Diverse critical data, such as location information and driving patterns, can be collected by IoT devices in vehicular networks to improve driving experiences and road safety. However, drivers are often reluctant to s...
详细信息
The critical challenge that modern smart grids face in term of their management is the maximum possible exploitation of the energy that Renewable Energy Sources (RES) produce. The non-controllable nature of the rate t...
详细信息
Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the *** this article,these issues are handled by prop...
详细信息
Intelligent traffic control requires accurate estimation of the road states and incorporation of adaptive or dynamically adjusted intelligent algorithms for making the *** this article,these issues are handled by proposing a novel framework for traffic control using vehicular communications and Internet of Things *** framework integrates Kalman filtering and *** smoothing Kalman filtering,our data fusion Kalman filter incorporates a process-aware model which makes it superior in terms of the prediction *** traditional Q-learning,our Q-learning algorithm enables adaptive state quantization by changing the threshold of separating low traffic from high traffic on the road according to the maximum number of vehicles in the junction *** evaluation,the model has been simulated on a single intersection consisting of four roads:east,west,north,and south.A comparison of the developed adaptive quantized Q-learning(AQQL)framework with state-of-the-art and greedy approaches shows the superiority of AQQL with an improvement percentage in terms of the released number of vehicles of AQQL is 5%over the greedy approach and 340%over the state-of-the-art ***,AQQL provides an effective traffic control that can be applied in today’s intelligent traffic system.
Online customer reviews can be valuable information when processed with the right techniques. Businesses aim to enhance their strategies in managing operations by leveraging sentiment analysis from their clientele. In...
详细信息
We discuss a simple, yet general family of models, namely Random Intersection Graphs (RIGs), initially introduced by Karoński et al. [4] and Singer-Cohen [10]. In such models there is a universe of labels and each on...
详细信息
The importance of accurate flood forecasting is rising as climate change makes it more difficult to predict when and where floods will occur. Flood predictions use supervised machine learning models, and flood levels ...
详细信息
Management and information systems are considered two major disciplines that have to be combined to benefit from knowledge for rational decision-making which means strict procedures utilizing objective knowledge and l...
详细信息
Museum ecosystems need digital transformation to provide value added to museums. This study discusses the digital museum ecosystem conceptual model based on artificial intelligence (AI) technology and the Internet of ...
详细信息
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data *** generated data is collected and shared using edge-based IoT structures at a considerably high ***,the data-s...
详细信息
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data *** generated data is collected and shared using edge-based IoT structures at a considerably high ***,the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge *** address the identified issue,we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing *** particular,we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes,where IoT devices and edge nodes are two parties of the *** devices may make malicious requests to achieve their goals of stealing ***,edge nodes should deny malicious IoT device requests to prevent IoT data from being *** dynamically adjust their own strategies according to the opponent's strategy and finally maximize the *** upon a developed application framework to illustrate the concrete data sharing architecture,a novel algorithm is proposed that can derive the optimal evolutionary learning ***,we numerically simulate evolutionarily stable strategies,and the final results experimentally verify the correctness of the IoT data sharing privacy preservation ***,the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared.
This study proposes a machine-learning-based sentiment classification approach for Bahasa Indonesia, where Gojek App's reviews are used for a case study. The sentiment classification is important since users often...
详细信息
暂无评论