نتایج جستجو برای: krill herd algorithmkh

تعداد نتایج: 10302  

Journal: :PLoS Biology 2005
Liza Gross

Feature Open access, freely available online H arrowing tales of starvation and endurance epitomize Antarctica's " heroic age, " when men equipped with little more than fortitude struggled against a landscape seemingly designed to thwart their intentions. A menacing sea ice fi gures prominently in these improbable survival stories. Daunting to early-20th-century explorers—trapping (and ultimate...

Journal: :Journal of fish biology 2013
M H Pinkerton J Forman S J Bury J Brown P Horn R L O'Driscoll

The diet of Antarctic silverfish Pleuragramma antarcticum was evaluated by examining stomach contents of specimens collected in the Ross Sea (71°-77° S; 165°-180° E) in January to March 2008. Pleuragramma antarcticum (50-236 mm standard length, L(S)) and prey items were analysed for stable-isotopic composition of carbon and nitrogen. According to index of relative importance (I(RI) ), which inc...

Journal: :Remote Sensing 2023

Detailed snow cover maps are essential for estimating the earth’s energy balance and hydrological cycle. Mapping across spatially extensive topographically complex areas with less or no cloud obscuration is challenging, but SNPP-VIIRS Day/Night Band (DNB) nighttime light data offers a potential solution. This paper aims to map distribution at 750 m resolution diverse 1,664,900 km2 of Xinjiang, ...

Journal: :International Journal of Advanced Computer Science and Applications 2021

A vehicular Adhoc Network, a subfield of Mobile Network is defined by its high mobility and demonstrating dissimilar patterns. So, VANET clustering techniques are needed with the consideration parameters amongst nearby nodes to construct stable techniques. At same time, security also major design issue in which can be resolved Intrusion Detection Systems. In contrast conventional IDS, based IDS...

Journal: :Protection and Control of Modern Power Systems 2023

Abstract The electric distribution system (EDS) is prone to faults leading power interruptions. present energy market demands that electricity utilities invest more in different measures improve the performance of EDS. approach proposed here details a composite dual-phased methodology reliability and efficiency delivered by In first phase, optimal allocation auto-reclosers (AR) undertaken emplo...

2016
Priyanka Raj

Patient’s condition description consists of combination and changes of clinical measures. Conventional data processing methods and classification algorithms may reduce the prediction performance of clinical data.Inorder to improve the accuracy of clinical data outcome prediction by using feature selection method with multiple measurement support vector machine(MMSVM) classification algorithm is...

2017
Vijayalakshmi Senniappan Jayashree Subramanian

In recent years, wireless sensor networks (WSN) are being used by a wide range of applications. Sensor nodes are used for gathering data about the various physical parameters of the system under study. As sensor nodes are battery powered, energy efficiency is an important challenge faced by WSN. Clustering is a technique for improving the energy efficiency of the sensor network. The reported pi...

Journal: :Applied sciences 2022

The internet of things (ransomware refers to a type malware) is the concept connecting devices and objects all types on internet. IoT cybersecurity task protecting ecosystems gadgets from cyber threats. Currently, ransomware serious threat challenging computing environment, which needs instant attention avoid moral financial blackmail. Thus, there comes real need for novel technique that can id...

Journal: :JAISE 2018
Vijayalakshmi Senniappan Jayashree Subramanian

Civil buildings are prone to various kinds of damages. The detection of damages caused in a building at an early stage is essential in order to save the invaluable human life and significant belongings. Wireless sensor networks (WSN) help to detect damages caused to a building by sensing different factors, which affect civil structures. Energy efficiency of sensor nodes and network congestion a...

Journal: :Intelligent Automation and Soft Computing 2022

Recent developments of the World Wide Web (WWW) and social networking (Twitter, Instagram, etc.) paves way for data sharing which has never been observed in human history before. A major security issue this network is creation fake accounts. In addition, automatic classification text article as true or also a crucial process. The ineffectiveness humans distinguishing false information exposes n...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید