Hybrid swarm negative selection algorithm for DNA-microarray data classification

The classification method, based on Combined Swarm Negative Selection Algorithm, which was originally designed for binary classification problems. The accuracy of developed algorithm was tested in an experimental way with the use of microarray data sets.

Подобные документы

  • Understanding program slicing as a technique for automatically decomposing programs by analyzing its control and data flow. Control flow analysis of binary executables and its problems. Interprocedural slicing using SDG and experimental results.

    статья, добавлен 11.10.2014

  • The similarities between cuisines of different countries, by analysing ingredients of the different recipes. The address problems of finding recipes, good ingredient pairings and even inventing new recipes. Neural network classifier and Simrank algorithm.

    статья, добавлен 18.09.2018

  • The detail parallelization a popular global search method, the PSO algorithm using MPJ Express. The parallel PSO algorithm’s robustness and efficiency are demonstrated by using four standard benchmark functions Alpine, Rosenbrock, Rastrigin and Schaffer.

    статья, добавлен 23.02.2015

  • Development of an algorithm for identifying potential clients of factoring services based on information from databases of Russian banks. Its implementation in the VBA programming language. Recommendations for improving the efficiency of sales staff.

    дипломная работа, добавлен 01.12.2019

  • A new algorithm for parallel fault simulation of VLSI on multicore workstations with common memory was proposed. The results of computational experiments on ISCAS-89 benchmarks circuits, which are obtained on the 12-core workstation, were reported.

    статья, добавлен 28.02.2016

  • Reported from a basic introduction to block cipher design and analysis. The tiny encryption algorithm. The study a concepts and design principles of block ciphers. Notation some binary operations of addition. Modern block cipher cryptanalysis methods.

    статья, добавлен 08.03.2014

  • Development of the block diagram of the expert system in the context of automated control system for preparation of the Executive plan of agricultural works for the fields on which cultivated culture. The algorithm of the fuzzy inference Mamdani.

    статья, добавлен 25.12.2016

  • Research and analysis of ways to solve the problem of reducing the expressions obtained in solving the naval system. Structure of Stokes equations. Development and analysis of an equivalent reduction algorithm based on the theory of chain fractions.

    статья, добавлен 22.12.2016

  • Analysis of data aggregated preferences. The ranking of the elements as separate and static elements. Evaluation of the algorithms, assumptions, weight and shifting implicit preferences. The essence of ranking elements as a function of their attributes.

    дипломная работа, добавлен 30.08.2016

  • The adaptive learning algorithm for "extended neo-fuzzy neuron" is proposed, that has both following and smoothing properties and allows to solve problems of prediction, filtering and smoothing of non-stationary disturbed stochastic and chaotic signals.

    статья, добавлен 29.07.2016

  • Development of classification method, graphic and text area of the image. Building a narrative function that characterizes the size of objects in the picture. Consideration the classification of text and graphic regions on a fragment of document image.

    статья, добавлен 23.02.2016

  • Find and analysis a way for data protection when a person uses e-platforms. Based on the General Data Protection Regulation, the measure for the data protection is assumed to comply when data systems go along with technical and organizational safeguards.

    статья, добавлен 13.08.2023

  • Analysis of simple principal component as a tool for dimension reduction can fail badly. Local approximations of principal component as among the most promising. Localized versions of component and principal curves and local partitioning algorithms.

    учебное пособие, добавлен 08.02.2013

  • The issue of many public key cryptosystems and application of embedded devices for this setup. Present an algorithm that also inherently thwarts differential side-channel attacks in finite abelian groups with only limited time and storage overhead.

    статья, добавлен 15.09.2012

  • The optimization problem to identify the classifier scalable objects based on two-layer perceptron. The ratio of standard deviations of pixel distortion and scale for the formation of learning sets. Minimization of the error rate of classification.

    статья, добавлен 27.03.2016

  • Rubik’s cube 3D model. Hardware and software systems for rubik’s cube solving. Designing and developing application for assembling a rubik's cube. Preventing wrong moves algorithm. Introduction to group theory and permutation puzzles. Computer vision.

    дипломная работа, добавлен 01.12.2019

  • Linguistic and numerical auxiliary quantities and the definition of auxiliary functions and a system of rules through them. The implementation of the proposed decision algorithm as a result of modeling processes that are performed by the operator.

    статья, добавлен 25.10.2016

  • Analysis of the extended euclidean algorithm. Analysis of operations in the residue class ring. Structure of the multiplicative group of residues mod a prime number. Symmetric and asymmetric cryptosystems. Compression functions from encryption functions.

    книга, добавлен 08.03.2014

  • The characteristics and features of the topic model in the form of stochastic matrices, their purpose and application. Creation and distinctive features of the new algorithm to build a Sub-hierarchy Galois, the specificity of the visualization tools.

    курсовая работа, добавлен 21.06.2016

  • Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.

    статья, добавлен 19.03.2024

  • Analysis of the specific features of automatic code generation for diagrams in the Dragon programming language. Computer’s training by creating an expert system as very different form of human learning. The algorithm of a trip by bus on Python 2.7.

    статья, добавлен 10.08.2018

  • Intellectual information systems as hybrid neural networks. Using the topology of neural networks based on a fuzzy perceptron, ANFIS, TSK, Wang & Mendel’s network to solve diagnostic problems in medicine. Influence of the fuzzy rule on output signal.

    статья, добавлен 22.12.2016

  • The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.

    статья, добавлен 18.09.2020

  • Methods for graphic and text image region classification. Construction of the narrative function characterizing areas of the image sub-elements is proposed. This function can be used for training and classification using support vector machines.

    статья, добавлен 23.02.2016

  • The article considers classification of decision support systems by the way of interaction with the user, by the method of support, by the level of data processed by the system. Types of DSS architecture are presented. Intelligent DSS are analyzed.

    статья, добавлен 14.02.2022

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.