2022
DOI: 10.53759/181x/jcns202202009
|View full text |Cite
|
Sign up to set email alerts
|

Open Source Network Optimization Tools for Edge Intelligence

Abstract: It is indeed possible to bring analysis and information storage closer to where the information is generated by implementing an edge computing model. Response times should improve while bandwidth use is reduced as a result." A common misconception is that "edge" and "IoT" are synonymous. Using edge computing in the Internet of Things (IoT) is an example of this type of distributed computing, which is sensitive to configuration and location." Instead, then alluding to a specific piece of technology, the word re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
1
0
Order By: Relevance
“…The ratio of packets received at the sink to packets sent by the source Routing Protocol (CT-RPL) selects the best cluster head based on the Euclidean distance and the efficient route is selected using a game theory approach [29].…”
Section: Amount Of Energy Left Over After Completion Of Transmission ...mentioning
confidence: 99%
“…The ratio of packets received at the sink to packets sent by the source Routing Protocol (CT-RPL) selects the best cluster head based on the Euclidean distance and the efficient route is selected using a game theory approach [29].…”
Section: Amount Of Energy Left Over After Completion Of Transmission ...mentioning
confidence: 99%
“…It includes P2P network design, encryption technology, implementing distributed algorithm and use of data storage [8]. Implementing the limitations of blockchain technology by combining with other cryptographic techniques to discourse the security problems of storing medical data management [9]. Lack of ability and consciousness in implementation, limitations arise in security side of blockchain based cloud storage works quite slow in progress.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, advanced cryptographic algorithms are required with the features of rich access control and strict high dimensionality secure enforcement. Nowadays, adopting advanced features of cryptographic algorithms research projects are carried out to provide secure processing of clinical data in the cloud storage [9].…”
Section: Introductionmentioning
confidence: 99%