Investigation on AI-Based Techniques in Applications for Detecting Fatal Traffic Accidents DOI

Harshvardhan Pramod Patil,

Kamal Upreti, Ramesh Chandra Poonia

et al.

Published: Oct. 10, 2023

The difficulties with road accident rates today rank among the top concerns for health and social policy in nations across continents. In this essay, we've spoken about fatalities injuries brought on by traffic accidents several Indian states. We have also shed light various factors that contribute to accidents. Many researchers reported methods identifying automobile crashes or are discussed work. Additionally, we covered collision avoidance systems their kinds. An examination of analysis techniques used comprehend numerous causes causing is included study. Traditional models frequently identify problems such driver weariness, drowsiness, driving while intoxicated, distractions.

Language: Английский

A performance comparison of YOLOv8 models for traffic sign detection in the Robotaxi-full scale autonomous vehicle competition DOI
Emel Soylu, Tuncay Soylu

Multimedia Tools and Applications, Journal Year: 2023, Volume and Issue: 83(8), P. 25005 - 25035

Published: Aug. 12, 2023

Language: Английский

Citations

49

Assessing risk and sustainability factors in spice supply chain management DOI Creative Commons
Vimal Kumar, Rohit Raj,

Pratima Verma

et al.

Operations Management Research, Journal Year: 2023, Volume and Issue: 17(1), P. 233 - 252

Published: Nov. 10, 2023

Abstract The inopportune organization of spice supply chains (SSCs) results in aided risks, resource wastages, and sustainability issues. Nevertheless, practitioners academicians alike must investigate chain management (SSCM) terms long-term sustainability. This study draws on the available literature to compile a collection characteristics maintain sustainable techniques which come up with associated risks relevant obstacles. Existing studies claim that due lack resources, are root poor SSCM performance. As result, goal this is identify primary risk variables using qualitative data; nevertheless, attributes be converted into scale comparable. fuzzy Delphi method (FDM) was used obtain valid reliable from data, while decision-making trial evaluation laboratory (FDEMATEL) address uncertainty interrelationships simultaneously. FDM suggest there eighteen critical seven threatening effective SSCM. FDEMATEL reveal data translated crisp, comparable values order causal linkages between confirm compatibility theoretical structure industry realities. findings show fluctuation Price (C8), diseases pests (C20), human contamination (C23), adulteration (C24), loss food quality, quantity (C36) all important sub-risks these causative interrelationships. involved enhancing SCM include Financial Risk (A5), Ergonomic (A8), Operation Management (A10). recommends professionals use future marketing tools protect themselves price changes allow them assess demand circumstances manage over distance time. Spices key contributors earning sizable amount foreign currency through export developing country. It suggests policymakers, regulatory organizations, develop regulations, raise farmer understanding about pest control, impose stiff penalties vendors businesses proven adulteration, fertilizer distribution system. These corresponding action plans for improving SSC sector comparing it agro-food short-supply investigated. contributes theory by utilizing methods addressing interrelationship among hinder attaining

Language: Английский

Citations

16

Cloud Computing Security Through Detection & Mitigation of Zero‐Day Attack Using Machine Learning Techniques DOI
Abhishek Sharma, Umesh Kumar Singh

Published: Jan. 10, 2025

With the extensive use of Cloud computing in areas such as e-government, e-commerce, internet payments, health care, and other daily necessities, danger being exposed to numerous threats has grown exponentially. Several businesses are investing this domain either for their own benefit or utility anyone else. The creation security risks both producers society among consequences Cloud-based solutions. recent global increase cybercrime cloud increased requirements opportunities better intrusion detection prevention systems. technique used here enhancing protection environment is machine learning (ML). Machine techniques have been a number ways on prevent detect attacks issues. But after exhaustive literature review, it was observed that stand-alone ML model not sufficient current emerging attack techniques. To achieve greater prediction results than would be attained from any constituent algorithms alone, work proposes an integrated strategy leveraging ensemble approaches through several AI technique. Nonmonotonous methodology also implemented with continuous adaptive capabilities which further helpful develop method detecting unknown malicious activities network predicting zero-day attack.

Language: Английский

Citations

0

Prioritization of Security Vulnerabilities under Cloud Infrastructure Using AHP DOI
Abhishek Sharma, Umesh Kumar Singh

Published: Jan. 10, 2025

In an ideal world, cyber security and IT experts would aggressively find patch every possible vulnerability, ensuring that their enterprises be safe across all known attack vectors. Conventional vulnerability management solutions just aren't up to the task in this fast-paced world. Despite this, cybersecurity professionals are always under pressure keep business secure from avalanche of vulnerabilities. The CVSS system is used by most businesses prioritize control operations. It's a free, open-source methodology for determining severity CVSS, on other hand, fails as prioritizing metric because it lacks specificity discern between highest levels — how can anything "critical" if everything is? majority understand importance having priority strategy. absence any strategy, organizations will faced with overwhelming volume effort have make near-random decisions what mitigate first. Hence, vulnerabilities practically not feasible. So, there strong research scope framework or model which capable further helpful mitigation. objective here propose novel attributes matrix input proposed method. A approach introduced prioritization Cloud computing environments using Analytical Hierarchical Process (AHP).

