UNIVERSAL APPROXIMATION WITH NON-SIGMOID HIDDEN LAYER ACTIVATION FUNCTIONS BY USING ARTIFICIAL NEURAL NETWORK MODELING
Journal Title: Indian Journal of Computer Science and Engineering - Year 2014, Vol 5, Issue 5
Abstract
Neural networks are modeled on the way the human brain. They are capable of learning and can automatically recognize by skillfully training and design complex relationships and hidden dependencies based on historical example patterns and use this information for forecasting. The main difference, and at the same time is biggest advantage of the model of neural networks over statistical techniques seen that the forecaster the exact functional structure between input and Output variables need not be specified, but this by the system with certain Learning algorithms is "learned" using a kind of threshold logic. Goal of the learning procedure is to define the training phase while those parameters of the network, with Help the network has one of those adequate for the problem behavior. Mathematically, the training phase is an iterative, converging towards a minimum error value process. They identify the processors of the network, minimize the "total error". The currently the most popular and most widely for business applications algorithm is the backpropagation algorithm. This paper opens the black box of Backpropagation networks and makes the optimization process in the network over time and locally comprehensible.
Authors and Affiliations
R. Murugadoss , Dr. M. Ramakrishnan
CLASSIFICATION OF BOUNDARY AND REGION SHAPES USING HU-MOMENT INVARIANTS
This paper attempts to introduce the concept of moment invariance into the classification algorithm based on the morphological boundary extraction and generalized skeleton transform, and tries to propose a new method abo...
ENRICHMENT OF SECURITY THROUGH CRYPTOGRAPHIC PUBLIC KEY ALGORITHM BASED ON BLOCK CIPHER
In recent years Data Security using cryptography has emerged as a topic of significant interest in both academic and industry circles. This paper deals with a new algorithm, which is based on linear block cipher. Our goa...
Modified Pixel Sieve Method for Visual Cryptography
Visual cryptography encodes a secret image into n shares which are distributed to n participants. Pixel Sieve method was proposed recently to encode an image into shares, but the encryption quality is poor. In this paper...
A FUZZY APPROACH TO DETECT AND CONTROL CONGESTION IN WIRELESS SENSOR NETWORKS
In Wireless Sensor Networks (WSN’s), congestion plays an important role in degrading the performance of the network. Under idle condition, the network load is very low whereas when an event is detected the network load b...
Optimal Spectral Analysis for detection of sinusitis using Near-Infrared Spectroscopy (NIRS)
Optical recording technique overtakes neural recording technique for simplicity, non-ionization, portability, non-invasiveness and cost effectiveness. Many optical techniques like FMRI, DOT, SPR, ERP and PPG are in use n...