Journal articles on the topic 'False-self system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'False-self system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Klímová, Helena. "The False We – the False Collective Self – and the Social Unconscious in a Totalitarian System." Group Analysis 48, no. 2_suppl (May 26, 2015): 50–54. http://dx.doi.org/10.1177/0533316415583262j.
Full textSokolovsky, S. P., and A. P. Telenga. "METHODOLOGY FOR THE FORMATION OF INFORMATION SYSTEMS FALSE NETWORK TRAFFIC FOR PROTECTION AGAINST NETWORK RECONNAISSANCE." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 212 (February 2022): 40–47. http://dx.doi.org/10.14489/vkit.2022.02.pp.040-047.
Full textFatourechi, M., R. K. Ward, and G. E. Birch. "A self-paced brain–computer interface system with a low false positive rate." Journal of Neural Engineering 5, no. 1 (December 11, 2007): 9–23. http://dx.doi.org/10.1088/1741-2560/5/1/002.
Full textAmbawade, Dayanand, and Dr Jagdish W. Bakal. "Alert Clustering using Self-Organizing Maps and K-Means Algorithm." International Journal of Engineering and Advanced Technology 12, no. 1 (October 30, 2022): 82–87. http://dx.doi.org/10.35940/ijeat.a3852.1012122.
Full textValentino, Kristin, Dante Cicchetti, Fred A. Rogosch, and Sheree L. Toth. "True and false recall and dissociation among maltreated children: The role of self-schema." Development and Psychopathology 20, no. 1 (2008): 213–32. http://dx.doi.org/10.1017/s0954579408000102.
Full textHofmeyr, Steven A., and Stephanie Forrest. "Architecture for an Artificial Immune System." Evolutionary Computation 8, no. 4 (December 2000): 443–73. http://dx.doi.org/10.1162/106365600568257.
Full textAsante, Emmanuel, and Raphael Avornyo. "Enhancing Healthcare System in Ghana through Integration of Traditional Medicine." Journal of Sociological Research 4, no. 2 (October 9, 2013): 256. http://dx.doi.org/10.5296/jsr.v4i2.4224.
Full textBashashati, Ali, Rabab K. Ward, and Gary E. Birch. "Towards Development of a 3-State Self-Paced Brain-Computer Interface." Computational Intelligence and Neuroscience 2007 (2007): 1–8. http://dx.doi.org/10.1155/2007/84386.
Full textMina Qaisar, Saeed, Dija Sidiya, Mohammad Akbar, and Abdulhamit Subasi. "An Event-Driven Multiple Objects Surveillance System." International journal of electrical and computer engineering systems 9, no. 1 (2018): 35–44. http://dx.doi.org/10.32985/ijeces.9.1.2.
Full textZhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing." Wireless Communications and Mobile Computing 2022 (June 9, 2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Full textWang, Jianqin, Henry Otgaar, Mark L. Howe, and Sen Cheng. "Self-referential false associations: A self-enhanced constructive effect for verbal but not pictorial stimuli." Quarterly Journal of Experimental Psychology 74, no. 9 (April 16, 2021): 1512–24. http://dx.doi.org/10.1177/17470218211009772.
Full textMa, Jian Hong, and Li Xia Ji. "Research of Network Monitoring Management System Based on Artificial Immune." Advanced Materials Research 648 (January 2013): 285–88. http://dx.doi.org/10.4028/www.scientific.net/amr.648.285.
Full textLuo, Huai Lin, Ling Yu Zhang, and Quan Yuan. "Self-Adapting Function Principle and Creative Design of BFT Type." Applied Mechanics and Materials 397-400 (September 2013): 830–32. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.830.
Full textMehrer, Helmut. "Self-Diffusion, Solute-Diffusion and Interdiffusion in Binary Intermetallics." Diffusion Foundations 2 (September 2014): 1–72. http://dx.doi.org/10.4028/www.scientific.net/df.2.1.
Full textGuo, Guang Feng. "The Study of the Ontology and Context Verification Based Intrusion Detection Model." Applied Mechanics and Materials 644-650 (September 2014): 3338–41. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3338.
Full textMcMahon, Sean, and Julie Cosmidis. "False biosignatures on Mars: anticipating ambiguity." Journal of the Geological Society 179, no. 2 (November 16, 2021): jgs2021–050. http://dx.doi.org/10.1144/jgs2021-050.
Full textMao, Jiang Kun, and Fan Zhan. "Study on Intrusion Detection System Based on Data Mining." Applied Mechanics and Materials 713-715 (January 2015): 2499–502. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2499.
Full textWHITEN, BILL. "A SIMPLE ALGORITHM FOR DEDUCTION." ANZIAM Journal 51, no. 1 (July 2009): 102–22. http://dx.doi.org/10.1017/s1446181109000352.
Full textPerhinschi, M. G., H. Moncayo, B. Wilburn, J. Wilburn, O. Karas, and A. Bartlett. "Neurally-augmented immunity-based detection and identification of aircraft sub-system failures." Aeronautical Journal 118, no. 1205 (July 2014): 775–96. http://dx.doi.org/10.1017/s0001924000009532.
Full textMoncayo, H., M. G. Perhinschi, and J. Davis. "Aircraft failure detection and identification over an extended flight envelope using an artificial immune system." Aeronautical Journal 115, no. 1163 (January 2011): 43–55. http://dx.doi.org/10.1017/s0001924000005352.
Full textChen, Jing, Scott Mishler, and Bin Hu. "Conveying Automation Reliability and Automation Error Type An Empirical Study in the Cyber Domain." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (September 2018): 172–73. http://dx.doi.org/10.1177/1541931218621040.
Full textKernohan, Andrew. "Capitalism and Self-Ownership." Social Philosophy and Policy 6, no. 1 (1988): 60–76. http://dx.doi.org/10.1017/s0265052500002685.
Full textEpstein, Ziv, Nicolo Foppiani, Sophie Hilgard, Sanjana Sharma, Elena Glassman, and David Rand. "Do Explanations Increase the Effectiveness of AI-Crowd Generated Fake News Warnings?" Proceedings of the International AAAI Conference on Web and Social Media 16 (May 31, 2022): 183–93. http://dx.doi.org/10.1609/icwsm.v16i1.19283.
Full textAldhaheri, Sahar, Daniyal Alghazzawi, Li Cheng, Bander Alzahrani, and Abdullah Al-Barakati. "DeepDCA: Novel Network-Based Detection of IoT Attacks Using Artificial Immune System." Applied Sciences 10, no. 6 (March 11, 2020): 1909. http://dx.doi.org/10.3390/app10061909.
Full textLiao, Jianfeng. "An Intrusion Detection Model Based on Improved ACGAN in Big Data Environment." Security and Communication Networks 2022 (May 9, 2022): 1–9. http://dx.doi.org/10.1155/2022/6821174.
Full textChen, Yunbing, Xin Tian, Kai Fan, Yanni Zheng, Nannan Tian, and Ka Fan. "The Value of Artificial Intelligence Film Reading System Based on Deep Learning in the Diagnosis of Non-Small-Cell Lung Cancer and the Significance of Efficacy Monitoring: A Retrospective, Clinical, Nonrandomized, Controlled Study." Computational and Mathematical Methods in Medicine 2022 (March 22, 2022): 1–8. http://dx.doi.org/10.1155/2022/2864170.
Full textChen, Zhen Guo, Guang Hua Zhang, Li Qin Tian, and Zi Lin Geng. "Intrusion Detection Based on Self-Organizing Map and Artificial Immunisation Algorithm." Key Engineering Materials 439-440 (June 2010): 29–34. http://dx.doi.org/10.4028/www.scientific.net/kem.439-440.29.
Full textErokhin, Victor V., and Larisa S. Pritchina. "Analysis and improvement of methods for detecting shellcodes in computer systems." Journal Of Applied Informatics 16, no. 92 (April 30, 2021): 103–22. http://dx.doi.org/10.37791/2687-0649-2021-16-2-103-122.
Full textJiang, Ya Ping, Jun Wei Zhao, and Yue Xia Tian. "A Model of Detector Generation Based on Immune Recognition and Redundancy Optimization." Applied Mechanics and Materials 457-458 (October 2013): 783–87. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.783.
Full textParini, Sergio, Luca Maggi, Anna C. Turconi, and Giuseppe Andreoni. "A Robust and Self-Paced BCI System Based on a Four Class SSVEP Paradigm: Algorithms and Protocols for a High-Transfer-Rate Direct Brain Communication." Computational Intelligence and Neuroscience 2009 (2009): 1–11. http://dx.doi.org/10.1155/2009/864564.
Full textFerrag, Mohamed Amine, and Leandros Maglaras. "DeliveryCoin: An IDS and Blockchain-Based Delivery Framework for Drone-Delivered Services." Computers 8, no. 3 (August 6, 2019): 58. http://dx.doi.org/10.3390/computers8030058.
Full textGreer, Jasmine M., Kendall J. Burdick, Arman R. Chowdhury, and Joseph J. Schlesinger. "Dynamic Alarm Systems for Hospitals (D.A.S.H.)." Ergonomics in Design: The Quarterly of Human Factors Applications 26, no. 4 (August 7, 2018): 14–19. http://dx.doi.org/10.1177/1064804618769186.
Full textHu, H. B., W. L. Luo, S. X. Liu, and Y. M. Zhang. "Design of a New Fire Detection and Alarm System Based on Self-Organizing Wireless Sensor Networks." Applied Mechanics and Materials 52-54 (March 2011): 1142–46. http://dx.doi.org/10.4028/www.scientific.net/amm.52-54.1142.
Full textLang, David J., Yaser Wafai, Ramez M. Salem, Edward A. Czinn, Ayman A. Halim, and Anis Baraka. "Efficacy of the Self-inflating Bulb in Confirming Tracheal Intubation in the Morbidly Obese." Anesthesiology 85, no. 2 (August 1, 1996): 246–53. http://dx.doi.org/10.1097/00000542-199608000-00004.
Full textAlbrecht, Christian Rudolf, Jenny Behre, Eva Herrmann, Stefan Jürgens, and Uwe Stilla. "Investigation on Robustness of Vehicle Localization Using Cameras and LiDAR." Vehicles 4, no. 2 (May 12, 2022): 445–63. http://dx.doi.org/10.3390/vehicles4020027.
Full textda Silva, Rafael Luiz, Boxuan Zhong, Yuhan Chen, and Edgar Lobaton. "Improving Performance and Quantifying Uncertainty of Body-Rocking Detection Using Bayesian Neural Networks." Information 13, no. 7 (July 12, 2022): 338. http://dx.doi.org/10.3390/info13070338.
Full textAli, Imran, Muhammad Asif, Muhammad Riaz Ur Rehman, Danial Khan, Huo Yingge, Sung Jin Kim, YoungGun Pu, Sang-Sun Yoo, and Kang-Yoon Lee. "A Highly Reliable, 5.8 GHz DSRC Wake-Up Receiver with an Intelligent Digital Controller for an ETC System." Sensors 20, no. 14 (July 19, 2020): 4012. http://dx.doi.org/10.3390/s20144012.
Full textLane, Riki. "Trans as Bodily Becoming: Rethinking the Biological as Diversity, Not Dichotomy." Hypatia 24, no. 3 (December 2008): 136–57. http://dx.doi.org/10.1111/j.1527-2001.2009.01049.x.
Full textSalánki, Dániel, and Kornél Sarvajcz. "Development of a Gait Recognition System in NI LabVIEW Programming Language." Műszaki Tudományos Közlemények 11, no. 1 (October 1, 2019): 167–70. http://dx.doi.org/10.33894/mtk-2019.11.37.
Full textRehman, Fiza Ur, Arshad Farid, Shefaat Ullah Shah, Muhammad Junaid Dar, Asim Ur Rehman, Naveed Ahmed, Sheikh Abdur Rashid, et al. "Self-Emulsifying Drug Delivery Systems (SEDDS): Measuring Energy Dynamics to Determine Thermodynamic and Kinetic Stability." Pharmaceuticals 15, no. 9 (August 26, 2022): 1064. http://dx.doi.org/10.3390/ph15091064.
Full textChristyawan, Tomi Yahya, Ahmad Afif Supianto, and Wayan Firdaus Mahmudy. "Anomaly-based intrusion detector system using restricted growing self organizing map." Indonesian Journal of Electrical Engineering and Computer Science 13, no. 3 (March 1, 2019): 919. http://dx.doi.org/10.11591/ijeecs.v13.i3.pp919-926.
Full textMuzammel, Muhammad, Mohd Zuki Yusoff, Mohamad Naufal Mohamad Saad, Faryal Sheikh, and Muhammad Ahsan Awais. "Blind-Spot Collision Detection System for Commercial Vehicles Using Multi Deep CNN Architecture." Sensors 22, no. 16 (August 15, 2022): 6088. http://dx.doi.org/10.3390/s22166088.
Full textAhmad, Malik Anas, Yasar Ayaz, Mohsin Jamil, Syed Omer Gillani, Muhammad Babar Rasheed, Muhammad Imran, Nadeem Ahmed Khan, Waqas Majeed, and Nadeem Javaid. "Comparative Analysis of Classifiers for Developing an Adaptive Computer-Assisted EEG Analysis System for Diagnosing Epilepsy." BioMed Research International 2015 (2015): 1–14. http://dx.doi.org/10.1155/2015/638036.
Full textD'AOUST, J. Y., and A. M. SEWELL. "Reliability of the Immunodiffusion 1–2 Test™ System for Detection of Salmonella in Foods." Journal of Food Protection 51, no. 11 (November 1, 1988): 853–56. http://dx.doi.org/10.4315/0362-028x-51.11.853.
Full textNG, E. Y. K., COLIN CHONG, and G. J. L. KAW. "CLASSIFICATION OF HUMAN FACIAL AND AURAL TEMPERATURE USING NEURAL NETWORKS AND IR FEVER SCANNER: A RESPONSIBLE SECOND LOOK." Journal of Mechanics in Medicine and Biology 05, no. 01 (March 2005): 165–90. http://dx.doi.org/10.1142/s0219519405001370.
Full textZou, Li Kun, Shao Kun Liu, and Guo Fu Ma. "Intrusion Detection Model Based on Improved Genetic Algorithm Neural Network in Computer Integrated Process System." Applied Mechanics and Materials 380-384 (August 2013): 2708–11. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2708.
Full textSaleh, Abdul Jabbar, Asif Karim, Bharanidharan Shanmugam, Sami Azam, Krishnan Kannoorpatti, Mirjam Jonkman, and Friso De Boer. "An Intelligent Spam Detection Model Based on Artificial Immune System." Information 10, no. 6 (June 12, 2019): 209. http://dx.doi.org/10.3390/info10060209.
Full textZhang, Yi-Ying, Jing Shang, Xi Chen, and Kun Liang. "A Self-Learning Detection Method of Sybil Attack Based on LSTM for Electric Vehicles." Energies 13, no. 6 (March 16, 2020): 1382. http://dx.doi.org/10.3390/en13061382.
Full textLi, Miao, and Wei Xin Ren. "Negative Selection Algorithm Using Natural Frequency for Novelty Detection under Temperature Variations." Advanced Materials Research 163-167 (December 2010): 2747–50. http://dx.doi.org/10.4028/www.scientific.net/amr.163-167.2747.
Full textHafaifa, Ahmed, Ferhat Laaouad, and Kouider Laroussi. "Fuzzy modeling and control for detection and isolation of surge in industrial centrifugal compressors." Journal of Automatic Control 19, no. 1 (2009): 19–26. http://dx.doi.org/10.2298/jac0901019h.
Full text