期刊文献+
共找到17,313篇文章
< 1 2 250 >
每页显示 20 50 100
A Potentially Shared Neural Basis Linking Rapid Saccades and Avoidance Initiation in the Superior Colliculus Driven by Visual Threats
1
作者 Zhou Sun Yu Gu 《Neuroscience Bulletin》 2025年第6期1115-1118,共4页
Throughout the lifespan,an animal can encounter predators frequently,thus the ability to avoid attacks from predators is crucial for its survival.The chances of evading danger can be greatly improved if the animal can... Throughout the lifespan,an animal can encounter predators frequently,thus the ability to avoid attacks from predators is crucial for its survival.The chances of evading danger can be greatly improved if the animal can respond immediately to the threat.Therefore,when an animal detects a threat through its visual system,it must quickly direct its gaze and attention toward the source of danger,assess the threat level,and take appropriate action. 展开更多
关键词 avoidance initiation threat assessment gaze direction survival visual systemit visual threats superior colliculus rapid saccades
原文传递
Threat assessment of non-cooperative satellites in interception scenarios:A transfer window perspective
2
作者 Hongyu Han Zhaohui Dang 《Defence Technology(防务技术)》 2026年第2期172-183,共12页
This paper proposes a threat assessment framework for non-cooperative satellites by analyzing their motion characteristics,developing a quantitative evaluation methodology,and demonstrating its effectiveness via repre... This paper proposes a threat assessment framework for non-cooperative satellites by analyzing their motion characteristics,developing a quantitative evaluation methodology,and demonstrating its effectiveness via representative scenarios with neural network acceleration.The framework first establishes a threat evaluation model that integrates three core parameters:capability,opportunity,and hidden values.Subsequently,this research systematically investigates the critical role of transfer windows in threat quantification and introduces a transfer window-based threat assessment approach.The proposed methodology is validated through multiple representative scenarios,with simulation results demonstrating superior performance compared to conventional methods relying solely on optimal transfer windows or minimum distance metrics,enabling more nuanced threat ranking in scenarios where traditional techniques prove inadequate.To address computational demands,a neural networkbased approximation system is implemented to achieve a 25,200×speedup(0.005 s vs.baseline 126 s per 1000-sample batch)through parallel processing,maintaining 99.3%accuracy.Finally,the study explores the framework's extensibility to diverse NCS objectives.It identifies discrepancies between intention inference models and threat evaluation paradigms,providing methodological insights for next-generation space domain awareness systems. 展开更多
关键词 Non-cooperative target Orbital maneuver Orbital service threat index threat prediction
在线阅读 下载PDF
Design of a Patrol and Security Robot with Semantic Mapping and Obstacle Avoidance System Using RGB-D Camera and LiDAR
3
作者 Shu-Yin Chiang Shin-En Huang 《Computers, Materials & Continua》 2026年第4期1735-1753,共19页
This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obsta... This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments. 展开更多
关键词 RGB-D semantic mapping object recognition obstacle avoidance security robot
在线阅读 下载PDF
TeachSecure-CTI:Adaptive Cybersecurity Curriculum Generation Using Threat Dynamics and AI
4
作者 Alaa Tolah 《Computers, Materials & Continua》 2026年第4期1698-1734,共37页
The rapidly evolving cybersecurity threat landscape exposes a critical flaw in traditional educational programs where static curricula cannot adapt swiftly to novel attack vectors.This creates a significant gap betwee... The rapidly evolving cybersecurity threat landscape exposes a critical flaw in traditional educational programs where static curricula cannot adapt swiftly to novel attack vectors.This creates a significant gap between theoretical knowledge and the practical defensive capabilities needed in the field.To address this,we propose TeachSecure-CTI,a novel framework for adaptive cybersecurity curriculumgeneration that integrates real-time Cyber Threat Intelligence(CTI)with AI-driven personalization.Our framework employs a layered architecture featuring a CTI ingestion and clusteringmodule,natural language processing for semantic concept extraction,and a reinforcement learning agent for adaptive content sequencing.Bydynamically aligning learningmaterialswithboththe evolving threat environment and individual learner profiles,TeachSecure-CTI ensures content remains current,relevant,and tailored.A 12-week study with 150 students across three institutions demonstrated that the framework improves learning gains by 34%,significantly exceeding the 12%–21%reported in recent literature.The system achieved 84.8%personalization accuracy,85.9%recognition accuracy for MITRE ATT&CK tactics,and a 31%faster competency development rate compared to static curricula.These findings have implications beyond academia,extending to workforce development,cyber range training,and certification programs.By bridging the gap between dynamic threats and static educational materials,TeachSecure-CTI offers an empirically validated,scalable solution for cultivating cybersecurity professionals capable of responding to modern threats. 展开更多
关键词 Adaptive learning cybersecurity education threat intelligence artificial intelligence curriculumgeneration personalised learning
在线阅读 下载PDF
DFCOA:Distributed Formation Control and Obstacle Avoidance for Multi-UGV Systems
5
作者 Md.Faishal Rahaman Xueyuan Li +3 位作者 Muhammad Amjad Ibrahim Gasimove Md.Shariful Islam S.M.Abul Bashar 《Computer Modeling in Engineering & Sciences》 2026年第2期922-954,共33页
Researchers are increasingly focused on enabling groups of multiple unmanned vehicles to operate cohesively in complex,real-world environments,where coordinated formation control and obstacle avoidance are essential f... Researchers are increasingly focused on enabling groups of multiple unmanned vehicles to operate cohesively in complex,real-world environments,where coordinated formation control and obstacle avoidance are essential for executing sophisticated collective tasks.This paper presents a Distributed Formation Control and Obstacle Avoidance(DFCOA)framework for multi-unmanned ground vehicles(UGV).DFCOA integrates a virtual leader structure for global guidance,an improved A^(*)path planning algorithm with an advanced cost function for efficient path planning,and a repulsive-force-based improved vector field histogram star(VFH^(*))technique for collision avoidance.The virtual leader generates a reference trajectory while enabling distributed execution;the improved A^(*)algorithm reduces planning time and number of nodes to determine the shortest path from the starting position to the goal;and the improved VFH^(*)uses 2D LiDAR data with inter-agent repulsive force to simultaneously avoid collision with obstacles and maintain safe inter-vehicle distances.The formation stability of the proposed DFCOA reaches 95.8%and 94.6%in two scenarios,with root mean square(RMS)centroid errors of 0.9516 and 1.0008 m,respectively.Velocity tracking is precise(velocity centroid error RMS of 0.2699 and 0.1700 m/s),and linear velocities closely match the desired 0.3 m/s.Safety metrics showed average collision risks of 0.7773 and 0.5143,with minimum inter-vehicle distances of 0.4702 and 0.8763 m,confirming collision-free navigation of four UGVs.DFCOA outperforms conventional methods in formation stability,path efficiency,and scalability,proving its suitability for decentralized multi-UGV applications. 展开更多
关键词 Formation control obstacle avoidance virtual leader path planning multi UGV collaboration
在线阅读 下载PDF
Semi-supervised Risk Assessment Research for Intelligent Vehicles Inspired by Collective Biological Risk-avoidance Behaviors
6
作者 Hongyu Hu Zhonghua Xiong +2 位作者 Zhengyi Li Tianjun Sun Rui Ran 《Journal of Bionic Engineering》 2026年第1期225-238,共14页
To address the critical challenge of risk perception and assessment for autonomous vehicles in dynamic interactive envi-ronments,this study proposes a semi-supervised spatiotemporal interaction risk cognition network ... To address the critical challenge of risk perception and assessment for autonomous vehicles in dynamic interactive envi-ronments,this study proposes a semi-supervised spatiotemporal interaction risk cognition network with attention mecha-nism(SS-SIRCN),inspired by the behavioral adaptation patterns of biological groups under external threats.First,by thoroughly analyzing the dynamic interaction characteristics exhibited by typical biological collectives when exposed to risk,the study reveals the underlying patterns of trajectory changes influenced by external danger.Then,an attention-based spatiotemporal risk cognition network is designed to establish a mapping between driving behavior features and potential driving risks.Finally,a semi-supervised learning framework is employed to enable risk assessment for autono-mous vehicles using only a small amount of labeled data.Experimental results on real-world vehicle trajectory datasets demonstrate that the proposed method achieves a risk prediction accuracy of 90.76%,outperforming other baseline models in performance. 展开更多
关键词 Escape behaviour Predator avoidance Brain-like intelligent decision-making Attention mechanism Driving risk Automated driving
在线阅读 下载PDF
Big Data-Driven Federated Learning Model for Scalable and Privacy-Preserving Cyber Threat Detection in IoT-Enabled Healthcare Systems
7
作者 Noura Mohammed Alaskar Muzammil Hussain +3 位作者 Saif Jasim Almheiri Atta-ur-Rahman Adnan Khan Khan M.Adnan 《Computers, Materials & Continua》 2026年第4期793-816,共24页
The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats.The early detection of threa... The increasing number of interconnected devices and the incorporation of smart technology into contemporary healthcare systems have significantly raised the attack surface of cyber threats.The early detection of threats is both necessary and complex,yet these interconnected healthcare settings generate enormous amounts of heterogeneous data.Traditional Intrusion Detection Systems(IDS),which are generally centralized and machine learning-based,often fail to address the rapidly changing nature of cyberattacks and are challenged by ethical concerns related to patient data privacy.Moreover,traditional AI-driven IDS usually face challenges in handling large-scale,heterogeneous healthcare data while ensuring data privacy and operational efficiency.To address these issues,emerging technologies such as Big Data Analytics(BDA)and Federated Learning(FL)provide a hybrid framework for scalable,adaptive intrusion detection in IoT-driven healthcare systems.Big data techniques enable processing large-scale,highdimensional healthcare data,and FL can be used to train a model in a decentralized manner without transferring raw data,thereby maintaining privacy between institutions.This research proposes a privacy-preserving Federated Learning–based model that efficiently detects cyber threats in connected healthcare systems while ensuring distributed big data processing,privacy,and compliance with ethical regulations.To strengthen the reliability of the reported findings,the resultswere validated using cross-dataset testing and 95%confidence intervals derived frombootstrap analysis,confirming consistent performance across heterogeneous healthcare data distributions.This solution takes a significant step toward securing next-generation healthcare infrastructure by combining scalability,privacy,adaptability,and earlydetection capabilities.The proposed global model achieves a test accuracy of 99.93%±0.03(95%CI)and amiss-rate of only 0.07%±0.02,representing state-of-the-art performance in privacy-preserving intrusion detection.The proposed FL-driven IDS framework offers an efficient,privacy-preserving,and scalable solution for securing next-generation healthcare infrastructures by combining adaptability,early detection,and ethical data management. 展开更多
关键词 Intrusion detection systems cyber threat detection explainable AI big data analytics federated learning
在线阅读 下载PDF
A Bio-inspired Bubble Artificial Muscles and TacTip Perception-driven Tri-legged Robot for Obstacle Avoidance
8
作者 Chaoqun Xiang Zhengwei Zhong +3 位作者 Wenqiang Wu Xiaocong Chen Yisheng Guan Tao Zou 《Journal of Bionic Engineering》 2026年第1期175-191,共17页
Legged robots have considerable potential for traversing unstructured situations;nonetheless,their inflexible frameworks often constrain adaptability and obstacle negotiation.The study article presents a revolutionary... Legged robots have considerable potential for traversing unstructured situations;nonetheless,their inflexible frameworks often constrain adaptability and obstacle negotiation.The study article presents a revolutionary Soft Tri-Legged Robot(STLR)that improves movement and obstacle-avoidance skills by using a bio-inspired pneumatic artificial muscle(Bubble Artificial Muscles)and a bio-inspired tactile sensor(TacTip).The STLR is activated by BAMs,which are flexible,pneu-matic-driven actuators that provide fine control over forward,backward,and steering movements.Obstacle identification and avoidance are facilitated by the TacTip sensor,which delivers tactile input for traversing unstructured terrains.We delineate the mechanical features of the BAMs,assess the functionality of the robot's legs,and elaborate on the incorpora-tion of the tactile sensing system.Experimental results demonstrate that the STLR can effectively achieve multi-directional flexible movement and obstacle avoidance through a cross-modal perception-actuation mechanism.This study highlights the promise of soft robotics for search and rescue,medical aid,and autonomous exploration,while delineating difficulties and opportunities for future improvements in functionality and efficiency. 展开更多
关键词 Legged robot Bio-inspired bubble artificial muscles Bio-inspired TacTip sensor Foot tactile perception Obstacle avoidance
在线阅读 下载PDF
Deep reinforcement learning-based adaptive collision avoidance method for UAV in joint operational airspace
9
作者 Yan Shen Xuejun Zhang +1 位作者 Yan Li Weidong Zhang 《Defence Technology(防务技术)》 2026年第2期142-159,共18页
As joint operations have become a key trend in modern military development,unmanned aerial vehicles(UAVs)play an increasingly important role in enhancing the intelligence and responsiveness of combat systems.However,t... As joint operations have become a key trend in modern military development,unmanned aerial vehicles(UAVs)play an increasingly important role in enhancing the intelligence and responsiveness of combat systems.However,the heterogeneity of aircraft,partial observability,and dynamic uncertainty in operational airspace pose significant challenges to autonomous collision avoidance using traditional methods.To address these issues,this paper proposes an adaptive collision avoidance approach for UAVs based on deep reinforcement learning.First,a unified uncertainty model incorporating dynamic wind fields is constructed to capture the complexity of joint operational environments.Then,to effectively handle the heterogeneity between manned and unmanned aircraft and the limitations of dynamic observations,a sector-based partial observation mechanism is designed.A Dynamic Threat Prioritization Assessment algorithm is also proposed to evaluate potential collision threats from multiple dimensions,including time to closest approach,minimum separation distance,and aircraft type.Furthermore,a Hierarchical Prioritized Experience Replay(HPER)mechanism is introduced,which classifies experience samples into high,medium,and low priority levels to preferentially sample critical experiences,thereby improving learning efficiency and accelerating policy convergence.Simulation results show that the proposed HPER-D3QN algorithm outperforms existing methods in terms of learning speed,environmental adaptability,and robustness,significantly enhancing collision avoidance performance and convergence rate.Finally,transfer experiments on a high-fidelity battlefield airspace simulation platform validate the proposed method's deployment potential and practical applicability in complex,real-world joint operational scenarios. 展开更多
关键词 Unmanned aerial vehicle Collision avoidance Deep reinforcement learning Joint operational airspace Hierarchical prioritized experience replay
在线阅读 下载PDF
Saturation attack based route planning and threat avoidance algorithm for cruise missiles 被引量:13
10
作者 Guanghui Wang Xuefeng Sun +1 位作者 Liping Zhang Chao Lv 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第6期948-953,共6页
According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the... According to the characteristic of cruise missiles,navigation point setting is simplified,and the principle of route planning for saturation attack and a concept of reference route are put forward.With the help of the shortest-tangent idea in route-planning and the algorithm of back reasoning from targets,a reference route algorithm is built on the shortest range and threat avoidance.Then a route-flight-time algorithm is built on navigation points.Based on the conditions of multi-direction saturation attack,a route planning algorithm of multi-direction saturation attack is built on reference route,route-flight-time,and impact azimuth.Simulation results show that the algorithm can realize missiles fired in a salvo launch reaching the target simultaneously from different directions while avoiding threat. 展开更多
关键词 aerospace system engineering control and navigation technology of aero-craft mission planning route planning cruise missile saturation attack threat avoidance.
在线阅读 下载PDF
Hierarchical reinforcement learning guidance with threat avoidance 被引量:1
11
作者 LI Bohao WU Yunjie LI Guofei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第5期1173-1185,共13页
The guidance strategy is an extremely critical factor in determining the striking effect of the missile operation.A novel guidance law is presented by exploiting the deep reinforcement learning(DRL)with the hierarchic... The guidance strategy is an extremely critical factor in determining the striking effect of the missile operation.A novel guidance law is presented by exploiting the deep reinforcement learning(DRL)with the hierarchical deep deterministic policy gradient(DDPG)algorithm.The reward functions are constructed to minimize the line-of-sight(LOS)angle rate and avoid the threat caused by the opposed obstacles.To attenuate the chattering of the acceleration,a hierarchical reinforcement learning structure and an improved reward function with action penalty are put forward.The simulation results validate that the missile under the proposed method can hit the target successfully and keep away from the threatened areas effectively. 展开更多
关键词 guidance law deep reinforcement learning(DRL) threat avoidance hierarchical reinforcement learning
在线阅读 下载PDF
Threat Perceptions, Avoidance Motivation and Security Behaviors Correlations
12
作者 Fabrice Djatsa 《Journal of Information Security》 2020年第1期19-45,共27页
As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despit... As the economy increases its dependence on the internet to increase efficiency and productivity in all aspects of society, close attention has been directed to solve the challenges related to internet security. Despite the large amount of resource invested so far in this area, cybersecurity challenges are still great as the media frequently report new cyber breaches. Although researchers acknowledge that great progress has been made in protecting digital assets, cybercriminals are still successful in their operations which are no longer limited to government entities and corporations but also individual computer users. To improve users’ security posture, the researcher examined the relationship between Millennials’ perceptions of cybersecurity threat, users’ online security behaviors and avoidance motivation. The study focused on three constructs which are Perceived Threat (PTH), Online Security Behaviors (OSB) and Avoidance Motivation (AMO). The researcher administered a survey to 109 participants randomly selected in the United States. The Spearman’s correlation test performed supported the analysis of the strength of the relationship and the level of significance between the independent variable and the dependent variables. The results from the statistical test provided enough evidence to fail to reject the null hypothesis related to relationships between PTH and OSB and to reject the null hypothesis regarding the relationship between PTH and AMO. 展开更多
关键词 Millennial PERCEPTIONS threat avoidance MOTIVATION Online Security BEHAVIORS
在线阅读 下载PDF
Threats and Avoidance Measures of Frost Damage of‘Shushanggan’Apricot in the Ili River Valley
13
作者 Guizhi CONG Shuying CHEN +2 位作者 Yuping MA Jin WANG You SHI 《Asian Agricultural Research》 2021年第5期26-30,共5页
[Objectives]To explore the threat factors of frost damage to‘Shushanggan’Apricot in the Ili River Valley,and to provide measures for avoiding frost damage.[Methods]Based on the meteorological data of the Ili River V... [Objectives]To explore the threat factors of frost damage to‘Shushanggan’Apricot in the Ili River Valley,and to provide measures for avoiding frost damage.[Methods]Based on the meteorological data of the Ili River Valley counties and cities during the 12 years from 2010 to 2021 and using the critical low temperature of‘Shushanggan’Apricot as the main factor,we comprehensively analyzed the threats of low temperature in winter in January and late frost in April in spring in the Ili River Valley.[Results]During the 12 years,there were 4 years of low temperature below the critical(-26—-28℃)of‘Shushanggan’Apricot in the Ili River Valley counties and cities in January,accounting for 33.3%,and a total of 59 d.The frequency of occurrence was:Nilka County>Qapqal County>Yining City>Gongliu County>Huocheng County>Khorgos City>Yining County>Tekes County>Xinyuan County.In April,there were 9 years with a low temperature below the critical temperature(-0.6℃)flowering and fruit setting of‘Shushanggan’Apricot,accounting for 75%,and a total of 134 d.The frequency of occurrence was:Nilka County>Tekes County>Gongliu County>Yining County>Huocheng County>Khorgos City>Xinyuan County>Yining City>Qapqal County.The low temperature threats of‘Shushanggan’Apricot suitable cultivation areas were ranked as follows:Nilka County>Gongliu County>Tekes County>Qapqal County>Huocheng County>Yining City>Yining County>Khorgos City>Xinyuan County.Combined with the observation and survey of frost damage on the spot,we comprehensively analyzed and evaluated the cultivation area of‘Shushanggan’Apricot in the Ili River Valley:three counties(Nilka County,Gongliu County,and Tekes County)in the eastern region,except Xinyuan County,suffered frequent late frost damage,are suitable areas for the cultivation of‘Shushanggan’Apricot;three counties and two cities in the western region(Qapqal County,Huocheng County,Yining City,Yining County,Khorgos City)and Xinyuan County in the eastern region are suitable areas for‘Shushanggan’Apricot.The inversion zone at an altitude of 820-1100 in the valley is the superior area for‘Shushanggan’Apricot.[Conclusions]We explored the suitable areas in the origin area of‘Shushanggan’Apricot,and came up with measures to avoid frost damage,to provide a reference for the development of‘Shushanggan’Apricot. 展开更多
关键词 ‘Shushanggan’Apricot Ili River Valley Frost damage threats avoidance measures
在线阅读 下载PDF
Intelligent sequential multi-impulse collision avoidance method for non-cooperative spacecraft based on an improved search tree algorithm 被引量:1
14
作者 Xuyang CAO Xin NING +4 位作者 Zheng WANG Suyi LIU Fei CHENG Wenlong LI Xiaobin LIAN 《Chinese Journal of Aeronautics》 2025年第4期378-393,共16页
The problem of collision avoidance for non-cooperative targets has received significant attention from researchers in recent years.Non-cooperative targets exhibit uncertain states and unpredictable behaviors,making co... The problem of collision avoidance for non-cooperative targets has received significant attention from researchers in recent years.Non-cooperative targets exhibit uncertain states and unpredictable behaviors,making collision avoidance significantly more challenging than that for space debris.Much existing research focuses on the continuous thrust model,whereas the impulsive maneuver model is more appropriate for long-duration and long-distance avoidance missions.Additionally,it is important to minimize the impact on the original mission while avoiding noncooperative targets.On the other hand,the existing avoidance algorithms are computationally complex and time-consuming especially with the limited computing capability of the on-board computer,posing challenges for practical engineering applications.To conquer these difficulties,this paper makes the following key contributions:(A)a turn-based(sequential decision-making)limited-area impulsive collision avoidance model considering the time delay of precision orbit determination is established for the first time;(B)a novel Selection Probability Learning Adaptive Search-depth Search Tree(SPL-ASST)algorithm is proposed for non-cooperative target avoidance,which improves the decision-making efficiency by introducing an adaptive-search-depth mechanism and a neural network into the traditional Monte Carlo Tree Search(MCTS).Numerical simulations confirm the effectiveness and efficiency of the proposed method. 展开更多
关键词 Non-cooperative target Collision avoidance Limited motion area Impulsive maneuver model Search tree algorithm Neural networks
原文传递
A literature review and outlook of advertising avoidance:An integrated theoretical framework based on the SOMR model
15
作者 Shengliang Zhang Jianhui Jin Xiaodong Li 《中国科学技术大学学报》 北大核心 2025年第1期2-16,1,I0001,共17页
Advertising avoidance is resistance to advertising intrusion.This issue has been the subject of much academic research in recent years.To guide scholars to better carry out relevant research and promote enterprises to... Advertising avoidance is resistance to advertising intrusion.This issue has been the subject of much academic research in recent years.To guide scholars to better carry out relevant research and promote enterprises to better implement advertising activities,this study intends to summarize the relevant research on advertising avoidance in recent years.The specific method is to use the core literature meta-analysis method to identify,filter,and screen relevant literature published in core journals from 1997 to 2020 with the keywords advertising avoidance and advertising resistance.We review the collected articles from the following perspectives:the definition and classification,external stimulating factors,internal perception factors,and moderating factors of advertising avoidance.On this basis,the SOMR model of advertising avoidance is constructed according to the SOR model.Finally,some prospects for future related research are presented. 展开更多
关键词 ADVERTISING advertising avoidance SOMR model perceived value perceived infringement
在线阅读 下载PDF
Fluid-based moderate collision avoidance for UAV formation in 3-D low-altitude environments 被引量:1
16
作者 Menghua ZHANG Honglun WANG +5 位作者 Zhiyu LI Yanxiang WANG Xianglun ZHANG Qiang TANG Shichao MA Jianfa WU 《Chinese Journal of Aeronautics》 2025年第6期533-551,共19页
Aiming to address the Unmanned Aerial Vehicle(UAV) formation collision avoidance problem in Three-Dimensional(3-D) low-altitude environments where dense various obstacles exist, a fluid-based path planning framework n... Aiming to address the Unmanned Aerial Vehicle(UAV) formation collision avoidance problem in Three-Dimensional(3-D) low-altitude environments where dense various obstacles exist, a fluid-based path planning framework named the Formation Interfered Fluid Dynamical System(FIFDS) with Moderate Evasive Maneuver Strategy(MEMS) is proposed in this study.First, the UAV formation collision avoidance problem including quantifiable performance indexes is formulated. Second, inspired by the phenomenon of fluids continuously flowing while bypassing objects, the FIFDS for multiple UAVs is presented, which contains a Parallel Streamline Tracking(PST) method for formation keeping and the traditional IFDS for collision avoidance. Third, to rationally balance flight safety and collision avoidance cost, MEMS is proposed to generate moderate evasive maneuvers that match up with collision risks. Comprehensively containing the time and distance safety information, the 3-D dynamic collision regions are modeled for collision prediction. Then, the moderate evasive maneuver principle is refined, which provides criterions of the maneuver amplitude and direction. On this basis, an analytical parameter mapping mechanism is designed to online optimize IFDS parameters. Finally, the performance of the proposed method is validated by comparative simulation results and real flight experiments using fixed-wing UAVs. 展开更多
关键词 Unmanned aerial vehicle Formation collision avoidance:3-D low-altitude environments Interfered fluid dynamical system 3-D dynamic collision region
原文传递
Data Inference:Data Security Threats in the AI Era
17
作者 Zijun Wang Ting Liu +2 位作者 Yang Liu Enrico Zio Xiaohong Guan 《Engineering》 2025年第9期29-33,共5页
1.Introduction Data inference(DInf)is a data security threat in which critical information is inferred from low-sensitivity data.Once regarded as an advanced professional threat limited to intelligence analysts,DInf h... 1.Introduction Data inference(DInf)is a data security threat in which critical information is inferred from low-sensitivity data.Once regarded as an advanced professional threat limited to intelligence analysts,DInf has become a widespread risk in the artificial intelligence(AI)era. 展开更多
关键词 data security threats data security threat artificial intelligence ai era artificial intelligence data inference data inference dinf advanced professional threat
在线阅读 下载PDF
Exploring Cyber Threat Intelligence into Land Administration Systems for Enhanced Cyber Resilience
18
作者 Pierre-François Blin Trias Aditya +1 位作者 Purnama Budi Santosa Christophe Claramunt 《Journal of Geographic Information System》 2025年第1期45-65,共21页
The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration ... The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS. 展开更多
关键词 Cyber threat Intelligence Common Vulnerabilities and Exposures Geodata Land Administration Systems Risk Assessment Spatial Cadastral Data
在线阅读 下载PDF
Understanding Corporate Tax Avoidance:A Review of Internal and External Influencing Factors
19
作者 Johan Adhitakarya Yudha +1 位作者 Iskandar Muda Erlina 《Journal of Modern Accounting and Auditing》 2025年第3期209-217,共9页
This study aims to systematically review the various factors influencing corporate tax avoidance.Tax avoidance refers to legal strategies used to minimize tax liabilities and has become a critical issue in accounting ... This study aims to systematically review the various factors influencing corporate tax avoidance.Tax avoidance refers to legal strategies used to minimize tax liabilities and has become a critical issue in accounting and corporate governance.The study examines key determinants of tax avoidance,including firm characteristics(such as size,leverage,and multinational scale),managerial attributes,executive compensation,ownership structure,corporate social responsibility(CSR)performance,as well as the impact of regulations and legal reforms.The review findings highlight that the motivations behind tax avoidance are multifaceted,driven by the interaction of economic incentives,organizational ethics,external pressures,and public policies.Moreover,strict regulatory environments and strong CSR practices can mitigate tax avoidance behaviors,although their effectiveness is often contingent upon a firm’s cultural and political context.This study offers a comprehensive mapping of the current literature and recommends future research that integrates additional variables and broader time spans to enhance the understanding of tax avoidance behavior across different national contexts. 展开更多
关键词 tax avoidance determinant tax avoidance MOTIVATION
在线阅读 下载PDF
AI-Powered Threat Detection in Online Communities: A Multi-Modal Deep Learning Approach
20
作者 Ravi Teja Potla 《Journal of Computer and Communications》 2025年第2期155-171,共17页
The fast increase of online communities has brought about an increase in cyber threats inclusive of cyberbullying, hate speech, misinformation, and online harassment, making content moderation a pressing necessity. Tr... The fast increase of online communities has brought about an increase in cyber threats inclusive of cyberbullying, hate speech, misinformation, and online harassment, making content moderation a pressing necessity. Traditional single-modal AI-based detection systems, which analyze both text, photos, or movies in isolation, have established useless at taking pictures multi-modal threats, in which malicious actors spread dangerous content throughout a couple of formats. To cope with these demanding situations, we advise a multi-modal deep mastering framework that integrates Natural Language Processing (NLP), Convolutional Neural Networks (CNNs), and Long Short-Term Memory (LSTM) networks to become aware of and mitigate online threats effectively. Our proposed model combines BERT for text class, ResNet50 for photograph processing, and a hybrid LSTM-3-d CNN community for video content material analysis. We constructed a large-scale dataset comprising 500,000 textual posts, 200,000 offensive images, and 50,000 annotated motion pictures from more than one platform, which includes Twitter, Reddit, YouTube, and online gaming forums. The system became carefully evaluated using trendy gadget mastering metrics which include accuracy, precision, remember, F1-score, and ROC-AUC curves. Experimental outcomes demonstrate that our multi-modal method extensively outperforms single-modal AI classifiers, achieving an accuracy of 92.3%, precision of 91.2%, do not forget of 90.1%, and an AUC rating of 0.95. The findings validate the necessity of integrating multi-modal AI for actual-time, high-accuracy online chance detection and moderation. Future paintings will have consciousness on improving hostile robustness, enhancing scalability for real-world deployment, and addressing ethical worries associated with AI-driven content moderation. 展开更多
关键词 Multi-Model AI Deep Learning Natural Language Processing (NLP) Explainable AI (XI) Federated Learning Cyber threat Detection LSTM CNNS
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部