Поиск по всему репозиторию:

    • Algorithm for calculating the mutual correlation function for a video surveillance system 

      Sadykhov, Rauf Khosrovovich; Lamovsky, D. V. (BrSTU, 2006)
      This paper describes a new algorithm to calculate cross-correlation function. We combined box filtering technique for calculation of cross correlation coefficients with parallel processing using MMX/SSE technology of modem general purpose processors. We have used this algorithm for real time optical ...

      2023-11-27

    • Analysis of approaches to design voice conversion systems 

      Thai Trung Kien (BrSTU, 2006)
      Analysis of approaches to design voice conversion systems is proposed in this paper. Base on analysis we give principles of voice conversion system, speech modes will be used to represent parameters of speech signal and acoustic characteristics will influence the quality of system. Moreover, we compare ...

      2023-11-27

    • Computer-aided technique for defect and project rules inspection on PCB layout image 

      Doudkin, Alexander; Inyutin, Alexander (BrSTU, 2006)
      A technique o f PCB layout optical inspection based on image comparison and mathematical morphology methods is proposed. The unique feature of the technique is that the inspection is performed at different stages of image processing. The presence of all layout elements is checked up, then positions ...

      2023-11-28

    • Simulation Modelling of Neural Control System for Coal Mine Ventilation 

      Turchenko, Iryna; Kochan, VoIodymyr; Sachenko, Anatoly (BrSTU, 2006)
      In this paper it is developed simple simulation model of a mine section in order to model sequential neural control scheme of the mine airflow. A technique of neural network's training set forming, neural network structure and a training algorithm are described. The results of simulation modeling of ...

      2023-11-28

    • An Artificial Neural Network Based Approach to Mass Biometry Dilemma Taking advantage from IBM ZISC-036 Neuro-Processor Based Massively Parallel Implementation 

      Kurosh Madani; Abdennasser Chebira; Damien Langlois (BrSTU, 2006)
      Over the recent past years, new public security tendency to fit up public areas with biometric devices has emerged new requirements in biometric recognition dealing with what we call here "mass biometry". Ifthe main goal in "individual biometry" is to authenticate and/or identify an undesired individual ...

      2023-11-28

    • A Fuzzy-CMAC Based Hybrid Intuitive Approach for Biped Robot’s Adaptive Dynamic Walking 

      Sabourin, Christophe; Kurosh Madani; Bruneau, Olivier (BrSTU, 2006)
      In this paper, we have proposed a new neural network based hybrid intuitive approach for biped robot's adaptive walking. Our approach takes advantage on the one hand from a Fuzzy-CMAC based stage and on the other hand from high level intuitive control strategy involving only the regulation of the ...

      2023-11-28

    • Modular Neurocontroller for a Sensor-Driven Reactive Behavior of Biologically Inspired Walking Machines 

      Manoonpong, Poramate; Pasemann, Frank; Roth, Hubert (BrSTU, 2006)
      In this article, a modular neurocontroller is presented. It has the capability to generate a reactive behavior of walking machines. The neurocontroller is formed on the basis of a modular structure. It consists of the three different functionality modules: neural preprocessing, a neural oscillator ...

      2023-11-29

    • Neural Network Techniques for Intrusion Detection 

      Golovko, Vladimir; Vaitsekhovich, Leanid (BrSTU, 2006)
      This paper presents the neural network approaches for building of intrusion detection system (IDS). Existing intrusion detection approaches have same limitations, namely low detection time and recognition accuracy. In order to overcome these limitations we propose several neural network systems for ...

      2023-11-29

    • A Steganographic Method Using Learning Vector Quantization 

      Gorbashkо, Larisa; Golovko, Vladimir (BrSTU, 2006)
      The new technique for embedding image data is presented. The message is subjects to vector quantizer by neural network. The modified data is inserted into the coiner in the wavelet transform domain. The vector quantization enables to increase the capacity of embedded data. The experimental results ...

      2023-11-29

    • How Many Parachutists will be Needed to Find a Needle in a Pastoral? 

      Akira Imada (BrSTU, 2006)
      This article is a consideration on computer network intrusion detection using artificial neural networks, or whatever else using machine learning techniques. We assume an intrusion to a network is like a needle in a haystack not like a family of iris flower, and we consider how an attack can be detected ...

      2023-11-29

    • Artificial Immune Systems for Information Security: Comparative Analysis of Negative and Positive Selections 

      Bezobrazov, Sergei (BrSTU, 2006)
      The artificial immune system is a new, perspective system for protection of computer systems from viruses. Training and selection of detectors is necessary in artificial immune system, as it prevents break-in of unnecessary detectors. This paper presents comparative analysis of two methods detectors ...

      2023-11-29

    • Fusion of Detectors on the Basis of Recirculation Neural Networks for Intrusion Detection 

      Kochurko, Pavel (BrSTU, 2006)
      The identification of attack class plays great role in intrusion detection. In this paper the method of recognition of a class of attack by means of the cumulative classifier with nonlinear recirculation neural networks as private detectors is described, strategy of detector selection – by a relative ...

      2023-11-29

    • Modular Connectionist Systems: Toward Higher Level Intelligent Functions 

      Kurosh Madani (BrSTU, 2006)
      Recent advances in “neurobiology" allowed highlighting some of key mechanisms of animal intelligence. Among them one can emphasizes brain’s “modular" structure and its ".self-organizing” capabilities. The main goal of this paper is to show how these primary supplies could be exploited and combined in ...

      2023-11-29

    • Applying Natural Computation to Real World Business – Selected Highlights from Cercia 

      Frayn, Colin M. (BrSTU, 2006)
      Bringing cutting-edge natural computation research into industry is a challenging task, with numerous obstacles to overcome. In this paper I describe a few selected projects that we have developed at the Centre of Excellence for Research in Computational Intelligence and Applications (Cercia) and I ...

      2023-11-29

    • Information-Based Algorithmic Design 

      Hiromoto, Robert E.; Manic, Milos (BrSTU, 2006)
      An information-based design principle is presented that provides a framework for the design of both parallel and sequential algorithms. In this presentation, the notion of information (data) organization and canonical separation are examined and used in the design of an iterative line method for pattern ...

      2023-11-29

    • Artificial Intelligence and Neural Networks The Legacy of Alan Turing and John von Neumann 

      Muehlenbein, Heinz (BrSTU, 2006)
      The work of Alan Turing and John von Neumann on machine intelligence and artificial automata is reviewed. Turing's proposal to create a child machine with the ability to Ieam is discussed. Von Neumann's had doubts that with teacher based learning it will be possible to create artificial intelligence. ...

      2023-11-29