In the context of m-health applications, developing user-friendly interfaces to improve usability and acceptance by older adults has become a prominent research topic. The use of embodied conversational agents (ECAs) ...
详细信息
Autonomous driving has been significantly advanced in todays society, which revolutionized daily routines and facilitated the development of the Internet of Vehicles (IoV). A crucial aspect of this system is understan...
详细信息
Autonomous driving has been significantly advanced in todays society, which revolutionized daily routines and facilitated the development of the Internet of Vehicles (IoV). A crucial aspect of this system is understanding traffic density to enable intelligent traffic management. With the rapid improvement in deep neural networks (DNNs), the accuracy of density estimation has markedly improved. However, there are two main issues that remain unsolved. Firstly, current DNN-based models are excessively heavy, characterized by an overwhelming number of training parameters (millions or even billions) and substantial computational complexity, indicated by a high number of FLOPs. These requirements for storage and computation severely limit the practical application of these models, especially on edge devices with limited capacity and computational power. Secondly, despite the superior performance of DNN models, their effectiveness largely depends on the availability of large-scale data for training. Growing privacy concerns have made individuals increasingly hesitant to allow their data to be publicly used for model training, particularly in vehicle-related applications that might reveal personal movements, which leads to data isolation issues. In this paper, we address these two problems at once with a systematic framework. Specifically, we introduce the Proxy Model Distributed Learning (PMDL) model for traffic density estimation. PMDL model is composed of two main components. First, we introduce a proxy model learning strategy that transfers fine-grained knowledge from a larger master model to a lightweight proxy model, i.e., a proxy model. Second, we design a distributed learning strategy that trains multiple proxy models with privacy-aware local data and seamlessly aggregates these models via a global parameter server. This ensures privacy protection while significantly improving estimation performance compared to training models with limited, isolated data. We tested
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ...
详细信息
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency.
Internet of Things (IoT) has lately been expanded across various applications, drawing significant attention to its design, where a loud industrial atmosphere can exist in the mining area. The central essence of this ...
详细信息
Early warning signs of dementia may include memory loss, difficulty with problem-solving, confusion, changes in mood and behavior, and impaired communication skills. People impacted by dementia often make a loss on th...
详细信息
Internet-of-things (IoT) networks are distinguished by nodes with limited computational power and storage capacity, making Low Power and Lossy Networks (LLNs) protocols essential for effective communication in resourc...
详细信息
The ability to match features and keep track of objects in changing dynamic environments is still an important problem, particularly due to varying noise levels, diverse datasets, and high dimensional feature spaces. ...
详细信息
Tracking a person with an onboard camera is a very difficult and perhaps technically impossible if one camera is used. In this regard, real-life projects use a series of cameras to achieve the task. The advent of came...
详细信息
Information security cannot be underemphasized today especially with the increased use of Information Communication Technology which requires improved threat identification techniques. In this study, we propose a nove...
详细信息
暂无评论