This three sentence summary provides the key details about the document:
The document proposes using multi-agent Q-learning to control traffic lights in a large, non-stationary traffic network. Each intersection is modeled as an intelligent agent that uses reinforcement learning to determine optimal light timings based on local queue lengths. The Q-learning approach does not require a pre-specified model and can adapt to changing traffic conditions, making it suitable for dynamic, non-stationary environments unlike traditional reinforcement learning.
A Template Matching Approach to Classification of QAM Modulation using Geneti...CSCJournals
The automatic recognition of the modulation format of a detected signal, the intermediate step between signal detection and demodulation, is a major task of an intelligent receiver, with various civilian and military applications. Obviously, with no knowledge of the transmitted data and many unknown parameters at the receiver, such as the signal power, carrier frequency and phase offsets, timing information, etc., blind identification of the modulation is a difficult task. This becomes even more challenging in real-world. In this paper modulation classification for QAM is performed by Genetic Algorithm followed by Template matching, considering the constellation of the received signal. In addition this classification finds the decision boundary of the signal which is critical information for bit detection. I have proposed and implemented a technique that casts modulation recognition into shape recognition. Constellation diagram is a traditional and powerful tool for design and evaluation of digital modulations. The simulation results show the capability of this method for modulation classification with high accuracy and appropriate convergence in the presence of noise.
Integration of a Predictive, Continuous Time Neural Network into Securities M...Chris Kirk, PhD, FIAP
This paper describes recent development and test implementation of a continuous time recurrent neural network that has been configured to predict rates of change in securities. It presents outcomes in the
context of popular technical analysis indicators and highlights the potential impact of continuous predictive capability on securities
market trading operations.
Spectral opportunity selection based on the hybrid algorithm AHP-ELECTRETELKOMNIKA JOURNAL
Due to an ever-growing demand for spectrum and the fast-paced developmentof wireless applications, technologies such as cognitive radio enablethe efficient use of the spectrum. The objective of the present article is todesign an algorithm capable of choosing the best channel for data transmission.It uses quantitative methods that can modify behavior by changing qualityparameters in the channel. To achieve this task, a hybrid decision-makingalgorithm is designed that combinesanalytical hierarchy process(AHP)algorithms and adjusts the weights of each channel parameter, using a prioritytable. TheElimination Et Choix Tranduisant La Realité(ELECTRE)algorithm processes the information from each channel through a weightmatrix and then delivers the most favorable result for the transmitted data. Theresults reveal that the hybrid AHP-ELECTRE algorithm has a suitableperformance, which improves the throughput rate by 14% compared to similaralternatives.
Application of a merit function based interior point method to linear model p...Zac Darcy
This paper present
s
robust linear model predictive control (MPC) technique for small scale linear MPC
problems. The quadratic programming (QP) problem arising in linear MPC is solved using primal dual
interior point method
.
We present
a me
rit function based on a path following strategy
to calculate the step
length
α
, which
forces the convergence of feasible iterates
. The algorithm globally converges to the optimal
solution
of the QP p
roblem while strictly following
the
inequality
constraint
s.
The linear system in the QP
problem is solved using LDL
T
factorizatio
n based linear solver which reduces the computational cost of
linear system to a certain extent
.
We implement this method for
a
linear MPC problem of undamped
oscillator. With the help
of a Kalman filter observer, we show that the MPC design is robust to the external
disturbances and integrated white noise.
A Template Matching Approach to Classification of QAM Modulation using Geneti...CSCJournals
The automatic recognition of the modulation format of a detected signal, the intermediate step between signal detection and demodulation, is a major task of an intelligent receiver, with various civilian and military applications. Obviously, with no knowledge of the transmitted data and many unknown parameters at the receiver, such as the signal power, carrier frequency and phase offsets, timing information, etc., blind identification of the modulation is a difficult task. This becomes even more challenging in real-world. In this paper modulation classification for QAM is performed by Genetic Algorithm followed by Template matching, considering the constellation of the received signal. In addition this classification finds the decision boundary of the signal which is critical information for bit detection. I have proposed and implemented a technique that casts modulation recognition into shape recognition. Constellation diagram is a traditional and powerful tool for design and evaluation of digital modulations. The simulation results show the capability of this method for modulation classification with high accuracy and appropriate convergence in the presence of noise.
Integration of a Predictive, Continuous Time Neural Network into Securities M...Chris Kirk, PhD, FIAP
This paper describes recent development and test implementation of a continuous time recurrent neural network that has been configured to predict rates of change in securities. It presents outcomes in the
context of popular technical analysis indicators and highlights the potential impact of continuous predictive capability on securities
market trading operations.
Spectral opportunity selection based on the hybrid algorithm AHP-ELECTRETELKOMNIKA JOURNAL
Due to an ever-growing demand for spectrum and the fast-paced developmentof wireless applications, technologies such as cognitive radio enablethe efficient use of the spectrum. The objective of the present article is todesign an algorithm capable of choosing the best channel for data transmission.It uses quantitative methods that can modify behavior by changing qualityparameters in the channel. To achieve this task, a hybrid decision-makingalgorithm is designed that combinesanalytical hierarchy process(AHP)algorithms and adjusts the weights of each channel parameter, using a prioritytable. TheElimination Et Choix Tranduisant La Realité(ELECTRE)algorithm processes the information from each channel through a weightmatrix and then delivers the most favorable result for the transmitted data. Theresults reveal that the hybrid AHP-ELECTRE algorithm has a suitableperformance, which improves the throughput rate by 14% compared to similaralternatives.
Application of a merit function based interior point method to linear model p...Zac Darcy
This paper present
s
robust linear model predictive control (MPC) technique for small scale linear MPC
problems. The quadratic programming (QP) problem arising in linear MPC is solved using primal dual
interior point method
.
We present
a me
rit function based on a path following strategy
to calculate the step
length
α
, which
forces the convergence of feasible iterates
. The algorithm globally converges to the optimal
solution
of the QP p
roblem while strictly following
the
inequality
constraint
s.
The linear system in the QP
problem is solved using LDL
T
factorizatio
n based linear solver which reduces the computational cost of
linear system to a certain extent
.
We implement this method for
a
linear MPC problem of undamped
oscillator. With the help
of a Kalman filter observer, we show that the MPC design is robust to the external
disturbances and integrated white noise.
An optimal general type-2 fuzzy controller for Urban Traffic NetworkISA Interchange
Urban traffic network model is illustrated by state-charts and object-diagram. However, they have limitations to show the behavioral perspective of the traffic information flow. Consequently, a state space model is used to calculate the half-value waiting time of vehicles. In this study, a combination of the general type-2 fuzzy logic sets and the modified backtracking search algorithm (MBSA) techniques are used in order to control the traffic signal scheduling and phase succession so as to guarantee a smooth flow of traffic with the least wait times and average queue length. The parameters of input and output membership functions are optimized simultaneously by the novel heuristic algorithm MBSA. A comparison is made between the achieved results with those of optimal and conventional type-1 fuzzy logic controllers.
Routing in Wireless Mesh Networks: Two Soft Computing Based Approachesijmnct
Due to dynamic network conditions, routing is the most critical part in WMNs and needs to be optimised.
The routing strategies developed for WMNs must be efficient to make it an operationally self configurable
network. Thus we need to resort to near shortest path evaluation. This lays down the requirement of some
soft computing approaches such that a near shortest path is available in an affordable computing time. This
paper proposes a Fuzzy Logic based integrated cost measure in terms of delay, throughput and jitter.
Based upon this distance (cost) between two adjacent nodes we evaluate minimal shortest path that updates
routing tables. We apply two recent soft computing approaches namely Big Bang Big Crunch (BB-BC) and
Biogeography Based Optimization (BBO) approaches to enumerate shortest or near short paths. BB-BC
theory is related with the evolution of the universe whereas BBO is inspired by dynamical equilibrium in
the number of species on an island. Both the algorithms have low computational time and high convergence
speed. Simulation results show that the proposed routing algorithms find the optimal shortest path taking
into account three most important parameters of network dynamics. It has been further observed that for
the shortest path problem BB-BC outperforms BBO in terms of speed and percent error between the
evaluated minimal path and the actual shortest path.
A surrogate-assisted modeling and optimization method for planning communicat...Power System Operation
The development of industrial informatization stimulates
the implementation of cyber-physical system (CPS) in
distribution network. As a close integration of the power
network infrastructure with cyber system, the research
of design methodology and tools for CPS has gained
wide spread interest considering the heterogeneous
characteristic. To address the problem of planning
communication system in distribution network CPS, at
first, this paper proposed an optimization model utilizing
topology potential equilibrium. The mutual influence
of nodes and the spatial distribution of topological
structure is mathematically described. Then, facing the
complex optimization problem in binary space with
multiple constraints, a novel binary bare bones fireworks
algorithm (BBBFA) with a surrogate-assisted model
is proposed. In the proposed algorithm, the surrogate
model, a back propagation neural network, replaces the
complex constraints by incremental approximation of
nonlinear constraint functions for reducing the difficulty
in finding the optimal solution. The communication
system planning of IEEE 39-bus power system,
which comprises four terminal units, was optimized.
Considering the different heterogeneous degrees,
four programs were involved in planning for practical
considerations. The simulation results of the proposed
algorithm were compared with other representative
methods, which demonstrated the effective performance
of the proposed method to solve communication system
planning for optimizing problems of distribution
network.
Classification of vehicles based on audio signalsijsc
The focusof this paper is on classification of different vehicles using sound emanated from the vehicles. In
this paper,quadratic discriminant analysis classifies audio signals of passing vehicles to bus, car, motor, and
truck categories based on features such as short time energy, average zero cross rate, and pitch frequency of
periodic segments of signals. Simulation results show that just by considering high energy feature vectors,
better classification accuracy can be achieved due to the correspondence of low energy regions with noises
of the background. To separate these elements, short time energy and average zero cross rate are used
simultaneously.In our method,we have used a few features which are easy to be calculated in time domain
and enable practical implementation of efficient classifier. Although, the computation complexity is low,
the classification accuracy is comparable with other classification methodsbased on long feature vectors
reported in literature for this problem.
Hybrid multi objectives genetic algorithms and immigrants scheme for dynamic ...khalil IBRAHIM
the main concept of intelligent optimization techniques, artificial neural networks, and new genetic algorithms to solve the multi-objective multicast routing problems with shortest path (SP) problem that used in the addresses networks and improve all processes addressing in the wireless communications based on multi-objective optimization. The most important characteristics in mobile wireless networks is the topology dynamics and the network topology changes over time, the routing problem (SPRP) in mobile ad hoc networks (MANETs) turns out to be a dynamic optimization problem[13], the hybrid immigrants multiple-objective genetic algorithm (HIMOGAs) in the real- world are dynamic in nature, that has objective functions, constraints, and parameters, the dynamic optimization problems (DOPs) are a big challenges to evolutionary multi-objective, since any environmental change may affect the objective vector, constraints, and parameters, HIMOGA for the optimization goal is to track the moving of parameters and get a sequence of approximations solutions over time. The quantity of services (QoS) is supporting guarantee for all data traffic and getting the maximizing utilization for network, the QoS based on multicast routing offers significant challenges, and increases to use an efficient multicast routing protocol that will be able to check multicast routing and satisfying QoS constraints, The author propose to use HIMOGAs and SP algorithm to solve multicast problem that produces new generation wireless networks with immigrants schema to get high-quality solutions after each change and satisfying all objectives.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Checkpoint and recovery protocols are commonly used in distributed applications for providing fault
tolerance. A distributed system may require taking checkpoints from time to time to keep it free of arbitrary
failures. In case of failure, the system will rollback to checkpoints where global consistency is preserved.
Checkpointing is one of the fault-tolerant techniques to restore faults and to restart job fast. The algorithms
for checkpointing on distributed systems have been under study for years.
It is known that checkpointing and rollback recovery are widely used techniques that allow a distributed
computing to progress inspite of a failure.There are two fundamental approaches for checkpointing and
recovery.One is asynchronus approach, process take their checkpoints independenty.So,taking checkpoints
is very simple but due to absence of a recent consistent global checkpoint which may cause a rollback of
computation.Synchronus checkpointing approach assumes that a single process other than the application
process invokes the checkpointing algorithm periodically to determine a consistent global checkpoint.
Method of controlling access to intellectual switching nodes of telecommunica...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
An Implementation on Effective Robot Mission under Critical Environemental Co...IJERA Editor
Software engineering is a field of engineering, for designing and writing programs for computers or other electronic devices. A software engineer, or programmer, writes software (or changes existing software) and compiles software using methods that make it better quality. Is the application of engineering to the design, development, implementation, testingand main tenance of software in a systematic method. Now a days the robotics are also plays an important role in present automation concepts. But we have several challenges in that robots when they are operated in some critical environments. Motion planning and task planning are two fundamental problems in robotics that have been addressed from different perspectives. For resolve this there are Temporal logic based approaches that automatically generate controllers have been shown to be useful for mission level planning of motion, surveillance and navigation, among others. These approaches critically rely on the validity of the environment models used for synthesis. Yet simplifying assumptions are inevitable to reduce complexity and provide mission-level guarantees; no plan can guarantee results in a model of a world in which everything can go wrong. In this paper, we show how our approach, which reduces reliance on a single model by introducing a stack of models, can endow systems with incremental guarantees based on increasingly strengthened assumptions, supporting graceful degradation when the environment does not behave as expected, and progressive enhancement when it does.
F EATURE S ELECTION USING F ISHER ’ S R ATIO T ECHNIQUE FOR A UTOMATIC ...IJCI JOURNAL
Automatic Speech Recognition (ASR) involves mainly
two steps; feature extraction and classification
(pattern recognition). Mel Frequency Cepstral Coeff
icient (MFCC) is used as one of the prominent featu
re
extraction techniques in ASR. Usually, the set of a
ll 12 MFCC coefficients is used as the feature vect
or in
the classification step. But the question is whethe
r the same or improved classification accuracy can
be
achieved by using a subset of 12 MFCC as feature ve
ctor. In this paper, Fisher’s ratio technique is us
ed for
selecting a subset of 12 MFCC coefficients that con
tribute more in discriminating a pattern. The selec
ted
coefficients are used in classification with Hidden
Markov Model (HMM) algorithm. The classification
accuracies that we get by using 12 coefficients and
by using the selected coefficients are compare
Our team had to use signal processing techniques to find the direction of desired incoming signals at an antenna rejecting interference from other signals.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Flavours of Physics Challenge: Transfer Learning approachAlexander Rakhlin
Presentation for "Heavy Flavour Data Mining workshop", February 18-19, University of Zurich. I discuss the solution that won Physics Prize of Flavours of Physics challenge organized by CERN, Yandex, Intel at Kaggle.
Ieee transactions on networking 2018 Title with Abstract tsysglobalsolutions
WE OFFER IEEE 2018 – 2019 FINAL YEAR MAIN & MINI PROJECT FOR ME,MSC,MCA/BE,B.TECH (CSE/IT) STUDENTS.
TECHNOLOGIES WE SUPPORT BIG DATA HADOOP, SPARK, SCALA, STROM, ELASTICSEARCH, WEB SERVICES(SOAP, RESTFUL (JERSEY), JAVA, J2EE, NS2, NS3, GLOMOSIM, OPNET, ANDROID /IOS, MATLAB, IDL, SUMO, GRIDSIM, BONITA TOOL & CLOUD DEPLOYMENT (CLOUDSIM, GOOGLE APP ENGINE, AMAZON, WINDOWS AZURE, EUCALYPTUS & REAL TIME CLOUD DEPLOYMENT)
WE ALSO SOLVE THE PAPERS & GIVE SUPPORT IN PREPARING JOURNAL OR CONFERENCE PAPER PREPARATION.
NEW PROJECTS AND OWN CONCEPT ARE ALWAYS WELCOME.
WE ALSO PROVIDE READYMADE PROJECT .
TIMELY COMPLETION OF PROJECT.
YOUR PROJECT WILL BE DONE AS PER YOUR REQUIREMENT.
OUR EXPERTS ARE HIGHLY QUALIFIED WITH RESEARCH KNOWLEDGE.
An optimal general type-2 fuzzy controller for Urban Traffic NetworkISA Interchange
Urban traffic network model is illustrated by state-charts and object-diagram. However, they have limitations to show the behavioral perspective of the traffic information flow. Consequently, a state space model is used to calculate the half-value waiting time of vehicles. In this study, a combination of the general type-2 fuzzy logic sets and the modified backtracking search algorithm (MBSA) techniques are used in order to control the traffic signal scheduling and phase succession so as to guarantee a smooth flow of traffic with the least wait times and average queue length. The parameters of input and output membership functions are optimized simultaneously by the novel heuristic algorithm MBSA. A comparison is made between the achieved results with those of optimal and conventional type-1 fuzzy logic controllers.
Routing in Wireless Mesh Networks: Two Soft Computing Based Approachesijmnct
Due to dynamic network conditions, routing is the most critical part in WMNs and needs to be optimised.
The routing strategies developed for WMNs must be efficient to make it an operationally self configurable
network. Thus we need to resort to near shortest path evaluation. This lays down the requirement of some
soft computing approaches such that a near shortest path is available in an affordable computing time. This
paper proposes a Fuzzy Logic based integrated cost measure in terms of delay, throughput and jitter.
Based upon this distance (cost) between two adjacent nodes we evaluate minimal shortest path that updates
routing tables. We apply two recent soft computing approaches namely Big Bang Big Crunch (BB-BC) and
Biogeography Based Optimization (BBO) approaches to enumerate shortest or near short paths. BB-BC
theory is related with the evolution of the universe whereas BBO is inspired by dynamical equilibrium in
the number of species on an island. Both the algorithms have low computational time and high convergence
speed. Simulation results show that the proposed routing algorithms find the optimal shortest path taking
into account three most important parameters of network dynamics. It has been further observed that for
the shortest path problem BB-BC outperforms BBO in terms of speed and percent error between the
evaluated minimal path and the actual shortest path.
A surrogate-assisted modeling and optimization method for planning communicat...Power System Operation
The development of industrial informatization stimulates
the implementation of cyber-physical system (CPS) in
distribution network. As a close integration of the power
network infrastructure with cyber system, the research
of design methodology and tools for CPS has gained
wide spread interest considering the heterogeneous
characteristic. To address the problem of planning
communication system in distribution network CPS, at
first, this paper proposed an optimization model utilizing
topology potential equilibrium. The mutual influence
of nodes and the spatial distribution of topological
structure is mathematically described. Then, facing the
complex optimization problem in binary space with
multiple constraints, a novel binary bare bones fireworks
algorithm (BBBFA) with a surrogate-assisted model
is proposed. In the proposed algorithm, the surrogate
model, a back propagation neural network, replaces the
complex constraints by incremental approximation of
nonlinear constraint functions for reducing the difficulty
in finding the optimal solution. The communication
system planning of IEEE 39-bus power system,
which comprises four terminal units, was optimized.
Considering the different heterogeneous degrees,
four programs were involved in planning for practical
considerations. The simulation results of the proposed
algorithm were compared with other representative
methods, which demonstrated the effective performance
of the proposed method to solve communication system
planning for optimizing problems of distribution
network.
Classification of vehicles based on audio signalsijsc
The focusof this paper is on classification of different vehicles using sound emanated from the vehicles. In
this paper,quadratic discriminant analysis classifies audio signals of passing vehicles to bus, car, motor, and
truck categories based on features such as short time energy, average zero cross rate, and pitch frequency of
periodic segments of signals. Simulation results show that just by considering high energy feature vectors,
better classification accuracy can be achieved due to the correspondence of low energy regions with noises
of the background. To separate these elements, short time energy and average zero cross rate are used
simultaneously.In our method,we have used a few features which are easy to be calculated in time domain
and enable practical implementation of efficient classifier. Although, the computation complexity is low,
the classification accuracy is comparable with other classification methodsbased on long feature vectors
reported in literature for this problem.
Hybrid multi objectives genetic algorithms and immigrants scheme for dynamic ...khalil IBRAHIM
the main concept of intelligent optimization techniques, artificial neural networks, and new genetic algorithms to solve the multi-objective multicast routing problems with shortest path (SP) problem that used in the addresses networks and improve all processes addressing in the wireless communications based on multi-objective optimization. The most important characteristics in mobile wireless networks is the topology dynamics and the network topology changes over time, the routing problem (SPRP) in mobile ad hoc networks (MANETs) turns out to be a dynamic optimization problem[13], the hybrid immigrants multiple-objective genetic algorithm (HIMOGAs) in the real- world are dynamic in nature, that has objective functions, constraints, and parameters, the dynamic optimization problems (DOPs) are a big challenges to evolutionary multi-objective, since any environmental change may affect the objective vector, constraints, and parameters, HIMOGA for the optimization goal is to track the moving of parameters and get a sequence of approximations solutions over time. The quantity of services (QoS) is supporting guarantee for all data traffic and getting the maximizing utilization for network, the QoS based on multicast routing offers significant challenges, and increases to use an efficient multicast routing protocol that will be able to check multicast routing and satisfying QoS constraints, The author propose to use HIMOGAs and SP algorithm to solve multicast problem that produces new generation wireless networks with immigrants schema to get high-quality solutions after each change and satisfying all objectives.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
Checkpoint and recovery protocols are commonly used in distributed applications for providing fault
tolerance. A distributed system may require taking checkpoints from time to time to keep it free of arbitrary
failures. In case of failure, the system will rollback to checkpoints where global consistency is preserved.
