Sanchit Goyal Assignments

2013 | OriginalPaper | Buchkapitel

Intelligent Interaction in Accessible Applications

Advances in artificial intelligence over the past decade, combined with increasingly affordable computing power, have made new approaches to accessibility possible. In this chapter we describe three ongoing projects in the Department of Computer Scie

Erschienen in: A Multimodal End-2-End Approach to Accessible Computing (2013)

Autoren:
Sina Bahram, Arpan Chakraborty, Srinath Ravindran, Robert St. Amant

2018 | OriginalPaper | Buchkapitel

Konzeption und Implementierung eines Smart-Glasses-basierten Informationssystems für technische Dienstleistungen

Im Rahmen des GLASSROOM-Projekts wurde eine Werkzeugkette für das Erstellen, Verwalten und Anzeigen von Schritt-für-Schritt-Anleitungen in Form von Assistenzprozessen realisiert. Die Erstellung einer solchen Anleitung erfolgt entweder über Rapid …

Erschienen in: Digitalisierung in der Aus- und Weiterbildung (2018)

Autor:
Simon Schwantzer

2018 | OriginalPaper | Buchkapitel

Introduction to ASP.NET Core

The ASP.NET framework is the successor to Classic ASP and offers a vast variety of application models for building web-based applications fit for almost any scenario. To date, ASP.NET includes ASP.NET Web Pages for, like Classic ASP, creating …

Erschienen in: Modern API Design with ASP.NET Core 2 (2018)

Autor:
Fanie Reynders

2018 | OriginalPaper | Buchkapitel

Research Trends in Malware Detection on Android Devices

Mobile phones have become the necessity of modern human life to store our valuable information such as passwords, reminders, messages, photos, videos and social contacts. The advent in mobile technology has made human life easier and more …

Erschienen in: Data Science and Analytics (2018)

Autoren:
Leesha Aneja, Sakshi Babbar

2018 | OriginalPaper | Buchkapitel

Facial Expression Recognition for Motor Impaired Users

In today’s world touch screen devices are trending as people are dependent on their smartphones and tablets for much of their work, making it simple and convenient to store and access data anytime and anywhere. In such a bustling framework, some …

Erschienen in: Data Science and Analytics (2018)

Autoren:
Krishna Sehgal, Sanchit Goel, Rachna Jain

2018 | OriginalPaper | Buchkapitel

Further Choice Scenarios

Until now, we have focused on group recommendation techniques for choice scenarios, related to explicitly-defined items. However, further choice scenarios exist that differ in the way alternatives are represented and recommendations are …

Erschienen in: Group Recommender Systems (2018)

Autoren:
Alexander Felfernig, Ludovico Boratto, Martin Stettinger, Marko Tkalčič

2018 | OriginalPaper | Buchkapitel

Homerecording

Seit das Internet zum „Mitmach-Web“ (Web 2.0) geworden ist, kann sich jeder nach Wunsch als Podcaster, Youtuber oder Hobby-Regisseur betätigen. Durch schnellere Internetanbindungen wurde das Web multimedial und YouTube befindet sich nach Google …

Erschienen in: AV-Medien (2018)

Autoren:
Peter Bühler, Patrick Schlaich, Dominik Sinner

2018 | OriginalPaper | Buchkapitel

Standards for CPS

Cyber-physical system (CPS) has emerged as an enhancement to the existing generation of wireless sensor networks and embedded systems. The rapid growth in the applications of this platform calls for standardized guidelines that would ensure …

Erschienen in: Cyber Security for Cyber Physical Systems (2018)

Autoren:
Saqib Ali, Taiseera Al Balushi, Zia Nadir, Omar Khadeer Hussain

2018 | OriginalPaper | Buchkapitel

Embedded Systems Security for Cyber-Physical Systems

Embedded systems have become a core component in today’s technological era. Embedded systems are a combination of hardware and software specially designed to perform a specific task. They can control many common systems used today which are …

Erschienen in: Cyber Security for Cyber Physical Systems (2018)

