期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
Behavior-based cooperative control method for fixed-wing UAV swarm through a virtual tube considering safety constraints 被引量:1
1
作者 Siyi YUE Duo ZHENG +2 位作者 Mingjun WEI Zhichen CHU Defu LIN 《Chinese Journal of Aeronautics》 2025年第11期365-383,共19页
Unmanned Aerial Vehicle(UAV)swarm collaboration enhances mission effectiveness.However,fixed-wing UAV swarm flights face collaborative safety control problems within a limited airspace in complex environments.Aimed at... Unmanned Aerial Vehicle(UAV)swarm collaboration enhances mission effectiveness.However,fixed-wing UAV swarm flights face collaborative safety control problems within a limited airspace in complex environments.Aimed at the cooperative control problem of fixed-wing UAV swarm flights under the airspace constraints of a virtual tube in a complex environment,this paper proposes a behavior-based distributed control method for fixed-wing UAV swarm considering flight safety constraints.Considering the fixed-wing UAV swarm flight problem in complex environment,a virtual tube model based on generator curve is established.The tube keeping,centerline tracking and flight safety behavioral control strategies of the UAV swarm are designed to ensure that the UAV swarm flies along the inside of the virtual tube safety and does not go beyond its boundary.On this basis,a maneuvering decision-making method based on behavioral fusion is proposed to ensure the safe flight of UAV swarm in the restricted airspace.This cooperative control method eliminates the need for respective pre-planned trajectories,reduces communication requirements,and achieves a high level of intelligence.Simulation results show that the proposed behaviorbased UAV swarm cooperative control method is able to make the fixed-wing UAV swarm,which is faster and unable to hover,fly along the virtual tube airspace under various virtual tube shapes and different swarm sizes,and the spacing between the UAVs is larger than the minimum safe distance during the flight. 展开更多
关键词 Unmanned aerial vehicles(UAV) UAV swarm Distributed cooperative control Swarm flight safety behavior-based method Virtual tube airspace
原文传递
Behavior-based Autonomous Navigation and Formation Control of Mobile Robots in Unknown Cluttered Dynamic Environments with Dynamic Target Tracking 被引量:9
2
作者 Nacer Hacene Boubekeur Mendil 《International Journal of Automation and computing》 EI CSCD 2021年第5期766-786,共21页
While different species in nature have safely solved the problem of navigation in a dynamic environment, this remains a challenging task for researchers around the world. The paper addresses the problem of autonomous ... While different species in nature have safely solved the problem of navigation in a dynamic environment, this remains a challenging task for researchers around the world. The paper addresses the problem of autonomous navigation in an unknown dynamic environment for a single and a group of three wheeled omnidirectional mobile robots(TWOMRs). The robot has to track a dynamic target while avoiding dynamic obstacles and dynamic walls in an unknown and very dense environment. It adopts a behavior-based controller that consists of four behaviors: "target tracking", "obstacle avoidance", "dynamic wall following" and "avoid robots". The paper considers the problem of kinematic saturation. In addition, it introduces a strategy for predicting the velocity of dynamic obstacles based on two successive measurements of the ultrasonic sensors to calculate the velocity of the obstacle expressed in the sensor frame. Furthermore, the paper proposes a strategy to deal with dynamic walls even when they have U-like or V-like shapes. The approach can also deal with the formation control of a group of robots based on the leader-follower structure and the behavior-based control, where the robots have to get together and maintain a given formation while navigating toward the target, avoiding obstacles and walls in a dynamic environment. The effectiveness of the proposed approaches is demonstrated via simulation. 展开更多
关键词 behavior-based autonomous navigation dynamic obstacles and walls dynamic target tracking formation control of multi-robot systems dynamic environment
原文传递
Formation Feedback Applied to Behavior-Based Approach to Formation Keeping 被引量:1
3
作者 苏治宝 陆际联 《Journal of Beijing Institute of Technology》 EI CAS 2004年第2期190-193,共4页
Approaches to the study of formation keeping for multiple mobile robots are analyzed and a behavior-based robot model is built in this paper. And, a kind of coordination architecture is presented, which is similar to ... Approaches to the study of formation keeping for multiple mobile robots are analyzed and a behavior-based robot model is built in this paper. And, a kind of coordination architecture is presented, which is similar to the infantry squad organization and is used to realize multiple mobile robots to keep formations. Simulations verify the validity of the approach to keep formation, which combines the behavior-based method and formation feedback. The effects of formation feedback on the performance of the system are analyzed. 展开更多
关键词 multiple mobile robots formation keeping behavior-based approach formation feedback
在线阅读 下载PDF
Real Time Behavior-Based Control on a Mobile Robot
4
作者 Koota Muzyamba 钱晋武 +1 位作者 沈林勇 章亚男 《Journal of Shanghai University(English Edition)》 CAS 2003年第3期280-284,共5页
This paper discusses and compares some common architectures used inautonomous mobile robotics. Then it describes a behavior-based autonomous mobile robot that wasimplemented successfully in the Robotics Lab of the Dep... This paper discusses and compares some common architectures used inautonomous mobile robotics. Then it describes a behavior-based autonomous mobile robot that wasimplemented successfully in the Robotics Lab of the Department of Precision Mechanical Engineering.Fuzzy controller was used to implement the emergency behavior, the behaviors arbitration wasimplemented using the subsumption architecture. In an unknown dynamic indoor environment, the robotachieved real-time obstacle avoidance properties that are cruel for mobile robotics. 展开更多
关键词 subsumption architecture mobile robot behavior-based control
在线阅读 下载PDF
BBACIMA:A Trustworthy Integrity Measurement Architecture through Behavior-Based TPM Access Control
5
作者 YU Aimin FENG Dengguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期513-518,共6页
Two limitations of current integrity measurement architectures are pointed out:(1)a reference value is required for every measured entity to verify the system states,as is impractical however;(2)malicious user can for... Two limitations of current integrity measurement architectures are pointed out:(1)a reference value is required for every measured entity to verify the system states,as is impractical however;(2)malicious user can forge proof of inexistent system states.This paper proposes a trustworthy integrity measurement architecture,BBACIMA,through enforcing behavior-based access control for trusted platform module(TPM).BBACIMA introduces a TPM reference monitor(TPMRM)to ensure the trustworthiness of integrity measurement.TPMRM enforces behavior-based access control for the TPM and is isolated from other entities which may be malicious.TPMRM is the only entity manipulating TPM directly and all PCR(platform configuration register)operation requests must pass through the security check of it so that only trusted processes can do measurement and produce the proof of system states.Through these mechanisms malicious user can not enforce attack which is feasible in current measurement architectures. 展开更多
关键词 integrity measurement behavior-based access control trusted platform module(TPM) trusted computing remoteattestation
在线阅读 下载PDF
基于行为安全管理的机场安检员不安全行为研究
6
作者 陈婉莹 钟导峰 王勤勤 《安全》 2025年第12期64-70,共7页
为有效管控机场安检员的不安全行为,本文将行为安全(BBS)管理应用于民航安检行业。根据行为观察结果与安全检查记录,梳理出旅检环节各岗位不安全行为21项;由BBS管理小组从后果严重程度、发生概率和纠正难度3个维度对各项行为打分,结合... 为有效管控机场安检员的不安全行为,本文将行为安全(BBS)管理应用于民航安检行业。根据行为观察结果与安全检查记录,梳理出旅检环节各岗位不安全行为21项;由BBS管理小组从后果严重程度、发生概率和纠正难度3个维度对各项行为打分,结合熵权逼近理想解排序法(TOPSIS)分析,识别出11项关键行为;面向某机场3条安检通道开展BBS管理实践。结果显示:经BBS管理,11项关键行为的安全水平指数平均提升比率约为15.43%;将旅检环节各岗位划分为文明服务类、专业技术类、全局管理类3类,据此提出差异化安全管理策略。研究结果可为机场安检员不安全行为管控提供理论依据与实践参考。 展开更多
关键词 行为安全(BBS)管理 不安全行为 行为安全观察 熵权逼近理想解排序法(TOPSIS) 机场安检员
在线阅读 下载PDF
Multi-sensor systems and information processing of mobile robot in uncertain environments
7
作者 乔凤斌 杨汝清 《Journal of Southeast University(English Edition)》 EI CAS 2004年第3期341-345,共5页
The PBJ- 01 robot is a kind of mobile robot featuring six wheels and two swing arms which can help it to fit many terrains. The robot has a sophisticated sensor system, which includes ultrasonic sensors, tentacle sens... The PBJ- 01 robot is a kind of mobile robot featuring six wheels and two swing arms which can help it to fit many terrains. The robot has a sophisticated sensor system, which includes ultrasonic sensors, tentacle sensors and a vision sensor. The PBJ- 01 adopts behavior-based reactive control architecture in which the key part is an object recognition system based on a fuzzy neural network. Simulation validates that this system can conclude the obstacle type from the sensor data, and help the robot decide whether to negotiate or to avoid obstacles. 展开更多
关键词 mobile robot behavior-based reactive control architecture neural network
在线阅读 下载PDF
Delay-CJ:A novel cryptojacking covert attack method based on delayed strategy and its detection 被引量:1
8
作者 Guangquan Xu Wenyu Dong +6 位作者 Jun Xing Wenqing Lei Jian Liu Lixiao Gong Meiqi Feng Xi Zheng Shaoying Liu 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1169-1179,共11页
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once beca... Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored. 展开更多
关键词 Cryptojacking Evasion techniques Delayed strategy Cryptocurrency mining behavior-based detection
在线阅读 下载PDF
Situated Learning of a Behavior-Based Mobile Robot Path Planner
9
作者 姚殊 张钹 《Journal of Computer Science & Technology》 SCIE EI CSCD 1995年第4期375-379,共5页
In this paper, we propose a behaviorbased path planner that can self learn in anunknown environment. A situated learning algorithm is designed which allows therobot to learn to coordinate several concurrent behaviors ... In this paper, we propose a behaviorbased path planner that can self learn in anunknown environment. A situated learning algorithm is designed which allows therobot to learn to coordinate several concurrent behaviors and improve its performanceby interacting with the environmellt. Behaviors are implemented using CMAC neuralnetworks. A simulation environment is set up and some simulation experiments arecarried out to rest our learning algorithm. 展开更多
关键词 Situated learning behavior-based path planning CMAC neural networks
原文传递
米非司酮治疗子宫肌瘤58例疗效观察 被引量:1
10
作者 李香梅 《实用医技杂志》 2007年第35期4812-4813,共2页
目的:观察米非司酮治疗子宫肌瘤的临床效果。方法:对58例确诊为子宫肌瘤的患者进行口服米非司酮治疗,治疗前后均行彩色超声监测子宫肌瘤大小,实验室观察卵泡刺激素(FSH)、黄体生成素(LH)、雌激素(E_2)、孕酮(P)、催乳素(PRL)、雄激素(T... 目的:观察米非司酮治疗子宫肌瘤的临床效果。方法:对58例确诊为子宫肌瘤的患者进行口服米非司酮治疗,治疗前后均行彩色超声监测子宫肌瘤大小,实验室观察卵泡刺激素(FSH)、黄体生成素(LH)、雌激素(E_2)、孕酮(P)、催乳素(PRL)、雄激素(T)的变化。结果:58例患者在治疗期间均出现闭经,子宫及子宫肌瘤体积均明显缩小,缩小率分别为29.0%和40.1%(P<0.01)。血FSH、LH、E_2、P测定治疗后平均水平也较用药前下降。结论:米非司酮治疗子宫肌瘤效果好,副反应小,是一种理想的治疗方法。 展开更多
关键词 米非司酮 子宫肌瘤 疗效观察
暂未订购
Efficient Accurate Context-Sensitive Anomaly Detection
11
作者 李红娇 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期639-644,650,共7页
For program behavior-based anomaly detection, the only way to ensure accurate monitoring is to construct an efficient and precise program behavior model. A new program behavior-based anomaly detection model, called co... For program behavior-based anomaly detection, the only way to ensure accurate monitoring is to construct an efficient and precise program behavior model. A new program behavior-based anomaly detection model, called combined pushdown automaton (CPDA) model was proposed, which is based on static binary executable analysis. The CPDA model incorporates the optimized call stack walk and code instrumentation technique to gain complete context information. Thereby the proposed method can detect more attacks, while retaining good performance. 展开更多
关键词 program behavior-based anomaly detection system call combined pushdown automaton (CPDA) model
在线阅读 下载PDF
A two-phase system call arguments attribute analyzing method
12
作者 李红娇 李建华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期573-577,共5页
To detect more attacks aiming at key security data in program behavior-based anomaly detection,the data flow properties were formulated as unary and binary relations on system call arguments.A new method named two-phr... To detect more attacks aiming at key security data in program behavior-based anomaly detection,the data flow properties were formulated as unary and binary relations on system call arguments.A new method named two-phrase analysis(2PA)is designed to analyze the efficient relation dependency,and its description as well as advantages are discussed.During the phase of static analysis,a dependency graph was constructed according to the program's data dependency graph,which was used in the phase of dynamic learning to learn specified binary relations.The constructed dependency graph only stores the information of related arguments and events,thus improves the efficiency of the learning algorithm and reduces the size of learned relation dependencies.Performance evaluations show that the new method is more efficient than existing methods. 展开更多
关键词 program behavior-based anomaly detection system call arguments data flow dependency 2PA method
在线阅读 下载PDF
The Design of Small Micro-UAV Formation of "Sub-mother" type
13
作者 XIONG Tao XIONG Jing LI Tianyi 《International English Education Research》 2017年第1期38-41,共4页
This paper aims to provide a design about a kind of low-cost "sub-mother" UAV small formation by using the low-cost micro-UAV as the platform. Combined with the current international situation in the UAV formation r... This paper aims to provide a design about a kind of low-cost "sub-mother" UAV small formation by using the low-cost micro-UAV as the platform. Combined with the current international situation in the UAV formation research, the modeling is based on the distributed control method and the behavior-based strategy. In this paper, some research to a few key issues has been carried out. 展开更多
关键词 LOW-COST UAV formation behavior-based strategy "Sub-mother" type
在线阅读 下载PDF
Value of Personalized Pricing in Customer Retention
14
作者 Wangyang Lu Huiqi Guan Tianjun Feng 《Journal of Systems Science and Systems Engineering》 2026年第1期54-83,共30页
Recent technological advances enable firms to engage more effectively with customers who reveal their intent to churn.When consumers disclose such intentions,firms can offer targeted discounts,a form of personalized p... Recent technological advances enable firms to engage more effectively with customers who reveal their intent to churn.When consumers disclose such intentions,firms can offer targeted discounts,a form of personalized pricing,to encourage retention.Prior literature,however,shows that broad use of personalized pricing for all returning customers can intensify competition and erode profits in competitive markets.We show that these adverse effects are substantially mitigated when personalized prices are offered selectively,i.e.,only after firms identify consumers who are likely to churn.Analyzing a retention-focused personalized pricing strategy,we find three main results.First,personalized pricing increases firm profits only when the proportion of disclosers is relatively low;although it raises margins on retained customers,it also intensifies first-period competition.Second,consumer surplus and social welfare improve when the share of disclosers is high,because higher disclosure induces stronger price reductions and greater retention.Third,firms often have incentives to invest in personalized pricing capabilities,but mutual investment can generate a Prisoner’s Dilemma:Even with low investment costs,simultaneous adoption may strengthen competition and reduce industry profits.These results emphasize the importance of selective targeting and timing when deploying personalized pricing for retention and offer guidance for firms and policymakers considering such investments. 展开更多
关键词 Customer retention personalized pricing behavior-based pricing duopoly competition
原文传递
Self-assembly control and experiments in swarm modular robots 被引量:2
15
作者 WEI HongXing LI HaiYuan +1 位作者 TAN JinDong WANG TianMiao 《Science China(Technological Sciences)》 SCIE EI CAS 2012年第4期1118-1131,共14页
This paper presents a self-assembly control strategy for the swarm modular robots. Simulated and physical experiments are conducted based on the Sambot platform, which is a novel self-assembly modular robot having the... This paper presents a self-assembly control strategy for the swarm modular robots. Simulated and physical experiments are conducted based on the Sambot platform, which is a novel self-assembly modular robot having the characteristics of both the chain-type and the mobile self-reconfigurable robots. Multiple Sambots can autonomously move and connect with one another through self-assembly to form robotic organisms. The configuration connection state table is used to describe the configuration of the robotic structure. A directional self-assembly control model is proposed to perform the self-assembly experiments. The self-assembly process begins with one Sambot as the seed, and then the Docking Sambots use a behavior-based controller to achieve connection with the seed Sambot. The controller is independent of the target configuration. The seed and connected Sambots execute a configuration comparison algorithm to control the growth of the robotic structure. Furthermore, the simul- taneous self-assembly of multiple Sambots is discussed. For multiple configurations, self-assembly experiments are conducted in simulation platform and physical platform of Sambot. The experimental results verify the effectiveness and scalability of the self-assembly algorithms. 展开更多
关键词 self-reconfigurable robot modular robot swarm robot SELF-ASSEMBLY behavior-based control
原文传递
An execution control method for the Aerostack aerial robotics framework
16
作者 Martin MOLINA Alberto CAMPORREDONDO +2 位作者 Hriday BAVLE AlejANDro RODRIGUEZ-RAMOS Pascual CAMPOY 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第1期60-75,共16页
Execution control is a critical task of robot architectures which has a deep impact on the quality of the final system. In this study, we describe a general method for execution control, which is a part of the Aerosta... Execution control is a critical task of robot architectures which has a deep impact on the quality of the final system. In this study, we describe a general method for execution control, which is a part of the Aerostack software framework for aerial robotics, and present technical challenges for execution control and design decisions to develop the method. The proposed method has an original design combining a distributed approach for execution control of behaviors(such as situation checking and performance monitoring) and centralizes coordination to ensure consistency of the concurrent execution. We conduct experiments to evaluate the method. The experimental results show that the method is general and usable with acceptable development efforts to efficiently work on different types of aerial missions. The method is supported by standards based on a robot operating system(ROS) contributing to its general use, and an open-source project is integrated in the Aerostack framework. Therefore, its technical details are fully accessible to developers and freely available to be used in the development of new aerial robotic systems. 展开更多
关键词 AERIAL ROBOTICS CONTROL ARCHITECTURE behavior-based CONTROL EXECUTIVE system
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部