Academic literature on the topic 'Edge devices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Edge devices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Edge devices"

1

van Dijke, Koen, Gert Veldhuis, Karin Schroën, and Remko Boom. "Parallelized edge-based droplet generation (EDGE) devices." Lab on a Chip 9, no. 19 (2009): 2824. http://dx.doi.org/10.1039/b906098g.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mahmod, Md Jubayer al, and Ujjwal Guin. "A Robust, Low-Cost and Secure Authentication Scheme for IoT Applications." Cryptography 4, no. 1 (March 8, 2020): 8. http://dx.doi.org/10.3390/cryptography4010008.

Full text
Abstract:
The edge devices connected to the Internet of Things (IoT) infrastructures are increasingly susceptible to piracy. These pirated edge devices pose a serious threat to security, as an adversary can get access to the private network through these non-authentic devices. It is necessary to authenticate an edge device over an unsecured channel to safeguard the network from being infiltrated through these fake devices. The implementation of security features demands extensive computational power and a large hardware/software overhead, both of which are difficult to satisfy because of inherent resource limitation in the IoT edge devices. This paper presents a low-cost authentication protocol for IoT edge devices that exploits power-up states of built-in SRAM for device fingerprint generations. Unclonable ID generated from the on-chip SRAM could be unreliable, and to circumvent this issue, we propose a novel ID matching scheme that alleviates the need for enhancing the reliability of the IDs generated from on-chip SRAMs. Security and different attack analysis show that the probability of impersonating an edge device by an adversary is insignificant. The protocol is implemented using a commercial microcontroller, which requires a small code overhead. However, no modification of device hardware is necessary.
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Dongkyu, Hyeongyun Moon, Sejong Oh, and Daejin Park. "mIoT: Metamorphic IoT Platform for On-Demand Hardware Replacement in Large-Scaled IoT Applications." Sensors 20, no. 12 (June 12, 2020): 3337. http://dx.doi.org/10.3390/s20123337.

Full text
Abstract:
As the Internet of Things (IoT) is becoming more pervasive in our daily lives, the number of devices that connect to IoT edges and data generated at the edges are rapidly increasing. On account of the bottlenecks in servers, due to the increase in data, as well as security and privacy issues, the IoT paradigm has shifted from cloud computing to edge computing. Pursuant to this trend, embedded devices require complex computation capabilities. However, due to various constraints, edge devices cannot equip enough hardware to process data, so the flexibility of operation is reduced, because of the limitations of fixed hardware functions, relative to cloud computing. Recently, as application fields and collected data types diversify, and, in particular, applications requiring complex computation such as artificial intelligence (AI) and signal processing are applied to edges, flexible processing and computation capabilities based on hardware acceleration are required. In this paper, to meet these needs, we propose a new IoT platform, called a metamorphic IoT (mIoT) platform, which can various hardware acceleration with limited hardware platform resources, through on-demand transmission and reconfiguration of required hardware at edges instead of via transference of sensing data to a server. The proposed platform reconfigures the edge’s hardware with minimal overhead, based on a probabilistic value, known as callability. The mIoT consists of reconfigurable edge devices based on RISC-V architecture and a server that manages the reconfiguration of edge devices based on callability. Through various experimental results, we confirmed that the callability-based mIoT platform can provide the hardware required by the edge device in real time. In addition, by performing various functions with small hardware, power consumption, which is a major constraint of IoT, can be reduced.
APA, Harvard, Vancouver, ISO, and other styles
4

Linke, Markus, and Juan García-Manrique. "Contribution to Reduce the Influence of the Free Sliding Edge on Compression-After-Impact Testing of Thin-Walled Undamaged Composites Plates." Materials 11, no. 9 (September 13, 2018): 1708. http://dx.doi.org/10.3390/ma11091708.

