Author:
Ahmed Tanzia,Rahman Tanvir,Ballav Roy Bir,Uddin Jia
Subject
Artificial Intelligence,Computer Networks and Communications,Computer Science Applications,Computer Vision and Pattern Recognition,Information Systems
Reference43 articles.
1. [1] M. Hicks, �Criminal Intent: FBI Details How Drones are used in crime,� Techradar-the source for tech buying advice, May 2018. [online]. https://www.techradar.com/news/criminal-intent-fbi-details-how-drones-are-being-used-for-crime.
2. [2] F. P. George, I. M. Shaikat, P. S. F. Hossain, M. Z. Parvez, and J. Uddin, �Recognition of emotional states using EEG signals based on time-frequency analysis and SVM classifier,� International Journal of Electrical and Computer Engineering, 2019, vol. 9, no. 2, pp. 1012-1020.
3. [3] R. Dong, H. Meng, Z. Long and H. Zhao, �Dimensionality reduction by soft-margin support vector machine,� IEEE International Conference on Agents (ICA), Beijing, China, 2017, pp. 154-156.
4. [4] G. Yan, �Network Anomaly Traffic Detection Method Based on Support Vector Machine,� 2016 International Conference on Smart City and Systems Engineering (ICSCSE), Zhangjiajie, Hunan, China, 2016, pp. 3-6.
5. [5] M. d. Barbosa, C. d. Barbosa, and A. F. Barbosa, �MuSSE: A Tool to Extract Meta-Data from Game Sprite Sheets Using Blob Detection Algorithm,� 14th Brazilian Symposium on Computer Games and Digital Entertainment (SBGAMES), Piau�, Brazil, 2015, pp. 61-69.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献