Sciweavers

502 search results - page 72 / 101
» Extraction of Logical Rules from Neural Networks
Sort
View
ICIP
2009
IEEE
14 years 9 months ago
A Bio-inspired Cnn With Re-indexing Engine For Lossless Dna Microarray Compression And Segmentation
The DNA microarray images allow to analyze the natural gene expressions. In this paper we propose an advanced method to efficiently address the imaging storage as well as the perf...
ICDAR
2009
IEEE
14 years 2 months ago
Machine Authentication of Security Documents
This paper presents a pioneering effort towards machine authentication of security documents like bank cheques, legal deeds, certificates, etc. that fall under the same class as f...
Utpal Garain, Biswajit Halder
IWUC
2004
13 years 9 months ago
Mobile Agent System for Web Services Integration in Pervasive Networks
Web Services integration using languages such as BPEL is to be applied not only on the Internet but also in pervasive networks using wireless mobile devices. However, in such a net...
Fuyuki Ishikawa, Nobukazu Yoshioka, Yasuyuki Tahar...
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 8 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
GECCO
2009
Springer
113views Optimization» more  GECCO 2009»
13 years 5 months ago
Single step evolution of robot controllers for sequential tasks
The generation of robot controllers for a task requiring a sequence of elementary behaviors is still a challenge. If these behaviors are known, intermediate steps can be given to ...
Stéphane Doncieux, Jean-Baptiste Mouret