政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/88696
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文笔数/总笔数 : 113160/144130 (79%)
造访人次 : 50760852      在线人数 : 646
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    政大機構典藏 > 商學院 > 資訊管理學系 > 學位論文 >  Item 140.119/88696


    请使用永久网址来引用或连结此文件: https://nccur.lib.nccu.edu.tw/handle/140.119/88696


    题名: 推理類神經網路及其應用
    The Reasoning Neural Network and It`s Applications
    作者: 徐志鈞
    Chun, Hsu Chih
    贡献者: 蔡瑞煌
    Tsaih
    徐志鈞
    Hsu Chih Chun
    关键词: 推理類神經網路
    軟性學習程序
    線性分割條件
    不相關節點
    推理機能
    The Reasoning Neural Network
    the softening learning algorithm
    linearly separating condition
    日期: 1994
    上传时间: 2016-04-29 16:30:45 (UTC+8)
    摘要: 大部的類神經網路均為解決特定問題而設計,並非真正去模擬人腦的功能
    Most of artification Neural Networks are designed to resolve
    參考文獻: Bibliography
    中文部份
    [葉怡成93]葉怡成,類神經網路模式應用與實作,儒林圖書公司,民國八十三年.
    英文部份

    [Arai89] Arai M., "Mapping abilities of three-Layer Neural Networks, ", In
    Proceedings of the International Conference on Neural Networks
    (Washington, DC:IEEE), pp I:419-424, 1989.
    [Arai93] Arai M., "Bounds on the Number of Hidden Nodes in Binary-Valued
    Three-Layer Neural Networks,", In IEEE Transactions on Neural
    Networks vol 6, pp 855-860, 1993.
    [Chau89] Y. Chauvin, "A back-propagation algorithm with optimal use of hidden
    node," In Advance in Neural Information Processing (2), D.S . Toutetzky,
    Ed. (Denver 1988), 1989,pp. 519-526.
    [Cybe89] G. Cybenko, "Approximation by superpositions of a sigmoidal function,"
    Mathematics of Control, Signals, and Systems, 2(4): pp. 303-314, 1989.
    [Cast93] Castellano G., Fanelli A. M., Pelillo M. ,"An Empirical Comparsion of
    Node Pruning Methods for Layerd Feed-forward Neural Networks", In
    Proceedings of 1993 International Joint Conference on Neural Networks,
    pp 321-326, 1993.
    [Cun90] Y. Ie Cun, 1.s. Denker, and S.A. Solla, "Optimal brain damage." In D.
    Tourezky, editor, Advances in Neural Information ProceSSing System 2, pp
    598-605. Morgan Kaufmann, 1990.
    [Free92] Freeman 1. A. , Skapura D. M.,"Neural Networks Algorithm, Applications,
    and Programming Techniques", Addison-Wesley, Reading MA, 1992.
    [Hertz91] J. Hertz, A. Krogh, R. Palmer, "Introduction to the theory of neural
    computation", Addison-Wesley, Reading MA, 1991.
    [Hagi93] Hagiwara M.,"Removal of hidden nodes and Weights for Back
    Propagation Networks", In Proceedings of 1993 International Joint
    Conference on Neural Networks, pp 35 1-353,1993.
    [Hajn87] A Hajnal, W. Maass, P.Pudlak, M. Szegedy, and G. Turan, "Threshold
    circuits of bounded depth." In Proceedings of the J 987 IEEE Symposium
    on the Funciations of Science, pp. 99-110,1987.
    [Hint87] Geoffrey E. Hinton and Terrence J. Sejnomsk.i. "Neural network
    architectures for AI" Tutolial No. MJ?2, AAA187, Seattle, W A, July 1987.
    [Huan91] Huang, S. c., & Huang, Y. F. "Bounds on the number of hidden neurons in
    multilayer perceptrons,", In IEEE Transactions on Neural Networks Vol 2,
    pp 47-55, 1991.
    [Hush93 J Don R. Hush and Bill G. Horne, "Progess in Supervised Neural Networks:
    What`s New Since Lippmann?", In IEEE SIGNAL ProceSSing magazine, pp
    8-39, January 1993.
    [Ishi90] M. Ishikawa, "A structural learning algorithm with forgetting of link
    weights," Tech. Rep. TR-90-7, Electroteclmical Lab., Tsukuba-City, Japan,
    1990.
    [Jac088] Adaptation." Neural Networks, Vol 1, pp 295-307.
    [Ji90] C. Ji, R.R. Snapp, and D. Psaltis, "Gereralizing smoothness constraints
    from discrete samples," Neural Commputation, Vol. 2, no. 2, pp. 188-197,
    1990.
    [Kam90] E . D. Karnin,"A simple procedure for pruning back-propagation trained
    neural network," IEEE Trans. Neural Networks, Vol. 2, no. 2, pp. 239-242,
    1990.
    [Krus88] Kruschke, J, "Creating local and distributed Bottlenecks in Hidden Layers
    of Back pop gat ion Networks," in Touretzky, D., Hiton, G., and Sejnowski,
    T (Eds): Proceeding oj the Connectionist Models Summer School 1988,
    Morgan Kaufman Pub!., San Mateo, California, 1988.
    [Makh89] 1. Makhoul, A. EI-Jaroudi, and R. Schwartz, " Fonnation of disconnected
    decision regions with a single hidden layer." In Proceedings oj the
    International Joint Conference on Neural Networks. Vol 1, pp 455-460,
    1989.
    [Merz88] Merzenich, M.M., Recanzone, G., Jenkins, W.M., Allard, TT, and Nudo,
    R)., "Cortical Representional Plasticity," In Rakie, P. and Singer, W.
    (Eds) : Neurobiology of Neocortex. John Wiley and Sons Limited. S.
    Bernhard. Dahlem Konferenzen, 1988.
    [McIn89] McInerny, J.M., K.G. Hainer, S. Biafore, and R. Hecht-Nielsen (1989).
    "Back Propagation Error Surfaces Can Have Local Minima.", In
    International Joint Conference on Neural Networks (Washington 1989),
    vol. II, 627. New York:IEEE.
    [Mins69] Minsky, M.L. and S.A. Papert, "Perceptron," Cambridge: MIT Press.
    Partially reprinted in Anderson and Rosenberg, 1988.
    [Morg91J D.P. Morgan and c.L. Scofield, Neural Networks and Speech Processing.
    Kluwer Academic Publishers, 1991.
    [Moze89] M. C. Mozer and P. Smolensky, "Skeletonization: A technique for trimming
    the fat from a network via relevance assessment,", In Advances in Neural
    Information Processing (1), D.S. Touretzky, Ed. (Denver 1988), 1989, pp.
    107-115.
    [Mura91] K.Murase, YMatsunaga and Y.Nakade: "A Back-propagation Algorithm
    with Automatically Determines the Number of Association Units", Proc. of
    International Joint Conference on Neural Networks(IJCNN-SINGAPORE),
    I, p.783-788, 1991.
    [pe1i93J M. Pelillo and A. M. Fanelli, "A method of pruning layered feed-forward
    neural networks," in Proc IWANN`93, Sitges, Barcelona, June 1993
    (Berlin: Springer-Verlag).
    [Reed93] R. Reed, "Pruning A1goritluns-A Survey", in IEEE Transactions On
    Neural Network, Vo14, NO.5, September 1993, pp. 740-747.
    [Rume86] Rumelhart, D.E., James McClelland, "Parallel Distributed Processing, ", Vol
    1 and 2, MIT Press, Cambridge, MA, 1986.
    [Siet88] Sietsma., 1. and R.lF. Dow (1988), "Neural Net Pruning-Why and How."
    In IEEE International Conference on Neural Networks (San Diego 1988),
    Vol. 1,325-333. New York:IEEE.
    [Tsai93] Tsaih, R., "The Softening Learning Procedure." In Mathematical and
    Computer Modeling, Vol. 18, No.8, 61-64.
    [Tsai93] Tsaih, R., "The Softening Learning Procedure for The Layered Feedforward
    Networks With Multiple Output nodes". Proceeding of
    Intemational Joint Conference on Neural Networks, Nagoya, I, 593-596.
    [Wata93] Watanabe E. and Shimizu H., "Algorithm for Pruning Hidden Nodes in
    Multi Layerd Neural Network for binary StimulusClassification Problem",
    In Proceedings of 1993 Intemational Joint Conference on Neural
    Networks, pp 327-330, 1993 .
    [Weig91] A. S. Weigend, D. E. Rumelhart, and B. A. Huberman, "Generalization by
    weight-elimination with application to forcasting," in Advances in Neural
    Information Processing (3), R. Lippmann, J. Moody, and D. Touretzky,
    Eds, 1991, pp. 875-882.
    [Werb90] P. J. Werbos, "Backpropagation Through Time: What It Does and How to
    Do It", In Proceedings of the IEEE, Vol 78, No.1 0, October 1990, pp .
    1550-1560.
    [Werb74] P. Werbos. IIBeyond Regression :New Tools for Prediction and the Analysis
    in the Behavioral Sciences." Ph.D. thesis, Harvard, Cambridge, MA,
    August 1974.
    描述: 碩士
    國立政治大學
    資訊管理學系
    81356007
    資料來源: http://thesis.lib.nccu.edu.tw/record/#B2002003876
    数据类型: thesis
    显示于类别:[資訊管理學系] 學位論文

    文件中的档案:

    档案 大小格式浏览次数
    index.html0KbHTML2341检视/开启


    在政大典藏中所有的数据项都受到原著作权保护.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