The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The crossover operator plays an important role in a genetic algorithm, which produces two or more offspring for each pair of parents. With the help of the crossover operator, the genetic algorithm can explore the search space effectively. In this paper, we propose a new crossover operator called elliptical crossover operator, which can explore the search domain effectively. A local search scheme is...
Based on difference of target azimuth sensitivity between radar feature and infrared(IR) feature, this paper presents a new algorithm for fusion recognition. By estimating the target azimuth through the infrared feature matching, the search domain of radar feature base and calculation of feature training are reduced. Through introducing a new conflict ratio of fusion, recognize feedback is used to...
In this paper, we will address one key issue for radar load regulation related to dwell priority assignment of Search Domains. Threat Level of search beam position is based on density map of most threatening trajectories (penetration corridors). We studied properties of these trajectories so as to find theoretical results (existence or unicity) and also search algorithm which would be able to compute...
In this paper, we present a new mutation operator called the systematic mutation (SM) operator for enhancing the performance of basic particle swarm optimization (BPSO) algorithm. The SM operator unlike most of its contemporary mutation operators do not use the random probability distribution for perturbing the swarm population, but uses a quasi random Sobol sequence to find new solution vectors in...
The chaos game, in which a moving point is repeatedly averaged toward randomly selected vertices of a triangle, is one method of generating the fractal called the Sierpinski triangle. The sequence of vertices, called generators, used to reach a given point of the Sierpinski triangle yields a map from strings over a three-character alphabet to points in the plane. This study generalizes that representation...
Localizing a bug in a program can be a complex and time- consuming process. In this paper we propose a code coverage-based fault localization method to prioritize suspicious code in terms of its likelihood of containing program bugs. Code with a higher risk should be examined before that with a lower risk, as the former is more suspicious (i.e., more likely to contain program bugs) than the latter...
In this paper, real-time detection and tracking of lips region of a talking person in natural scenes is addressed. In particular, we try to acquire numerical parameters to represent the lips information. Because, this information is very important for many applications, such as audio-visual speech recognition, robot perception, and interface of mobile devices. The difficulty lies in deformations and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.