• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 67
Next 10 →

Control Flow Obfuscation using Neural Network to Fight Concolic Testing?

by Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao, Haoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao, Chunfu Jia
"... Abstract. Concolic testing is widely regarded as the state-of-the-art technique in dynamic discovering and analyzing trigger-based behavior in software programs. It uses symbolic execution and an automatic the-orem prover to generate new concrete test cases to maximize code cover-age for scenarios l ..."
Abstract - Add to MetaCart
Abstract. Concolic testing is widely regarded as the state-of-the-art technique in dynamic discovering and analyzing trigger-based behavior in software programs. It uses symbolic execution and an automatic the-orem prover to generate new concrete test cases to maximize code cover-age for scenarios

systems using neural networks

by unknown authors , 2004
"... This paper presents a development and implementation of a PC-based maximum power point tracker (MPPT) for PV system using neural networks (NN). The system consists of a PV module via a MPPT supplying a dc motor that drives an air fan. The control algorithm is developed to use the artificial NN for d ..."
Abstract - Add to MetaCart
This paper presents a development and implementation of a PC-based maximum power point tracker (MPPT) for PV system using neural networks (NN). The system consists of a PV module via a MPPT supplying a dc motor that drives an air fan. The control algorithm is developed to use the artificial NN

A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows

by Ramkumar Chinchani, Eric Van Den Berg - In RAID , 2005
"... Abstract. A common way by which attackers gain control of hosts is through remote exploits. A new dimension to the problem is added by worms which use exploit code to self-propagate, and are becoming a commonplace occurrence. Defense mechanisms exist but popular ones are signature-based techniques w ..."
Abstract - Cited by 55 (0 self) - Add to MetaCart
which use known byte patterns, and they can be thwarted using polymorphism, metamorphism and other obfuscations. In this paper, we argue that exploit code is characterized by more than just a byte pattern because, in addition, there is a definite control and data flow. We propose a fast static analysis

Control of Subsonic Cavity Flows by Neural Networks – Analytical Models and Experimental Validation

by M. Ö. Efe, M. Debiasi, P. Yan, H. Özbay, M. Samimy
"... Flow control is attracting an increasing attention of researchers from a wide spectrum of specialties because of its interdisciplinary nature and the associated challenges. One of the main goals of The Collaborative Center of Control Science at The Ohio State University is to bring together research ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
researchers from different disciplines to advance the science and technology of flow control. This paper approaches the control of subsonic cavity flow, a study case we have selected, from a computational intelligence point of view, and offers a solution that displays an interconnected neural architecture

An Open Flow Controller Based on the Intercerebral Neural Network for Media Independent Handover

by Qiong Wu, Jun S Huang, Oliver Ww Yang
"... Copyright: © 2014 Wu Q, et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. This paper presents a novel open ..."
Abstract - Add to MetaCart
controller equation for the media independent handover that are mixed with the radial and sigmoid activation functions of the intercerebral neural network. Simulations based on the field experiment test data show that the system using the swarm intelligence algorithm is practical for the improvement

Exploring and Evolving Process-oriented Control for Real and Virtual Fire Fighting Robots

by Kathryn Hardey, Eren Corapcioglu, Molly Mattis, Mark Goadrich, Matthew Jadud
"... Current research in evolutionary robotics is largely focused on creating controllers by either evolving neural networks or refining genetic programs based on grammar trees. We propose the use of the dataflow languages for the construction of effective robotic controllers and the evolution of new con ..."
Abstract - Add to MetaCart
Current research in evolutionary robotics is largely focused on creating controllers by either evolving neural networks or refining genetic programs based on grammar trees. We propose the use of the dataflow languages for the construction of effective robotic controllers and the evolution of new

Mastitis detection in dairy cows using Neural Networks

by J. Krieter, D. Cavero, C. Henze
"... Abstract: The aim of the present research was to investigate the usefulness of neural networks (NN) in the early detection and control of mastitis in cows milked in an automatic milking system. A data set of 403,537 milkings involving 478 cows was used. Mastitis was determined according to udder tre ..."
Abstract - Add to MetaCart
Abstract: The aim of the present research was to investigate the usefulness of neural networks (NN) in the early detection and control of mastitis in cows milked in an automatic milking system. A data set of 403,537 milkings involving 478 cows was used. Mastitis was determined according to udder

Numerical Simulation of Neural Network-Controlled Unmanned Undersea Vehicle

by Ashraf S. Hussein - WSEAS Transactions on Circuits and Systems , 2003
"... Abstract:- In this paper, the locomotion of an autonomously navigated undersea vehicle that uses vorticity control propulsion is computationally simulated. The navigation procedure employs a set of vehicle geometric and state variables to predict the needed vehicle body deformations in order to pass ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
of unsteady flow standard test cases. Then, another set of properly planned test cases to cover the range of possible conditions were processed with the simulation and the output data was subsequently used to train a Multi-Layer Perceptron (MLP) neural network. The trained network can predict what body

An Emergency Department Simulation and a Neural Network Metamodel

by Lt Col Robert, Lt. Col, Robert A. Kilmer, Robert A. Kilmer, Alice E. Smith, Alice E. Smith, Larry J. Shuman, Larry J. Shuman
"... This paper describes a discrete event stochastic simulation of a hospital emergency department, and the development of a metamodel of that simulation. The metamodeling technique used is artificial neural networks, which are trained using the output of the simulation. The performance of the neural ..."
Abstract - Add to MetaCart
This paper describes a discrete event stochastic simulation of a hospital emergency department, and the development of a metamodel of that simulation. The metamodeling technique used is artificial neural networks, which are trained using the output of the simulation. The performance

Neural Control of Helicopter Blade-Vortex Interaction Noise

by unknown authors
"... Significant reduction of helicopter blade-vortex interaction (BVI) noise is currently one of the most advanced research topics in the helicopter industry. This is due to the complex flow, the close aerodynamic and structural coupling, and the interaction of the blades with the trailing edge vortices ..."
Abstract - Add to MetaCart
vortices. Analytical and numerical modelling techniques are therefore currently still far from a sufficient degree of accuracy to obtain satisfactory results using classical model based control concepts. Neural networks with a proven potential to learn nonlinear relationships implicitly encoded in a
Next 10 →
Results 1 - 10 of 67
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University