Independent component analysis (ICA) is not only popular for blind source separation but also for unsupervised learning when the observations can be decomposed into some independe...
We demonstrate the advantages of using Bayesian multi layer perceptron (MLP) neural networks for image analysis. The Bayesian approach provides consistent way to do inference by c...
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
We consider the problem of developing an automated visual solution for detecting human activities within industrial environments. This has been performed using an overhead view. Th...
Banafshe Arbab-Zavar, Imed Bouchrika, John N. Cart...
Abstract— Multi-hop relaying has attracted considerable attention recently as a key technique for improving cell coverage and throughput in wireless communication. We modelled va...