0000000001250561

AUTHOR

Lei Jiao

showing 92 related works from this author

Scheduling Domestic Shiftable Loads in Smart Grids: A Learning Automata-Based Scheme

2017

In this paper, we consider the problem of scheduling shiftable loads, over multiple users, in smart grids. We approach the problem, which is becoming increasingly pertinent in our present energy-thirsty society, using a novel distributed game-theoretic framework. From a modeling perspective, the distributed scheduling problem is formulated as a game, and in particular, a so-called “Potential” game. This game has at least one pure strategy Nash Equilibrium (NE), and we demonstrate that the NE point is a global optimal point. The solution that we propose, which is the pioneering solution that incorporates the theory of Learning Automata (LA), permits the total supplied loads to approach the p…

Learning automataJob shop schedulingComputer scienceDistributed computing02 engineering and technology010501 environmental sciences01 natural sciencesSubnetScheduling (computing)symbols.namesakeSmart gridStrategyNash equilibrium0202 electrical engineering electronic engineering information engineeringsymbols020201 artificial intelligence & image processingPotential game0105 earth and related environmental sciences
researchProduct

MAC strategies for single rendezvous multi-hop cognitive radio networks

2009

This paper presents two MAC strategies for multi-hop cognitive radio networks in single radio multi-channel cases. Both strategies use one of the idle multiple channels for communication among secondary users, and the network will leave the current channel and jump to another channel as a group if any primary user appears. The first strategy is based on a pre-defined pattern that will always tune to the next available channel when primary user emerges. The second one is based on the concept of connected dominating set in which a backbone is formed in the network in order to keep the continuity of the communication. The strategies are evaluated in both homogeneous and heterogeneous channels …

Routing protocolCognitive radiobusiness.industryComputer scienceDistributed computingRendezvousThroughputbusinessConnected dominating setComputer Science::Information TheoryComputer networkHop (networking)Communication channel2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications
researchProduct

Face Inpainting via Nested Generative Adversarial Networks

2019

Face inpainting aims to repaired damaged images caused by occlusion or cover. In recent years, deep learning based approaches have shown promising results for the challenging task of image inpainting. However, there are still limitation in reconstructing reasonable structures because of over-smoothed and/or blurred results. The distorted structures or blurred textures are inconsistent with surrounding areas and require further post-processing to blend the results. In this paper, we present a novel generative model-based approach, which consisted by nested two Generative Adversarial Networks (GAN), the sub-confrontation GAN in generator and parent-confrontation GAN. The sub-confrontation GAN…

General Computer ScienceComputer scienceInpaintingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technologyFace inpainting010501 environmental sciencesResidual01 natural sciencesImage (mathematics)0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5500105 earth and related environmental sciencesbusiness.industryDeep learningGeneral Engineeringdeep neural networkPattern recognitionGenerative modelFace (geometry)020201 artificial intelligence & image processingArtificial intelligencenested GANlcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesslcsh:TK1-9971Generator (mathematics)
researchProduct

The Regression Tsetlin Machine: A Tsetlin Machine for Continuous Output Problems

2019

The recently introduced Tsetlin Machine (TM) has provided competitive pattern classification accuracy in several benchmarks, composing patterns with easy-to-interpret conjunctive clauses in propositional logic. In this paper, we go beyond pattern classification by introducing a new type of TMs, namely, the Regression Tsetlin Machine (RTM). In all brevity, we modify the inner inference mechanism of the TM so that input patterns are transformed into a single continuous output, rather than to distinct categories. We achieve this by: (1) using the conjunctive clauses of the TM to capture arbitrarily complex patterns; (2) mapping these patterns to a continuous output through a novel voting and n…

FOS: Computer and information sciencesComputer Science - Machine LearningArtificial Intelligence (cs.AI)Computer Science - Artificial IntelligenceStatistics - Machine LearningMachine Learning (stat.ML)Machine Learning (cs.LG)
researchProduct

Optimizing channel selection for cognitive radio networks using a distributed Bayesian learning automata-based approach

2015

Consider a multi-channel Cognitive Radio Network (CRN) with multiple Primary Users (PUs), and multiple Secondary Users (SUs) competing for access to the channels. In this scenario, it is essential for SUs to avoid collision among one another while maintaining efficient usage of the available transmission opportunities. We investigate two channel access schemes. In the first model, an SU selects a channel and sends a packet directly without Carrier Sensing (CS) whenever the PU is absent on this channel. In the second model, an SU invokes CS in order to avoid collision among co-channel SUs. For each model, we analyze the channel selection problem and prove that it is a so-called "Exact Potent…

Theoretical computer scienceLearning automataComputer sciencebusiness.industryNetwork packet020206 networking & telecommunications02 engineering and technologyBayesian inferenceAutomatonsymbols.namesakeCognitive radioTransmission (telecommunications)Artificial IntelligenceNash equilibrium0202 electrical engineering electronic engineering information engineeringsymbols020201 artificial intelligence & image processingArtificial intelligencebusinessCommunication channelApplied Intelligence
researchProduct

Analysis on channel bonding/aggregation for multi-channel cognitive radio networks

2010

Paper presented at the 2010 European Wireless Conference, Lucca. (c) 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. Paper also available from the publisher: http://dx.doi.org/10.1109/EW.2010.5483492 Channel bonding/aggregation techniques, which assemble several channels together as one channel, could be used in cognitive radio networks for the purpose of achieving better bandwidth utilizatio…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

The regression Tsetlin machine: a novel approach to interpretable nonlinear regression

2019

Relying simply on bitwise operators, the recently introduced Tsetlin machine (TM) has provided competitive pattern classification accuracy in several benchmarks, including text understanding. In this paper, we introduce the regression Tsetlin machine (RTM), a new class of TMs designed for continuous input and output, targeting nonlinear regression problems. In all brevity, we convert continuous input into a binary representation based on thresholding, and transform the propositional formula formed by the TM into an aggregated continuous output. Our empirical comparison of the RTM with state-of-the-art regression techniques reveals either superior or on par performance on five datasets. Thi…

021110 strategic defence & security studiesTheoretical computer scienceEmpirical comparisonComputer scienceGeneral Mathematics0211 other engineering and technologiesGeneral EngineeringGeneral Physics and AstronomyBinary number02 engineering and technologyThresholdingRegressionPropositional formula0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingBitwise operationTheme (computing)Nonlinear regressionVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Unlocking the potential of deep learning for marine ecology: overview, applications, and outlook

2022

The deep learning revolution is touching all scientific disciplines and corners of our lives as a means of harnessing the power of big data. Marine ecology is no exception. These new methods provide analysis of data from sensors, cameras, and acoustic recorders, even in real time, in ways that are reproducible and rapid. Off-the-shelf algorithms can find, count, and classify species from digital images or video and detect cryptic patterns in noisy data. Using these opportunities requires collaboration across ecological and data science disciplines, which can be challenging to initiate. To facilitate these collaborations and promote the use of deep learning towards ecosystem-based management…

FOS: Computer and information sciences0106 biological sciencesArtificial intelligenceComputer Science - Machine LearningEcologyComputer Science - Artificial IntelligenceComputer Vision and Pattern Recognition (cs.CV)010604 marine biology & hydrobiologyComputer Science - Computer Vision and Pattern RecognitionMarine monitoringMarine bioacousticsAquatic ScienceEcosystem-based managementOceanography010603 evolutionary biology01 natural sciencesMachine Learning (cs.LG)VDP::Teknologi: 500Artificial Intelligence (cs.AI)13. Climate actionMachine learning14. Life underwaterEcology Evolution Behavior and Systematics
researchProduct

The Convolutional Tsetlin Machine

2019

Convolutional neural networks (CNNs) have obtained astounding successes for important pattern recognition tasks, but they suffer from high computational complexity and the lack of interpretability. The recent Tsetlin Machine (TM) attempts to address this lack by using easy-to-interpret conjunctive clauses in propositional logic to solve complex pattern recognition problems. The TM provides competitive accuracy in several benchmarks, while keeping the important property of interpretability. It further facilitates hardware-near implementation since inputs, patterns, and outputs are expressed as bits, while recognition and learning rely on straightforward bit manipulation. In this paper, we ex…

FOS: Computer and information sciencesComputer Science - Machine LearningArtificial Intelligence (cs.AI)Computer Science - Artificial IntelligenceStatistics - Machine LearningMachine Learning (stat.ML)Machine Learning (cs.LG)
researchProduct

User Grouping and Power Allocation in NOMA Systems: A Reinforcement Learning-Based Solution

2020

In this paper, we present a pioneering solution to the problem of user grouping and power allocation in Non-Orthogonal Multiple Access (NOMA) systems. There are two fundamentally salient and difficult issues associated with NOMA systems. The first involves the task of grouping users together into the pre-specified time slots. The subsequent second phase augments this with the solution of determining how much power should be allocated to the respective users. We resolve this with the first reported Reinforcement Learning (RL)-based solution, which attempts to solve the partitioning phase of this issue. In particular, we invoke the Object Migration Automata (OMA) and one of its variants to re…

Theoretical computer scienceLearning automataComputer science020206 networking & telecommunications02 engineering and technologymedicine.diseaseTask (project management)AutomatonPower (physics)NomaSalient0202 electrical engineering electronic engineering information engineeringmedicineReinforcement learningGreedy algorithm
researchProduct

A Bayesian Learning Automata-Based Distributed Channel Selection Scheme for Cognitive Radio Networks

2014

We consider a scenario where multiple Secondary Users SUs operate within a Cognitive Radio Network CRN which involves a set of channels, where each channel is associated with a Primary User PU. We investigate two channel access strategies for SU transmissions. In the first strategy, the SUs will send a packet directly without operating Carrier Sensing Medium Access/Collision Avoidance CSMA/CA whenever a PU is absent in the selected channel. In the second strategy, the SUs implement CSMA/CA to further reduce the probability of collisions among co-channel SUs. For each strategy, the channel selection problem is formulated and demonstrated to be a so-called "Potential" game, and a Bayesian Lea…

business.industryNetwork packetComputer scienceBayesian inferenceAutomatonsymbols.namesakeCognitive radioNash equilibriumConvergence (routing)symbolsbusinessPotential gameSimulationCommunication channelComputer network
researchProduct

Decoupled Downlink-Uplink Coverage Analysis with Interference Management for Enriched Heterogeneous Cellular Networks

2016

Heterogeneous cellular networks (HetCNets) offer a promising solution to cope with the current cellular coverage crunch. Due to the large transmit power disparity, while following maximum power received (MPR) association scheme, a larger number of users are associated with macro-cell BS (MBS) than small-cell BSs (SBSs). Therefore, an imbalance load arrangement takes place across the HetCNets. Hence, using cell range expansion-based cell association, we can balance the load across the congested MBS. However, using MPR association scheme, users’ offloading leads to two challenges: 1) macro-cell interference , in which the MBS interferes with the offloaded users, and 2) coupled downlink-uplink…

Heterogeneous cellular networksGeneral Computer ScienceComputer science02 engineering and technologyInterference (wave propagation)Frequency allocationsmall-cell BSsLoad managementBase stationcoverage performance0203 mechanical engineeringTelecommunications linkreverse frequency allocation0202 electrical engineering electronic engineering information engineeringGeneral Materials Sciencedecoupled downlink-uplink associationbusiness.industryGeneral Engineering020302 automobile design & engineering020206 networking & telecommunicationsTransmitter power outputCellular networklcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesslcsh:TK1-9971Computer networkIEEE Access
researchProduct

Dynamic Channel Aggregation Strategies in Cognitive Radio Networks with Spectrum Adaptation

2011

In cognitive radio networks, channel aggregation techniques which combine several channels together as one channel have been proposed in many MAC protocols. In this paper, spectrum adaptation is proposed in channel aggregation and two strategies which dynamically adjust channel occupancy of ongoing traffic flows are further developed. The performance of these strategies is evaluated using continuous time Markov chain models. Moreover, models in the quasi-stationary regime are analyzed and the closed-form capacity expression is derived in this regime. Numerical results demonstrate that the capacity of the secondary network can be improved by using channel aggregation with spectrum adaptation.

