Browse Definitions by Topic

Artificial neural network (ANN)

Artificial neural network (ANN) is a group of neuron nodes, interconnected with each other. Every circular node works as an artificial neuron that exchanges information with each other, similar to the functional principles of biological neural networks. The whole system is termed ANN.

The main advantage of artificial neural network implementation lies in the ability to perform complex mathematical modelling for emulation. This helps scientists to predict different processes and trends based on the visualisation of these models.

ANN is a simple system of processors (artificial neuron), in which neurons connect and interact reciprocally with each other. Each neuron periodically receives signals and sends them to others. By connecting to a reasonably large network of similar neurons, these single processors can perform quite complex actions.

  • From the point of view of machine learning, neural networks are special cases of discriminant analysis, pattern recognition and grouping methods.
  • From the mathematical point of view, the learning of neural networks is a multiparameter problem of nonlinear optimization.
  • From the development of computation and programming, neural networks are a way to solve efficient parallel problems.
  • From a cybernetic perspective, neural networks are used for problems of adaptive control and robotic algorithms.
  • From the point of view of artificial intelligence, neural networks are the basis of the philosophy of connectionism and the main direction of the structural methods of using computer algorithms to establish the possibility of natural intelligence.

Neural networks are not just programmed, but are also well trained. The possibility of ‘learning’ is one of the main advantages of ANN over traditional algorithms.

Stages of problem solving

  • Data collection for training;
  • Selection of network topology;
  • Preparation and normalization of data;
  • Experimental selection of training parameters;
  • Experimental selection of network characteristics;
  • Actually learning;
  • Checking the adequacy of training;
  • Adjustment of parameters, final training;
  • Verbalization of the network for further use.

Technically, ‘learning’ is to find the coefficient connection  between neurons. During this process, the neural network is able to detect complex dependencies between data input and output and perform generalization. This means that if training succeeds, the network can return the correct results based on data not provided in training samples and incomplete and / or "noisy" and partially distorted data. So, with the help of the ANN we can predict the most probable event. For the business environment, such operations are vital in the financial, medical, construction and any decision-making field.

Additional Terms
Networking Hardwear
Networking hardware is a set of devices necessary for the operation of a computer network, for example: a router, a switch, a hub, a patch panel, etc.   Active networking hardware is equipment containing electronic circuits receiving power from an electrical network or other sources and performing the functions of amplification, signal transformation, and others.  This means such equipment is able to process the signal by special algorithms. In the networks there is a package data transfer, each data package also contains technical information about its source, purpose, the integrity of information, etc, allowing to deliver the package to its destination. Active networking hardware includes the following types of devices: Network adapter - a card that is installed in the computer and provides its connection to the LAN; Repeater - a device, usually with two ports, designed to repeat the signal in order to increase the length of the network segment; Hub (active hub, multiport repeater) - a device with 4-32 ports, used to connect users to the network; Bridge - a device with 2 ports, usually used to combine several LAN (local area network) workgroups, allows you to filter network traffic by analyzing network (MAC) addresses; Switch - a device with several (4-32) ports, used to combine several LAN working groups (otherwise called multiport bridge); Router (router) - used to combine several  LAN workgroups, allows you to filter network traffic by analyzing network (IP) addresses; Retranslator - to create an advanced wireless network with a larger coverage area and is an alternative to a wired network. By default, the device operates in the signal amplification mode and acts as a relay station that catches the signal from the base network router or access point and transfers it to previously unavailable sites. Media converter - a device, usually with two ports, used to convert the data transfer medium (coaxial-twisted pair, twisted-pair optical fibre); A network transceiver is a device, usually with two ports, commonly used to convert the data format. A transceiver can be mentioned as a Medium Access Unit (MAU) in Ethernet network terminology. Additionally to this set of devices, to become a part of the network, a computer must have a network interface card (NIC). Mentioned above networking hardware can be called a set of computer networking devices or network equipment.  
Additional Terms of Network
See more words
SSL Certificate
(identity certificate, digital certificate) is a set of data, that adds a cryptographic key to the domain’s details and allows secure connections from a server to a browser. When installed on a web server, it activates the https protocol and the padlock to protect the user’s data from public access. Such a certificate is needed, first of all, to protect your personal information, while communicating with banks, payment systems and other organizations working with personal data - to protect transactions and prevent unauthorized access to your banking card details, passwords and other confidential data. When a certificate is installed on your server, HTTP (application protocol) is changed to HTTPs, where the ‘S’ stands for ‘secure’. Depending on the type and the browser you are using, you will see a padlock or green bar when you visit a website with SSL Certificate installed. Usually this contains the following information: the domain name for which the SSL certificate is issued; legal entity that owns it; the physical location of the holder (city, country); validity period; details of the company providing it; This confirms that the domain belongs to a real company and that its owner has the right to use the private key legally. Types of SSL Certificates Domain Validation - these are entry-level certificates, and are the most common in the world. The issuing speed varies from 2 to 10 minutes, depending on the brand. To obtain such a certificate no special documents are required. These are suitable for small sites and projects, when there is no need for a lot of trust from customers and site visitors. You need to confirm ownership of the domain: Verification via e-mail (DCV Email) - the certificate authority sends a verification letter, with a link to confirm domain ownership. Such a letter can be sent either to the email address specified in the Whois of your domain, or to one of the golden five: admin@, administrator@, hostmaster@, postmaster@, webmaster@ of your site; DNS record checking (DNS NAME) is a way for those who have a mail server set up, and Whois mail is closed by private registration. You need to create a special entry in your DNS, and the certification authority will verify it. The method is fully automatic; Verification using a hash file (HTTP CSR Hash) - the user will be provided with a special .txt file that must be uploaded to his server, the certificate authority will confirm it and the certificate will be issued. The method is fully automatic. Business Validation - these certificates are relevant for those who are thinking about trusting their products, companies and services, as the certificate authority performs a more thorough check. It is necessary to send the company documents, go through the process of "calling back" to the corporate phone. SSL certificates with Extended Validation - only EV certificates will provide the site with a green address bar in the browser. Most often, such certificates can be found at banks, online systems with a large number of visitors. SSL certificates with subdomain support (Wildcard) is a very convenient certificate when it comes to protecting a large number of subdomains within one domain. It can protect any number of subdomains on an unlimited number of servers. SAN SSL certificates are single communication certificates that can protect multiple domains, subdomains, local domains and servers. These certificates work with both external and internal domain names. Why does your company need a SSL Certificate Without SSL certificate all the information, including your name, login, password, and even banking card details, is transferred from your computer to a remote source is publically available. SSL certificate is protecting your private data with the help of cryptography, helping you to: Keep secure data exchange between servers Create/enhance the customers’ loyalty Increase the buyers’ trust and conversion rate
IFTTT (If This Then That)
IFTTT (If This Then That) is an online service for creating automatic actions or “recipes”. Each “recipe” consists of two parts: the event at which the recipe is triggered, and the action that occurs in the case of this event. To implement the automation users do not need to have technical or programming knowledge. There are pre settings for almost everything, which can be realised via user interface. Examples: IF @user on Instagram posted a photo, THEN save the image to Dropbox; IF tomorrow is expected 0 ° C in London, THEN notify me; IF a child is out of school, THEN send me a letter. Over the years of its existence, more than a hundred services and applications have been integrated with IFTTT in which events can be monitored and actions created: Instagram, Feed, Dropbox, Slack, Ebay, Pocket, Blogger, Box, Evernote, Gumroad, Fitbit, Soundcloud and others. When using IFTTT, it is important not to waste energy on “reinventing the wheel”, because there are thousands of ready-made “recipes” in the site collection: Mail IF Gmail receives a new email with an attachment, THEN save this attachment to Dropbox. IF Gmail receives a new email, THEN save it as a note in Evernote. If Gmail received a letter with order confirmation from Amazon, THEN save the letter as a note in Evernote. IF there is a new letter in the Gmail inbox marked as important, then add this letter to the to-do list in Todoist. IF a new photo appeared in my Instagram account, THEN send it to a certain email address. Social Networks IF I like the photo on Instagram, THEN save this photo on Google Drive. IF a new photo is published on my Instagram, THEN post this photo on Twitter. IF profile photo has changed on Facebook, THEN set the same profile photo to Twitter. IF a new photo appeared on my Instagram, THEN add it to my Pinterest board. IF I posted a new link on Facebook, THEN post the same link on Twitter. Other Services IF it’s a certain time, THEN send messages to a certain Slack channel. IF a certain article in Wikipedia is updated, THEN send me a notification about it. IF the parcel has changed its location, THEN mark this event in Google Calendar. IF frost is expected, THEN send me an email stating that I need to cover the plants. All the above mentioned actions can be changed and customised to fit your needs. To do this, add a “recipe” to your profile and click on the pencil icon to open the edit page. For example, in the finished “rule” you can replace Dropbox with Box, Google Calendar with Outlook Calendar, or Evernote with Onenote.
>> Content Management Application (CMA)
Content Management Application (CMA)  - a computer program used to provide a joint process of creating, managing, and editing content. The main functions of the CMA: Provide tools for creating content, organizing collaboration; Manage content: storage, versioning, adherence, document flow management, etc.; Publish content; Show information in a convenient form for navigation and search. A content management application can contain a variety of data: documents, photos, scientific data, phone number, and so on. Such an application is often used to store, review, manage,  and publish documentation. Version control is one of the main advantages when content is accessed by a group of individuals. Kinds of Apps In general, CMAs are divided into: Enterprise Content Management Application(ECMA);   Web Content Management Application (WCMA); Due to the fact that CMA have a deep internal classification by subject areas, the term CMA replaced the WCMS, becoming a synonym for the website management system. Such CMAs allow you to manage textual and graphical content of the site, providing the user with a convenient interface for working with content, handy tools for publishing and storing information, automating the process of placing data in bases and its output in HTML. There are many ready-made solutions for content management, including free ones. All applications available can be divided into 3 types according to the way they work: Generate pages on request. Applications of this type operate on the basis of the principle “Editing module → Database → Presentation module”. When requested, the presentation module generates a page with content, based on the information from the base. Database information is modified by the editing module. Pages are re-created by the server with each request, which creates an additional load on system resources. The load can be repeatedly reduced by using caching tools that are available in modern web servers. Page generation when editing. Systems of this type are used to edit pages that, when making changes to the content of a site, create a set of static pages. With this method, you are sacrificing interactivity between the visitor and the contents of the site. Mixed type. It combines the advantages of the previous types. It can be implemented by the caching principle - the presentation module generates the page once, later it is loaded much faster from the cache. The cache may be updated either automatically, after a certain period of time or when making changes to certain sections of the site, or manually at the command of the administrator. Another approach is to save certain data blocks at the stage of editing a site and to assemble a page from these blocks when a user requests a corresponding page.
View all IT-related terms
Results for "DEV"
Logo Magora LTD
Get in touch
Do you agree to the personal data processing?

Logo Magora LTD
Thank you very much.

Your registration to the webinar on the 27th of September at 2 p.m. BST was successfuly completed.
We will send you a reminder on the day before the event.
Magora team
Registration for a webinar

"Let Smart Bots Speed up your Business"
Date: 27.09.2018 Time: 2 p.m. BST
Do you agree to the personal data processing?