Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer an...
详细信息
Recent years have witnessed the proliferation of Internet of Things(IoT),in which billions of devices are connected to the Internet,generating an overwhelming amount of *** is challenging and infeasible to transfer and process trillions and zillions of bytes using the current cloud-device architecture.
We consider the problem of functional, random data classification from equidistant samples. Such data are frequently not easy for classification when one has a large number of observations that bear low information fo...
详细信息
The study aims to numerically investigate the flow boiling of Al2O3/H2O and CuO/H2O nanofluids and water in pipes filled with copper metal foams. Four different values of porosity and three values of pore density have...
详细信息
Context. Technical Debt (TD) is a term for software solutions that are beneficial in the short-term but impede future ***. Previous research on TD indicates various management-related causes. We analyze the perspectiv...
详细信息
Several solutions have been proposed for vehicle navigation in unknown environments to ensure safer driving by avoiding obstacles and collisions. In this work, an electric vehicle equipped with Mecanum 4 omnidirection...
Several solutions have been proposed for vehicle navigation in unknown environments to ensure safer driving by avoiding obstacles and collisions. In this work, an electric vehicle equipped with Mecanum 4 omnidirectional holonomic wheels, analog joystick to control driving movement, LiDAR sensors and Wi-Fi able to detect obstacles is investigated based on neural network approach. By experimental tests conducted to avoid collisions by detecting the presence of obstacles, the relation between the resistance distance and speed is described by the artificial neural network.
The rapid growth of AI-enabled Internet of Vehicles (IoV) calls for efficient machine learning (ML) solutions that can handle high vehicular mobility and decentralized data. This has motivated the emergence of Hierarc...
详细信息
Recent trends point towards communication networks will be multi-path in nature to increase failure resilience, support load-balancing and provide alternate paths for congestion avoidance. We argue that the transition...
详细信息
Recent trends point towards communication networks will be multi-path in nature to increase failure resilience, support load-balancing and provide alternate paths for congestion avoidance. We argue that the transition from single-path to multi-path routing should be as seamless as possible in order to lower the deployability barrier for network operators. Therefore, in this paper we are focusing on the problem of routing along the shortest pairs of disjoint paths between each source-destination pair over the currently deployed link-state routing architecture. We show that the union of disjoint path-pairs towards a given destination has a special structure, and we propose an efficient tag encoding scheme which requires only one extra forwarding table entry per router per destination. Our numerical evaluations demonstrate that in real-world topologies usually only 4 bit tags are sufficient in the packet headers to route on the disjoint path-pairs. Finally, we show that our tags automatically encode additional paths beyond the shortest pair of disjoint paths, including the shortest paths themselves, which enables incremental deployment of the proposed method.
Case studies of games by self-interested agents with totally positive externalities are provided. To that end, theoretical results on the class of games by self-interested agents with totally positive externalities ar...
详细信息
Case studies of games by self-interested agents with totally positive externalities are provided. To that end, theoretical results on the class of games by self-interested agents with totally positive externalities are stated. Then, by focusing on four types of games, various properties of the class of games by self-interested agents with totally positive externalities are illustrated.
This paper proposes a novel role switching scheme (RSS) to optimize the secure communication by the cooperation of multiple unmanned aerial vehicles (UAVs). Each UAV is enabled to switch its role during the flight, i....
This paper proposes a novel role switching scheme (RSS) to optimize the secure communication by the cooperation of multiple unmanned aerial vehicles (UAVs). Each UAV is enabled to switch its role during the flight, i.e., could be an aerial relay to serve ground users (GUs) or a friendly jammer to generate artificial noise (AN) to deteriorate the wiretapping of potential eavesdropper users (EUs). It's worthy to be noticed that the joint optimization for UAVs' trajectory and legitimate GUs' transmission power control with RSS is a non-convex mixed integer fractional programming problem. A multi-agent deep reinforcement learning (MADRL) combined successive convex approximate (SCA) algorithm is further designed to maximize the achievable secrecy energy efficiency (ASEE). Numerical results illustrate that compared with the role fixed scheme (RFS) and relaxation based SCA approaches, the proposed DRL-SCA algorithm endows UAVs the capacity to fly close enough to target users (both GUs and EUs) which brings a better achievable secrecy rate (ASR), less energy consumption and higher ASEE.
暂无评论