نتایج جستجو برای: nn implementation
تعداد نتایج: 372770 فیلتر نتایج به سال:
Boaz Lerner*, Hugo Guterman#, Mayer Aladjem#, and Its’hak Dinstein# *University of Cambridge Computer Laboratory, New Museums Site, Cambridge CB2 3QG, UK #Department of Electrical and Computer Engineering, Ben-Gurion University of the Negev, Beer-Sheva 84105, Israel Published in Pattern Recognition Letters, vol. 20(1), pp. 7-14, 1999. Abstract The projection maps and derived classification accu...
Simbad is an open source Java 3d robot simulator for scientific and educational purposes. It is mainly dedicated to researchers and programmers who want a simple basis for studying Situated Artificial Intelligence, Machine Learning, and more generally AI algorithms, in the context of Autonomous Robotics and Autonomous Agents. It is is kept voluntarily readable and simple for fast implementation...
This paper describes a generic and fast classifier that uses a binary CMM (Correlation Matrix Memory) neural network for storing and matching a large amount of patterns efficiently, and a k-NN rule for classification. To meet CMM input requirements, a robust encoding method is proposed to convert numerical inputs into binary ones with the maximally achievable uniformity. To reduce the execution...
روشهای نمونهبرداری بدون قطعه نمونه (خطی یا فاصلهای) از شیوههای مهم آماربرداری در جنگلاند. در این تحقیق بهمنظور بررسی کارایی روش نمونهبرداری فاصلهای نزدیکترین همسایۀ پیوسته (C-nn)، محدودهای به مساحت 220 هکتار در بخش چلیر جنگل خیرود نوشهر انتخاب شد. سپس نمونهبرداری به دو روش، یکی با قطعات نمونه دایرهای 10 آری (مرسوم در جنگلهای شمال کشور) و دیگری بهروش فاصلهای C-nn...
Rough set plays vital role to overcome the complexities, vagueness, uncertainty, imprecision, and incomplete data during features analysis. Classification is tested on certain dataset that maintain an exact class and review process where key attributes decide the class positions. To assess efficient and automated learning, algorithms are used over training datasets. Generally, classification is...
A significant hurdle towards realization of practical and scalable quantum computing is to protect the quantum states from inherent noises during the computation. In physical implementation of quantum circuits, a long-distance interaction between two qubits is undesirable since, it can be interpreted as a noise. Therefore, multiple quantum technologies and quantum error correcting codes strongl...
Traditional Network Intrusion Detection Systems (NIDSs) use rules to detect intrusions, with these rules being updated manually by knowledgeable engineers. With today’s complex network environment, a new systematic method is desired to detect intrusions automatically. Data mining techniques can be used to add a systematic intrusion detection capability to NIDSs. Data Mining is concerned with un...
Despite significant research in Security Games, limited efforts have been made to handle game domains with continuous space. Addressing such limitations, in this paper we propose: (i) a continuous space security game model that considers infinitesize action spaces for players; (ii) OptGradFP, a novel and general algorithm that searches for the optimal defender strategy in a parametrized search ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید