Leveraging Edge Computing for Video Data Streaming in UAV-Based Emergency Response Systems.

Sensors (Basel)

Department of Computer Science and Information Engineering, Chang Gung University, Guishan, Taoyuan 33302, Taiwan.

Published: August 2024

The rapid advancement of technology has greatly expanded the capabilities of unmanned aerial vehicles (UAVs) in wireless communication and edge computing domains. The primary objective of UAVs is the seamless transfer of video data streams to emergency responders. However, live video data streaming is inherently latency dependent, wherein the value of the video frames diminishes with any delay in the stream. This becomes particularly critical during emergencies, where live video streaming provides vital information about the current conditions. Edge computing seeks to address this latency issue in live video streaming by bringing computing resources closer to users. Nonetheless, the mobile nature of UAVs necessitates additional trajectory supervision alongside the management of computation and networking resources. Consequently, efficient system optimization is required to maximize the overall effectiveness of the collaborative system with limited UAV resources. This study explores a scenario where multiple UAVs collaborate with end users and edge servers to establish an emergency response system. The proposed idea takes a comprehensive approach by considering the entire emergency response system from the incident site to video distribution at the user level. It includes an adaptive resource management strategy, leveraging deep reinforcement learning by simultaneously addressing video streaming latency, UAV and user mobility factors, and varied bandwidth resources.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11314982PMC
http://dx.doi.org/10.3390/s24155076DOI Listing

Publication Analysis

Top Keywords

edge computing
12
video data
12
emergency response
12
live video
12
video streaming
12
video
8
data streaming
8
response system
8
streaming
5
leveraging edge
4

Similar Publications

Corrigendum: Abnormal respiratory sounds classification using deep CNN through artificial noise addition.

Front Med (Lausanne)

January 2025

Department of Computer and Network Engineering, College of Information Technology, UAE University, Al Ain, United Arab Emirates.

[This corrects the article DOI: 10.3389/fmed.2021.

View Article and Find Full Text PDF

This study aims to examine the landscape transformation and temperature dynamics using multiple spectral indices. The processes of temporal fluctuations in the land surface temperature is strongly related to the morphological features of the area in which the temperature is determined, and the given factors significantly affect the thermal properties of the surface. This research is being conducted in Pakistan to identify the vegetation cover, water bodies, impervious surfaces, and land surface temperature using decadal remote sensing data with four intervals during 1993-2023 in the Mardan division, Khyber Pakhtunkhwa.

View Article and Find Full Text PDF

Human-Validated Neural Networks for Precise Amastigote Categorization and Quantification to Accelerate Drug Discovery in Leishmaniasis.

ACS Omega

January 2025

Laboratory of Natural Products and Mass Spectrometry (LAPNEM), Faculty of Pharmaceutical Sciences, Food, and Nutrition (FACFAN), Federal University of Mato Grosso do Sul, Campo Grande, Mato Grosso do Sul 79070-900, Brazil.

Leishmaniases present a significant global health challenge with limited and often inadequate treatment options available. Traditional microscopic methods for detecting Leishmania amastigotes are time-consuming and error-prone, highlighting the need for automated approaches. This study aimed to implement and validate the YOLOv8 deep learning model for real-time detection, quantification, and categorization of Leishmania amastigotes to enhance drug screening assays.

View Article and Find Full Text PDF

Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment.

Sci Rep

January 2025

Department of Instrumentation Engineering, Madras Institute of Technology Campus, Anna University, Chromepet, Chennai 44, India.

Cloud Computing (CC) is a fast emerging field that enables consumers to access network resources on-demand. However, ensuring a high level of security in CC environments remains a significant challenge. Traditional encryption algorithms are often inadequate in protecting confidential data, especially digital images, from complex cyberattacks.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!