829 research outputs found

    Online Container Scheduling for Low-Latency IoT Services in Edge Cluster Upgrade: A Reinforcement Learning Approach

    Full text link
    In Mobile Edge Computing (MEC), Internet of Things (IoT) devices offload computationally-intensive tasks to edge nodes, where they are executed within containers, reducing the reliance on centralized cloud infrastructure. Frequent upgrades are essential to maintain the efficient and secure operation of edge clusters. However, traditional cloud cluster upgrade strategies are ill-suited for edge clusters due to their geographically distributed nature and resource limitations. Therefore, it is crucial to properly schedule containers and upgrade edge clusters to minimize the impact on running tasks. In this paper, we propose a low-latency container scheduling algorithm for edge cluster upgrades. Specifically: 1) We formulate the online container scheduling problem for edge cluster upgrade to minimize the total task latency. 2) We propose a policy gradient-based reinforcement learning algorithm to address this problem, considering the unique characteristics of MEC. 3) Experimental results demonstrate that our algorithm reduces total task latency by approximately 27\% compared to baseline algorithms

    Look Closer to Your Enemy: Learning to Attack via Teacher-Student Mimicking

    Full text link
    Deep neural networks have significantly advanced person re-identification (ReID) applications in the realm of the industrial internet, yet they remain vulnerable. Thus, it is crucial to study the robustness of ReID systems, as there are risks of adversaries using these vulnerabilities to compromise industrial surveillance systems. Current adversarial methods focus on generating attack samples using misclassification feedback from victim models (VMs), neglecting VM's cognitive processes. We seek to address this by producing authentic ReID attack instances through VM cognition decryption. This approach boasts advantages like better transferability to open-set ReID tests, easier VM misdirection, and enhanced creation of realistic and undetectable assault images. However, the task of deciphering the cognitive mechanism in VM is widely considered to be a formidable challenge. In this paper, we propose a novel inconspicuous and controllable ReID attack baseline, LCYE (Look Closer to Your Enemy), to generate adversarial query images. Specifically, LCYE first distills VM's knowledge via teacher-student memory mimicking the proxy task. This knowledge prior serves as an unambiguous cryptographic token, encapsulating elements deemed indispensable and plausible by the VM, with the intent of facilitating precise adversarial misdirection. Further, benefiting from the multiple opposing task framework of LCYE, we investigate the interpretability and generalization of ReID models from the view of the adversarial attack, including cross-domain adaption, cross-model consensus, and online learning process. Extensive experiments on four ReID benchmarks show that our method outperforms other state-of-the-art attackers with a large margin in white-box, black-box, and target attacks. The source code can be found at https://github.com/MingjieWang0606/LCYE-attack_reid

    Efficient Serverless Function Scheduling at the Network Edge

    Full text link
    Serverless computing is a promising approach for edge computing since its inherent features, e.g., lightweight virtualization, rapid scalability, and economic efficiency. However, previous studies have not studied well the issues of significant cold start latency and highly dynamic workloads in serverless function scheduling, which are exacerbated at the resource-limited network edge. In this paper, we formulate the Serverless Function Scheduling (SFS) problem for resource-limited edge computing, aiming to minimize the average response time. To efficiently solve this intractable scheduling problem, we first consider a simplified offline form of the problem and design a polynomial-time optimal scheduling algorithm based on each function's weight. Furthermore, we propose an Enhanced Shortest Function First (ESFF) algorithm, in which the function weight represents the scheduling urgency. To avoid frequent cold starts, ESFF selectively decides the initialization of new function instances when receiving requests. To deal with dynamic workloads, ESFF judiciously replaces serverless functions based on the function weight at the completion time of requests. Extensive simulations based on real-world serverless request traces are conducted, and the results show that ESFF consistently and substantially outperforms existing baselines under different settings

    Research on model fitting and strength characteristics of critical state for expansive soil

    Get PDF
    According to Mengzi expansive soil, consolidated drained tests and undrained tests are carried on under saturated and remoulded conditions. The stress-strain characteristics of saturated soil are researched systematically under different confining pressure, initial dry density, initial water content, shearing rate and drainage condition. The inherent unity of diversity of shearing strength for the same samples measured by different experimental methods is indicated according to the normalization of critical state test results. And the failure lines in p ‘- q - ν space of remoulded saturated expansive soil under consolidated drained and undrained conditions are attained. The hyperbolic curve model can fit well the weak hardening stress-strain curves and the exponential curve model can fit the weak softening stress-strain curves. The test results can provide technical parameters and theoretical help for shearing strength variation of slope during rainfall and strength state of soil structure in normal water level

    Physical Layer Security of Intelligent Reflective Surface Aided NOMA Networks

    Get PDF
    Intelligent reflective surface (IRS) technology is emerging as a promising performance enhancement technique for next-generation wireless networks. Hence, we investigate the physical layer security of the downlink in IRS-aided non-orthogonal multiple access networks in the presence of an eavesdropper, where an IRS is deployed for enhancing the quality by assisting the cell-edge user to communicate with the base station. To characterize the network's performance, the expected value of the new channel statistics is derived for the reflected links in the case of Nakagami-m fading. Furthermore, the performance of the proposed network is evaluated both in terms of the secrecy outage probability~(SOP) and the average secrecy capacity (ASC). The closed-form expressions of the SOP and the ASC are derived. We also study the impact of various network parameters on the overall performance of the network considered. To obtain further insights, the secrecy diversity orders and the high signal-to-noise ratio slopes are obtained. We finally show that: 1) the expectation of the channel gain in the reflected links is determined both by the number of IRSs and by the Nakagami- m fading parameters; 2)~The SOP of both receiver 1 and receiver 2 becomes unity, when the number of IRSs is sufficiently high; 3) The secrecy diversity orders are affected both by the number of IRSs and by the Nakagami-m fading parameters, whereas the high-SNR slopes are not affected by these parameters. Our Monte-Carlo simulations perfectly demonstrate the analytical results

    Rapid evolutionary divergence of Gossypium barbadense and G. hirsutum mitochondrial genomes

    Get PDF
    Background The mitochondrial genome from upland cotton, G. hirsutum, was previously sequenced. To elucidate the evolution of mitochondrial genomic diversity within a single genus, we sequenced the mitochondrial genome from Sea Island cotton (Gossypium barbadense L.). Methods Mitochondrial DNA from week-old etiolated seedlings was extracted from isolated organelles using discontinuous sucrose density gradient method. Mitochondrial genome was sequenced with Solexa using paired-end, 90 bp read. The clean reads were assembled into contigs using ABySS and finished via additional fosmid and BAC sequencing. Finally, the genome was annotated and analyzed using different softwares. Results The G. barbadense (Sea Island cotton) mitochondrial genome was fully sequenced (677,434-bp) and compared to the mitogenome of upland cotton. The G. barbadensemitochondrial DNA contains seven more genes than that of upland cotton, with a total of 40 protein coding genes (excluding possible pseudogenes), 6 rRNA genes, and 29 tRNA genes. Of these 75 genes, atp1, mttB, nad4, nad9, rrn5, rrn18, and trnD(GTC)-cp were each represented by two identical copies. A single 64 kb repeat was largely responsible for the 9 % difference in genome size between the two mtDNAs. Comparison of genome structures between the two mitochondrial genomes revealed 8 rearranged syntenic regions and several large repeats. The largest repeat was missing from the master chromosome in G. hirsutum. Both mitochondrial genomes contain a duplicated copy of rps3 (rps3-2) in conjunction with a duplication of repeated sequences. Phylogenetic and divergence considerations suggest that a 544-bp fragment of rps3 was transferred to the nuclear genome shortly after divergence of the A- and D- genome diploid cottons. Conclusion These results highlight the insights to the evolution of structural variation between Sea Island and upland cotton mitochondrial genomes

    Regulatory Effect of High-Protein Diet on Circadian Rhythm of Lipid Metabolism in Obese Mice

    Get PDF
    This study aimed to investigate the regulatory effect of high-protein diet on circadian rhythm disturbances of lipid metabolism in obese mice induced by high-fat diet. Totally 120 specific pathogen-free (SPF)-grade C57BL/6J mice were randomly divided into normal, high-fat and high-fat/high-protein groups. The metabolic status of mice was monitored at the 4th and 12th week of intervention, and mice were sacrificed at 2, 8, 14, and 20 o’clock after completion of feeding. Lipid levels in blood and liver, the expression of genes related to fat anabolism and catabolism and the expression of circadian rhythm-related genes were measured, and circadian rhythm changes were analyzed. The results showed that high-fat feeding caused an increase in body mass and obesity index and a decrease in voluntary activity and caloric expenditure during the active period. The changes were accompanied by dyslipidemia and an abnormal increase in liver lipid levels, manifested by continuous gene expression of acetyl-CoA carboxylase and fatty acid synthetase, key enzymes involved in fat anabolism in liver, at high levels during the active and resting periods, a slow increase in the gene expression of sensitive lipase and acetyl-CoA oxidase, key enzymes involved in fat catabolism in liver, and changes in the diurnal variation pattern. Compared with high-fat intervention, high-protein intervention significantly increased the amount of voluntary activity and energy expenditure during the active period, restored the expression rhythm of fat synthase that was higher during the active period and lower during the rest period, and resulted in high-level expression of ACOX, a key enzyme gene involved in fat catabolism, after ingestion, showing obvious circadian rhythms. Further analysis showed that the improvement effects of high-protein intervention on circadian rhythm disorders of lipid metabolism caused by high-fat diet were closely related to the regulation of the expression of two clock genes in liver, circadian locomotor output cycle kaput (CLOCK) and brain and muscle-Arnt-like protein 1 (BMAL1). In conclusion, high-protein diets can alleviate biological clock disorders in liver induced by high-fat diets and ameliorate hepatic lipid metabolism disorders in mice by stabilizing circadian rhythms
    • …
    corecore