Using numerous devices while driving causes drivers to lose focus on the road, contributing to accidents in about one-third of cases. To address this issue, significant research is focused on developing interfaces bet...
详细信息
As a distributed machine learning framework, federated learning has received considerable attention in recent years and has been researched and applied in various scenarios. However, the system heterogeneity due to th...
详细信息
ISBN:
(纸本)9798400716751
As a distributed machine learning framework, federated learning has received considerable attention in recent years and has been researched and applied in various scenarios. However, the system heterogeneity due to the physical characteristics of various terminal devices has led to the straggler effect, making the practical implementation of federated learning challenging. therefore, we propose a semi-asynchronous federated optimization method based on buffer pre-aggregation. this method allows every participant to engage in training through pre-aggregation and establishes a training time framework based on the pre-aggregation time. It updates the model adaptively using a semi-asynchronous communication method combined with lag factors, improving communication efficiency while maintaining stable accuracy. Experimental results on datasets demonstrate that our proposed method can effectively accelerate the training process of federated learning compared to existing federated optimization methods.
LoRa technology has shown to be a very promising option for implementing a variety of internet of things applications. One such application is the private farming remote monitoring. In this paper, the authors present ...
详细信息
Attribute-based encryption (ABE) has been used to provide data confidentiality and fine-grained access control in the internet of Vehicles (IoV). However, the attributes of vehicles in IoV might change frequently due ...
详细信息
Attribute-based encryption (ABE) has been used to provide data confidentiality and fine-grained access control in the internet of Vehicles (IoV). However, the attributes of vehicles in IoV might change frequently due to the movements of vehicles. thus, the invalid attributes need to be revoked in time and efficiently to ensure the security of the system. In this paper, we propose a data sharing scheme based on ABE for IoV. By using a binary tree and attribute version keys, flexible revocation can be achieved for IoV. Moreover, the ciphertext can be stored on clouds, and the distribution and of attribute keys can be realized by distributed attribute authorities. We performed the security analysis and proved the security of the proposed scheme. the results showed that the proposed scheme has lower average computing overhead in terms of attribute revocations compared with other schemes based on ABE, and can satisfy the performance requirement data sharing for IoV. (c) 2023 the Authors. Published by Elsevier B.V.
Tower solar thermal power generation is a new type of low-carbon and environmentally friendly clean energy technology. In this paper, a single-objective optimization model is established withthe maximum annual averag...
详细信息
Object tracking is a crucial field in computer vision, with significant applications in areas like drone operation and intelligent driving, where real-time performance and high accuracy are essential. Conventional cor...
详细信息
the proceedings contain 13 papers. the special focus in this conference is on Big Data Innovation for Sustainable Cognitive computing . the topics include: Integrating Fuzzy Logic and Deep Learning for Effective Netwo...
ISBN:
(纸本)9783031546952
the proceedings contain 13 papers. the special focus in this conference is on Big Data Innovation for Sustainable Cognitive computing . the topics include: Integrating Fuzzy Logic and Deep Learning for Effective Network Attack Detection with Fuzzified Deep Convolutional Neural Network;evolvable Hardware Using Genetic Algorithm;zero Watermarking and Data Authentication;gender-Based Differences in Demographic and Time Domain Pulse Rate Variability Parameters in Association with Type2 Diabetic;symbiotic Organism Search: A Novel Paradigm for Feature Optimization in Finger Vein Recognition Systems;Streamlining KYC Processes for Banks with Centralized Information Repository Using Design thinking;transforming Agriculture through internet of things;anti-theft System Using Structural Similarity;Analysis and Prediction of CO2 Emissions, Energy Use, and Economic Growth Trilemma in India;Cardless ATM Transaction System.
the healthcare industry has undergone a significant transformation withthe emergence of internet of things (IoT) technology. Various computing paradigms, including cloud computing, fog computing, and edge computing, ...
详细信息
the availability of a large number of devices in the internet of things (IoT) allows us to carry out distributed applications in a collaborative fashion. this approach is especially beneficial in smart city scenarios,...
详细信息
ISBN:
(纸本)9798350396690
the availability of a large number of devices in the internet of things (IoT) allows us to carry out distributed applications in a collaborative fashion. this approach is especially beneficial in smart city scenarios, wherein different types of resources (i.e., for sensing and actuation, in addition to computation and storage) are key to providing effective location-based services. this article addresses sharing heterogeneous resources for IoT applications in smart cities. Specifically, it takes a game-theoretic approach and addresses the problem of allocating resources from different devices as a combinatorial double auction. Features specific to IoT devices, including their affinity (e.g., ownership and co-location), are leveraged to form groups that offer resource bundles with a certain reliability. the proposed solution incurs a low computational complexity and achieves several important economic properties: incentive compatibility, individual rationality, and a balanced budget. Simulations based on a large-scale dataset demonstrate that the combinatorial double auction is effective and can be completed in a short time.
the Routing Protocol for Low power and Lossy networks (RPL) has been developed by the internet Engineering Task Force (IETF) standardization body to serve as a part of the 6LoWPAN (IPv6 over Low-Power Wireless Persona...
详细信息
暂无评论