Realizing contact-less applications with Multi-Access Edge Computing

نویسندگان

چکیده

The entire world progression has ceased with the unexpected outbreak of COVID-19 pandemic, and urges requirement for contact-less autonomous services applications. Realizing these predominantly Internet Things (IoT) based applications demands a holistic pervasive computing infrastructure. In this paper, we conduct survey to determine possible approaches utilizing Multi-Access Edge Computing (MEC) infrastructure in realizing requirements emerging IoT We have formalized specific architectural layouts considered applications, while specifying network-level realize such approaches; conducted simulation test feasibility proposed MEC approaches.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...

متن کامل

Using HDS for Realizing Multi-Agent Applications

systems. Nowadays, web services are the primary mean to provide interoperability with legacy applications and the large part of multi-agent applications have been realized without any strong requirement for the interoperability with other multi-agent applications. This paper presents the HDS software framework, which provides a software infrastructure to realize multi-agent applications that ei...

متن کامل

Realizing Mobile Computing Personae

The proliferation of computers has made it possible to do computer-related tasks in many places. At each place a user works, he or she runs applications, specifies preferences for them, and is allowed to access resources and files according to local rules. These elements, together with the nameto-resource mappings, can be referred to as a user’s computing persona. Currently, an implicit persona...

متن کامل

Joint Communication, Computation, Caching, and Control in Big Data Multi-access Edge Computing

The concept of multi-access edge computing (MEC) has been recently introduced to supplement cloud computing by deploying MEC servers to the network edge so as to reduce the network delay and alleviate the load on cloud data centers. However, compared to a resourceful cloud, an MEC server has limited resources. When each MEC server operates independently, it cannot handle all of the computationa...

متن کامل

Multi-access Edge Computing: The driver behind the wheel of 5G-connected cars

The automotive and telco industries have taken an investment bet on the connected car market, pushing for the digital transformation of the sector by exploiting recent Information and Communication Technology (ICT) progress. As ICT developments continue, it is expected that the technology advancements will be able to fulfill the sophisticated requirements for vehicular use cases, such as low la...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ICT Express

سال: 2022

ISSN: ['2405-9595']

DOI: https://doi.org/10.1016/j.icte.2022.03.001