Computational offloading, as one of the means to reduce latency and energy consumption in mobile edge computing (MEC), can reduce industrial costs through reasonable offloading decisions. A mixed-integer nonlinear opt...
详细信息
The coexistence of URLLC and eMBB services are very important for high data rate and low latency services in 5th Generation(5G) mobile network. But it is a difficult challenge to optimize resource allocation through e...
详细信息
Imaging photo-plethysmography (IPPG) technique has been proven to detect heart rate (HR) with a camera. Currently it might be used in a rigid scenario, such as the static subject, the short measurement distance and go...
详细信息
Real-time distance estimation with high accuracy is crucial to robot applications such as navigation and obstacle negotiation. However, considering the truth that high accuracy brings huge computation, the previous wo...
详细信息
Cognitive radio(CR) is a concept to improve the utilization of scarce spectrum resources in wirelesscommunication, and orthogonal frequency division multiplexing (OFDM) is regarded as the best technology to match wit...
详细信息
With the appearance of RGB-D cameras, 3D reconstruction becomes convenient. Previous studies focused on the objects with strong structural features. But for the objects with weak structure, such as rotationally symmet...
详细信息
With the rapid popularization of smartphones, various applications (Application: APP) have come into being. Therefore, automated testing of mobile applications is particularly important. At present, the automated test...
详细信息
The ability to realize human-motion imitation using robots is closely related to developments in the field of artificial intelligence. However, it is not easy to imitate human motions entirely owing to the physical di...
详细信息
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-...
详细信息
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in wirelesssensornetworks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.
Grant-free access successfully reduces the overhead and delay of signaling in the scenario of ultra-reliable low-latency communications (URLLC). However, it is also prone to conflict in the case of high load, resultin...
详细信息
暂无评论