153
click to vote
ISDA
15 years 10 months ago
2006 IEEE
We present in this paper a modification of Lumer and Faieta’s algorithm for data clustering. This algorithm discovers automatically clusters in numerical data without prior kno...
155
click to vote
ISDA
15 years 10 months ago
2006 IEEE
In this paper, we present a novel approach for face recognition and authentication based on dimensional surface matching. While most of existing methods use facial intensity image...
140
click to vote
ISDA
15 years 10 months ago
2006 IEEE
The use of monolithic neural networks (such as a multilayer perceptron) has some drawbacks: e.g. slow learning, weight coupling, the black box effect. These can be alleviated by t...
169
click to vote
ISDA
15 years 10 months ago
2006 IEEE
- Elliptic curve cryptography plays a crucial role in networking and information security area, and modular multiplication arithmetic over finite field is a necessary computation p...
113
click to vote
ISDA
15 years 10 months ago
2006 IEEE
In this paper we address some open questions on the recently proposed Zero-Error Density Maximization algorithm for MLP training. We propose a new version of the cost function tha...
|