Full text
Abstract:
Standard Compression-After-Impact test devices show a weakening effect on thin-walled specimens due to a free panel edge that is required for compression. As a result, thin-walled undamaged samples do not break in the free measuring area but near the free edge and along the supports. They also show a strength reduction due to the free edge which can become potentially relevant for very weakly damaged panels. In order to reduce the free edge influence on the measured strength, a modified Compression-After-Impact test device has been developed. In an experimental investigation with carbon fiber reinforced plastics, the modified device is compared with a standard device. It is shown that thin-walled undamaged specimens investigated with the modified device now mainly break within the free measuring area and no longer at the free edge and along the bearings as it is the case for standard test devices. The modified device does not cause a free edge weakening effect in comparison to standard devices. The modified device is therefore more suitable for determining the compression strengths of undamaged thin-walled composite plates.
APA, Harvard, Vancouver, ISO, and other styles
5

Douglas, Antonyo, Richard Holloway, Jonathan Lohr, Elijah Morgan, and Khaled Harfoush. "Blockchains for constrained edge devices." Blockchain: Research and Applications 1, no. 1-2 (December 2020): 100004. http://dx.doi.org/10.1016/j.bcra.2020.100004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

TYAGI, PAWAN. "MOLECULAR SPIN DEVICES: CURRENT UNDERSTANDING AND NEW TERRITORIES." Nano 04, no. 06 (December 2009): 325–38. http://dx.doi.org/10.1142/s1793292009001903.

Full text
Abstract:
Molecular spin devices (MSDs) are the most promising candidate for futuristic quantum computation, having potential to resolve spin scattering issue which compromise the utility of conventional spin devices. The MSDs have been extensively reviewed from the view points of device physics and the application of target molecules, such as single molecular magnets. Fabrication of a competent MSD still remains an intractable task. In this review, we first describe the experimental studies where spin state of molecule and/or electrode affected the device transport, especially under magnetic field. Then, we correlated the number of theoretical and experimental results from various domains of nanomagnetism to highlight the scope and future directions panoramically. Finally, the key designs of various MSDs, including our recently developed multilayer edge molecular electrode, have been discussed. A multilayer edge molecular electrode, prepared by bridging the molecular clusters on the exposed edges of a customized ferromagnet–insulator–ferromagnet junction, can be a promising platform for testing the variety of molecular magnets.
APA, Harvard, Vancouver, ISO, and other styles
7

Shafiq, Muhammad, Zhihong Tian, Ali Kashif Bashir, Korhan Cengiz, and Adnan Tahir. "SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique." Wireless Communications and Mobile Computing 2020 (October 9, 2020): 1–10. http://dx.doi.org/10.1155/2020/8864301.

Full text
Abstract:
The Internet of Things (IoT) is growing day by day, and new IoT devices are introduced and interconnected. Due to this rapid growth, IoT faces several issues related to communication in the edge computing network. The critical issue in these networks is the effective edge computing IoT device selection whenever there are several edge nodes to carry information. To overcome this problem, in this paper, we proposed a new framework model named SoftSystem based on the soft set technique that recommends useful IIoT devices. Then, we proposed an algorithm named Softsystemalgo. For the proposed system, three different parameters are selected: IoT Device Security (IDSC), IoT Device Storage (IDST), and IoT Device Communication Speed (IDCS). We also find out the most significant parameters from the given set of parameters. It is evident that our proposed system is effective for the selection of edge computing devices in the IoT network.
APA, Harvard, Vancouver, ISO, and other styles
8

Santa, José, Pedro J. Fernández, Ramon Sanchez-Iborra, Jordi Ortiz, and Antonio F. Skarmeta. "Offloading Positioning onto Network Edge." Wireless Communications and Mobile Computing 2018 (October 23, 2018): 1–13. http://dx.doi.org/10.1155/2018/7868796.

Full text
Abstract:
While satellite or cellular positioning implies dedicated hardware or network infrastructure functions, indoor navigation or novel IoT positioning techniques include flexible storage and computation requirements that can be fulfilled by both end-devices or cloud back-ends. Hybrid positioning systems support the integration of several algorithms and technologies; however, the common trend of delegating position calculation and storage of local geoinformation to mobile devices or centralized servers causes performance degradation in terms of delay, battery usage, and waste of network resources. The strategy followed in this work is offloading this computation effort onto the network edge, following a Mobile Edge Computing (MEC) approach. MEC nodes in the access network of the mobile device are in charge of receiving navigation data coming from both the smart infrastructure and mobile devices, in order to compute the final position following a hybrid approach. With the aim of supporting mobility and the access to multiple networks, an Information Centric Networking (ICN) solution is used to access generic position information resources. The presented system currently supports WiFi, Bluetooth LE, GPS, cellular and NFC technologies, involving both indoor and outdoor positioning, using fingerprinting and proximity for indoor navigation, and the integration of smart infrastructure data sources such as the door opening system within real smart campus deployment. Evaluations carried out reveal latency improvements of 50%, as compared with a regular configuration where position fixes are computed by mobile devices; at the same time the MEC solution offers extra flexibility features to manage positioning databases and algorithms and move extensive computation from constrained devices to the edge.
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Tyng-Yeu, and You-Jie Li. "A Location-Aware Service Deployment Algorithm Based on K-Means for Cloudlets." Mobile Information Systems 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/8342859.

Full text
Abstract:
Cloudlet recently was proposed to push data centers towards network edges for reducing the network latency of delivering cloud services to mobile devices. For the sake of user mobility, it is necessary to deploy and hand off services anytime anywhere for achieving the minimal network latency for users’ service requests. However, the cost of this solution usually is too high for service providers and is not effective for resource exploitation. To resolve this problem, we propose a location-aware service deployment algorithm based on K-means for cloudlets in this paper. Simply speaking, the proposed algorithm divides mobile devices into a number of device clusters according to the geographical location of mobile devices and then deploys service instances onto the edge cloud servers nearest to the centers of device clusters. Our performance evaluation has shown that the proposed algorithm can effectively reduce not only the network latency of edge cloud services but also the number of service instances used for satisfying the condition of tolerable network latency.
APA, Harvard, Vancouver, ISO, and other styles
10

Zeng, Xin, Xiaomei Zhang, Shuqun Yang, Zhicai Shi, and Chihung Chi. "Gait-Based Implicit Authentication Using Edge Computing and Deep Learning for Mobile Devices." Sensors 21, no. 13 (July 5, 2021): 4592. http://dx.doi.org/10.3390/s21134592.

Full text
Abstract:
Implicit authentication mechanisms are expected to prevent security and privacy threats for mobile devices using behavior modeling. However, recently, researchers have demonstrated that the performance of behavioral biometrics is insufficiently accurate. Furthermore, the unique characteristics of mobile devices, such as limited storage and energy, make it subject to constrained capacity of data collection and processing. In this paper, we propose an implicit authentication architecture based on edge computing, coined Edge computing-based mobile Device Implicit Authentication (EDIA), which exploits edge-based gait biometric identification using a deep learning model to authenticate users. The gait data captured by a device’s accelerometer and gyroscope sensors is utilized as the input of our optimized model, which consists of a CNN and a LSTM in tandem. Especially, we deal with extracting the features of gait signal in a two-dimensional domain through converting the original signal into an image, and then input it into our network. In addition, to reduce computation overhead of mobile devices, the model for implicit authentication is generated on the cloud server, and the user authentication process also takes place on the edge devices. We evaluate the performance of EDIA under different scenarios where the results show that i) we achieve a true positive rate of 97.77% and also a 2% false positive rate; and ii) EDIA still reaches high accuracy with limited dataset size.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Edge devices"

1

Choi, Myung Cheon. "Traffic flow management for RSVP/ATM edge devices." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/15520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barnes, Brian E. "Real-time resource management for RSVP/ATM edge devices." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/15395.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pinkney, Thomas David. "Wound-edge protection devices to reduce surgical site infection." Thesis, University of Birmingham, 2017. http://etheses.bham.ac.uk//id/eprint/7588/.

Full text
Abstract:
This thesis provides an overview of the design, conduct and analysis of a multicentre phase III trial exploring the clinical effectiveness of a novel in-theatre intervention to try to reduce rates of post-operative surgical site infection (SSI). The pitfalls inherent in the conduct of research into SSI are discussed, along with measures to try and overcome these. The wound-edge protection device (WEPD) intervention is defined and the published evidence assessing its clinical effectiveness systematically appraised. Clinical surgical research and its difficulties are described, and the paradigm-shift bought about by the new trainee-led research collaborative model introduced. The design considerations involved creating a pragmatic and simple trial within the complex intervention that is surgery are explored in the context of the creation of the ROSSINI trial. This trial successfully recruited ahead of time and target and robustly proved that WEPDs are not clinically effective in reducing SSI. It also demonstrated the power and ability of this new collaborative model, as witnessed by both the citations of the results paper and the exponential growth in similar collaborative ventures. Finally, lessons learned about SSI research and clinical surgical research are summarised, and plans for future research presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Kaarlela, H. (Heikki). "Edge adaptive filtering of depth maps for mobile devices." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201910313045.

Full text
Abstract:
Abstract. Mobile phone cameras have an almost unlimited depth of field, and therefore the images captured with them have wide areas in focus. When the depth of field is digitally manipulated through image processing, accurate perception of depth in a captured scene is important. Capturing depth data requires advanced imaging methods. In case a stereo lens system is used, depth information is calculated from the disparities between stereo frames. The resulting depth map is often noisy or doesn’t have information for every pixel. Therefore it has to be filtered before it is used for emphasizing depth. Edges must be taken into account in this process to create natural-looking shallow depth of field images. In this study five filtering methods are compared with each other. The main focus is the Fast Bilateral Solver, because of its novelty and high reported quality. Mobile imaging requires fast filtering in uncontrolled environments, so optimizing the processing time of the filters is essential. In the evaluations the depth maps are filtered, and the quality and the speed is determined for every method. The results show that the Fast Bilateral Solver filters the depth maps well, and can handle noisy depth maps better than the other evaluated methods. However, in mobile imaging it is slow and needs further optimization.Reunatietoinen syvyyskarttojen suodatus mobiililaitteilla. Tiivistelmä. Matkapuhelimien kameroissa on lähes rajoittamaton syväterävyysalue, ja siksi niillä otetuissa kuvissa laajat alueet näkyvät tarkennettuina. Digitaalisessa syvyysterävyysalueen muokkauksessa tarvitaan luotettava syvyystieto. Syvyysdatan hankinta vaatii edistyneitä kuvausmenetelmiä. Käytettäessä stereokameroita syvyystieto lasketaan kuvien välisistä dispariteeteista. Tuloksena syntyvä syvyyskartta on usein kohinainen, tai se ei sisällä syvyystietoa joka pikselille. Tästä syystä se on suodatettava ennen käyttöä syvyyden korostamiseen. Tässä prosessissa reunat ovat otettava huomioon, jotta saadaan luotua luonnollisen näköisiä kapean syväterävyysalueen kuvia. Tässä tutkimuksessa verrataan viittä suodatusmenetelmää keskenään. Eniten keskitytään nopeaan bilateraaliseen ratkaisijaan, johtuen sen uutuudesta ja korkeasta tuloksen laadusta. Mobiililaitteella kuvantamisen vaatimuksena on nopea suodatus hallitsemattomissa olosuhteissa, joten suodattimien prosessointiajan optimointi on erittäin tärkeää. Vertailuissa syvyyskuvat suodatetaan ja suodatuksen laatu ja nopeus mitataan jokaiselle menetelmälle. Tulokset osoittavat, että nopea bilateraalinen ratkaisija suodattaa syvyyskarttoja hyvin ja osaa käsitellä kohinaisia syvyyskarttoja paremmin kuin muut tarkastellut menetelmät. Mobiilikuvantamiseen se on kuitenkin hidas ja tarvitsee pidemmälle menevää optimointia.
APA, Harvard, Vancouver, ISO, and other styles
5

Brada, Matej. "Graphene electronic devices in magnetic field." Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/21800.

Full text
Abstract:
This thesis discusses the two dimensional allotrope of carbon known as graphene in presence of magnetic field, with special focus on edge states. The structure of graphene is described in detail and from the structure, two models are formed. The Dirac equation is a good description of graphene for large samples, far away from edges, where the boundaries can be ignored. However, it causes problems with most types of edge and hard wall approximation has to be implemented. The Dirac equation is described in detail and used to obtain an energy spectrum, wavefunction and density of states for graphene edge in a strong magnetic field. For comparison, a Bohr-Sommerfield approximation was used to find the dispersion relation and compare it to the results obtained numerically from the Dirac equation. The second model, better fitting for nano-scale systems, is the tight binding model. This model was utilized to find Energy spectrum for graphene flakes in magnetic field, which resembles Hofstadter's butterfly spectrum. The spectrum was analyzed and periodic oscillations of magnetisation dependent on magnetic field (known as the de Haas-van Alphen effect) were described. The oscillation of magnetisation depends on the shape of the dot, even though the main properties remain the same: at low magnetic field, periodic oscillations due to Aharonov-Bohm effect, turning into more chaotic oscillations depending on the boundary conditions of the given quantum dot.
APA, Harvard, Vancouver, ISO, and other styles
6

Sankin, Igor. "Edge termination and RESURF technology in power silicon carbide devices." Diss., Mississippi State : Mississippi State University, 2006. http://library.msstate.edu/etd/show.asp?etd=etd-12162005-141206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hansson, Gustav. "Computation offloading of 5G devices at the Edge using WebAssembly." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85898.

Full text
Abstract:
With an ever-increasing percentage of the human population connected to the internet, the amount of data produced and processed is at an all-time high. Edge Computing has emerged as a paradigm to handle this growth and, combined with 5G, enables complex time-sensitive applications running on resource-restricted devices. This master thesis investigates the use of WebAssembly in the context of computa¬tional offloading at the Edge. The focus is on utilizing WebAssembly to move computa¬tional heavy parts of a system from an end device to an Edge Server. An objective is to improve program performance by reducing the execution time and energy consumption on the end device. A proof-of-concept offloading system is developed to research this. The system is evaluated on three different use cases; calculating Fibonacci numbers, matrix multipli¬cation, and image recognition. Each use case is tested on a Raspberry Pi 3 and Pi 4 comparing execution of the WebAssembly module both locally and offloaded. Each test will also run natively on both the server and the end device to provide some baseline for comparison.
APA, Harvard, Vancouver, ISO, and other styles
8

Rajakaruna, A. (Archana). "Lightweight edge-based networking architecture for low-power IoT devices." Master's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201906072483.

Full text
Abstract:
Abstract. The involvement of low power Internet of Things (IoT) devices in the Wireless Sensor Networks (WSN) allow enhanced autonomous monitoring capability in many application areas. Recently, the principles of edge computing paradigm have been used to cater onsite processing and managing actions in WSNs. However, WSNs deployed in remote sites require human involvement in data collection process since internet accessibility is still limited to population dense areas. Nowadays, researchers propose UAVs for monitoring applications where human involvement is required frequently. In this thesis work, we introduce an edge-based architecture which create end-to-end secure communication between IoT sensors in a remote WSN and central cloud via UAV, which assist the data collection, processing and managing procedures of the remote WSN. Since power is a limited resource, we propose Bluetooth Low Energy (BLE) as the communication media between UAV and sensors in the WSN, where BLE is considered as an ultra-low power radio access technology. To examine the performance of the system model, we have presented a simulation analysis considering three sensor nodes array types that can realize in the practical environment. The impact of BLE data rate, impact of speed of the UAV, impact of distance between adjacent sensors and impact of data generation rate of the sensor node have been analysed to examine the performance of system. Moreover, to observe the practical functionality of the proposed architecture, prototype implementation is presented using commercially available off-the-shelf devices. The prototype of the system is implemented assuming ideal environment.
APA, Harvard, Vancouver, ISO, and other styles
9

Wood, Michael G. "Active Silicon Photonic Devices Based on Degenerate Band Edge Resonances." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1480432902683812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tania, Zannatun Nayem. "Machine Learning with Reconfigurable Privacy on Resource-Limited Edge Computing Devices." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-292105.

Full text
Abstract:
Distributed computing allows effective data storage, processing and retrieval but it poses security and privacy issues. Sensors are the cornerstone of the IoT-based pipelines, since they constantly capture data until it can be analyzed at the central cloud resources. However, these sensor nodes are often constrained by limited resources. Ideally, it is desired to make all the collected data features private but due to resource limitations, it may not always be possible. Making all the features private may cause overutilization of resources, which would in turn affect the performance of the whole system. In this thesis, we design and implement a system that is capable of finding the optimal set of data features to make private, given the device’s maximum resource constraints and the desired performance or accuracy of the system. Using the generalization techniques for data anonymization, we create user-defined injective privacy encoder functions to make each feature of the dataset private. Regardless of the resource availability, some data features are defined by the user as essential features to make private. All other data features that may pose privacy threat are termed as the non-essential features. We propose Dynamic Iterative Greedy Search (DIGS), a greedy search algorithm that takes the resource consumption for each non-essential feature as input and returns the most optimal set of non-essential features that can be private given the available resources. The most optimal set contains the features which consume the least resources. We evaluate our system on a Fitbit dataset containing 17 data features, 4 of which are essential private features for a given classification application. Our results show that we can provide 9 additional private features apart from the 4 essential features of the Fitbit dataset containing 1663 records. Furthermore, we can save 26:21% memory as compared to making all the features private. We also test our method on a larger dataset generated with Generative Adversarial Network (GAN). However, the chosen edge device, Raspberry Pi, is unable to cater to the scale of the large dataset due to insufficient resources. Our evaluations using 1=8th of the GAN dataset result in 3 extra private features with up to 62:74% memory savings as compared to all private data features. Maintaining privacy not only requires additional resources, but also has consequences on the performance of the designed applications. However, we discover that privacy encoding has a positive impact on the accuracy of the classification model for our chosen classification application.
Distribuerad databehandling möjliggör effektiv datalagring, bearbetning och hämtning men det medför säkerhets- och sekretessproblem. Sensorer är hörnstenen i de IoT-baserade rörledningarna, eftersom de ständigt samlar in data tills de kan analyseras på de centrala molnresurserna. Dessa sensornoder begränsas dock ofta av begränsade resurser. Helst är det önskvärt att göra alla insamlade datafunktioner privata, men på grund av resursbegränsningar kanske det inte alltid är möjligt. Att göra alla funktioner privata kan orsaka överutnyttjande av resurser, vilket i sin tur skulle påverka prestanda för hela systemet. I denna avhandling designar och implementerar vi ett system som kan hitta den optimala uppsättningen datafunktioner för att göra privata, med tanke på begränsningar av enhetsresurserna och systemets önskade prestanda eller noggrannhet. Med hjälp av generaliseringsteknikerna för data-anonymisering skapar vi användardefinierade injicerbara sekretess-kodningsfunktioner för att göra varje funktion i datasetet privat. Oavsett resurstillgänglighet definieras vissa datafunktioner av användaren som viktiga funktioner för att göra privat. Alla andra datafunktioner som kan utgöra ett integritetshot kallas de icke-väsentliga funktionerna. Vi föreslår Dynamic Iterative Greedy Search (DIGS), en girig sökalgoritm som tar resursförbrukningen för varje icke-väsentlig funktion som inmatning och ger den mest optimala uppsättningen icke-väsentliga funktioner som kan vara privata med tanke på tillgängliga resurser. Den mest optimala uppsättningen innehåller de funktioner som förbrukar minst resurser. Vi utvärderar vårt system på en Fitbit-dataset som innehåller 17 datafunktioner, varav 4 är viktiga privata funktioner för en viss klassificeringsapplikation. Våra resultat visar att vi kan erbjuda ytterligare 9 privata funktioner förutom de 4 viktiga funktionerna i Fitbit-datasetet som innehåller 1663 poster. Dessutom kan vi spara 26; 21% minne jämfört med att göra alla funktioner privata. Vi testar också vår metod på en större dataset som genereras med Generative Adversarial Network (GAN). Den valda kantenheten, Raspberry Pi, kan dock inte tillgodose storleken på den stora datasetet på grund av otillräckliga resurser. Våra utvärderingar med 1=8th av GAN-datasetet resulterar i 3 extra privata funktioner med upp till 62; 74% minnesbesparingar jämfört med alla privata datafunktioner. Att upprätthålla integritet kräver inte bara ytterligare resurser utan har också konsekvenser för de designade applikationernas prestanda. Vi upptäcker dock att integritetskodning har en positiv inverkan på noggrannheten i klassificeringsmodellen för vår valda klassificeringsapplikation.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Edge devices"

