Analysis and Interpretation of Coronary Artery Blockage using Soft Computing Techniques

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating electrochemical drilling (ECD) using statistical and soft computing techniques

In the present study, five modeling approaches of RA, MLP, MNN, GFF, and CANFIS were applied so as to estimate the radial overcut values in electrochemical drilling process. For these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. The developed models were evaluated in terms of their prediction capability with m...

متن کامل

investigating electrochemical drilling (ecd) using statistical and soft computing techniques

in the present study, five modeling approaches of ra, mlp, mnn, gff, and canfis were applied so as to estimate the radial overcut values in electrochemical drilling process. for these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. the developed models were evaluated in terms of their prediction capability with m...

متن کامل

Comparative Analysis of Three Tank Process using Soft Computing Techniques

Most of the process systems exhibits non-linear behaviour, so conventional controllers are not able to provide accurate data. At present, various soft computing techniques are used to overcome imprecision and uncertainty effects of conventional controllers. Various soft computing techniques like fuzzy logic, genetic algorithm and particle swarm optimization have been suggested for optimum setti...

متن کامل

Damage identification by using soft-computing techniques

This paper describes a soft computing approach to solve the damage identification problem using Case-Based Reasoning (CBR) to obtain an initial diagnostic exploiting the outcomes given in known structure models simulations and the data acquired by the sensors in operating conditions once the system has started. It creates an incremental database (since a new experience is retained each time a p...

متن کامل

Intrusion Detection Using Soft Computing Techniques

As the popularity and usage of Internet increases all over the world, security issues have also become very essential that have to be considered. In literature, different techniques from various disciplines have been utilized to develop efficient security methods but those techniques always have some shortcomings. In this chapter the author discuss soft computing techniques that have been appli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOSR Journal of Computer Engineering

سال: 2016

ISSN: 2278-8727,2278-0661

DOI: 10.9790/0661-1805027480