How does the optimal policy path look like

Assignment Help Computer Engineering
Reference no: EM133399561

Question 1
Submit your final project. You are expected to submit a document containing the code and the obtained results, and a 2~5 minute video showing how the project runs.

Final Project Document
Include all the project and dataset description that you have submitted in the previous assignment. If you have modified anything, make sure to include the latest descriptions. Add to that the project code. Include both, the code as text, and screenshots of the code. Also, include screenshots that show the obtained results when you run the code.

Project Video
Include a short video (around 2-5 minutes) explaining your project and show how it works. Run the code, enter any necessary input, show the obtained results. Explain what the project is about, what the code does, and what the obtained results mean. You can use your ASU zoom account to record a video, capturing your screen and showing the code running, store it in the cloud, and include the link to the video.

Question 2
Reinforcement Learning
Reinforcement learning is more suitable for simulated environments, and environments in which making mistakes has very low to zero cost. For the applications listed below, list whether reinforcement learning is suitable or not, explaining why. Feel free to include details that better define the environment or the conditions under which reinforcement learning would or would not be suitable.
1. Medical diagnosis of cancer patients
2. Recommending the next action to an auto-pilot
3. Exploring a area with limited space to explore
4. Identifying plants based on their physical features
5. Recommending buying/selling decisions for stocks
6. Controlling a robot arm that assembles toys
7. Training a self-driving car in a simulated environment
8. Training a self-driving car in a real environment (driving in real streets)

Question 3
Discussion: Ethical Issues Related to AI
.AI is being used in many applications related to various life aspects. This led to rising concerns about un-ethical uses of AI.
One controversial example for AI usage is deep fakes. Many have shared concerns about how such technology, powered by AI, can be used in illegitimate ways. You can read more about deep fakes here.
In this discussion, write about one use of AI that you think could be unethical. You can talk about deep fakes, or any other AI technology of your choice.
Grading Criteria:
1. List an AI Application (5 points)
2. Explain what this application is about (10 points)
3. List one usage for this application that may be considered unethical, explaining why that could be the case. (15 points)

Question 4
Training a Room Explorer using RL

Run the script after modifying the main code. Answer the questions below.
1. How does the optimal policy path look like? Draw the path on a 4 X 4 grid.
2. Does it contain as much right or left turns as the policies generated by the old reward function?
3. What is the number of times the exploration task was carried out until the optimal policy was found? (If you are lucky, the code will re run a couple of hundred times. If not, it can keep running for a couple of thousand times before it finds the optimal exploration policy. It should not take more than a couple of minutes maximum.)

Question 5
Using a FSM to program a Self-Driving Car Agent

Keep in mind that there are multiple ways by which a self-driving vehicle can be designed. The choice for a specific method depends on the task environment.
A FSM method would be suitable for simpler environments, with a relatively small number of states, and a small number of input percepts and actions. That's because FMS design relies on listing all percepts at different states, and deciding which action should be taken accordingly. Below is a FSM developed by a research team for high-level decision making in a self-driving car:

Components of a FSM
The finite state machine shows a set of states, representing different actions, and how the transition occurs from one action to another based on the input percept. To design a FSM, you need to first identify:
1. Input Percept: All input percepts, and the values they may take.
2. States: All possible actions/states.
3. Transition Model: How the transition should happen from one state to the another based on the perceived input.

Question 6
Word Suggestion with N-Grams
In this lab, we will generate N-grams for a given text corpus, and use it to make suggestions for the next word to type.

Attachment:- Reinforcement Learning.rar

Reference no: EM133399561

Questions Cloud

What life was like before the industrial revolution : Describe what life was like before the Industrial Revolution. What are some things that impact our daily life that resulted from the Industrial Revolution?
What does it mean to say that a database displays : What does it mean to say that a database displays both entity integrity and referential integrity? And why entity integrity and referential integrity important
Describe one successful way sound music is used to engage : Describe one successful way sound/music is used to engage the audience -- use the text to help describe why you think so. Describe one unsuccessful way
Describe how groups and cultures are presented : Describe how groups and/or cultures are presented in all your advertisements. Your analysis is limited to the people in your ads who form groups
How does the optimal policy path look like : How does the optimal policy path look like? Draw the path on a 4 X 4 grid. 2. Does it contain as much right or left turns as the policies generated by the old
Defines the product or service they are serving : Company defines the customers. Company defines the product or service they are serving. Company defines Define the company's values. As per the above
Discuss the aws simple monthly calculator : What are some of the general use cases that are covered? What are the requirements to use this calculator?
Do you want to info technology course to make it worthwhile : What do you want to learn from Computer and Info Technology course to make it worthwhile? Is a basic understanding of information systems vital to you?
How does filmmaker sembène use sexuality in the film xala : How does the filmmaker Sembène use sexuality in the film Xala to represent corruption? Think, for instance, of the relationship between sexual impotence

Reviews

Write a Review

Computer Engineering Questions & Answers

  Questionconsider a simplified tcps aimd algorithm where

questionconsider a simplified tcps aimd algorithm where congestion window size is measured in number of segments not in

  Develop a website based on the design document

Develop a website based on the design document you submitted for Website Design Document assignment. This website must contain a minimum of 10 pages.

  Draw a physical level 0 dfd for the given system

Draw a physical level 0 DFD for the following system and compare it with the logical model that you created in Chapter 5. A Video Store (AVS) runs a series of fairly standard video stores.

  What role do you feel data quality plays

What role do you feel data quality plays in the overall importance of big data collection and analysis? How does it impact these three base elements

  Write a program use a matrix represent

Write a Program Use a matrix represent.

  Program that uses class to create many fields

write a program that uses class to create many fields.

  What criteria can be developed for assessing the auditor

What criteria can be developed for assessing the auditor? What are metrics? What are two very important rules in the development of metrics?

  What is an audio codec and what is an audio container

What is an audio codec? What is an audio container? Why would an audio element include more than one source element?

  Discuss the benefits of the cloud computing models

Discuss the benefits and challenges of the four cloud computing models: Private, Public, Hybrid, Community. When reviewing, please make sure that you have offer

  Explain need for large prime numbers in cybersecurity field

Write a 1 to 2 page paper explaining the need for large prime numbers in cybersecurity field. If you rephrase what you find on line be sure to cite the source.

  What is the format of the processors logical address

Assume that the number of page entries and page size stay the same. Explain what a Race condition is. Discuss a concrete example of a race condition.

  Provide an overview on what it systems they will need

provide an overview on what IT systems they will need to support their widget and the company's operation. These systems should be linked and they will need

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd