Skip to main content

Showing 1–32 of 32 results for author: Ghani, A

.
  1. arXiv:2403.17231  [pdf, other

    cs.RO cs.LG

    Dyna-LfLH: Learning Agile Navigation in Dynamic Environments from Learned Hallucination

    Authors: Saad Abdul Ghani, Zizhao Wang, Peter Stone, Xuesu Xiao

    Abstract: This paper presents a self-supervised learning method to safely learn a motion planner for ground robots to navigate environments with dense and dynamic obstacles. When facing highly-cluttered, fast-moving, hard-to-predict obstacles, classical motion planners may not be able to keep up with limited onboard computation. For learning-based planners, high-quality demonstrations are difficult to acqui… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: Submitted to International Conference on Intelligent Robots and Systems (IROS) 2024

  2. arXiv:2310.12957  [pdf, other

    nlin.PS hep-th

    Kink dynamics in a high-order field model

    Authors: Aliakbar Moradi Marjaneh, Vakhid A. Gani, Azam Ghaani, Kurosh Javidan, Alexander A. Malnev, Oleg V. Nagornov

    Abstract: We study various properties of topological solitons (kinks) of a field-theoretic model with a polynomial potential of the twelfth degree. This model is remarkable in that it has several topological sectors, in which kinks have different masses. We obtain asymptotic estimates for the kink-antikink and antikink-kink interaction forces. We also study numerically kink-antikink and antikink-kink collis… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

    Comments: 24 pages, 11 figures

  3. arXiv:2309.12599  [pdf, other

    nlin.PS math-ph

    Kinks scattering in deformed $\varphi^6$ model

    Authors: Aliakbar Moradi Marjaneh, Azam Ghaani, Kurosh Javidan

    Abstract: The deformed model $\tilde{\varphi}^{(6)}$ is introduced based on the $\varphi^4$ model using a deformation functional $F[\varphi]$ including a free parameter $a$. The kink solutions in different sectors and their internal modes are obtained as functions of the deformation parameter and their characteristics are evaluated as well. It is shown that the kinks of the deformed model inherit some of th… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: 25 pages, 8 figures

  4. Towards Smart Education through the Internet of Things: A Review

    Authors: Afzal Badshah, Anwar Ghani, Ali Daud, Ateeqa Jalal, Muhammad Bilal, Jon Crowcroft

    Abstract: IoT is a fundamental enabling technology for creating smart spaces, which can assist the effective face-to-face and online education systems. The transition to smart education (integrating IoT and AI into the education system) is appealing, which has a concrete impact on learners' engagement, motivation, attendance, and deep learning. Traditional education faces many challenges, including administ… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: 30 pages, 16 tables, 6 figures. This article is accepted for publication in ACM Computing Surveys

    ACM Class: K.3; A.1; J.4

  5. arXiv:2302.05878  [pdf, other

    nucl-ex astro-ph.HE

    Ordinary muon capture rates on $^{100}$Mo and $^{\rm nat}$Mo for astro-antineutrinos and double beta decays

    Authors: I. H. Hashim, H. Ejiri, N. N. A. M. A. Ghani, F. Othman, R. Razali, Z. W. Ng, T. Shima, D. Tomono, D. Zinatulina, M. Schirchenko, S. Kazartsev, A. Sato, Y. Kawashima, K. Ninomiya, K. Takahisa

    Abstract: \item[Background] The nuclear responses for antineutrinos associated with double beta decays (DBDs) and astro-antineutrino interactions are studied by measuring ordinary muon capture (OMC) rates. \item[Purpose]The experimental studies of absolute OMC rates and their mass number dependence for $^{100}$Mo and the natural Mo are currently of interest in astro-antineutrinos and DBDs. \item[Method]The… ▽ More

    Submitted 12 February, 2023; originally announced February 2023.

    Comments: 5 pages, 3 figures, 2 tables

    MSC Class: 00 ACM Class: F.2.2; G.3

  6. arXiv:2209.09617  [pdf, other

    cs.LG cs.AI math.PR q-bio.PE stat.ML

    Seq2Seq Surrogates of Epidemic Models to Facilitate Bayesian Inference

    Authors: Giovanni Charles, Timothy M. Wolock, Peter Winskill, Azra Ghani, Samir Bhatt, Seth Flaxman

    Abstract: Epidemic models are powerful tools in understanding infectious disease. However, as they increase in size and complexity, they can quickly become computationally intractable. Recent progress in modelling methodology has shown that surrogate models can be used to emulate complex epidemic models with a high-dimensional parameter space. We show that deep sequence-to-sequence (seq2seq) models can serv… ▽ More

    Submitted 10 March, 2023; v1 submitted 20 September, 2022; originally announced September 2022.

  7. Op2Vec: An Opcode Embedding Technique and Dataset Design for End-to-End Detection of Android Malware

    Authors: Kaleem Nawaz Khan, Najeeb Ullah, Sikandar Ali, Muhammad Salman Khan, Mohammad Nauman, Anwar Ghani

    Abstract: Android is one of the leading operating systems for smart phones in terms of market share and usage. Unfortunately, it is also an appealing target for attackers to compromise its security through malicious applications. To tackle this issue, domain experts and researchers are trying different techniques to stop such attacks. All the attempts of securing Android platform are somewhat successful. Ho… ▽ More

    Submitted 1 March, 2022; v1 submitted 10 April, 2021; originally announced April 2021.

  8. Depth lower bounds in Stabbing Planes for combinatorial principles

    Authors: Stefan Dantchev, Nicola Galesi, Abdul Ghani, Barnaby Martin

    Abstract: Stabbing Planes (also known as Branch and Cut) is a proof system introduced very recently which, informally speaking, extends the DPLL method by branching on integer linear inequalities instead of single variables. The techniques known so far to prove size and depth lower bounds for Stabbing Planes are generalizations of those used for the Cutting Planes proof system. For size lower bounds these a… ▽ More

    Submitted 10 January, 2024; v1 submitted 15 February, 2021; originally announced February 2021.

    Journal ref: Logical Methods in Computer Science (January 11, 2024) lmcs:10134

  9. arXiv:2012.03829  [pdf, ps, other

    nucl-th hep-ph hep-th

    Transverse expansion of (1 + 2) dimensional magneto-hydrodynamics flow with longitudinal boost invariance

    Authors: R. Emamian, A. F. Kord, A. Ghaani, B. Azadegan

    Abstract: In the present work, we investigate the effects of magnetic field on expanding hot and dense nuclear matter as an ideal fluid. We consider QGP, on the particular case of a (1 + 2) dimensional longitudinally boost-invariant fluid expansion, in the background of an inhomogeneous magnetic field that is generated by external sources. We assume the magnetic field points in the direction perpendicular t… ▽ More

    Submitted 6 August, 2021; v1 submitted 7 December, 2020; originally announced December 2020.

  10. arXiv:2008.02138  [pdf, ps, other

    cs.LO cs.CC

    Proof complexity and the binary encoding of combinatorial principles

    Authors: Stefan Dantchev, Nicola Galesi, Abdul Ghani, Barnaby Martin

    Abstract: We consider Proof Complexity in light of the unusual binary encoding of certain combinatorial principles. We contrast this Proof Complexity with the normal unary encoding in several refutation systems, based on Resolution and Integer Linear Programming. Please consult the article for the full abstract.

    Submitted 5 April, 2022; v1 submitted 4 August, 2020; originally announced August 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1809.02843, arXiv:1911.00403

  11. arXiv:2004.14439  [pdf, other

    cs.SI

    EER: Enterprise Expert Ranking using Employee Reputation

    Authors: Saba Mahmood, Anwar Ghani, Ali Daud, Syed Muhammad Saqlain

    Abstract: The emergence of online enterprises spread across continents have given rise to the need for expert identification in this domain. Scenarios that includes the intention of the employer to find tacit expertise and knowledge of an employee that is not documented or self-disclosed has been addressed in this article. The existing reputation based approaches towards expertise ranking in enterprises uti… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: 16 pages, 8 Figures, 6 Tables, 49 References

  12. arXiv:2004.11707  [pdf, other

    cs.DC

    Revenue Maximization Approaches in IaaS Clouds: Research Challenges and Opportunities

    Authors: Afzal Badshah, Anwar Ghani, Ali Daud, Anthony Theodore Chronopoulos, Ateeqa Jalal

    Abstract: Revenue generation is the main concern of any business, particularly in the cloud, where there is no direct interaction between the provider and the consumer. Cloud computing is an emerging core for today's businesses, however, Its complications (e.g, installation, and migration) with traditional markets are the main challenges. It earns more but needs exemplary performance and marketing skills. I… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: 28 Pages, 3 Figures, 5 Tables, 110 References

  13. arXiv:2004.11342  [pdf, other

    stat.AP q-bio.PE stat.ME

    Estimating the number of infections and the impact of non-pharmaceutical interventions on COVID-19 in European countries: technical description update

    Authors: Seth Flaxman, Swapnil Mishra, Axel Gandy, H Juliette T Unwin, Helen Coupland, Thomas A Mellan, Harrison Zhu, Tresnia Berah, Jeffrey W Eaton, Pablo N P Guzman, Nora Schmit, Lucia Callizo, Imperial College COVID-19 Response Team, Charles Whittaker, Peter Winskill, Xiaoyue Xi, Azra Ghani, Christl A. Donnelly, Steven Riley, Lucy C Okell, Michaela A C Vollmer, Neil M. Ferguson, Samir Bhatt

    Abstract: Following the emergence of a novel coronavirus (SARS-CoV-2) and its spread outside of China, Europe has experienced large epidemics. In response, many European countries have implemented unprecedented non-pharmaceutical interventions including case isolation, the closure of schools and universities, banning of mass gatherings and/or public events, and most recently, wide-scale social distancing in… ▽ More

    Submitted 23 April, 2020; originally announced April 2020.

  14. arXiv:2004.08948  [pdf, other

    cs.DC

    SOS: Socially Omitting Selfishness in IoT for Smart and Connected Communities

    Authors: Ghani ur Rehman, Anwar Ghani, Muhammad Zubair, Muhammad Imran Saeed, Dhananjay Singh

    Abstract: Smart and Connected Communities (SCC) is an emerging field of Internet of Things (IoT), and it is having potential applications to improve human life. The improvement may be in terms of preservation, revitalization, livability, and sustainability of a community. The resources of the nodes and devices in the SCC have certain constraints that may not allow the devices and nodes to cooperate to save… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

    Comments: 25 Pages, 7 Figures, 7 Tables, 55 References

  15. arXiv:2004.08698  [pdf, other

    cs.DC cs.NI

    Honesty Based Democratic Scheme to Improve Community Cooperation for IoT Based Vehicular Delay Tolerant Networks

    Authors: Ghani ur Rehman, Anwar Ghani, Muhammad Zubair, Shahbaz Ahmad Khan Ghayyure, Shad Muhammad

    Abstract: Many Internet of things (IoT) applications have been developed and implemented on unreliable wireless networks like the Delay tolerant network (DTN), however, efficient data transfer in DTN is still an important issue for the IoT applications. One of the application areas of DTN is Vehicular Delay Tolerant Network (VDTN) where the network faces communication disruption due to lack of end-to-end re… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

    Comments: 19 Pages, 5 Figures, 6 Tables, 55 References

  16. arXiv:2004.08441  [pdf, other

    cs.SI cs.DC

    Structuring Communities for Sharing Human Digital Memories in a Social P2P Network

    Authors: Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani

    Abstract: A community is sub-network inside P2P networks that partition the network into groups of similar peers to improve performance by reducing network traffic and high search query success rate. Large communities are common in online social networks than traditional file-sharing P2P networks because many people capture huge amounts of data through their lives. This increases the number of hosts bearing… ▽ More

    Submitted 17 April, 2020; originally announced April 2020.

