We investigate the equilibrium stability and robustness in a class of moving target defense problems, in which players have both incomplete information and asymmetric cognition. We first establish a Bayesian Stackelbe...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
We investigate the equilibrium stability and robustness in a class of moving target defense problems, in which players have both incomplete information and asymmetric cognition. We first establish a Bayesian Stackelberg game model for incomplete information and then employ a hypergame reformulation to address asymmetric cognition. With the core concept of the hyper Bayesian Nash equilibrium (HBNE), a condition for achieving both the strategic and cognitive stability in equilibria can be realized by solving linear equations. Moreover, to deal with players’ underlying perturbed knowledge, we study the equilibrium robustness by presenting a condition of robust HBNE under the given configuration. Experiments evaluate our theoretical results.
Ni/Ge/Ni/Au multi-layer metal electrodes were prepared on N-GaAs substrate by electron-beam evaporation to investigate the effect of annealing process parameters on N-GaAs ohmic contacts. In the annealing temperature ...
详细信息
Targets grouping is the basis of second-level information fusion,which can effectively assist commanders to make *** aerial targets grouping algorithm only takes the radar acquisition data at the current time as the o...
详细信息
Targets grouping is the basis of second-level information fusion,which can effectively assist commanders to make *** aerial targets grouping algorithm only takes the radar acquisition data at the current time as the object and cannot update the clustering results automatically.A grouping method combining dynamic time warping(DTW) and the algorithm Density-Based Spatial Clustering of Applications with Noise(DBSCAN) is *** DTW distance of each attribute historical time-series data is used to measure the similarity between ***,an improved DBSCAN algorithm is used for *** simulation results show that the method has better grouping effect and can automatically cluster regularly.
We investigate the equilibrium stability and robustness in a class of moving target defense problems, in which players have both incomplete information and asymmetric cognition. We first establish a Bayesian Stackelbe...
详细信息
The development of artificial general intelligence (AGI) and metaverse technologies hold great potential to enhance the effectiveness of smart cities and societies. we present a cyberphysical-social approach to integr...
The development of artificial general intelligence (AGI) and metaverse technologies hold great potential to enhance the effectiveness of smart cities and societies. we present a cyberphysical-social approach to integrating AGI into metaverse-based smart cities and societies, with a specific focus on parallel intelligence. The proposed approach considers the interplay between the physical environment, digital systems, social dynamics, and emerging forms of parallel intelligence, as well as swarm intelligence and collective intelligence. By leveraging these forms of parallel intelligence, the integration of AGI can create more responsive and proactive infrastructure, personalized and efficient services, and foster greater community engagement. The metaverse acts as a platform for simulating real-world scenarios and testing and refining AGI models before deployment in the physical world, while also facilitating the development and coordination of parallel intelligence. However, ethical considerations must be taken into account to ensure responsible deployment and avoid exacerbating existing societal inequalities or infringing upon individual privacy rights. This report provides a comprehensive framework for the integration of AGI and parallel intelligence into metaverse-based digital and smart organizations, while emphasizing the importance of human ethics, social responsibility, and ecological sustainability.
Zero-shot detection (ZSD) is a hot topic, which can detect unseen object without training on it. This new approach rises several challenges, e.g., the imbalance between positive and negative data, ambiguity between ba...
详细信息
Admittance control is one of the important methods of compliance *** is performed by inputting force signals and outputting position *** control can achieve high accuracy,but the force signals have large errors,which ...
详细信息
Admittance control is one of the important methods of compliance *** is performed by inputting force signals and outputting position *** control can achieve high accuracy,but the force signals have large errors,which is an important factor affecting its *** the force sensor collects force data,there are non-negligible initial deviations due to gravity,installation,and other factors,resulting in poor admittance control *** order to solve this problem,this paper takes the six-degree-of-freedom manipulator admittance control as the research *** to the mapping relationship between the end attitude and the sensor errors,we propose a method of obtaining the initial offset value of the sensor through data *** method traverses the initial values of the sensor in each working posture when the sensor has no external force input,and then performs secondary interpolation to obtain the offset values of the sensor in any posture,corrects the output values of the force/torque sensor,and then improve the accuracy of admittance *** experimental results show that this method can quickly and effectively improve the calculation accuracy of the sensor's initial deviation values and the admittance control accuracy.
Due to the prediction errors and diverse driving styles of surrounding vehicles, traffic congestion and even accidents can occur in the traffic bottleneck area where vehicles merge into the main road. To ensure that c...
Due to the prediction errors and diverse driving styles of surrounding vehicles, traffic congestion and even accidents can occur in the traffic bottleneck area where vehicles merge into the main road. To ensure that connected and automated vehicles (CAVs) can quickly and efficiently merge into the main road, this paper proposes a cooperative trajectory planning method based on optimal control for vehicle cut-in scenarios. A optimal control model is constructed, and a quintic polynomial is used to generate the initial solution of the optimal control problem to accelerate the solution process and improve the success rate. Finally, The obtained merging trajectory is then synchronized with the movement of vehicles on the main road to optimize their actions and ensure a safe merging process. Joint simulation with Robot Operating system (ROS) and RVIZ is utilized, and the results show that the proposed algorithm can quickly obtain cooperative results, the locally successful merging trajectory meets the requirements of smoothness and safety, and if the solution does not allow merging, the merging vehicle is instructed to terminate the execution.
KCF is an excellent target tracking algorithm with fast computing speed and high ***,it performs poorly in complex tracking situations such as target deformation,motion blur,scale change and *** view of target deforma...
详细信息
KCF is an excellent target tracking algorithm with fast computing speed and high ***,it performs poorly in complex tracking situations such as target deformation,motion blur,scale change and *** view of target deformation and motion blur,we designed a feature fusion method,which combines CN feature and HOG feature to enhance the expression ability of the *** view of the change of scale,the scale pool is *** improve the ability of anti occlusion,we improved the model updating mechanism and designed a SVM detector to detect the target after it is *** experiments on OTB-100 showed that the improved method achieves a great improvement compared with KCF,the accuracy increases by 4.2%,the success rate increases by 12.1%,and our algorithm meets the real-time requirements.
In order to mitigate the adverse impact of denial of service (DoS) attacks, this work designs a parameter self-tuning controller based on fuzzy rules for vehicle platoons with vehicle-to-vehicle (V2V) communications. ...
In order to mitigate the adverse impact of denial of service (DoS) attacks, this work designs a parameter self-tuning controller based on fuzzy rules for vehicle platoons with vehicle-to-vehicle (V2V) communications. Aiming at achieving the cooperative adaptive cruise control (CACC) of the vehicles with a required inter-vehicle distance and the same velocity, while considering the possible DoS attacks, we propose a parameter self-tuning longitudinal controller combining linear control and fuzzy control to enhance the stability and resilience of the platoon systems. Firstly, by analyzing the dynamic characteristics of vehicles and the mechanism of DoS attacks, we establish the dynamic model of vehicle platoons and model the impact of random DoS attacks as a constant data transmission delay, whose probability distribution can be defined using the Bernoulli random variable. Then, a linear controller based on fuzzy control is designed for longitudinal control to guarantee that the platoon keeps a reference velocity and the specified inter-vehicle distance under DoS attacks. Finally, thorough simulations are performed and the detailed results show the performance of the secure longitudinal control scheme for vehicle platoons in terms of stability and security.
暂无评论