Results 41 to 50 of about 81,989 (164)

A connection-level call admission control using genetic algorithm for MultiClass multimedia services in wireless networks [PDF]

open access: yes, 2006
Call admission control in a wireless cell in a personal communication system (PCS) can be modeled as an M/M/C/C queuing system with m classes of users. Semi-Markov Decision Process (SMDP) can be used to optimize channel utilization with upper bounds on ...
Hong, X, Ni, Q, Xiao, Y
core  

From Infinite to Finite Programs: Explicit Error Bounds with Applications to Approximate Dynamic Programming

open access: yes, 2017
We consider linear programming (LP) problems in infinite dimensional spaces that are in general computationally intractable. Under suitable assumptions, we develop an approximation bridge from the infinite-dimensional LP to tractable finite convex ...
Esfahani, Peyman Mohajerin   +3 more
core   +1 more source

Multi‐agent reinforcement learning based transmission scheme for IRS‐assisted multi‐UAV systems

open access: yesIET Communications, 2023
In this paper, a transmission scheme based on multi‐agent reinforcement learning for intelligent reflecting surface (IRS)‐assisted multiple unmanned aerial vehicles (UAVs) systems is proposed.
Yumo Mei   +4 more
doaj   +1 more source

A Hemimetric Extension of Simulation for Semi-Markov Decision Processes [PDF]

open access: yes, 2018
Semi-Markov decision processes (SMDPs) are continuous-time Markov decision processes where the residence-time on states is governed by generic distributions on the positive real line. In this paper we consider the problem of comparing two SMDPs with respect to their time-dependent behaviour.
Pedersen, Mathias Ruggaard   +3 more
openaire   +2 more sources

Fuzzy Reinforcement Learning and Curriculum Transfer Learning for Micromanagement in Multi-Robot Confrontation

open access: yesInformation, 2019
Multi-Robot Confrontation on physics-based simulators is a complex and time-consuming task, but simulators are required to evaluate the performance of the advanced algorithms.
Chunyang Hu, Meng Xu
doaj   +1 more source

Task admission control for application service operators in mobile cloud computing

open access: yesEURASIP Journal on Wireless Communications and Networking, 2020
The resource constraint has become an important factor hindering the further development of mobile devices (MDs). Mobile cloud computing (MCC) is a new approach proposed to extend MDs’ capacity and improve their performance by task offloading.
Xiaomin Jin, Wenqiang Hua, Zhongmin Wang
doaj   +1 more source

Application of Generator-Electric Motor System for Emergency Propulsion of a Vessel in the Event of Loss of the Full Serviceability of the Diesel Main Engine

open access: yesEnergies, 2022
Oil tanker disasters have been a cause of major environmental disasters, with multi-generational impacts. One of the greatest hazards is damage to the propulsion system that causes the ship to turn sideways to a wave and lose stability, which in storm ...
Zbigniew Łosiewicz   +4 more
doaj   +1 more source

First and second order semi-Markov chains for wind speed modeling

open access: yes, 2012
The increasing interest in renewable energy, particularly in wind, has given rise to the necessity of accurate models for the generation of good synthetic wind speed data.
Barbu   +24 more
core   +1 more source

Trajectory Optimization of Packet Ferries in Opportunistic Social-Based Machine-to-Machine Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Machine-to-machine (M2M) communication is an emerging paradigm to connect a large number of devices through wireless technologies. In recent application scenarios, devices are normally carried by people in social contexts.
Xin Guan
doaj   +1 more source

Software Vulnerability Patch Management with Semi-Markov Decision Process [PDF]

open access: yesApplied Mathematics & Information Sciences, 2013
Information security incidents frequency has been increasing dramatically, the aim of this study is to analyze the state-space reachability problems through the transition of vulnerable status after the inf ormative system vulnerability exposure. In this research we took into consideration the time factor to analyze the arrival time to reacha ble ...
Chien-Cheng Huang   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy