Suggested Topics within your search.
Suggested Topics within your search.
- Education 1
- Educational evaluation 1
- Evaluation 1
- Research 1
- Schools 1
-
241
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
242
Mobile Traffic Prediction at the Edge Through Distributed and Deep Transfer Learning
Published 2024-01-01“…To do so, we propose a novel prediction framework based on edge computing and Deep Transfer Learning (DTL) techniques, using datasets obtained at the edge through a large measurement campaign. …”
Get full text
Article -
243
EDGE STATE METHOD IN MECHANICS PROBLEMS CONCERNING ANISOTROPIC THIN PLATES
Published 2018-12-01“…The isomorphism of spaces allows the process of finding the internal state to be reduced to the study of the edge state isomorphic to it. …”
Get full text
Article -
244
Investigation of Hf/Ti bilayers for the development of transition-edge sensor microcalorimeters
Published 2024-11-01“…The bridges were formed by a photolithographic lift-off process and are intended to be used as the main sensing element of a microcalorimeter based on a transition-edge sensor (TES) in experiments to determine the magnetic moment of neutrinos. …”
Get full text
Article -
245
Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique
Published 2024-09-01“…Its quick and straightforward testing process has become an essential component in our efforts to prevent blindness. …”
Get full text
Article -
246
Edge-Driven Multiple Trajectory Attention Model for Vehicle Routing Problems
Published 2025-03-01“…Our model is built upon the encoder–decoder architecture, incorporating an edge-driven multi-head attention (EDMHA) block within the encoder to better utilize edge information. …”
Get full text
Article -
247
Enhancing Incentive Schemes in Edge Computing through Hierarchical Reinforcement Learning
Published 2025-04-01“… Edge learning is a distributed approach for training machine learning models using data from edge devices. …”
Get full text
Article -
248
Hyperledger Fabric Blockchain for Securing the Edge Internet of Things: A Review
Published 2025-02-01Get full text
Article -
249
Overview of Modern Technologies for Acquiring and Analysing Acoustic Information Based on AI and IoT
Published 2025-06-01Subjects: Get full text
Article -
250
Comparing Geodesic Filtering to State-of-the-Art Algorithms: A Comprehensive Study and CUDA Implementation
Published 2025-05-01Subjects: Get full text
Article -
251
Bridge Displacements Monitoring Method Based on Pixel Sequence
Published 2024-12-01Subjects: Get full text
Article -
252
A near-threshold memristive computing-in-memory engine for edge intelligence
Published 2025-07-01“…Abstract Memristive computing-in-memory and near-threshold computing are two unconventional computing paradigms that can potentially enhance the energy efficiency and real-time performance of edge devices. However, their scalability faces challenges, primarily due to process variation. …”
Get full text
Article -
253
Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints
Published 2024-01-01“…Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. …”
Get full text
Article -
254
Experimental identification of I-mode characteristics at the edge of FIRE mode in KSTAR
Published 2025-01-01“…This coupling typically occurs as the H-mode transition approaches, and its potential link to a regulatory process is discussed. When the coupling manifests, intermittent bursts are observed concurrently, not just at the radial location where the WCM amplitude peaks, but throughout the edge region. …”
Get full text
Article -
255
A Survey on Video Big Data Analytics: Architecture, Technologies, and Open Research Challenges
Published 2025-07-01Subjects: Get full text
Article -
256
Task Offloading and Computation in Hybrid uRLLC and eMBB Cognitive Radio Enabled 5G Based Multiuser Edge Computing
Published 2025-01-01Subjects: Get full text
Article -
257
Edge Computing for Real-Time Climate Data Analysis in Smart Farming
Published 2025-01-01“…By doing data processing at the edge, latency is reduced and the accuracy of the predictions is improved at the same time, so the farmers are able to take data driven decision when it matters most. …”
Get full text
Article -
258
Federated learning based intelligent edge computing technique for video surveillance
Published 2020-10-01“…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
Get full text
Article -
259
Cutting-edge AI tools revolutionizing scientific research in life sciences
Published 2025-03-01Get full text
Article -
260
GreedySlide: An Efficient Sliding Window for Improving Edge-Object Detectors
Published 2022-02-01Get full text
Article