Mo Wei

Mo Wei
The Ohio State University | OSU

About

16
Publications
2,525
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
224
Citations

Publications

Publications (16)
Article
In this paper, both Pareto game theory and learning theory algorithms are utilized in a resource management module for a practical missile interception system. The resource management module will determine how many and which antimissiles will be launched for interception. Such interception decisions are based on the number of invading missiles, ava...
Conference Paper
Traditional missile interception often focuses on simplified scenarios such as one-to-one or multi-to-one interception. Recently, battlefield situations pose new difficulties for missile defense systems, which make traditional interception systems inefficient. The problems revolve around two aspects: 1) The guidance law insufficiency (traditional f...
Article
Civilians are not just passively static but might purposefully take actions to help one side in a battle. Sometimes civilians might directly join one side if they are excessively agitated by the other side. In this paper, a three-player attrition-type discrete time dynamic game model is formulated, in which there are two opposing forces and one civ...
Conference Paper
Full-text available
This paper presents a game theoretic approach for the management of multiple mobile sensors. Our approach can maintain tracks of smart targets under possibly adversarial environments. To ensure computational tractability, sensor management is divided into sensor assignment and sensor scheduling. In sensor assignment, covariance control and informat...
Article
Full-text available
Accurate predictions of enemy course of actions "ECOA" are important to the command and control optimization strategies in long-lasting battles. In most Command and Control "C2" applications, the existing techniques, such as spatial-temporal point models for ECOA prediction or Discrete Choice Model "DCM", assume that insurgent attack features/patte...
Conference Paper
Few pursuer-evader (PE) game algorithms allow for real-time applications for (1) multi-pursuer-multi-evader situations, (2) noisy environments, and (3) evaders with superior control resources such as higher speeds. This paper introduces a real-time decentralized approach for such games. A sufficient condition for capturing a superior evader is prop...
Article
Full-text available
Prediction of adversarial course of actions (COA) is critical to many applications including: crime prediction, Unmanned Aerial Vehicle (UAV) threat prediction, and terrorism attack prevention. Researchers have shown that integrating behavior features (or preferences/patterns/modes) into prediction systems, which utilize random process theory and l...
Article
Full-text available
A coupling game is a new model for partly cooperative and partly non-cooperative games. This paper describes benefits that result when coupling rational cooperation, under some situations, is increased. We prove that if a coupling game is strictly rational and partly cooperative, the higher the coupling factors, the larger the social payoff, which...
Article
Full-text available
Existing pursuer-evader (PE) game algorithms do not provide good real-time solutions for situations with the following complexities: (1) multi-pursuer multi-evader, (2) multiple evaders with superior control resources such as higher speeds, and (3) jamming confrontation between pursuers and evaders. This paper introduces a real-time decentralized a...
Article
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, the necessary protocol for the copyright control and content distribution, the authentication mechanism which offer consumption regis...
Conference Paper
Few approaches dealing with pursuer-evader (PE) game allow real-time applications for multi-pursuer-multi-evader situations, especially for cases of evaders with superior control resources such as higher speeds. In addition, existing implementations are often centralized and require prohibitive computation even for very small-scale case. This paper...
Article
Full-text available
We propose two flexible game models to represent and analyze cases that cannot be modeled by current game models. One is called sharing creditability game (SCG) and the other is called bottomline game (BLG). The new models transform cooperative games into new games that incorporate auxiliary information (noncooperative in nature) usually neglected...
Conference Paper
Full-text available
In this paper, a strategy named Bit Importance Strategy (BIS) is introduced to improve the performance of Bidirectional Associative Memory (BAM) in cases in which differences in importance among bits must be considered. The main advantage of this new strategy lies in the improvement of the recall success ratio. Simulation results are given, with an...
Conference Paper
Full-text available
Mission planning is one of the core steps to effectively exploit the capabilities of multi-level cooperative control of multiple semi-autonomous entities, such as unmanned aerospace vehicles (UAVs). In this paper, we describe a methodology of Team Dynamics and Tactics (TDT) for mission planning in a military operation. This method for mission plann...
Article
【Abstract】Inor derto solve the problemof copyright protection forH. 264 compressed video,a novel watermark algorithmo flow bit-rate video is proposed.Accor ding to the distribution of DCTcoef ficients in H.264,by using the sign coding of the coefficients,water mark is embedded into the quantized DCT coefficients of the intra frame. For the sake of...

Network

Cited By