Showing 241 - 260 results of 3,870 for search 'edge process', query time: 0.11s Refine Results
  1. 241

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  2. 242

    Mobile Traffic Prediction at the Edge Through Distributed and Deep Transfer Learning by Alfredo Petrella, Marco Miozzo, Paolo Dini

    Published 2024-01-01
    “…To do so, we propose a novel prediction framework based on edge computing and Deep Transfer Learning (DTL) techniques, using datasets obtained at the edge through a large measurement campaign. …”
    Get full text
    Article
  3. 243

    EDGE STATE METHOD IN MECHANICS PROBLEMS CONCERNING ANISOTROPIC THIN PLATES by D. A. Ivanychev

    Published 2018-12-01
    “…The isomorphism of spaces allows the process of finding the internal state to be reduced to the study of the edge state isomorphic to it. …”
    Get full text
    Article
  4. 244

    Investigation of Hf/Ti bilayers for the development of transition-edge sensor microcalorimeters by Victoria Y. Safonova, Anna V. Gordeeva, Anton V. Blagodatkin, Dmitry A. Pimanov, Anton A. Yablokov, Andrey L. Pankratov

    Published 2024-11-01
    “…The bridges were formed by a photolithographic lift-off process and are intended to be used as the main sensing element of a microcalorimeter based on a transition-edge sensor (TES) in experiments to determine the magnetic moment of neutrinos. …”
    Get full text
    Article
  5. 245

    Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique by Dipta Neogi, Mahirul Alam Chowdhury, Mst. Moriom Akter, Md. Ishan Arefin Hossain

    Published 2024-09-01
    “…Its quick and straightforward testing process has become an essential component in our efforts to prevent blindness. …”
    Get full text
    Article
  6. 246

    Edge-Driven Multiple Trajectory Attention Model for Vehicle Routing Problems by Dapeng Yan, Bei Ou, Qingshu Guan, Zheng Zhu, Hui Cao

    Published 2025-03-01
    “…Our model is built upon the encoder–decoder architecture, incorporating an edge-driven multi-head attention (EDMHA) block within the encoder to better utilize edge information. …”
    Get full text
    Article
  7. 247

    Enhancing Incentive Schemes in Edge Computing through Hierarchical Reinforcement Learning by Gowtham R, Vatsala Anand, Yadati Vijaya Suresh, Kasetty Lakshmi Narasimha, R. Anil Kumar, V. Saraswathi

    Published 2025-04-01
    “… Edge learning is a distributed approach for training machine learning models using data from edge devices. …”
    Get full text
    Article
  8. 248
  9. 249
  10. 250
  11. 251
  12. 252

    A near-threshold memristive computing-in-memory engine for edge intelligence by Linfang Wang, Weizeng Li, Zhidao Zhou, Junjie An, Wang Ye, Zhi Li, Hanghang Gao, Hongyang Hu, Jing Liu, Xiaoming Chen, Ling Li, Qi Liu, Mingoo Seok, Chunmeng Dou, Ming Liu

    Published 2025-07-01
    “…Abstract Memristive computing-in-memory and near-threshold computing are two unconventional computing paradigms that can potentially enhance the energy efficiency and real-time performance of edge devices. However, their scalability faces challenges, primarily due to process variation. …”
    Get full text
    Article
  13. 253

    Efficient Anomaly Detection for Edge Clouds: Mitigating Data and Resource Constraints by Javad Forough, Hamed Haddadi, Monowar Bhuyan, Erik Elmroth

    Published 2024-01-01
    “…Anomaly detection plays a vital role in ensuring the security and reliability of edge clouds, which are decentralized computing environments with limited resources. …”
    Get full text
    Article
  14. 254

    Experimental identification of I-mode characteristics at the edge of FIRE mode in KSTAR by Chweeho Heo, SangJin Park, GyungJin Choi, Jaewook Kim, Eun-jin Kim, YoungMu Jeon, Minjun J. Choi, Hyunsun Han, Choongki Sung, TaikSoo Hahm, Yong-Su Na

    Published 2025-01-01
    “…This coupling typically occurs as the H-mode transition approaches, and its potential link to a regulatory process is discussed. When the coupling manifests, intermittent bursts are observed concurrently, not just at the radial location where the WCM amplitude peaks, but throughout the edge region. …”
    Get full text
    Article
  15. 255
  16. 256
  17. 257

    Edge Computing for Real-Time Climate Data Analysis in Smart Farming by Shnain Ammar Hameed, Abed Z., Annapoorna Errabelli

    Published 2025-01-01
    “…By doing data processing at the edge, latency is reduced and the accuracy of the predictions is improved at the same time, so the farmers are able to take data driven decision when it matters most. …”
    Get full text
    Article
  18. 258

    Federated learning based intelligent edge computing technique for video surveillance by Yu ZHAO, Jie YANG, Miao LIU, Jinlong SUN, Guan GUI

    Published 2020-10-01
    “…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
    Get full text
    Article
  19. 259
  20. 260