نتایج جستجو برای: hidden node effect

تعداد نتایج: 1859524  

1994
Sam Waugh

We report on results of experiments using several variations of CascadeCorrelation. The first examines the application of patience parameters to the addition of hidden nodes with the aim of halting network training. The other techniques involve altering standard candidate training: both training candidates in subgroups of the same node style and training candidates individually, instead of trai...

Journal: :JILSA 2010
Amit Mishra Zaheeruddin

In this paper, a hybrid Fuzzy Neural Network (FNN) system for function approximation is presented. The proposed FNN can handle numeric and fuzzy inputs simultaneously. The numeric inputs are fuzzified by input nodes upon presentation to the network while the Fuzzy rule based knowledge is translated directly into network architecture. The connections between input to hidden nodes represent rule ...

Ali Zare Mirzaei Behrang Kazemi Nejad Fatemeh Abdorrazaghi Maryam Lotfi, Nasrin Shayanfar,

Background & Objectives: Colon cancer is currently of high incidence and mortality rate. Identifying the factors influencing its prognosis can be very beneficial to its clinical treatment. Recent studies have shown that lymph nodes ratio can be considered as an important prognostic factor. The aim of the present study is to investigate the effect of this factor on the prognosis of the ...

2012
Dinesh Chandra Jain

In wireless networks, hidden terminal problem is common and leads to collision which makes it difficult to provide the required quality of multimedia services or support priority based services. To overcome these problems a directional antennas have been extensively used in designing MAC protocols for wireless network. Directional antennas provide many advantages over the classical antennas. In...

2003
Cecilia Hemming

Why Neural Nets? ..................................................................................................................1 What is a Neural Net?.............................................................................................................2 The Perceptron....................................................................................................................3 ...

2003
Makihiko Sato Nobuyoshi Sugaya Hiroo Murakami Sachiyo Aburatani Katsuhisa Horimoto

The detection of sequence similarity within the twilight zone has been a challenging problem in sequence analysis. Among various types of approaches for sequence similarity detection, the profileprofile comparison is one of the most reliable approaches [4]. In this study, we design a profile, named match-node profile, which is generated from match nodes in the Hidden Markov Model (HMM) profiles.

Journal: :CoRR 2006
Abhilash Ponnath

This paper presents a review of instantaneously trained neural networks (ITNNs). These networks trade learning time for size and, in the basic model, a new hidden node is created for each training sample. Various versions of the cornerclassification family of ITNNs, which have found applications in artificial intelligence (AI), are described. Implementation issues are also considered.

Journal: :Neurocomputing 2002
In-Cheol Kim Sung-Il Chien

Selective attention learning is proposed to improve the speed of the error backpropagation algorithm for fast speaker adaptation. Class-selective relevance for measuring the importance of a hidden node in a multilayer Perceptron is employed to selectively update the weights of the network, thereby reducing the computational cost for learning. c © 2002 Elsevier Science B.V. All rights reserved.

2009
Clemens Mühlberger Reiner Kolla

Desynchronization is a biologically inspired primitive [8] for periodic but temporary exclusive access to a shared resource, like the transmission medium. In this paper, we recapitulate the single-hop desynchronization algorithm DESYNC [5, 2, 6] for Wireless Sensor Networks (WSNs) and identify its lack of handling hidden nodes in multi-hop environments. We explain in detail our decentralized an...

Journal: :I. J. Network Security 2012
Kavitha Ammayappan V. N. Sastry Atul Negi

In this paper, we propose a new secure route discovery protocol for MANETs that overcomes the vulnerabilities of Ariadne and EndairA, due to hidden channel attacks. It uses ’authentic neighborhood’ for route discovery process which potentially protects hidden channels of routing control packets, besides ensuring authenticity and integrity of routing control messages at hop-by-hop level. This au...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید