In task offloading, the movement of vehicles causes the switching of connected RSUs and servers, which may lead to task offloading failure or high service delay. In this paper, we analyze the impact of vehicle movemen...
详细信息
In task offloading, the movement of vehicles causes the switching of connected RSUs and servers, which may lead to task offloading failure or high service delay. In this paper, we analyze the impact of vehicle movements on task offloading and reveal that data preparation time for task execution can be minimized via forward-looking scheduling. Then, a Bi-LSTM-based model is proposed to predict the trajectories of vehicles. The service area is divided into several equal-sized grids. If the actual position of the vehicle and the predicted position by the model belong to the same grid, the prediction is considered correct, thereby reducing the difficulty of vehicle trajectory prediction. Moreover, we propose a scheduling strategy for delay optimization based on the vehicle trajectory prediction. Considering the inevitable prediction error, we take some edge servers around the predicted area as candidate execution servers and the data required for task execution are backed up to these candidate servers, thereby reducing the impact of prediction deviations on task offloading and converting the modest increase of resource overheads into delay reduction in task offloading. Simulation results show that, compared with other classical schemes, the proposed strategy has lower average task offloading delays.
Freezing of gait (FoG) refers to sudden, relatively brief episodes of gait arrest in Parkinson’s disease, known to manifest in the advanced stages of the condition. Events of freezing are associated with tumbles, tra...
详细信息
With the widespread global trend of voice phishing or vishing attacks, the development of effective detection models using artificial intelligence (AI) has been hindered by the lack of high-quality and large volumes o...
详细信息
This paper explores the concept of isomorphism in cellular automata (CAs), focusing on identifying and understanding isomorphic relationships between distinct CAs. A cellular automaton (CA) is said to be isomorphic to...
详细信息
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo...
详细信息
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv...
详细信息
Repetition is the most prominent type of dysfluency in stuttered speech. Spectral energy, entropy, ZCR, and centroid are extracted using wavelet packet transformation, and similarity between these features for adjacen...
详细信息
Federated Learning (FL) is vulnerable to backdoor attacks - especially distributed backdoor attacks (DBA) that are more persistent and stealthy than centralized backdoor attacks. However, we observe that the attack ef...
详细信息
Recommendation systems (RS) have become prevalent across different domains including music, e-commerce, e-learning, entertainment, and social media to address the issue of information overload. While traditional RS ap...
详细信息
The detection of violence in videos has become an extremely valuable application in real-life situations, which aim to maintain and protect people’s safety. Despite the complexities inherent in videos and the abrupt ...
详细信息
暂无评论