no code implementations • 12 Sep 2019 • Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch, Timothy R. Faughnan
This paper presents a forensic surveillance strategy by introducing an Instant Suspicious Activity identiFication at the Edge (I-SAFE) using fuzzy decision making.
no code implementations • 24 Apr 2018 • Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi, Timothy R. Faughnan
Edge computing efficiently extends the realm of information technology beyond the boundary defined by cloud computing paradigm.
no code implementations • 24 Apr 2018 • Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi, Timothy R. Faughnan
Edge computing allows more computing tasks to take place on the decentralized nodes at the edge of networks.