The design of data markets has gained importance as firms increasingly use machine learning models fueled by externally acquired training data. A key consideration is the externalities firms face when data, though inh...
详细信息
Vehicular networks, also known as Vehicular Ad Hoc Networks (VANETs), have become a crucial technology for vehicle communication, providing wireless connectivity among vehicles and between vehicles and infrastructure....
详细信息
ISBN:
(数字)9798350373974
ISBN:
(纸本)9798350373981
Vehicular networks, also known as Vehicular Ad Hoc Networks (VANETs), have become a crucial technology for vehicle communication, providing wireless connectivity among vehicles and between vehicles and infrastructure. However, the dynamic and complex nature of these networks presents unique challenges in routing and resource management. In this study, we explore the use of artificial intelligence (AI) to improve the performance of vehicular networks, focusing on two widely used routing protocols: Optimized Link State Routing (OLSR) and Destination-Sequenced Distance Vector (DSDV).We aim to evaluate the performance of these traditional routing protocols within the context of vehicular networks by integrating machine learning techniques such as neural network regression (MLRegression). Our goal is to understand how the integration of artificial intelligence can enhance the prediction and optimization of vehicular network performance. Using MLRegression, we aim to develop accurate prediction models for performance metrics such as latency, throughput, packet delivery rate, and more, based on network parameters and environmental conditions. This comparative evaluation, which involves incorporating an AI-based approach, will allow us to better understand the strengths and weaknesses of each protocol and provide recommendations for improving vehicular networks.
Disaster management is one of the areas of paramount importance for any government or organization. This process gets very tedious and tricky for some specific type of disasters. Deploying manpower for mitigating the ...
Disaster management is one of the areas of paramount importance for any government or organization. This process gets very tedious and tricky for some specific type of disasters. Deploying manpower for mitigating the disaster and saving the victims is a risky decision because the life of the people in the disaster management team is put to risk, which is a very unfortunate thing. So instead of using manpower, we can deploy intelligent machine agents, which are equivalent or sometimes more efficient than human beings for such highly risky tasks and avert the loss of lives. In our case, we have specifically considered the disaster wherein fire breaks out in a building and people get trapped inside due to the dangerous situation. In this case, where deploying manpower to rescue them requires a high quality protective gear and can even put their lives on risk, we have proposed to deploy intelligent machine agents that are trained to figure out the path on their own and find their way to the victims after which a rescue operation can be performed by safely escorting the victims to a nearby exit in the building. The agent in the proposed application has been evaluated by the metrics such as the time taken to reach the victims and come back to the exit, the total rewards gathered by the agent during its exploration in the environment and the number of correct decisions it made during its journey. The agent takes an average time of 145.6 seconds to complete its operation in the real-time environment. It gathered an average peak cumulative reward value of -0.2 in the real time environment. The agent on an average, records 67.3% chance of making a correct decision (that gets a positive reward) given a state vector.
The aim of technical education is to design a career-based curriculum that imparts a set of skills to students and enable them to contribute to a nation's economic progress. With their multifarious uses, informati...
详细信息
ISBN:
(数字)9798350399431
ISBN:
(纸本)9798350399448
The aim of technical education is to design a career-based curriculum that imparts a set of skills to students and enable them to contribute to a nation's economic progress. With their multifarious uses, information systems (IS) lie at the heart of modern economies. IS curricula offer several tracks for students to pursue career paths based on their interests and opportunities. To offer students an opportunity to apply the knowledge they glean from classroom instructions on real-world problems, capstone projects are essential elements in most, if not all, IS programs. As IS programs increasingly offer a wider range of career paths for students, the design and delivery of such capstone projects present a set of unique challenges. In this paper, we examine the set of challenges and share our experience from designing and delivering a career track-based capstone course for the first time at a large university. Feedback from students and faculty supervisors indicates that the course was able to meet its learning objectives to a notable extent and offered important pointers to future improvements in the course design.
End-to-end speech coding models achieve high coding gains by learning compact yet expressive features and a powerful decoder in a single network. A challenging problem as such results in unwelcome complexity increase ...
End-to-end speech coding models achieve high coding gains by learning compact yet expressive features and a powerful decoder in a single network. A challenging problem as such results in unwelcome complexity increase and inferior speech quality. In this paper, we propose to separate the representation learning and information reconstruction tasks. We leverage an end-to-end codec for learning low-dimensional discrete tokens. Instead of using its decoder, we employ a latent diffusion model to de-quantize coded features into a high-dimensional continuous space, relieving the decoder’s burden of de-quantizing and upsampling. To mitigate the issue of over-smooth generation, we introduce midway-infilling with less noise reduction and stronger conditioning. We investigate the hyperparameters for midway-infilling and latent diffusion space with different dimensions in ablation studies. Subjective listening tests show that our model outperforms the state-of-the-art at two low bitrates, 1.5 and 3 kbps. We open-source the project for reproducibility 1 .
Large language models (LLMs) provide a promising way for accurate session-based recommendation (SBR), but they demand substantial computational time and memory. Knowledge distillation (KD)-based methods can alleviate ...
详细信息
The integration of multi-omics data presents a major challenge in precision medicine, requiring advanced computational methods for accurate disease classification and biological interpretation. This study introduces t...
详细信息
One of the fundamental problems of interest for discrete-time linear systems is whether its input sequence may be recovered given its output sequence, a.k.a. the left inversion problem. Many conditions on the state sp...
详细信息
Voting is a crucial part of democracy because it gives people the chance to voice their opinions, hold elected officials responsible, encourage diversity in the government, cultivate civic participation, and defend th...
Voting is a crucial part of democracy because it gives people the chance to voice their opinions, hold elected officials responsible, encourage diversity in the government, cultivate civic participation, and defend themselves from tyranny. Existing electronic voting (e-voting) systems do in fact suffer a number of important obstacles, with security difficulties and a lack of transparency ranking as two of the most important problems. Given the significance of elections in democracies and the likelihood of fraud or other forms of manipulation in electronic voting procedures, these issues are extremely pressing. systems used for electronic voting heavily rely on software, which might occasionally have vulnerabilities that hackers can exploit. Any weak point in the system can be used to sway elections or jeopardize its security. To address these issues, a strong, secure electronic voting system (EVS), an open system design, impartial audits, and a dedication to inclusion and accessibility are required. For democratic processes to continue to be trusted and the right to vote to be protected, e-voting system integrity must be ensured. It is necessary to create a new Electronic Voting System (EVS) that can offer greater security, speed, and accuracy than the EVS used in the past. The authors of this research suggested a blockchain-based secure EVS. Immutable, transparent, and secure distributed ledger technology named as blockchain. Blockchain used to implement an E-Voting system that is transparent, tamper-proof, and can guarantee the correctness and integrity of the voting process.
In a wireless network using directional transmitters, a typical problem is to schedule a set of directional links to cover all the receivers in a region, such that an adequate data rate and coverage are maintained whi...
详细信息
暂无评论