In evolutionary algorithms, the typical post-processing phase involves selection of the best-of-run individual, which becomes the final outcome of the evolutionary run. Trivial f...
Abstract— In this paper, we have investigated the maximumlikelihood (ML) receivers for the fast frequency-hopped binary frequency-shift-keying (FFH/BFSK) spread-spectrum communic...
Content-based image retrieval has become an indispensable tool for managing the rapidly growing collections of digital images. The goal is to organize the contents semantically, a...
Dejan Depalov, Thrasyvoulos N. Pappas, Dongge Li, ...
Recent research has shown that it is possible to spoof a variety of fingerprint scanners using some simple techniques with molds made from plastic, clay, Play-Doh, silicon, or gela...
Background: Cluster analysis has been widely applied for investigating structure in bio-molecular data. A drawback of most clustering algorithms is that they cannot automatically ...