-
81
An Intelligent and Cost-Efficient Resource Consolidation Algorithm in Nanoscale Computing Environments
Published 2020-09-01“…The representative case would be the edge cloud, where small computing servers are deployed close to the cloud users to enhance the responsiveness and reduce turnaround time. …”
Get full text
Article -
82
SPOT: Secure and Privacy-Preserving PrOximiTy Protocol for e-Healthcare Systems
Published 2022-01-01“…It relies on a distributed proxy-based approach to preserve users’ privacy and a semi-trusted computing server to ensure data consistency and integrity. …”
Get full text
Article -
83
IRS-Assisted Physical Layer Security for 5G Enabled Industrial Internet of Things
Published 2023-01-01“…5G is a key enabler of Industrial Internet of Things (IIoT) that provides seamless connectivity between machines, sensors and computing servers. Security and privacy are major concerns for 5G enabled IIoT. …”
Get full text
Article -
84
A Microgrid Security Defense Method Based on Cooperation in an Edge-Computing Environment
Published 2023-01-01“…First, we build the edge-computing framework for microgrid, deploy the edge-computing server near the equipment terminal to improve the data processing efficiency, and deploy the blockchain in the edge server to ensure the reliability of the system. …”
Get full text
Article -
85
Enhanced whale optimization algorithm for dependent tasks offloading problem in multi-edge cloud computing
Published 2024-06-01“…We operate within a system comprising many decentralized Mobile Edge Computing servers (MECs) and a centralized cloud server. …”
Get full text
Article -
86
Optimizing the Agricultural Internet of Things (IoT) with Edge Computing and Low-Altitude Platform Stations
Published 2024-11-01“…By integrating edge computing servers into LAPSs, data can be processed directly at the edge in real time, significantly reducing latency and dependency on remote cloud servers. …”
Get full text
Article -
87
Minimizing Thermal Stress for Data Center Servers through Thermal-Aware Relocation
Published 2014-01-01“…A rise in inlet air temperature may lower the rate of heat dissipation from air cooled computing servers. This introduces a thermal stress to these servers. …”
Get full text
Article -
88
Multi-Task and Multi-Step Computation Offloading in Ultra-dense IoT Networks
Published 2022-06-01“…With the rapid development of Internet of Things(IoT),various IoT mobile devices(IMDs) need to process more and more computing-intensive and delay-sensitive tasks,which puts forward new challenges for the mobile edge networks.To address these challenges,the MEC-equipped ultra-dense IoT has emerged.In such networks,IMDs can save their computation resources and reduce their energy consumption by offloading computing-intensive tasks to edge computing servers for processing.However,it will result in additional transmission time and higher delay.In view of this,an optimization problem is formulated for finding the trade-off between energy consumption and delay,which jointly considers the user(IMD) association,computation offloading and resource allocation for ultra-dense MEC-enabled IoT.To further balance the network load and fully utilize the computation resources,the optimization problem is finally modeled as multi-step computation offloading one.At last,an intelligent algorithm,adaptive particle swarm optimization(PSO),is utilized to solve the proposed problem.Compared with traditional PSO,the total cost of adaptive PSO reduces by 20%~65%.…”
Get full text
Article -
89
A comprehensive review on internet of things task offloading in multi-access edge computing
Published 2024-05-01“…With the rapid development of Internet of Things (IoT) technology, Terminal Devices (TDs) are more inclined to offload computing tasks to higher-performance computing servers, thereby solving the problems of insufficient computing capacity and rapid battery consumption of TD. …”
Get full text
Article -
90
Router Activation Heuristics for Energy-Saving ECMP and Valiant Routing in Data Center Networks
Published 2023-05-01“…We designed and developed several efficient heuristics for equal-cost multipath (ECMP) and Valiant routing that reduce the energy consumption in the computer network interconnecting computing servers. Implementing these heuristics enables the selection of routing paths and relay nodes based on current and predicted internal network load. …”
Get full text
Article -
91
Intelligent Task Offloading in Fog Computing Based Vehicular Networks
Published 2022-04-01“…However, it is sometimes not possible for the fog computing server to process all offloaded tasks. In this work, a utility function for the RSU to process these offloaded tasks is designed. …”
Get full text
Article -
92
Mobile edge computing resource allocation: A joint Stackelberg game and matching strategy
Published 2019-07-01“…It is proved that the allocation strategy can optimize the utility of mobile edge computing server and improve allocating efficiency. Simulation results show the effectiveness of the proposed strategy compared with schemes based on auction game, and present performance with different changing system parameters.…”
Get full text
Article -
93
Efficient Privacy-Preserving <i>K</i>-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation
Published 2022-08-01“…More concretely, the clustering task is outsourced to three semi-honest computing servers. Theoretically, the proposed privacy-preserving scheme can be proven with full data privacy. …”
Get full text
Article -
94
Security-aware energy-efficient design for mobile edge computing network operating with finite blocklength codes
Published 2024-09-01“…Specifically, we examine a three-node scenario involving a user, a legitimate edge computing server, and an eavesdropper, where the user offloads sensitive data to the edge server while facing potential eavesdropping threats. …”
Get full text
Article -
95
Multi-User Computation Offloading and Resource Allocation Algorithm in a Vehicular Edge Network
Published 2024-03-01“…In Vehicular Edge Computing Network (VECN) scenarios, the mobility of vehicles causes the uncertainty of channel state information, which makes it difficult to guarantee the Quality of Service (QoS) in the process of computation offloading and the resource allocation of a Vehicular Edge Computing Server (VECS). A multi-user computation offloading and resource allocation optimization model and a computation offloading and resource allocation algorithm based on the Deep Deterministic Policy Gradient (DDPG) are proposed to address this problem. …”
Get full text
Article -
96
Applying an auction optimization algorithm to mobile edge computing for security
Published 2022-06-01“…Abstract The great demand for mobile blockchain computing power is often unsatisfied by terminal devices, so computational tasks are offloaded to edge computing servers. This paper proposes a new mobile communication blockchain assumption, forms a computing power alliance (CPA), and builds a smart contract‐based security model. …”
Get full text
Article -
97
Uniting cyber security and machine learning: Advantages, challenges and future research
Published 2022-09-01“…Cyber security is the practice of protecting digital systems, such as computers, servers, mobile devices, networks and associated data from malicious attacks. …”
Get full text
Article -
98
Privacy-preserving deep learning for electricity consumer characteristics identification
Published 2022-09-01“…In our protocols, the retailers secret-share their raw data to three computational servers, which implement deep learning training and inference through lightweight replicated secret sharing techniques. …”
Get full text
Article -
99
Panoramic Assessment Method of Substation Equipment Health Status Based on Multisource Monitoring and Deep Convolution Neural Network under Edge Computing Architecture
Published 2023-01-01“…Firstly, a panoramic sensing system for substation equipment is built based on edge computing, and an edge computing server is deployed in the substation to process the massive data obtained from multisource monitoring nearby. …”
Get full text
Article -
100
Hierarchical Clustering via Single and Complete Linkage Using Fully Homomorphic Encryption
Published 2024-07-01“…Therefore, we propose a cooperative approach in which the data owner aids the sorting process and shares a list of data positions with a computation server. Using this list, the server can determine the clustering of the data points. …”
Get full text
Article