This paper develops a low-complexity near-optimal non-coherent receiver for a multi-level energy-based coded modulation system. Inspired by the turbo processing principle, we incorporate the fundamentals of bit-interl...
详细信息
Neural networks with relatively shallow layers and simple structures may have limited ability in accurately identifying pneumonia. In addition, deep neural networks also have a large demand for computing resources, wh...
详细信息
This study addresses a distributed controller design problem for discrete-time systems using linear matrix inequalities (LMIs). Sparsity constraints on control gains of distributed controllers result in conservatism v...
详细信息
Humans have the ability to deviate from their natural behavior when necessary, which is a cognitive process called response inhibition. Similar approaches have independently received increasing attention in recent yea...
Humans have the ability to deviate from their natural behavior when necessary, which is a cognitive process called response inhibition. Similar approaches have independently received increasing attention in recent years for ensuring the safety of control. Realized using control barrier functions or predictive safety filters, these approaches can effectively ensure the satisfaction of state constraints through an online adaptation of nominal control laws, e.g., obtained through reinforcement learning. While the focus of these realizations of inhibitory control has been on risk-neutral formulations, human studies have shown a tight link between response inhibition and risk attitude. Inspired by this insight, we propose a flexible, risk-sensitive method for inhibitory control. Our method is based on a risk-aware condition for value functions, which guarantees the satisfaction of state constraints. We propose a method for learning these value functions using common techniques from reinforcement learning and derive sufficient conditions for its success. By enforcing the derived safety conditions online using the learned value function, risk-sensitive inhibitory control is effectively achieved. The effectiveness of the developed control scheme is demonstrated in simulations.
For each smart home, the need of energy consumption supervision is necessary, which plays an important role to ensure the highest power quality and to enhance the stability of the whole grid. The current document impl...
详细信息
ISBN:
(纸本)9781665482622
For each smart home, the need of energy consumption supervision is necessary, which plays an important role to ensure the highest power quality and to enhance the stability of the whole grid. The current document implements a smart home supply strategy based on endless resources to reduce the electricity bill and confirm the energy balance. In this context, a proposed supervision algorithm operates in eight cases to reach optimal energy flow between renewable generators, home battery and grid in a smart home concept is presented. The system is evaluated using the framework “Business Process Model and Notation” (BPMN) Camunda basing on information stored in Firebase Cloud and results are presented in order to manifest the efficiency of this control strategy.
This article deals with designing an efficient post-quantum lattice based encryption scheme that relies on the multi-authority Ciphertext-Policy Attribute-Based Encryption (CP-ABE). The security of the proposed scheme...
This article deals with designing an efficient post-quantum lattice based encryption scheme that relies on the multi-authority Ciphertext-Policy Attribute-Based Encryption (CP-ABE). The security of the proposed scheme is based on the hardness of the ring learning with errors (RLWE) problem. The construction of the proposed scheme is done using the Shamir's threshold secret sharing along with the Lagrange interpolation during the key generation and decryption processes in order to achieve the segmentation and restoration of private keys. A comparative study with the existing state of art schemes has been performed to show the feasibility and efficiency of the proposed scheme. Furthermore, experiments on the proposed scheme have been conducted to illustrate the computational time required during the key generation, encryption and decryption processes.
Unmanned aerial vehicles (UAVs) and Terahertz (THz) technology are envisioned to play paramount roles in next-generation wireless communications. In this paper, we present a novel secure UAV-assisted mobile relaying s...
详细信息
Electric Vehicles (EVs) share common technologies with classical fossil-fueled cars, but they also employ novel technologies and components (e.g., Charging System and Battery Management System) that create an unexplor...
详细信息
The paper discusses the integration and use of generative artificial intelligence technologies in education. Generative AI, such as OpenAI, in particular the GPT model, has fundamentally changed the way humans interac...
详细信息
ISBN:
(数字)9798331531119
ISBN:
(纸本)9798331531126
The paper discusses the integration and use of generative artificial intelligence technologies in education. Generative AI, such as OpenAI, in particular the GPT model, has fundamentally changed the way humans interact with machines. Advanced technologies in the field of generative AI in education are mostly used to personalize learning experiences by dynamically customizing learning materials according to the needs of learners, thus enabling the improvement of outcomes. This article explores the use of generative AI tools with the aim of assessing how useful students perceive these tools to be. The findings show mixed receptivity from users, highlighting the critical balance in using innovative AI capabilities through AI.
Artificial Intelligence (AI) significantly enhances adaptive learning by personalizing and tailoring instruction to individual student needs. AI analyzes data in real-time to create personalized learning paths based o...
详细信息
ISBN:
(数字)9798331531119
ISBN:
(纸本)9798331531126
Artificial Intelligence (AI) significantly enhances adaptive learning by personalizing and tailoring instruction to individual student needs. AI analyzes data in real-time to create personalized learning paths based on students' strengths, weaknesses, and preferences, which keeps students engaged and motivated. A major benefit of AI in adaptive learning is the provision of real-time feedback and assessment, allowing students to correct mistakes promptly and understand concepts more thoroughly. AI-based intelligent tutoring systems are primarily intended to simulate personalized tutoring processes that guide students in complex problem-solving and answering questions. It is convenient in teaching mathematics, sciences, and languages. AI also supports inclusive education, dealing with diversified learning requirements and styles, such as those of learners with disabilities. For the teacher, AI acts as a reflector of student performance so that one can intervene early and make adjustments in the method of instruction by creating effective learning environments. AI technology is a field in constant development and harbors the potential to change the face of adaptive learning, bringing an upswing in educational outcomes. This article will summarize the advantages and features that merit improvement of the AI-embedded adaptive learning systems with student feedback.
暂无评论