In reinforcement learning(RL), training a policy from scratch with online experiences can be inefficient because of the difficulties in exploration. Recently, offline RL provides a promising solution by giving an init...
详细信息
In reinforcement learning(RL), training a policy from scratch with online experiences can be inefficient because of the difficulties in exploration. Recently, offline RL provides a promising solution by giving an initialized offline policy, which can be refined through online interactions. However, existing approaches primarily perform offline and online learning in the same task, without considering the task generalization problem in offline-to-online adaptation. In real-world applications, it is common that we only have an offline dataset from a specific task while aiming for fast online-adaptation for several tasks. To address this problem, our work builds upon the investigation of successor representations for task generalization in online RL and extends the framework to incorporate offline-to-online learning. We demonstrate that the conventional paradigm using successor features cannot effectively utilize offline data and improve the performance for the new task by online fine-tuning. To mitigate this, we introduce a novel methodology that leverages offline data to acquire an ensemble of successor representations and subsequently constructs ensemble Q functions. This approach enables robust representation learning from datasets with different coverage and facilitates fast adaption of Q functions towards new tasks during the online fine-tuning *** empirical evaluations provide compelling evidence showcasing the superior performance of our method in generalizing to diverse or even unseen tasks.
Policy evaluation(PE)is a critical sub-problem in reinforcement learning,which estimates the value function for a given policy and can be used for policy ***,there still exist some limitations in current PE methods,su...
详细信息
Policy evaluation(PE)is a critical sub-problem in reinforcement learning,which estimates the value function for a given policy and can be used for policy ***,there still exist some limitations in current PE methods,such as low sample efficiency and local convergence,especially on complex *** this study,a novel PE algorithm called Least-Squares Truncated Temporal-Difference learning(LST2D)is *** LST2D,an adaptive truncation mechanism is designed,which effectively takes advantage of the fast convergence property of Least-Squares Temporal Difference learning and the asymptotic convergence property of Temporal Difference learning(TD).Then,two feature pre-training methods are utilised to improve the approximation ability of ***,an Actor-Critic algorithm based on LST2D and pre-trained feature representations(ACLPF)is proposed,where LST2D is integrated into the critic network to improve learning-prediction *** simulation studies were conducted on four robotic tasks,and the corresponding results illustrate the effectiveness of *** proposed ACLPF algorithm outperformed DQN,ACER and PPO in terms of sample efficiency and stability,which demonstrated that LST2D can be applied to online learning control problems by incorporating it into the actor-critic architecture.
This paper proposes a new multi-vehicle cooperative localization approach that combines Time of Arrival (TOA) with a heuristic Simulated Annealing Extended Kalman Filter (SA-EKF) to enhance positioning accuracy and ro...
详细信息
The vast majority of published event-triggered mechanisms (ETMs) are constructed based on measurement errors, which introduces a problem naturally that they are updated when the measurement errors exceed the threshold...
详细信息
Remote sensing small target detection can accurately detect small-scale targets in remote sensing images. It is valuable for military reconnaissance and civilian image recognition. However, there are some challenges i...
详细信息
The parallel architecture of FPGAs is well suited for parallel computation of DNNs. However, softmax-layer is one of the core operators of DNNs, which contains exponentiation and division operations and is not suitabl...
详细信息
A networked control systems (NCSs) with deception attacks is studied in this paper. Considering the energy constraints, the deception attacks are assumed to be bounded. To weaken the negative impact of deception attac...
详细信息
This paper studies the finite-time consensus of discrete-time multi-agent systems (MASs). First, a regionconditional switching controller is developed to realize finitetime consensus problem of the discrete-time syste...
详细信息
The typical underactuated system two-dimensional translational oscillator with rotational actuator (2D TORA) that consist of two unactuated translational carts and an actuated rotational eccentric ball which acts as i...
详细信息
This paper is concerned with stabilization for Takagi-Sugeno (T-S) fuzzy systems with the unmatched disturbance. In this paper, an integral fuzzy switching surface function (IFSSF) containing state-dependent input mat...
详细信息
暂无评论