    Comments: 13 Pages, 14 Figures, 39 References

  17. arXiv:2004.07618  [pdf, other

    cs.CR

    A Secure and Improved Multi Server Authentication Protocol Using Fuzzy Commitment

    Authors: Hafeez Ur Rehman, Anwar Ghani, Shehzad Ashraf Chaudhry, Mohammed H. Alsharif, Narjes Nabipour

    Abstract: Very recently, Barman et al. proposed a multi-server authentication protocol using fuzzy commitment. The authors claimed that their protocol provides anonymity while resisting all known attacks. In this paper, we analyze that Barman et al.'s protocol is still vulnerable to anonymity violation attack and impersonation based on the stolen smart attack; moreover, it has scalability issues. We then pr… ▽ More

    Submitted 16 April, 2020; originally announced April 2020.

    Comments: 19 Pages, 9 Figures, 3 Tables, 45 References

  18. arXiv:2004.06809  [pdf, other

    cs.NI cs.CR cs.DC

    Issues and challenges in Cloud Storage Architecture: A Survey

    Authors: Anwar Ghani, Afzal Badshah, Saeedullah Jan, Abdulrahman A. Alshdadi, Ali Daud

    Abstract: From home appliances to industrial enterprises, the Information and Communication Technology (ICT) industry is revolutionizing the world. We are witnessing the emergence of new technologies (e.g, Cloud computing, Fog computing, Internet of Things (IoT), Artificial Intelligence (AI) and Block-chain) which proves the growing use of ICT (e,g. business, education, health, and home appliances), resulti… ▽ More

    Submitted 12 July, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: 12 pages, 5 figures, The article may appear in a future issue of Researchpedia.info Journal of Computing Surveys

    Journal ref: Researchpedia Journal of Computing, Researchpedia.info, 2020, 1(1): 50-64

  19. arXiv:2004.04860  [pdf, other

    cs.HC

    Brain Interface Based Wheel Chair Control System for Handicap -- An advance and viable approach

    Authors: Mohtashim Baqar, Azfar Ghani, Azeem Aftab, Shahzad Karim Khawar

    Abstract: This paper presents advancement towards making an efficient and viable wheel chair control system based on brain computer interface via electro-oculogram (EOG) signals. The system utilizes the movement of eye as the element of purpose for controlling the movement of the wheel chair. Skin-surface electrodes are placed over skin for the purpose of acquiring the electro-oculogram signal and with the… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Comments: Journal Article

    Journal ref: Asian Journal of Engineering, Sciences & Technology . Mar2016, Vol. 6 Issue 1, p14-16. 3p

  20. arXiv:1911.05455  [pdf, ps, other

    nucl-th hep-th

    Analytical solution of magneto-hydrodynamics with acceleration effects of Bjorken expansion in heavy-ion collisions

    Authors: A. F. Kord, A. Ghaani, M. Haddadi Moghaddam

    Abstract: In this work, we study the 1+1 longitudinal acceleration expansion of hot and dense quark matter as a conducting relativistic fluid with the electric conductivity $σ$. The plasma has embedded in the presence of electric and magnetic fields which are perpendicular together in the transverse plane. In order to be more realistic, we generalize the Bjorken solution, which includes the acceleration eff… ▽ More

    Submitted 10 November, 2020; v1 submitted 12 November, 2019; originally announced November 2019.

  21. arXiv:1911.00403  [pdf, other

    cs.LO cs.CC

    Sherali-Adams and the binary encoding of combinatorial principles

    Authors: Stefan Dantchev, Abdul Ghani, Barnaby Martin

    Abstract: We consider the Sherali-Adams (SA) refutation system together with the unusual binary encoding of certain combinatorial principles. For the unary encoding of the Pigeonhole Principle and the Least Number Principle, it is known that linear rank is required for refutations in SA, although both admit refutations of polynomial size. We prove that the binary encoding of the Pigeonhole Principle require… ▽ More

    Submitted 1 November, 2019; originally announced November 2019.

  22. arXiv:1908.08166  [pdf, other

    nucl-ex hep-ex physics.ins-det

    Nuclear Isotope Production by Ordinary Muon Capture Reaction

    Authors: I. H. Hashim, H. Ejiri, F. Othman, F. Ibrahim, F. Soberi, N. N. A. M. A. Ghani, T. Shima, A. Sato, K. Ninomiya

    Abstract: Muon capture isotope production (MuCIP) using negative ordinary muon capture reactions (OMC) is used to efficiently produce various kinds of nuclear isotopes for both fundamental and applied science studies. The large capture probability of muon into a nucleus, together with the high intensity muon beam, make it possible to produce nuclear isotopes in the order of 10^{9-10} per second depending on… ▽ More

    Submitted 1 October, 2019; v1 submitted 21 August, 2019; originally announced August 2019.

    Comments: 21 pages, 5 figures

  23. arXiv:1807.11210  [pdf, ps, other

    math.DS

    Classification and study of a new class of $ ξ^{(as)} $-QSO

    Authors: Hamza Abd El-Qader, Ahmad Termimi Ab Ghani, Izzat Qaralleh

    Abstract: Many systems are presented using theory of nonlinear operators. A quadratic stochastic operator (QSO) is perceived as a nonlinear operator. It has a wide range of applications in various disciplines, such as mathematics, biology, and other sciences. The central problem that surrounds this nonlinear operator lies in the requirement that behavior should be studied. Nonlinear operators, even QSO (i.e… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

  24. arXiv:1712.10298  [pdf, ps, other

    hep-th

    Magnetohydrodynamic equations for cold quark gluon plasmas: Multi fluidity and Solitary wave stability

    Authors: Azam Ghaani, Kurosh Javidan

    Abstract: By means of magnetohydrodynamic equations in a non relativistic multi fluid framework, we study the behavior of small amplitude perturbations in cold Quark Gluon Plasmas (QGP). Magnetohydrodynamic equations, along with the QGP equation of state are expanded using the reductive perturbation method. It is shown that such a medium should be considered as multi fluid magnetohydrodynamic (MHD) system.… ▽ More

    Submitted 29 December, 2017; originally announced December 2017.

    Comments: 25 pages, 4 figures, 1 table

  25. Handling state space explosion in verification of component-based systems: A review

    Authors: Faranak Nejati, Abdul Azim Abd. Ghani, Ng Keng Yap, Azmi Jaafar

    Abstract: Component-based software development (CBSD) is an alternative approach to constructing software systems that offers numerous benefits, particularly in decreasing the complexity of system design. However, deploying components into a system is a challenging and error-prone task. Model-checking is one of the reliable methods to systematically analyze the correctness of a system. It is a bruce-force c… ▽ More

    Submitted 26 May, 2021; v1 submitted 28 July, 2017; originally announced September 2017.

    Journal ref: IEEEAccess, 2021

  26. arXiv:1411.5817  [pdf, ps, other

    astro-ph.HE hep-ph

    Stable solitary waves in Super dense plasmas at external magnetic fields

    Authors: Azam Ghaani, Kurosh Javidanyand, Mohsen Sarbishaei

    Abstract: Propagation of localized waves in a Fermi-Dirac distributed super dense matter at the presence of strong external magnetic fields is studied using the reductive perturbation method. Previous works indicate that localized waves break down in unmagnetized super dense hadronic matter. We have shown that stable solitons can be created in such non-relativistic fluids in the presence of an external magn… ▽ More

    Submitted 21 November, 2014; originally announced November 2014.

    Comments: 12 pages, 3 figures

    Journal ref: Astrophysics and Space Science, June 2015, 358:20

  27. arXiv:1402.6764  [pdf

    cs.SE cs.CL

    A method to identify potential ambiguous Malay words through Ambiguity Attributes map**: An exploratory Study

    Authors: Hazlina Haron, Abdul Azim Abd. Ghani

    Abstract: We describe here a methodology to identify a list of ambiguous Malay words that are commonly being used in Malay documentations such as Requirement Specification. We compiled several relevant and appropriate requirement quality attributes and sentence rules from previous literatures and adopt it to come out with a set of ambiguity attributes that most suit Malay words. The extracted Malay ambiguou… ▽ More

    Submitted 26 February, 2014; originally announced February 2014.

