Author of the publication

Neural network construction and training using grammatical evolution.

, , and . Neurocomputing, 72 (1-3): 269-277 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Glavas, Euripidis
add a person with the name Glavas, Euripidis
 

Other publications of authors with the same name

Modelling and performance evaluation of a novel internal-priority routing scheme for finite-buffered multistage interconnection networks., , , and . Int. J. Parallel Emergent Distributed Syst., 26 (5): 381-397 (2011)Classification of EEG signals from young adults with dyslexia combining a Brain Computer Interface device and an Interactive Linguistic Software Tool., , , , , , , , , and 2 other author(s). Biomed. Signal Process. Control., (2022)IoT Micro-Blockchain Fundamentals., , , , and . Sensors, 21 (8): 2784 (2021)A survey on the awareness on Virtual Reality, Internet of Things and Blockchain in the 4th IR era., , , , , , , , and . SEEDA-CECNSM, page 1-6. IEEE, (2022)An experimental protocol for exploration of stress in an immersive VR scenario with EEG., , , , , and . SEEDA-CECNSM, page 1-5. IEEE, (2022)Applied Virtual Reality in 3D Geometry., , , , , and . SEEDA-CECNSM, page 1-5. IEEE, (2022)Performance Evaluation of Two-Priority Network Schema for Single-Buffered Delta Networks., , , and . PIMRC, page 1-7. IEEE, (2007)Machine Learning Algorithms for Epilepsy Detection Based on Published EEG Databases: A Systematic Review., , , , , , and . IEEE Access, (2023)Location of amide I mode of vibration in computed data utilizing constructed neural networks., , , and . Expert Syst. Appl., 36 (10): 12210-12213 (2009)Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures - A Perspective on the Greek Landscape., , , and . J. Cybersecur. Priv., 3 (3): 610-637 (September 2023)