Computer sciencebusiness.industrySpectrum (functional analysis)Markov processUpper and lower boundsExpression (mathematics)symbols.namesakeCognitive radiosymbolsAdaptation (computer science)businessComputer Science::Information TheoryCommunication channelComputer network2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
researchProduct

Dynamic Flow-Adaptive Spectrum Leasing with Channel Aggregation in Cognitive Radio Networks.

2020

Cognitive radio networks (CRNs), which allow secondary users (SUs) to dynamically access a network without affecting the primary users (PUs), have been widely regarded as an effective approach to mitigate the shortage of spectrum resources and the inefficiency of spectrum utilization. However, the SUs suffer from frequent spectrum handoffs and transmission limitations. In this paper, considering the quality of service (QoS) requirements of PUs and SUs, we propose a novel dynamic flow-adaptive spectrum leasing with channel aggregation. Specifically, we design an adaptive leasing algorithm, which adaptively adjusts the portion of leased channels based on the number of ongoing and buffered PU …

Computer sciencechannel aggregating02 engineering and technologyBlocking (statistics)lcsh:Chemical technologyBiochemistryArticleAnalytical Chemistry0203 mechanical engineeringflow-adaptive spectrum leasing0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550business.industryQuality of serviceSpectrum (functional analysis)020302 automobile design & engineering020206 networking & telecommunicationsAtomic and Molecular Physics and OpticsCognitive radioTransmission (telecommunications)Flow (mathematics)cognitive radio networksbusinessCommunication channelComputer networkSensors (Basel, Switzerland)
researchProduct

A Data-Driven Architecture for Personalized QoE Management in 5G Wireless Networks

2017

With the emergence of a variety of new wireless network types, business types, and QoS in a more autonomic, diverse, and interactive manner, it is envisioned that a new era of personalized services has arrived, which emphasizes users' requirements and service experiences. As a result, users' QoE will become one of the key features in 5G/future networks. In this article, we first review the state of the art of QoE research from several perspectives, including definition, influencing factors, assessment methods, QoE models, and control methods. Then a data-driven architecture for enhancing personalized QoE is proposed for 5G networks. Under this architecture, we specifically propose a two-ste…

Service (systems architecture)MultimediaComputer scienceWireless networkQuality of service020206 networking & telecommunications02 engineering and technologycomputer.software_genreComputer Science ApplicationsVariety (cybernetics)Data-drivenComprehension0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringArchitecturecomputer5GIEEE Wireless Communications
researchProduct

Temperate Fish Detection and Classification: a Deep Learning based Approach

2021

A wide range of applications in marine ecology extensively uses underwater cameras. Still, to efficiently process the vast amount of data generated, we need to develop tools that can automatically detect and recognize species captured on film. Classifying fish species from videos and images in natural environments can be challenging because of noise and variation in illumination and the surrounding habitat. In this paper, we propose a two-step deep learning approach for the detection and classification of temperate fishes without pre-filtering. The first step is to detect each single fish in an image, independent of species and sex. For this purpose, we employ the You Only Look Once (YOLO) …

0106 biological sciencesFOS: Computer and information sciencesComputer Science - Machine LearningComputer scienceComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern Recognition010603 evolutionary biology01 natural sciencesConvolutional neural networkVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Machine Learning (cs.LG)Artificial IntelligenceClassifier (linguistics)FOS: Electrical engineering electronic engineering information engineeringbusiness.industry010604 marine biology & hydrobiologyDeep learningImage and Video Processing (eess.IV)Process (computing)Pattern recognitionElectrical Engineering and Systems Science - Image and Video ProcessingObject detectionA priori and a posterioriNoise (video)Artificial intelligenceTransfer of learningbusiness
researchProduct

Channel aggregation with guard-band in D-OFDM based CRNs: Modeling and performance evaluation

2016

Channel aggregation (CA) techniques can offer flexible channel allocation and improve overall system performance in multi-channel cognitive radio networks (CRNs). Although many CA techniques have been proposed and studied, the impact of guard-band on CA for channel access has not been addressed in-depth. In this paper, we study the guard-band allocation mechanisms in discontinuous-orthogonal frequency division multiplexing (D-OFDM) based CRNs, and investigate the impact of guard-band sharing on SU flows when CA is enabled. Continuous time Markov chain (CTMC) based models have been developed in order to investigate the stochastic behavior of PU and SU flows. Based on our mathematical analysi…

Channel allocation schemesComputer scienceOrthogonal frequency-division multiplexingDistributed computingBandwidth (signal processing)Guard bandMarkov process020206 networking & telecommunications02 engineering and technologyFrequency-division multiplexingsymbols.namesakeCognitive radio0202 electrical engineering electronic engineering information engineeringsymbols020201 artificial intelligence & image processingSimulationCommunication channel2016 IEEE Wireless Communications and Networking Conference
researchProduct

Markov Chain Analysis of CA and CF with Multiple Types of Users

2019

In the previous chapter, we studied in depth the impact of CA and CF on traffic flows in systems where there exists only one type of users with one type of flows. In this chapter, the influence of CA and CF is studied in a more complicated scenario, i.e., the one in which multiple users exist, and where users have different priorities in using channel resources. CRN is a typical example for such a system, and we study the CRNs where PUs and SUs have one type of flows for each.

Markov chainComputer scienceTopologyCommunication channel
researchProduct

A dynamic parallel-rendezvous MAC mechanism in multi-rate cognitive radio networks: Mechanism design and performance evaluation

2009

Published version of an article published in the journal:Journal of Communications, © Academy Publisher Also available from publisher: http://dx.doi.org/10.4304/jcm.4.10.752-765 Parallel rendezvous multi-channel MAC mechanisms are regarded as an efficient method for media access control in cognitive radio networks since they do not need a control channel and use only one transceiver. However, existing parallel rendezvous MAC mechanisms assume that all channels have the same maximum capacity and channel availability for secondary users. In this paper, we propose a dynamic parallel rendezvous multi-channel MAC mechanism for synchronized multi-rate cognitive radio networks in which secondary u…

ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVDP::Technology: 500::Information and communication technology: 550
researchProduct

A novel faster failure detection strategy for link connectivity using Hello messaging in mobile ad hoc networks

2019

Faster failure detection is one of the main steps responsible for efficient link connectivity in mobile ad hoc networks (MANETs). Under a random behaviour of network nodes and link/node failure, th...

Computer Networks and CommunicationsComputer sciencebusiness.industryStochastic processNode (networking)020206 networking & telecommunications02 engineering and technologyLink (geometry)Mobile ad hoc networkHardware and Architecture0202 electrical engineering electronic engineering information engineeringbusinessSoftwareComputer networkInternational Journal of Ad Hoc and Ubiquitous Computing
researchProduct

A formal proof of the ε-optimality of absorbing continuous pursuit algorithms using the theory of regular functions

2014

Published version of an article from the journal: Applied Intelligence. Also available on Springerlink: http://dx.doi.org/10.1007/s10489-014-0541-1 The most difficult part in the design and analysis of Learning Automata (LA) consists of the formal proofs of their convergence accuracies. The mathematical techniques used for the different families (Fixed Structure, Variable Structure, Discretized etc.) are quite distinct. Among the families of LA, Estimator Algorithms (EAs) are certainly the fastest, and within this family, the set of Pursuit algorithms have been considered to be the pioneering schemes. Informally, if the environment is stationary, their ε-optimality is defined as their abili…

Discrete mathematicsDiscretizationLearning automataAbsorbing CPAComputer scienceEstimatorMonotonic functionVDP::Technology: 500::Information and communication technology: 550Mathematical proofFormal proofCPAArbitrarily largeArtificial Intelligenceε-optimalityMartingale (probability theory)Pursuit algorithmsAlgorithm
researchProduct

Indoor Space Classification Using Cascaded LSTM

2020

Author's accepted manuscript. © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Indoor space classification is an important part of localization that helps in precise location extraction, which has been extensively utilized in industrial and domestic domain. There are various approaches that employ Bluetooth Low Energy (BLE), Wi-Fi, magnetic field, object detecti…

Computer scienceUltra-wideband020302 automobile design & engineering02 engineering and technologySpace (commercial competition)computer.software_genreObject detectionlaw.inventionDomain (software engineering)Bluetooth0203 mechanical engineeringlaw0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingData miningcomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Greedy versus Dynamic Channel Aggregation Strategy in CRNs: Markov Models and Performance Evaluation

2011

Publishes version of a paper from the book: Networking 2011 Workshops. Also available f rom the publisher on SpringLink:http://dx.doi.org/10.1007/978-3-642-23041-7_3 In cognitive radio networks, channel aggregation techniques which aggregate several channels together as one channel have been proposed in many MAC protocols. In this paper, we consider elastic data traffic and spectrum adaptation for channel aggregation, and propose two new strategies named as Greedy and Dynamic respectively. The performance of channel aggregation represented by these strategies is evaluated using continuous time Markov chain models. Moreover, simulation results based on various traffic distributions are utili…

VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

Medium access in cognitive radio networks: From single hop to multiple hops

2012

Doktorgradsavhandling i informasjons- og kommunikasjonsteknologi, Universitetet i Agder, Grimstad, 2012 If channel assembling is enabled, this technique can be utilized for potential performance improvement in CRNs. Two use cases are envisaged for channel assembling. In the first use case, the system can accommodate parallel SU services in multiple channels, while in the second use case, the system allows only one SU service at a time. In the use case where parallel SU services are allowed, various channel assembling strategies are proposed and modeled in order to investigate their performance and to acquire better comprehension of the behavior of CRNs with channel assembling. Moreover, the…

VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

The Regression Tsetlin Machine: A Tsetlin Machine for Continuous Output Problems

2019

The recently introduced Tsetlin Machine (TM) has provided competitive pattern classification accuracy in several benchmarks, composing patterns with easy-to-interpret conjunctive clauses in propositional logic. In this paper, we go beyond pattern classification by introducing a new type of TMs, namely, the Regression Tsetlin Machine (RTM). In all brevity, we modify the inner inference mechanism of the TM so that input patterns are transformed into a single continuous output, rather than to distinct categories. We achieve this by: (1) using the conjunctive clauses of the TM to capture arbitrarily complex patterns; (2) mapping these patterns to a continuous output through a novel voting and n…

Normalization (statistics)Scheme (programming language)Computer scienceInferenceProbability density function02 engineering and technologyPropositional calculusRegression020202 computer hardware & architecturePattern recognition (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingNoise (video)Algorithmcomputercomputer.programming_language
researchProduct

LCRT: A ToA Based Mobile Terminal Localization Algorithm in NLOS Environment

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/VETECS.2009.5073644 Non line-of-sight (NLOS) propagation in range measurement is a key problem for mobile terminal localization. This paper proposes a low computational residual test (LCRT) algorithm that can identify the number of line-of-sight (LOS) transmissions and reduce the computational com…

Non-line-of-sight propagationTime of arrivalComputational complexity theoryVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Range (statistics)Probability density functionResidualCramér–Rao boundAlgorithmUpper and lower boundsMathematics
researchProduct

A Comprehensive Utility Function for Resource Allocation in Mobile Edge Computing

2020

In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility function for resource allocation in MEC. The utility function considers the heterogeneous nature of applications that a UE offloads to MES. The proposed utility function considers all important parameters, including CPU, RAM, hard disk space, required time, and distance, to calculate a more realis…

FOS: Computer and information sciencesComputer sciencemedia_common.quotation_subjectG.3Cloud computingComputer Science - Networking and Internet ArchitectureC.2.3BiomaterialsC.2.1Resource (project management)Electrical and Electronic EngineeringFunction (engineering)media_commonNetworking and Internet Architecture (cs.NI)Mobile edge computingbusiness.industryEnergy consumptionComputer Science ApplicationsTask (computing)User equipmentMechanics of MaterialsModeling and SimulationResource allocationG.3; C.2.3; C.2.1business46FxxComputer networkComputers, Materials & Continua
researchProduct

Markov Chain Analysis of CA and CF with a Single Type of Users

2019

In this chapter, we study the impact of CA and CF on traffic flows in the simplest system where there is one single type of flows generated by one single type of users. We will use CTMC to model the system, and the goal is to deliver the elementary concept of CTMC analysis for a system with CA and CF.

Markov chainElementary conceptComputer scienceSingle typeTopology
researchProduct

Positionless aspect based sentiment analysis using attention mechanism.

2021

Abstract Aspect-based sentiment analysis (ABSA) aims at identifying fine-grained polarity of opinion associated with a given aspect word. Several existing articles demonstrated promising ABSA accuracy using positional embedding to show the relationship between an aspect word and its context. In most cases, the positional embedding depends on the distance between the aspect word and the remaining words in the context, known as the position index sequence. However, these techniques usually employ both complex preprocessing approaches with additional trainable positional embedding and complex architectures to obtain the state-of-the-art performance. In this paper, we simplify preprocessing by …

SequenceInformation Systems and ManagementComputer sciencebusiness.industrySentiment analysisContext (language use)02 engineering and technologycomputer.software_genreLexiconManagement Information SystemsIndex (publishing)Artificial Intelligence020204 information systems0202 electrical engineering electronic engineering information engineeringPreprocessorEmbedding020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550SoftwareWord (computer architecture)Natural language processing
researchProduct

Word-level human interpretable scoring mechanism for novel text detection using Tsetlin Machines

2021

Recent research in novelty detection focuses mainly on document-level classification, employing deep neural networks (DNN). However, the black-box nature of DNNs makes it difficult to extract an exact explanation of why a document is considered novel. In addition, dealing with novelty at the word-level is crucial to provide a more fine-grained analysis than what is available at the document level. In this work, we propose a Tsetlin machine (TM)-based architecture for scoring individual words according to their contribution to novelty. Our approach encodes a description of the novel documents using the linguistic patterns captured by TM clauses. We then adopt this description to measure how …

FOS: Computer and information sciencesI.2Computer Science - Machine LearningArtificial Intelligence (cs.AI)Computer Science - Computation and LanguageI.5Artificial IntelligenceComputer Science - Artificial IntelligenceI.2; I.5; I.7Computation and Language (cs.CL)I.7VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Machine Learning (cs.LG)
researchProduct

Deep Learning for Classifying Physical Activities from Accelerometer Data

2021

Physical inactivity increases the risk of many adverse health conditions, including the world’s major non-communicable diseases, such as coronary heart disease, type 2 diabetes, and breast and colon cancers, shortening life expectancy. There are minimal medical care and personal trainers’ methods to monitor a patient’s actual physical activity types. To improve activity monitoring, we propose an artificial-intelligence-based approach to classify the physical movement activity patterns. In more detail, we employ two deep learning (DL) methods, namely a deep feed-forward neural network (DNN) and a deep recurrent neural network (RNN) for this purpose. We evaluate the proposed models on two phy…

Fysisk aktivitetComputer scienceVDP::Informasjons- og kommunikasjonsteknologi: 550physical activityAccelerometercomputer.software_genresensorsBiochemistryMedical careRNNAnalytical Chemistry:Information and communication technology: 550 [VDP]Accelerometer dataAccelerometryartificial_intelligence_roboticsInstrumentationArtificial neural networkhealthAtomic and Molecular Physics and Opticsmachine learningclassificationHealthFeedforward neural network:Informasjons- og kommunikasjonsteknologi: 550 [VDP]Physical activityTP1-1185Movement activityMachine learningHelseFeed-forward neural networksVDP::Information and communication technology: 550ArticleFysisk aktiviteterMachine learningHumansAccelerometer dataElectrical and Electronic EngineeringExercisebusiness.industryPhysical activitySensorsDeep learningChemical technologydeep learningDeep learningfeed-forward neural networkRecurrent neural networkPhysical activitiesDiabetes Mellitus Type 2Recurrent neural networksaccelerometer dataUCIrecurrent neural networkNeural Networks ComputerArtificial intelligenceClassificationsbusinesscomputerDNN
researchProduct

Complexity analysis of spectrum access strategies with channel aggregation in CR networks

2012

Cognitive radio has been introduced to increase spectrum utilization efficiency. To further improve bandwidth utilization of cognitive radio users, channel aggregation (CA) techniques can be adopted for spectrum access. In this paper, we analyze the complexity of three CA strategies, in terms of required amount of handshakes for channel adaptation due to primary and secondary user activities. Continuous time Markov chain models are developed to evaluate the total number of handshakes required per unit time by different CA strategies and the analytical results are validated by simulations. Numerical results reveal that the complexity of CA strategies depends on the capability and the design …

Cognitive radioComputer scienceDistributed computingSpectrum (functional analysis)Adaptation (computer science)SimulationCommunication channel2012 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Using the Tsetlin Machine to Learn Human-Interpretable Rules for High-Accuracy Text Categorization With Medical Applications

2019

Medical applications challenge today's text categorization techniques by demanding both high accuracy and ease-of-interpretation. Although deep learning has provided a leap ahead in accuracy, this leap comes at the sacrifice of interpretability. To address this accuracy-interpretability challenge, we here introduce, for the first time, a text categorization approach that leverages the recently introduced Tsetlin Machine. In all brevity, we represent the terms of a text as propositional variables. From these, we capture categories using simple propositional formulae, such as: if "rash" and "reaction" and "penicillin" then Allergy. The Tsetlin Machine learns these formulae from a labelled tex…

FOS: Computer and information sciencesComputer Science - Machine LearningGeneral Computer ScienceComputer sciencetext categorizationNatural language understandingDecision treeMachine Learning (stat.ML)02 engineering and technologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Annen informasjonsteknologi: 559Machine learningcomputer.software_genresupervised learningMachine Learning (cs.LG)Naive Bayes classifierText miningStatistics - Machine Learning0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceTsetlin machinehealth informaticsInterpretabilityPropositional variableClassification algorithmsArtificial neural networkbusiness.industryDeep learning020208 electrical & electronic engineeringGeneral EngineeringRandom forestSupport vector machinemachine learningCategorization020201 artificial intelligence & image processingArtificial intelligencelcsh:Electrical engineering. Electronics. Nuclear engineeringbusinessPrecision and recallcomputerlcsh:TK1-9971
researchProduct

Neuroevolution of Actively Controlled Virtual Characters - An Experiment for an Eight-Legged Character

2018

Physics-based character animation offers an attractive alternative for traditional animations. However, it is often strenuous for a physics-based approach to incorporate active user control of different characters. In this paper, a neuroevolutionary approach is proposed using HyperNEAT to combine individually trained neural controllers to form a control strategy for a simulated eight-legged character, which is a previously untested character morphology for this algorithm. It is aimed to evaluate the robustness and responsiveness of the control strategy that changes the controllers based on simulated user inputs. The experiment result shows that HyperNEAT is able to evolve long walking contr…

Neuroevolutionbusiness.industry020207 software engineeringHyperNEAT02 engineering and technologyCharacter (mathematics)Robustness (computer science)User control0202 electrical engineering electronic engineering information engineeringCharacter animation020201 artificial intelligence & image processingArtificial intelligencebusinessControl (linguistics)
researchProduct

Measuring the Novelty of Natural Language Text Using the Conjunctive Clauses of a Tsetlin Machine Text Classifier

2020

Most supervised text classification approaches assume a closed world, counting on all classes being present in the data at training time. This assumption can lead to unpredictable behaviour during operation, whenever novel, previously unseen, classes appear. Although deep learning-based methods have recently been used for novelty detection, they are challenging to interpret due to their black-box nature. This paper addresses \emph{interpretable} open-world text classification, where the trained classifier must deal with novel classes during operation. To this end, we extend the recently introduced Tsetlin machine (TM) with a novelty scoring mechanism. The mechanism uses the conjunctive clau…

I.2FOS: Computer and information sciencesComputer Science - Machine LearningI.5Computer Science - Artificial IntelligenceComputer scienceI.2; I.5; I.7computer.software_genreI.7Novelty detectionMeasure (mathematics)Machine Learning (cs.LG)Representation (mathematics)Computer Science - Computation and Languagebusiness.industryDeep learningNoveltyPropositional calculusArtificial Intelligence (cs.AI)Artificial intelligencebusinessClassifier (UML)computerComputation and Language (cs.CL)Natural language processingNatural language
researchProduct

Analysis of load balancing and interference management in heterogeneous cellular networks

2017

To meet the current cellular capacity demands, proactive offloading is required in heterogeneous cellular networks (HetCNets) comprising of different tiers of base stations (BSs), e.g., small-cell BSs (sBSs) and conventional macro-cell BSs (mBSs). Each tier differs from the others in terms of BS transmit power, spatial density, and association bias. Consequently, the coverage range of each tier BSs is also different from others. Due to low transmit power, a fewer number of users are associated to an sBS as compared with mBS. Thus, inefficient utilization of small-cell resources occurs. To balance the load across the network, it is necessary to push users to the underloaded small cells from …

Heterogeneous cellular networksGeneral Computer ScienceComputer science02 engineering and technologyselective sBS deploymentFrequency allocationBase stationLoad managementsmall-cell BSs0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringreverse frequency allocationGeneral Materials ScienceNetwork performanceuser ratebusiness.industrycoverage probabilityGeneral Engineering020302 automobile design & engineering020206 networking & telecommunicationsLoad balancing (computing)Transmitter power outputCellular networklcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesslcsh:TK1-9971Computer network
researchProduct

Interpretability in Word Sense Disambiguation using Tsetlin Machine

2021

Word-sense disambiguationComputer sciencebusiness.industryArtificial intelligencecomputer.software_genrebusinesscomputerNatural language processingInterpretabilityProceedings of the 13th International Conference on Agents and Artificial Intelligence
researchProduct

Domestic load forecasting using neural network and its use for missing data analysis

2015

Domestic demand prediction is very important for home energy management system and also for peak reduction in power system network. In this work, active and reactive power consumption prediction model is developed and analysed for a typical Southern Norwegian house for hourly power (active and reactive) consumptions and time information as inputs. In the proposed model, a neural network is adopted as a main technique and historical domestic load data of around 2 years are used as input. The available data has some measurement errors and missing segments. Before using the data for training purpose, missing and inaccurate data are considered and then it is used for testing the model. It is ob…

Energy management systemEngineeringElectric power systemObservational errorArtificial neural networkOperations researchbusiness.industryDistribution management systemAC powerMissing databusinessReliability engineeringPower (physics)
researchProduct

A Conclusive Analysis of the Finite-Time Behavior of the Discretized Pursuit Learning Automaton

2019

Author's accepted version (post-print). © 20XX IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Available from 20/03/2021. This paper deals with the finite-time analysis (FTA) of learning automata (LA), which is a topic for which very little work has been reported in the literature. This is as opposed to the asymptotic steady-state analysis for which there are, probabl…

Property (philosophy)Learning automataDiscretizationMarkov chainComputer Networks and CommunicationsComputer scienceMarkov processMonotonic function02 engineering and technologyVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Computer Science ApplicationsAutomatonsymbols.namesakeArtificial Intelligence0202 electrical engineering electronic engineering information engineeringsymbols020201 artificial intelligence & image processingMathematical economicsSoftwareIEEE Transactions on Neural Networks and Learning Systems
researchProduct

The Hierarchical Discrete Learning Automaton Suitable for Environments with Many Actions and High Accuracy Requirements

2022

Author's accepted manuscript Since its early beginning, the paradigm of Learning Automata (LA), has attracted much interest. Over the last decades, new concepts and various improvements have been introduced to increase the LA’s speed and accuracy, including employing probability updating functions, discretizing the probability space, and implementing the “Pursuit” concept. The concept of incorporating “structure” into the ordering of the LA’s actions is one of the latest advancements to the field, leading to the ϵ-optimal Hierarchical Continuous Pursuit LA (HCPA) that has superior performance to other LA variants when the number of actions is large. Although the previously proposed HCPA is …

VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Modelling of Compressors in an Industrial CO $$_2$$ -Based Operational Cooling System Using ANN for Energy Management Purposes

2019

Large scale cooling installations usually have high energy consumption and fluctuating power demands. There are several ways to control energy consumption and power requirements through intelligent energy and power management, such as utilizing excess heat, thermal energy storage and local renewable energy sources. Intelligent energy and power management in an operational setting is only possible if the time-varying performance of the individual components of the energy system is known. This paper presents an approach to model the compressors in an industrial, operational two-stage cooling system, with CO\(_2\) as the working fluid, located in an advanced food distribution warehouse in Norw…

business.industryComputer scienceEnergy management020209 energy020208 electrical & electronic engineeringCooling load02 engineering and technologyEnergy consumptionThermal energy storageAutomotive engineeringEnergy storageRenewable energy0202 electrical engineering electronic engineering information engineeringWater coolingElectric powerbusiness
researchProduct

Distributed routing and channel allocation in multi-channel multi-hop ad hoc networks

2013

In this paper, we propose a novel routing protocol which is integrated with channel assignment for multi-channel multi-hop wireless ad hoc networks. In such a network, each node is equipped with three transceivers. One is always tuned on a control channel which is responsible for control and broadcast messages, and the other two perform as transmitter and receiver respectively for traffic flows on different data channels. The routing protocol works in an on-demand manner, and the proposed routing discovery process selects a path that potentially traverses nodes with lighter traffic load and lower number of carried flows. With a given number of non-overlapping channels, the optimal solution …

Routing protocolDynamic Source RoutingComputer scienceWireless ad hoc networkDistributed computingEnhanced Interior Gateway Routing ProtocolWireless Routing ProtocolHop (networking)Routing Information ProtocolControl channelDestination-Sequenced Distance Vector routingZone Routing ProtocolStatic routingChannel allocation schemesAdaptive quality of service multi-hop routingbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPath vector protocolAd hoc wireless distribution serviceDistance-vector routing protocolLink-state routing protocolOptimized Link State Routing ProtocolMultipath routingInterior gateway protocolHazy Sighted Link State Routing ProtocolbusinessComputer network2013 IEEE Wireless Communications and Networking Conference (WCNC)
researchProduct

Using the Theory of Regular Functions to Formally Prove the ε-Optimality of Discretized Pursuit Learning Algorithms

2014

Learning Automata LA can be reckoned to be the founding algorithms on which the field of Reinforcement Learning has been built. Among the families of LA, Estimator Algorithms EAs are certainly the fastest, and of these, the family of Pursuit Algorithms PAs are the pioneering work. It has recently been reported that the previous proofs for e-optimality for all the reported algorithms in the family of PAs have been flawed. We applaud the researchers who discovered this flaw, and who further proceeded to rectify the proof for the Continuous Pursuit Algorithm CPA. The latter proof, though requires the learning parameter to be continuously changing, is, to the best of our knowledge, the current …

Constraint (information theory)Basis pursuit denoisingLearning automataComputer scienceReinforcement learningBasis pursuitMathematical proofMatching pursuitAlgorithmField (computer science)
researchProduct

User grouping and power allocation in NOMA systems: a novel semi-supervised reinforcement learning-based solution

2022

Author's accepted manuscript In this paper, we present a pioneering solution to the problem of user grouping and power allocation in non-orthogonal multiple access (NOMA) systems. The problem is highly pertinent because NOMA is a well-recognized technique for future mobile radio systems. The salient and difcult issues associated with NOMA systems involve the task of grouping users together into the prespecifed time slots, which are augmented with the question of determining how much power should be allocated to the respective users. This problem is, in and of itself, NP-hard. Our solution is the frst reported reinforcement learning (RL)-based solution, which attempts to resolve parts of thi…

Artificial IntelligenceComputer Vision and Pattern RecognitionVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Power allocation in multi-channel cognitive radio networks with channel assembling

2011

Accepted version of a paper in the book: 2011 IEEE 12th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). Published version available from the IEEE:http://dx.doi.org/10.1109/SPAWC.2011.5990485 Consider power allocation for Secondary User (SU) packet transmissions over multiple channels with variable Primary User (PU) arrival rates in cognitive radio networks. Two problems are studied in this paper: The first one is to minimize the collision probability with PUs and the second one is to maximize the data rate while keeping the collision probability bounded. It is shown that the optimal solution for the first problem is to allocate all power onto the bes…

Mathematical optimizationComputer sciencebusiness.industryNetwork packet020206 networking & telecommunications02 engineering and technologyPower budgetPower (physics)Dynamic programmingVariable (computer science)Cognitive radioBounded functionVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 5520202 electrical engineering electronic engineering information engineeringbusinessComputer networkCommunication channel
researchProduct

On the Convergence of Tsetlin Machines for the XOR Operator.

2022

The Tsetlin Machine (TM) is a novel machine learning algorithm with several distinct properties, including transparent inference and learning using hardware-near building blocks. Although numerous papers explore the TM empirically, many of its properties have not yet been analyzed mathematically. In this article, we analyze the convergence of the TM when input is non-linearly related to output by the XOR-operator. Our analysis reveals that the TM, with just two conjunctive clauses, can converge almost surely to reproducing XOR, learning from training data over an infinite time horizon. Furthermore, the analysis shows how the hyper-parameter T guides clause construction so that the clauses c…

FOS: Computer and information sciencesComputer Science - Machine LearningComputer Science - Logic in Computer ScienceVDP::Teknologi: 500Artificial Intelligence (cs.AI)Computational Theory and MathematicsArtificial IntelligenceComputer Science - Artificial IntelligenceApplied MathematicsComputer Vision and Pattern RecognitionSoftwareMachine Learning (cs.LG)Logic in Computer Science (cs.LO)IEEE transactions on pattern analysis and machine intelligence
researchProduct

A Deep Learning Approach for Energy Efficient Computational Offloading in Mobile Edge Computing

2019

Mobile edge computing (MEC) has shown tremendous potential as a means for computationally intensive mobile applications by partially or entirely offloading computations to a nearby server to minimize the energy consumption of user equipment (UE). However, the task of selecting an optimal set of components to offload considering the amount of data transfer as well as the latency in communication is a complex problem. In this paper, we propose a novel energy-efficient deep learning based offloading scheme (EEDOS) to train a deep learning based smart decision-making algorithm that selects an optimal set of application components based on remaining energy of UEs, energy consumption by applicati…

QA75General Computer ScienceComputer scienceDistributed computingenergy efficient offloading02 engineering and technologyVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 42001 natural sciencesuser equipmentComputational offloadingServer0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Mobile edge computingbusiness.industryDeep learning010401 analytical chemistryGeneral Engineeringdeep learning020206 networking & telecommunicationsEnergy consumption0104 chemical sciencesUser equipmentArtificial intelligencemobile edge computinglcsh:Electrical engineering. Electronics. Nuclear engineeringbusinesslcsh:TK1-9971Efficient energy useIEEE Access
researchProduct

A multi-step finite-state automaton for arbitrarily deterministic Tsetlin Machine learning

2021

Computational Theory and MathematicsArtificial IntelligenceControl and Systems EngineeringVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Theoretical Computer Science
researchProduct

A general framework for group authentication and key exchange protocols

2014

Published version of a chapter in the book: Foundations and Practice of Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-319-05302-8_3 In this paper, we propose a novel framework for group authentication and key exchange protocols. There are three main advantages of our framework. First, it is a general one, where different cryptographic primitives can be used for different applications. Second, it works in a one-to-multiple mode, where a party can authenticate several parties mutually. Last, it can provide several security features, such as protection against passive adversaries and impersonate attacks, implicit key authentication, forward and backward securi…

group authenticationAuthenticationPost-quantum cryptographyelliptic curve discrete logarithm problemCryptographic primitivediscrete logarithm problembusiness.industryVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genreKey authenticationDiffie–Hellman key exchangePublic-key cryptographyDiffie-Hellman key exchangebusinesscomputerKey exchangeElGamal encryptionMathematics
researchProduct

Learning Automata Based Q-learning for Content Placement in Cooperative Caching

2019

An optimization problem of content placement in cooperative caching is formulated, with the aim of maximizing sum mean opinion score (MOS) of mobile users. Firstly, a supervised feed-forward back-propagation connectionist model based neural network (SFBC-NN) is invoked for user mobility and content popularity prediction. More particularly, practical data collected from GPS-tracker app on smartphones is tackled to test the accuracy of mobility prediction. Then, a learning automata-based Q-learning (LAQL) algorithm for cooperative caching is proposed, in which learning automata (LA) is invoked for Q-learning to obtain an optimal action selection in a random and stationary environment. It is p…

Signal Processing (eess.SP)Optimization problemLearning automatabusiness.industryComputer scienceMean opinion scoreQ-learningComputingMilieux_LEGALASPECTSOFCOMPUTING020206 networking & telecommunications02 engineering and technologycomputer.software_genreAction selectionIntelligent agentRecurrent neural networkFOS: Electrical engineering electronic engineering information engineering0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingQuality of experienceArtificial intelligenceElectrical and Electronic EngineeringElectrical Engineering and Systems Science - Signal ProcessingbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550computer
researchProduct

The Hierarchical Discrete Pursuit Learning Automaton: A Novel Scheme With Fast Convergence and Epsilon-Optimality

2022

Author's accepted manuscript © 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting /republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Since the early 1960s, the paradigm of learning automata (LA) has experienced abundant interest. Arguably, it has also served as the foundation for the phenomenon and field of reinforcement learning (RL). Over the decades, new concepts and fundamental principles have been introduced t…

Artificial IntelligenceComputer Networks and CommunicationsVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550SoftwareComputer Science ApplicationsIEEE Transactions on Neural Networks and Learning Systems
researchProduct

Massively Parallel and Asynchronous Tsetlin Machine Architecture Supporting Almost Constant-Time Scaling

2020

Using logical clauses to represent patterns, Tsetlin Machines (TMs) have recently obtained competitive performance in terms of accuracy, memory footprint, energy, and learning speed on several benchmarks. Each TM clause votes for or against a particular class, with classification resolved using a majority vote. While the evaluation of clauses is fast, being based on binary operators, the voting makes it necessary to synchronize the clause evaluation, impeding parallelization. In this paper, we propose a novel scheme for desynchronizing the evaluation of clauses, eliminating the voting bottleneck. In brief, every clause runs in its own thread for massive native parallelism. For each training…

FOS: Computer and information sciencesComputer Science - Machine LearningTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESArtificial Intelligence (cs.AI)Computer Science - Artificial IntelligenceMachine Learning (cs.LG)
researchProduct

Analysis of interference avoidance with load balancing in heterogeneous cellular networks

2016

In heterogeneous cellular networks (HCNets) smallcells are overlaid with macro-cells to handle heavy cellular data traffic in an efficient way. To achieve fast and reliable access to data with a better coverage it is necessary to offload users to the underutilized small-cells from the congested macro-cells. Sharing of the same licensed frequency spectrum by smallcells and macro-cells results in heavy cross-tier interference which significantly affects the downlink SINR. In this paper, we investigate and analyze a joint frequency-division duplex based cross-tier complementary spectrum sharing technique which is also regarded as reverse frequency allocation (RFA) scheme with load balancing. T…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesDuplex (telecommunications)050801 communication & media studies020206 networking & telecommunications02 engineering and technologySpectral efficiencyLoad balancing (computing)Frequency allocation0508 media and communicationsTelecommunications link0202 electrical engineering electronic engineering information engineeringCellular networkbusinessComputer network2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
researchProduct

Explainable Tsetlin Machine framework for fake news detection with credibility score assessment

2021

The proliferation of fake news, i.e., news intentionally spread for misinformation, poses a threat to individuals and society. Despite various fact-checking websites such as PolitiFact, robust detection techniques are required to deal with the increase in fake news. Several deep learning models show promising results for fake news classification, however, their black-box nature makes it difficult to explain their classification decisions and quality-assure the models. We here address this problem by proposing a novel interpretable fake news detection framework based on the recently introduced Tsetlin Machine (TM). In brief, we utilize the conjunctive clauses of the TM to capture lexical and…

FOS: Computer and information sciencesI.2Computer Science - Machine LearningArtificial Intelligence (cs.AI)Computer Science - Computation and LanguageI.5Computer Science - Artificial IntelligenceI.2; I.5; I.7Computation and Language (cs.CL)I.7Machine Learning (cs.LG)
researchProduct

Domestic demand predictions considering influence of external environmental parameters

2015

A precise prediction of domestic demand is very important for establishing home energy management system and preventing the damage caused by overloading. In this work, active and reactive power consumption prediction model based on historical power usage data and external environment parameter data (temperature and solar radiation) is presented for a typical Southern Norwegian house. In the presented model, a neural network is adopted as a main prediction technique and historical domestic load data of around 2 years are utilized for training and testing purpose. Temperature and global irradiation (which illustrates the solar radiation level quantitatively) are employed as external parameter…

Consumption (economics)Energy management systemEngineeringWork (thermodynamics)Artificial neural networkbusiness.industryDistribution management systemAC powerbusinessSimulationReliability engineeringPower (physics)Data modeling2015 IEEE 13th International Conference on Industrial Informatics (INDIN)
researchProduct

Modeling and Performance Analysis of Channel Assembling in Multichannel Cognitive Radio Networks With Spectrum Adaptation

2012

[EN] To accommodate spectrum access in multichannel cognitive radio networks (CRNs), the channel-assembling technique, which combines several channels together as one channel, has been proposed in many medium access control (MAC) protocols. However, analytical models for CRNs enabled with this technique have not been thoroughly investigated. In this paper, two representative channel-assembling strategies that consider spectrum adaptation and heterogeneous traffic are proposed, and the performance of these strategies is evaluated based on the proposed continuous-time Markov chain (CTMC) models. Moreover, approximations of these models in the quasistationary regime are analyzed, and closed-fo…

Computer Networks and CommunicationsComputer scienceAerospace EngineeringMarkov process02 engineering and technologyContinuous-time Markov chain (CTMC) modelsChannel assemblingsymbols.namesake0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringCognitive radio networks (CRNs)Electrical and Electronic EngineeringAdaptation (computer science)SimulationMarkov chainPerformance analysisSpectrum (functional analysis)020206 networking & telecommunications020302 automobile design & engineeringINGENIERIA TELEMATICACognitive radioAutomotive EngineeringsymbolsSpectrum adaptationAlgorithmCommunication channelIEEE Transactions on Vehicular Technology
researchProduct

Image Colorization Method Using Texture Descriptors and ISLIC Segmentation

2017

We present a new colorization method to assign color to a grayscale image based on a reference color image using texture descriptors and Improved Simple Linear Iterative Clustering (ISLIC). Firstly, the pixels of images are classified using Support Vector Machine (SVM) according to texture descriptors, mean luminance, entropy, homogeneity, correlation, and local binary pattern (LBP) features. Then, the grayscale image and the color image are segmented into superpixels, which are obtained by ISLIC to produce more uniform and regularly shaped superpixels than those obtained by SLIC, and the classified images are further post-processed combined with superpixles for removing erroneous classific…

Pixelbusiness.industryColor imageLocal binary patternsComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-space segmentationPattern recognitionImage segmentationGrayscaleImage textureComputer Science::Computer Vision and Pattern RecognitionArtificial intelligencebusinessCluster analysisComputingMethodologies_COMPUTERGRAPHICS
researchProduct

Performance analysis of user-centric SBS deployment with load balancing in heterogeneous cellular networks: A Thomas cluster process approach

2020

Abstract In conventional heterogeneous cellular networks (HCNets), the locations of user equipments (UEs) and base stations (BSs) are modeled randomly using two different homogeneous Poisson point processes (PPPs). However, this might not be a suitable assumption in case of UE distribution because UE density is not uniform everywhere in HCNets. Keeping in view the existence of nonuniform UEs, the small base stations (SBSs) are assumed to be deployed in the areas with high UE density, which results in correlation between UEs and BS locations. In this paper, we analyse the performance of HCNets with nonuniform UE deployment containing a union of clustered and uniform UE sets. The clustered UE…

Computer Networks and CommunicationsComputer scienceDistributed computing020206 networking & telecommunications02 engineering and technologyLoad balancing (computing)Poisson distributionsymbols.namesakeBase station0202 electrical engineering electronic engineering information engineeringsymbolsCellular network020201 artificial intelligence & image processingNetwork performanceStochastic geometryComputer Networks
researchProduct

Computational Offloading in Mobile Edge with Comprehensive and Energy Efficient Cost Function: A Deep Learning Approach

2021

In mobile edge computing (MEC), partial computational offloading can be intelligently investigated to reduce the energy consumption and service delay of user equipment (UE) by dividing a single task into different components. Some of the components execute locally on the UE while the remaining are offloaded to a mobile edge server (MES). In this paper, we investigate the partial offloading technique in MEC using a supervised deep learning approach. The proposed technique, comprehensive and energy efficient deep learning-based offloading technique (CEDOT), intelligently selects the partial offloading policy and also the size of each component of a task to reduce the service delay and energy …

