USING NEURAL NETWORKS

被引:0
|
作者
BRAUSE, R [1 ]
机构
[1] UNIV FRANKFURT,D-6000 FRANKFURT 1,FED REP GER
来源
MICROPROCESSING AND MICROPROGRAMMING | 1989年 / 27卷 / 1-5期
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:179 / 179
页数:1
相关论文
共 50 条
  • [31] Control of Robot Using Neural Networks
    Nagori, Nikhil
    Nandu, Sagar
    Reshamwala, Alpa
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 109 - 117
  • [32] Law discovery using neural networks
    Saito, K
    Nakano, R
    IJCAI-97 - PROCEEDINGS OF THE FIFTEENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS 1 AND 2, 1997, : 1078 - 1083
  • [33] Emotion Recognition Using Neural Networks
    Unluturk, Mehmet S.
    Oguz, Kaya
    Atay, Coskun
    NN'09: PROCEEDINGS OF THE 10TH WSEAS INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, 2009, : 82 - 85
  • [34] On model updating using neural networks
    Atalla, MJ
    Inman, DJ
    MECHANICAL SYSTEMS AND SIGNAL PROCESSING, 1998, 12 (01) : 135 - 161
  • [35] Electroencephalogram processing using neural networks
    Robert, C
    Gaudy, JF
    Limoge, A
    CLINICAL NEUROPHYSIOLOGY, 2002, 113 (05) : 694 - 701
  • [36] THE PREDICTION OF HARDENABILITY USING NEURAL NETWORKS
    Knap, M.
    Falkus, J.
    Rozman, A.
    Konopka, K.
    Lamut, J.
    ARCHIVES OF METALLURGY AND MATERIALS, 2014, 59 (01) : 133 - 136
  • [37] CAD of Sigmatism Using Neural Networks
    Woloshuk, Andre
    Krecichwost, Michal
    Miodonska, Zuzanna
    Badura, Pawel
    Trzaskalik, Joanna
    Pietka, Ewa
    INFORMATION TECHNOLOGY IN BIOMEDICINE (ITIB 2018), 2019, 762 : 260 - 271
  • [38] System identification using neural networks
    Mhaskar, HN
    NEURAL NETWORKS FOR SIGNAL PROCESSING VI, 1996, : 82 - 88
  • [39] Bankruptcy Prediction Using Neural Networks
    Naidu, G. Pranav
    Govinda, K.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 248 - 251
  • [40] Vowel Recognition using Neural Networks
    Sadeghi, Vahideh Sadat
    Yaghmaie, Khashayar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (12): : 154 - 158