期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Formation Feedback Applied to Behavior-Based Approach to Formation Keeping 被引量:1
1
作者 苏治宝 陆际联 《Journal of Beijing Institute of Technology》 EI CAS 2004年第2期190-193,共4页
Approaches to the study of formation keeping for multiple mobile robots are analyzed and a behavior-based robot model is built in this paper. And, a kind of coordination architecture is presented, which is similar to ... Approaches to the study of formation keeping for multiple mobile robots are analyzed and a behavior-based robot model is built in this paper. And, a kind of coordination architecture is presented, which is similar to the infantry squad organization and is used to realize multiple mobile robots to keep formations. Simulations verify the validity of the approach to keep formation, which combines the behavior-based method and formation feedback. The effects of formation feedback on the performance of the system are analyzed. 展开更多
关键词 multiple mobile robots formation keeping behavior-based approach formation feedback
下载PDF
BBACIMA:A Trustworthy Integrity Measurement Architecture through Behavior-Based TPM Access Control
2
作者 YU Aimin FENG Dengguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期513-518,共6页
Two limitations of current integrity measurement architectures are pointed out: (1) a reference value is required for every measured entity to verify the system states, as is impractical however; (2) malicious us... Two limitations of current integrity measurement architectures are pointed out: (1) a reference value is required for every measured entity to verify the system states, as is impractical however; (2) malicious user can forge proof of inexistent system states. This paper proposes a trustworthy integrity measurement architecture, BBACIMA, through enforcing behavior-based access control for trusted platform module (TPM). BBACIMA introduces a TPM reference monitor (TPMRM) to ensure the trustworthiness of integrity measurement. TPMRM enforces behavior-based access control for the TPM and is isolated from other entities which may be malicious. TPMRM is the only entity manipulating TPM directly and all PCR (platform configuration register) operation requests must pass through the security check of it so that only trusted processes can do measurement and produce the proof of system states. Through these mechanisms malicious user can not enforce attack which is feasible in current measurement architectures. 展开更多
关键词 integrity measurement behavior-based access control trusted platform module (TPM) trusted computing remoteattestation
下载PDF
Real Time Behavior-Based Control on a Mobile Robot
3
作者 Koota Muzyamba 钱晋武 +1 位作者 沈林勇 章亚男 《Journal of Shanghai University(English Edition)》 CAS 2003年第3期280-284,共5页
This paper discusses and compares some common architectures used inautonomous mobile robotics. Then it describes a behavior-based autonomous mobile robot that wasimplemented successfully in the Robotics Lab of the Dep... This paper discusses and compares some common architectures used inautonomous mobile robotics. Then it describes a behavior-based autonomous mobile robot that wasimplemented successfully in the Robotics Lab of the Department of Precision Mechanical Engineering.Fuzzy controller was used to implement the emergency behavior, the behaviors arbitration wasimplemented using the subsumption architecture. In an unknown dynamic indoor environment, the robotachieved real-time obstacle avoidance properties that are cruel for mobile robotics. 展开更多
关键词 subsumption architecture mobile robot behavior-based control
下载PDF
Behavior-based Autonomous Navigation and Formation Control of Mobile Robots in Unknown Cluttered Dynamic Environments with Dynamic Target Tracking 被引量:6
4
作者 Nacer Hacene Boubekeur Mendil 《International Journal of Automation and computing》 EI CSCD 2021年第5期766-786,共21页
While different species in nature have safely solved the problem of navigation in a dynamic environment, this remains a challenging task for researchers around the world. The paper addresses the problem of autonomous ... While different species in nature have safely solved the problem of navigation in a dynamic environment, this remains a challenging task for researchers around the world. The paper addresses the problem of autonomous navigation in an unknown dynamic environment for a single and a group of three wheeled omnidirectional mobile robots(TWOMRs). The robot has to track a dynamic target while avoiding dynamic obstacles and dynamic walls in an unknown and very dense environment. It adopts a behavior-based controller that consists of four behaviors: "target tracking", "obstacle avoidance", "dynamic wall following" and "avoid robots". The paper considers the problem of kinematic saturation. In addition, it introduces a strategy for predicting the velocity of dynamic obstacles based on two successive measurements of the ultrasonic sensors to calculate the velocity of the obstacle expressed in the sensor frame. Furthermore, the paper proposes a strategy to deal with dynamic walls even when they have U-like or V-like shapes. The approach can also deal with the formation control of a group of robots based on the leader-follower structure and the behavior-based control, where the robots have to get together and maintain a given formation while navigating toward the target, avoiding obstacles and walls in a dynamic environment. The effectiveness of the proposed approaches is demonstrated via simulation. 展开更多