Computer scienceReal-time computingTP1-118502 engineering and technologyBiochemistryVDP::Teknologi: 500::Elektrotekniske fag: 540ArticleAnalytical Chemistry0202 electrical engineering electronic engineering information engineeringcomputational offloadingElectrical and Electronic EngineeringInstrumentationenergy efficiencyMobile edge computingArtificial neural networkbusiness.industryChemical technologyDeep learningdeep learning020206 networking & telecommunicationsEnergy consumptionAtomic and Molecular Physics and OpticsTask (computing)cost functionUser equipment020201 artificial intelligence & image processingmobile edge computingArtificial intelligenceEnhanced Data Rates for GSM Evolutionremote executionbusinessEfficient energy useSensors
researchProduct

External parameters contribution in domestic load forecasting using neural network

2015

Domestic demand prediction is very important for home energy management system and also for peak reduction in the power system network. In this work, for precise prediction of power demand, external parameters, such as temperature and solar radiation, are considered and included in the prediction model for improving prediction performance. Power prediction models for coming hours' power demand estimation are built using neural network based on hourly power consumptions data with / without ambient temperature data and global solar irradiation (GSI) data respectively. In this work, a typical Southern Norwegian household demand has been considered. As a result, both ambient temperature and GSI…

Energy management systemReduction (complexity)Electric power systemEngineeringWork (thermodynamics)Artificial neural networkbusiness.industryLoad forecastingbusinessPredictive modellingSimulationAutomotive engineeringPower (physics)International Conference on Renewable Power Generation (RPG 2015)
researchProduct

A Single radio based channel datarate-aware parallel rendezvous MAC protocol for cognitive radio networks

2009

Channel hopping based parallel rendezvous multichannel MAC protocols have several advantages since they do not need a control channel, require only one transceiver, and produce higher system capacity. However, channel hopping sequences in existing parallel rendezvous MAC protocols have been designed as irrelevant to channel datarates, leading to under-utilization of channel resources in multi-rate multi-channel networks. Considering that datarates among channels may be different, we propose a dynamic parallel rendezvous multichannel MAC protocol for synchronized cognitive radio networks in which the secondary users adjust their own distinct hopping sequences according to the datarates of th…

Markov chainComputer sciencebusiness.industryDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSRendezvousMarkov processData_CODINGANDINFORMATIONTHEORYsymbols.namesakeCognitive radioControl channelsymbolsTransceiverbusinessProtocol (object-oriented programming)Computer networkCommunication channel2009 IEEE 34th Conference on Local Computer Networks
researchProduct

A formal proof of the e-optimality of discretized pursuit algorithms

2015

Learning Automata (LA) can be reckoned to be the founding algorithms on which the field of Reinforcement Learning has been built. Among the families of LA, Estimator Algorithms (EAs) are certainly the fastest, and of these, the family of discretized algorithms are proven to converge even faster than their continuous counterparts. However, it has recently been reported that the previous proofs for ??-optimality for all the reported algorithms for the past three decades have been flawed. We applaud the researchers who discovered this flaw, and who further proceeded to rectify the proof for the Continuous Pursuit Algorithm (CPA). The latter proof examines the monotonicity property of the proba…

Learning automataDiscretizationInequalityBasis (linear algebra)Computer sciencemedia_common.quotation_subjectField (mathematics)Monotonic function02 engineering and technologyMathematical proofFormal proof020202 computer hardware & architectureAlgebraArtificial Intelligence0202 electrical engineering electronic engineering information engineeringReinforcement learning020201 artificial intelligence & image processingAlgorithmmedia_common
researchProduct

The Hierarchical Continuous Pursuit Learning Automation for Large Numbers of Actions

2018

Part 10: Learning - Intelligence; International audience; Although the field of Learning Automata (LA) has made significant progress in the last four decades, the LA-based methods to tackle problems involving environments with a large number of actions are, in reality, relatively unresolved. The extension of the traditional LA (fixed structure, variable structure, discretized, and pursuit) to problems within this domain cannot be easily established when the number of actions is very large. This is because the dimensionality of the action probability vector is correspondingly large, and consequently, most components of the vector will, after a relatively short time, have values that are smal…

Theoretical computer scienceHierarchical learning automataHierarchy (mathematics)Learning automataComputer sciencePursuit learning automataPursuit LALearning Automata02 engineering and technologyEstimator-based LAProbability vectorField (computer science)020202 computer hardware & architectureLA with large number of actionsVariable (computer science)Operator (computer programming)Learning Automata (LA)Action (philosophy)0202 electrical engineering electronic engineering information engineeringEstimator-based learning automata[INFO]Computer Science [cs]020201 artificial intelligence & image processingHierarchical LACurse of dimensionality
researchProduct

ANN modelling of CO2 refrigerant cooling system COP in a smart warehouse

2020

Author's accepted manuscript Industrial cooling systems consume large quantities of energy with highly variable power demand. To reduce environmental impact and overall energy consumption, and to stabilize the power requirements, it is recommended to recover surplus heat, store energy, and integrate renewable energy production. To control these operations continuously in a complex energy system, an intelligent energy management system can be employed using operational data and machine learning. In this work, we have developed an artificial neural network based technique for modelling operational CO2 refrigerant based industrial cooling systems for embedding in an overall energy management s…

Renewable Energy Sustainability and the EnvironmentComputer sciencebusiness.industry020209 energyStrategy and Management05 social sciences02 engineering and technologyEnergy consumptionIndustrial and Manufacturing EngineeringEnergy storageAutomotive engineeringRenewable energyRefrigerantEnergy management systemMean absolute percentage errorOperating temperature050501 criminology0202 electrical engineering electronic engineering information engineeringWater coolingbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5500505 lawGeneral Environmental Science
researchProduct

Field Measurements and Parameter Calibrations of Propagation Model for Digital Audio Broadcasting in Norway

2018

During 2017, digital audio broadcasting (DAB) replaces frequency modulation (FM) broadcasting and becomes the only technology for national terrestrial audio broadcasting services in Norway. As Norway is the first country that replaces FM completely with DAB, it is of great importance to measure the signal strength of such a technology in massive deployments and to tune a simulation model as a reference for future studies. Therefore, field measurements of received signal strength are carried out in a typical Norwegian area in this work. Based on the data obtained from the measurements, a simulator with a recent empirical propagation model, namely, ITU-R P.1546-5, has been calibrated. The fin…

Measure (data warehouse)Field (physics)business.industryComputer scienceAttenuation020208 electrical & electronic engineering020206 networking & telecommunications02 engineering and technologyBroadcastingBroadcasting (networking)Digital audio broadcastingSignal strength0202 electrical engineering electronic engineering information engineeringElectronic engineeringbusinessFrequency modulation
researchProduct

Safeguarding the Ultra-dense Networks with the aid of Physical Layer Security: A review and a case study

2016

In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation communications in 2020. Thereinto, the technique of ultra-dense networks (UDNs) serves as a key enabler in meeting the roaring mobile traffic demands. With the prevalence of mobile Internet services especially those involve the mobile payment, security has gained an unprecedented amount of attention and become a highlighted feature for the fifth generation. Resource allocation, one of the most significant tools on getting over the obstacle of ubiquitous interference as well as elevating the spectrum/energy efficiency, h…

General Computer Scienceinformation securityComputer scienceMobile computingresource allocationMobile Web02 engineering and technologyComputer securitycomputer.software_genreSecurity information and event managementPublic land mobile network0203 mechanical engineeringSecurity association0202 electrical engineering electronic engineering information engineeringMobile paymentGeneral Materials ScienceResource managementCloud computing securityIMT AdvancedGeneral EngineeringPhysical layer020302 automobile design & engineering020206 networking & telecommunicationsInformation securityComputer security modelultra-dense networksSecurity serviceNetwork Access ControlNetwork security policyResource allocationlcsh:Electrical engineering. Electronics. Nuclear engineeringlcsh:TK1-9971computer5GEfficient energy useIEEE Access
researchProduct

A Student's t‐based density peaks clustering with superpixel segmentation (tDPCSS) method for image color clustering

2020

Superpixel segmentationComputer sciencebusiness.industryGeneral Chemical EngineeringHuman Factors and ErgonomicsPattern recognitionGeneral ChemistryArtificial intelligenceCluster analysisbusinessImage (mathematics)Color Research & Application
researchProduct

Performance analysis of underlay two-way relay cooperation in cognitive radio networks with energy harvesting

2018

Abstract Cognitive radio and energy harvesting are two important approaches to solve the problem of spectrum scarcity and energy constraint in wireless communications. In this work, we study a two-way relay cooperation scheme in underlay cognitive radio networks (CRNs) with energy harvesting in which two secondary users exchange information via an energy harvesting relay node. Since the relay node collects energy from the received signals and utilizes it to forward the information, the secondary transmission power can be markedly reduced. Therefore the interference of the secondary network to the primary network can be substantially reduced. We derive the outage probability of the secondary…

Computer Networks and CommunicationsComputer sciencebusiness.industryNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences050801 communication & media studies020206 networking & telecommunicationsThroughput02 engineering and technologySpectrum managementlaw.invention0508 media and communicationsCognitive radioRelaylawComputer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringWirelessUnderlaybusinessEnergy harvestingComputer Science::Information TheoryComputer networkComputer Networks
researchProduct

Biometric Fish Classification of Temperate Species Using Convolutional Neural Network with Squeeze-and-Excitation

2019

Our understanding and ability to effectively monitor and manage coastal ecosystems are severely limited by observation methods. Automatic recognition of species in natural environment is a promising tool which would revolutionize video and image analysis for a wide range of applications in marine ecology. However, classifying fish from images captured by underwater cameras is in general very challenging due to noise and illumination variations in water. Previous classification methods in the literature relies on filtering the images to separate the fish from the background or sharpening the images by removing background noise. This pre-filtering process may negatively impact the classificat…

0106 biological sciencesBiometricsComputer sciencebusiness.industry010604 marine biology & hydrobiologyPattern recognitionSharpening010603 evolutionary biology01 natural sciencesConvolutional neural networkBackground noiseA priori and a posterioriArtificial intelligenceUnderwaterbusinessTransfer of learningClassifier (UML)
researchProduct

Object Migration Automata for Non-equal Partitioning Problems with Known Partition Sizes

