In the 5G/6G era of networking, computational offloading, i.e., the act of transferring resource-intensive computational tasks to separate external devices in the network proximity, constitutes a paradigm shift for mo...
In the 5G/6G era of networking, computational offloading, i.e., the act of transferring resource-intensive computational tasks to separate external devices in the network proximity, constitutes a paradigm shift for mobile task execution on Edge Computing infrastructures. However, in order to provide firm Quality of Service (QoS) assurances for all the involved users, meticulous planning of the offloading decisions should be made, which potentially involves inter-site task transferring. In this paper, we consider a multi-user, multi-site Multi-Access Edge Computing (MEC) infrastructure, where mobile devices (MDs) can offload their tasks to the available edge sites (ESs). Our goal is to minimize end-to-end delay and energy consumption, which constitute the sum cost of the considered system, and comply with the MDs’ application requirements. To this end, we introduce a two-stage Reinforcement Learning (RL)-based mechanism, where the MDs-to-ES task offloading and the ES-to-ES task transferring decisions are iteratively optimized. The proper operation, effectiveness and efficiency of our proposed offloading mechanism is assessed under various evaluation scenarios.
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one o...
Requirements Elicitation is the process of identifying system needs by talking with stakeholders who have a direct or indirect effect on the requirements. Requirements may be derived from several sources and are one of the most important phases of requirement engineering. We need to perform different elicitation techniques to find out the user's needs. Pre-requirements tracing is the process of determining the origins of a specific demand. Typically, certain needs arise that have no apparent source, but stakeholders will testify to their importance. Such criteria, however, are most likely dependent on tacit or tacit-like information entrenched in the issue domain. Tacit knowledge is one of the most common challenges for requirement analysts. This study contributes to constructing a systematic literature review for exploring multiple ways to model functional requirements using tacit knowledge. We have identified and analyzed 10 studies. In these research papers, different authors have discussed different methods to gather functional requirements from tacit knowledge.
In practice, extended Kalman filter (EKF) is one of the most popular lithium-ion battery (LIB) state of charge (SOC) estimation algorithms in electric vehicles onboard battery management system (BMS). With the increas...
In practice, extended Kalman filter (EKF) is one of the most popular lithium-ion battery (LIB) state of charge (SOC) estimation algorithms in electric vehicles onboard battery management system (BMS). With the increasing necessity of off-loading the computational burden and data storage capacity of onboard BMS, the application of battery digital twin and cloud-BMS are getting popularity. Therefore, to assess the performance of EKF in terms of accuracy, the computational time, and overall request and execution time, an EKF-based SOC estimation method is developed in the cloud platform of Amazon Web Services (AWS). For a specific battery test data set, the cloud-based EKF demonstrated a mean absolute error of 0.00226 and a request time of 0.028s that are highly satisfactory towards developing a digital twin enabled cloud-based BMS.
Image deblurring techniques that uses deep learning have shown great potential but due to low generalizability, noise immunity and the correlation among different pixels is not addressed in detail that results in unwa...
Image deblurring techniques that uses deep learning have shown great potential but due to low generalizability, noise immunity and the correlation among different pixels is not addressed in detail that results in unwanted artifact that appears in the deblurred image. To tackle this problem an end-to-end approach is proposed for the recovery of sharp image from blurred one without the estimation of blur kernel. A special type of attention module known as crosshatch attention is used after Residual Block of Generator model for removing noise and for the collection of correlation of different pixels in an image. Hybrid Loss function is defined which focus on different part of image and improve edges and texture details. The performance of the model for deblurring is measured on GoPro dataset. Our proposed model has slightly higher objective and subjective evaluation i-e PSNR, SSIM value and the visual results.
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based Networking (IBN), that envision the automatio...
As the network infrastructure grows, its configuration and service provisioning become a tedious process. Accordingly, new paradigms have emerged, such as the Intent-Based Networking (IBN), that envision the automation of the network configuration, while minimizing the human intervention. Specifically, IBN allows users to interact with the network through high-level and declarative requests, called intents, which later can be translated into low-level configurations. IBN can entail different scopes and target network infrastructures, while being domain specific, which can create several challenges in terms of the final activation of the requested intents. To this end, in this paper, we mainly focus on intents that are expressing security and Quality of Service (QoS) network services demands that can be translated into Service Function Chains (SFC) and automatically deployed over a campus network. Our work and depending on the security level expressed in the intent, tries to optimally decide the level of multi-tenancy or complete segregation of the users' services that can be achieved, while satisfying the network provider's objectives. In particular, an artificial intelligence inspired algorithm called Particle Swarm Optimization (PSO) is modeled that automatically tries to find the best placement of the intents, while satisfying the security and QoS requirements of the users issuing the intents.
Interferometric fiber optical gyroscopes (IFOGs) have become one of the widely used sensors of inertial technology and rotational seismology, owing to their high precision and stability. In recent years, the dual-pola...
详细信息
The paper demonstrates the process of developing mathematical models for identifying breakdowns of electric motors using machine learning methods. The authors have developed three mathematical models for identifying b...
详细信息
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate...
Recent trends in Network Function Virtualization (NFV) combined with Internet of Things (IoT) and 5G applications have reshaped the network service offering. In particular, Service Function Chains (SFCs) can associate network functions with physical and virtual resources towards providing a complete network service. Concurrently, the management of a continuously expanding network and the fulfillment of the applications’ requirements pave the way for autonomic network solutions. Intent Based Networking (IBN) is a novel paradigm that aims to achieve the automatic orchestration of network services and the assurance of their performance. Accordingly, in this paper, we propose a novel automated network assurance model, based on Model Predictive Control, to guarantee the Quality of Service (QoS) and security requirements of multi-tenant and IBN-enabled SFCs. In this context, corrective decisions are proactively taken, in the form of incoming intent relocations among the SFCs. The results reveal that our model can assure with high probability the application requirements and minimize QoS violations.
We propose a stealthy and powerful backdoor attack on neural networks based on data poisoning. In contrast to previous attacks, both the poison and the trigger in our method are stealthy. We are able to change the mo...
详细信息
Point clouds from real-world scenarios inevitably contain complex noise, significantly impairing the accuracy of downstream tasks. To tackle this challenge, cascading encoder-decoder architecture has become a conventi...
详细信息
暂无评论