Search results for: MOBILE EDGE COMPUTING - Bridge of Knowledge

Search

Search results for: MOBILE EDGE COMPUTING

Filters

total: 1772
filtered: 1239

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: MOBILE EDGE COMPUTING

  • CNN-CLFFA: Support Mobile Edge Computing in Transportation Cyber Physical System

    Publication
    • A. Bhansali
    • R. Kumar Patra
    • P. Bidare Divakarachari
    • P. Falkowski-Gilski
    • G. Shivakanth
    • S. N. Patil

    - IEEE Access - Year 2024

    In the present scenario, the transportation Cyber Physical System (CPS) improves the reliability and efficiency of the transportation systems by enhancing the interactions between the physical and cyber systems. With the provision of better storage ability and enhanced computing, cloud computing extends transportation CPS in Mobile Edge Computing (MEC). By inspecting the existing literatures, the cloud computing cannot fulfill...

    Full text available to download

  • Some Artificial Intelligence Driven Algorithms For Mobile Edge Computing in Smart City

    Publication

    - Year 2019

    Smart mobile devices can share computing workload with the computer cloud that is important when artificial intelligence tools support computer systems in a smart city. This concept brings computing on the edge of the cloud, closer to citizens and it can shorten latency. Edge computing removes a crucial drawback of the smart city computing because city services are usually far away from citizens, physically. Besides, we introduced...

    Full text to download in external service

  • Edge-Computing based Secure E-learning Platforms

    Publication

    - Year 2022

    Implementation of Information and Communication Technologies (ICT) in E-Learning environments have brought up dramatic changes in the current educational sector. Distance learning, online learning, and networked learning are few examples that promote educational interaction between students, lecturers and learning communities. Although being an efficient form of real learning resource, online electronic resources are subject to...

    Full text available to download

  • Big Data and the Internet of Things in Edge Computing for Smart City

    Publication

    - Year 2019

    Requests expressing collective human expectations and outcomes from city service tasks can be partially satisfied by processing Big Data provided to a city cloud via the Internet of Things. To improve the efficiency of the city clouds an edge computing has been introduced regarding Big Data mining. This intelligent and efficient distributed system can be developed for citizens that are supposed to be informed and educated by the...

    Full text to download in external service

  • Mobile Offloading Framework: Solution for Optimizing Mobile Applications Using Cloud Computing

    Publication

    Number of mobile devices and applications is growing rapidly in recent years. Capabilities and performance of these devices can be tremendously extended with the integration of cloud computing. However, multiple challenges regarding implementation of these type of mobile applications are known, like differences in architecture, optimization and operating system support. This paper summarizes issues with mobile cloud computing and...

    Full text available to download

  • Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks

    Publication

    - Year 2014

    We introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...

    Full text to download in external service

  • Rendezvous of heterogeneous mobile agents in edge-weighted networks

    We introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...

    Full text available to download

  • Mobile Cloud computing architecture for massively parallelizablegeometric computation

    Publication
    • V. Sánchez Ribes
    • H. Mora-Mora
    • A. Sobecki
    • F. José Mora Gimeno

    - COMPUTERS IN INDUSTRY - Year 2020

    Cloud Computing is one of the most disruptive technologies of this century. This technology has been widely adopted in many areas of the society. In the field of manufacturing industry, it can be used to provide advantages in the execution of the complex geometric computation algorithms involved on CAD/CAM processes. The idea proposed in this research consists in outsourcing part of the load to be com- puted in the client machines...

    Full text available to download

  • Mobile devices and computing cloud resources allocation for interactive applications

    Using mobile devices such as smartphones or iPads for various interactive applications is currently very common. In the case of complex applications, e.g. chess games, the capabilities of these devices are insufficient to run the application in real time. One of the solutions is to use cloud computing. However, there is an optimization problem of mobile device and cloud resources allocation. An iterative heuristic algorithm for...

    Full text available to download

  • Asynchronous time difference of arrival (ATDOA) method

    Publication

    A new method for a location service in the asynchronous wireless sensor networks is outlined. This method, which is called asynchronous time difference of arrival (ATDOA), enables calculation of the position of a mobile node without knowledge of relative time differences (RTDs) between measuring sensors. The ATDOA method is based on the measurement of time difference of arrival between the node and the same sensor at the discrete...

    Full text to download in external service

  • Detection of the First Component of the Received LTE Signal in the OTDoA Method

    In a modern world there is a growing demand for localization services of various kinds. Position estimation can be realized via cellular networks, especially in the currently widely deployed LTE (Long Term Evolution) networks. However, it is not an easy task in harsh propagation conditions which often occur in dense urban environments. Recently, time-methods of terminal localization within the network have been the focus of attention,...

    Full text available to download

  • Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network

    The capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...

    Full text available to download

  • Multi-criteria Differential Evolution for Optimization of Virtual Machine Resources in Smart City Cloud

    Publication

    - Year 2020

    In a smart city, artificial intelligence tools support citizens and urban services. From the user point of view, smart applications should bring computing to the edge of the cloud, closer to citizens with short latency. However, from the cloud designer point of view, the trade-off between cost, energy and time criteria requires the Pareto solutions. Therefore, the proposed multi-criteria differential evolution can optimize virtual...

    Full text to download in external service

  • A Survey of Vehicular Network Systems for Road Traffic Management

    Publication

    In this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...

    Full text available to download

  • Speaker Recognition Using Convolutional Neural Network with Minimal Training Data for Smart Home Solutions

    Publication

    - Year 2018

    With the technology advancements in smart home sector, voice control and automation are key components that can make a real difference in people's lives. The voice recognition technology market continues to involve rapidly as almost all smart home devices are providing speaker recognition capability today. However, most of them provide cloud-based solutions or use very deep Neural Networks for speaker recognition task, which are...

    Full text to download in external service

  • Big Data from Sensor Network via Internet of Things to Edge Deep Learning for Smart City

    Publication

    - Year 2021

    Data from a physical world is sampled by sensor networks, and then streams of Big Data are sent to cloud hosts to support decision making by deep learning software. In a smart city, some tasks may be assigned to smart devices of the Internet of Things for performing edge computing. Besides, a part of workload of calculations can be transferred to the cloud hosts. This paper proposes benchmarks for division tasks between an edge...

    Full text to download in external service

  • Performance Analysis of the OpenCL Environment on Mobile Platforms

    Publication

    Today’s smartphones have more and more features that so far were only assigned to personal computers. Every year these devices are composed of better and more efficient components. Everything indicates that modern smartphones are replacing ordinary computers in various activities. High computing power is required for tasks such as image processing, speech recognition and object detection. This paper analyses the performance of...

    Full text to download in external service

  • Distributed Architectures for Intensive Urban Computing: A Case Study on Smart Lighting for Sustainable Cities

    Publication

    - IEEE Access - Year 2019

    New information and communication technologies have contributed to the development of the smart city concept. On a physical level, this paradigm is characterised by deploying a substantial number of different devices that can sense their surroundings and generate a large amount of data. The most typical case is image and video acquisition sensors. Recently, these types of sensors are found in abundance in urban spaces and are responsible...

    Full text available to download

  • On-line Search in Two-Dimensional Environment

    We consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...

    Full text available to download

  • Accurate Lightweight Calibration Methods for Mobile Low-Cost Particulate Matter Sensors

    Publication

    - Year 2023

    Monitoring air pollution is a critical step towards improving public health, particularly when it comes to identifying the primary air pollutants that can have an impact on human health. Among these pollutants, particulate matter (PM) with a diameter of up to 2.5 μ m (or PM2.5) is of particular concern, making it important to continuously and accurately monitor pollution related to PM. The emergence of mobile low-cost PM sensors...

    Full text to download in external service

  • Ubiquity of client access in heterogeneous access environment

    With popularization of mobile computing and diverse offer of mobile devices providing functionality comparable to stationary computers, the necessity of providing network access for such users cannot be disputed. The requirement is further reinforced by emergence of general purpose mobile operating systems which provide their full functionality only with network connectivity available and popular XaaS (Anything as a Service) approach....

    Full text available to download

  • A note on the affective computing systems and machines: a classification and appraisal

    Publication

    - Procedia Computer Science - Year 2022

    Affective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a lack of classification of the AfC systems. This study aims to fill this gap by reviewing...

    Full text available to download

  • Collaborative Delivery by Energy-Sharing Low-Power Mobile Robots

    Publication

    - Year 2017

    We study two variants of delivery problems for mobile robots sharing energy. Each mobile robot can store at any given moment at most two units of energy, and whenever two robots are at the same location, they can transfer energy between each other, respecting the maximum capacity. The robots operate in a simple graph and initially each robot has two units of energy. A single edge traversal by an robot reduces its energy by one...

    Full text to download in external service

  • Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application

    Publication
    • H. Mora
    • F. A. Pujol
    • T. Ramírez
    • A. Jimeno-Morenilla
    • J. Szymański

    - Cluster Computing-The Journal of Networks Software Tools and Applications - Year 2024

    Recent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...

    Full text available to download

  • An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments

    Publication

    - SENSORS - Year 2017

    The new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main...

    Full text available to download

  • Moduł platformy SyMEC odpowiedzialny za współpracę serwera MEC z sieciami komórkowymi i bezprzewodowymi sieciami dostępowymi WLAN

    Zaprezentowano moduł współpracy z sieciami dostępowymi, będący istotnym elementem serwera MEC (Multi-access Edge Computing), budowanego w ramach projektu SyMEC i umożliwiającego uruchamianie elementów aplikacyjnych na brzegu sieci. Przedstawiono różnice w wymaganiach dotyczących sposobu realizacji tego komponentu w przypadku sieci dostępowych standaryzowanych przez 3GPP oraz sieci WLAN. Zaproponowana została architektura umożliwiająca...

    Full text available to download

  • Application of genetic algorithms in graph searching problem

    Graph searching is a common approach to solving a problem of capturing a hostile intruder by a group of mobile agents. We assume that this task is performed in environment which we are able to model as a graph G. The question asked is how many agents are needed to capture an arbitrary fast, invisible and smart intruder. This number is called the (edge) search number of G. The strategy which must be performed by agents is called...

  • Optical Sensor Based Gestures Inference Using Recurrent Neural Network in Mobile Conditions

    In this paper the implementation of recurrent neural network models for hand gesture recognition on edge devices was performed. The models were trained with 27 hand gestures recorded with the use of a linear optical sensor consisting of 8 photodiodes and 4 LEDs. Different models, trained off-line, were tested in terms of different network topologies (different number of neurons and layers) and different effective sampling frequency...

  • Adaptacyjny system oświetlania dróg oraz inteligentnych miast

    Publication

    - Year 2024

    Przedmiotem rozprawy jest zbadanie praktycznej możliwości wykrywania w czasie rzeczywistym anomalii w systemie oświetlenia drogowego w oparciu o analizę danych ze inteligentnych liczników energii. Zastosowanie inteligentnych liczników energii elektrycznej (Smart Meter) w systemach oświetlenia drogowego stwarza nowe możliwości w zakresie automatycznej diagnostyki takich niepożądanych zjawisk jak awarie lamp, odstępstwa od harmonogramu...

    Full text available to download

  • Taking advantage of symmetries: Gathering of many asynchronous oblivious robots on a ring

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2010

    One of the recently considered models of robot-based computing makes use of identical, memoryless mobile units placed in nodes of an anonymous graph. The robots operate in Look-Compute-Move cycles; in one cycle, a robot takes a snapshot of the current configuration (Look), takes a decision whether to stay idle or to move to one of the nodes adjacent to its current position (Compute), and in the latter case makes an instantaneous...

    Full text available to download

  • Model otwartej architektury rozproszonych dokumentów elektronicznych wspierającej proces podejmowania decyzji w trybie obliczeń zespołowych

    Publication

    - Year 2013

    Model otwartej architektury mobilnych dokumentów interaktywnych MIND, został opracowany w celu efektywnego zarządzania informacją w procesach podejmowanych przez organizacje oparte na wiedzy. Architektura ta stanowi całościowy opis struktury i funkcjonalności dokumentu, zaprojektowanego w celu realizacji rozproszonego przetwarzania zespołowego i pracy grupowej. Umożliwia automatyczne przejście od statycznej postaci dokumentów...

    Full text to download in external service

  • Gossiping by energy-constrained mobile agents in tree networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2021

    Every node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...

    Full text to download in external service

  • Practical Approach to IP Scheduled Throughput Measurements in Dual Connectivity Systems

    Publication

    IP scheduled throughput defined according to 3GPP TS 36.314 reflects user throughput regardless of traffic characteristics, and therefore has become one of the most important indicators for monitoring Quality of Service (QoS) of the end user in Evolved Universal Terrestrial Radio Access Network (E-UTRAN). However, networks built on a distributed architecture make the above definition impossible to be applied directly due to the...

    Full text available to download

  • Co stymuluje rozwój współczesnej teleinformatyki i jakie są istotne kierunki tego rozwoju?

    Publication
    • J. Woźniak
    • J. M. Batalla
    • A. Bęben
    • M. Natkaniec
    • Z. Piotrowski
    • K. Szczypiorski

    - Przegląd Telekomunikacyjny + Wiadomości Telekomunikacyjne - Year 2022

    Corocznie dokonuje się oceny stanu sztuki i tendencji w rozwoju światowej telekomunikacji i (tele)informatyki przywołując „mierzalne” i „niemierzalne” zmiany. W artykule przedstawiono charakter tych zmian oraz wskazano wyzwania badawcze i wdrożeniowe istotne dla rozwoju tych dyscyplin. Zaprezentowano i scharakteryzowano ewolucję infrastruktury sieciowej prowadzącą do sieci programowalnych SDN (Software Defined Network) oraz wykorzystania...

    Full text available to download

  • Automated Classifier Development Process for Recognizing Book Pages from Video Frames

    One of the latest developments made by publishing companies is introducing mixed and augmented reality to their printed media (e.g. to produce augmented books). An important computer vision problem that they are facing is classification of book pages from video frames. The problem is non-trivial, especially considering that typical training data is limited to only one digital original per book page, while the trained classifier...

    Full text to download in external service

  • A Review of Emotion Recognition Methods Based on Data Acquired via Smartphone Sensors

    Publication

    In recent years, emotion recognition algorithms have achieved high efficiency, allowing the development of various affective and affect-aware applications. This advancement has taken place mainly in the environment of personal computers offering the appropriate hardware and sufficient power to process complex data from video, audio, and other channels. However, the increase in computing and communication capabilities of smartphones,...

    Full text available to download

  • Linear game non-contextuality and Bell inequalities—a graph-theoretic approach

    Publication

    - NEW JOURNAL OF PHYSICS - Year 2016

    We study the classical and quantum values of a class of one-and two-party unique games, that generalizes the well-known XOR games to the case of non-binary outcomes. In the bipartite case the generalized XOR(XOR-d) games we study are a subclass of the well-known linear games. We introduce a 'constraint graph' associated to such a game, with the constraints defining the game represented by an edge-coloring of the graph. We use the...

    Full text available to download

  • Sawing Processes as a Way of Determining Fracture Toughness and Shear Yield Stresses of Wood

    Publication

    - BIORESOURCES - Year 2015

    A new computational model, based on fracture mechanics, was used to determine cutting forces. Unlike traditional computing methods, which depend on many coefficients reflecting the machining of solid wood, the new model uses two main parameters: fracture toughness and shear yield stresses. The aim of this study was to apply this new method to determine these parameters for the tooth cutting edge principal positions and longitudinal...

    Full text available to download

  • LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module

    Monitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...

    Full text available to download

  • Detection of Anomalies in the Operation of a Road Lighting System Based on Data from Smart Electricity Meters

    Publication

    - ENERGIES - Year 2022

    Smart meters in road lighting systems create new opportunities for automatic diagnostics of undesirable phenomena such as lamp failures, schedule deviations, or energy theft from the power grid. Such a solution fits into the smart cities concept, where an adaptive lighting system creates new challenges with respect to the monitoring function. This article presents research results indicating the practical feasibility of real‐time...

    Full text available to download

  • Cross-layer mDNS/ARP integration for IEEE 802.11s Wireless mesh Network

    Publication

    - Year 2016

    Popularization of mobile computing devices created a need for robust, efficient and ubiquitous methods of communication and network access. At the same time, evolution and standardization of Wireless Local Area Network (WLAN) technologies made them an attractive solution for building of complex network systems. Moreover, growing maturity of WLAN standards such as IEEE 802.11 allows for introduction of WLAN architectures other than...

