Essays about: "MDP"
Showing result 6 - 10 of 19 essays containing the word MDP.
-
6. Autonomous UAV Path Planning using RSS signals in Search and Rescue Operations
University essay from Linköpings universitet/ReglerteknikAbstract : Unmanned aerial vehicles (UAVs) have emerged as a promising technology in search and rescue operations (SAR). UAVs have the ability to provide more timely localization, thus decreasing the crucial duration of SAR operations. READ MORE
-
7. DECISION-MAKING FOR AUTONOMOUS CONSTRUCTION VEHICLES
University essay from Mälardalens högskola/Inbyggda systemAbstract : Autonomous driving requires tactical decision-making while navigating in a dynamic shared space environment. The complexity and uncertainty in this process arise due to unknown and tightly-coupled interaction among traffic users. READ MORE
-
8. Privacy-Preserving Sharing of Health Data using Hybrid Anonymisation Techniques : A Comparison
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Data anonymisation is not a trivial task due to the challenge of balancing the trade-off between anonymity and data utility. A fairly new attempt to address this challenge is the development of hybrid anonymisation algorithms a combination of syntactic privacy models, often k-anonymity, and differential privacy. READ MORE
-
9. User Plane Selection for Core Networks using Deep Reinforcement Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Allocating service functions to a core network upon users’ various demands isof importance in 5G networks. In this thesis work, we have studied reinforcementlearning models to solve this allocation problem. READ MORE
-
10. Using Markov Decision Processes and Reinforcement Learning to Guide Penetration Testers in the Search for Web Vulnerabilities
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Bug bounties are an increasingly popular way of performing penetration tests of web applications. User statistics of bug bounty platforms show that a lot of hackers struggle to find bugs. READ MORE