Algorithmic Mechanism Design for Internet of Things Services Market by Yutao Jiao & Ping Wang & Dusit Niyato
Author:Yutao Jiao & Ping Wang & Dusit Niyato
Language: eng
Format: epub
ISBN: 9789811673535
Publisher: Springer Singapore
3.4.1.2 Face Verification
We use real-world face image datasets to offer a face verification service using a deep learning algorithm as an example of perishable services. Using the proposed model for perishable service, the service provider should first evaluate the service quality and customersâ valuation. Then, it can determine the optimal raw data size, optimal update interval. While serving the customers, the optimal price will be calculated for dynamically selecting the winning customers according to the changing service quality, and the service provider needs to update its external data by the optimal update frequency. As introduced in Sect. 3.1.2, there are two phases in the development of the face verification experiment. The first phase is to train the neural network model to extract the features of face images. Specifically, the dataset for feature learning and extraction combines the CASIA-WebFace dataset [19] and FaceScrub dataset [20]. In total, there are 444, 729 face images from 8, 277 people in the training dataset. In the second phase, we use the well-known FG-NET Aging Database [21] to study the impact of the age gap on the performance of face verification. The dataset for verification contains 1, 002 images from 82 people over large age ranges. We assume the customerâs average arriving rate for perishable services. For demonstration purposes, we normalize the data size, i.e., , throughout this section. This experiment indicates the perishability of data and verifies the corresponding quality decay function (3.37).
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7716)
Robo-Advisor with Python by Aki Ranin(7614)
Offensive Shellcode from Scratch by Rishalin Pillay(6098)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(5012)
Ego Is the Enemy by Ryan Holiday(4956)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
Python for ArcGIS Pro by Silas Toms Bill Parker(4176)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3881)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3618)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3285)
Speed Up Your Python with Rust by Maxwell Flitton(3231)
Liar's Poker by Michael Lewis(3221)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3195)
Extreme DAX by Michiel Rozema & Henk Vlootman(3171)
Agile Security Operations by Hinne Hettema(3122)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3108)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3083)
Cryptography Algorithms by Massimo Bertaccini(3001)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2982)
