5,458 research outputs found

    In-situ Model Downloading to Realize Versatile Edge AI in 6G Mobile Networks

    Full text link
    The sixth-generation (6G) mobile networks are expected to feature the ubiquitous deployment of machine learning and AI algorithms at the network edge. With rapid advancements in edge AI, the time has come to realize intelligence downloading onto edge devices (e.g., smartphones and sensors). To materialize this version, we propose a novel technology in this article, called in-situ model downloading, that aims to achieve transparent and real-time replacement of on-device AI models by downloading from an AI library in the network. Its distinctive feature is the adaptation of downloading to time-varying situations (e.g., application, location, and time), devices' heterogeneous storage-and-computing capacities, and channel states. A key component of the presented framework is a set of techniques that dynamically compress a downloaded model at the depth-level, parameter-level, or bit-level to support adaptive model downloading. We further propose a virtualized 6G network architecture customized for deploying in-situ model downloading with the key feature of a three-tier (edge, local, and central) AI library. Furthermore, experiments are conducted to quantify 6G connectivity requirements and research opportunities pertaining to the proposed technology are discussed.Comment: The paper has been submitted to IEEE for possible publicatio

    A novel on-board Unit to accelerate the penetration of ITS services

    Get PDF
    In-vehicle connectivity has experienced a big expansion in recent years. Car manufacturers have mainly proposed OBU-based solutions, but these solutions do not take full advantage of the opportunities of inter-vehicle peer-to-peer communications. In this paper we introduce GRCBox, a novel architecture that allows OEM user-devices to directly communicate when located in neighboring vehicles. In this paper we also describe EYES, an application we developed to illustrate the type of novel applications that can be implemented on top of the GRCBox. EYES is an ITS overtaking assistance system that provides the driver with real-time video fed from the vehicle located in front. Finally, we evaluated the GRCbox and the EYES application and showed that, for device-to-device communication, the performance of the GRCBox architecture is comparable to an infrastructure network, introducing a negligible impact

    FAIR: Towards Impartial Resource Allocation for Intelligent Vehicles with Automotive Edge Computing

    Full text link
    The emerging vehicular connected applications, such as cooperative automated driving and intersection collision warning, show great potentials to improve the driving safety, where vehicles can share the data collected by a variety of on-board sensors with surrounding vehicles and roadside infrastructures. Transmitting and processing this huge amount of sensory data introduces new challenges for automotive edge computing with traditional wireless communication networks. In this work, we address the problem of traditional asymmetrical network resource allocation for uplink and downlink connections that can significantly degrade the performance of vehicular connected applications. An end-to-end automotive edge networking system, FAIR, is proposed to provide fast, scalable, and impartial connected services for intelligent vehicles with edge computing, which can be applied to any traffic scenes and road topology. The core of FAIR is our proposed symmetrical network resource allocation algorithm deployed at edge servers and service adaptation algorithm equipped on intelligent vehicles. Extensive simulations are conducted to validate our proposed FAIR by leveraging real-world traffic dataset. Simulation results demonstrate that FAIR outperforms existing solutions in a variety of traffic scenes and road topology.Comment: This is a personal copy of the authors. Not for redistribution. The final version of this paper was accepted by IEEE Transactions on Intelligent Vehicle

    Reducing risky security behaviours:utilising affective feedback to educate users

    Get PDF
    Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rate of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The paper concludes that a solution utilising a browser extension is a suitable method of monitoring potentially risky security behaviour. Ultimately, future work seeks to implement an affective feedback mechanism within the browser extension with the aim of improving security awareness
    • …
    corecore