نتایج جستجو برای: pfih algorithm

تعداد نتایج: 754002  

Introduction: Breast cancer is one of the most common types of cancer and the most common type of malignancy in women, which has been growing in recent years. Patients with this disease have a chance of recurrence. Many factors reduce or increase this probability. Data mining is one of the methods used to detect or anticipate cancers, and one of its most common uses is to predict the recurrence...

Journal: :EURASIP Journal on Wireless Communications and Networking 2018

Journal: :progress in biological sciences 2013
vahid rezaei sima naghizadeh hamid pezeshk mehdi sadeghi changiz eslahchi

a profile hidden markov model (phmm) is widely used in assigning protein sequences to protein families. in this model, the hidden states only depend on the previous hidden state and observations are independent given hidden states. in other words, in the phmm, only the information of the left side of a hidden state is considered. however, it makes sense that considering the information of the b...

Journal: :journal of advances in computer research 0
fatemeh tavakoli department of computer engineering, aligudarz branch, islamic azad university, aligudarz, iran meisam kamarei university of applied science& technology (uast), tehran ,iran gholam reza asgari department of computer engineering, aligudarz branch, islamic azad university, aligudarz, iran

in this paper, an efficient fault-tolerant routing algorithm for mobile ad-hoc networks (manets) is presented. the proposed algorithm increases the network fault-tolerance using natural redundancy of ad-hoc networks. this algorithm is carried out in two stages; 1) the selection of backup nodes 2) the selection of backup route(s). in the first stage, the proposed algorithm chooses nodes with the...

A well-known clustering algorithm is K-means. This algorithm, besides advantages such as high speed and ease of employment, suffers from the problem of local optima. In order to overcome this problem, a lot of studies have been done in clustering. This paper presents a hybrid Extended Cuckoo Optimization Algorithm (ECOA) and K-means (K), which is called ECOA-K. The COA algorithm has advantages ...

Journal: :journal of artificial intelligence in electrical engineering 2016
saeede jabbarzadeh reyhani saeed meshgini

classical lbp such as complexity and high dimensions of feature vectors that make it necessary to apply dimension reduction processes. in this paper, we introduce an improved lbp algorithm to solve these problems that utilizes fast pca algorithm for reduction of vector dimensions of extracted features. in other words, proffer method (fast pca+lbp) is an improved lbp algorithm that is extracted ...

Journal: :journal of ai and data mining 2015
f. alibakhshi m. teshnehlab m. alibakhshi m. mansouri

the stability of learning rate in neural network identifiers and controllers is one of the challenging issues which attracts great interest from researchers of neural networks. this paper suggests adaptive gradient descent algorithm with stable learning laws for modified dynamic neural network (mdnn) and studies the stability of this algorithm. also, stable learning algorithm for parameters of ...

Journal: :journal of advances in computer research 0
firozeh razavi department of management and economics, science and research branch, islamic azad university, tehran, iran faramarz zabihi department of computer engineering, sari branch, islamic azad university, sari, iran mirsaeid hosseini shirvani department of computer engineering, sari branch, islamic azad university, sari, iran

neural network is one of the most widely used algorithms in the field of machine learning, on the other hand, neural network training is a complicated and important process. supervised learning needs to be organized to reach the goal as soon as possible. a supervised learning algorithm analyzes the training data and produces an inferred function, which can be used for mapping new examples.  hen...

Journal: :journal of advances in computer research 0
fereshteh ghanbari adivi m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran mohammad mehrnia m.sc. computer systems architecture, dezfoul branch, islamic azad university, dezfoul, iran

this paper presents a new audio encryption algorithm based on permutation and residue number system. in the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. for this purpose, the algorithm uses a predef...

Journal: :journal of optimization in industrial engineering 2015
tahereh poorbagheri seyed taghi akhavan niaki

in this research, an integrated inventory problem is formulated for a single-vendor multiple-retailer supply chain that works according to the vendor managed inventory policy. the model is derived based on the economic order quantity in which shortages with penalty costs at the retailers` level is permitted. as predicting customer demand is the most important problem in inventory systems and th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید