The maximal regularity property of discontinuous Galerkin methods for linear parabolic equations is used together with variational techniques to establish a priori and a posteriori error estimates of optimal order und...
详细信息
Spiking neural network (SNN), as the next generation of artificial neural network (ANN), offer a closer mimicry of natural neural networks and hold promise for significant improvements in computational efficiency. How...
详细信息
Vehicular networks are expected to empower auto mated driving and intelligent transportation via vehicle-to-everything(V2X)communications and edge/cloud-assisted computation,and in the meantime Cellular V2X(C-V2X)is g...
详细信息
Vehicular networks are expected to empower auto mated driving and intelligent transportation via vehicle-to-everything(V2X)communications and edge/cloud-assisted computation,and in the meantime Cellular V2X(C-V2X)is gaining wide support from the global industrial *** 5G NR-V2X technology is the evolution of LTE-V2X,which is expected to provide ultra-Reliable and Low-Latency Communications(uRLLC)with 1ms latency and 99.999%***,vehicular networks still face great challenges in supporting many emerging time-critical applications,which comprise sensing,communication and computation as closed-loops.
In crime scene scenarios, there are various factors to consider when determining a suspect's guilt. However, the process of extracting and assessing these factors can be time-consuming, often taking years and incu...
详细信息
ISBN:
(数字)9798350362763
ISBN:
(纸本)9798350362770
In crime scene scenarios, there are various factors to consider when determining a suspect's guilt. However, the process of extracting and assessing these factors can be time-consuming, often taking years and incurring significant legal expenses. Judges are now exploring the potential of artificial intelligence techniques and machine learning computations within the justice system. Specifically, in the realm of criminal justice, these methodologies have the potential to aid in investigations and decision-making processes. Utilizing machine learning approaches can thus expedite the bureaucratic process, potentially making it more efficient. We introduce an idea of an approach that could provide fast and explainable support in the evaluation of guilt. Our approach relies on computations based on the presence or absence of 44 features describing the crime scene. Then, by a boolean function, we determined the final verdict of the legal case (only a subset of the extracted features are relevant to evaluate the guilt prediction). To demonstrate the practicality of our proposal, we conducted experiments based on 79 road homicide cases in Italy. As a consequence, the boolean evaluation was done according to Italian law principles. With our system, we reached a 83.2 % accuracy rate in extracting features from the legal ruling texts and a 69.6% accuracy in guilt prediction.
In conventional joint communications and sensing (JCAS) designs for multi-carrier multiple-input multiple-output (MIMO) systems, the dual-functional waveforms are often optimized for the whole frequency band, resultin...
In conventional joint communications and sensing (JCAS) designs for multi-carrier multiple-input multiple-output (MIMO) systems, the dual-functional waveforms are often optimized for the whole frequency band, resulting in limited communications–sensing performance tradeoff. To overcome the limitation, we propose employing a subset of subcarriers for JCAS, while the communications function is performed over all the subcarriers. This offers more degrees of freedom to enhance the communications performance under a given sensing accuracy. We first formulate the rate maximization under the sensing accuracy constraint to optimize the beamformers and JCAS subcarriers. The problem is solved via Riemannian manifold optimization and closed-form solutions. Numerical results for an 8 × 4 MIMO system with 64 subcarriers show that compared to the conventional subcarrier sharing scheme, the proposed scheme employing 16 JCAS subcarriers offers 60% improvement in the achievable communications rate at the signal-to-noise ratio of 10 dB. Meanwhile, this scheme generates the sensing beampattern with the same quality as the conventional JCAS design.
Determinantal point processes (DPPs) have become prominent in data summarization and recommender system tasks for their ability to simultaneously model diversity as well as relevance. In practical applications, k-Dete...
Determinantal point processes (DPPs) have become prominent in data summarization and recommender system tasks for their ability to simultaneously model diversity as well as relevance. In practical applications, k-Determinantal point processes (k-DPPs) are used to yield a selection of k items from a set of size N that are the most representative of the set. In this paper, we study a special case of the diverse subset selection problem where a fixed set GO is already given as a forced recommendation and the task is to determine the remainder of the recommendation G1. The standard k-DPP optimization objectives here can suggest items that are close to optimal when considering only items in G1, but are arbitrarily close to items in G0, i.e., they might not be sufficiently diverse w.r.t. G0. We explore a semi-supervised k-DPP objective that simultaneously considers G0 and G1 and compares the difference between the two recommendations. We demonstrate our findings using multiple examples where the diverse subset selection problem with forced recommendation is important in practice.
We consider the discretization of a class of nonlinear parabolic equations by discontinuous Galerkin time-stepping methods and establish a priori as well as conditional a posteriori error estimates. Our approach is mo...
详细信息
Recent developments in artificial intelligence and automation support a new drug design paradigm: autonomous drug design. Under this paradigm, generative models can provide suggestions on thousands of molecules with s...
详细信息
Prior work has demonstrated a consistent tendency in neural networks engaged in continual learning tasks, wherein intermediate task similarity results in the highest levels of catastrophic interference. This phenomeno...
详细信息
To account for the massive uncoordinated random access scenario, which is relevant for the Internet of Things, Polyanskiy (2017) proposed a novel formulation of the multiple-access problem, commonly referred to as uns...
详细信息
To account for the massive uncoordinated random access scenario, which is relevant for the Internet of Things, Polyanskiy (2017) proposed a novel formulation of the multiple-access problem, commonly referred to as unsourced multiple access, where all users employ a common codebook and the receiver decodes up to a permutation of the messages. In this paper, we extend this seminal work to the case where the number of active users is random and unknown a priori. We define a random-access code accounting for both misdetection (MD) and false alarm (FA), and derive a random-coding achievability bound for the Gaussian multiple access channel. Our bound captures the fundamental trade-off between MD and FA probabilities. It suggests that the lack of knowledge of the number of active users entails a small penalty in energy efficiency when the target MD and FA probabilities are high. However, as the target MD and FA probabilities decrease, the energy efficiency penalty becomes more significant. For example, in a typical IoT scenario with framelength 19200 complex channel uses and 25-300 active users in average, the required energy per bit to achieve both MD and FA probabilities below 10−1, predicted by our bound, is only 0.5-0.7 dB higher than that predicted by the bound in Polyanskiy (2017) for a known number of active users. This gap increases to 3-4 dB when the target MD probability and/or FA probability is below 10−3. Taking both MD and FA into account, we use our bound to benchmark the energy efficiency of slotted-ALOHA with multi-packet reception, of a decoder that simply treats interference as noise, and of some recently proposed unsourced multiple access schemes. Numerical results suggest that, when the target MD and FA probabilities are high, it is effective to estimate the number of active users, then treat this estimate as the true value, and use a coding scheme that performs well for the case of known number of active users. However, this approach becomes energy in
暂无评论