Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (89)
  • Open Access

    ARTICLE

    AI Safety Approach for Minimizing Collisions in Autonomous Navigation

    Abdulghani M. Abdulghani, Mokhles M. Abdulghani, Wilbur L. Walters, Khalid H. Abed*

    Journal on Artificial Intelligence, Vol.5, pp. 1-14, 2023, DOI:10.32604/jai.2023.039786

    Abstract Autonomous agents can explore the environment around them when equipped with advanced hardware and software systems that help intelligent agents minimize collisions. These systems are developed under the term Artificial Intelligence (AI) safety. AI safety is essential to provide reliable service to consumers in various fields such as military, education, healthcare, and automotive. This paper presents the design of an AI safety algorithm for safe autonomous navigation using Reinforcement Learning (RL). Machine Learning Agents Toolkit (ML-Agents) was used to train the agent with a proximal policy optimizer algorithm with an intrinsic curiosity module (PPO + ICM). This training aims to improve AI… More >

  • Open Access

    ARTICLE

    Reactive Power Flow Convergence Adjustment Based on Deep Reinforcement Learning

    Wei Zhang1, Bin Ji2, Ping He1, Nanqin Wang1, Yuwei Wang1, Mengzhe Zhang2,*

    Energy Engineering, Vol.120, No.9, pp. 2177-2192, 2023, DOI:10.32604/ee.2023.026504

    Abstract Power flow calculation is the basis of power grid planning and many system analysis tasks require convergent power flow conditions. To address the unsolvable power flow problem caused by the reactive power imbalance, a method for adjusting reactive power flow convergence based on deep reinforcement learning is proposed. The deep reinforcement learning method takes switching parallel reactive compensation as the action space and sets the reward value based on the power flow convergence and reactive power adjustment. For the non-convergence power flow, the 500 kV nodes with reactive power compensation devices on the low-voltage side are converted into PV nodes… More >

  • Open Access

    ARTICLE

    Social Engineering Attack-Defense Strategies Based on Reinforcement Learning

    Rundong Yang1,*, Kangfeng Zheng1, Xiujuan Wang2, Bin Wu1, Chunhua Wu1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2153-2170, 2023, DOI:10.32604/csse.2023.038917

    Abstract Social engineering attacks are considered one of the most hazardous cyberattacks in cybersecurity, as human vulnerabilities are often the weakest link in the entire network. Such vulnerabilities are becoming increasingly susceptible to network security risks. Addressing the social engineering attack defense problem has been the focus of many studies. However, two main challenges hinder its successful resolution. Firstly, the vulnerabilities in social engineering attacks are unique due to multistage attacks, leading to incorrect social engineering defense strategies. Secondly, social engineering attacks are real-time, and the defense strategy algorithms based on gaming or reinforcement learning are too complex to make rapid… More >

  • Open Access

    ARTICLE

    Hyper-Heuristic Task Scheduling Algorithm Based on Reinforcement Learning in Cloud Computing

    Lei Yin1, Chang Sun2, Ming Gao3, Yadong Fang4, Ming Li1, Fengyu Zhou1,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1587-1608, 2023, DOI:10.32604/iasc.2023.039380

    Abstract The solution strategy of the heuristic algorithm is pre-set and has good performance in the conventional cloud resource scheduling process. However, for complex and dynamic cloud service scheduling tasks, due to the difference in service attributes, the solution efficiency of a single strategy is low for such problems. In this paper, we presents a hyper-heuristic algorithm based on reinforcement learning (HHRL) to optimize the completion time of the task sequence. Firstly, In the reward table setting stage of HHRL, we introduce population diversity and integrate maximum time to comprehensively determine the task scheduling and the selection of low-level heuristic strategies.… More >

  • Open Access

    ARTICLE

    Network Learning-Enabled Sensor Association for Massive Internet of Things

    Alaa Omran Almagrabi1,*, Rashid Ali2, Daniyal Alghazzawi1, Bander A. Alzahrani1, Fahad M. Alotaibi1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 843-853, 2023, DOI:10.32604/csse.2023.037652

    Abstract The massive Internet of Things (IoT) comprises different gateways (GW) covering a given region of a massive number of connected devices with sensors. In IoT networks, transmission interference is observed when different sensor devices (SD) try to send information to a single GW. This is mitigated by allotting various channels to adjoining GWs. Furthermore, SDs are permitted to associate with any GW in a network, naturally choosing the one with a higher received signal strength indicator (RSSI), regardless of whether it is the ideal choice for network execution. Finding an appropriate GW to optimize the performance of IoT systems is… More >

  • Open Access

    ARTICLE

    Implementation of Strangely Behaving Intelligent Agents to Determine Human Intervention During Reinforcement Learning

    Christopher C. Rosser, Wilbur L. Walters, Abdulghani M. Abdulghani, Mokhles M. Abdulghani, Khalid H. Abed*

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 261-277, 2022, DOI:10.32604/jai.2022.039703

    Abstract Intrinsic motivation helps autonomous exploring agents traverse a larger portion of their environments. However, simulations of different learning environments in previous research show that after millions of timesteps of successful training, an intrinsically motivated agent may learn to act in ways unintended by the designer. This potential for unintended actions of autonomous exploring agents poses threats to the environment and humans if operated in the real world. We investigated this topic by using Unity’s Machine Learning Agent Toolkit (ML-Agents) implementation of the Proximal Policy Optimization (PPO) algorithm with the Intrinsic Curiosity Module (ICM) to train autonomous exploring agents in three… More >

  • Open Access

    ARTICLE

    Reliable Scheduling Method for Sensitive Power Business Based on Deep Reinforcement Learning

    Shen Guo*, Jiaying Lin, Shuaitao Bai, Jichuan Zhang, Peng Wang

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1053-1066, 2023, DOI:10.32604/iasc.2023.038332

    Abstract The main function of the power communication business is to monitor, control and manage the power communication network to ensure normal and stable operation of the power communication network. Communication services related to dispatching data networks and the transmission of fault information or feeder automation have high requirements for delay. If processing time is prolonged, a power business cascade reaction may be triggered. In order to solve the above problems, this paper establishes an edge object-linked agent business deployment model for power communication network to unify the management of data collection, resource allocation and task scheduling within the system, realizes… More >

  • Open Access

    ARTICLE

    Residential Energy Consumption Forecasting Based on Federated Reinforcement Learning with Data Privacy Protection

    You Lu1,2,#,*, Linqian Cui1,2,#,*, Yunzhe Wang1,2, Jiacheng Sun1,2, Lanhui Liu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 717-732, 2023, DOI:10.32604/cmes.2023.027032

    Abstract Most studies have conducted experiments on predicting energy consumption by integrating data for model training. However, the process of centralizing data can cause problems of data leakage. Meanwhile, many laws and regulations on data security and privacy have been enacted, making it difficult to centralize data, which can lead to a data silo problem. Thus, to train the model while maintaining user privacy, we adopt a federated learning framework. However, in all classical federated learning frameworks secure aggregation, the Federated Averaging (FedAvg) method is used to directly weight the model parameters on average, which may have an adverse effect on… More >

  • Open Access

    ARTICLE

    Feature Selection with Deep Reinforcement Learning for Intrusion Detection System

    S. Priya1,*, K. Pradeep Mohan Kumar2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3339-3353, 2023, DOI:10.32604/csse.2023.030630

    Abstract An intrusion detection system (IDS) becomes an important tool for ensuring security in the network. In recent times, machine learning (ML) and deep learning (DL) models can be applied for the identification of intrusions over the network effectively. To resolve the security issues, this paper presents a new Binary Butterfly Optimization algorithm based on Feature Selection with DRL technique, called BBOFS-DRL for intrusion detection. The proposed BBOFSDRL model mainly accomplishes the recognition of intrusions in the network. To attain this, the BBOFS-DRL model initially designs the BBOFS algorithm based on the traditional butterfly optimization algorithm (BOA) to elect feature subsets.… More >

  • Open Access

    ARTICLE

    Reinforcement Learning with an Ensemble of Binary Action Deep Q-Networks

    A. M. Hafiz1, M. Hassaballah2,3,*, Abdullah Alqahtani3, Shtwai Alsubai3, Mohamed Abdel Hameed4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2651-2666, 2023, DOI:10.32604/csse.2023.031720

    Abstract With the advent of Reinforcement Learning (RL) and its continuous progress, state-of-the-art RL systems have come up for many challenging and real-world tasks. Given the scope of this area, various techniques are found in the literature. One such notable technique, Multiple Deep Q-Network (DQN) based RL systems use multiple DQN-based-entities, which learn together and communicate with each other. The learning has to be distributed wisely among all entities in such a scheme and the inter-entity communication protocol has to be carefully designed. As more complex DQNs come to the fore, the overall complexity of these multi-entity systems has increased many… More >

Displaying 11-20 on page 2 of 89. Per Page