With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw...
详细信息
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to networks and brings huge challenge to servicing user *** caching,which utilizes the storage and computation resources of the edge to bring resources closer to end users,is a promising way to relieve network burden and enhance user *** this paper,we aim to survey the edge caching techniques from a comprehensive and systematic *** first present an overview of edge caching,summarizing the three key issues regarding edge caching,i.e.,where,what,and how to cache,and then introducing several significant caching *** then carry out a detailed and in-depth elaboration on these three issues,which correspond to caching locations,caching objects,and caching strategies,*** particular,we innovate on the issue“what to cache”,interpreting it as the classification of the“caching objects”,which can be further classified into content cache,data cache,and service ***,we discuss several open issues and challenges of edge caching to inspire future investigations in this research area.
Poverty is considered a serious global issue that must be immediately eradicated by Sustainable Development Goals (SDGs) 1, namely ending poverty anywhere and in any form. As a developing country, poverty is a complex...
详细信息
Owing to massive technological developments in Internet of Things(IoT)and cloud environment,cloud computing(CC)offers a highly flexible heterogeneous resource pool over the network,and clients could exploit various re...
详细信息
Owing to massive technological developments in Internet of Things(IoT)and cloud environment,cloud computing(CC)offers a highly flexible heterogeneous resource pool over the network,and clients could exploit various resources on *** IoT-enabled models are restricted to resources and require crisp response,minimum latency,and maximum bandwidth,which are outside the *** was handled as a resource-rich solution to aforementioned *** high delay reduces the performance of the IoT enabled cloud platform,efficient utilization of task scheduling(TS)reduces the energy usage of the cloud infrastructure and increases the income of service provider via minimizing processing time of user ***,this article concentration on the design of an oppositional red fox optimization based task scheduling scheme(ORFOTSS)for IoT enabled cloud *** presented ORFO-TSS model resolves the problem of allocating resources from the IoT based cloud *** achieves the makespan by performing optimum TS procedures with various aspects of incoming *** designing of ORFO-TSS method includes the idea of oppositional based learning(OBL)as to traditional RFO approach in enhancing their efficiency.A wide-ranging experimental analysis was applied on the CloudSim *** experimental outcome highlighted the efficacy of the ORFO-TSS technique over existing approaches.
Efficient navigation of emergency response vehicles (ERVs) through urban congestion is crucial to life-saving efforts, yet traditional traffic systems often slow down their swift passage. In this work, we introduce Dy...
详细信息
The Salp swarm algorithm (SSA) simulates how salps forage and travel in the ocean. SSA suffers from low initial population diversity, improper balancing of exploration and exploitation, and slow convergence speed. Thu...
详细信息
In this article, a neuroadaptive event-triggered containment control strategy combined with the dynamic surface control (DSC) approach is proposed for nonlinear multiagent systems (MASs) with input saturation. Based o...
详细信息
Modern clustering techniques are becoming more popular, but traditional clustering methods often heavily rely on artificial feature extraction, costing too much human labor resources. This task is especially important...
详细信息
A pedestrian detection and tracking algorithm based on improved YOLOv5s and DeepSORT is proposed to address the issues of pedestrian identity jumps and tracking failures caused by mutual occlusion, similar appearance ...
详细信息
Human activity recognition (HAR) is an essential part of many applications, including smart surroundings, sports analysis, and healthcare. Accurately categorizing intricate actions from sensor data is still difficult,...
详细信息
Phishing attacks have risen like wildfire in the era of new digital technology in the wake of exploiting holes in the electronic communication process while cheating a user to seek private information. This work provi...
详细信息
暂无评论