نتایج جستجو برای: multiple network systems which are also called committee machine cm

تعداد نتایج: 7998094  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم و معارف قرآن کریم - دانشکده علوم قرآنی قم 1389

worship is submission and humitility with believe to divinity in fornt of god. in jewish religion ,worship is submission of the god inall the ordes and devosion tohim .worshio is not only so widely in islam and jew and does not include pray and fast and etc but also is every action that human does with divine intention and to content him. worship has huge and excellent rank in qoran and old te...

Journal: :The Quarterly Journal of Mathematics 1979

ژورنال: :نشریه علمی-پژوهشی مهندسی معدن 2012
صادق کریم پولی نادر فتحیان پور جابر روحی

reservoir permeability is a critical parameter for the evaluation of hydrocarbon reservoirs. there are a lot of well log data related with this parameter. in this study, permeability is predicted using them and a supervised committee machine neural network (scmnn) which is combined of 30 estimators. all of data were divided in two low and high permeability populations using statistical study. e...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1390

as the canon is shaped by white male standards rewriting the canonical works of literature is one of the ways through which postcolonial writers subvert the authority of the masters. writing in the language of the masters the colonized writers use the very suppressive tool in the hands of the masters i.e. their language to question the validity of their norms. regarded by most critics to be the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم اجتماعی و اقتصادی 1389

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1389

there has been a gradual shift of focus from the study of rule systems, which have increasingly been regarded as impoverished, … to the study of systems of principles, which appear to occupy a much more central position in determining the character and variety of possible human languages. there is a set of absolute universals, notions and principles existing in ug which do not vary from one ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده شیمی 1389

in this project, some new polyaspartimides, (pas)s, have been synthesized form michael addition reaction between new synthetic bismaleimide (bmi) and some aromatic diamines. a characteristic property of this polyaspartimides is a pendent carboxylic group, which introduced to these polymers from new bismaleimide. bismaleimides (bmi) is one of the interesting compounds, which can be self-polymeri...

Journal: :مطالعات حقوق خصوصی 0
ربیعا اسکینی پژوهشگاه علوم و فنون هسته ای، سازمان انرژی اتمی ایران مهرداد مهربخش دانشگاه تربیت معلم تهران، دانشجوی دکتری

network marketing phenomenon in which mendacious mediators are eliminated, basically is a useful matter. but the companies so-called pyramidal schemes misuse this title. in this companies there isn’t any production, consumable goods and useful work and they just constitute the pyramids in which the money belongs to persons in lower level go into the pocket of company and few people who are in t...

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید