Back propagation learning routine, Computer Engineering

Assignment Help:

Back propagation Learning Routine - Aartificial intelligence

As with perceptrons, the information in the network is stored in the weights, so the learning problem comes down to the question: how do we train the weights to best categories the training instance. Then we hope that this representation provides a nice way to categories unseen examples.

In outline, the back propagation method is the similar as for perceptrons:

1. We select and fix our architecture for the network, which will include input, hidden and output units, all of which will include sigmoid functions.

2. We randomly assign the weights between all the nodes. The assignments would be to smaller numbers, typically between -0.5 and 0.5.

3. Each training instance is used, 1 after another, to re-train the weights in the network. The way this is done is given in detail below.

4.   After each epoch (run through all the training examples), a termination situation is examine (also detailed below). For this method, Note down that, we are not guaranteed to search weights which give the network the global minimum error, for example, absolutely right categorization of the training examples. Hence the termination condition can have to be in terms of a (possibly small) number of miscategorisations. We see later that this must not be such a fine idea, though.

 


Related Discussions:- Back propagation learning routine

What is byte addressable memory, What is byte addressable memory? The a...

What is byte addressable memory? The assignment of successive addresses to successive byte locations in the memory is known as byte addressable memory.

Common tasks to accomplish - artificial intelligence, Common Tasks to Accom...

Common Tasks to Accomplish: Once you've worried about what and why you're doing "AI", what has inspired you and how you're going to approach the job, then you just start to th

C++, Byteland county is very famous for luminous jewels. Luminous jewels ar...

Byteland county is very famous for luminous jewels. Luminous jewels are used in making beautiful necklaces. A necklace consists of various luminous jewels of particular colour. Nec

What do you mean by underflow and overflow of data, What do you mean by und...

What do you mean by underflow and overflow of data? Underflow and overflow of data: When the value of the variable is either too long or too small for the data type to hold,

Show the liability of cpu in interrupt cycle, Q. Show the liability of CPU ...

Q. Show the liability of CPU in interrupt cycle? In the interrupt cycle the liability of CPU/Processor is to ensure whether any interrupts have happened checking presence of in

What is virtual memeory, What is virtual memory? How address mapping is don...

What is virtual memory? How address mapping is done in cache memory? Elaborate your answer with examples.

Performance of computer system, Performance of computer system: Comput...

Performance of computer system: Computer performance is frequently described in terms of clock speed (usually in MHz or GHz). It refers to the cycles per second of the main cl

Illustrate code segment with example, CODE SEGMENT ; Set DS register ...

CODE SEGMENT ; Set DS register MOV AX, DATA     ;    boiler plate code to set the DS register so that the MOV DS, AX          ;    program can access the data segment.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd