Leveraging convolutional neural networks (CNNs) to Vehicle-to-Everything (V2X) communication systems offers a promising approach to vehicle detection, which is essential for improving road safety and traffic efficienc...
详细信息
ISBN:
(数字)9798331507428
ISBN:
(纸本)9798331507435
Leveraging convolutional neural networks (CNNs) to Vehicle-to-Everything (V2X) communication systems offers a promising approach to vehicle detection, which is essential for improving road safety and traffic efficiency. At the same time, parameterization of CNNs’ architectures in order to achieve high accuracy in moving objects’ detection becomes an engineering challenge, especially when data pre- and post-processing solutions need to respect timing requirements. Our study evaluates the performance of five CNN architectures, namely YOLO in v5, v8, and v9, Faster R-CNN, and VGG16, for car detection. We utilize an open dataset including images derived from road-traffic environments and assess the models’ performance using benchmark evaluation metrics, i.e., precision, recall, mean Average Precision (mAP50, mAP50 – 95), and F1-score. Furthermore, we analyze their computational requirements, in terms of execution time and resource demands, which are critical factors when considering real-time applications in V2X systems, such as autonomous driving and traffic management. Our evaluation results indicate that, while the YOLO architecture exhibits the best balance of speed and accuracy, Faster R-CNN has higher detection performance at the cost of greater computational demand. This paper provides insights into each model’s strengths and limitations offering guidance for selecting optimal architectures tailored to V2X-related applications.
The demand for auxiliary systems that utilize methods and technologies of intellectual data analysis and machine learning is increasing in the CRM system development field. These systems are capable of generating valu...
详细信息
Dog activities recognition, especially dog motion status recognition, is an active research area. Although several machine learning and deep learning approaches have been used for dog motion states recognition, use of...
详细信息
ISBN:
(数字)9798350368833
ISBN:
(纸本)9798350368840
Dog activities recognition, especially dog motion status recognition, is an active research area. Although several machine learning and deep learning approaches have been used for dog motion states recognition, use of ensemble learning methods is rather missing as well as a comparison with deep learning ones. This paper focuses on the use of ensemble classifiers and deep learning neural networks in recognizing dog motion states, and their comparison. Our results show a slight superiority in accuracy (94.7
%
vs 92.8%) of deep learning, which is quite comparable to the state-of-the-art, but at the cost of larger complexity and training time, which makes ensemble techniques still attractive.
This research proposes a novel approach to addressing the issue of signature authenticity identification by implementing Deep Metric Learning (DML). The aim of this study is to develop a DML model with high accuracy i...
详细信息
ISBN:
(数字)9798350368802
ISBN:
(纸本)9798350368819
This research proposes a novel approach to addressing the issue of signature authenticity identification by implementing Deep Metric Learning (DML). The aim of this study is to develop a DML model with high accuracy in training and testing processes that can be integrated with a mobile application for signature authenticity verification. The data used in this research are signature images from 90 individuals, divided into two categories: genuine signatures and forged signatures. Testing results show that the developed model has an accuracy of 85.7 % , with high precision for the forged signature class at 95.9% and recall for the genuine signature class at 94.9%. The conclusion of this research is that the developed DML model is reliable for signature verification, although further development is needed to improve the model's performance, especially in detecting forged signatures. Suggestions for future research include increasing the amount and variety of training data, integrating the model with a mobile application, and testing the model under various conditions and on different devices.
With the advancement of cloud-based file management platforms, sharing and storing files in the company's area can be easily achieved through a variety of file-sharing platforms. However, these platforms often lac...
详细信息
ISBN:
(数字)9798350365191
ISBN:
(纸本)9798350365207
With the advancement of cloud-based file management platforms, sharing and storing files in the company's area can be easily achieved through a variety of file-sharing platforms. However, these platforms often lack of security and adequate access logs or activity records for the shared files, resulting in a lack of control and traceability for users. This research proposes an traceable and secure system for managing files in companies using blockchain and IPFS. The content ID of uploaded files to IPFS will be stored on the blockchain along with user access rights and access logs. Integration with the existing company file management system is also facilitated by the use of the change data capture method. Experimental findings demonstrate that the system offers the desired traceability of access and activity while also meeting data security requirements such as confidentiality, integrity, and availability. Furthermore, performance tests indicate satisfactory outcomes with 0.8 seconds per MB for file storage on IPFS, and 4.1 seconds per transaction for data storage on Blockchain. The experimental results revealed that the proposed system, integrating blockchain and IPFS, successfully addressed the need for traceability of access and activity for the company's data, providing a significant improvement in data security and management over existing solutions.
The rapid development of e-commerce platforms has brought significant changes in consumer behavior and business marketing strategies. In facing increasingly tight competition, some online stores need to predict revenu...
详细信息
ISBN:
(数字)9798331519643
ISBN:
(纸本)9798331519650
The rapid development of e-commerce platforms has brought significant changes in consumer behavior and business marketing strategies. In facing increasingly tight competition, some online stores need to predict revenue for the products they have. However, most online stores have more than one category, so it is necessary to evaluate predictions for each category. This problem can be handled by implementing Autoregressive Integrated Moving Average (ARIMA). This approach can be used to handle non-stationarity by having "integrated" components become stationary through differencing. The average MAPE value of all categories of cosmetic products is 12.144%. The development of this prediction system is in accordance with the stages in CRISP-DM. This approach provides a structured framework for carrying out data mining projects with six clear phases.
This paper presents the development of a secure data platform designed to enhance operational efficiency and to facilitate cross-company collaboration within the manufacturing supply chain. The platform is designed to...
详细信息
Brain dynamics big data is of increasing promise for many applications like epilepsy detection and cognitive understanding, with the advancements of consumer technology. However, the deep-source brain measurement is d...
详细信息
ISBN:
(数字)9798331521165
ISBN:
(纸本)9798331521172
Brain dynamics big data is of increasing promise for many applications like epilepsy detection and cognitive understanding, with the advancements of consumer technology. However, the deep-source brain measurement is difficult. In this study, we target the brain electroencephalogram (EEG) application, and investigate the deep-source EEG generation from surface EEG towards convenient big data. The deep learning algorithm has been developed to mine different configurations of the surface EEG streams, including the single-channel and multi-channel cases, for deep-source EEG generation. Promising experiments on the epilepsy application have been conducted, demonstrating the great promise of deep-learning-empowered deep-source EEG generation. This study will greatly advance brain dynamics mining towards smart consumer technology.
Nowadays, numerous devices are utilizing the IoT world, connecting and providing access to data and sensor measurements in vast networks of interconnected objects and devices. Considering the great communication dista...
详细信息
ISBN:
(纸本)9798350362480
Nowadays, numerous devices are utilizing the IoT world, connecting and providing access to data and sensor measurements in vast networks of interconnected objects and devices. Considering the great communication distances that need to be covered occasionally, the LoRaWAN network was proposed as it employs Low Power (LP) and Long Range (LoRa) protocols that reduce device energy consumption while maximizing communication range. A gateway to the cloud authenticates LoRaWAN IoT devices before data transmission. This procedure begins with an unencrypted Join Request. A Join Request includes, among others, a Message Integrity Code (MIC), which is the result of encrypting the unencrypted contents of the message using an AppKey that is securely stored both in the cloud and the IoT device. However, malicious actors acting as Man-In-the-Middle (MITM) can interfere in the communication channel, reverse engineer the MIC value, and derive the AppKey. They can then initiate a Join Request that is misinterpreted as coming from a legitimate device and gain access to the communication channel. This paper introduces a novel approach that focuses on the continuous regeneration of the AppKey, necessitating frequent re-joining and re-authentication of IoT devices within the network. The suggested method, which can be added as an extra layer of security in LoRaWAN networks, uses a key rolling technique similar to the one used in automobile central locking systems, and is developed as an optimised and scalable microservice for various LoRaWAN installations and versions. Through the evaluation process, significant findings emerged, demonstrating the effectiveness of the proposed security solution in mitigating replay attacks. The system successfully prevented the server from getting flooded by malicious packets, distinguishing it from a system lacking the proposed mechanism. Remarkably, this accomplishment was made without causing any noticeable delay to the communication process. In addit
暂无评论