Search results for "550"

showing 10 items of 1192 documents

Securing Assets with RFID

2008

Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology which has been dormant without very much development. In the last years the interest has grown and new ideas to use it has surfaced. This thesis is set out to present a comprehensive solution proposal for a RFID asset management system. A case will be presented which will be a scarlet thread throughout the paper. We cover areas like RFID technology and standards, tags, readers…

VDP::Mathematics and natural science: 400::Information and communication science: 420::Security and vulnerability: 424IKT590VDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552
researchProduct

Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game

2012

Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Bayesian learningVDP::Technology: 500::Information and communication technology: 550::Computer technology: 551Optimization problembusiness.industryComputer scienceGoore GameBayesian inferenceMulti-armed banditquality of service controldecentralized decision makingArtificial IntelligenceInfluence diagramResource allocationArtificial intelligencebandit problemswireless sensor networksbusinessWireless sensor networkOptimal decisionApplied Intelligence
researchProduct

Level-crossing rate and average duration of fades of the envelope of mobile-to-mobile fading channels in K-parallel dual-hop relay networks

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/WCSP.2009.5371574 This paper studies the fading behavior of narrowband mobile-to-mobile (M2M) fading channels in dual-hop distributed cooperative multi-relay systems under non-line-of-sight (NLOS) propagation conditions. M2M fading channels considered here are associated with amplify-and-forward …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Independent and identically distributed random variablesComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYTopologylaw.inventionFading distributionNarrowbandRelaylawMobile stationVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Computer Science::Networking and Internet ArchitectureCommunications satelliteFadingTelecommunicationsbusinessComputer Science::Information TheoryRayleigh fadingCommunication channel2009 International Conference on Wireless Communications & Signal Processing
researchProduct

On the analysis of a new Markov chain which has applications in AI and machine learning

2011

Accepted version of an article from the conference: 2011 24th Canadian Conference on Electrical and Computer Engineering. Published version available from IEEE: http://dx.doi.org/10.1109/CCECE.2011.6030727 In this paper, we consider the analysis of a fascinating Random Walk (RW) that contains interleaving random steps and random "jumps". The characterizing aspect of such a chain is that every step is paired with its counterpart random jump. RWs of this sort have applications in testing of entities, where the entity is never allowed to make more than a pre-specified number of consecutive failures. This paper contains the analysis of the chain, some fascinating limiting properties, and some i…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413InterleavingMarkov chainComputer sciencebusiness.industryStochastic processMarkov processVDP::Technology: 500::Information and communication technology: 550Machine learningcomputer.software_genreRandom walksymbols.namesakeChain (algebraic topology)symbolssortArtificial intelligencebusinesscomputer
researchProduct

Performance analysis of wideband sum-of-cisoids-based channel simulators with respect to the bit error probability of DPSK OFDM Systems

2009

In this paper, we analyze the performance of a wideband sum-of-cisoids (SOC) channel simulator w.r.t. the bit error probability (BEP) of differential phase-shift keying (DPSK) orthogonal frequency division multiplexing (OFDM) systems. Analytical BEP expressions are derived for coherent and non- coherent DPSK OFDM simulation systems in the presence of a wideband SOC channel simulator. We also study the degradations of the BEP introduced by an imperfect channel simulator. Using the deviation of the BEP as an appropriate measure, we evaluate the performance of three parameter computation methods, known as the method of exact Doppler spread (MEDS), the randomized MEDS (R-MEDS), and the Monte Ca…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Orthogonal frequency-division multiplexingComputer scienceVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Electronic engineeringKeyingFunction (mathematics)WidebandAlgorithmCommunication channel
researchProduct

The Riemann sum method for the design of sum-of-cisoids simulators for Rayleigh fading channels in non-isotropic scattering environments

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/ICUMT.2009.5345371 In this paper, we introduce the Riemann sum method (RSM) as an effective tool for the design of sum-of-cisoids (SOC) simulators for narrowband mobile Rayleigh fading channels under non-isotropic scattering conditions. We show that the RSM results in an excellent approximation of…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Scatteringbusiness.industryAutocorrelationProbability density functionsymbols.namesakeNarrowbandNorm (mathematics)Riemann sumVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552symbolsApplied mathematicsFadingTelecommunicationsbusinessRayleigh fadingMathematics
researchProduct

Modeling and Performance Analysis of Energy Efficiency Binary Power Control in MIMO-OFDM Wireless Communication Systems

2011

Published version of an article in the journal:International Journal of Distributed Sensor Networks. Also available from Hindawi Publishing: http://dx.doi.org/10.1155/2011/946258 The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated, and then a global optimization solution of power allocation is derived. Furthermore, a new energy efficiency binary power control (EEBPC) algorithm is designed to improve the energy efficiency of MIMO-OFDM wireless communication systems. Simulation results show that the EEBPC algorithm has better energy efficiency and spectrum efficiency than the average power control algorithm in MIMO-O…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Scheme (programming language)Theoretical computer scienceArticle SubjectComputer Networks and CommunicationsComputer scienceBinary numberData_CODINGANDINFORMATIONTHEORY02 engineering and technologylcsh:QA75.5-76.950203 mechanical engineeringVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Computer Science::Networking and Internet Architecture0202 electrical engineering electronic engineering information engineeringElectronic engineeringGlobal optimizationComputer Science::Information Theorycomputer.programming_languageComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral Engineering020206 networking & telecommunications020302 automobile design & engineeringSpectral efficiencyMIMO-OFDMPower (physics)lcsh:Electronic computers. Computer sciencecomputerPower controlEfficient energy useInternational Journal of Distributed Sensor Networks
researchProduct

An intelligent architecture for service provisioning in pervasive environments

2011

Accepted version of an article from the conference: 2011 International Symposium on Innovations in Intelligent Systems and Applications (INISTA). Definitive published version available from IEEE: http://dx.doi.org/10.1109/INISTA.2011.5946134 The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention of the user is becoming an increasingly-challenging task. In this paper, we present an adaptive multi-criteria decision making mechanism for recommending relevant services to the mobile user. In this context Relevance is determined b…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Service (systems architecture)business.industrycomputer.internet_protocolComputer scienceMobile computing020206 networking & telecommunicationsContext (language use)02 engineering and technologyService-oriented architectureRecommender systemWorld Wide WebVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 5520202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Mobile telephonyUser interfacebusinesscomputer
researchProduct

Networking logistic neurons can yield chaotic and pattern recognition properties

2011

Accepted version of an article the book: 2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) Proceedings. Published version available from IEEE: http://dx.doi.org/10.1109/CIMSA.2011.6059914 Over the last few years, the field of Chaotic Neural Networks (CNNs) has been extensively studied because of their potential applications in the understanding/recognition of patterns and images, their associative memory properties, their relationship to complex dynamic system control, and their capabilities in the modeling and analysis of other measurement systems. However, the results concerning CNNs which can demonstrate chaos, quasi-chaos, …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413VDP::Mathematics and natural science: 400::Information and communication science: 420::Knowledge based systems: 425VDP::Technology: 500::Information and communication technology: 550
researchProduct

A two-armed bandit based scheme for accelerated decentralized learning

2011

Published version of a chapter from the book: Modern Approaches in Applied Intelligence. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-21827-9_54 The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, QoS control, game playing, and resource allocation, can be solved in a …

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413VDP::Technology: 500::Information and communication technology: 550::Computer technology: 551
researchProduct