classical domain
Recently Published Documents


TOTAL DOCUMENTS

44
(FIVE YEARS 12)

H-INDEX

6
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Brendan Juba ◽  
Hai S. Le ◽  
Roni Stern

Creating a domain model, even for classical, domain-independent planning, is a notoriously hard knowledge-engineering task. A natural approach to solve this problem is to learn a domain model from observations. However, model learning approaches frequently do not provide safety guarantees: the learned model may assume actions are applicable when they are not, and may incorrectly capture actions' effects. This may result in generating plans that will fail when executed. In some domains such failures are not acceptable, due to the cost of failure or inability to replan online after failure. In such settings, all learning must be done offline, based on some observations collected, e.g., by some other agents or a human. Through this learning, the task is to generate a plan that is guaranteed to be successful. This is called the model-free planning problem. Prior work proposed an algorithm for solving the model-free planning problem in classical planning. However, they were limited to learning grounded domains, and thus they could not scale. We generalize this prior work and propose the first safe model-free planning algorithm for lifted domains. We prove the correctness of our approach, and provide a statistical analysis showing that the number of trajectories needed to solve future problems with high probability is linear in the potential size of the domain model. We also present experiments on twelve IPC domains showing that our approach is able to learn the real action model in all cases with at most two trajectories.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hujun He ◽  
Rui Xing ◽  
Ke Han ◽  
Junjie Yang

AbstractTaking into account the limitations of the single weighting method presently used for the environmental risk evaluation of overseas mining investment, an improved extension evaluation method based on game theory was developed. The method was then applied to real data from the Philippines and used to establish the congener element object and classical domain of the environmental risk of mining investment in the Philippines, based on extension matter element theory. The optimal index weights, based on a balance of subjective and objective results, were obtained from game theory, the analytic hierarchy process, and entropy weight theory. This enabled calculation of the association function values of evaluation indexes in the Philippines and the environmental risk level of overseas mining investment. Finally, given the weighting and association function values, the environmental risk level of mining investment in the Philippines was determined to be level II (higher risk). These results show that the proposed model is effective for evaluating the environmental risk of overseas mining investment.


CONVERTER ◽  
2021 ◽  
pp. 647-657
Author(s):  
Weiwei Zhu

Based on the basic-element expression method and correlation function theory in Extenics, combined with the knowledge of slope engineering, a method for evaluating the stability of complex slope is proposed. The evaluation process includes the selection of suitable evaluation indexes of slope stability, identificationof the classification standard for the slope stability, identificationof the weights of evaluation indexes by using the improved analytic hierarchy process,identificationof the classical domain, node domain and matter-element under evaluation,the calculation of the correlation of each stability class for each evaluation index, normalization of correlation,and so on. The selection rule of the slop stability evaluation indexes and selection of correlation function and optimal points are also discussed, which can provide reference for slope engineering designin construction industry.


Author(s):  
Maximilian Moll ◽  
Leonhard Kunczik

AbstractIn recent history, reinforcement learning (RL) proved its capability by solving complex decision problems by mastering several games. Increased computational power and the advances in approximation with neural networks (NN) paved the path to RL’s successful applications. Even though RL can tackle more complex problems nowadays, it still relies on computational power and runtime. Quantum computing promises to solve these issues by its capability to encode information and the potential quadratic speedup in runtime. We compare tabular Q-learning and Q-learning using either a quantum or a classical approximation architecture on the frozen lake problem. Furthermore, the three algorithms are analyzed in terms of iterations until convergence to the optimal behavior, memory usage, and runtime. Within the paper, NNs are utilized for approximation in the classical domain, while in the quantum domain variational quantum circuits, as a quantum hybrid approximation method, have been used. Our simulations show that a quantum approximator is beneficial in terms of memory usage and provides a better sample complexity than NNs; however, it still lacks the computational speed to be competitive.


Entropy ◽  
2020 ◽  
Vol 23 (1) ◽  
pp. 49
Author(s):  
Nathan Argaman

Quantum physics is surprising in many ways. One surprise is the threat to locality implied by Bell’s Theorem. Another surprise is the capacity of quantum computation, which poses a threat to the complexity-theoretic Church-Turing thesis. In both cases, the surprise may be due to taking for granted a strict arrow-of-time assumption whose applicability may be limited to the classical domain. This possibility has been noted repeatedly in the context of Bell’s Theorem. The argument concerning quantum computation is described here. Further development of models which violate this strong arrow-of-time assumption, replacing it by a weaker arrow which is yet to be identified, is called for.


2020 ◽  
Author(s):  
Wen-Xiang Chen

We know that string theory is purely geometric.It believes that, through the holographic principle, quantum effects can be generated by projecting onto the lower dimensional multidimensional geometry.There is a corollary here that quantum radiation cannot produce thermal effects.In this paper, in the case of superradiation, the boson boundary condition is presupposed first, which is possible to obtain higher energy than the traditional quantum effect, while the extra energy belongs to the classical domain, namely heat.


2020 ◽  
Vol 41 (3) ◽  
pp. 335-360
Author(s):  
Taishun Liu ◽  
Xiaomin Tang ◽  
Wenjun Zhang

2020 ◽  
Vol 2020 (10) ◽  
pp. 26-1-26-7
Author(s):  
Takuro Matsui ◽  
Takuro Yamaguchi ◽  
Masaaki Iheara

At public space such as a zoo and sports facilities, the presence of fence often annoys tourists and professional photographers. There is a demand for a post-processing tool to produce a non-occluded view from an image or video. This “de-fencing” task is divided into two stages: one is to detect fence regions and the other is to fill the missing part. For a decade or more, various methods have been proposed for video-based de-fencing. However, only a few single-image-based methods are proposed. In this paper, we mainly focus on single-image fence removal. Conventional approaches suffer from inaccurate and non-robust fence detection and inpainting due to less content information. To solve these problems, we combine novel methods based on a deep convolutional neural network (CNN) and classical domain knowledge in image processing. In the training process, we are required to obtain both fence images and corresponding non-fence ground truth images. Therefore, we synthesize natural fence image from real images. Moreover, spacial filtering processing (e.g. a Laplacian filter and a Gaussian filter) improves the performance of the CNN for detecting and inpainting. Our proposed method can automatically detect a fence and generate a clean image without any user input. Experimental results demonstrate that our method is effective for a broad range of fence images.


2020 ◽  
Vol 2020 ◽  
pp. 1-12 ◽  
Author(s):  
F. J. Farsana ◽  
K. Gopakumar

With the advancement in modern computational technologies like cloud computing, there has been tremendous growth in the field of data processing and encryption technologies. In this contest there is an increasing demand for successful storage of the data in the encrypted domain to avoid the possibility of data breach in shared networks. In this paper, a novel approach for speech encryption algorithm based on quantum chaotic system is designed. In the proposed method, classical bits of the speech samples are initially encoded in nonorthogonal quantum state by the secret polarizing angle. In the quantum domain, encoded speech samples are subjected to bit-flip operation according to the Controlled–NOT gate followed by Hadamard transform. Complete superposition of the quantum state in both Hadamard and standard basis is achieved through Hadamard transform. Control bits for C-NOT gate as well as Hadamard gate are generated with a modified Lu˙-hyperchaotic system. Secret nonorthogonal rotation angles and initial conditions of the hyperchaotic system are the keys used to ensure the security of the proposed algorithm. The computational complexity of the proposed algorithm has been analysed both in quantum domain and classical domain. Numerical simulation carried out based on the above principle showed that the proposed speech encryption algorithm has wider keyspace, higher key sensitivity and robust against various differential and statistical cryptographic attacks.


Sign in / Sign up

Export Citation Format

Share Document