Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ...
详细信息
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part of 6G systems and efficient task offloading techniques using fog computing will improve their performance and *** this paper,the focus is on the scenario of Partial Offloading of a Task to Multiple Helpers(POMH)in which larger tasks are divided into smaller subtasks and processed in parallel,hence expediting task ***,using POMH presents challenges such as breaking tasks into subtasks and scaling these subtasks based on many interdependent factors to ensure that all subtasks of a task finish simultaneously,preventing resource ***,applying matching theory to POMH scenarios results in dynamic preference profiles of helping devices due to changing subtask sizes,resulting in a difficult-to-solve,externalities *** paper introduces a novel many-to-one matching-based algorithm,designed to address the externalities problem and optimize resource allocation within POMH ***,we propose a new time-efficient preference profiling technique that further enhances time optimization in POMH *** performance of the proposed technique is thoroughly evaluated in comparison to alternate baseline schemes,revealing many advantages of the proposed *** simulation findings indisputably show that the proposed matching-based offloading technique outperforms existing methodologies in the literature,yielding a remarkable 52 reduction in task latency,particularly under high workloads.
This paper investigates the use of Large Language Models (LLMs) and natural language prompts to generate hardware description code, namely Verilog. Building on our prior work, we employ employ OpenAI's ChatGPT4 an...
详细信息
Across the world, the lack of proper healthcare resources in rural areas significantly impacts the physical and economic well-being of individuals living there. There is a need for multi-faceted solutions to help alle...
详细信息
The end-to-end training of neural networks with multimodal data poses challenges beyond those observed for the training with unimodal data. The difficulty lies frequently in a network’s capacity to overfit and genera...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
The use of attention mechanisms in deep learning solutions has become popular within natural language processing tasks. The use of these mechanisms allows managing the relevance of the elements of a sequence in accord...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which...
详细信息
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which is directly related to the detection reliability and *** this paper,a strategy is proposed to integrate three currently competitive WA's evaluation ***,a conventional evaluation method based on AEF statistical indicators is *** evaluation approaches include competing AEF-based predicted value intervals,and AEF classification based on fuzzy *** AEF attributes contribute to a more accurate AEF classification to different *** resulting dynamic weighting applied to these attributes improves the classification *** evaluation method is applied to evaluate the WA of a particular AEF,to obtain the corresponding evaluation *** integration in the proposed strategy takes the form of a score *** cumulative score levels correspond to different final WA *** imaging is performed to visualize thunderstorm activities using those AEFs already evaluated to exhibit thunderstorm *** results confirm that the proposed strategy effectively and reliably images thunderstorms,with a 100%accuracy of WA *** is the first study to design an integrated thunderstorm detection strategy from a new perspective of WA evaluation,which provides promising solutions for a more reliable and flexible thunderstorm detection.
Evolutionary computation is a rapidly evolving field and the related algorithms have been successfully used to solve various real-world optimization *** past decade has also witnessed their fast progress to solve a cl...
详细信息
Evolutionary computation is a rapidly evolving field and the related algorithms have been successfully used to solve various real-world optimization *** past decade has also witnessed their fast progress to solve a class of challenging optimization problems called high-dimensional expensive problems(HEPs).The evaluation of their objective fitness requires expensive resource due to their use of time-consuming physical experiments or computer ***,it is hard to traverse the huge search space within reasonable resource as problem dimension *** evolutionary algorithms(EAs)tend to fail to solve HEPs competently because they need to conduct many such expensive evaluations before achieving satisfactory *** reduce such evaluations,many novel surrogate-assisted algorithms emerge to cope with HEPs in recent *** there lacks a thorough review of the state of the art in this specific and important *** paper provides a comprehensive survey of these evolutionary algorithms for *** start with a brief introduction to the research status and the basic concepts of ***,we present surrogate-assisted evolutionary algorithms for HEPs from four main *** also give comparative results of some representative algorithms and application ***,we indicate open challenges and several promising directions to advance the progress in evolutionary optimization algorithms for HEPs.
Cloud–edge collaboration and edge intelligence have greatly driven the growth of the industrial Internet of Things (IIoT). However, the jittery network delay and limited computational resources of edge servers make i...
详细信息
Detecting P300 event-related potentials (ERPs) from electroencephalography (EEG) finds applications in several domains including brain computer interfaces (BCIs). Due to the low signal-to-noise ratio (SNR), however, d...
详细信息
暂无评论