Underwater communication systems experience obstacles like confined bandwidth, elevated energy consumption, propagation lags, end-to-end delay (E-ED), complex media accessibility control, resource allocation, and powe...
详细信息
WSNs are made up of a network of sensor nodes that are used to track environmental characteristics like pressure, temperature, etc. and communicate the data to the intended location. Networks must overcome obstacles i...
详细信息
Urban traffic management is a major challenge for cities worldwide, but with the help of technology, such as big data analytics and intelligent transport systems, cities are working to improve their situations. An int...
详细信息
Industrial cyber-physical systems (ICPS) refer to an emerging generation of intelligent systems, where distributed data acquisition is of great importance and is influenced by data transmission. In the improvement of ...
详细信息
ISBN:
(纸本)9781728143958
Industrial cyber-physical systems (ICPS) refer to an emerging generation of intelligent systems, where distributed data acquisition is of great importance and is influenced by data transmission. In the improvement of the overall performance of sensing accuracy and energy efficiency, sensing and transmission are tightly coupled. Due to the unknown transmission channel states in the harsh industrial field environment, intelligently performing sensor scheduling for distributed sensing is challenging. In this paper, edge computing technology is utilized to enhance the level of intelligence at the edge side and deploy advanced scheduling algorithms. We propose a learning-based distributed edge sensing-transmission co-design (LEST) algorithm under the coordination of the sensors and the edge computing unit (ECU). Deep reinforcement learning is applied to perform real-time sensor scheduling under unknown channel states. The conditions for the existence of feasible scheduling policies are analyzed. The proposed algorithm is applied to estimate the slab temperature in the hot rolling process, which is a typical ICPS. The simulation results demonstrate that the overall performance of LEST is better than other suboptimal algorithms.
We study the performance of online games played over a platform that implements gaming as a service (GaaS) in a mobile network slice that hosts concatenated virtual network functions (VNFs) at the edge. The distribute...
详细信息
ISBN:
(纸本)9798350390605;9783903176638
We study the performance of online games played over a platform that implements gaming as a service (GaaS) in a mobile network slice that hosts concatenated virtual network functions (VNFs) at the edge. The distributed gaming architecture is based on edge computing facilities, whose utilization must be carefully planned and managed, so as to satisfy the stringent performance requirements of game applications. The game manager must consider the latency between players and edge server VNFs, the capacity and load of edge servers, and the latency between edge servers used by interacting players. This calls for a careful choice about the allocation of players to edge server VNFs, aiming at extremely low latency in interactions resulting from player's commands. We develop an analytical model, which we validate with experiments in the wild, and show that, under several combinations of system parameters, deploying gaming VNFs at the edge can deliver better performance with respect to cloud gaming, in spite of the complexities arising from the distribution of gaming VNFs over edge servers. Our analytical model provides a useful tool for edge gaming systems performance prediction, thus supporting the management of GaaS applications.
The data fusion from sensors within the automotive vehicle is vital for improved accuracy and safety. The centralized and information matrix fusion (IMF) algorithms are famous for providing an optimal fusion estimate....
详细信息
This paper considers the well known Chief Executive Officer (CEO) scenario where each sensor in a network observes noisy versions of the same signal of interest. These measurements have to be locally compressed in ord...
详细信息
The proceedings contain 122 papers. The topics discuss include: centralization problem for opinion convergence in decentralized networks;annotators’ perspectives: exploring the influence of identity on interpreting m...
ISBN:
(纸本)9798400704093
The proceedings contain 122 papers. The topics discuss include: centralization problem for opinion convergence in decentralized networks;annotators’ perspectives: exploring the influence of identity on interpreting misogynoir;maximizing influence with graph neural networks;structure and dynamics of a charitable donor co-attendance network;how popularity shapes user interactions in tech-related online communities;together apart: decoding support dynamics in online COVID-19 communities;classifying severe weather events by utilizing social sensor data and social network analysis;the art of active listening;analyzing bias in recommender systems: a comprehensive evaluation of YouTube’s recommendation algorithm;exploring inequity in park usage amidst the COVID-19 pandemic;and understanding online attitudes with pre-trained language models.
Edge computing has become a very popular service that enables mobile devices to run complex tasks with the help of network-based computing resources. However, edge clouds are often resource-constrained, which makes re...
详细信息
ISBN:
(纸本)9781665449359
Edge computing has become a very popular service that enables mobile devices to run complex tasks with the help of network-based computing resources. However, edge clouds are often resource-constrained, which makes resource allocation a challenging issue. We focus on a distributed resource allocation method in which servers operate independently and do not communicate with each other, but interact with clients (tasks) to make allocation decisions. This provides robustness and does not require service providers to share information about their configurations or workloads. We propose a two-round bidding approach of assigning tasks to edge cloud servers, while taking into account various processing requirements and server constraints. We consider cases in which all jobs have equal utility, cases where jobs have different utilities but users do not disclose these utilities to servers, and cases where users disclose the utility of their jobs to servers. We evaluate the performance using extensive realistic simulations. Results show that our approach is very close to an optimal assignment, with discrepancy not exceeding 5%.
Human activity recognition (HAR) based on wearable devices has become an active research direction in the field of ubiquitous computing, and has a wide range of Internet of Things (IoT) applications. Unfortunately, it...
详细信息
暂无评论