Results 71 to 80 of about 4,328 (167)
Theory and method of shearer digital twin navigation cutting motion planning [PDF]
In order to further improve the intelligence level of coal working faces and achieve autonomous deduction, autonomous learning, and autonomous optimization of shearer navigation cutting, based on the concept of shearer autonomous navigation cutting ...
GE Shirong, MIAO Bing
core +1 more source
Abstract Henry George advocated for capturing land value increases for public ends. The active approach of public authorities organizing and financing land development can help capture higher land value increases, as Hartman and Spit indicate. However, this approach hardly happens in developing countries, where the coalition of private developers and ...
Nannan Xu
wiley +1 more source
临床实习是医学教育的关键时期是学校教育的深化,是学生将学校的理论与实践相结合的学习过程,实习教学目的是让学生在实际工作中学会运用理论知识,增强操作技能,培养分析问题、解决问题、独立工作能力,临床体液检验理论内容繁多,检测繁琐,设备发展迅速,是医学检验专业教学的重点、难点之一 ...
黄阿莉, 马琳琳, 吴翠翠
doaj
在大力发展智能电网的背景下,支撑电网运转的电力光通信网规模日趋庞大,其承载的业务更加多样化。然而电力光通信网的业务路由规划主要以最短路径算法为主,导致电力光通信网存在业务重要度分布不均衡,从而导致网络局部风险过高的问题。针对上述现状,文章采用深度强化学习技术,以网络业务风险均衡为目标,提出了基于强化学习的电力光通信网风险均衡路由算法。该算法考虑业务重要度分布情况、链路容量和链路光信噪比,实现了电力光通信网风险均衡化。文章选取某省电力通信子网验证方案的有效性,研究结果表明 ...
张庚 +5 more
doaj
Gathering Intelligence for Robust Crisis Governance: A Literature Review and Research Agenda
ABSTRACT The COVID‐19 crisis has highlighted the critical role and challenges of information processing during turbulent times. While expert knowledge can reassure citizens, it may also seem exclusive, and government communication often risks being overwhelming or unclear.
Chiara Russo
wiley +1 more source
Stealthy data poisoning attack method on offline reinforcement learning in unmanned systems [PDF]
Aiming at the limitations in effectiveness and stealth of existing offline reinforcement learning(RL) data poisoning attacks, a critical time-step dynamic poisoning attack was proposed, perturbing important samples to achieve efficient and covert attacks.
GAO Chaoyang +6 more
core +1 more source
TD algorithm based on double-layer fuzzy partitioning [PDF]
When dealing with the continuous space problems,the traditional Q-iteration algorithms based on lookup-table or function approximation converge slowly and are diff lt to get a continuous policy.To overcome the above weak-nesses,an on-policy TD algorithm ...
Hong-kun SUN +4 more
core +1 more source
Abstract This study explores readiness for change (RFC) in infant and early childhood education through the perspectives of infant and early childhood mental health (IECMH) consultants and social‐emotional (SEL) coaches. Specifically, this research examines how these professionals perceive educators’ RFC, identify barriers and facilitators to ...
Kaela M. Tidus, Amanda P. Williford
wiley +1 more source
机器学习根据历史数据的模式预测未来,近年来进行了大量研究并得到了应用,但在处理动态、非完整、非结构化信息上与人类相去甚远。为此,引入人的决策,结合机器学习、知识库,构建了一个人在回路的混合增强智能闭环系统。基于 Sawyer 协作机器人搭建了人机融合实验平台,设计了机器人抓取实验。实验结果表明,相比单一机器学习方式,在引入人类智能后,Sawyer在应对非结构化环境下的抓取任务中表现更佳。
付海军 +4 more
doaj
Optimized algorithm for value iteration based on topological sequence backups [PDF]
In order to improve the convergence performance, an optimized value iteration based on topological sequence backups, VI-TS, is proposed. The key idea of VI-TS is to circumvent the problem of unnecessary backups by dividing an MDP into strongly-connected ...
Hong-kun SUN +4 more
core +1 more source

