咨询与建议

限定检索结果

文献类型

  • 7 篇 期刊文献
  • 3 篇 会议

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 6 篇 电气工程
    • 6 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 石油与天然气工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电子科学与技术(可...
  • 2 篇 理学
    • 2 篇 数学
    • 2 篇 系统科学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 10 篇 reinforcement al...
  • 2 篇 transmission pow...
  • 2 篇 energy harvester
  • 2 篇 cyber-physical s...
  • 2 篇 cloud computing
  • 1 篇 intrusion detect...
  • 1 篇 reliability
  • 1 篇 programmable dat...
  • 1 篇 deep learning
  • 1 篇 renewable energy...
  • 1 篇 cover enhancemen...
  • 1 篇 gpu processor
  • 1 篇 weka and snoor t...
  • 1 篇 optimal conditio...
  • 1 篇 charging station
  • 1 篇 optimization
  • 1 篇 authentication
  • 1 篇 tcp/ip protocols
  • 1 篇 network monitori...
  • 1 篇 markov decision ...

机构

  • 1 篇 taibah univ elec...
  • 1 篇 univ quebec dept...
  • 1 篇 ericsson res tea...
  • 1 篇 universitat poli...
  • 1 篇 ensait gemtex la...
  • 1 篇 tianjin univ dep...
  • 1 篇 univ illinois co...
  • 1 篇 umm al qura univ...
  • 1 篇 univ surrey 5g &...
  • 1 篇 tech univ berlin...
  • 1 篇 dalian univ tech...
  • 1 篇 univ padua dept ...
  • 1 篇 hainan univ sch ...
  • 1 篇 dalian univ tech...
  • 1 篇 sri sairam inst ...
  • 1 篇 ningbo univ coll...
  • 1 篇 galgotias univ g...
  • 1 篇 eswaran acad che...
  • 1 篇 corporació catal...

作者

  • 2 篇 xing wei
  • 2 篇 zhao xudong
  • 1 篇 carles ventura
  • 1 篇 daniel giribet
  • 1 篇 ramesh k.
  • 1 篇 thilagavathy a.
  • 1 篇 altarjami ibrahi...
  • 1 篇 eusebio carasusa...
  • 1 篇 anand m. vivek
  • 1 篇 conti mauro
  • 1 篇 xavier giro-i-ni...
  • 1 篇 zhuo peiwen
  • 1 篇 zeng xy
  • 1 篇 basar tamer
  • 1 篇 elbiaze halima
  • 1 篇 shojafar mohamma...
  • 1 篇 ying kaiyu
  • 1 篇 liu zy
  • 1 篇 vakilinia shahin
  • 1 篇 xia weiguo

