Sampling-Based Threat Assessment Algorithms for Intersection Collisions Involving Errant Drivers
نویسندگان
چکیده
منابع مشابه
Sampling-Based Threat Assessment Algorithms for Intersection Collisions Involving Errant Drivers
This paper considers the decision-making problem for a vehicle crossing a road intersection in the presence of other, potentially errant, drivers. This problem is considered in a game-theoretic framework, where the errant drivers are assumed to be capable of causing intentional collisions. Our approach is to simulate the possible behaviors of errant drivers using RRT-Reach, a modified applicati...
متن کاملCollisions Involving Older Drivers: An In-depth Study
Although this report was commissioned by the Department for Transport (DfT), the findings and recommendations are those of the authors and do not necessarily represent the views of the DfT. While the DfT has made every effort to ensure the information in this document is accurate, DfT does not guarantee the accuracy, completeness or usefulness of that information; and it cannot accept liability...
متن کاملAlgorithms for Some Intersection Searching Problems Involving Curved Objects
Two classes of geometric intersection searching problems are considered i e problems in which a set S of geometric objects is to be preprocessed into a data structure so that for any query object q the objects of S that are intersected by q can be counted or reported e ciently In the rst class S is a set of curved objects such as d balls d spheres circles or circular arcs and q is also a curved...
متن کاملThreat-Based Risk Assessment for Enterprise Networks
Protecting enterprise networks requires continuous risk assessment that automatically identifies and prioritizes cybersecurity risks, enables efficient allocation of cybersecurity resources, and enhances protection against modern cyberthreats. Lincoln Laboratory developed a foundational network security maturity model to guide development of such risk assessments and has developed practical ris...
متن کاملArchitecture for Genetic Algorithm-Based Threat Assessment
The determination and subsequent analysis of potential enemy course of actions (COAs) forms a key element within the Intelligence Preparation of the Battlespace (IPB) process. Enemy COA prediction and analysis is also key element of threat assessment data fusion processing. Here we formulate an architecture that employs genetic algorithms (GAs) to generate and evaluate enemy COAs. This formulat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFAC Proceedings Volumes
سال: 2010
ISSN: 1474-6670
DOI: 10.3182/20100906-3-it-2019.00100