Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (99)
  • Open Access

    ARTICLE

    A Model Transformation Approach for Detecting Distancing Violations in Weighted Graphs

    Ahmad F. Subahi*

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 13-39, 2021, DOI:10.32604/csse.2021.014376

    Abstract This work presents the design of an Internet of Things (IoT) edge-based system based on model transformation and complete weighted graph to detect violations of social distancing measures in indoor public places. A wireless sensor network based on Bluetooth Low Energy is introduced as the infrastructure of the proposed design. A hybrid model transformation strategy for generating a graph database to represent groups of people is presented as a core middleware layer of the detecting system’s proposed architectural design. A Neo4j graph database is used as a target implementation generated from the proposed transformational system to store all captured real-time… More >

  • Open Access

    ARTICLE

    A Comprehensive Utility Function for Resource Allocation in Mobile Edge Computing

    Zaiwar Ali1, Sadia Khaf2, Ziaul Haq Abbas2, Ghulam Abbas3, Lei Jiao4, Amna Irshad2, Kyung Sup Kwak5, Muhammad Bilal6,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1461-1477, 2021, DOI:10.32604/cmc.2020.013743

    Abstract In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility function for resource allocation in MEC. The utility function considers the heterogeneous nature of applications that a UE offloads to MES. The proposed utility function considers all important parameters, including CPU, RAM, hard disk space, required… More >

  • Open Access

    ARTICLE

    Workload Allocation Based on User Mobility in Mobile Edge Computing

    Tengfei Yang1,2, Xiaojun Shi3, Yangyang Li1,*, Binbin Huang4, Haiyong Xie1,5, Yanting Shen4

    Journal on Big Data, Vol.2, No.3, pp. 105-115, 2020, DOI:10.32604/jbd.2020.010958

    Abstract Mobile Edge Computing (MEC) has become the most possible network architecture to realize the vision of interconnection of all things. By offloading compute-intensive or latency-sensitive applications to nearby small cell base stations (sBSs), the execution latency and device power consumption can be reduced on resource-constrained mobile devices. However, computation delay of Mobile Edge Network (MEN) tasks are neglected while the unloading decision-making is studied in depth. In this paper, we propose a workload allocation scheme which combines the task allocation optimization of mobile edge network with the actual user behavior activities to predict the task allocation of single user. We… More >

  • Open Access

    ARTICLE

    A Novel Edge Computing Based Area Navigation Scheme

    Jianzhong Qi1, 2, *, Qingping Song3, Jim Feng4

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2385-2396, 2020, DOI:10.32604/cmc.2020.011651

    Abstract The area navigation system, discussed in this paper, is composed of ground responders and a navigation terminal and can position a high-velocity aircraft and measure its velocity. This navigation system is silent at ordinary times. It sends out a request signal when positioning is required for an aircraft, and then the ground responders send a signal for resolving the aircraft. Combining the direct sequence spread spectrum and frequency hopping, the concealed communication mode is used in the whole communication process, with short communication pulses as much as possible, so the system has strong concealment and anti-interference characteristics. As the transmission… More >

  • Open Access

    ARTICLE

    MoTransFrame: Model Transfer Framework for CNNs on Low-Resource Edge Computing Node

    Panyu Liu1, Huilin Ren2, Xiaojun Shi3, Yangyang Li4, *, Zhiping Cai1, Fang Liu5, Huacheng Zeng6

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2321-2334, 2020, DOI:10.32604/cmc.2020.010522

    Abstract Deep learning technology has been widely used in computer vision, speech recognition, natural language processing, and other related fields. The deep learning algorithm has high precision and high reliability. However, the lack of resources in the edge terminal equipment makes it difficult to run deep learning algorithms that require more memory and computing power. In this paper, we propose MoTransFrame, a general model processing framework for deep learning models. Instead of designing a model compression algorithm with a high compression ratio, MoTransFrame can transplant popular convolutional neural networks models to resources-starved edge devices promptly and accurately. By the integration method,… More >

  • Open Access

    ARTICLE

    Edge-Computing with Graph Computation: A Novel Mechanism to Handle Network Intrusion and Address Spoofing in SDN

    Rashid Amin1, *, Mudassar Hussain2, Mohammed Alhameed3, Syed Mohsan Raza4, Fathe Jeribi3, Ali Tahir3

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1869-1890, 2020, DOI:10.32604/cmc.2020.011758

    Abstract Software Defined Networking (SDN) being an emerging network control model is widely recognized as a control and management platform. This model provides efficient techniques to control and manage the enterprise network. Another emerging paradigm is edge computing in which data processing is performed at the edges of the network instead of a central controller. This data processing at the edge nodes reduces the latency and bandwidth requirements. In SDN, the controller is a single point of failure. Several security issues related to the traditional network can be solved by using SDN central management and control. Address Spoofing and Network Intrusion… More >

  • Open Access

    ARTICLE

    Efficient Virtual Resource Allocation in Mobile Edge Networks Based on Machine Learning

    Li Li1,*, Yifei Wei1, Lianping Zhang2, Xiaojun Wang3

    Journal of Cyber Security, Vol.2, No.3, pp. 141-150, 2020, DOI:10.32604/jcs.2020.010764

    Abstract The rapid growth of Internet content, applications and services require more computing and storage capacity and higher bandwidth. Traditionally, internet services are provided from the cloud (i.e., from far away) and consumed on increasingly smart devices. Edge computing and caching provides these services from nearby smart devices. Blending both approaches should combine the power of cloud services and the responsiveness of edge networks. This paper investigates how to intelligently use the caching and computing capabilities of edge nodes/cloudlets through the use of artificial intelligence-based policies. We first analyze the scenarios of mobile edge networks with edge computing and caching abilities,… More >

  • Open Access

    ARTICLE

    DL-HAR: Deep Learning-Based Human Activity Recognition Framework for Edge Computing

    Abdu Gumaei1, 2, *, Mabrook Al-Rakhami1, 2, Hussain AlSalman2, Sk. Md. Mizanur Rahman3, Atif Alamri1, 2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1033-1057, 2020, DOI:10.32604/cmc.2020.011740

    Abstract Human activity recognition is commonly used in several Internet of Things applications to recognize different contexts and respond to them. Deep learning has gained momentum for identifying activities through sensors, smartphones or even surveillance cameras. However, it is often difficult to train deep learning models on constrained IoT devices. The focus of this paper is to propose an alternative model by constructing a Deep Learning-based Human Activity Recognition framework for edge computing, which we call DL-HAR. The goal of this framework is to exploit the capabilities of cloud computing to train a deep learning model and deploy it on lesspowerful… More >

  • Open Access

    ARTICLE

    Data Security Defense and Algorithm for Edge Computing Based on Mean Field Game

    Chengshan Qian1,2, Xue Li1,*, Ning Sun2, Yuqing Tian1

    Journal of Cyber Security, Vol.2, No.2, pp. 97-106, 2020, DOI:10.32604/jcs.2020.010548

    Abstract With the development of the Internet of Things, the edge devices are increasing. Cyber security issues in edge computing have also emerged and caused great concern. We propose a defense strategy based on Mean field game to solve the security issues of edge user data during edge computing. Firstly, an individual cost function is formulated to build an edge user data security defense model. Secondly, we research the More >

  • Open Access

    ARTICLE

    Resource Allocation in Edge-Computing Based Wireless Networks Based on Differential Game and Feedback Control

    Ruijie Lin1, Haitao Xu2, *, Meng Li3, Zhen Zhang4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 961-972, 2020, DOI:10.32604/cmc.2020.09686

    Abstract In this paper, we have proposed a differential game model to optimally solve the resource allocation problems in the edge-computing based wireless networks. In the proposed model, a wireless network with one cloud-computing center (CC) and lots of edge services providers (ESPs) is investigated. In order to provide users with higher services quality, the ESPs in the proposed wireless network should lease the computing resources from the CC and the CC can allocate its idle cloud computing resource to the ESPs. We will try to optimally allocate the edge computing resources between the ESPs and CC using the differential game… More >

Displaying 81-90 on page 9 of 99. Per Page