This research introduces a general class of functions serving as generalized neuron models to be used in artificial neural networks. They are cast in the common framework of comp...
—A method for secure query processing in mobile databases has been presented in this paper. Mobile devices send queries to the server via point-to-point channels. The mobile data...
—Realistic motion and natural-looking simulations require a thorough understanding of human movement control strategies. This work presents an initial developed on virtual agents...
Antonio Benitez, Guillermo de los Santos, Daniel V...
Abstract—In any formal theory, a proof is a sequence of well formed formulas (wff). Here, we consider the digraph whose nodes are proofs and the edges are pairs of proofs such t...
— Intelligent Agents have originated a lot of discussion about what they are, and how they are different from general programs. We describe in this paper a new paradigm for intel...
— In this work, an hybrid, self-configurable, multilayered and evolutionary subsumption architecture for cognitive agents is developed. Each layer of the multilayered architectur...
—In previous works, we have presented the advantages of using a domain ontology and annotations on information retrieval as well as the translation problems between languages wit...
—A high driving capability CMOS buffer amplifier with high slew-rate, low power, and low offset voltage for high resolution TFT-LCD source drivers is proposed. Low power and high...
—Calculations of iron losses in the electrical machines are normally based on experimental characteristics of core material used in the machines. These methods with simplified ma...
Ahmad Darabi, Mohammad Ebrahim Ghazi, Hamid Lesani...