Author of the publication

A method to design a neural pattern recognition system by using a genetic algorithm with partial fitness and a deterministic mutation

, and . Systems, Man, and Cybernetics, 1996. IEEE International Conference on, 3, page 1989--1993. IEEE Computer Society, (1996)
DOI: 10.1109/ICSMC.1996.565432

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A simple feature generation method based on fisher linear discriminant analysis., and . SIP, page 342-346. IASTED/ACTA Press, (2005)Development of a Block-based Palmprint Recognition Methodology Using the Discrete Cosine Transform., , , , and . Aust. J. Intell. Inf. Process. Syst., (2009)Detection of Dangerous Objects By Pan-tilt Camera., , , and . ISPACS, page 1-2. IEEE, (2019)Study on Discrimination of Finger Motions based on EMG signals., , , and . ISPACS, page 1-2. IEEE, (2019)A Method of Classifying Japanese Sign Language using Gathered Image Generation and Convolutional Neural Networks., , and . DASC/PiCom/DataCom/CyberSciTech, page 868-871. IEEE, (2019)3-Dimensional Object Recognition by Evolutional RBF Network., , , and . KES, volume 2773 of Lecture Notes in Computer Science, page 556-562. Springer, (2003)Feature Generation by Simple FLD., and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 643-649. Springer, (2005)Automatic Extraction System of a Kidney Region Based on the Q-Learning., , , , and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 1261-1267. Springer, (2005)Drift Ice Detection Using a Self-organizing Neural Network., , , and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 1268-1274. Springer, (2005)Music Impression Detection Method for User Independent Music Retrieval System., , , , , and . KES (3), volume 6278 of Lecture Notes in Computer Science, page 612-621. Springer, (2010)