语言

  • 10 篇 英文
检索条件"主题词=reinforcement algorithm"
10 条 记 录,以下是1-10 订阅
Studying the Optimal Frequency Control Condition for Electric Vehicle Fast Charging Stations as a Dynamic Load Using reinforcement Learning algorithms in Different Photovoltaic Penetration Levels
收藏 引用
ENERGIES 2024年 第11期17卷 2593页
作者: Altarjami, Ibrahim Alhazmi, Yassir Taibah Univ Elect Engn Dept Madinah 44256 Saudi Arabia Umm Al Qura Univ Elect Engn Dept Mecca 24382 Saudi Arabia
This study investigates the impact of renewable energy penetration on system stability and validates the performance of the (Proportional-Integral-Derivative) PID-(reinforcement learning) RL control technique. Three s... 详细信息
来源: 评论
Audio steganography cover enhancement via reinforcement learning
收藏 引用
SIGNAL IMAGE AND VIDEO PROCESSING 2024年 第2期18卷 1007-1013页
作者: Zhuo, Peiwen Yan, Diqun Ying, Kaiyu Wang, Rangding Dong, Li Ningbo Univ Coll Informat Sci & Engn 818 Fenghua Rd Ningbo 315211 Zhejiang Peoples R China
Recent advancements in steganography analysis based on deep neural networks have led to the development of steganography schemes that incorporate deep network technology like adversarial example, GAN, and reinforce le... 详细信息
来源: 评论
Transmission Scheduling for Remote State Estimation in CPSs With Two-Hop Networks Subject to DoS Attacks
收藏 引用
IEEE-ACM TRANSACTIONS ON NETWORKING 2024年 第6期32卷 5388-5398页
作者: Xing, Wei Zhao, Xudong Hainan Univ Sch Informat & Commun Engn Haikou 570228 Hainan Peoples R China Dalian Univ Technol Minist Educ Key Lab Intelligent Control & Optimizat Ind Equip Dalian 116024 Peoples R China
In this paper, a dynamic zero-sum game is formulated to describe the power decision-making process of the sensor/relay and the DoS attacker in cyber-physical systems. The sensor and the relay cooperate with each other... 详细信息
来源: 评论
reinforcement learning-based spatial sorting based dynamic task allocation on networked multicore GPU processors
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2021年 第10期12卷 9731-9738页
作者: Ramesh, K. Thilagavathy, A. Eswaran Acad Chennai Tamil Nadu India
Owing to the advancements in cloud computing our lives are significantly altering the means of utilizing data by the data-intensive business and research. The coming era of ubiquitous computing is greatly supported by... 详细信息
来源: 评论
TEL: Low-Latency Failover Traffic Engineering in Data Plane
收藏 引用
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT 2021年 第4期18卷 4697-4710页
作者: Mostafaei, Habib Shojafar, Mohammad Conti, Mauro Tech Univ Berlin Dept Telecommun Syst D-10587 Berlin Germany Univ Surrey 5G & 6G Innovat Ctr Inst Commun Syst Guildford GU2 7XH Surrey England Univ Padua Dept Math I-35121 Padua Italy
Modern network applications demand low-latency traffic engineering in the presence of network failure, while preserving the quality of service constraints like delay and capacity. Fast Re-Route (FRR) mechanisms are wi... 详细信息
来源: 评论
Optimal transmission scheduling for remote state estimation in CPSs with energy harvesting two-hop relay networks
收藏 引用
AUTOMATICA 2023年 第1期152卷
作者: Xing, Wei Zhao, Xudong Basar, Tamer Xia, Weiguo Dalian Univ Technol Key Lab Intelligent Control & Optimizat Ind Equipm Minist Educ Dalian Peoples R China Univ Illinois Coordinated Sci Lab Urbana IL USA
This paper considers the optimal transmission power scheduling for accurate remote state estimation in cyber-physical systems (CPSs). The plant is modeled as a discrete-time stochastic linear system with sensor measur... 详细信息
来源: 评论
Automatic Keyframe Selection based on Mutual reinforcement algorithm
Automatic Keyframe Selection based on Mutual Reinforcement A...
收藏 引用
International Workshop on Content-Based Multimedia Indexing
作者: Carles Ventura Xavier Giro-i-Nieto Veronica Vilaplana Daniel Giribet Eusebio Carasusan Universitat Politecnica de Catalunya (UPC) Barcelona Spain Corporació Catalana de Mitjans Audiovisuals (CCMA) Barcelona Spain
This paper addresses the problem of video summarization through an automatic selection of a single representative keyframe. The proposed solution is based on the mutual reinforcement paradigm, where a keyframe is sele... 详细信息
来源: 评论
IDS Based Network Security Architecture with TCP/IP Parameters using Machine Learning
IDS Based Network Security Architecture with TCP/IP Paramete...
收藏 引用
International Conference on Computing, Power and Communication Technologies (GUCON)
作者: Ponmaniraj, S. Rashmi, R. Anand, M. Vivek Galgotias Univ Greater Noida Uttar Pradesh India Sri Sairam Inst Technol Chennai Tamil Nadu India
This computer era leads human to interact with computers and networks but there is no such solution to get rid of security problems. Securities threats misleads internet, we are sometimes losing our hope and reliabili... 详细信息
来源: 评论
Automated Enforcement of SLA for Cloud Services  11
Automated Enforcement of SLA for Cloud Services
收藏 引用
11th IEEE International Conference on Cloud Computing (CLOUD) Part of the IEEE World Congress on Services
作者: Vakilinia, Shahin Truchan, Catherine Kempf, James Elbiaze, Halima Ericsson Res Team Budapest Hungary Univ Quebec Dept Informat Montreal PQ Canada
Orchestration and management of cloud computing entities necessitate measuring and analysis of real-time monitored performance metrics. However, decision making in current management platforms are addressed separately... 详细信息
来源: 评论
A learning automata based algorithm for optimization of continuous complex functions
收藏 引用
INFORMATION SCIENCES 2005年 第3-4期174卷 165-175页
作者: Zeng, XY Liu, ZY ENSAIT GEMTEX Lab F-59070 Roubaix France Tianjin Univ Dept Math Tianjin 300072 Peoples R China
This paper presents a new method for optimizing continuous complex functions based on a learning automaton. This method can be considered as active learning permitting to select on-line the most significant data sampl... 详细信息
来源: 评论