The emergence of software-defined vehicles(SDVs),combined with autonomous driving technologies,has en-abled a new era of vehicle computing(VC),where vehicles serve as a mobile computing ***,the interdisci-plinary comp...
详细信息
The emergence of software-defined vehicles(SDVs),combined with autonomous driving technologies,has en-abled a new era of vehicle computing(VC),where vehicles serve as a mobile computing ***,the interdisci-plinary complexities of automotive systems and diverse technological requirements make developing applications for au-tonomous vehicles *** simplify the development of applications running on SDVs,we propose a comprehen-sive suite of vehicle programming interfaces(VPIs).In this study,we rigorously explore the nuanced requirements for ap-plication development within the realm of VC,centering our analysis on the architectural intricacies of the Open Vehicu-lar data Analytics Platform(OpenVDAP).We then detail our creation of a comprehensive suite of standardized VPIs,spanning five critical categories:Hardware,data,Computation,Service,and Management,to address these evolving pro-gramming *** validate the design of VPIs,we conduct experiments using the indoor autonomous vehicle,Ze-bra,and develop the OpenVDAP prototype *** comparing it with the industry-influential AUTOSAR interface,our VPIs demonstrate significant enhancements in programming efficiency,marking an important advancement in the field of SDV application *** also show a case study and evaluate its *** work highlights that VPIs significantly enhance the efficiency of developing applications on *** meet both current and future technologi-cal demands and propel the software-defined automotive industry toward a more interconnected and intelligent future.
The rapid expansion of e-wallet services in Indonesia has significantly heightened the need for efficient customer service solutions, making chatbots an essential tool for user support. However, many providers continu...
详细信息
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in...
详细信息
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a varietyof industries, including access control, law enforcement, surveillance, and internet communication. However,the growing usage of face recognition technology has created serious concerns about data monitoring and userprivacy preferences, especially in context-aware systems. In response to these problems, this study provides a novelframework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain,and distributed computing to solve privacy concerns while maintaining exact face recognition. The framework’spainstaking design and execution strive to strike a compromise between precise face recognition and protectingpersonal data integrity in an increasingly interconnected environment. Using cutting-edge tools like Dlib for faceanalysis,Ray Cluster for distributed computing, and Blockchain for decentralized identity verification, the proposedsystem provides scalable and secure facial analysis while protecting user privacy. The study’s contributions includethe creation of a sustainable and scalable solution for privacy-aware face recognition, the implementation of flexibleprivacy computing approaches based on Blockchain networks, and the demonstration of higher performanceover previous methods. Specifically, the proposed StyleGAN model has an outstanding accuracy rate of 93.84%while processing high-resolution images from the CelebA-HQ dataset, beating other evaluated models such asProgressive GAN 90.27%, CycleGAN 89.80%, and MGAN 80.80%. With improvements in accuracy, speed, andprivacy protection, the framework has great promise for practical use in a variety of fields that need face recognitiontechnology. This study paves the way for future research in privacy-enhanced face recognition systems, emphasizingt
Low resolution image-face recognition system is one of the challenging aspects of face recognition models' development. From machine learning, deep learning, and into ensemble learning are implemented to develop f...
详细信息
The paper proposed a secured and efficient data aggregation mechanism leveraging the edge computing paradigm and homomorphic data encryption technique. The paper used a unique combination of Paillier cryptosystem and ...
详细信息
Deep learning has become an important computational paradigm in our daily lives with a wide range of applications,from authentication using facial recognition to autonomous driving in smart vehicles. The quality of th...
Deep learning has become an important computational paradigm in our daily lives with a wide range of applications,from authentication using facial recognition to autonomous driving in smart vehicles. The quality of the deep learning models, i.e., neural architectures with parameters trained over a dataset, is crucial to our daily living and economy.
Spark performs excellently in large-scale data-parallel computing and iterative processing. However, with the increase in data size and program complexity, the default scheduling strategy has difficulty meeting the de...
详细信息
Nyctophobia is a phobia of the dark and is common among children but also found in adults. While the phobia itself is commonly known, the diversity of its treatment is still minimal. As technology has reached its high...
详细信息
Online streaming feature selection(OSFS),as an online learning manner to handle streaming features,is critical in addressing high-dimensional *** real big data-related applications,the patterns and distributions of st...
详细信息
Online streaming feature selection(OSFS),as an online learning manner to handle streaming features,is critical in addressing high-dimensional *** real big data-related applications,the patterns and distributions of streaming features constantly change over time due to dynamic data generation ***,existing OSFS methods rely on presented and fixed hyperparameters,which undoubtedly lead to poor selection performance when encountering dynamic *** make up for the existing shortcomings,the authors propose a novel OSFS algorithm based on vague set,named *** main idea is to combine uncertainty and three-way decision theories to improve feature selection from the traditional dichotomous method to the trichotomous ***-Vague also improves the calculation method of correlation between features and ***,OSFS-Vague uses the distance correlation coefficient to classify streaming features into relevant features,weakly redundant features,and redundant ***,the relevant features and weakly redundant features are filtered for an optimal feature *** evaluate the proposed OSFS-Vague,extensive empirical experiments have been conducted on 11 *** results demonstrate that OSFS-Vague outperforms six state-of-the-art OSFS algorithms in terms of selection accuracy and computational efficiency.
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has expanded the potential targets that hackers might *** adequate safeguards,data transmitted on the internet is significantly more susceptible to unauthorized access,theft,or *** identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious *** research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks(RNN)integrated with Long Short-Term Memory(LSTM)*** proposed model can identify various types of cyberattacks,including conventional and distinctive *** networks,a specific kind of feedforward neural networks,possess an intrinsic memory *** Neural Networks(RNNs)incorporating Long Short-Term Memory(LSTM)mechanisms have demonstrated greater capabilities in retaining and utilizing data dependencies over extended *** such as data types,training duration,accuracy,number of false positives,and number of false negatives are among the parameters employed to assess the effectiveness of these models in identifying both common and unusual *** are utilised in conjunction with LSTM to support human analysts in identifying possible intrusion events,hence enhancing their decision-making capabilities.A potential solution to address the limitations of Shallow learning is the introduction of the Eccentric Intrusion Detection *** model utilises Recurrent Neural Networks,specifically exploiting LSTM *** proposed model achieves detection accuracy(99.5%),generalisation(99%),and false-positive rate(0.72%),the parameters findings reveal that it is superior to state-of-the-art techniques.
暂无评论