共 27 条
[1]
[Anonymous], 1989, GENETIC ALGORITHM SE
[2]
Bishop C. M., 1995, NEURAL NETWORKS PATT, P332
[3]
DIMENSIONALITY REDUCTION AND FEATURE-EXTRACTION APPLICATIONS IN IDENTIFYING COMPUTER USERS
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS,
1991, 21 (02)
:452-456
[5]
CHANGSHUI Z, 2000, P IEEE INT C SYST MA, V4, P2887
[6]
CLARKE K, 1994, NEW STATESMAN SOC, V7, P4
[7]
Speaker identification for security systems using reinforcement-trained pRAM neural network architectures
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS,
2001, 31 (01)
:65-76
[8]
George MH, 1995, 29TH ANNUAL 1995 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, P41, DOI 10.1109/CCST.1995.524731
[9]
GORDON S, 2001, OPTO LASER EUROPE
[10]
Haider S, 2000, IEEE SYS MAN CYBERN, P1336, DOI 10.1109/ICSMC.2000.886039