Neural network in corner detection of vertex chain code series
This paper presents a Neural Network Classifier to be implemented in corner detection of chain code series. The classifier directly uses chain code which is derived using Freeman chain code as training, testing and validation set. The steps of developing Neural Network Classifier are included in thi...
| Main Authors: | Subri, S. H., Haron, Habibollah, Sallehuddin, R. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2006
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/8210/ http://eprints.utm.my/8210/1/8210.pdf |
Similar Items
Neural network corner detection of vertex chain code
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
A new corner detection algorithm for chain code representation.
by: Haron , Habibollah, et al.
Published: (2005)
by: Haron , Habibollah, et al.
Published: (2005)
The evolution and trend of chain code scheme
by: Wulandhari, Lily Ayu, et al.
Published: (2008)
by: Wulandhari, Lily Ayu, et al.
Published: (2008)
Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm
by: Haron, Habibollah, et al.
Published: (2003)
by: Haron, Habibollah, et al.
Published: (2003)
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
by: Mr, Handrizal, et al.
Published: (2012)
by: Mr, Handrizal, et al.
Published: (2012)
An optimal approximation algorithm for optimization of un-weighted minimum vertex cover problem
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Network forensics: detection and mitigation of botnet malicious code via darknet
by: R. Othman, R. Azrina, et al.
Published: (2012)
by: R. Othman, R. Azrina, et al.
Published: (2012)
Time series modeling and designing of artifical neural network (ANN) for revenue forecasting
by: Mohd. Yusof, Norfadzlia
Published: (2005)
by: Mohd. Yusof, Norfadzlia
Published: (2005)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018)
by: Bariah, Yusob, et al.
Published: (2018)
Application of Artificial Neural Network in Detection of Probing Attacks
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Application of Artificial Neural Network in Detection of Probing Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Automatic spinal deformity detection based on neural network
by: Kim, Hyoungseop, et al.
Published: (2003)
by: Kim, Hyoungseop, et al.
Published: (2003)
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Artificial Neural Network Approaches to Intrusion Detection: A Review
Published: (2009)
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, Iftikhar
Published: (2009)
by: Ahmad, Iftikhar
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Artificial Neural Network Approaches to Intrusion Detection: A Review
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
Remote to Local Attack Detection Using Supervised Neural Network
by: Iftikhar, Ahmad, et al.
Published: (2010)
by: Iftikhar, Ahmad, et al.
Published: (2010)
Towards the Selection of Best Neural Network System for Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
by: Subri, Syarul Haniz
Published: (2006)
by: Subri, Syarul Haniz
Published: (2006)
Total Distance Vertex Irregularity Strength of Hairy Cycle C_m^n Graph
by: Ida, Wijayanti, et al.
Published: (2022)
by: Ida, Wijayanti, et al.
Published: (2022)
DNA Computing Technique to Solve Vertex Coloring Problem
by: Hasudungan, Rofilde, et al.
Published: (2013)
by: Hasudungan, Rofilde, et al.
Published: (2013)
Enhanced global and local curvature properties for corner detection
by: Suraya, Abu Bakar, et al.
Published: (2020)
by: Suraya, Abu Bakar, et al.
Published: (2020)
Suspense scene detection using recurrent neural network
by: Lim, Sin Hui
Published: (2021)
by: Lim, Sin Hui
Published: (2021)
Evaluating Neural Network Intrusion Detection Approaches Using Analytic Hierarchy Process
by: Ahmad, iftikhar, et al.
Published: (2010)
by: Ahmad, iftikhar, et al.
Published: (2010)
Botnet Detection Using a Feed-Forward Backpropagation Artificial Neural Network
by: Ahmed, Abdulghani Ali
Published: (2019)
by: Ahmed, Abdulghani Ali
Published: (2019)
Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Facial Feature Extraction Based on Improved Harris Corner Detection Algorithm
by: Bagherian, Elhaam
Published: (2011)
by: Bagherian, Elhaam
Published: (2011)
Enhanced algorithms for three-dimensional object interpreter
by: Haron, Habibollah
Published: (2004)
by: Haron, Habibollah
Published: (2004)
Forecasting time series data using hybrid grey relational artificial neural network and auto regressive integrated moving average model
by: Salleh, Roselina, et al.
Published: (2007)
by: Salleh, Roselina, et al.
Published: (2007)
Developing an event corner and knowledge sharing services mobile application for UTAR community
by: Teh, Tze Yang
Published: (2018)
by: Teh, Tze Yang
Published: (2018)
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks
by: Ahmad, Iftikhar, et al.
Published: (2010)
by: Ahmad, Iftikhar, et al.
Published: (2010)
Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection
by: Muhammad Arif, Mohamad, et al.
Published: (2024)
by: Muhammad Arif, Mohamad, et al.
Published: (2024)
Metaheuristic-Based Neural Network
Training And Feature Selector For
Intrusion Detection
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
by: Ghanem, Waheed Ali Hussein Mohammed
Published: (2019)
Unravel parking difficulty via relative chain code algorithm / Chan Huey Min
by: Chan , Huey Min
Published: (2005)
by: Chan , Huey Min
Published: (2005)
Code clone detection using string based tree matching technique
by: Wahid, Norfaradilla
Published: (2008)
by: Wahid, Norfaradilla
Published: (2008)
Reported malicious codes incident within Malaysia’s landscape: Time series modelling and a timeline analysis
by: Md Azam, Muhammad Nadzmi, et al.
Published: (2022)
by: Md Azam, Muhammad Nadzmi, et al.
Published: (2022)
Penerbitan Maklumat Tiga Dimensi Sebuah Lukisan Garisan Menggunakan Kaedah Jumlah Kuasa Dua Terkecil
by: Haron, Habibollah, et al.
Published: (2002)
by: Haron, Habibollah, et al.
Published: (2002)
Web Phishing Classification Model using Artificial Neural Network and Deep Learning Neural Network
by: Noor Hazirah, Hassan, et al.
Published: (2023)
by: Noor Hazirah, Hassan, et al.
Published: (2023)
Similar Items
-
Neural network corner detection of vertex chain code
by: Subri, S. H., et al.
Published: (2006) -
A new corner detection algorithm for chain code representation.
by: Haron , Habibollah, et al.
Published: (2005) -
The evolution and trend of chain code scheme
by: Wulandhari, Lily Ayu, et al.
Published: (2008) -
Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm
by: Haron, Habibollah, et al.
Published: (2003) -
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
by: Mr, Handrizal, et al.
Published: (2012)