نتایج جستجو برای: using various methods then
تعداد نتایج: 5327630 فیلتر نتایج به سال:
due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...
Perfect phylogeny is one of the fundamental models for studying evolution. We investigate the following variant of the problem: The input is an n ×m species-characters matrix. The characters are binary and directed, i.e., a species can only gain characters. The difference from standard perfect phylogeny is that for some species the state of some characters is unknown. The question is whether on...
L. Vigilant et al. (1) recently presented "the strongest support yet for the placement of [their] common mtDNA [mitochondrial DNA] ancestor in Africa some 200,000 years ago." This support stems from a tree estimated by maximum parsimony from mtDNA sequence data with the use of the computer program PAUP (2). The African origin is inferred from this tree because (i) the most basal splits are amon...
a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید