Academic literature on the topic 'Forward reachable set'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Forward reachable set.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Forward reachable set"

1

Feng, Xuhui, Mario E. Villanueva, and Boris Houska. "Backward-forward reachable set splitting for state-constrained differential games." Automatica 111 (January 2020): 108602. http://dx.doi.org/10.1016/j.automatica.2019.108602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sun, Gengxin, and Chih-Cheng Chen. "Influence Maximization Algorithm Based on Reverse Reachable Set." Mathematical Problems in Engineering 2021 (July 27, 2021): 1–12. http://dx.doi.org/10.1155/2021/5535843.

Full text
Abstract:
Most of the existing influence maximization algorithms are not suitable for large-scale social networks due to their high time complexity or limited influence propagation range. Therefore, a D-RIS (dynamic-reverse reachable set) influence maximization algorithm is proposed based on the independent cascade model and combined with the reverse reachable set sampling. Under the premise that the influence propagation function satisfies monotonicity and submodularity, the D-RIS algorithm uses an automatic debugging method to determine the critical value of the number of reverse reachable sets, which not only obtains a better influence propagation range but also greatly reduces the time complexity. The experimental results on the two real datasets of Slashdot and Epinions show that D-RIS algorithm is close to the CELF (cost-effective lazy-forward) algorithm and higher than RIS algorithm, HighDegree algorithm, LIR algorithm, and pBmH (population-based metaheuristics) algorithm in influence propagation range. At the same time, it is significantly better than the CELF algorithm and RIS algorithm in running time, which indicates that D-RIS algorithm is more suitable for large-scale social network.
APA, Harvard, Vancouver, ISO, and other styles
3

Limpiyamitr, Akarawit, and Yoshito Ohta. "On the Approximation of Maximal Output Admissible Set and Reachable Set via Forward Euler Discretization." IFAC Proceedings Volumes 37, no. 11 (July 2004): 395–400. http://dx.doi.org/10.1016/s1474-6670(17)31643-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Suseong, Davide Falanga, and Davide Scaramuzza. "Computing the Forward Reachable Set for a Multirotor Under First-Order Aerodynamic Effects." IEEE Robotics and Automation Letters 3, no. 4 (October 2018): 2934–41. http://dx.doi.org/10.1109/lra.2018.2848302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Morgan, and Matthew M. Peet. "Using SOS and Sublevel Set Volume Minimization for Estimation of Forward Reachable Sets." IFAC-PapersOnLine 52, no. 16 (2019): 484–89. http://dx.doi.org/10.1016/j.ifacol.2019.12.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rad, Ciprian, Calin Rusu, and Radu Balan. "Kinematics Investigation, Workspace Analysis and Actuators Design for a 2-DOF Redundant Parallel Robot." Solid State Phenomena 166-167 (September 2010): 333–38. http://dx.doi.org/10.4028/www.scientific.net/ssp.166-167.333.

Full text
Abstract:
This paper discusses the inverse and forward kinematics problem for a 2-dof parallel robot with actuator redundancy. The reachable workspace of the robot is generated for a set of parameters and a solution for the actuators is proposed in the final.
APA, Harvard, Vancouver, ISO, and other styles
7

ARMBRUSTER, BENJAMIN, LI WANG, and MARTINA MORRIS. "Forward reachable sets: Analytically derived properties of connected components for dynamic networks." Network Science 5, no. 3 (June 29, 2017): 328–54. http://dx.doi.org/10.1017/nws.2017.10.

Full text
Abstract:
AbstractFormal analysis of the emergent structural properties of dynamic networks is largely uncharted territory. We focus here on the properties of forward reachable sets (FRS) as a function of the underlying degree distribution and edge duration. FRS are defined as the set of nodes that can be reached from an initial seed via a path of temporally ordered edges; a natural extension of connected component measures to dynamic networks. Working in a stochastic framework, we derive closed-form expressions for the mean and variance of the exponential growth rate of the FRS for temporal networks with both edge and node dynamics. For networks with node dynamics, we calculate thresholds for the growth of the FRS. The effects of finite population size are explored via simulation and approximation. We examine how these properties vary by edge duration and different cross-sectional degree distributions that characterize a range of scientifically interesting normative outcomes (Poisson and Bernoulli). The size of the forward reachable set gives an upper bound for the epidemic size in disease transmission network models, relating this work to epidemic modeling (Ferguson, 2000; Eames, 2004).
APA, Harvard, Vancouver, ISO, and other styles
8

Hughes Hallett, Andrew, and Nicola Acocella. "STABILIZATION AND COMMITMENT: FORWARD GUIDANCE IN ECONOMIES WITH RATIONAL EXPECTATIONS." Macroeconomic Dynamics 22, no. 1 (April 5, 2016): 122–34. http://dx.doi.org/10.1017/s136510051600002x.

Full text
Abstract:
We construct a theory of forward guidance in economic policy making in order to provide a framework for explaining the role and strategic advantages of including forward guidance as an explicit part of policy design. We do this by setting up a general policy problem in which forward guidance plays a role, and then examine the consequences for performance when that guidance is withdrawn. We show that forward guidance provides enhanced controllability and stabilizability—especially where such properties may not otherwise be available. As a by-product, we find that forward guidance limits the scope and incentives for time-inconsistent behavior in an economy whose policy goals are ultimately reachable. It also adds to the credibility of a set of policies.
APA, Harvard, Vancouver, ISO, and other styles
9

Chun, Seung Su. "Effective Extraction of State Invariant for Software Verification." Applied Mechanics and Materials 752-753 (April 2015): 1097–104. http://dx.doi.org/10.4028/www.scientific.net/amm.752-753.1097.

Full text
Abstract:
In software design of complex systems, more time and effort are spent on verification than on constructions. Model checking for software verification techniques offer a large potential to obtain and early integration of verification in the design process. This paper describes how to easily specify and the software properties and to understand the software generating automatically invariant. In this paper deal with issue that state invariant is a property that holds in every reachable state. Not only can be used in understanding and analysis of complex software systems. In addition, it can be used for system verifications such as checking safety, consistency, and completeness. For these reasons, there are many vital researches for deriving state invariant from finite state machine models. In this research was to be considered to extract state invariant. Thus it is likely to be too complex for the user to understand. This paper let the user focus on some interested parts (called scopes) rather than a whole state space in a model. Computation Tree Logic (CTL) is used to specify scopes in which he/she is interested. Given a scope in CTL, forward reachability analysis is used to find out a set of states inside it. Obviously, a set of states calculated in this way is a subset of every reachable state. Keywords: Software verification, Invariant, Scopes, Model Checking
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Hong Bing, and Ming Wei Wang. "Real-Time Embedded Software Architecture Modeling and Reliability Evaluation Based on Time-Extended Petri Net." Applied Mechanics and Materials 651-653 (September 2014): 1888–92. http://dx.doi.org/10.4028/www.scientific.net/amm.651-653.1888.

Full text
Abstract:
Software reliability is one of the most important quality indices in software quality evaluation. Reliability analysis based on software architecture has become a researching hotspot. This paper makes a review on existed architecture-based reliability evaluation models, and puts forward the shortage of these models. As petri net has a good ability of description for concurrency and asynchronism, this paper focuses on the research of petri net model. Transitions are divided into time transitions and instantaneous transitions. Time-related reliability, including time-delay reliability and temporal reliability, are added. Then the reachable state transition matrix is set up and system reliability evaluation proceeds. The method above is used into a avionics embedded software. At last we accomplish the architecture modeling, reliability evaluation, proving the effectiveness and feasibility of this method.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Forward reachable set"

1

Chung, Chern Ferng Mechanical &amp Manufacturing Engineering Faculty of Engineering UNSW. "Reachable sets analysis in the cooperative control of pursuer vehicles." 2008. http://handle.unsw.edu.au/1959.4/41525.

Full text
Abstract:
This thesis is concerned with the Pursuit-and-Evasion (PE) problem where the pursuer aims to minimize the time to capture the evader while the evader tries to prevent capture. In the problem, the evader has two advantages: a higher manoeuvrability and that the pursuer is uncertain about the evader??s state. Cooperation among multiple pursuer vehicles can thus be used to overcome the evader??s advantages. The focus here is on the formulation and development of frameworks and algorithms for cooperation amongst pursuers, aiming at feasible implementation on real and autonomous vehicles. The thesis is split into Parts I and II. Part I considers the problem of capturing an evader of higher manoeuvrability in a deterministic PE game. The approach is the employment of Forward Reachable Set (FRS) analysis in the pursuers?? control. The analysis considers the coverage of the evader??s FRS, which is the set of reachable states at a future time, with the pursuer??s FRS and assumes that the chance of capturing the evader is dependent on the degree of the coverage. Using the union of multiple pursuers?? FRSs intuitively leads to more evader FRS coverage and this forms the mechanism of cooperation. A framework for cooperative control based on the FRS coverage, or FRS-based control, is proposed. Two control algorithms were developed within this framework. Part II additionally introduces the problem of evader state uncertainty due to noise and limited field-of-view of the pursuers?? sensors. A search-and-capture (SAC) problem is the result and a hybrid architecture, which includes multi-sensor estimation using the Particle Filter as well as FRS-based control, is proposed to accomplish the SAC task. The two control algorithms in Part I were tested in simulations against an optimal guidance algorithm. The results show that both algorithms yield a better performance in terms of time and miss distance. The results in Part II demonstrate the effectiveness of the hybrid architecture for the SAC task. The proposed frameworks and algorithms provide insights for the development of effective and more efficient control of pursuer vehicles and can be useful in the practical applications such as defence systems and civil law enforcement.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Forward reachable set"

1

Bhattacharya, Somak, Samresh Malhotra, and S. K. Ghosh. "An Attack Graph Based Approach for Threat Identification of an Enterprise Network." In Cyber Security and Global Information Assurance, 23–47. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-326-5.ch002.

Full text
Abstract:
As networks continue to grow in size and complexity, automatic assessment of the security vulnerability becomes increasingly important. The typical means by which an attacker breaks into a network is through a series of exploits, where each exploit in the series satisfies the pre-condition for subsequent exploits and makes a causal relationship among them. Such a series of exploits constitutes an attack path where the set of all possible attack paths form an attack graph. Attack graphs reveal the threat by enumerating all possible sequences of exploits that can be followed to compromise a given critical resource. The contribution of this chapter is to identify the most probable attack path based on the attack surface measures of the individual hosts for a given network and also identify the minimum possible network securing options for a given attack graph in an automated fashion. The identified network securing options are exhaustive and the proposed approach aims at detecting cycles in forward reachable attack graphs. As a whole, the chapter deals with identification of probable attack path and risk mitigation which may facilitate in improving the overall security of an enterprise network.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Forward reachable set"

1

Kousik, Shreyas, Sean Vaskov, Matthew Johnson-Roberson, and Ram Vasudevan. "Safe Trajectory Synthesis for Autonomous Driving in Unforeseen Environments." In ASME 2017 Dynamic Systems and Control Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/dscc2017-5361.

Full text
Abstract:
Path planning for autonomous vehicles in arbitrary environments requires a guarantee of safety, but this can be impractical to ensure in real-time when the vehicle is described with a high-fidelity model. To address this problem, this paper develops a method to perform trajectory design by considering a low-fidelity model that accounts for model mismatch. The presented method begins by computing a conservative Forward Reachable Set (FRS) of a high-fidelity model’s trajectories produced when tracking trajectories of a low-fidelity model over a finite time horizon. At runtime, the vehicle intersects this FRS with obstacles in the environment to eliminate trajectories that can lead to a collision, then selects an optimal plan from the remaining safe set. By bounding the time for this set intersection and subsequent path selection, this paper proves a lower bound for the FRS time horizon and sensing horizon to guarantee safety. This method is demonstrated in simulation using a kinematic Dubin’s car as the low-fidelity model and a dynamic unicycle as the high-fidelity model.
APA, Harvard, Vancouver, ISO, and other styles
2

Ruan, Wenjie, Xiaowei Huang, and Marta Kwiatkowska. "Reachability Analysis of Deep Neural Networks with Provable Guarantees." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/368.

Full text
Abstract:
Verifying correctness for deep neural networks (DNNs) is challenging. We study a generic reachability problem for feed-forward DNNs which, for a given set of inputs to the network and a Lipschitz-continuous function over its outputs computes the lower and upper bound on the function values. Because the network and the function are Lipschitz continuous, all values in the interval between the lower and upper bound are reachable. We show how to obtain the safety verification problem, the output range analysis problem and a robustness measure by instantiating the reachability problem. We present a novel algorithm based on adaptive nested optimisation to solve the reachability problem. The technique has been implemented and evaluated on a range of DNNs, demonstrating its efficiency, scalability and ability to handle a broader class of networks than state-of-the-art verification approaches.
APA, Harvard, Vancouver, ISO, and other styles
3

Tisdale, John, and J. Karl Hedrick. "A UAV Trajectory Planning Algorithm for Simultaneous Search and Track." In ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81100.

Full text
Abstract:
This paper considers trajectories for an unmanned aerial vehicle (UAV) that must search an area while tracking a target. The UAV has a constrained turn rate and a constant velocity; it is assumed that there are certain areas of interest that have a higher search value than others. An algorithm is presented that seeks to maximize the value of the area searched while still maintaining the track. The problem is discretized in both time and the control; the motion of the UAV is constrained to the reachability graph, a subset of the forward reachable set. At each revisit, the target path is estimated for the next revisit. A heuristic method is used to determine the best UAV path, because the target path is not known a priori. Feasible paths are found by examining the terminating vertices of the reachability graph. A cooperative implementation, for a team of UAVs patrolling the same region, is developed. Simulation indicates the feasibility of the method for a real-time implementation. Trajectories for example scenarios are presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography