scholarly journals Data Recovery through Modulation Identification in Dense Wireless Networks

2018 ◽  
Vol 210 ◽  
pp. 03009
Author(s):  
Anup Kar ◽  
Aradhana Misra ◽  
Kandarpa Kumar Sarma ◽  
Nikos E. Mastorakis

With rise in device complexity and transmission rates, reliability in data recovery has become another critical issue requiring costly and computationally demanding mechanism. The popularity of artificial intelligence (AI) and its ubiquitousness have established the usefulness of design of data recovery schemes where device level complexity is less. Lower device complexity is being ensured by the use of AI driven data recovery. In this work, we focus on the design of such a mechanism where traditional process are replaced by a neuro-computing structure. The advantage is lower levels of device complexity but incorporation of a training latency. Experimental results have established the reliability of the proposed system.

Author(s):  
Yaru Fu ◽  
Howard H. Yang ◽  
Khai Nguyen Doan ◽  
Chenxi Liu ◽  
Xijun Wang ◽  
...  

2021 ◽  
Vol 2 ◽  
pp. 1015-1040
Author(s):  
Mohamed-Amine Lahmeri ◽  
Mustafa A. Kishk ◽  
Mohamed-Slim Alouini

2014 ◽  
Vol 571-572 ◽  
pp. 105-108
Author(s):  
Lin Xu

This paper proposes a new framework of combining reinforcement learning with cloud computing digital library. Unified self-learning algorithms, which includes reinforcement learning, artificial intelligence and etc, have led to many essential advances. Given the current status of highly-available models, analysts urgently desire the deployment of write-ahead logging. In this paper we examine how DNS can be applied to the investigation of superblocks, and introduce the reinforcement learning to improve the quality of current cloud computing digital library. The experimental results show that the method works more efficiency.


Author(s):  
Samyak Sadanand Shravasti

Abstract: Phishing occurs when people's personal information is stolen via email, phone, or text communications. In Smishing Short Message Service (SMS) is used for cyber-attacks, Smishing is a type of theft of sensitive information. People are more likely to give personal information such as account details and passwords when they receive SMS messages. This data could be used to steal money or personal information from a person or a company. As a result, Smishing is a critical issue to consider. The proposed model uses an Artificial Intelligence to detect smishing. Analysing a SMS and successfully detecting Smishing is possible. Finally, we evaluate and analyse our proposed model to show its efficacy. Keywords: Phishing, Smishing, Artificial Intelligence, LSTM, RNN


2018 ◽  
Vol 14 (06) ◽  
pp. 4
Author(s):  
Shali Jiang ◽  
Qiong Ren

<p class="0abstract"><span lang="EN-US">In order to study the application of sensors in intelligent clothing design, the artificially intelligent cutting-edge technology -machine learning method was proposed to combine a variety of signals of non-contact sensors in several different positions. Higher accuracy was achieved, while maintaining the comfort brought by a non-contact sensor. The experimental results showed that the proposed strategy focused on the combination of clothing design technology and artificial intelligence technology. As a result, without changing the sensor materials, it enhances the comfort and precision of clothing, eliminates the comfort reduced by sensor close to the skin, and transforms inaccurate measurement into accurate measurement. </span></p>


Author(s):  
Guanghsu A. Chang ◽  
Cheng-Chung Su ◽  
John W. Priest

Artificial intelligence (AI) approaches have been successfully applied to many fields. Among the numerous AI approaches, Case-Based Reasoning (CBR) is an approach that mainly focuses on the reuse of knowledge and experience. However, little work is done on applications of CBR to improve assembly part design. Similarity measures and the weight of different features are crucial in determining the accuracy of retrieving cases from the case base. To develop the weight of part features and retrieve a similar part design, the research proposes using Genetic Algorithms (GAs) to learn the optimum feature weight and employing nearest-neighbor technique to measure the similarity of assembly part design. Early experimental results indicate that the similar part design is effectively retrieved by these similarity measures.


Author(s):  
Kaisheng Wu ◽  
Liangda Fang ◽  
Liping Xiong ◽  
Zhao-Rong Lai ◽  
Yong Qiao ◽  
...  

Strategy representation and reasoning has recently received much attention in artificial intelligence. Impartial combinatorial games (ICGs) are a type of elementary and fundamental games in game theory. One of the challenging problems of ICGs is to construct winning strategies, particularly, generalized winning strategies for possibly infinitely many instances of ICGs. In this paper, we investigate synthesizing generalized winning strategies for ICGs. To this end, we first propose a logical framework to formalize ICGs based on the linear integer arithmetic fragment of numeric part of PDDL. We then propose an approach to generating the winning formula that exactly captures the states in which the player can force to win. Furthermore, we compute winning strategies for ICGs based on the winning formula. Experimental results on several games demonstrate the effectiveness of our approach.


2020 ◽  
Vol 34 (10) ◽  
pp. 13969-13970
Author(s):  
Atsuki Yamaguchi ◽  
Katsuhide Fujita

In human-human negotiation, reaching a rational agreement can be difficult, and unfortunately, the negotiations sometimes break down because of conflicts of interests. If artificial intelligence can play a role in assisting with human-human negotiation, it can assist in avoiding negotiation breakdown, leading to a rational agreement. Therefore, this study focuses on end-to-end tasks for predicting the outcome of a negotiation dialogue in natural language. Our task is modeled using a gated recurrent unit and a pre-trained language model: BERT as the baseline. Experimental results demonstrate that the proposed tasks are feasible on two negotiation dialogue datasets, and that signs of a breakdown can be detected in the early stages using the baselines even if the models are used in a partial dialogue history.


Sign in / Sign up

Export Citation Format

Share Document