期刊文献+

不确定规划中循环可达状态信息的维护

Maintenance of Cyclic State Reachability in Nondeterministic Planning
下载PDF
导出
摘要 动态环境下,动作执行的不确定性会因外部因素存在变动,因此将导致不确定系统中的状态可达关系可能发生改变。为解答这一问题,论文对信息传递法中状态之间可达关系的更新方式进行改进,提出一种新的状态可达关系的维护算法。该算法将变更的状态之间可达关系与原可达矩阵对比,利用邻接矩阵中对应可达信息对变更后状态的可达信息进行修改,然后通过状态之间信息传递,求解不确定系统中局部状态可达关系,从而避免了更新过程中的重复计算。实验结果表明,该方法在运算时间上要优于重新利用信息传递法来维护系统的状态可达关系。 In a dynamic environment,the uncertainty of action exection may change due to external factors,which may change the state reachablility relationship in uncertain system. The update method of the reachability relationship between states in the information transfer method is improved,and a new maintenance algorithm of state reachability relationship is proposed to solve this problem. This algorithm compares the reachability relation between the changed states with the original reachability matrix,and modifies the reachability information of the changed state with the corresponding reachability information in the adjacency matrix,and then solves the reachability relation of the local state in the uncertain system through the information transfer between the states,thus the repeated calculation is avoided in the update process. The experimental results show that this method is better than reusing the information transfer method to maintain the state reachability relationship.
作者 张潇妮 文中华 彭擎宇 ZHANG Xiaoni;WEN Zhonghua;PENG Qingyu(College of Information Engineering,Xiangtan University,Xiangtan 411105;College of Computer and Communication,Hunan Institute of Engineering,Xiangtan 411104)
出处 《计算机与数字工程》 2022年第2期356-361,共6页 Computer & Digital Engineering
关键词 智能规划 信息传递 状态可达 矩阵 不确定规划 intelligent planning information delivery state reachability matrix nondeterministic planning
  • 相关文献

参考文献8

二级参考文献53

  • 1吴康恒,姜云飞.基于模型检测的领域约束规划[J].软件学报,2004,15(11):1629-1640. 被引量:17
  • 2王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:56
  • 3谢希仁.计算机网络(第五版)[M].北京:电子工业出版社.2007.5.
  • 4SCHNEIER B.Secrets and Lies[M].John Wiley and Sons,2000.318-333.
  • 5SCHNEIER B.Attack trees:modeling security threats[J].Dr Dobb's Journal,1999,12(24):21-29.
  • 6TIDWELL T,LARSON R,FITCH K,et al.Modeling Internet attacks[A].Proceedings of the 2001 IEEE Workshop on Information Assurance and Security[C].2001.54-59.
  • 7庄朝辉.基于攻击树的多层次入侵检测及其在Linux上的原型[D].厦门:厦门大学硕士论文,2002.
  • 8ANDREW P,MOOR E.Attack Modeling for Information Security and Survivability[R].Technical Notes,Carnegie Mellon University,2001.
  • 9FREDRIK M.Security Analysis of an Information System Using an Attack Tree-based Methodology[D].Chalmers University of Technology,2000.
  • 10JOHN S,MABEN R.Intrusion Detection with Support Vector Machines and Generative Models[R].Technical Research Report,University of Maryland,2002.

共引文献107

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部