Pervasive and Mobile Computing最新文献

筛选
英文 中文
An energy-efficient IoMT three-tier architecture for continuous monitoring of endangered bird species 一种节能的IoMT三层结构,用于濒危鸟类物种的持续监测
IF 3.5 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-07-24 DOI: 10.1016/j.pmcj.2025.102093
Aya Sakhri , Moufida Maimour , Noureddine Doghmane , Eric Rondeau , Saliha Harize
{"title":"An energy-efficient IoMT three-tier architecture for continuous monitoring of endangered bird species","authors":"Aya Sakhri ,&nbsp;Moufida Maimour ,&nbsp;Noureddine Doghmane ,&nbsp;Eric Rondeau ,&nbsp;Saliha Harize","doi":"10.1016/j.pmcj.2025.102093","DOIUrl":"10.1016/j.pmcj.2025.102093","url":null,"abstract":"<div><div>The alarming decline in animal populations, particularly birds, due to environmental degradation necessitates close monitoring of endangered migratory waterbirds in their natural habitats. This can be accomplished through the continuous capture and transmission for population estimation, habitat analysis, and various relevant studies. This paper introduces a three-tier IoMT (Internet of Multimedia Things) deployed along the Edge-Cloud continuum for automated bird monitoring systems aimed at safeguarding endangered waterbird populations. At the edge level, Wireless Multimedia Sensor Networks (WMSN) are used to periodically capture and transmit images to a central collection station (fog level). Challenges such as limited bandwidth and power in Low-Power and Lossy Networks (LLNs) are addressed through local audio identification of endangered bird calls, which activates cameras only for target birds. This significantly reduces data transmission and conserves energy. To tackle ambient noise issues in audio recognition, especially in complex environments such as wetlands, an appropriate noise reduction technique is employed to augment our automatic bird call recognition system. This paper details an energy-efficient approach addressing LLNs’ challenges and incorporates robust noise reduction techniques to improve local audio recognition. The research includes a thorough analysis of potential technical solutions prior to implementation, establishing a critical phase in the system development.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102093"},"PeriodicalIF":3.5,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144724153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A federated learning-based selection and incentive system using blockchain technology 基于区块链技术的联邦学习选择与激励系统
IF 3.5 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-07-18 DOI: 10.1016/j.pmcj.2025.102091
Yang Han , Tasiu Muazu , Omaji Samuel , Shiyu Miao
{"title":"A federated learning-based selection and incentive system using blockchain technology","authors":"Yang Han ,&nbsp;Tasiu Muazu ,&nbsp;Omaji Samuel ,&nbsp;Shiyu Miao","doi":"10.1016/j.pmcj.2025.102091","DOIUrl":"10.1016/j.pmcj.2025.102091","url":null,"abstract":"<div><div>Machine learning algorithms are powerful tools for analyzing data with several observations approximately equal to the number of predictors. However, the privacy of data owners may be revealed during the processes of analysis and mining in a distributed scenario. Today, federated learning is employed as the best paradigm for collaborative model training without disclosing the privacy of the data owners. Unfortunately, efficient client selection and incentive mechanisms need to provide for encouraging data sharing and analysis for constrained and non-constrained devices. Furthermore, trust in the system must be considered. To this end, this study proposes a federated blockchain-based incentive and selection mechanism for a federated learning system. Clients are selected using support vector machines (SVM), while the accuracy of SVM is improved by recursive feature elimination (RFE). A real-time incentive is provided to clients for collaborative learning using deep Q reinforcement learning, and an optimal incentive allocation policy is derived using the Markov decision process (MDP) framework. For miners’ selection, a proof of utility consensus is proposed using a sixteen-round addition game. Extensive simulations are conducted to evaluate the efficiency of the proposed system model. The performance of the proposed system is determined by its optimal statistical utility, system utility, and client utility, respectively. From the experimental results, the proposed SVM-RFE model outperform the existing algorithms. Additionally, security analysis is performed, which shows that the proposed system is safe against background knowledge attacks.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102091"},"PeriodicalIF":3.5,"publicationDate":"2025-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144722416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced hybrid prototype for few-shot class-incremental gait recognition in multi-activity scenarios using wearable sensors 基于可穿戴传感器的多活动场景下多镜头类增量步态识别的增强混合原型
IF 3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-07-16 DOI: 10.1016/j.pmcj.2025.102092
Chao Lin, Zhanyong Mei, Linlong Mao, Zijie Mei
{"title":"Enhanced hybrid prototype for few-shot class-incremental gait recognition in multi-activity scenarios using wearable sensors","authors":"Chao Lin,&nbsp;Zhanyong Mei,&nbsp;Linlong Mao,&nbsp;Zijie Mei","doi":"10.1016/j.pmcj.2025.102092","DOIUrl":"10.1016/j.pmcj.2025.102092","url":null,"abstract":"<div><div>Wearable devices for gait information sensing provide a reliable and robust solution for identity recognition. However, in real-world applications, gait recognition systems based on these sensing devices should adapt to diverse walking activities, tackle the challenge of limited individual data, and continuously update to recognize both old and new users. In this study, we propose a framework based on hybrid prototype enhancement to address the challenge of few-shot class-incremental gait recognition in multi-activity scenarios (<em>FC-GRMA</em>). Firstly, hybrid prototypes are generated by introducing auxiliary activity labels, which are more generalizable than ordinary prototypes; secondly, the prototypes are adjusted by a selective prototype enhancement module, which improves the representative and discriminative abilities of the prototypes. Finally, validation on the public dataset USC-HAD and the self-built dataset CDUT-AG shows that our proposed framework performs best in solving the <em>FC-GRMA</em> problem. In particular, we also discuss the effect of different numbers of activities on the model performance, and the results show that our framework effectively addresses the issue of catastrophic forgetting in multi-activity scenarios. The source code is available at <span><span>https://github.com/lc321/fc-grma.git</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102092"},"PeriodicalIF":3.0,"publicationDate":"2025-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144680694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge AIoT-based agricultural recommendation platform to improve humus productivity in vermicomposting processes 基于边缘物联网的农业推荐平台,提高蚯蚓堆肥过程中腐殖质的生产力
IF 3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-06-23 DOI: 10.1016/j.pmcj.2025.102080
Juan M. Núñez V., Sebastián López Flórez, Juan M. Corchado, Fernando De la Prieta
{"title":"Edge AIoT-based agricultural recommendation platform to improve humus productivity in vermicomposting processes","authors":"Juan M. Núñez V.,&nbsp;Sebastián López Flórez,&nbsp;Juan M. Corchado,&nbsp;Fernando De la Prieta","doi":"10.1016/j.pmcj.2025.102080","DOIUrl":"10.1016/j.pmcj.2025.102080","url":null,"abstract":"<div><div>Climate change represents a critical threat to global food security, affecting agricultural production and exacerbating the food crisis projected by the FAO for 2050. Soil recovery and the adoption of sustainable agricultural practices, such as organic farming, are essential to address this challenge. Smart organic farming improves soil quality, crop productivity, and water retention capacity. In this context, vermiculture, which utilizes Eisenia Foetida (red worms), plays a fundamental role. This article highlights how humus production through vermiculture has been significantly optimized through an Edge AIoT platform that integrates an agricultural recommendation system based on bio-inspired algorithms, an LSTM network for predicting humus and worm populations, and a control system to regulate variables such as temperature, humidity, and pH. The results show an increase in humus production from 37.58% to 87.88% and in the worm population from 35.5% to 83%. Vermicompost, obtained through the non-thermophilic biodegradation of organic waste by worms, acts as a crucial biofertilizer that sustainably increases crop yields and helps farmers adapt to environmental stresses, contributing to the Sustainable Development Goals (SDGs). Finally, seven experiments were conducted in which the Edge AIoT-based agricultural recommendation platform optimized the vermicomposting process, improving efficiency and productivity in humus production. This technological approach not only mitigates the impact of climate change but also supports the recovery of degraded soils and promotes sustainable agricultural practices essential for ensuring future food security.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102080"},"PeriodicalIF":3.0,"publicationDate":"2025-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144472127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiently linking LoRaWAN identifiers through multi-domain fingerprinting 通过多域指纹识别高效链接LoRaWAN标识符
IF 3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-06-16 DOI: 10.1016/j.pmcj.2025.102082
Samuel Pélissier , Abhishek Kumar Mishra , Mathieu Cunche , Vincent Roca , Didier Donsez
{"title":"Efficiently linking LoRaWAN identifiers through multi-domain fingerprinting","authors":"Samuel Pélissier ,&nbsp;Abhishek Kumar Mishra ,&nbsp;Mathieu Cunche ,&nbsp;Vincent Roca ,&nbsp;Didier Donsez","doi":"10.1016/j.pmcj.2025.102082","DOIUrl":"10.1016/j.pmcj.2025.102082","url":null,"abstract":"<div><div>LoRaWAN is a leading IoT technology worldwide, increasingly integrated into pervasive computing environments through a growing number of sensors in various industrial and consumer applications. Although its security vulnerabilities have been extensively explored in the recent literature, its ties to human activities warrant further privacy research. Existing device identification and activity inference attacks are only effective with a stable identifier. We find that the identifiers in LoRaWAN exhibit high variability, and more than half of the devices use them for less than a week. For the first time in the literature, we explore the feasibility of device fingerprinting in LoRaWAN, allowing long-term device linkage, i.e. associating various identifiers of the same device. We introduce a novel holistic fingerprint representation utilizing multiple domains, namely content, timing, and radio information, and present a machine learning-based solution for linking identifiers. Through a large-scale experimental evaluation based on real-world datasets containing up to 41 million messages, we study multiple scenarios, including an attacker with limited resources. We reach 0.98 linkage accuracy, underscoring the need for privacy-preserving measures. We showcase countermeasures including payload padding, random delays, and radio signal modulation, and conclude by assessing their impact on our fingerprinting solution.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102082"},"PeriodicalIF":3.0,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144313756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital twin-enabled age of information-aware scheduling for Industrial IoT edge networks 工业物联网边缘网络的信息感知调度数字孪生时代
IF 3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-06-16 DOI: 10.1016/j.pmcj.2025.102083
Elif Bozkaya-Aras
{"title":"Digital twin-enabled age of information-aware scheduling for Industrial IoT edge networks","authors":"Elif Bozkaya-Aras","doi":"10.1016/j.pmcj.2025.102083","DOIUrl":"10.1016/j.pmcj.2025.102083","url":null,"abstract":"<div><div>Mobile Edge Computing (MEC) is a significant technology employed in the development of the Industrial Internet of Things (IIoT) as it allows the collection and processing of high volumes of data at the network edge to support industrial processes and improve operational efficiency and productivity. However, despite significant advances in MEC capabilities, the stringent latency requirement that may occur in computation-intensive tasks may affect the freshness of status information. Therefore, there are practical challenges in scheduling the tasks associated with computational efficiency in local computation and remote computation. In this context, we propose an Age of Information (AoI)-based scheduler to determine where to execute computational tasks in order to continuously track state data updates, where the AoI metric measures the time elapsed from the generation of the computation task at the source to the latest received update at the destination. The contributions of this paper are threefold: First, we propose a digital twin-enabled AoI-based scheduler model that collects real-time data from IIoT nodes and predicts the best task assignment in terms of local computation and remote computation. The digital twin environment allows monitoring of the state changes of the real physical assets over time and optimizes the scheduling strategy. Second, we formulate the average AoI problem with the M/M/1 queueing model and propose a genetic algorithm-based scheduler to minimize AoI and task completion time to efficiently schedule the computation tasks between IIoT devices and MEC servers. Third, we compare the performance of our digital twin-enabled model with the traditional strategies and make a significant contribution to IIoT edge network management by analyzing AoI, task completion time and MEC server utilization.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102083"},"PeriodicalIF":3.0,"publicationDate":"2025-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144313757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized Multi Agent Reinforcement Learning solution for edge caching in the Internet of Vehicles 一种针对车联网边缘缓存的优化多智能体强化学习解决方案
