A Formal Verification Model for Performance Analysis of Reinforcement Learning Algorithms Applied to Dynamic Networks
Journal Title: Journal of Applied Computer Science & Mathematics - Year 2017, Vol 11, Issue 23
Abstract
Routing data packets in a dynamic network is a difficult and important problem in computer networks. As the network is dynamic, it is subject to frequent topology changes and is subject to variable link costs due to congestion and bandwidth. Existing shortest path algorithms fail to converge to better solutions under dynamic network conditions. Reinforcement learning algorithms posses better adaptation techniques in dynamic environments. In this paper we apply model based Q-Routing technique for routing in dynamic network. To analyze the correctness of Q-Routing algorithms mathematically, we provide a proof and also implement a SPIN based verification model. We also perform simulation based analysis of Q-Routing for given metrics.
Authors and Affiliations
ALNASER As'ad Mahmoud As'ad
Enhanced White Cane for Visually Impaired People
ccording to WHO (World Health Organization) statistics, around 285 billion people in the world have visual impairment. They find difficulty in doing their everyday tasks and detecting objects in front of them that can be...
Novel Crypting Methods Based on Singular Values Decomposition
With the rapid development of multimedia exchanges, it is necessary to dispose secure systems to protect data and ensure the security of transfer. Two encryption schemes are proposed in this letter where the second is ob...
Framework for Urdu News Headlines Classification
Automatic text classification has great significance in the field of text mining and plays a pivotal role in areas such as spam filtering, news classification, noise reduction etc. It is evident from the literature that...
Identification of Core Architecture Classes for Object-Oriented Software Systems
The new member of the software development team needs to understand the software prior making modifications to the unknown system. The core classes that constitute the system architecture can reveal important structural...
An Attribute Involved Public Key Cryptosystem Based on P-Sylow Subgroups and Randomization
The Asymmetric Key Cryptosystem (AKC) or Public Key Encryption (PKE) is a mechanism used to encrypt the messages by using public key and decrypt the enciphered messages by using private key. Of late, the Attribute-Base...