Abstract
Under the current background of the times, China’s development is very rapid, taking advantage of the tide of the network revolution, all walks of life are changing with each passing day and developing rapidly. However, due to the explosive growth of information, the whole Internet is being threatened by many data streams, which makes it difficult for us to distinguish and analyze data. Therefore, according to the current situation, this paper proposes and studies several network data processing methods based on edge computing. Therefore, under the premise of protecting user data security and not violating the information security rules, in order to improve the efficiency of data processing, this paper compares the transformation and difference of data processing methods between the present and the past, studies relevant literature and examples, adopts questionnaire, and uses a variety of algorithms to construct mathematical models to obtain the experimental results. The experimental results show that the appropriate algorithm to construct the appropriate model has a significant effect on the general situation, which can improve the analysis speed by 20% and the accuracy rate by 10%.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Li, H., Ota, K., Dong, M.: Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Netw. 32(1), 96–101 (2018)
Chetty, N., Alathur, S.: An architecture for digital hate content reduction with mobile edge computing. Digital Commun. Netw. 6(2), 217–222 (2020)
Cordelli, E., Pennazza, G., et al.: An Open-Source Smart Sensor Architecture for Edge Computing in IoT Applications. Proceedings 2(13), 955–955 (2018)
Zhou, J., Tu, Y., Chen, Y., et al.: With sampled network data. J. Bus. Econ Stat. 35(1), 130–138 (2018)
Shem-Tov, I.B., Bekhor, S.: Extracting travel demand for emergency situations using location-social network data. Transp. Res. Procedia 45, 111–118 (2020)
Yu, M.M., Chen, L.H., Boros, E.: A meta-frontier network data envelopment analysiss approach for the measurement of the property bias with network production structure. Ann. Oper. Res. 287(1), 495–514 (2020)
Sina, M., Guzman, J.I.: Real option valuation of open pit mines with two processing methods. J. Commod. Markets 13, 30–39 (2019)
Aberoumand, A.: Effects of processing methods on the composition of the composition of fish pampus argenteus (White pomfret) in iran. Potravinarstvo 14, 412–416 (2020)
Helma, C., Cramer, T., Kramer, S., et al.: Data mining and machine learnings for the product of the product of mutagenicity inducing substructures and structure activity relationships of noncongeneric compounds. J Chem. Inf. Comput. 35(4), 1402–1411 (2018)
Hong, H., Tsangaratos, P., Ilia, I., et al.: Application of fuzzy weight of evidence and data mining products in construction of flood susceptibility map of Poyang County, China. Sci. Total Environ. 625, 575–588 (2018)
Acknowledgement
This research was financially supported by both Scientific Research Project Fund of Jiangxi Province under Grant no. GJJ191100.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Jian, Y., Wu, W. (2021). Network Data Processing Methods Based on Edge Computing. In: Xu, Z., Parizi, R.M., Loyola-González, O., Zhang, X. (eds) Cyber Security Intelligence and Analytics. CSIA 2021. Advances in Intelligent Systems and Computing, vol 1342. Springer, Cham. https://doi.org/10.1007/978-3-030-70042-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-70042-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70041-6
Online ISBN: 978-3-030-70042-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)