Wireless sensor networks are often used by experts in many different fields to gather data pertinent to their work. Although their expertise may not include software engineering, ...
Alan Dearle, Dharini Balasubramaniam, Jonathan Lew...
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Abstract. In psychology the ‘A not B’ error, whereby infants perseverate in reaching to the location where a toy was previously hidden after it has been moved to a new location...
The objective herein is to demonstrate the feasibility of a real-time digital control of an inverted pendulum for modeling and control, with emphasis on nonlinear auto regressive m...
This paper reports work done to improve the modeling of complex processes when only small experimental data sets are available. Neural networks are used to capture the nonlinear un...
W. D. Wan Rosli, Z. Zainuddin, R. Lanouette, S. Sa...