• Title/Summary/Keyword: Edge Network

Search Result 802, Processing Time 0.025 seconds

The Fibonacci Edge Labelings on Fibonacci Trees (피보나치트리에서 피보나치 에지 번호매김방법)

  • Kim, Yong-Seok
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.6
    • /
    • pp.437-450
    • /
    • 2009
  • In this paper, we propose seven edge labeling methods. The methods produce three case of edge labels-sets of Fibonacci numbers {$F_k|k\;{\geq}\;2$}, {$F_{2k}|k\;{\geq}\;1$} and {$F_{3k+2}|k\;{\geq}\;0$}. When a sort of interconnection network, the circulant graph is designed, these edge labels are used for its jump sequence. As a result, the degree is due to the edge labels.

Prefix Caching for Playback Delay Reduction in Edge-Fog Caching Environment (엣지-포그 캐싱 환경에서 재생 지연 감소를 위한 Prefix 캐싱 기법)

  • Jeong, Junho;Seong, Eun San;Lee, Hyounsup;Youn, Joosang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.97-99
    • /
    • 2021
  • Edge caching can provide high QoE by reducing traffic in the backhaul network and reducing latency in video streaming services. But due to the limited capacity of edge cache, large amounts of content cannot be cached. In this paper, we propose an edge-fog prefix caching that reduces playback delay by caching prefixes of video content on edges and storing the rest in fog cache.

  • PDF

Design of Edge Device for Marine/Industry IoT (해상/산업용 IoT를 위한 Edge Device 설계)

  • Lee, Seong-Real;Yim, Chun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.676-678
    • /
    • 2021
  • This paper shows the design of edge device for marine and industry IoT sevice. Edge device gather IoT sensing data and then send these data into external network. For transmitting the gathered data, commercial LoRa and LTE Cat.M1 are applied into the edge device.

  • PDF

Stencil cutting process by Nd:YAG laser II -Influence of process parameters on cutting characteristics of stencil- (Nd:YAG레이저를 이용한 스텐실 절단공정II -레이저의 공정변수가 스텐실 절단특성에 미치는 영향-)

  • Lee, Je-Hoon;Seo, Jung;Kim, Jung-Oh;Shin, Dong-Sik;Lee, Young-Moon
    • Laser Solutions
    • /
    • v.4 no.2
    • /
    • pp.47-57
    • /
    • 2001
  • This study deals with the laser cutting of stencil for the PCB. The most important aim of this study is to determine optimal conditions which make good-qualify stencil in Nd:YAG laser cutting. We made an experiment according to various variables (power. type of mask. gas pressure, cutting speed, and pulse width) and analyzed the cutting characteristics (surface roughness, kerf width. dross) . Each variable has optimal value for good-qualify cut edge under fixed condition. And neural network after learning experimental data with a million time iteration could predict surface roughness of cut edge under arbitrary condition approximately.

  • PDF

Edge Router Selection and Traffic Engineering in LISP-Capable Networks

  • Li, Ke;Wang, Sheng;Wang, Xiong
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.612-620
    • /
    • 2011
  • Recently, one of the problems with the Internet is the issue of scalability. To this end, locator/identifier separation protocol (LISP), which separates end-system identifiers and routing locators, has been proposed as a solution. In the LISP deployed network, the ingress and egress nodes of inter-AS traffic is determined by edge router selection (ERS) and endpoint identifier-routing locator mapping assignment (ERMA). In this paper, joint optimizations of ERS and ERMA for stub networks with and without predetermined link weights are studied and the mixed integer linear programming (MILP) formulations for the problems are given. To make the problem with optimizable link weights tractable, a revised local search algorithm is also proposed. Simulation results show that joint optimization of ERS and ERMA enables better network performance.

A Scheduling and Synchronization Technique for RAPIEnet Switches Using Edge-Coloring of Conflict Multigraphs

  • Abbas, Syed Hayder;Hong, Seung Ho
    • Journal of Communications and Networks
    • /
    • v.15 no.3
    • /
    • pp.321-328
    • /
    • 2013
  • In this paper, we present a technique for obtaining conflict-free schedules for real-time automation protocol for industrial Ethernet (RAPIEnet) switches. Mathematical model of the switch is obtained using graph theory. Initially network traffic entry and exit parts in a single RAPIEnet switch are identified, so that a bipartite conflict graph can be constructed. The obtained conflict graph is transformed to three kinds of matrices to be used as inputs for our simulation model, and selection of any of the matrix forms is application-specific. A greedy edge-coloring algorithm is used to schedule the network traffic and to solve the minimum coloring problem. After scheduling, empty slots are identified for forwarding the non real-time traffic of asynchronous devices. Finally, an algorithm for synchronizing the schedules of adjacent switches is proposed using edge-contraction and minors. All simulations were carried out using Matlab.

A New Bank-card Number Identification Algorithm Based on Convolutional Deep Learning Neural Network

  • Shi, Rui-Xia;Jeong, Dong-Gyu
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.47-56
    • /
    • 2022
  • Recently bank card number recognition plays an important role in improving payment efficiency. In this paper we propose a new bank-card number identification algorithm. The proposed algorithm consists of three modules which include edge detection, candidate region generation, and recognition. The module of 'edge detection' is used to obtain the possible digital region. The module of 'candidate region generation' has the role to expand the length of the digital region to obtain the candidate card number regions, i.e. to obtain the final bank card number location. And the module of 'recognition' has Convolutional deep learning Neural Network (CNN) to identify the final bank card numbers. Experimental results show that the identification rate of the proposed algorithm is 95% for the card numbers, which shows 20% better than that of conventional algorithm or method.

Deep Reinforcement Learning-Based Edge Caching in Heterogeneous Networks

  • Yoonjeong, Choi; Yujin, Lim
    • Journal of Information Processing Systems
    • /
    • v.18 no.6
    • /
    • pp.803-812
    • /
    • 2022
  • With the increasing number of mobile device users worldwide, utilizing mobile edge computing (MEC) devices close to users for content caching can reduce transmission latency than receiving content from a server or cloud. However, because MEC has limited storage capacity, it is necessary to determine the content types and sizes to be cached. In this study, we investigate a caching strategy that increases the hit ratio from small base stations (SBSs) for mobile users in a heterogeneous network consisting of one macro base station (MBS) and multiple SBSs. If there are several SBSs that users can access, the hit ratio can be improved by reducing duplicate content and increasing the diversity of content in SBSs. We propose a Deep Q-Network (DQN)-based caching strategy that considers time-varying content popularity and content redundancy in multiple SBSs. Content is stored in the SBS in a divided form using maximum distance separable (MDS) codes to enhance the diversity of the content. Experiments in various environments show that the proposed caching strategy outperforms the other methods in terms of hit ratio.

Task Scheduling on Cloudlet in Mobile Cloud Computing with Load Balancing

  • Poonam;Suman Sangwan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.73-80
    • /
    • 2023
  • The recent growth in the use of mobile devices has contributed to increased computing and storage requirements. Cloud computing has been used over the past decade to cater to computational and storage needs over the internet. However, the use of various mobile applications like Augmented Reality (AR), M2M Communications, V2X Communications, and the Internet of Things (IoT) led to the emergence of mobile cloud computing (MCC). All data from mobile devices is offloaded and computed on the cloud, removing all limitations incorporated with mobile devices. However, delays induced by the location of data centers led to the birth of edge computing technologies. In this paper, we discuss one of the edge computing technologies, i.e., cloudlet. Cloudlet brings the cloud close to the end-user leading to reduced delay and response time. An algorithm is proposed for scheduling tasks on cloudlet by considering VM's load. Simulation results indicate that the proposed algorithm provides 12% and 29% improvement over EMACS and QRR while balancing the load.

Knowledge Recommendation Based on Dual Channel Hypergraph Convolution

  • Yue Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.2903-2923
    • /
    • 2023
  • Knowledge recommendation is a type of recommendation system that recommends knowledge content to users in order to satisfy their needs. Although using graph neural networks to extract data features is an effective method for solving the recommendation problem, there is information loss when modeling real-world problems because an edge in a graph structure can only be associated with two nodes. Because one super-edge in the hypergraph structure can be connected with several nodes and the effectiveness of knowledge graph for knowledge expression, a dual-channel hypergraph convolutional neural network model (DCHC) based on hypergraph structure and knowledge graph is proposed. The model divides user data and knowledge data into user subhypergraph and knowledge subhypergraph, respectively, and extracts user data features by dual-channel hypergraph convolution and knowledge data features by combining with knowledge graph technology, and finally generates recommendation results based on the obtained user embedding and knowledge embedding. The performance of DCHC model is higher than the comparative model under AUC and F1 evaluation indicators, comparative experiments with the baseline also demonstrate the validity of DCHC model.