Search results for "artificial intelligence"

showing 10 items of 6122 documents

5G Functional Architecture and Signaling Enhancements to Support Path Management for eV2X

2019

Enhanced vehicle-to-everything (eV2X) communication is one of the most challenging use cases that the fifth generation (5G) of cellular mobile communications must address. In particular, eV2X includes some 5G vehicular applications targeting fully autonomous driving which require ultra-high reliability. The usual approach to providing vehicular communication based on single-connectivity transmission, for instance, through the direct link between vehicles (PC5 interface), often fails at guaranteeing the required reliability. To solve such a problem, in this paper, we consider a scheme where the radio path followed by eV2X messages can be proactively and dynamically configured to either trans…

Scheme (programming language)General Computer ScienceComputer scienceDistributed computingInterface (computing)Reliability (computer networking)02 engineering and technology0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceUse casecomputer.programming_languageMulti-connectivitybusiness.industryGeneral Engineering020206 networking & telecommunications5G coreTransmission (telecommunications)Path (graph theory)V2Xsidelink020201 artificial intelligence & image processinglcsh:Electrical engineering. Electronics. Nuclear engineeringMobile telephonybusinesslcsh:TK1-9971computer5GIEEE Access
researchProduct

“Anti-Bayesian” flat and hierarchical clustering using symmetric quantiloids

2017

A myriad of works has been published for achieving data clustering based on the Bayesian paradigm, where the clustering sometimes resorts to Naive-Bayes decisions. Within the domain of clustering, the Bayesian principle corresponds to assigning the unlabelled samples to the cluster whose mean (or centroid) is the closest. Recently, Oommen and his co-authors have proposed a novel, counter-intuitive and pioneering PR scheme that is radically opposed to the Bayesian principle. The rational for this paradigm, referred to as the “Anti-Bayesian” (AB) paradigm, involves classification based on the non-central quantiles of the distributions. The first-reported work to achieve clustering using the A…

Scheme (programming language)Information Systems and ManagementTheoretical computer scienceComputer scienceBayesian principleBayesian probabilityVDP::Matematikk og Naturvitenskap: 400::Matematikk: 410::Statistikk: 412Multivariate normal distribution0102 computer and information sciences02 engineering and technology01 natural sciencesDomain (mathematical analysis)ClusteringTheoretical Computer ScienceArtificial Intelligence0103 physical sciencesCluster (physics)0202 electrical engineering electronic engineering information engineering010306 general physicsCluster analysiscomputer.programming_languageCentroidComputer Science ApplicationsHierarchical clustering010201 computation theory & mathematicsControl and Systems EngineeringAnti-Bayesian classification020201 artificial intelligence & image processingcomputerSoftwareQuantiloidsQuantile
researchProduct

A Pseudo-Supervised Approach to Improve a Recommender Based on Collaborative Filtering

2003

This PhD Thesis develops an optimal recommender. First of all, users accessing to a Web site are clustered. If a user belongs to a cluster, the system offers services which are usually accessed by users from the same cluster in a collaborative filtering scheme. A novel approach based on a users simulator and a dynamic recommendation system is proposed. The simulator is used to create the situations that one can find in a Web site. Introduction of dynamics in the recommender allows to change the clusters and in turn, the decisions which are taken. Since the system is based both on supervised and unsupervised learning whose borders are not too clear in our approach, we talk about a pseudo-sup…

Scheme (programming language)Information retrievalComputer sciencebusiness.industryCollaborative filteringUnsupervised learningArtificial intelligenceRecommender systembusinesscomputercomputer.programming_language
researchProduct

Modelling Dependencies Between Classifiers in Mobile Masquerader Detection

2004

The unauthorised use of mobile terminals may result in an abuse of sensitive information kept locally on the terminals or accessible over the network. Therefore, there is a need for security means capable of detecting the cases when the legitimate user of the terminal is substituted. The problem of user substitution detection is considered in the paper as a problem of classifying the behaviour of the person interacting with the terminal as originating from the user or someone else. Different aspects of behaviour are analysed by designated one-class classifiers whose classifications are subsequently combined. A modification of majority voting that takes into account some of the dependencies …

Scheme (programming language)Majority ruleComputer sciencebusiness.industrySubstitution (logic)Base (topology)Machine learningcomputer.software_genreInformation sensitivityTerminal (electronics)Artificial intelligenceData miningbusinesscomputercomputer.programming_language
researchProduct

Discretized Bayesian Pursuit – A New Scheme for Reinforcement Learning

2012

Published version of a chapter in the book: Advanced Research in Applied Artificial Intelligence. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-31087-4_79 The success of Learning Automata (LA)-based estimator algorithms over the classical, Linear Reward-Inaction ( L RI )-like schemes, can be explained by their ability to pursue the actions with the highest reward probability estimates. Without access to reward probability estimates, it makes sense for schemes like the L RI to first make large exploring steps, and then to gradually turn exploration into exploitation by making progressively smaller learning steps. However, this behavior becomes counter-intuitive wh…

Scheme (programming language)Mathematical optimizationDiscretizationLearning automataComputer sciencebusiness.industryVDP::Mathematics and natural science: 400::Information and communication science: 420::Algorithms and computability theory: 422estimator algorithmsBayesian probabilityBayesian reasoninglearning automataEstimatorVDP::Technology: 500::Information and communication technology: 550discretized learningBayesian inferenceAction (physics)Reinforcement learningArtificial intelligencepursuit schemesbusinesscomputercomputer.programming_language
researchProduct

A Learning Automata Local Contribution Sampling Applied to Hydropower Production Optimisation

2017

Learning Automata (LA) is a powerful approach for solving complex, non-linear and stochastic optimisation problems. However, existing solutions struggle with high-dimensional problems due to slow convergence, arguably caused by the global nature of feedback. In this paper we introduce a novel Learning Automata (LA) scheme to attack this challenge. The scheme is based on a parallel form of Local Contribution Sampling (LCS), which means that the LA receive individually directed feedback, designed to speed up convergence. Furthermore, our scheme is highly decentralized, allowing parallel execution on GPU architectures. To demonstrate the power of our scheme, the LA LCS is applied to hydropower…

Scheme (programming language)Mathematical optimizationEngineeringSpeedupLearning automatabusiness.industrySampling (statistics)Machine learningcomputer.software_genrePower (physics)Range (mathematics)Convergence (routing)Reinforcement learningArtificial intelligencebusinesscomputercomputer.programming_language
researchProduct

A General Frame for Building Optimal Multiple SVM Kernels

2012

The aim of this paper is to define a general frame for building optimal multiple SVM kernels. Our scheme follows 5 steps: formal representation of the multiple kernels, structural representation, choice of genetic algorithm, SVM algorithm, and model evaluation. The computation of the optimal parameter values of SVM kernels is performed using an evolutionary method based on the SVM algorithm for evaluation of the quality of chromosomes. After the multiple kernel is found by the genetic algorithm we apply cross validation method for estimating the performance of our predictive model. We implemented and compared many hybrid methods derived from this scheme. Improved co-mutation operators are u…

Scheme (programming language)Multiple kernel learningbusiness.industryComputationPattern recognitionCross-validationSupport vector machineGenetic algorithmArtificial intelligenceGeneral framebusinesscomputerKernel (category theory)Mathematicscomputer.programming_language
researchProduct

Sensorimotor Communication for Humans and Robots: Improving Interactive Skills by Sending Coordination Signals

2018

During joint actions, humans continuously exchange coordination signals and use nonverbal, sensorimotor forms of communication. Here we discuss a specific example of sensorimotor communication-"signaling"-which consists in the intentional modification of one's own action plan (e.g., a plan for reaching a glass of wine) to make it more predictable or discriminable from alternative action plans that are contextually plausible (e.g., a plan for reaching another glass on the same table). We first review the existing evidence on signaling in human-human interactions, discussing under which conditions humans use signaling. Successively, we distill these insights into a computational theory of sig…

Scheme (programming language)Sensorimotor Communication.Computer sciencemedia_common.quotation_subjectPlan (drawing)Human-Robot Interaction050105 experimental psychologyHuman–robot interaction03 medical and health sciencesNonverbal communication0302 clinical medicineJoint ActionArtificial IntelligenceHuman–computer interaction0501 psychology and cognitive sciencesQuality (business)Simulationmedia_commoncomputer.programming_languageSettore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni05 social sciencesSignalingAction (philosophy)Sensorimotor CommunicationAction planRobotcomputer030217 neurology & neurosurgerySoftwareIEEE Transactions on Cognitive and Developmental Systems
researchProduct

Priority-based initial access for URLLC traffic in massive IoT networks: Schemes and performance analysis

2020

Abstract At a density of one million devices per square kilometer, the10’s of billions of devices, objects, and machines that form a massive Internet of things (mIoT) require ubiquitous connectivity. Among a massive number of IoT devices, a portion of them require ultra-reliable low latency communication (URLLC) provided via fifth generation (5G) networks, bringing many new challenges due to the stringent service requirements. Albeit a surge of research efforts on URLLC and mIoT, access mechanisms which include both URLLC and massive machine type communications (mMTC) have not yet been investigated in-depth. In this paper, we propose three novel schemes to facilitate priority-based initial …

Scheme (programming language)Service (systems architecture)Computer Networks and CommunicationsComputer sciencebusiness.industryReliability (computer networking)Frame (networking)020206 networking & telecommunications02 engineering and technologyTransmission (telecommunications)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingLatency (engineering)businesscomputerVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 5505GRandom accesscomputer.programming_languageComputer network
researchProduct

A Neural Network model for the Evaluation of Text Complexity in Italian Language: a Representation Point of View

2018

Abstract The goal of a text simplification system (TS) is to create a new text suited to the characteristics of a reader, with the final goal of making it more understandable.The building of an Automatic Text Simplification System (ATS) cannot be separated from a correct evaluation of the text complexity. In fact the ATS must be capable of understanding if a text should be simplified for the target reader or not. In a previous work we have presented a model capable of classifying Italian sentences based on their complexity level. Our model is a Long Short Term Memory (LSTM) Neural Network capable of learning the features of easy-to-read and complex-to-read sentences autonomously from a anno…

Scheme (programming language)Text simplificationComputer science02 engineering and technologycomputer.software_genreEvaluation Sentence ComplexityText Simplification0202 electrical engineering electronic engineering information engineeringWord2vecRepresentation (mathematics)General Environmental Sciencecomputer.programming_languageNatural Language Processing060201 languages & linguisticsDeep Neural NetworksArtificial neural networkPoint (typography)business.industry06 humanities and the artsDeep Neural NetworksEvaluation Sentence ComplexityNatural Language ProcessingSentence ClassificationText SimplificationSentence Classification0602 languages and literatureComputingMethodologies_DOCUMENTANDTEXTPROCESSINGGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerFeature learningNatural language processingSentence
researchProduct