Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user *** this paper,computational offloading in F-RAN is considered,wher...
详细信息
Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user *** this paper,computational offloading in F-RAN is considered,where multiple User Equipments(UEs)offload their computational tasks to the F-RAN through fog *** UE can select one of the fog nodes to offload its task,and each fog node may serve multiple *** tasks are computed by the fog nodes or further offloaded to the cloud via a capacity-limited fronhaul *** order to compute all UEs'tasks quickly,joint optimization of UE-Fog association,radio and computation resources of F-RAN is proposed to minimize the maximum latency of all *** min-max problem is formulated as a Mixed Integer Nonlinear Program(MINP).To tackle it,first,MINP is reformulated as a continuous optimization problem,and then the Majorization Minimization(MM)method is used to find a *** MM approach that we develop is unconventional in that each MM subproblem is solved inexactly with the same provable convergence guarantee as the exact MM,thereby reducing the complexity of MM *** addition,a cooperative offloading model is considered,where the fog nodes compress-and-forward their received signals to the *** this model,a similar min-max latency optimization problem is formulated and tackled by the inexact *** results show that the proposed algorithms outperform some offloading strategies,and that the cooperative offloading can exploit transmission diversity better than noncooperative offloading to achieve better latency performance.
This paper considers the non-line-of-sight(NLOS)vehicle localization problem by using millimeter-wave(MMW)automotive *** preliminary attempts for NLOS vehicle detection are carried out and achieve good ***,an electrom...
详细信息
This paper considers the non-line-of-sight(NLOS)vehicle localization problem by using millimeter-wave(MMW)automotive *** preliminary attempts for NLOS vehicle detection are carried out and achieve good ***,an electromagnetic(EM)wave NLOS multipath propagation model for vehicle scene is ***,with the help of available multipath echoes,a complete NLOS vehicle localiza-tion algorithm is ***,simulation and experimental results validate the effectiveness of the established EM wave propagation model and the proposed NLOS vehicle localization algorithm.
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe...
详细信息
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking performance while satisfying the state and input constraints, even when system matrices are not available. We first establish a sufficient condition necessary for the existence of a solution pair to the regulator equation and propose a data-based approach to obtain the feedforward and feedback control gains for state feedback control using linear programming. Furthermore, we design a refined Luenberger observer to accurately estimate the system state, while keeping the estimation error within a predefined set. By combining output regulation theory, we develop an output feedback control strategy. The stability of the closed-loop system is rigorously proved to be asymptotically stable by further leveraging the concept of λ-contractive sets.
The continuous white light(CWL)covering the visible and near-infrared(NIR)regions can be observed in various absorptive media excited by continuous-wave(CW)*** is valuable to stimulate more efforts in unravelling the ...
详细信息
The continuous white light(CWL)covering the visible and near-infrared(NIR)regions can be observed in various absorptive media excited by continuous-wave(CW)*** is valuable to stimulate more efforts in unravelling the involved photophysical processes and exploring its potential applications in diverse ***,we proved that the enhanced thermal-field can boost the CWL *** rare earth(RE)ions(Pr^(3+),Er^(3+)and Yb^(3+))as the photothermally active centers in Y_(2)SiO_(5)phosphor,we reveal that absorbing more excitation energy and isolating the heat conduction can lead to rapid thermal field accumulation inside the material,thereby significantly reducing the excitation threshold and enhancing white light *** results might have important implications for the understanding of thermally enhanced radiation and may facilitate the CWL commercial application in night vision,bioimaging,and non-destructive detection.
3D object tracking based on deep neural networks has a wide range of potential applications, such as autonomous driving and robotics. However, deep neural networks are vulnerable to adversarial examples. Traditionally...
详细信息
Dear Editor, This letter concerns about the security problem of underwater cyber-physical system(UCPS) for depth-keeping task in the vertical plane. A dynamic parametric model of the UCPS with ocean currents and hydro...
详细信息
Dear Editor, This letter concerns about the security problem of underwater cyber-physical system(UCPS) for depth-keeping task in the vertical plane. A dynamic parametric model of the UCPS with ocean currents and hydrostatic is considered. With the intelligence of the controller, the objective function of a zero-sum game between the attacker and the controller is introduced. The attacker destroys the depth-keeping task of UCPS by injecting the designed false data into the system.
Interactive video object segmentation (iVOS), which aims to efficiently produce high-quality segmentation masks of the target object in a video with user interactions. Recently, numerous works are proposed to advance ...
详细信息
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is...
详细信息
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is not trustworthy,so the issue of data authenticity needs to be *** SM2 digital signature algorithm can provide an authentication mechanism for data to solve such ***,it still suffers from the problem of key *** order to address this concern,this study first introduces a key-insulated scheme,SM2-KI-SIGN,based on the SM2 *** scheme boasts strong key insulation and secure *** scheme uses the elliptic curve algorithm,which is not only more efficient but also more suitable for IIoT-cloud ***,the security proof of SM2-KI-SIGN is given under the Elliptic Curve Discrete Logarithm(ECDL)assumption in the random oracle.
Interpreting deep neural networks is of great importance to understand and verify deep models for natural language processing(NLP)***,most existing approaches only focus on improving the performance of models but igno...
详细信息
Interpreting deep neural networks is of great importance to understand and verify deep models for natural language processing(NLP)***,most existing approaches only focus on improving the performance of models but ignore their *** this work,we propose a Randomly Wired Graph Neural Network(RWGNN)by using graph to model the structure of Neural Network,which could solve two major problems(word-boundary ambiguity and polysemy)of ***,we develop a pipeline to explain the RWGNNby using Saliency Map and Adversarial *** results demonstrate that our approach can identify meaningful and reasonable interpretations for hidden states of RWGNN.
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based *** this dynamic m...
详细信息
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based *** this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication ***,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the *** address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is *** protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session *** security of these session keys is rigorously validated through formal proofs,formal verification,and informal *** confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)*** proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C *** simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
暂无评论