[HTML][HTML] All one needs to know about fog computing and related edge computing paradigms: A complete survey

A Yousefpour, C Fung, T Nguyen, K Kadiyala… - Journal of Systems …, 2019 - Elsevier
Abstract With the Internet of Things (IoT) becoming part of our daily life and our environment,
we expect rapid growth in the number of connected devices. IoT is expected to connect …

IoT-Fog architectures in smart city applications: A survey

SS Hajam, SA Sofi - China Communications, 2021 - ieeexplore.ieee.org
Smart cities improve the quality of life of people by utilizing the benefits of Information and
communication technology (ICT) and the Internet of things (IoT). The applications of the …

Flying through the secure fog: a complete study on UAV‐fog in heterogeneous networks

A Gupta, SK Gupta - International journal of communication …, 2022 - Wiley Online Library
A drone or unmanned aerial vehicles (UAVs) is becoming a trending area for researchers
worldwide. UAV's contribution is increasing in day‐to‐day life, whether it is in a military zone …

[PDF][PDF] All one needs to know about fog computing and related edge computing paradigms

A Yousefpour, C Fung, T Nguyen, K Kadiyala… - Journal of Systems … - researchgate.net
In today's information technology age, data is the main commodity, and possessing more
data typically generates more value in datadriven businesses. According to the International …

An empirical comparison of machine learning algorithms for attack detection in internet of things edge

J Manokaran, G Vairavel - ECS Transactions, 2022 - iopscience.iop.org
This research work is aimed to perform a comparative analysis of different machine learning
algorithms for attack detection at the Internet of Things (IoT) edge. Due to the rising …

Optimizing machine learning-based, edge computing networks

A Anghel, G Kathareios, M Gusat - US Patent 11,347,970, 2022 - Google Patents
Optimizing a network comprising a core computing system (CCS) and a set of edge
computing devices (ECDs), wherein each of the ECDs locally performs computations based …

[HTML][HTML] Identification of soldiers and weapons in military armory based on comparison image processing and RFID tag

BD Lj - Vojnotehnički glasnik, 2021 - cyberleninka.ru
Introduction/purpose: The process of issuing and retrieving weapons in the military should
be fast enough and should provide immediate availability of accurate information on the …

Distribution and Allocation of Network Resources Based on Predictive Analyses of Time-Series Telecommunications Data

V Križanović, J Vlaović, D Žagar… - International journal of …, 2022 - hrcak.srce.hr
Sažetak With the fast development of different communication technologies, applications,
and services, the adoption of advanced sensory and computing solutions, such as the …

Middleware-enabled frugality for intelligent and distributed edge applications

M Mendula - 2024 - amsdottorato.unibo.it
In the ever-evolving landscape of computing, the integration of Artificial Intelligence has
become pervasive, empowering applications with unprecedented capabilities. However, as …

[图书][B] Design, development and evaluation of the ruggedized edge computing node (RECON)

SG Patel - 2022 - search.proquest.com
The increased quality and quantity of sensors provide an ever-increasing capability to
collect large quantities of high-quality data in the field. Research devoted to translating that …