16,351 research outputs found
Big data analytics:Computational intelligence techniques and application areas
Big Data has significant impact in developing functional smart cities and supporting modern societies. In this paper, we investigate the importance of Big Data in modern life and economy, and discuss challenges arising from Big Data utilization. Different computational intelligence techniques have been considered as tools for Big Data analytics. We also explore the powerful combination of Big Data and Computational Intelligence (CI) and identify a number of areas, where novel applications in real world smart city problems can be developed by utilizing these powerful tools and techniques. We present a case study for intelligent transportation in the context of a smart city, and a novel data modelling methodology based on a biologically inspired universal generative modelling approach called Hierarchical Spatial-Temporal State Machine (HSTSM). We further discuss various implications of policy, protection, valuation and commercialization related to Big Data, its applications and deployment
Trustworthy Federated Learning: A Survey
Federated Learning (FL) has emerged as a significant advancement in the field
of Artificial Intelligence (AI), enabling collaborative model training across
distributed devices while maintaining data privacy. As the importance of FL
increases, addressing trustworthiness issues in its various aspects becomes
crucial. In this survey, we provide an extensive overview of the current state
of Trustworthy FL, exploring existing solutions and well-defined pillars
relevant to Trustworthy . Despite the growth in literature on trustworthy
centralized Machine Learning (ML)/Deep Learning (DL), further efforts are
necessary to identify trustworthiness pillars and evaluation metrics specific
to FL models, as well as to develop solutions for computing trustworthiness
levels. We propose a taxonomy that encompasses three main pillars:
Interpretability, Fairness, and Security & Privacy. Each pillar represents a
dimension of trust, further broken down into different notions. Our survey
covers trustworthiness challenges at every level in FL settings. We present a
comprehensive architecture of Trustworthy FL, addressing the fundamental
principles underlying the concept, and offer an in-depth analysis of trust
assessment mechanisms. In conclusion, we identify key research challenges
related to every aspect of Trustworthy FL and suggest future research
directions. This comprehensive survey serves as a valuable resource for
researchers and practitioners working on the development and implementation of
Trustworthy FL systems, contributing to a more secure and reliable AI
landscape.Comment: 45 Pages, 8 Figures, 9 Table
Hybrid mobile computing for connected autonomous vehicles
With increasing urbanization and the number of cars on road, there are many global issues on modern transport systems, Autonomous driving and connected vehicles are the most promising technologies to tackle these issues. The so-called integrated technology connected autonomous vehicles (CAV) can provide a wide range of safety applications for safer, greener and more efficient intelligent transport systems (ITS). As computing is an extreme component for CAV systems,various mobile computing models including mobile local computing, mobile edge computing and mobile cloud computing are proposed. However it is believed that none of these models fits all CAV applications, which have highly diverse quality of service (QoS) requirements such as communication delay, data rate, accuracy, reliability and/or computing latency.In this thesis, we are motivated to propose a hybrid mobile computing model with objective of overcoming limitations of individual models and maximizing the performances for CAV applications.In proposed hybrid mobile computing model three basic computing models and/or their combinations are chosen and applied to different CAV applications, which include mobile local computing, mobile edge computing and mobile cloud computing. Different computing models and their combinations are selected according to the QoS requirements of the CAV applications.Following the idea, we first investigate the job offloading and allocation of computing and communication resources at the local hosts and external computing centers with QoS aware and resource awareness. Distributed admission control and resource allocation algorithms are proposed including two baseline non-cooperative algorithms and a matching theory based cooperative algorithm. Experiment results demonstrate the feasibility of the hybrid mobile computing model and show large improvement on the service quality and capacity over existing individual computing models. The matching algorithm also largely outperforms the baseline non-cooperative algorithms.In addition, two specific use cases of the hybrid mobile computing for CAV applications are investigated: object detection with mobile local computing where only local computing resources are used, and movie recommendation with mobile cloud computing where remote cloud resources are used. For object detection, we focus on the challenges of detecting vehicles, pedestrians and cyclists in driving environment and propose three methods to an existing CNN based object detector. Large detection performance improvement is obtained over the KITTI benchmark test dataset. For movie recommendation we propose two recommendation models based on a general framework of integrating machine learning and collaborative filtering approach.The experiment results on Netix movie dataset show that our models are very effective for cold start items recommendatio
Developing Future Smart Parking Solutions for Hangzhou\u27s IoT Town
With help from the Smart Cities Research Center of Zhejiang Province, this project aimed to assess and improve current smart parking solutions in Hangzhou, China. The team consulted industry experts and research students to gauge the direction of smart technology applicable to future parking solutions. The team analyzed results from interviews, customer surveys, and observations to infer needs for improved user experience. Research performed on future technologies allowed the team to offer a system framework recommendation with modern smart parking features for a characteristic town in Hangzhou. The project team discovered that a future smart parking system could integrate 5G, High-Frequency RFID, and non-contact payment methods to address the shortcomings of current smart parking systems
What attracts vehicle consumers’ buying:A Saaty scale-based VIKOR (SSC-VIKOR) approach from after-sales textual perspective?
Purpose:
The increasingly booming e-commerce development has stimulated vehicle consumers to express individual reviews through online forum. The purpose of this paper is to probe into the vehicle consumer consumption behavior and make recommendations for potential consumers from textual comments viewpoint.
Design/methodology/approach:
A big data analytic-based approach is designed to discover vehicle consumer consumption behavior from online perspective. To reduce subjectivity of expert-based approaches, a parallel NaĂŻve Bayes approach is designed to analyze the sentiment analysis, and the Saaty scale-based (SSC) scoring rule is employed to obtain specific sentimental value of attribute class, contributing to the multi-grade sentiment classification. To achieve the intelligent recommendation for potential vehicle customers, a novel SSC-VIKOR approach is developed to prioritize vehicle brand candidates from a big data analytical viewpoint.
Findings:
The big data analytics argue that “cost-effectiveness” characteristic is the most important factor that vehicle consumers care, and the data mining results enable automakers to better understand consumer consumption behavior.
Research limitations/implications:
The case study illustrates the effectiveness of the integrated method, contributing to much more precise operations management on marketing strategy, quality improvement and intelligent recommendation.
Originality/value:
Researches of consumer consumption behavior are usually based on survey-based methods, and mostly previous studies about comments analysis focus on binary analysis. The hybrid SSC-VIKOR approach is developed to fill the gap from the big data perspective
A Multi-Modal Latent-Features based Service Recommendation System for the Social Internet of Things
The Social Internet of Things (SIoT), is revolutionizing how we interact with
our everyday lives. By adding the social dimension to connecting devices, the
SIoT has the potential to drastically change the way we interact with smart
devices. This connected infrastructure allows for unprecedented levels of
convenience, automation, and access to information, allowing us to do more with
less effort. However, this revolutionary new technology also brings an eager
need for service recommendation systems. As the SIoT grows in scope and
complexity, it becomes increasingly important for businesses and individuals,
and SIoT objects alike to have reliable sources for products, services, and
information that are tailored to their specific needs. Few works have been
proposed to provide service recommendations for SIoT environments. However,
these efforts have been confined to only focusing on modeling user-item
interactions using contextual information, devices' SIoT relationships, and
correlation social groups but these schemes do not account for latent semantic
item-item structures underlying the sparse multi-modal contents in SIoT
environment. In this paper, we propose a latent-based SIoT recommendation
system that learns item-item structures and aggregates multiple modalities to
obtain latent item graphs which are then used in graph convolutions to inject
high-order affinities into item representations. Experiments showed that the
proposed recommendation system outperformed state-of-the-art SIoT
recommendation methods and validated its efficacy at mining latent
relationships from multi-modal features
Proof of Travel for Trust-Based Data Validation in V2I Communication Part I: Methodology
Previous work on misbehavior detection and trust management for
Vehicle-to-Everything (V2X) communication can identify falsified and malicious
messages, enabling witness vehicles to report observations about
high-criticality traffic events. However, there may not exist enough "benign"
vehicles with V2X connectivity or vehicle owners who are willing to opt-in in
the early stages of connected-vehicle deployment. In this paper, we propose a
security protocol for the communication between vehicles and infrastructure,
titled Proof-of-Travel (POT), to answer the research question: How can we
transform the power of cryptography techniques embedded within the protocol
into social and economic mechanisms to simultaneously incentivize
Vehicle-to-Infrastructure (V2I) data sharing activities and validate the data?
The key idea is to determine the reputation of and the contribution made by a
vehicle based on its distance traveled and the information it shared through
V2I channels. In particular, the total vehicle miles traveled for a vehicle
must be testified by digital signatures signed by each infrastructure component
along the path of its movement. While building a chain of proofs of spatial
movement creates burdens for malicious vehicles, acquiring proofs does not
result in extra cost for normal vehicles, which naturally want to move from the
origin to the destination. The proof of travel for a vehicle can then be used
to determine the contribution and reward by its altruistic behaviors. We
propose short-term and long-term incentive designs based on the POT protocol
and evaluate their security and performance through theoretical analysis and
simulations
- …