In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Background: Much of the public access cancer microarray data is asymmetric, belonging to datasets containing no samples from normal tissue. Asymmetric data cannot be used in stand...
The problem of extracting continuous structures from noisy or cluttered images is a difficult one. Successful extraction depends critically on the ability to balance prior constra...
In this paper, we propose a new method for face detection from cluttered images. We use a polynomial neural network (PNN) for separation of face and non-face patterns while the co...
Abstract. Most fMRI studies use voxel-wise statistics to carry out intrasubject as well as inter-subject analysis. We show that statistics derived from voxel-wise comparisons are l...
Guillermo A. Cecchi, Rahul Garg, A. Ravishankar ...