Pixel-to-scale standard deviations ratio optimization for two-layer perceptron training on pixel-distorted scaled 60-by-80-images in scaled objects classification problem
The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.
Подобные документы
Features a combination of different approaches to work with sets of objects, their classes to the design and development of artificial intelligence systems to analyze information using object-oriented programming. Determining properties of object class.
статья, добавлен 28.02.2016Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016A negligibility-based framework to model network-centric security problems in mobile ad hoc networks. Modeling network-centric security in a negligibility-based framework with network scale as the input parameter and anti-disruption secure routing.
статья, добавлен 15.09.2012Methods of classification of correlation extremal navigation systems, geophysical fields. The block diagram of CENS, which works in risk conditions. Dependence of posteriori probability on the quantity of key points and total error of its determination.
статья, добавлен 26.06.2016Dictionary data structures. Tolerant retrieval: Wildcards, Spell correction, Soundex. Sort-based index construction. Blocked sort-based Indexing (Sorting with fewer disk seeks). Remaining problem with sort-based algorithm. Single-pass in-memory indexing.
презентация, добавлен 19.02.2014The problem is to find the reliable sensor for detection of dangerous tilt angle. Task is to identify the sensor properties as sensitivity, zero shift and also uncertainty of measurement. Before using it is necessary to identify sensor properties.
статья, добавлен 26.08.2020The prerequisites for the emergence and formation of areas of computer science that explores the possibilities of electronic encryption devices using large-scale integrated computer circuits. The structure of cryptographic techniques to explore data.
книга, добавлен 08.03.2014Creating a classification of methods and ranking of commercial sites of the coal-energy and mining-metallurgical complexes with regard to their marketing. Development of the system criteria local commercial sites, their formalization and the digitized.
статья, добавлен 30.07.2016Search for opportunities to ensure the security of the state in view of the formation of a new field of confrontation - cyberspace. Consideration of factors influencing the country's cybersecurity situation and protection of information objects.
статья, добавлен 18.09.2020Characteristics and use of a RGB color space. Methods transmission colors in images. Working RGB color space for applications. Their use in order to minimize the image space. Analysis of digital image processing and conversion. Future RGB Display spaces.
статья, добавлен 16.02.2016The technology of integration of three-dimensional models of potentially dangerous objects into the geoinformation system of executive bodies. Description of spatial information in the composition of three-dimensional models. Means of a unified system.
статья, добавлен 30.04.2018The problem of information and communication technologies and electronic learning tools and their impact on student achievement is considered. Subjects related to the use of technology in performing tasks with the help of a computer are described.
статья, добавлен 24.08.2022JavaScript as a prototype-based scripting language programming. JavaScript as a language for embedded software applications access to objects. Use of browsers as a scripting language to make interactive Web pages. Key architectural features JavaScript.
книга, добавлен 14.03.2014Basics of Contemporary Cryptography for Information Technology Practitioners. Codes for Error Detection. Advances in Coding Theory and Cryptography. Arcs, minihypers, and the classification of three-dimensional Griesmer codes. About the code equivalence.
книга, добавлен 08.03.2014Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.
курс лекций, добавлен 08.03.2014Optimization using intellectual centers based on artificial intelligence of the information infrastructure of universities in the conditions of wartime challenges. Creation of reliable and adaptive information systems that support educational activities.
статья, добавлен 06.12.2024The elements of computer security. Cryptography approaches and attacks. An advanced encryption standard. Key generation and distribution approaches and attacks. The qualities of workable security solutions. The trusted platform module at biometrics.
книга, добавлен 08.03.2014Analysis of the model of dynamic classification software applications included in the business critical systems for security access. Information technology, allowing to distinguish three basic classes of safety-critical access software applications.
статья, добавлен 22.12.2016This paper explores the development and application of a long-short-term memory model for virtual distributed system control optimization using the TensorFlow and Keras frameworks. In the context of the rapid development of information technologies.
статья, добавлен 18.09.2024The Internet as a revolutionary phenomenon that enables millions of individuals across the globe to access, exchange and create vast amounts of information. The Internet as a practical problem. A new means for empowerment. A new form of oppression.
статья, добавлен 15.06.2012In the article efficiency of DCT-based filters for a wide-class of images is investigated. The study is carried out for additive white Gaussian noise (AWGN) case with several intensity levels. Local DCT-based filter is used as basic denoising technique.
статья, добавлен 07.12.2016Identify and select fragments of developed software products and applied technologies that contribute to the formation and development of professional competencies of professionals. Reviews software applications and fragments of their software code.
статья, добавлен 16.08.2023Auction and contract networks as coordination mechanisms in multi-agent systems based on Foundation for Intelligent Physical Agents protocols. Structural elements of mechanisms in the socio-economic and political contexts of the use in cybersecurity.
статья, добавлен 09.09.2021This systematic literature review aims to identify the impact of artificial intelligence in foreign language learning using learning management systems by systematically reviewing studies related to the area. Application of the PRISMA block diagram.
статья, добавлен 16.01.2024The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.
статья, добавлен 23.06.2016