Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
As computer network technology becomes increasingly complex, it becomes necessary to place greater requirements on the validity of developing standards and the resulting technology...
We review a neuroplanner architecture for use in constructing subcognitive controllers and new application that uses it. These controllers have wo important properties: (1) the ab...
Abstract--In this work, we study how continuous video monitoring and intelligent video processing can be used in eldercare to assist the independent living of elders and to improve...
Zhongna Zhou, Xi Chen, Yu-Chia Chung, Zhihai He, T...
Abstract. Existing legged robots lack energy-efficiency, performance and adaptivity when confronted with situations that animals cope with on a routine basis. Bridging the gap bet...
Katayon Radkhah, Stefan Kurowski, Thomas Lens, Osk...