نتایج جستجو برای: with developing another genetic algorithm
تعداد نتایج: 9813172 فیلتر نتایج به سال:
Applying nonlinear models to estimation and forecasting economic models are now becoming more common, thanks to advances in computing technology. Artificial Neural Networks (ANN) models, which are nonlinear local optimizer models, have proven successful in forecasting economic variables. Most ANN models applied in Economics use the gradient descent method as their learning algorithm. However, t...
This paper presents a novel teleoperation controller for a nonlinear master–slave robotic system with constant time delay in communication channel. The proposed controller enables the teleoperation system to compensate human and environmental disturbances, while achieving master and slave position coordination in both free motion and contact situation. The current work basically extends the pas...
in this study, scour of mashkid bridge pier located in mashkid river of saravan county has been studied and to measure the scour rate, the numerical model hec-ras 4.0 has been used. upon selection of mashkid river as the case study and whereas the studied zone is important with respect to the climatic conditions and showery monsoon raining and flowing the great and destructive floodwaters, ther...
The paper deals with a problem of optimizing substation locations and network routing to serve a given load demand. An objective function of fixed costs of substations and lines and the present worth cost of energy loss of the line segments is optimized, subject to a set of constraints. The problem is combinatorial and thus they have a discrete objective function. Considering the limitations of...
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
this thesis attempts to study the representations of the third-world intellectuals in three fictional works by the british-educated trinidadian nobel-winner v. s. naipaul: the mimic men, a bend in the river, and magic seeds. the first one recounts the story of ralph singh’s sense of alienation, his experiences as a colonial politician, and his struggle to give order to his disorderly world thro...
as far as bandura’s (1977) conceptualization of the sense of self-efficacy is concerned, it is argued to be context- and even task-specific, compared to other concepts like self-esteem (brown, 2000); therefore, upon the previous research studies, related theories and definitions, and the ideas and views obtained from the interviews conducted with the scholars, the current research study aimed a...
چکیده ندارد.
Background and Objectives: Rheological characteristics of dough are important for achieving useful information about raw-material quality, dough behavior during mechanical handling, and textural characteristics of products. Our purpose in the present research is to apply soft computation tools for predicting the rheological properties of dough out of simple measurable factors. Materials and Me...
Resource limitation in zero time may cause to some profitable projects not to be selected in project selection problem, thus simultaneous project portfolio selection and scheduling problem has received significant attention. In this study, budget, investment costs and earnings are considered to be stochastic. The objectives are maximizing net present values of selected projects and minimizing v...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید