2014
DOI: 10.1007/978-3-642-41196-0
|View full text |Cite
|
Sign up to set email alerts
|

Bio-inspired Computation in Unmanned Aerial Vehicles

Abstract: The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 76 publications
(33 citation statements)
references
References 0 publications
0
32
0
1
Order By: Relevance
“…At any point in time, only one bee will act as a scout bee, and it will be the one to determine a new food source. Such bees are called artificial scouts [17]. Figure 4 shows the ABC mechanism, in which two discovered food sources are assumed as A and B.…”
Section: Artificial Bee Colony Algorithmmentioning
confidence: 99%
“…At any point in time, only one bee will act as a scout bee, and it will be the one to determine a new food source. Such bees are called artificial scouts [17]. Figure 4 shows the ABC mechanism, in which two discovered food sources are assumed as A and B.…”
Section: Artificial Bee Colony Algorithmmentioning
confidence: 99%
“…In this model, S is defined as the starting point, and T is the target point ( Figure 1) [18,19]. There are some threat resources in UCAV battlefield, for example, radars, missiles, and artillery, the effects of which all are shown in the form of a circle.…”
Section: Threat Resource Model In Ucav Path Planningmentioning
confidence: 99%
“…In this work, the threat cost of the route between two discrete points was calculated. It is approximately equal to the sum of the threat cost of five points, as shown in Figure 2 [18,19]. 1 1 (x , y ) If the i th edge is within the effect range, the calculation formula of the threat cost is as follows: …”
Section: Evaluation Functionmentioning
confidence: 99%
“…However, our proposed model requires more time to complete the training part. Time consumption is also the bottleneck for many biologically inspired models [42]. The processing speed of our model is the main limitation in real-world applications, such as the analysis of video.…”
Section: F Future Workmentioning
confidence: 99%