Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "przetwarzanie brzegowe" wg kryterium: Temat


Wyświetlanie 1-3 z 3
Tytuł:
The performance of IIoT communication standards
Autorzy:
Walczak, Maciej
Hetmańczyk, Mariusz
Powiązania:
https://bibliotekanauki.pl/articles/2232525.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Polskie Towarzystwo Diagnostyki Technicznej PAN
Tematy:
Industry 4.0
edge computing
IIoT
przetwarzanie brzegowe
Opis:
The requirements of Industry 4.0 determine the necessity to change thinking in the field of production development, adopted management methods and modernisation of production resources. When planning the implementation of a new production system (or retrofit), it is possible to use the RAMI 4.0 reference model, which was published in April 2015 by the VDI/VDE Society Measurement and Automatic Control. A key aspect of modern industrial systems is connectivity and trouble-free data exchange. In the case of data exchange, the basic element holding back the development of Industry 4.0 is the lack of standardisation, as well as the lack of interoperability between IIoT network nodes. Modern IIoT applications require high network throughput, low latency and reliability. In view of such guidelines, efficient communication standards and specialised equipment are required. Edge Computing is one of the most important technology trends of the 21st century that will play a key role in the IIoT market. Due to the diversity of available technologies and solutions, no universal standards have been developed to date that can be referred to when planning, building and implementing new applications. The article presents an overview of the most popular industrial communication protocols and their systematisation in terms of meet the requirements for IIoT devices.
Źródło:
Diagnostyka; 2023, 24, 3; art. no. 2023307
1641-6414
2449-5220
Pojawia się w:
Diagnostyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Decentralized device authentication for cloud systems with blockchain using skip graph algorithm
Autorzy:
Sammy, F.
Vigila, S. Maria Celestin
Powiązania:
https://bibliotekanauki.pl/articles/38700867.pdf
Data publikacji:
2023
Wydawca:
Instytut Podstawowych Problemów Techniki PAN
Tematy:
blockchain
cloud computing
edge computing
fog computing
latency
power consumption
ID algorithm
single point failure
skipgraph
łańcuch bloków
chmura obliczeniowa
przetwarzanie brzegowe
mgła obliczeniowa
czas oczekiwania
pobór energii
algorytm ID
awaria jednego punktu
przeskok
Opis:
Cloud computing provides centralized computing services to the user on demand. Despite this sophisticated service, it suffers from single-point failure, which blocks the entire system. Many security operations consider this single-point failure, which demands alternate security solutions to the aforesaid problem. Blockchain technology provides a corrective measure to a single-point failure with the decentralized operation. The devices communicating in the cloud environment range from small IoT devices to large cloud data storage. The nodes should be effectively authenticated in a blockchain environment. Mutual authentication is time-efficient when the network is small. However, as the network scales, authentication is less time-efficient, and dynamic scalability is not possible with smart contract-based authentication. To address this issue, the blockchain node runs the skip graph algorithm to retrieve the registered node. The skip graph algorithm possesses scalability and decentralized nature, and retrieves a node by finding the longest prefix matching. The worst time complexity is O(log n) for maximum n nodes. This method ensures fast nodal retrieval in the mutual authentication process. The proposed search by name id algorithm through skip graph is efficient compared with the state-of-art existing work and the performance is also good compared with the existing work where the latency is reduced by 30–80%, and the power consumption is reduced by 32–50% compared to other considered approaches.
Źródło:
Computer Assisted Methods in Engineering and Science; 2023, 30, 2; 203-221
2299-3649
Pojawia się w:
Computer Assisted Methods in Engineering and Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Edge computing in IoT-enabled honeybee monitoring for the detection of Varroa destructor
Autorzy:
Wachowicz, Anna
Pytlik, Jakub
Małysiak-Mrozek, Bożena
Tokarz, Krzysztof
Mrozek, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2172108.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
Internet of Things
IoT
Varroa destructor
precision beekeeping
machine learning
image processing
edge device
Internet Rzeczy
pszczelarstwo
uczenie maszynowe
przetwarzanie obrazu
urządzenie brzegowe
Opis:
Among many important functions, bees play a key role in food production. Unfortunately, worldwide bee populations have been decreasing since 2007. One reason for the decrease of adult worker bees is varroosis, a parasitic disease caused by the Varroa destructor (V. destructor) mite. Varroosis can be quickly eliminated from beehives once detected. However, this requires them to be monitored continuously during periods of bee activity to ensure that V. destructor mites are detected before they spread and infest the entire beehive. To this end, the use of Internet of things (IoT) devices can significantly increase detection speed. Comprehensive solutions are required that can cover entire apiaries and prevent the disease from spreading between hives and apiaries. In this paper, we present a solution for global monitoring of apiaries and the detection of V. destructor mites in beehives. Our solution captures and processes video streams from camera-based IoT devices, analyzes those streams using edge computing, and constructs a global collection of cases within the cloud. We have designed an IoT device that monitors bees and detects V. destructor infestation via video stream analysis on a GPU-accelerated Nvidia Jetson Nano. Experimental results show that the detection process can be run in real time while maintaining similar efficacy to alternative approaches.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2022, 32, 3; 355--369
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-3 z 3

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies