Edge Computing Edge 2024

Download Edge Computing Edge 2024 PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Edge Computing Edge 2024 book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Edge Computing – EDGE 2024

This book constitutes the refereed proceedings of the 8th International Conference on Edge Computing, EDGE 2024, held in Bangkok, Thailand, during November 16-19, 2024. The 8 full papers included in this book were carefully reviewed and selected from 16 submissions. The papers presented focus on various topics such as Edge Storage, Edge Connections, Edge Analytics, Edge AI, Edge Processing Engine, Industry-Specific Edges, Edge Application Innovations, 5G and Edge, 5G and Cloud, AIGC for Edge.
Machine Learning for Edge Computing

This book divides edge intelligence into AI for edge (intelligence-enabled edge computing) and AI on edge (artificial intelligence on edge). It focuses on providing optimal solutions to the key concerns in edge computing through effective AI technologies, and it discusses how to build AI models, i.e., model training and inference, on edge. This book provides insights into this new inter-disciplinary field of edge computing from a broader vision and perspective. The authors discuss machine learning algorithms for edge computing as well as the future needs and potential of the technology. The authors also explain the core concepts, frameworks, patterns, and research roadmap, which offer the necessary background for potential future research programs in edge intelligence. The target audience of this book includes academics, research scholars, industrial experts, scientists, and postgraduate students who are working in the field of Internet of Things (IoT) or edge computing and would like to add machine learning to enhance the capabilities of their work. This book explores the following topics: Edge computing, hardware for edge computing AI, and edge virtualization techniques Edge intelligence and deep learning applications, training, and optimization Machine learning algorithms used for edge computing Reviews AI on IoT Discusses future edge computing needs Amitoj Singh is an Associate Professor at the School of Sciences of Emerging Technologies, Jagat Guru Nanak Dev Punjab State Open University, Punjab, India. Vinay Kukreja is a Professor at the Chitkara Institute of Engineering and Technology, Chitkara University, Punjab, India. Taghi Javdani Gandomani is an Assistant Professor at Shahrekord University, Shahrekord, Iran.
Secure Edge Computing

The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.