Engineering Applications of Artificial Intelligence
Papers 4,203
1 page of 421 pages (4,203 results)
Abstract null null To detect social signals such as laughter and filler events in an audio recording, the most straightforward way is to utilize a Hidden Markov Model — or these days a Hidden Markov Model/Deep Neural Network (HMM/DNN) hybrid. HMM/DNNs, however, perform best if the DNN outputs are scaled by dividing them by the a priori class probabilities first, before applying a dynamic or Viterbi beam search. These class a priori probability values (or priors for short) are usually estimated b...
Abstract null null Sine Cosine Algorithm (SCA) that is one of the population-based metaheuristic optimization algorithms basically consists of the updating mechanism based on sine and cosine functions. In this algorithm, a few random and adaptive variables are also utilized for more effective motions of the candidate solutions. SCA has some drawbacks like other some metaheuristic algorithms. SCA tends to be stuck into the local regions in the search space and this affects negatively on the compu...
#1Fernando G. Papi (UFSC: Universidade Federal de Santa Catarina)H-Index: 1
#2Jomi Fred Hübner (UFSC: Universidade Federal de Santa Catarina)H-Index: 24
Last. Maiquel de Brito (UFSC: Universidade Federal de Santa Catarina)H-Index: 6
view all 3 authors...
Abstract null null Multi-Agent systems technology can offer valuable tools to develop applications in domains involving transactions of assets. However, they usually do not have a proper support for reliable and decentralized recording of the transactions that are common in this kind of system. This support can be provided by the Blockchain technology. Furthermore, it is important to have means to represent in the system concepts that are intangible, such as asset and ownership. This paper prese...
#1Lipeng Pan (UESTC: University of Electronic Science and Technology of China)
Abstract null null Intuitionistic fuzzy set (IFS) is a classical branch of fuzzy set, which has advantage to deal with uncertain problems. In IFS, similarity measure is an important fundamental concept, it is used to measure consistency between different intuitionistic fuzzy sets (IFSs) and becomes a key parameter in fuzzy decision system. However, the previous methods of similarity measure do not take enough account the effect of hesitancy degree on membership degree and non-membership degree, ...
#1Nurul Afiqah Burhanuddin (UPM: Universiti Putra Malaysia)
#2Mohd Bakri Adam (UPM: Universiti Putra Malaysia)H-Index: 10
Last. Kamarulzaman Ibrahim (NUM: National University of Malaysia)H-Index: 17
view all 3 authors...
Abstract null null In this paper, we present a constrained Dirichlet process mixture model with labels as side information. Specifically, the labeled information is incorporated through the use of a product partition prior to give clusters of instances with similar labels a higher prior preference. The proposed formulation is further extended to handle multiple side information. The empirical results on several benchmark datasets show that our method can consistently improve its clustering perfo...
#1Naveed Ahmad Khan (AWKUM: Abdul Wali Khan University Mardan)H-Index: 5
#2Muhammad Sulaiman (AWKUM: Abdul Wali Khan University Mardan)H-Index: 13
Last. Miftahuddin (Syiah Kuala University)H-Index: 1
view all 5 authors...
Abstract null null In recent studies, several chaos-based secure communication (CBSC) systems are developed and are assumed to be effective and promising tools for balancing communications in wireless applications. The reliability of a wireless communication system is dependent on the synchronization between receiving and transmitting nodes. Therefore, it is crucial to analyze the mathematical models for different enhancements through CBSC and avoid the difficulty in synchronization. We have des...
#1Javier García (Carlos III University of Madrid)H-Index: 11
#2Ismael Sagredo (Universidad Internacional de La Rioja)
Abstract null null Deep Reinforcement Learning systems are now a hot topic in Machine Learning for their effectiveness in many complex tasks, but their application in safety-critical domains (e.g., robot control or self-autonomous driving) remains dangerous without mechanism to detect and prevent risk situations. In Deep RL, such risk is mostly in the form of adversarial attacks, which introduce small perturbations to sensor inputs with the aim of changing the network-based decisions and thus ca...
#1Antonio Sala (UPV: Universitat Politècnica de València)H-Index: 26
#2Leopoldo Armesto (UPV: Universitat Politècnica de València)H-Index: 14
Abstract null null This work proposes a new criterion for adaptive meshing in polyhedral partitions which interpolate a value function in Approximate Dynamic Programming (ADP) in optimal control problems. The criterion adds new points to a simplicial mesh, based on: a user-defined initial condition probability density function which determines ‘influential’ regions of the state space, uncertainty (variance) propagation, and temporal-difference error. A collection of lemmas justifies the algorith...
#1Deming Lei (WUT: Wuhan University of Technology)H-Index: 2
Last. Ming Li
view all 3 authors...
#1Jian Guo (BUTE: Budapest University of Technology and Economics)H-Index: 3
#2Istvan Harmati (BUTE: Budapest University of Technology and Economics)H-Index: 10
Abstract null null This study presents a cellular lane-changing model where the traffic lanes are discretized into cells and formulates the lane-changing process as a multi-player non-zero-sum non-cooperative game in a connected environment where the real-time surrounding traffic data is shared. In a congested traffic scenario where a large quantity of mandatory lane-changing maneuvers are required simultaneously, the size of the game is extended dynamically (i.e., 2–5 players in this case, and ...
Top fields of study
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.