bidirectional associative memory
Recently Published Documents


TOTAL DOCUMENTS

335
(FIVE YEARS 42)

H-INDEX

36
(FIVE YEARS 3)

2021 ◽  
Vol 6 (1) ◽  
pp. 14
Author(s):  
M. Syed Ali ◽  
M. Hymavathi ◽  
Syeda Asma Kauser ◽  
Grienggrai Rajchakit ◽  
Porpattama Hammachukiattikul ◽  
...  

This article examines the drive-response synchronization of a class of fractional order uncertain BAM (Bidirectional Associative Memory) competitive neural networks. By using the differential inclusions theory, and constructing a proper Lyapunov-Krasovskii functional, novel sufficient conditions are obtained to achieve global asymptotic stability of fractional order uncertain BAM competitive neural networks. This novel approach is based on the linear matrix inequality (LMI) technique and the derived conditions are easy to verify via the LMI toolbox. Moreover, numerical examples are presented to show the feasibility and effectiveness of the theoretical results.


JURNAL TIKA ◽  
2021 ◽  
Vol 6 (03) ◽  
pp. 231-237
Author(s):  
Rini Meiyanti ◽  
Cut Lika Mestika Sandy

Sistem pengendalian emosi seseorang melalui suara dapat menggunakan algoritma Hidden Markov Model (HMM). Namun, untuk melihat kinerja algoritma HMM dalam sistem aplikasi sudah optimal atau belum, diperlukan suatu perbandingan agar memperoleh hasil yang lebih maksimal. Maka dari itu peneliti melakukan unjuk kerja pengenalian emosi seseorang dengan menggunakan algoritma HMM dan algoritma Bidirectional Associative Memory (BAM) melalui suara. Hidden Markov Model (HMM) terdiri dari rantai markov pada bagian pertama yang menyembunyikan state, oleh karena itu perilaku internal model tetap tidak terlihat. Sedangkan algoritma BAM dapat memproses input yang tidak lengkap, karena adanya hubungan timbal balik antara dari lapisan output ke lapisan input. Pada algoritma BAM, nilai suara pengujian dan nilai sampel suara pelatihan yang diperoleh akan dicari nilai vektornya menggunakan pencarian nilai bobot yang dilakukan dengan cara mengubah matriks biner ke dalam matriks bipolar. Pada penelitian ini akan membuat sebuah sistem aplikasi yang dapat mendeteksi suara dalam bentuk emosi marah, bahagia, dan netral. Dan database yang digunakan adalah suara dari rekaman film. Penelitian ini dilakukan untuk menghasilkan sistem yang dapat mengenali probabilitas emosi pada kategori marah, bahagia dan netral, yaitu dengan menunjukkan unjuk kerja dari kedua metode sehingga kita dapat mengetahui metode mana menghasilkan output yang maksimal.


Author(s):  
Ilyenko Anna ◽  
◽  
Ilyenko Sergii ◽  
Herasymenko Marharyta

During the research, the analysis of the existing biometric cryptographic systems was carried out. Some methods that help to generate biometric features were considered and compared with a cryptographic key. For comparing compact vectors of biometric images and cryptographic keys, the following methods are analyzed: designing and training of bidirectional associative memory; designing and training of single-layer and multilayer neural networks. As a result of comparative analysis of algorithms for extracting primary biometric features and comparing the generated image to a private key within the proposed authentication system, it was found that deep convolutional networks and neural network bidirectional associative memory are the most effective approach to process the data. In the research, an approach based on the integration of a biometric system and a cryptographic module was proposed, which allows using of a generated secret cryptographic key based on a biometric sample as the output of a neural network. The RSA algorithm is chosen to generate a private cryptographic key by use of convolutional neural networks and Python libraries. The software authentication module is implemented based on the client-server architecture using various internal Python libraries. Such authentication system should be used in systems where the user data and his valuable information resources are stored or where the user can perform certain valuable operations for which a cryptographic key is required. Proposed software module based on convolutional neural networks will be a perfect tool for ensuring the confidentiality of information and for all information-communication systems, because protecting information system from unauthorized access is one of the most pressing problems. This approach as software module solves the problem of secure generating and storing the secret key and author propose combination of the convolutional neural network with bidirectional associative memory, which is used to recognize the biometric sample, generate the image, and match it with a cryptographic key. The use of this software approach allows today to reduce the probability of errors of the first and second kind in authentication system and absolute number of errors was minimized by an average of 1,5 times. The proportion of correctly recognized images by the comparating together convolutional networks and neural network bidirectional associative memory in the authentication software module increased to 96,97%, which is on average from 1,08 times up to 1,01 times The authors further plan a number of scientific and technical solutions to develop and implement effective methods, tools to meet the requirements, principles and approaches to cybersecurity and cryptosystems for provide integrity and onfidentiality of information in experimental computer systems and networks.


2021 ◽  
Author(s):  
Masood Zamani

In this thesis, we proposed a spiking bidirectional associative memory (BAM) using temporal coding. The information processing in biological neurons is beyond of[sic] that applied in the current Artificial Neural Networks (ANNs). The coding scheme used in ANNs known as “mean firing rate” cannot answer the fast and complex computations occurring in the cortex. In biological neural networks the information is coded and processed based on the timing of action potentials. To improve the biological plausibility of the standard BAM, we employed spiking neurons for its processing units, and information is presented to the BAM in the form of temporal coding. The neurons employed in the model are heterogeneous, and being able to generate various spike-timing patterns. Genetic Algorithm and Co-evolution are used for training, and the experiment results of the proposed BAM are compared to those of the standard BAM. The results show improvements in recall, storage capacity and convergence which are of interest to design a BAM.


Sign in / Sign up

Export Citation Format

Share Document