Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (68)

Search Parameters:
Keywords = cache aware

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 5507 KiB  
Article
A Web-Based Application for Smart City Data Analysis and Visualization
by Panagiotis Karampakakis, Despoina Ioakeimidou, Periklis Chatzimisios and Konstantinos A. Tsintotas
Future Internet 2025, 17(5), 217; https://doi.org/10.3390/fi17050217 - 13 May 2025
Viewed by 979
Abstract
Smart cities are urban areas that use contemporary technology to improve citizens’ overall quality of life. These modern digital civil hubs aim to manage environmental conditions, traffic flow, and infrastructure through interconnected and data-driven decision-making systems. Today, many applications employ intelligent sensors for [...] Read more.
Smart cities are urban areas that use contemporary technology to improve citizens’ overall quality of life. These modern digital civil hubs aim to manage environmental conditions, traffic flow, and infrastructure through interconnected and data-driven decision-making systems. Today, many applications employ intelligent sensors for real-time data acquisition, leveraging visualization to derive actionable insights. However, despite the proliferation of such platforms, challenges like high data volume, noise, and incompleteness continue to hinder practical visual analysis. As missing data is a frequent issue in visualizing those urban sensing systems, our approach prioritizes their correction as a fundamental step. We deploy a hybrid imputation strategy combining SARIMAX, k-nearest neighbors, and random forest regression to address this. Building on this foundation, we propose an interactive web-based pipeline that processes, analyzes, and presents the sensor data provided by Basel’s “Smarte Strasse”. Our platform receives and projects environmental measurements, i.e., NO2, O3, PM2.5, and traffic noise, as well as mobility indicators such as vehicle speed and type, parking occupancy, and electric vehicle charging behavior. By resolving gaps in the data, we provide a solid foundation for high-fidelity and quality visual analytics. Built on the Flask web framework, the platform incorporates performance optimizations through Flask-Caching. Concerning the user’s dashboard, it supports interactive exploration via dynamic charts and spatial maps. This way, we demonstrate how future internet technologies permit the accessibility of complex urban sensor data for research, planning, and public engagement. Lastly, our open-source web-based application keeps reproducible, privacy-aware urban analytics. Full article
(This article belongs to the Section Smart System Infrastructure and Applications)
Show Figures

Graphical abstract

29 pages, 1776 KiB  
Article
Deep Reinforcement Learning-Enabled Computation Offloading: A Novel Framework to Energy Optimization and Security-Aware in Vehicular Edge-Cloud Computing Networks
by Waleed Almuseelem
Sensors 2025, 25(7), 2039; https://doi.org/10.3390/s25072039 - 25 Mar 2025
Viewed by 1138
Abstract
The Vehicular Edge-Cloud Computing (VECC) paradigm has gained traction as a promising solution to mitigate the computational constraints through offloading resource-intensive tasks to distributed edge and cloud networks. However, conventional computation offloading mechanisms frequently induce network congestion and service delays, stemming from uneven [...] Read more.
The Vehicular Edge-Cloud Computing (VECC) paradigm has gained traction as a promising solution to mitigate the computational constraints through offloading resource-intensive tasks to distributed edge and cloud networks. However, conventional computation offloading mechanisms frequently induce network congestion and service delays, stemming from uneven workload distribution across spatial Roadside Units (RSUs). Moreover, ensuring data security and optimizing energy usage within this framework remain significant challenges. To this end, this study introduces a deep reinforcement learning-enabled computation offloading framework for multi-tier VECC networks. First, a dynamic load-balancing algorithm is developed to optimize the balance among RSUs, incorporating real-time analysis of heterogeneous network parameters, including RSU computational load, channel capacity, and proximity-based latency. Additionally, to alleviate congestion in static RSU deployments, the framework proposes deploying UAVs in high-density zones, dynamically augmenting both storage and processing resources. Moreover, an Advanced Encryption Standard (AES)-based mechanism, secured with dynamic one-time encryption key generation, is implemented to fortify data confidentiality during transmissions. Further, a context-aware edge caching strategy is implemented to preemptively store processed tasks, reducing redundant computations and associated energy overheads. Subsequently, a mixed-integer optimization model is formulated that simultaneously minimizes energy consumption and guarantees latency constraint. Given the combinatorial complexity of large-scale vehicular networks, an equivalent reinforcement learning form is given. Then a deep learning-based algorithm is designed to learn close-optimal offloading solutions under dynamic conditions. Empirical evaluations demonstrate that the proposed framework significantly outperforms existing benchmark techniques in terms of energy savings. These results underscore the framework’s efficacy in advancing sustainable, secure, and scalable intelligent transportation systems. Full article
(This article belongs to the Special Issue Vehicle-to-Everything (V2X) Communication Networks 2024–2025)
Show Figures

