Skip to main content

Network Data Processing Methods Based on Edge Computing

  • Conference paper
  • First Online:
  • 1068 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1342))

Abstract

Under the current background of the times, China’s development is very rapid, taking advantage of the tide of the network revolution, all walks of life are changing with each passing day and developing rapidly. However, due to the explosive growth of information, the whole Internet is being threatened by many data streams, which makes it difficult for us to distinguish and analyze data. Therefore, according to the current situation, this paper proposes and studies several network data processing methods based on edge computing. Therefore, under the premise of protecting user data security and not violating the information security rules, in order to improve the efficiency of data processing, this paper compares the transformation and difference of data processing methods between the present and the past, studies relevant literature and examples, adopts questionnaire, and uses a variety of algorithms to construct mathematical models to obtain the experimental results. The experimental results show that the appropriate algorithm to construct the appropriate model has a significant effect on the general situation, which can improve the analysis speed by 20% and the accuracy rate by 10%.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Li, H., Ota, K., Dong, M.: Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Netw. 32(1), 96–101 (2018)

    Article  Google Scholar 

  2. Chetty, N., Alathur, S.: An architecture for digital hate content reduction with mobile edge computing. Digital Commun. Netw. 6(2), 217–222 (2020)

    Article  Google Scholar 

  3. Cordelli, E., Pennazza, G., et al.: An Open-Source Smart Sensor Architecture for Edge Computing in IoT Applications. Proceedings 2(13), 955–955 (2018)

    Google Scholar 

  4. Zhou, J., Tu, Y., Chen, Y., et al.: With sampled network data. J. Bus. Econ Stat. 35(1), 130–138 (2018)

    Article  Google Scholar 

  5. Shem-Tov, I.B., Bekhor, S.: Extracting travel demand for emergency situations using location-social network data. Transp. Res. Procedia 45, 111–118 (2020)

    Article  Google Scholar 

  6. Yu, M.M., Chen, L.H., Boros, E.: A meta-frontier network data envelopment analysiss approach for the measurement of the property bias with network production structure. Ann. Oper. Res. 287(1), 495–514 (2020)

    Article  MathSciNet  Google Scholar 

  7. Sina, M., Guzman, J.I.: Real option valuation of open pit mines with two processing methods. J. Commod. Markets 13, 30–39 (2019)

    Google Scholar 

  8. Aberoumand, A.: Effects of processing methods on the composition of the composition of fish pampus argenteus (White pomfret) in iran. Potravinarstvo 14, 412–416 (2020)

    Article  Google Scholar 

  9. Helma, C., Cramer, T., Kramer, S., et al.: Data mining and machine learnings for the product of the product of mutagenicity inducing substructures and structure activity relationships of noncongeneric compounds. J Chem. Inf. Comput. 35(4), 1402–1411 (2018)

    Google Scholar 

  10. Hong, H., Tsangaratos, P., Ilia, I., et al.: Application of fuzzy weight of evidence and data mining products in construction of flood susceptibility map of Poyang County, China. Sci. Total Environ. 625, 575–588 (2018)

    Google Scholar 

Download references

Acknowledgement

This research was financially supported by both Scientific Research Project Fund of Jiangxi Province under Grant no. GJJ191100.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ying Jian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jian, Y., Wu, W. (2021). Network Data Processing Methods Based on Edge Computing. In: Xu, Z., Parizi, R.M., Loyola-González, O., Zhang, X. (eds) Cyber Security Intelligence and Analytics. CSIA 2021. Advances in Intelligent Systems and Computing, vol 1342. Springer, Cham. https://doi.org/10.1007/978-3-030-70042-3_11

Download citation

Publish with us

Policies and ethics