The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper was presented a practical method of solving inverse problems in tomography using neural networks. The methods to detect changes in the size and position of an object inside another object tomography. Computed tomography allows direct, non-invasive diagnosis of brain and other intracranial structures. With this method it is possible to detect intracerebral hemorrhages, tumors, etc.
W publikacji umieszczono wyniki dotyczące badania jakości sterowania siecią neuronową pracującą z różnym czasem wykonywania obliczeń. Celem jest wyznaczenie (dla założonego obiektu) granicy częstotliwości, z jaką musi pracować sieć, aby sterowanie spełniało założone wskaźniki jakości. Do uczenia sieci neuronowej wykorzystano algorytm adaptacyjnej interakcji.
Technique of creating a sub-line diagnostics status turbine unit thermal power plant based on an analysis of its diagnostic features. Rapid assessment of the technical state of turbine unit allows an early stage to detect the possibility of an emergency and to localize it. It involves the integration of the subsystems of the existing process control system (PCS), which will allow more efficient use...
Nowadays, with the rapid development of network technologies and with global informatization of society problems come to the fore ensuring a high level of information system security. With the increase in the number of computer security incidents, intrusion detection systems (IDS) started to be developed rapidly.Nowadays the intrusion detection systems usually represent software or hardware-software...
In the past few years, we have seen a rapid expansion in the field of mobile computing due to the proliferation of inexpensive, widely available wireless devices. However, current devices, applications and protocols are solely focused on cellular or wireless local area networks (WLANs), not taking into account the great potential offered by ad hoc networking. Ad hoc networks are wireless mobile networks...
In this paper, we present our research which confirms the suitability of the convolutional neural network usage for the classification of single-lead ECG recordings. The proposed method was designed for classifying normal sinus rhythm, atrial fibrillation (AF), non-AF related other abnormal heart rhythms and noisy signals. The method combines manually selected features with the features learned by...
Artificial neural networks are essential intelligent tools for various learning tasks. Training them is challenging due to the nature of the data set, many training weights, and their dependency, which gives rise to a complicated high-dimensional error function for minimization. Thus, global optimization methods have become an alternative approach. Many variants of differential evolution (DE) have...
The scheme of dynamic management of traffic and activity of message sources with different priority of service is considered. The scheme is built on the basis of the neuroprognostic analysis model and the gradient descent method. For prediction and early detection of overload, the apparatus of the general theory of sensitivity with indirect feedback and control of activity of message sources is used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.