Intelligent Virtual Security System using Attention Mechanism
نویسندگان
چکیده
منابع مشابه
Power system security boundary visualization using intelligent techniques
Zhou, Guozhong, "Power system security boundary visualization using intelligent techniques " (1998). Retrospective Theses and Dissertations. Paper 11904. This manuscript has been reproduced from the microfihn master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter &ce, while others may be fix>m any type of computer pri...
متن کاملIntelligent Cardiac Monitoring System using Virtual Instrumentation Techniques
This paper describes the design of a portable, cheap and easy to handle microcontroller-based heart monitoring system using a Atmega32 model-based microcontroller and GLCD. The project is capable of detecting and distinguishing the normal heart signal from an abnormal one. A circuit was designed to convert the sound signals from the heart into electrical signals. The signal so obtained was then...
متن کاملAttention Enhancement System using Virtual Reality and EEG Biofeedback
Attention Deficit Hyperactivity Disorder (ADHD) is a childhood syndrome characterized by short attention span, impulsiveness, and hyperactivity, which often lead ? to learning disabilities and various behavioral problems. For the treatment of ADHD, medication and cognitive-behavior therapy is applied in recent years. Although psychostimulant medication has been widely used for many years, curre...
متن کاملAttention Based, Naive Strategies, for Guiding Intelligent Virtual Agents
Guiding the behaviour of Intelligent Virtual Agents so that a pleasant and productive interaction is established with the user has been the aim of a very large body of research work. In this paper we propose that by basing this guidance on a set of attention indicators it is possible to define strategies to effectively guide IVA’s behaviours.
متن کاملAn Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing network, thus they must be protected at different levels of the OSI model. At the physical layer they can be protected by lock-and-key, and at the data link they can be protected within VLANS (Virtual LANs). With the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ICST Transactions on Scalable Information Systems
سال: 2018
ISSN: 2032-9407
DOI: 10.4108/eai.13-4-2018.154473