1

Krasheninnikov, Sergei, Andrei Smolyakov, and Andrei Kukushkin. On the Edge of Magnetic Fusion Devices. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49594-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hirose, Akira. Collisionless edge instability in tokamaks. Saskatoon, Sask: Plasma Physics Laboratory, University of Saskatchewan, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Wei. Improved confinement and edge plasma fluctuations in the STOR-M tokamak. Saskatoon, Sask: University of Saskatchewan, Plasma Physics Laboratory, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Springett, Alan. Do colour measuring devices maximise a printing company's competitive edge?. London: LCP, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scott, Samuel J. Effects of leading-edge devices on the low-speed aerodynamic characteristics of a highly-swept arrow-wing. Hampton, Va: National Aeronautics and Space Administration, Langley Research Center, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nakano, Hiroshi. DC-SQUIDs fabricated by shapes of sputtering deposition at step edge and anodic oxidization. Fukuoka, Japan: [Kyushu University Research Institute of Fundamental Information Science, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pitcher, Charles Spencer. Tokamak plasma interaction with limiters. Downsview, Ont: Institute for Aerospace Studies, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rudolph, Peter K. C. High-lift systems on commercial subsonic airliners. Moffett Field, Calif: National Aeronautics and Space Administration, Ames Research Center, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stephen, Booth. The devil's edge: A Cooper & Fry mystery. New York]: Witness Impulse, an imprint of HarperCollinsPublisher, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheruvu, Sunil. Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment. Berkeley, CA: Springer Nature, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Edge devices"

1

Fordham, Stuart. "Edge Devices." In Learning SD-WAN with Cisco, 149–82. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7347-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stackowiak, Robert. "IoT Edge Devices and Microsoft." In Azure Internet of Things Revealed, 55–72. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5470-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shin, Changhwan. "Line Edge Roughness (LER)." In Variation-Aware Advanced CMOS Devices and SRAM, 19–35. Dordrecht: Springer Netherlands, 2016. http://dx.doi.org/10.1007/978-94-017-7597-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Van Vaerenbergh, Kevin, and Tom Tourwé. "Distributed Data Compression for Edge Devices." In Artificial Intelligence Applications and Innovations. AIAI 2021 IFIP WG 12.5 International Workshops, 293–304. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-79157-5_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rogalla, H. "YBCO/PBCO/YBCO Edge Junctions and DC-SQUIDs." In Superconducting Devices and Their Applications, 106–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-77457-7_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krasheninnikov, Sergei, Andrei Smolyakov, and Andrei Kukushkin. "Edge Plasma Issues in Magnetic Fusion Devices." In Springer Series in Plasma Science and Technology, 1–12. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49594-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Siegel, M., F. Schmidl, E. Heinz, K. Zach, J. Fuchs, E. B. Kley, and P. Seidel. "DC-SQUID with Step Edge Junctions on (100) SrTiO3." In Superconducting Devices and Their Applications, 138–41. Berlin, Heidelberg: Springer Berlin Heidelberg, 1992. http://dx.doi.org/10.1007/978-3-642-77457-7_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nguyen-Duc, Manh, Anh Le-Tuan, Jean-Paul Calbimonte, Manfred Hauswirth, and Danh Le-Phuoc. "Autonomous RDF Stream Processing for IoT Edge Devices." In Semantic Technology, 304–19. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41407-8_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fathoni, Halim, Chao-Tung Yang, Chih-Hung Chang, and Chin-Yin Huang. "Performance Comparison of Lightweight Kubernetes in Edge Devices." In Pervasive Systems, Algorithms and Networks, 304–9. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30143-9_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meghana, V., B. S. Anisha, and P. Ramakanth Kumar. "Monitoring Health of Edge Devices in Real Time." In Advances in Intelligent Systems and Computing, 555–66. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8443-5_47.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Edge devices"

