Architecture of artificial neural networks, Computer Engineering

Architecture of Artificial neural networks:

Presumably "Artificial Neural Networks" consist of a number of units that are mini calculation devices. But they take in real-valued input from multiple other nodes and they produce a single real valued output.  Through real-valued input and output we mean real numbers that are able to take any decimal value. However the architecture of ANNs is as given: 

1. There a set of input units that take in information about the example to be propagated by the network. Through propagation the information from the input will be passed by the network and an output produced. Presumably the set of input units forms that what is known as the input layer. 

2. There a set of hidden units that take input from the input layer. If there the hidden units collectively form the  hidden layer then just to simplicity here we assume like each unit in the input layer is connected to each unit of the hidden layer so it means this isn't necessarily the case. As a weighted su units forms the input to every hidden unit. Remember that the number of hidden units is usually smaller than the number of input units of course. 

3. There a set of output units that in learning tasks and dictate the category assigned to an example propagated through the network. So the output units form the output layer. Hence again for simplicity here we assume that each unit in the hidden layer is connected to each unit in the output layer so a weighted sum of the output from the hidden units forms the input to every output unit.  Still m of the output from the input.

Posted Date: 1/11/2013 6:48:49 AM | Location : United States







Related Discussions:- Architecture of artificial neural networks, Assignment Help, Ask Question on Architecture of artificial neural networks, Get Answer, Expert's Help, Architecture of artificial neural networks Discussions

Write discussion on Architecture of artificial neural networks
Your posts are moderated
Related Questions
Virtual Private Networks (VPN) In order to encrypt/decrypt all the communication network traffic that passes through the Internet or Intranet, a VPN uses software or hardware.

INT 21H supports about 100 different functions. A function is recognised by putting the function number in AH register. For illustration if we want to call function number 01 then

Explain dataflow computation model An option to the von Neumann model of computation is a dataflow computation model. In a dataflow model the control is tied to the flow of dat

Update -task updates are Asynchronous updates.

What is secondary list? It permits you to enhance the information presented in the basic list.  The user can, for example, select a line of the basic list for which he require

What is compiler? A system software program known as a compiler translates the high-level language program into a suitable machine language program having instruction such as t

Q. Starting parallel virtual machine? To initialize PVM on any host on that PVM has been installed we can type  % pvm The PVM console known as pvm is a standalone PVM t

This part looks at Berliner's program, two backprop versions by Tesauro and a temporal difference process by Tesauro. This latter program is VERY good quality and has found strateg

Hi I study master of computer science I have assignment for subject statical natural language processing . I need solved due date on 6 May2014 at 11 pm Australia time I need yo

Give some examples of malicious data.  In May 2002, the Norton Anti-Virus software for Windows operating systems detects about 61000 malicious programs. Some of them are named