Large language models (LLMs) have recently shown remarkable performance in a variety of natural language processing (NLP) *** further explore LLMs'reasoning abilities in solving complex problems,recent research [1...
详细信息
Large language models (LLMs) have recently shown remarkable performance in a variety of natural language processing (NLP) *** further explore LLMs'reasoning abilities in solving complex problems,recent research [1-3]has investigated chain-of-thought (CoT) reasoning in complex multimodal scenarios,such as science question answering (scienceQA) tasks [4],by fine-tuning multimodal models through human-annotated CoT ***,collected CoT rationales often miss the necessary rea-soning steps and specific expertise.
This paper presents a novel Substrate Integrated Waveguide (SIW) Cavity-Backed Slot Antenna (CBSA) to enable the next generation of communication and sensing infrastructure. The antenna achieves a bandwidth of 40%, wi...
详细信息
The technology of facial expression reconstruction has paved the way for various face-centric applications such as virtual reality (VR) modeling, human-computer interaction, and affective computing. Existing vision-ba...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
In the Internet of Things (IoT), optimizing machine performance through data analysis and improved connectivity is pivotal. Addressing the growing need for environmentally friendly IoT solutions, we focus on "gre...
详细信息
Research into Medicare fraud detection that utilizes machine learning methodologies is of great national interest due to the significant fiscal ramifications of this type of fraud. Our big data analysis pertains to th...
详细信息
The process of modifying digital images has been made significantly easier by the availability of several image editing software. However, in a variety of contexts, including journalism, judicial processes, and histor...
详细信息
As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation *** Toll Collection(...
详细信息
As big data,Artificial Intelligence,and Vehicle-to-Everything(V2X)communication have advanced,Intelligent Transportation Systems(ITS)are being developed to enable efficient and safe transportation *** Toll Collection(ETC),which is one of the services included in ITS systems,is an automated system that allows vehicles to pass through toll plazas without stopping for manual *** ETC system is widely deployed on highways due to its contribution to stabilizing the overall traffic system *** ensure secure and efficient toll payments,designing a distributed model for sharing toll payment information among untrusted toll service providers is ***,the current ETC system operates under a centralized ***,both toll service providers and toll plazas know the toll usage history of *** raises concerns about revealing the entire driving routes and patterns of *** address these issues,blockchain technology,suitable for secure data management and data sharing in distributed systems,is being applied to the ETC *** enables efficient and transparent management of ETC ***,the public nature of blockchain poses a challenge where users’usage records are exposed to all *** tackle this,we propose a blockchain-based toll ticket model named AnonymousTollPass that considers the privacy of *** proposed model utilizes traceable ring signatures to provide unlinkability between tickets used by a vehicle and prevent the identity of the vehicle using the ticket from being identified among the ring members for the ***,malicious vehicles’identities can be traced when they attempt to reuse *** conducting simulations,we show the effectiveness of the proposed model and demonstrate that gas fees required for executing the proposed smart contracts are only 10%(when the ring size is 50)of the fees required in previous studies.
Blue phosphorescent organic light-emitting diodes (PHOLEDs) are highly efficient, although their short operational lifetimes have limited their commercial acceptance in displays and lighting. A high density of energet...
详细信息
Multiagent Reinforcement Learning (MARL) plays a pivotal role in intelligent vehicle systems, offering solutions for complex decision-making, coordination, and adaptive behavior among autonomous agents. This review ai...
详细信息
Multiagent Reinforcement Learning (MARL) plays a pivotal role in intelligent vehicle systems, offering solutions for complex decision-making, coordination, and adaptive behavior among autonomous agents. This review aims to highlight the importance of fostering trust in MARL and emphasize the significance of MARL in revolutionizing intelligent vehicle systems. First, this paper summarizes the fundamental methods of MARL. Second, it identifies the limitations of MARL in safety, robustness, generalization, and ethical constraints and outlines the corresponding research methods. Then we summarize their applications in intelligent vehicle systems. Considering human interaction is essential to practical applications of MARL in various domains, the paper also analyzes the challenges associated with MARL's applications in human-machine systems. These challenges, when overcome, could significantly enhance the real-world implementation of MARL-based intelligent vehicle systems. IEEE
暂无评论