The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the main drawbacks in Real-time strategy (RTS) games is that the built-in artificial intelligence (or gamebots) tend to lag behind human players. To make gamebots perform like human players, gamebots should try to find best action from the Knowledge (training data) for each time-stamp and should be able to play game against every opponent. To achieve this end in this paper we propose a learning...
Recently, the operation of a new class of three-phase differential-mode inverter have been proposed and their efficacy demonstrated using a discontinuous-modulation-scheme (DMS) based differential-mode Ćuk inverter (DMCI). DMS-based DMCI has a completely-modular topological configuration. To extend this modularity of the power stage to control implementation, one has to deal with the nonlinearity...
Bloat is a problem that occurs when there is no advancement in fitness measure, but the size of the tree grows exponentially. Bloat eventually increases the time required to reach the optimal solution. To overcome this defect, Crossover and Mutation with Intelligence technique is proposed. We also used double tournament, in which we apply two tournaments on the basis of size and fitness respectively...
Computer Forensic process consists of Preparation, Acquisition, Preservation, Examination and Analysis, and Reporting. With the booming of the virtualization technology and the popularity of virtual machines for end users to deal with daily works, the probability of using virtual machines for malicious purposes keeps increasing. In this paper we propose a methodology by using virtual forensics for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.