Journal ArticleDOI
Pattern Recognition and Machine Learning
Reads0
Chats0
TLDR
This book covers a broad range of topics for regular factorial designs and presents all of the material in very mathematical fashion and will surely become an invaluable resource for researchers and graduate students doing research in the design of factorial experiments.Abstract:
(2007). Pattern Recognition and Machine Learning. Technometrics: Vol. 49, No. 3, pp. 366-366.read more
Citations
More filters
Journal ArticleDOI
Consistency and differences between centrality measures across distinct classes of networks.
Stuart Oldham,Ben D. Fulcher,Ben D. Fulcher,Linden Parkes,Aurina Arnatkevičiūtė,Chao Suo,Alex Fornito +6 more
TL;DR: It is found that centrality measures are generally positively correlated to each other, the strength of these correlations varies across networks, and network modularity plays a key role in driving these cross-network variations.
Journal ArticleDOI
A Least-Squares Framework for Component Analysis
TL;DR: The LS-WKRRR formulation of CA methods has several benefits: it provides a clean connection between many CA techniques and an intuitive framework to understand normalization factors, overcomes the small sample size problem, and provides a framework to easily extend CA methods.
Journal ArticleDOI
Intelligent Waste Classification System Using Deep Learning Convolutional Neural Network
Olugboja Adedeji,Zenghui Wang +1 more
TL;DR: The separation process of the waste will be faster and intelligent using the proposed waste material classification system without or reducing human involvement.
Book
Evolutionary optimization algorithms : biologically-Inspired and population-based approaches to computer intelligence
TL;DR: This paper presents a meta-anatomy of evolutionary algorithms and some examples of successful and unsuccessful attempts at optimization in the context of discrete-time programming.
Proceedings Article
Detection of Malicious PDF Files Based on Hierarchical Document Structure.
Nedim Srndic,Pavel Laskov +1 more
TL;DR: This paper proposes a highly performant static method for detection of malicious PDF documents which, instead of analyzing JavaScript or any other content, makes use of essential differences in the structural properties of malicious and benign PDF files.