Searched for: subject%3A%22reinforcement%255C+learning%22
(1 - 19 of 19)
document
Lu, Miaojia (author), Yan, Xinyu (author), Sharif Azadeh, S. (author), Wang, P. (author)
The volume of instant delivery has witnessed a significant growth in recent years. Given the involvement of numerous heterogeneous stakeholders, instant delivery operations are inherently characterized by dynamics and uncertainties. This study introduces two order dispatching strategies, namely task buffering and dynamic batching, as...
journal article 2024
document
Groot, D.J. (author), Ellerbroek, Joost (author), Hoekstra, J.M. (author)
Conventional Air Traffic Control is still predominantly being done by human Air Traffic Controllers, however, as the traffic density increases, the workload of the controllers increases as well. Especially for the area of unmanned aviation, driven by the rise in drones, having human controllers might become unfeasible. One of the methods that...
journal article 2024
document
Zhang, Yingqian (author), Bliek, Laurens (author), da Costa, Paulo (author), Refaei Afshar, Reza (author), Reijnen, Robbert (author), Catshoek, T. (author), Vos, D.A. (author), Verwer, S.E. (author), Schmitt-Ulms, Fynn (author)
This paper reports on the first international competition on AI for the traveling salesman problem (TSP) at the International Joint Conference on Artificial Intelligence 2021 (IJCAI-21). The TSP is one of the classical combinatorial optimization problems, with many variants inspired by real-world applications. This first competition asked the...
journal article 2023
document
Wu, C. (author), Pan, W. (author), Staa, Rick (author), Liu, Jianxing (author), Sun, Guanghui (author), Wu, Ligang (author)
This paper investigates the deep reinforcement learning based secure control problem for cyber–physical systems (CPS) under false data injection attacks. We describe the CPS under attacks as a Markov decision process (MDP), based on which the secure controller design for CPS under attacks is formulated as an action policy learning using data....
journal article 2023
document
Remmerswaal, Mick G.D. (author), Wu, L. (author), Tiran, Sébastien (author), Mentens, Nele (author)
Template attacks (TAs) are one of the most powerful side-channel analysis (SCA) attacks. The success of such attacks relies on the effectiveness of the profiling model in modeling the leakage information. A crucial step for TA is to select relevant features from the measured traces, often called points of interest (POIs), to extract the...
journal article 2023
document
Zhang, Y. (author), Negenborn, R.R. (author), Atasoy, B. (author)
The objective of this study is to address the issue of service time uncertainty in synchromodal freight transport, which can cause delays, inefficiencies, and reduced satisfaction for shippers. The proposed solution is an online deep Reinforcement Learning (RL) approach that takes into account the service time uncertainty, assisted by an...
journal article 2023
document
Su, Jiahang (author), Li, Shuai (author), Wolff, Lennard (author), van Zwam, Wim (author), Niessen, W.J. (author), van der Lugt, Aad (author), van Walsum, T. (author)
Extracting the cerebral anterior vessel tree of patients with an intracranial large vessel occlusion (LVO) is relevant to investigate potential biomarkers that can contribute to treatment decision making. The purpose of our work is to develop a method that can achieve this from routinely acquired computed tomography angiography (CTA) and...
journal article 2023
document
Hou, Biao (author), Yang, Song (author), Kuipers, F.A. (author), Jiao, Lei (author), Fu, Xiaoming (author)
Recent years have witnessed video streaming grad- ually evolve into one of the most popular Internet applications. With the rapidly growing personalized demand for real-time video streaming services, maximizing their Quality of Experience (QoE) is a long-standing challenge. The emergence of the server- less computing paradigm has potential to...
conference paper 2023
document
Wu, Chengwei (author), Yao, Weiran (author), Luo, Wensheng (author), Pan, W. (author), Sun, Guanghui (author), Xie, Hui (author), Wu, Ligang (author)
The problem of learning-based control for robots has been extensively studied, whereas the security issue under malicious adversaries has not been paid much attention to. Malicious adversaries can invade intelligent devices and communication networks used in robots, causing incidents, achieving illegal objectives, and even injuring people....
journal article 2023
document
Morato, P. G. (author), Andriotis, C. (author), Papakonstantinou, K. G. (author), Rigo, P. (author)
In the context of modern engineering, environmental, and societal concerns, there is an increasing demand for methods able to identify rational management strategies for civil engineering systems, minimizing structural failure risks while optimally planning inspection and maintenance (I&M) processes. Most available methods simplify the I...
journal article 2023
document
Mhaisen, N. (author), Allahham, Mhd Saria (author), Mohamed, Amr (author), Erbad, Aiman (author), Guizani, Mohsen (author)
Service provisioning systems assign users to service providers according to allocation criteria that strike an optimal trade-off between users' Quality of Experience (QoE) and the operation cost endured by providers. These systems have been leveraging Smart Contracts (SCs) to add trust and transparency to their criteria. However, deploying...
journal article 2022
document
Bai, C. (author), Yan, Peng (author), Yu, Xiaoqiang (author), Guo, Jifeng (author)
Unmanned and intelligent technologies are the future development trend in the business field. It is of great significance for the connotation analysis and application characterization of massive interactive data. Particularly, during major epidemics or disasters, how to provide business services safely and securely is crucial. Specifically,...
journal article 2022
document
Ferreira de Brito, B.F. (author), Agarwal, Achin (author), Alonso-Mora, J. (author)
Autonomous navigation in dense traffic scenarios remains challenging for autonomous vehicles (AVs) because the intentions of other drivers are not directly observable and AVs have to deal with a wide range of driving behaviors. To maneuver through dense traffic, AVs must be able to reason how their actions affect others (interaction model)...
journal article 2022
document
Arslan, Furkan (author), Aydoğan, Reyhan (author)
Designing an effective and intelligent bidding strategy is one of the most compelling research challenges in automated negotiation, where software agents negotiate with each other to find a mutual agreement when there is a conflict of interests. Instead of designing a hand-crafted decision-making module, this work proposes a novel bidding...
journal article 2022
document
Andriotis, C. (author), Papakonstantinou, K. G. (author)
Determination of inspection and maintenance policies for minimizing long-term risks and costs in deteriorating engineering environments constitutes a complex optimization problem. Major computational challenges include the (i) curse of dimensionality, due to exponential scaling of state/action set cardinalities with the number of components; ...
journal article 2021
document
de Bruin, T.D. (author)
The arrival of intelligent, general-purpose robots that can learn to perform new tasks autonomously has been promised for a long time now. Deep reinforcement learning, which combines reinforcement learning with deep neural network function approximation, has the potential to enable robots to learn to perform a wide range of new tasks while...
doctoral thesis 2020
document
Wang, X. (author), Wu, Chaozhong (author), Xue, J. (author), Chen, Z. (author)
To date, automatic driving technology has become a hotspot in academia. It is necessary to provide a personalization of automatic driving decision for each passenger. The purpose of this paper is to propose a self-learning method for personalized driving decisions. First, collect and analyze driving data from different drivers to set learning...
journal article 2020
document
Razeghi, Yousef (author), Yavuz, Ozan (author), Aydoğan, Reyhan (author)
This paper introduces an acceptance strategy based on reinforcement learning for automated bilateral negotiation, where negotiating agents bargain on multiple issues in a variety of negotiation scenarios. Several acceptance strategies based on predefined rules have been introduced in the automated negotiation literature. Those rules mostly...
journal article 2020
document
Kulhánek, J. (author), Derner, Erik (author), de Bruin, T.D. (author), Babuska, R. (author)
Deep reinforcement learning (RL) has been successfully applied to a variety of game-like environments. However, the application of deep RL to visual navigation with realistic environments is a challenging task. We propose a novel learning architecture capable of navigating an agent, e.g. a mobile robot, to a target given by an image. To...
conference paper 2019
Searched for: subject%3A%22reinforcement%255C+learning%22
(1 - 19 of 19)