1,219 research outputs found

    Data driven low-bandwidth intelligent control of a jet engine combustor

    Get PDF
    This thesis introduces a low-bandwidth control architecture for navigating the input space of an un-modeled combustor system between desired operating conditions while avoiding regions of instability and blow-out. An experimental procedure is discussed for identifying regions of instability and gathering sufficient data to build a data-driven model of the system\u27s operating modes. Regions of instability and blow-out are identified experimentally and a data-driven operating point classifier is designed. This classifier acts as a map of the operating space of the combustor, indicating regions in which the flame is in a good or bad operating mode. A data-driven predictor is also designed that monitors the combustion process in real time and provides a prediction of what operating mode the flame will be in for the next measurement. A path planning algorithm is then discussed for planning an input trajectory from the current operating condition to the desired operating condition that avoids regions of instability or blow-out in the input space. An adaptive layer is incorporated into the path planning algorithm to ensure that the path planner can update its trajectory when new information about the operating space becomes available

    Variational Autoencoder Based Estimation Of Distribution Algorithms And Applications To Individual Based Ecosystem Modeling Using EcoSim

    Get PDF
    Individual based modeling provides a bottom up approach wherein interactions give rise to high-level phenomena in patterns equivalent to those found in nature. This method generates an immense amount of data through artificial simulation and can be made tractable by machine learning where multidimensional data is optimized and transformed. Using individual based modeling platform known as EcoSim, we modeled the abilities of elitist sexual selection and communication of fear. Data received from these experiments was reduced in dimension through use of a novel algorithm proposed by us: Variational Autoencoder based Estimation of Distribution Algorithms with Population Queue and Adaptive Variance Scaling (VAE-EDA-Q AVS). We constructed a novel Estimation of Distribution Algorithm (EDA) by extending generative models known as variational autoencoders (VAE). VAE-EDA-Q, proposed by us, smooths the data generation process using an iteratively updated queue (Q) of populations. Adaptive Variance Scaling (AVS) dynamically updates the variance at which models are sampled based on fitness. The combination of VAE-EDA-Q with AVS demonstrates high computational efficiency and requires few fitness evaluations. We extended VAE-EDA-Q AVS to act as a feature reducing wrapper method in conjunction with C4.5 Decision trees to reduce the dimensionality of data. The relationship between sexual selection, random selection, and speciation is a contested topic. Supporting evidence suggests sexual selection to drive speciation. Opposing evidence contends either a negative or absence of correlation to exist. We utilized EcoSim to model elitist and random mate selection. Our results demonstrated a significantly lower speciation rate, a significantly lower extinction rate, and a significantly higher turnover rate for sexual selection groups. Species diversification was found to display no significant difference. The relationship between communication and foraging behavior similarly features opposing hypotheses in claim of both increases and decreases of foraging behavior in response to alarm communication. Through modeling with EcoSim, we found alarm communication to decrease foraging activity in most cases, yet gradually increase foraging activity in some other cases. Furthermore, we found both outcomes resulting from alarm communication to increase fitness as compared to non-communication

    Emergency Data Transmission Mechanism in VANETs using Improved Restricted Greedy Forwarding (IRGF) Scheme

    Get PDF
    One of the most critical tasks in Vehicular Ad-hoc Networks (VANETs) is broadcasting Emergency Messages (EMs) at considerable data delivery rates (DDRs). The enhanced spider-web-like Transmission Mechanism for Emergency Data (TMED) is based on request spiders and authenticated spiders to create the shortest route path between the source vehicle and target vehicles. However, the adjacent allocation is based on the DDR only and it is not clear whether each adjacent vehicle is honest or not. Hence, in this article, the Improved Restricted Greedy Forwarding (IRGF) scheme is proposed for adjacent allocation with the help of trust computation in TMED. The trust and reputation score value of each adjacent vehicle is estimated based on successfully broadcast emergency data. The vehicles’ position, velocity, direction, density, and the reputation score, are fed to a fuzzy logic (FL) scheme, which selects the most trusted adjacent node as the forwarding node for broadcasting the EM to the destination vehicles. Finally, the simulation results illustrate the TMED-IRGF model’s efficiency compared to state-of-the-art models in terms of different network metrics

    Reinforcement Learning

    Get PDF
    Brains rule the world, and brain-like computation is increasingly used in computers and electronic devices. Brain-like computation is about processing and interpreting data or directly putting forward and performing actions. Learning is a very important aspect. This book is on reinforcement learning which involves performing actions to achieve a goal. The first 11 chapters of this book describe and extend the scope of reinforcement learning. The remaining 11 chapters show that there is already wide usage in numerous fields. Reinforcement learning can tackle control tasks that are too complex for traditional, hand-designed, non-learning controllers. As learning computers can deal with technical complexities, the tasks of human operators remain to specify goals on increasingly higher levels. This book shows that reinforcement learning is a very dynamic area in terms of theory and applications and it shall stimulate and encourage new research in this field

    An adaptable fuzzy-based model for predicting link quality in robot networks.

