首页 > 最新文献

Int. J. Intell. Def. Support Syst.最新文献

英文 中文
Performance improvement of real coded genetic algorithm with Quadratic Approximation based hybridisation 基于二次逼近的实数编码遗传算法性能改进
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2009.031415
Kusum Deep, K. Das
Due to their diversity preserving mechanism, real coded genetic algorithms are extremely popular in solving complex non-linear optimisation problems. In recent literature, Deep and Thakur (2007a, 2007b) proved that the new real coded genetic algorithm (called LX-PM that uses Laplace Crossover and Power Mutation) is more efficient than the existing genetic algorithms that use combinations of Heuristic Crossover along with Non-Uniform or Makinen, Periaux and Toivanen Mutation. However, there are some instances where LX-PM needs improvement. Hence, in this paper, an attempt is made to improve the efficiency and reliability of this existing LX-PM by hybridising it with quadratic approximation (called H-LX-PM). To realise the improvement, a set of 22 benchmark test problems and two real world problems, namely: a) system of linear equations; b) frequency modulation parameter identification problem, have been considered. The numerical and graphical results confirm that H-LX-PM really exhibits improvement over LX-PM in terms of efficiency, reliability and stability.
实编码遗传算法由于其多样性保持机制,在求解复杂的非线性优化问题中得到了广泛的应用。在最近的文献中,Deep和Thakur (2007a, 2007b)证明了新的实编码遗传算法(称为LX-PM,使用拉普拉斯交叉和幂突变)比现有的使用启发式交叉与非均匀或Makinen, Periaux和Toivanen突变组合的遗传算法更有效。然而,在某些情况下,LX-PM需要改进。因此,本文试图通过将现有的LX-PM与二次逼近(称为H-LX-PM)混合来提高其效率和可靠性。为了实现改进,一组22个基准测试问题和两个现实世界问题,即:a)线性方程组;B)调频参数辨识问题,都有考虑。数值和图形结果证实,H-LX-PM在效率、可靠性和稳定性方面确实优于LX-PM。
{"title":"Performance improvement of real coded genetic algorithm with Quadratic Approximation based hybridisation","authors":"Kusum Deep, K. Das","doi":"10.1504/IJIDSS.2009.031415","DOIUrl":"https://doi.org/10.1504/IJIDSS.2009.031415","url":null,"abstract":"Due to their diversity preserving mechanism, real coded genetic algorithms are extremely popular in solving complex non-linear optimisation problems. In recent literature, Deep and Thakur (2007a, 2007b) proved that the new real coded genetic algorithm (called LX-PM that uses Laplace Crossover and Power Mutation) is more efficient than the existing genetic algorithms that use combinations of Heuristic Crossover along with Non-Uniform or Makinen, Periaux and Toivanen Mutation. However, there are some instances where LX-PM needs improvement. Hence, in this paper, an attempt is made to improve the efficiency and reliability of this existing LX-PM by hybridising it with quadratic approximation (called H-LX-PM). To realise the improvement, a set of 22 benchmark test problems and two real world problems, namely: a) system of linear equations; b) frequency modulation parameter identification problem, have been considered. The numerical and graphical results confirm that H-LX-PM really exhibits improvement over LX-PM in terms of efficiency, reliability and stability.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114215345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Net-centric issues for large scale tactical data 大规模战术数据的网络中心问题
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2011.044807
B. Bourgeois, R. Ladner, F. Petry
This paper illustrates use of the Universal Core messaging framework to enable request and return of large environmental data files, specifically meteorological and oceanographic (MetOc) data. The utility of the approach is described by experiments conducted during the Trident Warrior 2010 Naval exercise. We next overview development of a web services broker system for MetOc data. The implementation of this broker system incorporates both automated data discovery and retrieval capabilities. An extension of UCore, C2 (Command and Control) Core is described and an evaluation to assess its effectiveness for the MetOc domain is described.
本文演示了使用通用核心消息传递框架来实现大型环境数据文件的请求和返回,特别是气象和海洋学(MetOc)数据。在三叉戟勇士2010海军演习期间进行的实验描述了该方法的实用性。接下来我们概述了MetOc数据的web服务代理系统的开发。该代理系统的实现结合了自动数据发现和检索功能。描述了UCore的扩展,C2(指挥与控制)核心,并描述了评估其在MetOc领域有效性的评估。
{"title":"Net-centric issues for large scale tactical data","authors":"B. Bourgeois, R. Ladner, F. Petry","doi":"10.1504/IJIDSS.2011.044807","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.044807","url":null,"abstract":"This paper illustrates use of the Universal Core messaging framework to enable request and return of large environmental data files, specifically meteorological and oceanographic (MetOc) data. The utility of the approach is described by experiments conducted during the Trident Warrior 2010 Naval exercise. We next overview development of a web services broker system for MetOc data. The implementation of this broker system incorporates both automated data discovery and retrieval capabilities. An extension of UCore, C2 (Command and Control) Core is described and an evaluation to assess its effectiveness for the MetOc domain is described.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116059915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systems model for probabilistic risk assessment of improvised explosive device attacks 简易爆炸装置袭击概率风险评估系统模型
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2012.053664
M. Grant, M. Stewart
Due to their improvised nature, the variability in the design, manufacture and operation of most improvised explosive devices (IEDs) defy the traditional paradigms used to assess the effectiveness of conventional munitions. Thus, IEDs are complex socio-technical systems to model. To compensate for inadequacies in model design or data deficiencies, expert judgement and subjective probability assignments are often employed. The paper aims to reduce this reliance by developing an IED probabilistic risk assessment model using a systems model for IED attacks based on IED device reliability and characterising the human aspects of IED attack operational effectiveness from existing terrorism databases. This model can then be used to develop an automated model for IED probabilistic risk assessment that can be used towards informing military applications such as operations planning and war-gaming, and civil applications such as security risk management (including event planning), protective construction requirements, and insurance assessments. It was found that the risk of loss (fatalities, property damage) is influenced more by operational aspects (such as target selection, IED placement and attack timing) than the technical aspects of the device design and manufacture.
由于简易爆炸装置的简易性,大多数简易爆炸装置在设计、制造和操作方面的可变性与评估常规弹药有效性的传统范式相悖。因此,ied是需要建模的复杂社会技术系统。为了弥补模型设计的不足或数据的不足,通常采用专家判断和主观概率分配。本文旨在通过使用基于IED装置可靠性的IED攻击系统模型开发IED概率风险评估模型,并从现有的恐怖主义数据库中描述IED攻击作战有效性的人为方面,从而减少这种依赖。然后,该模型可用于开发IED概率风险评估的自动化模型,该模型可用于为军事应用(如作战计划和战争演习)和民用应用(如安全风险管理(包括事件规划)、防护建筑要求和保险评估)提供信息。研究发现,损失(死亡、财产损失)的风险更多地受到操作方面(如目标选择、简易爆炸装置放置和攻击时间)的影响,而不是装置设计和制造的技术方面。
{"title":"A systems model for probabilistic risk assessment of improvised explosive device attacks","authors":"M. Grant, M. Stewart","doi":"10.1504/IJIDSS.2012.053664","DOIUrl":"https://doi.org/10.1504/IJIDSS.2012.053664","url":null,"abstract":"Due to their improvised nature, the variability in the design, manufacture and operation of most improvised explosive devices (IEDs) defy the traditional paradigms used to assess the effectiveness of conventional munitions. Thus, IEDs are complex socio-technical systems to model. To compensate for inadequacies in model design or data deficiencies, expert judgement and subjective probability assignments are often employed. The paper aims to reduce this reliance by developing an IED probabilistic risk assessment model using a systems model for IED attacks based on IED device reliability and characterising the human aspects of IED attack operational effectiveness from existing terrorism databases. This model can then be used to develop an automated model for IED probabilistic risk assessment that can be used towards informing military applications such as operations planning and war-gaming, and civil applications such as security risk management (including event planning), protective construction requirements, and insurance assessments. It was found that the risk of loss (fatalities, property damage) is influenced more by operational aspects (such as target selection, IED placement and attack timing) than the technical aspects of the device design and manufacture.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Construction of permittivity functions for high-explosives using density functional theory 用密度泛函理论构造烈性炸药介电常数函数
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2012.053648
Daniel Finkenstadt, S. Lambrakos, N. Bernstein, V. Jacobs, Lulu Huang, L. Massa, A. Shabaev
We review a framework for the prediction of explosive molecular spectra, namely, for the common explosives found in improvised explosive devices, e.g., β-HMX. Through the use of excitation by incident electromagnetic waves in the THz frequency range, molecular signatures of these explosives may be detected, identified and perhaps neutralised remotely. A central component of this framework is an S-matrix representation of multilayered composite materials. The individual molecules are first simulated using first-principles density functional theory (DFT). An effective electric permittivity function is then constructed, which yields reflectivity and transmissivity functions of frequency and of angle of incident radiation. The input for this component would be a parameterised analytic-function representation of the electric permittivity as a function of frequency, which is provided by another component model of the framework. The permittivity function is constructed by fitting response spectra calculated usin...
我们回顾了一个预测爆炸分子光谱的框架,即简易爆炸装置中常见的爆炸物,如β-HMX。通过使用太赫兹频率范围内的入射电磁波激发,这些炸药的分子特征可以被探测、识别,甚至可能被远程中和。该框架的核心组件是多层复合材料的s矩阵表示。单个分子首先使用第一性原理密度泛函理论(DFT)进行模拟。然后构造有效电介电常数函数,得到频率和入射辐射角的反射率和透射率函数。该组件的输入将是电介电常数作为频率函数的参数化分析函数表示,该函数由框架的另一个组件模型提供。通过拟合响应谱来构造介电常数函数。
{"title":"Construction of permittivity functions for high-explosives using density functional theory","authors":"Daniel Finkenstadt, S. Lambrakos, N. Bernstein, V. Jacobs, Lulu Huang, L. Massa, A. Shabaev","doi":"10.1504/IJIDSS.2012.053648","DOIUrl":"https://doi.org/10.1504/IJIDSS.2012.053648","url":null,"abstract":"We review a framework for the prediction of explosive molecular spectra, namely, for the common explosives found in improvised explosive devices, e.g., β-HMX. Through the use of excitation by incident electromagnetic waves in the THz frequency range, molecular signatures of these explosives may be detected, identified and perhaps neutralised remotely. A central component of this framework is an S-matrix representation of multilayered composite materials. The individual molecules are first simulated using first-principles density functional theory (DFT). An effective electric permittivity function is then constructed, which yields reflectivity and transmissivity functions of frequency and of angle of incident radiation. The input for this component would be a parameterised analytic-function representation of the electric permittivity as a function of frequency, which is provided by another component model of the framework. The permittivity function is constructed by fitting response spectra calculated usin...","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116134447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Weapon target assignment problem: multi-objective formulation, optimisation using MOPSO and TOPSIS 武器目标分配问题:多目标公式,使用MOPSO和TOPSIS进行优化
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2015.075483
B. P. Mishra, Eui-Whan Kim, Guck-Cheol Bang, Satchidananda Dehuri, Sung-Bae Cho
In this paper, a static weapon target assignment problem is studied by optimising the conflicting criteria like shooting failure and number of weapons used to destroy the targets. The inherent intractability and conflicting objectives of this problem motivated us to use multi-objective particle swarm optimisation (MOPSO) to uncover the true Pareto front. We first employ the MOPSO to uncover the Pareto front. Secondly, a ranking method called techniques for order preference by similarity to ideal solution (TOPSIS) is used to sort the non-dominated solutions by the preference of decision maker (DM). A numerical experiment on two test cases has been conducted to realise the efficacy of the method. The experimental work is offering large number of solutions in the Pareto front, which may create problem to DM for effective decision. Therefore, by TOPSIS a prioritised set of non-dominated solutions is provided to DM, which fits the preference under different situations.
本文通过优化射击失败和摧毁目标的武器数量等冲突准则,研究了静态武器目标分配问题。这个问题固有的难解性和相互冲突的目标促使我们使用多目标粒子群优化(MOPSO)来揭示真正的帕累托前沿。我们首先使用MOPSO来揭开帕累托前线。其次,利用与理想解相似度排序技术(TOPSIS)对非支配解进行排序。在两个测试用例上进行了数值实验,验证了该方法的有效性。实验工作是在Pareto前沿提供大量的解决方案,这可能会给DM带来问题,从而进行有效的决策。因此,通过TOPSIS,为DM提供了一组符合不同情况下偏好的非支配解的优先集。
{"title":"Weapon target assignment problem: multi-objective formulation, optimisation using MOPSO and TOPSIS","authors":"B. P. Mishra, Eui-Whan Kim, Guck-Cheol Bang, Satchidananda Dehuri, Sung-Bae Cho","doi":"10.1504/IJIDSS.2015.075483","DOIUrl":"https://doi.org/10.1504/IJIDSS.2015.075483","url":null,"abstract":"In this paper, a static weapon target assignment problem is studied by optimising the conflicting criteria like shooting failure and number of weapons used to destroy the targets. The inherent intractability and conflicting objectives of this problem motivated us to use multi-objective particle swarm optimisation (MOPSO) to uncover the true Pareto front. We first employ the MOPSO to uncover the Pareto front. Secondly, a ranking method called techniques for order preference by similarity to ideal solution (TOPSIS) is used to sort the non-dominated solutions by the preference of decision maker (DM). A numerical experiment on two test cases has been conducted to realise the efficacy of the method. The experimental work is offering large number of solutions in the Pareto front, which may create problem to DM for effective decision. Therefore, by TOPSIS a prioritised set of non-dominated solutions is provided to DM, which fits the preference under different situations.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Complete identification of dynamic physical systems using a five parameter model 使用五参数模型完成动态物理系统的识别
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2008.023007
D. Maiti, Mithun Chakraborty, A. Konar
System identification is important in science and engineering. This contribution proposes a simple yet elegant scheme for identifying a fractional order dynamic system based on its observed response to a standard excitation. Our approach consists in obtaining and solving a set of simultaneous linear equations connecting the parameters to yield the desired estimates. To minimise the effect of noise, we have performed an in-depth analysis of the Grunwald-Letnikov definition and, as far as we know, are the first ones to do so. Results show that the proposed method offers a very high degree of accuracy even for erroneous data.
系统识别在科学和工程中具有重要的意义。这一贡献提出了一个简单而优雅的方案,用于识别分数阶动态系统基于其对标准激励的观察响应。我们的方法包括获得和求解一组联立线性方程,这些方程将参数连接起来,以产生期望的估计。为了尽量减少噪音的影响,我们对格伦瓦尔德-列特尼科夫定义进行了深入的分析,据我们所知,我们是第一个这样做的人。结果表明,该方法即使对错误数据也有很高的精度。
{"title":"Complete identification of dynamic physical systems using a five parameter model","authors":"D. Maiti, Mithun Chakraborty, A. Konar","doi":"10.1504/IJIDSS.2008.023007","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.023007","url":null,"abstract":"System identification is important in science and engineering. This contribution proposes a simple yet elegant scheme for identifying a fractional order dynamic system based on its observed response to a standard excitation. Our approach consists in obtaining and solving a set of simultaneous linear equations connecting the parameters to yield the desired estimates. To minimise the effect of noise, we have performed an in-depth analysis of the Grunwald-Letnikov definition and, as far as we know, are the first ones to do so. Results show that the proposed method offers a very high degree of accuracy even for erroneous data.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116751824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model of intrapulse effects for pulse sources above 100 MHz and their measurement by an Expert System 100 MHz以上脉冲源的脉冲内效应模型及其专家系统测量
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2008.025019
P. Fitch
This paper describes a digital model of intrapulse effects generated from a library of source characteristics, together with the noise. The model provides simulation for amplitude, frequency and Phase Modulation (PM) effects within a pulse. Multiple modulations can occur within the same pulse. An Expert System is described which identifies and demodulates the intrapulse modulation and the results from an implementation of such a system are compared with the source data. The intrapulse model is intended for use in the evaluation of algorithms utilising traditional Digital Signal Processing (DSP) and artificial intelligent techniques associated with Electronic Support (ES) and Radar Warning Receiver (RWR) systems.
本文描述了一个包含噪声的信号源特性库所产生的脉冲内效应的数字模型。该模型提供了脉冲内幅度、频率和相位调制(PM)效应的仿真。在同一脉冲中可以发生多次调制。描述了一个识别和解调脉冲内调制的专家系统,并将该系统的实现结果与源数据进行了比较。脉冲内模型旨在用于评估利用传统数字信号处理(DSP)和与电子支持(ES)和雷达告警接收器(RWR)系统相关的人工智能技术的算法。
{"title":"A model of intrapulse effects for pulse sources above 100 MHz and their measurement by an Expert System","authors":"P. Fitch","doi":"10.1504/IJIDSS.2008.025019","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.025019","url":null,"abstract":"This paper describes a digital model of intrapulse effects generated from a library of source characteristics, together with the noise. The model provides simulation for amplitude, frequency and Phase Modulation (PM) effects within a pulse. Multiple modulations can occur within the same pulse. An Expert System is described which identifies and demodulates the intrapulse modulation and the results from an implementation of such a system are compared with the source data. The intrapulse model is intended for use in the evaluation of algorithms utilising traditional Digital Signal Processing (DSP) and artificial intelligent techniques associated with Electronic Support (ES) and Radar Warning Receiver (RWR) systems.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122327645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive vs. conventional potential field approaches for solving navigation problems of a real car-like wheeled robot 基于自适应与传统势场方法的类车轮式机器人导航问题求解
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2009.031414
Subba Rao Amada, P. Vundavilli, D. K. Pratihar
Adaptive Potential Field Methods (APFMs) have been proposed in this paper and their performances have been compared among them and with that of Conventional Potential Field Method (CPFM) to solve navigation problems of the mobile robot. The performance of a potential field method (PFM) depends on its chosen attractive and repulsive potential functions and the constant terms associated with them. Robots that navigate using the CPFM may not find time-optimal path and may suffer from the deadlock situations. APFM could solve the said problems by changing the constant terms associated with the potential functions to cope with the varying situations of the environment. The performances of the proposed adaptive and CPFMs have been tested through computer simulations and on a real car-like wheeled robot. The proposed PFM is found to perform better than the conventional one.
本文提出了自适应势场法,并将其与传统势场法的性能进行了比较,以解决移动机器人的导航问题。势场法的性能取决于所选择的吸引和排斥势函数以及与之相关的常数项。使用CPFM进行导航的机器人可能无法找到时间最优路径,并可能出现死锁情况。APFM可以通过改变与势函数相关的常数项来应对环境的变化情况,从而解决上述问题。所提出的自适应和CPFMs的性能已经通过计算机模拟和一个真实的类车轮式机器人进行了测试。结果表明,所提出的PFM比传统的PFM性能更好。
{"title":"Adaptive vs. conventional potential field approaches for solving navigation problems of a real car-like wheeled robot","authors":"Subba Rao Amada, P. Vundavilli, D. K. Pratihar","doi":"10.1504/IJIDSS.2009.031414","DOIUrl":"https://doi.org/10.1504/IJIDSS.2009.031414","url":null,"abstract":"Adaptive Potential Field Methods (APFMs) have been proposed in this paper and their performances have been compared among them and with that of Conventional Potential Field Method (CPFM) to solve navigation problems of the mobile robot. The performance of a potential field method (PFM) depends on its chosen attractive and repulsive potential functions and the constant terms associated with them. Robots that navigate using the CPFM may not find time-optimal path and may suffer from the deadlock situations. APFM could solve the said problems by changing the constant terms associated with the potential functions to cope with the varying situations of the environment. The performances of the proposed adaptive and CPFMs have been tested through computer simulations and on a real car-like wheeled robot. The proposed PFM is found to perform better than the conventional one.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132732061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A SVM Greek character recogniser 一个支持向量机希腊字符识别器
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2008.025018
F. Camastra
This paper presents a handwritten Greek character recogniser based on Support Vector Machines (SVMs). The recogniser is composed of two modules: the first one is a feature extractor, the second one, the classifier, is performed by means of SVMs. The recogniser, tested on a database of more than 22000 handwritten Greek characters, has shown satisfactory performances. SVMs compare notably better, in terms of recognition rates, with popular neural classifiers, such as Learning Vector Quantisation (LVQ) and Multi-layer Perceptron (MLP).
提出了一种基于支持向量机(svm)的手写体希腊字符识别器。该识别系统由两个模块组成:第一个模块是特征提取器,第二个模块是通过支持向量机实现的分类器。该识别器在超过22000个希腊手写字符的数据库中进行了测试,结果令人满意。在识别率方面,svm与流行的神经分类器(如学习向量量化(LVQ)和多层感知器(MLP))相比明显更好。
{"title":"A SVM Greek character recogniser","authors":"F. Camastra","doi":"10.1504/IJIDSS.2008.025018","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.025018","url":null,"abstract":"This paper presents a handwritten Greek character recogniser based on Support Vector Machines (SVMs). The recogniser is composed of two modules: the first one is a feature extractor, the second one, the classifier, is performed by means of SVMs. The recogniser, tested on a database of more than 22000 handwritten Greek characters, has shown satisfactory performances. SVMs compare notably better, in terms of recognition rates, with popular neural classifiers, such as Learning Vector Quantisation (LVQ) and Multi-layer Perceptron (MLP).","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121418381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network-centric IED detection planning 以网络为中心的IED检测规划
Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2012.053665
K. Usbeck, J. Cleveland, W. Regli
As methods for detecting improvised explosive devices (IEDs) continue to diversify, it becomes increasingly important to establish a framework for coordinating distributed IED monitoring resources to best protect a designated area. The purpose of this paper is to establish the beginnings of such a framework in a distributed plan execution context. The first contribution of this paper is defining an automated planning domain for distributed IED detection. In doing so, we investigate approaches for coordinating distributed plan execution resources. Whereas many existing multi-agent system (MAS) frameworks abstract network information from agent decision-making processes, we instead propose that MAS frameworks consider network properties to improve effectiveness. The second contribution of the paper is the description of several types of network-aware planning, execution, and monitoring agents and a comparison of their performance and effectiveness in an IED monitoring scenario. The results of this research ...
随着简易爆炸装置(IED)探测方法的不断多样化,建立一个协调分布式IED监测资源的框架以最好地保护指定区域变得越来越重要。本文的目的是在分布式计划执行上下文中建立这样一个框架的开端。本文的第一个贡献是定义了分布式IED检测的自动规划域。在此过程中,我们研究协调分布式计划执行资源的方法。鉴于许多现有的多智能体系统(MAS)框架从智能体决策过程中抽象网络信息,我们建议MAS框架考虑网络属性以提高有效性。本文的第二个贡献是描述了几种类型的网络感知规划、执行和监控代理,并比较了它们在IED监控场景中的性能和有效性。这项研究的结果是……
{"title":"Network-centric IED detection planning","authors":"K. Usbeck, J. Cleveland, W. Regli","doi":"10.1504/IJIDSS.2012.053665","DOIUrl":"https://doi.org/10.1504/IJIDSS.2012.053665","url":null,"abstract":"As methods for detecting improvised explosive devices (IEDs) continue to diversify, it becomes increasingly important to establish a framework for coordinating distributed IED monitoring resources to best protect a designated area. The purpose of this paper is to establish the beginnings of such a framework in a distributed plan execution context. The first contribution of this paper is defining an automated planning domain for distributed IED detection. In doing so, we investigate approaches for coordinating distributed plan execution resources. Whereas many existing multi-agent system (MAS) frameworks abstract network information from agent decision-making processes, we instead propose that MAS frameworks consider network properties to improve effectiveness. The second contribution of the paper is the description of several types of network-aware planning, execution, and monitoring agents and a comparison of their performance and effectiveness in an IED monitoring scenario. The results of this research ...","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133176582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Int. J. Intell. Def. Support Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1