2004
DOI: 10.1016/j.mee.2004.05.006
|View full text |Cite
|
Sign up to set email alerts
|

Wafer surface reconstruction from top–down scanning electron microscope images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 16 publications
0
10
0
Order By: Relevance
“…In [10], multi RNNs are exploited to learn from training data and recognize shaped objects in clutter by combining the results of all RNNs. In [77], the feed-forward RNN is applied to learning a mapping from the scanning electron microscopy intensity waveform to the cross-section shape (i.e., the profile) such that the profile can be reconstructed from the intensity waveform and the destruction caused by acquiring a cross-section image can be avoided. In [117], the task of Denial of Service (DoS) detection is formulated as a pattern classification problem, and then, with useful input features measured and selected, the RNNs with both the feed-forward and recurrent architectures are exploited to fulfil the task.…”
Section: Applications Of Random Neural Networkmentioning
confidence: 99%
“…In [10], multi RNNs are exploited to learn from training data and recognize shaped objects in clutter by combining the results of all RNNs. In [77], the feed-forward RNN is applied to learning a mapping from the scanning electron microscopy intensity waveform to the cross-section shape (i.e., the profile) such that the profile can be reconstructed from the intensity waveform and the destruction caused by acquiring a cross-section image can be avoided. In [117], the task of Denial of Service (DoS) detection is formulated as a pattern classification problem, and then, with useful input features measured and selected, the RNNs with both the feed-forward and recurrent architectures are exploited to fulfil the task.…”
Section: Applications Of Random Neural Networkmentioning
confidence: 99%
“…Some of its other applications can be found in [1,3,4,9,12,25,26,89,[101][102][103]157,174] and several papers reviewing this subject can be found in the papers of the special issue in [49].…”
Section: The Random Neural Networkmentioning
confidence: 99%
“…The Random Neural Network was reported in Erol's earlier work and its theoretical foundations were developed in [44,47,48,78,79,97,132]. Some of its other applications can be found in [1,3,4,9,12,25,26,89,[101][102][103]157,174] and several papers reviewing this subject can be found in the papers of the special issue in [49].…”
Section: The Random Neural Networkmentioning
confidence: 99%
“…The RNN is a probabilistic computational model which was inspired by the spiking behavior of neurons, and which has a well-developed mathematical theory [23,24,31] and efficient learning algorithms for recurrent networks [25,33,38]. The RNN has been successfully applied to several problems in engineering and information sciences, including pattern recognition [9,10,30,34], classification [32], image/video processing and compression [15][16][17]29,37], DoS attack detection [35,51,52], and others that can be found in numerous reviews on the subject [26,27,61].…”
Section: Introductionmentioning
confidence: 99%