Browsing Scientific Publications in Information and Communication Technology by Subject "VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413"
Now showing items 1-14 of 14
-
A two-armed bandit based scheme for accelerated decentralized learning
(Lecture Notes in Computer Science;6704, Chapter; Peer reviewed, 2011)The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions ... -
Accelerated Bayesian learning for decentralized two-armed bandit based decision making with applications to the Goore Game
(Journal article; Peer reviewed, 2012)The two-armed bandit problem is a classical optimization problem where a decision maker sequentially pulls one of two arms attached to a gambling machine, with each pull resulting in a random reward. The reward distributions ... -
An intelligent architecture for service provisioning in pervasive environments
(Chapter; Peer reviewed, 2011)The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention ... -
Anomaly detection in dynamic systems using weak estimators
(Journal article; Peer reviewed, 2011)Anomaly detection involves identifying observations that deviate from the normal behavior of a system. One of the ways to achieve this is by identifying the phenomena that characterize “normal” observations. Subsequently, based ... -
Ant colony optimisation for planning safe escape routes
(Lecture Notes in Computer Science;7906, Chapter; Peer reviewed, 2013)An emergency requiring evacuation is a chaotic event filled with uncertainties both for the people affected and rescuers. The evacuees are often left to themselves for navigation to the escape area. The chaotic situation ... -
Level-crossing rate and average duration of fades of the envelope of mobile-to-mobile fading channels in K-parallel dual-hop relay networks
(Chapter; Peer reviewed, 2009)This paper studies the fading behavior of narrowband mobile-to-mobile (M2M) fading channels in dual-hop distributed cooperative multi-relay systems under non-line-of-sight (NLOS) propagation conditions. M2M fading channels ... -
Modeling and performance analysis of energy efficiency binary power control in MIMO-OFDM wireless communication systems
(Journal article; Peer reviewed, 2011)The energy efficiency optimization of the binary power control scheme for MIMO-OFDM wireless communication systems is formulated, and then a global optimization solution of power allocation is derived. Furthermore, a new ... -
Multi-class pairwise linear dimensionality reduction using heteroscedastic schemes
(Peer reviewed; Journal article, 2010)Linear dimensionality reduction (LDR) techniques have been increasingly important in pattern recognition (PR) due to the fact that they permit a relatively simple mapping of the problem onto a lower-dimensional subspace, ... -
Networking logistic neurons can yield chaotic and pattern recognition properties
(Chapter; Peer reviewed, 2011)Over the last few years, the field of Chaotic Neural Networks (CNNs) has been extensively studied because of their potential applications in the understanding/recognition of patterns and images, their associative memory ... -
On the analysis of a new Markov chain which has applications in AI and machine learning
(Chapter; Peer reviewed, 2011)In this paper, we consider the analysis of a fascinating Random Walk (RW) that contains interleaving random steps and random "jumps". The characterizing aspect of such a chain is that every step is paired with its counterpart ... -
Performance Analysis of Wideband Sum-of-Cisoids-Based Channel Simulators with Respect to the Bit Error Probability of DPSK OFDM Systems
(Journal article; Peer reviewed, 2009)In this paper, we analyze the performance of a wideband sum-of-cisoids (SOC) channel simulator w.r.t. the bit error probability (BEP) of differential phase-shift keying (DPSK) orthogonal frequency division multiplexing ... -
The Riemann sum method for the design of sum-of-cisoids simulators for Rayleigh fading channels in non-isotropic scattering environments
(Journal article; Peer reviewed, 2009)In this paper, we introduce the Riemann sum method (RSM) as an effective tool for the design of sum-of-cisoids (SOC) simulators for narrowband mobile Rayleigh fading channels under non-isotropic scattering conditions. We ... -
A study of the influence of shadowing on the statistical properties of the capacity of mobile radio channels
(Journal article; Peer reviewed, 2009)This paper studies the influence of shadowing on the statistical properties of the channel capacity. The problem is addressed by using a Suzuki process as an appropriate statistical channel model for land mobile terrestrial ... -
Tracking the preferences of users using weak estimators
(Lecture Notes in Computer Science;7106, Chapter; Peer reviewed, 2011)Since a social network, by definition, is so diverse, the problem of estimating the preferences of its users is becoming increasingly essential for personalized applications which range from service recommender systems to ...