In this paper, the method to design deep Convolutional Neural Network (CNN) architecture for the problem of traffic signs classification is proposed. The approach incorporates five main stages followed by each other: ...
详细信息
Locating objects Non-Line-of-Sight is an important challenge in many fields such as defense applications, autonomous vehicles, natural disasters, etc. With the advancement of signal processing techniques, there has be...
详细信息
ISBN:
(数字)9798331531492
ISBN:
(纸本)9798331531508
Locating objects Non-Line-of-Sight is an important challenge in many fields such as defense applications, autonomous vehicles, natural disasters, etc. With the advancement of signal processing techniques, there has been an increased interest in the detection of objects in hidden areas. In this respect, audio signals have a strong potential as a low-cost technology for object localization. This study presents an experimental application to detect the location of hidden objects Non-Line-of-Sight based on audio signals. The signals from the sound source strike the hidden object through a reflecting surface, such as a wall, and are received back from the reflecting surface as secondary signals. In this study, object detection can be performed with acoustic sound signals without physically intervening in an area beyond the line of sight and without locating any sensors in this area. The experimental results obtained from the study show that the position detection of an object located Non-Line-of-Sight can be done satisfactorily.
Recent advancements in Artificial Intelligence (AI) and the proliferation of the Internet of Things (loT) and mobile devices have generated enormous data volumes, necessitating advanced data processing closer to data ...
详细信息
ISBN:
(数字)9798350354119
ISBN:
(纸本)9798350354126
Recent advancements in Artificial Intelligence (AI) and the proliferation of the Internet of Things (loT) and mobile devices have generated enormous data volumes, necessitating advanced data processing closer to data sources through edge computing to enhance efficiency and reduce latency. Nonetheless, privacy concerns in cloud storage and data transmission, alongside the inadequacy of traditional privacy protections, have highlighted the vulnerability to sophisticated data breaches. This paper offers a survey on edge computing, emphasizing privacy and security challenges, evaluating threats, and exploring solutions to promote the development of secure, robust and privacy-preserving edge computing frameworks.
Requirements elicitation process is employed for the identification of stakeholders of an information system. A large number of stakeholders from different domains across the globe participate during the requirements ...
详细信息
Requirements elicitation process is employed for the identification of stakeholders of an information system. A large number of stakeholders from different domains across the globe participate during the requirements elicitation process. Based on our review, we found that existing methods for the analysis of stakeholders do not support how to classify the stakeholders based on the similarity measures. These measures play an important role for the recommendation of an item/user in a recommendation system. Thus, the objective of this paper is to classify the stakeholders of an information system using fuzzy-based adjusted cosine similarity measure. We have identified the stakeholders of library information system and their opinions for different requirements are recorded. The identified stakeholders have been classified and analysed based on the following similarity measures under fuzzy environment, i.e., Cosine similarity measure, Euclidean distance, Pearson coefficient correlation etc., so that stakeholders having similar requirements can be recommended to strengthen the requirements elicitation process.
Driver monitoring systems have become a vital component of Advanced Driver Assistance Systems (ADAS) for vehicle safety. According to the U.S. National Highway Traffic Safety Administration, drowsy driving contributes...
详细信息
ISBN:
(数字)9798331520038
ISBN:
(纸本)9798331520045
Driver monitoring systems have become a vital component of Advanced Driver Assistance Systems (ADAS) for vehicle safety. According to the U.S. National Highway Traffic Safety Administration, drowsy driving contributes to nearly 100,000 accidents annually. Early driver monitoring systems relied on vehicle sensor data, and current systems often use eye-tracking technology. Recently, there has been a rising interest in applying machine vision and deep learning to driver monitoring systems. Machine vision allows for advanced driver monitoring, such as detecting driver attention states, smartphone use, and seat belts, but machine vision systems typically require high processing power, which increases the device cost. This paper introduces a cost-effective driver monitoring system utilizing Pi Zero Single Board computers (SBCs) like the Raspberry Pi Zero 2 W board, and Radxa Zero 3 W board, combined with a deep learning CNN, the system is capable of identifying various driver states, including safe driving, distraction, drowsiness, and smartphone use.
The Sequence-to-Sequence (Seq2Seq) of neural network (NN) method based on recurrent neural network (RNN) and attention mechanism plays an important role in information extraction and automatic summarization. However, ...
详细信息
Security plays an important role in many sectors and industries. Nowadays, scams and illegal movements are spreading around the world. Copyright protection for PDF documentation is one of the focus in digital watermar...
详细信息
The research is devoted to the problem of project- specific steep learning curve when designing complex hardware microarchitectures. To address this issue, it is proposed to use custom synthesizable kernels that provi...
详细信息
Alternative proofs of the Weierstrass uniform approximation theorem have been provided by numerous mathematicians, including renowned ones. Among them, there was Bernstein that used a set of polynomials known as the B...
详细信息
Alternative proofs of the Weierstrass uniform approximation theorem have been provided by numerous mathematicians, including renowned ones. Among them, there was Bernstein that used a set of polynomials known as the Bernstein polynomials. Motivated by the advancements in computational disciplines, we propose a new type of Szász-Mirakjan-Kantorovich operators that incorporate a shape parameterα. Certain shape-preserving properties, such as monotonicity and convexity, are achieved by computing the first and second order derivatives of the proposed operators. Certain approximation properties, including the statistical rate of convergence, are also obtained using a regular summability matrix. Finally, theoretical results are supported by illustrative graphics and numerical experiments using the Mathematica computer program. The operators defined in this paper may be used in computer and computational sciences, including in robotic manipulator control.
Advanced machine learning(ML)algorithms have outperformed traditional approaches in various forecasting applications,especially electricity price forecasting(EPF).However,the prediction accuracy of ML reduces substant...
详细信息
Advanced machine learning(ML)algorithms have outperformed traditional approaches in various forecasting applications,especially electricity price forecasting(EPF).However,the prediction accuracy of ML reduces substantially if the input data is not similar to the ones seen by the model during *** is often observed in EPF problems when market dynamics change owing to a rise in fuel prices,an increase in renewable penetration,a change in operational policies,*** the dip in model accuracy for unseen data is a cause for concern,what is more,challenging is not knowing when the ML model would respond in such a *** uncertainty makes the power market participants,like bidding agents and retailers,vulnerable to substantial financial loss caused by the prediction errors of EPF ***,it becomes essential to identify whether or not the model prediction at a given instance is *** this light,this paper proposes a trust algorithm for EPF users based on explainable artificial intelligence *** suggested algorithm generates trust scores that reflect the model’s prediction quality for each new *** scores are formulated in two stages:in the first stage,the coarse version of the score is formed using correlations of local and global explanations,and in the second stage,the score is fine-tuned further by the Shapley additive explanations values of different *** score-based explanations are more straightforward than feature-based visual explanations for EPF users like asset managers and traders.A dataset from Italy’s and ERCOT’s electricity market validates the efficacy of the proposed *** show that the algorithm has more than 85%accuracy in identifying good predictions when the data distribution is similar to the training *** the case of distribution shift,the algorithm shows the same accuracy level in identifying bad predictions.
暂无评论