Author of the publication

Gene Selection Using Gaussian Kernel Support Vector Machine Based Recursive Feature Elimination with Adaptive Kernel Width Strategy.

, , , , , and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 799-806. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gene prediction using multinomial probit regression with Bayesian gene selection, , and . EURASIP Journal on Applied Signal Processing, (January 2004)Mutual information-based feature selection in studying perturbation of dendritic structure caused by TSC2 inactivation., , , , and . Neuroinformatics, 4 (1): 81-94 (2006)Research of MapReduce architecture on busbar protection., and . CCIS, page 819-823. IEEE, (2018)Hybrid Deep Learning for Plant Leaves Classification., , , , , , and . ICIC (2), volume 9226 of Lecture Notes in Computer Science, page 115-123. Springer, (2015)Gene Selection Using Gaussian Kernel Support Vector Machine Based Recursive Feature Elimination with Adaptive Kernel Width Strategy., , , , , and . RSKT, volume 4062 of Lecture Notes in Computer Science, page 799-806. Springer, (2006)ODDS: Optimizing Data-Locality Access for Scientific Data Analysis., , , , and . IEEE Trans. Cloud Computing, 8 (1): 220-231 (2020)Online Adaptive Anomaly Detection for Augmented Network Flows., , , and . ACM Trans. Auton. Adapt. Syst., 11 (3): 17:1-17:28 (2016)A Tutorial on Lossy Forwarding Cooperative Relaying., , , , , , , and . IEEE Commun. Surv. Tutorials, 21 (1): 66-87 (2019)Conditional random pattern algorithm for LOH inference and segmentation., , , , , and . Bioinform., 25 (1): 61-67 (2009)Towards Automated Cellular Image Segmentation for RNAi Genome-Wide Screening., , , , and . MICCAI, volume 3749 of Lecture Notes in Computer Science, page 885-892. Springer, (2005)