Checkpointing is one of the fault-tolerant techniques to restore faults and to restart job fast. The algorithms
for checkpointing on distributed systems have been under study for years.
It is known that checkpointing and rollback recovery are widely used techniques that allow a distributed
computing to progress inspite of a failure.There are two fundamental approaches for checkpointing and
recovery.One is asynchronus approach, process take their checkpoints independenty.So,taking checkpoints
is very simple but due to absence of a recent consistent global checkpoint which may cause a rollback of
computation.Synchronus checkpointing approach assumes that a single process other than the application
process invokes the checkpointing algorithm periodically to determine a consistent global checkpoint.
Method of controlling access to intellectual switching nodes of telecommunica...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
An Implementation on Effective Robot Mission under Critical Environemental Co...IJERA Editor
Software engineering is a field of engineering, for designing and writing programs for computers or other electronic devices. A software engineer, or programmer, writes software (or changes existing software) and compiles software using methods that make it better quality. Is the application of engineering to the design, development, implementation, testingand main tenance of software in a systematic method. Now a days the robotics are also plays an important role in present automation concepts. But we have several challenges in that robots when they are operated in some critical environments. Motion planning and task planning are two fundamental problems in robotics that have been addressed from different perspectives. For resolve this there are Temporal logic based approaches that automatically generate controllers have been shown to be useful for mission level planning of motion, surveillance and navigation, among others. These approaches critically rely on the validity of the environment models used for synthesis. Yet simplifying assumptions are inevitable to reduce complexity and provide mission-level guarantees; no plan can guarantee results in a model of a world in which everything can go wrong. In this paper, we show how our approach, which reduces reliance on a single model by introducing a stack of models, can endow systems with incremental guarantees based on increasingly strengthened assumptions, supporting graceful degradation when the environment does not behave as expected, and progressive enhancement when it does.
F EATURE S ELECTION USING F ISHER ’ S R ATIO T ECHNIQUE FOR A UTOMATIC ...IJCI JOURNAL
Automatic Speech Recognition (ASR) involves mainly
two steps; feature extraction and classification
(pattern recognition). Mel Frequency Cepstral Coeff
icient (MFCC) is used as one of the prominent featu
re
extraction techniques in ASR. Usually, the set of a
ll 12 MFCC coefficients is used as the feature vect
or in
the classification step. But the question is whethe
r the same or improved classification accuracy can
be
achieved by using a subset of 12 MFCC as feature ve
ctor. In this paper, Fisher’s ratio technique is us
ed for
selecting a subset of 12 MFCC coefficients that con
tribute more in discriminating a pattern. The selec
ted
coefficients are used in classification with Hidden
Markov Model (HMM) algorithm. The classification
accuracies that we get by using 12 coefficients and
by using the selected coefficients are compare
Our team had to use signal processing techniques to find the direction of desired incoming signals at an antenna rejecting interference from other signals.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Flavours of Physics Challenge: Transfer Learning approachAlexander Rakhlin
Presentation for "Heavy Flavour Data Mining workshop", February 18-19, University of Zurich. I discuss the solution that won Physics Prize of Flavours of Physics challenge organized by CERN, Yandex, Intel at Kaggle.
Ieee transactions on networking 2018 Title with Abstract tsysglobalsolutions
WE OFFER IEEE 2018 – 2019 FINAL YEAR MAIN & MINI PROJECT FOR ME,MSC,MCA/BE,B.TECH (CSE/IT) STUDENTS.
TECHNOLOGIES WE SUPPORT BIG DATA HADOOP, SPARK, SCALA, STROM, ELASTICSEARCH, WEB SERVICES(SOAP, RESTFUL (JERSEY), JAVA, J2EE, NS2, NS3, GLOMOSIM, OPNET, ANDROID /IOS, MATLAB, IDL, SUMO, GRIDSIM, BONITA TOOL & CLOUD DEPLOYMENT (CLOUDSIM, GOOGLE APP ENGINE, AMAZON, WINDOWS AZURE, EUCALYPTUS & REAL TIME CLOUD DEPLOYMENT)
WE ALSO SOLVE THE PAPERS & GIVE SUPPORT IN PREPARING JOURNAL OR CONFERENCE PAPER PREPARATION.
NEW PROJECTS AND OWN CONCEPT ARE ALWAYS WELCOME.
WE ALSO PROVIDE READYMADE PROJECT .
TIMELY COMPLETION OF PROJECT.
YOUR PROJECT WILL BE DONE AS PER YOUR REQUIREMENT.
OUR EXPERTS ARE HIGHLY QUALIFIED WITH RESEARCH KNOWLEDGE.
Department of Health's Policy Improvement Plan 2013Alice Ehrlich
In the Department of Health, we see Open Policy Making not as a discrete concept or behaviour, but a state of mind. We would argue that open policy making is gold-standard policy making. But we recognise that too often, policy making defaults from the gold-standard. Sometimes this is a consequence of unchangeable circumstance, but at other times it could have been prevented. We aim to professionalise our policy making to improve standards, and are using the Twelve Actions to Professionalise Policy Making as a blueprint to do that.
This is our plan for how we’ll get to where we want to be—our Policy Improvement Plan. It introduces our new Policy Tests, outlines how we’ll improve learning and development, openness and connectedness, and how we’ll reward excellence in policy making.
The Plan addresses DH staff as its audience, but—in the true spirit of openness—we want to hear from outside voices, too (you’ll see it’s still not in its final form)! What do you think?
Adaptive traffic lights based on traffic flow prediction using machine learni...IJECEIAES
Traffic congestion prediction is one of the essential components of intelligent transport systems (ITS). This is due to the rapid growth of population and, consequently, the high number of vehicles in cities. Nowadays, the problem of traffic congestion attracts more and more attention from researchers in the field of ITS. Traffic congestion can be predicted in advance by analyzing traffic flow data. In this article, we used machine learning algorithms such as linear regression, random forest regressor, decision tree regressor, gradient boosting regressor, and K-neighbor regressor to predict traffic flow and reduce traffic congestion at intersections. We used the public roads dataset from the UK national road traffic to test our models. All machine learning algorithms obtained good performance metrics, indicating that they are valid for implementation in smart traffic light systems. Next, we implemented an adaptive traffic light system based on a random forest regressor model, which adjusts the timing of green and red lights depending on the road width, traffic density, types of vehicles, and expected traffic. Simulations of the proposed system show a 30.8% reduction in traffic congestion, thus justifying its effectiveness and the interest of deploying it to regulate the signaling problem in intersections.
Machine learning in Dynamic Adaptive Streaming over HTTP (DASH)Eswar Publications
Recently machine learning has been introduced into the area of adaptive video streaming. This paper explores a novel taxonomy that includes six state of the art techniques of machine learning that have been applied to Dynamic Adaptive Streaming over HTTP (DASH): (1) Q-learning, (2) Reinforcement learning, (3) Regression, (4) Classification, (5) Decision Tree learning, and (6) Neural networks.
Evolutionary reinforcement learning multi-agents system for intelligent traf...IJECEIAES
Due to the rapid growth of urban vehicles, traffic congestion has become more serious. The signalized intersections are used all over the world and still established in the new construction. This paper proposes a self-adapted approach, called evolutionary reinforcement learning multi-agents system (ERL-MA), which combines computational intelligence and machine learning. The concept of this work is to build an intelligent agent capable of developing senior skills to manage the traffic light control system at any type of junction, using two powerful tools: learning from the confronted experience and the assumption using the randomization concept. The ERL-MA is an independent multi-agents system composed of two layers: the modeling and the decision layers. The modeling layer uses the intersection modeling using generalized fuzzy graph technique. The decision layer uses two methods: the novel greedy genetic algorithm (NGGA), and the Q-learning. In the Q-learning method, a multi Q-tables strategy and a new reward formula are proposed. The experiments used in this work relied on a real case of study with a simulation of one-hour scenario at Pasubio area in Italy. The obtained results show that the ERL-MA system succeeds to achieve competitive results comparing to urban traffic optimization by integrated automation (UTOPIA) system using different metrics.
Q-learning vertical handover scheme in two-tier LTE-A networks IJECEIAES
Global mobile communication necessitates improved capacity and proper quality assurance for services. To achieve these requirements, small cells have been deployed intensively by long term evolution (LTE) networks operators beside conventional base station structure to provide customers with better service and capacity coverage. Accomplishment of seamless handover between Macrocell layer (first tier) and Femtocell layer (second tier) is one of the key challenges to attain the QoS requirements. Handover related information gathering becomes very hard in high dense femtocell networks, effective handover decision techniques are important to minimize unnecessary handovers occurred and avoid Ping-Pong effect. In this work, we proposed and implemented an efficient handover decision procedure based on users’ profiles using Q-learning technique in an LTE-A macrocellfemtocell networks. New multi-criterion handover decision parameters are proposed in typical/dense femtocells in microcells environment to estimate the target cell for handover. The proposed handover algorithms are validated using the LTE-Sim simulator under an urban environment. The simulation results showed noteworthy reduction in the average number of handovers.
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETScsandit
Multi-agent systems are asynchronous and distributed computer systems. These characteristics make them also a discrete-event dynamic system. It is, therefore, important to analyze the behavior of such systems to ensure that they terminate correctly and satisfy other important properties. This paper presents a formal modeling and analysis of MAS, based on Well-formed Nets, in order to ensure the absence of any undesired or unexpected behavior. To validate our ontribution, we consider the timetable problem, which is a multi-agent resource allocation problem.
Congestion control based on sliding mode control and scheduling with prioriti...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
WMNs: The Design and Analysis of Fair Schedulingiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Traffic Prediction from Street Network images.pptxchirantanGupta1
While considering the spatial and temporal features of traffic, capturing the impacts of various external factors on travel is an essential step towards achieving accurate traffic forecasting. However, existing studies seldom consider external factors or neglect the effect of the complex correlations among external factors on traffic. Intuitively, knowledge graphs can naturally describe these correlations. Since knowledge graphs and traffic networks are essentially heterogeneous networks, it is challenging to integrate the information in both networks. On this background, this study presents a knowledge representation-driven traffic forecasting method based on spatial-temporal graph convolutional networks.
Motorcycle Movement Model Based on Markov Chain Process in Mixed TrafficIJECEIAES
Mixed traffic systems are dynamically complex since there are many parameters and variables that influence the interactions between the different kinds of vehicles. Modeling the behavior of vehicles, especially motorcycle which has erratic behavior is still being developed continuously, especially in developing countries which have heterogeneous traffic. To get a better understanding of motorcycle behavior, one can look at maneuvers performed by drivers. In this research, we tried to build a model of motorcycle movement which only focused on maneuver action to avoid the obstacle along with the trajectories using a Markov Chain approach. In Markov Chain, the maneuver of motorcycle will described by state transition. The state transition model is depend on probability function which will use for determine what action will be executed next. The maneuver of motorcycle using Markov Chain model was validated by comparing the analytical result with the naturalistic data, with similarity is calculated using MSE. In order to know how good our proposed method can describe the maneuver of motorcycle, we try to compare the MSE of the trajectory based on Markov Chain model with those using polynomial approach. The MSE results showed the performance of Markov Chain Model give the smallest MSE which 0.7666 about 0.24 better than 4 order polynomial.
Global Situational Awareness of A.I. and where its headedvikram sood
You can see the future first in San Francisco.
Over the past year, the talk of the town has shifted from $10 billion compute clusters to $100 billion clusters to trillion-dollar clusters. Every six months another zero is added to the boardroom plans. Behind the scenes, there’s a fierce scramble to secure every power contract still available for the rest of the decade, every voltage transformer that can possibly be procured. American big business is gearing up to pour trillions of dollars into a long-unseen mobilization of American industrial might. By the end of the decade, American electricity production will have grown tens of percent; from the shale fields of Pennsylvania to the solar farms of Nevada, hundreds of millions of GPUs will hum.
The AGI race has begun. We are building machines that can think and reason. By 2025/26, these machines will outpace college graduates. By the end of the decade, they will be smarter than you or I; we will have superintelligence, in the true sense of the word. Along the way, national security forces not seen in half a century will be un-leashed, and before long, The Project will be on. If we’re lucky, we’ll be in an all-out race with the CCP; if we’re unlucky, an all-out war.
Everyone is now talking about AI, but few have the faintest glimmer of what is about to hit them. Nvidia analysts still think 2024 might be close to the peak. Mainstream pundits are stuck on the wilful blindness of “it’s just predicting the next word”. They see only hype and business-as-usual; at most they entertain another internet-scale technological change.
Before long, the world will wake up. But right now, there are perhaps a few hundred people, most of them in San Francisco and the AI labs, that have situational awareness. Through whatever peculiar forces of fate, I have found myself amongst them. A few years ago, these people were derided as crazy—but they trusted the trendlines, which allowed them to correctly predict the AI advances of the past few years. Whether these people are also right about the next few years remains to be seen. But these are very smart people—the smartest people I have ever met—and they are the ones building this technology. Perhaps they will be an odd footnote in history, or perhaps they will go down in history like Szilard and Oppenheimer and Teller. If they are seeing the future even close to correctly, we are in for a wild ride.
Let me tell you what we see.
Learn SQL from basic queries to Advance queriesmanishkhaire30
Dive into the world of data analysis with our comprehensive guide on mastering SQL! This presentation offers a practical approach to learning SQL, focusing on real-world applications and hands-on practice. Whether you're a beginner or looking to sharpen your skills, this guide provides the tools you need to extract, analyze, and interpret data effectively.
Key Highlights:
Foundations of SQL: Understand the basics of SQL, including data retrieval, filtering, and aggregation.
Advanced Queries: Learn to craft complex queries to uncover deep insights from your data.
Data Trends and Patterns: Discover how to identify and interpret trends and patterns in your datasets.
Practical Examples: Follow step-by-step examples to apply SQL techniques in real-world scenarios.
Actionable Insights: Gain the skills to derive actionable insights that drive informed decision-making.
Join us on this journey to enhance your data analysis capabilities and unlock the full potential of SQL. Perfect for data enthusiasts, analysts, and anyone eager to harness the power of data!
#DataAnalysis #SQL #LearningSQL #DataInsights #DataScience #Analytics
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
2. II. REINFORCEMENT LEARNING AND Q-LEARNING
Unlike supervised and unsupervised learning, reinforce-
ment learning learns an optimal policy by perceiving states
of the environment and receiving information from the
environment. Reinforcement learning algorithms optimize
environmental feedback by mapping percepts to actions.
These are best suited for domains in which an agent has
limited or no previous knowledge. The Q-Learning is one
particular reinforcement learning algorithm that is model-
free. Put simply, this means that an agent has no previous
model of how states and actions are related to rewards. The
Q-Learning algorithm was proposed by Watkins [13]. As
mentioned, it is essentially independent of existing domain
knowledge. This property of Q-Learning makes it a favorable
choice for unexplored environments.
Classically, Q-Learning is modeled by using a Markov
decision process formalism. This means that the agent is
in a state s, performs an action a, from which it gets a
scalar reward r from the environment. The environment then
changes to state s according to a given probability transition
matrix T. The goal of the agent is to choose actions maxi-
mizing discounted cumulative rewards over time. Discounted
means that short term rewards are weighted more heavily
than distant future rewards. The discount factor, γ = [0..1],
awards greater weight to future reinforcements if set closer to
1. In Q-learning, Q(s,a) is a state-action value representing
the expected total discounted return resulting from taking
action a in state s and continuing with the optimal policy
thereafter.
Q(s,a) ←− β(r +γV(s ))Q(s,a) (1)
V(s ) ←− max
a
Q(s ,a) (2)
In Equation 1, β is the learning rate parameter and V(s )
is given by Equation 2. The discount factor determines the
importance of future rewards. Q(s,a) measures the quality
value of the state-action pair and V(s ) gives the best Q value
for the actions in next state, s . Q-learning helps to decide
upon the next action based on the expected reward of the
action taken for a particular state. Successive Q values are
built increasing the confidence of the agent as more rewards
are acquired for an action. As an agent explores the state
space, its estimate of Q improves gradually and Watkins and
Dayan have shown that the Q-Learning algorithm converges
to an optimal decision policy for a finite Markov decision
process [14].
III. REINFORCEMENT LEARNING FOR TRAFFIC LIGHT
CONTROL
Reinforcement learning offers some potentially significant
advantages and has become a good solution to control
single junction as well as network of traffic signals, in non-
stationary and dynamic environments.
Some researchers have tried to use a model-based rein-
forcement learning method for traffic light control. In [15],
transition model has been proposed that estimates waiting
times of cars in different states. In [16] Silva et al have
presented a reinforcement learning with context detection
that creates a partial model of the environment on demand.
Later, the partial models are improved or new ones are con-
structed. Adaptive reinforcement learning has been presented
to control a model free traffic environment in [17], [18].
Adaptive control of traffic light has also been studied in [19],
which uses a function approximation method as a mapping
between the states and signal timing.
Some researchers have introduced a reinforcement learn-
ing method based on communication between the agents. A
collaborative reinforcement learning introduced in [11] has
tried to exploit local knowledge of neighboring agents in
order to learn signal timings.
In [20] an interaction model based on game theory has
been studied. They defined two types of agents for traffic
signal control, intersection agents and management agents,
and constructed models of two agents. Q-learning was used
to build the payoff values in the interaction model. In the
interaction model, the renewed Q-values in the distributed
reinforcement Q-learning was used to build the payoff values.
Therefore, interaction has taken on from the action selection
between two agents.
Balaji et al have presented a method in which agents
try to compute a new phase length based on both local
and communicated information [21]. Q values were shared
between agents to improve the local observations and create
a global view.
In [22], two types of agents have been used to control a
five intersection network. Four intersections connected to a
central intersection were labeled as outbound intersections.
Two types of agents, a central agent and an outbound agent,
were employed. An outbound agent that follows the longest
queue collaborates with a central agent by providing relative
traffic flow values as a local traffic statistic. The relative
traffic flow is defined as the total delay of vehicles in a lane
divided by the average delay at all lanes in the intersection.
The central agent learns a value function driven by its
local and neighbors traffic conditions. It incorporates relative
traffic flow of its neighbors as a part of its decision-making
process.
Some other methods have been using communicated infor-
mation in state and reward estimation [23], [24], optimization
through cooperation based on information fusion technology
in a multi-level hierarchical structure [25].
Several researches have tried to realize distributed control
that learn optimal signal control over a group of signal
by a hierarchical multi-agent system. In [26] a two level
hierarchical multi-agent system has been proposed. Local
traffic agents are concerned with the optimal performance of
their assigned intersection. A second layer has been added as
a coordinator that supervises the local agents. Bazzan et al
[27] have presented a hierarchical reinforcement learning for
networks. A number of groups of three traffic light agents
each is first composed. These groups are coordinated by a
supervisor agents that recommend a joint action.
1581
3. TABLE I
EXAMPLE OF STATE SPACE
State number Link order State number Link order
State 1 l1 ≥ l2 ≥ l3 ≥ l4 State 13 l2 ≥ l3 ≥ l1 ≥ l4
State 2 l1 ≥ l2 ≥ l4 ≥ l3 State 14 l2 ≥ l4 ≥ l1 ≥ l3
State 3 l1 ≥ l3 ≥ l2 ≥ l4 State 15 l3 ≥ l2 ≥ l1 ≥ l4
State 4 l1 ≥ l4 ≥ l2 ≥ l3 State 16 l4 ≥ l2 ≥ l1 ≥ l3
State 5 l1 ≥ l3 ≥ l4 ≥ l2 State 17 l3 ≥ l4 ≥ l1 ≥ l2
State 6 l1 ≥ l4 ≥ l3 ≥ l2 State 18 l4 ≥ l3 ≥ l1 ≥ l2
State 7 l2 ≥ l1 ≥ l3 ≥ l4 State 19 l2 ≥ l3 ≥ l4 ≥ l1
State 8 l2 ≥ l1 ≥ l4 ≥ l3 State 20 l2 ≥ l4 ≥ l3 ≥ l1
State 9 l3 ≥ l1 ≥ l2 ≥ l4 State 21 l3 ≥ l2 ≥ l4 ≥ l1
State 10 l4 ≥ l1 ≥ l2 ≥ l3 State 22 l4 ≥ l2 ≥ l3 ≥ l1
State 11 l3 ≥ l1 ≥ l4 ≥ l2 State 23 l3 ≥ l4 ≥ l2 ≥ l1
State 12 l4 ≥ l1 ≥ l3 ≥ l2 State 24 l4 ≥ l3 ≥ l2 ≥ l1
It is not common to find a reinforcement learning based
method that uses a large network for simulation without any
simplification. Most of the works mentioned here have used
a grid based network with a small number of states and
actions. As mentioned, in the present paper, a Q-learning
based method is used, which considers not only a large
number of states and actions, but also a non-grid based, non-
regular network.
IV. PROPOSED METHOD
In the Q-learning based method used here, the traffic
network is considered as a system composed of intelligent
agents, where each controls an intersection.
As state estimation, agents use the average queue length
in approaching links in a fixed cycle. They then select an
action and receive a reward. The state space is discretized
by ranking the approaches according to the statistic gathered
in the last cycle.
The number of states is equal to the number of permutation
of the approaches, i.e., k! for an agent with k approaching
links. To see why this is is so, consider the following
example. There are 24 states for each junction, since each
agent has four approaching links. The state space can be
seen in Table I. If li represents the ith approaching link for
an intersection, l1 ≥ l2 ≥ l4 ≥ l3 shows a state in which the
queue length of approaching link l1 is the longest and l3 is
the shortest. If two approaching links have the same queue
length, then they are ranked according to their order in the
signal plan.
The actions relate to split of green time, i.e., the action
space contains different phase splits of the cycle time. Phase
split refers to the division of the cycle time into a sequence
of green signals for each group of approaching links. We
assumed that the cycle time, δ, is fixed and all junctions use
the same value.
It should be noted that for a fixed time controller, all
available phases should at least appear once in a cycle.
Each phase should have a minimum green time so that a
stopped vehicle that receives a green signal has enough time
to cross the intersection. The cycle length is divided to a
fixed minimum green time, and extension time that can be
assigned to different phases.
Fig. 1. Phase split parameters used for action definition
Assume that there is nph phases and minimum green time
assigned for each of them is the same and equal to tmin.
Moreover, there are nex extensions with fixed length of time,
hex. The actions determine the assignment of nex extensions
to different phases.
For example, assuming a cycle length of 50 seconds,
a signal plan containing 3 phases and 10 second as the
minimum green time, 3 × 10 seconds is assigned to the
phases and different actions determine the assignment of the
remaining 20 seconds to three phases.
The action space is defined by < nph,tmin,nex,hex >,where:
nph: number of phases tmin: minimum green time for
phases (seconds) nex: number of time extensions hex: length
of each extension (seconds) such that the effective cycle
length δ is given as in Equation 3.
δ = hex ×nex +nph ×tmin (3)
The possible green time assignment can be formulated as
follows:
nph
∑
i=1
xi = nex, xi ∈ 0,1,...,α, 1 ≤ α ≤ nph (4)
The maximum number of extension is controlled by α.
The action space can be reduced by choosing the small value
for α. The solutions determine the portion of the cycle time
that is assigned to each phase by:
di = tmin +xi ×hex (5)
In equation 5, di is the green time assigned to phase i.
Figure 1 shows the phase split parameter used for the
definition of the actions. For example, d1, the green time
assigned to the first phase, includes tmin as minimum green
time and a number of extension displayed by x1.
The reward is inversely proportional to the average length
of the queues in the approaching links, normalized to remain
between 0 and 1.
V. NETWORK CONFIGURATION
The traffic network used in the experiments is shown in
Figure 2. It contains 50 junctions and more than 100 links.
A four-way intersection is the most common intersection in
real world, and therefore it has been used in our approach.
The number of lanes is three for all approaches. During
the simulation, new vehicles are generated by uniform dis-
tribution over 30 input sections. Time intervals between two
consecutive vehicle arrivals at input sections are sampled
from a uniform distribution. The network is surrounded by
1582
4. Fig. 2. The network used for the simulation
Fig. 3. An example for action corresponds to [x1,x2,x3,x4] = [0,2,1,1].
Two seconds is assigned for all-red interval between two signals
20 centroids. Centroids are points that vehicles enter or exit
the network through them.
In this configuration, the number of phases is four and the
minimum green time for each phase is set to 13 seconds.
Moreover, four 10-second extension intervals are used for
signal timing, i.e. nex = 4 and hex = 10. The effective
cycle time is computed according to Equation 3 with δ =
92seconds.
The purpose of all-red interval is to provide a safe tran-
sition between two conflicting traffic signal phases. Two
seconds is assigned for all-red interval at the end of each
signal phase as it has been shown in Figure 3. Since there are
four phases, 8 seconds are assigned for all-red time interval.
In this case, the total cycle time will be 100seconds for a
complete signal plan.
The parameters used in the Q-learning based method are
shown in Table II. There are 19 possible solutions for
Equation 4 if we assume α = 2. For example, [x1,x2,x3,x4] =
[0,2,1,1] is a solution for Equation 4. The corresponding
action is (13,33,23,23) as shown in Figure 3.
The action set is as follows:
TABLE II
THE PARAMETERS USED IN THIS PAPER
Parameter Description Value
δ effective cycle length 92
nph number of phases 4
tmin minimum green time for each phase 13
nex number of extension interval 4
hex length of extended time 10
α maximum number of extension for each phase 2
|S| number of states 24
|A| number of actions 19
TABLE III
NETWORK CONFIGURATION PARAMETERS
Properties Value
number of intersections 50
number of links 224
average length of links 847.44m
number of lanes per links 3
maximum speed 50km/h
number of input/output centroid 20
arrival distribution Uniform
simulation duration 10hour
traffic demand 1 18000 veh/hour
traffic demand 2 27000 veh/hour
A = {a1(33,33,13,13),a2(33,13,23,23),...,a19(23,23,23,23)}
(6)
Moreover, we use ε-greedy as a mechanism to select an
action in Q-learning with ε fixed at value of 0.9. This means
that the best action is selected for a proportion 1 − ε of
the trials, and a random action is selected (with uniform
probability) for a proportion ε.
VI. EXPERIMENTAL RESULTS
The proposed method has been tested on a large network
that contains 50 intersections and 112 two-way links using
the Aimsun traffic simulator 1. The system configuration
parameters are shown in Table III.
We performed some experiments using Aimsun in order
to compare the proposed method with fixed time method
that assigns equal green time to each signal group. The
experiment aimed to determine the simulated average delay
time of the network for different traffic demands. Among
different traffic demands we choose two values as medium
and high traffic congestion (traffic demands 1 and 2 in
Table III).
In these experiments, the average delay time is used for
performance evaluation. The results show that the proposed
approach has reduced the average delay time in comparison
with the fixed time method. Figure 4 shows the result over
a traffic demand with 18000 vehicles per hour (demand 1).
The performance of the methods over a traffic demand
with 27000 vehicles per hour (demand 2) can be seen in
Figure 5. The average value of the delay is shown in Table
IV.
1http://www.aimsun.com
1583
5. Fig. 4. Comparison between fixed time method and the proposed Q-learning based approach for traffic demand 1
TABLE IV
AVERAGE DELAY OF THE PROPOSED QL AND FIXED TIME METHOD
Fixed time Proposed QL
Traffic demand 1 47.977 42.362
Traffic demand 2 113.034 63.687
For the fixed timing, performance begins to drop rapidly
when nearly all of the vehicles in some junctions stop. This
happens after six hours after the begin of the simulation, for
traffic demand 2, as seen in Figure 5. At the end of the
simulation, all vehicles stop in the network and there is no
vehicle leaving network. Under these conditions, the average
delay over all simulated time makes no sense. Therefore, the
value reported in Table IV for traffic demand 2 has been
computed over the period of the first 6 hours.
Regarding the proposed method, it is possible to see that
it could manage to efficiently control the traffic lights in the
network under relatively high traffic demand in a better way
than the fixed timing method.
VII. CONCLUSIONS
In this work we have shown that Q-learning is a promising
approach to control traffic light in a non-stationary environ-
ment. A real traffic network is a non-stationary environment
because traffic flow patterns are dynamically changed over
the time. The proposed method is based on local statistical
information gathered in one learning step and tries to learn
the best action in different situations. Average queue length
in approaching links is used as the statistical information.
The proposed method contains a relatively large number of
states and actions that can be used in a large network.
The simulation results demonstrated that the proposed Q-
learning method outperformed the fixed time method under
different traffic demands.
Parametric representation of the action space enables us to
define different situations by means of using different values
of the parameters. Since the action space is defined by a
number of parameters, it can be extended to a larger space
or smaller one by changing the parameters. As a result, it
can be applied in real traffic networks with a non predictable
traffic demand. Moreover, it can be used in different types of
intersections with a different number of approaching links.
Future work includes applying the method to other net-
works, extension of the action space with different parame-
ters to find the proper parameters for a given traffic demand,
and examination of impact of different parameters values on
learning performance.
VIII. ACKNOWLEDGEMENTS
A. Bazzan and M. Abdoos are partially supported by
CNPq. The present research was supported by Research
Institute for Information and Communication Technology -
ITRC (Tehran, Iran). The first author gratefully acknowledge
the support of this institute.
REFERENCES
[1] Z. Liu, “A survey of intelligence methods in urban traffic signal
control,” International Journal of Computer Science and Network
Security, vol. 7, no. 7, pp. 105–112, 2007.
[2] J. Adler, G. Setapathy, V. Manikonda, B. Bowles, and B. V.J., “A multi-
agent approach to cooperative traffic management and route guidance,”
Transportation Research Part B, vol. 39, pp. 297–318, 2005.
[3] K. Teknomo, “Application of microscopic pedestrian simulation
model,” Transportation Research Part F, vol. 9, pp. 15–27, 2006.
[4] A. Doniec, R. Mandiau, S. Piechowiak, and S. Espi´e, “A behavioral
multi-agent model for road traffic simulation,” Engineering Applica-
tions of Artificial Intelligence, vol. 21, no. 8, pp. 1443–1454, 2008.
[5] V. Hirankitti, J. Krohkaew, and C. Hogger, “A multi-agent approach
for intelligent traffic-light control,” in Proc. of the World Congress on
Engineering, vol. 1. London, U.K.: Morgan Kaufmann, 2007.
[6] I. Kosonen, “Multi-agent fuzzy signal control based on real-time
simulation,” vol. 11, no. 5, pp. 389–403, 2003.
[7] P. Balaji, P. Sachdeva, D. Srinivasan, and T. C.K., “Multi-agent system
based urban traffic management.” Singapore: IEEE, 2007, pp. 1740–
1747.
[8] R. T. v. Katwijk, B. De Schutter, and J. Hellendoorn, “Multi-agent
coordinationof traffic control instruments,” in Proc. of the International
Conference on Infrastructure Systems 2008: Building Networks for a
Brighter Future, vol. 1, Rotterdam, The Netherlands, November 2008.
1584
6. Fig. 5. Comparison between fixed time method and the proposed Q-learning based approach for traffic demand 2
[9] A. L. C. Bazzan, “A distributed approach for coordination of
traffic signal agents,” Autonomous Agents and Multiagent Systems,
vol. 10, no. 1, pp. 131–164, March 2005. [Online]. Available:
www.inf.ufrgs.br/∼bazzan/downloads/jaamas10 2 131 164.pdf.gz
[10] F. Daneshfar, F. Akhlaghian, and F. Mansoori, “Adaptive and coopera-
tive multi-agent fuzzy system architecture,” in Proc. 14th International
CSI Computer Conference. IEEE, 2009, pp. 30–34.
[11] A. Salkham, R. Cunningham, A. Garg, and V. Cahill, “A collaborative
reinforcement learning approach to urban traffic control optimization,”
in Proc. of International Conference on Web Intelligence and Intelli-
gent Agent Technology. IEEE, 2008, pp. 560–566.
[12] A. L. C. Bazzan, “Opportunities for multiagent systems and multiagent
reinforcement learning in traffic control,” Autonomous Agents and
Multiagent Systems, vol. 18, no. 3, pp. 342–375, June 2009. [Online].
Available: http://www.springerlink.com/content/j1j0817117r8j18r/
[13] C. Watkins, “Learning from delayed rewards,” Ph.D. dissertation,
University of Cambridge, 1989.
[14] C. J. C. H. Watkins and P. Dayan, “Q-learning,” Machine Learning,
vol. 8, no. 3, pp. 279–292, 1992.
[15] M. Weiring, “Multi-agent reinforcement learning for traffic light
control,” in Proc. of the Seventh International Conference on Machine
Learning, 2000, pp. 1151–1158.
[16] B. C. d. Silva, E. W. Basso, A. L. C. Bazzan, and P. M.
Engel, “Improving reinforcement learning with context detection,” in
Proceedings of the 5th International Joint Conference On Autonomous
Agents And Multiagent Systems, AAMAS, 2006. Hakodate, Japan:
New York, ACM Press, May 2006, pp. 811–812. [Online]. Available:
www.inf.ufrgs.br/maslab/pergamus/pubs/Silva+2006.pdf
[17] K. Wen, S. Qu, and Y. Zhang, “A stochastic adaptive control model for
isolated intersections,” in Proc. 2007 IEEE International Conference
on Robotics and Biomimetics. Sanya, China: IEEE, 2008, pp. 2256–
2260.
[18] Y. Dai, D. Zhao, and J. a. Yi, “A comparative study of urban traffic
signal control with reinforcement learning and adaptive dynamic
programming,” in Proc. of International Joint Conference on Neuarl
Networks, Barcelona, 2010, pp. 1–7.
[19] L. Prashanth and S. Bhatnagar, “Reinforcement learning with func-
tion approximation for traffic signal control,” IEEE Transaction on
Intelligent Transportation Systems, pp. 1–10, 2010.
[20] X. Xinhai and X. Lunhui, “Traffic signal control agent interaction
model based on game theory and reinforcement learning,” in Proc.
2009 International Forum on Computer Science-Technology and Ap-
plications. IEEE, 2009, pp. 164–168.
[21] P. Balaji, X. German, and D. Srinivasan, “Urban traffic signal control
using reinforcement learning agents,” IET Intelligent Transportation
Systems, vol. 4, no. 3, pp. 177–188, 2010.
[22] I. Arel, C. Liu, T. Urbanik, and A. Kohls, “Reinforcement learning-
based multi-agent system for network traffic signal control,” IET
Intelligent Transport Systems, vol. 4, no. 2, pp. 128–135, 2010.
[23] J. Medina, A. Hajbabaie, and R. Benekohal, “Arterial traffic control
using reinforcement learning agents and information from adjacent
intersections in the state and reward structure,” in Intelligent Trans-
portation Systems (ITSC), 2010 13th International IEEE Conference
on, sept. 2010, pp. 525–530.
[24] W. Yaping and Z. Zheng, “A method of reinforcement learning
based automatic traffic signal control,” in Proc. Third International
Conference on Measuring Technology and Mechatronics Automation.
IEEE, 2011, pp. 119–122.
[25] Z. Yang, X. Chen, Y. Tang, and J. Sun, “Intelligent cooperation control
of urban traffic networks,” in Proc. Fourth International Conference
on Machine Learning and Cybernetics. Guangzhou, China: IEEE,
2005, pp. 1482–1486.
[26] J. France and A. A. Ghorbani, “A multiagent system for optimizing
urban traffic,” in Proceedings of the IEEE/WIC International Confer-
ence on Intelligent Agent Technology. Washington, DC, USA: IEEE
Computer Society, 2003, pp. 411–414.
[27] A. L. C. Bazzan, D. d. Oliveira, and B. C. d. Silva, “Learning in groups
of traffic signals,” Engineering Applications of Artificial Intelligence,
vol. 23, pp. 560–568, 2010.
1585