Architecture of artificial neural networks, Computer Engineering

Architecture of Artificial neural networks:

Presumably "Artificial Neural Networks" consist of a number of units that are mini calculation devices. But they take in real-valued input from multiple other nodes and they produce a single real valued output.  Through real-valued input and output we mean real numbers that are able to take any decimal value. However the architecture of ANNs is as given: 

1. There a set of input units that take in information about the example to be propagated by the network. Through propagation the information from the input will be passed by the network and an output produced. Presumably the set of input units forms that what is known as the input layer. 

2. There a set of hidden units that take input from the input layer. If there the hidden units collectively form the  hidden layer then just to simplicity here we assume like each unit in the input layer is connected to each unit of the hidden layer so it means this isn't necessarily the case. As a weighted su units forms the input to every hidden unit. Remember that the number of hidden units is usually smaller than the number of input units of course. 

3. There a set of output units that in learning tasks and dictate the category assigned to an example propagated through the network. So the output units form the output layer. Hence again for simplicity here we assume that each unit in the hidden layer is connected to each unit in the output layer so a weighted sum of the output from the hidden units forms the input to every output unit.  Still m of the output from the input.

Posted Date: 1/11/2013 6:48:49 AM | Location : United States







Related Discussions:- Architecture of artificial neural networks, Assignment Help, Ask Question on Architecture of artificial neural networks, Get Answer, Expert's Help, Architecture of artificial neural networks Discussions

Write discussion on Architecture of artificial neural networks
Your posts are moderated
Related Questions
State the various Security Tools Securing an Intranet is not a simple task. Just as articles in a house are protected by use of various types of security systems such as lock

Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve betw   #includ

E-Commerce is not suitable for Online job searching.

Q. Explain about Diodes? A single pn-junction with appropriate contacts for connecting the junction to external circuits is called a semiconductor pn-junction diode. The fundam

Explain the concept of variable-partition contiguous storage allocation. Suppose that we have 1024K main memory available in that 128K is occupied through operating system pro

super ascii string checker

Analysis of Sort_Bitonic(X) The bitonic sorting network needs log n number of phases for performing task of sorting the numbers. The first n-1 phases of circuit can sort two n/

give sample prepaired software?

Search Methods and Heuristics - Artificial intelligence: Here now we come to the question of how constraint solvers search for solutions -constraint preserving coursework of v

General Considerations for Research -artificial intelligence: If we can specify the initial state, the operators or a consumer and the goal check for a search problem, that al