Search
Search Results
-
Genetic Algorithms Based Hybrid Intelligent Systems
The oldest branch of Evolutionary Computation, namely GA, is at the same time the used in real-world applications of HIS. Chapter 8 of the book tries... -
New Trends of Develo** Hybrid Intelligent Systems – AIS Hybridization and DNA-Hybridization
As already mentioned in Chap.1, the use of biologically inspired CI techniques play a crucial role for the hybridisation at any level of HIS features... -
Threshold ring signature: generic construction and logarithmic size instantiation
A ring signature is a variant of normal digital signature and protects the privacy of a specific signer in the sense that a ring signature can be...
-
Fuzzy Rules Extraction from Connectionist Structures
In the conjugate effort of building shells for Hybrid Intelligent Systems with a homogenous architecture, based on neural networks, a difficult task... -
Integration of Explicit and Implicit Knowledge in Hybrid Intelligent Systems
The introduction of modular networks into fuzzy systems provides new insights into the integration of explicit and implicit knowledge in a... -
Practical Implementation Aspects Regarding Real-World Application of Hybrid Intelligent Systems
This chapter is focussed on the application aspects of HISengineering. The main application areas of HIS are mentioned. A lot of outstanding... -
Intelligent Techniques and Computational Intelligence
The field of Intelligent Technologies (IT) or Computational Intelligence (CI) is mainly the result of an increasing merger of Fuzzy Systems(FS) or... -
Neuro-Fuzzy Integration in Hybrid Intelligent Systems
In the last fifteen years, hybrid neural systems have drawn increasing research interest. This approach has been successfully used in various areas,... -
Neuro-Fuzzy Based Hybrid Intelligent Systems for Fault Diagnosis
In the last ten years, the field of diagnosis has attracted the attention of many researchers, both from the technical area as well as from the... -
Why the use of domain-specific modeling in airworthy software requires new methods and how these might look like? (extended version)
The use of domain-specific modeling (DSM) in safety-critical avionics is rare, even though the ever-increasing complexity of avionics systems makes...
-
Applying constraint programming to minimal lottery designs
We develop and deploy a set of constraints for the purpose of calculating minimal sizes of lottery designs. Specifically, we find the minimum number...
-
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks
Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive...
-
Detecting mistakes in a domain model: a comparison of three approaches
Domain models are a fundamental part of software engineering, thus it is important for every software engineer to know the principles of domain...
-
FedSHE: privacy preserving and efficient federated learning with adaptive segmented CKKS homomorphic encryption
Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate...
-
Qualitative reasoning and cyber-physical systems: abstraction, modeling, and optimized simulation
Complex systems modeling and simulation are critical in many industrial and research fields, specifically to predict, prove, verify, and understand...
-
A privacy-preserving image retrieval scheme with access control based on searchable encryption in media cloud
With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud...
-
Improved homomorphic evaluation for hash function based on TFHE
Homomorphic evaluation of hash functions offers a solution to the challenge of data integrity authentication in the context of homomorphic...
-
An empirical study of reflection attacks using NetFlow data
Reflection attacks are one of the most intimidating threats organizations face. A reflection attack is a special type of distributed...
-
Distributed AgriFood Supply Chains
In Agrifood scenarios, where farmers need to ensure that their produce is safely produced, transported, and stored, they rely on a network of IoT...
-
Distributed Petri nets ROS
Verifying industrial robotic systems is a complex task because those systems are distributed and solely defined by their implementation instead of...