CHALLENGES to ENSURING HUMAN CONTROL OVER MILITARY SWARMS Maaike Verbruggen

Total Page:16

File Type:pdf, Size:1020Kb

CHALLENGES to ENSURING HUMAN CONTROL OVER MILITARY SWARMS Maaike Verbruggen EU Non-Proliferation and Disarmament Consortium NON-PROLIFERATION AND DISARMAMENT PAPERS Promoting the European network of independent non-proliferation and disarmament think tanks No. 65 December 2019 THE QUESTION OF SWARMS CONTROL: CHALLENGES TO ENSURING HUMAN CONTROL OVER MILITARY SWARMS maaike verbruggen I. INTRODUCTION SUMMARY Swarms represent a futuristic use of autonomy in The European Union (EU) and EU member states are weapon systems. A swarm is a group of individual increasingly investing in military swarm research, despite systems that interact and operate as a collective with the significant challenges that exist in establishing human control over swarms. These challenges include the high a common goal. Swarms are a novel type of weapon cognitive demands on human operators; interface and system in which there is great military interest because control design choices; disrupted communications of their potential for enabling new types of missions. between operator and swarm, whether from in-built However, because swarms operate as collectives, there technological limitations or environmental factors; and the are real limitations to the extent of control that humans inherent unpredictability of certain kinds of swarms. can exert over them. This paper covers the various These challenges create tactical risks and increase the challenges to human control, especially where relevant chances of undesired outcomes, such as conflict escalation to European Union (EU) research on swarms. and violations of international humanitarian law and The goal of this paper is therefore twofold. First, it ethical principles. EU-funded swarm research aims to increase policymakers’ understanding of how programmes should take steps to address these issues. swarms work based on the current state of the art in the literature of swarm robotics, and to highlight ABOUT THE AUTHOR the challenges posed to human control over swarms. Maaike Verbruggen (Netherlands) is a doctoral researcher Second, it aims to provide clarity on ongoing EU at the Institute for European Studies at the Vrije defence research on swarms, and to inform the defence Universiteit Brussel. Her research focuses on the cooperation communities about the potential problems intersection between emerging technologies, military that swarms might pose. Unfortunately, although innovation and arms control. She is currently working on a the fields of swarm robotics and defence swarms are PhD thesis on military innovation in artificial intelligence. highly related, there is little interaction between them. Integration of the issues in this paper may help to guide the policy decisions of the new European Commission (EC) that took office on 1 December 2019. This paper commences by contexualizing these developments in section II, and providing a brief introduction to swarms in section III. This is followed by a review of the technical literature on swarm robotics discussing human control over machines in section IV and challenges to human control and human–swarm interaction in section V. Section VI considers the policy implications of the challenges raised in the previous sections. The final two main 2 eu non-proliferation and disarmament consortium discussions, section VII and section VIII respectively, changing relations between humans and machines.2 assess the status of human control as an aspect of If not thought out carefully, this new human–machine swarm research in EU defence cooperation and configuration could lead to a loss of human control over provide recommendations for ensuring human control weapon systems. The loss of control is a direct result is considered under EU-funded swarm research not only of automating certain functions, but also of programmes. a deterioration of critical independent judgements by humans over information provided by machines. As II. BACKGROUND operators lose control, they lose the tools to ensure that missions are executed according to their intent. The international response to autonomous weapons Similarly, the challenges of human control over systems and concepts of ‘control’ swarms in particular—while relevant to the discussions on the CCW Convention—also go beyond LAWS. Improvements in autonomous capabilities and The dispersed nature of a swarm means that control increased global military interest in swarms have over it functions differently from controls over most sparked discussions about their impact and the existing autonomous systems, and the international appropriate response by the international community. community needs to consider how to translate existing The prime forum for these discussions is the series concepts and frameworks onto such distributed and of debates on lethal autonomous weapon systems networked military systems. This paper focuses both (LAWS) that take place under the auspices of the 1981 on armed and unarmed swarms because control Convention on Prohibitions or Restrictions on the challenges are relevant to all types of swarms and also, Use of Certain Conventional Weapons which may since current research on unarmed swarms can aid be Deemed to be Excessively Injurious or to have in the development of armed swarms. For example, Indiscriminate Effects (CCW Convention). LAWS are swarms that merely provide intelligence, surveillance difficult to define, but they can generally be viewed and reconnaissance (ISR) functions can still provide as weapon systems that can select and engage targets critical information that ultimately leads to deadly without human intervention. engagements or causes accidents, while misperceptions Within the discussions on LAWS, the concept about their use can escalate conflicts. It is thus of ‘meaningful human control’ (MHC) has gained important to apply a broad lens when assessing how popularity as a potential tool for regulation. For swarms work, and not limit the analysis to swarms that example, MHC could entail adopting a positive could be defined as LAWS. obligation to maintain a significant human role in the selection and engagement of targets. However, this The role of the European Union concept also has fierce opponents, and even among its proponents there is no agreement on either the The EU plays a dual role with regard to LAWS. substance of the concept or how it should be used. The first role is regulatory in nature: the European To avoid confusion over the definition—and because Parliament (EP) has called for a ban on LAWS; in this paper covers the nature of the human–machine Geneva the EU diplomatic mission aims to ensure that relationship at large, including in regard to non-critical all weapon systems are developed, deployed and used and non-lethal functions, as explained below—the in compliance with international humanitarian law emphasis here is on ‘human control’ rather than MHC. (IHL); and in Brussels the European External Action In this paper ‘human control’ is used as a catch-all Service (EEAS) actively searches for solutions to the term for the ‘mechanism for achieving [a human] issue of LAWS and how to consolidate the opinion of commander’s intent’ and refers to the extent of human member states, since their opinions on these issues are influence on the outcome of the mission.1 widely divergent.3 The second role is that of defence The issue of human control is wider than LAWS, technology investment and development: in 2015 as autonomy poses fundamental questions about the 2 Huelss, H., ‘Deciding on appropriate use of force: human–machine interaction in weapons systems and emerging norms’, Global Policy, vol. 10 (2019), pp. 354–58. 1 Moyes, R., Key Elements of Meaningful Human Control (Article 36: 3 Kayser, D. and Beck, A., Crunch Time: European Positions on Lethal Geneva, Apr. 2016), p. 4. Autonomous Weapon Systems: Update 2018 (PAX: Utrecht, Nov. 2018). the question of swarms control 3 the EU began directly funding defence research and end, it is unlikely that projects will change course or be development (R&D), with key priority areas being abandoned. Furthermore, international law requires artificial intelligence (AI) and robotics in general, legal reviews of new weapons and of new means and and swarms in particular. This paper investigates methods of warfare (so-called Article 36 reviews) the state of swarm research and regulation in the EU, while they are under study or development. Critical and makes recommendations for EU-funded research analysis at an early stage of whether the weapons under programmes to ensure that these two roles do not development do not pose major strategic, ethical and undermine each other. legal risks is therefore essential. The state of swarms technology III. ABOUT SWARMS Currently there is only a small body of literature on A swarm is a group of systems that operate as a swarms robotics that covers in-depth investigations collective. A swarm is not a specific type of system, of their working and use.4 This apparent oversight is but a specific type of configuration, namely ‘a large partially fuelled by a lack of information, as military group of locally interacting individuals with common operational swarms are still a few decades away. goals’.7 This can be better understood with reference However, the literature on swarms robotics provides to biology. A school of fish, a flock of birds and a pack of more information about how swarms work and the wolves are all swarms: each comprises individuals, but challenges to human control over swarms. This paper the individuals interact and work as a group to achieve translates these technical findings
Recommended publications
  • Swarms and Swarm Intelligence
    SOFTWARE TECHNOLOGIES homogeneous. Intelligent swarms can also comprise heterogeneous elements Swarms from the outset, reflecting different capabilities as well as a possible social structure. and Swarm Researchers have used agent swarms as a computer modeling tech- nique and as a tool to study complex systems. Simulation examples include Intelligence bird swarms and business, economics, and ecological systems. In swarm sim- Michael G. Hinchey, Loyola College in Maryland ulations, each agent tries to maximize Roy Sterritt, University of Ulster its given parameters. Chris Rouff, Lockheed Martin Advanced Technology Laboratories In terms of bird swarms, each bird tries to find another to fly with, and then flies slightly higher to one side to reduce drag, with the birds eventually forming a flock. Other types of swarm simulations exhibit unlikely emergent behaviors, which are sums of simple Intelligent swarm technologies solve individual behaviors that form com- complex problems that traditional plex and often unexpected behaviors approaches cannot. when aggregated. Swarm intelligence Gerardo Beni and Jing Wang intro- duced the term swarm intelligence in a 1989 article (“Swarm Intelligence,” Proc. 7th Ann. Meeting of the Robotics e are all familiar with working together to achieve a goal Society of Japan, RSJ Press, 1989, pp. swarms in nature. The and produce significant results. 425-428). Swarm intelligence tech- word swarm conjures Swarms may operate on or under the niques (note the difference from intel- up images of large Earth’s surface, under water, or on ligent swarms) are population-based W groups of small insects other planets. stochastic methods used in combina- in which each member performs a torial optimization problems in which simple role, but the action produces SWARMS AND INTELLIGENCE the collective behavior of relatively sim- complex behavior as a whole.
    [Show full text]
  • (AFDD) 3-13, Information Operations
    Cover Sheet for Air Force Doctrine Document (AFDD) 3-13, Information Operations OPR: LeMay Center/DD 28 July 2011 AFDD numbering has changed to correspond with the joint doctrine publication numbering architecture (the AFDD titles remain unchanged until the doctrine is revised). Any AFDD citations within the documents will list the old AFDD numbers until the doctrine is revised. The changed numbers follow: OLD NEW TITLE AFDD 2-1 changed to AFDD 3-1 Air Warfare AFDD 2-1.1 changed to AFDD 3-01 Counterair Operations AFDD 2-1.2 changed to AFDD 3-70 Strategic Attack AFDD 2-1.3 changed to AFDD 3-03 Counterland Operations AFDD 2-1.4 changed to AFDD 3-04 Countersea Operations AFDD 2-1.6 changed to AFDD 3-50 Personnel Recovery Operations AFDD 2-1.7 changed to AFDD 3-52 Airspace Control AFDD 2-1.8 changed to AFDD 3-40 Counter-CBRN AFDD 2-1.9 changed to AFDD 3-60 Targeting AFDD 2-10 changed to AFDD 3-27 Homeland Operations AFDD 2-12 changed to AFDD 3-72 Nuclear Operations AFDD 2-2 changed to AFDD 3-14 Space Operations AFDD 2-2.1 changed to AFDD 3-14.1 Counterspace Operations AFDD 2-3 changed to AFDD 3-24 Irregular Warfare AFDD 2-3.1 changed to AFDD 3-22 Foreign Internal Defense AFDD 2-4 changed to AFDD 4-0 Combat Support AFDD 2-4.1 changed to AFDD 3-10 Force Protection AFDD 2-4.2 changed to AFDD 4-02 Health Services AFDD 2-4.4 changed to AFDD 4-11 Bases, Infrastructure, and Facilities [Rescinded] AFDD 2-4.5 changed to AFDD 1-04 Legal Support AFDD 2-5 changed to AFDD 3-13 Information Operations AFDD 2-5.1 changed to AFDD 3-13.1 Electronic Warfare AFDD 2-5.3 changed to AFDD 3-61 Public Affairs Operations AFDD 2-6 changed to AFDD 3-17 Air Mobility Operations AFDD 2-7 changed to AFDD 3-05 Special Operations AFDD 2-8 changed to AFDD 6-0 Command and Control AFDD 2-9 changed to AFDD 2-0 ISR Operations AFDD 2-9.1 changed to AFDD 3-59 Weather Operations INFORMATION OPERATIONS Air Force Doctrine Document 3-13 11 January 2005 Incorporating Change 1, 28 July 2011 This document complements related discussion found in Joint Publication 3-13, Joint Doctrine for Information Operations.
    [Show full text]
  • Team 4: Influencing Insurgent SVBIED
    Team 4: Influencing Insurgent SVBIED Operations Using Traffic Control Points Enhanced with Unmanned Aerial System (UAS) Employment Strategies TEAM 4 MEMBERS The goal of the IDFW 15 effort was to determine the value of adding Unmanned Aerial Systems (UAS) to the Edward Teague aforementioned environment. Specifically, we looked to US Military Academy at West Point, US derive insights about semi-autonomous UAS with swarm Niki Goerger behaviors. Engineer Research and Development Center, US US Military Academy at West Point, US This extension can assist counterinsurgent forces in several ways. It will drive needs for UAS allocation and Brad Young Naval Post Graduate School, US development by identifying critical elements of semi- autonomous swarming behavior. In addition, it may Ng Chu Ngah highlight mission behavior that shows the most promise by Quek Kwang Ti Defence Science and Technology Agency, expanding the tasks and environment beyond this current Republic of Singapore set. Due to the complex nature of the problem, the current state of understanding in the field, and the exploratory nature INTRODUCTION of the research, insights vice specific answers are central in this research. Insurgents have effectively employed asymmetric tactics, such as the use of suicide bombers, as viable threats in urban PROBLEM STATEMENT environments. These threats are often devastating in their physical and emotional effects. They are hard to detect and This study addresses whether we can isolate factors needed have proven difficult to thwart or defeat. The U.S. Army has to identify effective semiautonomous UAS behaviors that recognized that improvised Explosive Devices (IEDs) pose a add value to the aforementioned SVBIED TCP study.
    [Show full text]
  • Wolf Family Values
    Wolf family values The exquisitely balanced social life of the wolf has implications far beyond the pack, says Sharon Levy ORDON HABER was tracking a wolf pack Wolf Project. Despite many thousands of he had known for over 40 years when his hours spent in the field, Haber published G plane crashed on a remote stretch of the little peer-reviewed documentation of his Toklat river in Denali national park, Alaska, work. Now, however, in the months following last October. The fatal accident silenced one his sudden death, Smith and other wolf of the most outspoken and controversial biologists have reported findings that support advocates for wolf protection. Haber, an some of Haber’s ideas. independent biologist, had spent a lifetime Once upon a time, folklore shaped our studying the behaviour and ecology of wolves thinking about wolves. It is only in the past and his passion for the animals was obvious. two decades that biologists have started to “I am still in awe of what I see out there,” he build a clearer picture of wolf ecology (see wrote on his website. “Wolves enliven the “Beyond myth and legend”, page 42). Instead northern mountains, forests, and tundra like of seeing rogue man-eaters and savage packs, no other creature, helping to enrich our stay we now understand that wolves have evolved on the planet simply by their presence as other to live in extended family groups that include Few places remain highly advanced societies in our midst.” a breeding pair – typically two strong, where wolves can live His opposition to hunting was equally experienced individuals – along with several as nature intended intense.
    [Show full text]
  • Drone Swarms As Networked Control Systems by Integration of Networking and Computing
    sensors Review Drone Swarms as Networked Control Systems by Integration of Networking and Computing Godwin Asaamoning 1,2,* , Paulo Mendes 3,4 , Denis Rosário 5 and Eduardo Cerqueira 5 1 COPELABS, Universidade Lusofóna, 1749-024 Lisbon, Portugal 2 Bolgatanga Technical University, Sumbrungu UB-0964-8505, Ghana 3 School of Communication, Architecture, Arts and Information Technologies, Universidade Lusofóna, 1749-024 Lisbon, Portugal; [email protected] 4 Airbus Central Research and Technology, Willy-Messerschmitt-Str 1, Taufkirchen, 82024 Munich, Germany 5 Computer Science Faculty, Federal University of Pará, Belém 66075-110, Brazil; [email protected] (D.R.); [email protected] (E.C.) * Correspondence: [email protected] Abstract: The study of multi-agent systems such as drone swarms has been intensified due to their cooperative behavior. Nonetheless, automating the control of a swarm is challenging as each drone operates under fluctuating wireless, networking and environment constraints. To tackle these challenges, we consider drone swarms as Networked Control Systems (NCS), where the control of the overall system is done enclosed within a wireless communication network. This is based on a tight interconnection between the networking and computational systems, aiming to efficiently support the basic control functionality, namely data collection and exchanging, decision-making, and the distribution of actuation commands. Based on a literature analysis, we do not find revision papers about design of drone swarms as NCS. In this review, we introduce an overview of how to develop self-organized drone swarms as NCS via the integration of a networking system and a Citation: Asaamoning, G.; Mendes, computational system. In this sense, we describe the properties of the proposed components of a P.; Rosário, D.; Cerqueira, E.
    [Show full text]
  • Drone Swarms
    Future Warfare Series No. 1020304060 DefendingAvoidingTheThe “WorriedAnthraxAre thePanic Drone American Vaccine Well”and Swarms Keeping Response Debate: Homeland the A WeaponsMedicalPorts Opento Review ofCBRN1993-2003 Massin a Events:forChemical Destruction? Commanders and BiologicalAnalysis Threat and Solu�onsEnvironment A Literature Review TanjaLieutenantRandallMajor M. Korpi Zach J.Richard ColonelLarsen aandry Kallenborn A.Christopherand Fred Hersack, Patrick P. Stone, USAF D.Hemmer EllisUSAF United States Air Force 60 Center for Strategic Deterrence Studies 30204010 Maxwell Air Force Base, Alabama Are Drone Swarms Weapons of Mass Destruction? by Zachary Kallenborn The Counterproliferation Papers Future Warfare Series No. 60 May 6, 2020 U.S. Air Force Center for Strategic Deterrence Studies Air University Maxwell Air Force Base, Alabama 36112 Table of Contents Chapter Page Disclaimer.…………………………………….…………..….……….………… ii Abstract…………………………………………………….….…………………iii Chapter 1. Introduction……………………………………….….……….………1 Chapter 2. Are Drone Swarms WMD?.………….………………………………9 Chapter 3. The Question of Autonomy…………………..………….….………15 Chapter 4. Drone Swarms in WMD Roles…………………………..…………….…19 Chapter 5. Conclusion……..…….…………...……...……...……...……...……27 i Disclaimer The views expressed in this academic research paper are those of the individual authors and do not reflect the official policy or position of the United States government, the Department of Defense, or Air University. In accordance with Air Force Instruction 51-303, it is not copyrighted, but is the property of the United States government. ii Abstract Public discussion has raised significant fears over armed drone swarms being used in a manner like weapons of mass destruction (WMDs). However, should they be considered WMDs? The first half of the article explores the question of comparing drone swarms to various conceptions of WMD. Overall, it finds that a subset of drone swarms, armed fully autonomous drone swarms (AFADS), are WMD.
    [Show full text]
  • An Exploration in Stigmergy-Based Navigation Algorithms
    From Ants to Service Robots: an Exploration in Stigmergy-Based Navigation Algorithms عمر بهر تيری محبت ميری خدمت گر رہی ميں تری خدمت کےقابل جب هوا توچل بسی )اقبال( To my late parents with love and eternal appreciation, whom I lost during my PhD studies Örebro Studies in Technology 79 ALI ABDUL KHALIQ From Ants to Service Robots: an Exploration in Stigmergy-Based Navigation Algorithms © Ali Abdul Khaliq, 2018 Title: From Ants to Service Robots: an Exploration in Stigmergy-Based Navigation Algorithms Publisher: Örebro University 2018 www.publications.oru.se Print: Örebro University, Repro 05/2018 ISSN 1650-8580 ISBN 978-91-7529-253-3 Abstract Ali Abdul Khaliq (2018): From Ants to Service Robots: an Exploration in Stigmergy-Based Navigation Algorithms. Örebro Studies in Technology 79. Navigation is a core functionality of mobile robots. To navigate autonomously, a mobile robot typically relies on internal maps, self-localization, and path plan- ning. Reliable navigation usually comes at the cost of expensive sensors and often requires significant computational overhead. Many insects in nature perform robust, close-to-optimal goal directed naviga- tion without having the luxury of sophisticated sensors, powerful computational resources, or even an internally stored map. They do so by exploiting a simple but powerful principle called stigmergy: they use their environment as an external memory to store, read and share information. In this thesis, we explore the use of stigmergy as an alternative route to realize autonomous navigation in practical robotic systems. In our approach, we realize a stigmergic medium using RFID (Radio Frequency Identification) technology by embedding a grid of read-write RFID tags in the floor.
    [Show full text]
  • Flocks, Herds, and Schools: a Distributed Behavioral Model 1
    Published in Computer Graphics, 21(4), July 1987, pp. 25-34. (ACM SIGGRAPH '87 Conference Proceedings, Anaheim, California, July 1987.) Flocks, Herds, and Schools: A Distributed Behavioral Model 1 Craig W. Reynolds Symbolics Graphics Division [obsolete addresses removed 2] Abstract The aggregate motion of a flock of birds, a herd of land animals, or a school of fish is a beautiful and familiar part of the natural world. But this type of complex motion is rarely seen in computer animation. This paper explores an approach based on simulation as an alternative to scripting the paths of each bird individually. The simulated flock is an elaboration of a particle system, with the simulated birds being the particles. The aggregate motion of the simulated flock is created by a distributed behavioral model much like that at work in a natural flock; the birds choose their own course. Each simulated bird is implemented as an independent actor that navigates according to its local perception of the dynamic environment, the laws of simulated physics that rule its motion, and a set of behaviors programmed into it by the "animator." The aggregate motion of the simulated flock is the result of the dense interaction of the relatively simple behaviors of the individual simulated birds. Categories and Subject Descriptors: 1.2.10 [Artificial Intelligence]: Vision and Scene Understanding; 1.3.5 [Computer Graphics]: Computational Geometry and Object Modeling; 1.3.7 [Computer Graphics]: Three Dimensional Graphics and Realism-Animation: 1.6.3 [Simulation and Modeling]: Applications. General Terms: Algorithms, design.b Additional Key Words, and Phrases: flock, herd, school, bird, fish, aggregate motion, particle system, actor, flight, behavioral animation, constraints, path planning.
    [Show full text]
  • December 1, 2018 1:00 Pm – 1:45 Pm Panel 6 Star Wars: What
    DECEMBER 1, 2018 1:00 PM – 1:45 PM PANEL 6 STAR WARS: WHAT DOES SDI TEACH US ABOUT TECHNOLOGY IN MILITARY COMPETITION? Panelists: • General Hawk Carlisle (USAF, Retired), President and CEO, National Defense Industrial Asscociation (NDIA) • Dr. Thomas Kennedy, Chairman and CEO, Raytheon • Senator Jon Kyl, U.S. Senate, Arizona Moderator: Ms. Morgan Brennan, CNBC Video: https://www.youtube.com/watch?v=a_IZcFxkIY&list=PLHNOi2zcxo7sBxM7HfhmB_tf6QXeqj 48K&index=9 Brennan: Well first I want to say thank you all for being here today, it's been an incredible forum so far. I just want to introduce our panelists. Star Wars: What Does SDI Teach Us About Tech and Military Competition? Brennan: Sitting next to me is Senator John Kyl, US Senator representing Arizona. Dr. Tom Kennedy, Chairman and CEO of Raytheon, and General Hawk Carlisle, 4-Star retired US Air force General, and now President and CEO of the National Defense Industrial Association. Brennan: So great to speak with all three of you today. Brennan: So, I think the first place to start is, what actually was SDI, the Strategic Defense Initiative, and how did it birth modern day missile defense, and the technology we're now talking about today? Brennan: So, Senator Kyl, I would love for you to just start with a little bit of background on this, given the fact that you have been a life-long advocate of nuclear defense, and your public service does date back to the Reagan years. Kyl: Thank you very much. Kyl: You can think about SDI as a roughly decade long effort, first begun by President Ronald Reagan, to create a new system.
    [Show full text]
  • HV Battery SOC Estimation Algorithm Based on PSO
    HV Battery SOC Estimation Algorithm Based on PSO Qiang Sun1, Haiying Lv1, Shasha Wang2, Shixiang Jing1, Jijun Chen1 and Rui Fang1 1College of Engineering and Technology, Tianjin Agricultural University, Jinjing Road, Tianjin, China 2Beijing Electric Vehicle Co., Ltd., East Ring Road, Beijing, China [email protected], [email protected] Keywords: HV battery, SOC, PSO, individual optimum, global optimum. Abstract: In view of the traditional algorithm to estimate the electric vehicle battery state of charge (SOC), lots of problems were caused by the inaccurate battery model parameter estimation error. Particle swarm optimization (PSO) algorithm is a global optimization algorithm based on swarm intelligence, it has intrinsic parallel search mechanism, and is suitable for the complex optimization field. PSO is simple in concept with few using of parameters, and easily in implementation. It is proved to be an efficient method to solve optimization problems, and has successfully been applied in area of function optimization. This article adopts the PSO optimization method to solve the problem of battery parameters. The paper make a new attempt on SOC estimation method, applying PSO to SOC parameters optimization. It can build optimization model to get a more accurate estimate SOC in the case of less parameters with faster convergence speed. 1 INTRODUCTION suitable for the complex optimization field. The paper make a new attempt on SOC estimation Lithium battery has many advantages such as high method, applying PSO to SOC parameters energy density, high power density, long cycle life optimization, It can build optimization model to get and so on. As the energy storage element of electric a more accurate estimate SOC in the case of less vehicles, it is used widely.
    [Show full text]
  • Mathematical Modelling and Applications of Particle Swarm Optimization
    Master’s Thesis Mathematical Modelling and Simulation Thesis no: 2010:8 Mathematical Modelling and Applications of Particle Swarm Optimization by Satyobroto Talukder Submitted to the School of Engineering at Blekinge Institute of Technology In partial fulfillment of the requirements for the degree of Master of Science February 2011 Contact Information: Author: Satyobroto Talukder E-mail: [email protected] University advisor: Prof. Elisabeth Rakus-Andersson Department of Mathematics and Science, BTH E-mail: [email protected] Phone: +46455385408 Co-supervisor: Efraim Laksman, BTH E-mail: [email protected] Phone: +46455385684 School of Engineering Internet : www.bth.se/com Blekinge Institute of Technology Phone : +46 455 38 50 00 SE – 371 79 Karlskrona Fax : +46 455 38 50 57 Sweden ii ABSTRACT Optimization is a mathematical technique that concerns the finding of maxima or minima of functions in some feasible region. There is no business or industry which is not involved in solving optimization problems. A variety of optimization techniques compete for the best solution. Particle Swarm Optimization (PSO) is a relatively new, modern, and powerful method of optimization that has been empirically shown to perform well on many of these optimization problems. It is widely used to find the global optimum solution in a complex search space. This thesis aims at providing a review and discussion of the most established results on PSO algorithm as well as exposing the most active research topics that can give initiative for future work and help the practitioner improve better result with little effort. This paper introduces a theoretical idea and detailed explanation of the PSO algorithm, the advantages and disadvantages, the effects and judicious selection of the various parameters.
    [Show full text]
  • Differential Wolf-Pack-Size Persistence and the Role of Risk When Hunting Dangerous Prey
    Behaviour 153 (2016) 1473–1487 brill.com/beh Differential wolf-pack-size persistence and the role of risk when hunting dangerous prey Shannon M. Barber-Meyer a,b,∗, L. David Mech a,c, Wesley E. Newton a and Bridget L. Borg d a U.S. Geological Survey, Northern Prairie Wildlife Research Center, 8711 37th Street, SE, Jamestown, ND 58401-7317, USA b Present address: U.S. Geological Survey, 1393 Highway 169, Ely, MN 55731, USA c Present address: The Raptor Center, University of Minnesota, 1920 Fitch Avenue, St. Paul, MN 55108, USA d Denali National Park and Preserve, P.O. Box 9, Denali, AK 99755-0009, USA *Corresponding author’s e-mail address: [email protected] Accepted 18 July 2016; published online 19 August 2016 Abstract Risk to predators hunting dangerous prey is an emerging area of research and could account for possible persistent differences in gray wolf (Canis lupus) pack sizes. We documented significant differences in long-term wolf-pack-size averages and variation in the Superior National Forest (SNF), Denali National Park and Preserve, Yellowstone National Park, and Yukon, Canada (p< 0.01). The SNF differences could be related to the wolves’ risk when hunting primary prey, for those packs (N = 3) hunting moose (Alces americanus) were significantly larger than those (N = 10) hunting white-tailed deer (Odocoileus virginianus)(F1,8 = 16.50, p = 0.004). Our data support the hypothesis that differential pack-size persistence may be perpetuated by differences in primary prey riskiness to wolves, and we highlight two important extensions of this idea: (1) the potential for wolves to provision and defend injured packmates from other wolves and (2) the importance of less-risky, buffer prey to pack-size persistence and year-to-year variation.
    [Show full text]