• Title/Summary/Keyword: Edge user

Search Result 309, Processing Time 0.023 seconds

Network Anomaly Traffic Detection Using WGAN-CNN-BiLSTM in Big Data Cloud-Edge Collaborative Computing Environment

  • Yue Wang
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.375-390
    • /
    • 2024
  • Edge computing architecture has effectively alleviated the computing pressure on cloud platforms, reduced network bandwidth consumption, and improved the quality of service for user experience; however, it has also introduced new security issues. Existing anomaly detection methods in big data scenarios with cloud-edge computing collaboration face several challenges, such as sample imbalance, difficulty in dealing with complex network traffic attacks, and difficulty in effectively training large-scale data or overly complex deep-learning network models. A lightweight deep-learning model was proposed to address these challenges. First, normalization on the user side was used to preprocess the traffic data. On the edge side, a trained Wasserstein generative adversarial network (WGAN) was used to supplement the data samples, which effectively alleviates the imbalance issue of a few types of samples while occupying a small amount of edge-computing resources. Finally, a trained lightweight deep learning network model is deployed on the edge side, and the preprocessed and expanded local data are used to fine-tune the trained model. This ensures that the data of each edge node are more consistent with the local characteristics, effectively improving the system's detection ability. In the designed lightweight deep learning network model, two sets of convolutional pooling layers of convolutional neural networks (CNN) were used to extract spatial features. The bidirectional long short-term memory network (BiLSTM) was used to collect time sequence features, and the weight of traffic features was adjusted through the attention mechanism, improving the model's ability to identify abnormal traffic features. The proposed model was experimentally demonstrated using the NSL-KDD, UNSW-NB15, and CIC-ISD2018 datasets. The accuracies of the proposed model on the three datasets were as high as 0.974, 0.925, and 0.953, respectively, showing superior accuracy to other comparative models. The proposed lightweight deep learning network model has good application prospects for anomaly traffic detection in cloud-edge collaborative computing architectures.

A Novle Method for Efficient Mobile AR Service in Edge Mesh Network

  • Choi, Seyun;Shim, Woosung;Hong, Sukjun;Kim, Hoijun;Lee, Seunghyun;Kwon, Soonchul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.22-29
    • /
    • 2022
  • Recently, with the development of mobile computing power, mobile-based VR and AR services are being developed. Due to network performance and computing power constraints, VR and AR services using large-capacity 3D content have limitations. A study on an efficient 3D content load method for a mobile device is required. The conventional method downloads all 3D content used for AR services at the same time. In this paper, we propose an active 3D content load according to the user's track. The proposed method is a partitioned 3D object load. Edge servers were installed for each area and connected through the MESH network. Partitioned load the required 3D object in the area referring to the user's location. The location is identified through the edge server information of the connected AP. The performance of the proposed method and the conventional method was compared. As a result of the comparison, the proposed method showed a stable Mobile AR Service. The results of this study, it is expected to contribute to the activation of edge server-based AR mobile services.

Enhancing Service Availability in Multi-Access Edge Computing with Deep Q-Learning

  • Lusungu Josh Mwasinga;Syed Muhammad Raza;Duc-Tai Le ;Moonseong Kim ;Hyunseung Choo
    • Journal of Internet Computing and Services
    • /
    • v.24 no.2
    • /
    • pp.1-10
    • /
    • 2023
  • The Multi-access Edge Computing (MEC) paradigm equips network edge telecommunication infrastructure with cloud computing resources. It seeks to transform the edge into an IT services platform for hosting resource-intensive and delay-stringent services for mobile users, thereby significantly enhancing perceived service quality of experience. However, erratic user mobility impedes seamless service continuity as well as satisfying delay-stringent service requirements, especially as users roam farther away from the serving MEC resource, which deteriorates quality of experience. This work proposes a deep reinforcement learning based service mobility management approach for ensuring seamless migration of service instances along user mobility. The proposed approach focuses on the problem of selecting the optimal MEC resource to host services for high mobility users, thereby reducing service migration rejection rate and enhancing service availability. Efficacy of the proposed approach is confirmed through simulation experiments, where results show that on average, the proposed scheme reduces service delay by 8%, task computing time by 36%, and migration rejection rate by more than 90%, when comparing to a baseline scheme.

Performance Analysis of a Combined scheme for Inter-cell Interference Avoidance and Power Control in LTE-Advanced Systems (LTE-Advanced 시스템에서 셀간 간섭 회피 및 전력 제어 결합 성능 분석)

  • Kim, Sang-Goo;Lim, Sung-Ho;Yoon, Dong-Weon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.12
    • /
    • pp.39-44
    • /
    • 2010
  • In LTE-Advanced systems, every sector uses the entire range of the frequency resource, and when the UEs are located at a cell edge, user throughputs degrade due to the interferences from the adjacent cells. In this paper, we propose a combined scheme for inter-cell interference avoidance and power control. In the proposed algorithm, the sectors consist of the right edge, the left edge and the center for resource allocation and we control the transmission power to improve the user throughputs at the edge of each cell. Using a system level simulation, we analyze low 5th percentile and average user throughputs of the UEs who are located the cell, center and edge when the inter-cell interference avoidance and the power control are combined.

Distributed Resource Partitioning Scheme for Intercell Interference in Multicellular Networks

  • Song, Jae-Su;Lee, Seung-Hwan
    • Journal of electromagnetic engineering and science
    • /
    • v.15 no.1
    • /
    • pp.14-19
    • /
    • 2015
  • In multicellular wireless networks, intercell interference limits system performance, especially cell edge user performance. One promising approach to solve this problem is the intercell interference coordination (ICIC) scheme. In this paper, we propose a new ICIC scheme based on a resource partitioning approach to enhance cell edge user performance in a wireless multicellular system. The most important feature of the proposed scheme is that the algorithm is performed at each base station in a distributed manner and therefore minimizes the required information exchange between neighboring base stations. The proposed scheme has benefits in a practical environment where the traffic load distribution is not uniform among base stations and the backhaul capacity between the base stations is limited.

An Offloading Strategy for Multi-User Energy Consumption Optimization in Multi-MEC Scene

  • Li, Zhi;Zhu, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4025-4041
    • /
    • 2020
  • Mobile edge computing (MEC) is capable of providing services to smart devices nearby through radio access networks and thus improving service experience of users. In this paper, an offloading strategy for the joint optimization of computing and communication resources in multi-user and multi-MEC overlapping scene was proposed. In addition, under the condition that wireless transmission resources and MEC computing resources were limited and task completion delay was within the maximum tolerance time, the optimization problem of minimizing energy consumption of all users was created, which was then further divided into two subproblems, i.e. offloading strategy and resource allocation. These two subproblems were then solved by the game theory and Lagrangian function to obtain the optimal task offloading strategy and resource allocation plan, and the Nash equilibrium of user offloading strategy games and convex optimization of resource allocation were proved. The simulation results showed that the proposed algorithm could effectively reduce the energy consumption of users.

Digital Signage System Based on Intelligent Recommendation Model in Edge Environment: The Case of Unmanned Store

  • Lee, Kihoon;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.599-614
    • /
    • 2021
  • This paper proposes a digital signage system based on an intelligent recommendation model. The proposed system consists of a server and an edge. The server manages the data, learns the advertisement recommendation model, and uses the trained advertisement recommendation model to determine the advertisements to be promoted in real time. The advertisement recommendation model provides predictions for various products and probabilities. The purchase index between the product and weather data was extracted and reflected using correlation analysis to improve the accuracy of predicting the probability of purchasing a product. First, the user information and product information are input to a deep neural network as a vector through an embedding process. With this information, the product candidate group generation model reduces the product candidates that can be purchased by a certain user. The advertisement recommendation model uses a wide and deep recommendation model to derive the recommendation list by predicting the probability of purchase for the selected products. Finally, the most suitable advertisements are selected using the predicted probability of purchase for all the users within the advertisement range. The proposed system does not communicate with the server. Therefore, it determines the advertisements using a model trained at the edge. It can also be applied to digital signage that requires immediate response from several users.

Edge Computing-Based Medical Information Platform for Automatic Authentication Using Patient Situations

  • Gyu-Sung Ham;Mingoo Kang;Suck-Tae Joung;Su-Chong Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1049-1065
    • /
    • 2023
  • Recently, with the development of IoT, AI, and mobile terminals, medical information platforms are expanding. The medical information platform can determine a patient's emergency situation, and medical staff can easily access patient information through a mobile terminal. However, in the existing platform, emergency situation decision is delayed, and faster and stronger authentication is required in emergency situations. Therefore, we propose an edge computing-based medical information platform for automatic authentication using patient situations. We design an edge computing-based medical information platform architecture capable of rapid transmission of biometric data of IoT and quick emergency situation decision, and implement the platform data flow in emergency situations. Relying on this platform, we propose the automatic authentication using patient situations. The automatic authentication protects patient information through patient-centered authentication by using the patient's situation as an authentication factor, and enables quick authentication by automatically proceeding with mobile terminal authentication after user authentication in emergencies without user intervention. We compared the proposed platform with existing platforms to show that it can make quick and stable emergency decisions. In addition, comparing the automatic authentication with existing authentication showed that it is fast and protects medical information centered on patient situations in emergency situations.

STUDY ON THE EFFECTS OF AIRFOIL TRAILING EDGE SHAPE ON THE WING AERODYNAMICS (익형 뒷전 형상이 날개 공력 특성에 미치는 영향)

  • Kim, W.H.;Ryu, G.M.;Kim, B.S.
    • Journal of computational fluids engineering
    • /
    • v.19 no.4
    • /
    • pp.75-79
    • /
    • 2014
  • In the paper, a study on the analysis of the effects of trailing edge thickness on the aerodynamic characteristics of an airfoil is described. In this research, modification of the formula representing NACA symmetric airfoil is studied to change the airfoil shape with different trailing edge thickness of user's choice. According to the result of aerodynamic characteristics, as the trailing edge thickness increases the maximum lift coefficient increases while the lift-to-drag ratio decreases. In this paper flow calculation results are demonstrated and the analysis on those results and findings on the effects of non-zero thickness of trailing edge are suggested.

A Study on the Improvement of Fire Alarm System in Special Buildings Using Beacons in Edge Computing Environment (에지 컴퓨팅 환경에서 비콘을 활용한 특수건물 화재 경보 시스템 개선 방안 연구)

  • Lee, Tae Gyu;Choi, Kyeong Seo;Shin, Youn Soon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.217-224
    • /
    • 2022
  • Today, with the development of technology and industry, fire accidents in special buildings are increasing as special buildings increase. However, despite the rapid development of information and communication technology, human casualties are steadily occurring due to the underdeveloped and ineffective indoor fire alarm system. In this study, we confirmed that the existing indoor fire alarm system using acoustic alarm could not deliver a sufficiently large alarm to the in-room personnel. To improve this, we designed and implemented a fire alarm system using edge computing and beacons. The proposed improved fire alarm system consists of terminal sensor nodes, edge nodes, a user application, and a server. The terminal sensor nodes collect indoor environment data and send it to the edge node, and the edge node monitors whether a fire occurs through the transmitted sensor value. In addition, the edge node continuously generate beacon signals to collect information of smart devices with user applications installed within the signal range, store them in a server database, and send application push-type fire alarms to all in-room personnel based on the collected user information. As a result of conducting a signal valid range measurement experiment in a university building with dense lecture rooms, it was confirmed that device information was normally collected within the beacon signal range of the edge node and a fire alarm was quickly sent to specific users. Through this, it was confirmed that the "blind spot problem of the alarm" was solved by flexibly collecting information of visitors that changes time to time and sending the alarm to a smart device very adjacent to the people. In addition, through the analysis of the experimental results, a plan to effectively apply the proposed fire alarm system according to the characteristics of the indoor space was proposed.