94,375 research outputs found

    An effective communication and computation model based on a hybridgraph-deeplearning approach for SIoT.

    Get PDF
    Social Edge Service (SES) is an emerging mechanism in the Social Internet of Things (SIoT) orchestration for effective user-centric reliable communication and computation. The services are affected by active and/or passive attacks such as replay attacks, message tampering because of sharing the same spectrum, as well as inadequate trust measurement methods among intelligent devices (roadside units, mobile edge devices, servers) during computing and content-sharing. These issues lead to computation and communication overhead of servers and computation nodes. To address this issue, we propose the HybridgrAph-Deep-learning (HAD) approach in two stages for secure communication and computation. First, the Adaptive Trust Weight (ATW) model with relation-based feedback fusion analysis to estimate the fitness-priority of every node based on directed graph theory to detect malicious nodes and reduce computation and communication overhead. Second, a Quotient User-centric Coeval-Learning (QUCL) mechanism to formulate secure channel selection, and Nash equilibrium method for optimizing the communication to share data over edge devices. The simulation results confirm that our proposed approach has achieved effective communication and computation performance, and enhanced Social Edge Services (SES) reliability than state-of-the-art approaches

    Towards Proactive Mobility-Aware Fog Computing

    Get PDF
    Paljude värkvõrk- ja ärirakenduste tavapäraseks osaks on sõltuvus kaugete pilveteenuste poolt pakutavast andmetöötlusvõimekusest. Arvestatav hulk seesugustest rakendustest koguvad andmeid mitmetelt ümbritsevatelt heterogeensetelt seadmetelt, et pakkuda reaalajal põhinevaid teenuseid oma kasutajatele. Taolise lahenduse negatiivseks küljeks on aga kõrge viiteaeg, mis muutub eriti problemaatiliseks, kui vastava rakenduse efektiivne töö on väleda vastuse saamisega otseses sõltuvuses. Taolise olukorra puhul on viiteaja vähendamiseks välja pakutud uduandmetöötlusel põhinev arhitektuur, mis kujutab endast arvutusmahukate andmetöötlusühikute jaotamist andmeallikate ja lõppkasutajatele lähedal asuvatele arvutusseadmetele. Vaatamata sellele, et uduandmetöötlusel põhinev arhitektuur on paljutõotav, toob see kaasa uusi väljakutseid seoses kvaliteetse uduandmetöötlusteenuse pakkumisega mobiilsetele kasutajatele. Käesolev magistritöö käsitleb proaktiivset lähenemist uduandmetöötlusele, kasutades selleks lähedalasuvatel kasutajatel baseeruvat mobiilset ad hoc võrgustikku, mis võimaldab uduteenusetuvastust ja juurdepääsu ilma pilveteenuse abi kasutamata. Proaktiivset lähenemist kasutatakse nii teenusetuvastuse ja arvutuse migratsiooni kui ka otsese uduteenuse pakkumise käigus, kiirendades arvutusühikute jaotusprotsessi ning parendadades arvutuste jaotust vastavalt käitusaegsele kontekstiinfole (nt. arvutusseadmete hetkevõimekus). Lisaks uuriti uduarvutuse rakendusviisi mobiilses sotsiaal–silmusvõrgustikus, tehes andmeedastuseks optimaalseima valiku vastavalt kuluefektiivsuse indeksile. Lähtudes katsetest nii päris seadmete kui simulaatoritega, viidi läbi käesoleva magistritöö komponentide kontseptuaalsete prototüüpide testhindamine.A common approach for many Internet of Things (IoT) and business applications is to rely on distant Cloud services for the processing of data. Several of these applications collect data from a multitude of proximity-based ubiquitous resources to provide various real-time services for their users. However, this has the downside of resulting in explicit latency of the result, being especially problematic when the application requires a rapid response in the edge network. Therefore, researchers have proposed the Fog computing architecture that distributes the computational data processing tasks to the edge network nodes located in the vicinity of the data sources and end-users, to reduce the latency. Although the Fog computing architecture is promising, it still faces challenges in many areas, especially when dealing with support for mobile users. Utilizing Fog for real-time mobile applications faces the new challenge of ensuring the seamless accessibility of Fog services on the move. Further, Fog computing also faces a challenge in mobility when the tasks originate from mobile ubiquitous applications in which the data sources are moving objects. In this thesis, a proactive approach for Fog computing is proposed, which supports proactive Fog service discovery and process migration using Mobile Ad hoc Social Network in proximity, enabling Fog-assisted ubiquitous service provisioning in proximity without distant Cloud services. Moreover, a proactive approach is also applied for the Fog service provisioning itself, in order to hasten the task distribution process in Mobile Fog use cases and provide an optimization scheme based on runtime context information. In addition, a case study regarding the usage of Fog Computing for the enhancement of Mobile Mesh Social Network was presented, along with a resource-aware Cost-Performance Index scheme to assist choosing the approach to be used for transmission of data. The proposed elements have been evaluated by utilizing a combination of real devices and simulators in order to provide proof-of-concept

    Data Processing in Cyber-Physical-Social Systems Through Edge Computing

    Get PDF
    Cloud and Fog computing have established a convenient and widely adopted approach for computation offloading, where raw data generated by edge devices in the Internet of Things (IoT) context is collected and processed remotely. This vertical offloading pattern, however, typically does not take into account increasingly pressing time constraints of the emerging IoT scenarios, in which numerous data sources, including human agents (i.e., Social IoT), continuously generate large amounts of data to be processed in a timely manner. Big data solutions could be applied in this respect, provided that networking issues and limitations related to connectivity of edge devices are properly addressed. Although edge devices are traditionally considered to be resource-constrained, main limitations refer to energy, networking, and memory capacities, whereas their ever-growing processing capabilities are already sufficient to be effectively involved in actual (big data) processing. In this context, the role of human agents is no longer limited to passive data generation, but can also include their voluntary involvement in relatively complex computations. This way, users can share their personal computational resources (i.e., mobile phones) to support collaborative data processing, thereby turning the existing IoT into a global cyber-physical-social system (CPSS). To this extent, this paper proposes a novel IoT/CPSS data processing pattern based on the stream processing technology, aiming to distribute the workload among a cluster of edge devices, involving mobile nodes shared by contributors on a voluntary basis, and paving the way for cluster computing at the edge. Experiments on an intelligent surveillance system deployed on an edge device cluster demonstrate the feasibility of the proposed approach, illustrating how its distributed in-memory data processing architecture can be effective

    Data Processing in Cyber-Physical-Social Systems Through Edge Computing

    Get PDF
    © 2013 IEEE. Cloud and Fog computing have established a convenient and widely adopted approach for computation offloading, where raw data generated by edge devices in the Internet of Things (IoT) context is collected and processed remotely. This vertical offloading pattern, however, typically does not take into account increasingly pressing time constraints of the emerging IoT scenarios, in which numerous data sources, including human agents (i.e., Social IoT), continuously generate large amounts of data to be processed in a timely manner. Big data solutions could be applied in this respect, provided that networking issues and limitations related to connectivity of edge devices are properly addressed. Although edge devices are traditionally considered to be resource-constrained, main limitations refer to energy, networking, and memory capacities, whereas their ever-growing processing capabilities are already sufficient to be effectively involved in actual (big data) processing. In this context, the role of human agents is no longer limited to passive data generation, but can also include their voluntary involvement in relatively complex computations. This way, users can share their personal computational resources (i.e., mobile phones) to support collaborative data processing, thereby turning the existing IoT into a global cyber-physical-social system (CPSS). To this extent, this paper proposes a novel IoT/CPSS data processing pattern based on the stream processing technology, aiming to distribute the workload among a cluster of edge devices, involving mobile nodes shared by contributors on a voluntary basis, and paving the way for cluster computing at the edge. Experiments on an intelligent surveillance system deployed on an edge device cluster demonstrate the feasibility of the proposed approach, illustrating how its distributed in-memory data processing architecture can be effective

    Next Generation Cloud Computing: New Trends and Research Directions

    Get PDF
    The landscape of cloud computing has significantly changed over the last decade. Not only have more providers and service offerings crowded the space, but also cloud infrastructure that was traditionally limited to single provider data centers is now evolving. In this paper, we firstly discuss the changing cloud infrastructure and consider the use of infrastructure from multiple providers and the benefit of decentralising computing away from data centers. These trends have resulted in the need for a variety of new computing architectures that will be offered by future cloud infrastructure. These architectures are anticipated to impact areas, such as connecting people and devices, data-intensive computing, the service space and self-learning systems. Finally, we lay out a roadmap of challenges that will need to be addressed for realising the potential of next generation cloud systems.Comment: Accepted to Future Generation Computer Systems, 07 September 201

    Snake energy analysis and result validation for a mobile laser scanning data-based automated road edge extraction algorithm

    Get PDF
    © 2008-2012 IEEE. The negative impact of road accidents cannot be ignored in terms of the very sizeable social and economic loss. Road infrastructure has been identified as one of the main causes of the road accidents. They are required to be recorded, located, measured, and classified in order to schedule maintenance and identify the possible risk elements of the road. Toward this, an accurate knowledge of the road edges increases the reliability and precision of extracting other road features. We have developed an automated algorithm for extracting road edges from mobile laser scanning (MLS) data based on the parametric active contour or snake model. The algorithm involves several internal and external energy parameters that need to be analyzed in order to find their optimal values. In this paper, we present a detailed analysis of the snake energy parameters involved in our road edge extraction algorithm. Their optimal values enable us to automate the process of extracting edges from MLS data for tested road sections. We present a modified external energy in our algorithm and demonstrate its utility for extracting road edges from low and nonuniform point density datasets. A novel validation approach is presented, which provides a qualitative assessment of the extracted road edges based on direct comparisons with reference road edges. This approach provides an alternative to traditional road edge validation methodologies that are based on creating buffer zones around reference road edges and then computing quality measure values for the extracted edges. We tested our road edge extraction algorithm on datasets that were acquired using multiple MLS systems along various complex road sections. The successful extraction of road edges from these datasets validates the robustness of our algorithm for use in complex route corridor environments
    corecore