Personalized Federated Learning (pFL) is among the most popular tasks in distributed deep learning, which compensates for mutual knowledge and enables device-specific model personalization. However, the effectiveness ...
详细信息
Broadcasting is an information dissemination primitive where a message is passed from one node (called originator) to all other nodes in the network. With the increasing interest in interconnection networks, an extens...
详细信息
In IoT systems managing multiple devices simultaneously, errors in system controllers often undermine intended operations. Formal verification offers a method to assess system reliability. Colored Generalized Stochast...
详细信息
Early and accurate detection of anomalous events on the freeway, such as accidents, can improve emergency response and clearance. However, existing delays and mistakes from manual crash reporting records make it a dif...
The global elderly population is increasing rapidly, leading to a rise in chronic illnesses and co-existing conditions, which in turn results in higher healthcare expenses. Accidental falls are among the leading cause...
详细信息
The development of the next generation of cellular networks, 5G-Advanced and 6G (5G-A/6G), offers higher speeds, sub-millisecond latency, and providing wider coverage, which are key to meeting the requirements of new ...
详细信息
Data augmentation plays a crucial role in enhancing the robustness and performance of machine learning models across various domains. In this study, we introduce a novel mixed-sample data augmentation method called Ra...
详细信息
Nowadays days,the chief grounds of automobile accidents are driver fatigue and *** the development of computer vision technology,a cutting-edge system has the potential to spot driver distractions or sleepiness and al...
详细信息
Nowadays days,the chief grounds of automobile accidents are driver fatigue and *** the development of computer vision technology,a cutting-edge system has the potential to spot driver distractions or sleepiness and alert them,reducing *** paper presents a novel approach to detecting driver tiredness based on eye and mouth movements and object identification that causes a distraction while operating a motor *** the facial landmarks that the camera picks up and sends to classify using a Convolutional Neural Network(CNN)any changes by focusing on the eyes and mouth zone,precision is *** of the tasks that must be performed in the transit system is seat belt detection to lessen accidents caused by sudden stops or high-speed collisions with other cars.A method is put forth to use convolution neural networks to determine whether the motorist is wearing a seat belt when a driver is sleepy,preoccupied,or not wearing their seat belt,this system alerts them with an alarm,and if they don’t wake up by a predetermined time of 3 s threshold,an automatic message is sent to law enforcement *** suggested CNN-based model exhibits greater accuracy with 97%.It can be utilized to develop a system that detects driver attention or sleeps in real-time.
One of the challenging problems with evolutionary computing algorithms is to maintain the balance between exploration and exploitation capability in order to search global optima.A novel convergence track based adapti...
详细信息
One of the challenging problems with evolutionary computing algorithms is to maintain the balance between exploration and exploitation capability in order to search global optima.A novel convergence track based adaptive differential evolution(CTbADE)algorithm is presented in this research *** crossover rate and mutation probability parameters in a differential evolution algorithm have a significant role in searching global optima.A more diverse population improves the global searching capability and helps to escape from the local optima *** the convergence path over time helps enhance the searching speed of a differential evolution algorithm for varying *** adaptive powerful parameter-controlled sequences utilized learning period-based memory and following convergence track over time are introduced in this *** proposed algorithm will be helpful in maintaining the equilibrium between an algorithm’s exploration and exploitation capability.A comprehensive test suite of standard benchmark problems with different natures,i.e.,unimodal/multimodal and separable/non-separable,was used to test the convergence power of the proposed CTbADE *** results show the significant performance of the CTbADE algorithm in terms of average fitness,solution quality,and convergence speed when compared with standard differential evolution algorithms and a few other commonly used state-of-the-art algorithms,such as jDE,CoDE,and EPSDE *** algorithm will prove to be a significant addition to the literature in order to solve real time problems and to optimize computationalmodels with a high number of parameters to adjust during the problem-solving process.
For efficient and robust information exchange in the vehicular adhoc network,a secure and trusted incentive reward is needed to avoid and reduce the intensity of misbehaving nodes and congestion especially in the case...
详细信息
For efficient and robust information exchange in the vehicular adhoc network,a secure and trusted incentive reward is needed to avoid and reduce the intensity of misbehaving nodes and congestion especially in the case where the periodic beacons exploit the *** addition,we cannot be sure that all vehicular nodes eagerly share their communication assets to the system for message dissemination without any ***,there may be some misbehaving nodes and due to their selfish and greedy approach,these nodes may not help others on the *** deal with this challenge,trust-based misbehavior avoidance schemes are generally reflected as the capable *** this paper,we employed a fair incentive mechanism for cooperation aware vehicular communication *** order to deploy a comprehensive credit based rewarding scheme,the proposed rewardbased scheme fully depends on secure and reliable cryptographic *** order to achieve the security goals,we used the cryptographic scheme to generate a certified public key for the authenticity of every message exchange over the *** evaluated the friction of misbehaving vehicles and the effect of rewarding schemes in context with honest messages dissemination over the network.
暂无评论