This paper introduces a systematic methodological framework to design and analyze distributed algorithms for optimization and games over networks. Starting from a centralized method, we identify an aggregation functio...
详细信息
Evaluating the candidate answers during online examination by a human examiner is wearisome task. Along with that, security concerns also associated in the E-Learning environment in terms of false data injection and m...
详细信息
ISBN:
(数字)9798350369083
ISBN:
(纸本)9798350369090
Evaluating the candidate answers during online examination by a human examiner is wearisome task. Along with that, security concerns also associated in the E-Learning environment in terms of false data injection and modification attacks respectively. The state of the art work, either focus on designing intelligent and robust question answering model using Machine Learning (ML)/Deep Learning (DL) algorithm, or designing a secure framework for E-Learning environment using blockchain. To neutralize that issue, we design a secure and intelligent model for E-Learning environment using Deep Reinforcement Learning (DRL) and blockchain methodology respectively named EvauleBlock. The EvauleBlock composed of four major processes such as data assortment, data pre-processing, intelligent answer evaluation, and blockchain storage. In data assortment stage, the training of the proposed DRL algorithm named Multi Agent Deep Deterministic Policy Gradient (MADDPG) is taken place by crawling the related question answering data from the various websites. Followed by, we have performed pre-processing for the candidate written answers using adequate pre-processing steps. Once the answers are pre-processed, it is then provided to the MADDPG algorithm which employs four agents for validating the candidate answers by checking the semantic, syntactic, keyword, and context similarity scoring respectively. At last, the overall scores are securely stored in the blockchain using Proof of Work (PoW) consensus algorithm. The implementation of this work is carried out using python 3.11.0 tool and performance of the proposed model are validated and compared with adequate performance metrics. The results are promising when compared to the conventional models.
In this paper, we introduce an inexact approach to the Boosted Difference of Convex Functions algorithm (BDCA) for solving nonconvex and nondifferentiable problems involving the difference of two convex functions (DC ...
详细信息
Efficient algorithms for solving the Smallest Enclosing Sphere (SES) problem, such as Welzl's algorithm, often fail to handle degenerate subsets of points in 3D space. De- generacies and ill-posed configurations p...
详细信息
In this paper, we provide algorithmic methods for conducting exhaustive searches for periodic Golay pairs. Our methods enumerate several lengths beyond the currently known state-of-the-art available searches: we condu...
详细信息
If an algorithm is to be counted as a practically working solution to a decision problem, then the algorithm must must verifiable in some constructed and "trusted" theory such as PA or ZF. In this paper, a c...
详细信息
Extracting surfaces from Signed Distance Fields (SDFs) can be accomplished using traditional algorithms, such as Marching Cubes. However, since they rely on sign flips across the surface, these algorithms cannot be us...
详细信息
Dynamic Spectrum Access (DSA) addresses the underutilized spectrum allocation issues associated with static spectrum allocation. Blockchain is a critical enabler for implementing a DSA system because it allows untrust...
详细信息
ISBN:
(数字)9798350316742
ISBN:
(纸本)9798350316759
Dynamic Spectrum Access (DSA) addresses the underutilized spectrum allocation issues associated with static spectrum allocation. Blockchain is a critical enabler for implementing a DSA system because it allows untrusted parties to conduct business, such as spectrum buying and selling, without the involvement of a trusted third party. A blockchain system is implemented using the Proof-of-Sense consensus algorithm, which is designed to facilitate DSA while also providing several additional benefits, such as spectrum data collection.
When applied to signed graphs, spectral clustering methods often struggle to capture natural groupings accurately. Recent research shows that these methods become less effective as the size of the signed network incre...
详细信息
This paper studies MP Cv5+, which is to cover as many vertices as possible in a given graph G = (V, E) by vertex-disjoint 5+-paths (i.e., paths each with at least five vertices). MP Cv5+ is NP-hard and admits an exist...
详细信息
暂无评论