نتایج جستجو برای: imperialism competition algorithm
تعداد نتایج: 836414 فیلتر نتایج به سال:
The unprecedented growth of competition in the banking technology has raised the importance of retaining current customers and acquires new customers so that is important analyzing Customer behavior, which is base on bank databases. Analyzing bank databases for analyzing customer behavior is difficult since bank databases are multi-dimensional, comprised of monthly account records and daily t...
With the vigorous development of China’s sports industry, rules and number events are increasing, competition pressure on playground is also increasing. The increase will bring many negative effects to athletes. In order relieve athletes in eliminate significance athletes, this paper mainly introduces clustering algorithm source competition. uses similarity attributes between data objects calcu...
abstract according to increase in electricity consumption in one hand and power systemsreliability importance in another , fault location detection techniqueshave beenrecentlytaken to consideration. an algorithm based on collected data from both transmission line endsproposed in this thesis. in order to reducecapacitance effects of transmission line, distributed parametersof transmission line...
Event-related desynchronization/synchronization patterns during right/left motor imagery (MI) are effective features for an electroencephalogram-based brain-computer interface (BCI). As MI tasks are subject-specific, selection of subject-specific discriminative frequency components play a vital role in distinguishing these patterns. This paper proposes a new discriminative filter bank (FB) comm...
In this paper, two clustering algorithms are proposed. In the first one, we investigate a clustering protocol for single hop wireless sensor networks that employs a competitive scheme for cluster head selection. The proposed algorithm is named EECSM that is a modified version to the well known protocol EECS where some of the nodes become volunteers to be cluster heads with an equal probability....
Draft FIPS PUB 202 [32] speci es the Secure Hash Algorithm-3 (SHA-3) family of functions. The SHA-3 functions are based on instances of the Keccak algorithm that NIST selected as the winner of the SHA-3 cryptographic hash algorithm competition. The SHA-3 family consists of four cryptographic hash functions, SHA3-224, SHA3-256, SHA3-384, and SHA3-512, and two extendableoutput functions (XOFs), S...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید