Search results for: Actor-Critic Network - Bridge of Knowledge

Search

Search results for: Actor-Critic Network

Filters

total: 1868
filtered: 1571

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: Actor-Critic Network

  • Robust-adaptive dynamic programming-based time-delay control of autonomous ships under stochastic disturbances using an actor-critic learning algorithm

    Publication

    This paper proposes a hybrid robust-adaptive learning-based control scheme based on Approximate Dynamic Programming (ADP) for the tracking control of autonomous ship maneuvering. We adopt a Time-Delay Control (TDC) approach, which is known as a simple, practical, model free and roughly robust strategy, combined with an Actor-Critic Approximate Dynamic Programming (ACADP) algorithm as an adaptive part in the proposed hybrid control...

    Full text available to download

  • High performance super-twisting sliding mode control for a maritime autonomous surface ship (MASS) using ADP-Based adaptive gains and time delay estimation

    Publication

    This research addresses two kinds of problems related to optimal trajectory tracking of a Maritime Autonomous Surface Ship (MASS): those caused by the time-varying external disturbances including winds, waves and ocean currents as well as those resulting from inherent dynamical uncertainties. As the paper shows, an accurate and robust optimal controller can successfully deal with both issues. An improved Optimal Adaptive Super-Twisting...

  • High performance super-twisting sliding mode control for a maritime autonomous surface ship (MASS) using ADP-Based adaptive gains and time delay estimation

    This research addresses two kinds of problems related to optimal trajectory tracking of a Maritime Autonomous Surface Ship (MASS): those caused by the time-varying external disturbances including winds, waves and ocean currents as well as those resulting from inherent dynamical uncertainties. As the paper shows, an accurate and robust optimal controller can successfully deal with both issues. An improved Optimal Adaptive Super-Twisting...

    Full text available to download

  • Network on Chip implementation using FPGAs resources

    W artykule przedstawiono implementację sieci typu ''Network on Chip'' w układach FPGA. Sieci typu ''Network on Chip'' stały się bardzo interesującym i obiecującym rozwiązaniem dla systemów typu ''System on Chip'' które charakteryzują się intensywną komunikacją wewnętrzną. Ze względu na inne paradygmaty projektowania nie ma obecnie dostępnych efektywnych platform do budowy prototypów sieci typu ''Network on Chip'' i ich weryfikacji....

  • From Sequential to Parallel Implementation of NLP Using the Actor Model

    The article focuses on presenting methods allowing easy parallelization of an existing, sequential Natural Language Processing (NLP) application within a multi-core system. The actor-based solution implemented with the Akka framework has been applied and compared to an application based on Task Parallel Library (TPL) and to the original sequential application. Architectures, data and control flows are described along with execution...

    Full text available to download

  • Thomas Szasz: The Uncompromising Rebel and Critic of Psychiatry

    Publication

    Full text to download in external service

  • Local Government as an Actor in Collaborative Governance – Partner or Leader?

    Publication

    - Year 2015

    Full text to download in external service

  • Maritime Communications Network Development Using Virtualised Network Slicing of 5G Network

    Publication

    - Nase More - Year 2020

    The paper presents the review on perspectives of maritime systems development at the context of 5G systems implementation and their main properties. Firstly, 5G systems requirements and principles are discussed, which can be important for maritime applications. Secondly, the problems of network softwarisation, virtualisation and slicing, and possible types of services for potential implementation in 5G marine applications are described....

    Full text available to download

  • Deep neural network architecture search using network morphism

    Publication

    The paper presents the results of the research on neural architecture search (NAS) algorithm. We utilized the hill climbing algorithm to search for well-performing structures of deep convolutional neural network. Moreover, we used the function preserving transformations which enabled the effective operation of the algorithm in a short period of time. The network obtained with the advantage of NAS was validated on skin lesion classification...

    Full text to download in external service

  • Collision-Free Network Exploration

    Publication
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - Year 2014

    A set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...

    Full text to download in external service

  • Collision-free network exploration

    Publication
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - JOURNAL OF COMPUTER AND SYSTEM SCIENCES - Year 2017

    Mobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...

    Full text available to download

  • EMULACJA ŚRODOWISKA DLA ZASTOSOWANIA PROTOKOŁU IN-BAND NETWORK TELEMETRY

    Określenie jakości obsługi strumieni pakietów w sieci przełączników wymaga odpowiedniego środowiska badawczego w którym prowadzi się doświadczenia i pomiary wybranych wielkości. Protokół In-band Network Telemetry jest jednym z narzędzi, które można wykorzystać do realizacji tych zadań. W pracy zaproponowano zwirtualizowane środowisko badawcze w którym można emulować sieć przełączników programowalnych w języku P4 wraz z implementacją...

  • Resource constrained neural network training

    Publication

    Modern applications of neural-network-based AI solutions tend to move from datacenter backends to low-power edge devices. Environmental, computational, and power constraints are inevitable consequences of such a shift. Limiting the bit count of neural network parameters proved to be a valid technique for speeding up and increasing efficiency of the inference process. Hence, it is understandable that a similar approach is gaining...

    Full text available to download

  • Application tool for IP QoS network design

    Publication

    - Year 2010

    Despite the fact that differentiated-service-aware network implementation has been a widely discussed topic for quite some time, network design still proofs nontrivial. Well developed software could put an end to network designer's problems. This chapter describes work, which has been aimed at creating a comprehensive network design tool, offering a fair range of functionality and high reliability. The presented tool is able to...

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Model of control plane of ASON/GMPLS network

    ASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols. This solution, an ASON control plane built on GMPLS protocols is named ASON/GMPLS. In the paper, we decompose the control plane problem and show the main concepts of ASON network. We propose a hierarchical architecture...

  • Simulator for Performance Evaluation of ASON/GMPLS Network

    Publication

    The hierarchical control plane network architecture of Automatically Switched Optical Network with utilization of Generalized Multi-Protocol Label Switching protocols is compliant to next generation networks requirements and can supply connections with required quality of service, even with incomplete domain information. Considering connection control, connection management and network management, the controllers of this architecture...

    Full text available to download

  • Epoxy/Ionic Liquid-Modified Mica Nanocomposites: Network Formation–Network Degradation Correlation

    Publication
    • M. Jouyandeh
    • V. Akbari
    • S. M. R. Paran
    • S. Livi
    • L. Lins
    • H. Vahabi
    • M. Saeb

    - Nanomaterials - Year 2021

    We synthesized pristine mica (Mica) and N-octadecyl-N’-octadecyl imidazolium iodide (IM) modified mica (Mica-IM), characterized it, and applied it at 0.1–5.0 wt.% loading to prepare epoxy nanocomposites. Dynamic differential scanning calorimetry (DSC) was carried out for the analysis of the cure potential and kinetics of epoxy/Mica and epoxy/Mica-IM curing reaction with amine curing agents at low loading of 0.1 wt.% to avoid particle...

    Full text available to download

  • Evolutionary Algorithms in MPLS network designing

    Publication

    - Year 2008

    MPLS technology become more and more popular especially in core networks giving great flexibility and compatibility with existing Internet protocols. There is a need to optimal design such networks and optimal bandwidth allocation. Linear Programming is not time efficient and does not solve nonlinear problems. Heuristic algorithms are believed to deal with these disadvantages and the most promising of them are Evolutionary Algorithms....

    Full text to download in external service

  • Network effects—do they matter for digital technologies diffusion?

    Purpose The main research target of this paper is to capture the network effects using the case of mobile cellular telephony, identified in European telecommunication markets, and its determinants enhancing the process of digital technologies diffusion. Design/methodology/approach This research relies on panel and dynamic panel regression analysis. The empirical sample covers 30 European countries, and the period for the analysis...

    Full text to download in external service

  • DWDM Network Laboratory Solution for Telecommunication Education Engineering

    Publication

    Development of network architectures in the field of optical telecommunications technologies is an indicator of changes in telecommunication education engineering. Conducting didactic classes requires hardware infrastructure and research in terms of teaching needs. In the paper we present DWDM network laboratory solution for telecommunication education engineering on the basis of the ADVA Optical Networking equipment. We have to...

    Full text to download in external service

  • Information-driven network resilience: Research challenges and perspectives

    Publication
    • J. Rak
    • D. Papadimitriou
    • H. Niedermayer
    • P. Romero

    - Optical Switching and Networking - Year 2017

    Internet designed over 40 years ago was originally focused on host-to-host message delivery in a best-effort manner. However, introduction of new applications over the years have brought about new requirements related with throughput, scalability, mobility, security, connectivity, and availability among others. Additionally, convergence of telecommunications, media, and information technology was responsible for transformation...

    Full text to download in external service

  • Transmission protocol simulation framework for the resource-constrained sensor network

    Publication

    - Year 2014

    In this paper the simulation framework for simulation of the sensor network protocol is presented. The framework enables the simultaneous development of the sensor network software and the protocol for the wireless data transmission. The advantage of using the framework is the convergence of the simulation with the real software, because the same software is used in real sensor network nodes and in the simulation framework. The...

  • Methods of Network Resource Provisioning for the Future Internet IIP Initiative

    Publication
    • J. Gozdecki
    • M. Kantor
    • K. Wajda
    • J. Rak

    - TELECOMMUNICATION SYSTEMS - Year 2016

    In this paper, we present specification, design and implementation aspects of a network resource provisioning module introduced for the Polish Initiative of Future Internet called System IIP. In particular, we propose a set of novel LP optimization models of network resource provisioning designed to minimize the network resource consumption, either bandwidth or node’s computational power, as well as to maximize the residual capacity....

    Full text available to download

  • Full Network Coverage Monitoring Solutions – The netBaltic System Case

    Publication

    This paper defines the problem of monitoring a specific network, and more precisely – part of reporting process, which is responsible for the transport of data collected from network devices to station managers. The environment requires additional assumptions, as a specific network related to the netBaltic Project is to be monitored. Two new monitoring methods (EHBMPvU and EHBMPvF) are proposed, which priority is full network coverage....

    Full text to download in external service

  • The secure transmission protocol of sensor Ad Hoc network

    The paper presents a secure protocol of radio Ad Hoc sensor network. This network operates based on TDMA multiple access method. Transmission rate on the radio channel is 57.6 kbps. The paper presents the construction of frames, types of packets and procedures for the authentication, assignment of time slots available to the node, releasing assigned slots and slots assignment conflict detection.

    Full text to download in external service

  • Generalized access control in hierarchical computer network

    The paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...

    Full text available to download

  • Self-Organizing Wireless Nodes Monitoring Network

    The concept of data monitoring system and self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the wireless monitoring system for containers, and the second is the mobile monitoring system for gas air pollution measurements.

  • Cognitive network model dedicated to transport system telematics

    The paper defines the concept of cognitive radio, in the context of transport systems, with particular emphasis on modern ecological concept of “green cognitive radio”. In addition, in the paper a modified cognitive network model dedicated to transport system telematics is proposed and presented. Algorithms to support the functioning of the cognitive radio are discussed. Sensors necessary to use the network to support cognitive...

  • Global Surrogate Modeling by Neural Network-Based Model Uncertainty

    Publication

    - Year 2022

    This work proposes a novel adaptive global surrogate modeling algorithm which uses two neural networks, one for prediction and the other for the model uncertainty. Specifically, the algorithm proceeds in cycles and adaptively enhances the neural network-based surrogate model by selecting the next sampling points guided by an auxiliary neural network approximation of the spatial error. The proposed algorithm is tested numerically...

    Full text to download in external service

  • Berkeley Open Infrastructure for Network Computing

    Publication

    - Year 2012

    Zaprezentowano system BOINC (ang. Berkeley Open Infrastructure for Network Computing) jako interesujące rozwiązanie integrujące rozproszone moce obliczeniowe osobistych komputerów typu PC w Internecie. Przedstawiono zasadę działania opisywanej platformy. W dalszej części zaprezentowano kilka wybranych projektów naukowych wykorzystujących BOINC, które są reprezentatywne w zakresie zastosowania systemu w ujęciu założonego paradygmatu...

    Full text to download in external service

  • Distributed state estimation using a network of asynchronous processing nodes

    Publication

    We consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...

    Full text to download in external service

  • Distributed state estimation using a network of asynchronous processing nodes

    We consider the problem of distributed state estimation of continuous-time stochastic processes using a~network of processing nodes. Each node performs measurement and estimation using the Kalman filtering technique, communicates its results to other nodes in the network, and utilizes similar results from the other nodes in its own computations. We assume that the connection graph of the network is not complete, i.e. not all nodes...

    Full text to download in external service

  • Network Protection Against Node Attacks Based on Probabilistic Availability Measures

    Publication

    Full text to download in external service

  • Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network

    In this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating...

    Full text available to download

  • Investigation of continuous wave jamming in an IEEE 802.15.4 network

    Publication

    This paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...

    Full text to download in external service

  • A survey on network resiliency methodologies against weather-based disruptions

    Publication
    • M. Tornatore
    • J. Andre
    • P. Babarczi
    • T. Braun
    • E. Folstad
    • P. Heegaard
    • A. Hmaity
    • M. Furdek
    • L. Jorge
    • W. Kmiecik... and 9 others

    - Year 2016

    Due to the increasing dependence on network services of our society, research has recently been concentrating on enhancing traditional protection strategies to withstand large-scale failures, as in case of disaster events. The recently-formed EU-funded RECODIS project aims at coordinating and fostering research collaboration in Europe on disaster resiliency in communication networks. In particular, the Working Group (WG) 2 of the...

    Full text to download in external service

  • Analysis of energy efficiency of suburban railway transport network

    Publication

    Rising numbers of agglomeration residents cause increased need for people movement on daily basis. Because of congestion of local roads, air pollution and limited parking space, providing mass transit based on electric traction is reasonable. While the electric rail vehicles are considered highly efficient in themselves, they need to be analyzed as a part of a transport network, because energy consumption depends on operating conditions...

    Full text available to download

  • Quality of Service in ASON/GMPLS Network with Hierarchical Control Plane Structure

    Publication

    The paper presents the problem of quality of service for hierarchical control plane structure of Automatically Switched Optical Network (ASON) utilizing Generalized Multi-Protocol Label Switching (GMPLS). The approach is implemented to control the multidomain network with required quality of service, in a use case of incomplete domain network information. The authors examine different factors, including resource reservation algorithms...

    Full text to download in external service

  • PROGRAMMABLE YANG - BASED INTERFACE IN CONTROL OF OPTICAL TRANSPORT NETWORK

    Since over a decade we observe intensive effort of research institutions and industrial consortia on extending flexibility and automation of the transport network control also known under the term network programmability. Key aspect of each programming interface is ability to evolve but also sensitivity to future modifications. As indicated in the past work in the specific context of optical transport networks an important criterion...

    Full text to download in external service

  • Neural network agents trained by declarative programming tutors

    Publication

    This paper presents an experimental study on the development of a neural network-based agent, trained using data generated using declarative programming. The focus of the study is the application of various agents to solve the classic logic task – The Wumpus World. The paper evaluates the effectiveness of neural-based agents across different map configurations, offering a comparative analysis to underline the strengths and limitations...

    Full text to download in external service

  • The Performance of ASON/GMPLS Network with Hierarchical Control Plane Structure

    Publication

    The paper regards the problem of ASON/GMPLS network performance with hierarchical control plane structure in condition of incomplete domain network information. The authors propose the hierarchical ASON/GMPLS control plane architecture, which fulfills the requirements of modern optical networks and allows to control the multidomain network with requirement quality of service. The authors examine the scalability and properties of...

    Full text to download in external service

  • Neural Network Subgraphs Correlation with Trained Model Accuracy

    Publication

    - Year 2020

    Neural Architecture Search (NAS) is a computationally demanding process of finding optimal neural network architecture for a given task. Conceptually, NAS comprises applying a search strategy on a predefined search space accompanied by a performance evaluation method. The design of search space alone is expected to substantially impact NAS efficiency. We consider neural networks as graphs and find a correlation between the presence...

    Full text to download in external service

  • Next generation ITS implementation aspects in 5G wireless communication network

    Publication

    - Year 2017

    In the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...

    Full text to download in external service

  • A Simple Neural Network for Collision Detection of Collaborative Robots

    Publication

    Due to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...

    Full text available to download

  • Application of BAN Network to Increase Security in Transport Systems

    Publication

    - Year 2017

    In the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...

    Full text to download in external service

  • Agent-based social network as a simulation of a market behaviour

    Publication

    - Year 2010

    Recent years and the outbreak of world's economic crisis in 2008 proved the crucial importance of reliable analysis of market dynamics. However, werarely apply models of proper detail level (the global prosperity forecast of 2007 can be seen as a grim proof). The behaviour of individuals and companies is far from being ideal and rational. Many claims that the economic paradigm of rational expectations (coming from J. Muth and R....

  • The Central European GNSS Research Network (CEGRN) dataset

    Publication
    • J. Zurutuza
    • A. Caporali
    • M. Bertocco
    • M. Ishchenko
    • O. Khoda
    • H. Steffen
    • M. Figurski
    • E. Parseliunas
    • S. Berk
    • G. Nykiel

    - Data in Brief - Year 2019

    The Central European GNSS Research Network (CEGRN) collects GNSS data since 1994 from contributors which today include 42 Institutions in 33 Countries. CEGRN returns a dataset of coordinates and velocities computed according to international standards and the most recent processing procedures and recommendations. We provide a dataset of 1229 positions and velocities resulting from 3 or more repetitions of coordinate measurements...

    Full text available to download

  • Neural network training with limited precision and asymmetric exponent

    Publication

    Along with an extremely increasing number of mobile devices, sensors and other smart utilities, an unprecedented growth of data can be observed in today’s world. In order to address multiple challenges facing the big data domain, machine learning techniques are often leveraged for data analysis, filtering and classification. Wide usage of artificial intelligence with large amounts of data creates growing demand not only for storage...

    Full text available to download

  • A Bayesian regularization-backpropagation neural network model for peeling computations

    Publication
    • S. Gouravaraju
    • J. Narayan
    • R. Sauer
    • S. S. Gautam

    - JOURNAL OF ADHESION - Year 2023

    A Bayesian regularization-backpropagation neural network (BRBPNN) model is employed to predict some aspects of the gecko spatula peeling, viz. the variation of the maximum normal and tangential pull-off forces and the resultant force angle at detachment with the peeling angle. K-fold cross validation is used to improve the effectiveness of the model. The input data is taken from finite element (FE) peeling results. The neural network...

    Full text available to download