A novel method is proposed for asynchronous measurement fusion using maximum-likelihood (ML) estimator. This method is applied to multiple radar tracking and reconstruction of ballistic trajectories. The performance a...
详细信息
A novel method is proposed for asynchronous measurement fusion using maximum-likelihood (ML) estimator. This method is applied to multiple radar tracking and reconstruction of ballistic trajectories. The performance and robustness of the ML measurement fusion technique are analysed using a generic simulation scenario involving multisensor weapon locating in urban environment. Accuracies of firing point and impact point estimation of mortar grenades and artillery rockets are also evaluated taking into account different radars' characteristics and geometries of the scenario. Immunity to glint noise, limited time of observation, and uncertainty of ballistic coefficient are also investigated. This study shows the effectiveness of the new method, advantages over track fusion approach, and reveals its practical value.
Competitive and cooperative threading are widely used abstractions in computing. In competitive threading, threads are scheduled preemptively with the goal of minimizing response time, usually of interactive applicati...
详细信息
Streaming environments and similar parallel platforms are widely used in image, signal, or general data processing as a means of achieving high performance. Unfortunately, they are often associated with specific progr...
详细信息
ISBN:
(纸本)9781509060597
Streaming environments and similar parallel platforms are widely used in image, signal, or general data processing as a means of achieving high performance. Unfortunately, they are often associated with specific programminglanguages and, thus, hardly accessible for non-experts. In this paper, we present a framework for transformation of a C# procedural code to a Hybrid Flow Graph - a novel intermediate code which employs the streaming paradigm and can be further converted into a streaming application. This approach will allow creating streaming applications or their parts using a widely known imperative language instead of an intricate language specific to streaming. In this paper, we focus on the transformation of control flow which represents the main difference between procedural code, driven by control flow constructs, and streaming environments, driven by data. Since the use of a streaming platform automatically enables parallelism and vectorization, we were able to demonstrate that the streaming applications generated by our method may outperform their original C# implementation.
The "Sequentially Drilled" Joint Congruence (SeDJoCo) transformation is a set of matrix transformation equations, which coincide with the Likelihood Equations for semi-blind source separation, when each sour...
详细信息
ISBN:
(纸本)9781509041183
The "Sequentially Drilled" Joint Congruence (SeDJoCo) transformation is a set of matrix transformation equations, which coincide with the Likelihood Equations for semi-blind source separation, when each source is modeled as a zero-mean Gaussian process with a known (and distinct) temporal covariance matrix. Therefore, with such a model a solution of SeDJoCo can lead to the Maximum Likelihood (ML) estimate of the separating matrix, which is asymptotically optimal. However, as we have shown in previous work, multiple solutions of SeDJoCo may exist, and the selection of the optimal solution among these (corresponding to the global maximum of the likelihood function) is therefore of considerable interest. In this paper we further extend our results by proposing a new ML approach for the identification and correction of a sub-optimal solution, assuming sources of unrestricted, general temporal covariance structures. We demonstrate the resulting improvement in simulation with non-stationary sources.
Enforcing open source licenses such as the GNU General Public License (GPL), analyzing a binary for possible vulnerabilities, and code maintenance are all situations where it is useful to be able to determine the sour...
详细信息
programminglanguages themselves have a limited number of reserved keywords and character based tokens that define the language specification. However, programmers have a rich use of natural language within their code...
详细信息
Multilingual (ML) representations play a key role in building speech recognition systems for low resource languages. The IARPA sponsored BABEL program focuses on building speech recognition (ASR) and keyword search (K...
详细信息
ISBN:
(纸本)9781509041183
Multilingual (ML) representations play a key role in building speech recognition systems for low resource languages. The IARPA sponsored BABEL program focuses on building speech recognition (ASR) and keyword search (KWS) systems in over 24 languages with limited training data. The most common mechanism to derive ML representations in the BABEL program has been with the use of a two-stage network, the first stage being a convolutional network (CNN) from where multilingual features are extracted, expanded contextually and used as input to the second stage which can be a feed-forward DNN or a CNN. The final multilingual representations are derived from the second network. This paper presents two novel methods for deriving ML representations. The first is based on Long-Short Term Memory (LSTM) networks and the second is based on a very deep CNN (VGG-net). We demonstrate that ML features extracted from both models show significant improvement over the baseline CNN-DNN based ML representations, in terms of both speech recognition and keyword search performance and draw the comparison between the LSTM model itself and the ML representations derived from it on Georgian, the surprise language for the OpenKWS evaluation.
Recent studies have shown that sketches and diagrams play an important role in the daily work of software developers. If these visual artifacts are archived, they are often detached from the source code they document,...
详细信息
The main objectives of SCADA (Supervisory Control And Data Acquisition) systems are the supervisory analysis of the system, control algorithms validation, and data acquisition. These systems are normally implemented a...
详细信息
暂无评论