Software Defect Prediction (SDP) uses machine learning algorithms to detect faulty and defective modules inside software projects. Like any machine learning model, the model’s performance depends on the training data...
详细信息
Autonomous navigation in obstacle-rich indoor environments is crucial for both industrial and domestic robotic applications. A central aspect of this process is Simultaneous Localization and Mapping (SLAM). This paper...
详细信息
Nowadays people express their opinions on social media. Also provides product reviews on eCommerce websites and responds to various news as comments. It is necessary to know the polarity and aspect of various posts an...
详细信息
Multi-focus image fusion is a technique that combines multiple out-of-focus images to enhance the overall image quality. It has gained significant attention in recent years, thanks to the advancements in deep learning...
详细信息
In the financial markets, artificial intelligence technology is widely used for stock forecasting. The precision of forecast results and the timing of transactions are crucial. In this paper, ten stocks from the U.S. ...
详细信息
Decision-making is crucial in fully autonomous vehicle operations and is expected to greatly influence future transportation systems. Observing the current driving status of autonomous vehicles is vital for its decisi...
详细信息
Decision-making is crucial in fully autonomous vehicle operations and is expected to greatly influence future transportation systems. Observing the current driving status of autonomous vehicles is vital for its decision-making process. The autonomous connected vehicles on the road send significant data about their movements to the server to maintain continuous training. With the Proof of Authority (PoA) consensus process, blockchain technology provides a valid, decentralised and secure option to improve transactions throughput and minimise delay. The limited computational capacity of vehicles poses a challenge in achieving high accuracy and low latency while training self-driving algorithms. GPT-4V surpassed challenging autonomous systems in scene interpretation and causal thinking. GPT-4V has ability to navigate circumstances without access to database, interpret intentions, and make sound decisions in real-world driving scenarios. The reward function and different driving conditions are organised to allow an optimal search to find the most efficient driving style while ensuring safety. The consequences of the Blockchain-enabled decision-making model (DMM) for Self-Driving Vehicles (SDV) primarily based on GPT-4V and Federated Reinforcement Learning (FRL) would, likely, upgrades in decision-making accuracy, operational performance, statistics integrity, and potentially enhanced learning skills in SDV. Integrating blockchain technology, superior language modelling GPT-4V and FRL may lead to multiplied safety, reliability, and decision-making ability in SDV. This study utilised the Simulation of Urban MObility (SUMO) simulator to assess the ability of SDV to maintain its desired speed consistently and securely in a highway setting using proposed DMM. This study indicates that the suggested DMM, utilising the driving state evaluation approach for SDV, can help these vehicles operate safely and effectively. The performance of the proposed model, such as CPU utilisation
In this research, haptic motor, Node MCU, ultrasonic sensors are used to address the problem associated with the current walking stick for visually disabled people. These problems include disturbing their main sense o...
详细信息
It's no secret that security systems rely heavily on image processing because of its versatility. Two-dimensional visuals, intricate algorithms, and instantaneous decision-making are all challenges that must be me...
详细信息
ISBN:
(纸本)9798350336009
It's no secret that security systems rely heavily on image processing because of its versatility. Two-dimensional visuals, intricate algorithms, and instantaneous decision-making are all challenges that must be met by the system. It is possible to optimize the system at one of four stages: preprocessing, feature extraction, Lip detection, and Recognition. Using modern computing hardware and software, we can create a system that is both easy to use and exactly what we need. Unfortunately, as more characteristics are added, the complexity of implementing these algorithms grows. The process is improved through the development of novel approaches, tools, and strategies. Machine learning and AI techniques have recently been applied to image processing applications. Standard methods of authentication, such as passwords and PINs, are becoming increasingly insecure. Physical and biological characteristics that are unique to each individual provide the best level of security. It is vulnerable to guessing and theft in business and public computer networks. Plastic cards, smart cards, and computer token cards all have non-security flaws in the form of forgery, loss, corruption, and inaccessibility. Identifying techniques based on biometrics have several applications in forensics, finance, and other fields. Voluntary action from the past has the drawbacks of being difficult to implement and not adaptable for covert uses, such as in surveillance applications. Lip image audit and verification during biometrics record keeping is prone to human error. Image quality of the lips is more easily obtained than fingerprint images. Only about five percent of the population has imperfect fingerprints and cannot be verified. Reasons include but are not limited to dry skin, diseased skin, elderly skin, wounded skin, calloused finger, oriental skin, bandaged finger, narrow finger, smeared sensor on reader, etc. Varying lighting conditions are widely recognized as one of the most crucial aspec
The underwater object detection is a difficult task due to the unclear visibility and lack of objects underwater in kovalam, it was expected to have visibility up to three to five meters but it is very complicated to ...
详细信息
With the rapid development of urban rail transit,the existing track detection has some problems such as low efficiency and insufficient detection coverage,so an intelligent and automatic track detectionmethod based on...
详细信息
With the rapid development of urban rail transit,the existing track detection has some problems such as low efficiency and insufficient detection coverage,so an intelligent and automatic track detectionmethod based onUAV is urgently needed to avoid major safety *** the same time,the geographical distribution of IoT devices results in the inefficient use of the significant computing potential held by a large number of *** a result,the Dispersed Computing(DCOMP)architecture enables collaborative computing between devices in the Internet of Everything(IoE),promotes low-latency and efficient cross-wide applications,and meets users’growing needs for computing performance and service *** paper focuses on examining the resource allocation challenge within a dispersed computing environment that utilizes UAV inspection ***,the system takes into account both resource constraints and computational constraints and transforms the optimization problem into an energy minimization problem with computational *** Markov Decision Process(MDP)model is employed to capture the connection between the dispersed computing resource allocation strategy and the system ***,a method based on Double Deep Q-Network(DDQN)is introduced to derive the optimal ***,an experience replay mechanism is implemented to tackle the issue of increasing *** experimental simulations validate the efficacy of the method across various scenarios.
暂无评论