-
121
Penerapan Deep Convolutional Generative Adversarial Network Untuk Menciptakan Data Sintesis Perilaku Pengemudi Dalam Berkendara
Published 2023-10-01“…DCGAN terdiri dari dua neural network bernama generator dan discriminator yang membentuk hubungan zero-sum game. …”
Get full text
Article -
122
“Faster, Higher, Stronger – Together”?: the Crisis of the World Sports Movement in the Context of the Pandemic and the Problem of Racism
Published 2022-07-01“…European Football Championship and Olympic Games in Tokyo 2021, FIFA 2022 qualifiers show some politically motivated refereeing, as well as bursts of racism on the part of individual participants. …”
Get full text
Article -
123
Distributed Joint Cluster Formation and Resource Allocation Scheme for Cooperative Data Collection in Virtual MIMO-Based M2M Networks
Published 2015-01-01“…An efficient data collection scheme plays an important role for the real-time intelligent monitoring in many machine-to-machine (M2M) networks. In this paper, a distributed joint cluster formation and resource allocation scheme for data collection in cluster-based M2M networks is proposed. …”
Get full text
Article -
124
Intelligent power control for covert communication in cognitive Internet of things
Published 2020-03-01“…In order to solve the security problem of cognitive Internet of things (IoT),an intelligent power control algorithm of covert communication in cognitive IoT based on generative adversarial network was proposed.Firstly,the covert communication optimization problem in the cognitive IoT was transformed into a dynamic game between the cognitive IoT user and the eavesdropper.Then,the generator imitated the cognitive IoT user,while the discriminator imitated the eavesdropper.The generator and the discriminator were constructed by the three-layer neural network respectively.Through the two-person zero-sum game,the learning optimization process was realized to achieve the Nash equilibrium,and finally the covert power control scheme was obtained.The simulation results show that the proposed algorithm can not only obtain near-optimal covert power control scheme with rapid convergence ability,but also be more practical in the future cognitive IoT.…”
Get full text
Article -
125
Heavy Users, Mobile Gamers, and Social Networkers: Patterns of Objective Smartphone Use in Parents of Infants and Associations With Parent Depression, Sleep, Parenting, and Problem...
Published 2024-01-01“…., messaging, social media, mobile gaming, video chat) and phone use across contexts (e.g., during feeding and at bedtime). …”
Get full text
Article -
126
Presentation of knowledge sharing model in Bank Maskan Iran
Published 2024-06-01“…Gholipour domyeh (2023) investigated the simultaneous optimization of knowledge sharing and customer loyalty in social networks under the digital marketing approach. The results of the integrated approach on a company active in the field of digital marketing in Tehran showed that there is a significant positive effect of 6.47% between customer loyalty and knowledge sharing at a significance level of 1%. …”
Get full text
Article -
127
The phenomenon of laziness as a risk factor of high school students' fascination with gadgets
Published 2021-10-01“…In the study presented in the paper, the term passion for computer games and viewing social networks is used as a predictor of computer addiction and, which is not legally defined as addiction, but its blocking effect on the educational activity and productivity of schoolchildren can be stated. …”
Get full text
Article -
128
Adaptive Dynamic Programming-based Tracking Controls of Multi-Motor Driven Systems
Published 2025-01-01Get full text
Article -
129
A Wi-Fi sensing method for complex continuous human activities based on CNN-BiGRU
Published 2023-12-01“…Human activity sensing based on Wi-Fi channel state information (CSI) has an important application prospect in future intelligent interaction scenarios such as virtual reality, intelligent games, and the metaverse.Accurate sensing of complex and continuous human activities is an important challenge for Wi-Fi sensing.Convolutional neural network (CNN) has the ability of spatial feature extraction but is poor at modeling the temporal features of the data.While long short-term memory (LSTM) network or gated recurrent unit (GRU) network, which are suitable for modeling time-series data, neglect learning spatial features of data.In order to solve this problem, an improved CNN that integrates bidirectional gated recurrent unit (BiGRU) network was proposed.The bi-directional feature extraction ability of BiGRU was used to capture the correlation and dependence of the front and back information in the time series data.The extraction of the spatiotemporal features of the time series CSI data was realized, and then the mapping relationship between the action and the CSI data was present.Thus the recognition accuracy of the complex continuous action was improved.The proposed network structure was tested with basketball actions.The results show that the recognition accuracy of this method is above 95% under various conditions.Compared with the traditional multi-layer perceptron (MLP), CNN, LSTM, GRU, and attention based bidirectional long short-term memory (ABLSTM) baseline methods, the recognition accuracy has been improved by 1%~20%.…”
Get full text
Article -
130
An edge cloud–based body data sensing architecture for artificial intelligence computation
Published 2019-04-01Get full text
Article -
131
Intelligent planning method for cyber defense strategies based on bounded rationality
Published 2023-05-01“…Considering that network defense subjects were usually resource-constrained, an intelligent planning and au-tonomous implementation of network defense strategies under bounded rationality was studied considering the concept of intelligent confrontation.First, attack graph, general knowledge and domain-specific knowledge were fused to construct a network defense security ontology.On that basis, knowledge reasoning was utilized to recommend security defense strategies to better adapt to the security needs of protected network information assets and current attack threats.Finally, an autonomous planning and implementation of defense strategies was achieved under the constraints of limited network security defense resources and dynamic changes of network information assets with the help of bounded rationality.The example shows that the proposed method is robust under dynamic attacks.The experiments show that the defense effec-tiveness is improved by 5.6%~26.12% compared with existing game theory and attack graph-based methods against a typical APT attack.…”
Get full text
Article -
132
Cooperative content downloading scheme based on D2D multicast communications
Published 2020-11-01“…Aiming at the content downloading scenario in the network such as cellular network and vehicular network,a cooperative content downloading scheme based on device-to-device multicast communications was proposed to improve the content downloading performance.Such a scheme took advantage of the proximity feature of the content requesters and groups them into disjoint clusters.Firstly,the base station delivered the entire content to a cluster,and each content requester in a cluster downloaded a proportion of the entire content.Then,the content requesters took turns sharing their downloaded content with other content requesters in the same cluster.In this way,the additional resource consumption of content sharing in a cluster was shared by the content requesters in the cluster together.During this process,a pricing-based approach was proposed to motivate these content requesters to cooperate with each other.Such an approach only required the base station to maintain a content downloading price.Based on this,the joint issue of user clustering,link scheduling and power allocation was studied to minimize the total cost of content requesters.To obtain a superior solution with reductive complexity,a joint optimization algorithm was designed based on the coalition formation game.Numerical results show that compared with the traditional non-cooperative scheme,the total cost of content requesters was reduced by 37.15%.Under different numbers of content requesters and cellular users,the proposed scheme is both superior to other benchmark schemes.…”
Get full text
Article -
133
A cooperative jamming decision-making method based on multi-agent reinforcement learning
Published 2025-02-01“…This paper addresses the complex electromagnetic game involving multiple active jammers and radar systems by proposing a multi-agent reinforcement learning-based cooperative jamming decision-making method (MA-CJD). …”
Get full text
Article -
134
An Optimized Player Taxonomy Model for Mobile MMORPGs with Millions of Users
Published 2011-01-01“…In the MMORPGs, a stability player taxonomy model is very important for game design. It helps to balance different types of players and improve business strategy of the game. …”
Get full text
Article -
135
A Gradient-Based Reinforcement Learning Algorithm for Multiple Cooperative Agents
Published 2018-01-01“…The simulations show that the PMR-EGA displays consistently an excellent performance for both stochastic games.…”
Get full text
Article -
136
Development and Complex Dynamics at School Environment
Published 2018-01-01“…The intervention consisted of 8 one-hour long sessions comprising mindfulness-based practices, collaborative activities that required cooperation, and perspective-taking instances in which children shared feelings, perceptions, and needs felt during the activities. We used complex network and game theory to evaluate pre-post-intervention variations. …”
Get full text
Article -
137
A privacy-enhanced framework with deep learning for botnet detection
Published 2025-01-01“…Organizations or individuals use network traffic to mine botnet communication behavior features. …”
Get full text
Article -
138
Incentive Mechanism Design for Distributed Autonomous Organizations Based on the Mutual Insurance Scenario
Published 2021-01-01“…The results show that blind expansion without review aggravates the overall risk pool’s moral hazard, in the context of mutual insurance. …”
Get full text
Article -
139
Réseaux d’affaires en justice. La concurrence et les pouvoirs (Couronne d’Aragon, xive siècle)
Published 2023-12-01“…Fluid, versatile, modifiable, and diversely mobilized, mobilized networks prevail for business, without erasing the feudal structure, watermark, and rules of the game. …”
Get full text
Article -
140
Changes in Internet Activities and Influencing Factors for Problematic Internet Use During the COVID-19 Pandemic in Korean Adolescents: Repeated Cross-Sectional Study
Published 2025-02-01“…In 2019, both the game and video groups had higher YIAS scores than other groups (F5=9.37; P<.001), and by 2022, the YIAS scores among the game, video, and Social Network Service groups did not differ significantly. …”
Get full text
Article