Sciweavers

WCE
2007
13 years 5 months ago
A Neural Network Approach to Objective Evaluation of Seam Pucker
—Seam pucker grade is one of the most important quality parameters in garments manufacturing industry. At present, seam pucker is usually evaluated by human inspectors, which is ...
K. L. Mak, Wei Li
ESANN
2000
13 years 5 months ago
Analytical comparison of the Temporal Kohonen Map and the Recurrent Self Organizing Map
The basic SOM is indi erent to the ordering of the input patterns. Real data, however, is often sequential in nature thus context of a pattern may signi cantly in uence its correc...
Markus Varsta, Jukka Heikkonen, Jouko Lampinen
ESANN
2003
13 years 6 months ago
Unsupervised Recursive Sequence Processing
We propose a self organizing map (SOM) for sequences by extending standard SOM by two features, the recursive update of Sperduti [7] and the hyperbolic neighborhood of Ritter [5]. ...
Marc Strickert, Barbara Hammer
AAAI
2004
13 years 6 months ago
Distributed Representation of Syntactic Structure by Tensor Product Representation and Non-Linear Compression
Representing lexicons and sentences with the subsymbolic approach (using techniques such as Self Organizing Map (SOM) or Artificial Neural Network (ANN)) is a relatively new but i...
Heidi H. T. Yeung, Peter W. M. Tsang
ESANN
2007
13 years 6 months ago
Model collisions in the dissimilarity SOM
We investigate in this paper the problem of model collisions in the Dissimilarity Self Organizing Map (SOM). This extension of the SOM to dissimilarity data suffers from constrain...
Fabrice Rossi
ICSAP
2010
13 years 8 months ago
An Enhanced Implementation of Brain Tumor Detection Using Segmentation Based on Soft Computing
—Image Segmentation is an important and challenging factor in the medical image segmentation. This paper describes segmentation method consisting of two phases. In the first phas...
T. Logeswari, M. Karnan
COMSWARE
2007
IEEE
13 years 11 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha