Sciweavers

1845 search results - page 318 / 369
» Computing the Angularity Tolerance
Sort
View
IJNSEC
2008
129views more  IJNSEC 2008»
13 years 9 months ago
LAMAIDS: A Lightweight Adaptive Mobile Agent-based Intrusion Detection System
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
IJON
2006
91views more  IJON 2006»
13 years 9 months ago
Symmetry axis extraction by a neural network
This paper proposes a neural network model that extracts axes of symmetry from visual patterns. The input patterns can be line drawings, plane figures or gray-scaled natural image...
Kunihiko Fukushima, Masayuki Kikuchi
IJON
2006
189views more  IJON 2006»
13 years 9 months ago
Storing and restoring visual input with collaborative rank coding and associative memory
Associative memory in cortical circuits has been held as a major mechanism for content-addressable memory. Hebbian synapses implement associative memory efficiently when storing s...
Martin Rehn, Friedrich T. Sommer
JCM
2008
104views more  JCM 2008»
13 years 9 months ago
An OFDM Symbol Design for Reduced Complexity MMSE Channel Estimation
In this paper we revisit the minimum mean square error (MMSE) pilot-aided channel estimation for broadband orthogonal frequency division multiplexing (OFDM) systems. The careful de...
Carlos Ribeiro, Atílio Gameiro
JCP
2006
100views more  JCP 2006»
13 years 9 months ago
A Local Enumeration Protocol in Spite of Corrupted Data
We present a novel self-stabilizing version of Mazurkiewicz enumeration algorithm [1]. The initial version is based on local rules to enumerate nodes on an anonymous network. [2] p...
Brahim Hamid, Mohamed Mosbah