Comparison of Neural Network Training Functions for Hematoma Classification in Brain CT Images
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
Classification is one of the most important task in application areas of artificial neural networks (ANN).Training neural networks is a complex task in the supervised learning field of research. The main difficulty in adopting ANN is to find the most appropriate combination of learning, transfer and training function for the classification task. We compared the performances of three types of training algorithms in feed forward neural network for brain hematoma classification. In this work we have selected Gradient Descent based backpropagation, Gradient Descent with momentum, Resilence backpropogation algorithms. Under conjugate based algorithms, Scaled Conjugate back propagation, Conjugate Gradient backpropagation with Polak-Riebreupdates(CGP) and Conjugate Gradient backpropagation with Fletcher-Reeves updates (CGF).The last category is Quasi Newton based algorithm, under this BFGS, Levenberg-Marquardt algorithms are selected. Proposed work compared training algorithm on the basis of mean square error, accuracy, rate of convergence and correctness of the classification. Our conclusion about the training functions is based on the simulation results
Authors and Affiliations
Bhavna Sharma
Innovative PCG technique for Cardiac Spectral Analysis
Normally the ratio of population versus physician is so feeble in most of the economically underdeveloped and developing countries that cause delayed diagnosis and non-availability of on-time treatment of heart pat...
Enhanced cAntMinerPB Algorithm for Induction of Classification Rules using Ant Colony Approach
Abstract : Mining classification rules from data is a key mission of data mining and is getting great attention in recent years. Rule induction is a method used in data mining where the desired output is a set of R...
RKO Technique for Color Visual Cryptography
Abstract : To maintain the secrecy and confidentiality of images two different approaches are being followed, Image Encryption and Visual Cryptography. The former being encrypting the images through encryption algo...
Performance Evaluation of Voice and video conferencing For WIMAX Network under Various Modulation techniques
Abstract: Worldwide interoperability for Microwave Access (WIMAX) that based on 802.16d/e Orthogonal Frequency Division Multiplexing (OFDM) and based on adaptive Physical Layer (PHY), It provides wireless broadband to fi...
Research Paper Selection Based On an Ontology and Text MiningTechnique Using Clustering
Abstract: Research Paper Selection is important decision making task for the Government funding Agency,Universities, research Institutes. Ontology is Knowledge Repository in which concepts and terms defined as well...