n this paper, the repair problem for erasures beyond locality in locally repairable codes is explored under a practical system setting, where a rack-aware storage system consists of racks, each containing a few parity...
详细信息
For each smart home, the need of energy consumption supervision is necessary, which plays an important role to ensure the highest power quality and to enhance the stability of the whole grid. The current document impl...
详细信息
ISBN:
(纸本)9781665482622
For each smart home, the need of energy consumption supervision is necessary, which plays an important role to ensure the highest power quality and to enhance the stability of the whole grid. The current document implements a smart home supply strategy based on endless resources to reduce the electricity bill and confirm the energy balance. In this context, a proposed supervision algorithm operates in eight cases to reach optimal energy flow between renewable generators, home battery and grid in a smart home concept is presented. The system is evaluated using the framework “Business Process Model and Notation” (BPMN) Camunda basing on information stored in Firebase Cloud and results are presented in order to manifest the efficiency of this control strategy.
Multi-modality image fusion (MMIF) entails synthesizing images with detailed textures and prominent objects. Existing methods tend to use general feature extraction to handle different fusion tasks. However, these met...
详细信息
The first important step in extracting DNA characters is using the output data of MinION devices in the form of electrical current signals. Various cutting-edge base callers use this data to detect the DNA characters ...
详细信息
Energy conservation dictates that an electron with elementary charge e traversing a vacuum gap formed by electrodes maintained at potential difference U volts acquires maximum energy of eU. In many experiments electro...
详细信息
Energy conservation dictates that an electron with elementary charge e traversing a vacuum gap formed by electrodes maintained at potential difference U volts acquires maximum energy of eU. In many experiments electrons with energies as high as 3eU have been observed. The experimental discovery of this effect was made over 50 years ago and is still a subject of significant controversy in applications related to x-ray generation from high voltage discharges. Here we explain these observations by a sequential increase of energy of runaway electrons released from the cathode due to the photoelectric absorption of bremsstrahlung radiation generated by the previous cycle of runaway electrons bombarding the anode.
Spatial range query enjoys widespread application scenarios due to the ever-growing geo-positioning technology in recent years. Huge amounts of encrypted geo-location data are being outsourced to cloud servers to alle...
Spatial range query enjoys widespread application scenarios due to the ever-growing geo-positioning technology in recent years. Huge amounts of encrypted geo-location data are being outsourced to cloud servers to alleviate local storage and computational overheads without leaking sensitive information. However, most existing Privacy-preserving Spatial Range Query (PSRQ) cannot achieve high efficiency while satisfying strong security over large-scale encrypted spatial data. To strike a best possible balance between security and efficiency, we propose a novel efficient Privacy-preserving Spatial Range Query (eP-SRQ) scheme in dual-cloud architecture over large-scale dataset. Specifically, we propose an efficient PSRQ scheme by designing a novel index structure based on Geohash algorithm, Circular Shift and Coalesce Zero-Sum Garbled Bloom Filter (CSC-ZGBF) and Symmetric Homomorphic Encryption (SHE), which makes the computational complexity of query process independent of dataset size. Formal security analysis proves that our scheme can achieve Indistinguishability against Chosen-Plaintext Attack (IND-CPA), and extensive experiments prove that our scheme is feasible in real-world applications.
This paper investigates the vulnerability of the Alternating Direction Method of Multipliers (ADMM) algorithm to shared data manipulation, with a focus on solving optimal power flow (OPF) problems. Deliberate data man...
详细信息
A direct adaptive equalizer (DAE) coupled with a phase-locked loop (PLL) has been proved as an efficient receiver scheme for single-carrier coherent underwater acoustic (UWA) communications. Ever since its birth, nume...
A direct adaptive equalizer (DAE) coupled with a phase-locked loop (PLL) has been proved as an efficient receiver scheme for single-carrier coherent underwater acoustic (UWA) communications. Ever since its birth, numerous improvements have been proposed for the DAE. In contrast, the PLL has been somehow overlooked. A PLL with predetermined coefficients suffers performance degradation when channel conditions change, then a variable-parameter (VP) PLL designed via gradient descent (GD) method was proposed. The GD-VP-PLL is sensitive to parameter initialization though. In this paper, we propose a new VP-PLL scheme in light of the recursive Gauss-Newton (RGN) method. The resulting RGN-VP-PLL has been tested by at-sea experimental data, and showed better performance than the GD-VP-PLL and a PLL with fixed coefficients. Moreover, it is insensitive to initialization of parameters.
In this paper, we employ multiple UAVs coordinated by a base station (BS) to help the ground users (GUs) to offload their sensing data. Different UAVs can adapt their trajectories and network formation to expedite dat...
详细信息
Mobile edge computing (MEC) can extend computing power at the edge of wireless networks by migrating compute-intensive tasks to MEC servers, which has the potential to enable compute-intensive applications in 5G netwo...
Mobile edge computing (MEC) can extend computing power at the edge of wireless networks by migrating compute-intensive tasks to MEC servers, which has the potential to enable compute-intensive applications in 5G networks. However, whether to offload tasks and how much edge computing resources to allocate to it is an NP-hard problem. In this paper, a MEC system enabled multi-user wireless network is proposed, in which the access point (AP) is equipped with a MEC server that provides computing resources for mobile users through task offloading. Then, the issue of task offloading and resource allocation is formulated as a mixed integer nonlinear program to minimize the overhead of the entire MEC system, represented by a weighted sum of delay and energy consumption. Furthermore, a collaborative neurodynamic optimization (CNO) with levy mutation operator (CNO-LMO) algorithm is proposed for searching global optimal solutions to the formulated problem. Finally, the experimental results are given to verify the superiority of the proposed CNO-LMO in reducing the overhead of the MEC system compared to some other algorithms.
暂无评论