Author of the publication

Is Extreme Learning Machine Feasible? A Theoretical Assessment (Part I).

, , , and . IEEE Trans. Neural Networks Learn. Syst., 26 (1): 7-20 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning Convolutional Ranking-Score Function by Query Preference Regularization., , , , , , and . IDEAL, volume 10585 of Lecture Notes in Computer Science, page 1-8. Springer, (2017)ACAR: Adaptive Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks., , , , and . ICCCN, page 535-540. IEEE, (2008)Fast Compressed Sensing SAR Imaging based on Approximated Observation, , , , and . CoRR, (2013)Traveling Waves for Monotone Semiflows with Weak Compactness., and . SIAM J. Math. Anal., 46 (6): 3678-3704 (2014)Is Extreme Learning Machine Feasible? A Theoretical Assessment (Part I)., , , and . IEEE Trans. Neural Networks Learn. Syst., 26 (1): 7-20 (2015)Database Acceleration on FPGAs.. Delft University of Technology, Netherlands, (2019)base-search.net (fttudelft:oai:tudelft.nl:uuid:84dfc577-ca6f-43ea-9b24-4dc160c103f5).Optimization of facial expression recognition based on dual attention mechanism by lightweight network model., , , , and . J. Intell. Fuzzy Syst., 45 (5): 9069-9081 (November 2023)NonMonotonicity of Traveling Wave Profiles for a Unimodal Recursive System., and . SIAM J. Math. Anal., 54 (2): 1669-1694 (2022)Privacy-preserving Cloud-based Personal Health Record System Using Attribute-based Encryption and Anonymous Multi-ReceiverIdentity-based Encryption., , , and . Informatica (Slovenia), (2015)A Lightweight Passive Human Tracking Method Using Wi-Fi., , , , , , and . Sensors, 22 (2): 541 (2022)