What will a back-propagation network for problem

Assignment Help Basic Computer Science
Reference no: EM1361110

a) Suppose that a training set contains only a single example, repeated 100 times. In 80 of the 100 cases, the single output value is 1, in other 20 it is 0. What will a back-propagation network predict for this example, assuming that it has been trained and reaches a global optimum? (Hint: to find the global optimum, differentiate the error function and set to zero.)

Reference no: EM1361110

Questions Cloud

Determine the length of the wire : determine the length of the wire.
Major functions of macronutrients : What are some of the major functions of macronutrients? What are some prime sources of macronutrients in your own diet?
Pay structure and policy line : Explain the characteristics of pay structure. Define, in your own words, a pay policy line and how it is determined.
How advertise to defend their market shares : year on television advertising campaigns, promoting their beer brands. Obviously, if one firm is advertising its brands heavily, the others must also advertise to defend their market shares.
What will a back-propagation network for problem : What will a back-propagation network predict for this example, assuming that it has been trained and reaches a global optimum?
Presentation outline of business etiquettes in the uae : Please provide an example of a presentation outline and divide each point. Use the topic of "Business Etiquettes in UAE" as an example.
Obesity-health issue in the unites states : Obesity is a major health issue in the Unites States. What environmental factors do you believe have contributed to obesity?
Teen-aged driving analysis : Finding out how an analysis will be performed using quality tools to reduce the alarming statistics in teen driving
Explain the gdp fails to capture changes in the availability : Explain The GDP fails to capture changes in the availability of leisure time and often fails to reflect changes in the quality of products or in the availability of new products

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Voluntarily gravitating to give up our real world experience

In an age of virtual worlds where people are spending inordinate amounts. Are we voluntarily gravitating to this world and giving up our real world experiences for virtual ones?

  Rsa protocol to encrypt and decrypt messages

In this problem you are enquired to hand-turn RSA protocol to encrypt and decrypt messages by using rather smaller numbers than are used in practice, so that calculations can be done by hand.

  Explaining mandatory access control implementation

How are Novell AppArmor and the Red Hat "targeted" SELinux policy similar? Is either a true Mandatory Access Control implementation. If not, explain why.

  Explaining it acquisition issued request for proposal

A federal agency that does not use IT acquisition best practices issued a request for proposal that requires the contractor selected to use such practices, including certification at CMMI Level 3 or above.

  Write difference between logical and physical modeling

What is the difference between logical and physical modeling? Give three reasons why logical models are superior for structuring business requirements.

  Access and its limitations in distributed business model

describe the difference of the two terms and how they work together. Your post should include the following details: A description of Access and its limitations in a distributed business model.

  Explaining formal risk assessment of desktop systems

As apart of a formal risk assessment of desktop systems in small accounting firm with limited IT Support, you have identified asset "integrity of customer and financial data files on desktop systems" and threat.

  Significance of strategic management

Explain the significance of strategic management to support telecommunications planning model.

  Tools or tactics used by risk assessment team

In your new position at XYZ Corporation, you have been asked to lead risk assessment team. How can you bring everyone to agreement an what are there any tools or tactics you might use to help?

  Factoring is the problem of computing

Consider the one time pad encryption scheme to encrypt a 1-bit message. Replace the XOR operation with another operation X. For which X does the resulting scheme satisfy perfect secrecy?

  Finding content of ac and memory word at specified address

What are the content of the AC and the memory word at address 103 when the computer halts.

  Describe factors having greater trust in e-business

Describe the factors which would contribute to you having greater trust in e-business. Do you look for trust seals when shopping online?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd