In this paper, a neuro-fuzzy algorithm has been implemented to improve the path planning of a mobile robot based on modification of vector field histogram (VFH) approach using neu...
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Classical models for motion detection with artificial neural networks are inspired in physiological data of simple visual systems. Local speed estimationis a problem that involves...
Francisco J. Vico, F. J. Garrido, Francisco Sandov...
Reservoir Computing (RC) techniques use a fixed (usually randomly created) recurrent neural network, or more generally any dynamic system, which operates at the edge of stability,...
Eric A. Antonelo, Benjamin Schrauwen, Dirk Strooba...
Abstract. Intracellular recordings obtained under cutaneous and lemniscal stimulation show that the afferent fibers can establish excitatory and inhibitory synaptic connections w...