In this paper,we explore a distributed collaborative caching and computing model to support the distribution of adaptive bit rate video *** aim is to reduce the average initial buffer delay and improve the quality of ...
详细信息
In this paper,we explore a distributed collaborative caching and computing model to support the distribution of adaptive bit rate video *** aim is to reduce the average initial buffer delay and improve the quality of user *** the difference between global and local video popularities and the time-varying characteristics of video popularity,a two-stage caching scheme is proposed to push popular videos closer to users and minimize the average initial buffer *** on both long-term content popularity and short-term content popularity,the proposed caching solution is decouple into the proactive cache stage and the cache update *** the proactive cache stage,we develop a proactive cache placement algorithm that can be executed in an off-peak *** the cache update stage,we propose a reactive cache update algorithm to update the existing cache policy to minimize the buffer *** results verify that the proposed caching algorithms can reduce the initial buffer delay efficiently.
The phenomenal popularity of smart mobile computing hardware is enabling pervasive edge intelligence and ushering us into a digital twin ***,the natural barrier between edge equipment owned by different interested par...
详细信息
The phenomenal popularity of smart mobile computing hardware is enabling pervasive edge intelligence and ushering us into a digital twin ***,the natural barrier between edge equipment owned by different interested parties poses unique challenges for cross-domain trust *** addition,the openness of radio access and the accessibility of edge services render edge intelligence systems vulnerable and put sensitive user data in *** paper presents an intrusion protection mechanism for edge trust transfer to address the inter-edge trust management issue and the conundrum of detecting indistinguishable malevolent nodes launching weak ***,an inter-edge reputation transfer framework is established to leverage the trust quality of different edges to retain the accumulated trust histories of users when they roam in multi-edge environments ***,a fine-grained intrusion protection system is proposed to reduce the negative impact of attacks on user interactions and improve the overall trust quality and system security of edge intelligence *** experimental results validate the effectiveness and superior performance of the proposed intrusion protection for edge trust transfer in securing,enhancing,and consolidating edge intelligence services.
The Joint Video Experts Team(JVET)has announced the latest generation of the Versatile Video Coding(VVC,H.266)*** in-loop filter in VVC inherits the De-Blocking Filter(DBF)and Sample Adaptive Offset(SAO)of High Effici...
详细信息
The Joint Video Experts Team(JVET)has announced the latest generation of the Versatile Video Coding(VVC,H.266)*** in-loop filter in VVC inherits the De-Blocking Filter(DBF)and Sample Adaptive Offset(SAO)of High Efficiency Video Coding(HEVC,H.265),and adds the Adaptive Loop Filter(ALF)to minimize the error between the original sample and the decoded ***,for chaotic moving video encoding with low bitrates,serious blocking artifacts still remain after in-loop filtering due to the severe quantization distortion of texture *** tackle this problem,this paper proposes a Convolutional Neural network(CNN)based VVC in-loop filter for chaotic moving video encoding with low ***,a blur-aware attention network is designed to perceive the blurring effect and to restore texture ***,a deep in-loop filtering method is proposed based on the blur-aware network to replace the VVC in-loop ***,experimental results show that the proposed method could averagely save 8.3%of bit consumption at similar subjective ***,under close bit rate consumption,the proposed method could reconstruct more texture information,thereby significantly reducing the blocking artifacts and improving the visual quality.
Offloading Mobile Devices(MDs)computation tasks to Edge Nodes(ENs)is a promising solution to overcome computation and energy resources limitations of ***,there exists an unreasonable profit allocation problem between ...
详细信息
Offloading Mobile Devices(MDs)computation tasks to Edge Nodes(ENs)is a promising solution to overcome computation and energy resources limitations of ***,there exists an unreasonable profit allocation problem between MDs and ENs caused by the excessive concern on MD *** this paper,we propose an auction-based computation offloading algorithm,inspiring ENs to provide high-quality service by maximizing the profit of ***,a novel cooperation auction framework is designed to avoid overall profit damage of ENs,which is derived from the high computation delay at the overloaded ***,the bidding willingness of each MD in every round of auction is determined to ensure MD ***,we put forward a payment rule for the pre-selected winner to effectively guarantee auction ***,the auction-based profit maximization offloading algorithm is proposed,and the MD is allowed to occupy the computation and spectrum resources of the EN for offloading if it wins the *** results verify the performance of the proposed *** with the VA algorithm,the ENs profit is increased by 23.8%,and the task discard ratio is decreased by 7.5%.
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under...
详细信息
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under wideband dual-mode resonant operation. As theoretically predicted by the two resonant modes TE3/5,1and TE9/5,1within a 150° radiator, the operation principle is revealed at first. As have been numerically demonstrated and experimentally validated at 2.4-GHz band, the designed antenna exhibits a wide impedance bandwidth over 90.1%(i.e., 2.06–5.44 GHz), in which the stable gain bandwidth in the backfire,-x-direction(θ = 90°, φ = 180°) with peak value of 3.2 dBi and fluctuation less than 3 dB is up to 45.3%(i.e., 3.74–5.44 GHz). It is concluded that the stable wideband backfire gain frequency response should be owing to the high-order resonant mode in the unique sectorial monopole antennas.
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage...
详细信息
With the benefits of reducing time and workforce,automated testing has been widely used for the quality assurance of mobile applications(APPs).Compared with automated testing,manual testing can achieve higher coverage in complex interactive *** the effectiveness of manual testing is highly dependent on the user operation process(UOP)of experienced *** on the UOP,we propose an iterative Android automated testing(IAAT)method that automatically records,extracts,and integrates UOPs to guide the test logic of the tool across the complex Activity *** feedback test results can train the UOPs to achieve higher coverage in each *** extracted 50 UOPs and conducted experiments on 10 popular mobile APPs to demonstrate IAAT’s effectiveness compared with Monkey and the initial automated *** experimental results show a noticeable improvement in the IAAT compared with the test logic without human *** the 60 minutes test time,the average code coverage is improved by 13.98%to 37.83%,higher than the 27.48%of Monkey under the same conditions.
Cyber-Physical networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV...
详细信息
Cyber-Physical networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV).With the increasing popularity of digital photography and Internet technology,more and more users are sharing images on ***,many images are shared without any privacy processing,exposing hidden privacy risks and making sensitive content easily accessible to Artificial Intelligence(AI)*** image sharing methods lack fine-grained image sharing policies and cannot protect user *** address this issue,we propose a social relationship-driven privacy customization protection model for publishers and *** construct a heterogeneous social information network centered on social relationships,introduce a user intimacy evaluation method with time decay,and evaluate privacy levels considering user interest *** protect user privacy while maintaining image appreciation,we design a lightweight face-swapping algorithm based on Generative Adversarial network(GAN)to swap faces that need to be *** proposed method minimizes the loss of image utility while satisfying privacy requirements,as shown by extensive theoretical and simulation analyses.
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was propo...
详细信息
In the previous works, to further provide the continuous leakage resilience for the identity-based encryption scheme, a new cryptography primitive, called updatable identity-based hash proof system(U-IB-HPS),was proposed. However, most of the existing constructions have some deficiencies, they either do not have perfect key update function or the corresponding security with tight reduction relies on a non-static complexity assumption. To address the above problems, a new construction of U-IB-HPS is created, and the corresponding security of our system is proved based on the static complexity assumption. Also, the corresponding comparisons and analysis of performances show that our proposal not only achieves the perfect key update function and the anonymity, but also has the tight security reduction. In additional, our proposal achieves the same computational efficiency as other previous systems. To further illustrate the practical function of U-IB-HPS, a generic method of non-interactive data authorization protocol with continuous leakage resilience is designed by employing U-IB-HPS as an underlying tool, which can provide continuous leakage-resilient data authorization function for the cloud computing. Hence, the application field of U-IB-HPS is further extended through our study.
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual...
详细信息
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual-functional radar-communication base station detects a malicious radar target nearby and communicates with multiple legitimate users on the other side of the STAR-RIS. We utilize an integrated architecture that combines the fully-connected(FC)-RIS, an emerging type of beyond-diagonal(BD)-RIS, with the time-switching(TS)-STAR-RIS to enhance both the sensing and communications at the cost of possible target intercepting and propose the simultaneous-transmitting-and-reflecting fully-connected RIS(STAR-FCR) schemes to strike a balance between sensing and communications performance. Thereafter, observing the security-reliability performance tradeoff of the downlink ISAMC, we conduct closed-form analyses to compare COPs of round-robin scheduling(RS) and multiuser scheduling(MS) with the aid of a TS-based STAR-FC-RIS. Furthermore, we derive closed-form expressions of the sensing outage probability, communications outage probability(COP), and communications intercept probability, where an average of the three probabilities is exploited to obtain an optimized time allocation(OTA) of the *** results verify that the STAR-FCR-MS scheme outperforms the STAR-FCR-RS scheme in terms of sensing reliability and communications security. Moreover, an OTA remarkably enhances the overall performance of the STAR-FCR schemes of ISAMC systems.
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC n...
详细信息
The Multi-access Edge Cloud(MEC) networks extend cloud computing services and capabilities to the edge of the networks. By bringing computation and storage capabilities closer to end-users and connected devices, MEC networks can support a wide range of applications. MEC networks can also leverage various types of resources, including computation resources, network resources, radio resources,and location-based resources, to provide multidimensional resources for intelligent applications in 5/***, tasks generated by users often consist of multiple subtasks that require different types of resources. It is a challenging problem to offload multiresource task requests to the edge cloud aiming at maximizing benefits due to the heterogeneity of resources provided by devices. To address this issue,we mathematically model the task requests with multiple subtasks. Then, the problem of task offloading of multi-resource task requests is proved to be NP-hard. Furthermore, we propose a novel Dual-Agent Deep Reinforcement Learning algorithm with Node First and Link features(NF_L_DA_DRL) based on the policy network, to optimize the benefits generated by offloading multi-resource task requests in MEC networks. Finally, simulation results show that the proposed algorithm can effectively improve the benefit of task offloading with higher resource utilization compared with baseline algorithms.
暂无评论