601 research outputs found

    Edge/Fog Computing Technologies for IoT Infrastructure

    Get PDF
    The prevalence of smart devices and cloud computing has led to an explosion in the amount of data generated by IoT devices. Moreover, emerging IoT applications, such as augmented and virtual reality (AR/VR), intelligent transportation systems, and smart factories require ultra-low latency for data communication and processing. Fog/edge computing is a new computing paradigm where fully distributed fog/edge nodes located nearby end devices provide computing resources. By analyzing, filtering, and processing at local fog/edge resources instead of transferring tremendous data to the centralized cloud servers, fog/edge computing can reduce the processing delay and network traffic significantly. With these advantages, fog/edge computing is expected to be one of the key enabling technologies for building the IoT infrastructure. Aiming to explore the recent research and development on fog/edge computing technologies for building an IoT infrastructure, this book collected 10 articles. The selected articles cover diverse topics such as resource management, service provisioning, task offloading and scheduling, container orchestration, and security on edge/fog computing infrastructure, which can help to grasp recent trends, as well as state-of-the-art algorithms of fog/edge computing technologies

    Biometric Security Through Visual Encryption for Fog Edge Computing

    Get PDF
    Fog and mobile edge computing have gained considerable attention from the research and development community. The problems related to security and privacy of biometric content are simpler to solve through edge computing resulting in improved security and privacy of biometric and other critically private information. Zero-watermarking has been proposed as a solution to help protect the ownership of multimedia content that is easy to copy and distribute. Visual cryptography is another approach to secure data that is to be shared through generating multiple shares. This paper is concerned with developing a biometric security solution for face images, using visual cryptography and zero-watermarking, that does not adversely impact the visual quality of the image. The original face image is not modified through the zero-watermarking and visual encryption procedures and this in turn does not adversely impact the recognition rate

    Leveraging Intelligent Computation Offloading with Fog/Edge Computing for Tactile Internet: Advantages and Limitations

    Full text link
    [EN] With the recent advancement in wireless communication and networks, we are at the doorstep of the Tactile Internet. The Tactile Internet aims to enable the skill delivery and thereafter democratize the specialized skills for many emerging applications (e.g., remote medical, industrial machinery, remote robotics, autonomous driving). In this article, we start with the motivation of applying intelligent edge computing for computation offloading in the Tactile Internet. Afterward, we outline the main research challenges to leverage edge intelligence at the master, network, and controlled domain of the Tactile Internet. The key research challenges in the Tactile Internet lie in its stringent requirements such as ultra-low latency, ultra-high reliability, and almost zero service outage. We also discuss major entities in intelligent edge computing and their role in the Tactile Internet. Finally, several potential research challenges in edge intelligence for the Tactile Internet are highlighted.This work was supported in part by the National Natural Science Foundation of China under Grant 61901128, and Agile Edge Intelligence for Delay Sensitive IoT (AgilE-IoT) project (Grant No. 9131-00119B) of Independent Research Fund Denmark (DFF).Mukherjee, M.; Guo, M.; Lloret, J.; Zhang, Q. (2020). Leveraging Intelligent Computation Offloading with Fog/Edge Computing for Tactile Internet: Advantages and Limitations. IEEE Network. 34(5):322-329. https://doi.org/10.1109/MNET.001.200000432232934

    Digital Agriculture and Intelligent Farming Business Using Information and Communication Technology: A Survey

    Get PDF
    Adopting new information and communication technology (ICT) as a solution to achieve food security becomes more urgent than before, particularly with the demographical explosion. In this survey, we analyze the literature in the last decade to examine the existing fog/edge computing architectures adapted for the smart farming domain and identify the most relevant challenges resulting from the integration of IoT and fog/edge computing platforms. On the other hand, we describe the status of Blockchain usage in intelligent farming as well as the most challenges this promising topic is facing. The relevant recommendations and researches needed in Blockchain topic to enhance intelligent farming sustainability are also highlighted. It is found through the examination that the adoption of ICT in the various farming processes helps to increase productivity with low efforts and costs. Several challenges are faced when implementing such solutions, they are mainly related to the technological development, energy consumption, and the complexity of the environments where the solutions are implemented. Despite these constraints, it is certain that shortly several farming businesses will heavily invest to introduce more intelligence into their management methods. Furthermore, the use of sophisticated deep learning and Blockchain algorithms may contribute to the resolution of many recent farming issues

    Power Modelling for Heterogeneous Cloud-Edge Data Centers

    Get PDF
    Existing power modelling research focuses not on the method used for developing models but rather on the model itself. This paper aims to develop a method for deploying power models on emerging processors that will be used, for example, in cloud-edge data centers. Our research first develops a hardware counter selection method that appropriately selects counters most correlated to power on ARM and Intel processors. Then, we propose a two stage power model that works across multiple architectures. The key results are: (i) the automated hardware performance counter selection method achieves comparable selection to the manual selection methods reported in literature, and (ii) the two stage power model can predict dynamic power more accurately on both ARM and Intel processors when compared to classic power models.Comment: 10 pages,10 figures,conferenc
    corecore