10 research outputs found

    Intelligent Escape of Robotic Systems: A Survey of Methodologies, Applications, and Challenges

    Full text link
    Intelligent escape is an interdisciplinary field that employs artificial intelligence (AI) techniques to enable robots with the capacity to intelligently react to potential dangers in dynamic, intricate, and unpredictable scenarios. As the emphasis on safety becomes increasingly paramount and advancements in robotic technologies continue to advance, a wide range of intelligent escape methodologies has been developed in recent years. This paper presents a comprehensive survey of state-of-the-art research work on intelligent escape of robotic systems. Four main methods of intelligent escape are reviewed, including planning-based methodologies, partitioning-based methodologies, learning-based methodologies, and bio-inspired methodologies. The strengths and limitations of existing methods are summarized. In addition, potential applications of intelligent escape are discussed in various domains, such as search and rescue, evacuation, military security, and healthcare. In an effort to develop new approaches to intelligent escape, this survey identifies current research challenges and provides insights into future research trends in intelligent escape.Comment: This paper is accepted by Journal of Intelligent and Robotic System

    Corporate Behavior and the Social Efficiency of Tort Law

    Get PDF
    This article examines this dissonance between accepted theory and observed reality, between what the model envisions and what the tort system seems to deliver. After sketching the model in greater detail, the first section of the article reviews restraints within tort law on the achievement of efficient outcomes. The analysis then turns to the broader legal environment, and describes how legally sanctioned means of liability evasion - such as the corporate law doctrine of limited liability and the bankruptcy rules permitting discharge of obligations - may further undermine the practical utility of the social efficiency model of tort. The final section of the article examines tort reform\u27s potential for overcoming such barriers to efficiency, and, in light of its pessimistic conclusion, suggests that rethinking the efficiency norm may be a more appropriate response

    Parallel evolutionary programming techniques for strategy optimisation in air combat scenarios

    Get PDF
    Air combat between fighter missiles and aircraft can be categorised as a pursuit-evasion problem. One aircraft acts as a pursuer and the other as an evader. Generally, the pursuer will try to capture the evader as quickly as possible and the evader tries to evade capture for as long as possible. For an experienced human pilot, it is trivial to discuss this methodology, but to simulate it, the mathematics involved is very complex and difficult to implement in a computer environment. Classical methods, though very accurate in their analysis, are not suited to solve a complex 6DOF pursuit-evasion problem and they have limitations in representing real-world problems such as discontinuities, discrete, stochastic, chaotic, temporal information or lack of information. In this thesis, evolutionary programming (EP) is applied to determine the optimum maneuvering strategy for an aircraft (evader) to avoid interception by an incoming missile (pursuer). EP is a class of algorithms known as Evolutionary Algorithm (EA). EA has an ability to find an optimal solution in a complex problem which involves discontinuities, discrete, nondifferential parameters and noise. In addition, the methodology was implemented on parallel computer architecture to improve the computing time and expanding the search space. A sensitivity analysis was carried out to determine the best configuration and to understand the effect of parameters, such as number of processors, population size, number of generations, etc., on the results. The effects of sensor and instrument errors were also considered. The method enabled feasible solutions to be found in a relatively short period of time. However, the ability to search for feasible solutions is dependent on various parameters such as initial conditions, aircraft configurations and aerodynamic constraints. It is concluded that, in general, EP is able to determine feasible maneuvering strategies for an evader to avoid interception with and without instrument errors. The methodology has the potential to be used as a training tool for pilots in air combat or as an intelligent engagement strategy for autonomous systems, such as Unmanned Air Combat Vehicles (UCAV)

    On the role and opportunities in teamwork design for advanced multi-robot search systems

    Get PDF
    Intelligent robotic systems are becoming ever more present in our lives across a multitude of domains such as industry, transportation, agriculture, security, healthcare and even education. Such systems enable humans to focus on the interesting and sophisticated tasks while robots accomplish tasks that are either too tedious, routine or potentially dangerous for humans to do. Recent advances in perception technologies and accompanying hardware, mainly attributed to rapid advancements in the deep-learning ecosystem, enable the deployment of robotic systems equipped with onboard sensors as well as the computational power to perform autonomous reasoning and decision making online. While there has been significant progress in expanding the capabilities of single and multi-robot systems during the last decades across a multitude of domains and applications, there are still many promising areas for research that can advance the state of cooperative searching systems that employ multiple robots. In this article, several prospective avenues of research in teamwork cooperation with considerable potential for advancement of multi-robot search systems will be visited and discussed. In previous works we have shown that multi-agent search tasks can greatly benefit from intelligent cooperation between team members and can achieve performance close to the theoretical optimum. The techniques applied can be used in a variety of domains including planning against adversarial opponents, control of forest fires and coordinating search-and-rescue missions. The state-of-the-art on methods of multi-robot search across several selected domains of application is explained, highlighting the pros and cons of each method, providing an up-to-date view on the current state of the domains and their future challenges

    Optimizing evasive strategies for an evader with imperfect vision capacity

    No full text
    The multiagent pursuit-evasion problem has attracted considerable interest during recent years, and a general assumption is that the evader has perfect vision capacity. However, in the real world, the vision capacity of the evader is always imperfect, and it may have noisy observation within its limited field of view. Such an imperfect vision capacity makes the evader sense incomplete and inaccurate information from the environment, and thus, the evader will achieve suboptimal decisions. To address this challenge, we decompose this problem into two subproblems: 1) optimizing evasive strategies with a limited field of view, and 2) optimizing evasive strategies with noisy observation. For the evader with a limited field of view, we propose a memory-based ‘worst case’ algorithm, the idea of which is to store the locations of the pursuers seen before and estimate the possible region of the pursuers outside the sight of the evader. For the evader with noisy observation, we propose a value-based reinforcement learning algorithm that trains the evader offline and applies the learned strategy to the actual environment, aiming at reducing the impact of uncertainty created by inaccurate information. Furthermore, we combine and make a trade-off between the above two algorithms and propose a memory-based reinforcement learning algorithm that utilizes the estimated locations to modify the input of the state set in the reinforcement learning algorithm. Finally, we extensively evaluate our algorithms in simulation, concluding that in this imperfect vision capacity setting, our algorithms significantly improve the escape success rate of the evader.This work was supported by the National Natural Science Foundation of China (61472079, 61170164, 61807008 and 61806053), the Natural Science Foundation of Jiangsu Province of China (BK20171363, BK20180356, BK20180369, BK20170693)

    Machine Medical Ethics

    Get PDF
    In medical settings, machines are in close proximity with human beings: with patients who are in vulnerable states of health, who have disabilities of various kinds, with the very young or very old, and with medical professionals. Machines in these contexts are undertaking important medical tasks that require emotional sensitivity, knowledge of medical codes, human dignity, and privacy. As machine technology advances, ethical concerns become more urgent: should medical machines be programmed to follow a code of medical ethics? What theory or theories should constrain medical machine conduct? What design features are required? Should machines share responsibility with humans for the ethical consequences of medical actions? How ought clinical relationships involving machines to be modeled? Is a capacity for empathy and emotion detection necessary? What about consciousness? The essays in this collection by researchers from both humanities and science describe various theoretical and experimental approaches to adding medical ethics to a machine, what design features are necessary in order to achieve this, philosophical and practical questions concerning justice, rights, decision-making and responsibility, and accurately modeling essential physician-machine-patient relationships. This collection is the first book to address these 21st-century concerns

    Advances and Applications of Dezert-Smarandache Theory (DSmT) for Information Fusion (Collected Works), Vol. 4

    Get PDF
    The fourth volume on Advances and Applications of Dezert-Smarandache Theory (DSmT) for information fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics. The contributions (see List of Articles published in this book, at the end of the volume) have been published or presented after disseminating the third volume (2009, http://fs.unm.edu/DSmT-book3.pdf) in international conferences, seminars, workshops and journals. First Part of this book presents the theoretical advancement of DSmT, dealing with Belief functions, conditioning and deconditioning, Analytic Hierarchy Process, Decision Making, Multi-Criteria, evidence theory, combination rule, evidence distance, conflicting belief, sources of evidences with different importance and reliabilities, importance of sources, pignistic probability transformation, Qualitative reasoning under uncertainty, Imprecise belief structures, 2-Tuple linguistic label, Electre Tri Method, hierarchical proportional redistribution, basic belief assignment, subjective probability measure, Smarandache codification, neutrosophic logic, Evidence theory, outranking methods, Dempster-Shafer Theory, Bayes fusion rule, frequentist probability, mean square error, controlling factor, optimal assignment solution, data association, Transferable Belief Model, and others. More applications of DSmT have emerged in the past years since the apparition of the third book of DSmT 2009. Subsequently, the second part of this volume is about applications of DSmT in correlation with Electronic Support Measures, belief function, sensor networks, Ground Moving Target and Multiple target tracking, Vehicle-Born Improvised Explosive Device, Belief Interacting Multiple Model filter, seismic and acoustic sensor, Support Vector Machines, Alarm classification, ability of human visual system, Uncertainty Representation and Reasoning Evaluation Framework, Threat Assessment, Handwritten Signature Verification, Automatic Aircraft Recognition, Dynamic Data-Driven Application System, adjustment of secure communication trust analysis, and so on. Finally, the third part presents a List of References related with DSmT published or presented along the years since its inception in 2004, chronologically ordered
    corecore