Convergence index for BPN training
The Back Propagation Network (BPN) is one of the most widely used neural networks. It has a distinct training phase and then it is put to use. It is observed that certain training sets would Get trained and certain others would not get trained in a BPN. This is an inherent property of the training s...
| Main Author: | Gunasekaran, S |
|---|---|
| Format: | Article |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2536/ |
Similar Items
ETC training management system / the needs and expectations for training management system in Thailand
by: Adam, Metinee
Published: (2009)
by: Adam, Metinee
Published: (2009)
Indexing Of Bilingual Knowledge Bank
Based On The Synchronous Sstc Structure
by: Ye , Hong Hoe
Published: (2006)
by: Ye , Hong Hoe
Published: (2006)
Impact of spatial ability training in desktop virtual environment.
by: Rafi, A., et al.
Published: (2010)
by: Rafi, A., et al.
Published: (2010)
An Efficiency Analysis Of Seaports Using Extended
Window Analysis, Malmquist Index And Simar-wilson
Approach
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Adapting and enhancing mussels wandering optimization algorithm for supervised training of neural networks
by: Abusnaina, Ahmed A. A.
Published: (2015)
by: Abusnaina, Ahmed A. A.
Published: (2015)
Training, Motivation And Leadership In Human Resource
Development Practices: The Case Of Construction Firms
Of Iran.
by: Tabassi, Amin Akhavan
Published: (2010)
by: Tabassi, Amin Akhavan
Published: (2010)
Privacy in the Converged Communications Platform
by: Gita, Radhakrishna
Published: (2008)
by: Gita, Radhakrishna
Published: (2008)
Training in spatial visualization: The effects of training method and gender
by: Ahmad, Rafi, et al.
Published: (2008)
by: Ahmad, Rafi, et al.
Published: (2008)
Investigating Design Choices between Bitmap index and B-tree index for a Large Data Warehouse System
by: Morteza, Zaker, et al.
Published: (2008)
by: Morteza, Zaker, et al.
Published: (2008)
Evolution of structural path indexing techniques in XML databases: A survey and open discussion
by: Su-Cheng, Haw, et al.
Published: (2008)
by: Su-Cheng, Haw, et al.
Published: (2008)
Quantitative image morphology
by: Sagar, , BSD, et al.
Published: (2003)
by: Sagar, , BSD, et al.
Published: (2003)
Efficient and fast multi layer statistical approach for colour based image retrieval
by: Odeh, , JQ, et al.
Published: (2003)
by: Odeh, , JQ, et al.
Published: (2003)
Improved variable ordering for ROBDDs
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Theoretic evidence k-nearest neighbourhood classifiers in a bimodal biometric verification system
by: Jin, , ATB, et al.
Published: (2003)
by: Jin, , ATB, et al.
Published: (2003)
Variable order verification use of logic representation
by: Prasad, , PWC, et al.
Published: (2003)
by: Prasad, , PWC, et al.
Published: (2003)
Fingerprint images segmentation using two stages coarse to fine discrimination technique
by: Ong, Teng Sian, et al.
Published: (2003)
by: Ong, Teng Sian, et al.
Published: (2003)
Automatic fingerprint center point determination by using modified directional field and morphology
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
Flexibly-configurable and computation-efficient digital cash with polynomial-thresholded coinage
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Multiresolution watershed segmentation on a Beowulf network
by: Ishar,, S, et al.
Published: (2003)
by: Ishar,, S, et al.
Published: (2003)
Fuzzy modeling based recognition of multi-font numerals
by: Hanmandlu, Madasu, et al.
Published: (2003)
by: Hanmandlu, Madasu, et al.
Published: (2003)
Solving Unit Commitment Problem Using Hybrid Particle Swarm Optimization
by: Ting, Tiew-On, et al.
Published: (2003)
by: Ting, Tiew-On, et al.
Published: (2003)
The scale invariants of pseudo-Zernike moments
by: Chong, Chee Way, et al.
Published: (2003)
by: Chong, Chee Way, et al.
Published: (2003)
A HYBRID GENETIC ALGORITHM FOR OPTICAL ORTHOGONAL CODE CONSTRUCTION
by: Ho, C. K., et al.
Published: (2003)
by: Ho, C. K., et al.
Published: (2003)
Screen design: a dynamic symmetry grid based approach
by: Ch'ng, E
Published: (2003)
by: Ch'ng, E
Published: (2003)
An efficient algorithm for fast computation of pseudo-Zernike moments
by: Chong, Chee-Way
Published: (2003)
by: Chong, Chee-Way
Published: (2003)
Translation invariants of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
Application of active force control and iterative learning in a 5-link biped robot
by: Kwek, L. C.
Published: (2003)
by: Kwek, L. C.
Published: (2003)
Modelling interface aesthetics
by: Ngo, David Chek Ling, et al.
Published: (2003)
by: Ngo, David Chek Ling, et al.
Published: (2003)
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)
by: Ngo,, DCL, et al.
Published: (2003)
Formal specification of design pattern combination using BPSL
by: Taibi, T
Published: (2003)
by: Taibi, T
Published: (2003)
Unconstrained handwritten character recognition based on fuzzy logic
by: Hanmandlu, M
Published: (2003)
by: Hanmandlu, M
Published: (2003)
A comparative analysis of algorithms for fast computation of Zernike moments
by: Chong, C
Published: (2003)
by: Chong, C
Published: (2003)
Mapping of sub-watersheds from digital elevation model: A morphological approach
by: CHOCKALINGAM, L.
Published: (2003)
by: CHOCKALINGAM, L.
Published: (2003)
Stock Trend Prediction With Neural Network Techniques
by: Mohd Haris Lye Abdullah,
Published: (2003)
by: Mohd Haris Lye Abdullah,
Published: (2003)
A Short Review Of Neural Network Techniques In Visual Servoing Of Robotic Manipulators.
by: Ramachandram, Dhanesh, et al.
Published: (2003)
by: Ramachandram, Dhanesh, et al.
Published: (2003)
Similar Items
-
ETC training management system / the needs and expectations for training management system in Thailand
by: Adam, Metinee
Published: (2009) -
Indexing Of Bilingual Knowledge Bank
Based On The Synchronous Sstc Structure
by: Ye , Hong Hoe
Published: (2006) -
Impact of spatial ability training in desktop virtual environment.
by: Rafi, A., et al.
Published: (2010) -
An Efficiency Analysis Of Seaports Using Extended
Window Analysis, Malmquist Index And Simar-wilson
Approach
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009) -
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)