Databases Reference
In-Depth Information
TABLE 4.4: Character Representations of 35-bit Patterns Using a Horizontal
Scanning Approach
Character
35-bit Representation
A
00100010101000111111100011000110001
I
11111000010000110001100011000101110
J
01111100001000001110000010000111110
S
10001100010101000100010101000110001
X
10001100010101000100010101000110001
Z
11111000010001000100010001000011111
(With kind permission from John Wiley & Sons, Inc.: Mobile Intelligence,“An
Online Scheme for Threat Detection Within Mobile Ad Hoc Networks,” pp.
380-411, 2010, Khan, A. I. and Muhamad Amin, A. H. and Raja Mahmood,
R. A., Table 17.2, http://dx.doi.org/10.1002/9780470579398.ch17.)
FIGURE 4.10: The HGN subnets successfully store the bitmap pattern
for character “I” at index 2 after the bit map pattern for character
“A” was stored in index 1. (With kind permission from John Wiley &
Sons, Inc.: Mobile Intelligence, “An Online Scheme for Threat Detec-
tion Within Mobile Ad Hoc Networks,” pp. 380-411, 2010, Khan, A. I.
and Muhamad Amin, A. H. and Raja Mahmood, R. A., Figure 17.14,
http://dx.doi.org/10.1002/9780470579398.ch17.)
into the HGN subnets by the SI module. Figure 4.10 shows the bitmap of
character “I” analyzed by the distributed HGN. Character “I” is stored after
character “A,” which has the index value of 1. The results show character “I”
is a new pattern, which has the index value of 2. For this simulation, each
segment was input sequentially. However, in an actual implementation, the
processing of these pattern segments will occur in parallel, vastly improving
the execution time.
4.4.1.1 Pattern Recognition Process
The overall store or recall decision depends on the decisions reached by the
individual HGN subnets. The top-layer neurons of each subnet decide if the
subpattern produces a recall or a store. If the pattern segment has not been
Search WWH ::




Custom Search