As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive...
详细信息
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive,and privacy-aware vehicular applications in Io V result in the transformation from cloud computing to edge computing,which enables tasks to be offloaded to edge nodes(ENs) closer to vehicles for efficient execution. In ITS environment,however, due to dynamic and stochastic computation offloading requests, it is challenging to efficiently orchestrate offloading decisions for application requirements. How to accomplish complex computation offloading of vehicles while ensuring data privacy remains challenging. In this paper, we propose an intelligent computation offloading with privacy protection scheme, named COPP. In particular, an Advanced Encryption Standard-based encryption method is utilized to implement privacy protection. Furthermore, an online offloading scheme is proposed to find optimal offloading policies. Finally, experimental results demonstrate that COPP significantly outperforms benchmark schemes in the performance of both delay and energy consumption.
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com...
详细信息
ISBN:
(纸本)9798350351507
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into computer science education, targeting undergraduate juniors/seniors and graduate students. Many safety-critical systems and services crucially depend on correct and reliable behavior. Formal methods can play a key role in ensuring correct and safe system behavior, yet remain underutilized in educational and industry contexts. Aims: We aim to (1) qualitatively assess the state of formal methods in computer science programs, (2) construct level-appropriate examples that could be included midway into one's undergraduate studies, (3) demonstrate how to address successive 'failuresy' through progressively stringent safety and liveness requirements, and (4) establish an ongoing framework for assessing interest and relevance among students. Methods: We detail our pedagogical strategy for embedding TLA+ into an intermediate course on formal methods at our institution. After starting with a refresher on mathematical logic, students specify the rules of simple puzzles in TLA+ and use its included model checker (known as TLC) to find a solution. We gradually escalate to more complex, dynamic, event-driven systems, such as the control logic of a microwave oven, where students will study safety and liveness requirements. We subsequently discuss explicit concurrency, along with thread safety and deadlock avoidance, by modeling bounded counters and buffers. Results: Our initial findings suggest that through careful curricular design and choice of examples and tools, it is possible to inspire and cultivate a new generation of software engineers proficient in formal methods. Conclusions: Our initial efforts suggest that 84% of our students had a positive experience in our formal methods course. Our future plans include a longitudinal analysis within our own institution and
There is an emerging interest in using agile methodologies in Global software Development(GSD)to get the mutual benefits of both *** is currently admired by many development teams as an agile most known meth-odology a...
详细信息
There is an emerging interest in using agile methodologies in Global software Development(GSD)to get the mutual benefits of both *** is currently admired by many development teams as an agile most known meth-odology and considered adequate for collocated *** the same time,stake-holders in GSD are dispersed by geographical,temporal,and socio-cultural *** to the controversial nature of Scrum and GSD,many significant challenges arise that might restrict the use of Scrum in *** conducted a Sys-tematic Literature Review(SLR)by following Kitchenham guidelines to identify the challenges that limit the use of Scrum in GSD and to explore the mitigation strategies adopted by practitioners to resolve the *** validate our reviewfindings,we conducted an industrial survey of 305 *** results of our study are consolidated into a research *** framework represents current best practices and recommendations to mitigate the identified distributed scrum challenges and is validated byfive experts of distributed *** of the expert review were found supportive,reflecting that the framework will help the stakeholders deliver sustainable products by effectively mitigating the identified challenges.
The growing field of urban monitoring has increasingly recognized the potential of utilizing autonomous technologies,particularly in drone *** deployment of intelligent drone swarms offers promising solutions for enha...
详细信息
The growing field of urban monitoring has increasingly recognized the potential of utilizing autonomous technologies,particularly in drone *** deployment of intelligent drone swarms offers promising solutions for enhancing the efficiency and scope of urban condition *** this context,this paper introduces an innovative algorithm designed to navigate a swarm of drones through urban landscapes for monitoring *** primary challenge addressed by the algorithm is coordinating drone movements from one location to another while circumventing obstacles,such as *** algorithm incorporates three key components to optimize the obstacle detection,navigation,and energy efficiency within a drone ***,the algorithm utilizes a method to calculate the position of a virtual leader,acting as a navigational beacon to influence the overall direction of the ***,the algorithm identifies observers within the swarm based on the current *** further refine obstacle avoidance,the third component involves the calculation of angular velocity using fuzzy *** approach considers the proximity of detected obstacles through operational rangefinders and the target’s location,allowing for a nuanced and adaptable computation of angular *** integration of fuzzy logic enables the drone swarm to adapt to diverse urban conditions dynamically,ensuring practical obstacle *** proposed algorithm demonstrates enhanced performance in the obstacle detection and navigation accuracy through comprehensive *** results suggest that the intelligent obstacle avoidance algorithm holds promise for the safe and efficient deployment of autonomous mobile drones in urban monitoring applications.
Pneumonia is a dangerous respiratory disease due to which breathing becomes incredibly difficult and painful;thus,catching it early is *** physicians’time is limited in outdoor situations due to many patients;therefo...
详细信息
Pneumonia is a dangerous respiratory disease due to which breathing becomes incredibly difficult and painful;thus,catching it early is *** physicians’time is limited in outdoor situations due to many patients;therefore,automated systems can be a *** input images from the X-ray equipment are also highly unpredictable due to variances in radiologists’***,radiologists require an automated system that can swiftly and accurately detect pneumonic lungs from chest *** medical classifications,deep convolution neural networks are commonly *** research aims to use deep pretrained transfer learning models to accurately categorize CXR images into binary classes,i.e.,Normal and *** MDEV is a proposed novel ensemble approach that concatenates four heterogeneous transfer learning models:Mobile-Net,DenseNet-201,EfficientNet-B0,and VGG-16,which have been finetuned and trained on 5,856 CXR *** evaluation matrices used in this research to contrast different deep transfer learning architectures include precision,accuracy,recall,AUC-roc,and *** model effectively decreases training loss while increasing *** findings conclude that the proposed MDEV model outperformed cutting-edge deep transfer learning models and obtains an overall precision of 92.26%,an accuracy of 92.15%,a recall of 90.90%,an auc-roc score of 90.9%,and f-score of 91.49%with minimal data pre-processing,data augmentation,finetuning and hyperparameter adjustment in classifying Normal and Pneumonia chests.
In the present paper, a comprehensive review was performed on the application of technology acceptance models (TAM) in the healthcare sector. The important post-2019 published papers were searched and extracted by the...
详细信息
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the d...
详细信息
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the disease are characterized by a paucity of observable symptoms,which necessitates the prompt creation of automated and robust diagnostic *** traditional research focuses on image-level diagnostics that attend to the left and right eyes in isolation without making use of pertinent correlation data between the two sets of *** addition,they usually only target one or a few different kinds of eye diseases at the same *** this study,we design a patient-level multi-label OD(PLML_ODs)classification model that is based on a spatial correlation network(SCNet).This model takes into consideration the relevance of patient-level diagnosis combining bilateral eyes and multi-label ODs ***_ODs is made up of three parts:a backbone convolutional neural network(CNN)for feature extraction i.e.,DenseNet-169,a SCNet for feature correlation,and a classifier for the development of classification *** DenseNet-169 is responsible for retrieving two separate sets of attributes,one from each of the left and right *** then,the SCNet will record the correlations between the two feature sets on a pixel-by-pixel *** the attributes have been analyzed,they are integrated to provide a representation at the patient *** the whole process of ODs categorization,the patient-level representation will be *** efficacy of the PLML_ODs is examined using a soft margin loss on a dataset that is readily accessible to the public,and the results reveal that the classification performance is significantly improved when compared to several baseline approaches.
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
Mobile Edge Computing (MEC) and Edge Robotics have recently emerged as transformative technologies, revolutionizing industries by enabling real-time processing, decision-making, and automation at the network edge. How...
详细信息
暂无评论