SP Yadav, S Yadav - Medical & Biological Engineering & Computing, 2020 - Springer
An image fusion based on multimodal medical images renders a considerable enhancement in the quality of fused images. An effective image fusion technique produces …
The automatic detection of software vulnerabilities is considered a complex and common research problem. It is possible to detect several security vulnerabilities using static analysis …
PH Foo, GW Ng - J. Adv. Inf. Fusion, 2013 - isif.org
In general, data and information fusion can provide enhancement to the outcomes of processes for solving various application problems. Some advantages of carrying out DIF …
Character recognition plays an important role in the modern world. In recent years, character recognition systems for different languages has gain importance. The recognition of Arabic …
The use of fault detection and tolerance measures in wireless sensor networks is inevitable to ensure the reliability of the data sources. In this context, immune-inspired concepts offer …
BV Dasarathy - Information Fusion, 2012 - dl.acm.org
Editorial: Information fusion in the realm of medical applications - A bibliographic glimpse at its growing appeal: Information Fusion: Vol 13, No 1 skip to main content ACM Digital Library home …
This thesis explores the design and application of artificial immune systems (AISs), problem- solving systems inspired by the human and other immune systems. AISs to date have largely …
GC Silva, D Dasgupta - Handbook on Computational Intelligence …, 2016 - World Scientific
This report aims to bring the state-of-the-art of artificial immune systems (AISs) and the literature review during the last five years, presenting some Immune-based methods, their …
Abstract The “Dendritic Cell Algorithm”(DCA) is inspired by the function of the dendritic cells of the human immune system. In nature, dendritic cells are the intrusion detection agents of …