: In this paper we present research works on non-intuitive and low-efficient negotiations between agents in agent based system. We find recommendation techniques as a suitable meth...
Abstract. This paper evaluates feature extraction techniques in aspect of watermark synchronization. Most watermarking algorithms suffer from geometric distortion attacks that desy...
: We present a concept and implementation of a computational support for spatial memory management and describe its temporal evolution. Our essential idea is to use an immersible g...
: The aim of this study was to demonstrate the effectiveness of an adaptive neuro-fuzzy inference system (ANFIS) for the prediction of diesel spray penetration length in the cylind...
Shaun H. Lee, Robert J. Howlett, Simon D. Walters,...
Abstract. An energy-efficient power-aware design is highly desirable for digital signal processing functions that encounter a wide diversity of operating scenarios in battery-power...
Abstract. Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network service. In this paper, we propo...
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...