نتایج جستجو برای: elman networks

تعداد نتایج: 428057  

1998
Laura Firoiu Tim Oates Paul R. Cohen

We consider the problem of learning a nite automaton with recurrent n e u r a l networks from positive evidence. We train Elman recurrent neural networks with a set of sentences in a language and extract a nite automaton by clustering the states of the trained network. We observe that the generalizations beyond the training set, in the language recognized by the extracted automaton, are due to ...

2007
Helga Mazyar Kaveh Mahdaviani Saeed Majidi H. Saraee

In this paper a multi agent model for predicting monthly maximum and minimum quote prices has been proposed. This model is based on the training of Elman neural networks and using particle swarm optimization for obtaining the best parameters of the neural networks. Also one method for reducing the effects of overfitting problem is suggested. This method averages the outputs of an ensemble netwo...

Journal: :Soft Comput. 2014
Rohitash Chandra

Cooperative coevolution decomposes an optimisation problem into subcomponents and collectively solves them using evolutionary algorithms. Memetic algorithms provides enhancement to evolutionary algorithms with local search. Recently, the incorporation of local search into a memetic cooperative coevolution method has shown to be efficient for training feedforward networks on pattern classificati...

Journal: :IJIMAI 2012
Sumit Goyal Gyanendra Kumar Goyal

— For predicting the shelf life of processed cheese stored at 7-8º C, Elman single and multilayer models were developed and compared. The input variables used for developing were applied in order to compare the prediction ability of the developed models. The Elman models got simulated very well and showed excellent agreement between the experimental data and the predicted values, suggesting tha...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...

Journal: :Energies 2021

The internal leakage of a hydraulic cylinder is an inevitable system failure that seriously affects the working efficiency system. Therefore, it very important to accurately identify and predict data in cylinder. In this paper, model proposed simulate small cylinders, convert amount oil into strain signals through high-precision gauges train collected using various neural networks form computat...

2012
Elif Derya Übeyli Mustafa Übeyli

Artificial neural networks (ANNs) are computational modeling tools that have recently emerged and found extensive acceptance in many disciplines for modeling complex realworld problems. ANN-based models are empirical in nature, however they can provide practically accurate solutions for precisely or imprecisely formulated problems and for phenomena that are only understood through experimental ...

Journal: :Applied Artificial Intelligence 2004
Xiaohu Shi Yanchun Liang H. P. Lee W. Z. Lin X. Xu S. P. Lim

This work has been partially supported by the Science-Technology Development Project of Jilin Province of P.R. China (Grant No. 20030520) and the Key Science-Technology Project of the National Education Ministry of P.R. China (Grant No. 02090). Address correspondence to Professor Y.C. Liang, College of Computer Science and Technology, Jilin University, Changchun 130012, P.R. China. E-mail: lian...

Journal: :Annales UMCS, Informatica 2007
Jaroslaw Skaruz Franciszek Seredynski

In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to be performed. The problem of detection of this class of attacks is transformed to time series prediction problem. SQL queries are used as a source of events in a protected environment. To differentiate between normal S...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید