: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Since the classical work of D. O. Hebb [1] it has been assumed that synaptic plasticity solely depends on the activity of the pre- and the postsynaptic cell. Synapses influence th...
This paper explores the computational capacity of a novel local computational model that expands the conventional analogical and logical dynamic neural models, based on the charge ...
Neurotransmitter fields differ from neural fields in the underlying principle that the state variables are not the neuron action potentials, but the chemical concentration of neuro...
We present a novel approach to fully automated delineation of tree structures in noisy 2D images and 3D image stacks. Unlike earlier methods that rely mostly on local evidence, ou...