Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Information Security Risk and Protective Measures of Computer Network in Big Data Age

    Along with the rapid development of Internet information technology, the field of network information technology has become more and more widely applied, and it is followed by the ‘‘big data era’’. Under the ...

    Lei Deng, Hai** Li, Fanchun Li in Artificial Intelligence Algorithms and Applications (2020)

  2. No Access

    Chapter and Conference Paper

    Active Optimal Fault-Tolerant Control Method for Multi-fault Concurrent Modular Manipulator Based on Adaptive Dynamic Programming

    In this paper, a novel active optimal fault-tolerant control (FTC) scheme is designed based on adaptive dynamic programming (ADP) for modular manipulator when sensor and actuator faults are concurrency. Firstl...

    Bing Li, Fan Zhou, Bo Dong, Yucheng Liu, Fu Liu in Advances in Neural Networks – ISNN 2019 (2019)

  3. No Access

    Chapter and Conference Paper

    Decentralized Robust Optimal Control for Modular Robot Manipulators Based on Zero-Sum Game with ADP

    In this paper, a decentralized robust zero-sum optimal control method is proposed for modular robot manipulators (MRMs) based on the adaptive dynamic programming (ADP) approach

    Bo Dong, Tianjiao An, Fan Zhou, Shenquan Wang in Advances in Neural Networks – ISNN 2019 (2019)

  4. No Access

    Chapter and Conference Paper

    Neuro-control of Nonlinear Systems with Unknown Input Constraints

    This paper establishes an adaptive dynamic programming algorithm based neuro-control scheme for nonlinear systems with unknown input constraints. The control strategy consists of an online nominal optimal cont...

    Bo Zhao, **nliang Liu, Derong Liu, Yuanchun Li in Neural Information Processing (2017)

  5. No Access

    Chapter and Conference Paper

    Masquerade Detection System Based on Principal Component Analysis and Radial Basics Function

    This article presents a masquerade detection system based on principal component analysis (PCA) and radial basics function (RBF) neural network. The system first creates a profile defining a normal user’s beha...

    Zhanchun Li, Zhitang Li, Yao Li, Bin Liu in Computational Intelligence and Security (2005)

  6. No Access

    Chapter and Conference Paper

    An Image Hiding Algorithm Based on Bit Plane

    In this paper, an image hiding method which used for hiding one secret image into multiple open images is addressed. The method is roughly divided into three steps. First, based on the correlations analysis, d...

    Bin Liu, Zhitang Li, Zhanchun Li in Computational Intelligence and Security (2005)