Author of the publication

On the Performance of Chernoff-Distance-Based Linear Dimensionality Reduction Techniques.

, , and . Canadian AI, volume 4013 of Lecture Notes in Computer Science, page 467-478. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A 32-bit RISC-V AXI4-lite bus-based microcontroller with 10-bit SAR ADC., , , , , , , , , and 5 other author(s). LASCAS, page 315-318. IEEE, (2016)Geometric visualization of clusters obtained from fuzzy clustering algorithms., and . Pattern Recognit., 39 (8): 1415-1429 (2006)Heart Disease Prediction Using Adaptive Infinite Feature Selection and Deep Neural Networks., , and . ICAIIC, page 235-240. IEEE, (2022)Microarray Time-Series Data Clustering via Multiple Alignment of Gene Expression Profiles., , , and . PRIB, volume 5780 of Lecture Notes in Computer Science, page 377-390. Springer, (2009)Sub-grid and Spot Detection in DNA Microarray Images Using Optimal Multi-level Thresholding., and . PRIB, volume 6282 of Lecture Notes in Computer Science, page 277-288. Springer, (2010)Multi-class heteroscedastic linear dimensionality reduction scheme for diagnosing process faults., , , and . CCECE, page 1-4. IEEE, (2017)Toward New Paradigms to Combating Internet Child Pornography., , , and . CCECE, page 1012-1015. IEEE, (2006)A Computational Domain-Based Feature Grouping Approach for Prediction of Stability of SCF Ligases., , and . IWBBIO (1), volume 9043 of Lecture Notes in Computer Science, page 630-640. Springer, (2015)A New Paradigm for Pattern Classification: Nearest Border Techniques., , , and . Australasian Conference on Artificial Intelligence, volume 8272 of Lecture Notes in Computer Science, page 441-446. Springer, (2013)Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning., , , and . ICBEA, page 50-57. ACM, (2018)