6,555 research outputs found
Vehicular Edge Computing via Deep Reinforcement Learning
The smart vehicles construct Vehicle of Internet which can execute various
intelligent services. Although the computation capability of the vehicle is
limited, multi-type of edge computing nodes provide heterogeneous resources for
vehicular services.When offloading the complicated service to the vehicular
edge computing node, the decision should consider numerous factors.The
offloading decision work mostly formulate the decision to a resource scheduling
problem with single or multiple objective function and some constraints, and
explore customized heuristics algorithms. However, offloading multiple data
dependency tasks in a service is a difficult decision, as an optimal solution
must understand the resource requirement, the access network, the user
mobility, and importantly the data dependency. Inspired by recent advances in
machine learning, we propose a knowledge driven (KD) service offloading
decision framework for Vehicle of Internet, which provides the optimal policy
directly from the environment. We formulate the offloading decision of
multi-task in a service as a long-term planning problem, and explores the
recent deep reinforcement learning to obtain the optimal solution. It considers
the future data dependency of the following tasks when making decision for a
current task from the learned offloading knowledge. Moreover, the framework
supports the pre-training at the powerful edge computing node and continually
online learning when the vehicular service is executed, so that it can adapt
the environment changes and learns policy that are sensible in hindsight. The
simulation results show that KD service offloading decision converges quickly,
adapts to different conditions, and outperforms the greedy offloading decision
algorithm.Comment: Preliminary report of ongoing wor
Intelligent Processing in Vehicular Ad hoc Networks: a Survey
The intelligent Processing technique is more and more attractive to
researchers due to its ability to deal with key problems in Vehicular Ad hoc
networks. However, several problems in applying intelligent processing
technologies in VANETs remain open. The existing applications are
comprehensively reviewed and discussed, and classified into different
categories in this paper. Their strategies, advantages/disadvantages, and
performances are elaborated. By generalizing different tactics in various
applications related to different scenarios of VANETs and evaluating their
performances, several promising directions for future research have been
suggested.Comment: 11pages, 5 figure
Deep Learning for Reliable Mobile Edge Analytics in Intelligent Transportation Systems
Intelligent transportation systems (ITSs) will be a major component of
tomorrow's smart cities. However, realizing the true potential of ITSs requires
ultra-low latency and reliable data analytics solutions that can combine, in
real-time, a heterogeneous mix of data stemming from the ITS network and its
environment. Such data analytics capabilities cannot be provided by
conventional cloud-centric data processing techniques whose communication and
computing latency can be high. Instead, edge-centric solutions that are
tailored to the unique ITS environment must be developed. In this paper, an
edge analytics architecture for ITSs is introduced in which data is processed
at the vehicle or roadside smart sensor level in order to overcome the ITS
latency and reliability challenges. With a higher capability of passengers'
mobile devices and intra-vehicle processors, such a distributed edge computing
architecture can leverage deep learning techniques for reliable mobile sensing
in ITSs. In this context, the ITS mobile edge analytics challenges pertaining
to heterogeneous data, autonomous control, vehicular platoon control, and
cyber-physical security are investigated. Then, different deep learning
solutions for such challenges are proposed. The proposed deep learning
solutions will enable ITS edge analytics by endowing the ITS devices with
powerful computer vision and signal processing functions. Preliminary results
show that the proposed edge analytics architecture, coupled with the power of
deep learning algorithms, can provide a reliable, secure, and truly smart
transportation environment.Comment: 5 figure
Wearable Affective Robot
With the development of the artificial intelligence (AI), the AI applications
have influenced and changed people's daily life greatly. Here, a wearable
affective robot that integrates the affective robot, social robot, brain
wearable, and wearable 2.0 is proposed for the first time. The proposed
wearable affective robot is intended for a wide population, and we believe that
it can improve the human health on the spirit level, meeting the fashion
requirements at the same time. In this paper, the architecture and design of an
innovative wearable affective robot, which is dubbed as Fitbot, are introduced
in terms of hardware and algorithm's perspectives. In addition, the important
functional component of the robot-brain wearable device is introduced from the
aspect of the hardware design, EEG data acquisition and analysis, user behavior
perception, and algorithm deployment, etc. Then, the EEG based cognition of
user's behavior is realized. Through the continuous acquisition of the
in-depth, in-breadth data, the Fitbot we present can gradually enrich user's
life modeling and enable the wearable robot to recognize user's intention and
further understand the behavioral motivation behind the user's emotion. The
learning algorithm for the life modeling embedded in Fitbot can achieve better
user's experience of affective social interaction. Finally, the application
service scenarios and some challenging issues of a wearable affective robot are
discussed
VeMo: Enabling Transparent Vehicular Mobility Modeling at Individual Levels with Full Penetration
Understanding and predicting real-time vehicle mobility patterns on highways
are essential to address traffic congestion and respond to the emergency.
However, almost all existing works (e.g., based on cellphones, onboard devices,
or traffic cameras) suffer from high costs, low penetration rates, or only
aggregate results. To address these drawbacks, we utilize Electric Toll
Collection systems (ETC) as a large-scale sensor network and design a system
called VeMo to transparently model and predict vehicle mobility at the
individual level with a full penetration rate. Our novelty is how we address
uncertainty issues (i.e., unknown routes and speeds) due to sparse implicit ETC
data based on a key data-driven insight, i.e., individual driving behaviors are
strongly correlated with crowds of drivers under certain spatiotemporal
contexts and can be predicted by combining both personal habits and context
information. More importantly, we evaluate VeMo with (i) a large-scale ETC
system with tracking devices at 773 highway entrances and exits capturing more
than 2 million vehicles every day; (ii) a fleet consisting of 114 thousand
vehicles with GPS data as ground truth. We compared VeMo with state-of-the-art
benchmark mobility models, and the experimental results show that VeMo
outperforms them by average 10% in terms of accuracy.Comment: This is a pre-print version to appear in the 25th Annual
International Conference on Mobile Computing and Networking (MobiCom'19
CAVBench: A Benchmark Suite for Connected and Autonomous Vehicles
Connected and autonomous vehicles (CAVs) have recently attracted a
significant amount of attention both from researchers and industry. Numerous
studies targeting algorithms, software frameworks, and applications on the CAVs
scenario have emerged. Meanwhile, several pioneer efforts have focused on the
edge computing system and architecture design for the CAVs scenario and
provided various heterogeneous platform prototypes for CAVs. However, a
standard and comprehensive application benchmark for CAVs is missing, hindering
the study of these emerging computing systems. To address this challenging
problem, we present CAVBench, the first benchmark suite for the edge computing
system in the CAVs scenario. CAVBench is comprised of six typical applications
covering four dominate CAVs scenarios and takes four datasets as standard
input. CAVBench provides quantitative evaluation results via application and
system perspective output metrics. We perform a series of experiments and
acquire three systemic characteristics of the applications in CAVBench. First,
the operation intensity of the applications is polarized, which explains why
heterogeneous hardware is important for a CAVs computing system. Second, all
applications in CAVBench consume high memory bandwidth, so the system should be
equipped with high bandwidth memory or leverage good memory bandwidth
management to avoid the performance degradation caused by memory bandwidth
competition. Third, some applications have worse data/instruction locality
based on the cache miss observation, so the computing system targeting these
applications should optimize the cache architecture. Last, we use the CAVBench
to evaluate a typical edge computing platform and present the quantitative and
qualitative analysis of the benchmarking results.Comment: 13 pages, The Third ACM/IEEE Symposium on Edge Computing 2018 SE
Edge Intelligence: The Confluence of Edge Computing and Artificial Intelligence
Along with the rapid developments in communication technologies and the surge
in the use of mobile devices, a brand-new computation paradigm, Edge Computing,
is surging in popularity. Meanwhile, Artificial Intelligence (AI) applications
are thriving with the breakthroughs in deep learning and the many improvements
in hardware architectures. Billions of data bytes, generated at the network
edge, put massive demands on data processing and structural optimization. Thus,
there exists a strong demand to integrate Edge Computing and AI, which gives
birth to Edge Intelligence. In this paper, we divide Edge Intelligence into AI
for edge (Intelligence-enabled Edge Computing) and AI on edge (Artificial
Intelligence on Edge). The former focuses on providing more optimal solutions
to key problems in Edge Computing with the help of popular and effective AI
technologies while the latter studies how to carry out the entire process of
building AI models, i.e., model training and inference, on the edge. This paper
provides insights into this new inter-disciplinary field from a broader
perspective. It discusses the core concepts and the research road-map, which
should provide the necessary background for potential future research
initiatives in Edge Intelligence.Comment: 13 pages, 3 figure
All One Needs to Know about Fog Computing and Related Edge Computing Paradigms: A Complete Survey
With the Internet of Things (IoT) becoming part of our daily life and our
environment, we expect rapid growth in the number of connected devices. IoT is
expected to connect billions of devices and humans to bring promising
advantages for us. With this growth, fog computing, along with its related edge
computing paradigms, such as multi-access edge computing (MEC) and cloudlet,
are seen as promising solutions for handling the large volume of
security-critical and time-sensitive data that is being produced by the IoT. In
this paper, we first provide a tutorial on fog computing and its related
computing paradigms, including their similarities and differences. Next, we
provide a taxonomy of research topics in fog computing, and through a
comprehensive survey, we summarize and categorize the efforts on fog computing
and its related computing paradigms. Finally, we provide challenges and future
directions for research in fog computing.Comment: 48 pages, 7 tables, 11 figures, 450 references. The data (categories
and features/objectives of the papers) of this survey are now available
publicly. Accepted by Elsevier Journal of Systems Architectur
Differential Privacy Techniques for Cyber Physical Systems: A Survey
Modern cyber physical systems (CPSs) has widely being used in our daily lives
because of development of information and communication technologies (ICT).With
the provision of CPSs, the security and privacy threats associated to these
systems are also increasing. Passive attacks are being used by intruders to get
access to private information of CPSs. In order to make CPSs data more secure,
certain privacy preservation strategies such as encryption, and k-anonymity
have been presented in the past. However, with the advances in CPSs
architecture, these techniques also needs certain modifications. Meanwhile,
differential privacy emerged as an efficient technique to protect CPSs data
privacy. In this paper, we present a comprehensive survey of differential
privacy techniques for CPSs. In particular, we survey the application and
implementation of differential privacy in four major applications of CPSs named
as energy systems, transportation systems, healthcare and medical systems, and
industrial Internet of things (IIoT). Furthermore, we present open issues,
challenges, and future research direction for differential privacy techniques
for CPSs. This survey can serve as basis for the development of modern
differential privacy techniques to address various problems and data privacy
scenarios of CPSs.Comment: 46 pages, 12 figure
Security in Mobile Edge Caching with Reinforcement Learning
Mobile edge computing usually uses cache to support multimedia contents in 5G
mobile Internet to reduce the computing overhead and latency. Mobile edge
caching (MEC) systems are vulnerable to various attacks such as denial of
service attacks and rogue edge attacks. This article investigates the attack
models in MEC systems, focusing on both the mobile offloading and the caching
procedures. In this paper, we propose security solutions that apply
reinforcement learning (RL) techniques to provide secure offloading to the edge
nodes against jamming attacks. We also present light-weight authentication and
secure collaborative caching schemes to protect data privacy. We evaluate the
performance of the RL-based security solution for mobile edge caching and
discuss the challenges that need to be addressed in the future
- …