Sciweavers

CIS
2005
Springer
13 years 10 months ago
Distance Protection of Compensated Transmission Line Using Computational Intelligence
A new approach for protection of transmission line including TCSC is presented in this paper. The proposed method includes application of Fuzzy Neural Network for distance relaying...
S. R. Samantaray, Pradipta K. Dash, Ganapati Panda...
CIS
2005
Springer
13 years 10 months ago
An RLS-Based Natural Actor-Critic Algorithm for Locomotion of a Two-Linked Robot Arm
Recently, actor-critic methods have drawn much interests in the area of reinforcement learning, and several algorithms have been studied along the line of the actor-critic strategy...
Jooyoung Park, Jongho Kim, Daesung Kang
CIS
2005
Springer
13 years 10 months ago
Multimodal FeedForward Self-organizing Maps
Andrew P. Paplinski, Lennart Gustafsson
CIS
2005
Springer
13 years 10 months ago
Survivability Computation of Networked Information Systems
Abstract. Survivability should be considered beyond security for networked information systems, which emphasizes the ability of continuing providing services timely in malicious en...
Xuegang Lin, Rongsheng Xu, Miaoliang Zhu
CIS
2005
Springer
13 years 10 months ago
A Method for Automating the Extraction of Specialized Information from the Web
The World Wide Web can be viewed as a gigantic distributed database including millions of interconnected hosts some of which publish information via web servers or peer-to-peer sys...
Ling Lin, Antonio Liotta, Andrew Hippisley
CIS
2005
Springer
13 years 10 months ago
Moving Block Sequence and Organizational Evolutionary Algorithm for General Floorplanning
⎯A new nonslicing floorplan representation, the moving block sequence (MBS), is proposed in this paper. Our idea of the MBS originates from the observation that placing blocks on...
Jing Liu, Weicai Zhong, Licheng Jiao
CIS
2005
Springer
13 years 10 months ago
Multimedia Digital Right Management Using Selective Scrambling for Mobile Handset
Abstract. In this paper, we propose a novel solution called joint encryption, in which audio and video data are scrambled efficiently by using modified phase scrambling, modified...
Goo-Rak Kwon, Tea-Young Lee, Kyoung-Ho Kim, Jae-Do...
CIS
2005
Springer
13 years 10 months ago
Computational Intelligence for Network Intrusion Detection: Recent Contributions
Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the...
Asim Karim
CIS
2005
Springer
13 years 10 months ago
ID-Based Restrictive Partially Blind Signatures
Restrictive blind signatures allow a recipient to receive a blind signature on a message not known to the signer but the choice of message is restricted and must conform to certain...
Xiaofeng Chen, Fangguo Zhang, Shengli Liu