Language: Английский

Citations

0

Cloud computing security assurance modelling through risk analysis using machine learning DOI
Abhishek Sharma, Umesh Kumar Singh

International Journal of Systems Assurance Engineering and Management, Journal Year: 2025, Volume and Issue: unknown

Published: Jan. 30, 2025

Language: Английский

Citations

0

Cybersecurity Testing for Automotive Domain: A Survey DOI Creative Commons
Feng Luo, Xuan Zhang, Zhenyu Yang

et al.

Sensors, Journal Year: 2022, Volume and Issue: 22(23), P. 9211 - 9211

Published: Nov. 26, 2022

Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for have increased significantly. Malicious cyberattacks will not only exploit personal privacy property, but affect the functional safety of electrical/electronic (E/E) safety-critical systems by controlling driving functionality, is life-threatening. Therefore, it necessary to conduct cybersecurity testing on reveal address relevant security threats vulnerabilities. Cybersecurity standards regulations issued in recent years, such as ISO/SAE 21434 UNECE WP.29 (R155 R156), emphasize indispensability verification validation development lifecycle lack specific technical details. Thus, this paper conducts a systematic comprehensive review research practice field automotive testing, can provide reference advice researchers testers. We classify discuss methods testbeds engineering. Furthermore, we identify gaps limitations existing point out future challenges.

Language: Английский

Citations

16

Application of Cloud Computing Technology in Computer Secure Storage DOI Open Access
Fenglian Cao, Lihong Zhang, Darshana A. Naik

et al.

Scientific Programming, Journal Year: 2022, Volume and Issue: 2022, P. 1 - 9

Published: Sept. 16, 2022

To investigate the use of cloud computing technologies in safe computer storage, firstly, it is proposed to complete central control function by building a data center, collect multiple platforms and network safety technologies, then connect computers unlike sites confirm information security. Then, based on implementation advantages technique specific applications are analyzed. Finally, secure modeling analysis idea multiqueue multiserver proposed. The security approach ensures that both easily accessible authorized users. One always has consistent way access your applications, allowing you address any potential issues as soon they arise. It greatly improved storage convenience while also improving After verification, with technology platform carry out relevant businesses at time, operation effectiveness been meaningfully enhanced 80%. At same promotes construction sharing gives full performance benefits hardware, accelerates process resource integration, provides support for formulation enterprise strategic plans. Combined actual situation, current study discusses development application direction computing, so add new impetus economic growth enterprises.

Language: Английский

Citations

3

Retracted: Risk-Based Access Control Mechanism for Internet of Vehicles Using Artificial Intelligence DOI Creative Commons

Security and Communication Networks

Security and Communication Networks, Journal Year: 2024, Volume and Issue: 2024, P. 1 - 1

Published: Jan. 9, 2024

Language: Английский

Citations

0

Using Artificial Intelligence (AI) Methods on the Internet of Vehicles (IoV): Overview and Future Opportunities DOI

Adnan El Ahmadi,

Otman Abdoun, El Khatir Haimoudi

et al.

Lecture notes in networks and systems, Journal Year: 2024, Volume and Issue: unknown, P. 193 - 201

Published: Jan. 1, 2024

Language: Английский

Citations

0

Quantum Computing and Generative Adversarial Networks (GANs) DOI
Wasswa Shafik

Advances in computational intelligence and robotics book series, Journal Year: 2024, Volume and Issue: unknown, P. 111 - 156

Published: Dec. 31, 2024

Advancement in technology has demonstrated a shift application, interpretability, and technological acceptance. Quantum Computing Generative Adversarial Networks (GANs) represent two transformative domains with immense potential for innovation disruption. This study examines the rise of ethical, privacy, security considerations accompanying these technologies, highlighting their importance defining core emphasis on overlapping data problems mitigation. Starting an overview quantum computing GANs, outlines principles practical applications, elucidating algorithms' revolutionary power unique challenges. It explores how generative models reshape industries while examining ethical dilemmas introduced by synthetic content generation. Privacy concerns are evaluated, focusing privacy-enhancing technologies. Security challenges scrutinized, proposing strategies to fortify technologies against adversarial threats.

Language: Английский

Citations

0