Automotive cyber-physical systems (ACPS) are typical cyber-physical systems because of the joint interaction between the cyber part and physical part. Functional safety requirement (including response time and reliabi...
详细信息
Automotive cyber-physical systems (ACPS) are typical cyber-physical systems because of the joint interaction between the cyber part and physical part. Functional safety requirement (including response time and reliability requirements) for an ACPS function must be assured for safe driving. Auto industry is cost-sensitive, power-sensitive, and environment-friendly. Energy consumption affects the development efficiency of the ACPS and the living environment of people. This paper solves the problem of optimizing the energy consumption for an ACPS function while assuring its functional safety requirement (i.e., energy-efficient functional safety for ACPS). However, implementing minimum response time, maximum reliability, and minimum energy consumption is a conflicting problem. Consequently, solving the problem is a challenge. In this paper, we propose a three-stage design process toward energy-efficient functional safety for ACPS. The topic problem is divided into three sub-problems, namely, response time requirement verification (first stage), functional safety requirement verification (second stage), and functional safety-critical energy consumption optimization (third stage). The proposed energy-efficient functional safety design methodology is implemented by using automotive safety integrity level decomposition, which is defined in the ACPS functional safety standard ISO 26262. Experiments with real-life and synthetic ACPS functions reveal the advantages of the proposed design methodology toward energy-efficient functional safety for ACPS compared with state-of-the-art algorithms. IEEE
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a...
详细信息
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such as ensuring security,compatibility,standardization,performance,privacy,and increasing user *** significantly impacts network security,including better end-user privacy and security,challenges for network security professionals,increasing usage of encrypted malware communication,and difficulty adapting DNS-based security ***,it is important to understand the impact of DoH on network security and develop newprivacy-preserving techniques to allowthe analysis of DoH traffic without compromising user *** paper provides an in-depth analysis of the effects of DoH on *** discuss various techniques for detecting DoH tunneling and identify essential research challenges that need to be addressed in future security ***,this paper highlights the need for continued research and development to ensure the effectiveness of DoH as a tool for improving privacy and security.
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
COVID-19 pandemic restrictions limited all social activities to curtail the spread of the *** foremost and most prime sector among those affected were schools,colleges,and *** education system of entire nations had sh...
详细信息
COVID-19 pandemic restrictions limited all social activities to curtail the spread of the *** foremost and most prime sector among those affected were schools,colleges,and *** education system of entire nations had shifted to online education during this *** shortcomings of Learning Management systems(LMSs)were detected to support education in an online mode that spawned the research in Artificial Intelligence(AI)based tools that are being developed by the research community to improve the effectiveness of *** paper presents a detailed survey of the different enhancements to LMSs,which are led by key advances in the area of AI to enhance the real-time and non-real-time user *** AI-based enhancements proposed to the LMSs start from the Application layer and Presentation layer in the form of flipped classroom models for the efficient learning environment and appropriately designed UI/UX for efficient utilization of LMS utilities and resources,including AI-based *** layer enhancements are also required,such as AI-based online proctoring and user authentication using *** extend to the Transport layer to support real-time and rate adaptive encrypted video transmission for user security/privacy and satisfactory working of *** also needs the support of the Networking layer for IP-based geolocation features,the Virtual Private Network(VPN)feature,and the support of Software-Defined Networks(SDN)for optimum Quality of Service(QoS).Finally,in addition to these,non-real-time user experience is enhanced by other AI-based enhancements such as Plagiarism detection algorithms and Data Analytics.
Efficient energy management is a cornerstone of advancing cognitive cities,where AI,IoT,and cloud computing seamlessly integrate to meet escalating global energy *** this context,the ability to forecast electricity co...
详细信息
Efficient energy management is a cornerstone of advancing cognitive cities,where AI,IoT,and cloud computing seamlessly integrate to meet escalating global energy *** this context,the ability to forecast electricity consumption with precision is vital,particularly in residential settings where usage patterns are highly variable and *** study presents an innovative approach to energy consumption forecasting using a bidirectional Long Short-Term Memory(LSTM)*** a dataset containing over twomillionmultivariate,time-series observations collected froma single household over nearly four years,ourmodel addresses the limitations of traditional time-series forecasting methods,which often struggle with temporal dependencies and non-linear *** bidirectional LSTM architecture processes data in both forward and backward directions,capturing past and future contexts at each time step,whereas existing unidirectional LSTMs consider only a single temporal *** design,combined with dropout regularization,leads to a 20.6%reduction in RMSE and an 18.8%improvement in MAE over conventional unidirectional LSTMs,demonstrating a substantial enhancement in prediction accuracy and *** to existing models—including SVM,Random Forest,MLP,ANN,and CNN—the proposed model achieves the lowest MAE of 0.0831 and RMSE of 0.2213 during testing,significantly outperforming these *** results highlight the model’s superior ability to navigate the complexities of energy usage patterns,reinforcing its potential application in AI-driven IoT and cloud-enabled energy management systems for cognitive *** integrating advanced machine learning techniqueswith IoT and cloud infrastructure,this research contributes to the development of intelligent,sustainable urban environments.
Medical data are subject to privacy regulations, which severely limit AI specialists who wish to construct decision support systems for medicine. Large amounts of this data are tabular, indicating that they are organi...
详细信息
This paper investigates the application of GradCAM, an explainable AI (XAI) technique, to enhance the transparency and precision of fingerprint authentication systems in forensics, particularly in detecting fingerprin...
详细信息
Neural networks have become a leading model in modern machine learning, able to model even the most complex data. For them to be properly trained, however, a lot of computational resources are required. With the carbo...
详细信息
作者:
Wanjari, KetanVerma, Prateek
Department of Computer Science and Engineering Faculty of Engineering and Technology Maharashtra Wardha442001 India
Department of Artificial Intelligence and Data Science Faculty of Engineering and Technology Maharashtra Wardha442001 India
Modern image recognition has experienced dramatic improvements because of Machine Learning and Deep Learning algorithms together. This study investigates CNNs and SVMs for recognition enhancement while reviewing image...
详细信息
暂无评论