نتایج جستجو برای: binary

تعداد نتایج: 118197  

Artificial bee colony (ABC) algorithm is a swarm intelligence optimization algorithm inspired by the intelligent behavior of honey bees when searching for food sources. The various versions of the ABC algorithm have been widely used to solve continuous and discrete optimization problems in different fields. In this paper a new binary version of the ABC algorithm inspired by quantum computing, c...

The goal of this study is to introduce a statistical method regarding the analysis of specific latent data for regression analysis of the discrete data and to build a relation between a probit regression model (related to the discrete response) and normal linear regression model (related to the latent data of continuous response). This method provides precise inferences on binary and multinomia...

Fluidization of initially segregated binary mixtures has been investigated for particle systems of the same material. This paper reports experiments conducted in 0.055m diameter fluidizes bed for binary mixtures composed of sands whose sizes ranged from 450 to 1450mm. An empirical relationship, Utf = 0.95 UF (dR)0.87, was derived in terms of the minimum fluidization of the smaller particle, UF ...

Hossein Akhgari Mohammad Mehdi Montazer Rahmati Seyyed Jaber Safdari

Holdup was measured at various frequencies, amplitudes, continuous and dispersed phase flow rates for binary systems in a pulsed plate column capable of providing samples at various heights. The binary systems was so selected as to cover a wide spectrum of interfacial tensions. Dispersed phase holdup was found to increase with height in a logarithmic fashion at conditions away from the flooding...

In this study, NRTL and UNIQUAC thermodynamic models were used to predict the composition of ternary mixtures of solvents+ m/o/p-cresol+ water in organic and aqueous phases. Various solvents are used for the separation of cresols from water. In this study, methyl propyl ketone, methyl isopropyl ketone, methyl butyl ketone, and methyl isobutyl ketone solvents were investigated. Intermolecular in...

شاهدی, زهرا, هادوی, سعید ,

  In this study, we prepared the binary-binary TCO compounds of SnO2-ZnO by the spray pyrolysis technique. We also investigated the role of MgF2/SiO2 antireflection coatings in reducing optical reflectance in the visible region of TCO. Before preparation , we simulated the optical transmition of the films for optimizing the layer thicknesses. The results of this study showed increasing of optic...

Gholamreza Moradi Hosnie-Sadat Mousavi, Majid Mohadesi,

In this study, the use of the three-layer feed forward neural network has been investigated for estimating of infinite dilute diffusion coefficient ( D12 ) of supercritical fluid (SCF), liquid and gas binary systems. Infinite dilute diffusion coefficient was spotted as a function of critical temperature, critical pressure, critical volume, normal boiling point, molecular volume in normal boilin...

Many researchers adopt Local Binary Pattern for pattern analysis. However, the long histogram created by Local Binary Pattern is not suitable for large-scale facial database. This paper presents a simple facial pattern descriptor for facial expression recognition. Local pattern is computed based on local gradient flow from one side to another side through the center pixel in a 3x3 pixels region...

In this study, the pressure drop for the binary mixtures of particles differing in size and density in a pseudo-2D spouted bed was experimentally studied. A binary mixture of solid particles including sand, Gypsum, and polyurethane was used in the experimental setup. Effects of static bed height, cone angle, particles diameter, and a particles weight fraction on the bed pressure drop were e...

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید