A crucial role in the BRT transportation system’s planning, development, and operation is the prediction of passenger numbers. Using time-series data, it is necessary to develop careful prediction models, appropriate...
详细信息
ISBN:
(数字)9798350367492
ISBN:
(纸本)9798350367508
A crucial role in the BRT transportation system’s planning, development, and operation is the prediction of passenger numbers. Using time-series data, it is necessary to develop careful prediction models, appropriate techniques, and an indepth understanding of the number of BRT Transjakarta passengers. A prediction model is sought based on comparing combined LSTM and BiLSTM experiments using three evaluation matrices and time. Historical data used from daily passenger data for 13 BRT Transjakarta corridors (1/01/2021-31/12/2023). The best prediction model was obtained from the BiLSTM-CNN combination with the lowest MSLE (0.0425), MAPE (0.1598), and SMAPE (15.9387) evaluation matrix values. However, it required a longer time (00:02:14). Predictions of passenger numbers on the 13 Transjakarta BRT corridors for the next 12 months can be made simultaneously by predicting fluctuations occurring simultaneously. The strongest positive correlation is in corridor 9-6, while the strongest negative correlation is in corridor 12-5. The prediction results must be understood by stakeholders, managers, and technopreneurs to develop and support appropriate strategies to increase the number of BRT passengers.
With the increasing number of end users that are using multimedia services, demand for access network high bitrate systems with sufficient quality of services also increases. However, this might not always be ensured ...
详细信息
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AE...
详细信息
ISBN:
(数字)9798350379365
ISBN:
(纸本)9798350379372
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AES-128, AES-256, ChaCha20, RSA (1024-bit, 2048-bit, and 4096-bit), SHA256, SHA512, and HMAC-SHA256 were tested in both standalone and emulated environments. The primary objective was to evaluate the performance and resource consumption of these protocols, focusing on their encryption and hashing efficiency. Key innovations include the comparative analysis of resource consumption and performance efficiency across diverse cryptographic operations, under both real-world and emulated conditions. By identifying protocols like ChaCha20 for high efficiency and minimal resource usage, and RSA 4096-bit for enhanced security at higher computational costs, this study provides actionable insights into the trade-offs between security and performance. These findings offer a foundational reference for selecting optimized cryptographic protocols, advancing IoT malware defense strategies through informed decision-making.
This work is dealing with actual topic in the field of internet service providers that are solving the question of metallic and optical networks convergence. The aim was to construct an experimental network topology i...
详细信息
Large language model-generated code (LLMgCode) has become increasingly prevalent in software development. Many studies report that LLMgCode has more quality and security issues than human-authored code (HaCode). It is...
详细信息
As the structure of knowledge graphs may vary over time, static knowledge graph completion methods do not deal with time-varying knowledge graphs. However, examining the paths between entities and entities' contex...
详细信息
As the structure of knowledge graphs may vary over time, static knowledge graph completion methods do not deal with time-varying knowledge graphs. However, examining the paths between entities and entities' context information can lead to more accurate completion methods. This paper attempts to complete dynamic (time-varying) knowledge graphs by combining time-aware relational paths and relational context. The proposed model can improve dynamic knowledge graph completion methods by leveraging neural networks. Experimental results conducted on two standard datasets, ICEWS14 and ICEWS05-15, indicate our model's superiority in terms of Mean Reciprocal Rank (MRR) and Hit@k over its well-known counterparts, such as DE-TransE and DE-DistMult.
The main objective of this work was to find the association rules between factors affecting user satisfaction in software project by using an association rule discovery technique. Data from 191 software projects were ...
详细信息
In forensic investigations, facial recognition techniques serve as critical tools for identifying and apprehending suspects. In this study, we investigate the impact of Convolutional Neural Networks (CNNs) paralleliza...
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
In forensic investigations, facial recognition techniques serve as critical tools for identifying and apprehending suspects. In this study, we investigate the impact of Convolutional Neural Networks (CNNs) parallelization on the performance of facial recognition models within forensic contexts. Through experiments, we demonstrate the potential benefits of parallelization in enhancing model accuracy and robustness. Leveraging a reduced dataset, we employ augmentation techniques to expand the diversity of training samples. Our findings highlight the advantages of CNN parallelization in achieving superior recognition outcomes. Nevertheless, we identify constraints linked to excessive parallelization, which may induce model overfitting.
This paper addresses the challenges posed by faults in the complex systems of autonomous vehicles within vehicle platoons. It presents a state-space model tailored for vehicle platoons, incorporating an Unknown Input ...
This paper addresses the challenges posed by faults in the complex systems of autonomous vehicles within vehicle platoons. It presents a state-space model tailored for vehicle platoons, incorporating an Unknown Input Observer (UIO) to estimate internal states for each vehicle. By monitoring discrepancies between measured and estimated states, the framework effectively detects faults affecting a vehicle's position, velocity, and acceleration, often stemming from malfunctions in its control and navigation components. The paper also introduces fault detection and identification UIOs to pinpoint faulty parameters and estimate associated fault inputs. To validate its effectiveness, the proposed method undergoes MATLAB simulations across diverse scenarios, confirming its capability to mitigate faults within the vehicle platoon.
In this paper, a design and development of an assistive robot are proposed that assists to the elderly and handicapped people, such as providing information and care with daily routine supports with the ability to per...
详细信息
暂无评论