Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 34-39.doi: 10.11896/JsJkx.191100191
• Artificial Intelligence • Previous Articles Next Articles
GAO Qing-Ji, WANG Wen-bo, HOU Shi-hao and XING Zhi-wei
CLC Number:
[1] GAO S,XU F Z,GUO H J.Research on mobile robots’ path planning based on a spring model.Chinese Journal of Scientific Instrument,2016,37(4):796-803. [2] ROSTAMI S M H,SANGAIAH A K,WANG J,et al.Obstacle avoidance of mobile robots using modified artificial potential field algorithm..https://doi.org/10.1186/s13638-019-1396-2. [3] SEDER M,PETROVIC I.Dynamic window based approach to mobile robot motion control in the presence of moving obstacles//IEEE International Conference on Robotics and Automation.Roma,Italy:IEEE Press,2007:1986-1992. [4] SARANRITTICHAI P,NIPARNAN N,SUDSANG A.Robust local obstacle avoidance for mobile robot based on Dynamic Window approach//Proceeding of 10th International Conference on Electrical Engineering/Electronics,Computer,Telecommunication and Information Technology (EC-TI-CON).2013:1-4. [5] ZHOU Y,CHEN B.Method for robot obstacle avoidance based on the improve dueling network.Journal of Xidian University,2019,46(1):46-50,63. [6] ZHANG W,MA Y,ZHAO H D,et al.Obstacle avoidance path planning of intelligent mobile based on improved fireworks-ant colony hybrid algorithm.Control and Decision,2019,34(2):335-343. [7] NI T,WEI D R,ZHAO X L,et al.Neural Dynamic Collision-Avoidance Strategy for Robots Based on Evaluation of Threat Degree.Robot,2017,39(6):853-859. [8] CHEN T D,HUANG Y Y,ZHANG Y L.Non-trap dynamic path planning based on collision risk.Systems Engineering and Electronics,2019,41(11):2496-2506. [9] ZHANG Yu-qin,born in 1977,master,lecture.Her main research interests include optimization theory and algorithm. [1] QI R L,ZHOU W J,LIU J G,et al.Obstacle Avoidance TraJectory Planning for Gaussian Motion of Robot Based on Probability Theory.Journal of Mechanical Engineering,2017,53(5):93-100. [2] CHEN Y,PENG H,GRIZZLE J.Obstacle Avoidance for Low-Speed Autonomous Vehicles With Barrier Function.IEEE Transactions on Control Systems Technology,2018,26(1):194-206. [3] MALONE N,CHIANG H T,LESSER K,et al.Hybrid Dynamic Moving Obstacle Avoidance Using a Stochastic Reachable Set-Based Potential Field.IEEE Transactions on Robotics,2017,33(5):1124-1138. [4] LIEBOWITZ B.Human Territories:How We Behave in Space-Time.Family Process,2004,15(4):447-451. [5] LANG P J,BRADLEY M M,CUTHBERT B N.Emotion,attention,and the startle reflex.Psychological Review,1990,97(3):377-395. [6] ELLIOT A J.The Hierarchical Model of Approach-Avoidance Motivation.Motivation and Emotion,2006,30(2):111-116. [7] ALEXOPOULOS T,RIC F.The evaluation-behavior link:Direct and beyond valence.Journal of Experimental SocialPsycho-logy,2007,43(6):1010-1016. [8] ZHANG X W,XUAN Y M,FU X L.The Effect of Emotional Valences on Approach and Avoidance Responses.Advances in Psychological Science,2012,20(7):1023-1030. [9] ZHENG J,LIU L,SHI J X,et al.The Definition,Theory and Research Paradigm of The Compatibility Effect.Advances in Psychological Science,2013,21(9):1686-1695. [10] HELBING D,MOLNAR P.Social Force Model for Pedestrian Dynamics.Physical review.E,Statistical physics,plasmas,fluids,and related interdisciplinary topics,1998,51(5):4282. [11] HELBING D,FARKAS I J,VICSEK T.Simulating Dynamical Features of Escape Panic.Social Science Electronic Publi-shing,2000,407(6803):487-490. [12] ZANLUNGO F,IKEDA T,KANDA T.Social force model with explicit collision prediction.EPL (Europhysics Letters),2011,93(6):68005. [13] YU H,WANG Y,ZHANG X,et al.Extended Social Force Model-Based Mean Shift for Pedestrian Tracking Under Obstacle Avoidance.IET Computer Vision,2017,11(1):1-9. [14] JOHANSSON F,PETERSON A,TAPANI A.Waiting pedestrians in the social force model.Physica A:Statistical Mechanics and its Applications,2015,419:95-107. |
[1] | WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133. |
[2] | GUO Cong-rui, WANG Jun and FENG Yi-ming. Research on Method of Credibility Evaluation of System Simulation [J]. Computer Science, 2020, 47(6A): 567-571. |
[3] | YANG Xiao-jun, XU Zhong-fu, ZHANG Xing, SUN Dan-hui. Overview and Difficulties Analysis on Credibility Assessment of Simulation Models [J]. Computer Science, 2019, 46(6A): 23-29. |
[4] | ZHENG Hong-liang, HOU Xue-hui, SONG Xiao-ying, PANG Kuo, ZOU Li. Approach for Knowledge Reasoning Based on Hesitate Fuzzy Credibility [J]. Computer Science, 2019, 46(1): 131-137. |
[5] | GAO Peng, LIU Yun-jiang, GAO Wei-ting, LI Man, CHEN Juan. Double Thresholds DMM Cooperative Spectrum Sensing Algorithm Based on Credibility [J]. Computer Science, 2018, 45(9): 166-170. |
[6] | FENG Lei, JI Jun-zhong, WU Chen-sheng. New Method for Ranking Scientific Publications with Creditworthiness Mechanism [J]. Computer Science, 2018, 45(11A): 132-137. |
[7] | WU Wei-min, CHEN Dong-xin, LAI Wen-xin and SU Qing. Research and Implementation of EFI OS Loader Security Reinforcement Technology [J]. Computer Science, 2016, 43(9): 188-191. |
[8] | ZHANG Xue-ming, HUANG Zhi-qiu and SUN Yi. Research on Privacy Access Control Based on RBAC [J]. Computer Science, 2016, 43(1): 166-171. |
[9] | HE Xiao-xia and TAN Liang. Web Service Discovery Model of Semantic and Trust QoS Based on Hadoop [J]. Computer Science, 2015, 42(8): 220-224. |
[10] | . Study on the Application of Evidence Theory in Software Requirements Engineering [J]. Computer Science, 2012, 39(Z11): 237-239. |
[11] | . Code Execution Security Mechanism for Open Cloud&Client Computing [J]. Computer Science, 2012, 39(7): 7-10. |
[12] | . Logical Framework for Evaluation of Multiple-premise [J]. Computer Science, 2012, 39(3): 236-243. |
[13] | JIA Jia,ZHOU Yi,DONG Hui,ZHENG Cheng-yan. Research on Hierarchical Trusted Platform Based on Trusted Terminal [J]. Computer Science, 2011, 38(Z10): 109-113. |
[14] | HU Jian-li. ZHOU Bin, ZHOU Yu, WU Quan-yuan. Incentive Compatible Reputation Model for P2P Networks [J]. Computer Science, 2011, 38(9): 59-63. |
[15] | GNU Xue-wen,NIU Wen-sheng,MA Jian-feng,SHENU Li-jie. Security Extension on Strand Space Model for Ad-hoc Routing Protocols [J]. Computer Science, 2011, 38(7): 51-54. |
|