• No results found

fully connected network

Estimation of Network Reliability for a Fully Connected Network with Unreliable Nodes and Unreliable Edges using Neuro Optimization

Estimation of Network Reliability for a Fully Connected Network with Unreliable Nodes and Unreliable Edges using Neuro Optimization

... neural network can implement with stochastic ...a fully connected network. Every node is connected to other nodes, except ...the network may be unreliable, ...This network ...

16

A Double Error Dynamic Asymptote Model of Associative Learning

A Double Error Dynamic Asymptote Model of Associative Learning

... a fully-connected network architecture in which stimuli are represented as temporally clustered elements that associate to each other, so that elements of one cluster engender activity on other ...

143

A Novel Method for Remotely Sensed Hyperspectral Image Classification
Based on Convolutional Neural Network

A Novel Method for Remotely Sensed Hyperspectral Image Classification Based on Convolutional Neural Network

... Abstract: The Hyperspectral Images (HSI) acquired by remote sensors are characterized by hundreds of contiguous channels with high spectral resolution. Hyperspectral image classification is the process of assigning land ...

10

A Step Forward to Revolutionise IntrusionDetection System Using Deep Convolution Neural Network

A Step Forward to Revolutionise IntrusionDetection System Using Deep Convolution Neural Network

... The method selected is the optimized CNN due to the following reasons. Firstly, it has automatic feature extraction capability which helps to extract the relevant information from the input. In the domain of intrusion ...

13

The Perception of Flood attacks in Loosely Connected Network

The Perception of Flood attacks in Loosely Connected Network

... Loosely Connected Networks (LCNs) comprise of portable nodes, which move throughout the network. LCNs empower information exchange when portable nodes are just irregularly associated, though there is no ...

6

Review on Network on Chip (NoC) Topology

Review on Network on Chip (NoC) Topology

... a network is the distance between inter nodes , the maximum number of links that should be traversed to send a message to all nodes along the shortest ...of network can also help to provide low and ...

5

Context Aware in Intermittently Connected Network Routing

Context Aware in Intermittently Connected Network Routing

... probability is defined as the ratio of the number of packets received by destination nodes to the number of packets sent by source nodes. This probability can be improved by disseminating more message copies in the ...

10

EA-CG: An Approximate Second-Order Method for Training Fully-Connected Neural Networks

EA-CG: An Approximate Second-Order Method for Training Fully-Connected Neural Networks

... training fully-connected neural networks (FCNNs), we propose a practical approximate second-order method includ- ing: 1) an approximation of the Hessian matrix and 2) a conju- gate gradient (CG) based ...

10

Stability Criteria Of Fully Connected Hopfield Artificial Neural Network

Stability Criteria Of Fully Connected Hopfield Artificial Neural Network

... Neural Network (HANN). Hopfield Neural Network is a multiple loop feedback neural network which can be used as an associative ...the network are connected to every other neuron but ...

6

Dynamic Multicast Transmission Packets Control in DTNs Using Mobile Adhoc Networks

Dynamic Multicast Transmission Packets Control in DTNs Using Mobile Adhoc Networks

... Mobile Delay Tolerant Networks (DTNs), also called as occasionally connected mobile networks, are wireless networks in which a fully connected path from source to destination is unlikely to exist. In ...

6

Multi Layer, Multi Dimensional and Multi Granularity Network Model to Measure Network Security

Multi Layer, Multi Dimensional and Multi Granularity Network Model to Measure Network Security

... The network node layer measures the network reliability and structure without considering the resources of nodes and the resource layer measures the nodes’ ...the network security from the ...

14

Detection of Vulnerabilities in Network-Connected Servers

Detection of Vulnerabilities in Network-Connected Servers

... Many Web Servers either contain or have access to sensitive data. A server used for electronic commerce may contain customer records and credit card information, all of which must be kept from prying eyes. Some Web ...

6

Interacting nonequilibrium systems with two temperatures

Interacting nonequilibrium systems with two temperatures

... two-dimensional fully connected Heisenberg lattice where each node represents a spin-1/2 ...are fully connected to their own separate thermal reservoirs and no particle is connected to ...

18

On The Determination of a Low Cost K-Connected Network

On The Determination of a Low Cost K-Connected Network

... communication network is to achieve a specified performance at a minimal ...node network, let alone a 100 node ...potential network topology (called a starting network) and see if it satisfies ...

5

On The Determination of a Low Cost K-Connected Network

On The Determination of a Low Cost K-Connected Network

... a network and a cost matrix giving the cost of establishing a link between any node i and any node j, we proceed as ...starting network results when the edges of T1 and T2 are ...

5

Simple and Efficient Smoke Segmentation Based on Fully Convolutional Network

Simple and Efficient Smoke Segmentation Based on Fully Convolutional Network

... Our network parameters are almost ignorable compared to other ...and network complexity indicate that our proposed algorithm is more suitable for practical ...SegNet network recognizes a richer smoke ...

5

Design and optimization of the Automatic Brown PlantHopper (BPH) light trap surveillance network

Design and optimization of the Automatic Brown PlantHopper (BPH) light trap surveillance network

... The position of the light traps are stored in the plain text with xml format (*.gpx) that are used as input data. Fig. 5 presents the structure of the data with three types of information including date, coordinate of ...

7

A case study on accessibility of medical and healthcare facilities in Mashhad using GIS

A case study on accessibility of medical and healthcare facilities in Mashhad using GIS

... centers can be considered as one of the indices for having access to healthcare [5]. As urban environments become complex day by day, the difficulty of planning in this field increases accordingly. The application of ...

10

Scale Invariant Fully Convolutional Network: Detecting Hands Efficiently

Scale Invariant Fully Convolutional Network: Detecting Hands Efficiently

... new efficient hand detection method termed as Scale In- variant Fully Convolutional Network (SIFCN). SIFCN em- ploys existing popular deep learning architecture such as VGG16 (Simonyan and Zisserman 2014) ...

8

Research on the Architecture of a Converged Satellite and Terrestrial Network with Content Nearby Delivery

Research on the Architecture of a Converged Satellite and Terrestrial Network with Content Nearby Delivery

... communication network architecture converged satellite and terrestrial network proposed in this paper fully utilizes the advantages of the satellite network to make up for the insufficiency of ...

9

Show all 10000 documents...

Related subjects