Artificial neural networks, Computer Engineering

Assignment Help:

Artificial Neural Networks:

However imagine now in this example as the inputs to our function were arrays of pixels and there actually taken from photographs of vehicles such that the output of the function is either 1, 2 or 3 when 1 stands for a car and 2 stands for a bus and 3 also stands for a tank.

Hence in this case there the function that takes an array of integers representing pixel data and outputs either 1 or 2 or 3 will be fairly complicated then it's just doing the same kind of thing as the two simpler functions. 

Presumably the functions learned an example as categorise photos of vehicles into a category of car or bus or tank then are so complicated that we say the ANN approach is a black box approach is because of that the function performs well at its job so that we cannot look inside it to gain a knowledge of how it works. However this is a little unfair as maybe there are some projects that have addressed the problem of translating learned neural networks into human readable forms. Moreover,, there in generally ANNs are used in cases when the predictive accuracy is  of greater importance than understanding the learned concept.


Related Discussions:- Artificial neural networks

Drag and drop state numbers and functions in vb, State 0 Source control is ...

State 0 Source control is being dragged with the variety of a target. 1 Out of the variety of a target. 2 One position in the target to one another.

What are semaphores, What are semaphores? Semaphore : A semaphore is a...

What are semaphores? Semaphore : A semaphore is a synchronization tool which gives a general-purpose solution to controlling access to critical sections. It s an abstract data

Explian two limitations of dead-box analysis, (a) Explian two limitations o...

(a) Explian two limitations of dead-box analysis. (b) Describe why memory analysis is difficult. (c) With reference to the "Shadow Walker" rootkit, explain what is meant by

Develop a simple patient management system, In the first part of Assignment...

In the first part of Assignment 2A you will develop a simple Patient class, representing an Patient who is to be admitted for a minor procedure that only requires a 1-2 day stay in

Why do we need dma, Why do we need DMA? DMA is used to transfer the blo...

Why do we need DMA? DMA is used to transfer the block of data directly among an external device and the main memory without the continuous intervention by the processor.

What is interactive reporting, What is interactive reporting? It helps ...

What is interactive reporting? It helps you to make easy-to-read lists.  You can view an overview list first that having general information and give the user with the possibil

Explain about butterfly permutation, Q. Explain about Butterfly permutation...

Q. Explain about Butterfly permutation? Butterfly permutation:  This kind of permutation is attained by interchanging the most significant bit in address with least significant

Security analysis, Security Analysis: Suppose you are a young securiti...

Security Analysis: Suppose you are a young securities analyst, working in a small brokerage firm. You have access to publicly available information relevant to valuation of th

Embedded systems and the system in which rtos is running, Explain What is t...

Explain What is the difference among embedded systems and the system in which RTOS is running? Ans) Embedded system can have RTOS and cannot have also. It depends on the requi

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd