There is an emerging philosophy, called Neuro-informatics, contained in the Artificial Intelligence field, that aims to emulate how living beings do tasks such as taking a decision based on the interpretation of an im...
详细信息
ISBN:
(纸本)9788489315471
There is an emerging philosophy, called Neuro-informatics, contained in the Artificial Intelligence field, that aims to emulate how living beings do tasks such as taking a decision based on the interpretation of an image by emulating spiking neurons into VLSI designs and, therefore, trying to re-create the human brain at its highest level. Address-Event-Representation (AER) is a communication protocol that has embedded part of the processing. It is intended to transfer spikes between bioinspired chips. An AER based system may consist of a hierarchical structure with several chips that transmit spikes among them in real-time, while performing some processing. There are several AER tools to help to develop and test AER based systems. These tools require the use of a computer to allow the higher level processing of the event information, reaching very high bandwidth at the AER communication level. We propose the use of an embedded platform based on a multi-task operating system to allow both, the AER communication and processing without the requirement of either a laptop or a computer. In this paper, we present and study the performance of a new philosophy of a frame-grabber AER tool based on a multi-task environment. This embedded platform is based on the Intel XScale processor which is governed by an embedded GNU/Linux system. We have connected and programmed it for processing Address-Event information from a spiking generator.
Clear imagery of retinal vessels is one of the critical shreds of evidence in specific disease diagnosis and evaluation, including sophisticated hierarchical topology and plentiful-and-intensive capillaries. In this w...
详细信息
This paper describes an alternative mutation control scheme for Genetic Algorithms (GAs) inspired by the Self-Organized Criticality (SOC) theory. The strategy, which mimics a SOC system known as sandpile, is able to g...
详细信息
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can qu...
详细信息
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can quickly fabricate comments and news on social *** most difficult challenge is determining which news is real or ***,tracking down programmed techniques to recognize fake news online is *** an emphasis on false news,this study presents the evolution of artificial intelligence techniques for detecting spurious social media *** study shows past,current,and possible methods that can be used in the future for fake news *** different publicly available datasets containing political news are utilized for performing *** supervised learning algorithms are used,and their results show that conventional Machine Learning(ML)algorithms that were used in the past perform better on shorter text *** contrast,the currently used Recurrent Neural Network(RNN)and transformer-based algorithms perform better on longer ***,a brief comparison of all these techniques is provided,and it concluded that transformers have the potential to revolutionize Natural Language Processing(NLP)methods in the near future.
This paper focuses on the latest version of a tool developed within the department to guide developer through the various steps of requirements, test-procedures and documentations to finally download the derived algor...
详细信息
Selective attention to visual-spatial stimuli causes decrements of power in alpha band and increments in beta. For steady-state visual evoked potentials (SSVEP) selective attention affects electroencephalogram (EEG) r...
详细信息
Recent advances in multimedia and image processing techniques can be utilized to assist pathologists in this respect. In fact, many investigators believe that automation of prostate cancer analysis increases the rate ...
详细信息
ISBN:
(纸本)2930307056
Recent advances in multimedia and image processing techniques can be utilized to assist pathologists in this respect. In fact, many investigators believe that automation of prostate cancer analysis increases the rate of early detection. In this paper, we will propose an automatic procedure for prostate cancer light micrograph based on soft-computing technique, for image interpretation, with increased accuracy. We propose a feature subset selection algorithm that selects the most important features, used by a pseudo-gaussian radial basis function neural networks to classify the prostate cancer light micrograph. A high classification rate has been achieved which will reduce the subjective human invention and will increase the diagnostic speed.
Estimation of Distribution Algorithms (EDAs) are a set of optimization techniques that have been successfully applied to different kinds of problems. In this paper, we deal with the creation of multivariate calibratio...
详细信息
The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies...
详细信息
The target coverage is an important yet challenging problem in wireless sensor networks, especially when both coverage and energy constraints should be taken into account. Due to its nonlinear nature, previous studies of this problem have mainly focused on heuristic algorithms; the theoretical bound remains unknown. Moreover, the most popular method used in the previous literature, i.e., discretization of continuous time, has yet to be justified. This paper fills in these gaps with two theoretical results. The first one is a formal justification for the method. We use a simple example to illustrate the procedure of transforming a solution in time domain into a corresponding solution in the pattern domain with the same network lifetime and obtain two key observations. After that, we formally prove these two observations and use them as the basis to justify the method. The second result is an algorithm that can guarantee the network lifetime to be at least (1 - ε) of the optimal network lifetime, where ε can be made arbitrarily small depending on the required precision. The algorithm is based on the column generation (CG) theory, which decomposes the original problem into two sub-problems and iteratively solves them in a way that approaches the optimal solution. Moreover, we developed several constructive approaches to further optimize the algorithm. Numerical results verify the efficiency of our CG-based algorithm.
This article consists of a collection of slides from the authors' conference presentation. They conclude that: distributed microarchitecture acknowledges and tolerates wire delay and scalable protocols tailored fo...
暂无评论