Features of hybrid neural networks use with input data of different types
Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.
Подобные документы
The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.
??????, добавлен 18.09.2018- 52. Methods of traffic regulation and user reputation handling in the bittorrent peer-to-peer networks
Examining various methods of traffic throttling and user reputation handling in the context of Bittorrent networks. An overview of the main methods for calculating user reputation and ways to differentiate the quality of services based on them.
??????, добавлен 27.05.2021 The Internet - a global association of computer networks. E-mail - system for sending messages between users. Guaranteeing the flow of information between customers, establishment of a virtual connection - the tasks of Transmission Control Protocol.
??????????? ??????, добавлен 20.05.2016- 54. Express Mali
The role of the corporate network in the modern infrastructure of the organization, identification and selection. Implementation of the communication in distributed networks, encapsulation in distributed. Packet switching technology - frame relay.
????????? ??????, добавлен 30.06.2015 ?omputer facilities and microprocessor systems, data manipulation. The general principles of programming. The branched and cyclic programs organization using Assembler-86 language. X-bit Motorola microprocessors. Communication networks designing.
?????????, добавлен 11.10.2014Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
??????, добавлен 29.11.2016An integrated approach to the study of different kinds of virus attacks that are launched against wireless networks and computer systems. Characteristics of certificate programs provide protective mechanisms and practical tools for information security.
?????, добавлен 08.03.2014Cryptography from the perspective of security and mechanisms to implement them: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and confidentiality and integrity.
?????, добавлен 08.03.2014Especially the use of simulators to create a network for conducting research in the field of computer networking. Research simulators (Ns-2, O?net, PacketTracer, etc.), their comparison on the basis of performance IP networking with the security settings.
??????, добавлен 25.12.2016The basic approaches to developing application software and computer system components. The generations of object-oriented programming languages. Types of computer systems and secondary storage, storage area network and output devices of information.
???????????, добавлен 10.06.2016Social network analysis as a modern theoretical approach to studying various processes of human life. Application SNA to fields of science. Application exact and approximate Shapley values in the assessment of centrality measures of nodes in networks.
????????? ??????, добавлен 02.09.2016- 62. ????????? ????
???????? ????????? ????????? ?????. ???????? ??????? ?? ????? ? ???????????? ??? ???????. ?????? ?????????, ??????????? ? ????? ????????. ?????????? ???????????????? ?????? ????????? Neural Network Wizard, ????????? ?? ?????? ????????? ???? ????????.
???????, добавлен 13.04.2014 The article reviews the contemporary land information systems of land management. The current problems of information support for land management are identified. Suggestions how to improve the information systems using technologies are presented.
??????, добавлен 28.09.2016The development and use of new, progressive information technologies based on the widespread use of superproductive and reliable dual-use computer systems and components. Consideration of the problem of the Fourier transform and its application.
??????, добавлен 01.11.2021The classification method, based on Combined Swarm Negative Selection Algorithm, which was originally designed for binary classification problems. The accuracy of developed algorithm was tested in an experimental way with the use of microarray data sets.
??????, добавлен 20.01.2017Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
??????, добавлен 01.02.2024Cryptology from the romans to world war II. Word perfect encryption as a modern example. Exchanging keys with and without a public key. Key management and authentication in GSM networks. The end of the crypto-monopoly and the role of politics today.
?????, добавлен 08.03.2014Review digital communication and traditional computer-based technologies. The European Telecommunications Standards Institute. Computer and network hardware and software. Features of use of information and communication technologies in modern society.
???????????, добавлен 06.02.2017Problems of security of biometric authentication systems and analysis of the author's approach to increasing their reliability. Features and conditions of use of these systems for the security of information resources, their advantages and disadvantages.
??????, добавлен 06.05.2018Optimization using intellectual centers based on artificial intelligence of the information infrastructure of universities in the conditions of wartime challenges. Creation of reliable and adaptive information systems that support educational activities.
??????, добавлен 06.12.2024Communicating over long distances. The Telegraph and commercial Growth of the Telephone. The Emergence of Broadcasting. International Telecommunications Networks. Hand-Held Radio Transceivers. History and development of communications satellites.
???????, добавлен 24.12.2013The article analyzes the application of information technologies to the analysis of the stock market, namely to the study of the dynamics of the Ukrainian currency exchange rate, which will allow us to draw a conclusion about the market as a whole.
??????, добавлен 25.11.2023- 73. Cognitive models
Goal and task hierarchies. The model aspects of users: understanding, knowledge, intentions, processing. The study of complexity theory. Use rules of production. Device generalized transition networks. Four rules to model problem architectural spaces.
??????, добавлен 28.12.2013 The performance of transmission Multi Input Multi Output beamforming for the multi subscriber in large cell with effective channel throughput has been investigated. Singular value decomposition (SVD) using Single User in 3GPP Long Term Evolution (LTE).
??????, добавлен 23.02.2016Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.
??????, добавлен 13.08.2023
