Zobrazeno 1 - 10
of 1 840
pro vyhledávání: '"dqn"'
Autor:
Zhongyi Huang
Publikováno v:
Alexandria Engineering Journal, Vol 106, Iss , Pp 381-391 (2024)
Addressing the requirements and challenges of traffic light control, a reinforcement learning based adaptive optimal control model for traffic lights in intelligent transportation systems is proposed. In the model design, we combined Markov decision
Externí odkaz:
https://doaj.org/article/8cd36fe2df924ff8ad6faff699dc4f17
Publikováno v:
Вестник Самарского университета: Аэрокосмическая техника, технологии и машиностроение, Vol 23, Iss 3, Pp 94-110 (2024)
The article presents the results of the development of means for intelligent robust control of the parameters of a tribotronic rotor-support system with a tapered bearing with a removable bush. The proposed controller is implemented on the basis of d
Externí odkaz:
https://doaj.org/article/b94a90d7bbba4e10953ca1ed62465e18
Publikováno v:
ICT Express, Vol 10, Iss 4, Pp 845-850 (2024)
To effectively manage the escalating traffic, attention is drawn to the coexistence mechanism of cellular and Wi-Fi networks which offload the cellular traffic from the licensed band to the unlicensed band. For the coexistence of 5G new radio-unlicen
Externí odkaz:
https://doaj.org/article/c912e8ec716749bf9cc7c89dc8da0343
Publikováno v:
Taiyuan Ligong Daxue xuebao, Vol 55, Iss 4, Pp 705-711 (2024)
Purposes Reinforcement learning policy transfer is an effective way to reducing the consumption of deep reinforcement learning training. Local policy transfer is policy transfer at a fine-grained level, which is of great significance to the improveme
Externí odkaz:
https://doaj.org/article/7efd4f81475c495bad95dfd631871742
Publikováno v:
Xibei Gongye Daxue Xuebao, Vol 42, Iss 3, Pp 396-405 (2024)
Reinforcement learning is now being applied more and more in a variety of scenarios, the majority of which are based on the deep Q network (DQN) technology. However, the algorithm is heavily influenced by multiple factors. In this paper, we take the
Externí odkaz:
https://doaj.org/article/a11fec09fe3648b4a5471bee98e528bb
Autor:
LI Weiguang, CHEN Dong
Publikováno v:
Zhihui kongzhi yu fangzhen, Vol 46, Iss 3, Pp 62-69 (2024)
Aiming at the characteristics of large solution space, discrete, dynamic and nonlinear of firepower-target assignment problem, this paper proposes a deep reinforcement learning algorithm based on DQN. By combining the 6-layer fully connected feedforw
Externí odkaz:
https://doaj.org/article/1d9e1746d40f44e19ef42acb3797af00
Autor:
Huanhuan Hou, Azlan Ismail
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 8, Pp 102177- (2024)
The huge energy consumption of data centers in cloud computing leads to increased operating costs and high carbon emissions to the environment. Deep Reinforcement Learning (DRL) technology combines of deep learning and reinforcement learning, which h
Externí odkaz:
https://doaj.org/article/061e0b68c2f146ca9e4efd7252ce1829
Publikováno v:
Journal of Intelligent and Connected Vehicles, Vol 7, Iss 1, Pp 64-77 (2024)
As the proliferation and development of automated container terminal continue, the issues of efficiency and safety become increasingly significant. The container yard is one of the most crucial cargo distribution centers in a terminal. Automated Guid
Externí odkaz:
https://doaj.org/article/ffdcd903e9b041a5883fb18122e64b53
Publikováno v:
Gong-kuang zidonghua, Vol 50, Iss 6, Pp 23-29, 45 (2024)
Due to the disturbance of geological disasters such as deep mining and rock burst, there are problems such as poor self perception capability, weak intelligent anti impact adaptive capability, and lack of decision-making and control capability in the
Externí odkaz:
https://doaj.org/article/53cb3ac950a74696ae7dad72dd28aab2
Publikováno v:
Teknika, Vol 13, Iss 1, Pp 77-85 (2024)
A honeypot is a tool or system used to record, redirect, and even lure hackers into penetrating and exploiting a system. The increasing development of technology causes cyber hackers to realize the existence of honeypots using various other software
Externí odkaz:
https://doaj.org/article/5b31c4ff871c4466aecea8d1d71d6003