按需灵活配置、高可用性、高资源利用率等优点,云计算技术成为过去十年的主流计算范式.随着万物互联时代的到来,单独依赖云计算技术已经无法满足数以亿计的IoT设备及其数据流量的需求.边缘计算可以被看作是云计算的进化,它因5G网络和物联网的崛起而诞生.随着云游戏、VR技术以及人工智能技术在日常生活中的广泛运用,对计算资源的需求也在日渐增长.然而,受体积与功耗限制,处于边缘的节点设备算力较弱.本文提出了gEdge:一种基于容器技术的云边协同的异构计算框架.该框架通过GPU虚拟化技术,将云端的物理GPU资源分为多块虚拟GPU资源,按需为边缘节点提供GPU算力资源,并且对用户容器无感知.实验表明,使用gEdge框架使边缘节点使用的容器镜像体积降低了48.8%,容器启动时间降低了35.5%,平均相对运行速度提高了213%. 展开更多
关键词 图形处理器 虚拟化技术 容器技术 边缘计算 云边协同
下载PDF
On Cost Aware Cloudlet Placement for Mobile Edge Computing 被引量:6
13
作者 Qiang Fan Nirwan Ansari 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2019年第4期926-937,共12页
As accessing computing resources from the remote cloud inherently incurs high end-to-end(E2E)delay for mobile users,cloudlets,which are deployed at the edge of a network,can potentially mitigate this problem.Although ... As accessing computing resources from the remote cloud inherently incurs high end-to-end(E2E)delay for mobile users,cloudlets,which are deployed at the edge of a network,can potentially mitigate this problem.Although some research works focus on allocating workloads among cloudlets,the cloudlet placement aiming to minimize the deployment cost(i.e.,consisting of both the cloudlet cost and average E2E delay cost)has not been addressed effectively so far.The locations and number of cloudlets have a crucial impact on both the cloudlet cost in the network and average E2E delay of users.Therefore,in this paper,we propose the Cost Aware cloudlet PlAcement in moBiLe Edge computing(CAPABLE)strategy,where both the cloudlet cost and average E2E delay are considered in the cloudlet placement.To solve this problem,a Lagrangian heuristic algorithm is developed to achieve the suboptimal solution.After cloudlets are placed in the network,we also design a workload allocation scheme to minimize the E2E delay between users and their cloudlets by considering the user mobility.The performance of CAPABLE has been validated by extensive simulations. 展开更多
关键词 cloudLET PLACEMENT MOBILE cloud COMPUTING MOBILE edge COMPUTING
下载PDF
Energy-Optimal and Delay-Bounded Computation Offloading in Mobile Edge Computing with Heterogeneous Clouds 被引量:25
14
作者 Tianchu Zhao Sheng Zhou +3 位作者 Linqi Song Zhiyuan Jiang Xueying Guo Zhisheng Niu 《China Communications》 SCIE CSCD 2020年第5期191-210,共20页
By Mobile Edge Computing(MEC), computation-intensive tasks are offloaded from mobile devices to cloud servers, and thus the energy consumption of mobile devices can be notably reduced. In this paper, we study task off... By Mobile Edge Computing(MEC), computation-intensive tasks are offloaded from mobile devices to cloud servers, and thus the energy consumption of mobile devices can be notably reduced. In this paper, we study task offloading in multi-user MEC systems with heterogeneous clouds, including edge clouds and remote clouds. Tasks are forwarded from mobile devices to edge clouds via wireless channels, and they can be further forwarded to remote clouds via the Internet. Our objective is to minimize the total energy consumption of multiple mobile devices, subject to bounded-delay requirements of tasks. Based on dynamic programming, we propose an algorithm that minimizes the energy consumption, by jointly allocating bandwidth and computational resources to mobile devices. The algorithm is of pseudo-polynomial complexity. To further reduce the complexity, we propose an approximation algorithm with energy discretization, and its total energy consumption is proved to be within a bounded gap from the optimum. Simulation results show that, nearly 82.7% energy of mobile devices can be saved by task offloading compared with mobile device execution. 展开更多
关键词 mobile edge computing heterogeneous clouds energy saving delay bounds dynamic programming
下载PDF
Adaptive Service Provisioning for Mobile Edge Cloud 被引量:5
15
作者 HUANG Huawei GUO Song 《ZTE Communications》 2017年第2期2-10,共9页
A mobile edge cloud provides a platform to accommodate the offloaded traffic workload generated by mobile devices.It can significantly reduce the access delay for mobile application users.However,the high user mobilit... A mobile edge cloud provides a platform to accommodate the offloaded traffic workload generated by mobile devices.It can significantly reduce the access delay for mobile application users.However,the high user mobility brings significant challenges to the service provisioning for mobile users,especially to delay-sensitive mobile applications.With the objective to maximize a profit,which positively associates with the overall admitted traffic served by the local edge cloud,and negatively associates with the access delay as well as virtual machine migration delay,we study a fundamental problem in this paper:how to update the service provisioning solution for a given group of mobile users.Such a profit-maximization problem is formulated as a nonlinear integer linear programming and linearized by absolute value manipulation techniques.Then,we propose a framework of heuristic algorithms to solve this Nondeterministic Polynomial(NP)-hard problem.The numerical simulation results demonstrate the efficiency of the devised algorithms.Some useful summaries are concluded via the analysis of evaluation results. 展开更多
