Search results for "550"

showing 10 items of 1192 documents

Discretized Bayesian Pursuit – A New Scheme for Reinforcement Learning

2012

Published version of a chapter in the book: Advanced Research in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-31087-4_79 The success of Learning Automata (LA)-based estimator algorithms over the classical, Linear Reward-Inaction ( L RI )-like schemes, can be explained by their ability to pursue the actions with the highest reward probability estimates. Without access to reward probability estimates, it makes sense for schemes like the L RI to first make large exploring steps, and then to gradually turn exploration into exploitation by making progressively smaller learning steps. However, this behavior becomes counter-intuitive wh…

Scheme (programming language)Mathematical optimizationDiscretizationLearning automataComputer sciencebusiness.industryVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422estimator algorithmsBayesian probabilityBayesian reasoninglearning automataEstimatorVDP::Technology: 500::Information and communication technology: 550discretized learningBayesian inferenceAction (physics)Reinforcement learningArtificial intelligencepursuit schemesbusinesscomputercomputer.programming_language
researchProduct

Solving Non-Stationary Bandit Problems by Random Sampling from Sibling Kalman Filters

2010

Published version of an article from Lecture Notes in Computer Science. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_21 The multi-armed bandit problem is a classical optimization problem where an agent sequentially pulls one of multiple arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Dynamically changing (non-stationary) bandit problems are particularly challenging because each change of the reward distributions may progressively degrade the performance of any fixed strategy. Alt…

Scheme (programming language)Mathematical optimizationOptimization problemComputer scienceBayesian probabilityVDP::Technology: 500::Information and communication technology: 550Kalman filterBayesian inferenceMulti-armed banditVDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425computerThompson samplingOptimal decisioncomputer.programming_language
researchProduct

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

2020

Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …

Scheme (programming language)Service (systems architecture)Computer Networks and CommunicationsComputer sciencebusiness.industryReliability (computer networking)Frame (networking)020206 networking & telecommunications02 engineering and technologyTransmission (telecommunications)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingLatency (engineering)businesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accesscomputer.programming_languageComputer network
researchProduct

Secure and efficient data storage in unattended wireless sensor networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…

Scheme (programming language)business.industryComputer scienceMobile computingHomomorphic encryptionCryptographyComputer data storageSecrecyVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Mobile telephonybusinesscomputerWireless sensor networkcomputer.programming_languageComputer network
researchProduct

On Infiltration and Infiltration Characteristic Times

2022

In his seminal paper on the solution of the infiltration equation, Philip (1969), https://doi.org/10.1016/b978-1-4831-9936-8.50010-6 proposed a gravity time, tgrav, to estimate practical convergence time and the time domain validity of his infinite time series expansion, TSE, for describing the transient state. The parameter tgrav refers to a point in time where infiltration is dominated equally by capillarity and gravity as derived from the first two (dominant) terms of the TSE. Evidence suggests that applicability of the truncated two-term equation of Philip has a time limit requiring higher-order TSE terms to better describe the infiltration process for times exceeding that limit. Since …

Science & TechnologyEROSIONsorptivityHYDRAULIC CONDUCTIVITYINFILTROMETERInfiltrationEnvironmental Sciences & EcologyPARAMETERSSOILMODELPhysical SciencesLimnology[SDE]Environmental Sciencesddc:550Water ResourcesEQUATIONSettore AGR/08 - Idraulica Agraria E Sistemazioni Idraulico-ForestaliWATERsteady statetime domain validityMarine & Freshwater BiologyLife Sciences & Biomedicinehydraulic conductivityEnvironmental SciencesWater Science and Technology
researchProduct

Didactics of ICT in Secondary Education: Conceptual Issues and Practical Perspectives

2009

Article published in the journal: Issues in Informing Science and Information Technology. Also available from the publisher: http://iisit.org/Vol6/IISITv6p153-178Hadjerrouit605.pdf While there is a huge research literature on the field of ICT (Information and Communication Technology) as a tool in teaching and learning, there is much less research on the area of ICT as a subject or similar designations such as school informatics. As a result, there is a lack of theoretical grounding of the didactics of ICT and associated teaching and learning processes. One of the main reasons for the lack of theoretical underpinnings of the didactics of ICT is that there have been in the past and there per…

Secondary educationlcsh:T58.5-58.64business.industryComputer sciencelcsh:Information technologyInformation technologyVDP::Technology: 500::Information and communication technology: 550Information and Communications TechnologyPedagogyComputingMilieux_COMPUTERSANDEDUCATIONbusinessGeneralLiterature_REFERENCE(e.g.dictionariesencyclopediasglossaries)Informing scienceVDP::Social science: 200::Education: 280::Subject didactics: 283Issues in Informing Science and Information Technology
researchProduct

Positionless aspect based sentiment analysis using attention mechanism.

2021

Abstract Aspect-based sentiment analysis (ABSA) aims at identifying fine-grained polarity of opinion associated with a given aspect word. Several existing articles demonstrated promising ABSA accuracy using positional embedding to show the relationship between an aspect word and its context. In most cases, the positional embedding depends on the distance between the aspect word and the remaining words in the context, known as the position index sequence. However, these techniques usually employ both complex preprocessing approaches with additional trainable positional embedding and complex architectures to obtain the state-of-the-art performance. In this paper, we simplify preprocessing by …

SequenceInformation Systems and ManagementComputer sciencebusiness.industrySentiment analysisContext (language use)02 engineering and technologycomputer.software_genreLexiconManagement Information SystemsIndex (publishing)Artificial Intelligence020204 information systems0202 electrical engineering electronic engineering information engineeringPreprocessorEmbedding020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550SoftwareWord (computer architecture)Natural language processing
researchProduct

PMG-Pro: A Model-Driven Development Method of Service-Based Applications

2011

Published version of a chapter published in the book: SDL 2011: Integrating System and Software Modeling. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-25264-8_12 In the Internet of Things, billions of networked and software-driven devices will be connected to the Internet. They can communicate and cooperate with each other to form a composite system. In this paper, we propose PMG-pro (present, model, generate and provide), a language independent, bottom-up and model-driven method for the development of such composite system. We envision that all devices in the Internet of Things provide their functionalities as services. From a service description, a service pre…

Service (business)InternetSource codebusiness.industryComputer scienceService delivery frameworkService designmedia_common.quotation_subjectVDP::Technology: 500::Information and communication technology: 550Activity diagramWorld Wide WebCustomer Service AssuranceThe InternetCode generationbusinessSoftware engineeringmedia_common
researchProduct

Online or offline – Does it matter?: A study of in-service teachers' perceptions of learning outcomes in Norway

2020

Policymakers and scholars are scaling up online professional development programmes for teachers. We studied how in-service teachers in Norway perceived their learning outcomes for professional development programmes conducted either as campus-based or online courses. Based on survey data, we found teachers studying online and in campus-based settings have relatively similar perceptions of the learning outcomes. This changes when indicators of collaboration and support from teachers are controlled for, suggesting that these factors are more strongly related to learning outcomes for those in campus-based studies than those in online studies. Our findings contribute new insights on how percei…

Service (business)Medical educationPerceived learning outcomeOnline learningmedia_common.quotation_subjectIn-service teachersProfessional development programmesComputer Science ApplicationsEducationPeer reviewOnline learningPerceptionComputingMilieux_COMPUTERSANDEDUCATIONStudy formatPsychologyVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550media_common
researchProduct

Media Delivery to Remote Renderers Controlled by the Mobile Phone

2009

In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.

Service (business)MultimediaComputer sciencebusiness.industryService delivery frameworkMobile computingService providercomputer.software_genreMobile phoneNext-generation networkVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552The InternetSession (computer science)Best-effort deliverybusinesscomputerComputer network
researchProduct