Sciweavers

1345 search results - page 134 / 269
» Optimal Control With Noisy Time
Sort
View
CANS
2009
Springer
180views Cryptology» more  CANS 2009»
15 years 11 months ago
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks
RFID systems suffer from different location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Among them mafia fraud attack is the most serious sin...
Chong Hee Kim, Gildas Avoine
PIMRC
2008
IEEE
15 years 11 months ago
BER analysis of single-carrier MPAM in the presence of ADC quantization noise
— Noisy radio frequency (RF) circuits tend to degrade the system performance, especially in high frequency communication systems. The performance analysis of such systems is norm...
Umar H. Rizvi, Gerard J. M. Janssen, Jos H. Weber
SYNASC
2005
IEEE
170views Algorithms» more  SYNASC 2005»
15 years 10 months ago
Density Based Clustering with Crowding Differential Evolution
The aim of this work is to analyze the applicability of crowding differential evolution to unsupervised clustering. The basic idea of this approach, interpreting the clustering pr...
Daniela Zaharie
SIGGRAPH
2010
ACM
15 years 9 months ago
SmartBoxes for interactive urban reconstruction
We introduce an interactive tool which enables a user to quickly assemble an architectural model directly over a 3D point cloud acquired from large-scale scanning of an urban scen...
Liangliang Nan, Andrei Sharf, Hao Zhang, Daniel Co...
ESWA
2006
154views more  ESWA 2006»
15 years 4 months ago
Artificial neural networks with evolutionary instance selection for financial forecasting
In this paper, I propose a genetic algorithm (GA) approach to instance selection in artificial neural networks (ANNs) for financial data mining. ANN has preeminent learning abilit...
Kyoung-jae Kim