We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Genetic Algorithms Based Hybrid Intelligent Systems

    The oldest branch of Evolutionary Computation, namely GA, is at the same time the used in real-world applications of HIS. Chapter 8 of the book tries...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  2. New Trends of Develo** Hybrid Intelligent Systems – AIS Hybridization and DNA-Hybridization

    As already mentioned in Chap.1, the use of biologically inspired CI techniques play a crucial role for the hybridisation at any level of HIS features...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  3. Threshold ring signature: generic construction and logarithmic size instantiation

    A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...

    Huizhuo Wang, Yang Tao, Rui Zhang in Cybersecurity
    Article Open access 11 July 2024
  4. Fuzzy Rules Extraction from Connectionist Structures

    In the conjugate effort of building shells for Hybrid Intelligent Systems with a homogenous architecture, based on neural networks, a difficult task...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  5. Integration of Explicit and Implicit Knowledge in Hybrid Intelligent Systems

    The introduction of modular networks into fuzzy systems provides new insights into the integration of explicit and implicit knowledge in a...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  6. Practical Implementation Aspects Regarding Real-World Application of Hybrid Intelligent Systems

    This chapter is focussed on the application aspects of HISengineering. The main application areas of HIS are mentioned. A lot of outstanding...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  7. Intelligent Techniques and Computational Intelligence

    The field of Intelligent Technologies (IT) or Computational Intelligence (CI) is mainly the result of an increasing merger of Fuzzy Systems(FS) or...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  8. Neuro-Fuzzy Integration in Hybrid Intelligent Systems

    In the last fifteen years, hybrid neural systems have drawn increasing research interest. This approach has been successfully used in various areas,...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  9. Neuro-Fuzzy Based Hybrid Intelligent Systems for Fault Diagnosis

    In the last ten years, the field of diagnosis has attracted the attention of many researchers, both from the technical area as well as from the...
    Mircea Gh. Negoita, Daniel Neagu, Vasile Palade in Computational Intelligence
    Chapter
  10. Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)

    The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...

    Vanessa Tietz, Constantin Frey, ... Bjoern Annighoefer in Innovations in Systems and Software Engineering
    Article Open access 10 July 2024
  11. Applying constraint programming to minimal lottery designs

    We develop and deploy a set of constraints for the purpose of calculating minimal sizes of lottery designs. Specifically, we find the minimum number...

    David Cushing, David I. Stewart in Constraints
    Article Open access 09 July 2024
  12. End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks

    Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...

    Gourav Prateek Sharma, Wouter Tavernier, ... Ingrid Moerman in Journal of Network and Systems Management
    Article Open access 08 July 2024
  13. Detecting mistakes in a domain model: a comparison of three approaches

    Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...

    Prabhsimran Singh, Younes Boubekeur, Gunter Mussbacher in Innovations in Systems and Software Engineering
    Article 08 July 2024
  14. FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption

    Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate...

    Yao Pan, Zheng Chao, ... Wang Liming in Cybersecurity
    Article Open access 04 July 2024
  15. Qualitative reasoning and cyber-physical systems: abstraction, modeling, and optimized simulation

    Complex systems modeling and simulation are critical in many industrial and research fields, specifically to predict, prove, verify, and understand...

    Baptiste Gueuziec, Jean-Pierre Gallois, Frédéric Boulanger in Innovations in Systems and Software Engineering
    Article 04 July 2024
  16. A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud

    With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud...

    Miao Tian, Yushu Zhang, ... Wenying Wen in Cybersecurity
    Article Open access 03 July 2024
  17. Improved homomorphic evaluation for hash function based on TFHE

    Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...

    Benqiang Wei, **anhui Lu in Cybersecurity
    Article Open access 02 July 2024
  18. An empirical study of reflection attacks using NetFlow data

    Reflection attacks are one of the most intimidating threats organizations face. A reflection attack is a special type of distributed...

    Edward Chuah, Neeraj Suri in Cybersecurity
    Article Open access 01 July 2024
  19. Distributed AgriFood Supply Chains

    In Agrifood scenarios, where farmers need to ensure that their produce is safely produced, transported, and stored, they rely on a network of IoT...

    Hélio Pesanhane, Wesley R. Bezerra, ... Carlos Westphall in Journal of Network and Systems Management
    Article 27 June 2024
  20. Distributed Petri nets ROS

    Verifying industrial robotic systems is a complex task because those systems are distributed and solely defined by their implementation instead of...

    Sebastian Ebert, Johannes Mey, ... Uwe Aßmann in Innovations in Systems and Software Engineering
    Article Open access 25 June 2024
Did you find what you were looking for? Share feedback.