|
|
|
Yuzhu Zhang and Hao Xu
This study investigates the problem of decentralized dynamic resource allocation optimization for ad-hoc network communication with the support of reconfigurable intelligent surfaces (RIS), leveraging a reinforcement learning framework. In the present co...
ver más
|
|
|
|
|
|
|
Soohyun Cho
Herein, we propose the use of the logarithmic values of data transmission rates for multi-armed bandit (MAB) algorithms that adjust the modulation and coding scheme (MCS) levels of data packets in carrier-sensing multiple access/collision avoidance (CSMA...
ver más
|
|
|
|
|
|
|
Aristeidis Karras, Christos Karras, Spyros Sioutas, Christos Makris, George Katselis, Ioannis Hatzilygeroudis, John A. Theodorou and Dimitrios Tsolis
This study explores the design and capabilities of a Geographic Information System (GIS) incorporated with an expert knowledge system, tailored for tracking and monitoring the spread of dangerous diseases across a collection of fish farms. Specifically t...
ver más
|
|
|
|
|
|
|
Pedro Santana and José Moura
To handle the exponential growth of data-intensive network edge services and automatically solve new challenges in routing management, machine learning is steadily being incorporated into software-defined networking solutions. In this line, the article p...
ver más
|
|
|
|
|
|
|
Yuxin Jiao, Zhikun Lin, Long Yu and Xiaozhu Wu
Task allocation is a critical issue of spatial crowdsourcing. Although the batching strategy performs better than the real-time matching mode, it still has the following two drawbacks: (1) Because the granularity of the batch size set obtained by batchin...
ver más
|
|
|
|
|
|
|
Peng Wang, Jingju Liu, Dongdong Hou and Shicheng Zhou
The application of cybersecurity knowledge graphs is attracting increasing attention. However, many cybersecurity knowledge graphs are incomplete due to the sparsity of cybersecurity knowledge. Existing knowledge graph completion methods do not perform w...
ver más
|
|
|
|
|
|
|
Elena Gangan,Milos Kudus,Eugene Ilyushin
Pág. 12 - 27
The main goal of this paper is to introduce the reader to the multiarmed bandit algorithms of different types and to observe how the industry leveraged them in advancing recommendation systems. We present the current state of the art in RecSys and then ...
ver más
|
|
|
|
|
|
|
Xiaohan Kang, Hong Ri, Mohd Nor Akmal Khalid and Hiroyuki Iida
The attraction of games comes from the player being able to have fun in games. Gambling games that are based on the Variable-Ratio schedule in Skinner?s experiment are the most typical addictive games. It is necessary to clarify the reason why typical ga...
ver más
|
|
|
|
|
|
|
Yongqun Chen, Huaibei Zhou, Ruoshan Kong, Li Zhu and Huaqing Mao
Due to the spectrum varying nature of cognitive radio networks, secondary users are required to perform spectrum handoffs when the spectrum is occupied by primary users, which will lead to a handoff delay. In this paper, based on the multi-armed bandit f...
ver más
|
|
|
|