Prediction Model of Dry Fertilizer Crushing Force Based on P-DE-SVM

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

mortality forecasting based on lee-carter model

over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...

15 صفحه اول

Operon prediction based on SVM

The operon is a specific functional organization of genes found in bacterial genomes. Most genes within operons share common features. The support vector machine (SVM) approach is here used to predict operons at the genomic level. Four features were chosen as SVM input vectors: the intergenic distances, the number of common pathways, the number of conserved gene pairs and the mutual information...

متن کامل

Network Traffic Prediction Model Based on Catfish-PSO-SVM

In order to improve the prediction accuracy of network traffic, this paper proposes a network traffic prediction model based on support vector machine (SVM) which parameters are optimized by catfish particle swarm optimization algorithm. Firstly, the parameters of SVM are encoded as a particle, and then catfish effect is introduced to overcome the defects of particle swarm optimization algorith...

متن کامل

Research on the Prediction Model for the Security Situation of Metro Station Based on PSO/SVM

Security situation awareness is a new technology about security. This paper brings it to the assessment of security situation of metro station which serves as a new way to secure the security of passengers as well as the operation of the metro station. This paper sets up an index system for assessing the security situation awareness and makes a prediction model for the security situation of met...

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACS Omega

سال: 2021

ISSN: 2470-1343,2470-1343

DOI: 10.1021/acsomega.0c05120