Safe traffic management requires citywide flow projections. Transportation, public safety, and municipal planning are substantially affected. It forecasts city intake and outflow using flow data. Traditional methods a...
详细信息
Despite its high energy and hardware efficiency, some defects of the reconfigurable intelligence surface (RIS) technology have come to be realized, including the severe fading loss and restricted-to-half-space coverag...
Despite its high energy and hardware efficiency, some defects of the reconfigurable intelligence surface (RIS) technology have come to be realized, including the severe fading loss and restricted-to-half-space coverage. This paper proposes a novel double-faced-active (DFA)-RIS structure to overcome these defects. Besides, we utilize this novel DFA-RIS to improve power saving of the communication system. Unlike traditional power saving literature, we aim at fulfilling queueing stability and long-term power minimization in a downlink system assisted by the DFA-RIS, with a realistic data arriving process taken into consideration. Enlightened by Lyapunov control theory, we propose an online optimization strategy that adaptively adjusts DFA-RIS configuration. Each online problem can be efficiently solved by leveraging alternative directional method of multipliers (ADMM) method. Numerical results demonstrate the effectiveness of our proposed Lyapunov-guided strategy and DFA-RIS’ superiority over the classical passive RIS.
In the current paper we describe how Watson Experience Manager (WEM), an industrial Question Answering (QA) tool developed by IBM, has been used in an educational context at the National Technical University of Athens...
详细信息
ISBN:
(纸本)9781509042418
In the current paper we describe how Watson Experience Manager (WEM), an industrial Question Answering (QA) tool developed by IBM, has been used in an educational context at the National Technical University of Athens (NTUA). During the postgraduate course on data Science, three student teams experimented with WEM's QA capabilities on three different topics, namely, Nutrition, Autism and New York sightseeing. We present WEM, the workflow followed by the teams together with qualitative and quantitative experimental evaluations.
Relay-assisted connectivity control for underwater high-pace verbal exchange networks improves verbal exchange velocity and reliability by connecting Wi-Fi networks to relays. By allowing communication among unique ne...
详细信息
Visibility-based shading techniques for laptop snapshots and Visualization can provide realistic and perceptual shading consequences with the aid of utilizing data from the scene's visibility shape. Those methods ...
详细信息
Automatic parallelization improves the performance of serial program by automatically converting to parallel program. Automatic parallelization typically works in three phases: check for data dependencies in the input...
详细信息
In recent years, the proliferation of wireless devices has contributed to the emergence of new set of applications termed as Location Based Services (LBS). LBS provide privileges to mobile users based on their proximi...
详细信息
In recent years, the proliferation of wireless devices has contributed to the emergence of new set of applications termed as Location Based Services (LBS). LBS provide privileges to mobile users based on their proximity to a facility. In order to gain benefits, users may lie or falsely claim their location. Hence, it is essential to verify the legitimacy of users. In this paper, we propose our novel solution for generating location proof for mobile users and verification of the location claim by application services. Our protocol exploits unique Wi-Fi signal characteristics and employs an information theoretically secure fuzzy vault scheme. We provide a detailed theoretical and experimental evaluation of our protocol. Our solution is faster by an order of magnitude, and the performance of our scheme is independent of the location tag size and distance between the mobile user and location proof provider compared to the state-of-the-art.
The growth of multivalued logic over the 21-year period from 1971 through 1991, as indicated by papers in the International Symposium on Multiple-Valued Logic, is examined. Of specific interest are trends in research ...
详细信息
The growth of multivalued logic over the 21-year period from 1971 through 1991, as indicated by papers in the International Symposium on Multiple-Valued Logic, is examined. Of specific interest are trends in research topics, including patterns of growth and decline. Also considered is the demographics of the contributing authors. This includes the distributions of authors by country, the percentage of authors who are new, the percentage of new authors who return, and the distribution of authors by affiliation (acedemia, industry, and government). To derive these statistics, a database of papers, authors, and topics was developed.< >
Text-based Statistical steganography is one of the most non-human detectable methods of embedding hidden messages in plain text format which is useful in concealing information. Steganalysis is its counter, the proces...
详细信息
ISBN:
(数字)9798350372120
ISBN:
(纸本)9798350372137
Text-based Statistical steganography is one of the most non-human detectable methods of embedding hidden messages in plain text format which is useful in concealing information. Steganalysis is its counter, the process of detecting if a text has any encrypted data in it. This paper applies quantum computing to create DeepKet Embedding, which optimizes the space requirements for word embeddings similar to Word2Vec. DeepKet is benchmarked against existing embedding layers and a significant size reduction is achieved while maintaining accuracy for steganalysis.
暂无评论