2021

Part 4: Automated Machine Learning; International audience; Solving partitioning problems in random environments is a classic and challenging task, and has numerous applications. The existing Object Migration Automaton (OMA) and its proposed enhancements, which include the Pursuit and Transitivity phenomena, can solve problems with equi-sized partitions. Currently, these solutions also include one where the partition sizes possess a Greatest Common Divisor (GCD). In this paper, we propose an OMA-based solution that can solve problems with both equally and non-equally-sized groups, without restrictions on their sizes. More specifically, our proposed approach, referred to as the Partition Siz…

Object partitioning with non-equal sizesScheme (programming language)Object Migration AutomataLearning automataComputer scienceLearning Automata0102 computer and information sciences01 natural sciencesPartition (database)Field (computer science)AutomatonTask (computing)010201 computation theory & mathematicsGreatest common divisorA priori and a posteriori[INFO]Computer Science [cs]computerAlgorithmComputer Science::Databasescomputer.programming_language
researchProduct

On the Performance of Channel Assembling and Fragmentation in Cognitive Radio Networks

2014

[EN] Flexible channel allocation may be applied to multi-channel cognitive radio networks (CRNs) through either channel assembling (CA) or channel fragmentation (CF). While CA allows one secondary user (SU) occupy multiple channels when primary users (PUs) are absent, CF provides finer granularity for channel occupancy by allocating a portion of one channel to an SU flow. In this paper, we investigate the impact of CF together with CA for SU flows by proposing a channel access strategy which activates both CF and CA and correspondingly evaluating its performance. In addition, we also consider a novel scenario where CA is enabled for PU flows. The performance evaluation is conducted based on…

Channel allocation schemesComputer sciencebusiness.industryApplied MathematicsFragmentation (computing)INGENIERIA TELEMATICATopologyUpper and lower boundsComputer Science ApplicationsContinuous time Markov chain modelingMulti-channel cognitive radio networksChannel assemblingCognitive radioFlow (mathematics)Channel fragmentationPerformance evaluationElectrical and Electronic EngineeringbusinessCommunication channelComputer networkIEEE Transactions on Wireless Communications
researchProduct

A Deep Reinforcement Learning scheme for Battery Energy Management

2020

Deep reinforcement learning is considered promising for many energy cost optimization tasks in smart buildings. How-ever, agent learning, in this context, is sometimes unstable and unpredictable, especially when the environments are complex. In this paper, we examine deep Reinforcement Learning (RL) algorithms developed for game play applied to a battery control task with an energy cost optimization objective. We explore how agent behavior and hyperparameters can be analyzed in a simplified environment with the goal of modifying the algorithms for increased stability. Our modified Deep Deterministic Policy Gradient (DDPG) agent is able to perform consistently close to the optimum over multi…

Reduction (complexity)Task (computing)Mathematical optimizationArtificial neural networkComputer sciencebusiness.industryDeep learningStability (learning theory)Reinforcement learningContext (language use)Artificial intelligencebusinessAverage cost2020 5th International Conference on Smart and Sustainable Technologies (SpliTech)
researchProduct

Capacity driven small cell deployment in heterogeneous cellular networks : Outage probability and rate coverage analysis

2020

Author's accepted manuscript. This is the peer reviewed version of the following article: Ullah, A., Haq Abbas, Z., Muhammad, F., Abbas, G. & Lei, J. (2020). Capacity driven small cell deployment in heterogeneous cellular networks: Outage probability and rate coverage analysis. Transactions on Emerging Telecommunications Technologies, 31(6): e3876, which has been published in final form at https://doi.org/10.1002/ett.3876. This article may be used for non-commercial purposes in accordance with Wiley Terms and Conditions for Use of Self-Archived Versions.

Software deploymentbusiness.industryComputer scienceCellular networkOutage probabilityElectrical and Electronic EngineeringbusinessVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer network
researchProduct

Directive local color transfer based on dynamic look-up table

2019

Abstract Color transfer in image processing usually suffers from misleading color mapping and loss of details. This paper presents a novel directive local color transfer method based on dynamic look-up table (D-DLT) to solve these problems in two steps. First, a directive mapping between the source and the reference image is established based on the salient detection and the color clusters to obtain directive color transfer intention. Then, dynamic look-up tables are created according to the color clusters to preserve the details, which can suppress pseudo contours and avoid detail loss. Subjective and objective assessments are presented to verify the feasibility and the availability of the…

business.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020206 networking & telecommunicationsImage processing02 engineering and technologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550::Annen informasjonsteknologi: 559DirectiveLocal colorSalientTransfer (computing)Signal ProcessingColor mappingLookup table0202 electrical engineering electronic engineering information engineeringTable (database)020201 artificial intelligence & image processingComputer visionComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringbusinessSoftwareSignal Processing: Image Communication
researchProduct

Performance comparison of residual related algorithms for ToA positioning in wireless terrestrial and sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172462 Time of Arrival (ToA) is a popular technique for terrestrial positioning. This paper presents a comparison of ToA based residual related positioning algorithms in wireless terrestrial and sensor networks in both long range outdoor and short range indoor environments. Us…

Time of arrivalComputational complexity theoryComputer scienceIterative methodbusiness.industryVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552WirelessResidualCommunication complexitybusinessWireless sensor networkAlgorithmWeighting
researchProduct

Robust Interpretable Text Classification against Spurious Correlations Using AND-rules with Negation

2022

The state-of-the-art natural language processing models have raised the bar for excellent performance on a variety of tasks in recent years. However, concerns are rising over their primitive sensitivity to distribution biases that reside in the training and testing data. This issue hugely impacts the performance of the models when exposed to out-of-distribution and counterfactual data. The root cause seems to be that many machine learning models are prone to learn the shortcuts, modelling simple correlations rather than more fundamental and general relationships. As a result, such text classifiers tend to perform poorly when a human makes minor modifications to the data, which raises questi…

VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct

Greedy versus Dynamic Channel Aggregation Strategy in CRNs: Markov Models and Performance Evaluation

2011

Part 1: - PE-CRN 2011 Workshop; International audience; In cognitive radio networks, channel aggregation techniques which aggregate several channels together as one channel have been proposed in many MAC protocols. In this paper, we consider elastic data traffic and spectrum adaptation for channel aggregation, and propose two new strategies named as Greedy and Dynamic respectively. The performance of channel aggregation represented by these strategies is evaluated using continuous time Markov chain models. Moreover, simulation results based on various traffic distributions are utilized in order to evaluate the validity and preciseness of the mathematical models.

Mathematical optimizationMathematical modelComputer science020209 energycontinuous time Markov chain modelsAggregate (data warehouse)Cognitive radio networks020206 networking & telecommunications02 engineering and technologyMarkov modelchannel aggregation strategyperformance evaluationContinuous-time Markov chain[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Cognitive radio0202 electrical engineering electronic engineering information engineeringDynamic channel[INFO]Computer Science [cs]SimulationComputer Science::Information TheoryCommunication channel
researchProduct

Analysis on channel bonding/aggregation for multi-channel cognitive radio networks

2010

Channel bonding/aggregation techniques, which assemble several channels together as one channel, could be used in cognitive radio networks for the purpose of achieving better bandwidth utilization. In existing work on this topic, channel bonding/aggregation is focused on the cases when primary channels are time slotted or stationary as compared with secondary users' activities. In this paper, we analyze the performance of channel bonding/aggregation strategies when primary channels are not time slotted and the time scale of primary activities is at the same level as the secondary users', given that spectrum handover is not allowed. Continuous time Markov chain models are built in order to a…

business.industryComputer scienceMarkov processChannel bondingBlocking (statistics)Continuous-time Markov chainChannel capacitysymbols.namesakeCognitive radioHandoversymbolsbusinessComputer networkCommunication channel2010 European Wireless Conference (EW)
researchProduct

A Learning-Automata Based Solution for Non-equal Partitioning: Partitions with Common GCD Sizes

2021

The Object Migration Automata (OMA) has been used as a powerful tool to resolve real-life partitioning problems in random Environments. The virgin OMA has also been enhanced by incorporating the latest strategies in Learning Automata (LA), namely the Pursuit and Transitivity phenomena. However, the single major handicap that it possesses is the fact that the number of objects in each partition must be equal. Obviously, one does not always encounter problems with equally-sized groups (When the true underlying problem has non-equally-sized groups, the OMA reports the best equally-sized solution as the recommended partition.). This paper is the pioneering attempt to relax this constraint. It p…

Constraint (information theory)Transitive relationTheoretical computer scienceLearning automataComputer scienceGreatest common divisorState spaceSpace (commercial competition)Partition (database)Automaton
researchProduct

Robust Transmission for Reconfigurable Intelligent Surface Aided Millimeter Wave Vehicular Communications With Statistical CSI

2022

The integration of reconfigurable intelligent surface (RIS) into millimeter wave (mmWave) vehicular communications offers the possibility to unleash the potential of future proliferating vehicular applications. However, the high-mobility-induced rapidly varying channel state information (CSI) has been making it challenging to obtain the accurate instantaneous CSI (I-CSI) and to cope with the incurable high signaling overhead. The situation may become worse when the RIS with a large number of passive reflecting elements is deployed. To overcome this challenge, we investigate in this paper a robust transmission scheme for the time-varying RIS-aided mmWave vehicular communications, in which, s…

Base stationTransmission (telecommunications)Computer scienceChannel state informationRobustness (computer science)Applied MathematicsTelecommunications linkReal-time computingOverhead (computing)Resource allocationElectrical and Electronic EngineeringComputer Science ApplicationsCommunication channelIEEE Transactions on Wireless Communications
researchProduct

Channel selection in Cognitive Radio Networks: A Switchable Bayesian Learning Automata approach

2013

We consider the problem of a user operating within a Cognitive Radio Network (CRN) which involves N channels each associated with a Primary User (PU). The problem consists of allocating a channel which, at any given time instant is not being used by a PU, to a Secondary User (SU). Within our study, we assume that a SU is allowed to perform “channel switching”, i.e., to choose an alternate channel S times (where S +1 ≤ N) if the previous choice does not lead to a channel which is vacant. The paper first presents a formal probabilistic model for the problem itself, referred to as the Formal Secondary Channel Selection (FSCS) problem, and the characteristics of the FSCS are then analyzed. Ther…

Cognitive radioTheoretical computer sciencebusiness.industryComputer scienceBayesian probabilitySampling (statistics)Statistical modelArtificial intelligenceBayesian inferencebusinessProbability vectorCommunication channelAutomaton2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)
researchProduct

UDP flows in Cognitive Radios with Channel Aggregation and Fragmentation: A Test-bed Based Evaluation

2018

Channel aggregation (CA) and channel fragmentation (CF) have been studied extensively in cognitive radios (CRs) for many years. However, a test-bed evaluation for such techniques at flow level is still open. In this study, employing National Instruments devices, a test-bed is set up to evaluate the performance of UDP flows for CRs with CA and CF, considering the aspects of blocking, preemption, and throughput in probability. The measurements clearly show that there are performance improvements in applying CA and CF in CRs for UDP flows.

