Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Perceptron-based learning algorithms

Published: 01 June 1990 Publication History

Abstract

A key task for connectionist research is the development and analysis of learning algorithms. An examination is made of several supervised learning algorithms for single-cell and network models. The heart of these algorithms is the pocket algorithm, a modification of perceptron learning that makes perceptron learning well-behaved with nonseparable training data, even if the data are noisy and contradictory. Features of these algorithms include speed algorithms fast enough to handle large sets of training data; network scaling properties, i.e. network methods scale up almost as well as single-cell models when the number of inputs is increased; analytic tractability, i.e. upper bounds on classification error are derivable; online learning, i.e. some variants can learn continually, without referring to previous data; and winner-take-all groups or choice groups, i.e. algorithms can be adapted to select one out of a number of possible classifications. These learning algorithms are suitable for applications in machine learning, pattern recognition, and connectionist expert systems

Cited By

View all
  • (2024)A Survey on Evaluation of Large Language ModelsACM Transactions on Intelligent Systems and Technology10.1145/364128915:3(1-45)Online publication date: 29-Mar-2024
  • (2024)Automatic Accident Detection, Segmentation and Duration Prediction Using Machine LearningIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.332363625:2(1547-1568)Online publication date: 1-Feb-2024
  • (2023)A Disk Failure Prediction Algorithm Based on Fusion ModelProceedings of the 2023 15th International Conference on Machine Learning and Computing10.1145/3587716.3587806(544-550)Online publication date: 17-Feb-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Neural Networks
IEEE Transactions on Neural Networks  Volume 1, Issue 2
June 1990
94 pages

Publisher

IEEE Press

Publication History

Published: 01 June 1990

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey on Evaluation of Large Language ModelsACM Transactions on Intelligent Systems and Technology10.1145/364128915:3(1-45)Online publication date: 29-Mar-2024
  • (2024)Automatic Accident Detection, Segmentation and Duration Prediction Using Machine LearningIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.332363625:2(1547-1568)Online publication date: 1-Feb-2024
  • (2023)A Disk Failure Prediction Algorithm Based on Fusion ModelProceedings of the 2023 15th International Conference on Machine Learning and Computing10.1145/3587716.3587806(544-550)Online publication date: 17-Feb-2023
  • (2023)Gotcha! I Know What You Are Doing on the FPGA Cloud: Fingerprinting Co-Located Cloud FPGA Accelerators via Measuring Communication LinksProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616606(2024-2037)Online publication date: 15-Nov-2023
  • (2023)Perceptrons Under Verifiable Random Data CorruptionMachine Learning, Optimization, and Data Science10.1007/978-3-031-53969-5_8(93-103)Online publication date: 22-Sep-2023
  • (2022)Dynamic Page Policy Using Perceptron LearningProceedings of the 2022 International Symposium on Memory Systems10.1145/3565053.3565055(1-11)Online publication date: 3-Oct-2022
  • (2022)Zebra: A novel method for optimizing text classification query in overload scenarioWorld Wide Web10.1007/s11280-022-01061-y26:3(905-931)Online publication date: 2-Jun-2022
  • (2020)Neural network approach to assessing cybersecurity risks in large-scale dynamic networks13th International Conference on Security of Information and Networks10.1145/3433174.3433603(1-8)Online publication date: 4-Nov-2020
  • (2020)Distributed block-diagonal approximation methods for regularized empirical risk minimizationMachine Language10.1007/s10994-019-05859-2109:4(813-852)Online publication date: 1-Apr-2020
  • (2019)Sentiment Analysis for a Resource Poor Language—Roman UrduACM Transactions on Asian and Low-Resource Language Information Processing10.1145/332970919:1(1-15)Online publication date: 16-Aug-2019
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media