scholarly journals The effect of autonomous systems on the crew size of ships – a case study

2020 ◽  
pp. 1-17
Author(s):  
Carmen Kooij ◽  
Robert Hekkenberg
Keyword(s):  
Author(s):  
Guilherme Eduardo Leite ◽  
Norian Marranghello ◽  
Aledir Silveira Pereira

Author(s):  
Eder Escobar ◽  
Richard Abramonte ◽  
Antenor Aliaga ◽  
Flabio Gutierrez

In this work, the AutonomousSystems4D package is presented, which allows the qualitative analysis of non-linear differential equation systems in four dimensions, as well as drawing the phase surfaces by immersing R4 in R3. The package is programmed in the computational tool Octave. As a case study applied to the new Lorenz 4D System, sensitivity was found in the initial conditions, Lyapunov exponents, Kaplan Yorke dimension, a stable and unstable critical point, limit cycle, Hopf bifurcation, and hyperattractors. The package could be adapted to perform qualitative analysis and visualize phase surfaces to autonomous systems, e.g. Sprott 4D, Rossler 4D, etc. The package can be applied to problems such as: design, analysis, implementation of electronic circuits; to message encryption.


2021 ◽  
Vol 20 (5s) ◽  
pp. 1-26
Author(s):  
Radoslav Ivanov ◽  
Kishor Jothimurugan ◽  
Steve Hsu ◽  
Shaan Vaidya ◽  
Rajeev Alur ◽  
...  

Recent advances in deep learning have enabled data-driven controller design for autonomous systems. However, verifying safety of such controllers, which are often hard-to-analyze neural networks, remains a challenge. Inspired by compositional strategies for program verification, we propose a framework for compositional learning and verification of neural network controllers. Our approach is to decompose the task (e.g., car navigation) into a sequence of subtasks (e.g., segments of the track), each corresponding to a different mode of the system (e.g., go straight or turn). Then, we learn a separate controller for each mode, and verify correctness by proving that (i) each controller is correct within its mode, and (ii) transitions between modes are correct. This compositional strategy not only improves scalability of both learning and verification, but also enables our approach to verify correctness for arbitrary compositions of the subtasks. To handle partial observability (e.g., LiDAR), we additionally learn and verify a mode predictor that predicts which controller to use. Finally, our framework also incorporates an algorithm that, given a set of controllers, automatically synthesizes the pre- and postconditions required by our verification procedure. We validate our approach in a case study on a simulation model of the F1/10 autonomous car, a system that poses challenges for existing verification tools due to both its reliance on LiDAR observations, as well as the need to prove safety for complex track geometries. We leverage our framework to learn and verify a controller that safely completes any track consisting of an arbitrary sequence of five kinds of track segments.


2015 ◽  
Vol 2015 (2) ◽  
pp. 171-187 ◽  
Author(s):  
Joshua Juen ◽  
Aaron Johnson ◽  
Anupam Das ◽  
Nikita Borisov ◽  
Matthew Caesar

Abstract The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems (ASes) and Internet exchanges (IXes), which can observe different overlay hops belonging to the same circuit. We evaluate whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by collecting 17.2 million traceroutes from Tor relays to destinations around the Internet. We compare the collected traceroute paths to predicted paths using state-of-the-art path inference techniques. We find that traceroutes present a very different picture, with the set of ASes seen in the traceroute path differing from the predicted path 80% of the time. We also consider the impact that prediction errors have on Tor security. Using a simulator to choose paths over a week, our traceroutes indicate a user has nearly a 100% chance of at least one compromise in a week with 11% of total paths containing an AS compromise and less than 1% containing an IX compromise when using default Tor selection. We find modifying the path selection to choose paths predicted to be safe lowers total paths with an AS compromise to 0.14% but still presents a 5–11% chance of at least one compromise in a week while making 5% of paths fail, with 96% of failures due to false positives in path inferences. Our results demonstrate more measurement and better path prediction is necessary to mitigate the risk of AS and IX adversaries to Tor.


2021 ◽  
Author(s):  
Risto Holopainen

Dynamic systems have found their use in sound synthesis as well as score synthesis. These levels can be integrated in monolithic autonomous systems in a novel approach to algorithmic composition that shares certain aesthetic motivations with some work with autonomous music systems, such as the search for emergence. We discuss various strategies for achieving variation on multiple time-scales by using slow-fast, hybrid dynamic systems, and statistical feedback. The ideas are illustrated with a case study.


Author(s):  
Christoph A Thieme ◽  
Børge Rokseth ◽  
Ingrid B Utne

Autonomous systems, including airborne, land-based, marine, and underwater vehicles, are increasingly present in the world. One important aspect of autonomy is the capability to process information and to make independent decisions for achieving a mission goal. Information on the level of risk related to the operation may improve the decision-making process of autonomous systems. This article describes the integration of risk analysis methods with the control system of autonomous and highly automated systems that are evaluated during operation. Four main areas of implementation are identified; (i) risk models used to directly make decisions, (ii) use of the output of risk models as input to decision-making and optimization algorithms, (iii) the output of risk models may be used as a constraint in or modifying constraints of algorithms, and (iv) the output of risk models may be used to inform representations or maps of the environment to be used in path planning. A case study on a dynamic positioning controller of an offshore supply vessel exemplifies the concepts described in this article. In addition, it demonstrates how risk model output may be used within a hybrid controller.


2021 ◽  
Vol 13 (16) ◽  
pp. 9209
Author(s):  
Lamia Berrah ◽  
Vincent Cliville ◽  
Damien Trentesaux ◽  
Claude Chapel

This article addresses the issue of the industrial performance model and its evolution to cope with the context of Industry 4.0. With its digitalisation, intelligent/autonomous systems and wealth of data, Industry 4.0 offers opportunities that can achieve objectives better. It also presents risks and uncertainties that question the autonomy of the systems, their interaction with humans and the use of available data. The hypothesis put forward in this work is that the efficiency–effectiveness–relevance performance triangle can no longer guarantee long-term performance under these conditions and needs to be associated with an ethical dimension that allows for the risks and uncertainties relating to Industry 4.0 to be considered. Ethics is therefore considered to extend the triangle to a tetrahedron. A brief analysis of current performance management will first show the limits of the current practice in the context of Industry 4.0. The frameworks that could overcome these limits in light of new needs are then recalled and discussed, leading to the choice of ethics, whose main definitions and use in the engineering field are also introduced. The proposed (efficiency–effectiveness–relevance–ethics tetrahedron-based methodology is illustrated through a case study related to an aeronautical supplier, regarding the consequences of the implementation of a MES (Manufacturing Execution System) in terms of product traceability and operator autonomy. The discussion and prospects finally conclude this study.


Procedia CIRP ◽  
2020 ◽  
Vol 90 ◽  
pp. 209-214
Author(s):  
Michael Saidani ◽  
Erik Pan ◽  
Harrison Kim ◽  
Andrew Greenlee ◽  
Jason Wattonville ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document