Computer sciencebusiness.industryFragmentation (computing)020302 automobile design & engineering020206 networking & telecommunicationsThroughput02 engineering and technologySoftware-defined radioBlocking (statistics)Cognitive radio0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringbusinessCommunication channelComputer network2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)
researchProduct

Test-Bed Evaluation of CA and CF via a Software Defined Radio

2019

In Chaps. 3 and 4, we presented the analytical models and simulation approaches to study the impact of CA and CF on traffic flows in the single-flow single-user and the single-flow multi-user systems. In this chapter, we investigate the impact of CA and CF in a test-bed. We employ a software defined radio (SDR) from National Instruments (NI) to evaluate the performance of a CR system with user datagram protocol (UDP) flows. The adopted SDR is based on LTE protocol stack with additional functionalities that can support CA and CF, and accommodating PUs. By conducting measurements based on the test-bed system, we will be able to confirm that performance improvement can indeed be obtained by ap…

Protocol stackbusiness.industryComputer scienceEmbedded systemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSUser Datagram ProtocolSoftware-defined radioPerformance improvementbusiness
researchProduct

Channel Assembling with Priority-Based Queues in Cognitive Radio Networks: Strategies and Performance Evaluation

2014

[EN] With the implementation of channel assembling (CA) techniques, higher data rate can be achieved for secondary users in multi-channel cognitive radio networks. Recent studies which are based on loss systems show that maximal capacity can be achieved using dynamic CA strategies. However the channel allocation schemes suffer from high blocking and forced termination when primary users become active. In this paper, we propose to introduce queues for secondary users so that those flows that would otherwise be blocked or forcibly terminated could be buffered and possibly served later. More specifically, in a multi-channel network with heterogeneous traffic, two queues are separately allocate…

CTMCQueueing theoryChannel allocation schemesbusiness.industryComputer scienceApplied MathematicsCognitive radio networksMarkov processINGENIERIA TELEMATICABlocking (statistics)Computer Science ApplicationsScheduling (computing)Continuous-time Markov chainChannel assemblingsymbols.namesakeCognitive radioHeterogeneous trafficsymbolsQueuing schemesElectrical and Electronic EngineeringbusinessQueueCommunication channelComputer networkIEEE Transactions on Wireless Communications
researchProduct

Capacity Upper Bound of Channel Assembling in Cognitive Radio Networks with Quasistationary Primary User Activities

2013

In cognitive radio networks (CRNs) with multiple channels, various channel-assembling (ChA) strategies may be applied to secondary users (SUs), resulting in different achieved capacity. However, there is no previous work on determining the capacity upper bound (UB) of ChA for SUs under given system configurations. In this paper, we derive the maximum capacity for CRNs with ChA through Markov chain modeling, considering that primary user (PU) activities are relatively static, compared with SU services. We first deduce a closed-form expression for the maximum capacity in a dynamic ChA strategy and then demonstrate that no other ChA strategy can provide higher capacity than that achieved by th…

EngineeringMathematical optimizationMarkov chainComputer Networks and Communicationsbusiness.industryAerospace EngineeringINGENIERIA TELEMATICAUpper and lower boundsExpression (mathematics)Continuous-time Markov chain (CTMC) modelsCognitive radioChannel assembling (ChA)Automotive EngineeringQuasistationary regime (QSR)Cognitive radio networks (CRNs)Electrical and Electronic EngineeringbusinessSimulationCommunication channel
researchProduct

Interpretable Tsetlin Machine-based Premature Ventricular Contraction Identification

2023

Neural network-based models have found wide use in automatic long-term electrocardiogram (ECG) analysis. However, such black box models are inadequate for analysing physiological signals where credibility and interpretability are crucial. Indeed, how to make ECG analysis transparent is still an open problem. In this study, we develop a Tsetlin machine (TM) based architecture for premature ventricular contraction (PVC) identification by analysing long-term ECG signals. The architecture is transparent by describing patterns directly with logical AND rules. To validate the accuracy of our approach, we compare the TM performance with those of convolutional neural networks (CNNs). Our numerical …

Signal Processing (eess.SP)FOS: Computer and information sciencesComputer Science - Machine LearningFOS: Electrical engineering electronic engineering information engineeringElectrical Engineering and Systems Science - Signal ProcessingMachine Learning (cs.LG)
researchProduct

Network Slicing Enabled Resource Management for Service-Oriented Ultra-Reliable and Low-Latency Vehicular Networks

2020

Network slicing has been considered as a promising candidate to provide customized services for vehicular applications that have extremely high requirements of latency and reliability. However, the high mobility of vehicles poses significant challenges to resource management in such a stochastic vehicular environment with time-varying service demands. In this paper, we develop an online network slicing scheduling strategy for joint resource block (RB) allocation and power control in vehicular networks. The long-term time-averaged total system capacity is maximized while guaranteeing strict ultra-reliable and low-latency requirements of vehicle communication links, subject to stability const…

Vehicular ad hoc networkComputer Networks and CommunicationsComputer scienceDistributed computingAerospace EngineeringComputingMilieux_LEGALASPECTSOFCOMPUTING020302 automobile design & engineeringLyapunov optimization02 engineering and technologySlicingScheduling (computing)0203 mechanical engineeringAutomotive EngineeringResource managementStochastic optimizationElectrical and Electronic EngineeringOnline algorithmVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Power controlIEEE Transactions on Vehicular Technology
researchProduct

On Using the Theory of Regular Functions to Prove the ε-Optimality of the Continuous Pursuit Learning Automaton

2013

Published version of a chapter in the book: Recent Trends in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-38577-3_27 There are various families of Learning Automata (LA) such as Fixed Structure, Variable Structure, Discretized etc. Informally, if the environment is stationary, their ε-optimality is defined as their ability to converge to the optimal action with an arbitrarily large probability, if the learning parameter is sufficiently small/large. Of these LA families, Estimator Algorithms (EAs) are certainly the fastest, and within this family, the set of Pursuit algorithms have been considered to be the pioneering schemes. The…

Property (philosophy)Learning automataComputer scienceVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422Structure (category theory)Monotonic functionMathematical proofAutomatonArbitrarily largeε-optimalityContinuous Pursuit AlgorithmCalculuspursuit algorithmsAlgorithmVariable (mathematics)
researchProduct

The Hierarchical Continuous Pursuit Learning Automation: A Novel Scheme for Environments With Large Numbers of Actions.

2019

Although the field of learning automata (LA) has made significant progress in the past four decades, the LA-based methods to tackle problems involving environments with a large number of actions is, in reality, relatively unresolved. The extension of the traditional LA to problems within this domain cannot be easily established when the number of actions is very large. This is because the dimensionality of the action probability vector is correspondingly large, and so, most components of the vector will soon have values that are smaller than the machine accuracy permits, implying that they will never be chosen . This paper presents a solution that extends the continuous pursuit paradigm to …

Theoretical computer scienceHierarchical learning automataHierarchy (mathematics)DiscretizationLearning automataComputer Networks and CommunicationsComputer scienceLarge action numbersPursuit learning automata02 engineering and technologyVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420Probability vectorLearning automataComputer Science ApplicationsAutomatonOperator (computer programming)Artificial Intelligence0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Estimator-based learning automata020201 artificial intelligence & image processingVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550SoftwareCurse of dimensionalityIEEE transactions on neural networks and learning systems
researchProduct

Markov Chain and Stationary Distribution

2019

MC has been a valuable tool for analyzing the performance of complex stochastic systems since it was introduced by the Russian mathematician A. A. Markov (1856–1922) in the early 1900s. More and more system analyses have been carried out by using MC, including the analysis on CA and CF. In this chapter, we will briefly review the essential ingredients of MC that are necessary for the performance analysis presented in this book. A more comprehensive introduction of MC and its applications can be found in Nelson (2013, Probability, stochastic processes, and queueing theory: the mathematics of computer performance modeling).

Queueing theoryStationary distributionComputer performanceMarkov chainComputer scienceStochastic processApplied mathematics
researchProduct

A Learning Automaton-based Scheme for Scheduling Domestic Shiftable Loads in Smart Grids

2017

In this paper, we consider the problem of scheduling shiftable loads, over multiple users, in smart electrical grids. We approach the problem, which is becoming increasingly pertinent in our present energy-thirsty society, using a novel distributed game-theoretic framework. In our specific instantiation, we consider the scenario when the power system has a local-area Smart Grid subnet comprising of a single power source and multiple customers. The objective of the exercise is to tacitly control the total power consumption of the customers’ shiftable loads, so to approach the rigid power budget determined by the power source, but to simultaneously not exceed this threshold. As opposed to the…

General Computer ScienceComputer scienceDistributed computing02 engineering and technologyPotential gamePower budgetLearning automataScheduling (computing)Electric power systemStrategyControl theoryMachine learning0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceschedulingJob shop schedulingLearning automataScheduling020208 electrical & electronic engineeringGeneral Engineeringlearning automata020206 networking & telecommunicationsSmart gridsSubnetSmart gridmachine learningpotential gamelcsh:Electrical engineering. Electronics. Nuclear engineeringPotential gamelcsh:TK1-9971
researchProduct

On the Convergence of Tsetlin Machines for the IDENTITY- and NOT Operators

2020

The Tsetlin Machine (TM) is a recent machine learning algorithm with several distinct properties, such as interpretability, simplicity, and hardware-friendliness. Although numerous empirical evaluations report on its performance, the mathematical analysis of its convergence is still open. In this article, we analyze the convergence of the TM with only one clause involved for classification. More specifically, we examine two basic logical operators, namely, the "IDENTITY"- and "NOT" operators. Our analysis reveals that the TM, with just one clause, can converge correctly to the intended logical operator, learning from training data over an infinite time horizon. Besides, it can capture arbit…

FOS: Computer and information sciencesComputer Science - Machine LearningTraining setLearning automataComputer Science - Artificial IntelligenceComputer sciencebusiness.industryApplied MathematicsTime horizonPropositional calculusLogical connectiveMachine Learning (cs.LG)Artificial Intelligence (cs.AI)Operator (computer programming)Computational Theory and MathematicsArtificial IntelligencePattern recognition (psychology)Convergence (routing)Identity (object-oriented programming)Computer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareInterpretabilityIEEE Transactions on Pattern Analysis and Machine Intelligence
researchProduct