The incorporation of last-generation sensors to airborne and satellite platforms is currently producing a nearly continual stream of high-dimensional data, and this explosion in t...
Keystroke authentication is a biometric method utilizing the typing characteristics of users. In this paper, we propose an evolutionary method for stable keystroke authentication....
- This paper presents a variable node-to-node-link neural network (VN2 NN) trained by real-coded genetic algorithm (RCGA). The VN2 NN exhibits a node-to-node relationship in the hi...
Wavelet-based image coders like the JPEG2000 standard are the state of the art in image compression. Unlike traditional image coders, however, their performance depends to a large...
— In many decision support applications it is important to guarantee the expressive power, easy formalization and interpretability of Mamdani-type fuzzy inference systems (FIS), ...
Javad Jassbi, S. H. Alavi, Paulo J. A. Serra, Rita...