5 resultados para Active Transportation
Resumo:
Multi-Agent Reinforcement Learning (MARL) algorithms face two main difficulties: the curse of dimensionality, and environment non-stationarity due to the independent learning processes carried out by the agents concurrently. In this paper we formalize and prove the convergence of a Distributed Round Robin Q-learning (D-RR-QL) algorithm for cooperative systems. The computational complexity of this algorithm increases linearly with the number of agents. Moreover, it eliminates environment non sta tionarity by carrying a round-robin scheduling of the action selection and execution. That this learning scheme allows the implementation of Modular State-Action Vetoes (MSAV) in cooperative multi-agent systems, which speeds up learning convergence in over-constrained systems by vetoing state-action pairs which lead to undesired termination states (UTS) in the relevant state-action subspace. Each agent's local state-action value function learning is an independent process, including the MSAV policies. Coordination of locally optimal policies to obtain the global optimal joint policy is achieved by a greedy selection procedure using message passing. We show that D-RR-QL improves over state-of-the-art approaches, such as Distributed Q-Learning, Team Q-Learning and Coordinated Reinforcement Learning in a paradigmatic Linked Multi-Component Robotic System (L-MCRS) control problem: the hose transportation task. L-MCRS are over-constrained systems with many UTS induced by the interaction of the passive linking element and the active mobile robots.
Resumo:
Bordetella pertussis, the whooping cough pathogen, secretes several virulence factors among which adenylate cyclase toxin (ACT) is essential for establishment of the disease in the respiratory tract. ACT weakens host defenses by suppressing important bactericidal activities of the phagocytic cells. Up to now, it was believed that cell intoxication by ACT was a consequence of the accumulation of abnormally high levels of cAMP, generated exclusively beneath the host plasma membrane by the toxin N-terminal catalytic adenylate cyclase (AC) domain, upon its direct translocation across the lipid bilayer. Here we show that host calpain, a calcium-dependent Cys-protease, is activated into the phagocytes by a toxin-triggered calcium rise, resulting in the proteolytic cleavage of the toxin N-terminal domain that releases a catalytically active "soluble AC''. The calpain-mediated ACT processing allows trafficking of the "soluble AC'' domain into subcellular organella. At least two strategic advantages arise from this singular toxin cleavage, enhancing the specificity of action, and simultaneously preventing an indiscriminate activation of cAMP effectors throughout the cell. The present study provides novel insights into the toxin mechanism of action, as the calpain-mediated toxin processing would confer ACT the capacity for a space- and time-coordinated production of different cAMP "pools'', which would play different roles in the cell pathophysiology.
Resumo:
One of the major concerns in an Intelligent Transportation System (ITS) scenario, such as that which may be found on a long-distance train service, is the provision of efficient communication services, satisfying users' expectations, and fulfilling even highly demanding application requirements, such as safety-oriented services. In an ITS scenario, it is common to have a significant amount of onboard devices that comprise a cluster of nodes (a mobile network) that demand connectivity to the outside networks. This demand has to be satisfied without service disruption. Consequently, the mobility of the mobile network has to be managed. Due to the nature of mobile networks, efficient and lightweight protocols are desired in the ITS context to ensure adequate service performance. However, the security is also a key factor in this scenario. Since the management of the mobility is essential for providing communications, the protocol for managing this mobility has to be protected. Furthermore, there are safety-oriented services in this scenario, so user application data should also be protected. Nevertheless, providing security is expensive in terms of efficiency. Based on this considerations, we have developed a solution for managing the network mobility for ITS scenarios: the NeMHIP protocol. This approach provides a secure management of network mobility in an efficient manner. In this article, we present this protocol and the strategy developed to maintain its security and efficiency in satisfactory levels. We also present the developed analytical models to analyze quantitatively the efficiency of the protocol. More specifically, we have developed models for assessing it in terms of signaling cost, which demonstrates that NeMHIP generates up to 73.47% less signaling compared to other relevant approaches. Therefore, the results obtained demonstrate that NeMHIP is the most efficient and secure solution for providing communications in mobile network scenarios such as in an ITS context.
Resumo:
4 p.
Resumo:
18 p.