Edge vs. Cloud computing: where to do image processing for surveillance?

被引:2
|
作者
Heredia, Andres [1 ]
Barros-Gavilanes, Gabriel [1 ,2 ]
机构
[1] Univ Azuay, LIDI, Ave 24 Mayo 7-77, Cuenca 010204, Ecuador
[2] Tivo Ec, Don Bosco 2-07, Cuenca 010205, Ecuador
来源
ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING IN DEFENSE APPLICATIONS | 2019年 / 11169卷
关键词
Performance analysis; automatic counter; Convolutional Neural Networks; image classification; SSD-MobileNet; Camera matrix; Homography;
D O I
10.1117/12.2533380
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Surveillance applications require transmission of video flows to a high performance remote server or perform onsite processing. In both cases, image analysis techniques are used to support tasks for situational awareness, such as: detection, classification, and tracking. Nowadays, neural networks are widely used as data driven Machine Learning methods. The hardware required for deploying state-of-the-art neural networks models implies massive and invasive installations. Embedded devices could be an alternative running with more modest settings. Then, it is important to understand which trade-off is better for this surveillance application. When a new camera angle lead to an unknown scenario, detection and classification deteriorates in terms of precision and recall. To solve this problem we analyze and predict the angles in different scenarios using homography techniques. We proposed the inclusion of more data sets and labeled images from different angles. This means that more images does not always mean better detection. We have a model by transfer of learning with images from scenarios with similar angles to the real environments of detection. We compare the performance of different implementations of an automated counter in an embedded device using a GPU versus a server performing the same task. Results show that an Edge computing implementation is possible with a good performance. Possible solutions involve regulating bit rate and skipping a specific number of frames (skip-n-frames) to rise the number of Frames per Second of the system. The results show that using both: an embedded device and a server is possible to perform real-time object detection and counting with precision values of around 92% in the embedded device and 93% in a server.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Edge vs. Cloud computing
    Mohr, Marie Platenius
    ABB Review, 2022, (03): : 74 - 75
  • [2] Investigating Edge vs. Cloud Computing Trade-offs for Stream Processing
    Silva, Pedro
    Costan, Alexandru
    Antoniu, Gabriel
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 469 - 474
  • [3] Edge Computing versus Cloud Computing: Impact on Retinal Image Pre-processing
    Kunas, Cristiano A.
    Pinto, Dayla R.
    Granville, Lisandro Z.
    Serpa, Matheus S.
    Padoin, Edson L.
    Navaux, Philippe O. A.
    2022 IEEE 34TH INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE AND HIGH PERFORMANCE COMPUTING WORKSHOPS (SBAC-PADW 2022), 2022, : 51 - 56
  • [4] Mobile-Edge Computing vs. Centralized Cloud Computing in Fiber-Wireless Access Networks
    Rimal, Bhaskar Prasad
    Dung Pham Van
    Maier, Martin
    2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [5] Centralized vs. Decentralized Cloud Computing in Healthcare
    Abughazalah, Mona
    Alsaggaf, Wafaa
    Saifuddin, Shireen
    Sarhan, Shahenda
    APPLIED SCIENCES-BASEL, 2024, 14 (17):
  • [6] Systematic Parameters vs. SLAs for Security in Cloud Computing
    Bohlol, Nahid
    Safari, Zohreh
    2015 9TH INTERNATIONAL CONFERENCE ON E-COMMERCE IN DEVELOPING COUNTRIES: WITH FOCUS ON E-BUSINESS (ECDC), 2015,
  • [7] EVALUATION OF CLOUD COMPUTING PLATFORM FOR IMAGE PROCESSING ALGORITHMS
    Altarawneh, Mokhled
    Alqaisi, Aws
    Salamah, Jamal Bani
    JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (04): : 2345 - 2358
  • [8] The unperceived boon and bane of Cloud Computing: End-user Computing vs. Integration
    Hetzenecker, Jochen
    Sprenger, Sebastian
    Kammerer, Sebastian
    Amberg, Michael
    AMCIS 2012 PROCEEDINGS, 2012,
  • [9] Where does security stand? New vulnerabilities vs. trusted computing
    Gueron, Shay
    Strdngin, Geoffrey
    Seifert, Jean-Pierre
    Chiou, Derek
    Sendag, Resit
    Yi, Joshua J.
    IEEE MICRO, 2007, 27 (06) : 25 - 35
  • [10] VISUAL VS AUDITORY PATTERN PROCESSING - WHERE DO WE LOOK, WHERE DO WE LISTEN
    AIKEN, LS
    LONO, MM
    BULLETIN OF THE PSYCHONOMIC SOCIETY, 1977, 10 (04) : 260 - 260