CINXE.COM

Tangina Sultana | Kyung Hee University - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Tangina Sultana | Kyung Hee University - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="zGn5fNF6GI2w0pc8+Aq3x8LhUS/fS4MxbjRomgS6wutGfP+P+aSvteOOfTMBUXqS/odix2Ww8Rg/C+O7tL4CEQ==" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-77f7b87cb1583fc59aa8f94756ebfe913345937eb932042b4077563bebb5fb4b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-9e8218e1301001388038e3fc3427ed00d079a4760ff7745d1ec1b2d59103170a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-b2b823dd904da60a48fd1bfa1defd840610c2ff414d3f39ed3af46277ab8df3b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="author" content="tangina sultana" /> <meta name="description" content="Tangina Sultana, Kyung Hee University: 2 Followers, 1 Following, 23 Research papers. Research interests: Urban Analysis, Geospatial Semantics, and SDI (Spatial…" /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '92477ec68c09d28ae4730a4143c926f074776319'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15276,"monthly_visitors":"113 million","monthly_visitor_count":113458213,"monthly_visitor_count_in_millions":113,"user_count":277559985,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732821884000); window.Aedu.timeDifference = new Date().getTime() - 1732821884000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-bdb9e8c097f01e611f2fc5e2f1a9dc599beede975e2ae5629983543a1726e947.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-bae13f9b51961d5f1e06008e39e31d0138cb31332e8c2e874c6d6a250ec2bb14.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-19a25d160d01bde427443d06cd6b810c4c92c6026e7cb31519e06313eb24ed90.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://khu.academia.edu/TanginaSultana" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-e032f1d55548c2f2dee4eac9fe52f38beaf13471f2298bb2ea82725ae930b83c.js" defer="defer"></script><script>Aedu.rankings = { showPaperRankingsLink: false } $viewedUser = Aedu.User.set_viewed( {"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana","photo":"https://0.academia-photos.com/128920438/35786042/30901429/s65_tangina.sultana.jpg","has_photo":true,"department":{"id":1908544,"name":"Department of Computer Science and Engineering","url":"https://khu.academia.edu/Departments/Department_of_Computer_Science_and_Engineering/Documents","university":{"id":13850,"name":"Kyung Hee University","url":"https://khu.academia.edu/"}},"position":"Graduate Student","position_id":3,"is_analytics_public":false,"interests":[{"id":428104,"name":"Urban Analysis","url":"https://www.academia.edu/Documents/in/Urban_Analysis"},{"id":30195,"name":"Geospatial Semantics","url":"https://www.academia.edu/Documents/in/Geospatial_Semantics"},{"id":1256,"name":"SDI (Spatial Data Infrastructure)","url":"https://www.academia.edu/Documents/in/SDI_Spatial_Data_Infrastructure_"},{"id":125836,"name":"Linked Open Data","url":"https://www.academia.edu/Documents/in/Linked_Open_Data"},{"id":413148,"name":"Big Data / Analytics / Data Mining","url":"https://www.academia.edu/Documents/in/Big_Data_Analytics_Data_Mining"},{"id":1226904,"name":"Computer Science and Engineering","url":"https://www.academia.edu/Documents/in/Computer_Science_and_Engineering-1"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://khu.academia.edu/TanginaSultana&quot;,&quot;location&quot;:&quot;/TanginaSultana&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;khu.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/TanginaSultana&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-275b1cd2-934e-4fd3-b2d7-2cb23c5c1a66"></div> <div id="ProfileCheckPaperUpdate-react-component-275b1cd2-934e-4fd3-b2d7-2cb23c5c1a66"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="Tangina Sultana" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/128920438/35786042/30901429/s200_tangina.sultana.jpg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Tangina Sultana</h1><div class="affiliations-container fake-truncate js-profile-affiliations"><div><a class="u-tcGrayDarker" href="https://khu.academia.edu/">Kyung Hee University</a>, <a class="u-tcGrayDarker" href="https://khu.academia.edu/Departments/Department_of_Computer_Science_and_Engineering/Documents">Department of Computer Science and Engineering</a>, <span class="u-tcGrayDarker">Graduate Student</span></div></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Tangina" data-follow-user-id="128920438" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="128920438"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">2</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">1</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span><a class="ri-more-link js-profile-ri-list-card" data-click-track="profile-user-info-primary-research-interest" data-has-card-for-ri-list="128920438">View All (6)</a></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="128920438" href="https://www.academia.edu/Documents/in/Urban_Analysis"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://khu.academia.edu/TanginaSultana&quot;,&quot;location&quot;:&quot;/TanginaSultana&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;khu.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/TanginaSultana&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Urban Analysis&quot;]}" data-trace="false" data-dom-id="Pill-react-component-b29ed72b-06dd-4a3d-82a1-24c0af5a4651"></div> <div id="Pill-react-component-b29ed72b-06dd-4a3d-82a1-24c0af5a4651"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="128920438" href="https://www.academia.edu/Documents/in/Geospatial_Semantics"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Geospatial Semantics&quot;]}" data-trace="false" data-dom-id="Pill-react-component-ce3402c6-13d7-4bd3-a0d0-9f79e94282fd"></div> <div id="Pill-react-component-ce3402c6-13d7-4bd3-a0d0-9f79e94282fd"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="128920438" href="https://www.academia.edu/Documents/in/SDI_Spatial_Data_Infrastructure_"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;SDI (Spatial Data Infrastructure)&quot;]}" data-trace="false" data-dom-id="Pill-react-component-40c1f266-00ce-4a7a-aaca-ac2e218a1a25"></div> <div id="Pill-react-component-40c1f266-00ce-4a7a-aaca-ac2e218a1a25"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="128920438" href="https://www.academia.edu/Documents/in/Linked_Open_Data"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Linked Open Data&quot;]}" data-trace="false" data-dom-id="Pill-react-component-69eef7f2-e4d6-41de-832a-4bebe4c8ae07"></div> <div id="Pill-react-component-69eef7f2-e4d6-41de-832a-4bebe4c8ae07"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="128920438" href="https://www.academia.edu/Documents/in/Big_Data_Analytics_Data_Mining"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Big Data / Analytics / Data Mining&quot;]}" data-trace="false" data-dom-id="Pill-react-component-d4a5bd04-64af-4934-8185-969f941e17e7"></div> <div id="Pill-react-component-d4a5bd04-64af-4934-8185-969f941e17e7"></div> </a></div></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by Tangina Sultana</h3></div><div class="js-work-strip profile--work_container" data-work-id="104663982"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663982/LeL_GNN_Learnable_Edge_Sampling_and_Line_Based_Graph_Neural_Network_for_Link_Prediction"><img alt="Research paper thumbnail of LeL-GNN: Learnable Edge Sampling and Line Based Graph Neural Network for Link Prediction" class="work-thumbnail" src="https://attachments.academia-assets.com/104332122/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663982/LeL_GNN_Learnable_Edge_Sampling_and_Line_Based_Graph_Neural_Network_for_Link_Prediction">LeL-GNN: Learnable Edge Sampling and Line Based Graph Neural Network for Link Prediction</a></div><div class="wp-workCard_item"><span>IEEE Access</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="2d31ab3392f35c858eaf123f30066555" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:104332122,&quot;asset_id&quot;:104663982,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/104332122/download_file?st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663982"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663982"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663982; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663982]").text(description); $(".js-view-count[data-work-id=104663982]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663982; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663982']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663982, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "2d31ab3392f35c858eaf123f30066555" } } $('.js-work-strip[data-work-id=104663982]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663982,"title":"LeL-GNN: Learnable Edge Sampling and Line Based Graph Neural Network for Link Prediction","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","grobid_abstract":"Graph neural networks lose a lot of their computing power when more network layers are added. As a result, the majority of existing graph neural networks have a shallow depth of learning. Oversmoothing and information loss are two of the key issues that restrict graph neural networks from going deeper. As network depth goes up, the embeddings of all the nodes eventually converge on the same value, which separates output representations from input vectors and causes over-smoothing. Moreover, layers of graph pooling are required in a deep learning model to retrieve specified features for prediction, which results in some degree of information loss. In this research, we present a new and multi-scale approach for overcoming these constraints by using concepts from graph theory, namely learnable edge sampling and line graphs. An edge-sampling mechanism that selects a particular number of edges through a learning parameter before training reduces oversmoothing, and the issue of information loss is alleviated using a line graph technique that converts the original graph into a similar line graph. Our method of edge sampling preserves the core spectral features of the graph without affecting its fundamental structure. Our suggested technique outperforms state-of-the-art models on publicly available datasets of diverse applications while having minimal constraints and great training skills. INDEX TERMS Edge sampling, deep graph neural networks, line graph, link prediction.","publication_name":"IEEE Access","grobid_abstract_attachment_id":104332122},"translated_abstract":null,"internal_url":"https://www.academia.edu/104663982/LeL_GNN_Learnable_Edge_Sampling_and_Line_Based_Graph_Neural_Network_for_Link_Prediction","translated_internal_url":"","created_at":"2023-07-17T10:56:48.639-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":104332122,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332122/thumbnails/1.jpg","file_name":"10144318.pdf","download_url":"https://www.academia.edu/attachments/104332122/download_file?st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"LeL_GNN_Learnable_Edge_Sampling_and_Line.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332122/10144318-libre.pdf?1689619734=\u0026response-content-disposition=attachment%3B+filename%3DLeL_GNN_Learnable_Edge_Sampling_and_Line.pdf\u0026Expires=1732825483\u0026Signature=CmfS3YcAUdaJl1Pgc72caQM3SDDIhaS0W02eOQbAPTYtW-tPVi8wzcX~0BittZKOWvJC8AES7bhtae1Sk44ptlQfbcSrkc8d1JI1lYRLjyqQj75jYlWjO0eEPhr-qdr4JVCAN3Z~zuPBMTCye5tuvyNwJeos2MhshW26eYVAHG18uBnA~OPhXSpt7RS8OMQYaqExAnfsX-m2mrGcjukLsDUtligVL53SfpFeAVl~QvUO8AyoppWs1LTg8TwQSuNQ91rauhykLVA9CrgjmuVRD-ewG~WQiENv8awglrBbTSPNC6ATCjU3irdzR3oPF3gnqxkRkvVNlXAdgARnxLG1xQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"LeL_GNN_Learnable_Edge_Sampling_and_Line_Based_Graph_Neural_Network_for_Link_Prediction","translated_slug":"","page_count":15,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":104332122,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332122/thumbnails/1.jpg","file_name":"10144318.pdf","download_url":"https://www.academia.edu/attachments/104332122/download_file?st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"LeL_GNN_Learnable_Edge_Sampling_and_Line.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332122/10144318-libre.pdf?1689619734=\u0026response-content-disposition=attachment%3B+filename%3DLeL_GNN_Learnable_Edge_Sampling_and_Line.pdf\u0026Expires=1732825483\u0026Signature=CmfS3YcAUdaJl1Pgc72caQM3SDDIhaS0W02eOQbAPTYtW-tPVi8wzcX~0BittZKOWvJC8AES7bhtae1Sk44ptlQfbcSrkc8d1JI1lYRLjyqQj75jYlWjO0eEPhr-qdr4JVCAN3Z~zuPBMTCye5tuvyNwJeos2MhshW26eYVAHG18uBnA~OPhXSpt7RS8OMQYaqExAnfsX-m2mrGcjukLsDUtligVL53SfpFeAVl~QvUO8AyoppWs1LTg8TwQSuNQ91rauhykLVA9CrgjmuVRD-ewG~WQiENv8awglrBbTSPNC6ATCjU3irdzR3oPF3gnqxkRkvVNlXAdgARnxLG1xQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":32939408,"url":"http://xplorestaging.ieee.org/ielx7/6287639/10005208/10144318.pdf?arnumber=10144318"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="104663981"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663981/Computation_Offloading_Strategy_Based_on_Multi_armed_Bandit_Learning_in_Microservice_enabled_Vehicular_Edge_Computing_Networks"><img alt="Research paper thumbnail of Computation Offloading Strategy Based on Multi-armed Bandit Learning in Microservice-enabled Vehicular Edge Computing Networks" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663981/Computation_Offloading_Strategy_Based_on_Multi_armed_Bandit_Learning_in_Microservice_enabled_Vehicular_Edge_Computing_Networks">Computation Offloading Strategy Based on Multi-armed Bandit Learning in Microservice-enabled Vehicular Edge Computing Networks</a></div><div class="wp-workCard_item"><span>2023 International Conference on Information Networking (ICOIN)</span><span>, Jan 11, 2023</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663981"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663981"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663981; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663981]").text(description); $(".js-view-count[data-work-id=104663981]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663981; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663981']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663981, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104663981]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663981,"title":"Computation Offloading Strategy Based on Multi-armed Bandit Learning in Microservice-enabled Vehicular Edge Computing Networks","translated_title":"","metadata":{"publication_date":{"day":11,"month":1,"year":2023,"errors":{}},"publication_name":"2023 International Conference on Information Networking (ICOIN)"},"translated_abstract":null,"internal_url":"https://www.academia.edu/104663981/Computation_Offloading_Strategy_Based_on_Multi_armed_Bandit_Learning_in_Microservice_enabled_Vehicular_Edge_Computing_Networks","translated_internal_url":"","created_at":"2023-07-17T10:56:48.464-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Computation_Offloading_Strategy_Based_on_Multi_armed_Bandit_Learning_in_Microservice_enabled_Vehicular_Edge_Computing_Networks","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":440,"name":"Distributed Computing","url":"https://www.academia.edu/Documents/in/Distributed_Computing"},{"id":26860,"name":"Cloud Computing","url":"https://www.academia.edu/Documents/in/Cloud_Computing"},{"id":1729876,"name":"Microservices","url":"https://www.academia.edu/Documents/in/Microservices"},{"id":2236574,"name":"Mobile Edge Computing","url":"https://www.academia.edu/Documents/in/Mobile_Edge_Computing"},{"id":2525525,"name":"Edge Computing","url":"https://www.academia.edu/Documents/in/Edge_Computing"},{"id":3731186,"name":"Computation offloading ","url":"https://www.academia.edu/Documents/in/Computation_offloading"}],"urls":[{"id":32939407,"url":"https://doi.org/10.1109/icoin56518.2023.10048991"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="104663980"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663980/Human_Action_Recognition_A_Taxonomy_Based_Survey_Updates_and_Opportunities"><img alt="Research paper thumbnail of Human Action Recognition: A Taxonomy-Based Survey, Updates, and Opportunities" class="work-thumbnail" src="https://attachments.academia-assets.com/104332123/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663980/Human_Action_Recognition_A_Taxonomy_Based_Survey_Updates_and_Opportunities">Human Action Recognition: A Taxonomy-Based Survey, Updates, and Opportunities</a></div><div class="wp-workCard_item"><span>Sensors</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Human action recognition systems use data collected from a wide range of sensors to accurately id...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Human action recognition systems use data collected from a wide range of sensors to accurately identify and interpret human actions. One of the most challenging issues for computer vision is the automatic and precise identification of human activities. A significant increase in feature learning-based representations for action recognition has emerged in recent years, due to the widespread use of deep learning-based features. This study presents an in-depth analysis of human activity recognition that investigates recent developments in computer vision. Augmented reality, human–computer interaction, cybersecurity, home monitoring, and surveillance cameras are all examples of computer vision applications that often go in conjunction with human action detection. We give a taxonomy-based, rigorous study of human activity recognition techniques, discussing the best ways to acquire human action features, derived using RGB and depth data, as well as the latest research on deep learning and ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e599a702810567a04a41d98a3abcc52f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:104332123,&quot;asset_id&quot;:104663980,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/104332123/download_file?st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663980"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663980"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663980; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663980]").text(description); $(".js-view-count[data-work-id=104663980]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663980; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663980']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663980, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e599a702810567a04a41d98a3abcc52f" } } $('.js-work-strip[data-work-id=104663980]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663980,"title":"Human Action Recognition: A Taxonomy-Based Survey, Updates, and Opportunities","translated_title":"","metadata":{"abstract":"Human action recognition systems use data collected from a wide range of sensors to accurately identify and interpret human actions. One of the most challenging issues for computer vision is the automatic and precise identification of human activities. A significant increase in feature learning-based representations for action recognition has emerged in recent years, due to the widespread use of deep learning-based features. This study presents an in-depth analysis of human activity recognition that investigates recent developments in computer vision. Augmented reality, human–computer interaction, cybersecurity, home monitoring, and surveillance cameras are all examples of computer vision applications that often go in conjunction with human action detection. We give a taxonomy-based, rigorous study of human activity recognition techniques, discussing the best ways to acquire human action features, derived using RGB and depth data, as well as the latest research on deep learning and ...","publisher":"MDPI AG","publication_name":"Sensors"},"translated_abstract":"Human action recognition systems use data collected from a wide range of sensors to accurately identify and interpret human actions. One of the most challenging issues for computer vision is the automatic and precise identification of human activities. A significant increase in feature learning-based representations for action recognition has emerged in recent years, due to the widespread use of deep learning-based features. This study presents an in-depth analysis of human activity recognition that investigates recent developments in computer vision. Augmented reality, human–computer interaction, cybersecurity, home monitoring, and surveillance cameras are all examples of computer vision applications that often go in conjunction with human action detection. We give a taxonomy-based, rigorous study of human activity recognition techniques, discussing the best ways to acquire human action features, derived using RGB and depth data, as well as the latest research on deep learning and ...","internal_url":"https://www.academia.edu/104663980/Human_Action_Recognition_A_Taxonomy_Based_Survey_Updates_and_Opportunities","translated_internal_url":"","created_at":"2023-07-17T10:56:48.297-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":104332123,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332123/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/104332123/download_file?st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Human_Action_Recognition_A_Taxonomy_Base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332123/pdf-libre.pdf?1689619723=\u0026response-content-disposition=attachment%3B+filename%3DHuman_Action_Recognition_A_Taxonomy_Base.pdf\u0026Expires=1732825483\u0026Signature=UIMZDZRV8PCq3s6JuZW7fCsXuMY6NQ2bt5-y~4e58OwYCF-W4QQknEp~9PbpBQUN2m2U~yMap1DqHEfKHGScyVKHR-i9j2AMOb-giq6cQcL9tzO2SWar2jtZMXvfsESZJUx0fjqdGSVnco4y-8Yg3n3lxjB47eNTsBFYeARZuOCKaDelPCyOOjStpq3xSpzeGb~uaXUTwgWGMcCD9uBVReimHCPPIx-2GCzAolkajev3hI5~vCeoV5D2xYAOh42vfw3p3gqFbKEEE-0yQ3Rgx6aIv16t-gq8cGmn-h5EC2tK2Oqc9IqqxjAcYav0F21xBUiLoAuL3m1C~5v9vtsf3Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Human_Action_Recognition_A_Taxonomy_Based_Survey_Updates_and_Opportunities","translated_slug":"","page_count":40,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":104332123,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332123/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/104332123/download_file?st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Human_Action_Recognition_A_Taxonomy_Base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332123/pdf-libre.pdf?1689619723=\u0026response-content-disposition=attachment%3B+filename%3DHuman_Action_Recognition_A_Taxonomy_Base.pdf\u0026Expires=1732825483\u0026Signature=UIMZDZRV8PCq3s6JuZW7fCsXuMY6NQ2bt5-y~4e58OwYCF-W4QQknEp~9PbpBQUN2m2U~yMap1DqHEfKHGScyVKHR-i9j2AMOb-giq6cQcL9tzO2SWar2jtZMXvfsESZJUx0fjqdGSVnco4y-8Yg3n3lxjB47eNTsBFYeARZuOCKaDelPCyOOjStpq3xSpzeGb~uaXUTwgWGMcCD9uBVReimHCPPIx-2GCzAolkajev3hI5~vCeoV5D2xYAOh42vfw3p3gqFbKEEE-0yQ3Rgx6aIv16t-gq8cGmn-h5EC2tK2Oqc9IqqxjAcYav0F21xBUiLoAuL3m1C~5v9vtsf3Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":104332124,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332124/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/104332124/download_file","bulk_download_file_name":"Human_Action_Recognition_A_Taxonomy_Base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332124/pdf-libre.pdf?1689619722=\u0026response-content-disposition=attachment%3B+filename%3DHuman_Action_Recognition_A_Taxonomy_Base.pdf\u0026Expires=1732825483\u0026Signature=PVRmRVQBQgXYVXi2I3bYBTWbPswW~4mSR14aki6nwccoRygPPcYfVNIJKUb5UYJ42KFrR2m5JbnS4PFHT7rnbGuM~0DyxE1biAuTWXrKy7Q7PwNNMuRQkJ4KRVkNtVn2GoPxI33YLfDfuahRXVjZRLk~izNRAGpvv3jFqUay3O1g3kYgBMr9YvotGAmY27tAVfQMURH389UTgqWY9m-0LH8eM2CheGxRAuxcwmV16gcaE5PkZpSc7j3oqeVd2PEgNpVrOVY0BoDRc30rMael3h30Mg4AhtIbbe3J9POXivq9Qox5VsxkjFqXSJgjnOd~aSTlhJAEcIRr9LkE4TpbuA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction"},{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":90270,"name":"Action Recognition","url":"https://www.academia.edu/Documents/in/Action_Recognition"},{"id":901526,"name":"Action (Physics)","url":"https://www.academia.edu/Documents/in/Action_Physics_"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":32939406,"url":"https://www.mdpi.com/1424-8220/23/4/2182/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="104663979"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663979/%EB%A9%80%ED%8B%B0_%EC%95%A1%EC%84%B8%EC%8A%A4_%EC%97%90%EC%A7%80_%EC%BB%B4%ED%93%A8%ED%8C%85%EC%97%90%EC%84%9C_%ED%8D%BC%EC%A7%80_%EB%A1%9C%EC%A7%81%EC%9D%84_%EC%82%AC%EC%9A%A9%ED%95%9C_%ED%9A%A8%EC%9C%A8%EC%A0%81%EC%9D%B8_%EB%B6%80%ED%95%98_%EA%B4%80%EB%A6%AC_%EA%B8%B0%EB%B2%95"><img alt="Research paper thumbnail of 멀티 액세스 에지 컴퓨팅에서 퍼지 로직을 사용한 효율적인 부하 관리 기법" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663979/%EB%A9%80%ED%8B%B0_%EC%95%A1%EC%84%B8%EC%8A%A4_%EC%97%90%EC%A7%80_%EC%BB%B4%ED%93%A8%ED%8C%85%EC%97%90%EC%84%9C_%ED%8D%BC%EC%A7%80_%EB%A1%9C%EC%A7%81%EC%9D%84_%EC%82%AC%EC%9A%A9%ED%95%9C_%ED%9A%A8%EC%9C%A8%EC%A0%81%EC%9D%B8_%EB%B6%80%ED%95%98_%EA%B4%80%EB%A6%AC_%EA%B8%B0%EB%B2%95">멀티 액세스 에지 컴퓨팅에서 퍼지 로직을 사용한 효율적인 부하 관리 기법</a></div><div class="wp-workCard_item"><span>한국정보과학회</span><span>, Nov 1, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663979"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663979"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663979; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663979]").text(description); $(".js-view-count[data-work-id=104663979]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663979; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663979']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663979, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104663979]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663979,"title":"멀티 액세스 에지 컴퓨팅에서 퍼지 로직을 사용한 효율적인 부하 관리 기법","translated_title":"","metadata":{"publisher":"한국정보과학회","publication_date":{"day":1,"month":11,"year":2020,"errors":{}},"publication_name":"한국정보과학회"},"translated_abstract":null,"internal_url":"https://www.academia.edu/104663979/%EB%A9%80%ED%8B%B0_%EC%95%A1%EC%84%B8%EC%8A%A4_%EC%97%90%EC%A7%80_%EC%BB%B4%ED%93%A8%ED%8C%85%EC%97%90%EC%84%9C_%ED%8D%BC%EC%A7%80_%EB%A1%9C%EC%A7%81%EC%9D%84_%EC%82%AC%EC%9A%A9%ED%95%9C_%ED%9A%A8%EC%9C%A8%EC%A0%81%EC%9D%B8_%EB%B6%80%ED%95%98_%EA%B4%80%EB%A6%AC_%EA%B8%B0%EB%B2%95","translated_internal_url":"","created_at":"2023-07-17T10:56:48.193-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"멀티_액세스_에지_컴퓨팅에서_퍼지_로직을_사용한_효율적인_부하_관리_기법","translated_slug":"","page_count":null,"language":"ko","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="104663962"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663962/The_role_of_microservice_approach_in_edge_computing_Opportunities_challenges_and_research_directions"><img alt="Research paper thumbnail of The role of microservice approach in edge computing: Opportunities, challenges, and research directions" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663962/The_role_of_microservice_approach_in_edge_computing_Opportunities_challenges_and_research_directions">The role of microservice approach in edge computing: Opportunities, challenges, and research directions</a></div><div class="wp-workCard_item"><span>ICT Express</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663962"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663962"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663962; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663962]").text(description); $(".js-view-count[data-work-id=104663962]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663962; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663962']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663962, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104663962]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663962,"title":"The role of microservice approach in edge computing: Opportunities, challenges, and research directions","translated_title":"","metadata":{"publisher":"Elsevier BV","publication_name":"ICT Express"},"translated_abstract":null,"internal_url":"https://www.academia.edu/104663962/The_role_of_microservice_approach_in_edge_computing_Opportunities_challenges_and_research_directions","translated_internal_url":"","created_at":"2023-07-17T10:56:27.316-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"The_role_of_microservice_approach_in_edge_computing_Opportunities_challenges_and_research_directions","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[],"urls":[{"id":32939397,"url":"https://api.elsevier.com/content/article/PII:S2405959523000760?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231054"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231054/Edge_Orchestration_Based_Computation_Peer_Offloading_in_MEC_Enabled_Networks_A_Fuzzy_Logic_Approach"><img alt="Research paper thumbnail of Edge Orchestration Based Computation Peer Offloading in MEC-Enabled Networks: A Fuzzy Logic Approach" class="work-thumbnail" src="https://attachments.academia-assets.com/89326518/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231054/Edge_Orchestration_Based_Computation_Peer_Offloading_in_MEC_Enabled_Networks_A_Fuzzy_Logic_Approach">Edge Orchestration Based Computation Peer Offloading in MEC-Enabled Networks: A Fuzzy Logic Approach</a></div><div class="wp-workCard_item"><span>2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0097c9ad7e94d40afff3cbb419abb5b5" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326518,&quot;asset_id&quot;:84231054,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326518/download_file?st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231054"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231054"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231054; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231054]").text(description); $(".js-view-count[data-work-id=84231054]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231054; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231054']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231054, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0097c9ad7e94d40afff3cbb419abb5b5" } } $('.js-work-strip[data-work-id=84231054]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231054,"title":"Edge Orchestration Based Computation Peer Offloading in MEC-Enabled Networks: A Fuzzy Logic Approach","translated_title":"","metadata":{"publisher":"IEEE","grobid_abstract":"La dépêche africaine featured a mélange of African diasporic contributors from across the French colonies. Chief among them were the Afro-Martinican intellectuals and sisters Jane and Paulette Nardal. It was here that Jane Nardal published her now famous essay \"Internationalisme noir,\" introducing the idea of \"black internationalism\" into popular parlance. Nardal documented a new understanding of blackness and collectivity amid post-World War I globalization. Just as wartime had broken down barriers among Europeans and white Americans, so too had it fostered the \"sentiment\" among black people from the around the world that they \"belong[ed] to one and the same race.\" 1 Introducing and reifying terms such as \"Afro Latino\" and \"African American\" into French and English vernaculars, Nardal focused on black people's efforts to rhetorically and ideologically link the African diaspora while also reconciling these new identities with the \"ancient traditions\" of Africa. 2 The result: one of the first efforts to define black internationalism as an ideology, worldview, and political practice in a moment in which black people the world over were trying to negotiate the modernizing world and their place in it. As Nardal's work offered rich and ideologically fertile ground, contemporaneous male writers and thinkers quickly usurped the ideas and lexicon of black internationalism. Her contemporaries-most notably Martinican writer Aimé Césaire and Senegalese poet and politician Léopold Senghor-gained global fame for their redefinition of black colonial subjectivity through what is now known as the Negritude movement. Moreover, they created a \"conspicuously masculine genealogy of their critical consciousness\" that credited black American Harlem Renaissance writers and intellectuals such as Langston Hughes, Claude McKay, and W. E. B. Du Bois as the movement's intellectual progenitors. 3 Despite her","publication_name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","grobid_abstract_attachment_id":89326518},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231054/Edge_Orchestration_Based_Computation_Peer_Offloading_in_MEC_Enabled_Networks_A_Fuzzy_Logic_Approach","translated_internal_url":"","created_at":"2022-08-06T08:22:46.922-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326518,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326518/thumbnails/1.jpg","file_name":"S1479244321000081.pdf","download_url":"https://www.academia.edu/attachments/89326518/download_file?st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Edge_Orchestration_Based_Computation_Pee.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326518/S1479244321000081-libre.pdf?1659800607=\u0026response-content-disposition=attachment%3B+filename%3DEdge_Orchestration_Based_Computation_Pee.pdf\u0026Expires=1732825483\u0026Signature=bdbcgd38sgWuVQrynTeKiwizafdF8Ih5WCAeHaFMNYpInCo5ix8oQ2-nO78ZqFMtWF73GhR~l3n0dzwYRA~JwTwwRfaFb2JVjXvnrII9HHUvATdyFCtCAQa9RxCBMVx9gIUK6piUF0a~KF-cxQtxjXAGrwY0GQLS2XGNuO1rrqOf4QBlmNA5-CPmbeaDrDMpoxiVkc2F9R7Fow~9rggtx9~flNyz8HgIjUfO6Ib8CG8Mv4WzBNXdrRxa-P7PZdC5anMwaYBSW4wSQgVjj1O0f5STQxUdWMpvQK-y7XCLkVPZUG5x-CHoGdZWLJpITj43rsMRNZDfSszexEIXWz8GhA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Edge_Orchestration_Based_Computation_Peer_Offloading_in_MEC_Enabled_Networks_A_Fuzzy_Logic_Approach","translated_slug":"","page_count":13,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326518,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326518/thumbnails/1.jpg","file_name":"S1479244321000081.pdf","download_url":"https://www.academia.edu/attachments/89326518/download_file?st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Edge_Orchestration_Based_Computation_Pee.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326518/S1479244321000081-libre.pdf?1659800607=\u0026response-content-disposition=attachment%3B+filename%3DEdge_Orchestration_Based_Computation_Pee.pdf\u0026Expires=1732825483\u0026Signature=bdbcgd38sgWuVQrynTeKiwizafdF8Ih5WCAeHaFMNYpInCo5ix8oQ2-nO78ZqFMtWF73GhR~l3n0dzwYRA~JwTwwRfaFb2JVjXvnrII9HHUvATdyFCtCAQa9RxCBMVx9gIUK6piUF0a~KF-cxQtxjXAGrwY0GQLS2XGNuO1rrqOf4QBlmNA5-CPmbeaDrDMpoxiVkc2F9R7Fow~9rggtx9~flNyz8HgIjUfO6Ib8CG8Mv4WzBNXdrRxa-P7PZdC5anMwaYBSW4wSQgVjj1O0f5STQxUdWMpvQK-y7XCLkVPZUG5x-CHoGdZWLJpITj43rsMRNZDfSszexEIXWz8GhA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":22675102,"url":"http://xplorestaging.ieee.org/ielx7/9377321/9377322/09377327.pdf?arnumber=9377327"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231053"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231053/Dynamic_Task_Offloading_for_Cloud_Assisted_Vehicular_Edge_Computing_Networks_A_Non_Cooperative_Game_Theoretic_Approach"><img alt="Research paper thumbnail of Dynamic Task Offloading for Cloud-Assisted Vehicular Edge Computing Networks: A Non-Cooperative Game Theoretic Approach" class="work-thumbnail" src="https://attachments.academia-assets.com/89326500/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231053/Dynamic_Task_Offloading_for_Cloud_Assisted_Vehicular_Edge_Computing_Networks_A_Non_Cooperative_Game_Theoretic_Approach">Dynamic Task Offloading for Cloud-Assisted Vehicular Edge Computing Networks: A Non-Cooperative Game Theoretic Approach</a></div><div class="wp-workCard_item"><span>Sensors</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Vehicular edge computing (VEC) is one of the prominent ideas to enhance the computation and stora...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Vehicular edge computing (VEC) is one of the prominent ideas to enhance the computation and storage capabilities of vehicular networks (VNs) through task offloading. In VEC, the resource-constrained vehicles offload their computing tasks to the local road-side units (RSUs) for rapid computation. However, due to the high mobility of vehicles and the overloaded problem, VEC experiences a great deal of challenges when determining a location for processing the offloaded task in real time. As a result, this degrades the quality of vehicular performance. Therefore, to deal with these above-mentioned challenges, an efficient dynamic task offloading approach based on a non-cooperative game (NGTO) is proposed in this study. In the NGTO approach, each vehicle can make its own strategy on whether a task is offloaded to a multi-access edge computing (MEC) server or a cloud server to maximize its benefits. Our proposed strategy can dynamically adjust the task-offloading probability to acquire th...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f45ade83c9ef3864d0e0e643054810b1" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326500,&quot;asset_id&quot;:84231053,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326500/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231053"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231053"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231053; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231053]").text(description); $(".js-view-count[data-work-id=84231053]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231053; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231053']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231053, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f45ade83c9ef3864d0e0e643054810b1" } } $('.js-work-strip[data-work-id=84231053]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231053,"title":"Dynamic Task Offloading for Cloud-Assisted Vehicular Edge Computing Networks: A Non-Cooperative Game Theoretic Approach","translated_title":"","metadata":{"abstract":"Vehicular edge computing (VEC) is one of the prominent ideas to enhance the computation and storage capabilities of vehicular networks (VNs) through task offloading. In VEC, the resource-constrained vehicles offload their computing tasks to the local road-side units (RSUs) for rapid computation. However, due to the high mobility of vehicles and the overloaded problem, VEC experiences a great deal of challenges when determining a location for processing the offloaded task in real time. As a result, this degrades the quality of vehicular performance. Therefore, to deal with these above-mentioned challenges, an efficient dynamic task offloading approach based on a non-cooperative game (NGTO) is proposed in this study. In the NGTO approach, each vehicle can make its own strategy on whether a task is offloaded to a multi-access edge computing (MEC) server or a cloud server to maximize its benefits. Our proposed strategy can dynamically adjust the task-offloading probability to acquire th...","publisher":"MDPI AG","publication_name":"Sensors"},"translated_abstract":"Vehicular edge computing (VEC) is one of the prominent ideas to enhance the computation and storage capabilities of vehicular networks (VNs) through task offloading. In VEC, the resource-constrained vehicles offload their computing tasks to the local road-side units (RSUs) for rapid computation. However, due to the high mobility of vehicles and the overloaded problem, VEC experiences a great deal of challenges when determining a location for processing the offloaded task in real time. As a result, this degrades the quality of vehicular performance. Therefore, to deal with these above-mentioned challenges, an efficient dynamic task offloading approach based on a non-cooperative game (NGTO) is proposed in this study. In the NGTO approach, each vehicle can make its own strategy on whether a task is offloaded to a multi-access edge computing (MEC) server or a cloud server to maximize its benefits. Our proposed strategy can dynamically adjust the task-offloading probability to acquire th...","internal_url":"https://www.academia.edu/84231053/Dynamic_Task_Offloading_for_Cloud_Assisted_Vehicular_Edge_Computing_Networks_A_Non_Cooperative_Game_Theoretic_Approach","translated_internal_url":"","created_at":"2022-08-06T08:22:46.733-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326500,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326500/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326500/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Dynamic_Task_Offloading_for_Cloud_Assist.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326500/pdf-libre.pdf?1659800640=\u0026response-content-disposition=attachment%3B+filename%3DDynamic_Task_Offloading_for_Cloud_Assist.pdf\u0026Expires=1732825483\u0026Signature=a33Zye2C9n~l4NBQE26KfWZu-RhpIE8ouTtoDMW-3PLaEusTYPlpvZclXUJXtx4UTaKhjumK-W~lHlHVEt21ZUXXfyfr2Dm5vcGLF-FmDYg8picRDG7HyS1B8yRL~en0xVVnLoEwdK4DVFsfNzzWSaq8uWCbv3Tgiqqa2fN-Ap62njSWBy25Gvci1qmPebsSNWlkCl1i3me8JXAOf-Vysuii7UTKPw9BwPGlRsCP4vH69Q41gjkSLrFL7m287xqPfXbrva8YExoBfhsTRLvms5q9AUPfoRvsKecVEjX4JjyvRiFJH~SoJfkwOUqJ~Rrb3rCEfUwnjz9vwfTyL08ezQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Dynamic_Task_Offloading_for_Cloud_Assisted_Vehicular_Edge_Computing_Networks_A_Non_Cooperative_Game_Theoretic_Approach","translated_slug":"","page_count":18,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326500,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326500/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326500/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Dynamic_Task_Offloading_for_Cloud_Assist.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326500/pdf-libre.pdf?1659800640=\u0026response-content-disposition=attachment%3B+filename%3DDynamic_Task_Offloading_for_Cloud_Assist.pdf\u0026Expires=1732825483\u0026Signature=a33Zye2C9n~l4NBQE26KfWZu-RhpIE8ouTtoDMW-3PLaEusTYPlpvZclXUJXtx4UTaKhjumK-W~lHlHVEt21ZUXXfyfr2Dm5vcGLF-FmDYg8picRDG7HyS1B8yRL~en0xVVnLoEwdK4DVFsfNzzWSaq8uWCbv3Tgiqqa2fN-Ap62njSWBy25Gvci1qmPebsSNWlkCl1i3me8JXAOf-Vysuii7UTKPw9BwPGlRsCP4vH69Q41gjkSLrFL7m287xqPfXbrva8YExoBfhsTRLvms5q9AUPfoRvsKecVEjX4JjyvRiFJH~SoJfkwOUqJ~Rrb3rCEfUwnjz9vwfTyL08ezQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":22675101,"url":"https://www.mdpi.com/1424-8220/22/10/3678/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231052"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231052/Game_Theory_Based_Dynamic_Computation_Offloading_in_MEC_Enabled_Vehicular_Networks"><img alt="Research paper thumbnail of Game Theory Based Dynamic Computation Offloading in MEC-Enabled Vehicular Networks" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231052/Game_Theory_Based_Dynamic_Computation_Offloading_in_MEC_Enabled_Vehicular_Networks">Game Theory Based Dynamic Computation Offloading in MEC-Enabled Vehicular Networks</a></div><div class="wp-workCard_item"><span>KIISE Transactions on Computing Practices</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231052"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231052"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231052; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231052]").text(description); $(".js-view-count[data-work-id=84231052]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231052; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231052']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231052, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231052]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231052,"title":"Game Theory Based Dynamic Computation Offloading in MEC-Enabled Vehicular Networks","translated_title":"","metadata":{"publisher":"Korean Institute of Information Scientists and Engineers","publication_name":"KIISE Transactions on Computing Practices"},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231052/Game_Theory_Based_Dynamic_Computation_Offloading_in_MEC_Enabled_Vehicular_Networks","translated_internal_url":"","created_at":"2022-08-06T08:22:46.625-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Game_Theory_Based_Dynamic_Computation_Offloading_in_MEC_Enabled_Vehicular_Networks","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":59487,"name":"Computation","url":"https://www.academia.edu/Documents/in/Computation"},{"id":3731186,"name":"Computation offloading ","url":"https://www.academia.edu/Documents/in/Computation_offloading"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231051"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231051/gRDF_An_Efficient_Compressor_with_Reduced_Structural_Regularities_That_Utilizes_gRePair"><img alt="Research paper thumbnail of gRDF: An Efficient Compressor with Reduced Structural Regularities That Utilizes gRePair" class="work-thumbnail" src="https://attachments.academia-assets.com/89326507/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231051/gRDF_An_Efficient_Compressor_with_Reduced_Structural_Regularities_That_Utilizes_gRePair">gRDF: An Efficient Compressor with Reduced Structural Regularities That Utilizes gRePair</a></div><div class="wp-workCard_item"><span>Sensors</span><span>, 2022</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The explosive volume of semantic data published in the Resource Description Framework (RDF) data ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The explosive volume of semantic data published in the Resource Description Framework (RDF) data model demands efficient management and compression with better compression ratio and runtime. Although extensive work has been carried out for compressing the RDF datasets, they do not perform well in all dimensions. However, these compressors rarely exploit the graph patterns and structural regularities of real-world datasets. Moreover, there are a variety of existing approaches that reduce the size of a graph by using a grammar-based graph compression algorithm. In this study, we introduce a novel approach named gRDF (graph repair for RDF) that uses gRePair, one of the most efficient grammar-based graph compression schemes, to compress the RDF dataset. In addition to that, we have improved the performance of HDT (header-dictionary-triple), an efficient approach for compressing the RDF datasets based on structural properties, by introducing modified HDT (M-HDT). It can detect the freque...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="18560b7c84b84ea7e3318e42cbccf083" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326507,&quot;asset_id&quot;:84231051,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326507/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231051"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231051"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231051; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231051]").text(description); $(".js-view-count[data-work-id=84231051]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231051; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231051']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231051, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "18560b7c84b84ea7e3318e42cbccf083" } } $('.js-work-strip[data-work-id=84231051]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231051,"title":"gRDF: An Efficient Compressor with Reduced Structural Regularities That Utilizes gRePair","translated_title":"","metadata":{"abstract":"The explosive volume of semantic data published in the Resource Description Framework (RDF) data model demands efficient management and compression with better compression ratio and runtime. Although extensive work has been carried out for compressing the RDF datasets, they do not perform well in all dimensions. However, these compressors rarely exploit the graph patterns and structural regularities of real-world datasets. Moreover, there are a variety of existing approaches that reduce the size of a graph by using a grammar-based graph compression algorithm. In this study, we introduce a novel approach named gRDF (graph repair for RDF) that uses gRePair, one of the most efficient grammar-based graph compression schemes, to compress the RDF dataset. In addition to that, we have improved the performance of HDT (header-dictionary-triple), an efficient approach for compressing the RDF datasets based on structural properties, by introducing modified HDT (M-HDT). It can detect the freque...","publisher":"MDPI AG","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Sensors"},"translated_abstract":"The explosive volume of semantic data published in the Resource Description Framework (RDF) data model demands efficient management and compression with better compression ratio and runtime. Although extensive work has been carried out for compressing the RDF datasets, they do not perform well in all dimensions. However, these compressors rarely exploit the graph patterns and structural regularities of real-world datasets. Moreover, there are a variety of existing approaches that reduce the size of a graph by using a grammar-based graph compression algorithm. In this study, we introduce a novel approach named gRDF (graph repair for RDF) that uses gRePair, one of the most efficient grammar-based graph compression schemes, to compress the RDF dataset. In addition to that, we have improved the performance of HDT (header-dictionary-triple), an efficient approach for compressing the RDF datasets based on structural properties, by introducing modified HDT (M-HDT). It can detect the freque...","internal_url":"https://www.academia.edu/84231051/gRDF_An_Efficient_Compressor_with_Reduced_Structural_Regularities_That_Utilizes_gRePair","translated_internal_url":"","created_at":"2022-08-06T08:22:46.466-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326507,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326507/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326507/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"gRDF_An_Efficient_Compressor_with_Reduce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326507/pdf-libre.pdf?1659800625=\u0026response-content-disposition=attachment%3B+filename%3DgRDF_An_Efficient_Compressor_with_Reduce.pdf\u0026Expires=1732825484\u0026Signature=E1F-cwtpGbeV~1V7KG43sCXZiKP4cIN88Y~8MjqEWAIFnJk4Xu3vqCqoNU1gebpKCZ7n8~bqdW8Pzk4nnRmvVlZYvZLTLAi85YIkP8HmuwpgfMjzZbsWxF1sBhGjHIEMsI02kF3a97BfAe38QDHGFPapR9C8X5WvLQVGIJu-PtHrSGfWCJBRYNR3pHPlQlOxR9pZxPxn0xcL-7XF4Uvg124PvPL4VvJZOAgUZrxV7Qca47qFwmaNcW0OdoENuOWKZLIc7jpcL4GEsLhdK3AWm9o6UZgU1iOBV0Yp587icPQH5k1LrDA8NGakpYuVyQeMlaXERx-VToA~OTSWGMhqrw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"gRDF_An_Efficient_Compressor_with_Reduced_Structural_Regularities_That_Utilizes_gRePair","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326507,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326507/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326507/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"gRDF_An_Efficient_Compressor_with_Reduce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326507/pdf-libre.pdf?1659800625=\u0026response-content-disposition=attachment%3B+filename%3DgRDF_An_Efficient_Compressor_with_Reduce.pdf\u0026Expires=1732825484\u0026Signature=E1F-cwtpGbeV~1V7KG43sCXZiKP4cIN88Y~8MjqEWAIFnJk4Xu3vqCqoNU1gebpKCZ7n8~bqdW8Pzk4nnRmvVlZYvZLTLAi85YIkP8HmuwpgfMjzZbsWxF1sBhGjHIEMsI02kF3a97BfAe38QDHGFPapR9C8X5WvLQVGIJu-PtHrSGfWCJBRYNR3pHPlQlOxR9pZxPxn0xcL-7XF4Uvg124PvPL4VvJZOAgUZrxV7Qca47qFwmaNcW0OdoENuOWKZLIc7jpcL4GEsLhdK3AWm9o6UZgU1iOBV0Yp587icPQH5k1LrDA8NGakpYuVyQeMlaXERx-VToA~OTSWGMhqrw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":89326509,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326509/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326509/download_file","bulk_download_file_name":"gRDF_An_Efficient_Compressor_with_Reduce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326509/pdf-libre.pdf?1659800626=\u0026response-content-disposition=attachment%3B+filename%3DgRDF_An_Efficient_Compressor_with_Reduce.pdf\u0026Expires=1732825484\u0026Signature=UBIIysPyHEfB3ZLV8fVF1LLr8EwwCNAMN5KrXlDRsVbStj2wX2Pn82UrLWnJs9Zx5tW7Flync84fW25nukoSi0Xuh3rp~HZEyRV7X9YJORyWPw78Y6Dv1WJsXB917hqf7Zi2rmBomEQ-IXhVPQM21DIM7MzjRtjn4WJk9fTrB2Au9uxPAme33EF1-44TKH8UCGdmLdWeyQhFd4uA4SPB02Oz4sB13wBwaAB4I7xbqL19AuPhzrgF5v16-tPxFQkPENPOIwCBqag8JDwRctx2wEG9M-v4yQwuAW6KF7QJnft49jLvroAnVZOHL8zDum2xadgARPT8jBFyajxnTykxlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":100652,"name":"RDF","url":"https://www.academia.edu/Documents/in/RDF"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":22675100,"url":"https://www.mdpi.com/1424-8220/22/7/2545/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231050"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231050/Efficient_Approach_for_Encoding_and_Compression_of_RDF_Knowledge_Bases"><img alt="Research paper thumbnail of Efficient Approach for Encoding and Compression of RDF Knowledge Bases" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231050/Efficient_Approach_for_Encoding_and_Compression_of_RDF_Knowledge_Bases">Efficient Approach for Encoding and Compression of RDF Knowledge Bases</a></div><div class="wp-workCard_item"><span>Journal of KIISE</span><span>, 2022</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231050"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231050"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231050; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231050]").text(description); $(".js-view-count[data-work-id=84231050]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231050; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231050']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231050, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231050]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231050,"title":"Efficient Approach for Encoding and Compression of RDF Knowledge Bases","translated_title":"","metadata":{"publisher":"Korean Institute of Information Scientists and Engineers","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Journal of KIISE"},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231050/Efficient_Approach_for_Encoding_and_Compression_of_RDF_Knowledge_Bases","translated_internal_url":"","created_at":"2022-08-06T08:22:46.351-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Efficient_Approach_for_Encoding_and_Compression_of_RDF_Knowledge_Bases","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":464,"name":"Information Retrieval","url":"https://www.academia.edu/Documents/in/Information_Retrieval"},{"id":100652,"name":"RDF","url":"https://www.academia.edu/Documents/in/RDF"},{"id":487495,"name":"SPARQL","url":"https://www.academia.edu/Documents/in/SPARQL"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231049"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231049/Fuzzy_Decision_Based_Efficient_Task_Offloading_Management_Scheme_in_Multi_Tier_MEC_Enabled_Networks"><img alt="Research paper thumbnail of Fuzzy Decision-Based Efficient Task Offloading Management Scheme in Multi-Tier MEC-Enabled Networks" class="work-thumbnail" src="https://attachments.academia-assets.com/89326508/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231049/Fuzzy_Decision_Based_Efficient_Task_Offloading_Management_Scheme_in_Multi_Tier_MEC_Enabled_Networks">Fuzzy Decision-Based Efficient Task Offloading Management Scheme in Multi-Tier MEC-Enabled Networks</a></div><div class="wp-workCard_item"><span>Sensors</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Multi-access edge computing (MEC) is a new leading technology for meeting the demands of key perf...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Multi-access edge computing (MEC) is a new leading technology for meeting the demands of key performance indicators (KPIs) in 5G networks. However, in a rapidly changing dynamic environment, it is hard to find the optimal target server for processing offloaded tasks because we do not know the end users’ demands in advance. Therefore, quality of service (QoS) deteriorates because of increasing task failures and long execution latency from congestion. To reduce latency and avoid task failures from resource-constrained edge servers, vertical offloading between mobile devices with local-edge collaboration or with local edge-remote cloud collaboration have been proposed in previous studies. However, they ignored the nearby edge server in the same tier that has excess computing resources. Therefore, this paper introduces a fuzzy decision-based cloud-MEC collaborative task offloading management system called FTOM, which takes advantage of powerful remote cloud-computing capabilities and ut...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="532d8e25caeea765f7e7f00ee606c59b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326508,&quot;asset_id&quot;:84231049,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326508/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231049"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231049"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231049; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231049]").text(description); $(".js-view-count[data-work-id=84231049]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231049; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231049']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231049, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "532d8e25caeea765f7e7f00ee606c59b" } } $('.js-work-strip[data-work-id=84231049]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231049,"title":"Fuzzy Decision-Based Efficient Task Offloading Management Scheme in Multi-Tier MEC-Enabled Networks","translated_title":"","metadata":{"abstract":"Multi-access edge computing (MEC) is a new leading technology for meeting the demands of key performance indicators (KPIs) in 5G networks. However, in a rapidly changing dynamic environment, it is hard to find the optimal target server for processing offloaded tasks because we do not know the end users’ demands in advance. Therefore, quality of service (QoS) deteriorates because of increasing task failures and long execution latency from congestion. To reduce latency and avoid task failures from resource-constrained edge servers, vertical offloading between mobile devices with local-edge collaboration or with local edge-remote cloud collaboration have been proposed in previous studies. However, they ignored the nearby edge server in the same tier that has excess computing resources. Therefore, this paper introduces a fuzzy decision-based cloud-MEC collaborative task offloading management system called FTOM, which takes advantage of powerful remote cloud-computing capabilities and ut...","publisher":"MDPI AG","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Sensors"},"translated_abstract":"Multi-access edge computing (MEC) is a new leading technology for meeting the demands of key performance indicators (KPIs) in 5G networks. However, in a rapidly changing dynamic environment, it is hard to find the optimal target server for processing offloaded tasks because we do not know the end users’ demands in advance. Therefore, quality of service (QoS) deteriorates because of increasing task failures and long execution latency from congestion. To reduce latency and avoid task failures from resource-constrained edge servers, vertical offloading between mobile devices with local-edge collaboration or with local edge-remote cloud collaboration have been proposed in previous studies. However, they ignored the nearby edge server in the same tier that has excess computing resources. Therefore, this paper introduces a fuzzy decision-based cloud-MEC collaborative task offloading management system called FTOM, which takes advantage of powerful remote cloud-computing capabilities and ut...","internal_url":"https://www.academia.edu/84231049/Fuzzy_Decision_Based_Efficient_Task_Offloading_Management_Scheme_in_Multi_Tier_MEC_Enabled_Networks","translated_internal_url":"","created_at":"2022-08-06T08:22:46.185-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326508,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326508/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326508/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Fuzzy_Decision_Based_Efficient_Task_Offl.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326508/pdf-libre.pdf?1659800621=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Decision_Based_Efficient_Task_Offl.pdf\u0026Expires=1732825484\u0026Signature=X8bY2k307UPYkKPYInoVBO9S~MLvkWjUMUBzsqSJEjSb1DzqNgt4tFX6D935BprMIJ54s~bQMHOt8WkdLEaiRARGPbcMZJReZ36QKG8lpEkasz5hP9ZXrvn0h5jsJP2D8dyFOPFl3IexXVSmS4jGclCmDUnaiAe1tQ5VNNPDsrKM~yxRjQ8d8rum2XdAGJrGttb-k0F~uMNlM1YLrZ630BUF3fQb3J52V1wBZA07cDGv2IqprmAOyeuwJdmxBPAm6-RhhxXfOL0b~d5SLNP2rdOIB02deW2j1atUyWEM8jvqMtA4DZEXFiwGSAeZ2XOQ6g9KIdj5jVoK1k3ziMcYQQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Fuzzy_Decision_Based_Efficient_Task_Offloading_Management_Scheme_in_Multi_Tier_MEC_Enabled_Networks","translated_slug":"","page_count":26,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326508,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326508/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326508/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Fuzzy_Decision_Based_Efficient_Task_Offl.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326508/pdf-libre.pdf?1659800621=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Decision_Based_Efficient_Task_Offl.pdf\u0026Expires=1732825484\u0026Signature=X8bY2k307UPYkKPYInoVBO9S~MLvkWjUMUBzsqSJEjSb1DzqNgt4tFX6D935BprMIJ54s~bQMHOt8WkdLEaiRARGPbcMZJReZ36QKG8lpEkasz5hP9ZXrvn0h5jsJP2D8dyFOPFl3IexXVSmS4jGclCmDUnaiAe1tQ5VNNPDsrKM~yxRjQ8d8rum2XdAGJrGttb-k0F~uMNlM1YLrZ630BUF3fQb3J52V1wBZA07cDGv2IqprmAOyeuwJdmxBPAm6-RhhxXfOL0b~d5SLNP2rdOIB02deW2j1atUyWEM8jvqMtA4DZEXFiwGSAeZ2XOQ6g9KIdj5jVoK1k3ziMcYQQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":22675099,"url":"https://www.mdpi.com/1424-8220/21/4/1484/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231048"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231048/Orchestration_Based_Task_Offloading_for_Mobile_Edge_Computing_in_Small_Cell_Networks"><img alt="Research paper thumbnail of Orchestration-Based Task Offloading for Mobile Edge Computing in Small-Cell Networks" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231048/Orchestration_Based_Task_Offloading_for_Mobile_Edge_Computing_in_Small_Cell_Networks">Orchestration-Based Task Offloading for Mobile Edge Computing in Small-Cell Networks</a></div><div class="wp-workCard_item"><span>Proceedings of International Joint Conference on Computational Intelligence</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">To execute computation-intensive applications and stringent latency-critical tasks at resource co...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">To execute computation-intensive applications and stringent latency-critical tasks at resource constraints smart mobile devices, mobile edge computing (MEC) in small-cell networks is one of the leading thought, where mobile devices will offload their computation-intensive tasks to the adjacent small-cell network for faster processing. Currently, some research work has been done for combining mobile edge computing and small-cell networks together. Existing researches mostly concentrate on the user to small base station (SBS) offloading and improving the radio access performance using optimization, while the computing capability of SBS-MEC server is ignored. In order to acquire superior performance, an efficient orchestration-based task offloading for mobile edge computing in small-cell networks is proposed in this paper where edge orchestrator collects all the information from the neighboring small-cell SBS-MEC server to decide for forwarding the workloads from overloaded SBS-MEC to nearby SBS-MEC with a light workload. Simulation results affirm that orchestration-based task offloading scheme offers the best results not only by reducing the task failure but also with a smaller task completion time compared to other approaches in small-cell networks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231048"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231048"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231048; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231048]").text(description); $(".js-view-count[data-work-id=84231048]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231048; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231048']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231048, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231048]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231048,"title":"Orchestration-Based Task Offloading for Mobile Edge Computing in Small-Cell Networks","translated_title":"","metadata":{"abstract":"To execute computation-intensive applications and stringent latency-critical tasks at resource constraints smart mobile devices, mobile edge computing (MEC) in small-cell networks is one of the leading thought, where mobile devices will offload their computation-intensive tasks to the adjacent small-cell network for faster processing. Currently, some research work has been done for combining mobile edge computing and small-cell networks together. Existing researches mostly concentrate on the user to small base station (SBS) offloading and improving the radio access performance using optimization, while the computing capability of SBS-MEC server is ignored. In order to acquire superior performance, an efficient orchestration-based task offloading for mobile edge computing in small-cell networks is proposed in this paper where edge orchestrator collects all the information from the neighboring small-cell SBS-MEC server to decide for forwarding the workloads from overloaded SBS-MEC to nearby SBS-MEC with a light workload. Simulation results affirm that orchestration-based task offloading scheme offers the best results not only by reducing the task failure but also with a smaller task completion time compared to other approaches in small-cell networks.","publisher":"Springer Singapore","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Proceedings of International Joint Conference on Computational Intelligence"},"translated_abstract":"To execute computation-intensive applications and stringent latency-critical tasks at resource constraints smart mobile devices, mobile edge computing (MEC) in small-cell networks is one of the leading thought, where mobile devices will offload their computation-intensive tasks to the adjacent small-cell network for faster processing. Currently, some research work has been done for combining mobile edge computing and small-cell networks together. Existing researches mostly concentrate on the user to small base station (SBS) offloading and improving the radio access performance using optimization, while the computing capability of SBS-MEC server is ignored. In order to acquire superior performance, an efficient orchestration-based task offloading for mobile edge computing in small-cell networks is proposed in this paper where edge orchestrator collects all the information from the neighboring small-cell SBS-MEC server to decide for forwarding the workloads from overloaded SBS-MEC to nearby SBS-MEC with a light workload. Simulation results affirm that orchestration-based task offloading scheme offers the best results not only by reducing the task failure but also with a smaller task completion time compared to other approaches in small-cell networks.","internal_url":"https://www.academia.edu/84231048/Orchestration_Based_Task_Offloading_for_Mobile_Edge_Computing_in_Small_Cell_Networks","translated_internal_url":"","created_at":"2022-08-06T08:22:46.006-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Orchestration_Based_Task_Offloading_for_Mobile_Edge_Computing_in_Small_Cell_Networks","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":2236574,"name":"Mobile Edge Computing","url":"https://www.academia.edu/Documents/in/Mobile_Edge_Computing"}],"urls":[{"id":22675098,"url":"http://link.springer.com/content/pdf/10.1007/978-981-15-3607-6_50"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231047"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231047/Peak_to_average_power_ratio_reduction_method_for_orthogonal_frequency_division_multiplexing_signals_in_wireless_communication_systems"><img alt="Research paper thumbnail of Peak-to- average power ratio reduction method for orthogonal frequency division multiplexing signals in wireless communication systems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231047/Peak_to_average_power_ratio_reduction_method_for_orthogonal_frequency_division_multiplexing_signals_in_wireless_communication_systems">Peak-to- average power ratio reduction method for orthogonal frequency division multiplexing signals in wireless communication systems</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231047"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231047"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231047; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231047]").text(description); $(".js-view-count[data-work-id=84231047]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231047; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231047']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231047, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231047]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231047,"title":"Peak-to- average power ratio reduction method for orthogonal frequency division multiplexing signals in wireless communication systems","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2015,"errors":{}}},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231047/Peak_to_average_power_ratio_reduction_method_for_orthogonal_frequency_division_multiplexing_signals_in_wireless_communication_systems","translated_internal_url":"","created_at":"2022-08-06T08:22:45.906-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Peak_to_average_power_ratio_reduction_method_for_orthogonal_frequency_division_multiplexing_signals_in_wireless_communication_systems","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1490962,"name":"Orthogonal Frequency Division Multiplexing","url":"https://www.academia.edu/Documents/in/Orthogonal_Frequency_Division_Multiplexing"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231046"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231046/Lane_Departure_Warning_through_Message_and_Alarm_and_Vehicle_Position_Tracking_using_Video_Camera_based_Driver_Assist_System"><img alt="Research paper thumbnail of Lane Departure Warning through Message and Alarm &amp; Vehicle Position Tracking using Video Camera based Driver Assist System" class="work-thumbnail" src="https://attachments.academia-assets.com/89326503/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231046/Lane_Departure_Warning_through_Message_and_Alarm_and_Vehicle_Position_Tracking_using_Video_Camera_based_Driver_Assist_System">Lane Departure Warning through Message and Alarm &amp; Vehicle Position Tracking using Video Camera based Driver Assist System</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In modern competitive era, people are so much desperate to reach their goal in a short time. They...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In modern competitive era, people are so much desperate to reach their goal in a short time. They are not even concerned much about their lives. When these people are driving on road, they have more attention about the time to reach the destination. As a result, they are risking their and others lives on r ad due to driver’s inattention or incompetence or drowsine ss. If driver have an assist system in their vehicle which alert him when he drives car out of lane, then he can sav e himself and others from accident. This paper propos es a video based driver assist system which alerts the d river with audio alarm and visual message about lane departure as well as can track the specific vehicle using license plate extraction. The proposed system uses camera sensor to get the real time input data of ro ad environment which is then passes through the 2D FIR filter and thresholding process. After that Hough transform and Hough line is used to detect lane mar ker and line. Kalman filter is ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="abe3bcde5dc88e8d641feda5eb411f1f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326503,&quot;asset_id&quot;:84231046,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326503/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231046"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231046"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231046; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231046]").text(description); $(".js-view-count[data-work-id=84231046]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231046; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231046']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231046, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "abe3bcde5dc88e8d641feda5eb411f1f" } } $('.js-work-strip[data-work-id=84231046]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231046,"title":"Lane Departure Warning through Message and Alarm \u0026 Vehicle Position Tracking using Video Camera based Driver Assist System","translated_title":"","metadata":{"abstract":"In modern competitive era, people are so much desperate to reach their goal in a short time. They are not even concerned much about their lives. When these people are driving on road, they have more attention about the time to reach the destination. As a result, they are risking their and others lives on r ad due to driver’s inattention or incompetence or drowsine ss. If driver have an assist system in their vehicle which alert him when he drives car out of lane, then he can sav e himself and others from accident. This paper propos es a video based driver assist system which alerts the d river with audio alarm and visual message about lane departure as well as can track the specific vehicle using license plate extraction. The proposed system uses camera sensor to get the real time input data of ro ad environment which is then passes through the 2D FIR filter and thresholding process. After that Hough transform and Hough line is used to detect lane mar ker and line. Kalman filter is ...","publication_date":{"day":null,"month":null,"year":2016,"errors":{}}},"translated_abstract":"In modern competitive era, people are so much desperate to reach their goal in a short time. They are not even concerned much about their lives. When these people are driving on road, they have more attention about the time to reach the destination. As a result, they are risking their and others lives on r ad due to driver’s inattention or incompetence or drowsine ss. If driver have an assist system in their vehicle which alert him when he drives car out of lane, then he can sav e himself and others from accident. This paper propos es a video based driver assist system which alerts the d river with audio alarm and visual message about lane departure as well as can track the specific vehicle using license plate extraction. The proposed system uses camera sensor to get the real time input data of ro ad environment which is then passes through the 2D FIR filter and thresholding process. After that Hough transform and Hough line is used to detect lane mar ker and line. Kalman filter is ...","internal_url":"https://www.academia.edu/84231046/Lane_Departure_Warning_through_Message_and_Alarm_and_Vehicle_Position_Tracking_using_Video_Camera_based_Driver_Assist_System","translated_internal_url":"","created_at":"2022-08-06T08:22:45.739-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326503,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326503/thumbnails/1.jpg","file_name":"28_20IJAEMS-JUN-2016-79-Lane_20Departure_20Warning_20through_20Message_20and_20Alarm_20__20Vehicle_20Position_20Tracking_20using_20Video.pdf","download_url":"https://www.academia.edu/attachments/89326503/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Lane_Departure_Warning_through_Message_a.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326503/28_20IJAEMS-JUN-2016-79-Lane_20Departure_20Warning_20through_20Message_20and_20Alarm_20__20Vehicle_20Position_20Tracking_20using_20Video-libre.pdf?1659800610=\u0026response-content-disposition=attachment%3B+filename%3DLane_Departure_Warning_through_Message_a.pdf\u0026Expires=1732825484\u0026Signature=Nj~l3uHmWvBJJ5XPhJSi74EWSKTa1Hj~AZ9G-g5-IeasSFKasrfDMgI8uQmi275Uf995GfU~ck47amTWPeuCdPp-Ch4yq-3BetU29MLeNVOi1zRxU4Dq5l7Ez3SMtAjYn3dO8yCeSzWIPCHlrWuQYfpSW5NbQOLHsK5HIffKX6aQzfOHWvlJ68i1bSN5W-5Mp2pqhphrI~utFvaHCI0vgjZsY3Kb8EBEc7wZXtEP2oNFP4HY-FFNg8XWOU6TJVcN28X~z5uZ~TBQv5Voyg2bzzf-K3YRQO7R6qlbBY62UjZvFcSIIJSIvQn5~b24dV3OgLzhSc12aZV9XmFpz3ovuw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Lane_Departure_Warning_through_Message_and_Alarm_and_Vehicle_Position_Tracking_using_Video_Camera_based_Driver_Assist_System","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326503,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326503/thumbnails/1.jpg","file_name":"28_20IJAEMS-JUN-2016-79-Lane_20Departure_20Warning_20through_20Message_20and_20Alarm_20__20Vehicle_20Position_20Tracking_20using_20Video.pdf","download_url":"https://www.academia.edu/attachments/89326503/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Lane_Departure_Warning_through_Message_a.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326503/28_20IJAEMS-JUN-2016-79-Lane_20Departure_20Warning_20through_20Message_20and_20Alarm_20__20Vehicle_20Position_20Tracking_20using_20Video-libre.pdf?1659800610=\u0026response-content-disposition=attachment%3B+filename%3DLane_Departure_Warning_through_Message_a.pdf\u0026Expires=1732825484\u0026Signature=Nj~l3uHmWvBJJ5XPhJSi74EWSKTa1Hj~AZ9G-g5-IeasSFKasrfDMgI8uQmi275Uf995GfU~ck47amTWPeuCdPp-Ch4yq-3BetU29MLeNVOi1zRxU4Dq5l7Ez3SMtAjYn3dO8yCeSzWIPCHlrWuQYfpSW5NbQOLHsK5HIffKX6aQzfOHWvlJ68i1bSN5W-5Mp2pqhphrI~utFvaHCI0vgjZsY3Kb8EBEc7wZXtEP2oNFP4HY-FFNg8XWOU6TJVcN28X~z5uZ~TBQv5Voyg2bzzf-K3YRQO7R6qlbBY62UjZvFcSIIJSIvQn5~b24dV3OgLzhSc12aZV9XmFpz3ovuw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":22675097,"url":"https://ijaems.com/upload_images/issue_files/28%20IJAEMS-JUN-2016-79-Lane%20Departure%20Warning%20through%20Message%20and%20Alarm%20\u0026%20Vehicle%20Position%20Tracking%20using%20Video%20Camera%20based%20Driver%20Assist%20System.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231045"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231045/Online_Garments_Inventory_Management_System"><img alt="Research paper thumbnail of Online Garments Inventory Management System" class="work-thumbnail" src="https://attachments.academia-assets.com/89326504/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231045/Online_Garments_Inventory_Management_System">Online Garments Inventory Management System</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Management Systems are usually designed to enhance the efficiency of handling the information of ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Management Systems are usually designed to enhance the efficiency of handling the information of any system, which is running through an inefficient procedure and is expensive, time consuming, insecure and it needs more manpower. The Online Garments Inventory Management System is a system which makes the working procedure of present manual system of Garments easier and increases its efficiency to a high degree. The main objective of this application is to automate the existing system which is manually maintaining. The whole system is accessed from different terminals of the network. There are three major sectors in this system- employee management, product inventory and raw materials inventory. In the employee management system all information of the employees are stored. In the product inventory system, the invoice and the delivery information is maintained. Raw materials inventory controls the purchase information, shipping information, total materials of stock in the garments. Th...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5e6552e3765578998e84e9e6778697ba" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326504,&quot;asset_id&quot;:84231045,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326504/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231045"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231045"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231045; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231045]").text(description); $(".js-view-count[data-work-id=84231045]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231045; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231045']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231045, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5e6552e3765578998e84e9e6778697ba" } } $('.js-work-strip[data-work-id=84231045]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231045,"title":"Online Garments Inventory Management System","translated_title":"","metadata":{"abstract":"Management Systems are usually designed to enhance the efficiency of handling the information of any system, which is running through an inefficient procedure and is expensive, time consuming, insecure and it needs more manpower. The Online Garments Inventory Management System is a system which makes the working procedure of present manual system of Garments easier and increases its efficiency to a high degree. The main objective of this application is to automate the existing system which is manually maintaining. The whole system is accessed from different terminals of the network. There are three major sectors in this system- employee management, product inventory and raw materials inventory. In the employee management system all information of the employees are stored. In the product inventory system, the invoice and the delivery information is maintained. Raw materials inventory controls the purchase information, shipping information, total materials of stock in the garments. Th...","publication_date":{"day":null,"month":null,"year":2016,"errors":{}}},"translated_abstract":"Management Systems are usually designed to enhance the efficiency of handling the information of any system, which is running through an inefficient procedure and is expensive, time consuming, insecure and it needs more manpower. The Online Garments Inventory Management System is a system which makes the working procedure of present manual system of Garments easier and increases its efficiency to a high degree. The main objective of this application is to automate the existing system which is manually maintaining. The whole system is accessed from different terminals of the network. There are three major sectors in this system- employee management, product inventory and raw materials inventory. In the employee management system all information of the employees are stored. In the product inventory system, the invoice and the delivery information is maintained. Raw materials inventory controls the purchase information, shipping information, total materials of stock in the garments. Th...","internal_url":"https://www.academia.edu/84231045/Online_Garments_Inventory_Management_System","translated_internal_url":"","created_at":"2022-08-06T08:22:45.586-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326504,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326504/thumbnails/1.jpg","file_name":"29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System.pdf","download_url":"https://www.academia.edu/attachments/89326504/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Online_Garments_Inventory_Management_Sys.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326504/29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System-libre.pdf?1659800607=\u0026response-content-disposition=attachment%3B+filename%3DOnline_Garments_Inventory_Management_Sys.pdf\u0026Expires=1732825484\u0026Signature=NpC-3DnA4ondwnt1CM7fmF4lOgfJTN4KQkT7hFYA3mcFyZLqe9qriEyvgRU7scylRTaNo2AxH4RPmSDZeqMl34QNufp129damSyskZFN4RhaxqBeKH6dsxnTpGLLbw1wPkdF-PlS~bI~-P2jh2V5I9m9Rg6b9dVL-9U~E5QFvWC1hQzOplQJMnpcBzumdLaANodQ83s1oAZN116BnrD~jBLj37MzAxDaPrDRwxpOlrJyX1UJmn-NpGY2iA5WPD3Z3rbfZGn93NcqAVWB07zEeTp6NCJTczFluTZE1WK3qHamMQyCGWWDSQ62SSzD4ga1QU3LH-5nmMu8Z7hKtYY1ZQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Online_Garments_Inventory_Management_System","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326504,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326504/thumbnails/1.jpg","file_name":"29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System.pdf","download_url":"https://www.academia.edu/attachments/89326504/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Online_Garments_Inventory_Management_Sys.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326504/29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System-libre.pdf?1659800607=\u0026response-content-disposition=attachment%3B+filename%3DOnline_Garments_Inventory_Management_Sys.pdf\u0026Expires=1732825484\u0026Signature=NpC-3DnA4ondwnt1CM7fmF4lOgfJTN4KQkT7hFYA3mcFyZLqe9qriEyvgRU7scylRTaNo2AxH4RPmSDZeqMl34QNufp129damSyskZFN4RhaxqBeKH6dsxnTpGLLbw1wPkdF-PlS~bI~-P2jh2V5I9m9Rg6b9dVL-9U~E5QFvWC1hQzOplQJMnpcBzumdLaANodQ83s1oAZN116BnrD~jBLj37MzAxDaPrDRwxpOlrJyX1UJmn-NpGY2iA5WPD3Z3rbfZGn93NcqAVWB07zEeTp6NCJTczFluTZE1WK3qHamMQyCGWWDSQ62SSzD4ga1QU3LH-5nmMu8Z7hKtYY1ZQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":89326501,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326501/thumbnails/1.jpg","file_name":"29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System.pdf","download_url":"https://www.academia.edu/attachments/89326501/download_file","bulk_download_file_name":"Online_Garments_Inventory_Management_Sys.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326501/29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System-libre.pdf?1659800608=\u0026response-content-disposition=attachment%3B+filename%3DOnline_Garments_Inventory_Management_Sys.pdf\u0026Expires=1732825484\u0026Signature=Qu1G2uZTQobqa~wLqhl2kbLWJIcC~Vke~LiqH-rvJItZtcaTMcEZ44c0IkMk30WTZ-rJLvufub7j7O987Z3dwxaNR8li5jxSMsUDpYZs08yWTtkjyc1~RNaQd0BlMZyOwuaV8hNdP-O63ogYHMTkYkn99h5544DodFJV378e~~U5W552afUtNKSyb55LnTpxtR~mhuEDuqxTbfDMwGC9RRDjwCKcQzX58yjBnRcH6R97JD0AETuWoydK--F0ecHe1R06vPcGjdPsP8gGyh-YgdkU8PL71plq61NMZRT-eaS3O3y5eJJ5oT9chSTR1Rc3hBxgxOZbF2mOdYM2tvQQvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":449,"name":"Software Engineering","url":"https://www.academia.edu/Documents/in/Software_Engineering"},{"id":117212,"name":"Inventory Management","url":"https://www.academia.edu/Documents/in/Inventory_Management"}],"urls":[{"id":22675096,"url":"https://ijaems.com/upload_images/issue_files/29%20IJAEMS-JUN-2016-88-Online%20Garments%20Inventory%20Management%20System.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231044"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231044/A_New_Approach_for_Efficient_Face_Detection_Using_BPV_Algorithm_Based_on_Mathematical_Modeling"><img alt="Research paper thumbnail of A New Approach for Efficient Face Detection Using BPV Algorithm Based on Mathematical Modeling" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231044/A_New_Approach_for_Efficient_Face_Detection_Using_BPV_Algorithm_Based_on_Mathematical_Modeling">A New Approach for Efficient Face Detection Using BPV Algorithm Based on Mathematical Modeling</a></div><div class="wp-workCard_item"><span>Proceedings of International Joint Conference on Computational Intelligence</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In this paper several face detection algorithms are compared on the basis of mathematical analysi...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In this paper several face detection algorithms are compared on the basis of mathematical analysis to find out the most efficient algorithm. At first the mathematical model of different face detection algorithms (Camshift, AdaBoost, LBP and Viola Jones algorithms) are analyzed and compared to find out the most efficient one. Mathematical results show that Viola Jones performs best result to detect the face. But in case of Viola Jones, integral image integrates the non-face region pixels with face region pixels as a result, the pixel value redundancy is occurred which degrades its efficiency. To overcome this problem, a new face detection algorithm is proposed in this paper which is named as Break Point Value (BPV) algorithm. The mathematical model of our proposed method is derived where integral images are compared with Local Binary Pattern (LBP) and the compared value is suggested as test value. If the test value is less than or equal to the BPV then the region is a face region and if it is not, the region is a non-face region. Since there is a comparison between integral image value and LBP value of the same pixel region the redundant values are reduced. Furthermore, the use of BPV helps to find out more relevant frames. Thus the proposed method is more efficient face detection process as compared to the previous processes in the field of face detection system.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231044"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231044"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231044; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231044]").text(description); $(".js-view-count[data-work-id=84231044]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231044; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231044']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231044, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231044]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231044,"title":"A New Approach for Efficient Face Detection Using BPV Algorithm Based on Mathematical Modeling","translated_title":"","metadata":{"abstract":"In this paper several face detection algorithms are compared on the basis of mathematical analysis to find out the most efficient algorithm. At first the mathematical model of different face detection algorithms (Camshift, AdaBoost, LBP and Viola Jones algorithms) are analyzed and compared to find out the most efficient one. Mathematical results show that Viola Jones performs best result to detect the face. But in case of Viola Jones, integral image integrates the non-face region pixels with face region pixels as a result, the pixel value redundancy is occurred which degrades its efficiency. To overcome this problem, a new face detection algorithm is proposed in this paper which is named as Break Point Value (BPV) algorithm. The mathematical model of our proposed method is derived where integral images are compared with Local Binary Pattern (LBP) and the compared value is suggested as test value. If the test value is less than or equal to the BPV then the region is a face region and if it is not, the region is a non-face region. Since there is a comparison between integral image value and LBP value of the same pixel region the redundant values are reduced. Furthermore, the use of BPV helps to find out more relevant frames. Thus the proposed method is more efficient face detection process as compared to the previous processes in the field of face detection system.","publisher":"Springer Singapore","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Proceedings of International Joint Conference on Computational Intelligence"},"translated_abstract":"In this paper several face detection algorithms are compared on the basis of mathematical analysis to find out the most efficient algorithm. At first the mathematical model of different face detection algorithms (Camshift, AdaBoost, LBP and Viola Jones algorithms) are analyzed and compared to find out the most efficient one. Mathematical results show that Viola Jones performs best result to detect the face. But in case of Viola Jones, integral image integrates the non-face region pixels with face region pixels as a result, the pixel value redundancy is occurred which degrades its efficiency. To overcome this problem, a new face detection algorithm is proposed in this paper which is named as Break Point Value (BPV) algorithm. The mathematical model of our proposed method is derived where integral images are compared with Local Binary Pattern (LBP) and the compared value is suggested as test value. If the test value is less than or equal to the BPV then the region is a face region and if it is not, the region is a non-face region. Since there is a comparison between integral image value and LBP value of the same pixel region the redundant values are reduced. Furthermore, the use of BPV helps to find out more relevant frames. Thus the proposed method is more efficient face detection process as compared to the previous processes in the field of face detection system.","internal_url":"https://www.academia.edu/84231044/A_New_Approach_for_Efficient_Face_Detection_Using_BPV_Algorithm_Based_on_Mathematical_Modeling","translated_internal_url":"","created_at":"2022-08-06T08:22:45.402-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_New_Approach_for_Efficient_Face_Detection_Using_BPV_Algorithm_Based_on_Mathematical_Modeling","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":26817,"name":"Algorithm","url":"https://www.academia.edu/Documents/in/Algorithm"}],"urls":[{"id":22675095,"url":"http://link.springer.com/content/pdf/10.1007/978-981-13-7564-4_30"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231043"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231043/Collaborative_Task_Offloading_for_Overloaded_Mobile_Edge_Computing_in_Small_Cell_Networks"><img alt="Research paper thumbnail of Collaborative Task Offloading for Overloaded Mobile Edge Computing in Small-Cell Networks" class="work-thumbnail" src="https://attachments.academia-assets.com/89326515/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231043/Collaborative_Task_Offloading_for_Overloaded_Mobile_Edge_Computing_in_Small_Cell_Networks">Collaborative Task Offloading for Overloaded Mobile Edge Computing in Small-Cell Networks</a></div><div class="wp-workCard_item"><span>2020 International Conference on Information Networking (ICOIN)</span><span>, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c4acfd2e233fd20f9c4a1f056a8bdb29" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326515,&quot;asset_id&quot;:84231043,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326515/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231043"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231043"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231043; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231043]").text(description); $(".js-view-count[data-work-id=84231043]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231043; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231043']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231043, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c4acfd2e233fd20f9c4a1f056a8bdb29" } } $('.js-work-strip[data-work-id=84231043]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231043,"title":"Collaborative Task Offloading for Overloaded Mobile Edge Computing in Small-Cell Networks","translated_title":"","metadata":{"publisher":"IEEE","grobid_abstract":"Mobile Edge Computing (MEC) enhances mobile cloud computing capabilities by fetching services close to the edge of the network, which adds 4C (Computing, Communication, Control and Caching) to the edges. MECenabled small cell network is regarded as the key technology in future 5G networks where for rapid task execution, a user offloads their tasks to the nearest small BS (SBS). The research work regarding MEC-enabled small cell network is still in its infancy. Recently, some researchers are trying to integrate MEC with small cell networks (SCNs) while ignoring the unlimited computation resource in a remote cloud and the computational capability of a single SBS-MEC server, which has the limited capacity for handling huge number of user request. To effectively handle latency-sensitive tasks and resources-hungry mobile applications in small-cell networks, two collaborative task offloading schemes of our proposed model is introduced in this paper. Our proposed collaborative model can make decision dynamically where the SBS-MEC server collaborate with mobile devices or remote cloud for executing the computation tasks. The simulation results confirm that collaborative task offloading between mobile with SBS-MEC scheme will reduce the average number of task failure more efficiently than other schemes and the collaborative task offloading between SBS-MEC with cloud scheme will provide lower task execution latency than others in small-cell networks.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"2020 International Conference on Information Networking (ICOIN)","grobid_abstract_attachment_id":89326515},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231043/Collaborative_Task_Offloading_for_Overloaded_Mobile_Edge_Computing_in_Small_Cell_Networks","translated_internal_url":"","created_at":"2022-08-06T08:22:45.197-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326515,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326515/thumbnails/1.jpg","file_name":"Collaborative_20Task_20Offloading_20for_20Overloaded_20Mobile_20Edge_20Computing_20in_20Small-Cell_20Networks.pdf","download_url":"https://www.academia.edu/attachments/89326515/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Collaborative_Task_Offloading_for_Overlo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326515/Collaborative_20Task_20Offloading_20for_20Overloaded_20Mobile_20Edge_20Computing_20in_20Small-Cell_20Networks-libre.pdf?1659800616=\u0026response-content-disposition=attachment%3B+filename%3DCollaborative_Task_Offloading_for_Overlo.pdf\u0026Expires=1732825484\u0026Signature=Bz9NeAe1ysr5p8WT1qWjNRMTr24axK~iDoiW1e4RKLhY0wOK~OMgGeK9-tjZlLiM~1CUt-OKDp7chYib1QHFV2MFCK7swVVeTyAd3nZlf2A9PGPxle1owO25UA-HfOBVjA678XLiBQUPz31wj9qU9ule~tuUHUx~k1e0nCKohJc5jRsMAKwGm6OIWYkCRUnXDBw8VkQzTtPVyI1lS7pgd2e~oNi8X2RQySdO3bVZODhHQ0hQhg2vrTN0J~ybynfDbI2uK2Mk97foulefBwOR7jtSQtoVB59IY4~RlgHj~NzFilEWOXQaPoZ1vY7Oa4SYlZ5JYhXUnxorpxeW0sKxvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Collaborative_Task_Offloading_for_Overloaded_Mobile_Edge_Computing_in_Small_Cell_Networks","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326515,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326515/thumbnails/1.jpg","file_name":"Collaborative_20Task_20Offloading_20for_20Overloaded_20Mobile_20Edge_20Computing_20in_20Small-Cell_20Networks.pdf","download_url":"https://www.academia.edu/attachments/89326515/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Collaborative_Task_Offloading_for_Overlo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326515/Collaborative_20Task_20Offloading_20for_20Overloaded_20Mobile_20Edge_20Computing_20in_20Small-Cell_20Networks-libre.pdf?1659800616=\u0026response-content-disposition=attachment%3B+filename%3DCollaborative_Task_Offloading_for_Overlo.pdf\u0026Expires=1732825484\u0026Signature=Bz9NeAe1ysr5p8WT1qWjNRMTr24axK~iDoiW1e4RKLhY0wOK~OMgGeK9-tjZlLiM~1CUt-OKDp7chYib1QHFV2MFCK7swVVeTyAd3nZlf2A9PGPxle1owO25UA-HfOBVjA678XLiBQUPz31wj9qU9ule~tuUHUx~k1e0nCKohJc5jRsMAKwGm6OIWYkCRUnXDBw8VkQzTtPVyI1lS7pgd2e~oNi8X2RQySdO3bVZODhHQ0hQhg2vrTN0J~ybynfDbI2uK2Mk97foulefBwOR7jtSQtoVB59IY4~RlgHj~NzFilEWOXQaPoZ1vY7Oa4SYlZ5JYhXUnxorpxeW0sKxvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":2236574,"name":"Mobile Edge Computing","url":"https://www.academia.edu/Documents/in/Mobile_Edge_Computing"}],"urls":[{"id":22675094,"url":"http://xplorestaging.ieee.org/ielx7/8999388/9016415/09016452.pdf?arnumber=9016452"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231042"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231042/Efficient_Load_Management_in_Multi_Access_Edge_Computing_Using_Fuzzy_Logic"><img alt="Research paper thumbnail of Efficient Load Management in Multi-Access Edge Computing Using Fuzzy Logic" class="work-thumbnail" src="https://attachments.academia-assets.com/89326514/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231042/Efficient_Load_Management_in_Multi_Access_Edge_Computing_Using_Fuzzy_Logic">Efficient Load Management in Multi-Access Edge Computing Using Fuzzy Logic</a></div><div class="wp-workCard_item"><span>KIISE Transactions on Computing Practices</span><span>, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="4655bc9bdffba6a6470bd6328bb27ea6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326514,&quot;asset_id&quot;:84231042,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326514/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231042"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231042"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231042; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231042]").text(description); $(".js-view-count[data-work-id=84231042]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231042; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231042']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231042, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "4655bc9bdffba6a6470bd6328bb27ea6" } } $('.js-work-strip[data-work-id=84231042]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231042,"title":"Efficient Load Management in Multi-Access Edge Computing Using Fuzzy Logic","translated_title":"","metadata":{"publisher":"Korean Institute of Information Scientists and Engineers","grobid_abstract":"We consider an elliptic problem with unknowns on the boundary of the domain of the elliptic equation and suppose that the right-hand side of this equation is square integrable and that the boundary data are arbitrary (specifically, irregular) distributions. We investigate local (up to the boundary) properties of generalized solutions to the problem in Hilbert distribution spaces that belong to the refined Sobolev scale. These spaces are parametrized with a real number and a function that varies slowly at infinity. The function parameter refines the number order of the space. We prove theorems on local regularity and a local a priori estimate of generalized solutions to the problem under investigation. These theorems are new for Sobolev spaces as well.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"KIISE Transactions on Computing Practices","grobid_abstract_attachment_id":89326514},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231042/Efficient_Load_Management_in_Multi_Access_Edge_Computing_Using_Fuzzy_Logic","translated_internal_url":"","created_at":"2022-08-06T08:22:45.059-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326514,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326514/thumbnails/1.jpg","file_name":"2006.08379.pdf","download_url":"https://www.academia.edu/attachments/89326514/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Efficient_Load_Management_in_Multi_Acces.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326514/2006.08379-libre.pdf?1659800608=\u0026response-content-disposition=attachment%3B+filename%3DEfficient_Load_Management_in_Multi_Acces.pdf\u0026Expires=1732825484\u0026Signature=Cc6lh8abglKJ4IzW6QhFaqFc4nLtdyjhjDipSGNYEwuiZYMQygGzbzhvGNDfOmCKdVqu152aKIbQECYWyvhFcQFK2XNaSxCEVpUdJ6p8E5mW251vXZ1ZZIs7tpzxx0nuWOf9zBMViLLzrBbkPjLOOGzx6P1RLBOxlBofUtnfe6BApbQ40YLlo0nX1LHq5OjUtGZ7iZ~w466x8jjdS3ZFwRv6lRJg7Qq~pFVqylMBEnzwB-8AUzCFNKBvN6fhIXvonPr~q5xrY07FAESheb7q0SuxbrpJgBY84ltDSZYJMIB~Td8JmGdB9JFQ3ny--eWa7cLC22Vs4vaA6Awk15oXSA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Efficient_Load_Management_in_Multi_Access_Edge_Computing_Using_Fuzzy_Logic","translated_slug":"","page_count":15,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326514,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326514/thumbnails/1.jpg","file_name":"2006.08379.pdf","download_url":"https://www.academia.edu/attachments/89326514/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Efficient_Load_Management_in_Multi_Acces.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326514/2006.08379-libre.pdf?1659800608=\u0026response-content-disposition=attachment%3B+filename%3DEfficient_Load_Management_in_Multi_Acces.pdf\u0026Expires=1732825484\u0026Signature=Cc6lh8abglKJ4IzW6QhFaqFc4nLtdyjhjDipSGNYEwuiZYMQygGzbzhvGNDfOmCKdVqu152aKIbQECYWyvhFcQFK2XNaSxCEVpUdJ6p8E5mW251vXZ1ZZIs7tpzxx0nuWOf9zBMViLLzrBbkPjLOOGzx6P1RLBOxlBofUtnfe6BApbQ40YLlo0nX1LHq5OjUtGZ7iZ~w466x8jjdS3ZFwRv6lRJg7Qq~pFVqylMBEnzwB-8AUzCFNKBvN6fhIXvonPr~q5xrY07FAESheb7q0SuxbrpJgBY84ltDSZYJMIB~Td8JmGdB9JFQ3ny--eWa7cLC22Vs4vaA6Awk15oXSA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231041"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231041/Expressive_Rule_Pattern_Based_Compression_with_Ranking_in_Horn_Rules_on_RDF_Style_KB"><img alt="Research paper thumbnail of Expressive Rule Pattern Based Compression with Ranking in Horn Rules on RDF Style KB" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231041/Expressive_Rule_Pattern_Based_Compression_with_Ranking_in_Horn_Rules_on_RDF_Style_KB">Expressive Rule Pattern Based Compression with Ranking in Horn Rules on RDF Style KB</a></div><div class="wp-workCard_item"><span>2021 IEEE International Conference on Big Data and Smart Computing (BigComp)</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">With the increasing growth of linked open datasets published in the RDF format, demands for RDF c...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">With the increasing growth of linked open datasets published in the RDF format, demands for RDF compression has been becoming extremely important. There are a number of structured compression schemes that consider the structural redundancies. A very few researches have done that focuses on compact representation. In this study, we compress the RDF datasets by using different semantic association rules learned from the RDF graphs. From the RDF datasets, our proposed system mines the logically related Horn rules for accomplishing higher compression. The system keeps the triples that match the antecedent part and deletes them while match with the head part of the rules. We have proposed the grammar based pattern system (GBS) to reduce the search space size and faster projection. Moreover, we also have proposed the ranking rules and top-k approach for effectively utilizing all the rules and decreasing the mining time. The experimental result affirms that our proposed system has achieved greater compression compared to the existing RB compression approach.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231041"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231041"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231041; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231041]").text(description); $(".js-view-count[data-work-id=84231041]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231041; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231041']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231041, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231041]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231041,"title":"Expressive Rule Pattern Based Compression with Ranking in Horn Rules on RDF Style KB","translated_title":"","metadata":{"abstract":"With the increasing growth of linked open datasets published in the RDF format, demands for RDF compression has been becoming extremely important. There are a number of structured compression schemes that consider the structural redundancies. A very few researches have done that focuses on compact representation. In this study, we compress the RDF datasets by using different semantic association rules learned from the RDF graphs. From the RDF datasets, our proposed system mines the logically related Horn rules for accomplishing higher compression. The system keeps the triples that match the antecedent part and deletes them while match with the head part of the rules. We have proposed the grammar based pattern system (GBS) to reduce the search space size and faster projection. Moreover, we also have proposed the ranking rules and top-k approach for effectively utilizing all the rules and decreasing the mining time. The experimental result affirms that our proposed system has achieved greater compression compared to the existing RB compression approach.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"2021 IEEE International Conference on Big Data and Smart Computing (BigComp)"},"translated_abstract":"With the increasing growth of linked open datasets published in the RDF format, demands for RDF compression has been becoming extremely important. There are a number of structured compression schemes that consider the structural redundancies. A very few researches have done that focuses on compact representation. In this study, we compress the RDF datasets by using different semantic association rules learned from the RDF graphs. From the RDF datasets, our proposed system mines the logically related Horn rules for accomplishing higher compression. The system keeps the triples that match the antecedent part and deletes them while match with the head part of the rules. We have proposed the grammar based pattern system (GBS) to reduce the search space size and faster projection. Moreover, we also have proposed the ranking rules and top-k approach for effectively utilizing all the rules and decreasing the mining time. The experimental result affirms that our proposed system has achieved greater compression compared to the existing RB compression approach.","internal_url":"https://www.academia.edu/84231041/Expressive_Rule_Pattern_Based_Compression_with_Ranking_in_Horn_Rules_on_RDF_Style_KB","translated_internal_url":"","created_at":"2022-08-06T08:22:44.891-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Expressive_Rule_Pattern_Based_Compression_with_Ranking_in_Horn_Rules_on_RDF_Style_KB","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":22675093,"url":"http://xplorestaging.ieee.org/ielx7/9373068/9373070/09373279.pdf?arnumber=9373279"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231040"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231040/Fuzzy_Based_Collaborative_Task_Offloading_Scheme_in_the_Densely_Deployed_Small_Cell_Networks_with_Multi_Access_Edge_Computing"><img alt="Research paper thumbnail of Fuzzy Based Collaborative Task Offloading Scheme in the Densely Deployed Small-Cell Networks with Multi-Access Edge Computing" class="work-thumbnail" src="https://attachments.academia-assets.com/89326511/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231040/Fuzzy_Based_Collaborative_Task_Offloading_Scheme_in_the_Densely_Deployed_Small_Cell_Networks_with_Multi_Access_Edge_Computing">Fuzzy Based Collaborative Task Offloading Scheme in the Densely Deployed Small-Cell Networks with Multi-Access Edge Computing</a></div><div class="wp-workCard_item"><span>Applied Sciences</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Accelerating the development of the 5G network and Internet of Things (IoT) application, multi-ac...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Accelerating the development of the 5G network and Internet of Things (IoT) application, multi-access edge computing (MEC) in a small-cell network (SCN) is designed to provide computation-intensive and latency-sensitive applications through task offloading. However, without collaboration, the resources of a single MEC server are wasted or sometimes overloaded for different service requests and applications; therefore, it increases the user’s task failure rate and task duration. Meanwhile, the distinct MEC server has faced some challenges to determine where the offloaded task will be processed because the system can hardly predict the demand of end-users in advance. As a result, the quality-of-service (QoS) will be deteriorated because of service interruptions, long execution, and waiting time. To improve the QoS, we propose a novel Fuzzy logic-based collaborative task offloading (FCTO) scheme in MEC-enabled densely deployed small-cell networks. In FCTO, the delay sensitivity of the ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="58f06b893e38870e787b34aedf393ef2" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326511,&quot;asset_id&quot;:84231040,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326511/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231040"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231040"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231040; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231040]").text(description); $(".js-view-count[data-work-id=84231040]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231040; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231040']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231040, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "58f06b893e38870e787b34aedf393ef2" } } $('.js-work-strip[data-work-id=84231040]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231040,"title":"Fuzzy Based Collaborative Task Offloading Scheme in the Densely Deployed Small-Cell Networks with Multi-Access Edge Computing","translated_title":"","metadata":{"abstract":"Accelerating the development of the 5G network and Internet of Things (IoT) application, multi-access edge computing (MEC) in a small-cell network (SCN) is designed to provide computation-intensive and latency-sensitive applications through task offloading. However, without collaboration, the resources of a single MEC server are wasted or sometimes overloaded for different service requests and applications; therefore, it increases the user’s task failure rate and task duration. Meanwhile, the distinct MEC server has faced some challenges to determine where the offloaded task will be processed because the system can hardly predict the demand of end-users in advance. As a result, the quality-of-service (QoS) will be deteriorated because of service interruptions, long execution, and waiting time. To improve the QoS, we propose a novel Fuzzy logic-based collaborative task offloading (FCTO) scheme in MEC-enabled densely deployed small-cell networks. In FCTO, the delay sensitivity of the ...","publisher":"MDPI AG","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Applied Sciences"},"translated_abstract":"Accelerating the development of the 5G network and Internet of Things (IoT) application, multi-access edge computing (MEC) in a small-cell network (SCN) is designed to provide computation-intensive and latency-sensitive applications through task offloading. However, without collaboration, the resources of a single MEC server are wasted or sometimes overloaded for different service requests and applications; therefore, it increases the user’s task failure rate and task duration. Meanwhile, the distinct MEC server has faced some challenges to determine where the offloaded task will be processed because the system can hardly predict the demand of end-users in advance. As a result, the quality-of-service (QoS) will be deteriorated because of service interruptions, long execution, and waiting time. To improve the QoS, we propose a novel Fuzzy logic-based collaborative task offloading (FCTO) scheme in MEC-enabled densely deployed small-cell networks. In FCTO, the delay sensitivity of the ...","internal_url":"https://www.academia.edu/84231040/Fuzzy_Based_Collaborative_Task_Offloading_Scheme_in_the_Densely_Deployed_Small_Cell_Networks_with_Multi_Access_Edge_Computing","translated_internal_url":"","created_at":"2022-08-06T08:22:44.721-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326511,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326511/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326511/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Fuzzy_Based_Collaborative_Task_Offloadin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326511/pdf-libre.pdf?1659800618=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Based_Collaborative_Task_Offloadin.pdf\u0026Expires=1732825484\u0026Signature=BwDl-tRqItx5vZ0L3nxrHP4d2m7UGLULUFQBlN6P7m8UgI6pSm~hzHXRDGo0l2BVPhnj2DNfYdayuC0rVvmkJPNLlcEMx3957fyyGX8skKbCruW0MkpuD6vvKuRWn18HSOP0-u1FZtntIwhHpdDYIiYNUHBVs50bH1exAxHVB~ftpwsogKLIqX2Dlmw43WDFh6gZ-35CW4ObLGw8CDZJygshavNhxmz9R1Jwkj823uyK62iNybeyxjRwHT4N~NXziGQPWunRep-KOiWP86pfaqadMqIUvOk0DkTwtGhES3-8tKCHP8g8BV88LJwfA-Or5inbpNT4vnuh5xqLNZ-rPw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Fuzzy_Based_Collaborative_Task_Offloading_Scheme_in_the_Densely_Deployed_Small_Cell_Networks_with_Multi_Access_Edge_Computing","translated_slug":"","page_count":23,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326511,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326511/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326511/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Fuzzy_Based_Collaborative_Task_Offloadin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326511/pdf-libre.pdf?1659800618=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Based_Collaborative_Task_Offloadin.pdf\u0026Expires=1732825484\u0026Signature=BwDl-tRqItx5vZ0L3nxrHP4d2m7UGLULUFQBlN6P7m8UgI6pSm~hzHXRDGo0l2BVPhnj2DNfYdayuC0rVvmkJPNLlcEMx3957fyyGX8skKbCruW0MkpuD6vvKuRWn18HSOP0-u1FZtntIwhHpdDYIiYNUHBVs50bH1exAxHVB~ftpwsogKLIqX2Dlmw43WDFh6gZ-35CW4ObLGw8CDZJygshavNhxmz9R1Jwkj823uyK62iNybeyxjRwHT4N~NXziGQPWunRep-KOiWP86pfaqadMqIUvOk0DkTwtGhES3-8tKCHP8g8BV88LJwfA-Or5inbpNT4vnuh5xqLNZ-rPw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":89326517,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326517/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326517/download_file","bulk_download_file_name":"Fuzzy_Based_Collaborative_Task_Offloadin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326517/pdf-libre.pdf?1659800626=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Based_Collaborative_Task_Offloadin.pdf\u0026Expires=1732825484\u0026Signature=OBjke0apFj2AJ4RTtrbkBYt5nggkQv1ObY51083Z-3a~qrRZqeNlrI37hgRB8chSXZ-3T7vwq~L7cb9rM~jpWgt8duE1WT3qxon9MDdLBi1aJsl6FFgNEZP4e-5h-B9WiIE~ZLNZk-WhqCVKYXGUPWP~Ixh7jiXx3C94X4~U1CTuK1XnYXOCBLVlV67juKj7Us4bKzJiV4pP5VI0FF4vUqJRuVg5TPyenkTcyZ-H8aFYKosz1KUiy0I5AqOtX355aTdHFIwXjk-iO2ZJBjBfd9iQK7YZrvyYD01mysAzuGOWC~r3bDXankybnUsET1PI6mpUVN66sEnlzrqdJtO~FQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":89326510,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326510/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326510/download_file","bulk_download_file_name":"Fuzzy_Based_Collaborative_Task_Offloadin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326510/pdf-libre.pdf?1659800635=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Based_Collaborative_Task_Offloadin.pdf\u0026Expires=1732825484\u0026Signature=H362OrCMUYygN-pv1hCGnqFhZpg9mbP-vOVpiE97xYb-B4Sxkr8314CB5p8G80mx2CdScSXTfGTN~Uu-MN9DZuonATvVvyfLu~8Awuhh0qqxlAfoLt~MMGkAYYkuRgC0SOcDRW2EvPBGwb0nvTJ5KcXvFcTOEsCevV4BoCuyo~rfZwIwr7tW0u2-CRRrdMOsXs8cxH0~H3u1YS3TbKXsW~CYyckazKxmMyntcn7vVT2p6nuH7IKIEjtow7MrLFgpL3ttQJcCSywymEveFhZYtODtln5hjQWSmk9b-c2V1jcltmjyhMv1Jms-mDwrIRGQJPJDgUSvGPdRXHPmefaN5A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":4165,"name":"Fuzzy Logic","url":"https://www.academia.edu/Documents/in/Fuzzy_Logic"},{"id":159232,"name":"Applied Sciences","url":"https://www.academia.edu/Documents/in/Applied_Sciences"},{"id":1623056,"name":"Small Cell Networks","url":"https://www.academia.edu/Documents/in/Small_Cell_Networks"},{"id":2236574,"name":"Mobile Edge Computing","url":"https://www.academia.edu/Documents/in/Mobile_Edge_Computing"},{"id":2525525,"name":"Edge Computing","url":"https://www.academia.edu/Documents/in/Edge_Computing"}],"urls":[{"id":22675092,"url":"https://www.mdpi.com/2076-3417/10/9/3115/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="15516603" id="papers"><div class="js-work-strip profile--work_container" data-work-id="104663982"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663982/LeL_GNN_Learnable_Edge_Sampling_and_Line_Based_Graph_Neural_Network_for_Link_Prediction"><img alt="Research paper thumbnail of LeL-GNN: Learnable Edge Sampling and Line Based Graph Neural Network for Link Prediction" class="work-thumbnail" src="https://attachments.academia-assets.com/104332122/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663982/LeL_GNN_Learnable_Edge_Sampling_and_Line_Based_Graph_Neural_Network_for_Link_Prediction">LeL-GNN: Learnable Edge Sampling and Line Based Graph Neural Network for Link Prediction</a></div><div class="wp-workCard_item"><span>IEEE Access</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="2d31ab3392f35c858eaf123f30066555" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:104332122,&quot;asset_id&quot;:104663982,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/104332122/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663982"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663982"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663982; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663982]").text(description); $(".js-view-count[data-work-id=104663982]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663982; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663982']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663982, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "2d31ab3392f35c858eaf123f30066555" } } $('.js-work-strip[data-work-id=104663982]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663982,"title":"LeL-GNN: Learnable Edge Sampling and Line Based Graph Neural Network for Link Prediction","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","grobid_abstract":"Graph neural networks lose a lot of their computing power when more network layers are added. As a result, the majority of existing graph neural networks have a shallow depth of learning. Oversmoothing and information loss are two of the key issues that restrict graph neural networks from going deeper. As network depth goes up, the embeddings of all the nodes eventually converge on the same value, which separates output representations from input vectors and causes over-smoothing. Moreover, layers of graph pooling are required in a deep learning model to retrieve specified features for prediction, which results in some degree of information loss. In this research, we present a new and multi-scale approach for overcoming these constraints by using concepts from graph theory, namely learnable edge sampling and line graphs. An edge-sampling mechanism that selects a particular number of edges through a learning parameter before training reduces oversmoothing, and the issue of information loss is alleviated using a line graph technique that converts the original graph into a similar line graph. Our method of edge sampling preserves the core spectral features of the graph without affecting its fundamental structure. Our suggested technique outperforms state-of-the-art models on publicly available datasets of diverse applications while having minimal constraints and great training skills. INDEX TERMS Edge sampling, deep graph neural networks, line graph, link prediction.","publication_name":"IEEE Access","grobid_abstract_attachment_id":104332122},"translated_abstract":null,"internal_url":"https://www.academia.edu/104663982/LeL_GNN_Learnable_Edge_Sampling_and_Line_Based_Graph_Neural_Network_for_Link_Prediction","translated_internal_url":"","created_at":"2023-07-17T10:56:48.639-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":104332122,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332122/thumbnails/1.jpg","file_name":"10144318.pdf","download_url":"https://www.academia.edu/attachments/104332122/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"LeL_GNN_Learnable_Edge_Sampling_and_Line.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332122/10144318-libre.pdf?1689619734=\u0026response-content-disposition=attachment%3B+filename%3DLeL_GNN_Learnable_Edge_Sampling_and_Line.pdf\u0026Expires=1732825483\u0026Signature=CmfS3YcAUdaJl1Pgc72caQM3SDDIhaS0W02eOQbAPTYtW-tPVi8wzcX~0BittZKOWvJC8AES7bhtae1Sk44ptlQfbcSrkc8d1JI1lYRLjyqQj75jYlWjO0eEPhr-qdr4JVCAN3Z~zuPBMTCye5tuvyNwJeos2MhshW26eYVAHG18uBnA~OPhXSpt7RS8OMQYaqExAnfsX-m2mrGcjukLsDUtligVL53SfpFeAVl~QvUO8AyoppWs1LTg8TwQSuNQ91rauhykLVA9CrgjmuVRD-ewG~WQiENv8awglrBbTSPNC6ATCjU3irdzR3oPF3gnqxkRkvVNlXAdgARnxLG1xQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"LeL_GNN_Learnable_Edge_Sampling_and_Line_Based_Graph_Neural_Network_for_Link_Prediction","translated_slug":"","page_count":15,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":104332122,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332122/thumbnails/1.jpg","file_name":"10144318.pdf","download_url":"https://www.academia.edu/attachments/104332122/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"LeL_GNN_Learnable_Edge_Sampling_and_Line.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332122/10144318-libre.pdf?1689619734=\u0026response-content-disposition=attachment%3B+filename%3DLeL_GNN_Learnable_Edge_Sampling_and_Line.pdf\u0026Expires=1732825483\u0026Signature=CmfS3YcAUdaJl1Pgc72caQM3SDDIhaS0W02eOQbAPTYtW-tPVi8wzcX~0BittZKOWvJC8AES7bhtae1Sk44ptlQfbcSrkc8d1JI1lYRLjyqQj75jYlWjO0eEPhr-qdr4JVCAN3Z~zuPBMTCye5tuvyNwJeos2MhshW26eYVAHG18uBnA~OPhXSpt7RS8OMQYaqExAnfsX-m2mrGcjukLsDUtligVL53SfpFeAVl~QvUO8AyoppWs1LTg8TwQSuNQ91rauhykLVA9CrgjmuVRD-ewG~WQiENv8awglrBbTSPNC6ATCjU3irdzR3oPF3gnqxkRkvVNlXAdgARnxLG1xQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":32939408,"url":"http://xplorestaging.ieee.org/ielx7/6287639/10005208/10144318.pdf?arnumber=10144318"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="104663981"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663981/Computation_Offloading_Strategy_Based_on_Multi_armed_Bandit_Learning_in_Microservice_enabled_Vehicular_Edge_Computing_Networks"><img alt="Research paper thumbnail of Computation Offloading Strategy Based on Multi-armed Bandit Learning in Microservice-enabled Vehicular Edge Computing Networks" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663981/Computation_Offloading_Strategy_Based_on_Multi_armed_Bandit_Learning_in_Microservice_enabled_Vehicular_Edge_Computing_Networks">Computation Offloading Strategy Based on Multi-armed Bandit Learning in Microservice-enabled Vehicular Edge Computing Networks</a></div><div class="wp-workCard_item"><span>2023 International Conference on Information Networking (ICOIN)</span><span>, Jan 11, 2023</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663981"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663981"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663981; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663981]").text(description); $(".js-view-count[data-work-id=104663981]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663981; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663981']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663981, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104663981]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663981,"title":"Computation Offloading Strategy Based on Multi-armed Bandit Learning in Microservice-enabled Vehicular Edge Computing Networks","translated_title":"","metadata":{"publication_date":{"day":11,"month":1,"year":2023,"errors":{}},"publication_name":"2023 International Conference on Information Networking (ICOIN)"},"translated_abstract":null,"internal_url":"https://www.academia.edu/104663981/Computation_Offloading_Strategy_Based_on_Multi_armed_Bandit_Learning_in_Microservice_enabled_Vehicular_Edge_Computing_Networks","translated_internal_url":"","created_at":"2023-07-17T10:56:48.464-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Computation_Offloading_Strategy_Based_on_Multi_armed_Bandit_Learning_in_Microservice_enabled_Vehicular_Edge_Computing_Networks","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":440,"name":"Distributed Computing","url":"https://www.academia.edu/Documents/in/Distributed_Computing"},{"id":26860,"name":"Cloud Computing","url":"https://www.academia.edu/Documents/in/Cloud_Computing"},{"id":1729876,"name":"Microservices","url":"https://www.academia.edu/Documents/in/Microservices"},{"id":2236574,"name":"Mobile Edge Computing","url":"https://www.academia.edu/Documents/in/Mobile_Edge_Computing"},{"id":2525525,"name":"Edge Computing","url":"https://www.academia.edu/Documents/in/Edge_Computing"},{"id":3731186,"name":"Computation offloading ","url":"https://www.academia.edu/Documents/in/Computation_offloading"}],"urls":[{"id":32939407,"url":"https://doi.org/10.1109/icoin56518.2023.10048991"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="104663980"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663980/Human_Action_Recognition_A_Taxonomy_Based_Survey_Updates_and_Opportunities"><img alt="Research paper thumbnail of Human Action Recognition: A Taxonomy-Based Survey, Updates, and Opportunities" class="work-thumbnail" src="https://attachments.academia-assets.com/104332123/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663980/Human_Action_Recognition_A_Taxonomy_Based_Survey_Updates_and_Opportunities">Human Action Recognition: A Taxonomy-Based Survey, Updates, and Opportunities</a></div><div class="wp-workCard_item"><span>Sensors</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Human action recognition systems use data collected from a wide range of sensors to accurately id...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Human action recognition systems use data collected from a wide range of sensors to accurately identify and interpret human actions. One of the most challenging issues for computer vision is the automatic and precise identification of human activities. A significant increase in feature learning-based representations for action recognition has emerged in recent years, due to the widespread use of deep learning-based features. This study presents an in-depth analysis of human activity recognition that investigates recent developments in computer vision. Augmented reality, human–computer interaction, cybersecurity, home monitoring, and surveillance cameras are all examples of computer vision applications that often go in conjunction with human action detection. We give a taxonomy-based, rigorous study of human activity recognition techniques, discussing the best ways to acquire human action features, derived using RGB and depth data, as well as the latest research on deep learning and ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e599a702810567a04a41d98a3abcc52f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:104332123,&quot;asset_id&quot;:104663980,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/104332123/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663980"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663980"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663980; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663980]").text(description); $(".js-view-count[data-work-id=104663980]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663980; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663980']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663980, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e599a702810567a04a41d98a3abcc52f" } } $('.js-work-strip[data-work-id=104663980]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663980,"title":"Human Action Recognition: A Taxonomy-Based Survey, Updates, and Opportunities","translated_title":"","metadata":{"abstract":"Human action recognition systems use data collected from a wide range of sensors to accurately identify and interpret human actions. One of the most challenging issues for computer vision is the automatic and precise identification of human activities. A significant increase in feature learning-based representations for action recognition has emerged in recent years, due to the widespread use of deep learning-based features. This study presents an in-depth analysis of human activity recognition that investigates recent developments in computer vision. Augmented reality, human–computer interaction, cybersecurity, home monitoring, and surveillance cameras are all examples of computer vision applications that often go in conjunction with human action detection. We give a taxonomy-based, rigorous study of human activity recognition techniques, discussing the best ways to acquire human action features, derived using RGB and depth data, as well as the latest research on deep learning and ...","publisher":"MDPI AG","publication_name":"Sensors"},"translated_abstract":"Human action recognition systems use data collected from a wide range of sensors to accurately identify and interpret human actions. One of the most challenging issues for computer vision is the automatic and precise identification of human activities. A significant increase in feature learning-based representations for action recognition has emerged in recent years, due to the widespread use of deep learning-based features. This study presents an in-depth analysis of human activity recognition that investigates recent developments in computer vision. Augmented reality, human–computer interaction, cybersecurity, home monitoring, and surveillance cameras are all examples of computer vision applications that often go in conjunction with human action detection. We give a taxonomy-based, rigorous study of human activity recognition techniques, discussing the best ways to acquire human action features, derived using RGB and depth data, as well as the latest research on deep learning and ...","internal_url":"https://www.academia.edu/104663980/Human_Action_Recognition_A_Taxonomy_Based_Survey_Updates_and_Opportunities","translated_internal_url":"","created_at":"2023-07-17T10:56:48.297-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":104332123,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332123/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/104332123/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Human_Action_Recognition_A_Taxonomy_Base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332123/pdf-libre.pdf?1689619723=\u0026response-content-disposition=attachment%3B+filename%3DHuman_Action_Recognition_A_Taxonomy_Base.pdf\u0026Expires=1732825483\u0026Signature=UIMZDZRV8PCq3s6JuZW7fCsXuMY6NQ2bt5-y~4e58OwYCF-W4QQknEp~9PbpBQUN2m2U~yMap1DqHEfKHGScyVKHR-i9j2AMOb-giq6cQcL9tzO2SWar2jtZMXvfsESZJUx0fjqdGSVnco4y-8Yg3n3lxjB47eNTsBFYeARZuOCKaDelPCyOOjStpq3xSpzeGb~uaXUTwgWGMcCD9uBVReimHCPPIx-2GCzAolkajev3hI5~vCeoV5D2xYAOh42vfw3p3gqFbKEEE-0yQ3Rgx6aIv16t-gq8cGmn-h5EC2tK2Oqc9IqqxjAcYav0F21xBUiLoAuL3m1C~5v9vtsf3Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Human_Action_Recognition_A_Taxonomy_Based_Survey_Updates_and_Opportunities","translated_slug":"","page_count":40,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":104332123,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332123/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/104332123/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Human_Action_Recognition_A_Taxonomy_Base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332123/pdf-libre.pdf?1689619723=\u0026response-content-disposition=attachment%3B+filename%3DHuman_Action_Recognition_A_Taxonomy_Base.pdf\u0026Expires=1732825483\u0026Signature=UIMZDZRV8PCq3s6JuZW7fCsXuMY6NQ2bt5-y~4e58OwYCF-W4QQknEp~9PbpBQUN2m2U~yMap1DqHEfKHGScyVKHR-i9j2AMOb-giq6cQcL9tzO2SWar2jtZMXvfsESZJUx0fjqdGSVnco4y-8Yg3n3lxjB47eNTsBFYeARZuOCKaDelPCyOOjStpq3xSpzeGb~uaXUTwgWGMcCD9uBVReimHCPPIx-2GCzAolkajev3hI5~vCeoV5D2xYAOh42vfw3p3gqFbKEEE-0yQ3Rgx6aIv16t-gq8cGmn-h5EC2tK2Oqc9IqqxjAcYav0F21xBUiLoAuL3m1C~5v9vtsf3Q__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":104332124,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/104332124/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/104332124/download_file","bulk_download_file_name":"Human_Action_Recognition_A_Taxonomy_Base.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/104332124/pdf-libre.pdf?1689619722=\u0026response-content-disposition=attachment%3B+filename%3DHuman_Action_Recognition_A_Taxonomy_Base.pdf\u0026Expires=1732825483\u0026Signature=PVRmRVQBQgXYVXi2I3bYBTWbPswW~4mSR14aki6nwccoRygPPcYfVNIJKUb5UYJ42KFrR2m5JbnS4PFHT7rnbGuM~0DyxE1biAuTWXrKy7Q7PwNNMuRQkJ4KRVkNtVn2GoPxI33YLfDfuahRXVjZRLk~izNRAGpvv3jFqUay3O1g3kYgBMr9YvotGAmY27tAVfQMURH389UTgqWY9m-0LH8eM2CheGxRAuxcwmV16gcaE5PkZpSc7j3oqeVd2PEgNpVrOVY0BoDRc30rMael3h30Mg4AhtIbbe3J9POXivq9Qox5VsxkjFqXSJgjnOd~aSTlhJAEcIRr9LkE4TpbuA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction"},{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":90270,"name":"Action Recognition","url":"https://www.academia.edu/Documents/in/Action_Recognition"},{"id":901526,"name":"Action (Physics)","url":"https://www.academia.edu/Documents/in/Action_Physics_"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":32939406,"url":"https://www.mdpi.com/1424-8220/23/4/2182/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="104663979"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663979/%EB%A9%80%ED%8B%B0_%EC%95%A1%EC%84%B8%EC%8A%A4_%EC%97%90%EC%A7%80_%EC%BB%B4%ED%93%A8%ED%8C%85%EC%97%90%EC%84%9C_%ED%8D%BC%EC%A7%80_%EB%A1%9C%EC%A7%81%EC%9D%84_%EC%82%AC%EC%9A%A9%ED%95%9C_%ED%9A%A8%EC%9C%A8%EC%A0%81%EC%9D%B8_%EB%B6%80%ED%95%98_%EA%B4%80%EB%A6%AC_%EA%B8%B0%EB%B2%95"><img alt="Research paper thumbnail of 멀티 액세스 에지 컴퓨팅에서 퍼지 로직을 사용한 효율적인 부하 관리 기법" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663979/%EB%A9%80%ED%8B%B0_%EC%95%A1%EC%84%B8%EC%8A%A4_%EC%97%90%EC%A7%80_%EC%BB%B4%ED%93%A8%ED%8C%85%EC%97%90%EC%84%9C_%ED%8D%BC%EC%A7%80_%EB%A1%9C%EC%A7%81%EC%9D%84_%EC%82%AC%EC%9A%A9%ED%95%9C_%ED%9A%A8%EC%9C%A8%EC%A0%81%EC%9D%B8_%EB%B6%80%ED%95%98_%EA%B4%80%EB%A6%AC_%EA%B8%B0%EB%B2%95">멀티 액세스 에지 컴퓨팅에서 퍼지 로직을 사용한 효율적인 부하 관리 기법</a></div><div class="wp-workCard_item"><span>한국정보과학회</span><span>, Nov 1, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663979"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663979"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663979; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663979]").text(description); $(".js-view-count[data-work-id=104663979]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663979; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663979']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663979, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104663979]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663979,"title":"멀티 액세스 에지 컴퓨팅에서 퍼지 로직을 사용한 효율적인 부하 관리 기법","translated_title":"","metadata":{"publisher":"한국정보과학회","publication_date":{"day":1,"month":11,"year":2020,"errors":{}},"publication_name":"한국정보과학회"},"translated_abstract":null,"internal_url":"https://www.academia.edu/104663979/%EB%A9%80%ED%8B%B0_%EC%95%A1%EC%84%B8%EC%8A%A4_%EC%97%90%EC%A7%80_%EC%BB%B4%ED%93%A8%ED%8C%85%EC%97%90%EC%84%9C_%ED%8D%BC%EC%A7%80_%EB%A1%9C%EC%A7%81%EC%9D%84_%EC%82%AC%EC%9A%A9%ED%95%9C_%ED%9A%A8%EC%9C%A8%EC%A0%81%EC%9D%B8_%EB%B6%80%ED%95%98_%EA%B4%80%EB%A6%AC_%EA%B8%B0%EB%B2%95","translated_internal_url":"","created_at":"2023-07-17T10:56:48.193-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"멀티_액세스_에지_컴퓨팅에서_퍼지_로직을_사용한_효율적인_부하_관리_기법","translated_slug":"","page_count":null,"language":"ko","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="104663962"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/104663962/The_role_of_microservice_approach_in_edge_computing_Opportunities_challenges_and_research_directions"><img alt="Research paper thumbnail of The role of microservice approach in edge computing: Opportunities, challenges, and research directions" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/104663962/The_role_of_microservice_approach_in_edge_computing_Opportunities_challenges_and_research_directions">The role of microservice approach in edge computing: Opportunities, challenges, and research directions</a></div><div class="wp-workCard_item"><span>ICT Express</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="104663962"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="104663962"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 104663962; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=104663962]").text(description); $(".js-view-count[data-work-id=104663962]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 104663962; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='104663962']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 104663962, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=104663962]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":104663962,"title":"The role of microservice approach in edge computing: Opportunities, challenges, and research directions","translated_title":"","metadata":{"publisher":"Elsevier BV","publication_name":"ICT Express"},"translated_abstract":null,"internal_url":"https://www.academia.edu/104663962/The_role_of_microservice_approach_in_edge_computing_Opportunities_challenges_and_research_directions","translated_internal_url":"","created_at":"2023-07-17T10:56:27.316-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"The_role_of_microservice_approach_in_edge_computing_Opportunities_challenges_and_research_directions","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[],"urls":[{"id":32939397,"url":"https://api.elsevier.com/content/article/PII:S2405959523000760?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231054"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231054/Edge_Orchestration_Based_Computation_Peer_Offloading_in_MEC_Enabled_Networks_A_Fuzzy_Logic_Approach"><img alt="Research paper thumbnail of Edge Orchestration Based Computation Peer Offloading in MEC-Enabled Networks: A Fuzzy Logic Approach" class="work-thumbnail" src="https://attachments.academia-assets.com/89326518/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231054/Edge_Orchestration_Based_Computation_Peer_Offloading_in_MEC_Enabled_Networks_A_Fuzzy_Logic_Approach">Edge Orchestration Based Computation Peer Offloading in MEC-Enabled Networks: A Fuzzy Logic Approach</a></div><div class="wp-workCard_item"><span>2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0097c9ad7e94d40afff3cbb419abb5b5" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326518,&quot;asset_id&quot;:84231054,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326518/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231054"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231054"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231054; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231054]").text(description); $(".js-view-count[data-work-id=84231054]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231054; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231054']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231054, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0097c9ad7e94d40afff3cbb419abb5b5" } } $('.js-work-strip[data-work-id=84231054]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231054,"title":"Edge Orchestration Based Computation Peer Offloading in MEC-Enabled Networks: A Fuzzy Logic Approach","translated_title":"","metadata":{"publisher":"IEEE","grobid_abstract":"La dépêche africaine featured a mélange of African diasporic contributors from across the French colonies. Chief among them were the Afro-Martinican intellectuals and sisters Jane and Paulette Nardal. It was here that Jane Nardal published her now famous essay \"Internationalisme noir,\" introducing the idea of \"black internationalism\" into popular parlance. Nardal documented a new understanding of blackness and collectivity amid post-World War I globalization. Just as wartime had broken down barriers among Europeans and white Americans, so too had it fostered the \"sentiment\" among black people from the around the world that they \"belong[ed] to one and the same race.\" 1 Introducing and reifying terms such as \"Afro Latino\" and \"African American\" into French and English vernaculars, Nardal focused on black people's efforts to rhetorically and ideologically link the African diaspora while also reconciling these new identities with the \"ancient traditions\" of Africa. 2 The result: one of the first efforts to define black internationalism as an ideology, worldview, and political practice in a moment in which black people the world over were trying to negotiate the modernizing world and their place in it. As Nardal's work offered rich and ideologically fertile ground, contemporaneous male writers and thinkers quickly usurped the ideas and lexicon of black internationalism. Her contemporaries-most notably Martinican writer Aimé Césaire and Senegalese poet and politician Léopold Senghor-gained global fame for their redefinition of black colonial subjectivity through what is now known as the Negritude movement. Moreover, they created a \"conspicuously masculine genealogy of their critical consciousness\" that credited black American Harlem Renaissance writers and intellectuals such as Langston Hughes, Claude McKay, and W. E. B. Du Bois as the movement's intellectual progenitors. 3 Despite her","publication_name":"2021 15th International Conference on Ubiquitous Information Management and Communication (IMCOM)","grobid_abstract_attachment_id":89326518},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231054/Edge_Orchestration_Based_Computation_Peer_Offloading_in_MEC_Enabled_Networks_A_Fuzzy_Logic_Approach","translated_internal_url":"","created_at":"2022-08-06T08:22:46.922-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326518,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326518/thumbnails/1.jpg","file_name":"S1479244321000081.pdf","download_url":"https://www.academia.edu/attachments/89326518/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Edge_Orchestration_Based_Computation_Pee.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326518/S1479244321000081-libre.pdf?1659800607=\u0026response-content-disposition=attachment%3B+filename%3DEdge_Orchestration_Based_Computation_Pee.pdf\u0026Expires=1732825483\u0026Signature=bdbcgd38sgWuVQrynTeKiwizafdF8Ih5WCAeHaFMNYpInCo5ix8oQ2-nO78ZqFMtWF73GhR~l3n0dzwYRA~JwTwwRfaFb2JVjXvnrII9HHUvATdyFCtCAQa9RxCBMVx9gIUK6piUF0a~KF-cxQtxjXAGrwY0GQLS2XGNuO1rrqOf4QBlmNA5-CPmbeaDrDMpoxiVkc2F9R7Fow~9rggtx9~flNyz8HgIjUfO6Ib8CG8Mv4WzBNXdrRxa-P7PZdC5anMwaYBSW4wSQgVjj1O0f5STQxUdWMpvQK-y7XCLkVPZUG5x-CHoGdZWLJpITj43rsMRNZDfSszexEIXWz8GhA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Edge_Orchestration_Based_Computation_Peer_Offloading_in_MEC_Enabled_Networks_A_Fuzzy_Logic_Approach","translated_slug":"","page_count":13,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326518,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326518/thumbnails/1.jpg","file_name":"S1479244321000081.pdf","download_url":"https://www.academia.edu/attachments/89326518/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4Myw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Edge_Orchestration_Based_Computation_Pee.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326518/S1479244321000081-libre.pdf?1659800607=\u0026response-content-disposition=attachment%3B+filename%3DEdge_Orchestration_Based_Computation_Pee.pdf\u0026Expires=1732825483\u0026Signature=bdbcgd38sgWuVQrynTeKiwizafdF8Ih5WCAeHaFMNYpInCo5ix8oQ2-nO78ZqFMtWF73GhR~l3n0dzwYRA~JwTwwRfaFb2JVjXvnrII9HHUvATdyFCtCAQa9RxCBMVx9gIUK6piUF0a~KF-cxQtxjXAGrwY0GQLS2XGNuO1rrqOf4QBlmNA5-CPmbeaDrDMpoxiVkc2F9R7Fow~9rggtx9~flNyz8HgIjUfO6Ib8CG8Mv4WzBNXdrRxa-P7PZdC5anMwaYBSW4wSQgVjj1O0f5STQxUdWMpvQK-y7XCLkVPZUG5x-CHoGdZWLJpITj43rsMRNZDfSszexEIXWz8GhA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":22675102,"url":"http://xplorestaging.ieee.org/ielx7/9377321/9377322/09377327.pdf?arnumber=9377327"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231053"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231053/Dynamic_Task_Offloading_for_Cloud_Assisted_Vehicular_Edge_Computing_Networks_A_Non_Cooperative_Game_Theoretic_Approach"><img alt="Research paper thumbnail of Dynamic Task Offloading for Cloud-Assisted Vehicular Edge Computing Networks: A Non-Cooperative Game Theoretic Approach" class="work-thumbnail" src="https://attachments.academia-assets.com/89326500/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231053/Dynamic_Task_Offloading_for_Cloud_Assisted_Vehicular_Edge_Computing_Networks_A_Non_Cooperative_Game_Theoretic_Approach">Dynamic Task Offloading for Cloud-Assisted Vehicular Edge Computing Networks: A Non-Cooperative Game Theoretic Approach</a></div><div class="wp-workCard_item"><span>Sensors</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Vehicular edge computing (VEC) is one of the prominent ideas to enhance the computation and stora...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Vehicular edge computing (VEC) is one of the prominent ideas to enhance the computation and storage capabilities of vehicular networks (VNs) through task offloading. In VEC, the resource-constrained vehicles offload their computing tasks to the local road-side units (RSUs) for rapid computation. However, due to the high mobility of vehicles and the overloaded problem, VEC experiences a great deal of challenges when determining a location for processing the offloaded task in real time. As a result, this degrades the quality of vehicular performance. Therefore, to deal with these above-mentioned challenges, an efficient dynamic task offloading approach based on a non-cooperative game (NGTO) is proposed in this study. In the NGTO approach, each vehicle can make its own strategy on whether a task is offloaded to a multi-access edge computing (MEC) server or a cloud server to maximize its benefits. Our proposed strategy can dynamically adjust the task-offloading probability to acquire th...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f45ade83c9ef3864d0e0e643054810b1" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326500,&quot;asset_id&quot;:84231053,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326500/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231053"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231053"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231053; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231053]").text(description); $(".js-view-count[data-work-id=84231053]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231053; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231053']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231053, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f45ade83c9ef3864d0e0e643054810b1" } } $('.js-work-strip[data-work-id=84231053]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231053,"title":"Dynamic Task Offloading for Cloud-Assisted Vehicular Edge Computing Networks: A Non-Cooperative Game Theoretic Approach","translated_title":"","metadata":{"abstract":"Vehicular edge computing (VEC) is one of the prominent ideas to enhance the computation and storage capabilities of vehicular networks (VNs) through task offloading. In VEC, the resource-constrained vehicles offload their computing tasks to the local road-side units (RSUs) for rapid computation. However, due to the high mobility of vehicles and the overloaded problem, VEC experiences a great deal of challenges when determining a location for processing the offloaded task in real time. As a result, this degrades the quality of vehicular performance. Therefore, to deal with these above-mentioned challenges, an efficient dynamic task offloading approach based on a non-cooperative game (NGTO) is proposed in this study. In the NGTO approach, each vehicle can make its own strategy on whether a task is offloaded to a multi-access edge computing (MEC) server or a cloud server to maximize its benefits. Our proposed strategy can dynamically adjust the task-offloading probability to acquire th...","publisher":"MDPI AG","publication_name":"Sensors"},"translated_abstract":"Vehicular edge computing (VEC) is one of the prominent ideas to enhance the computation and storage capabilities of vehicular networks (VNs) through task offloading. In VEC, the resource-constrained vehicles offload their computing tasks to the local road-side units (RSUs) for rapid computation. However, due to the high mobility of vehicles and the overloaded problem, VEC experiences a great deal of challenges when determining a location for processing the offloaded task in real time. As a result, this degrades the quality of vehicular performance. Therefore, to deal with these above-mentioned challenges, an efficient dynamic task offloading approach based on a non-cooperative game (NGTO) is proposed in this study. In the NGTO approach, each vehicle can make its own strategy on whether a task is offloaded to a multi-access edge computing (MEC) server or a cloud server to maximize its benefits. Our proposed strategy can dynamically adjust the task-offloading probability to acquire th...","internal_url":"https://www.academia.edu/84231053/Dynamic_Task_Offloading_for_Cloud_Assisted_Vehicular_Edge_Computing_Networks_A_Non_Cooperative_Game_Theoretic_Approach","translated_internal_url":"","created_at":"2022-08-06T08:22:46.733-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326500,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326500/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326500/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Dynamic_Task_Offloading_for_Cloud_Assist.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326500/pdf-libre.pdf?1659800640=\u0026response-content-disposition=attachment%3B+filename%3DDynamic_Task_Offloading_for_Cloud_Assist.pdf\u0026Expires=1732825483\u0026Signature=a33Zye2C9n~l4NBQE26KfWZu-RhpIE8ouTtoDMW-3PLaEusTYPlpvZclXUJXtx4UTaKhjumK-W~lHlHVEt21ZUXXfyfr2Dm5vcGLF-FmDYg8picRDG7HyS1B8yRL~en0xVVnLoEwdK4DVFsfNzzWSaq8uWCbv3Tgiqqa2fN-Ap62njSWBy25Gvci1qmPebsSNWlkCl1i3me8JXAOf-Vysuii7UTKPw9BwPGlRsCP4vH69Q41gjkSLrFL7m287xqPfXbrva8YExoBfhsTRLvms5q9AUPfoRvsKecVEjX4JjyvRiFJH~SoJfkwOUqJ~Rrb3rCEfUwnjz9vwfTyL08ezQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Dynamic_Task_Offloading_for_Cloud_Assisted_Vehicular_Edge_Computing_Networks_A_Non_Cooperative_Game_Theoretic_Approach","translated_slug":"","page_count":18,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326500,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326500/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326500/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Dynamic_Task_Offloading_for_Cloud_Assist.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326500/pdf-libre.pdf?1659800640=\u0026response-content-disposition=attachment%3B+filename%3DDynamic_Task_Offloading_for_Cloud_Assist.pdf\u0026Expires=1732825483\u0026Signature=a33Zye2C9n~l4NBQE26KfWZu-RhpIE8ouTtoDMW-3PLaEusTYPlpvZclXUJXtx4UTaKhjumK-W~lHlHVEt21ZUXXfyfr2Dm5vcGLF-FmDYg8picRDG7HyS1B8yRL~en0xVVnLoEwdK4DVFsfNzzWSaq8uWCbv3Tgiqqa2fN-Ap62njSWBy25Gvci1qmPebsSNWlkCl1i3me8JXAOf-Vysuii7UTKPw9BwPGlRsCP4vH69Q41gjkSLrFL7m287xqPfXbrva8YExoBfhsTRLvms5q9AUPfoRvsKecVEjX4JjyvRiFJH~SoJfkwOUqJ~Rrb3rCEfUwnjz9vwfTyL08ezQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":22675101,"url":"https://www.mdpi.com/1424-8220/22/10/3678/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231052"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231052/Game_Theory_Based_Dynamic_Computation_Offloading_in_MEC_Enabled_Vehicular_Networks"><img alt="Research paper thumbnail of Game Theory Based Dynamic Computation Offloading in MEC-Enabled Vehicular Networks" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231052/Game_Theory_Based_Dynamic_Computation_Offloading_in_MEC_Enabled_Vehicular_Networks">Game Theory Based Dynamic Computation Offloading in MEC-Enabled Vehicular Networks</a></div><div class="wp-workCard_item"><span>KIISE Transactions on Computing Practices</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231052"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231052"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231052; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231052]").text(description); $(".js-view-count[data-work-id=84231052]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231052; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231052']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231052, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231052]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231052,"title":"Game Theory Based Dynamic Computation Offloading in MEC-Enabled Vehicular Networks","translated_title":"","metadata":{"publisher":"Korean Institute of Information Scientists and Engineers","publication_name":"KIISE Transactions on Computing Practices"},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231052/Game_Theory_Based_Dynamic_Computation_Offloading_in_MEC_Enabled_Vehicular_Networks","translated_internal_url":"","created_at":"2022-08-06T08:22:46.625-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Game_Theory_Based_Dynamic_Computation_Offloading_in_MEC_Enabled_Vehicular_Networks","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":59487,"name":"Computation","url":"https://www.academia.edu/Documents/in/Computation"},{"id":3731186,"name":"Computation offloading ","url":"https://www.academia.edu/Documents/in/Computation_offloading"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231051"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231051/gRDF_An_Efficient_Compressor_with_Reduced_Structural_Regularities_That_Utilizes_gRePair"><img alt="Research paper thumbnail of gRDF: An Efficient Compressor with Reduced Structural Regularities That Utilizes gRePair" class="work-thumbnail" src="https://attachments.academia-assets.com/89326507/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231051/gRDF_An_Efficient_Compressor_with_Reduced_Structural_Regularities_That_Utilizes_gRePair">gRDF: An Efficient Compressor with Reduced Structural Regularities That Utilizes gRePair</a></div><div class="wp-workCard_item"><span>Sensors</span><span>, 2022</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The explosive volume of semantic data published in the Resource Description Framework (RDF) data ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The explosive volume of semantic data published in the Resource Description Framework (RDF) data model demands efficient management and compression with better compression ratio and runtime. Although extensive work has been carried out for compressing the RDF datasets, they do not perform well in all dimensions. However, these compressors rarely exploit the graph patterns and structural regularities of real-world datasets. Moreover, there are a variety of existing approaches that reduce the size of a graph by using a grammar-based graph compression algorithm. In this study, we introduce a novel approach named gRDF (graph repair for RDF) that uses gRePair, one of the most efficient grammar-based graph compression schemes, to compress the RDF dataset. In addition to that, we have improved the performance of HDT (header-dictionary-triple), an efficient approach for compressing the RDF datasets based on structural properties, by introducing modified HDT (M-HDT). It can detect the freque...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="18560b7c84b84ea7e3318e42cbccf083" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326507,&quot;asset_id&quot;:84231051,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326507/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231051"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231051"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231051; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231051]").text(description); $(".js-view-count[data-work-id=84231051]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231051; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231051']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231051, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "18560b7c84b84ea7e3318e42cbccf083" } } $('.js-work-strip[data-work-id=84231051]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231051,"title":"gRDF: An Efficient Compressor with Reduced Structural Regularities That Utilizes gRePair","translated_title":"","metadata":{"abstract":"The explosive volume of semantic data published in the Resource Description Framework (RDF) data model demands efficient management and compression with better compression ratio and runtime. Although extensive work has been carried out for compressing the RDF datasets, they do not perform well in all dimensions. However, these compressors rarely exploit the graph patterns and structural regularities of real-world datasets. Moreover, there are a variety of existing approaches that reduce the size of a graph by using a grammar-based graph compression algorithm. In this study, we introduce a novel approach named gRDF (graph repair for RDF) that uses gRePair, one of the most efficient grammar-based graph compression schemes, to compress the RDF dataset. In addition to that, we have improved the performance of HDT (header-dictionary-triple), an efficient approach for compressing the RDF datasets based on structural properties, by introducing modified HDT (M-HDT). It can detect the freque...","publisher":"MDPI AG","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Sensors"},"translated_abstract":"The explosive volume of semantic data published in the Resource Description Framework (RDF) data model demands efficient management and compression with better compression ratio and runtime. Although extensive work has been carried out for compressing the RDF datasets, they do not perform well in all dimensions. However, these compressors rarely exploit the graph patterns and structural regularities of real-world datasets. Moreover, there are a variety of existing approaches that reduce the size of a graph by using a grammar-based graph compression algorithm. In this study, we introduce a novel approach named gRDF (graph repair for RDF) that uses gRePair, one of the most efficient grammar-based graph compression schemes, to compress the RDF dataset. In addition to that, we have improved the performance of HDT (header-dictionary-triple), an efficient approach for compressing the RDF datasets based on structural properties, by introducing modified HDT (M-HDT). It can detect the freque...","internal_url":"https://www.academia.edu/84231051/gRDF_An_Efficient_Compressor_with_Reduced_Structural_Regularities_That_Utilizes_gRePair","translated_internal_url":"","created_at":"2022-08-06T08:22:46.466-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326507,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326507/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326507/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"gRDF_An_Efficient_Compressor_with_Reduce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326507/pdf-libre.pdf?1659800625=\u0026response-content-disposition=attachment%3B+filename%3DgRDF_An_Efficient_Compressor_with_Reduce.pdf\u0026Expires=1732825484\u0026Signature=E1F-cwtpGbeV~1V7KG43sCXZiKP4cIN88Y~8MjqEWAIFnJk4Xu3vqCqoNU1gebpKCZ7n8~bqdW8Pzk4nnRmvVlZYvZLTLAi85YIkP8HmuwpgfMjzZbsWxF1sBhGjHIEMsI02kF3a97BfAe38QDHGFPapR9C8X5WvLQVGIJu-PtHrSGfWCJBRYNR3pHPlQlOxR9pZxPxn0xcL-7XF4Uvg124PvPL4VvJZOAgUZrxV7Qca47qFwmaNcW0OdoENuOWKZLIc7jpcL4GEsLhdK3AWm9o6UZgU1iOBV0Yp587icPQH5k1LrDA8NGakpYuVyQeMlaXERx-VToA~OTSWGMhqrw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"gRDF_An_Efficient_Compressor_with_Reduced_Structural_Regularities_That_Utilizes_gRePair","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326507,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326507/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326507/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"gRDF_An_Efficient_Compressor_with_Reduce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326507/pdf-libre.pdf?1659800625=\u0026response-content-disposition=attachment%3B+filename%3DgRDF_An_Efficient_Compressor_with_Reduce.pdf\u0026Expires=1732825484\u0026Signature=E1F-cwtpGbeV~1V7KG43sCXZiKP4cIN88Y~8MjqEWAIFnJk4Xu3vqCqoNU1gebpKCZ7n8~bqdW8Pzk4nnRmvVlZYvZLTLAi85YIkP8HmuwpgfMjzZbsWxF1sBhGjHIEMsI02kF3a97BfAe38QDHGFPapR9C8X5WvLQVGIJu-PtHrSGfWCJBRYNR3pHPlQlOxR9pZxPxn0xcL-7XF4Uvg124PvPL4VvJZOAgUZrxV7Qca47qFwmaNcW0OdoENuOWKZLIc7jpcL4GEsLhdK3AWm9o6UZgU1iOBV0Yp587icPQH5k1LrDA8NGakpYuVyQeMlaXERx-VToA~OTSWGMhqrw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":89326509,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326509/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326509/download_file","bulk_download_file_name":"gRDF_An_Efficient_Compressor_with_Reduce.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326509/pdf-libre.pdf?1659800626=\u0026response-content-disposition=attachment%3B+filename%3DgRDF_An_Efficient_Compressor_with_Reduce.pdf\u0026Expires=1732825484\u0026Signature=UBIIysPyHEfB3ZLV8fVF1LLr8EwwCNAMN5KrXlDRsVbStj2wX2Pn82UrLWnJs9Zx5tW7Flync84fW25nukoSi0Xuh3rp~HZEyRV7X9YJORyWPw78Y6Dv1WJsXB917hqf7Zi2rmBomEQ-IXhVPQM21DIM7MzjRtjn4WJk9fTrB2Au9uxPAme33EF1-44TKH8UCGdmLdWeyQhFd4uA4SPB02Oz4sB13wBwaAB4I7xbqL19AuPhzrgF5v16-tPxFQkPENPOIwCBqag8JDwRctx2wEG9M-v4yQwuAW6KF7QJnft49jLvroAnVZOHL8zDum2xadgARPT8jBFyajxnTykxlQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":100652,"name":"RDF","url":"https://www.academia.edu/Documents/in/RDF"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":22675100,"url":"https://www.mdpi.com/1424-8220/22/7/2545/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231050"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231050/Efficient_Approach_for_Encoding_and_Compression_of_RDF_Knowledge_Bases"><img alt="Research paper thumbnail of Efficient Approach for Encoding and Compression of RDF Knowledge Bases" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231050/Efficient_Approach_for_Encoding_and_Compression_of_RDF_Knowledge_Bases">Efficient Approach for Encoding and Compression of RDF Knowledge Bases</a></div><div class="wp-workCard_item"><span>Journal of KIISE</span><span>, 2022</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231050"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231050"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231050; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231050]").text(description); $(".js-view-count[data-work-id=84231050]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231050; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231050']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231050, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231050]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231050,"title":"Efficient Approach for Encoding and Compression of RDF Knowledge Bases","translated_title":"","metadata":{"publisher":"Korean Institute of Information Scientists and Engineers","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Journal of KIISE"},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231050/Efficient_Approach_for_Encoding_and_Compression_of_RDF_Knowledge_Bases","translated_internal_url":"","created_at":"2022-08-06T08:22:46.351-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Efficient_Approach_for_Encoding_and_Compression_of_RDF_Knowledge_Bases","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":464,"name":"Information Retrieval","url":"https://www.academia.edu/Documents/in/Information_Retrieval"},{"id":100652,"name":"RDF","url":"https://www.academia.edu/Documents/in/RDF"},{"id":487495,"name":"SPARQL","url":"https://www.academia.edu/Documents/in/SPARQL"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231049"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231049/Fuzzy_Decision_Based_Efficient_Task_Offloading_Management_Scheme_in_Multi_Tier_MEC_Enabled_Networks"><img alt="Research paper thumbnail of Fuzzy Decision-Based Efficient Task Offloading Management Scheme in Multi-Tier MEC-Enabled Networks" class="work-thumbnail" src="https://attachments.academia-assets.com/89326508/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231049/Fuzzy_Decision_Based_Efficient_Task_Offloading_Management_Scheme_in_Multi_Tier_MEC_Enabled_Networks">Fuzzy Decision-Based Efficient Task Offloading Management Scheme in Multi-Tier MEC-Enabled Networks</a></div><div class="wp-workCard_item"><span>Sensors</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Multi-access edge computing (MEC) is a new leading technology for meeting the demands of key perf...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Multi-access edge computing (MEC) is a new leading technology for meeting the demands of key performance indicators (KPIs) in 5G networks. However, in a rapidly changing dynamic environment, it is hard to find the optimal target server for processing offloaded tasks because we do not know the end users’ demands in advance. Therefore, quality of service (QoS) deteriorates because of increasing task failures and long execution latency from congestion. To reduce latency and avoid task failures from resource-constrained edge servers, vertical offloading between mobile devices with local-edge collaboration or with local edge-remote cloud collaboration have been proposed in previous studies. However, they ignored the nearby edge server in the same tier that has excess computing resources. Therefore, this paper introduces a fuzzy decision-based cloud-MEC collaborative task offloading management system called FTOM, which takes advantage of powerful remote cloud-computing capabilities and ut...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="532d8e25caeea765f7e7f00ee606c59b" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326508,&quot;asset_id&quot;:84231049,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326508/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231049"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231049"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231049; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231049]").text(description); $(".js-view-count[data-work-id=84231049]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231049; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231049']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231049, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "532d8e25caeea765f7e7f00ee606c59b" } } $('.js-work-strip[data-work-id=84231049]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231049,"title":"Fuzzy Decision-Based Efficient Task Offloading Management Scheme in Multi-Tier MEC-Enabled Networks","translated_title":"","metadata":{"abstract":"Multi-access edge computing (MEC) is a new leading technology for meeting the demands of key performance indicators (KPIs) in 5G networks. However, in a rapidly changing dynamic environment, it is hard to find the optimal target server for processing offloaded tasks because we do not know the end users’ demands in advance. Therefore, quality of service (QoS) deteriorates because of increasing task failures and long execution latency from congestion. To reduce latency and avoid task failures from resource-constrained edge servers, vertical offloading between mobile devices with local-edge collaboration or with local edge-remote cloud collaboration have been proposed in previous studies. However, they ignored the nearby edge server in the same tier that has excess computing resources. Therefore, this paper introduces a fuzzy decision-based cloud-MEC collaborative task offloading management system called FTOM, which takes advantage of powerful remote cloud-computing capabilities and ut...","publisher":"MDPI AG","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Sensors"},"translated_abstract":"Multi-access edge computing (MEC) is a new leading technology for meeting the demands of key performance indicators (KPIs) in 5G networks. However, in a rapidly changing dynamic environment, it is hard to find the optimal target server for processing offloaded tasks because we do not know the end users’ demands in advance. Therefore, quality of service (QoS) deteriorates because of increasing task failures and long execution latency from congestion. To reduce latency and avoid task failures from resource-constrained edge servers, vertical offloading between mobile devices with local-edge collaboration or with local edge-remote cloud collaboration have been proposed in previous studies. However, they ignored the nearby edge server in the same tier that has excess computing resources. Therefore, this paper introduces a fuzzy decision-based cloud-MEC collaborative task offloading management system called FTOM, which takes advantage of powerful remote cloud-computing capabilities and ut...","internal_url":"https://www.academia.edu/84231049/Fuzzy_Decision_Based_Efficient_Task_Offloading_Management_Scheme_in_Multi_Tier_MEC_Enabled_Networks","translated_internal_url":"","created_at":"2022-08-06T08:22:46.185-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326508,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326508/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326508/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Fuzzy_Decision_Based_Efficient_Task_Offl.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326508/pdf-libre.pdf?1659800621=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Decision_Based_Efficient_Task_Offl.pdf\u0026Expires=1732825484\u0026Signature=X8bY2k307UPYkKPYInoVBO9S~MLvkWjUMUBzsqSJEjSb1DzqNgt4tFX6D935BprMIJ54s~bQMHOt8WkdLEaiRARGPbcMZJReZ36QKG8lpEkasz5hP9ZXrvn0h5jsJP2D8dyFOPFl3IexXVSmS4jGclCmDUnaiAe1tQ5VNNPDsrKM~yxRjQ8d8rum2XdAGJrGttb-k0F~uMNlM1YLrZ630BUF3fQb3J52V1wBZA07cDGv2IqprmAOyeuwJdmxBPAm6-RhhxXfOL0b~d5SLNP2rdOIB02deW2j1atUyWEM8jvqMtA4DZEXFiwGSAeZ2XOQ6g9KIdj5jVoK1k3ziMcYQQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Fuzzy_Decision_Based_Efficient_Task_Offloading_Management_Scheme_in_Multi_Tier_MEC_Enabled_Networks","translated_slug":"","page_count":26,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326508,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326508/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326508/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Fuzzy_Decision_Based_Efficient_Task_Offl.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326508/pdf-libre.pdf?1659800621=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Decision_Based_Efficient_Task_Offl.pdf\u0026Expires=1732825484\u0026Signature=X8bY2k307UPYkKPYInoVBO9S~MLvkWjUMUBzsqSJEjSb1DzqNgt4tFX6D935BprMIJ54s~bQMHOt8WkdLEaiRARGPbcMZJReZ36QKG8lpEkasz5hP9ZXrvn0h5jsJP2D8dyFOPFl3IexXVSmS4jGclCmDUnaiAe1tQ5VNNPDsrKM~yxRjQ8d8rum2XdAGJrGttb-k0F~uMNlM1YLrZ630BUF3fQb3J52V1wBZA07cDGv2IqprmAOyeuwJdmxBPAm6-RhhxXfOL0b~d5SLNP2rdOIB02deW2j1atUyWEM8jvqMtA4DZEXFiwGSAeZ2XOQ6g9KIdj5jVoK1k3ziMcYQQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":22675099,"url":"https://www.mdpi.com/1424-8220/21/4/1484/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231048"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231048/Orchestration_Based_Task_Offloading_for_Mobile_Edge_Computing_in_Small_Cell_Networks"><img alt="Research paper thumbnail of Orchestration-Based Task Offloading for Mobile Edge Computing in Small-Cell Networks" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231048/Orchestration_Based_Task_Offloading_for_Mobile_Edge_Computing_in_Small_Cell_Networks">Orchestration-Based Task Offloading for Mobile Edge Computing in Small-Cell Networks</a></div><div class="wp-workCard_item"><span>Proceedings of International Joint Conference on Computational Intelligence</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">To execute computation-intensive applications and stringent latency-critical tasks at resource co...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">To execute computation-intensive applications and stringent latency-critical tasks at resource constraints smart mobile devices, mobile edge computing (MEC) in small-cell networks is one of the leading thought, where mobile devices will offload their computation-intensive tasks to the adjacent small-cell network for faster processing. Currently, some research work has been done for combining mobile edge computing and small-cell networks together. Existing researches mostly concentrate on the user to small base station (SBS) offloading and improving the radio access performance using optimization, while the computing capability of SBS-MEC server is ignored. In order to acquire superior performance, an efficient orchestration-based task offloading for mobile edge computing in small-cell networks is proposed in this paper where edge orchestrator collects all the information from the neighboring small-cell SBS-MEC server to decide for forwarding the workloads from overloaded SBS-MEC to nearby SBS-MEC with a light workload. Simulation results affirm that orchestration-based task offloading scheme offers the best results not only by reducing the task failure but also with a smaller task completion time compared to other approaches in small-cell networks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231048"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231048"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231048; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231048]").text(description); $(".js-view-count[data-work-id=84231048]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231048; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231048']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231048, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231048]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231048,"title":"Orchestration-Based Task Offloading for Mobile Edge Computing in Small-Cell Networks","translated_title":"","metadata":{"abstract":"To execute computation-intensive applications and stringent latency-critical tasks at resource constraints smart mobile devices, mobile edge computing (MEC) in small-cell networks is one of the leading thought, where mobile devices will offload their computation-intensive tasks to the adjacent small-cell network for faster processing. Currently, some research work has been done for combining mobile edge computing and small-cell networks together. Existing researches mostly concentrate on the user to small base station (SBS) offloading and improving the radio access performance using optimization, while the computing capability of SBS-MEC server is ignored. In order to acquire superior performance, an efficient orchestration-based task offloading for mobile edge computing in small-cell networks is proposed in this paper where edge orchestrator collects all the information from the neighboring small-cell SBS-MEC server to decide for forwarding the workloads from overloaded SBS-MEC to nearby SBS-MEC with a light workload. Simulation results affirm that orchestration-based task offloading scheme offers the best results not only by reducing the task failure but also with a smaller task completion time compared to other approaches in small-cell networks.","publisher":"Springer Singapore","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Proceedings of International Joint Conference on Computational Intelligence"},"translated_abstract":"To execute computation-intensive applications and stringent latency-critical tasks at resource constraints smart mobile devices, mobile edge computing (MEC) in small-cell networks is one of the leading thought, where mobile devices will offload their computation-intensive tasks to the adjacent small-cell network for faster processing. Currently, some research work has been done for combining mobile edge computing and small-cell networks together. Existing researches mostly concentrate on the user to small base station (SBS) offloading and improving the radio access performance using optimization, while the computing capability of SBS-MEC server is ignored. In order to acquire superior performance, an efficient orchestration-based task offloading for mobile edge computing in small-cell networks is proposed in this paper where edge orchestrator collects all the information from the neighboring small-cell SBS-MEC server to decide for forwarding the workloads from overloaded SBS-MEC to nearby SBS-MEC with a light workload. Simulation results affirm that orchestration-based task offloading scheme offers the best results not only by reducing the task failure but also with a smaller task completion time compared to other approaches in small-cell networks.","internal_url":"https://www.academia.edu/84231048/Orchestration_Based_Task_Offloading_for_Mobile_Edge_Computing_in_Small_Cell_Networks","translated_internal_url":"","created_at":"2022-08-06T08:22:46.006-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Orchestration_Based_Task_Offloading_for_Mobile_Edge_Computing_in_Small_Cell_Networks","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":2236574,"name":"Mobile Edge Computing","url":"https://www.academia.edu/Documents/in/Mobile_Edge_Computing"}],"urls":[{"id":22675098,"url":"http://link.springer.com/content/pdf/10.1007/978-981-15-3607-6_50"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231047"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231047/Peak_to_average_power_ratio_reduction_method_for_orthogonal_frequency_division_multiplexing_signals_in_wireless_communication_systems"><img alt="Research paper thumbnail of Peak-to- average power ratio reduction method for orthogonal frequency division multiplexing signals in wireless communication systems" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231047/Peak_to_average_power_ratio_reduction_method_for_orthogonal_frequency_division_multiplexing_signals_in_wireless_communication_systems">Peak-to- average power ratio reduction method for orthogonal frequency division multiplexing signals in wireless communication systems</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231047"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231047"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231047; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231047]").text(description); $(".js-view-count[data-work-id=84231047]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231047; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231047']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231047, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231047]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231047,"title":"Peak-to- average power ratio reduction method for orthogonal frequency division multiplexing signals in wireless communication systems","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2015,"errors":{}}},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231047/Peak_to_average_power_ratio_reduction_method_for_orthogonal_frequency_division_multiplexing_signals_in_wireless_communication_systems","translated_internal_url":"","created_at":"2022-08-06T08:22:45.906-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Peak_to_average_power_ratio_reduction_method_for_orthogonal_frequency_division_multiplexing_signals_in_wireless_communication_systems","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1490962,"name":"Orthogonal Frequency Division Multiplexing","url":"https://www.academia.edu/Documents/in/Orthogonal_Frequency_Division_Multiplexing"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231046"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231046/Lane_Departure_Warning_through_Message_and_Alarm_and_Vehicle_Position_Tracking_using_Video_Camera_based_Driver_Assist_System"><img alt="Research paper thumbnail of Lane Departure Warning through Message and Alarm &amp; Vehicle Position Tracking using Video Camera based Driver Assist System" class="work-thumbnail" src="https://attachments.academia-assets.com/89326503/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231046/Lane_Departure_Warning_through_Message_and_Alarm_and_Vehicle_Position_Tracking_using_Video_Camera_based_Driver_Assist_System">Lane Departure Warning through Message and Alarm &amp; Vehicle Position Tracking using Video Camera based Driver Assist System</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In modern competitive era, people are so much desperate to reach their goal in a short time. They...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In modern competitive era, people are so much desperate to reach their goal in a short time. They are not even concerned much about their lives. When these people are driving on road, they have more attention about the time to reach the destination. As a result, they are risking their and others lives on r ad due to driver’s inattention or incompetence or drowsine ss. If driver have an assist system in their vehicle which alert him when he drives car out of lane, then he can sav e himself and others from accident. This paper propos es a video based driver assist system which alerts the d river with audio alarm and visual message about lane departure as well as can track the specific vehicle using license plate extraction. The proposed system uses camera sensor to get the real time input data of ro ad environment which is then passes through the 2D FIR filter and thresholding process. After that Hough transform and Hough line is used to detect lane mar ker and line. Kalman filter is ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="abe3bcde5dc88e8d641feda5eb411f1f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326503,&quot;asset_id&quot;:84231046,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326503/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231046"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231046"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231046; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231046]").text(description); $(".js-view-count[data-work-id=84231046]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231046; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231046']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231046, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "abe3bcde5dc88e8d641feda5eb411f1f" } } $('.js-work-strip[data-work-id=84231046]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231046,"title":"Lane Departure Warning through Message and Alarm \u0026 Vehicle Position Tracking using Video Camera based Driver Assist System","translated_title":"","metadata":{"abstract":"In modern competitive era, people are so much desperate to reach their goal in a short time. They are not even concerned much about their lives. When these people are driving on road, they have more attention about the time to reach the destination. As a result, they are risking their and others lives on r ad due to driver’s inattention or incompetence or drowsine ss. If driver have an assist system in their vehicle which alert him when he drives car out of lane, then he can sav e himself and others from accident. This paper propos es a video based driver assist system which alerts the d river with audio alarm and visual message about lane departure as well as can track the specific vehicle using license plate extraction. The proposed system uses camera sensor to get the real time input data of ro ad environment which is then passes through the 2D FIR filter and thresholding process. After that Hough transform and Hough line is used to detect lane mar ker and line. Kalman filter is ...","publication_date":{"day":null,"month":null,"year":2016,"errors":{}}},"translated_abstract":"In modern competitive era, people are so much desperate to reach their goal in a short time. They are not even concerned much about their lives. When these people are driving on road, they have more attention about the time to reach the destination. As a result, they are risking their and others lives on r ad due to driver’s inattention or incompetence or drowsine ss. If driver have an assist system in their vehicle which alert him when he drives car out of lane, then he can sav e himself and others from accident. This paper propos es a video based driver assist system which alerts the d river with audio alarm and visual message about lane departure as well as can track the specific vehicle using license plate extraction. The proposed system uses camera sensor to get the real time input data of ro ad environment which is then passes through the 2D FIR filter and thresholding process. After that Hough transform and Hough line is used to detect lane mar ker and line. Kalman filter is ...","internal_url":"https://www.academia.edu/84231046/Lane_Departure_Warning_through_Message_and_Alarm_and_Vehicle_Position_Tracking_using_Video_Camera_based_Driver_Assist_System","translated_internal_url":"","created_at":"2022-08-06T08:22:45.739-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326503,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326503/thumbnails/1.jpg","file_name":"28_20IJAEMS-JUN-2016-79-Lane_20Departure_20Warning_20through_20Message_20and_20Alarm_20__20Vehicle_20Position_20Tracking_20using_20Video.pdf","download_url":"https://www.academia.edu/attachments/89326503/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Lane_Departure_Warning_through_Message_a.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326503/28_20IJAEMS-JUN-2016-79-Lane_20Departure_20Warning_20through_20Message_20and_20Alarm_20__20Vehicle_20Position_20Tracking_20using_20Video-libre.pdf?1659800610=\u0026response-content-disposition=attachment%3B+filename%3DLane_Departure_Warning_through_Message_a.pdf\u0026Expires=1732825484\u0026Signature=Nj~l3uHmWvBJJ5XPhJSi74EWSKTa1Hj~AZ9G-g5-IeasSFKasrfDMgI8uQmi275Uf995GfU~ck47amTWPeuCdPp-Ch4yq-3BetU29MLeNVOi1zRxU4Dq5l7Ez3SMtAjYn3dO8yCeSzWIPCHlrWuQYfpSW5NbQOLHsK5HIffKX6aQzfOHWvlJ68i1bSN5W-5Mp2pqhphrI~utFvaHCI0vgjZsY3Kb8EBEc7wZXtEP2oNFP4HY-FFNg8XWOU6TJVcN28X~z5uZ~TBQv5Voyg2bzzf-K3YRQO7R6qlbBY62UjZvFcSIIJSIvQn5~b24dV3OgLzhSc12aZV9XmFpz3ovuw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Lane_Departure_Warning_through_Message_and_Alarm_and_Vehicle_Position_Tracking_using_Video_Camera_based_Driver_Assist_System","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326503,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326503/thumbnails/1.jpg","file_name":"28_20IJAEMS-JUN-2016-79-Lane_20Departure_20Warning_20through_20Message_20and_20Alarm_20__20Vehicle_20Position_20Tracking_20using_20Video.pdf","download_url":"https://www.academia.edu/attachments/89326503/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Lane_Departure_Warning_through_Message_a.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326503/28_20IJAEMS-JUN-2016-79-Lane_20Departure_20Warning_20through_20Message_20and_20Alarm_20__20Vehicle_20Position_20Tracking_20using_20Video-libre.pdf?1659800610=\u0026response-content-disposition=attachment%3B+filename%3DLane_Departure_Warning_through_Message_a.pdf\u0026Expires=1732825484\u0026Signature=Nj~l3uHmWvBJJ5XPhJSi74EWSKTa1Hj~AZ9G-g5-IeasSFKasrfDMgI8uQmi275Uf995GfU~ck47amTWPeuCdPp-Ch4yq-3BetU29MLeNVOi1zRxU4Dq5l7Ez3SMtAjYn3dO8yCeSzWIPCHlrWuQYfpSW5NbQOLHsK5HIffKX6aQzfOHWvlJ68i1bSN5W-5Mp2pqhphrI~utFvaHCI0vgjZsY3Kb8EBEc7wZXtEP2oNFP4HY-FFNg8XWOU6TJVcN28X~z5uZ~TBQv5Voyg2bzzf-K3YRQO7R6qlbBY62UjZvFcSIIJSIvQn5~b24dV3OgLzhSc12aZV9XmFpz3ovuw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":22675097,"url":"https://ijaems.com/upload_images/issue_files/28%20IJAEMS-JUN-2016-79-Lane%20Departure%20Warning%20through%20Message%20and%20Alarm%20\u0026%20Vehicle%20Position%20Tracking%20using%20Video%20Camera%20based%20Driver%20Assist%20System.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231045"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231045/Online_Garments_Inventory_Management_System"><img alt="Research paper thumbnail of Online Garments Inventory Management System" class="work-thumbnail" src="https://attachments.academia-assets.com/89326504/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231045/Online_Garments_Inventory_Management_System">Online Garments Inventory Management System</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Management Systems are usually designed to enhance the efficiency of handling the information of ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Management Systems are usually designed to enhance the efficiency of handling the information of any system, which is running through an inefficient procedure and is expensive, time consuming, insecure and it needs more manpower. The Online Garments Inventory Management System is a system which makes the working procedure of present manual system of Garments easier and increases its efficiency to a high degree. The main objective of this application is to automate the existing system which is manually maintaining. The whole system is accessed from different terminals of the network. There are three major sectors in this system- employee management, product inventory and raw materials inventory. In the employee management system all information of the employees are stored. In the product inventory system, the invoice and the delivery information is maintained. Raw materials inventory controls the purchase information, shipping information, total materials of stock in the garments. Th...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5e6552e3765578998e84e9e6778697ba" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326504,&quot;asset_id&quot;:84231045,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326504/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231045"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231045"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231045; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231045]").text(description); $(".js-view-count[data-work-id=84231045]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231045; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231045']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231045, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5e6552e3765578998e84e9e6778697ba" } } $('.js-work-strip[data-work-id=84231045]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231045,"title":"Online Garments Inventory Management System","translated_title":"","metadata":{"abstract":"Management Systems are usually designed to enhance the efficiency of handling the information of any system, which is running through an inefficient procedure and is expensive, time consuming, insecure and it needs more manpower. The Online Garments Inventory Management System is a system which makes the working procedure of present manual system of Garments easier and increases its efficiency to a high degree. The main objective of this application is to automate the existing system which is manually maintaining. The whole system is accessed from different terminals of the network. There are three major sectors in this system- employee management, product inventory and raw materials inventory. In the employee management system all information of the employees are stored. In the product inventory system, the invoice and the delivery information is maintained. Raw materials inventory controls the purchase information, shipping information, total materials of stock in the garments. Th...","publication_date":{"day":null,"month":null,"year":2016,"errors":{}}},"translated_abstract":"Management Systems are usually designed to enhance the efficiency of handling the information of any system, which is running through an inefficient procedure and is expensive, time consuming, insecure and it needs more manpower. The Online Garments Inventory Management System is a system which makes the working procedure of present manual system of Garments easier and increases its efficiency to a high degree. The main objective of this application is to automate the existing system which is manually maintaining. The whole system is accessed from different terminals of the network. There are three major sectors in this system- employee management, product inventory and raw materials inventory. In the employee management system all information of the employees are stored. In the product inventory system, the invoice and the delivery information is maintained. Raw materials inventory controls the purchase information, shipping information, total materials of stock in the garments. Th...","internal_url":"https://www.academia.edu/84231045/Online_Garments_Inventory_Management_System","translated_internal_url":"","created_at":"2022-08-06T08:22:45.586-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326504,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326504/thumbnails/1.jpg","file_name":"29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System.pdf","download_url":"https://www.academia.edu/attachments/89326504/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Online_Garments_Inventory_Management_Sys.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326504/29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System-libre.pdf?1659800607=\u0026response-content-disposition=attachment%3B+filename%3DOnline_Garments_Inventory_Management_Sys.pdf\u0026Expires=1732825484\u0026Signature=NpC-3DnA4ondwnt1CM7fmF4lOgfJTN4KQkT7hFYA3mcFyZLqe9qriEyvgRU7scylRTaNo2AxH4RPmSDZeqMl34QNufp129damSyskZFN4RhaxqBeKH6dsxnTpGLLbw1wPkdF-PlS~bI~-P2jh2V5I9m9Rg6b9dVL-9U~E5QFvWC1hQzOplQJMnpcBzumdLaANodQ83s1oAZN116BnrD~jBLj37MzAxDaPrDRwxpOlrJyX1UJmn-NpGY2iA5WPD3Z3rbfZGn93NcqAVWB07zEeTp6NCJTczFluTZE1WK3qHamMQyCGWWDSQ62SSzD4ga1QU3LH-5nmMu8Z7hKtYY1ZQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Online_Garments_Inventory_Management_System","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326504,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326504/thumbnails/1.jpg","file_name":"29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System.pdf","download_url":"https://www.academia.edu/attachments/89326504/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Online_Garments_Inventory_Management_Sys.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326504/29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System-libre.pdf?1659800607=\u0026response-content-disposition=attachment%3B+filename%3DOnline_Garments_Inventory_Management_Sys.pdf\u0026Expires=1732825484\u0026Signature=NpC-3DnA4ondwnt1CM7fmF4lOgfJTN4KQkT7hFYA3mcFyZLqe9qriEyvgRU7scylRTaNo2AxH4RPmSDZeqMl34QNufp129damSyskZFN4RhaxqBeKH6dsxnTpGLLbw1wPkdF-PlS~bI~-P2jh2V5I9m9Rg6b9dVL-9U~E5QFvWC1hQzOplQJMnpcBzumdLaANodQ83s1oAZN116BnrD~jBLj37MzAxDaPrDRwxpOlrJyX1UJmn-NpGY2iA5WPD3Z3rbfZGn93NcqAVWB07zEeTp6NCJTczFluTZE1WK3qHamMQyCGWWDSQ62SSzD4ga1QU3LH-5nmMu8Z7hKtYY1ZQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":89326501,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326501/thumbnails/1.jpg","file_name":"29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System.pdf","download_url":"https://www.academia.edu/attachments/89326501/download_file","bulk_download_file_name":"Online_Garments_Inventory_Management_Sys.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326501/29_20IJAEMS-JUN-2016-88-Online_20Garments_20Inventory_20Management_20System-libre.pdf?1659800608=\u0026response-content-disposition=attachment%3B+filename%3DOnline_Garments_Inventory_Management_Sys.pdf\u0026Expires=1732825484\u0026Signature=Qu1G2uZTQobqa~wLqhl2kbLWJIcC~Vke~LiqH-rvJItZtcaTMcEZ44c0IkMk30WTZ-rJLvufub7j7O987Z3dwxaNR8li5jxSMsUDpYZs08yWTtkjyc1~RNaQd0BlMZyOwuaV8hNdP-O63ogYHMTkYkn99h5544DodFJV378e~~U5W552afUtNKSyb55LnTpxtR~mhuEDuqxTbfDMwGC9RRDjwCKcQzX58yjBnRcH6R97JD0AETuWoydK--F0ecHe1R06vPcGjdPsP8gGyh-YgdkU8PL71plq61NMZRT-eaS3O3y5eJJ5oT9chSTR1Rc3hBxgxOZbF2mOdYM2tvQQvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":449,"name":"Software Engineering","url":"https://www.academia.edu/Documents/in/Software_Engineering"},{"id":117212,"name":"Inventory Management","url":"https://www.academia.edu/Documents/in/Inventory_Management"}],"urls":[{"id":22675096,"url":"https://ijaems.com/upload_images/issue_files/29%20IJAEMS-JUN-2016-88-Online%20Garments%20Inventory%20Management%20System.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231044"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231044/A_New_Approach_for_Efficient_Face_Detection_Using_BPV_Algorithm_Based_on_Mathematical_Modeling"><img alt="Research paper thumbnail of A New Approach for Efficient Face Detection Using BPV Algorithm Based on Mathematical Modeling" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231044/A_New_Approach_for_Efficient_Face_Detection_Using_BPV_Algorithm_Based_on_Mathematical_Modeling">A New Approach for Efficient Face Detection Using BPV Algorithm Based on Mathematical Modeling</a></div><div class="wp-workCard_item"><span>Proceedings of International Joint Conference on Computational Intelligence</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">In this paper several face detection algorithms are compared on the basis of mathematical analysi...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">In this paper several face detection algorithms are compared on the basis of mathematical analysis to find out the most efficient algorithm. At first the mathematical model of different face detection algorithms (Camshift, AdaBoost, LBP and Viola Jones algorithms) are analyzed and compared to find out the most efficient one. Mathematical results show that Viola Jones performs best result to detect the face. But in case of Viola Jones, integral image integrates the non-face region pixels with face region pixels as a result, the pixel value redundancy is occurred which degrades its efficiency. To overcome this problem, a new face detection algorithm is proposed in this paper which is named as Break Point Value (BPV) algorithm. The mathematical model of our proposed method is derived where integral images are compared with Local Binary Pattern (LBP) and the compared value is suggested as test value. If the test value is less than or equal to the BPV then the region is a face region and if it is not, the region is a non-face region. Since there is a comparison between integral image value and LBP value of the same pixel region the redundant values are reduced. Furthermore, the use of BPV helps to find out more relevant frames. Thus the proposed method is more efficient face detection process as compared to the previous processes in the field of face detection system.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231044"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231044"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231044; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231044]").text(description); $(".js-view-count[data-work-id=84231044]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231044; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231044']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231044, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231044]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231044,"title":"A New Approach for Efficient Face Detection Using BPV Algorithm Based on Mathematical Modeling","translated_title":"","metadata":{"abstract":"In this paper several face detection algorithms are compared on the basis of mathematical analysis to find out the most efficient algorithm. At first the mathematical model of different face detection algorithms (Camshift, AdaBoost, LBP and Viola Jones algorithms) are analyzed and compared to find out the most efficient one. Mathematical results show that Viola Jones performs best result to detect the face. But in case of Viola Jones, integral image integrates the non-face region pixels with face region pixels as a result, the pixel value redundancy is occurred which degrades its efficiency. To overcome this problem, a new face detection algorithm is proposed in this paper which is named as Break Point Value (BPV) algorithm. The mathematical model of our proposed method is derived where integral images are compared with Local Binary Pattern (LBP) and the compared value is suggested as test value. If the test value is less than or equal to the BPV then the region is a face region and if it is not, the region is a non-face region. Since there is a comparison between integral image value and LBP value of the same pixel region the redundant values are reduced. Furthermore, the use of BPV helps to find out more relevant frames. Thus the proposed method is more efficient face detection process as compared to the previous processes in the field of face detection system.","publisher":"Springer Singapore","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Proceedings of International Joint Conference on Computational Intelligence"},"translated_abstract":"In this paper several face detection algorithms are compared on the basis of mathematical analysis to find out the most efficient algorithm. At first the mathematical model of different face detection algorithms (Camshift, AdaBoost, LBP and Viola Jones algorithms) are analyzed and compared to find out the most efficient one. Mathematical results show that Viola Jones performs best result to detect the face. But in case of Viola Jones, integral image integrates the non-face region pixels with face region pixels as a result, the pixel value redundancy is occurred which degrades its efficiency. To overcome this problem, a new face detection algorithm is proposed in this paper which is named as Break Point Value (BPV) algorithm. The mathematical model of our proposed method is derived where integral images are compared with Local Binary Pattern (LBP) and the compared value is suggested as test value. If the test value is less than or equal to the BPV then the region is a face region and if it is not, the region is a non-face region. Since there is a comparison between integral image value and LBP value of the same pixel region the redundant values are reduced. Furthermore, the use of BPV helps to find out more relevant frames. Thus the proposed method is more efficient face detection process as compared to the previous processes in the field of face detection system.","internal_url":"https://www.academia.edu/84231044/A_New_Approach_for_Efficient_Face_Detection_Using_BPV_Algorithm_Based_on_Mathematical_Modeling","translated_internal_url":"","created_at":"2022-08-06T08:22:45.402-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_New_Approach_for_Efficient_Face_Detection_Using_BPV_Algorithm_Based_on_Mathematical_Modeling","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":26817,"name":"Algorithm","url":"https://www.academia.edu/Documents/in/Algorithm"}],"urls":[{"id":22675095,"url":"http://link.springer.com/content/pdf/10.1007/978-981-13-7564-4_30"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231043"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231043/Collaborative_Task_Offloading_for_Overloaded_Mobile_Edge_Computing_in_Small_Cell_Networks"><img alt="Research paper thumbnail of Collaborative Task Offloading for Overloaded Mobile Edge Computing in Small-Cell Networks" class="work-thumbnail" src="https://attachments.academia-assets.com/89326515/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231043/Collaborative_Task_Offloading_for_Overloaded_Mobile_Edge_Computing_in_Small_Cell_Networks">Collaborative Task Offloading for Overloaded Mobile Edge Computing in Small-Cell Networks</a></div><div class="wp-workCard_item"><span>2020 International Conference on Information Networking (ICOIN)</span><span>, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c4acfd2e233fd20f9c4a1f056a8bdb29" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326515,&quot;asset_id&quot;:84231043,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326515/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231043"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231043"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231043; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231043]").text(description); $(".js-view-count[data-work-id=84231043]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231043; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231043']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231043, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c4acfd2e233fd20f9c4a1f056a8bdb29" } } $('.js-work-strip[data-work-id=84231043]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231043,"title":"Collaborative Task Offloading for Overloaded Mobile Edge Computing in Small-Cell Networks","translated_title":"","metadata":{"publisher":"IEEE","grobid_abstract":"Mobile Edge Computing (MEC) enhances mobile cloud computing capabilities by fetching services close to the edge of the network, which adds 4C (Computing, Communication, Control and Caching) to the edges. MECenabled small cell network is regarded as the key technology in future 5G networks where for rapid task execution, a user offloads their tasks to the nearest small BS (SBS). The research work regarding MEC-enabled small cell network is still in its infancy. Recently, some researchers are trying to integrate MEC with small cell networks (SCNs) while ignoring the unlimited computation resource in a remote cloud and the computational capability of a single SBS-MEC server, which has the limited capacity for handling huge number of user request. To effectively handle latency-sensitive tasks and resources-hungry mobile applications in small-cell networks, two collaborative task offloading schemes of our proposed model is introduced in this paper. Our proposed collaborative model can make decision dynamically where the SBS-MEC server collaborate with mobile devices or remote cloud for executing the computation tasks. The simulation results confirm that collaborative task offloading between mobile with SBS-MEC scheme will reduce the average number of task failure more efficiently than other schemes and the collaborative task offloading between SBS-MEC with cloud scheme will provide lower task execution latency than others in small-cell networks.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"2020 International Conference on Information Networking (ICOIN)","grobid_abstract_attachment_id":89326515},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231043/Collaborative_Task_Offloading_for_Overloaded_Mobile_Edge_Computing_in_Small_Cell_Networks","translated_internal_url":"","created_at":"2022-08-06T08:22:45.197-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326515,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326515/thumbnails/1.jpg","file_name":"Collaborative_20Task_20Offloading_20for_20Overloaded_20Mobile_20Edge_20Computing_20in_20Small-Cell_20Networks.pdf","download_url":"https://www.academia.edu/attachments/89326515/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Collaborative_Task_Offloading_for_Overlo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326515/Collaborative_20Task_20Offloading_20for_20Overloaded_20Mobile_20Edge_20Computing_20in_20Small-Cell_20Networks-libre.pdf?1659800616=\u0026response-content-disposition=attachment%3B+filename%3DCollaborative_Task_Offloading_for_Overlo.pdf\u0026Expires=1732825484\u0026Signature=Bz9NeAe1ysr5p8WT1qWjNRMTr24axK~iDoiW1e4RKLhY0wOK~OMgGeK9-tjZlLiM~1CUt-OKDp7chYib1QHFV2MFCK7swVVeTyAd3nZlf2A9PGPxle1owO25UA-HfOBVjA678XLiBQUPz31wj9qU9ule~tuUHUx~k1e0nCKohJc5jRsMAKwGm6OIWYkCRUnXDBw8VkQzTtPVyI1lS7pgd2e~oNi8X2RQySdO3bVZODhHQ0hQhg2vrTN0J~ybynfDbI2uK2Mk97foulefBwOR7jtSQtoVB59IY4~RlgHj~NzFilEWOXQaPoZ1vY7Oa4SYlZ5JYhXUnxorpxeW0sKxvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Collaborative_Task_Offloading_for_Overloaded_Mobile_Edge_Computing_in_Small_Cell_Networks","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326515,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326515/thumbnails/1.jpg","file_name":"Collaborative_20Task_20Offloading_20for_20Overloaded_20Mobile_20Edge_20Computing_20in_20Small-Cell_20Networks.pdf","download_url":"https://www.academia.edu/attachments/89326515/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Collaborative_Task_Offloading_for_Overlo.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326515/Collaborative_20Task_20Offloading_20for_20Overloaded_20Mobile_20Edge_20Computing_20in_20Small-Cell_20Networks-libre.pdf?1659800616=\u0026response-content-disposition=attachment%3B+filename%3DCollaborative_Task_Offloading_for_Overlo.pdf\u0026Expires=1732825484\u0026Signature=Bz9NeAe1ysr5p8WT1qWjNRMTr24axK~iDoiW1e4RKLhY0wOK~OMgGeK9-tjZlLiM~1CUt-OKDp7chYib1QHFV2MFCK7swVVeTyAd3nZlf2A9PGPxle1owO25UA-HfOBVjA678XLiBQUPz31wj9qU9ule~tuUHUx~k1e0nCKohJc5jRsMAKwGm6OIWYkCRUnXDBw8VkQzTtPVyI1lS7pgd2e~oNi8X2RQySdO3bVZODhHQ0hQhg2vrTN0J~ybynfDbI2uK2Mk97foulefBwOR7jtSQtoVB59IY4~RlgHj~NzFilEWOXQaPoZ1vY7Oa4SYlZ5JYhXUnxorpxeW0sKxvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":2236574,"name":"Mobile Edge Computing","url":"https://www.academia.edu/Documents/in/Mobile_Edge_Computing"}],"urls":[{"id":22675094,"url":"http://xplorestaging.ieee.org/ielx7/8999388/9016415/09016452.pdf?arnumber=9016452"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231042"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231042/Efficient_Load_Management_in_Multi_Access_Edge_Computing_Using_Fuzzy_Logic"><img alt="Research paper thumbnail of Efficient Load Management in Multi-Access Edge Computing Using Fuzzy Logic" class="work-thumbnail" src="https://attachments.academia-assets.com/89326514/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231042/Efficient_Load_Management_in_Multi_Access_Edge_Computing_Using_Fuzzy_Logic">Efficient Load Management in Multi-Access Edge Computing Using Fuzzy Logic</a></div><div class="wp-workCard_item"><span>KIISE Transactions on Computing Practices</span><span>, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="4655bc9bdffba6a6470bd6328bb27ea6" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326514,&quot;asset_id&quot;:84231042,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326514/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231042"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231042"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231042; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231042]").text(description); $(".js-view-count[data-work-id=84231042]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231042; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231042']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231042, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "4655bc9bdffba6a6470bd6328bb27ea6" } } $('.js-work-strip[data-work-id=84231042]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231042,"title":"Efficient Load Management in Multi-Access Edge Computing Using Fuzzy Logic","translated_title":"","metadata":{"publisher":"Korean Institute of Information Scientists and Engineers","grobid_abstract":"We consider an elliptic problem with unknowns on the boundary of the domain of the elliptic equation and suppose that the right-hand side of this equation is square integrable and that the boundary data are arbitrary (specifically, irregular) distributions. We investigate local (up to the boundary) properties of generalized solutions to the problem in Hilbert distribution spaces that belong to the refined Sobolev scale. These spaces are parametrized with a real number and a function that varies slowly at infinity. The function parameter refines the number order of the space. We prove theorems on local regularity and a local a priori estimate of generalized solutions to the problem under investigation. These theorems are new for Sobolev spaces as well.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"KIISE Transactions on Computing Practices","grobid_abstract_attachment_id":89326514},"translated_abstract":null,"internal_url":"https://www.academia.edu/84231042/Efficient_Load_Management_in_Multi_Access_Edge_Computing_Using_Fuzzy_Logic","translated_internal_url":"","created_at":"2022-08-06T08:22:45.059-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326514,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326514/thumbnails/1.jpg","file_name":"2006.08379.pdf","download_url":"https://www.academia.edu/attachments/89326514/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Efficient_Load_Management_in_Multi_Acces.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326514/2006.08379-libre.pdf?1659800608=\u0026response-content-disposition=attachment%3B+filename%3DEfficient_Load_Management_in_Multi_Acces.pdf\u0026Expires=1732825484\u0026Signature=Cc6lh8abglKJ4IzW6QhFaqFc4nLtdyjhjDipSGNYEwuiZYMQygGzbzhvGNDfOmCKdVqu152aKIbQECYWyvhFcQFK2XNaSxCEVpUdJ6p8E5mW251vXZ1ZZIs7tpzxx0nuWOf9zBMViLLzrBbkPjLOOGzx6P1RLBOxlBofUtnfe6BApbQ40YLlo0nX1LHq5OjUtGZ7iZ~w466x8jjdS3ZFwRv6lRJg7Qq~pFVqylMBEnzwB-8AUzCFNKBvN6fhIXvonPr~q5xrY07FAESheb7q0SuxbrpJgBY84ltDSZYJMIB~Td8JmGdB9JFQ3ny--eWa7cLC22Vs4vaA6Awk15oXSA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Efficient_Load_Management_in_Multi_Access_Edge_Computing_Using_Fuzzy_Logic","translated_slug":"","page_count":15,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326514,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326514/thumbnails/1.jpg","file_name":"2006.08379.pdf","download_url":"https://www.academia.edu/attachments/89326514/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Efficient_Load_Management_in_Multi_Acces.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326514/2006.08379-libre.pdf?1659800608=\u0026response-content-disposition=attachment%3B+filename%3DEfficient_Load_Management_in_Multi_Acces.pdf\u0026Expires=1732825484\u0026Signature=Cc6lh8abglKJ4IzW6QhFaqFc4nLtdyjhjDipSGNYEwuiZYMQygGzbzhvGNDfOmCKdVqu152aKIbQECYWyvhFcQFK2XNaSxCEVpUdJ6p8E5mW251vXZ1ZZIs7tpzxx0nuWOf9zBMViLLzrBbkPjLOOGzx6P1RLBOxlBofUtnfe6BApbQ40YLlo0nX1LHq5OjUtGZ7iZ~w466x8jjdS3ZFwRv6lRJg7Qq~pFVqylMBEnzwB-8AUzCFNKBvN6fhIXvonPr~q5xrY07FAESheb7q0SuxbrpJgBY84ltDSZYJMIB~Td8JmGdB9JFQ3ny--eWa7cLC22Vs4vaA6Awk15oXSA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231041"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231041/Expressive_Rule_Pattern_Based_Compression_with_Ranking_in_Horn_Rules_on_RDF_Style_KB"><img alt="Research paper thumbnail of Expressive Rule Pattern Based Compression with Ranking in Horn Rules on RDF Style KB" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231041/Expressive_Rule_Pattern_Based_Compression_with_Ranking_in_Horn_Rules_on_RDF_Style_KB">Expressive Rule Pattern Based Compression with Ranking in Horn Rules on RDF Style KB</a></div><div class="wp-workCard_item"><span>2021 IEEE International Conference on Big Data and Smart Computing (BigComp)</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">With the increasing growth of linked open datasets published in the RDF format, demands for RDF c...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">With the increasing growth of linked open datasets published in the RDF format, demands for RDF compression has been becoming extremely important. There are a number of structured compression schemes that consider the structural redundancies. A very few researches have done that focuses on compact representation. In this study, we compress the RDF datasets by using different semantic association rules learned from the RDF graphs. From the RDF datasets, our proposed system mines the logically related Horn rules for accomplishing higher compression. The system keeps the triples that match the antecedent part and deletes them while match with the head part of the rules. We have proposed the grammar based pattern system (GBS) to reduce the search space size and faster projection. Moreover, we also have proposed the ranking rules and top-k approach for effectively utilizing all the rules and decreasing the mining time. The experimental result affirms that our proposed system has achieved greater compression compared to the existing RB compression approach.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231041"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231041"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231041; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231041]").text(description); $(".js-view-count[data-work-id=84231041]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231041; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231041']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231041, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=84231041]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231041,"title":"Expressive Rule Pattern Based Compression with Ranking in Horn Rules on RDF Style KB","translated_title":"","metadata":{"abstract":"With the increasing growth of linked open datasets published in the RDF format, demands for RDF compression has been becoming extremely important. There are a number of structured compression schemes that consider the structural redundancies. A very few researches have done that focuses on compact representation. In this study, we compress the RDF datasets by using different semantic association rules learned from the RDF graphs. From the RDF datasets, our proposed system mines the logically related Horn rules for accomplishing higher compression. The system keeps the triples that match the antecedent part and deletes them while match with the head part of the rules. We have proposed the grammar based pattern system (GBS) to reduce the search space size and faster projection. Moreover, we also have proposed the ranking rules and top-k approach for effectively utilizing all the rules and decreasing the mining time. The experimental result affirms that our proposed system has achieved greater compression compared to the existing RB compression approach.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"2021 IEEE International Conference on Big Data and Smart Computing (BigComp)"},"translated_abstract":"With the increasing growth of linked open datasets published in the RDF format, demands for RDF compression has been becoming extremely important. There are a number of structured compression schemes that consider the structural redundancies. A very few researches have done that focuses on compact representation. In this study, we compress the RDF datasets by using different semantic association rules learned from the RDF graphs. From the RDF datasets, our proposed system mines the logically related Horn rules for accomplishing higher compression. The system keeps the triples that match the antecedent part and deletes them while match with the head part of the rules. We have proposed the grammar based pattern system (GBS) to reduce the search space size and faster projection. Moreover, we also have proposed the ranking rules and top-k approach for effectively utilizing all the rules and decreasing the mining time. The experimental result affirms that our proposed system has achieved greater compression compared to the existing RB compression approach.","internal_url":"https://www.academia.edu/84231041/Expressive_Rule_Pattern_Based_Compression_with_Ranking_in_Horn_Rules_on_RDF_Style_KB","translated_internal_url":"","created_at":"2022-08-06T08:22:44.891-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Expressive_Rule_Pattern_Based_Compression_with_Ranking_in_Horn_Rules_on_RDF_Style_KB","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":22675093,"url":"http://xplorestaging.ieee.org/ielx7/9373068/9373070/09373279.pdf?arnumber=9373279"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84231040"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84231040/Fuzzy_Based_Collaborative_Task_Offloading_Scheme_in_the_Densely_Deployed_Small_Cell_Networks_with_Multi_Access_Edge_Computing"><img alt="Research paper thumbnail of Fuzzy Based Collaborative Task Offloading Scheme in the Densely Deployed Small-Cell Networks with Multi-Access Edge Computing" class="work-thumbnail" src="https://attachments.academia-assets.com/89326511/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84231040/Fuzzy_Based_Collaborative_Task_Offloading_Scheme_in_the_Densely_Deployed_Small_Cell_Networks_with_Multi_Access_Edge_Computing">Fuzzy Based Collaborative Task Offloading Scheme in the Densely Deployed Small-Cell Networks with Multi-Access Edge Computing</a></div><div class="wp-workCard_item"><span>Applied Sciences</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Accelerating the development of the 5G network and Internet of Things (IoT) application, multi-ac...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Accelerating the development of the 5G network and Internet of Things (IoT) application, multi-access edge computing (MEC) in a small-cell network (SCN) is designed to provide computation-intensive and latency-sensitive applications through task offloading. However, without collaboration, the resources of a single MEC server are wasted or sometimes overloaded for different service requests and applications; therefore, it increases the user’s task failure rate and task duration. Meanwhile, the distinct MEC server has faced some challenges to determine where the offloaded task will be processed because the system can hardly predict the demand of end-users in advance. As a result, the quality-of-service (QoS) will be deteriorated because of service interruptions, long execution, and waiting time. To improve the QoS, we propose a novel Fuzzy logic-based collaborative task offloading (FCTO) scheme in MEC-enabled densely deployed small-cell networks. In FCTO, the delay sensitivity of the ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="58f06b893e38870e787b34aedf393ef2" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89326511,&quot;asset_id&quot;:84231040,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89326511/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84231040"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84231040"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84231040; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84231040]").text(description); $(".js-view-count[data-work-id=84231040]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84231040; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84231040']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84231040, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "58f06b893e38870e787b34aedf393ef2" } } $('.js-work-strip[data-work-id=84231040]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84231040,"title":"Fuzzy Based Collaborative Task Offloading Scheme in the Densely Deployed Small-Cell Networks with Multi-Access Edge Computing","translated_title":"","metadata":{"abstract":"Accelerating the development of the 5G network and Internet of Things (IoT) application, multi-access edge computing (MEC) in a small-cell network (SCN) is designed to provide computation-intensive and latency-sensitive applications through task offloading. However, without collaboration, the resources of a single MEC server are wasted or sometimes overloaded for different service requests and applications; therefore, it increases the user’s task failure rate and task duration. Meanwhile, the distinct MEC server has faced some challenges to determine where the offloaded task will be processed because the system can hardly predict the demand of end-users in advance. As a result, the quality-of-service (QoS) will be deteriorated because of service interruptions, long execution, and waiting time. To improve the QoS, we propose a novel Fuzzy logic-based collaborative task offloading (FCTO) scheme in MEC-enabled densely deployed small-cell networks. In FCTO, the delay sensitivity of the ...","publisher":"MDPI AG","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Applied Sciences"},"translated_abstract":"Accelerating the development of the 5G network and Internet of Things (IoT) application, multi-access edge computing (MEC) in a small-cell network (SCN) is designed to provide computation-intensive and latency-sensitive applications through task offloading. However, without collaboration, the resources of a single MEC server are wasted or sometimes overloaded for different service requests and applications; therefore, it increases the user’s task failure rate and task duration. Meanwhile, the distinct MEC server has faced some challenges to determine where the offloaded task will be processed because the system can hardly predict the demand of end-users in advance. As a result, the quality-of-service (QoS) will be deteriorated because of service interruptions, long execution, and waiting time. To improve the QoS, we propose a novel Fuzzy logic-based collaborative task offloading (FCTO) scheme in MEC-enabled densely deployed small-cell networks. In FCTO, the delay sensitivity of the ...","internal_url":"https://www.academia.edu/84231040/Fuzzy_Based_Collaborative_Task_Offloading_Scheme_in_the_Densely_Deployed_Small_Cell_Networks_with_Multi_Access_Edge_Computing","translated_internal_url":"","created_at":"2022-08-06T08:22:44.721-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":128920438,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89326511,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326511/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326511/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Fuzzy_Based_Collaborative_Task_Offloadin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326511/pdf-libre.pdf?1659800618=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Based_Collaborative_Task_Offloadin.pdf\u0026Expires=1732825484\u0026Signature=BwDl-tRqItx5vZ0L3nxrHP4d2m7UGLULUFQBlN6P7m8UgI6pSm~hzHXRDGo0l2BVPhnj2DNfYdayuC0rVvmkJPNLlcEMx3957fyyGX8skKbCruW0MkpuD6vvKuRWn18HSOP0-u1FZtntIwhHpdDYIiYNUHBVs50bH1exAxHVB~ftpwsogKLIqX2Dlmw43WDFh6gZ-35CW4ObLGw8CDZJygshavNhxmz9R1Jwkj823uyK62iNybeyxjRwHT4N~NXziGQPWunRep-KOiWP86pfaqadMqIUvOk0DkTwtGhES3-8tKCHP8g8BV88LJwfA-Or5inbpNT4vnuh5xqLNZ-rPw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Fuzzy_Based_Collaborative_Task_Offloading_Scheme_in_the_Densely_Deployed_Small_Cell_Networks_with_Multi_Access_Edge_Computing","translated_slug":"","page_count":23,"language":"en","content_type":"Work","owner":{"id":128920438,"first_name":"Tangina","middle_initials":null,"last_name":"Sultana","page_name":"TanginaSultana","domain_name":"khu","created_at":"2019-10-01T00:54:29.909-07:00","display_name":"Tangina Sultana","url":"https://khu.academia.edu/TanginaSultana"},"attachments":[{"id":89326511,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326511/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326511/download_file?st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&st=MTczMjgyMTg4NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Fuzzy_Based_Collaborative_Task_Offloadin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326511/pdf-libre.pdf?1659800618=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Based_Collaborative_Task_Offloadin.pdf\u0026Expires=1732825484\u0026Signature=BwDl-tRqItx5vZ0L3nxrHP4d2m7UGLULUFQBlN6P7m8UgI6pSm~hzHXRDGo0l2BVPhnj2DNfYdayuC0rVvmkJPNLlcEMx3957fyyGX8skKbCruW0MkpuD6vvKuRWn18HSOP0-u1FZtntIwhHpdDYIiYNUHBVs50bH1exAxHVB~ftpwsogKLIqX2Dlmw43WDFh6gZ-35CW4ObLGw8CDZJygshavNhxmz9R1Jwkj823uyK62iNybeyxjRwHT4N~NXziGQPWunRep-KOiWP86pfaqadMqIUvOk0DkTwtGhES3-8tKCHP8g8BV88LJwfA-Or5inbpNT4vnuh5xqLNZ-rPw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":89326517,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326517/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326517/download_file","bulk_download_file_name":"Fuzzy_Based_Collaborative_Task_Offloadin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326517/pdf-libre.pdf?1659800626=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Based_Collaborative_Task_Offloadin.pdf\u0026Expires=1732825484\u0026Signature=OBjke0apFj2AJ4RTtrbkBYt5nggkQv1ObY51083Z-3a~qrRZqeNlrI37hgRB8chSXZ-3T7vwq~L7cb9rM~jpWgt8duE1WT3qxon9MDdLBi1aJsl6FFgNEZP4e-5h-B9WiIE~ZLNZk-WhqCVKYXGUPWP~Ixh7jiXx3C94X4~U1CTuK1XnYXOCBLVlV67juKj7Us4bKzJiV4pP5VI0FF4vUqJRuVg5TPyenkTcyZ-H8aFYKosz1KUiy0I5AqOtX355aTdHFIwXjk-iO2ZJBjBfd9iQK7YZrvyYD01mysAzuGOWC~r3bDXankybnUsET1PI6mpUVN66sEnlzrqdJtO~FQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":89326510,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89326510/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/89326510/download_file","bulk_download_file_name":"Fuzzy_Based_Collaborative_Task_Offloadin.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89326510/pdf-libre.pdf?1659800635=\u0026response-content-disposition=attachment%3B+filename%3DFuzzy_Based_Collaborative_Task_Offloadin.pdf\u0026Expires=1732825484\u0026Signature=H362OrCMUYygN-pv1hCGnqFhZpg9mbP-vOVpiE97xYb-B4Sxkr8314CB5p8G80mx2CdScSXTfGTN~Uu-MN9DZuonATvVvyfLu~8Awuhh0qqxlAfoLt~MMGkAYYkuRgC0SOcDRW2EvPBGwb0nvTJ5KcXvFcTOEsCevV4BoCuyo~rfZwIwr7tW0u2-CRRrdMOsXs8cxH0~H3u1YS3TbKXsW~CYyckazKxmMyntcn7vVT2p6nuH7IKIEjtow7MrLFgpL3ttQJcCSywymEveFhZYtODtln5hjQWSmk9b-c2V1jcltmjyhMv1Jms-mDwrIRGQJPJDgUSvGPdRXHPmefaN5A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":4165,"name":"Fuzzy Logic","url":"https://www.academia.edu/Documents/in/Fuzzy_Logic"},{"id":159232,"name":"Applied Sciences","url":"https://www.academia.edu/Documents/in/Applied_Sciences"},{"id":1623056,"name":"Small Cell Networks","url":"https://www.academia.edu/Documents/in/Small_Cell_Networks"},{"id":2236574,"name":"Mobile Edge Computing","url":"https://www.academia.edu/Documents/in/Mobile_Edge_Computing"},{"id":2525525,"name":"Edge Computing","url":"https://www.academia.edu/Documents/in/Edge_Computing"}],"urls":[{"id":22675092,"url":"https://www.mdpi.com/2076-3417/10/9/3115/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "7133eae74e02a17bf52e9eb00d5780d4c4054d3bf41a4c8201c35deb28d3fc51", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="ufvUcY64oTm2lOYoZDWbzF1eDoiTLLb2t5AGP/0nXEkz7tKCpmYWAeXIDCedblaZYTg9YCnXxN/mr40eTSOcsw==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://khu.academia.edu/TanginaSultana" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="6W81W8jPeBNVWLJ+vLacciUvVBVzX2Y7muB017trBJ9jejOo4BHPKwYEWHFF7VEnGUln/cmkFBLL3//2C2/EZQ==" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10