Autoren:
Saqib Ali, Taiseera Al Balushi, Zia Nadir, Omar Khadeer Hussain

2018 | OriginalPaper | Buchkapitel

Introduction

At this age and time that we live in, coding is simply invaluable. It has the power to uplift your career, your future prospects, and even your intellectual capacity. Computation is driving one of the largest capital expansions in history, and …

Erschienen in: Learn JavaScript with p5.js (2018)

Autor:
Engin Arslan

2018 | OriginalPaper | Buchkapitel

E-Business in the Era of Digital Transformation

In recent years, the development of information technology has reached a new level of evolution. It should be noted, however, that digitalization and digital transformation are not fundamentally new phenomena. A phase marked by strong …

Erschienen in: Business Information Systems and Technology 4.0 (2018)

Autoren:
Uwe Leimstoll, Achim Dannecker, Hanspeter Knechtli, Michael Quade, Christian Tanner, Ralf Wölfle

2018 | OriginalPaper | Buchkapitel

Real Time Evaluation of Education Methods via Smart Mobile Technology

We design, implement and evaluate performance of Exantas application which is compatible with Android Operating Systems Smartphone devices. As Exantas tool was able to show ancients travelers the correct route to follow we show that our …

Erschienen in: Interactivity, Game Creation, Design, Learning, and Innovation (2018)

Autoren:
George Tsamis, Nikos Papadakis, Evangelos Tzirakis, Evi Katsaraki, Maria Rousaki, John Nikolopoulos, Kostas Vassilakis

2018 | OriginalPaper | Buchkapitel

Training the Mind: The GARDINER Platform

Recent research has shown that the systematic involvement of a person with games, which are designated to exercise memory and concentration, contributes to the long-term preservation of the human memory and therefore leads to the prevention of …

Erschienen in: Interactivity, Game Creation, Design, Learning, and Innovation (2018)

Autoren:
Nikolas Vidakis, Maria Skalidaki, Kostas Konstantoulakis, Lefteris Kalikakis, Michail Kalogiannakis, Kostas Vassilakis

2018 | OriginalPaper | Buchkapitel

Improving User Experience for Lost Heritage Sites with a User-Centered Indirect Augmented Reality Application

Using digital media technology, e.g. augmented reality, to convey information about cultural heritage, is becoming increasingly more common. While augmented reality is considered useful and innovative for this purpose, systems based on this …

Erschienen in: Interactivity, Game Creation, Design, Learning, and Innovation (2018)

Autoren:
Christian L. Jakobsen, Jon B. Larsen, Mads Luther Nørlem, Martin Kraus

2018 | OriginalPaper | Buchkapitel

Using Gamification for Supporting an Introductory Programming Course. The Case of ClassCraft in a Secondary Education Classroom

Old teaching methods mechanisms are no longer beneficial to the students. In traditional instructional methodology, where the lecture classes are perceived to be tedious by students, the gamification technology has a great advantage to solve the …

Erschienen in: Interactivity, Game Creation, Design, Learning, and Innovation (2018)

Autoren:
Stamatios Papadakis, Michail Kalogiannakis

2018 | OriginalPaper | Buchkapitel

A Review on Individual Assessment of Strength Training Using Smartphone Applications

This paper presents a state of the art review of popular strength training applications. The literature review and heuristic evaluation presented in this paper show that there is a large selection of strength training applications on the Android …

Erschienen in: Interactivity, Game Creation, Design, Learning, and Innovation (2018)

Autoren:
Nicolai B. K. Jensen, Michael B. Holte

2018 | OriginalPaper | Buchkapitel

BioSpil: Bringing Interactivity and Gaming into a Cinema-Context

This paper presents a study on a current phenomenon conceptualized as BioSpil, which brings interactivity and gaming into a cinema context. The study focused on two questions, namely in what way BioSpil can be called a game, and how it functions …

Erschienen in: Interactivity, Game Creation, Design, Learning, and Innovation (2018)

Autoren:
Tobias Tretow-Fish, Dan Andersen, Lisa Klemm Larsen, Eva Brooks

2018 | OriginalPaper | Buchkapitel

Software

Im letzten Kapitel haben Sie die Hardware eines Computers kennengelernt. Wörtlich übersetzt bezeichnet der Begriff hard ware (dt.: harte Ware) alles, was fest ist und damit in die Hand genommen werden kann. Bei Software passt die wörtliche …

Erschienen in: Informationstechnik (2018)

Autoren:
Peter Bühler, Patrick Schlaich, Dominik Sinner

2018 | OriginalPaper | Buchkapitel

PDF-Bearbeitung

Sie haben den Preflight einer PDF-Datei positiv abgeschlossen. Bei einer visuellen Überprüfung zeigen sich Fehler im Satz. Eine Möglichkeit wäre die Korrektur in der Ursprungsdatei, sofern Sie darauf Zugriff haben, und anschließend eine erneute …

Erschienen in: PDF (2018)

Autoren:
Peter Bühler, Patrick Schlaich, Dominik Sinner

2018 | OriginalPaper | Buchkapitel

PDF-Erstellung

Viele Wege führen zu PDF. Welcher ist nun der richtige? Soll das PDF für ein bestimmtes Ausgabemedium erstellt werden? Oder brauchen Sie ein universelles PDF, das dann je nach Ausgabemedium editiert und optimiert werden kann? Soll das PDF der …

Erschienen in: PDF (2018)

Autoren:
Peter Bühler, Patrick Schlaich, Dominik Sinner

2018 | OriginalPaper | Buchkapitel

Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP

Internet users are heavily relying on mobile terminals for content access, where the content is hosted and delivered by either third-party infrastructures (e.g., CDNs and clouds) or the content providers’ own delivery networks, or both. China has …

Erschienen in: Passive and Active Measurement (2018)

Autoren:
Zhenyu Li, Donghui Yang, Zhenhua Li, Chunjing Han, Gaogang Xie

2018 | OriginalPaper | Buchkapitel

A First Look at QUIC in the Wild

For the first time since the establishment of TCP and UDP, the Internet transport layer is subject to a major change by the introduction of QUIC. Initiated by Google in 2012, QUIC provides a reliable, connection-oriented low-latency and fully …

Erschienen in: Passive and Active Measurement (2018)

Autoren:
Jan Rüth, Ingmar Poese, Christoph Dietzel, Oliver Hohlfeld

2018 | OriginalPaper | Buchkapitel

RARE: A Systematic Augmented Router Emulation for Malware Analysis

How can we analyze and profile the behavior of a router malware? This is the motivating question behind our work focusing on router. Router-specific malware has emerged as a new vector for hackers, but has received relatively little attention …

Erschienen in: Passive and Active Measurement (2018)

Autoren:
Ahmad Darki, Chun-Yu Chuang, Michalis Faloutsos, Zhiyun Qian, Heng Yin

2018 | OriginalPaper | Buchkapitel

TCP CUBIC versus BBR on the Highway

4G Long Term Evolution (LTE) networks present new features of high capacities together with end-user mobility. These challenges have led to a gap in the understanding of the effectiveness of TCP congestion control algorithms in LTE networks with …

Erschienen in: Passive and Active Measurement (2018)

Autoren:
Feng Li, Jae Won Chung, Xiaoxiao Jiang, Mark Claypool

2018 | OriginalPaper | Buchkapitel

Components of an Artificial Pancreas System

This chapter provides an extensive review of the components of artificial pancreas (AP) systems. Continuous glucose monitoring (CGM) sensors, insulin pumps and control algorithms are the three basic components of all AP systems. Information about …

Erschienen in: Advances in Artificial Pancreas Systems (2018)

Autoren:
Ali Cinar, Kamuran Turksoy

2018 | OriginalPaper | Buchkapitel

Regional Innovation Systems and Global Flows of Knowledge

The literature on regional innovation systems emphasizes the role of the region as locus for interactive learning and knowledge exchange, stressing the importance of (geographical) proximity for innovation. Even though the importance of …

Erschienen in: New Avenues for Regional Innovation Systems - Theoretical Advances, Empirical Cases and Policy Lessons (2018)

Autoren:
Roman Martin, Heidi Wiig Aslesen, Markus Grillitsch, Sverre J. Herstad

2018 | OriginalPaper | Buchkapitel

A Secured Framework for Encrypted Messaging Service for Smart Device (Crypto-Message)

The involvement of technology in our life makes it more advance and provides access on our fingertip. It provides us with the capability to get connected with people and explore the information on the topics which is very beneficial for the ease …

Erschienen in: Information Systems Design and Intelligent Applications (2018)

Autoren:
Shopan Dey, Afaq Ahmad, Anil Kr. Chandravanshi, Sandip Das

2018 | OriginalPaper | Buchkapitel

Communication Is Culture

Just as every culture has its own unwritten rules that govern it, inside every culture there are similar unwritten rules that govern the communication endemic to that culture. Some of the rules are obscure and difficult to understand or learn …

Erschienen in: The Tech Professional's Guide to Communicating in a Global Workplace (2018)

Autor:
April Wells

2018 | OriginalPaper | Buchkapitel

Inferring Ontology Fragments from Semantic Role Typing of Lexical Variants

[Context and Motivation] Information systems depend on personal data to individualize services. To manage privacy expectations, companies use privacy policies to regulate what data is collected, used and shared. However, different terminological …

Erschienen in: Requirements Engineering: Foundation for Software Quality (2018)

Autoren:
Mitra Bokaei Hosseini, Travis D. Breaux, Jianwei Niu

2018 | OriginalPaper | Buchkapitel

ONParkinson – Innovative mHealth to Support the Triad: Patient, Carer and Health Professional

The ONParkinson mHealth platform aims to empower an integrated assistance to support end-users of the triad “people with Parkinson’s Disease, their carers and health professionals”, promoting the self-management in Parkinson’s disease. Therefore …

Erschienen in: Pervasive Computing Paradigms for Mental Health (2018)

Autoren:
Rui Neves Madeira, Carla Mendes Pereira, Sergiu Clipei, Patrícia Macedo

2018 | OriginalPaper | Buchkapitel

Two-Factor Authentication with End-to-End Password Security

We present a secure two-factor authentication (TFA) scheme based on the possession by the user of a password and a crypto-capable device. Security is “end-to-end” in the sense that the attacker can attack all parts of the system, including all …

Erschienen in: Public-Key Cryptography – PKC 2018 (2018)

Autoren:
Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena

2018 | OriginalPaper | Buchkapitel

Related Randomness Security for Public Key Encryption, Revisited

Motivated by the history of randomness failures in practical systems, Paterson, Schuldt, and Sibborn (PKC 2014) introduced the notion of related randomness security for public key encryption. In this paper, we firstly show an inherent limitation …

Erschienen in: Public-Key Cryptography – PKC 2018 (2018)

Autoren:
Takahiro Matsuda, Jacob C. N. Schuldt

2018 | OriginalPaper | Buchkapitel

Design and Implementation of Secure Multimedia Storage System

To keep the users’ multimedia data secure and private in the cloud, this paper designs and implements a secure multimedia storage system based on HDFS platform. The system provides different client software for windows and android to encrypt …

Erschienen in: Internet Multimedia Computing and Service (2018)

Autoren:
Guang-yu Gu, Qing Yi, Hao Zheng, Shu-juan Zhang, Bo-wu Sun

2018 | OriginalPaper | Buchkapitel

Piloting Digitally Enabled Knowledge Management to Improve Health Programs in Rural Bangladesh

Until recently, digitally enabled Knowledge Management (KM) activities in developing countries have more often than not been dismissed as unrealistic given challenges with access to electricity and the internet. However, a number of recent …

Erschienen in: Knowledge Management in Digital Change (2018)

Autoren:
Piers J. W. Bocock, Tara M. Sullivan, Rebecca Arnold, Rupali J. Limaye

2018 | OriginalPaper | Buchkapitel

A Novel Extended-Cloud Based Approach for Internet of Things

The Internet of Things(IoT) is the future Internet evolution towards a network of interconnected smart objects such as computers, smart phones, smart watches, smart televisions, smart cars and many more. It is a matter of concern that our current …

Erschienen in: Cloud Computing for Optimization: Foundations, Applications, and Challenges (2018)

Autoren:
Amitabha Chakrabarty, Tasnia Ashrafi Heya, Md. Arshad Hossain, Sayed Erfan Arefin, Kowshik Dipta Das Joy

2018 | OriginalPaper | Buchkapitel

Virtual Sex: Good, Bad or Ugly?

Computers have created a new world which enables people to have different experiences that may not be available or appropriate to have in the real world. Sexual activities are also a part this. Nowadays, sex relationships between humans and robots …

Erschienen in: Love and Sex with Robots (2018)

Autoren:
Hoshang Kolivand, Abdoulvahab Ehsani Rad, David Tully

2018 | OriginalPaper | Buchkapitel

Posthuman Desire in Robotics and Science Fiction

This article explores how human-posthuman intimate relationships are thematized in both robotics and in science fiction film, literature and robotic art. While on the one hand many engineers and computer scientists are working hard, albeit in an …

Erschienen in: Love and Sex with Robots (2018)

Autor:
Sophie Wennerscheid

2018 | OriginalPaper | Buchkapitel

Conclusion and Future Works

Recent technological advancement have emerged the data intensive tasks in wide distinctive areas such as commerce, earth science, astronomy, computational biology and others in boosting trend. Due to the various characteristics of data, it is …

Erschienen in: Optimized Cloud Based Scheduling (2018)

Autoren:
Rong Kun Jason Tan, John A. Leong, Amandeep S. Sidhu

2018 | OriginalPaper | Buchkapitel

Utilizing Smartphone and Tablet for Appliances Mobile Controller System

Reducing the electricity consumption is better for the planet and help to reduce harmful greenhouse releases. Hence, this paper proposes house appliances controller apps that can control and calculate the power usage of house appliances. Besides …

Erschienen in: Computational Science and Technology (2018)

Autoren:
Aslina Baharum, Nurul Hidayah Mat Zain, Ismassabah Ismail, Chew Yun Fai, Siti Hasnah Tanalol, Muhammad Omar

2018 | OriginalPaper | Buchkapitel

Design and Development of Novel Android 3D 3rd Person Shooting Game

In recent years, smartphones have grown exponentially in popularity, taking over the world by storm. While the mobile gaming industry has grown large due to the development, there is a deluge of mediocre games in the Android market which replicate …

Erschienen in: Computational Science and Technology (2018)

Autoren:
Kim On Chin, Syukri Majdi Hamdan, Tan Tse Guan

2018 | OriginalPaper | Buchkapitel

Vehicle Insurance Payment System Based on IoT

This study describes an application based on Arduino applied for Smart Driver as part of IoT. The purpose of such system comes as result of an evaluation for the payment of the vehicle insurance based on the way you drive the car. The technologies …

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autoren:
Elma Zanaj, Kristi Verushi, Indrit Enesi, Blerina Zanaj

2018 | OriginalPaper | Buchkapitel

Android OS Stack Power Management Capabilities

During the last decade, mobile communications and smartphone technology increasingly became part of people’s daily routine. Nowadays, Android smartphones and iPhone are more and more pervasive and widely used even from people with less incomes.

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autoren:
Olimpjon Shurdi, Luan Ruçi, Vladi Kolici, Algenti Lala, Bexhet Kamo

2018 | OriginalPaper | Buchkapitel

Towards Internet of Things and Cloud Computing for Management of Cars Network

XXI century is full of smart devices which amount is still substantially growing. Therefore there is a big need of context-aware platform that uses all of these devices and connect them together. However, clearing this way to accomplishing that …

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autoren:
Krzysztof Stepień, Aneta Poniszewska-Marańda

2018 | OriginalPaper | Buchkapitel

A Mobile Wireless Network Visualizer for Assisting Administrators

As a performance index of wireless network, a heat map function for visualizing the distribution of signal strengths received from APs (Access Points) is a useful tool. Existing technologies, however, have some problems such as insufficient …

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autoren:
Dai Shimizu, Toshiyuki Haramaki, Hiroaki Nishino

2018 | OriginalPaper | Buchkapitel

Voice Quality Testing Using VoIP Applications over 4G Mobile Networks

Nowadays, many mobile applications in the telecommunication market provide Voice over IP (VoIP), video and data services. This paper presents the performance evaluation of a 4G mobile network in the city of Pristina. This was accomplished by …

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autoren:
Desar Shahu, Alban Rakipi, Joana Jorgji, Ismail Baxhaku, Irena Galić

2018 | OriginalPaper | Buchkapitel

Usage Optimization of Mobile Devices Resources in Mobile Web

The continuous development of mobile devices and the huge number of mobile application users is implicating that somewhere in near future many mobile applications will be focusing on maximizing the usage of possibilities offered by the mobile …

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autoren:
Nebojsha Ilijoski, Vladimir Trajkovik

2018 | OriginalPaper | Buchkapitel

Tourism Support System Using AR for Tourists’ Migratory Behaviors

This paper treats tourism support systems and the authors propose a tourism support system for tourists’ migratory behaviors using AR (Augmented Reality). The target users of this system are mainly young tourists who frequently use one of the …

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autoren:
Haruna Sonobe, Hiroaki Nishino, Yoshihiro Okada, Kousuke Kaneko

2018 | OriginalPaper | Buchkapitel

Improving Data Loss Prevention Using Classification

The financial institutions provide the resources to protect their sensitive data and information by trying to prevent unauthorized leakage. They approve policies and realize technical restrictions to block the loss and revelation of sensitive data …

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autor:
Brunela Karamani

2018 | OriginalPaper | Buchkapitel

Improving Results of Forensics Analysis by Semantic-Based Suggestion System

Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or military investigation and they are primary to support cyber-security. Detectives use a many techniques and proprietary forensic software to analyze …

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autoren:
Flora Amato, Leonard Barolli, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato

2018 | OriginalPaper | Buchkapitel

Endowing IoT Devices with Intelligent Services

The future of the Internet is to be found in Internet of Things (IoT) where every device communicates with others by making simple but intelligent decisions. To leverage the power of IoT, smart devices and objects need to be endowed with …

Erschienen in: Advances in Internet, Data & Web Technologies (2018)

Autoren:
Aneta Poniszewska-Maranda, Daniel Kaczmarek, Natalia Kryvinska, Fatos Xhafa

2018 | OriginalPaper | Buchkapitel

Novel Aproach for Localization of Patients in Urgent Admission Department

The Real-time Locating Systems (RTLS) are also well known as real-time location systems have recently become significantly important part of many location aware systems. RTLS systems are primarily used for the object tracking placed indoor. This …

Erschienen in: Modern Approaches for Intelligent Information and Database Systems (2018)

Autoren:
Jan Kubicek, Libor Michalek, Tomas Urbanczyk, Jaromir Konecny, Martin Tomis, Filip Benes, Jiri Svub, Pavel Stasa, Leopold Pleva

2018 | OriginalPaper | Buchkapitel

OpenWebCrypt—Securing Our Data in Public Cloud

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. The increasing usage and popularity of web services indicate the likelihood of privacy …

Erschienen in: Modern Approaches for Intelligent Information and Database Systems (2018)

Autoren:
Péter Vörös, Attila Kiss

2018 | OriginalPaper | Buchkapitel

Robust Scale-Invariant Normalization and Similarity Measurement for Time Series Data

Classification is one of the most prevalent tasks in time series mining. Dynamic Time Warping and Longest Common Subsequence are well-known and widely used algorithms to measure similarity between two time series sequences using non-linear …

Erschienen in: Modern Approaches for Intelligent Information and Database Systems (2018)

Autoren:
Ariyawat Chonbodeechalermroong, Chotirat Ann Ratanamahatana

2018 | OriginalPaper | Buchkapitel

Language Mashup: Personalized Language Service Platform

The aim of the LanguageNakaguchi, Takao Grid is to enableLin, Donghui users to develop new language services by sharing and combining any existing language resources as languageOtani, Masayuki services. To implement this concept, we had to address …

Erschienen in: Services Computing for Language Resources (2018)

Autoren:
Masayuki Otani, Nguyen Cao Hong Ngoc, Takao Nakaguchi, Donghui Lin

2018 | OriginalPaper | Buchkapitel

Understanding Sensor Data Using Deep Learning Methods on Resource-Constrained Edge Devices

With the development of the Internet of Things, more and more edge devices (such as smart-phones, tablets, wearable devices, embedded devices, gateway equipment and etc.) generate huge amounts of rich sensor data every day. With them, some deep …

Erschienen in: Wireless Sensor Networks (2018)

Autoren:
Junzhao Du, Sicong Liu, Yuheng Wei, Hui Liu, Xin Wang, Kaiming Nan

2018 | OriginalPaper | Buchkapitel

Remote Continuous Health Monitoring System for Patients

Recent advances in Internet of Things (IoT) leads to the development of several applications. Some of these applications are related to smart healthcare monitoring though there are several applications for healthcare and monitoring it does not …

Erschienen in: Data Science Analytics and Applications (2018)

Autoren:
D. Jagadish, N. Priya, R. Suganya

2018 | OriginalPaper | Buchkapitel

Immersive Art in Augmented Reality

Google Glass brought a new level of excitement to Augmented Reality for the mainstream. It did not, however, bring the type of features that most AR enthusiasts have been looking forward to for decades. AR has traditionally been defined by the …

Erschienen in: Augmented Reality Art (2018)

Autor:
Todd Margolis

2018 | OriginalPaper | Buchkapitel

An Emotional Compass: Emotions on Social Networks and a New Experience of Cities

Introduction:

Goyal, Kjeldergaard, Deshmukh, and Kim present a strategy to develop an intelligent agent capable of playing blackjack using learning, utilitary theory and decision-making to maximize the expected probability of winning the game. 

Summary: 

Blackjack functions as an excellent use for decision trees. The popular table game is an example of an iterated game with a finite number of players (2), imperfect information, and a finite (albeit large) number of possible moves. Because of these factors, the house edge in this game can be minimized to the extent that in certain situations, the player can press their advantage to tip the odds in their favor. However, even using the best strategies, players' expected values remain negative.

The study examines the methods to compute player odds and dealer odds, and details the ideal method for inputting these computations into a probabilistic decision tree. For human actors, card-counting techniques can be used to track probable hands, to find advantageous positions. However, an intelligent agent will be able to perfectly recollect the actual history of the standard eight-deck shoe, to perfectly calculate both its and the dealer's probable hands at the beginning of each iteration.

The agent bases its probabilistic determination of strategy (hit, stay, double down, split, and amount to bet) based on the ongoing set of discarded information. The knowledge of the remaining cards in the shoe are used to determine at which point on the decision tree to pick up the analysis. 

The intelligent agent should learn over time optimal strategy, by attempting to address the problem: 

1. Given the total of the agent’s hand and the cards in dealer’s hand including the 2 hidden cards, is there any set of cards within the remaining deck that will make my hand total greater than 21? If such set of cards are there, what is the probability of getting one such set in addition to the hand in possession.

2. While taking care of point 1, are there any set of cards in the remaining deck which will make my total = 21 or at least total > Dealer’s Stand Point. (depending on the casino rules and practices)

Based on the answer to the preceding problem, the agent can determine the optimal strategy for its moves and the flow of money in the game. However, because Blackjack is NP Complete, there is no efficient solution to this problem. 

Bibliography: 


Sanchit Goyal, E. K. (2010). Intelligent Agent for Playing Casino Card Games. Grand Forks, ND: University of North Dakota.

0 thoughts on “Sanchit Goyal Assignments”

    -->

Leave a Comment

Your email address will not be published. Required fields are marked *