2018
DOI: 10.3390/s18092982
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Computation Offloading Scheme for Drone-Based Surveillance Systems

Abstract: Recently, various technologies for utilizing unmanned aerial vehicles have been studied. Drones are a kind of unmanned aerial vehicle. Drone-based mobile surveillance systems can be applied for various purposes such as object recognition or object tracking. In this paper, we propose a mobility-aware dynamic computation offloading scheme, which can be used for tracking and recognizing a moving object on the drone. The purpose of the proposed scheme is to reduce the time required for recognizing and tracking a m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…There are remarkable research results that are based on reinforcement learning techniques for sequential stochastic decision-making in various computing research domains. For the application of deep reinforcement learning to mobile edge computing, the research contributions in [8][9][10][11] had been discussed about the optimization for their own objective functions. Even if they considered many criteria for the offloading, there are not contributions that aim at the optimal sequential decision-making for offloading decisions, i.e., whether it has to conduct offloading (i.e., centralized computing) or not (i.e., local edge computing).…”
Section: Related Work: Reinforcement Learning For Mobile Edge Computingmentioning
confidence: 99%
See 1 more Smart Citation
“…There are remarkable research results that are based on reinforcement learning techniques for sequential stochastic decision-making in various computing research domains. For the application of deep reinforcement learning to mobile edge computing, the research contributions in [8][9][10][11] had been discussed about the optimization for their own objective functions. Even if they considered many criteria for the offloading, there are not contributions that aim at the optimal sequential decision-making for offloading decisions, i.e., whether it has to conduct offloading (i.e., centralized computing) or not (i.e., local edge computing).…”
Section: Related Work: Reinforcement Learning For Mobile Edge Computingmentioning
confidence: 99%
“…In mobile edge computing research, several algorithms were proposed in order to optimize their own objectives [8][9][10][11][12]. However, none of them are considering offloading decision for determining whether it has to conduct offloading or not.…”
mentioning
confidence: 99%
“…Forward secrecy safeguards from potential secret-key compromises on previous sessions. Through creating a unique session key for each session initiated by a user, a single session key compromise will not impact any data other than that shared in the session secured by that specific key [10]. Reverse Secrecy ensures that an uninvolved foe who knows an adjoining subset of gathering keys can't find the previously used group keys.…”
Section: Forward and Backward Secrecymentioning
confidence: 99%
“…The goal is to reduce the processing time of recognition and detection. A mobility-aware computation offloading decision scheme is proposed in [ 23 ]. Based on the mobility information of the moving target object and network conditions, it will offload some computation task that is related to the recognizing and tracking of a moving object to a remote control center.…”
Section: Related Workmentioning
confidence: 99%