关键词 behavior-based autonomous navigation dynamic obstacles and walls dynamic target tracking formation control of multi-robot systems dynamic environment
原文传递
Situated Learning of a Behavior-Based Mobile Robot Path Planner
5
作者 姚殊 张钹 《Journal of Computer Science & Technology》 SCIE EI CSCD 1995年第4期375-379,共5页
In this paper, we propose a behaviorbased path planner that can self learn in anunknown environment. A situated learning algorithm is designed which allows therobot to learn to coordinate several concurrent behaviors ... In this paper, we propose a behaviorbased path planner that can self learn in anunknown environment. A situated learning algorithm is designed which allows therobot to learn to coordinate several concurrent behaviors and improve its performanceby interacting with the environmellt. Behaviors are implemented using CMAC neuralnetworks. A simulation environment is set up and some simulation experiments arecarried out to rest our learning algorithm. 展开更多
关键词 Situated learning behavior-based path planning CMAC neural networks
原文传递
Delay-CJ:A novel cryptojacking covert attack method based on delayed strategy and its detection 被引量:1
6
作者 Guangquan Xu Wenyu Dong +6 位作者 Jun Xing Wenqing Lei Jian Liu Lixiao Gong Meiqi Feng Xi Zheng Shaoying Liu 《Digital Communications and Networks》 SCIE CSCD 2023年第5期1169-1179,共11页
Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once beca... Cryptojacking is a type of resource embezzlement attack,wherein an attacker secretly executes the cryptocurrency mining program in the target host to gain profits.It has been common since 2017,and in fact,it once became the greatest threat to network security.To better prove the attack ability the harm caused by cryptojacking,this paper proposes a new covert browser-based mining attack model named Delay-CJ,this model was deployed in a simulation environment for evaluation.Based on the general framework of cryptojacking,Delay-CJ adds hybrid evasion detection techniques and applies the delayed execution strategy specifically for video websites in the prototype implementation.The results show that the existing detection methods used for testing may become invalid as result of this model.In view of this situation,to achieve a more general and robust detection scheme,we built a cryptojacking detection system named CJDetector,which is based on cryptojacking process features.Specifically,it identifies malicious mining by monitoring CPU usage and analyzing the function call information.This system not only effectively detects the attack in our example but also has universal applicability.The recognition accuracy of CJDetector reaches 99.33%.Finally,we tested the web pages in Alexa 50K websites to investigate cryptojacking activity in the real network.We found that although cryptojacking is indeed on the decline,it remains a part of network security threats that cannot be ignored. 展开更多
关键词 Cryptojacking Evasion techniques Delayed strategy Cryptocurrency mining behavior-based detection
下载PDF
Multi-sensor systems and information processing of mobile robot in uncertain environments
7
作者 乔凤斌 杨汝清 《Journal of Southeast University(English Edition)》 EI CAS 2004年第3期341-345,共5页
The PBJ- 01 robot is a kind of mobile robot featuring six wheels and two swing arms which can help it to fit many terrains. The robot has a sophisticated sensor system, which includes ultrasonic sensors, tentacle sens... The PBJ- 01 robot is a kind of mobile robot featuring six wheels and two swing arms which can help it to fit many terrains. The robot has a sophisticated sensor system, which includes ultrasonic sensors, tentacle sensors and a vision sensor. The PBJ- 01 adopts behavior-based reactive control architecture in which the key part is an object recognition system based on a fuzzy neural network. Simulation validates that this system can conclude the obstacle type from the sensor data, and help the robot decide whether to negotiate or to avoid obstacles. 展开更多
关键词 mobile robot behavior-based reactive control architecture neural network
下载PDF
A two-phase system call arguments attribute analyzing method
8
作者 李红娇 李建华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第4期573-577,共5页
To detect more attacks aiming at key security data in program behavior-based anomaly detection,the data flow properties were formulated as unary and binary relations on system call arguments.A new method named two-phr... To detect more attacks aiming at key security data in program behavior-based anomaly detection,the data flow properties were formulated as unary and binary relations on system call arguments.A new method named two-phrase analysis(2PA)is designed to analyze the efficient relation dependency,and its description as well as advantages are discussed.During the phase of static analysis,a dependency graph was constructed according to the program's data dependency graph,which was used in the phase of dynamic learning to learn specified binary relations.The constructed dependency graph only stores the information of related arguments and events,thus improves the efficiency of the learning algorithm and reduces the size of learned relation dependencies.Performance evaluations show that the new method is more efficient than existing methods. 展开更多
关键词 program behavior-based anomaly detection system call arguments data flow dependency 2PA method
下载PDF
Efficient Accurate Context-Sensitive Anomaly Detection
9
作者 李红娇 李建华 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第5期639-644,650,共7页
For program behavior-based anomaly detection, the only way to ensure accurate monitoring is to construct an efficient and precise program behavior model. A new program behavior-based anomaly detection model, called co... For program behavior-based anomaly detection, the only way to ensure accurate monitoring is to construct an efficient and precise program behavior model. A new program behavior-based anomaly detection model, called combined pushdown automaton (CPDA) model was proposed, which is based on static binary executable analysis. The CPDA model incorporates the optimized call stack walk and code instrumentation technique to gain complete context information. Thereby the proposed method can detect more attacks, while retaining good performance. 展开更多
关键词 program behavior-based anomaly detection system call combined pushdown automaton (CPDA) model
下载PDF
The Design of Small Micro-UAV Formation of "Sub-mother" type
10
作者 XIONG Tao XIONG Jing LI Tianyi 《International English Education Research》 2017年第1期38-41,共4页
This paper aims to provide a design about a kind of low-cost "sub-mother" UAV small formation by using the low-cost micro-UAV as the platform. Combined with the current international situation in the UAV formation r... This paper aims to provide a design about a kind of low-cost "sub-mother" UAV small formation by using the low-cost micro-UAV as the platform. Combined with the current international situation in the UAV formation research, the modeling is based on the distributed control method and the behavior-based strategy. In this paper, some research to a few key issues has been carried out. 展开更多
关键词 LOW-COST UAV formation behavior-based strategy "Sub-mother" type
下载PDF
Self-assembly control and experiments in swarm modular robots 被引量:2
11
作者 WEI HongXing LI HaiYuan +1 位作者 TAN JinDong WANG TianMiao 《Science China(Technological Sciences)》 SCIE EI CAS 2012年第4期1118-1131,共14页
This paper presents a self-assembly control strategy for the swarm modular robots. Simulated and physical experiments are conducted based on the Sambot platform, which is a novel self-assembly modular robot having the... This paper presents a self-assembly control strategy for the swarm modular robots. Simulated and physical experiments are conducted based on the Sambot platform, which is a novel self-assembly modular robot having the characteristics of both the chain-type and the mobile self-reconfigurable robots. Multiple Sambots can autonomously move and connect with one another through self-assembly to form robotic organisms. The configuration connection state table is used to describe the configuration of the robotic structure. A directional self-assembly control model is proposed to perform the self-assembly experiments. The self-assembly process begins with one Sambot as the seed, and then the Docking Sambots use a behavior-based controller to achieve connection with the seed Sambot. The controller is independent of the target configuration. The seed and connected Sambots execute a configuration comparison algorithm to control the growth of the robotic structure. Furthermore, the simul- taneous self-assembly of multiple Sambots is discussed. For multiple configurations, self-assembly experiments are conducted in simulation platform and physical platform of Sambot. The experimental results verify the effectiveness and scalability of the self-assembly algorithms. 展开更多
关键词 self-reconfigurable robot modular robot swarm robot SELF-ASSEMBLY behavior-based control
原文传递
An execution control method for the Aerostack aerial robotics framework
12
作者 Martin MOLINA Alberto CAMPORREDONDO +2 位作者 Hriday BAVLE AlejANDro RODRIGUEZ-RAMOS Pascual CAMPOY 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第1期60-75,共16页
Execution control is a critical task of robot architectures which has a deep impact on the quality of the final system. In this study, we describe a general method for execution control, which is a part of the Aerosta... Execution control is a critical task of robot architectures which has a deep impact on the quality of the final system. In this study, we describe a general method for execution control, which is a part of the Aerostack software framework for aerial robotics, and present technical challenges for execution control and design decisions to develop the method. The proposed method has an original design combining a distributed approach for execution control of behaviors(such as situation checking and performance monitoring) and centralizes coordination to ensure consistency of the concurrent execution. We conduct experiments to evaluate the method. The experimental results show that the method is general and usable with acceptable development efforts to efficiently work on different types of aerial missions. The method is supported by standards based on a robot operating system(ROS) contributing to its general use, and an open-source project is integrated in the Aerostack framework. Therefore, its technical details are fully accessible to developers and freely available to be used in the development of new aerial robotic systems. 展开更多
关键词 AERIAL ROBOTICS CONTROL ARCHITECTURE behavior-based CONTROL EXECUTIVE system
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部