For a project in Bangladesh, Prof. Mushfiq Mobarak and his team used machine-learning models applied to mobile phone records ...
An Ensemble Learning Tool for Land Use Land Cover Classification Using Google Alpha Earth Foundations Satellite Embeddings ...
Cryptography secures communication in banking, messaging, and blockchain. Good algorithms (AES, RSA, ECC, SHA-2/3, ChaCha20) are secure, efficient, and widely trusted. Bad algorithms (DES, MD5, SHA-1, ...
Unmanned surface vehicles (USVs) nowadays have been widely used in ocean observation missions, helping researchers to monitor climate change, collect environmental data, and observe marine ecosystem ...
Abstract: We study the Whittle index learning algorithm with Q-Iearning for restless multi-armed bandits. We first discuss Q-learning algorithm with exploration policies-E-greedy, softmax, e-softmax ...
ABSTRACT: Offline reinforcement learning (RL) focuses on learning policies using static datasets without further exploration. With the introduction of distributional reinforcement learning into ...
Abstract: Q-learning and double Q-learning are well-known sample-based, off-policy reinforcement learning algorithms. However, Q-learning suffers from overestimation bias, while double Q-learning ...
Institute of Logistics Science and Engineering of Shanghai Maritime University, Pudong, China Introduction: This study addresses the joint scheduling optimization of continuous berths and quay cranes ...
Reinforcement learning (RL) trains agents to make sequential decisions by maximizing cumulative rewards. It has diverse applications, including robotics, gaming, and automation, where agents interact ...