As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation *** Toll Collection(...
详细信息
As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation *** Toll Collection(ETC),which is one of the services included in ITS systems,is an automated system that allows vehicles to pass through toll plazas without stopping for manual *** ETC system is widely deployed on highways due to its contribution to stabilizing the overall traffic system *** ensure secure and efficient toll payments,designing a distributed model for sharing toll payment information among untrusted toll service providers is ***,the current ETC system operates under a centralized ***,both toll service providers and toll plazas know the toll usage history of *** raises concerns about revealing the entire driving routes and patterns of *** address these issues,blockchain technology,suitable for secure data management and data sharing in distributed systems,is being applied to the ETC *** enables efficient and transparent management of ETC ***,the public nature of blockchain poses a challenge where users’usage records are exposed to all *** tackle this,we propose a blockchain-based toll ticket model named AnonymousTollPass that considers the privacy of *** proposed model utilizes traceable ring signatures to provide unlinkability between tickets used by a vehicle and prevent the identity of the vehicle using the ticket from being identified among the ring members for the ***,malicious vehicles’identities can be traced when they attempt to reuse *** conducting simulations,we show the effectiveness of the proposed model and demonstrate that gas fees required for executing the proposed smart contracts are only 10%(when the ring size is 50)of the fees required in previous studies.
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to t...
详细信息
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to the person being *** study presents a novel framework for generating animatable 3D cartoon faces from a single portrait *** First,we transferred an input real-world portrait to a stylized cartoon image using *** then proposed a two-stage reconstruction method to recover a 3D cartoon face with detailed *** two-stage strategy initially performs coarse estimation based on template models and subsequently refines the model by nonrigid deformation under landmark ***,we proposed a semantic-preserving face-rigging method based on manually created templates and deformation *** Compared with prior arts,the qualitative and quantitative results show that our method achieves better accuracy,aesthetics,and similarity ***,we demonstrated the capability of the proposed 3D model for real-time facial animation.
This innovative practice full paper describes an innovative pedagogical framework that integrates community engaged learning and social justice principles into a traditional web development course, fostering a holisti...
详细信息
This article reviews the electromagnetic framework used to model radio frequency interference (RFI) and the resulting development of mitigation methods. With the rise of IoT devices, wireless devices in which RF anten...
详细信息
In this paper, a new block diagonal chaotic model (BDC) is investigated due to higher necessity of advanced secure data transmission method in wireless medium and considerable limitation on computational storage space...
详细信息
This paper presents a radio frequency fingerprinting identification (RFFI) protocol in wireless links with multi-antenna array transmitters. Multi-antenna systems are widely used in wireless communication systems for ...
详细信息
Along with the flourishing of brain-computer interface technology,the brain-to-brain information transmission between different organisms has received high attention in recent ***,specific information transmission mod...
详细信息
Along with the flourishing of brain-computer interface technology,the brain-to-brain information transmission between different organisms has received high attention in recent ***,specific information transmission mode and implementation technology need to be further *** this paper,we constructed a brain-to-brain information transmission system between pigeons based on the neural information decoding and electrical stimulation encoding *** system consists of three parts:(1)the“perception pigeon”learns to distinguish different visual stimuli with two discrepant frequencies,(2)the computer decodes the stimuli based on the neural signals recorded from the“perception pigeon”through a frequency identification algorithm(neural information decoding)and encodes them into different kinds of electrical pulses,(3)the“action pigeon”receives the Intracortical Microstimulation(ICMS)and executes corresponding key-pecking actions through discriminative learning(electrical stimulation encoding).The experimental results show that our brain-to-brain system achieves information transmission from perception to action between two pigeons with the average accuracy of about 72%.Our study verifies the feasibility of information transmission between inter-brain based on neural information decoding and ICMS encoding,providing important technical methods and experimental program references for the development of brain-to-brain communication technology.
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get c...
详细信息
VANETs are highly attractive and is used in maximum of the applications of cross-regional communication. To increase the coverage of the vehicular network, Unmanned Arial Vehicles (UAVs) are introduced, and they get connected with the satellite networks to perform heterogeneous communication. With the help of this connectivity, the communication quality of ground level to air medium is increased. Currently the vehicle usage is highly increased and as a results of communication link failure, improper resource allocation are arises whither abruptly assumes a stability about a network with that increases an energy consumption and communication delay in the heterogeneous networks. In these conditions, thus study is idea of Resource Allocation and Edge Computing for Dual Hop Communication (RAEDH) in introduced in satellite assisted UAVs enabled VANETs. The major sections of the approach are UAV assisted mobile computing, resource allocation among the vehicles and the UAVs, and dual communication among the vehicles and the *** these methods the input resources are properly allocated and that reduces the power utility and communication delay. Initially, the vehicular network is established, incorporating trusted components like TA, RSU, and CRS. Subsequently, mobile edge computing reduces energy consumption through computation offloading and optimized UAV trajectory selection. Resource allocation, facilitated by whale optimization, ensures effective utilization across vehicles. The implementation of this method is done in NS3, and the scenario is analyzed using two parameters like number of vehicles and its speed. The output parameters that remain thought-out over a performance examination stay throughput, end-to-end delay, energy efficiency, packet loss, packet delivery ratio, and routing overhead, and as well those results are compared with the earlier methods. Finally, dual-hop transmission between vehicles and UAVs enhances delivery ratio and throughput. From
Recent advancements in deep neural networks (DNNs) have made them indispensable for numerous commercial applications. These include healthcare systems and self-driving cars. Training DNN models typically demands subst...
详细信息
作者:
Huang, Po-HsunHsiao, Tzu-Chien
Hsinchu300 Taiwan Nycu
Department of Computer Science College of Cs and Institute of Biomedical Engineering College of Electrical and Computer Engineering Hsinchu300 Taiwan
The determination of appropriate parameters and an appropriate window size in most entropy-based measurements of time-series complexity is a challenging problem. Inappropriate settings can lead to the loss of intrinsi...
详细信息
暂无评论