2020
DOI: 10.1016/j.future.2020.03.017
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive-inspired Computing: Advances and Novel Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…The key characteristics of cognitive-inspired computing were explained in [26] for resolving the security and privacy issues. An intelligent data fusion algorithm based on hybrid delayaware clustering (HDC) was presented in [27].…”
Section: A Related Workmentioning
confidence: 99%
“…The key characteristics of cognitive-inspired computing were explained in [26] for resolving the security and privacy issues. An intelligent data fusion algorithm based on hybrid delayaware clustering (HDC) was presented in [27].…”
Section: A Related Workmentioning
confidence: 99%
“…Zhu et al proposed that with the development of computing and interactive systems inspired by cognition, cognition is becoming a new and promising methodology, which makes a large number of applications possible and is of great significance to changing our lives. How to apply machine learning, intelligent interaction, and cognitive science to APP design to improve human cognitive ability is worthy of deep consideration and exploration [ 8 ]. The abovementioned documents describe the technical points of the key technologies involved are very accurate, and the depth of research on some technologies is also involved to a considerable extent.…”
Section: Introductionmentioning
confidence: 99%
“…Secondly, it is assumed that the symbol period of the DFH-OFDM bi-directional modulation signal is T , and the frequency point detection is performed on the result of the FFT processing, the OFDM subcarrier set used for transmitting the data symbols at the time t is obtained, as shown in the formula (5). A schematic diagram of FFTbased subcarrier frequency detection is shown in Fig.…”
Section: A Two-dimensional New Communication Technology Working Mechmentioning
confidence: 99%
“…It cooperatively senses, collects, processes and transmits the information of the perceived objects in the geographical area, and finally sends the information to the owner of the network [2], [3]. With the rapid development of Internet of things technology, future computer systems and wireless sensor networks, networked munitions emerge as the times require and play a crucial role in the battlefield [4], [5]. Networked ammunition is an ammunition that can be propelled by its own power device, can receive combat grid information during flight, and can automatically detect, track, locate the target, strike and damage the assessed ammunition [6].…”
Section: Introductionmentioning
confidence: 99%