Introduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the Wo...
详细信息
Introduction: Vehicle crashes can be hazardous to public safety and may cause infrastructure damage. Risky driving significantly raises the possibility of the occurrence of a vehicle crash. As per statistics by the World Health Organization (WHO), approximately 1.35 million people are involved in road traffic crashes resulting in loss of life or physical disability. WHO attributes events like over-speeding, drunken driving, distracted driving, dilapidated road infrastructure and unsafe practices such as non-use of helmets and seatbelts to road traffic accidents. As these driving events negatively affect driving quality and enhance the risk of a vehicle crash, they are termed as negative driving attributes. Methods: A multi-level hierarchical fuzzy rules-based computational model has been designed to capture risky driving by a driver as a driving risk index. Data from the onboard telematics device and vehicle controller area network is used for capturing the required information in a naturalistic way during actual driving conditions. Fuzzy rules-based aggregation and inference mechanisms have been designed to alert about the possibility of a crash due to the onset of risky driving. Results: On-board telematics data of 3213 sub-trips of 19 drivers has been utilized to learn long term risky driving attributes. Furthermore, the current trip assessment of these drivers demonstrates the efficacy of the proposed model in correctly modeling the driving risk index of all of them, including 7 drivers who were involved in a crash after the monitored trip. Conclusion: In this work, risky driving behavior has been associated not just with rash driving but also other contextual data like driver’s long-term risk aptitude and environmental context such as type of roads, traffic volume and weather conditions. Trip-wise risky driving behavior of six out of seven drivers, who had met with a crash during that trip, was correctly predicted during evaluation. Similarly, for the other 12
Speech emotion recognition is a difficult task that is gaining attention in a variety of domains, including psychology, human–computer interaction, and speech processing. To recognize speech emotions, machine learnin...
详细信息
Illegible handwriting on medical prescriptions poses a significant challenge, often leading to the misinterpretation of drug names and dosages. This issue primarily stems from doctors' use of Latin abbreviations, ...
详细信息
The optical character recognition for the right to left and cursive languages such as Arabic is challenging and received little attention from researchers in the past compared to the other Latin ***,the absence of a s...
详细信息
The optical character recognition for the right to left and cursive languages such as Arabic is challenging and received little attention from researchers in the past compared to the other Latin ***,the absence of a standard publicly available dataset for several low-resource lan-guages,including the Pashto language remained a hurdle in the advancement of language *** that,a clean dataset is the fundamental and core requirement of character recognition,this research begins with dataset generation and aims at a system capable of complete language *** in view the complete and full autonomous recognition of the cursive Pashto *** first achievement of this research is a clean and standard dataset for the isolated characters of the Pashto *** this paper,a database of isolated Pashto characters for forty four alphabets using various font styles has been *** order to overcome the font style shortage,the graphical software Inkscape has been used to generate sufficient image data samples for each *** dataset has been pre-processed and reduced in dimensions to 32×32 pixels,and further converted into the binary format with a black background and white text so that it resembles the Modified National Institute of Standards and technology(MNIST)*** benchmark database is publicly available for further research on the standard GitHub and Kaggle database servers both in pixel and Comma Separated Values(CSV)formats.
In recent years,task offloading and its scheduling optimization have emerged as widely discussed and signif-icant *** multi-objective optimization problems inherent in this domain,particularly those related to resourc...
详细信息
In recent years,task offloading and its scheduling optimization have emerged as widely discussed and signif-icant *** multi-objective optimization problems inherent in this domain,particularly those related to resource allocation,have been extensively ***,existing studies predominantly focus on matching suitable computational resources for task offloading requests,often overlooking the optimization of the task data transmission *** inefficiency in data transmission leads to delays in the arrival of task data at computational nodes within the edge network,resulting in increased service times due to elevated network transmission latencies and idle computational *** address this gap,we propose an Asynchronous Data Transmission Policy(ADTP)for optimizing data transmission for task offloading in edge-computing enabled ultra-dense *** dynamically generates data transmission scheduling strategies by jointly considering task offloading decisions and the fluctuating operational states of edge computing-enabled IoT *** contrast to existing methods,the Deep Deterministic Policy Gradient(DDPG)based task data transmission scheduling module works asynchronously with the Deep Q-Network(DQN)based Virtual Machine(VM)selection module in *** significantly reduces the computational space required for the scheduling *** continuous dynamic adjustment of data transmission bandwidth ensures timely delivery of task data and optimal utilization of network bandwidth *** reduces the task completion time and minimizes the failure rate caused by ***,the VM selection module only performs the next inference step when a new task arrives or when a task finishes its *** a result,the wastage of computational resources is further *** simulation results indicate that the proposed ADTP reduced average data transmission delay and service time by 7.11%and 8.09%,***,the tas
Image caption generation has emerged as a remarkable development that bridges the gap between Natural Language Processing (NLP) and computer Vision (CV). It lies at the intersection of these fields and presents unique...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a da...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a dataset,making it difficult to pick the best set of features using standard ***,in this research,a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm(ASSOA)has been *** using metaheuristics to pick features,it is common for the selection of features to vary across runs,which can lead to *** of this,we used the adaptive squirrel search to balance exploration and exploitation duties more evenly in the optimization *** the selection of the best subset of features,we recommend using the binary ASSOA search strategy we developed *** to the suggested approach,the number of features picked is reduced while maximizing classification accuracy.A ten-feature dataset from the University of California,Irvine(UCI)repository was used to test the proposed method’s performance *** other state-of-the-art approaches,including binary grey wolf optimization(bGWO),binary hybrid grey wolf and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hybrid GWO and genetic algorithm 4028 CMC,2023,vol.74,no.2(bGWO-GA),binary firefly algorithm(bFA),and *** results confirm the superiority and effectiveness of the proposed algorithm for solving the problem of feature selection.
Guided depth map super-resolution (GDSR) is one of the mainstream methods in depth map super-resolution, as high-resolution color images can guide the reconstruction of the depth maps and are often easy to obtain. How...
详细信息
In the last few years, artificial intelligence has shown its importance and ability in computer vision due to its high level of accuracy and wide acceptance. The main goal of the research is to look into a better way ...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs ...
详细信息
A Mobile Ad hoc Network(MANET)is a group of low-power con-sumption of wireless mobile nodes that configure a wireless network without the assistance of any existing infrastructure/centralized *** primary aim of MANETs is to extendflexibility into the self-directed,mobile,and wireless domain,in which a cluster of autonomous nodes forms a MANET routing *** Intrusion Detection system(IDS)is a tool that examines a network for mal-icious behavior/policy violations.A network monitoring system is often used to report/gather any suspicious attacks/*** IDS is a software program or hardware system that monitors network/security traffic for malicious attacks,sending out alerts whenever it detects malicious *** impact of Dynamic Source Routing(DSR)in MANETs challenging blackhole attack is investigated in this research *** Cluster Trust Adaptive Acknowledgement(CTAA)method is used to identify unauthorised and malfunctioning nodes in a MANET *** system is active and provides successful delivery of a data packet,which implements Kalman Filters(KF)to anticipate node ***,KF is used to eliminate synchronisation errors that arise during the sending and receiving *** order to provide an energy-efficient solution and to minimize network traffic,route optimization in MANET by using Multi-Objective Particle Swarm Optimization(MOPSO)technique to determine the optimal num-ber of clustered MANET along with energy dissipation in *** to the researchfindings,the proposed CTAA-MPSO achieves a Packet Delivery Ratio(PDR)of 3.3%.In MANET,the PDR of CTAA-MPSO improves CTAA-PSO by 3.5%at 30%malware.
暂无评论