Feature detection using spikes: The greedy approach
نویسندگان
چکیده
منابع مشابه
Feature detection using spikes: the greedy approach.
A goal of low-level neural processes is to build an efficient code extracting the relevant information from the sensory input. It is believed that this is implemented in cortical areas by elementary inferential computations dynamically extracting the most likely parameters corresponding to the sensory signal. We explore here a neuro-mimetic feed-forward model of the primary visual area (VI) sol...
متن کاملthe use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
15 صفحه اولDetermining Effective Features for Face Detection Using a Hybrid Feature Approach
Detecting faces in cluttered backgrounds and real world has remained as an unsolved problem yet. In this paper, by using composition of some kind of independent features and one of the most common appearance based approaches, and multilayered perceptron (MLP) neural networks, not only some questions have been answered, but also the designed system achieved better performance rather than the pre...
متن کاملA new approach to greedy multiuser detection
In this paper, we propose a new suboptimum multiuser detector for synchronous and asynchronous multiuser communications. In this approach, a greedy strategy is used to maximize the cost function, the maximum-likelihood (ML) metric. The coefficients of the ML metric are utilized as weights indicating in which order bits can be estimated. The complexity of the algorithm is approximately 2 log per...
متن کاملPhishing website detection using weighted feature line embedding
The aim of phishing is tracing the users' s private information without their permission by designing a new website which mimics the trusted website. The specialists of information technology do not agree on a unique definition for the discriminative features that characterizes the phishing websites. Therefore, the number of reliable training samples in phishing detection problems is limited. M...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physiology-Paris
سال: 2004
ISSN: 0928-4257
DOI: 10.1016/j.jphysparis.2005.09.012