Content deleted Content added
→Applications: Improve grammar |
There are k no. of hidden neurons.So,output of hidden layer (sigma) should be numbered from 1 to k. |
||
Line 23:
The most used protocol for key exchange between two parties A and B in the practice is Diffie-Hellman protocol. Neural key exchange, which is based on the synchronization of two tree parity machines, should be a secure replacement for this method.
Synchronizing these two machines is similar to synchronizing two chaotic oscillators in [[chaos communications]].
[[
▲[[Image:TreeParityMachine.jpg|thumb|right|350px|Tree parity machine]]
=== Tree parity machine ===
|