    Get PDF
    It is often essential for robots to maintain wireless connectivity with other systems so that commands, sensor data, and other situational information can be exchanged. Unfortunately, maintaining sufficient connection quality between these systems can be problematic. Robot mobility, combined with the attenuation and rapid dynamics associated with radio wave propagation, can cause frequent link quality (LQ) issues such as degraded throughput, temporary disconnects, or even link failure. In order to proactively mitigate such problems, robots must possess the capability, at the application layer, to gauge the quality of their wireless connections. However, many of the existing approaches lack adaptability or the framework necessary to rapidly build and sustain an accurate LQ prediction model. The primary contribution of this dissertation is the introduction of a novel way of blending machine learning with fuzzy logic so that an adaptable, yet intuitive LQ prediction model can be formed. Another significant contribution includes the evaluation of a unique active and incremental learning framework for quickly constructing and maintaining prediction models in robot networks with minimal sampling overhead

    New Framework and Decision Support Tool to Warrant Detour Operations During Freeway Corridor Incident Management

    Get PDF
    As reported in the literature, the mobility and reliability of the highway systems in the United States have been significantly undermined by traffic delays on freeway corridors due to non-recurrent traffic congestion. Many of those delays are caused by the reduced capacity and overwhelming demand on critical metropolitan corridors coupled with long incident durations. In most scenarios, if proper detour strategies could be implemented in time, motorists could circumvent the congested segments by detouring through parallel arterials, which will significantly improve the mobility of all vehicles in the corridor system. Nevertheless, prior to implementation of any detour strategy, traffic managers need a set of well-justified warrants, as implementing detour operations usually demand substantial amount of resources and manpower. To contend with the aforementioned issues, this study is focused on developing a new multi-criteria framework along with an advanced and computation-friendly tool for traffic managers to decide whether or not and when to implement corridor detour operations. The expected contributions of this study are: * Proposing a well-calibrated corridor simulation network and a comprehensive set of experimental scenarios to take into account many potential affecting factors on traffic manager\u27s decision making process and ensure the effectiveness of the proposed detour warrant tool; * Developing detour decision models, including a two-choice model and a multi-choice model, based on generated optima detour traffic flow rates for each scenario from a diversion control model to allow responsible traffic managers to make best detour decisions during real-time incident management; and * Estimating the resulting benefits for comparison with the operational costs using the output from the diversion control model to further validate the developed detour decision model from the overall societal perspective

    Intrusion detection and response model for mobile ad hoc networks.

    Get PDF
    This dissertation presents a research whose objective is to design and develop an intrusion detection and response model for Mobile Ad hoc NETworks (MANET). Mobile ad hoc networks are infrastructure-free, pervasive and ubiquitous in nature, without any centralized authority. These unique MANET characteristics present several changes to secure them. The proposed security model is called the Intrusion Detection and Response for Mobile Ad hoc Networks (IDRMAN). The goal of the proposed model is to provide a security framework that will detect various attacks and take appropriate measures to control the attack automatically. This model is based on identifying critical system parameters of a MANET that are affected by various types of attacks, and continuously monitoring the values of these parameters to detect and respond to attacks. This dissertation explains the design and development of the detection framework and the response framework of the IDRMAN. The main aspects of the detection framework are data mining using CART to identify attack sensitive network parameters from the wealth of raw network data, statistical processing using six sigma to identify the thresholds for the attack sensitive parameters and quantification of the MANET node state through a measure called the Threat Index (TI) using fuzzy logic methodology. The main aspects of the response framework are intruder identification and intruder isolation through response action plans. The effectiveness of the detection and response framework is mathematically analyzed using probability techniques. The detection framework is also evaluated by performance comparison experiments with related models, and through performance evaluation experiments from scalability perspective. Performance metrics used for assessing the detection aspect of the proposed model are detection rate and false positive rate at different node mobility speed. Performance evaluation experiments for scalability are with respect to the size of the MANET, where more and more mobile nodes are added into the MANET at varied mobility speed. The results of both the mathematical analysis and the performance evaluation experiments demonstrate that the IDRMAN model is an effective and viable security model for MANET

    20th SC@RUG 2023 proceedings 2022-2023

    Get PDF

    20th SC@RUG 2023 proceedings 2022-2023

    Get PDF
    • …
    corecore