IIC Journal of Innovation 5th Edition | Page 27

Edge Intelligence : The Central Cloud is Dead – Long Live the Edge Cloud !
alarm should that behavior change due to accident , attack etc . Since decision-making is local , the transmission bandwidth would be very low and latency could be in seconds . The intelligent gateway in this case would function only as a data consolidator and could also have UI , etc ., installed .
Physical Access Control – Tailgating Detection at Doors
Tailgating at security doors can be achieved by combining MI module and an inexpensive stereo camera , to ensure that only the right person got through secured doors . Badge readers ( BLE / RFID for example ) can add additional security ,: i . e ., the door opens as the person approaches , but only if a valid signal is read from each person ( if there is more than one ) approaching . If more than one person approaches , and fewer badge signals are read , then an alarm will be registered if they all enter the doorway . By using an inexpensive camera with a processing module , latency and bandwidth are reduced over sending to the cloud .
Fire Detection via Surveillance Cameras
An MI module is used with access to video streams incoming from non-specialized video cameras and scans those streams for fire traces using a trained model . In the case of a fire , latency is an issue , and the local processing can greatly increase response to minimize loss . When there are no incidents , bandwidth is minimized and only summary data is sent .
TECHNOLOGY GAPS intelligence that need to be addressed to support requirements for the use described in the previous section .
Factory Productivity Improvement
( 1 ) Credibility of information generated by edge computing
In order to realize edge intelligence , it is necessary to establish credible data , as the data are the raw materials for future analysis and decision-making . Now , there are technologies which can be used to ensure the credibility of data exist , such as technologies to secure the identity and the integrity of device-generating data and technologies to protect information being communicated over a network . In addition to enhancing technologies , systematic ways to guarantee credibility of the data by making use of such technologies and operational measures including physical security .
( 2 ) Assisted / automatic
optimization
of
system operation
In order to reduce the operational cost , it is necessary to optimize system operation and to adjust operational parameters more efficiently . At present , many productivity decisions in a factory are done manually by experienced engineers , and even the data for such decision-making can be collected . It would be desirable to make optimization easier by automating data collection and assisting engineers in the optimization analysis , ultimately automating optimization processes .
This section describes different technological gaps related to edge
IIC Journal of Innovation - 25 -