Neural network corner detection of vertex chain code
This paper presents a Neural Network Classifier to be implemented in corner detection of chain code series. The classifier directly uses chain code which is derived using Vertex chain code as training, testing and validation set. The steps of developing Neural Network Classifier are included in this...
| Main Authors: | Subri, S. H., Haron, H., Sallehuddin, R. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/441/ http://eprints.utm.my/441/1/A-01-Habibollah.pdf |
Similar Items
Neural network in corner detection of vertex chain code series
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
The evolution and trend of chain code scheme
by: Wulandhari, Lily Ayu, et al.
Published: (2008)
by: Wulandhari, Lily Ayu, et al.
Published: (2008)
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
by: Mr, Handrizal, et al.
Published: (2012)
by: Mr, Handrizal, et al.
Published: (2012)
An optimal approximation algorithm for optimization of un-weighted minimum vertex cover problem
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm
by: Haron, Habibollah, et al.
Published: (2003)
by: Haron, Habibollah, et al.
Published: (2003)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Automatic spinal deformity detection based on neural network
by: Kim, Hyoungseop, et al.
Published: (2003)
by: Kim, Hyoungseop, et al.
Published: (2003)
A new corner detection algorithm for chain code representation.
by: Haron , Habibollah, et al.
Published: (2005)
by: Haron , Habibollah, et al.
Published: (2005)
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Remote to Local Attack Detection Using Supervised Neural Network
by: Iftikhar, Ahmad, et al.
Published: (2010)
by: Iftikhar, Ahmad, et al.
Published: (2010)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
by: Subri, Syarul Haniz
Published: (2006)
by: Subri, Syarul Haniz
Published: (2006)
Total Distance Vertex Irregularity Strength of Hairy Cycle C_m^n Graph
by: Ida, Wijayanti, et al.
Published: (2022)
by: Ida, Wijayanti, et al.
Published: (2022)
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010)
by: Ahmad, iftikhar, et al.
Published: (2010)
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019)
by: Ahmed, Abdulghani Ali
Published: (2019)
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Suspense scene detection using recurrent neural network
by: Lim, Sin Hui
Published: (2021)
by: Lim, Sin Hui
Published: (2021)
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
by: Ahmad, Iftikhar, et al.
Published: (2010)
by: Ahmad, Iftikhar, et al.
Published: (2010)
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
by: Muhammad Arif, Mohamad, et al.
Published: (2024)
by: Muhammad Arif, Mohamad, et al.
Published: (2024)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Developing an event corner and knowledge sharing services mobile application for UTAR community
by: Teh, Tze Yang
Published: (2018)
by: Teh, Tze Yang
Published: (2018)
Unravel parking difficulty via relative chain code algorithm / Chan Huey Min
by: Chan , Huey Min
Published: (2005)
by: Chan , Huey Min
Published: (2005)
Face recognition using eigenfaces and neural networks
by: Saad, Puteh, et al.
Published: (2006)
by: Saad, Puteh, et al.
Published: (2006)
Real time astrocyte in spiking neural network
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
by: Abdul-Rahman Abed, Bassam, et al.
Published: (2015)
Sales Prediction Using Artificial Neural Network
by: Ilham Ariff, Mohammad Fadzli
Published: (2023)
by: Ilham Ariff, Mohammad Fadzli
Published: (2023)
Differential evolution for neural networks learning enhancement
by: Ismail Wdaa, Abdul Sttar
Published: (2008)
by: Ismail Wdaa, Abdul Sttar
Published: (2008)
Threat analysis using artificial neural network
by: Yee, Chan Pheng
Published: (2009)
by: Yee, Chan Pheng
Published: (2009)
Forecasting of Salmonellosis Incidence in Human using Artificial Neural Network
by: Adhistya Erna, Permanasari, et al.
Published: (2010)
by: Adhistya Erna, Permanasari, et al.
Published: (2010)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Web Phishing Classification Model using Artificial Neural Network and Deep Learning Neural Network
by: Noor Hazirah, Hassan, et al.
Published: (2023)
by: Noor Hazirah, Hassan, et al.
Published: (2023)
Particle swarm optimization for neural network learning enhancement
by: Abdull Hamed, Haza Nuzly
Published: (2006)
by: Abdull Hamed, Haza Nuzly
Published: (2006)
Applying Neural Network to U2R Attacks
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Adam optimization algorithm for wide and deep neural network
by: Mohd Jais, Imran Khan, et al.
Published: (2019)
by: Mohd Jais, Imran Khan, et al.
Published: (2019)
Similar Items
-
Neural network in corner detection of vertex chain code series
by: Subri, S. H., et al.
Published: (2006) -
The evolution and trend of chain code scheme
by: Wulandhari, Lily Ayu, et al.
Published: (2008) -
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
by: Mr, Handrizal, et al.
Published: (2012) -
An optimal approximation algorithm for optimization of un-weighted minimum vertex cover problem
by: Fayaz, Muhammad, et al.
Published: (2016) -
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)