The Frontiers of Society, Science and Technology, 2019, 1(10); doi: 10.25236/FSST.2019.011016.
Kuo-Chi Chang1, Yuh-Chung Lin2, Kai-Chun Chu3*
1.2. Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou, China
3 Kai-Chun Chu, Department of Business Administration Group of Strategic Management of National Central University, Taoyuan, Taiwan
*Corresponding Author
With the continuous development of clinical technology in recent years, edge computing is closer to the source of data and data, and it provides an open platform for edge intelligence services. Edge computing technology is initially applied to cloud computing, and it has gained positive effects in many aspects. effect. This paper analyzes the characteristics of edge computing technology, and proposes the use of edge computing technology in the security industry to explore future development trends.
Security industry; Edge computing; Technology
Kuo-Chi Chang,Yuh-Chung Lin,Kai-Chun Chu. Application of Edge Computing Technology in the Security Industry. The Frontiers of Society, Science and Technology (2019) Vol. 1 Issue 10: 130-134. https://doi.org/10.25236/FSST.2019.011016.
[1] Liu F, Miao Z (2016). The Application of RFID Technology in Production Control in the Discrete Manufacturing Industry// IEEE International Conference on Video & Signal Based Surveillance. IEEE Computer Society, vol. 28, no. 1, pp. 164-169
[2] Lisok, Joanna (2016). Application of Modern Technology to Improve Safety in the Automotive Industry. Solid State Phenomena, vol. 246, no. 2, pp. 271-274.
[3] Song, Guijuan (2018). [IEEE 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)-Xiamen, China (2018.1.25-2018.1.26)] 2018 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS) - Application of Data Mining Technology in the CRM of Pharmaceutical Industry. vol. 57, no. 4, pp. 61-64.
[4] Li B, Lv S, Zhang Y, et al (2018). The Application of Trusted Computing Technology in the Cloud Security. Lecture Notes in Electrical Engineering, vol. 12, no. 1, pp.865-872.
[5] Netto A V (2015). Application of Interactive Technology for Training in the Security Area// 2015 XVII Symposium on Virtual and Augmented Reality (SVR). IEEE, vol. 28, no. 1, pp. 339-346.
[6] Zhang J, Chen B, Zhao Y, et al (2018). Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access, vol. 11, no. 3, pp. 57-61.
[7] Krüssel, Peter (2019). [Management for Professionals] Future Telco (Successful Positioning of Network Operators in the Digital Age) || Edge Computing: The Third Major Step in the Evolution of Telco Networks. vol. 118, no. 2, pp. 131-142