Search results for: REINFORCEMENT LEARNING, DQN, LOGIC GAMES, PROLOG, WUMPUS WORLD - Bridge of Knowledge

Search

Search results for: REINFORCEMENT LEARNING, DQN, LOGIC GAMES, PROLOG, WUMPUS WORLD

Filters

total: 92
filtered: 80

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: REINFORCEMENT LEARNING, DQN, LOGIC GAMES, PROLOG, WUMPUS WORLD

  • Are Pair Trading Strategies Profitable During COVID-19 Period?

    Publication
    • M. K. Sohail
    • A. Raheman
    • J. Iqbal
    • M. I. Sindhu
    • A. Staar
    • M. Mushafiq
    • H. Afzal

    - Journal of Information & Knowledge Management - Year 2022

    Pair trading strategy is a well-known profitable strategy in stock, forex, and commodity markets. As most of the world stock markets declined during COVID-19 period, therefore this study is going to observe whether this strategy is still profitable after COVID-19 pandemic. One of the powerful algorithms of DBSCAN under the umbrella of unsupervised machine learning is applied and three clusters were formed by using market and accounting...

    Full text to download in external service

  • Geoscience Methods in Real Estate Market Analyses Subjectivity Decrease

    Publication

    - Geosciences - Year 2019

    Real estate management, including real estate market analysis, is part of a so-called geosystem. In recent years, the popularity of creating various types of systems and automatic solutions in real estate management, including those related to property classification and valuation, has been growing in the world, mainly to reduce the impact of human subjectivity, to increase the scope of analyses and reduce research time. A very...

    Full text available to download

  • Energy-Aware Scheduling for High-Performance Computing Systems: A Survey

    Publication

    High-performance computing (HPC), according to its name, is traditionally oriented toward performance, especially the execution time and scalability of the computations. However, due to the high cost and environmental issues, energy consumption has already become a very important factor that needs to be considered. The paper presents a survey of energy-aware scheduling methods used in a modern HPC environment, starting with the...

    Full text available to download

  • Load effect impact on the exploitation of concrete machine foundations used in the gas and oil industry

    Publication

    - Year 2019

    Machine foundations is a critical topic in the gas and oil industry, which design and exploitation require extensive technical knowledge. Machine foundations are the constructions which are intended for mounting on it a specific type of machine. The foundation has to transfer dynamic and static load from machine to the ground. The primary difference between machine foundations and building foundations is that the machine foundations...

  • Underfrequency Load Shedding: An Innovative Algorithm Based on Fuzzy Logic

    Publication

    In contemporary power systems, the load shedding schemes are typically based on disconnecting a pre-specified amount of load after the frequency drops below a predetermined value. The actual conditions at the time of disturbance may largely dier from the assumptions, which can lead to non-optimal or ineective operation of the load shedding scheme. For many years, increasing the eectiveness of the underfrequency load shedding (UFLS)...

    Full text available to download

  • Is This Distance Teaching Planning That Bad?

    Publication

    - disP - Year 2021

    In spring 2020, university courses were moved into the virtual space due to the Covid-19 lockdown. In this paper, we use experience from courses at Gdańsk University of Technology and ETH Zurich to identify core problems in distance teaching planning and to discuss what to do and what not to do in teaching planning after the pandemic. We conclude that we will not return to the state of (teaching) affairs that we had previously....

    Full text available to download

  • Chained machine learning model for predicting load capacity and ductility of steel fiber–reinforced concrete beams

    Publication
    • T. Shafighfard
    • F. Kazemi
    • F. Bagherzadeh
    • M. Mieloszyk
    • D. Yoo

    - COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING - Year 2024

    One of the main issues associated with steel fiber–reinforced concrete (SFRC) beams is the ability to anticipate their flexural response. With a comprehensive grid search, several stacked models (i.e., chained, parallel) consisting of various machine learning (ML) algorithms and artificial neural networks (ANNs) were developed to predict the flexural response of SFRC beams. The flexural performance of SFRC beams under bending was...

    Full text available to download

  • Toward Robust Pedestrian Detection With Data Augmentation

    Publication

    In this article, the problem of creating a safe pedestrian detection model that can operate in the real world is tackled. While recent advances have led to significantly improved detection accuracy on various benchmarks, existing deep learning models are vulnerable to invisible to the human eye changes in the input image which raises concerns about its safety. A popular and simple technique for improving robustness is using data...

    Full text available to download

  • Physics-guided neural networks (PGNNs) to solve differential equations for spatial analysis

    Numerous examples of physically unjustified neural networks, despite satisfactory performance, generate contradictions with logic and lead to many inaccuracies in the final applications. One of the methods to justify the typical black-box model already at the training stage and lead to many inaccuracies in the final applications. One of the methods to justify the typical black-box model already at the training stage involves extending...

