Mobile Edge computing (MEC) is an emerging computing paradigm in which computational capabilities are pushed from the central cloud to the network edges. However, preserving the satisfactory quality-of-service (QoS) f...
详细信息
Mobile Edge computing (MEC) is an emerging computing paradigm in which computational capabilities are pushed from the central cloud to the network edges. However, preserving the satisfactory quality-of-service (QoS) for user applications is non-trivial among multiple densely dispersed yet capacity constrained MEC nodes. This is mainly because both the access network and edge nodes are vulnerable to network congestion. Previous works are mostly limited to optimizing the QoS through dynamic service placement, while ignoring the critical effects of access network selection on the network congestion. In this paper, we study the problem of jointly optimizing the access network selection and service placement for MEC, towards the goal of improving the QoS by balancing the access, switching and communication delay. Specifically, we first design an efficient online framework to decompose the long-term optimization problem into a series of one-shot problems. To address the NP-hardness of the one-shot problem, we further propose an iteration-based algorithm to derive a computation efficient solution. Both rigorous theoretical analysis on the optimality gap and extensive trace-driven simulations validate the efficacy of our proposed solution.
It is often claimed that inaccurate modularisation of crosscutting concerns hinders program comprehension and, as a consequence, leads to harmful software instabilities. However, recent studies have pointed out that c...
详细信息
It is often claimed that inaccurate modularisation of crosscutting concerns hinders program comprehension and, as a consequence, leads to harmful software instabilities. However, recent studies have pointed out that crosscutting concerns are not always harmful to design stability. Hence, software maintainers would benefit from well documented patterns of crosscutting concerns and a better understanding about their actual impact on design stability. This paper presents a catalogue of crosscutting concern patterns recurrently observed in software systems. These patterns are described and classified based on an intuitive vocabulary that facilitates their recognition by software engineers. We analysed instances of the crosscutting patterns in object-oriented and aspect-oriented versions of three evolving programs. The outcomes of our exploratory evaluation indicated that: (i) a certain category of crosscutting patterns seems to be good indicator of harmful instabilities, and (ii) aspect-oriented solutions were unable to modularise concerns matching some crosscutting patterns.
This study presents a computational methodology for developing a multi-ball system that automatically aligns during assembly processes. The contributions of this work are threefold: Firstly, a comprehensive error anal...
详细信息
This research proposes to modernize a legacy software system by using Web services as the main building blocks of the software reengineering. For this purpose, a legacy theorem proof checking and derivation tool calle...
详细信息
This research proposes to modernize a legacy software system by using Web services as the main building blocks of the software reengineering. For this purpose, a legacy theorem proof checking and derivation tool called Bertie3 is reengineered in terms of service-oriented architecture, service-oriented componentization, and external data representation and serialization. With the Web services of derivation checking engines and first-order markup languages, a minimal amount of development time can be spent working on well-known and well-developed components. More time can be spent updating the features that make the tool unique. This case study shows that modernizing a software system with Web services will allow the business components of the system to be easily expanded and integrated with other application components for future demands.
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ...
详细信息
As the e-Health world is geared up for a more efficient rollout of fast healthcare resources, we designed our new Rapid Delivery e-Health Service (RDeHS) platform, which not only streamlines standard conformance throu...
详细信息
ISBN:
(纸本)9781509033713
As the e-Health world is geared up for a more efficient rollout of fast healthcare resources, we designed our new Rapid Delivery e-Health Service (RDeHS) platform, which not only streamlines standard conformance through emerging technologies in e-Health resources. This paper reports the evolution in our new architectural approach for the purpose of rapid development and deployment of e-Health services to reduce healthcare costs and enhance quality of care.
This paper proposes the use of metaverse for computer science education by leveraging virtual reality (VR) and artificial intelligence (AI) technologies. VR glasses are used to record videos such as presentation slide...
详细信息
This paper proposes the use of metaverse for computer science education by leveraging virtual reality (VR) and artificial intelligence (AI) technologies. VR glasses are used to record videos such as presentation slides and classroom lectures in the metaverse. AI technologies automatically generate customized class notes summarized from the video recordings. This education metaverse can accommodate students' digital avatars in different virtual workspaces, including collaboration spaces, laboratories, and classrooms. It consists of practical features that mimic a physical classroom setup, such as real-time voice chat, avatar movement, and shared screen presentations. In the metaverse journey, the AI notes generator module is used to create personalized class notes using technologies including optical character recognition, automatic speech recognition, natural language processing, and text-to-speech. We discuss current progress and future work to prototype an AI-assisted metaverse for proof-of-concept experiments in computer science education.
In this paper, a hybrid Genetic Algorithm (GA) is proposed to solve the Vehicle Routing Problems with Dynamic Requests (VRPDR). The proposed hybrid GA primarily involves the following parts. First, a greedy split is i...
详细信息
In this paper, a hybrid Genetic Algorithm (GA) is proposed to solve the Vehicle Routing Problems with Dynamic Requests (VRPDR). The proposed hybrid GA primarily involves the following parts. First, a greedy split is introduced, which is fit for the VRPDR. Second, the adjacent-exchange-based local search is proposed. Third, a novel mutation operator, named the insert mutation, is proposed. The experimental results show that the proposed hybrid GA is effective.
Local markets in East Africa have been destroyed by raging fires,leading to the loss of life and property in the nearby *** circuits,arson,and neglected charcoal stoves are the major causes of these *** methods,i.e.,s...
详细信息
Local markets in East Africa have been destroyed by raging fires,leading to the loss of life and property in the nearby *** circuits,arson,and neglected charcoal stoves are the major causes of these *** methods,i.e.,satellites,are expensive to maintain and cause unnecessary ***,unit-smoke detectors are highly prone to false *** this paper,an Interval Type-2 TSK fuzzy model for an intelligent lightweight fire intensity detection algorithm with decision-making in low-power devices is proposed using a sparse inference rules approach.A free open–source MATLAB/Simulink fuzzy toolbox integrated into MATLAB 2018a is used to investigate the performance of the Interval Type-2 fuzzy *** crisp input parameters,namely:FIT and FIG��are *** show that the Interval Type-2 model achieved an accuracy value of FIO�=98.2%,MAE=1.3010,MSE=1.6938 and RMSE=1.3015 using regression *** study shall assist the firefighting personnel in fully understanding and mitigating the current level of fire *** a result,the proposed solution can be fully implemented in low-cost,low-power fire detection systems to monitor the state of fire with improved accuracy and reduced false *** informed decision-making in low-cost fire detection devices,early warning notifications can be provided to aid in the rapid evacuation of people,thereby improving fire safety surveillance,management,and protection for the market community.
暂无评论