Features of hybrid neural networks use with input data of different types

Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.

Подобные документы

  • Study of method of the adaptive shaping of flows of network traffic and method of tuning of the control systems with an indirect feedback. Analysis of algorithm of multivariable adaptation of shaper to changing the set of parameters of input traffic.

    статья, добавлен 27.12.2016

  • Analyze, manage and present spatial or geographic data and provide a technological process for their collection, storage, processing, visualization, exchange, distribution and practical use. Stages of development of geographic information systems.

    статья, добавлен 11.03.2019

  • In this book - notions from three different areas: how digital information has to be designed, how artifacts or systems containing digital content should maximize usability, how context can influence the nature and efficiency of digital communication.

    книга, добавлен 09.04.2013

  • Ознакомление с этапами программирования базы данных для туристической карты, с использованием пакета программ ArcGIS 10.1. Рассмотрение примера создания триангуляционной сети "Triangular Irregular Networks". Этапы визуализации цифровой модели карты.

    статья, добавлен 17.03.2014

  • Изучение основных видов функций принадлежности нечетких множеств. Способы построения и коррекции функций принадлежности в пакете программ MatLab. Состав и возможности инструментария нечеткой логики Fuzzy Logic Toolbox, входящего в пакет программ MatLab.

    лабораторная работа, добавлен 25.08.2011

  • The article deals with problems of a different nature that arise in any type of business activity with insufficient attention to the removal or concealment of the information contained in the metadata of various documents. Various types of documents.

    статья, добавлен 16.01.2024

  • The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.

    статья, добавлен 27.03.2016

  • The formation of a common information space. The describing of a new generation of information systems, which are provided the grow and further development of the enterprises and corporate decision-making effectiveness in current economical situation.

    статья, добавлен 26.06.2018

  • Basics of Contemporary Cryptography. Codes for Error Detection. Advances in Coding Theory and Cryptography. Encryption Basics. Authentication Codes in the Query Model. Collision in the DSA Function. Fuzzy Identity-based Encryption: Efficient Schemes.

    учебное пособие, добавлен 08.03.2014

  • The development of mobile versions of official websites, creation of special programs, registration and constant support of official pages in social networks are revealed. Organization of independent work of engineers and teachers of computer profile.

    статья, добавлен 22.08.2021

  • The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.

    статья, добавлен 28.08.2016

  • Memory Definitions. Memory Block Diagram. Memory Organization Example. Basic Memory Operations. Timing of signal changes and data observation. RAM Integrated Circuits. Cell Arrays and Coincident Selection. Storage of information on different capacitors.

    презентация, добавлен 03.06.2012

  • Local and wide area networks, їх головні особливості. Основні відмінності локальних мереж від глобальних. Швидкість обміну даними, розділення каналів, оперативність виконання запитів, масштабованість. Головні причини появи мереж масштабу великого міста.

    реферат, добавлен 26.08.2013

  • Signature schemes and anonymous credentials from bilinear maps. Asymptotically optimal communication for torus-based cryptography. Paradigm of hybrid encryption scheme. Pseudo-signatures, broadcast, and multi-party computation from correlated randomness.

    книга, добавлен 08.03.2014

  • Internet multimedia: media element such as sound, animation and video. File transfers: downloading (process of transferring the file from remote computer to your computer) and uploading (sending a copy of files from your computer to remote computer).

    лекция, добавлен 15.04.2014

  • Features of the authentication scheme built on the complex fractal sets using the composition methods of remote evaluation of knowledge. Algorithm for client-server interaction. Improvement in security of network information resources in the scheme.

    статья, добавлен 25.03.2016

  • The concept features and nature of IT piracy and effect of information society on the emergence and spread of piracy on the Internet. Problems of the spread and speed of persistent violations, commission of acts of piracy, plagiarism in the Internet.

    статья, добавлен 08.05.2018

  • Data flow diagrams as a hierarchy of functional processes related data flows. Familiarity with the main components of a data flow diagram: external entities, systems and subsystems, processes. Analysis of the structure of building hierarchy DFD.

    статья, добавлен 25.03.2019

  • A number of different techniques that people can use to hide information. The sound files and images that float about the network today. Measuring and encrypting information. Error correction and white noise. Analysis of hiding information in JPEG files.

    книга, добавлен 08.03.2014

  • Organizational problems that affect the decision. Socio-technical model and methodology of soft systems. Training users find information. The impact of structure in work. Free search system problems computer. Electronic communication as a critical mass.

    лекция, добавлен 28.12.2013

  • Comparative analysis of the ways to reduce the contingency of loss of access. The secret key - the main part of the protection system in most cryptographic algorithms. Homomorphism property as one of the basic features of Shamir threshold scheme.

    статья, добавлен 06.05.2018

  • Research of aspects of information protection procedure development on the basis of software development. Characteristics of the Raspberry PI platform and the Raspbian system. Possibilities of influence of third-party means on management of object.

    статья, добавлен 29.10.2020

  • Features of the use of special terms in the modern information and communication space. Disclosure of the content and the essence of the Open Source Intelligence and "consolidated information", identification of similarities and differences between them.

    статья, добавлен 08.06.2024

  • Describing the main synthesis of fault-tolerant topologies, the consideration of the possibilities of using their features and the analysis of the main characteristics in comparison with each other and with classic versions based on binary code.

    статья, добавлен 19.07.2020

  • Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.

    лабораторная работа, добавлен 17.03.2016

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.