The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work attempts to find the most optimal setting for a convolutional neural network (CNN) for Bengali digit dataset classification. Recognition of handwritten Bengali numerals has recently gained much interest among researchers due to the significant performance gain found in the recognition of English numerals using neural network based architecture. In this work, a new dataset of 70,000 samples...
The Hopfield Artificial Neural Network (ANN) algorithm is combined with the vector Finite Element Method (FEM) from the standpoint of the topological analogy between FEM and ANN. The ANN and FEM are combined as follows: the neurons are arranged on all the corresponding FEM elements, and the synaptic weights of each neuron are predetermined using FEM’s formulation. The unknown inputs of the network...
Artificial Neural Networks (ANNs) are often viewed as black box. This limits the comprehensive understanding on how it deals with input neuron/data, as well as how it reached a particular decision. Input significance analysis (ISA) refers to the process of understanding these input neurons/data. And since this work is on classification problem, hence similarly, this process can also be called feature...
This paper presents a new image encryption technique based on neural chaotic generator. This encryption technique includes two main operations, permutation at pixel level and masking and permutation at bit level. The chaotic generator used in the encryption of image is perturbed by a new technique done by artificial neural network. Simulations show that the proposed encryption technique is effective...
Novel higher order polynomial neural network architecture is presented in this paper. The new proposed neural network is called dynamic ridge polynomial neural network that combines the properties of higher order and recurrent neural networks. The advantage of this type of network is that it exploits the properties of higher-order neural networks by functionally extending the input space into a higher...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.