1

Sharma, Ragini, Saman Biookaghazadeh, Baoxin Li, and Ming Zhao. "Are Existing Knowledge Transfer Techniques Effective for Deep Learning with Edge Devices?" In 2018 IEEE International Conference on Edge Computing (EDGE). IEEE, 2018. http://dx.doi.org/10.1109/edge.2018.00013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pandey, Manish, and Young-Woo Kwon. "Middleware for Edge Devices in Mobile Edge Computing." In 2021 36th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC). IEEE, 2021. http://dx.doi.org/10.1109/itc-cscc52171.2021.9501419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jo, Jongmin, Sucheol Jeong, and Pilsung Kang. "Benchmarking GPU-Accelerated Edge Devices." In 2020 IEEE International Conference on Big Data and Smart Computing (BigComp). IEEE, 2020. http://dx.doi.org/10.1109/bigcomp48618.2020.00-89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fan, Shu-Hao, Daniel Guidotti, Claudio Estevez, Gee-Kung Chang, Ying-Jung Chang, and Daoqiang Daniel Lu. "Short-reach flexible optical interconnection using embedded edge-emitting lasers and edge-viewing detectors." In Integrated Optoelectronic Devices 2008, edited by Alexei L. Glebov and Ray T. Chen. SPIE, 2008. http://dx.doi.org/10.1117/12.763336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gibson, Perry, Jose Cano, Jack Turner, Elliot J. Crowley, Michael O'Boyle, and Amos Storkey. "Optimizing Grouped Convolutions on Edge Devices." In 2020 IEEE 31st International Conference on Application-specific Systems, Architectures and Processors (ASAP). IEEE, 2020. http://dx.doi.org/10.1109/asap49362.2020.00039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Prabhu, Narendra, Daksha Naik, and Fatima Anwar. "Trusted Video Streaming on Edge Devices." In 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops). IEEE, 2021. http://dx.doi.org/10.1109/percomworkshops51409.2021.9431058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Topno, Preeti, and Govind Murmu. "An Improved Edge Detection Method based on Median Filter." In 2019 Devices for Integrated Circuit (DevIC). IEEE, 2019. http://dx.doi.org/10.1109/devic.2019.8783450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Shiya, Lingjia Liu, and Yang Yi. "Quantized Reservoir Computing on Edge Devices for Communication Applications." In 2020 IEEE/ACM Symposium on Edge Computing (SEC). IEEE, 2020. http://dx.doi.org/10.1109/sec50012.2020.00068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Benditkis, Daniel, Aviv Keren, Liron Mor-Yosef, Tomer Avidor, Neta Shoham, and Nadav Tal-Israel. "Distributed deep neural network training on edge devices." In SEC '19: The Fourth ACM/IEEE Symposium on Edge Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3318216.3363324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Qin, Zhuwei, Fuxun Yu, and Xiang Chen. "Task-adaptive incremental learning for intelligent edge devices." In SEC '19: The Fourth ACM/IEEE Symposium on Edge Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3318216.3363373.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Edge devices"

1

Miller, L. S., S. Huang, and G. A. Quandt. Atmospheric tests of trailing-edge aerodynamic devices. Office of Scientific and Technical Information (OSTI), January 1998. http://dx.doi.org/10.2172/565655.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dickens, John B., and Dean R. Dukes. Innovative Decentralized Decision-Making Enabling Capability on Mobile Edge Devices. Fort Belvoir, VA: Defense Technical Information Center, September 2015. http://dx.doi.org/10.21236/ad1008918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Griem, Hans R. High Resolution Spectroscopy in the Divertor and Edge Regions of Alcator-C Mode and Measurement of Radiative Transfer in Vacuum-UV Line Emission from Magnetic Fusion Devices. Office of Scientific and Technical Information (OSTI), March 2005. http://dx.doi.org/10.2172/1046049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ammar H Hakim. Final Report for "Extending BOUT++ for Solution of Edge Plasma Equations for Use in Whole Device Simulation of Tokamaks". Office of Scientific and Technical Information (OSTI), October 2011. http://dx.doi.org/10.2172/1027635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography