Artificial Intelligence

Simulation code for the paper:  "AoI Minimization in Energy Harvesting and Spectrum Sharing Enabled 6G Networks" 

we use a neural network to approximate the Q-value function. The state is given as the input and the Q-value of all possible actions is generated as the output.

 

Categories:
529 Views

This dataset consists of temporal and temperature drift characteristics of Si3N4-gate iSFET andsupplementary files

Categories:
438 Views

UCSA-20 contains 9,601 user reviews, of which 4,843 are positive and the remaining are negative

Categories:
1650 Views

This dataset consists of 2579 image pairs (5158 images in total) of wood veneers before and after drying. The high-resolution .png images (generally over 4000x4000) have a white background. The data has been collected from a real plywood factory. Raute Corporation is acknowledged for making this dataset public. The manufacturing process is well visualized here: https://www.youtube.com/watch?v=tjkIYCEVXko.

Categories:
1642 Views

Without publicly available dataset, specifically in handwritten document recognition (HDR), we cannot make a fair and/or reliable comparison between the methods. Considering HDR, Indic script’s document recognition is still in its early stage compared to others such as Roman and Arabic. In this paper, we present a page-level handwritten document image dataset (PHDIndic_11), of 11 official Indic scripts: Bangla, Devanagari, Roman, Urdu, Oriya, Gurumukhi, Gujarati, Tamil, Telugu, Malayalam and Kannada.

Categories:
1625 Views

An offline handwritten signature dataset from two most popular scripts in India namely Roman and Devanagari is proposed here. 

Categories:
1950 Views

<p>The dataset comprises 2035 images from 14 different software architectural patterns (100+ images each), viz., Broker, Client Server, Microkernel, Repository, Publisher-Subscriber, Peer-to-Peer, Event Bus, Model View Controller, REST, Layered, Presentation Abstraction Controller, Microservices, and Space-based patterns.</p>

Categories:
839 Views

Dataset including over 40,000 generated images of malicious binaries for malware classification in machine learning as outlined in NARAD - A Novel Auto-learn Real-time Fuzzy Machine Learning Anomaly Detection and Classification System.

Categories:
5428 Views

The simulation code for the paper:

"AoI-Aware Resource Allocation for Platoon-Based C-V2X Networks via Multi-Agent Multi-Task Reinforcement Learning"

 

The overall architecture of the proposed MARL framework is shown in the figure.

 

Modified MADDPG: This algorithm trains two critics (different from legacy MADDPG) with the following functionalities:

Categories:
1076 Views

Medical Symptoms are sometimes very tricky to analyse in real time as it takes time for example, first to detect the symptoms then to perform some tests and finally coming to a solution. This process can be eliminated and lot of time can be saved by introducing the concept of Deep learning. CNNs create a network for extracting the features of a given image in order to evaluate the image based on the conditions required. This property of the CNN is used as a certain advantage in order to detect the symptoms based on the type of X-ray images provided.

Categories:
2946 Views

Pages