The present study advances object detection and tracking techniques by proposing a novel model combining Automated Image Annotation with Inception v2-based Faster RCNN (AIA-IFRCNN). The research methodology utilizes t...
详细信息
Traditional Global Positioning System(GPS)technology,with its high power consumption and limited perfor-mance in obstructed environments,is unsuitable for many Internet of Things(IoT)*** paper explores LoRa as an alte...
详细信息
Traditional Global Positioning System(GPS)technology,with its high power consumption and limited perfor-mance in obstructed environments,is unsuitable for many Internet of Things(IoT)*** paper explores LoRa as an alternative localization technology,leveraging its low power consumption,robust indoor penetration,and extensive coverage area,which render it highly suitable for diverse IoT *** comprehensively review several LoRa-based localization techniques,including time of arrival(ToA),time difference of arrival(TDoA),round trip time(RTT),received signal strength indicator(RSSI),and fingerprinting *** this review,we evaluate the strengths and limitations of each technique and investigate hybrid models to potentially improve positioning *** studies in smart cities,agriculture,and logistics exemplify the versatility of LoRa for indoor and outdoor *** findings demonstrate that LoRa technology not only overcomes the limitations of GPS regarding power consumption and coverage but also enhances the scalability and efficiency of IoT deployments in complex environments.
Large language models(LLMs)have significantly advanced artificial intelligence(AI)by excelling in tasks such as understanding,generation,and reasoning across multiple *** these achieve-ments,LLMs have inherent limitat...
详细信息
Large language models(LLMs)have significantly advanced artificial intelligence(AI)by excelling in tasks such as understanding,generation,and reasoning across multiple *** these achieve-ments,LLMs have inherent limitations including outdated information,hallucinations,inefficiency,lack of interpretability,and challenges in domain-specific *** address these issues,this survey explores three promising directions in the post-LLM era:knowledge empowerment,model collaboration,and model ***,we examine methods of integrating external knowledge into LLMs to enhance factual accuracy,reasoning capabilities,and interpretability,including incorporating knowledge into training objectives,instruction tuning,retrieval-augmented inference,and knowledge ***,we discuss model collaboration strategies that leverage the complementary strengths of LLMs and smaller models to improve efficiency and domain-specific performance through techniques such as model merging,functional model collaboration,and knowledge ***,we delve into model co-evolution,in which multiple models collaboratively evolve by sharing knowledge,parameters,and learning strategies to adapt to dynamic environments and tasks,thereby enhancing their adaptability and continual *** illustrate how the integration of these techniques advances AI capabilities in science,engineering,and society—particularly in hypothesis development,problem formulation,problem-solving,and interpretability across various *** conclude by outlining future pathways for further advancement and applications.
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the desig...
详细信息
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the design of sequential scanning beams for target detection with the required sensing resolution has not been tackled in the *** bridge this gap, this paper introduces a resolution-aware beam scanning design. In particular, the transmit information beamformer, the covariance matrix of the dedicated radar signal, and the receive beamformer are jointly optimized to maximize the average sum rate of the system while satisfying the sensing resolution and detection probability requirements.A block coordinate descent(BCD)-based optimization framework is developed to address the non-convex design problem. By exploiting successive convex approximation(SCA), S-procedure, and semidefinite relaxation(SDR), the proposed algorithm is guaranteed to converge to a stationary solution with polynomial time complexity. Simulation results show that the proposed design can efficiently handle the stringent detection requirement and outperform existing antenna-activation-based methods in the literature by exploiting the full degrees of freedom(DoFs) brought by all antennas.
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
The security challenges posed by Infrastructure as code (IaC) are outgrowing established security procedures in an era of rapidly adopting cloud computing and DevOps methodologies. Using security principles to be inte...
详细信息
An imbalanced dataset often challenges machine learning, particularly classification methods. Underrepresented minority classes can result in biased and inaccurate models. The Synthetic Minority Over-Sampling Techniqu...
详细信息
An imbalanced dataset often challenges machine learning, particularly classification methods. Underrepresented minority classes can result in biased and inaccurate models. The Synthetic Minority Over-Sampling Technique (SMOTE) was developed to address the problem of imbalanced data. Over time, several weaknesses of the SMOTE method have been identified in generating synthetic minority class data, such as overlapping, noise, and small disjuncts. However, these studies generally focus on only one of SMOTE’s weaknesses: noise or overlapping. Therefore, this study addresses both issues simultaneously by tackling noise and overlapping in SMOTE-generated data. This study proposes a combined approach of filtering, clustering, and distance modification to reduce noise and overlapping produced by SMOTE. Filtering removes minority class data (noise) located in majority class regions, with the k-nn method applied for filtering. The use of Noise Reduction (NR), which removes data that is considered noise before applying SMOTE, has a positive impact in overcoming data imbalance. Clustering establishes decision boundaries by partitioning data into clusters, allowing SMOTE with modified distance metrics to generate minority class data within each cluster. This SMOTE clustering and distance modification approach aims to minimize overlap in synthetic minority data that could introduce noise. The proposed method is called “NR-Clustering SMOTE,” which has several stages in balancing data: (1) filtering by removing minority classes close to majority classes (data noise) using the k-nn method;(2) clustering data using K-means aims to establish decision boundaries by partitioning data into several clusters;(3) applying SMOTE oversampling with Manhattan distance within each cluster. Test results indicate that the proposed NR-Clustering SMOTE method achieves the best performance across all evaluation metrics for classification methods such as Random Forest, SVM, and Naїve Bayes, compared t
As cities expand, vehicles and congestion become more complex. Efficient vehicle-to-vehicle contact networks are needed for road safety and efficient traffic flow. Thus, Vehicular Ad Hoc Networks are needed to overcom...
详细信息
Six-phase motors are becoming more popular because of their advantages such as lower torque ripple, better power distribution per phase, higher efficiency, and fault-tolerant capability compared to the three-phase one...
详细信息
暂无评论