咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 12 册 图书
  • 1 篇 期刊文献

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16 篇 工学
    • 16 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 6 篇 控制科学与工程
  • 11 篇 理学
    • 11 篇 物理学

主题

  • 10 篇 artificial intel...
  • 8 篇 theory of comput...
  • 5 篇 computer communi...
  • 5 篇 computer system ...
  • 5 篇 special purpose ...
  • 5 篇 mathematics of c...
  • 4 篇 pattern recognit...
  • 3 篇 security
  • 3 篇 neural network
  • 3 篇 classification
  • 3 篇 computation by a...
  • 3 篇 image processing...
  • 2 篇 information syst...
  • 2 篇 simulation and m...
  • 2 篇 data mining and ...
  • 2 篇 neuromorphic
  • 2 篇 computing milieu...
  • 2 篇 swarm intelligen...
  • 2 篇 computational bi...
  • 2 篇 computer systems...

机构

  • 4 篇 huazhong univers...
  • 2 篇 university of gr...
  • 2 篇 central south un...
  • 2 篇 school of electr...
  • 2 篇 rochester inst t...
  • 2 篇 edinburgh napier...
  • 1 篇 departament d’en...
  • 1 篇 department of co...
  • 1 篇 faculty of agric...
  • 1 篇 school of inform...
  • 1 篇 suny binghamton ...
  • 1 篇 wenzhou univ tec...
  • 1 篇 next generat sys...
  • 1 篇 universidad naci...
  • 1 篇 institute of cyb...
  • 1 篇 ohio state unive...
  • 1 篇 indian statistic...
  • 1 篇 guangdong polyte...
  • 1 篇 univ n dakota de...
  • 1 篇 icf int fairfax ...

作者

  • 4 篇 linqiang pan
  • 3 篇 jianqing lin
  • 2 篇 de-shuang huang
  • 2 篇 sarah l. thomson
  • 2 篇 pablo garcía-sán...
  • 2 篇 pino robinson e.
  • 2 篇 kudithipudi dhir...
  • 2 篇 emma hart
  • 2 篇 lianghao li
  • 2 篇 merkel cory
  • 2 篇 yong wang
  • 1 篇 sukhu christophe...
  • 1 篇 ramirez-de-arell...
  • 1 篇 ayesha rahman
  • 1 篇 alonzo rommel
  • 1 篇 shevenell michae...
  • 1 篇 kim peter c. w.
  • 1 篇 mordonini monica
  • 1 篇 joan cabestany
  • 1 篇 seetharaman guna

语言

  • 31 篇 英文
检索条件"任意字段=Machine Intelligence and Bio-inspired Computation: Theory and Applications VIII"
31 条 记 录,以下是1-10 订阅
排序:
machine intelligence and bio-inspired computation: theory and applications viii
Machine Intelligence and Bio-inspired Computation: Theory an...
收藏 引用
machine intelligence and bio-inspired computation: theory and applications viii
The proceedings contain 21 papers. The topics discussed include: a tale of three bio-inspired computational approaches;probabilistic graphs using coupled random variables;evaluating data distribution and drift vulnera...
来源: 评论
machine intelligence and bio-inspired computation: theory and applications VII
Machine Intelligence and Bio-Inspired Computation: Theory an...
收藏 引用
machine intelligence and bio-inspired computation: theory and applications VII Conference
The proceedings contain 11 papers. The topics discussed include: optimization of background subtraction for image enhancement;statistical recognition of 3D objects using integral imaging;spatial context for moving veh...
来源: 评论
Intelligent Water Drops for Aerospace and Defense applications
Intelligent Water Drops for Aerospace and Defense Applicatio...
收藏 引用
Conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Straub, Jeremy Univ N Dakota Dept Comp Sci Grand Forks ND 58202 USA
A modified version of the intelligent water drop algorithm for performing planning for air and ground robots based on telemetry provided by satellites has been created. The IWD algorithm works by simulating the flow o... 详细信息
来源: 评论
Neuromorphic Computing applications for Network Intrusion Detection Systems
Neuromorphic Computing Applications for Network Intrusion De...
收藏 引用
Conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Garcia, Raymond C. Pino, Robinson E. ICF Int Fairfax VA 22031 USA
What is presented here is a sequence of evolving concepts for network intrusion detection. These concepts start with neuromorphic structures for XOR-based signature matching and conclude with computationally based net... 详细信息
来源: 评论
Heterogeneous CMOS/Memristor Hardware Neural Networks for Real-Time Target Classification
Heterogeneous CMOS/Memristor Hardware Neural Networks for Re...
收藏 引用
Conference on machine intelligence and bio-inspired computation - theory and applications viii
作者: Merkel, Cory Kudithipudi, Dhireesha Ptucha, Ray Rochester Inst Technol NanoComp Res Lab Rochester NY 14623 USA Rochester Inst Technol Machine Intelligence Lab Rochester NY USA
The advent of nanoscale metal-insulator-metal (MIM) structures with memristive properties has given birth to a new generation of hardware neural networks based on CMOS/memristor integration (CMHNNs). The advantage of ... 详细信息
来源: 评论
Trusted computation through biologically inspired processes
Trusted computation through biologically inspired processes
收藏 引用
Conference on machine intelligence and bio-inspired computation - theory and applications VII
作者: Anderson, Gustave W. MacAulay Brown Inc MacB Roanoke VA USA
Due to supply chain threats it is no longer a reasonable assumption that traditional protections alone will provide sufficient security for enterprise systems. The proposed cognitive trust model architecture extends t... 详细信息
来源: 评论
Experimental analysis of a Lotka-Volterra neural network for classification  2
Experimental analysis of a Lotka-Volterra neural network for...
收藏 引用
Conference on Next-Generation Robotics II and machine intelligence and bio-inspired computation - theory and applications IX
作者: Sukhu, Christopher L. Stanton, Joseph Aylesworth, Marc BAE Syst Intelligence & Secur Rome NY 13441 USA
An experimental study of a neural network modeled by an adaptive Lotka-Volterra system follows. With totally inhibitory connections, this system can be embedded in a simple classification network. This network is able... 详细信息
来源: 评论
computational intelligence and Neuromorphic Computing Potential for Cybersecurity applications
Computational Intelligence and Neuromorphic Computing Potent...
收藏 引用
Conference on machine intelligence and bio-inspired computation - theory and applications VII
作者: Pino, Robinson E. Shevenell, Michael J. Cam, Hasan Mouallem, Pierre Shumaker, Justin L. Edwards, Arthur H. ICF Int Baltimore MD 21202 USA
In today's highly mobile, networked, and interconnected internet world, the flow and volume of information is overwhelming and continuously increasing. Therefore, it is believed that the next frontier in technolog... 详细信息
来源: 评论
Optimized Hardware Framework of MLP with Random Hidden Layers for Classification applications  10
Optimized Hardware Framework of MLP with Random Hidden Layer...
收藏 引用
Conference on machine intelligence and bio-inspired computation - theory and applications X
作者: Zyarah, Abdullah M. Ramesh, Abhishek Merkel, Cory Kudithipudi, Dhireesha Rochester Inst Technol NanoComp Res Lab Rochester NY 14623 USA Univ Baghdad Dept Elect Engn Baghdad 10071 Iraq
Multilayer Perceptron Networks with random hidden layers are very efficient at automatic feature extraction and offer significant performance improvements in the training process. They essentially employ large collect... 详细信息
来源: 评论
Comparison of Artificial intelligence Classifiers for SIP Attack Data  10
Comparison of Artificial Intelligence Classifiers for SIP At...
收藏 引用
Conference on machine intelligence and bio-inspired computation - theory and applications X
作者: Safarik, Jakub Slachta, Jiri Cesnet Zspo Zikova 4 Prague 6 Czech Republic
Honeypot application is a source of valuable data about attacks on the network. We run several SIP honeypots in various computer networks, which are separated geographically and logically. Each honeypot runs on public... 详细信息
来源: 评论