Showing 121 - 140 results of 151 for search 'Game Show Network', query time: 0.07s Refine Results
  1. 121

    Penerapan Deep Convolutional Generative Adversarial Network Untuk Menciptakan Data Sintesis Perilaku Pengemudi Dalam Berkendara by Michael Stephen Lui, Fitra Abdurrachman Bachtiar, Novanto Yudistira

    Published 2023-10-01
    “…DCGAN terdiri dari dua neural network bernama generator dan discriminator yang membentuk hubungan ­zero-sum game. …”
    Get full text
    Article
  2. 122

    “Faster, Higher, Stronger – Together”?: the Crisis of the World Sports Movement in the Context of the Pandemic and the Problem of Racism by E. V. Khakhalkina, A. V. Munko

    Published 2022-07-01
    “…European Football Championship and Olympic Games in Tokyo 2021, FIFA 2022 qualifiers show some politically motivated refereeing, as well as bursts of racism on the part of individual participants. …”
    Get full text
    Article
  3. 123

    Distributed Joint Cluster Formation and Resource Allocation Scheme for Cooperative Data Collection in Virtual MIMO-Based M2M Networks by Xi Luan, Jianjun Wu, Yuxin Cheng, Haige Xiang

    Published 2015-01-01
    “…An efficient data collection scheme plays an important role for the real-time intelligent monitoring in many machine-to-machine (M2M) networks. In this paper, a distributed joint cluster formation and resource allocation scheme for data collection in cluster-based M2M networks is proposed. …”
    Get full text
    Article
  4. 124

    Intelligent power control for covert communication in cognitive Internet of things by Zan LI, Xiaomin LIAO, Jia SHI, Pei XIAO

    Published 2020-03-01
    “…In order to solve the security problem of cognitive Internet of things (IoT),an intelligent power control algorithm of covert communication in cognitive IoT based on generative adversarial network was proposed.Firstly,the covert communication optimization problem in the cognitive IoT was transformed into a dynamic game between the cognitive IoT user and the eavesdropper.Then,the generator imitated the cognitive IoT user,while the discriminator imitated the eavesdropper.The generator and the discriminator were constructed by the three-layer neural network respectively.Through the two-person zero-sum game,the learning optimization process was realized to achieve the Nash equilibrium,and finally the covert power control scheme was obtained.The simulation results show that the proposed algorithm can not only obtain near-optimal covert power control scheme with rapid convergence ability,but also be more practical in the future cognitive IoT.…”
    Get full text
    Article
  5. 125
  6. 126

    Presentation of knowledge sharing model in Bank Maskan Iran by Maryam Firoozi, ahmad vedadi, alireza Amirkabiri

    Published 2024-06-01
    “…Gholipour domyeh (2023) investigated the simultaneous optimization of knowledge sharing and customer loyalty in social networks under the digital marketing approach. The results of the integrated approach on a company active in the field of digital marketing in Tehran showed that there is a significant positive effect of 6.47% between customer loyalty and knowledge sharing at a significance level of 1%. …”
    Get full text
    Article
  7. 127

    The phenomenon of laziness as a risk factor of high school students' fascination with gadgets by Ranno I. Sunnatova

    Published 2021-10-01
    “…In the study presented in the paper, the term passion for computer games and viewing social networks is used as a predictor of computer addiction and, which is not legally defined as addiction, but its blocking effect on the educational activity and productivity of schoolchildren can be stated. …”
    Get full text
    Article
  8. 128
  9. 129

    A Wi-Fi sensing method for complex continuous human activities based on CNN-BiGRU by Yang LIU, Anming DONG, Jiguo YU, Kai ZHAO, You ZHOU

    Published 2023-12-01
    “…Human activity sensing based on Wi-Fi channel state information (CSI) has an important application prospect in future intelligent interaction scenarios such as virtual reality, intelligent games, and the metaverse.Accurate sensing of complex and continuous human activities is an important challenge for Wi-Fi sensing.Convolutional neural network (CNN) has the ability of spatial feature extraction but is poor at modeling the temporal features of the data.While long short-term memory (LSTM) network or gated recurrent unit (GRU) network, which are suitable for modeling time-series data, neglect learning spatial features of data.In order to solve this problem, an improved CNN that integrates bidirectional gated recurrent unit (BiGRU) network was proposed.The bi-directional feature extraction ability of BiGRU was used to capture the correlation and dependence of the front and back information in the time series data.The extraction of the spatiotemporal features of the time series CSI data was realized, and then the mapping relationship between the action and the CSI data was present.Thus the recognition accuracy of the complex continuous action was improved.The proposed network structure was tested with basketball actions.The results show that the recognition accuracy of this method is above 95% under various conditions.Compared with the traditional multi-layer perceptron (MLP), CNN, LSTM, GRU, and attention based bidirectional long short-term memory (ABLSTM) baseline methods, the recognition accuracy has been improved by 1%~20%.…”
    Get full text
    Article
  10. 130
  11. 131

    Intelligent planning method for cyber defense strategies based on bounded rationality by Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN

    Published 2023-05-01
    “…Considering that network defense subjects were usually resource-constrained, an intelligent planning and au-tonomous implementation of network defense strategies under bounded rationality was studied considering the concept of intelligent confrontation.First, attack graph, general knowledge and domain-specific knowledge were fused to construct a network defense security ontology.On that basis, knowledge reasoning was utilized to recommend security defense strategies to better adapt to the security needs of protected network information assets and current attack threats.Finally, an autonomous planning and implementation of defense strategies was achieved under the constraints of limited network security defense resources and dynamic changes of network information assets with the help of bounded rationality.The example shows that the proposed method is robust under dynamic attacks.The experiments show that the defense effec-tiveness is improved by 5.6%~26.12% compared with existing game theory and attack graph-based methods against a typical APT attack.…”
    Get full text
    Article
  12. 132

    Cooperative content downloading scheme based on D2D multicast communications by Lianxin YANG, Dan WU, Feng YUAN, Chao YUE, Qinxue FU

    Published 2020-11-01
    “…Aiming at the content downloading scenario in the network such as cellular network and vehicular network,a cooperative content downloading scheme based on device-to-device multicast communications was proposed to improve the content downloading performance.Such a scheme took advantage of the proximity feature of the content requesters and groups them into disjoint clusters.Firstly,the base station delivered the entire content to a cluster,and each content requester in a cluster downloaded a proportion of the entire content.Then,the content requesters took turns sharing their downloaded content with other content requesters in the same cluster.In this way,the additional resource consumption of content sharing in a cluster was shared by the content requesters in the cluster together.During this process,a pricing-based approach was proposed to motivate these content requesters to cooperate with each other.Such an approach only required the base station to maintain a content downloading price.Based on this,the joint issue of user clustering,link scheduling and power allocation was studied to minimize the total cost of content requesters.To obtain a superior solution with reductive complexity,a joint optimization algorithm was designed based on the coalition formation game.Numerical results show that compared with the traditional non-cooperative scheme,the total cost of content requesters was reduced by 37.15%.Under different numbers of content requesters and cellular users,the proposed scheme is both superior to other benchmark schemes.…”
    Get full text
    Article
  13. 133

    A cooperative jamming decision-making method based on multi-agent reinforcement learning by Bingchen Cai, Haoran Li, Naimin Zhang, Mingyu Cao, Han Yu

    Published 2025-02-01
    “…This paper addresses the complex electromagnetic game involving multiple active jammers and radar systems by proposing a multi-agent reinforcement learning-based cooperative jamming decision-making method (MA-CJD). …”
    Get full text
    Article
  14. 134

    An Optimized Player Taxonomy Model for Mobile MMORPGs with Millions of Users by Fang You, Jianping Liu, Xinjian Guan, Jianmin Wang, Zibin Zheng, Peter Tam

    Published 2011-01-01
    “…In the MMORPGs, a stability player taxonomy model is very important for game design. It helps to balance different types of players and improve business strategy of the game. …”
    Get full text
    Article
  15. 135

    A Gradient-Based Reinforcement Learning Algorithm for Multiple Cooperative Agents by Zhen Zhang, Dongqing Wang, Dongbin Zhao, Qiaoni Han, Tingting Song

    Published 2018-01-01
    “…The simulations show that the PMR-EGA displays consistently an excellent performance for both stochastic games.…”
    Get full text
    Article
  16. 136

    Development and Complex Dynamics at School Environment by Miguel Angel Fuentes, Juan Pablo Cárdenas, Natalia Carro, Mariana Lozada

    Published 2018-01-01
    “…The intervention consisted of 8 one-hour long sessions comprising mindfulness-based practices, collaborative activities that required cooperation, and perspective-taking instances in which children shared feelings, perceptions, and needs felt during the activities. We used complex network and game theory to evaluate pre-post-intervention variations. …”
    Get full text
    Article
  17. 137

    A privacy-enhanced framework with deep learning for botnet detection by Guangli Wu, Xingyue Wang

    Published 2025-01-01
    “…Organizations or individuals use network traffic to mine botnet communication behavior features. …”
    Get full text
    Article
  18. 138

    Incentive Mechanism Design for Distributed Autonomous Organizations Based on the Mutual Insurance Scenario by Yiguang Pan, Xiaomei Deng

    Published 2021-01-01
    “…The results show that blind expansion without review aggravates the overall risk pool’s moral hazard, in the context of mutual insurance. …”
    Get full text
    Article
  19. 139

    Réseaux d’affaires en justice. La concurrence et les pouvoirs (Couronne d’Aragon, xive siècle) by Claude Denjean

    Published 2023-12-01
    “…Fluid, versatile, modifiable, and diversely mobilized, mobilized networks prevail for business, without erasing the feudal structure, watermark, and rules of the game. …”
    Get full text
    Article
  20. 140

    Changes in Internet Activities and Influencing Factors for Problematic Internet Use During the COVID-19 Pandemic in Korean Adolescents: Repeated Cross-Sectional Study by Sol I Kim, Jae-Chan Jin, Seo-Koo Yoo, Doug Hyun Han

    Published 2025-02-01
    “…In 2019, both the game and video groups had higher YIAS scores than other groups (F5=9.37; P<.001), and by 2022, the YIAS scores among the game, video, and Social Network Service groups did not differ significantly. …”
    Get full text
    Article