10 research outputs found

    DESIGN FRAMEWORK FOR INTERNET OF THINGS BASED NEXT GENERATION VIDEO SURVEILLANCE

    Get PDF
    Modern artificial intelligence and machine learning opens up new era towards video surveillance system. Next generation video surveillance in Internet of Things (IoT) environment is an emerging research area because of high bandwidth, big-data generation, resource constraint video surveillance node, high energy consumption for real time applications. In this thesis, various opportunities and functional requirements that next generation video surveillance system should achieve with the power of video analytics, artificial intelligence and machine learning are discussed. This thesis also proposes a new video surveillance system architecture introducing fog computing towards IoT based system and contributes the facilities and benefits of proposed system which can meet the forthcoming requirements of surveillance. Different challenges and issues faced for video surveillance in IoT environment and evaluate fog-cloud integrated architecture to penetrate and eliminate those issues. The focus of this thesis is to evaluate the IoT based video surveillance system. To this end, two case studies were performed to penetrate values towards energy and bandwidth efficient video surveillance system. In one case study, an IoT-based power efficient color frame transmission and generation algorithm for video surveillance application is presented. The conventional way is to transmit all R, G and B components of all frames. Using proposed technique, instead of sending all components, first one color frame is sent followed by a series of gray-scale frames. After a certain number of gray-scale frames, another color frame is sent followed by the same number of gray-scale frames. This process is repeated for video surveillance system. In the decoder, color information is formulated from the color frame and then used to colorize the gray-scale frames. In another case study, a bandwidth efficient and low complexity frame reproduction technique that is also applicable in IoT based video surveillance application is presented. Using the second technique, only the pixel intensity that differs heavily comparing to previous frame’s corresponding pixel is sent. If the pixel intensity is similar or near similar comparing to the previous frame, the information is not transferred. With this objective, the bit stream is created for every frame with a predefined protocol. In cloud side, the frame information can be reproduced by implementing the reverse protocol from the bit stream. Experimental results of the two case studies show that the IoT-based proposed approach gives better results than traditional techniques in terms of both energy efficiency and quality of the video, and therefore, can enable sensor nodes in IoT to perform more operations with energy constraints

    Edge Video Analytics: A Survey on Applications, Systems and Enabling Techniques

    Full text link
    Video, as a key driver in the global explosion of digital information, can create tremendous benefits for human society. Governments and enterprises are deploying innumerable cameras for a variety of applications, e.g., law enforcement, emergency management, traffic control, and security surveillance, all facilitated by video analytics (VA). This trend is spurred by the rapid advancement of deep learning (DL), which enables more precise models for object classification, detection, and tracking. Meanwhile, with the proliferation of Internet-connected devices, massive amounts of data are generated daily, overwhelming the cloud. Edge computing, an emerging paradigm that moves workloads and services from the network core to the network edge, has been widely recognized as a promising solution. The resulting new intersection, edge video analytics (EVA), begins to attract widespread attention. Nevertheless, only a few loosely-related surveys exist on this topic. The basic concepts of EVA (e.g., definition, architectures) were not fully elucidated due to the rapid development of this domain. To fill these gaps, we provide a comprehensive survey of the recent efforts on EVA. In this paper, we first review the fundamentals of edge computing, followed by an overview of VA. The EVA system and its enabling techniques are discussed next. In addition, we introduce prevalent frameworks and datasets to aid future researchers in the development of EVA systems. Finally, we discuss existing challenges and foresee future research directions. We believe this survey will help readers comprehend the relationship between VA and edge computing, and spark new ideas on EVA.Comment: 31 pages, 13 figure

    Resource provisioning and scheduling algorithms for hybrid workflows in edge cloud computing

    Get PDF
    In recent years, Internet of Things (IoT) technology has been involved in a wide range of application domains to provide real-time monitoring, tracking and analysis services. The worldwide number of IoT-connected devices is projected to increase to 43 billion by 2023, and IoT technologies are expected to engaged in 25% of business sector. Latency-sensitive applications in scope of intelligent video surveillance, smart home, autonomous vehicle, augmented reality, are all emergent research directions in industry and academia. These applications are required connecting large number of sensing devices to attain the desired level of service quality for decision accuracy in a sensitive timely manner. Moreover, continuous data stream imposes processing large amounts of data, which adds a huge overhead on computing and network resources. Thus, latency-sensitive and resource-intensive applications introduce new challenges for current computing models, i.e, batch and stream. In this thesis, we refer to the integrated application model of stream and batch applications as a hybrid work ow model. The main challenge of the hybrid model is achieving the quality of service (QoS) requirements of the two computation systems. This thesis provides a systemic and detailed modeling for hybrid workflows which describes the internal structure of each application type for purposes of resource estimation, model systems tuning, and cost modeling. For optimizing the execution of hybrid workflows, this thesis proposes algorithms, techniques and frameworks to serve resource provisioning and task scheduling on various computing systems including cloud, edge cloud and cooperative edge cloud. Overall, experimental results provided in this thesis demonstrated strong evidences on the responsibility of proposing different understanding and vision on the applications of integrating stream and batch applications, and how edge computing and other emergent technologies like 5G networks and IoT will contribute on more sophisticated and intelligent solutions in many life disciplines for more safe, secure, healthy, smart and sustainable society

    Vue d'ensemble du problème de placement de service dans Fog and Edge Computing

    Get PDF
    To support the large and various applications generated by the Internet of Things(IoT), Fog Computing was introduced to complement the Cloud Computing and offer Cloud-like services at the edge of the network with low latency and real-time responses. Large-scale, geographical distribution and heterogeneity of edge computational nodes make service placement insuch infrastructure a challenging issue. Diversity of user expectations and IoT devices characteristics also complexify the deployment problem. This paper presents a survey of current research conducted on Service Placement Problem (SPP) in the Fog/Edge Computing. Based on a new clas-sification scheme, a categorization of current proposals is given and identified issues and challenges are discussed.Pour prendre en charge les applications volumineuses et variées générées par l'Internet des objets (IoT), le Fog Computing a été introduit pour compléter le Cloud et exploiter les ressources de calcul en périphérie du réseau afin de répondre aux besoins de calcul à faible latence et temps réel des applications. La répartition géographique à grande échelle et l'hétérogénéité des noeuds de calcul de périphérie rendent difficile le placement de services dans une telle infrastructure. La diversité des attentes des utilisateurs et des caractéristiques des périphériques IoT complexifie également le probllème de déploiement. Cet article présente une vue d'ensemble des recherches actuelles sur le problème de placement de service (SPP) dans l'informatique Fog et Edge. Sur la base d'un nouveau schéma de classification, les solutions présentées dans la littérature sont classées et les problèmes et défis identifiés sont discutés

    Vue d'ensemble du problème de placement de service dans Fog and Edge Computing

    Get PDF
    To support the large and various applications generated by the Internet of Things(IoT), Fog Computing was introduced to complement the Cloud Computing and offer Cloud-like services at the edge of the network with low latency and real-time responses. Large-scale, geographical distribution and heterogeneity of edge computational nodes make service placement insuch infrastructure a challenging issue. Diversity of user expectations and IoT devices characteristics also complexify the deployment problem. This paper presents a survey of current research conducted on Service Placement Problem (SPP) in the Fog/Edge Computing. Based on a new clas-sification scheme, a categorization of current proposals is given and identified issues and challenges are discussed.Pour prendre en charge les applications volumineuses et variées générées par l'Internet des objets (IoT), le Fog Computing a été introduit pour compléter le Cloud et exploiter les ressources de calcul en périphérie du réseau afin de répondre aux besoins de calcul à faible latence et temps réel des applications. La répartition géographique à grande échelle et l'hétérogénéité des noeuds de calcul de périphérie rendent difficile le placement de services dans une telle infrastructure. La diversité des attentes des utilisateurs et des caractéristiques des périphériques IoT complexifie également le probllème de déploiement. Cet article présente une vue d'ensemble des recherches actuelles sur le problème de placement de service (SPP) dans l'informatique Fog et Edge. Sur la base d'un nouveau schéma de classification, les solutions présentées dans la littérature sont classées et les problèmes et défis identifiés sont discutés

    TinySurveillance: A Low-power Event-based Surveillance Method for Unmanned Aerial Vehicles

    Get PDF
    Unmanned Aerial Vehicles (UAVs) have always been faced with power management challenges. Managing power consumption becomes critical, especially in surveillance applications where the longer flight time results in wider coverage and a cheaper solution. While most current studies focus on utilizing new models for improving event detection without considering the power constraints, our design's first priority is our platform's power efficiency. Implementing an algorithm on a portable device with minimal access to power supply sources requires special hardware and software considerations. An improved algorithm may need more powerful hardware, which can surge power consumption. Therefore, we aim to propose a method to be suitable for such devices with power consumption constraints. In this work, we propose an event-driven surveillance method with an efficient video transmission algorithm that reduces power consumption while preserving image quality. The surveillance will start automatically once the low-power AI-based onboard processor detects the desired event. The drone repeatedly solves a classification problem by employing a lightweight deep learning algorithm. When the UAV detects the defined event, a sample image is sent to the server for validation. Afterwards, if the server validates the drone decision, the drone, which can be a UAV, starts sending a colored image accompanied by a group of N grayscale images. Then, in the server, the grayscale images will be colorized using a convolution neural network trained by the colored images. By adopting this method, the sent data rate decreases and the server's computation load increases. The former part results in a drop in the UAV's power consumption, which is our aim. In this work, an application of wildfire detection and surveillance has been implemented to show the proof of concept of the TinySurveillance method. Using four videos of similar scenarios with different spatial and temporal information that a UAV may face, with various spatial and temporal characteristics, we show the effectiveness of our method. Our results show that the power consumption of the onboard processing unit in detection mode will be reduced by at least 4 times, reaching a detection accuracy of 85%, while in surveillance mode, we can decrease the data transmission rate by almost 66% while achieving a competent image quality with PSNR_Avg of 41.35 dB, PSNR of 30.94 dB, and output frame rate of 5.2. Also, the reproduced images show the outstanding performance of the algorithm by generating colorized images identical to the original scenes. There are main features that affect our method's power consumption and output quality, like the number of grayscale images, sent video bitrate, learning rate, and video characteristics that are discussed comprehensively

    Performance Evaluation of Wireless Medium Access Control Protocols for Internet of Things

    Get PDF
    The Internet of Things makes the residents in Smart Cities enjoy a more efficient and high-quality lifestyle by wirelessly interconnecting the physical and visual world. However, the performance of wireless networks is challenged by the ever-growing wireless traffic data, the complexity of the network structures, and various requirements of Quality of Service (QoS), especially on the Internet of Vehicle and wireless sensor networks. Consequently, the IEEE 802.11p and 802.11ah standards were designed to support effective inter-vehicle communications and large-scale sensor networks, respectively. Although their Medium Access Control protocols have attracted much research interest, they have yet to fully consider the influences of channel errors and buffer sizes on the performance evaluation of these Medium Access Control (MAC) protocols. Therefore, this thesis first proposed a new analytical model based on a Markov chain and Queuing analysis to evaluate the performance of IEEE 802.11p under imperfect channels with both saturated and unsaturated traffic. All influential factors of the Enhanced Distributed Channel Access (EDCA) mechanism in IEEE 802.11p are considered, including the backoff counter freezing, Arbitration Inter-Frame Spacing (AIFS) defers, the internal collision, and finite MAC buffer sizes. Furthermore, this proposed model considers more common and actual conditions with the influence of channel errors and finite MAC buffer sizes. The effectiveness and accuracy of the developed model have been validated through extensive ns-3 simulation experiments. Second, this thesis proposes a developed analytical model based on Advanced Queuing Analysis and the Gilbert-Elliot model to analyse the performance of IEEE 802.11p with burst error transmissions. This proposed analytical model simultaneously describes transmission queues for all four Access Categories (AC) queues with the influence of burst errors. Similarly, this presented model can analyse QoS performance, including throughputs and end-to-end delays with the unsaturated or saturated load traffics. Furthermore, this model operates under more actual bursty error channels in vehicular environments. In addition, a series of simulation experiments with a natural urban environment is designed to validate the efficiency and accuracy of the presented model. The simulation results reflect the reliability and effectiveness of the presented model in terms of throughput and end-to-end delays under various channel conditions. Third, this thesis designed and implemented a simulation experiment to analyse the performance of IEEE 802.11ah. These simulation experiments are based on ns-3 and an extension. These simulation experiments' results indicate the Restricted Access Window (RAW) mechanism's influence on the throughputs, end-to-end delays, and packet loss rates. Furthermore, the influences of channel errors and bursty errors are considered in the simulations. The results also show the strong impact of channel errors on the performance of IEEE 802.11ah due to urban environments. Finally, the potential future work based on the proposed models and simulations is analysed in this thesis. The proposed models of IEEE 802.11p can be an excellent fundamental to optimise the QoS due to the precise evaluation of the influence of factors on the performance of IEEE 802.11p. Moreover, it is possible to migrate the analytical models of IEEE 802.11p to evaluate the performance of IEEE 802.11ah

    Direction of the Play: The Fantasticks

    Get PDF
    This project entailed the selection, background research and documentation, musical analysis, casting, direction, vocal coaching, and post-production analysis of Ridgefield High School\u27s production of Tom Jones and Harvey Schmidt\u27s The Fantasticks. Documentation includes research and analysis of the play, its music, and an evaluation of the musical as a production vehicle for the Department of Theatre Arts at Central Washinton University. The analysis also includes a discussion as to the non-traditional directorial vision of this production
    corecore