Sampling-Based Threat Assessment Algorithms for Intersection Collisions Involving Errant Drivers

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sampling-Based Threat Assessment Algorithms for Intersection Collisions Involving Errant Drivers

This paper considers the decision-making problem for a vehicle crossing a road intersection in the presence of other, potentially errant, drivers. This problem is considered in a game-theoretic framework, where the errant drivers are assumed to be capable of causing intentional collisions. Our approach is to simulate the possible behaviors of errant drivers using RRT-Reach, a modified applicati...

متن کامل

Collisions Involving Older Drivers: An In-depth Study

Although this report was commissioned by the Department for Transport (DfT), the findings and recommendations are those of the authors and do not necessarily represent the views of the DfT. While the DfT has made every effort to ensure the information in this document is accurate, DfT does not guarantee the accuracy, completeness or usefulness of that information; and it cannot accept liability...

متن کامل

Algorithms for Some Intersection Searching Problems Involving Curved Objects

Two classes of geometric intersection searching problems are considered i e problems in which a set S of geometric objects is to be preprocessed into a data structure so that for any query object q the objects of S that are intersected by q can be counted or reported e ciently In the rst class S is a set of curved objects such as d balls d spheres circles or circular arcs and q is also a curved...

متن کامل

Threat-Based Risk Assessment for Enterprise Networks

Protecting enterprise networks requires continuous risk assessment that automatically identifies and prioritizes cybersecurity risks, enables efficient allocation of cybersecurity resources, and enhances protection against modern cyberthreats. Lincoln Laboratory developed a foundational network security maturity model to guide development of such risk assessments and has developed practical ris...

متن کامل

Architecture for Genetic Algorithm-Based Threat Assessment

The determination and subsequent analysis of potential enemy course of actions (COAs) forms a key element within the Intelligence Preparation of the Battlespace (IPB) process. Enemy COA prediction and analysis is also key element of threat assessment data fusion processing. Here we formulate an architecture that employs genetic algorithms (GAs) to generate and evaluate enemy COAs. This formulat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IFAC Proceedings Volumes

سال: 2010

ISSN: 1474-6670

DOI: 10.3182/20100906-3-it-2019.00100