Vis enkel innførsel

dc.contributor.authorXu, Xiaolong
dc.contributor.authorWu, Qi
dc.contributor.authorHe, Chengxun
dc.contributor.authorWan, Shaohua
dc.contributor.authorQi, Lianyong
dc.contributor.authorWang, Hao
dc.date.accessioned2020-01-30T09:30:54Z
dc.date.available2020-01-30T09:30:54Z
dc.date.created2020-01-15T11:31:53Z
dc.date.issued2019
dc.identifier.citationCommunications in Computer and Information Science. 2019, 1122 128-140.nb_NO
dc.identifier.issn1865-0929
dc.identifier.urihttp://hdl.handle.net/11250/2638794
dc.description.abstractAs a novel technology, Internet of Vehicles (IoV) is employed to gather real-time traffic information for drivers from sensors and video surveillance devices with image processing, circumstances analysis and events recognition. In spite of multiple advantages of IoV, preprocessing the huge data may demand abundant computation resources for video surveillance devices. Migrating tasks to remote servers for performing is efficient to solve this problem, but it needs high network bandwidth, which causes traffic congestion and delay. Edge computing has capability to enhance processing performance, which complements video surveillance device and addresses numerous shortcomings. Nevertheless, edge computing for video surveillance remains a challenge to achieve low-latency and load balance through limited amount of edge servers. To handle this challenge, an Edge computing-enabled Resource Provisioning Method (ERPM) for Video Surveillance in IoV is proposed in this paper. Technically, SPEA2 (improving the Strength Pare to Evolutionary Algorithm) is picked to solve the multi-objective optimization problem aiming at minimizing the time consumption and optimizing load balance. Finally, experimental simulation for Evolution algorithm demonstrate the appropriation and efficiency of ERPM.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleEdge Computing-Enabled Resource Provisioning for Video Surveillance in Internet of Vehiclesnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber128-140nb_NO
dc.source.volume1122nb_NO
dc.source.journalCommunications in Computer and Information Sciencenb_NO
dc.identifier.doihttps://doi.org/10.1007/978-981-15-1301-5_11
dc.identifier.cristin1773520
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article. Locked until 5.11.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-981-15-1301-5_11nb_NO
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel