The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a parallelized and pipelined architecture for a generalized Laguerre-Volterra MIMO system to identify the time-varying neural dynamics underlying spike activities. The proposed architecture consists of a first stage containing a vector convolution and MAC (Multiply and Accumulation) component, a second stage containing a pre-threshold potential updating unit with an error approximation...
This paper presented an approach for trust computing using fuzzy cognitive map and D-S evidence reasoning theory. As fuzzy inference can deal with variable dependencies in the system by decoupling dependable variables, FCM provides an efficient way to trust deducing, and also the difficulty and complexity of trust computing. The approach of DS evidence overcomes the problem of over-precision.
IT enterprises generally believe that there is still a certain knowledge and skill gap between the demand of enterprises and IT professionals trained by the colleges and universities in China. IT students face enormous pressure in employment after graduation. As IT enterprises are the end-user of IT students, tertiary institutes should be market-oriented and practice focused while training IT professionals...
This paper integrates QoS to trust model. An approach for trust computing using FCMs and D-S evidence theory are presented. Compared with existing models, our model has some main features. First, it eliminates malicious recommendation by considering QoS. Second, As fuzzy inference can deal with variable dependencies in the system by decoupling dependable variables, the FCMs approach provides an efficient...
Credibility theory of simulation application is an important brace of the body of knowledge (BOK) about discipline of simulation science and technology. Firstly, this article has established the credibility Theory of simulation application on the whole, which includes three parts, namely, the simulation credibility theory, the influencing factors analysis theory of simulation credibility and the simulation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.