IF 3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-06-13 DOI: 10.1016/j.pmcj.2025.102081
Mohamed Amine Ghamri, Badis Djamaa, Mohamed Akrem Benatia, Redouane Bellahmer
{"title":"An optimized Multi Agent Reinforcement Learning solution for edge caching in the Internet of Vehicles","authors":"Mohamed Amine Ghamri,&nbsp;Badis Djamaa,&nbsp;Mohamed Akrem Benatia,&nbsp;Redouane Bellahmer","doi":"10.1016/j.pmcj.2025.102081","DOIUrl":"10.1016/j.pmcj.2025.102081","url":null,"abstract":"<div><div>The Internet of Vehicles has evolved significantly with the integration of intelligent technologies, transforming vehicular networks by enhancing communication, resource management, and decision-making at the network’s edge. With the increasing complexity of vehicular environments and data demands, efficient caching mechanisms have become essential to ensure seamless service delivery and optimized resource usage. In this paper, we present LF-MARLEC, a Leader Follower Multi-Agent Reinforcement Learning solution for Edge Caching within the Internet of Vehicles. Our approach introduces a hierarchical distribution of action importance, enabling more effective decision-making at the network edge. Extensive experiments, conducted using widely adopted simulation tools such as SUMO and Veins, demonstrate that our approach substantially enhances caching performance and overall system efficiency. Specifically, our approach achieves nearly 9% reduction in content distribution delay and over 11% improvement in cache hit rate compared to state-of-the-art methods, thereby enhancing the effectiveness of intelligent edge caching in Internet of Vehicles environments. The source code is publicly available at: <span><span>https://github.com/amine9008/RL-EDGE-CACHING</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102081"},"PeriodicalIF":3.0,"publicationDate":"2025-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144364550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight secure key establishment to create a secure channel between entities in a crowdsourcing environment 轻量级安全密钥建立,在众包环境中创建实体之间的安全通道
IF 3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-06-09 DOI: 10.1016/j.pmcj.2025.102078
Mahdi Nikooghadam, Hamid Reza Shahriari
{"title":"Lightweight secure key establishment to create a secure channel between entities in a crowdsourcing environment","authors":"Mahdi Nikooghadam,&nbsp;Hamid Reza Shahriari","doi":"10.1016/j.pmcj.2025.102078","DOIUrl":"10.1016/j.pmcj.2025.102078","url":null,"abstract":"<div><div>The concept of crowdsourcing uses shared intelligence to solve complex tasks through group collaboration. Crowdsourcing involves gathering information and opinions from participants who submit their data, or solutions, over the Internet using a specific program. Given that the communication environment for crowdsourcing platforms is the Internet, there is a significant opportunity for attackers to compromise the confidentiality and integrity of information and violate participants’ privacy. Despite the great benefits of crowdsourcing, concerns about security and privacy are growing and require attention. Unfortunately based on our knowledge, the schemes presented to preserve security and privacy in crowdsourcing are susceptible to security and privacy attack and have a high computational and communication overhead. Therefore, they are not appropriate for crowdsourcing environments. This paper presents an ultra-lightweight authentication and key establishment protocol based on hash functions. This protocol meets all security requirements, is invulnerable to known attacks, and imposes a very low network overhead. The security of the proposed scheme has been formally proved, depicting the resistance of the proposed scheme to different types of possible attacks. In addition, the robustness of the proposed scheme against potential attacks has been proven through Scyther’s automatic software validation tool. The performance evaluation ultimately demonstrated that the proposed protocol incurs significantly reduced computational and communication costs compared to previous schemes and is very suitable for the crowdsourcing environment.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102078"},"PeriodicalIF":3.0,"publicationDate":"2025-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144262812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling user dynamics in the evolving social debate on climate crisis during the conferences of the parties 在缔约方会议期间,在不断发展的气候危机社会辩论中揭示用户动态
IF 3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-06-05 DOI: 10.1016/j.pmcj.2025.102077
Liliana Martirano , Lucio La Cava , Andrea Tagarelli
{"title":"Unveiling user dynamics in the evolving social debate on climate crisis during the conferences of the parties","authors":"Liliana Martirano ,&nbsp;Lucio La Cava ,&nbsp;Andrea Tagarelli","doi":"10.1016/j.pmcj.2025.102077","DOIUrl":"10.1016/j.pmcj.2025.102077","url":null,"abstract":"<div><div>Social media have widely been recognized as a valuable proxy for investigating users’ opinions by echoing virtual venues where individuals engage in daily discussions on a wide range of topics. Among them, climate change is gaining momentum due to its large-scale impact, tangible consequences for society, and enduring nature. In this work, we investigate the social debate surrounding climate emergency, aiming to uncover the fundamental patterns that underlie the climate debate, thus providing valuable support for strategic and operational decision-making. To this purpose, we leverage Graph Mining and NLP techniques to analyze a large corpus of tweets spanning seven years pertaining to the Conference of the Parties (COP), the leading global forum for multilateral discussion on climate-related matters, based on our proposed framework, named NATMAC, which consists of three main modules designed to perform network analysis, topic modeling and affective computing tasks. Our contribution in this work is manifold: (i) we provide insights into the key social actors involved in the climate debate and their relationships, (ii) we unveil the main topics discussed during COPs within the social landscape, (iii) we assess the evolution of users’ sentiment and emotions across time, and (iv) we identify users’ communities based on multiple dimensions. Furthermore, our proposed approach exhibits the potential to scale up to other emergency issues, highlighting its versatility and potential for broader use in analyzing and understanding the increasingly debated emergent phenomena.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102077"},"PeriodicalIF":3.0,"publicationDate":"2025-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144364551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A-BEE-C: Autonomous Bandwidth-Efficient Edge Codecast A-BEE-C:自主带宽高效边缘编解码器
IF 3 3区 计算机科学
Pervasive and Mobile Computing Pub Date : 2025-06-04 DOI: 10.1016/j.pmcj.2025.102075
Gyujeong Lim , Joon-Min Gil , Heonchang Yu
{"title":"A-BEE-C: Autonomous Bandwidth-Efficient Edge Codecast","authors":"Gyujeong Lim ,&nbsp;Joon-Min Gil ,&nbsp;Heonchang Yu","doi":"10.1016/j.pmcj.2025.102075","DOIUrl":"10.1016/j.pmcj.2025.102075","url":null,"abstract":"<div><div>Edge computing is a new paradigm in cloud infrastructure that decentralizes computing and storage, bringing data and services closer to the users. This proximity allows users to access high quality or large sized data with lower latency. However, edge servers typically have fewer resources than cloud servers, necessitating efficient resource management. Emerging research focuses on increasing the cache hit rate of user requests to edge servers, which reduces response latency and improves efficiency. Nonetheless, if available bandwidth is not considered, it becomes challenging to maintain both speed and quality in edge environments. This paper proposes an Autonomous Bandwidth-Efficient Edge Codecast (A-BEE-C) method to enhance the effective bandwidth per device within an edge service area. Codecast, introduced in this paper, is a transmission method that encodes multiple files into a single file before sending it to users. A-BEE-C introduces a dynamic mechanism that switches between unicast and codecast modes based on real-time bandwidth assessment. Our proposed method increases the effective bandwidth per device by encoding multiple user requests into a single coded transmission when the bandwidth of the edge server is limited. Experimental results demonstrate that A-BEE-C reduces average latency per device by up to 9.89% (and up to 18.45% with Zipf pattern data) and increases effective bandwidth per user by up to 10.15% (up to 18.11% with Zipf pattern).</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102075"},"PeriodicalIF":3.0,"publicationDate":"2025-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144221106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信