As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an Advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
Code reuse is a pivotal practice in software development, promoting efficiency, reducing redundancy, and ensuring higher quality software products. Recommender systems play a crucial role in this process by suggesting...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a...
详细信息
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a few research studies have focused on the application of ML especially supervised learning techniques in Requirement engineering(RE)activities to solve the problems that occur in RE *** authors focus on the systematic mapping of past work to investigate those studies that focused on the application of supervised learning techniques in RE activities between the period of 2002–*** authors aim to investigate the research trends,main RE activities,ML algorithms,and data sources that were studied during this ***-five research studies were selected based on our exclusion and inclusion *** results show that the scientific community used 57 *** those algorithms,researchers mostly used the five following ML algorithms in RE activities:Decision Tree,Support Vector Machine,Naïve Bayes,K-nearest neighbour Classifier,and Random *** results show that researchers used these algorithms in eight major RE *** activities are requirements analysis,failure prediction,effort estimation,quality,traceability,business rules identification,content classification,and detection of problems in requirements written in natural *** selected research studies used 32 private and 41 public data *** most popular data sources that were detected in selected studies are the Metric Data Programme from NASA,Predictor Models in softwareengineering,and iTrust Electronic Health Care System.
Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into sever...
详细信息
Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into several pieces by the XOR coding, and each piece is routed via different paths. Then, an adversary cannot obtain the original message unless she eavesdrops on all message pieces from all the paths. In this paper, we extend such an approach into secure multicast routing, which is a one-to-many communication primitive. To this end, we propose the multi-tree-based avoidance multicast routing protocol (AMRP) for WSNs, in which a set of adversary disjoint trees is discovered, i.e., a set of multicast trees with no common adversaries. When a set of multicast trees is adversary disjoint, no adversary can eavesdrop on all message pieces to recover the original message. In addition, optimized AMRP (OAMRP) is proposed in order to reduce the control overhead of AMRP, where additional multicast trees are used for only a subset of destination nodes with no single safe tree. The simulation results demonstrate that the proposed protocols achieve higher secure delivery rates than a simple extension of the existing unicast avoidance routing protocol. IEEE
In neurology, it is critical to promptly and precisely identify epileptic episodes using EEG data. Interpretability and thorough model evaluation are still crucial to guarantee reliability, even though machine learnin...
详细信息
Data security is becoming more and more crucial due to developments in communication and information technology, particularly when it comes to video transmission. This research provides a unique approach that combines...
详细信息
In the contemporary landscape, autonomous vehicles (AVs) have emerged as a prominent technological advancement globally. Despite their widespread adoption, significant hurdles remain, with security standing out as a c...
详细信息
Spam emails are sent to recipients for advertisement and phishing purposes. In either case, it disturbs recipients and reduces communication quality. Addressing this issue requires classifying emails on servers as eit...
详细信息
Real-time systems experience many safety and performance issues at run time due to different uncertainties in the environment. Systems are now becoming highly interactive and must be able to execute in a changing envi...
详细信息
Real-time systems experience many safety and performance issues at run time due to different uncertainties in the environment. Systems are now becoming highly interactive and must be able to execute in a changing environment without experiencing any failure. A real-time system can have multiple modes of operation such as safety and performance. The system can satisfy its safety and performance requirements by switching between the modes at run time. It is essential for the designers to ensure that a multi-mode real-time system operates in the expected mode at run time. In this paper, we present a verification model that identifies the expected mode at run time and checks whether the multi-mode real-time system is operating in the correct mode or not. To determine the expected mode, we present a monitoring module that checks the environment of the system, identifies different real-world occurrences as events, determines their properties and creates an event-driven dataset for failure analysis. The dataset consumes less memory in comparison to the raw input data obtained from the monitored environment. The event-driven dataset also facilitates onboard decision-making because the dataset allows the system to perform a safety analysis by determining the probability of failure in each environmental situations. We use the probability of failure of the system to determine the safety mode in different environmental situations. To demonstrate the applicability of our proposed scheme, we design and implement a real-time traffic monitoring system that has two modes: safety, and performance. The experimental analysis of our work shows that the verification model can identify the expected operating mode at run time based on the safety (probability of failure) and performance (usage) requirements of the system as well as allows the system to operate in performance mode (in 3295 out of 3421 time intervals) and safety mode (in 126 out of 3421 time intervals). The experimental resul
In the emergence of greener transportation, electric vehicles (EVs) play an important role, where the accurate prediction of the driving range is pivotal for alleviating driver range anxiety, serving as a foundation f...
详细信息
暂无评论