当前位置:网站首页>Hong Kong Polytechnic University | data efficient reinforcement learning and adaptive optimal perimeter control of network traffic dynamics
Hong Kong Polytechnic University | data efficient reinforcement learning and adaptive optimal perimeter control of network traffic dynamics
2022-07-03 16:27:00 【Zhiyuan community】
【 title 】Data efficient reinforcement learning and adaptive optimal perimeter control of network traffic dynamics
【 The author team 】C. Chen, Y.P. Huang, W.H.K. Lam, T.L. Pan, S.C. Hsu, A. Sumalee, R.X. Zhong
【 Date of publication 】2022.6.28
【 Thesis link 】https://www.sciencedirect.com/sdfe/reader/pii/S0968090X22001929/pdf
【 Recommended reasons 】 The existing data-driven and feedback flow control strategies do not consider the heterogeneity of real-time data measurement . Besides , Traditional traffic control reinforcement learning (RL) Due to the lack of data efficiency , Usually slow convergence . Moreover, the traditional optimal perimeter control scheme needs to accurately understand the system dynamics , Therefore, they are vulnerable to endogenous uncertainty . In this paper, we propose a holistic reinforcement learning (IRL) To learn macro traffic dynamics , To achieve adaptive optimal perimeter control . The main contribution of this paper is :(a) Continuous time control with discrete gain update is developed , To adapt to discrete-time sensor data .(b) In order to reduce sampling complexity and use available data more effectively , Replay experience (ER) Technology introduction IRL Algorithm .(c) The proposed method is based on “ No model ” The method relaxes the requirements for model calibration , Through data-driven RL The algorithm achieves robustness to modeling uncertainty and improves real-time performance .(d) be based on IRL The convergence of the algorithm and the stability of the controlled traffic dynamics are proved theoretically . The optimal control law is parameterized , Then through neural network (NN) Approaching , This reduces the computational complexity .
边栏推荐
- 记一次jar包冲突解决过程
- [statement] about searching sogk1997 and finding many web crawler results
- Interviewer: how does the JVM allocate and recycle off heap memory
- Page dynamics [2]keyframes
- [proteus simulation] 8 × 8LED dot matrix screen imitates elevator digital scrolling display
- 疫情常态化大背景下,关于远程办公的思考|社区征文
- Custom plug-in construction and use of QT plug-in
- The difference between calling by value and simulating calling by reference
- TCP擁塞控制詳解 | 3. 設計空間
- Chinese translation of Tagore's floating birds (1~10)
猜你喜欢

记一次jar包冲突解决过程

Initial test of scikit learn Library

Famous blackmail software stops operation and releases decryption keys. Most hospital IOT devices have security vulnerabilities | global network security hotspot on February 14
![[statement] about searching sogk1997 and finding many web crawler results](/img/1a/8ed3ca0030ea227adcd95e8b306aca.png)
[statement] about searching sogk1997 and finding many web crawler results

Embedded development: seven reasons to avoid open source software

Visual SLAM algorithms: a survey from 2010 to 2016

NFT新的契机,多媒体NFT聚合平台OKALEIDO即将上线

Myopia: take off or match glasses? These problems must be understood clearly first

The accept attribute of the El upload upload component restricts the file type (detailed explanation of the case)

Remote file contains actual operation
随机推荐
【Proteus仿真】74HC595+74LS154驱动显示16X16点阵
Mysql 单表字段重复数据取最新一条sql语句
[redis foundation] understand redis persistence mechanism together (rdb+aof graphic explanation)
Multithread 02 thread join
Slam learning notes - build a complete gazebo multi machine simulation slam from scratch (4)
Slam learning notes - build a complete gazebo multi machine simulation slam from scratch (II)
"Everyday Mathematics" serial 56: February 25
Colab works with Google cloud disk
Effect of ARP package on FTP dump under vxworks-6.6 system
Record windows10 installation tensorflow-gpu2.4.0
Unity项目优化案例一
Mysql 将逗号隔开的属性字段数据由列转行
[combinatorics] combinatorial identity (sum of variable upper terms 1 combinatorial identity | summary of three combinatorial identity proof methods | proof of sum of variable upper terms 1 combinator
请求头不同国家和语言的表示
Is it safe to open an account with tongdaxin?
消息队列消息丢失和消息重复发送的处理策略
Thinking about telecommuting under the background of normalization of epidemic | community essay solicitation
关于视觉SLAM的最先进技术的调查-A survey of state-of-the-art on visual SLAM
Visual SLAM algorithms: a survey from 2010 to 2016
在ntpdate同步时间的时候出现“the NTP socket is in use, exiting”