In this paper, we address the complex problem of detecting overlapping speech segments, a key challenge in speech processing with applications in speaker diarization, automatic transcription, and multi-speaker recogni...
详细信息
Children's physical, mental and emotional development depends heavily on sleep, with age-specific sleep needs fluctuating. Malnutrition may result from eating too little, absorbing nutrients poorly, being unwell, ...
详细信息
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model *** address this challenge,prior research has introduced clustered FL(CFL),which involves cluste...
详细信息
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model *** address this challenge,prior research has introduced clustered FL(CFL),which involves clustering clients and training them *** its potential benefts,CFL can be computationally and communicationally expensive when the data distribution is unknown *** is because CFL involves the entire neural networks of involved clients in computing the clusters during training,which can become increasingly timeconsuming with large-sized *** tackle this issue,this paper proposes an efcient CFL approach called LayerCFL that employs a Layer-wised clustering *** LayerCFL,clients are clustered based on a limited number of layers of neural networks that are pre-selected using statistical and experimental *** experimental results demonstrate the efectiveness of LayerCFL in mitigating the impact of Non-IID data,improving the accuracy of clustering,and enhancing computational efciency.
Social media platforms help users share opinions and find new information but also spread rumors, which misinforms the public. These rumour threads often prompt users (called guardians) to respond with fact-checking a...
详细信息
The convergence of blockchain technology and artificial intelligence (AI) presents a promising solution for enhancing safety within the Internet of Vehicles (IoV) ecosystem. This paper introduces the "Blockchain-...
详细信息
The convergence of blockchain technology and artificial intelligence (AI) presents a promising solution for enhancing safety within the Internet of Vehicles (IoV) ecosystem. This paper introduces the "Blockchain-Based Collision Avoidance with AI for Vehicles" (BCA-CAR) algorithm, which aims to provide advanced and intelligent collision avoidance capabilities in IoV. BCA-CAR combines the security and data integrity features of blockchain with the real-time decision-making capabilities of AI to prevent collisions and improve road safety. The algorithm consists of five key phases: Data Collection and Processing, AI Collision Risk Assessment, Decision and Smart Contract Execution, Data Validation and Trust (Blockchain Integration), and Learning and Improvement. In the Data Collection and Processing phase, data from vehicle sensors, cameras, V2V and V2I communication, and external infrastructure is collected and preprocessed. The AI Collision Risk Assessment phase utilizes machine learning models to analyze real-time data and predict collision risks. In the Decision and Smart Contract Execution phase, smart contracts on the blockchain automate collision avoidance actions. The Data Validation and Trust phase ensures the authenticity and integrity of data through blockchain technology. Finally, the Learning and Improvement phase leverages historical collision data to enhance predictive models and overall system performance. BCA-CAR's primary objective is to enhance safety by preventing collisions, ensuring data trustworthiness, and providing intelligent collision avoidance capabilities. This innovative algorithm has the potential to revolutionize road safety in the era of IoV by reducing accidents, improving traffic management, and enhancing the security and privacy of vehicular communication. The findings highlight that Support Vector Regression (SVR) demonstrates strong predictive accuracy and adaptability within the Internet of Vehicles (IoV), offering a reliable modeli
This paper presents an in-depth analysis of the architecture and development of an innovative application designed to virtualize transaction execution on the Solana blockchain. This virtualization system facilitates t...
详细信息
Investors acquire securities to gain a share of the profits generated by the underlying assets. These profits are distributed among the investors in the form of dividends. With the advent of decentralized networks, ex...
详细信息
Optimizing camera information storage is a critical issue due to the increasing data volume and a large number of daily surveillance videos. In this study, we propose a deep learning-based system for efficient data st...
详细信息
Optimizing camera information storage is a critical issue due to the increasing data volume and a large number of daily surveillance videos. In this study, we propose a deep learning-based system for efficient data storage. Videos captured by cameras are classified into four categories: no action, normal action, human action, and dangerous action. Videos without action or with normal action are stored temporarily and then deleted to save storage space. Videos with human action are stored for easy retrieval, while videos with dangerous action are promptly alerted to users. In the paper, we propose two approaches using deep learning models to address the video classification problem. The first approach is a separate approach, where pretrained CNN models extract features from video frame images. These features are then passed through RNN, Transformer models to extract relationships between them. The goal of this approach is to delve into extracting features of objects in the video. The proposed models include VGG16, InceptionV3 combined with LSTM, BiLSTM, Attention, and Vision Transformer. The next approach combines CNN and LSTM layers simultaneously through models like ConvLSTM and LRCN. This approach aims to help the model simultaneously extract object features and their relationships, with the goal of reducing model size, accelerating the training process, and increasing object recognition speed when deployed in the system. In Approach 1, we construct and refine network architectures such as VGG16+LSTM, VGG16+Attention+LSTM, VGG16+BiLSTM, VGG16+ViT, InceptionV3+LSTM, InceptionV3+Attention+LSTM, InceptionV3+BiLSTM. In Approach 2, we build a new network architecture based on the ConvLSTM and LRCN model. The training dataset, collected from real surveillance cameras, comprises 3315 videos labeled into four classes: no action (1018 videos), actions involving people (832 videos), dangerous actions (751 videos), and normal actions (714 videos). Experimental results show t
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing sca...
详细信息
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing scale and monotonous strategies of existing RLbased automated penetration testing methods make them less effective in practical *** this paper,we present CLAP(Coverage-Based Reinforcement Learning to Automate Penetration Testing),an RL penetration testing agent that provides comprehensive network security assessments with diverse adversary testing behaviours on a massive *** employs a novel neural network,namely the coverage mechanism,to address the enormous and growing action spaces in large *** also utilizes a Chebyshev decomposition critic to identify various adversary strategies and strike a balance between *** results across various scenarios demonstrate that CLAP outperforms state-of-the-art methods,by further reducing attack operations by nearly 35%.CLAP also provides enhanced training efficiency and stability and can effectively perform pen-testing over large-scale networks with up to 500 ***,the proposed agent is also able to discover pareto-dominant strategies that are both diverse and effective in achieving multiple objectives.
In the context of Intelligent Transportation Systems (ITS), the role of vehicle detection and classification is indispensable for streamlining transportation management, refining traffic control, and conducting in-dep...
详细信息
暂无评论