ADAPTATION BASED ON MEMORY DYNAMICS IN A CHAOTIC NEURAL NETWORK

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Continuous parameter working memory in a balanced chaotic neural network

It has been proposed that neural noise in the cortex arises from chaotic dynamics in the balanced state: in this model of cortical dynamics, the excitatory and inhibitory inputs to each neuron approximately cancel, and activity is driven by fluctuations of the synaptic inputs around their mean. It remains unclear whether neural networks in the balanced state can perform tasks that are highly se...

متن کامل

A New Dynamical Memory System Based on Chaotic Neural Networks

This paper proposes a new dynamical memory system based on chaotic neural networks, and its learning method. It is demonstrated that, when no embedded pattern, i.e., unknown pattern, is applied to the system, the output pattern travels around the embedded patterns, and the traveling phases depend on a particular parameter of the networks.

متن کامل

Slow diffusive dynamics in a chaotic balanced neural network

It has been proposed that neural noise in the cortex arises from chaotic dynamics in the balanced state: in this model of cortical dynamics, the excitatory and inhibitory inputs to each neuron approximately cancel, and activity is driven by fluctuations of the synaptic inputs around their mean. It remains unclear whether neural networks in the balanced state can perform tasks that are highly se...

متن کامل

Cryptanalysis of a Chaotic Neural Network based Chaotic Cipher

Recently a Triple key encryption method based on logistic map was proposed. The present paper analysis the security of the proposed encryption method and points out that it can be easily broken by one pair of known/chosen plain-text attack which is supported by mathematical proof and experimental result. In addition, some other security defects are also reported.

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybernetics and Systems

سال: 2002

ISSN: 0196-9722,1087-6553

DOI: 10.1080/01969720290040632