Search results for "NETWORKS"

showing 10 items of 3260 documents

On coincidence of feedback and global Stackelberg equilibria in a class of differential games

2021

This paper shows for a class of differential games that the global Stackelberg equilibrium (GSE) coincides with the feedback Stackelberg equilibrium (FSE), although the GSE assumes that the leader/regulator an- nounces at the initial time the regulatory instrument rule she will follow for the rest of the game, while in the FSE, the regulator at any time chooses the optimal level of the regulatory instrument rate. This coincidence is based on the fact that the FSE is calculated using dynamic programming what implies that although the regulator chooses the regulatory instrument rate level that maximizes social welfare, the first-order condition for the maximization of the right-hand side of t…

Computer Science::Computer Science and Game Theory050210 logistics & transportation021103 operations researchInformation Systems and ManagementGeneral Computer ScienceComputer scienceQuantitative Biology::Molecular Networks05 social sciences0211 other engineering and technologies02 engineering and technologyMaximizationManagement Science and Operations ResearchOutcome (game theory)Industrial and Manufacturing EngineeringCoincidenceModeling and Simulation0502 economics and businessDifferential gameStackelberg competitionEconomic modelDifferential (infinitesimal)Mathematical economicsEuropean Journal of Operational Research
researchProduct

Non-convex distributed power allocation games in cognitive radio networks

2013

In this thesis, we explore interweave communication systems in cognitive radio networks where the overall objective is to maximize the sum-rate of each cognitive radio user by optimizing jointly both the detection operation based on sensing and the power allocation across channels, taking into account the influence of the sensing accuracy and the interference limitation to the primary users. The optimization problem is addressed in single and multiuser cognitive radio networks for both single-input single-output and multi-input multi-output channels. Firstly, we study the resource allocation optimization problem for single-input single-output single user cognitive radio networks, wherein th…

Computer Science::Computer Science and Game Theory:CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicaciones::Otras [UNESCO]Quasi-Nash EquilibriumNon-convex OptimizationCognitive Radio NetworksNon-cooperative GameUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de las telecomunicaciones::Otras
researchProduct

Non-convex Optimization for Resource Allocation in Wireless Device-to-Device Communications

2020

Device-to-device (D2D) communication is considered one of the key frameworks to provide suitable solutions for the exponentially increasing data tra c in mobile telecommunications. In this PhD Thesis, we focus on the resource allocation for underlay D2D communications which often results in a non-convex optimization problem that is computationally demanding. We have also reviewed many of the works on D2D underlay communications and identi ed some of the limitations that were not handled previously, which has motivated our works in this Thesis. Our rst works focus on the joint power allocation and channel assignment problem in the D2D underlay communication scenario for a unicast single-inpu…

Computer Science::Computer Science and Game TheoryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::MultimediaComputer Science::Networking and Internet ArchitectureVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer Science::Information Theory
researchProduct

Upport vector machines for nonlinear kernel ARMA system identification.

2006

Nonlinear system identification based on support vector machines (SVM) has been usually addressed by means of the standard SVM regression (SVR), which can be seen as an implicit nonlinear autoregressive and moving average (ARMA) model in some reproducing kernel Hilbert space (RKHS). The proposal of this letter is twofold. First, the explicit consideration of an ARMA model in an RKHS (SVM-ARMA 2k) is proposed. We show that stating the ARMA equations in an RKHS leads to solving the regularized normal equations in that RKHS, in terms of the autocorrelation and cross correlation of the (nonlinearly) transformed input and output discrete time processes. Second, a general class of SVM-based syste…

Computer Science::Machine LearningStatistics::TheoryComputer Networks and CommunicationsBiomedical signal processingInformation Storage and RetrievalMachine learningcomputer.software_genrePattern Recognition AutomatedStatistics::Machine LearningArtificial IntelligenceApplied mathematicsStatistics::MethodologyAutoregressive–moving-average modelComputer SimulationMathematicsTelecomunicacionesHardware_MEMORYSTRUCTURESSupport vector machinesModels StatisticalNonlinear system identificationbusiness.industryAutocorrelationSystem identificationSignal Processing Computer-AssistedGeneral MedicineComputer Science ApplicationsSupport vector machineNonlinear systemKernelAutoregressive modelNonlinear DynamicsARMA modelling3325 Tecnología de las TelecomunicacionesArtificial intelligenceNeural Networks ComputerbusinesscomputerSoftwareAlgorithmsReproducing kernel Hilbert spaceIEEE transactions on neural networks
researchProduct

Automatic construction of test sets: Theoretical approach

2005

We consider the problem of automatic construction of complete test set (CTS) from program text. The completeness criterion adopted is C1, i.e., it is necessary to execute all feasible branches of program at least once on the tests of CTS. A simple programming language is introduced with the property that the values used in conditional statements are not arithmetically deformed. For this language the CTS problem is proved to be algorithmically solvable and CTS construction algorithm is obtained. Some generalizations of this language containing counters, stacks or arrays are considered where the CTS problem remains solvable. In conclusion the applications of the obtained results to CTS constr…

Computer Science::PerformanceComputer scienceProperty (programming)Simple (abstract algebra)Completeness (order theory)Test setComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::Networking and Internet ArchitectureComputer Science::Programming LanguagesInternal variableArithmeticHardware_LOGICDESIGNTest (assessment)
researchProduct

Social Network Analysis and Qualitative Interviews for Assessing Geographic Characteristics of Tourism Business Networks.

2015

This study integrates quantitative social network analysis (SNA) and qualitative interviews for understanding tourism business links in isolated communities through analysing spatial characteristics. Two case studies are used, the Surselva-Gotthard region in the Swiss Alps and Longyearbyen in the Arctic archipelago of Svalbard, to test the spatial characteristics of physical proximity, isolation, and smallness for understanding tourism business links. In the larger Surselva-Gotthard region, we found a strong relationship between geographic separation of the three communities on compartmentalization of the collaboration network. A small set of businesses played a central role in steering col…

Computer and Information SciencesNorwegian PeoplePopulation DynamicsSocial Scienceslcsh:MedicineResearch and Analysis MethodsSocial NetworkingAnalytical ChemistryInterviews as TopicSvalbardGeographical LocationsSociologyChemical AnalysisSurveys and QuestionnairesHumansEthnicitiesCooperative Behaviorlcsh:SciencePopulation BiologyGeographylcsh:RCommerceSocial SupportBiology and Life SciencesPaleontologyQualitative StudiesGeographic DistributionNavigationEuropeChemistrySocial NetworksResearch DesignPaleogeographyPhysical SciencesPeople and PlacesEarth SciencesEngineering and TechnologyPopulation GroupingsSteeringlcsh:QQualitative AnalysisSwitzerlandNetwork AnalysisResearch ArticlePLoS ONE
researchProduct

Hypervisor-assisted dynamic malware analysis

2021

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…

Computer engineering. Computer hardwareSoftware_OPERATINGSYSTEMSvirtualisointiComputer Networks and CommunicationsComputer scienceContext (language use)Static program analysiscomputer.software_genreTK7885-7895Artificial IntelligenceComponent (UML)Overhead (computing)tietoturvaMalware analysiskyberturvallisuusbusiness.industryHypervisorQA75.5-76.95haittaohjelmatComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSTask (computing)Electronic computers. Computer scienceEmbedded systemMalwarebusinesscomputerSoftwareInformation SystemsCybersecurity
researchProduct

Complex networks : application for texture characterization and classification

2008

This article describes a new method and approch of texture characterization. Using complex network representation of an image, classical and derived (hierarchical) measurements, we presente how to have good performance in texture classification. Image is represented by a complex networks : one pixel as a node. Node degree and clustering coefficient, using with traditionnal and extended hierarchical measurements, are used to characterize ”organisation” of textures.

Computer engineering. Computer hardwareTexture compressionComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComplex networksImage processingTexture (geology)TK7885-7895Image textureImage processingAnàlisi de texturaProcesamiento de imágenestexture analysisClustering coefficientAnálisis de texturaRedes complejasPixelbusiness.industryNode (networking)Pattern recognitionProcessament d'imatgescomplex networksQA75.5-76.95Xarxes complexesComplex networkTexture analysisElectronic computers. Computer scienceComputer Science::Computer Vision and Pattern RecognitionComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareELCVIA: electronic letters on computer vision and image analysis
researchProduct

Deep CNN for IIF Images Classification in Autoimmune Diagnostics

2019

The diagnosis and monitoring of autoimmune diseases are very important problem in medicine. The most used test for this purpose is the antinuclear antibody (ANA) test. An indirect immunofluorescence (IIF) test performed by Human Epithelial type 2 (HEp-2) cells as substrate antigen is the most common methods to determine ANA. In this paper we present an automatic HEp-2 specimen system based on a convolutional neural network method able to classify IIF images. The system consists of a module for features extraction based on a pre-trained AlexNet network and a classification phase for the cell-pattern association using six support vector machines and a k-nearest neighbors classifier. The class…

Computer science02 engineering and technologyConvolutional neural networklcsh:TechnologyIIF imageAlexNetlcsh:Chemistry03 medical and health sciencesconvolutional neural networks (CNNs)Autoimmune diseaseClassifier (linguistics)0202 electrical engineering electronic engineering information engineeringGeneral Materials Scienceautoimmune diseasesInstrumentationlcsh:QH301-705.5030304 developmental biologyIIF imagesFluid Flow and Transfer Processes0303 health sciencesDeep cnnIndirect immunofluorescenceaccuracybusiness.industrylcsh:TProcess Chemistry and Technologyk-nearest neighbors (KNN)General EngineeringPattern recognitionIIfClass (biology)lcsh:QC1-999Computer Science ApplicationsSupport vector machinelcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040System parameters020201 artificial intelligence & image processingsupport vector machine (SVM)Artificial intelligencebusinesslcsh:Engineering (General). Civil engineering (General)lcsh:PhysicsApplied Sciences
researchProduct

A Damage Identification Approach for Offshore Jacket Platforms Using Partial Modal Results and Artificial Neural Networks

2018

This paper presents a damage identification method for offshore jacket platforms using partially measured modal results and based on artificial intelligence neural networks. Damage identification indices are first proposed combining information of six modal results and natural frequencies. Then, finite element models are established, and damages in structural members are assumed by reducing the structural elastic modulus. From the finite element analysis for a training sample, both the damage identification indices and the damages are obtained, and neural networks are trained. These trained networks are further tested and used for damage prediction of structural members. The calculation res…

Computer science020101 civil engineering02 engineering and technologylcsh:Technology0201 civil engineeringWaterlinejacket platformlcsh:Chemistrysymbols.namesake0203 mechanical engineeringGeneral Materials Sciencenatural frequenciesInstrumentationlcsh:QH301-705.5Fluid Flow and Transfer Processesdamage identification indexfinite element modelArtificial neural networkbusiness.industrylcsh:TProcess Chemistry and Technologymodal shapesGeneral EngineeringStructural engineeringFinite element methodlcsh:QC1-999Computer Science ApplicationsIdentification (information)020303 mechanical engineering & transportsModallcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040symbolsSubmarine pipelinebusinesslcsh:Engineering (General). Civil engineering (General)artificial neural networkslcsh:Physics
researchProduct