Prediction Model of Dry Fertilizer Crushing Force Based on P-DE-SVM
نویسندگان
چکیده
منابع مشابه
mortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولOperon prediction based on SVM
The operon is a specific functional organization of genes found in bacterial genomes. Most genes within operons share common features. The support vector machine (SVM) approach is here used to predict operons at the genomic level. Four features were chosen as SVM input vectors: the intergenic distances, the number of common pathways, the number of conserved gene pairs and the mutual information...
متن کاملNetwork Traffic Prediction Model Based on Catfish-PSO-SVM
In order to improve the prediction accuracy of network traffic, this paper proposes a network traffic prediction model based on support vector machine (SVM) which parameters are optimized by catfish particle swarm optimization algorithm. Firstly, the parameters of SVM are encoded as a particle, and then catfish effect is introduced to overcome the defects of particle swarm optimization algorith...
متن کاملResearch on the Prediction Model for the Security Situation of Metro Station Based on PSO/SVM
Security situation awareness is a new technology about security. This paper brings it to the assessment of security situation of metro station which serves as a new way to secure the security of passengers as well as the operation of the metro station. This paper sets up an index system for assessing the security situation awareness and makes a prediction model for the security situation of met...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACS Omega
سال: 2021
ISSN: 2470-1343,2470-1343
DOI: 10.1021/acsomega.0c05120