Suggested Topics within your search.
Suggested Topics within your search.
- Education 1
- Educational evaluation 1
- Evaluation 1
- Research 1
- Schools 1
-
121
Survey on edge computing technology for autonomous driving
Published 2021-03-01“…Edge computing plays an extremely important role in the environment perception and data processing of autonomous driving.Autonomous driving vehicles can expand their perception scope by obtaining environmental information from edge nodes, and can also deal with the problem of insufficient computing resources by offloading tasks to edge nodes.Compared with cloud computing, edge computing avoids high latency caused by long-distance data transmission, and provides autonomous driving vehicles with faster responses, and relieves the traffic load of the backbone network.Firstly, the edge computing-based cooperative perception and task offloading technologies for autonomous vehicles were introduced firstly, and related challenging issues were also proposed.Then the state-of-the-art of cooperative perception and task offloading technologies were analyzed and summarized.Finally, the problems need to be further studied in this field were discussed.…”
Get full text
Article -
122
A blockchain sharding scheme in edge computing
Published 2023-12-01“…The low security and poor privacy of the data in edge computing restrict the development of edge computing.Block chains can provide security for data in edge computing using their own tamper resistance, while protecting privacy by use of traceability.But the bottleneck of blockchain's scalability has become a barrier to their application in the field of edge computing.To solve the problem that blockchain can not meet the needs of a large number of nodes to process data at the same time when applied to edge computing, a two-layer sharding scheme was presented, which meets the needs of edge computing scenarios.Geographic location-based partitioning of nodes was implemented using the improved K-means algorithm, and a local blockchain network consensus (LBNC) algorithm was designed based on the idea of delegated proof of stake (DPoS) and practical Byzantine fault tolerance (PBFT).Simulation results show that the proposed scheme has less delay and higher throughput than those of PBFT, and the total throughput increases with the number of shards.…”
Get full text
Article -
123
RESOURCES OF COMPETITIVE EDGE ENTERPRISE IN MODERN CONDITIONS
Published 2013-09-01Get full text
Article -
124
Assurance in Advanced 5G Edge Continuum
Published 2024-01-01“…The implementation of distributed applications is more frequently achieved through the configuration of service-oriented workflows, which are then deployed within the Edge-Cloud Continuum. This approach facilitates the support of distributed processing pipelines. …”
Get full text
Article -
125
Fortified-Edge 2.0: Advanced Machine-Learning-Driven Framework for Secure PUF-Based Authentication in Collaborative Edge Computing
Published 2025-06-01“…This research introduces Fortified-Edge 2.0, a novel authentication framework that addresses critical security and privacy challenges in Physically Unclonable Function (PUF)-based systems for collaborative edge computing (CEC). …”
Get full text
Article -
126
-
127
Restoration of Motion Blurred Images Based on Rich Edge Region Extraction Using a Gray-Level Co-Occurrence Matrix
Published 2018-01-01Subjects: “…Image processing…”
Get full text
Article -
128
System and application of video surrveillance based on edge computing
Published 2020-06-01“…With the popularization of video surveillance systems and the diversification of their applications,traditional data processing methods using cloud computing to handle all the computations are more and more unsustainable.Edge computing pre-processes video data nearby,and performs well in terms of bandwidth,storage,and latency,but edge-cloud collaboration is still required to improve overall performance.The architecture of edge-cloud collaborative video surveillance system was proposed,then an open edge node design scheme and algorithm training and inferencing ideas were proposed.Finally,taking forest fire prevention and smart poles & towers as examples,the application realization and value of edge computing in video surveillance services were illustrated.…”
Get full text
Article -
129
Security, QoS and energy aware optimization of cloud-edge data centers using game theory and homomorphic encryption: Modeling and formal verification
Published 2024-12-01Subjects: “…Cloud-edge data centers…”
Get full text
Article -
130
Upper Mantle Earthquakes Along the Edge of the Wyoming Craton
Published 2025-05-01“…We infer a mixture of brittle and ductile (thermal runaway) source processes facilitated by elevated strain rates from regional or edge‐driven mantle convection, which is thought to be a primary force behind crustal seismicity in the Intermountain West.…”
Get full text
Article -
131
New algorithms to Enhanced Fused Images from Auto-Focus Images
Published 2021-03-01Subjects: Get full text
Article -
132
Edge Computing Architecture for the Management of Underwater Cultural Heritage
Published 2024-12-01“…This paper proposes an innovative platform combining the internet of underwater things and edge computing technologies to enhance UCH’s real-time monitoring, localisation, and management. …”
Get full text
Article -
133
Diabetic neuropathy: cutting-edge research and future directions
Published 2025-04-01Get full text
Article -
134
Multifocus Images Fusion Based On Homogenity and Edges Measures
Published 2014-06-01Get full text
Article -
135
Technology and equipment for friction stir preweld edge preparation
Published 2021-09-01“…The same setup can be used for the friction stir welding process. To calculate the geometry of the thickened edges and the parameters of the deforming roller depending on the value of the edge settlement, a mathematical model based on the contact problem for elastic (roller) and elastoplastic (blank) bodies with a bilinear hardening law has been developed. …”
Get full text
Article -
136
Learning edge importance in bipartite graph-based recommendations
Published 2022-09-01Get full text
Article -
137
Direct communication of edge elements in the Industrial Internet of Things
Published 2020-09-01Get full text
Article -
138
Real-time multiple people gait recognition in the edge
Published 2025-06-01“…Abstract Deploying deep learning models on edge devices offers advantages in terms of data security and communication latency. …”
Get full text
Article -
139
5G edge computing technology and application prospects
Published 2019-06-01“…Edge computing is a method of processing data physically close to where data is generated,and it is one of the key technologies of 5G.The development of network technology and the demand of business applications have jointly promoted the maturity of 5G edge computing.The 5G edge computing technology system was elaborated through the perspective of edge infrastructure,edge computing network and edge platform,and the 5G edge computing application was prospected.…”
Get full text
Article -
140
Research on incentive mechanism for mobile intelligent edge computing
Published 2019-06-01“…As a new architecture,mobile edge computing gives edge users stronger capabilities of computing,storage and communication,but it needs reasonable incentives mechanism to motivate edge users to provide resources.In terms of the three typical scenarios of mobile intelligent edge computing:computation offloading,edge caching and data collection,the incentive mechanism in the above scenarios was studied at first,then the core scientific problems were proposed that need to be solved in the incentive mechanism design of mobile intelligent edge computing from three perspectives of service quality,network quality and data quality.Finally,the technical challenges in the process of solving the above problems were analysed deeply and the corresponding feasible solutions were given.…”
Get full text
Article