Figure 1

26 pages, 5463 KiB  
Article
Intelligent Congestion Control in Wireless Sensor Networks (WSN) Based on Generative Adversarial Networks (GANs) and Optimization Algorithms
by Seyed Salar Sefati, Bahman Arasteh, Razvan Craciunescu and Ciprian-Romeo Comsa
Mathematics 2025, 13(4), 597; https://doi.org/10.3390/math13040597 - 12 Feb 2025
Cited by 1 | Viewed by 1143
Abstract
Internet of Things (IoT) technology has facilitated the deployment of autonomous sensors in remote and challenging environments, enabling substantial advancements in environmental monitoring and data collection. IoT sensors continuously gather data, transmitting it to a central Base Station (BS) via designated Cluster Heads [...] Read more.
Internet of Things (IoT) technology has facilitated the deployment of autonomous sensors in remote and challenging environments, enabling substantial advancements in environmental monitoring and data collection. IoT sensors continuously gather data, transmitting it to a central Base Station (BS) via designated Cluster Heads (CHs). However, data flow encounters frequent congestion at CH nodes, negatively impacting network performance and Quality of Service (QoS). This paper introduces a novel congestion control strategy tailored for Wireless Sensor Networks (WSNs) to balance energy efficiency and data reliability. The proposed approach follows an eight-step process, integrating Generative Adversarial Networks (GANs) for enhanced clustering and Ant Colony Optimization (ACO) for optimal CH selection and routing. GANs simulate realistic node clustering, achieving better load distribution and energy conservation across the network. ACO then selects CHs based on energy levels, distance, and network centrality, using pheromone-based routing to adaptively manage data flows. A congestion factor (CF) threshold is also incorporated to dynamically reroute traffic when congestion risks arise, preserving QoS. Simulation results show that this approach significantly improves QoS metrics, including latency, throughput, and reliability. Comparative evaluations reveal that our method outperforms existing frameworks, such as Fuzzy Structure and Genetic-Fuzzy (FSFG), Deep Reinforcement Learning Cache-Aware Congestion Control (DRL-CaCC), and Adaptive Cuckoo Search Rate Optimization (ACSRO). Full article
Show Figures

Figure 1

20 pages, 899 KiB  
Article
Boundary-Aware Concurrent Queue: A Fast and Scalable Concurrent FIFO Queue on GPU Environments
by Md. Sabbir Hossain Polak, David A. Troendle and Byunghyun Jang
Appl. Sci. 2025, 15(4), 1834; https://doi.org/10.3390/app15041834 - 11 Feb 2025
Viewed by 998
Abstract
This paper presents Boundary-Aware Concurrent Queue (BACQ), a high-performance queue designed for modern GPUs, which focuses on high concurrency in massively parallel environments. BACQ operates at the warp level, leveraging intra-warp locality to improve throughput. A key to BACQ’s design is its [...] Read more.
This paper presents Boundary-Aware Concurrent Queue (BACQ), a high-performance queue designed for modern GPUs, which focuses on high concurrency in massively parallel environments. BACQ operates at the warp level, leveraging intra-warp locality to improve throughput. A key to BACQ’s design is its ability to replace conflicting accesses to shared data with independent accesses to private data. It uses a ticket-based system to ensure fair ordering of operations and supports infinite growth of the head and tail across its ring buffer. The leader thread of each warp coordinates enqueue and dequeue operations, broadcasting offsets for intra-warp synchronization. BACQ dynamically adjusts operation priorities based on the queue’s state, especially as it approaches boundary conditions such as overfilling the buffer. It also uses a virtual caching layer for intra-warp communication, reducing memory latency. Rigorous benchmarking results show that BACQ outperforms the BWD (Broker Queue Work Distributor), the fastest known GPU queue, by more than 2× while preserving FIFO semantics. The paper demonstrates BACQ’s superior performance through real-world empirical evaluations. Full article
(This article belongs to the Special Issue Data Structures for Graphics Processing Units (GPUs))
Show Figures

Figure 1

22 pages, 2306 KiB  
Article
Age-Aware Scheduling for Federated Learning with Caching in Wireless Computing Power Networks
by Xiaochong Zhuang, Chuanbai Luo, Zhenghao Xie, Yu Li and Li Jiang
Electronics 2025, 14(4), 663; https://doi.org/10.3390/electronics14040663 - 8 Feb 2025
Cited by 1 | Viewed by 814
Abstract
With the rapid development of Wireless Computing Power Networks (WCPNs), the urgent need for data privacy protection and communication efficiency has led to the emergence of the federated learning (FL) framework. However, the time delay leads to dragging problems and reduces the convergence [...] Read more.
With the rapid development of Wireless Computing Power Networks (WCPNs), the urgent need for data privacy protection and communication efficiency has led to the emergence of the federated learning (FL) framework. However, the time delay leads to dragging problems and reduces the convergence performance of FL in the training process. In this article, we propose an FL resource scheduling strategy based on information age perception in WCPNs, which can effectively reduce the time delay and enhance the convergence performance of FL. Moreover, a data cache buffer and a model cache buffer are set up at the user end and the central server, respectively. Next, we formulate the parametric age-aware problem to simultaneously minimize the global parameter age, energy consumption, and FL service delays. Considering the dynamic WCPN environment, the optimization target is modeled as a Markov decision process (MDP), and the Proximal Policy Optimization (PPO) algorithm is used to achieve the optimal solution. Numerical simulation results demonstrate that the proposed method significantly outperforms baseline schemes across critical metrics. Specifically, the proposed approach reduces FL service delays by 25.2%. It also decreases the global parameter age by 45.5% through the joint optimization of the data collection frequency, computation frequency, and bandwidth allocation. The method attains a reward value of 65 at convergence, 18.2% higher than the WithoutAnyCache scheme and 8.3% higher than the OnlyLocalCache scheme. FL accuracy improves to 98.2% with a 0.08 final loss. Finally, numerical simulation results further confirm the superiority and outstanding performance of the proposed method. Full article
Show Figures

Figure 1

30 pages, 6408 KiB  
Article
Construction of a Deep Learning Model for Unmanned Aerial Vehicle-Assisted Safe Lightweight Industrial Quality Inspection in Complex Environments
by Zhongyuan Jing and Ruyan Wang
Drones 2024, 8(12), 707; https://doi.org/10.3390/drones8120707 - 27 Nov 2024
Viewed by 1214
Abstract
With the development of mobile communication technology and the proliferation of the number of Internet of Things (IoT) terminal devices, a large amount of data and intelligent applications are emerging at the edge of the Internet, giving rise to the demand for edge [...] Read more.
With the development of mobile communication technology and the proliferation of the number of Internet of Things (IoT) terminal devices, a large amount of data and intelligent applications are emerging at the edge of the Internet, giving rise to the demand for edge intelligence. In this context, federated learning, as a new distributed machine learning method, becomes one of the key technologies to realize edge intelligence. Traditional edge intelligence networks usually rely on terrestrial communication base stations as parameter servers to manage communication and computation tasks among devices. However, this fixed infrastructure is difficult to adapt to the complex and ever-changing heterogeneous network environment. With its high degree of flexibility and mobility, the introduction of unmanned aerial vehicles (UAVs) into the federated learning framework can provide enhanced communication, computation, and caching services in edge intelligence networks, but the limited communication bandwidth and unreliable communication environment increase system uncertainty and may lead to a decrease in overall energy efficiency. To address the above problems, this paper designs a UAV-assisted federated learning with a privacy-preserving and efficient data sharing method, Communication-efficient and Privacy-protection for FL (CP-FL). A network-sparsifying pruning training method based on a channel importance mechanism is proposed to transform the pruning training process into a constrained optimization problem. A quantization-aware training method is proposed to automate the learning of quantization bitwidths to improve the adaptability between features and data representation accuracy. In addition, differential privacy is applied to the uplink data on this basis to further protect data privacy. After the model parameters are aggregated on the pilot UAV, the model is subjected to knowledge distillation to reduce the amount of downlink data without affecting the utility. Experiments on real-world datasets validate the effectiveness of the scheme. The experimental results show that compared with other federated learning frameworks, the CP-FL approach can effectively mitigate the communication overhead, as well as the computation overhead, and has the same outstanding advantage in terms of the balance between privacy and usability in differential privacy preservation. Full article
(This article belongs to the Special Issue Mobile Fog and Edge Computing in Drone Swarms)
Show Figures

Figure 1

21 pages, 526 KiB  
Article
Collaborative Caching for Implementing a Location-Privacy Aware LBS on a MANET
by Rudyard Fuster, Patricio Galdames and Claudio Gutierréz-Soto
Appl. Sci. 2024, 14(22), 10480; https://doi.org/10.3390/app142210480 - 14 Nov 2024
Viewed by 937
Abstract
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting [...] Read more.
This paper addresses the challenge of preserving user privacy in location-based services (LBSs) by proposing a novel, complementary approach to existing privacy-preserving techniques such as k-anonymity and l-diversity. Our approach implements collaborative caching strategies within a mobile ad hoc network (MANET), exploiting the geographic of location-based queries (LBQs) to reduce data exposure to untrusted LBS servers. Unlike existing approaches that rely on centralized servers or stationary infrastructure, our solution facilitates direct data exchange between users’ devices, providing an additional layer of privacy protection. We introduce a new privacy entropy-based metric called accumulated privacy loss (APL) to quantify the privacy loss incurred when accessing either the LBS or our proposed system. Our approach implements a two-tier caching strategy: local caching maintained by each user and neighbor caching based on proximity. This strategy not only reduces the number of queries to the LBS server but also significantly enhances user privacy by minimizing the exposure of location data to centralized entities. Empirical results demonstrate that while our collaborative caching system incurs some communication costs, it significantly mitigates redundant data among user caches and reduces the need to access potentially privacy-compromising LBS servers. Our findings show a 40% reduction in LBS queries, a 64% decrease in data redundancy within cells, and a 31% reduction in accumulated privacy loss compared to baseline methods. In addition, we analyze the impact of data obsolescence on cache performance and privacy loss, proposing mechanisms for maintaining the relevance and accuracy of cached data. This work contributes to the field of privacy-preserving LBSs by providing a decentralized, user-centric approach that improves both cache redundancy and privacy protection, particularly in scenarios where central infrastructure is unreachable or untrusted. Full article
(This article belongs to the Special Issue New Advances in Computer Security and Cybersecurity)
Show Figures

Figure 1

21 pages, 957 KiB  
Article
Social Trust Confirmation-Based Selfish Node Detection Algorithm in Socially Aware Networks
by Xiaowen Chen, Ying Rao, Zenggang Xiong, Yuan Li, Xuemin Zhang, Delin Hou, Qiangqiang Lou and Jing Li
Electronics 2024, 13(19), 3797; https://doi.org/10.3390/electronics13193797 - 25 Sep 2024
Viewed by 876
Abstract
Nodes in socially aware networks (SANs) may act selfishly on individual bases due to resource constraints and socially selfish behavior arising from the social preferences of nodes. In response to such selfish behaviors exhibited by nodes, this paper proposes a social trust confirmation-based [...] Read more.
Nodes in socially aware networks (SANs) may act selfishly on individual bases due to resource constraints and socially selfish behavior arising from the social preferences of nodes. In response to such selfish behaviors exhibited by nodes, this paper proposes a social trust confirmation-based selfish node detection algorithm (STCDA). This algorithm first utilizes a subjective forwarding willingness detection mechanism to discern selfishness. If a node’s energy is insufficient or its message rejection rate is too high—that is, the node cannot or is unwilling to forward messages—it indicates that the node is selfish. Otherwise, it is evaluated more thoroughly through the node’s social trust detection mechanisms. It calculates the social trust level of nodes based on the benefits of forwarding messages, thereby distinguishing between individually selfish nodes and socially selfish nodes in the network. If further evaluation is needed, the final judgment will be made using the message confirmation feedback detection mechanism. This checks the message information forwarded by nodes in the network. If nodes fail to forward messages after receiving them—excluding reasons such as message expiration or temporary insufficient cache space—it indicates that the nodes are selfish. Results from experimental simulations show that this algorithm performs better than traditional algorithms. Under conditions of 80% selfish nodes, a message TTL of 300 min, and 10 MB of cache space, it improves the message delivery rate by 5.87% and reduces the average delay by 6.2% compared to the existing comprehensive confirmation-based selfish node detection algorithm. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

20 pages, 305 KiB  
Article
Revisiting Database Indexing for Parallel and Accelerated Computing: A Comprehensive Study and Novel Approaches
by Maryam Abbasi, Marco V. Bernardo, Paulo Váz, José Silva and Pedro Martins
Information 2024, 15(8), 429; https://doi.org/10.3390/info15080429 - 24 Jul 2024
Viewed by 3216
Abstract
While the importance of indexing strategies for optimizing query performance in database systems is widely acknowledged, the impact of rapidly evolving hardware architectures on indexing techniques has been an underexplored area. As modern computing systems increasingly leverage parallel processing capabilities, multi-core CPUs, and [...] Read more.
While the importance of indexing strategies for optimizing query performance in database systems is widely acknowledged, the impact of rapidly evolving hardware architectures on indexing techniques has been an underexplored area. As modern computing systems increasingly leverage parallel processing capabilities, multi-core CPUs, and specialized hardware accelerators, traditional indexing approaches may not fully capitalize on these advancements. This comprehensive experimental study investigates the effects of hardware-conscious indexing strategies tailored for contemporary and emerging hardware platforms. Through rigorous experimentation on a real-world database environment using the industry-standard TPC-H benchmark, this research evaluates the performance implications of indexing techniques specifically designed to exploit parallelism, vectorization, and hardware-accelerated operations. By examining approaches such as cache-conscious B-Tree variants, SIMD-optimized hash indexes, and GPU-accelerated spatial indexing, the study provides valuable insights into the potential performance gains and trade-offs associated with these hardware-aware indexing methods. The findings reveal that hardware-conscious indexing strategies can significantly outperform their traditional counterparts, particularly in data-intensive workloads and large-scale database deployments. Our experiments show improvements ranging from 32.4% to 48.6% in query execution time, depending on the specific technique and hardware configuration. However, the study also highlights the complexity of implementing and tuning these techniques, as they often require intricate code optimizations and a deep understanding of the underlying hardware architecture. Additionally, this research explores the potential of machine learning-based indexing approaches, including reinforcement learning for index selection and neural network-based index advisors. While these techniques show promise, with performance improvements of up to 48.6% in certain scenarios, their effectiveness varies across different query types and data distributions. By offering a comprehensive analysis and practical recommendations, this research contributes to the ongoing pursuit of database performance optimization in the era of heterogeneous computing. The findings inform database administrators, developers, and system architects on effective indexing practices tailored for modern hardware, while also paving the way for future research into adaptive indexing techniques that can dynamically leverage hardware capabilities based on workload characteristics and resource availability. Full article
(This article belongs to the Special Issue Advances in High Performance Computing and Scalable Software)
18 pages, 736 KiB  
Systematic Review
Post-Mastectomy Breast Reconstruction Disparities: A Systematic Review of Sociodemographic and Economic Barriers
by Kella L. Vangsness, Jonathan Juste, Andre-Philippe Sam, Naikhoba Munabi, Michael Chu, Mouchammed Agko, Jeff Chang and Antoine L. Carre
Medicina 2024, 60(7), 1169; https://doi.org/10.3390/medicina60071169 - 19 Jul 2024
Cited by 3 | Viewed by 2798
Abstract
Background: Breast reconstruction (BR) following mastectomy is a well-established beneficial medical intervention for patient physical and psychological well-being. Previous studies have emphasized BR as the gold standard of care for breast cancer patients requiring surgery. Multiple policies have improved BR access, but [...] Read more.
Background: Breast reconstruction (BR) following mastectomy is a well-established beneficial medical intervention for patient physical and psychological well-being. Previous studies have emphasized BR as the gold standard of care for breast cancer patients requiring surgery. Multiple policies have improved BR access, but there remain social, economic, and geographical barriers to receiving reconstruction. Threats to equitable healthcare for all breast cancer patients in America persist despite growing awareness and efforts to negate these disparities. While race/ethnicity has been correlated with differences in BR rates and outcomes, ongoing research outlines a multitude of issues underlying this variance. Understanding the current and continuous barriers will help to address and overcome gaps in access. Methods: A systematic review assessing three reference databases (PubMed, Web of Science, and Ovid Medline) was carried out in accordance with PRISMA 2020 guidelines. A keyword search was conducted on 3 February 2024, specifying results between 2004 and 2024. Studies were included based on content, peer-reviewed status, and publication type. Two independent reviewers screened results based on title/abstract appropriateness and relevance. Data were extracted, cached in an online reference collection, and input into a cloud-based database for analysis. Results: In total, 1756 references were populated from all databases (PubMed = 829, Ovid Medline = 594, and Web of Science = 333), and 461 duplicate records were removed, along with 1147 results deemed ineligible by study criteria. Then, 45 international or non-English results were excluded. The screening sample consisted of 103 publications. After screening, the systematic review produced 70 studies with satisfactory relevance to our study focus. Conclusions: Federal mandates have improved access to women undergoing postmastectomy BR, particularly for younger, White, privately insured, urban-located patients. Recently published studies had a stronger focus on disparities, particularly among races, and show continued disadvantages for minorities, lower-income, rural-community, and public insurance payers. The research remains limited beyond commonly reported metrics of disparity and lacks examination of additional contributing factors. Future investigations should elucidate the effect of these factors and propose measures to eliminate barriers to access to BR for all patients. Full article
(This article belongs to the Special Issue Updates on Post-mastectomy Breast Reconstruction)
Show Figures

Figure 1

27 pages, 3989 KiB  
Article
QWLCPM: A Method for QoS-Aware Forwarding and Caching Using Simple Weighted Linear Combination and Proximity for Named Data Vehicular Sensor Network
by Dependra Dhakal and Kalpana Sharma
Electronics 2024, 13(7), 1183; https://doi.org/10.3390/electronics13071183 - 23 Mar 2024
Cited by 1 | Viewed by 1222
Abstract
The named data vehicular sensor network (NDVSN) has become an increasingly important area of research because of the increasing demand for data transmission in vehicular networks. In such networks, ensuring the quality of service (QoS) of data transmission is essential. The NDVSN is [...] Read more.
The named data vehicular sensor network (NDVSN) has become an increasingly important area of research because of the increasing demand for data transmission in vehicular networks. In such networks, ensuring the quality of service (QoS) of data transmission is essential. The NDVSN is a mobile ad hoc network that uses vehicles equipped with sensors to collect and disseminate data. QoS is critical in vehicular networks, as the data transmission must be reliable, efficient, and timely to support various applications. This paper proposes a QoS-aware forwarding and caching algorithm for NDVSNs, called QWLCPM (QoS-aware Forwarding and Caching using Weighted Linear Combination and Proximity Method). QWLCPM utilizes a weighted linear combination and proximity method to determine stable nodes and the best next-hop forwarding path based on various metrics, including priority, signal strength, vehicle speed, global positioning system data, and vehicle ID. Additionally, it incorporates a weighted linear combination method for the caching mechanism to store frequently accessed data based on zone ID, stability, and priority. The performance of QWLCPM is evaluated through simulations and compared with other forwarding and caching algorithms. QWLCPM’s efficacy stems from its holistic decision-making process, incorporating spatial and temporal elements for efficient cache management. Zone-based caching, showcased in different scenarios, enhances content delivery by utilizing stable nodes. QWLCPM’s proximity considerations significantly improve cache hits, reduce delay, and optimize hop count, especially in scenarios with sparse traffic. Additionally, its priority-based caching mechanism enhances hit ratios and content diversity, emphasizing QWLCPM’s substantial network-improvement potential in vehicular environments. These findings suggest that QWLCPM has the potential to greatly enhance QoS in NDVSNs and serve as a promising solution for future vehicular sensor networks. Future research could focus on refining the details of its implementation, scalability in larger networks, and conducting real-world trials to validate its performance under dynamic conditions. Full article
(This article belongs to the Special Issue Advances in Wireless Sensor Networks)
Show Figures

Figure 1

22 pages, 9020 KiB  
Article
A Low-Latency Noise-Aware Tone Mapping Operator for Hardware Implementation with a Locally Weighted Guided Filter
by Qianwang Liang, Tianyu Yan, Nan Wang, Zhiying Zhu and Jiongyao Ye
Symmetry 2024, 16(3), 356; https://doi.org/10.3390/sym16030356 - 15 Mar 2024
Viewed by 2272
Abstract
A tone mapping operator (TMO) is a module in the image signal processing pipeline that is used to convert high dynamic range images to low dynamic range images for display. Currently, state-of-the-art TMOs typically take complex algorithms and are implemented on graphics processing [...] Read more.
A tone mapping operator (TMO) is a module in the image signal processing pipeline that is used to convert high dynamic range images to low dynamic range images for display. Currently, state-of-the-art TMOs typically take complex algorithms and are implemented on graphics processing units, making it difficult to run with low latency on edge devices, and TMOs implemented in hardware circuits often lack additional noise suppression because of latency and hardware resource constraints. To address these issues, we proposed a low-latency noise-aware TMO for hardware implementation. Firstly, a locally weighted guided filter is proposed to decompose the luminance image into a base layer and a detail layer, with the weight function symmetric concerning the central pixel value of a window. Secondly, the mean and standard deviation of the basic layer and the detail layer are used to estimate the noise visibility according to the human visual characteristics. Finally, the gain for the detail layer is calculated to achieve adaptive noise suppression. In this process, luminance is first processed by the log2 function before being filtered and then symmetrically converted back to the linear domain by the exp2 function after compression. Meanwhile, the algorithms within the proposed TMO were optimized for hardware implementation to minimize latency and cache, achieving a low latency of 60.32 μs under video specification of 1080 P at 60 frames per second and objective metric smoothness in dark flat regions could be improved by more than 10% compared to similar methods. Full article
Show Figures

Figure 1

22 pages, 740 KiB  
Article
Federated Learning-Based Service Caching in Multi-Access Edge Computing System
by Tuan Phong Tran, Anh Hung Ngoc Tran, Thuan Minh Nguyen and Myungsik Yoo
Appl. Sci. 2024, 14(1), 401; https://doi.org/10.3390/app14010401 - 1 Jan 2024
Cited by 3 | Viewed by 1827
Abstract
Multi-access edge computing (MEC) brings computations closer to mobile users, thereby decreasing service latency and providing location-aware services. Nevertheless, given the constrained resources of the MEC server, it is crucial to provide a limited number of services that properly fulfill the demands of [...] Read more.
Multi-access edge computing (MEC) brings computations closer to mobile users, thereby decreasing service latency and providing location-aware services. Nevertheless, given the constrained resources of the MEC server, it is crucial to provide a limited number of services that properly fulfill the demands of users. Several static service caching approaches have been proposed. However, the effectiveness of these strategies is constrained by the dynamic nature of the system states and user demand patterns. To mitigate this problem, several investigations have been conducted on dynamic service caching techniques that can be categorized as centralized and distributed. However, centralized approaches typically require gathering comprehensive data from the entire system. This increases the burden on resources and raises concerns regarding data security and privacy. By contrast, distributed strategies require the formulation of complicated optimization problems without leveraging the inherent characteristics of the data. This paper proposes a distributed service caching strategy based on federated learning (SCFL) that works efficiently in a distributed system with user mobility. An autoencoder model is utilized to extract features regarding the service request distribution of individual MEC servers. The global model is then generated using federated learning, which is utilized to make service-caching decisions. Extensive experiments are conducted to demonstrate that the performance of the proposed method is superior to that of other methods. Full article
Show Figures

Figure 1

17 pages, 2727 KiB  
Article
Adaptive Streaming Transmission Optimization Method Based on Three-Dimensional Caching Architecture and Environment Awareness in High-Speed Rail
by Jia Guo, Yexuan Zhu, Jinqi Zhu, Fan Shen, Hui Gao and Ye Tian
Electronics 2024, 13(1), 41; https://doi.org/10.3390/electronics13010041 - 20 Dec 2023
Cited by 1 | Viewed by 1364
Abstract
In high-mobility scenarios, a user’s media experience is severely constrained by the difficulty of network channel prediction, the instability of network quality, and other problems caused by the user’s fast movement, frequent base station handovers, the Doppler effect, etc. To this end, this [...] Read more.
In high-mobility scenarios, a user’s media experience is severely constrained by the difficulty of network channel prediction, the instability of network quality, and other problems caused by the user’s fast movement, frequent base station handovers, the Doppler effect, etc. To this end, this paper proposes a video adaptive transmission architecture based on three-dimensional caching. In the temporal dimension, video data are cached to different base stations, and in the spatial dimension video data are cached to base stations, high-speed trains, and clients, thus constructing a multilevel caching architecture based on spatio-temporal attributes. Then, this paper mathematically models the media stream transmission process and summarizes the optimization problems that need to be solved. To solve the optimization problem, this paper proposes three optimization algorithms, namely, the placement algorithm based on three-dimensional caching, the video content selection algorithm for caching, and the bitrate selection algorithm. Finally, this paper builds a simulation system, which shows that the scheme proposed in this paper is more suitable for high-speed mobile networks, with better and more stable performance. Full article
Show Figures

Figure 1

18 pages, 758 KiB  
Article
Traffic-Aware Optimization of Task Offloading and Content Caching in the Internet of Vehicles
by Pengwei Wang, Yaping Wang, Junye Qiao and Zekun Hu
Appl. Sci. 2023, 13(24), 13069; https://doi.org/10.3390/app132413069 - 7 Dec 2023
Cited by 4 | Viewed by 1615
Abstract
Emerging in-vehicle applications seek to improve travel experiences, but the rising number of vehicles results in more computational tasks and redundant content requests, leading to resource waste. Efficient compute offloading and content caching strategies are crucial for the Internet of Vehicles (IoV) to [...] Read more.
Emerging in-vehicle applications seek to improve travel experiences, but the rising number of vehicles results in more computational tasks and redundant content requests, leading to resource waste. Efficient compute offloading and content caching strategies are crucial for the Internet of Vehicles (IoV) to optimize performance in time latency and energy consumption. This paper proposes a joint task offloading and content caching optimization method based on forecasting traffic streams, called TOCC. First, temporal and spatial correlations are extracted from the preprocessed dataset using the Forecasting Open Source Tool (FOST) and integrated to predict the traffic stream to obtain the number of tasks in the region at the next moment. To obtain a suitable joint optimization strategy for task offloading and content caching, the multi-objective problem of minimizing delay and energy consumption is decomposed into multiple single-objective problems using an improved Multi-Objective Evolutionary Algorithm based on Decomposition (MOEA/D) via the Tchebycheff weight aggregation method, and a set of Pareto-optimal solutions is obtained. Finally, the experimental results verify the effectiveness of the TOCC strategy. Compared with other methods, its latency is up to 29% higher and its energy consumption is up to 83% higher. Full article
Show Figures

Figure 1

Back to TopTop