Search results for "550"
showing 10 items of 1192 documents
Discretized Bayesian Pursuit – A New Scheme for Reinforcement Learning
2012
Published version of a chapter in the book: Advanced Research in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-31087-4_79 The success of Learning Automata (LA)-based estimator algorithms over the classical, Linear Reward-Inaction ( L RI )-like schemes, can be explained by their ability to pursue the actions with the highest reward probability estimates. Without access to reward probability estimates, it makes sense for schemes like the L RI to first make large exploring steps, and then to gradually turn exploration into exploitation by making progressively smaller learning steps. However, this behavior becomes counter-intuitive wh…
Solving Non-Stationary Bandit Problems by Random Sampling from Sibling Kalman Filters
2010
Published version of an article from Lecture Notes in Computer Science. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_21 The multi-armed bandit problem is a classical optimization problem where an agent sequentially pulls one of multiple arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Dynamically changing (non-stationary) bandit problems are particularly challenging because each change of the reward distributions may progressively degrade the performance of any fixed strategy. Alt…
Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis
2020
Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …
Secure and efficient data storage in unattended wireless sensor networks
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/NTMS.2009.5384753 Providing forward and backward secrecy is still a big challenge in Unattended Wireless Sensor Networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic…
On Infiltration and Infiltration Characteristic Times
2022
In his seminal paper on the solution of the infiltration equation, Philip (1969), https://doi.org/10.1016/b978-1-4831-9936-8.50010-6 proposed a gravity time, tgrav, to estimate practical convergence time and the time domain validity of his infinite time series expansion, TSE, for describing the transient state. The parameter tgrav refers to a point in time where infiltration is dominated equally by capillarity and gravity as derived from the first two (dominant) terms of the TSE. Evidence suggests that applicability of the truncated two-term equation of Philip has a time limit requiring higher-order TSE terms to better describe the infiltration process for times exceeding that limit. Since …
Didactics of ICT in Secondary Education: Conceptual Issues and Practical Perspectives
2009
Article published in the journal: Issues in Informing Science and Information Technology. Also available from the publisher: http://iisit.org/Vol6/IISITv6p153-178Hadjerrouit605.pdf While there is a huge research literature on the field of ICT (Information and Communication Technology) as a tool in teaching and learning, there is much less research on the area of ICT as a subject or similar designations such as school informatics. As a result, there is a lack of theoretical grounding of the didactics of ICT and associated teaching and learning processes. One of the main reasons for the lack of theoretical underpinnings of the didactics of ICT is that there have been in the past and there per…
Positionless aspect based sentiment analysis using attention mechanism.
2021
Abstract Aspect-based sentiment analysis (ABSA) aims at identifying fine-grained polarity of opinion associated with a given aspect word. Several existing articles demonstrated promising ABSA accuracy using positional embedding to show the relationship between an aspect word and its context. In most cases, the positional embedding depends on the distance between the aspect word and the remaining words in the context, known as the position index sequence. However, these techniques usually employ both complex preprocessing approaches with additional trainable positional embedding and complex architectures to obtain the state-of-the-art performance. In this paper, we simplify preprocessing by …
PMG-Pro: A Model-Driven Development Method of Service-Based Applications
2011
Published version of a chapter published in the book: SDL 2011: Integrating System and Software Modeling. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-25264-8_12 In the Internet of Things, billions of networked and software-driven devices will be connected to the Internet. They can communicate and cooperate with each other to form a composite system. In this paper, we propose PMG-pro (present, model, generate and provide), a language independent, bottom-up and model-driven method for the development of such composite system. We envision that all devices in the Internet of Things provide their functionalities as services. From a service description, a service pre…
Online or offline – Does it matter?: A study of in-service teachers' perceptions of learning outcomes in Norway
2020
Policymakers and scholars are scaling up online professional development programmes for teachers. We studied how in-service teachers in Norway perceived their learning outcomes for professional development programmes conducted either as campus-based or online courses. Based on survey data, we found teachers studying online and in campus-based settings have relatively similar perceptions of the learning outcomes. This changes when indicators of collaboration and support from teachers are controlled for, suggesting that these factors are more strongly related to learning outcomes for those in campus-based studies than those in online studies. Our findings contribute new insights on how percei…
Media Delivery to Remote Renderers Controlled by the Mobile Phone
2009
In today's content delivery solutions, service delivery and control are still tightly coupled, a service typically being delivered to the same device that controls the session. We present a solution that was designed with the goal to decouple service control and delivery. Using our approach, multimedia streaming services can be delivered to off-the-shelf DLNA devices in visited networks. The service provider receives information about the remote media player and access environment via a mobile phone. Proximity technologies (e.g. barcodes, NFC) of the control device are used for the exchange of required credentials. This paper describes a typical scenario and our prototype implementation.