Sciweavers

6796 search results - page 1062 / 1360
» Java for Embedded Systems
Sort
View
IJON
2006
111views more  IJON 2006»
15 years 4 months ago
Applications of multi-objective structure optimization
We present an application of multi-objective evolutionary optimization of feed-forward neural networks (NN) to two real world problems, car and face classification. The possibly co...
Alexander Gepperth, Stefan Roth
IJON
2006
68views more  IJON 2006»
15 years 4 months ago
Dendritic cable with active spines: A modelling study in the spike-diffuse-spike framework
The spike-diffuse-spike (SDS) model describes a passive dendritic tree with active dendritic spines. Spine-head dynamics is modelled with a simple integrate-and-fire process, whil...
Yulia Timofeeva, Gabriel J. Lord, Stephen Coombes
JDCTA
2008
535views more  JDCTA 2008»
15 years 4 months ago
Steganography: DCT Coefficients Reparation Technique in JPEG Image
Due to the ever-growing usage of the computer, it has led to a rapid increment in the data that is being exchanged, published and stored in an assortment of digital form. This phe...
Chiew Kang Leng, Jane Labadin, Sarah Flora Samson ...
JUCS
2008
143views more  JUCS 2008»
15 years 4 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
KES
2008
Springer
15 years 4 months ago
Aware Group Home Enhanced by RFID Technology
Abstract. In Japan, a Group Home which offers home-based care service for elderly persons who suffer from dementia have been increased. Even though the small community of the home ...
Motoki Miura, Sadanori Ito, Ryozo Takatsuka, Susum...
« Prev « First page 1062 / 1360 Last » Next »