Coordinating service capacity with dynamic varying, market-driven customer demand in a service business imposes correlating and synchronizing front-office and back-office processes - the first addressing customer rela...
Coordinating service capacity with dynamic varying, market-driven customer demand in a service business imposes correlating and synchronizing front-office and back-office processes - the first addressing customer relationship management and the second inventory planning, forecasting demand, analytics, and strategic decision making. Front office management (FOM) contributes substantially in coordinating the services requested by guests, and needs to be integrated in an Operations Management Software system specific for hotel business. Research efforts are currently directed towards automating repetitive, time consuming operations included in front office processes that are in great number, initiated by random events and customer actions with variable timing. The paper presents a solution to automate FOM operations that are kept consistent with the business strategy of the organization, and assist front-office workflows involving customers (service requests, service quality assessment) and front line personnel (registration, check in, check out, taxation and invoicing). The solution is based on the Robotic Process Automation (RPA) technology extended with AI-based functionalities for the intelligent process automation and integration with back-office workflows.
The development, enhancement, and integration of intelligent functionalities aimed at automating vehicles are increasingly becoming a fundamental aspect of modern life. There is a growing emphasis on improving the eve...
详细信息
The efficient solution of moderately large-scale linear systems arising from the KKT conditions in optimal control problems (OCPs) is a critical challenge in robotics. With the stagnation of Moore’s law, there is gro...
详细信息
The soft robotics field offers a large variety of actuators and robots, complex structures and designs able to behave in a required way, offering speed and resistance and at the same time reducing the contact damage c...
The soft robotics field offers a large variety of actuators and robots, complex structures and designs able to behave in a required way, offering speed and resistance and at the same time reducing the contact damage chance. The control of such structures using mathematical methods requires complex methods which evolved over time in the form of predictive control and even neural networks and genetic algorithms. The current paper presents ongoing research that can be found at the intersection of meta-materials and sensor technology. It approaches a simpler method of controlling a flexible actuator based on a shape memory alloy, the regulator being a two-state switch controller steered by a pressure force sensor. We propose a complete analogical electrical structure and analyze the performance of the outcome, focusing on time response. The present work also contains a brief description of a mechanical design proposal able to optimize the impact of the shape memory alloy used, in order to obtain an amplified actuation.
The applications related to cooperative automated driving need to share periodic safety information with neighboring vehicles in a reliable and low-latency manner. However, the performance of vehicular ad-hoc technolo...
The applications related to cooperative automated driving need to share periodic safety information with neighboring vehicles in a reliable and low-latency manner. However, the performance of vehicular ad-hoc technologies degrades substantially when the channel becomes congested. Therefore, this paper presents a channel congestion evaluation method for V2V safety communication for the IEEE 802.11p protocol. The evaluation addresses multiplatooning applications, in which the vehicles' density is a defining element. To illustrate the negative effects of the channel load level, a number of relevant performance metrics were analyzed, such as Channel Busy Ratio (CBR), Packet Loss Rate (PLR), and Inter-Packet Delay (IPD).
With the increasing importance of cybersecurity in our digital age, cybersecurity competitions have become a popular way to test the incident response abilities of participants. This paper proposes a network architect...
With the increasing importance of cybersecurity in our digital age, cybersecurity competitions have become a popular way to test the incident response abilities of participants. This paper proposes a network architecture to test the vulnerabilities that may appear in a Red and Blue cybersecurity competition. The network architecture is designed to simulate a real-world cyber-attack scenario and includes a router, a core system, and multiple subnets representing different teams. Each subnet contains vulnerable systems that must be protected by the teams, who must also launch attacks on the other teams to identify flags. The architecture presents several challenges, including the large number of rules required for router configuration, which prohibit direct access to opposing teams’ virtual machines (VMs) and restrict/block access to specific phases of the competition. The VMs used in the competition include various vulnerabilities related to cryptocurrency wallet operation, medical clinics, chat services, X-ray clinics, SCADA communication protocols, and industrial power plants. Overall, the network architecture and VMs used in this competition provide a challenging and realistic scenario for participants to test their skills in identifying and mitigating cybersecurity threats.
The latest work in the field of deep reinforcement learning speaks highly about the advanced exploration techniques which avoid the greedy decisions of agents. Usually, reinforcement learning works by finding the opti...
The latest work in the field of deep reinforcement learning speaks highly about the advanced exploration techniques which avoid the greedy decisions of agents. Usually, reinforcement learning works by finding the optimal policy for a Markov Decision Process. In off-policy algorithms the agent learns a value function for this optimal policy, separate of the action choice, an example being the deep Q-learning algorithm. Algorithms based on a maximum entropy framework, like soft Q-learning, overcome the greedy behavior of the agent, effectively combining exploration and exploitation by adding an entropy term to the Bellman equation. This method, applied to the Lunar Lander environment, was compared to the classic deep Q-learning, using the same set of different random seeds and averaging multiple runs. An implicit exploration strategy proves to compensate for disturbances caused by intrinsic sources of non-determinism, such as random seeds. This paper highlights the sensitivity to intrinsic and extrinsic influences for deep reinforcement learning, with respect to exploration and repeatability.
This paper explores the impact of the burgeoning electric vehicle (EV) presence on distribution grid operations, highlighting the challenges they present to conventional pricing strategies due to their dual role as po...
详细信息
This paper presents the ability of the federated learning concept to create a collaboration between multiple devices using a shared global model, while still keeping data privacy to meet the General Data Protection Re...
This paper presents the ability of the federated learning concept to create a collaboration between multiple devices using a shared global model, while still keeping data privacy to meet the General Data Protection Regulation (GDPR). In real-world application scenarios, this concept faces problems related to the defense of the global model from possible attacks and the compatibility with non-independent and identically distributed data (non-IID). This paper presents two aggregation algorithms compatible with non-IID data, which use a refined aggregation of the local model, based on their accuracy. Thus, the proposed algorithms can refine the confidence in each client, eliminate intruders and allow a safe aggregation of the global model. Testing scenarios performed for IID and non-IID data illustrate that the proposed algorithms are able to provide faster training and improved robustness against intruders, w.r.t. the well-known federated average algorithm.
Automated Ground Vehicles (AGVs) use deep-learning-based vision systems to perceive the surrounding environment and extract relevant information about it. Although deep learning models offer high capabilities, they re...
详细信息
暂无评论