scispace - formally typeset
Journal ArticleDOI

Pattern Recognition and Machine Learning

Radford M. Neal
- 01 Aug 2007 - 
- Vol. 49, Iss: 3, pp 366-366
Reads0
Chats0
TLDR
This book covers a broad range of topics for regular factorial designs and presents all of the material in very mathematical fashion and will surely become an invaluable resource for researchers and graduate students doing research in the design of factorial experiments.
Abstract
(2007). Pattern Recognition and Machine Learning. Technometrics: Vol. 49, No. 3, pp. 366-366.

read more

Citations
More filters
Journal ArticleDOI

Consistency and differences between centrality measures across distinct classes of networks.

TL;DR: It is found that centrality measures are generally positively correlated to each other, the strength of these correlations varies across networks, and network modularity plays a key role in driving these cross-network variations.
Journal ArticleDOI

A Least-Squares Framework for Component Analysis

TL;DR: The LS-WKRRR formulation of CA methods has several benefits: it provides a clean connection between many CA techniques and an intuitive framework to understand normalization factors, overcomes the small sample size problem, and provides a framework to easily extend CA methods.
Journal ArticleDOI

Intelligent Waste Classification System Using Deep Learning Convolutional Neural Network

TL;DR: The separation process of the waste will be faster and intelligent using the proposed waste material classification system without or reducing human involvement.
Book

Evolutionary optimization algorithms : biologically-Inspired and population-based approaches to computer intelligence

Dan Simon
TL;DR: This paper presents a meta-anatomy of evolutionary algorithms and some examples of successful and unsuccessful attempts at optimization in the context of discrete-time programming.
Proceedings Article

Detection of Malicious PDF Files Based on Hierarchical Document Structure.

TL;DR: This paper proposes a highly performant static method for detection of malicious PDF documents which, instead of analyzing JavaScript or any other content, makes use of essential differences in the structural properties of malicious and benign PDF files.