关键词 edge cloud MOBILE COMPUTING SERVICE PROVISIONING
下载PDF
A review on edge analytics:Issues,challenges,opportunities,promises,future directions,and applications
16
作者 Sabuzima Nayak Ripon Patgiri +1 位作者 Lilapati Waikhom Arif Ahmed 《Digital Communications and Networks》 SCIE CSCD 2024年第3期783-804,共22页
Edge technology aims to bring cloud resources(specifically,the computation,storage,and network)to the closed proximity of the edge devices,i.e.,smart devices where the data are produced and consumed.Embedding computin... Edge technology aims to bring cloud resources(specifically,the computation,storage,and network)to the closed proximity of the edge devices,i.e.,smart devices where the data are produced and consumed.Embedding computing and application in edge devices lead to emerging of two new concepts in edge technology:edge computing and edge analytics.Edge analytics uses some techniques or algorithms to analyse the data generated by the edge devices.With the emerging of edge analytics,the edge devices have become a complete set.Currently,edge analytics is unable to provide full support to the analytic techniques.The edge devices cannot execute advanced and sophisticated analytic algorithms following various constraints such as limited power supply,small memory size,limited resources,etc.This article aims to provide a detailed discussion on edge analytics.The key contributions of the paper are as follows-a clear explanation to distinguish between the three concepts of edge technology:edge devices,edge computing,and edge analytics,along with their issues.In addition,the article discusses the implementation of edge analytics to solve many problems and applications in various areas such as retail,agriculture,industry,and healthcare.Moreover,the research papers of the state-of-the-art edge analytics are rigorously reviewed in this article to explore the existing issues,emerging challenges,research opportunities and their directions,and applications. 展开更多
关键词 edge analytics edge computing edge devices Big data Sensor Artificial intelligence Machine learning Smart technology Healthcare
下载PDF
An Approach for Enabling Intelligent Edge Gateway Based on Microservice Architecture in Cloud Manufacturing 被引量:5
17
作者 WANG Liping TANG Dunbing +2 位作者 NIE Qingwei SONG Jiaye LIU Changchun 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2022年第3期338-348,共11页
Cloud manufacturing has become a reality. It requires sensing and capturing heterogeneous manufacturing resources and extensive data analysis through the industrial internet. However,the cloud computing and serviceori... Cloud manufacturing has become a reality. It requires sensing and capturing heterogeneous manufacturing resources and extensive data analysis through the industrial internet. However,the cloud computing and serviceoriented architecture are slightly inadequate in dynamic manufacturing resource management. This paper integrates the technology of edge computing and microservice and develops an intelligent edge gateway for internet of thing(IoT)-based manufacturing. Distributed manufacturing resources can be accessed through the edge gateway,and cloud-edge collaboration can be realized. The intelligent edge gateway provides a solution for complex resource ubiquitous perception in current manufacturing scenarios. Finally,a prototype system is developed to verify the effectiveness of the intelligent edge gateway. 展开更多
关键词 edge computing intelligent gateway microservice architecture cloud manufacturing
下载PDF
Cloud-Assisted Distributed Edge Brains for Multi-Cell Joint Beamforming Optimization for 6G 被引量:1
18
作者 Juan Deng Kaicong Tian +4 位作者 Qingbi Zheng Jielin Bai Kuo Cui Yitong Liu Guangyi Liu 《China Communications》 SCIE CSCD 2022年第3期36-49,共14页
In 5G networks,optimization of antenna beam weights of base stations has become the key application of AI for network optimization.For 6G,higher frequency bands and much denser cells are expected,and the importance of... In 5G networks,optimization of antenna beam weights of base stations has become the key application of AI for network optimization.For 6G,higher frequency bands and much denser cells are expected,and the importance of automatic and accurate beamforming assisted by AI will become more prominent.In existing network,servers are“patched”to network equipment to act as a centralized brain for model training and inference leading to high transmission overhead,large inference latency and potential risks of data security.Decentralized architectures have been proposed to achieve flexible parameter configuration and fast local response,but it is inefficient in collecting and sharing global information among base stations.In this paper,we propose a novel solution based on a collaborative cloud edge architecture for multi-cell joint beamforming optimization.We analyze the performance and costs of the proposed solution with two other architectural solutions by simulation.Compared with the centralized solution,our solution improves prediction accuracy by 24.66%,and reduces storage cost by 83.82%.Compared with the decentralized solution,our solution improves prediction accuracy by 68.26%,and improves coverage performance by 0.4 dB.At last,the future research work is prospected. 展开更多
关键词 artificial intelligence collaborative cloud edge centralized cloud brain decentralized edge brain 6G mobile communication
下载PDF
Efficient and Cost-Effective Vehicle Detection in Foggy Weather for Edge/Fog-Enabled Traffic Surveillance and Collision Avoidance Systems
19
作者 Naeem Raza Muhammad Asif Habib +3 位作者 Mudassar Ahmad Qaisar Abbas Mutlaq BAldajani Muhammad Ahsan Latif 《Computers, Materials & Continua》 SCIE EI 2024年第10期911-931,共21页
Vision-based vehicle detection in adverse weather conditions such as fog,haze,and mist is a challenging research area in the fields of autonomous vehicles,collision avoidance,and Internet of Things(IoT)-enabled edge/f... Vision-based vehicle detection in adverse weather conditions such as fog,haze,and mist is a challenging research area in the fields of autonomous vehicles,collision avoidance,and Internet of Things(IoT)-enabled edge/fog computing traffic surveillance and monitoring systems.Efficient and cost-effective vehicle detection at high accuracy and speed in foggy weather is essential to avoiding road traffic collisions in real-time.To evaluate vision-based vehicle detection performance in foggy weather conditions,state-of-the-art Vehicle Detection in Adverse Weather Nature(DAWN)and Foggy Driving(FD)datasets are self-annotated using the YOLO LABEL tool and customized to four vehicle detection classes:cars,buses,motorcycles,and trucks.The state-of-the-art single-stage deep learning algorithms YOLO-V5,and YOLO-V8 are considered for the task of vehicle detection.Furthermore,YOLO-V5s is enhanced by introducing attention modules Convolutional Block Attention Module(CBAM),Normalized-based Attention Module(NAM),and Simple Attention Module(SimAM)after the SPPF module as well as YOLO-V5l with BiFPN.Their vehicle detection accuracy parameters and running speed is validated on cloud(Google Colab)and edge(local)systems.The mAP50 score of YOLO-V5n is 72.60%,YOLOV5s is 75.20%,YOLO-V5m is 73.40%,and YOLO-V5l is 77.30%;and YOLO-V8n is 60.20%,YOLO-V8s is 73.50%,YOLO-V8m is 73.80%,and YOLO-V8l is 72.60%on DAWN dataset.The mAP50 score of YOLO-V5n is 43.90%,YOLO-V5s is 40.10%,YOLO-V5m is 49.70%,and YOLO-V5l is 57.30%;and YOLO-V8n is 41.60%,YOLO-V8s is 46.90%,YOLO-V8m is 42.90%,and YOLO-V8l is 44.80%on FD dataset.The vehicle detection speed of YOLOV5n is 59 Frame Per Seconds(FPS),YOLO-V5s is 47 FPS,YOLO-V5m is 38 FPS,and YOLO-V5l is 30 FPS;and YOLO-V8n is 185 FPS,YOLO-V8s is 109 FPS,YOLO-V8m is 72 FPS,and YOLO-V8l is 63 FPS on DAWN dataset.The vehicle detection speed of YOLO-V5n is 26 FPS,YOLO-V5s is 24 FPS,YOLO-V5m is 22 FPS,and YOLO-V5l is 17 FPS;and YOLO-V8n is 313 FPS,YOLO-V8s is 182 FPS,YOLO-V8m is 99 FPS,and YOLO-V8l is 60 FPS on FD dataset.YOLO-V5s,YOLO-V5s variants and YOLO-V5l_BiFPN,and YOLO-V8 algorithms are efficient and cost-effective solution for real-time vision-based vehicle detection in foggy weather. 展开更多
关键词 Vehicle detection YOLO-V5 YOLO-V5s variants YOLO-V8 DAWN dataset foggy driving dataset IoT cloud/edge/fog computing
下载PDF
Combining neural network-based method with heuristic policy for optimal task scheduling in hierarchical edge cloud 被引量:1
20
作者 Zhuo Chen Peihong Wei Yan Li 《Digital Communications and Networks》 SCIE CSCD 2023年第3期688-697,共10页
Deploying service nodes hierarchically at the edge of the network can effectively improve the service quality of offloaded task requests and increase the utilization of resources.In this paper,we study the task schedu... Deploying service nodes hierarchically at the edge of the network can effectively improve the service quality of offloaded task requests and increase the utilization of resources.In this paper,we study the task scheduling problem in the hierarchically deployed edge cloud.We first formulate the minimization of the service time of scheduled tasks in edge cloud as a combinatorial optimization problem,blue and then prove the NP-hardness of the problem.Different from the existing work that mostly designs heuristic approximation-based algorithms or policies to make scheduling decision,we propose a newly designed scheduling policy,named Joint Neural Network and Heuristic Scheduling(JNNHSP),which combines a neural network-based method with a heuristic based solution.JNNHSP takes the Sequence-to-Sequence(Seq2Seq)model trained by Reinforcement Learning(RL)as the primary policy and adopts the heuristic algorithm as the auxiliary policy to obtain the scheduling solution,thereby achieving a good balance between the quality and the efficiency of the scheduling solution.In-depth experiments show that compared with a variety of related policies and optimization solvers,JNNHSP can achieve better performance in terms of scheduling error ratio,the degree to which the policy is affected by re-sources limitations,average service latency,and execution efficiency in a typical hierarchical edge cloud. 展开更多
关键词 edge cloud Task scheduling Neural network Reinforcement learning
下载PDF
上一页 1 2 86 下一页 到第
使用帮助 返回顶部