نتایج جستجو برای: imperialism competition algorithm

تعداد نتایج: 836414  

Journal: :Полис. Политические исследования 2004

  The unprecedented growth of competition in the banking technology has raised the importance of retaining current customers and acquires new customers so that is important analyzing Customer behavior, which is base on bank databases. Analyzing bank databases for analyzing customer behavior is difficult since bank databases are multi-dimensional, comprised of monthly account records and daily t...

Journal: :Scientific Programming 2022

With the vigorous development of China’s sports industry, rules and number events are increasing, competition pressure on playground is also increasing. The increase will bring many negative effects to athletes. In order relieve athletes in eliminate significance athletes, this paper mainly introduces clustering algorithm source competition. uses similarity attributes between data objects calcu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعت آب و برق (شهید عباسپور) - دانشکده مهندسی برق و کامپیوتر 1392

abstract according to increase in electricity consumption in one hand and power systemsreliability importance in another , fault location detection techniqueshave beenrecentlytaken to consideration. an algorithm based on collected data from both transmission line endsproposed in this thesis. in order to reducecapacitance effects of transmission line, distributed parametersof transmission line...

Journal: :IEEE transactions on bio-medical engineering 2009
Kavitha P. Thomas Cuntai Guan Chiew Tong Lau A. Prasad Vinod Kai Keng Ang

Event-related desynchronization/synchronization patterns during right/left motor imagery (MI) are effective features for an electroencephalogram-based brain-computer interface (BCI). As MI tasks are subject-specific, selection of subject-specific discriminative frequency components play a vital role in distinguishing these patterns. This paper proposes a new discriminative filter bank (FB) comm...

2010
S. M. MAZINANI J. CHITIZADEH M. H. YAGHMAEE M. T. HONARY F. TASHTARIAN

In this paper, two clustering algorithms are proposed. In the first one, we investigate a clustering protocol for single hop wireless sensor networks that employs a competitive scheme for cluster head selection. The proposed algorithm is named EECSM that is a modified version to the well known protocol EECS where some of the nodes become volunteers to be cluster heads with an equal probability....

2015
Itai Dinur

Draft FIPS PUB 202 [32] speci es the Secure Hash Algorithm-3 (SHA-3) family of functions. The SHA-3 functions are based on instances of the Keccak algorithm that NIST selected as the winner of the SHA-3 cryptographic hash algorithm competition. The SHA-3 family consists of four cryptographic hash functions, SHA3-224, SHA3-256, SHA3-384, and SHA3-512, and two extendableoutput functions (XOFs), S...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید