7 results
Search Results
2. Profit maximization for security-aware task offloading in edge-cloud environment.
- Author
-
Li, Zhongjin, Chang, Victor, Hu, Haiyang, Yu, Dongjin, Ge, Jidong, and Huang, Binbin
- Subjects
- *
PROFIT maximization , *ARTIFICIAL intelligence , *ALGORITHMS , *DATA security , *MOBILE apps , *CLOUD computing - Abstract
Mobile devices (MDs) and applications are receiving extensive popularity and attracting significant attention. Mobile applications, especially for artificial intelligence (AI) applications, require powerful computation-intensive resources. Hence, running all the AI applications on a single MD introduces high energy consumption and application delay, as it has limited battery capacity and computation resources. Fortunately, the emerging edge-cloud computing (ECC) architecture pushes the computation resource to both the network edge and remote cloud to cope with challenging AI applications. Although the advantage of ECC greatly benefits various mobile applications, data security remains an important open issue in this scenario, which has not been well studied. This paper focuses on the profit maximization (PM) problem for security-aware task offloading in an ECC environment, i.e., considering the tasks from MDs with different service demands, edge nodes should decide them to be processed on the edge node or the remote cloud with a security guarantee. Specifically, we first construct the security model to measure the time overhead for each task under various scenarios. We then formulate the PM problem by jointly considering the security demand and deadline constraints of tasks. Finally, we propose a genetic algorithm-based PM (GA-PM) algorithm, the coding strategy of which considers the task execution location and execution order. Moreover, the crossover and mutation operations are implemented based on the coding strategy. Extensive simulation experiments with various parameters varying demonstrate that our GA-PM can achieve better performance than all the comparison algorithms. • The security model is built to measure the execution time of tasks under different parameters. • A genetic algorithm (GA)-based PM algorithm is proposed to implement task offloading and obtain optimal profit. • A coding strategy is devised by considering the tasks execution location and execution order. • Extensive simulation results demonstrate that GA-PM algorithm achieves the optimal profit. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
3. The methodology of studying fairness perceptions in Artificial Intelligence: Contrasting CHI and FAccT.
- Author
-
van Berkel, Niels, Sarsenbayeva, Zhanna, and Goncalves, Jorge
- Subjects
- *
ARTIFICIAL intelligence , *FAIRNESS , *COMMUNITIES , *HUMAN-computer interaction , *SCIENTIFIC community ,WESTERN countries - Abstract
The topic of algorithmic fairness is of increasing importance to the Human–Computer Interaction research community following accumulating concerns regarding the use and deployment of Artificial Intelligence-based systems. How we conduct research on algorithmic fairness directly influences our inferences and conclusions regarding algorithmic fairness. To better understand the methodological decisions of studies focused on people's perceptions of algorithmic fairness, we systematic analysed relevant papers from the CHI and FAccT conferences. We identified 200 relevant papers published between 1993 and 2022 and assessed their study design, participant sample, and geographical location of participants and authors. Our results highlight that studies are predominantly cross-sectional, cover a wide range of participant roles, and that both authors and participants are primarily from the United States. Based on these findings, we reflect on the potential pitfalls and shortcomings in how the community studies algorithmic fairness. • Mapping of CHI and FAccT papers on algorithmic fairness published 1993–2022. • Over one-third of papers miss details on participant locality and compensation. • Algorithmic fairness research largely restricted to US and other Western countries. • Limited cross-country collaboration, most study samples from a single country. • Remote studies are most common, longitudinal studies are relatively rare. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
4. The soft actor–critic algorithm for automatic mode-locked fiber lasers.
- Author
-
Li, Jin, Chang, Kun, Liu, Congcong, Ning, Yu, Ma, Yuansheng, He, Jiangyong, Liu, Yange, and Wang, Zhi
- Subjects
- *
MODE-locked lasers , *FIBER lasers , *REINFORCEMENT learning , *DEEP reinforcement learning , *ALGORITHMS , *ARTIFICIAL intelligence - Abstract
With the development of artificial intelligence, deep reinforcement learning (DRL) has been applied for fiber laser. In this paper, the intelligent passively mode-locked fiber laser (PMLFL) with the Soft Actor–Critic (SAC) algorithm is reported. The SAC algorithm is a DRL algorithm with random policy, which combines the Actor–Critic framework and the maximum entropy. The agent learns the logic of mode-locking by outputting actions and inputting states of the laser. Due to the maximum entropy model, more exploration is encouraged, which means that multiple policies can be learned to maximize the reward, and the robustness is enhanced accordingly. The results show that the logic learned by the agent is similar to that of human. In 80 random initial state of polarization mode-locked tests, 37 explorations are needed on average, and the frequency of achieving mode-locked state exceeds 0.8 within 60 explorations. Further, the laser system can be monitored or controlled remotely, which expands the application scenarios. • Passively mode-locked fiber laser based on the Soft Actor–Critic (SAC) algorithm is proposed. • SAC algorithm is more exploratory and thus more robust. • The laser system based on SAC algorithm can resist the change of environment and realize mode-locking. • The experimental results prove the high stability of SAC algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. Visual video evaluation association modeling based on chaotic pseudo-random multi-layer compressed sensing for visual privacy-protected keyframe extraction.
- Author
-
Liu, Jixin, Li, Yicong, Han, Guang, and Sun, Ning
- Subjects
- *
ARTIFICIAL intelligence , *VIDEO processing , *OPTICAL information processing , *PRIVACY , *ALGORITHMS - Abstract
In current society, artificial intelligence processing technology offers convenient video monitoring, but also raises the risk of privacy leakage. Theoretically, the data used in intelligent video processing methods may directly convey visual information containing private content. For the above problem, this paper uses a multi-layer visual privacy-protected (VPP) coding method to blur private content in the video at the visual level, while avoiding the loss of important visual features contained in the video as much as possible. And this provides a guarantee of the quality of the subsequent keyframe extraction step. Then a visual evaluation algorithm is proposed for assessing the quality of VPP-encoded video privacy protection. And the experiment shows that the results are consistent with those of subjective evaluation. In addition, for VPP-encoded video, we propose an unsupervised two-layer clustering keyframe extraction method with corresponding performance evaluation index. Finally, an association model is established to balance the privacy protection quality and the keyframe extraction performance. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Intake monitoring in free-living conditions: Overview and lessons we have learned.
- Author
-
Diou, Christos, Kyritsis, Konstantinos, Papapanagiotou, Vasileios, and Sarafis, Ioannis
- Subjects
- *
ARTIFICIAL intelligence , *MACHINE learning , *VIDEO recording , *FOOD habits , *BEHAVIORAL research , *SMARTWATCHES , *MEALS , *ALGORITHMS , *DIET - Abstract
The progress in artificial intelligence and machine learning algorithms over the past decade has enabled the development of new methods for the objective measurement of eating, including both the measurement of eating episodes as well as the measurement of in-meal eating behavior. These allow the study of eating behavior outside the laboratory in free-living conditions, without the need for video recordings and laborious manual annotations. In this paper, we present a high-level overview of our recent work on intake monitoring using a smartwatch, as well as methods using an in-ear microphone. We also present evaluation results of these methods in challenging, real-world datasets. Furthermore, we discuss use-cases of such intake monitoring tools for advancing research in eating behavior, for improving dietary monitoring, as well as for developing evidence-based health policies. Our goal is to inform researchers and users of intake monitoring methods regarding (i) the development of new methods based on commercially available devices, (ii) what to expect in terms of effectiveness, and (iii) how these methods can be used in research as well as in practical applications. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
7. Branching interval algebra: An almost complete picture.
- Author
-
Bertagnon, A., Gavanelli, M., Passantino, A., Sciavicco, G., and Trevisani, S.
- Subjects
- *
ALGEBRA , *PROBLEM solving , *ARTIFICIAL intelligence , *ALGORITHMS , *BRANCHING processes - Abstract
Branching Algebra is the natural branching-time generalization of Allen's Interval Algebra. As in the linear case, the consistency problem for Branching Algebra is NP-hard. Branching Algebra has many potential applications in different areas of Artificial Intelligence; therefore, being able to efficiently solve classical problems expressed in Branching Algebra is very important. This can be achieved in two steps: first, by identifying expressive enough, yet tractable fragments of the whole algebra, and, second, by using such fragments to boost the performances of a backtracking algorithm for the whole language. In this paper we study the properties of several such fragments, both from the algebraic and the computational point of view, and we give an almost complete picture of tractable and non-tractable fragments of the Branching Algebra. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.