This article initiates a rigorous theoretical analysis of the computational power of circuits that employ modules for computing winner-take-all. Computational models that involve ...
This study employed WebAccess software to construct a remote graphic surveillance system, which was developed differently from previous remote monitoring systems. Advantech WebAcc...
1 Accurately locating edge points is important for image measurement. This paper describes an edge detection method based on back-propagation algorithm of neural networks. A three-...
It has been one of the great challenges of neuro-symbolic integration to represent recursive logic programs using neural networks of finite size. In this paper, we propose to imple...
Ekaterina Komendantskaya, Krysia Broda, Artur S. d...
In this paper we describe our approach to realize a pervasive (computing) learning environment for children based on augmented toys: traditional toys that are equipped with pervas...