This paper explores how reliability analysis and cyber-security analysis can be combined using Artificial Intelligence and Machine Learning (AI/ML), and Large Language Models (LLM) to produce a continuously updated re...
This paper explores how reliability analysis and cyber-security analysis can be combined using Artificial Intelligence and Machine Learning (AI/ML), and Large Language Models (LLM) to produce a continuously updated resilience analysis. This is achieved by modeling both the hardware and software of the system, and employing LLMs and AI/ML to continuously search for new software vulnerabilities and feed that information into continuously updating resilience models. A case study of a drone is presented that demonstrates the promise of the proposed method. It is expected that using the proposed method, named Assessment for Risk in Cybersecurity and Safety - Resilience (ARCS-R), will reduce failure rate of mission-critical cyber-physical systems by reducing the likelihood of a potential initiating event causing a prolonged degradation in system performance that impacts system resilience.
This study examines the accuracy and ethical implications of using convolutional neural networks (CNN) for automated crime detection. A CNN model was trained on a dataset of criminal mugshots to identify potential cri...
This study examines the accuracy and ethical implications of using convolutional neural networks (CNN) for automated crime detection. A CNN model was trained on a dataset of criminal mugshots to identify potential criminal behaviour based on facial features. This study analyzed the performance of the model and achieved a high accuracy rate in identifying criminals. However, the ethical implications of automated criminal detection are also explored, including bias, privacy and human rights violations. The findings of this study highlight the need for caution and ethical considerations when implementing automated crime detection technologies. It is important to ensure that such technologies are not used to violate the rights of individuals or perpetuate societal biases.
Efficient Road sign recognition is key to improving road safety, navigation and to enhance driver assistance for an intelligent transportation system (ITS). However, achieving efficient road sign and traffic recogniti...
Efficient Road sign recognition is key to improving road safety, navigation and to enhance driver assistance for an intelligent transportation system (ITS). However, achieving efficient road sign and traffic recognition is accompanied by many challenges, in our last few years, several deep learning algorithms have been deployed for responding to these limitations. With the exponential increase in the number of vehicles in Morocco, the need for accurate and real-time detection and classification of road signs has become essential. In this paper, we propose an advanced approach for recognizing Moroccan road signs utilizing the YOLOv8 (You Only Look Once) model that very known for its efficiency and effectiveness in object detection tasks. the model is trained and evaluated under a comprehensive dataset that comprising diverse Moroccan road signs. The test of YOLOv8 model give an encouraging result in different performance metrics such as accuracy, recall, precision and mAP which have respectively an average of 0.95, 0.94, 0.96 and 0.97.
The rapid growth of AI-enabled Internet of Vehicles (IoV) calls for efficient machine learning (ML) solutions that can handle high vehicular mobility and decentralized data. This has motivated the emergence of Hierarc...
详细信息
Model inversion attacks (MIAs) aim to reconstruct private images from a target classifier's training set, thereby raising privacy concerns in AI applications. Previous GAN-based MIAs tend to suffer from inferior g...
详细信息
Game theory offers a powerful framework for analyzing strategic interactions among decision-makers, providing tools to model, analyze, and predict their behavior. However, implementing game theory can be challenging d...
详细信息
Earth observation satellites generate large amounts of real-time data for monitoring and managing time-critical events such as disaster relief missions. This presents a major challenge for satellite-to-ground communic...
详细信息
Electric vehicles (EVs) are driving green and low-carbon transport in modern cities. It makes charging station occupancy prediction (CSOP) critual for intelligent transportation systems (ITS) to achieve a balance betw...
详细信息
Cyberbullying, marked by its persistent and intentional aggression online, yields severe repercussions for its victims, extending beyond immediate distress to long-lasting effects such as heightened anxiety, depressio...
详细信息
In recent years, there has been a growth in the development of numerous software algorithms dedicated to pedometers (or step counters). This surge has subsequently spurred the creation of various context-aware smartph...
详细信息
ISBN:
(数字)9798350349948
ISBN:
(纸本)9798350349955
In recent years, there has been a growth in the development of numerous software algorithms dedicated to pedometers (or step counters). This surge has subsequently spurred the creation of various context-aware smartphone applications for sports, healthcare, and other fields. Most works that compare commercial offerings do not adopt a sound and rigorous method, as human testers are asked to stick to a defined set of constraints, and experiments are carried out within controlled environments. However, each application is still tested separately, with no guarantee that the conditions are really the same, plus these conditions cannot resemble the real environment where pedometers are going to be used. Our proposal features a software solution that records the sensor readings of human testers and inject the exact same sensor values into different pedometer applications to produce a sound result by using the same testing conditions. We implement our solution and perform with it a comparison study.
暂无评论