Complementary neural networks for regression problems (original) (raw)

Biclustering gene expression data based on a high dimensional geometric method

Alan Liew

2005 International Conference on Machine Learning and Cybernetics, 2005

View PDFchevron_right

A Survey of Current Datasets for Code-Switching Research

Shardul Suryawanshi

2020

View PDFchevron_right

MVGL Analyser for Multi-classifier Based Spam Filtering System

Md Rafiqul Islam

2009 Eighth IEEE/ACIS International Conference on Computer and Information Science, 2009

View PDFchevron_right

Random Early Detection for Congestion Avoidance in Wired Networks: A Discretized Pursuit Learning-Automata-Like Solution

Mohammad Obaidat

IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 2010

View PDFchevron_right

A survey of affect recognition methods: Audio, visual, and spontaneous expressions

Glenn Roisman

Pattern Analysis and Machine Intelligence, IEEE Transactions on, 2009

View PDFchevron_right

Propagation modeling and analysis of viruses in P2P networks

Laurissa Tokarchuk

Machine Learning and …, 2008

View PDFchevron_right

Training and analysis of Support Vector Machine using Sequential Minimal Optimization

Shahrani Shahbudin

2008 IEEE International Conference on Systems, Man and Cybernetics, 2008

View PDFchevron_right

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems

George Cybenko

Second International Conference on Autonomic Computing (ICAC'05), 2005

View PDFchevron_right

A General Neural Network Model for Estimating Telecommunications Network Reliability

Berna Dengiz

IEEE Transactions on Reliability, 2009

View PDFchevron_right

Pulmonary Nodule Classification Aided by Clustering

Gulisong Nasierding

View PDFchevron_right

Fuzzy rule interpolation for multidimensional input spaces with applications: a case study

Domonkos Tikk

IEEE Transactions on Fuzzy Systems, 2005

View PDFchevron_right

The Latest vs. Averaged Recent Experience: Which Better Guides a PSO Algorithm?

Mehmet Bodur

2006 IEEE International Conference on Evolutionary Computation, 2006

View PDFchevron_right

The effect of haptic guidance on curve negotiation behavior of young, experienced drivers

David Abbink

Systems, Man and …, 2008

View PDFchevron_right

Empirical evaluation of optimized stacking configurations

AGAPITO ISMAEL LEDEZMA ESPINO

16th IEEE International Conference on Tools with Artificial Intelligence

View PDFchevron_right

Machine Learning for Automatic Defence against Distributed Denial of Service Attacks

Namrata Arora

View PDFchevron_right

Detecting security anomalies from internet traffic using the MA-RMSE algorithms

Varin Khera

Pinto B Khera V and Fung C C Detecting Security Anomalies from Internet Traffic Using the Ma Rmse Algorithms in 7th Ieee International Conference on Industrial Informatics 23 26 June 2009 Cardiff Wales Pp 887 891, 2009

View PDFchevron_right

A knowledge management platform for the promotion of modern rural energy services in ASEAN countries

Arnold Depickere

2004 IEEE Region 10 Conference TENCON 2004., 2004

View PDFchevron_right

Bernoulli's principle of insufficient reason and conservation of information in computer search

William Dembski

2009 IEEE International Conference on Systems, Man and Cybernetics, 2009

View PDFchevron_right

Fusion of Multi-sensor based Biomechanical Gait Analysis using Vision and Wearable Sensor

Vijay Bhaskar Semwal

IEEE Sensors Journal , 2021

View PDFchevron_right

Flood Detection Framework Fusing The Physical Sensing & Social Sensing

Aryya Gangopadhyay

2020 IEEE International Conference on Smart Computing (SMARTCOMP), 2020

View PDFchevron_right

An Adaptive Fuzzy Control Traffic Shaping Scheme over Wireless Networks

Somchai Lekcharoen

2009

View PDFchevron_right

A new spectrum estimation method in unevenly sampling space

Alan Liew

Proceedings of the 2006 International Conference on Machine Learning and Cybernetics, 2006

View PDFchevron_right

Geometric Mean for Subspace Selection

Stephen Maybank

IEEE Transactions on Pattern Analysis and Machine Intelligence, 2009

View PDFchevron_right

G-Model: A Novel Approach to Privacy-Preserving 1:M Microdata Publication

Khalid Albulayhi

2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2020

View PDFchevron_right

Construction of fuzzy signature from data: an example of SARS pre-clinical diagnosis system

Laszlo Koczy

2004

View PDFchevron_right