期刊文献+
共找到16,958篇文章
< 1 2 250 >
每页显示 20 50 100
A Potentially Shared Neural Basis Linking Rapid Saccades and Avoidance Initiation in the Superior Colliculus Driven by Visual Threats
1
作者 Zhou Sun Yu Gu 《Neuroscience Bulletin》 2025年第6期1115-1118,共4页
Throughout the lifespan,an animal can encounter predators frequently,thus the ability to avoid attacks from predators is crucial for its survival.The chances of evading danger can be greatly improved if the animal can... Throughout the lifespan,an animal can encounter predators frequently,thus the ability to avoid attacks from predators is crucial for its survival.The chances of evading danger can be greatly improved if the animal can respond immediately to the threat.Therefore,when an animal detects a threat through its visual system,it must quickly direct its gaze and attention toward the source of danger,assess the threat level,and take appropriate action. 展开更多
关键词 avoidance initiation threat assessment gaze direction survival visual systemit visual threats superior colliculus rapid saccades
原文传递
Convergence of carbapenem resistance and hypervirulence in Klebsiella pneumoniae:An emerging public health threat 被引量:1
2
作者 Jianping Jiang Jianfeng Zhang +2 位作者 Zhewei Sun Liang Chen Minggui Wang 《hLife》 2025年第10期501-503,共3页
Antimicrobial resistance is a global health crisis and carbapenem-resistant Klebsiella pneumoniae(CRKp)is listed as one of the top high-priority pathogens by the World Health Organization.Meanwhile,hypervirulent K.pne... Antimicrobial resistance is a global health crisis and carbapenem-resistant Klebsiella pneumoniae(CRKp)is listed as one of the top high-priority pathogens by the World Health Organization.Meanwhile,hypervirulent K.pneumoniae(hvKp)causes severe community-associated infections,such as liver abscesses and meningitis,in otherwise healthy individuals.Both CRKp and hvKp infections are associated with high mortality rates.The convergence of carbapenem resistance and hypervirulence within a single bacterial strain may lead to significantly more severe clinical outcomes. 展开更多
关键词 carbapenem resistance liver abscesses hypervirulence antimicrobial resistance Klebsiella pneumoniae public health threat klebsiella pneumoniae crkp
暂未订购
Intelligent sequential multi-impulse collision avoidance method for non-cooperative spacecraft based on an improved search tree algorithm 被引量:1
3
作者 Xuyang CAO Xin NING +4 位作者 Zheng WANG Suyi LIU Fei CHENG Wenlong LI Xiaobin LIAN 《Chinese Journal of Aeronautics》 2025年第4期378-393,共16页
The problem of collision avoidance for non-cooperative targets has received significant attention from researchers in recent years.Non-cooperative targets exhibit uncertain states and unpredictable behaviors,making co... The problem of collision avoidance for non-cooperative targets has received significant attention from researchers in recent years.Non-cooperative targets exhibit uncertain states and unpredictable behaviors,making collision avoidance significantly more challenging than that for space debris.Much existing research focuses on the continuous thrust model,whereas the impulsive maneuver model is more appropriate for long-duration and long-distance avoidance missions.Additionally,it is important to minimize the impact on the original mission while avoiding noncooperative targets.On the other hand,the existing avoidance algorithms are computationally complex and time-consuming especially with the limited computing capability of the on-board computer,posing challenges for practical engineering applications.To conquer these difficulties,this paper makes the following key contributions:(A)a turn-based(sequential decision-making)limited-area impulsive collision avoidance model considering the time delay of precision orbit determination is established for the first time;(B)a novel Selection Probability Learning Adaptive Search-depth Search Tree(SPL-ASST)algorithm is proposed for non-cooperative target avoidance,which improves the decision-making efficiency by introducing an adaptive-search-depth mechanism and a neural network into the traditional Monte Carlo Tree Search(MCTS).Numerical simulations confirm the effectiveness and efficiency of the proposed method. 展开更多
关键词 Non-cooperative target Collision avoidance Limited motion area Impulsive maneuver model Search tree algorithm Neural networks
原文传递
A literature review and outlook of advertising avoidance:An integrated theoretical framework based on the SOMR model
4
作者 Shengliang Zhang Jianhui Jin Xiaodong Li 《中国科学技术大学学报》 北大核心 2025年第1期2-16,1,I0001,共17页
Advertising avoidance is resistance to advertising intrusion.This issue has been the subject of much academic research in recent years.To guide scholars to better carry out relevant research and promote enterprises to... Advertising avoidance is resistance to advertising intrusion.This issue has been the subject of much academic research in recent years.To guide scholars to better carry out relevant research and promote enterprises to better implement advertising activities,this study intends to summarize the relevant research on advertising avoidance in recent years.The specific method is to use the core literature meta-analysis method to identify,filter,and screen relevant literature published in core journals from 1997 to 2020 with the keywords advertising avoidance and advertising resistance.We review the collected articles from the following perspectives:the definition and classification,external stimulating factors,internal perception factors,and moderating factors of advertising avoidance.On this basis,the SOMR model of advertising avoidance is constructed according to the SOR model.Finally,some prospects for future related research are presented. 展开更多
关键词 ADVERTISING advertising avoidance SOMR model perceived value perceived infringement
在线阅读 下载PDF
Fluid-based moderate collision avoidance for UAV formation in 3-D low-altitude environments 被引量:1
5
作者 Menghua ZHANG Honglun WANG +5 位作者 Zhiyu LI Yanxiang WANG Xianglun ZHANG Qiang TANG Shichao MA Jianfa WU 《Chinese Journal of Aeronautics》 2025年第6期533-551,共19页
Aiming to address the Unmanned Aerial Vehicle(UAV) formation collision avoidance problem in Three-Dimensional(3-D) low-altitude environments where dense various obstacles exist, a fluid-based path planning framework n... Aiming to address the Unmanned Aerial Vehicle(UAV) formation collision avoidance problem in Three-Dimensional(3-D) low-altitude environments where dense various obstacles exist, a fluid-based path planning framework named the Formation Interfered Fluid Dynamical System(FIFDS) with Moderate Evasive Maneuver Strategy(MEMS) is proposed in this study.First, the UAV formation collision avoidance problem including quantifiable performance indexes is formulated. Second, inspired by the phenomenon of fluids continuously flowing while bypassing objects, the FIFDS for multiple UAVs is presented, which contains a Parallel Streamline Tracking(PST) method for formation keeping and the traditional IFDS for collision avoidance. Third, to rationally balance flight safety and collision avoidance cost, MEMS is proposed to generate moderate evasive maneuvers that match up with collision risks. Comprehensively containing the time and distance safety information, the 3-D dynamic collision regions are modeled for collision prediction. Then, the moderate evasive maneuver principle is refined, which provides criterions of the maneuver amplitude and direction. On this basis, an analytical parameter mapping mechanism is designed to online optimize IFDS parameters. Finally, the performance of the proposed method is validated by comparative simulation results and real flight experiments using fixed-wing UAVs. 展开更多
关键词 Unmanned aerial vehicle Formation collision avoidance:3-D low-altitude environments Interfered fluid dynamical system 3-D dynamic collision region
原文传递
Data Inference:Data Security Threats in the AI Era
6
作者 Zijun Wang Ting Liu +2 位作者 Yang Liu Enrico Zio Xiaohong Guan 《Engineering》 2025年第9期29-33,共5页
1.Introduction Data inference(DInf)is a data security threat in which critical information is inferred from low-sensitivity data.Once regarded as an advanced professional threat limited to intelligence analysts,DInf h... 1.Introduction Data inference(DInf)is a data security threat in which critical information is inferred from low-sensitivity data.Once regarded as an advanced professional threat limited to intelligence analysts,DInf has become a widespread risk in the artificial intelligence(AI)era. 展开更多
关键词 data security threats data security threat artificial intelligence ai era artificial intelligence data inference data inference dinf advanced professional threat
在线阅读 下载PDF
Exploring Cyber Threat Intelligence into Land Administration Systems for Enhanced Cyber Resilience
7
作者 Pierre-François Blin Trias Aditya +1 位作者 Purnama Budi Santosa Christophe Claramunt 《Journal of Geographic Information System》 2025年第1期45-65,共21页
The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration ... The current global cybersecurity landscape, characterized by the increasing scale and sophistication of cyberattacks, underscores the importance of integrating Cyber Threat Intelligence (CTI) into Land Administration Systems (LAS). LAS services involve requests and responses concerning public and private cadastral data, including credentials of parties, ownership, and spatial parcels. This study explores the integration of CTI in LAS to enhance cyber resilience, focusing on the unique vulnerabilities of LAS, such as sensitive data management and interconnection with other critical systems related to spatial data uses and changes. The approach employs a case study of a typical country-specific LAS to analyse structured vulnerabilities and their attributes to determine the degree of vulnerability of LAS through a quantitative inductive approach. The analysis results indicate significant improvements in identifying and mitigating potential threats through CTI integration, thus enhancing cyber resilience. These findings are crucial for policymakers and practitioners to develop robust cybersecurity strategies for LAS. 展开更多
关键词 Cyber threat Intelligence Common Vulnerabilities and Exposures Geodata Land Administration Systems Risk Assessment Spatial Cadastral Data
在线阅读 下载PDF
Understanding Corporate Tax Avoidance:A Review of Internal and External Influencing Factors
8
作者 Johan Adhitakarya Yudha +1 位作者 Iskandar Muda Erlina 《Journal of Modern Accounting and Auditing》 2025年第3期209-217,共9页
This study aims to systematically review the various factors influencing corporate tax avoidance.Tax avoidance refers to legal strategies used to minimize tax liabilities and has become a critical issue in accounting ... This study aims to systematically review the various factors influencing corporate tax avoidance.Tax avoidance refers to legal strategies used to minimize tax liabilities and has become a critical issue in accounting and corporate governance.The study examines key determinants of tax avoidance,including firm characteristics(such as size,leverage,and multinational scale),managerial attributes,executive compensation,ownership structure,corporate social responsibility(CSR)performance,as well as the impact of regulations and legal reforms.The review findings highlight that the motivations behind tax avoidance are multifaceted,driven by the interaction of economic incentives,organizational ethics,external pressures,and public policies.Moreover,strict regulatory environments and strong CSR practices can mitigate tax avoidance behaviors,although their effectiveness is often contingent upon a firm’s cultural and political context.This study offers a comprehensive mapping of the current literature and recommends future research that integrates additional variables and broader time spans to enhance the understanding of tax avoidance behavior across different national contexts. 展开更多
关键词 tax avoidance determinant tax avoidance MOTIVATION
在线阅读 下载PDF
AI-Powered Threat Detection in Online Communities: A Multi-Modal Deep Learning Approach
9
作者 Ravi Teja Potla 《Journal of Computer and Communications》 2025年第2期155-171,共17页
The fast increase of online communities has brought about an increase in cyber threats inclusive of cyberbullying, hate speech, misinformation, and online harassment, making content moderation a pressing necessity. Tr... The fast increase of online communities has brought about an increase in cyber threats inclusive of cyberbullying, hate speech, misinformation, and online harassment, making content moderation a pressing necessity. Traditional single-modal AI-based detection systems, which analyze both text, photos, or movies in isolation, have established useless at taking pictures multi-modal threats, in which malicious actors spread dangerous content throughout a couple of formats. To cope with these demanding situations, we advise a multi-modal deep mastering framework that integrates Natural Language Processing (NLP), Convolutional Neural Networks (CNNs), and Long Short-Term Memory (LSTM) networks to become aware of and mitigate online threats effectively. Our proposed model combines BERT for text class, ResNet50 for photograph processing, and a hybrid LSTM-3-d CNN community for video content material analysis. We constructed a large-scale dataset comprising 500,000 textual posts, 200,000 offensive images, and 50,000 annotated motion pictures from more than one platform, which includes Twitter, Reddit, YouTube, and online gaming forums. The system became carefully evaluated using trendy gadget mastering metrics which include accuracy, precision, remember, F1-score, and ROC-AUC curves. Experimental outcomes demonstrate that our multi-modal method extensively outperforms single-modal AI classifiers, achieving an accuracy of 92.3%, precision of 91.2%, do not forget of 90.1%, and an AUC rating of 0.95. The findings validate the necessity of integrating multi-modal AI for actual-time, high-accuracy online chance detection and moderation. Future paintings will have consciousness on improving hostile robustness, enhancing scalability for real-world deployment, and addressing ethical worries associated with AI-driven content moderation. 展开更多
关键词 Multi-Model AI Deep Learning Natural Language Processing (NLP) Explainable AI (XI) Federated Learning Cyber threat Detection LSTM CNNS
在线阅读 下载PDF
Metagenomic perspectives on antibiotic resistance genes in tap water:The environmental characteristic,potential mobility and health threat
10
作者 Qiyue Meng Yibo Zhang +3 位作者 Da He Yu Xia Jie Fu Chenyuan Dang 《Journal of Environmental Sciences》 2025年第1期582-596,共15页
As an emerging environmental contaminant,antibiotic resistance genes(ARGs)in tap water have attracted great attention.Although studies have provided ARG profiles in tap water,research on their abundance levels,composi... As an emerging environmental contaminant,antibiotic resistance genes(ARGs)in tap water have attracted great attention.Although studies have provided ARG profiles in tap water,research on their abundance levels,composition characteristics,and potential threat is still insufficient.Here,9 household tap water samples were collected from the Guangdong-Hong Kong-Macao Greater Bay Area(GBA)in China.Additionally,75 sets of environmental sample data(9 types)were downloaded from the public database.Metagenomics was then performed to explore the differences in the abundance and composition of ARGs.221 ARG subtypes consisting of 17 types were detected in tap water.Although the ARG abundance in tap water was not significantly different from that found in drinking water plants and reservoirs,their composition varied.In tap water samples,the three most abundant classes of resistance genes were multidrug,fosfomycin and MLS(macrolide-lincosamidestreptogramin)ARGs,and their corresponding subtypes ompR,fosX and macB were also the most abundant ARG subtypes.Regarding the potential mobility,vanS had the highest abundance on plasmids and viruses,but the absence of key genes rendered resistance to vancomycin ineffective.Generally,the majority of ARGs present in tap water were those that have not been assessed and are currently not listed as high-threat level ARG families based on the World Health Organization Guideline.Although the current potential threat to human health posed by ARGs in tap water is limited,with persistent transfer and accumulation,especially in pathogens,the potential danger to human health posed by ARGs should not be ignored. 展开更多
关键词 Antibiotic resistance genes Tap water Plasmids Viruses Health threat
原文传递
Adapting railway sector to repel cyber threats:A critical analysis
11
作者 Wahiba Erriadi Suresh Renukappa +3 位作者 Subashini Suresh Panagiotis Georgakis Adel Almohammad Luke Seabright 《High-Speed Railway》 2025年第3期229-237,共9页
Given the unique challenges facing the railway industry, cybersecurity is a crucial issue that must be addressed proactively. This paper aims to provide a systematic review of cybersecurity threats that could impact t... Given the unique challenges facing the railway industry, cybersecurity is a crucial issue that must be addressed proactively. This paper aims to provide a systematic review of cybersecurity threats that could impact the safety and operations of rolling stock, the privacy and security of passengers and employees, and the public in general. The systematic literature review revealed that cyber threats to the railway industry can take many forms, including attacks on operational technology systems, data breaches, theft of sensitive information, and disruptions to train services. The consequences of these threats can be severe, leading to operational disruptions, financial losses, and loss of public trust in the railway system. To address these threats, railway organizations must adopt a proactive approach to security and implement robust cybersecurity measures tailored to the industry’s specific needs and challenges. This includes regular testing of systems for vulnerabilities, incident response plans, and employee training to identify and respond to cyber threats. Ensuring the system remains available, reliable, and maintainable is fundamental given the importance of railways as critical infrastructure and the potential harm that can be caused by cyber threats. 展开更多
关键词 Cyber threats Operations Railway sector Risks and safety
在线阅读 下载PDF
Localization and tracking of multiple quadrotors with collision avoidance:Theory and experiment
12
作者 Guang Yang Juntong Qi +4 位作者 Mingming Wang Yan Peng Chong Wu Yuan Ping Hailong Huang 《Defence Technology(防务技术)》 2025年第8期338-350,共13页
Multiple quadrotors target encirclement is widely used in the intelligent field,as it can effectively monitor and control target behavior.However,it faces the danger of collision,as well as difficulties in localizatio... Multiple quadrotors target encirclement is widely used in the intelligent field,as it can effectively monitor and control target behavior.However,it faces the danger of collision,as well as difficulties in localization and tracking.Therefore,we propose a complete target encirclement method.Firstly,based on Hooke's law,a collision avoidance controller is designed to maintain a safe flying distance among quadrotors.Then,based on the consensus theory,a formation tracking controller is designed to meet the requirements of formation transformation and encirclement tasks,and a stability proof based on Lyapunov was provided.Besides,the target detection is designed based on YOLOv5s,and the target location model is constructed based on the principle of pinhole projection and triangle similarity.Finally,we conducted experiments on the built platform,with 3 reconnaissance quadrotors detecting and localization 3 target vehicles and 7 hunter quadrotors tracking them.The results show that the minimum average error for localization targets with reconnaissance quadrotors can reach 0.1354 m,while the minimum average error for tracking with hunter quadrotors is only 0.2960 m.No quadrotors collision occurred in the whole formation transformation and tracking experiment.In addition,compared with the advanced methods,the proposed method has better performance. 展开更多
关键词 Multiple quadrotors Collision avoidance Target localization TRACKING Outdoor experiments
在线阅读 下载PDF
Biomechanical Analysis of Scoliosis Orthopedic Force Loading with Human Avoidance Effect
13
作者 ZHU Ye REN Dong +1 位作者 ZHANG Shuang CAO Qian 《Journal of Shanghai Jiaotong university(Science)》 2025年第1期187-196,共10页
Due to the lack of human avoidance analysis,the orthosis cannot accurately apply orthopedic force during orthopedic,resulting in poor orthopedic effect.Therefore,the relationship between the human body’s active avoid... Due to the lack of human avoidance analysis,the orthosis cannot accurately apply orthopedic force during orthopedic,resulting in poor orthopedic effect.Therefore,the relationship between the human body’s active avoidance ability and force application is studied to achieve accurate loading of orthopedic force.First,a high-precision scoliosis model was established based on computed tomography data,and the relationship between orthopedic force and Cobb angle was analyzed.Then 9 subjects were selected for avoidance ability test grouped by body mass index calculation,and the avoidance function of different groups was fitted.The avoidance function corrected the application of orthopedic forces.The results show that the optimal correction force calculated by the finite element method was 60 N.The obese group had the largest avoidance ability,followed by the standard group and the lean group.When the orthopedic force was 60 N,the Cobb angle was reduced from 33.77°to 20°,the avoidance ability of the standard group at 50 N obtained from the avoidance function was 20.28%and 10.14 N was actively avoided.Therefore,when 50 N was applied,60.14 N was actually generated,which can achieve the orthopedic effect of 60 N numerical simulation analysis.The avoidance effect can take the active factors of the human body into consideration in the orthopedic process,so as to achieve a more accurate application of orthopedic force,and provide data reference for clinicians in the orthopedic process. 展开更多
关键词 SCOLIOSIS BIOMECHANICS human active avoidance ability body mass index
原文传递
Advanced persistent threat detection via mining long-term features in provenance graphs
14
作者 Fan XU Qinxin ZHAO +4 位作者 Xiaoxiao LIU Nan WANG Meiqi GAO Xuezhi WEN Dalin ZHANG 《Frontiers of Computer Science》 2025年第10期111-121,共11页
Advanced Persistent Threats(APTs)pose significant challenges to detect due to their“low-and-slow”attack patterns and frequent use of zero-day vulnerabilities.Within this task,the extraction of long-term features is ... Advanced Persistent Threats(APTs)pose significant challenges to detect due to their“low-and-slow”attack patterns and frequent use of zero-day vulnerabilities.Within this task,the extraction of long-term features is often crucial.In this work,we propose a novel end-to-end APT detection framework named Long-Term Feature Association Provenance Graph Detector(LT-ProveGD).Specifically,LT-ProveGD encodes contextual information of the dynamic provenance graph while preserving the topological information with space efficiency.To combat“low-and-slow”attacks,LT-ProveGD develops an autoencoder with an integrated multi-head attention mechanism to extract long-term dependencies within the encoded representations.Furthermore,to facilitate the detection of previously unknown attacks,we leverage Jenks’natural breaks methodology,enabling detection without relying on specific attack information.By conducting extensive experiments on five widely used datasets with state-of-the-art attack detection methods,we demonstrate the superior effectiveness of LT-ProveGD. 展开更多
关键词 advanced persistent threats provenance graph long-term features extraction
原文传递
Classification of Cyber Threat Detection Techniques for Next-Generation Cyber Defense via Hesitant Bipolar Fuzzy Frank Information
15
作者 Hafiz Muhammad Waqas Tahir Mahmood +2 位作者 Walid Emam Ubaid ur Rehman Dragan Pamucar 《Computers, Materials & Continua》 2025年第9期4699-4727,共29页
Cyber threat detection is a crucial aspect of contemporary cybersecurity due to the depth and complexity of cyberattacks.It is the identification of malicious activity,unauthorized access,and possible intrusions in ne... Cyber threat detection is a crucial aspect of contemporary cybersecurity due to the depth and complexity of cyberattacks.It is the identification of malicious activity,unauthorized access,and possible intrusions in networks and systems.Modern detection methods employ artificial intelligence and machine learning to study vast amounts of data,learn patterns,and anticipate potential threats.Real-time monitoring and anomaly detection improve the capacity to react to changing threats more rapidly.Cyber threat detection systems aim to reduce false positives and provide complete coverage against the broadest possible attacks.This research advocates for proactive measures and adaptive technologies in defending digital environments.Improvements in detection ability by organizations will assist in safeguarding assets and integrity in operations in this increasingly digital world.This paper draws on the categorization of cyber threat detection methods using hesitant bipolar fuzzy Frank operators.Categorization is a step that is necessary for systematic comparison and assessment of detection methods so that the most suitable method for particular cybersecurity requirements is chosen.Furthermore,this research manages uncertainty and vagueness that exists in decision-making by applying hesitant bipolar fuzzy logic.The importance of the work lies in how it fortifies cybersecurity architectures with a formal method of discovering optimal detection measures and improving responsiveness,resulting in holistic protection against dynamic threats. 展开更多
关键词 CYBERSECURITY threat detection hesitant bipolar fuzzy sets frank operators MCDM process
在线阅读 下载PDF
The Developmental Trajectory of Family Functioning in Junior High School Students:Effects on Preference for Solitude and Social Avoidance
16
作者 Liuyan Ren Ruining Wang +2 位作者 Hohjin Im Baojuan Ye Qi Dai 《International Journal of Mental Health Promotion》 2025年第6期809-822,共14页
Objectives:Positive family functioning(FF)is critical for adolescent development,yet only a few studies have examined this developmental trajectory pathway.This study aimed to identify different types of FF developmen... Objectives:Positive family functioning(FF)is critical for adolescent development,yet only a few studies have examined this developmental trajectory pathway.This study aimed to identify different types of FF development trajectories during junior high school students,investigate their influence on social avoidance(SA),and further examine the mediating role of preference for solitude(PS)between them.Methods:A three-wave longitudinal study was used with six-month intervals.Questionnaire data were collected from 436 junior high school students in Jiangxi Province,China.Participants ranged in age from 11 to 14 years old(Mean=12.89 years,SD=1.08;50.2%male).Results:Four heterogeneous types of FF trajectories were identified:(1)a high and increasing group(14.7%);(2)a consistently high group(36.24%);(3)a consistently moderate group(45.86%);and(4)a rapid growth group(3.2%).The developmental trajectories of FF among junior high students significantly varied in their levels of SA(F(3,432)=32.03,p<0.001).Compared to the high and increasing groups,the consistently high,consistently medium,and rapid growth groups exhibited higher levels of SA.PS mediated the association between the developmental trajectory of FF and SA.Conclusion:There was a close relationship between the developmental trajectory of FF and SA.Interventions focusing on family system optimization and solitary preference management could effectively mitigate SA behaviors.These findings are important for promoting healthy socialization in adolescents. 展开更多
关键词 Developmental trajectory family functioning social avoidance preference for solitude longitudinal study
在线阅读 下载PDF
Time-efficient cooperative attack strategy considering collision avoidance for missile swarm
17
作者 HU Yixin XU Yun DANG Zhaohui 《Journal of Systems Engineering and Electronics》 2025年第5期1306-1316,共11页
In the realm of missile defense systems,the self-sufficient maneuver capacity of missile swarms is pivotal for their survival.Through the analysis of the missile dynamics model,a time-efficient cooperative attack stra... In the realm of missile defense systems,the self-sufficient maneuver capacity of missile swarms is pivotal for their survival.Through the analysis of the missile dynamics model,a time-efficient cooperative attack strategy for missile swarm is proposed.Based on the distribution of the attackers and defenders,the collision avoidance against the defenders is considered during the attack process.By analyzing the geometric relationship between the relative velocity vector and relative position vector of the attackers and defenders,the collision avoidance constrains of attacking swarm are redefined.The key point is on adjusting the relative velocity vectors to fall outside the collision cone.This work facilitates high-precision attack toward the target while keeping safe missing distance between other attackers during collision avoidance process.By leveraging an innovative repulsion artificial function,a time-efficient cooperative attack strategy for missile swarm is obtained.Through rigorous simulation,the effectiveness of this cooperative attack strategy is substantiated.Furthermore,by employing Monte Carlo simulation,the success rate of the cooperative attack strategy is assessesed and the optimal configuration for the missile swarm is deduced. 展开更多
关键词 missile swarm cooperative attack strategy collision avoidance constraint artificial potential function
在线阅读 下载PDF
Integrated threat assessment method of beyond-visual-range air combat
18
作者 WANG Xingyu YANG Zhen +3 位作者 CHAI Shiyuan HE Yupeng HUO Weiyu ZHOU Deyun 《Journal of Systems Engineering and Electronics》 2025年第1期176-193,共18页
Beyond-visual-range(BVR)air combat threat assessment has attracted wide attention as the support of situation awareness and autonomous decision-making.However,the traditional threat assessment method is flawed in its ... Beyond-visual-range(BVR)air combat threat assessment has attracted wide attention as the support of situation awareness and autonomous decision-making.However,the traditional threat assessment method is flawed in its failure to consider the intention and event of the target,resulting in inaccurate assessment results.In view of this,an integrated threat assessment method is proposed to address the existing problems,such as overly subjective determination of index weight and imbalance of situation.The process and characteristics of BVR air combat are analyzed to establish a threat assessment model in terms of target intention,event,situation,and capability.On this basis,a distributed weight-solving algorithm is proposed to determine index and attribute weight respectively.Then,variable weight and game theory are introduced to effectively deal with the situation imbalance and achieve the combination of subjective and objective.The performance of the model and algorithm is evaluated through multiple simulation experiments.The assessment results demonstrate the accuracy of the proposed method in BVR air combat,indicating its potential practical significance in real air combat scenarios. 展开更多
关键词 beyond-visual-range(BVR) air combat threat assessment game theory variable weight theory
在线阅读 下载PDF
Cooperative Collision Avoidance Control with Relative Velocity Information for Redundant Dual-arm Robotic Manipulators
19
作者 Jinyue Liu Chao Xu +2 位作者 Xiaohui Jia Yi Wu Tiejun Li 《Journal of Bionic Engineering》 2025年第3期1111-1125,共15页
In this paper,a novel cooperative collision avoidance control strategy with relative velocity information for redundant robotic manipulators is derived to guarantee the behavioral safety of robots in the cooperative o... In this paper,a novel cooperative collision avoidance control strategy with relative velocity information for redundant robotic manipulators is derived to guarantee the behavioral safety of robots in the cooperative operational task.This strategy can generate the collision-free trajectory of the robotic links in real-time,which is to realize that the robot can avoid moving obstacles less conservatively and ensure tracking accuracy of terminal end-effector tasks in performing cooperative tasks.For the case where there is interference between the moving obstacle and the desired path of the robotic end-effector,the method inherits the null-space-based self-motion characteristics of the redundant manipulator,integrates the relative motion information,and uses the improved artificial potential field method to design the control items,which are used to generate the collision avoidance motion and carry out moving obstacles smoothly and less conservatively.At the same time,the strategy maintains the kinematic constraint relationship of dual-arm cooperatives,to meet the real-time collision avoidance task under collaborative tasks.Finally,the algorithm simulation indicates that the method can better ensure the tracking accuracy of the end-effector task and carry out moving obstacles smoothly.The experimental results show that the method can generate the real-time collision-free trajectory of the robot in the cooperative handling task,and the joint movement is continuous and stable. 展开更多
关键词 Redundant dual-arm robotic manipulators Cooperative operational tasks Collision avoidance Relative velocity information
在线阅读 下载PDF
Research on the Problem of Autonomous Collision Avoidance and Risk Avoidance of Ships
20
作者 Qiang Tan 《Journal of Electronic Research and Application》 2025年第3期262-269,共8页
This paper deeply explores the autonomous collision avoidance algorithm for intelligent ships,aiming to enhance the intelligence level and safety of ship collision avoidance by integrating navigation experience.An aut... This paper deeply explores the autonomous collision avoidance algorithm for intelligent ships,aiming to enhance the intelligence level and safety of ship collision avoidance by integrating navigation experience.An autonomous collision avoidance algorithm based on navigation experience is designed,a collision avoidance experience database is constructed,a quantitative model is established,and specific algorithm steps are implemented.The algorithm is verified and analyzed through simulation tests.The results show that the algorithm can effectively achieve autonomous ship collision avoidance in different scenarios,providing new ideas and methods for the development of intelligent ship collision avoidance technology. 展开更多
关键词 Intelligent ships Autonomous collision avoidance algorithm Navigation experience Quantitative model Simulation test
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部