Clustering problems are becoming more challenging as the quantity of data and unstructured data handling complexities is increasing. Such big amount and complex data that cannot handle by two days DBMS tools is known ...
详细信息
Applying the BFT consensus mechanism in the IoT edge computing environment effectively solves the problem of data consistency and trustworthiness. However, the existing BFT consensus mechanism needs to pay attention t...
详细信息
Unmanned aerial vehicles (UAVs) are commonly used for edge collaborative computing in current transmission line object detection, where computationally intensive tasks generated by user nodes are offloaded to more pow...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Unmanned aerial vehicles (UAVs) are commonly used for edge collaborative computing in current transmission line object detection, where computationally intensive tasks generated by user nodes are offloaded to more powerful edge servers for processing. However, performing edge collaborative processing on transmission line image data may result in serious privacy breaches. To address this issue, we propose a secure single-stage detection model called SecYOLOv7 that preserves the privacy of object detecting. Based on secure multi-party computation (MPC), a series of secure computing protocols are designed for the collaborative execution of Secure Feature Contraction, Secure Bounding-Box Prediction and Secure Object Classification by two non-edge servers. Performance evaluation shows that both computational and communication overhead in this framework as well as calculation error significantly outperform existing works.
Rapid and precise urban flood forecasting is crucial for promptly implementing preventive actions. This article presents a review of the literature focusing on soft computing techniques and algorithms for predicting u...
详细信息
This paper proposes an intelligent monitoring method based on Web semantics from three levels: data source, data acquisition layer, dataprocessing layer and application layer. In addition, this project will also stud...
详细信息
Anomaly detection of dynamic baseline performance time series data is an important problem in data center and cloud computing. In order to solve this problem, an anomaly detection method based on machine learning for ...
详细信息
A huge amount of information and data is now available in seconds through the internet. Due to the availability of internet in the world, as the amount of online news is increasing on the one hand, people are interest...
详细信息
The paper deals with the issues of improving the accuracy when performing the task of classifying several signals, where the main task is to determine the class of an object based on the data of the time series of thi...
详细信息
With the rapid increase of data traffic and real-time requirements for control-based services in the Electricity-Energy Internet, the information processing technologies of deterministic edge network has broad applica...
详细信息
ISBN:
(纸本)9798350309461
With the rapid increase of data traffic and real-time requirements for control-based services in the Electricity-Energy Internet, the information processing technologies of deterministic edge network has broad application prospects for real-time and high reliable transmission. However, the high dimensionality of sensing data, complex processingalgorithms, and difficulty in learning in deterministic edge networks pose high challenges to sampling detection. Therefore, a sampling period adaptive adjustment algorithm with dual-scale prediction is proposed in this paper. Dual-scale prediction is utilized, to depict the short term trend of power equipment's operation data and the long term fluctuation of them. The proposed algorithm realizes data reconstruction for the missing time points, which can greatly reduce the amount of transmitted data, thus satisfying high-quality transmission. Extensive simulation results validate that this proposed algorithm can effectively reduce the data reconstruction error through edge sensing.
In recent years, UA V technology has been developing rapidly, the pure orientation passive positioning of UAVs in formation flight is a hot research topic. Based on the circular formation formatted by 10 UAVs, a “UAV...
In recent years, UA V technology has been developing rapidly, the pure orientation passive positioning of UAVs in formation flight is a hot research topic. Based on the circular formation formatted by 10 UAVs, a “UAV three-point positioning” model is given to find the position coordinates of deviating UAVs using angle information; research found that 3 UAVs can achieve fuzzy positioning of UAVs when the UAV index is unknown, and at least 4 UAVs are needed to achieve accurate positioning. Based on the greedy algorithm, a model is established to find the optimal solution by multiple iterations using the “UA V three-point positioning” model, the MATLAB simulation result show that the error value is 10– 25 and basically remains constant after 7 iterations, which can be considered as optimal state, and the optimal adjustment solution is given. The theory that “if a convex polyhedron (convex polygon) formed by all known points has no symmetry plane (axis), the desired position can be uniquely determined by these points” is proved, base on this theory, general UA V location and position adjustment principle of any formation is given.
暂无评论