Analytical Study of Neural Network Techniques: SOM, MLP and Classifier-A Survey
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: This paper focuses on the various neural network techniques including Multilayer perceptron (MLP) neural network, classifier and self-organizing maps (SOMs). Various aspects of neural network techniques are mentioned in this paper along with the advantages and drawbacks. The neural network models are trained with measured values of the field strength at arbitrary points. The back propagation training algorithm is used for the learning process in MLP. The mechanism of supervised and unsupervised learning are also specified.
Authors and Affiliations
Sonali B. Wankhede
Energy Consumption of Intermediate node in AODV
Abstract: An A MANET(Mobile Ad-Hoc NETwork)is a network of wireless mobile nodes,without a centralizedcontrol.MANET can be characterized as unstructured Ad-Hoc,mobile nodes with limited resources includingenergy.AO...
Implementation of an Improved Multi-Channel Security in Cloud Computing Using Image Steganography and RSA Algorithm
The increase use of cloud computing infrastructure has led to a security consciousness by users and cloud service providers to protect data available in the cloud from illegal users. Even though, different techniques hav...
Clustering Algorithm Based On Correlation Preserving Indexing
Fast retrieval of the relevant information from the databases has always been a significant issue. Different techniques have been developed for this purpose; one of them is Data Clustering. In this paper Data &nb...
An innovative scheme for representation of signed numbers employing ternary logic and method of development of semiconductor optical amplifiers based wavelength encoded optical ternary half adder
Abstract: In binary logic, two different logical states are used to represent signed as well as unsigned numbers. In case of signed numbers one bit, usually the Most Significant Bit is solely devoted to represent the sig...
BEST-1: A Light Weight Block Cipher
Abstract: The demand for applications involving Wireless Sensor Network (WSN) or RFID systems is increasing. The sensor in a WSN and RFID tag/reader in a RFID system are called resource constrained devices becaus...