    Full text available to download

  • Platforma edX - nowe podejście do kursów online

    Współczesne metody nauczania na odległość zmieniają się dynamicznie. Powstają światowe konsorcja podejmujące starania zapewnienia dostępu do edukacji na najwyższym poziomie z wykorzystaniem Internetu. Jedną z takich prób jest platforma edX. Jej rozwój zapoczątkowały niemal 2 lata temu MIT i Harvard. Obecnie zespół liczy już 30 uczelni z całego świata. Renoma ośrodków naukowych biorących udział w projekcie przyciągnęła już ponad...

    Full text available to download

  • A Parallel Corpus-Based Approach to the Crime Event Extraction for Low-Resource Languages

    Publication
    • N. Khairova
    • O. Mamyrbayev
    • N. Rizun
    • M. Razno
    • G. Ybytayeva

    - IEEE Access - Year 2023

    These days, a lot of crime-related events take place all over the world. Most of them are reported in news portals and social media. Crime-related event extraction from the published texts can allow monitoring, analysis, and comparison of police or criminal activities in different countries or regions. Existing approaches to event extraction mainly suggest processing texts in English, French, Chinese, and some other resource-rich...

    Full text available to download

  • Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

    Publication
    • A. G. Akintola
    • A. O. Balogun
    • L. F. Capretz
    • H. A. Mojeed
    • S. Basri
    • S. A. Salihu
    • F. E. Usman-Hamza
    • P. O. Sadiku
    • G. B. Balogun
    • Z. O. Alanamu

    - Applied Sciences-Basel - Year 2022

    As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...

    Full text available to download

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • Detection of People Swimming in Water Reservoirs with the Use of Multimodal Imaging and Machine Learning

    Publication

    - Year 2024

    Every year in many countries, there are fatal unintentional drownings in different water reservoirs like swimming pools, lakes, seas, or oceans. The existing threats of this type require creating a method that could automatically supervise such places to increase the safety of bathers. This work aimed to create methods and prototype solutions for detecting people bathing in water reservoirs using a multimodal imaging system and...

    Full text to download in external service

  • Rewitalizacja przestrzeni miejskiej poprzez wydarzenia i inicjatywy sportowe

    Artykuł opisuje powiązania pomiędzy procesami rewitalizacji przestrzeni miejskiej, a wydarzeniami i inicjatywami sportowymi różnej skali i rangi. Można wyodrębnić trzy główne uwarunkowania występowania tych powiązań: 1) podczas organizacji największych wydarzeń sportowych o zasięgu globalnym, takich jak igrzyska olimpijskie oraz mistrzostwa Świata i Europy w piłce nożnej; 2) podczas przedsięwzięć aktywizujących mieszkańców w formie...

    Full text available to download

  • Implementing artificial intelligence in forecasting the risk of personal bankruptcies in Poland and Taiwan

    Publication

    - Oeconomia Copernicana - Year 2022

    Research background: The global financial crisis from 2007 to 2012, the COVID-19 pandemic, and the current war in Ukraine have dramatically increased the risk of consumer bankruptcies worldwide. All three crises negatively impact the financial situation of households due to increased interest rates, inflation rates, volatile exchange rates, and other significant macroeconomic factors. Financial difficulties may arise when the...

    Full text available to download

  • Neural network training with limited precision and asymmetric exponent

    Publication

    Along with an extremely increasing number of mobile devices, sensors and other smart utilities, an unprecedented growth of data can be observed in today’s world. In order to address multiple challenges facing the big data domain, machine learning techniques are often leveraged for data analysis, filtering and classification. Wide usage of artificial intelligence with large amounts of data creates growing demand not only for storage...

    Full text available to download

  • Detection of anomalies in bee colony using transitioning state and contrastive autoencoders

    Honeybees plays vital role for the environmental sustainability and overall agricultural economy. Assisting bee colonies within their proper functioning brings the attention of researchers around the world. Electronics systems and machine learning algorithms are being developed for classifying specific undesirable bee behaviors in order to alert about upcoming substantial losses. However, classifiers could be impaired when used...

    Full text available to download

  • Kriging-assisted hybrid reliability design and optimization of offshore wind turbine support structure based on a portfolio allocation strategy

    Publication
    • D. Meng
    • H. Yang
    • S. Yang
    • Y. Zhang
    • A. M. D. Jesus
    • J. A. Correia
    • T. Fazeres-Ferradosa
    • W. Macek
    • R. Branco
    • S. Zhu

    - OCEAN ENGINEERING - Year 2024

    In recent years, offshore wind power generation technology has developed rapidly around the world, making important contributions to the further development of renewable energy. When designing an Offshore Wind Turbine (OWT) system, the uncertainties in parameters and different types of constraints need to be considered to find the optimal design of these systems. Therefore, the Reliability-Based Design Optimization (RBDO) method...

    Full text to download in external service

  • Deep learning-based waste detection in natural and urban environments

    Waste pollution is one of the most significant environmental issues in the modern world. The importance of recycling is well known, both for economic and ecological reasons, and the industry demands high efficiency. Current studies towards automatic waste detection are hardly comparable due to the lack of benchmarks and widely accepted standards regarding the used metrics and data. Those problems are addressed in this article by...

    Full text available to download

  • Remote measurement of building usable floor area - Algorithms fusion

    Publication
    • A. Janowski
    • M. Renigier-Biłozor
    • M. Walacik
    • A. Chmielewska

    - LAND USE POLICY - Year 2021

    Rapid changes that are taking place in the urban environment have significant impact on urban growth. Most cities and urban regions all over the world compete to increase resident and visitor satisfaction. The growing requirements and rapidity of introducing new technologies to all aspects of residents' lives force cities and urban regions to implement "smart cities" concepts in their activities. Real estate is one of the principal...

    Full text to download in external service

  • Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection

    Publication
    • A. G. Akintola
    • A. O. Balogun
    • H. A. Mojeed
    • F. Usman-Hamza
    • S. A. Salihu
    • K. S. Adewole
    • G. B. Balogun
    • P. O. Sadiku

    - International Journal of Interactive Mobile Technologies - Year 2022

    Due to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...

    Full text available to download

  • Robust and Efficient Machine Learning Algorithms for Visual Recognition

    Publication

    - Year 2022

    In visual recognition, the task is to identify and localize all objects of interest in the input image. With the ubiquitous presence of visual data in modern days, the role of object recognition algorithms is becoming more significant than ever and ranges from autonomous driving to computer-aided diagnosis in medicine. Current models for visual recognition are dominated by models based on Convolutional Neural Networks (CNNs), which...

    Full text available to download

  • COVID-19 and digital deprivation in Poland

    Publication

    Research background: The problem of digital deprivation is already known, but the COVID-19 pandemic has highlighted its negative consequences. A global change in the way of life, work and socialisation resulting from the epidemic has indicated that a basic level of digital integration is becoming necessary. During the lockdown, people were forced to use ICTs to adapt to a rapidly changing reality. Current experience with coronavirus...

    Full text available to download

  • Freelance technical writing application for a job which I did not get.

    Publication

    - Year 2019

    In this essay I am going to explore the different ways in which developments in engineering technology and materials science have improved the quality of learning and at the same time somewhat diminished students innate intellectual ability which came as the result of what we know as A.I.   According to wikipedia.org the word "education" comes from the conjunction of a Latin words "I lead" or "duco" meaning "I...

  • Real-Time Facial Features Detection from Low Resolution Thermal Images with Deep Classification Models

    Deep networks have already shown a spectacular success for object classification and detection for various applications from everyday use cases to advanced medical problems. The main advantage of the classification models over the detection models is less time and effort needed for dataset preparation, because classification networks do not require bounding box annotations, but labels at the image level only. Yet, after passing...

    Full text to download in external service

  • Is data management a new “digitisation”? A change of the role of librarians in the context of changing academic libraries’ tasks

    Publication

    - Year 2018

    Academic libraries’ tasks have been evolving over the years. The changes have been stimulated by appearing of electronic resources, automated library systems, digital libraries and Open Access (OA) repositories. Librarians’ tasks and responsibilities in the academic environment have been evolving in accordance with new tasks they were expected to assume. A few years ago there was a discussion during which an attempt was made to...

    Full text available to download

  • How can Systems Thinking Help Us Handling the COVID-19 Crisis?

    Publication

    - Year 2020

    Purpose: COVID-19 pandemic outbreak remains one of the most influential events in the global economy over the recent years. While being primarily public health-related, it has a tremendous impact on many other aspects, such as public transport, education, and business management. Many businesses were forced to introduce rapid changes to their business models in order to survive. The aim of this paper is to show the complexity and...

    Full text available to download

  • Using LSTM networks to predict engine condition on large scale data processing framework

    Publication

    - Year 2017

    As the Internet of Things technology is developing rapidly, companies have an ability to observe the health of engine components and constructed systems through collecting signals from sensors. According to output of IoT sensors, companies can build systems to predict the conditions of components. Practically the components are required to be maintained or replaced before the end of life in performing their assigned task. Predicting...

    Full text to download in external service

  • Architektura a dekonstrukcja. Przypadek Petera Eisenmana i Bernarda Tschumiego

    Publication

    - Year 2015

    Architecture and Deconstruction Case of Peter Eisenman and Bernard Tschumi   Introduction Towards deconstruction in architecture Intensive relations between philosophical deconstruction and architecture, which were present in the late 1980s and early 1990s, belong to the past and therefore may be described from a greater than...

    Full text available to download