    Full text to download in external service

  • ROBOT TYPU QUADROCOPTER STEROWANY MIKROKONTROLERAMI O NIEWIELKIEJ MOCY OBLICZENIOWEJ

    Współczesna robotyka rozwija się bardzo dynamicznie. Coraz więcej osób prywatnych i inżynierów konstruuje różnego rodzaju pojazdy mobilne. Dlatego autorzy niniejszego referatu postawili sobie następującą tezę: możliwa jest budowa latającego robota mobilnego na bazie kontrolera o niskiej mocy obliczeniowej oraz prostego regulatora, i podjęli się jej udowodnienia.

    Full text available to download

  • Architektura przyszłości – przekraczanie granic poprzez interfejsy

    Publication

    - Year 2014

    Architektura przyszłości rozpatrywana jest w kontekście rozwoju technologii cyfrowych, które umożliwiają nadawanie obiektom architektonicznym cech interfejsów. Przekraczanie granic dotyczy więc nadawania architekturze nowych funkcji - funkcjonalności zapożyczonych ze świata wirtualnego, emisji informacji oraz interakcji. W tym ujęciu „interfejs architektoniczny” stanowi płaszczyznę komunikacji pomiędzy obiektem architektonicznym...

  • Biblioteka PG w strukturach ogólnokrajowej sieci bibliotecznej (OSB)

    Publication

    - Pismo PG - Year 2023

    Biblioteka Politechniki Gdańskiej została włączona do ogólnokrajowej sieci bibliotecznej (OSB). Proces rozbudowy OSB opiera się na wdrażaniu działającego w chmurze (cloud computing) systemu bibliotecznego Alma (z wyszukiwarką Primo), używanego przez ponad 3 tysiące bibliotek na świecie. Jest to system biblioteczny nowej generacji działający w oparciu o usługę chmurową typu Multitenant SaaS. Oznacza to, że system biblioteczny...

    Full text to download in external service

  • Mobile Security: Threats and Best Practices

    Publication

    - Mobile Information Systems - Year 2020

    Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...

    Full text available to download

  • Distributed Evacuation in Graphs with Multiple Exits

    Publication

    We consider the problem of efficient evacuation using multiple exits. We formulate this problem as a discrete problem on graphs where mobile agents located in distinct nodes of a given graph must quickly reach one of multiple possible exit nodes, while avoiding congestion and bottlenecks. Each node of the graph has the capacity of holding at most one agent at each time step. Thus, the agents must choose their movements strategy...

    Full text to download in external service

  • Soft Real-Time Communication with WebSocket and WebRTC Protocols Performance Analysis for Web-based Control Loops

    Publication

    - Year 2019

    The web browser has become an access window for content and services. The browser is available on almost any device connected to the network, regardless of its intended use: desktop, mobile device, computing server, e-book reader etc. Browsers are used by people to read news, contact the world, to check a bank account, register a visit at the doctor, watching video content, electronic purchases, using web versions of the office...

    Full text to download in external service

  • Global edge alliances in graphs

    In the paper we introduce and study a new problem of finding a minimum global edge alliance in a graph which is related to the global defensive alliance (Haynes et al., 2013; Hedetniemi, 2004) and the global defensive set (Lewoń et al., 2016). We proved the NP-completeness of the global edge alliance problem for subcubic graphs and we constructed polynomial time algorithms for trees. We found the exact values of the size of the...

    Full text available to download

  • Edge subdivision and edge multisubdivision versus some domination related parameters in generalized corona graphs

    Publication

    - Opuscula Mathematica - Year 2016

    Given a graph G= (V, E), the subdivision of an edge e=uv∈E(G) means the substitution of the edge e by a vertex x and the new edges ux and xv. The domination subdivision number of a graph G is the minimum number of edges of G which must be subdivided (where each edge can be subdivided at most once) in order to increase the domination number. Also, the domination multisubdivision number of G is the minimum number of subdivisions...

    Full text available to download

  • Optimal edge-coloring with edge rate constraints

    Publication

    - NETWORKS - Year 2013

    We consider the problem of covering the edges of a graph by a sequence of matchings subject to the constraint that each edge e appears in at least a given fraction r(e) of the matchings. Although it can be determined in polynomial time whether such a sequence of matchings exists or not [Grötschel et al., Combinatorica (1981), 169–197], we show that several questions about the length of the sequence are computationally intractable....

    Full text to download in external service