The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident preventi...
详细信息
The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)*** functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic *** these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle *** paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly ***-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by *** systems can autonomously create specific models based on network data to differentiate between regular traffic and *** these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational *** evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and *** review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV *** examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
作者:
Gote, Pradnyawant M.Kumar, PraveenVerma, PrateekYesankar, PrajyotPawar, AdeshSaratkar, Saniya
Faculty of Engineering and Technology Department of Computer Science & Design Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Computer Science & Medical Engineering Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Artificial Intelligence & Machine Learning Maharashtra Wardha442001 India
Faculty of Engineering and Technology Department of Artificial Intelligence & Data Science Maharashtra Wardha442001 India
The swift progression of wireless communication technologies-specifically from 5G to 6G is an approach that could be the most significant revolutionary leap towards changing connectivity and data transmission forever....
详细信息
The agriculture industry is currently dealing with serious issues with rice plants as a result of illnesses that decrease the quantity and output of the harvest. Numerous fungi and bacteria diseases harm plants that a...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn...
详细信息
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syntax,it is hard for the developers to write correctly due to lacking knowledge of the mathematical foundations of the first-order logic,which is approximately half accurate at the first stage of devel-opment.A deep neural network named DeepOCL is proposed,which takes the unre-stricted natural language as inputs and automatically outputs the best-scored OCL candidates without requiring a domain conceptual model that is compulsively required in existing rule-based generation *** demonstrate the validity of our proposed approach,ablation experiments were conducted on a new sentence-aligned dataset named *** experiments show that the proposed DeepOCL can achieve state of the art for OCL statement generation,scored 74.30 on BLEU,and greatly outperformed experienced developers by 35.19%.The proposed approach is the first deep learning approach to generate the OCL expression from the natural *** can be further developed as a CASE tool for the software industry.
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t...
详细信息
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj...
详细信息
Gaze tracking is the process of estimating where a person is looking on the screen using only information from eye movement without additional input from the user, it contributes greatly in understanding and improving...
详细信息
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking *** shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a hi...
详细信息
Shadow extraction and elimination is essential for intelligent transportation systems(ITS)in vehicle tracking *** shadow is the source of error for vehicle detection,which causes misclassification of vehicles and a high false alarm rate in the research of vehicle counting,vehicle detection,vehicle tracking,and *** of the existing research is on shadow extraction of moving vehicles in high intensity and on standard datasets,but the process of extracting shadows from moving vehicles in low light of real scenes is *** real scenes of vehicles dataset are generated by self on the Vadodara–Mumbai highway during periods of poor illumination for shadow extraction of moving vehicles to address the above *** paper offers a robust shadow extraction of moving vehicles and its elimination for vehicle *** method is distributed into two phases:In the first phase,we extract foreground regions using a mixture of Gaussian model,and then in the second phase,with the help of the Gamma correction,intensity ratio,negative transformation,and a combination of Gaussian filters,we locate and remove the shadow region from the foreground *** to the outcomes proposed method with outcomes of an existing method,the suggested method achieves an average true negative rate of above 90%,a shadow detection rate SDR(η%),and a shadow discrimination rate SDR(ξ%)of 80%.Hence,the suggested method is more appropriate for moving shadow detection in real scenes.
This paper focuses on the development of a Meteorological Service for Air Navigation system, which classifies clouds into five categories: BKN, CAVOK, FEW, OVER, and SCT. The classification is based on the cloud patte...
详细信息
We design and analyze an iterative two-grid algorithm for the finite element discretizations of strongly nonlinear elliptic boundary value problems in this *** propose an iterative two-grid algorithm,in which a nonlin...
详细信息
We design and analyze an iterative two-grid algorithm for the finite element discretizations of strongly nonlinear elliptic boundary value problems in this *** propose an iterative two-grid algorithm,in which a nonlinear problem is first solved on the coarse space,and then a symmetric positive definite problem is solved on the fine *** main contribution in this paper is to establish a first convergence analysis,which requires dealing with four coupled error estimates,for the iterative two-grid *** also present some numerical experiments to confirm the efficiency of the proposed algorithm.
暂无评论