Author of the publication

Unsupervised approach for an optimal representation of the latent space of a failure analysis dataset.

, , , and . J. Supercomput., 80 (5): 5923-5949 (March 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Welding monitoring and defect detection using probability density distribution and functional nonparametric kernel classifier., and . J. Intell. Manuf., 34 (3): 1469-1481 (March 2023)New MCDM methods under uncertainty applied to integrated natural risks management., , , , and . CIVEMSA, page 193-198. IEEE, (2017)Uncertainty Quantification for Efficient and Risk-Sensitive Reinforcement Learning., , , and . SSCI, page 1429-1434. IEEE, (2023)Vertical Vector Fields and Neural Networks: An Application in Atmospheric Pollution Forecasting., , and . ICANNGA, page 91-94. Springer, (2003)Modélisation spatiale et décision territoriale participative. Conception et mise en oeuvre dans des ateliers chercheurs acteurs., , and . Revue Internationale de Géomatique, 18 (4): 549-569 (2008)Energy Efficient Message Scheduling with Redundancy Control for Massive IoT Monitoring., , , and . WCNC, page 1-6. IEEE, (2023)NLP based on GCVAE for intelligent Fault Analysis in Semiconductor industry., , , , and . ETFA, page 1-8. IEEE, (2022)A two-step fusion process for multi-criteria decision applied to natural hazards in mountains, , and . CoRR, (2010)Computer Vision based welding defect detection using YOLOv3., , and . ETFA, page 1-6. IEEE, (2022)Applying ER-MCDA and BF-TOPSIS to Decide on Effectiveness of Torrent Protection., , , , and . BELIEF, volume 9861 of Lecture Notes in Computer Science, page 56-65. Springer, (2016)