نتایج جستجو برای: layer perceptron neural network this model has been established of one input layer

تعداد نتایج: 21561211  

Journal: :international journal of industrial mathematics 0
a. jafarian department of mathematics, urmia branch, islamic azad university, urmia, iran. s. measoomy nia department of mathematics, urmia branch, islamic azad university, urmia, iran.

this paper intends to offer a new iterative method based on arti cial neural networks for finding solution of a fuzzy equations system. our proposed fuzzi ed neural network is a ve-layer feedback neural network that corresponding connection weights to output layer are fuzzy numbers. this architecture of arti cial neural networks, can get a real input vector and calculates its corresponding fu...

Risks assessment of forest project implementation in spatial density changes of forest under canopy vegetation using artificial neural network modeling approach   Nowadays, environmental risk assessment has been defined as one of the effective in environmental planning and policy making. Considering the position and structure of vegetation on the forest floor, the main role of forest under ca...

An optimal artificial neural network (ANN) has been developed to predict the Nusselt number of non-Newtonian nanofluids. The resulting ANN is a multi-layer perceptron with two hidden layers consisting of six and nine neurons, respectively. The tangent sigmoid transfer function is the best for both hidden layers and the linear transfer function is the best transfer function for the output layer....

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

a major concern in the last few years has been the fact that the cultural centers are keeping distance with what they have been established for and instead of reproducing the hegemony, they have turned into a place for resistance and reproduction of resistance against hegemony. because the cultural centers, as urban public spaces in the last two decades, have been the subject of ideological dis...

پایان نامه :0 1375

investigation the archetype of mother can help the reader to understand poes works, especially his fiction, better, if not fully. motivated by internal and external drives to get into the universe in its manifold form poe was impelled to art and, from various modes of art, to symbolism. how much was poe successful to produce works of art has been a matter of dispute among critics. however, ther...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده مدیریت 1392

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

Ata Allah Nadiri Hadi Sabri Mahak Osuli Parinaz Mehnati, Reza Malekzadeh Reza Meynagi Zadeh Zargar Yaser Bagheri

Introduction: Solar radiation has a major role in design, utilization, development, and planning of solar energy. The most important source of natural ultraviolet radiation is the sun, which has an important role in many biologic processes. Some of these processes are useful, like the production of vitamin D in the body, or curing rickets, and some of them are not, such as ski...

2016
Mahmoud Ltaief Hala Bezine Adel M. Alimi

In this paper we developed a spiking neural network model that learns to generate online handwriting movements. The architecture is a feed forward network with one hidden layer. The input layer uses a set of Beta elliptic parameters. The hidden layer contains both excitatory and inhibitory neurons. Whereas the output layer provides the script coordinates x(t) and y(t). The proposed spiking neur...

پایان نامه :0 1374

this experimental study has been conducted to test the effect of oral presentation on the development of l2 learners grammar. but this oral presentation is not merely a deductive instruction of grammatical points, in this presentation two hypotheses of krashen (input and low filter hypotheses), stevicks viewpoints on grammar explanation and correction and widdowsons opinion on limited use of l1...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید