Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
This paper presents a novel architecture for on-chip neural network training using particle swarm optimization (PSO). PSO is an evolutionary optimization algorithm with a growing ...
Amin Farmahini Farahani, Seid Mehdi Fakhraie, Saee...
As the second generation of electronic commerce, the framework of agent based commerce is proposed. Since the communication messages and solution methods of agents are significant...
—The role of a compliant motion scheme is to control a robot manipulator in contact with its environment. By accommodating with the interaction force, the manipulator can be used...
Many important physiological processes operate at time and space scales far beyond those accessible to atom-realistic simulations, and yet discrete stochastic rather than continuum...
Rex A. Kerr, Thomas M. Bartol, Boris Kaminsky, Mar...