scholarly journals EdgeAvatar: An Edge Computing System for Building Virtual Beings

Electronics ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 229
Author(s):  
Neftali Watkinson ◽  
Fedor Zaitsev ◽  
Aniket Shivam ◽  
Michael Demirev ◽  
Mike Heddes ◽  
...  

Dialogue systems, also known as conversational agents, are computing systems that use algorithms for speech and language processing to engage in conversation with humans or other conversation-capable systems. A chatbot is a conversational agent that has, as its primary goal, to maximize the length of the conversation without any specific targeted task. When a chatbot is embellished with an artistic approach that is meant to evoke an emotional response, then it is called a virtual being. On the other hand, conversational agents that interact with the physical world require the use of specialized hardware to sense and process captured information. In this article we describe EdgeAvatar, a system based on Edge Computing principles for the creation of virtual beings. The objective of the EdgeAvatar system is to provide a streamlined and modular framework for virtual being applications that are to be deployed in public settings. We also present two implementations that use EdgeAvatar and are inspired by historical figures to interact with visitors of the Venice Biennale 2019. EdgeAvatar can adapt to fit different approaches for AI powered conversations.

Sensors ◽  
2019 ◽  
Vol 19 (8) ◽  
pp. 1926 ◽  
Author(s):  
Yi Chen ◽  
Hong Wen ◽  
Jinsong Wu ◽  
Huanhuan Song ◽  
Aidong Xu ◽  
...  

In this paper, we propose a clustering based physical-layer authentication scheme (CPAS) to overcome the drawback of traditional cipher-based authentication schemes that suffer from heavy costs and are limited by energy-constrained intelligent devices. CPAS is a novel cross-layer secure authentication approach for edge computing system with asymmetric resources. The CPAS scheme combines clustering and lightweight symmetric cipher with physical-layer channel state information to provide two-way authentication between terminals and edge devices. By taking advantage of temporal and spatial uniqueness in physical layer channel responses, the non-cryptographic physical layer authentication techniques can achieve fast authentication. The lightweight symmetric cipher initiates user authentication at the start of a session to establish the trust connection. Based on theoretical analysis, the CPAS scheme is secure and simple, but there is no trusted party, while it can also resist small integer attacks, replay attacks, and spoofing attacks. Besides, experimental results show that the proposed scheme can boost the total success rate of access authentication and decrease the data frame loss rate, without notable increase in authentication latencies.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8264
Author(s):  
Seung-Yeon Kim ◽  
Yi-Kang Kim

An edge computing system is a distributed computing framework that provides execution resources such as computation and storage for applications involving networking close to the end nodes. An unmanned aerial vehicle (UAV)-aided edge computing system can provide a flexible configuration for mobile ground nodes (MGN). However, edge computing systems still require higher guaranteed reliability for computational task completion and more efficient energy management before their widespread usage. To solve these problems, we propose an energy efficient UAV-based edge computing system with energy harvesting capability. In this system, the MGN makes requests for computing service from multiple UAVs, and geographically proximate UAVs determine whether or not to conduct the data processing in a distributed manner. To minimize the energy consumption of UAVs while maintaining a guaranteed level of reliability for task completion, we propose a stochastic game model with constraints for our proposed system. We apply a best response algorithm to obtain a multi-policy constrained Nash equilibrium. The results show that our system can achieve an improved life cycle compared to the individual computing scheme while maintaining a sufficient successful complete computation probability.


2021 ◽  
Vol 21 (2) ◽  
pp. 1-25
Author(s):  
Pin Ni ◽  
Yuming Li ◽  
Gangmin Li ◽  
Victor Chang

Cyber-Physical Systems (CPS), as a multi-dimensional complex system that connects the physical world and the cyber world, has a strong demand for processing large amounts of heterogeneous data. These tasks also include Natural Language Inference (NLI) tasks based on text from different sources. However, the current research on natural language processing in CPS does not involve exploration in this field. Therefore, this study proposes a Siamese Network structure that combines Stacked Residual Long Short-Term Memory (bidirectional) with the Attention mechanism and Capsule Network for the NLI module in CPS, which is used to infer the relationship between text/language data from different sources. This model is mainly used to implement NLI tasks and conduct a detailed evaluation in three main NLI benchmarks as the basic semantic understanding module in CPS. Comparative experiments prove that the proposed method achieves competitive performance, has a certain generalization ability, and can balance the performance and the number of trained parameters.


Life ◽  
2021 ◽  
Vol 11 (4) ◽  
pp. 310
Author(s):  
Shih-Chia Chang ◽  
Ming-Tsang Lu ◽  
Tzu-Hui Pan ◽  
Chiao-Shan Chen

Although the electronic health (e-health) cloud computing system is a promising innovation, its adoption in the healthcare industry has been slow. This study investigated the adoption of e-health cloud computing systems in the healthcare industry and considered security functions, management, cloud service delivery, and cloud software for e-health cloud computing systems. Although numerous studies have determined factors affecting e-health cloud computing systems, few comprehensive reviews of factors and their relations have been conducted. Therefore, this study investigated the relations between the factors affecting e-health cloud computing systems by using a multiple criteria decision-making technique, in which decision-making trial and evaluation laboratory (DEMATEL), DANP (DEMATEL-based Analytic Network Process), and modified VIKOR (VlseKriterijumska Optimizacija I Kompromisno Resenje) approaches were combined. The intended level of adoption of an e-health cloud computing system could be determined by using the proposed approach. The results of a case study performed on the Taiwanese healthcare industry indicated that the cloud management function must be primarily enhanced and that cost effectiveness is the most significant factor in the adoption of e-health cloud computing. This result is valuable for allocating resources to decrease performance gaps in the Taiwanese healthcare industry.


2021 ◽  
Vol 561 ◽  
pp. 70-80
Author(s):  
Guangshun Li ◽  
Xinrong Ren ◽  
Junhua Wu ◽  
Wanting Ji ◽  
Haili Yu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document