Search results for "550"
showing 10 items of 1192 documents
Securing Assets with RFID
2008
Masteroppgave i informasjons- og kommunikasjonsteknologi 2008 – Universitetet i Agder, Grimstad Loss of property is something every company has had to deal with at some point, without proper securing this is a problem that is very hard to get control of. RFID has been available for decades but it has been a technology which has been dormant without very much development. In the last years the interest has grown and new ideas to use it has surfaced. This thesis is set out to present a comprehensive solution proposal for a RFID asset management system. A case will be presented which will be a scarlet thread throughout the paper. We cover areas like RFID technology and standards, tags, readers…
Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game
2012
Published version of an article in the journal: Applied Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/s10489-012-0346-z The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, Quality of Service (QoS) control, game playing, and resource allocation, can be solved …
Level-crossing rate and average duration of fades of the envelope of mobile-to-mobile fading channels in K-parallel dual-hop relay networks
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE." Article also available from publisher: http://dx.doi.org/10.1109/WCSP.2009.5371574 This paper studies the fading behavior of narrowband mobile-to-mobile (M2M) fading channels in dual-hop distributed cooperative multi-relay systems under non-line-of-sight (NLOS) propagation conditions. M2M fading channels considered here are associated with amplify-and-forward …
On the analysis of a new Markov chain which has applications in AI and machine learning
2011
Accepted version of an article from the conference: 2011 24th Canadian Conference on Electrical and Computer Engineering. Published version available from IEEE: http://dx.doi.org/10.1109/CCECE.2011.6030727 In this paper, we consider the analysis of a fascinating Random Walk (RW) that contains interleaving random steps and random "jumps". The characterizing aspect of such a chain is that every step is paired with its counterpart random jump. RWs of this sort have applications in testing of entities, where the entity is never allowed to make more than a pre-specified number of consecutive failures. This paper contains the analysis of the chain, some fascinating limiting properties, and some i…
Performance analysis of wideband sum-of-cisoids-based channel simulators with respect to the bit error probability of DPSK OFDM Systems
2009
In this paper, we analyze the performance of a wideband sum-of-cisoids (SOC) channel simulator w.r.t. the bit error probability (BEP) of differential phase-shift keying (DPSK) orthogonal frequency division multiplexing (OFDM) systems. Analytical BEP expressions are derived for coherent and non- coherent DPSK OFDM simulation systems in the presence of a wideband SOC channel simulator. We also study the degradations of the BEP introduced by an imperfect channel simulator. Using the deviation of the BEP as an appropriate measure, we evaluate the performance of three parameter computation methods, known as the method of exact Doppler spread (MEDS), the randomized MEDS (R-MEDS), and the Monte Ca…
The Riemann sum method for the design of sum-of-cisoids simulators for Rayleigh fading channels in non-isotropic scattering environments
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/ICUMT.2009.5345371 In this paper, we introduce the Riemann sum method (RSM) as an effective tool for the design of sum-of-cisoids (SOC) simulators for narrowband mobile Rayleigh fading channels under non-isotropic scattering conditions. We show that the RSM results in an excellent approximation of…
Modeling and Performance Analysis of Energy Efficiency Binary Power Control in MIMO-OFDM Wireless Communication Systems
2011
Published version of an article in the journal:International Journal of Distributed Sensor Networks. Also available from Hindawi Publishing: http://dx.doi.org/10.1155/2011/946258 The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated, and then a global optimization solution of power allocation is derived. Furthermore, a new energy efficiency binary power control (EEBPC) algorithm is designed to improve the energy efficiency of MIMO-OFDM wireless communication systems. Simulation results show that the EEBPC algorithm has better energy efficiency and spectrum efficiency than the average power control algorithm in MIMO-O…
An intelligent architecture for service provisioning in pervasive environments
2011
Accepted version of an article from the conference: 2011 International Symposium on Innovations in Intelligent Systems and Applications (INISTA). Definitive published version available from IEEE: http://dx.doi.org/10.1109/INISTA.2011.5946134 The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention of the user is becoming an increasingly-challenging task. In this paper, we present an adaptive multi-criteria decision making mechanism for recommending relevant services to the mobile user. In this context Relevance is determined b…
Networking logistic neurons can yield chaotic and pattern recognition properties
2011
Accepted version of an article the book: 2011 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications (CIMSA) Proceedings. Published version available from IEEE: http://dx.doi.org/10.1109/CIMSA.2011.6059914 Over the last few years, the field of Chaotic Neural Networks (CNNs) has been extensively studied because of their potential applications in the understanding/recognition of patterns and images, their associative memory properties, their relationship to complex dynamic system control, and their capabilities in the modeling and analysis of other measurement systems. However, the results concerning CNNs which can demonstrate chaos, quasi-chaos, …
A two-armed bandit based scheme for accelerated decentralized learning
2011
Published version of a chapter from the book: Modern Approaches in Applied Intelligence. Also available at SpringerLink: http://dx.doi.org/10.1007/978-3-642-21827-9_54 The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions are unknown, and thus, one must balance between exploiting existing knowledge about the arms, and obtaining new information. Bandit problems are particularly fascinating because a large class of real world problems, including routing, QoS control, game playing, and resource allocation, can be solved in a …