    Comments: Paper was presented at The Fourth International Conference of Computer Science and Information Technology (CCSIT2014)in Sydney, Australia on Feb 22, 2014

  28. arXiv:1302.2748  [pdf

    cs.SE

    A Systematic Literature Review on relationship between agile methods and Open Source Software Development methodology

    Authors: Taghi Javdani Gandomani, Hazura Zulzalil, Abdul Azim Abdul Ghani, Abu Bakar Md Sultan

    Abstract: Agile software development methods (ASD) and open source software development methods (OSSD) are two different approaches which were introduced in last decade and both of them have their fanatical advocators. Yet, it seems that relation and interface between ASD and OSSD is a fertile area and few rigorous studies have been done in this matter. Major goal of this study was assessment of the relatio… ▽ More

    Submitted 12 February, 2013; originally announced February 2013.

    Comments: 6 pages, 5 tables

    Journal ref: Taghi Javdani Gandomani, at al., A systematic literature review on relationship between agile SD and open source SD, International review on computers and software (IRECOS), 2012, Vol. 7, Issue 4, pp. 1602-1607

  29. arXiv:1302.2747  [pdf

    cs.SE

    Effective factors in agile transformation process from change management perspective

    Authors: Taghi Javdani Gandomani, Hazura Zulzalil, Abdul Azim Abdul Ghani, Abu Bakar Md. Sultan

    Abstract: After introducing agile approach in 2001, several agile methods were founded over the last decade. Agile values such as customer collaboration, embracing changes, iteration and frequent delivery, continuous integration, etc. motivate all software stakeholders to use these methods in their projects. The main issue is that for using these methods instead of traditional methods in software developmen… ▽ More

    Submitted 12 February, 2013; originally announced February 2013.

    Journal ref: Taghi Javdani Gandomani, et al., Effective factors in agile transformation process from change management perspective, 2nd Int. Conf. on Advance Information System, E-Education & Development (CAISED 2013), Jan. 2013, Kuala Lumpur, Malaysia

  30. arXiv:1301.5964  [pdf

    cs.SE

    On the Current Measurement Practices in Agile Software Development

    Authors: Taghi Javdani, Hazura Zulzalil, Abdul Azim Abd Ghani, Abu Bakar Md Sultan, Reza Meimandi Parizi

    Abstract: Agile software development (ASD) methods were introduced as a reaction to traditional software development methods. Principles of these methods are different from traditional methods and so there are some different processes and activities in agile methods comparing to traditional methods. Thus ASD methods require different measurement practices comparing to traditional methods. Agile teams often… ▽ More

    Submitted 24 January, 2013; originally announced January 2013.

    Comments: 7 pages

    Journal ref: Taghi Javdani , Hazura Zulzalil, Abd. Azim Abd. Ghani, Abubakar Md. Sultan, On the current measurement practices in agile software development, International Journal of Computer Science Issues, 2012, Vol. 9, Issue 4, No. 3, pp. 127-133

  31. arXiv:1012.5579   

    cs.CR

    The El-Gamal AA_β Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem

    Authors: Muhammad Rezal Kamel Ariffin, Arif Mandangan, Aniza Abdul Ghani, Kamel Ariffin Mohd Atan, Nor Azman Abu

    Abstract: The El-Gamal AA_β Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_β-function. The AA_β-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \equiv M^e (mod N) and M \equiv C^d (mod N) in the RSA cryptosystem. It w… ▽ More

    Submitted 14 February, 2011; v1 submitted 27 December, 2010; originally announced December 2010.

    Comments: There is a major flaw within the arguments such that the results are compromised

    MSC Class: 94A60; 68P25; 11D45

  32. arXiv:0807.2282  [pdf

    cs.NE cs.AI cs.CE

    Hardware/Software Co-Design for Spike Based Recognition

    Authors: Arfan Ghani, Martin McGinnity, Liam Maguire, Jim Harkin

    Abstract: The practical applications based on recurrent spiking neurons are limited due to their non-trivial learning algorithms. The temporal nature of spiking neurons is more favorable for hardware implementation where signals can be represented in binary form and communication can be done through the use of spikes. This work investigates the potential of recurrent spiking neurons implementations on rec… ▽ More

    Submitted 14 July, 2008; originally announced July 2008.

    Comments: 6 pages

    ACM Class: C.1.3