نتایج جستجو برای: organizing map neural networks method which is considered as a non

تعداد نتایج: 15088889  

Journal: :the modares journal of electrical engineering 2008
ahmad reza sharafat mahdi rasti

high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1388

target tracking is the tracking of an object in an image sequence. target tracking in image sequence consists of two different parts: 1- moving target detection 2- tracking of moving target. in some of the tracking algorithms these two parts are combined as a single algorithm. the main goal in this thesis is to provide a new framework for effective tracking of different kinds of moving target...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1389

in reality, most structures involved in geotechnical engineering are three dimensional in nature, and although in many, plane strain or axisymmetric approximations are reasonable, there are some, for which 3-d treatment is required. the quantity of data, and the size of the various vectors and matrices involved in such analysis, increase dramatically. this has sever implications for computer r...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1390

as the canon is shaped by white male standards rewriting the canonical works of literature is one of the ways through which postcolonial writers subvert the authority of the masters. writing in the language of the masters the colonized writers use the very suppressive tool in the hands of the masters i.e. their language to question the validity of their norms. regarded by most critics to be the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1376

in this thesis our aim is to construct vector field in r3 for which the corresponding one-dimensional maps have certain discontinuities. two kinds of vector fields are considered, the first the lorenz vector field, and the second originally introced here. the latter have chaotic behavior and motivate a class of one-parameter families of maps which have positive lyapunov exponents for an open in...

2013
Paigwar Shikha

Handwritten signatures are the most natural way of authenticating a person’s identity. An offline signature verification system generally consists of four components: data acquisition, preprocessing, feature extraction, recognition and verification. This paper presents a method for verifying handwritten signature by using NN architecture. In proposed methods the multi-layer perceptron (MLP), mo...

Journal: :desert 2008
a. m. kalteh p. hjorth

over the last decade or so, artificial neural networks (anns) have become one of the most promising tools formodelling hydrological processes such as rainfall runoff processes. however, the employment of a single model doesnot seem to be an appropriate approach for modelling such a complex, nonlinear, and discontinuous process thatvaries in space and time. for this reason, this study aims at de...

پایان نامه :0 1374

to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان 1389

the present thesis is a study of postmodern historical novel with respect to the voice of women. according to postmodern historiography,the established institution of history is one of the other manifestations of patriarchys power which has silenced women. the study analyzes angela carters nights at the circus as a postmodern historical novel which makes its female characters transgress the pat...

Today, information networks play an important role in supply chain management. Therefore, in this article, clustering-based routing protocols, which are one of the most important ways to reduce energy consumption in wireless sensor networks, are used to optimize the supply chain informational cloud network. Accordingly, first, a clustering protocol is presented using self-organizing map neu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید