نتایج جستجو برای: genetic network programing with vigorous connection gnp vc

تعداد نتایج: 9687130  

Journal: :Photochemical & photobiological sciences : Official journal of the European Photochemistry Association and the European Society for Photobiology 2010
Atsushi Kimoto Koji Iwasaki Jiro Abe

To tailor highly-functionalized gold nanoparticle (GNP) networks, we investigated the GNP network formation with functionalized spacer group via click chemistry. This is based on its high reactivity and mild reaction conditions. The feature of this protocol is the easy approach to versatile GNP functionalization on the basis of the excellent accessibility and good stability of functional dialky...

2005
Jan Suchý Jirí Kubalík

This paper presents an algorithm for induction of ensembles of decision trees, also referred to as decision forests. In order to achieve high expressiveness the trees induced are multivariate, with various, possibly user-defined tests in their internal nodes. Strongly typed genetic programming is utilized to evolve structure of the tests. Special attention is given to the problem of diversity o...

1992
Rick Bubenik Mike Gaddis John D. DeHart

Clients of ATM (Asynchronous Transfer Mode) networks communicate by creating connections to one another, then exchanging data over these connections [1] [2] [4] [6] [7] [10]. The ATM standard provides for two types of connections: Virtual Path (VP) and Virtual Channel (VC). With a VP connection, clients set the VP identifier (VPI) field of the ATM header (Figure 1) when sending cells. The netwo...

2000
Koji Sugisono Miki Yamamoto Hiromasa Ikeda

In the Internet, multimedia services, such as video streaming, TV conference, should be supported by multicast communications, i.e. IP multicast, in order to reduce total bandwidth necessary for distributing streaming programs. Below data-link layer, IP can use any network technology and ATM is the most promising one for a backbone network. IP multicast is based on the connection-less communica...

2011
Guangfei Yang Yanzhong Dang Shingo Mabu Kaoru Shimada Kotaro Hirasawa

In this paper, we propose an evolutionary method to search interesting association rules. Most of the association rule mining methods give a large number of rules, and it is difficult for human beings to deal with them. We study this problem by borrowing the style of a search engine, that is, searching association rules by keywords. Whether a rule is interesting or not is decided by its relatio...

1995
Mahbub Hassan Mohammed Atiquzzaman

LAN interconnection is expected to be the rst service ooered by ATM based B-ISDN. Since traac on the current LANs is connectionless and bursty, the main challenge will be to provide an eecient con-nectionless service over connection oriented ATM network. One of the methods proposed for transporting bursty LAN traac over ATM is to set up an ATM connection upon arrival of a burst and close the co...

Journal: :BioEssays 2021

Langerhans cells (LCs), residing in the epidermis, are able to induce potent immunogenic responses and also mediate immune tolerance. We propose that tolerogenic of LCs directed by signaling from epidermis involve counter-acting gene circuits coupled a core maturation module. base our analysis on recent genetic genomic findings facilitating understanding molecular mechanisms controlling these d...

2013
Saad Ahmad Khan Jonathan Streater Taranjeet Singh Bhatia Steve Fiore Ladislau Bölöni

Physical or simulated agents sharing an environment with humans must evaluate the impact of their own and other agents’ actions in the specific social and cultural context. It is desirable that this social calculus aligns itself with the models developed in sociology and psychology however, it needs to be expressed in an operational, algorithmic form, suitable for implementation. While we can d...

Journal: :journal of advances in computer engineering and technology 2015
mahdi sattarivand

abstract— peer-to-peer ( p2p ) systems have been the center of attention in recent years due to their advantage . since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . this paper investigates the use of genetic ...

This paper designs a reliability distribution network with limited capacity under partial and complete facility disruptions. To increase the reliability of the distribution network, a new mixed integer linear programing model is developed by considering multiple mitigation strategies including diversification, fortification, and transshipment. The distribution network constitutes of reliable di...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید