نتایج جستجو برای: network size
تعداد نتایج: 1190474 فیلتر نتایج به سال:
Many who study anti-immigrant sentiment attribute negative attitudes among the native population to objective economic threats that immigrants may pose. In multilevel studies, researchers focus almost exclusively on geographic regions, such as metropolitan areas or countries, as contexts within which to examine the consequences of objective economic threats. Although geographic regions are rele...
In an aggregate crushing plant, the crusher performances will be affected by variation from incoming feed size distribution. Collecting accurate measurements of distribution on conveyors can help both operators and control systems to make right decisions in order reduce overall power consumption avoid undesirable operating conditions. this work, a particle estimation method based DexiNed edge d...
This paper presents a feed forward back-propagation neural network model to predict the retained tensile strength and design chart in order to estimation of the strength reduction factors of nonwoven geotextiles due to installation process. A database of 34 full-scale field tests were utilized to train, validate and test the developed neural network and regression model. The results show that t...
Bidirectionality, forward and backward information flow, is introduced in neural networks to produce two-way associative search for stored stimulus-response associations (A(i),B(i)). Two fields of neurons, F(A) and F(B), are connected by an n x p synaptic marix M. Passing information through M gives one direction, passing information through its transpose M(T) gives the other. Every matrix is b...
Orthogonal Latin hypercubes (OLHs) are available for only a limited collection of run sizes. This paper presents a simple algorithm for constructing orthogonal designs that are nearly Latin hypercubes. The algorithm is based on the approach developed by Steinberg and Lin for OLH designs and can generate designs for all run sizes for which a Plackett-Burman design exists. The designs have good u...
We consider the security of an ITU standard for ATM-based passive optical networks. First, we show that the standard’s encryption algorithm, called churning, has an effective 8-bit key length and thus is trivial to break with exhaustive keysearch. Second, we show that the authentication mechanisms have significant weaknesses. The conclusion is that these measures should not be relied upon to pr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید