派博傳思國(guó)際中心

標(biāo)題: Titlebook: Artificial Intelligence and Simulation; 13th International C Tag Gon Kim Conference proceedings 2005 Springer-Verlag Berlin Heidelberg 2005 [打印本頁(yè)]

作者: 孵化    時(shí)間: 2025-3-21 17:14
書目名稱Artificial Intelligence and Simulation影響因子(影響力)




書目名稱Artificial Intelligence and Simulation影響因子(影響力)學(xué)科排名




書目名稱Artificial Intelligence and Simulation網(wǎng)絡(luò)公開度




書目名稱Artificial Intelligence and Simulation網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Artificial Intelligence and Simulation被引頻次




書目名稱Artificial Intelligence and Simulation被引頻次學(xué)科排名




書目名稱Artificial Intelligence and Simulation年度引用




書目名稱Artificial Intelligence and Simulation年度引用學(xué)科排名




書目名稱Artificial Intelligence and Simulation讀者反饋




書目名稱Artificial Intelligence and Simulation讀者反饋學(xué)科排名





作者: Pandemic    時(shí)間: 2025-3-22 00:07
Renal Manifestations of Fabry Disease we applied to a real game, Quake II. The experimental results verify the feasibility and validity of this game system.This system is currently capable of recognizing 13 gestures, corresponding to 20 keyboard and mouse commands for Quake II game.
作者: Accord    時(shí)間: 2025-3-22 04:02

作者: entice    時(shí)間: 2025-3-22 06:23
A Disaster Relief Simulation Model of a Building FireThe people have to escape from the building when they find or notice the fire. We show the algorithm and the result, how the fire spreads the floor and the people escape from the fire, of this model and the possibility of future model.
作者: 常到    時(shí)間: 2025-3-22 09:19

作者: 無(wú)脊椎    時(shí)間: 2025-3-22 16:27
A Scheduling Analysis in FMS Using the Transitive Matrixystem could be divided into some subnets such as BUC of the machine’s operations and analyzed the feasibility time in each schedule. The usefulness of transitive matrix to slice off some subnets from the original net, and the explanation in an example will be discussed.
作者: single    時(shí)間: 2025-3-22 18:15
Unified Modeling for Singularly Perturbed Systems by Delta Operators: Pole Assignment Case. A pole placement example is used to show such advantages of the proposed methods. It is shown that the error of the reduced model in its eigenvalues is less than the order of . (singular perturbation parameter). It is shown that the error in the unified model is less than that of the discrete model.
作者: 暴露他抗議    時(shí)間: 2025-3-22 22:12

作者: 樂章    時(shí)間: 2025-3-23 04:41
Proposal of High Level Architecture Extensionsion of specification level from application programming interface (API) to message-based protocols makes RTI software communicate each other and even with the protocol-talking hardware. The extension includes new APIs to the Federate Interface Specification, improving reusability of federates.
作者: BOOM    時(shí)間: 2025-3-23 06:26

作者: Hypopnea    時(shí)間: 2025-3-23 12:58
,Wandlungsf?hige Fabriken und Fabrikmodelle,compression, digital filtering, and soft computation. Perhaps most fundamentally we suggest the possibility of dispensing with the mysteries of traditional calculus to revolutionize the prevailing educational paradigm.
作者: 增減字母法    時(shí)間: 2025-3-23 16:44
Fabrikplanung und Fabrikbetrieb. We will argue in this paper that these parallel developments have led to some myopia that should be overcome because techniques and insights borrowed from the other discipline can be very beneficial.
作者: 使混合    時(shí)間: 2025-3-23 21:06
Unternehmenskultur leben und weitergeben,ion than the usual approach. This is attributed to the PCA method which reduces the dimensionality of the original data prior to the processing. Furthermore, the proposed model had verified the premise that it could handle sparse information and suitable for data of high dimensionality as compared to other technique such as the wavelet transform.
作者: ostrish    時(shí)間: 2025-3-23 22:11

作者: 是貪求    時(shí)間: 2025-3-24 05:42

作者: 挑剔小責(zé)    時(shí)間: 2025-3-24 08:55

作者: 無(wú)動(dòng)于衷    時(shí)間: 2025-3-24 11:33

作者: Detonate    時(shí)間: 2025-3-24 18:32

作者: enflame    時(shí)間: 2025-3-24 19:22
Association Rule Discovery in Data Mining by Implementing Principal Component Analysision than the usual approach. This is attributed to the PCA method which reduces the dimensionality of the original data prior to the processing. Furthermore, the proposed model had verified the premise that it could handle sparse information and suitable for data of high dimensionality as compared to other technique such as the wavelet transform.
作者: Measured    時(shí)間: 2025-3-25 00:22
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Constructiong factors in our DNS ITS system. Also, this analysis result is used in modeling and simulation to see the dynamics of computer network for vulnerability and external malicious attack. This paper shows simulation execution examples making use of the vulnerability analysis result.
作者: 誓言    時(shí)間: 2025-3-25 04:38

作者: 點(diǎn)燃    時(shí)間: 2025-3-25 09:05
The Hierarchical Federation Architecture for the Interoperability of ROK and US Simulationsnd its testing. Finally, we expect that this architecture will provide an enhancement in the ROK-US combined exercises while reducing costs. Furthermore, we believe that this architecture is an example to interoperate simulations with other allies.
作者: arthroscopy    時(shí)間: 2025-3-25 15:39

作者: 有幫助    時(shí)間: 2025-3-25 17:35

作者: clarify    時(shí)間: 2025-3-25 20:30

作者: Ornithologist    時(shí)間: 2025-3-26 03:43
Pradeep Buddharaju,Ioannis Pavlidis Ph.D.se retrieved from the case base. We adopt rule-based reasoning for the case adjustment which is one of the most difficult jobs in CBR. We have collected ERP implementation cases by interviewing with project managers, and organized them with XML (Extensible Markup Language)
作者: 刻苦讀書    時(shí)間: 2025-3-26 05:36

作者: Aids209    時(shí)間: 2025-3-26 10:00

作者: Ophthalmoscope    時(shí)間: 2025-3-26 13:24

作者: CRACK    時(shí)間: 2025-3-26 17:17
PPSS: CBR System for ERP Project Pre-planningse retrieved from the case base. We adopt rule-based reasoning for the case adjustment which is one of the most difficult jobs in CBR. We have collected ERP implementation cases by interviewing with project managers, and organized them with XML (Extensible Markup Language)
作者: refraction    時(shí)間: 2025-3-27 00:26
,Wandlungsf?hige Fabriken und Fabrikmodelle,. A pole placement example is used to show such advantages of the proposed methods. It is shown that the error of the reduced model in its eigenvalues is less than the order of . (singular perturbation parameter). It is shown that the error in the unified model is less than that of the discrete model.
作者: Ambulatory    時(shí)間: 2025-3-27 02:26

作者: CLAP    時(shí)間: 2025-3-27 09:10
Face Biometrics for Personal Identificationsion of specification level from application programming interface (API) to message-based protocols makes RTI software communicate each other and even with the protocol-talking hardware. The extension includes new APIs to the Federate Interface Specification, improving reusability of federates.
作者: strdulate    時(shí)間: 2025-3-27 12:19
Detecting Faces in Still Images,s can be evolved according to their environments by applying gene algorithm. It also produces various special quality NPCs from a few kinds of NPCs through evolution. Game character group’s movement can be expressed more realistically by applied Flocking algorithm.
作者: 法律    時(shí)間: 2025-3-27 16:23

作者: abject    時(shí)間: 2025-3-27 21:12

作者: Intuitive    時(shí)間: 2025-3-27 23:46

作者: extrovert    時(shí)間: 2025-3-28 05:10

作者: ALLAY    時(shí)間: 2025-3-28 08:17

作者: CIS    時(shí)間: 2025-3-28 13:20

作者: 陰謀    時(shí)間: 2025-3-28 15:14

作者: Mettle    時(shí)間: 2025-3-28 22:23
Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing Systemvarious kinds, some of which are related to manufacturing systems. In modern manufacturing industries, automatic systems composed of computers are common, and these systems are continuing to enhance the efficiency of the manufacturing process by analyzing the overall production process – from design
作者: Antecedent    時(shí)間: 2025-3-29 00:38

作者: debris    時(shí)間: 2025-3-29 03:55
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attackques, since the marked information written by any routers between the attacker and the reflectors will be lost in the replied packets from the reflectors. In response to such attacks, advanced IP traceback technology must be suggested. This study proposed a . for simulating . technique that identifi
作者: 鳥籠    時(shí)間: 2025-3-29 09:19

作者: Fibrillation    時(shí)間: 2025-3-29 13:38
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Networkto account confidentiality, authentication, integrity, secure key exchange and protection mechanism against replay attack also. For the connectionless security services on packet basis, IETF IPsec Working Group has standardized two extension headers (AH&ESP), key exchange and authentication protocol
作者: 舊式步槍    時(shí)間: 2025-3-29 16:22
Describing the HLA Using the DFSS Formalism has been established by the US/DMSO and it is aimed to promote the communication among complex simulators. In this paper, we present a formal representation of the modeling aspects of the HLA using the . (DFSS), a modeling formalism aimed to represent dynamic structure systems. The HLA has introduc
作者: 侵害    時(shí)間: 2025-3-29 23:33

作者: dainty    時(shí)間: 2025-3-30 03:32
High Performance Modeling for Distributed Simulationt, which is load balancing, suggests distribution of a different functionality to each distributed component, and assigns various degrees of communication and computation loads in each component. In addition, this paper introduces a design with an inter-federation communication on HLA-compliant dist
作者: ADAGE    時(shí)間: 2025-3-30 04:41
The Hierarchical Federation Architecture for the Interoperability of ROK and US Simulationsnalyzed and extracted the necessary improvements through the review of the simulation architecture currently used for ROK-US combined exercises and from the current ROK Armed Forces modeling and simulation (M&S) utilization. We have designed an advanced federation architecture based on a multi-feder
作者: NEXUS    時(shí)間: 2025-3-30 10:51

作者: 言行自由    時(shí)間: 2025-3-30 15:42
A Scheduling Analysis in FMS Using the Transitive Matrix token flows, the basic unit of concurrency (short BUC) could be defined to be a set of the executed control flows in the net. In addition, original system could be divided into some subnets such as BUC of the machine’s operations and analyzed the feasibility time in each schedule. The usefulness of
作者: 滔滔不絕地說    時(shí)間: 2025-3-30 20:22

作者: Cardioplegia    時(shí)間: 2025-3-30 21:44

作者: Accord    時(shí)間: 2025-3-31 01:23

作者: cortisol    時(shí)間: 2025-3-31 06:24
Reorder Decision System Based on the Concept of the Order Risk Using Neural Networkspt of the order risk. Simulation results show that the proposed system gives superior performance to the traditional reorder policies. Additionally, managerial implication is provided regarding the environmental characteristics where the performance of the proposed system is maximized.
作者: Misnomer    時(shí)間: 2025-3-31 10:18

作者: 絕食    時(shí)間: 2025-3-31 14:21
Tag Gon KimIncludes supplementary material:
作者: Engaging    時(shí)間: 2025-3-31 20:45

作者: 真實(shí)的你    時(shí)間: 2025-3-31 21:40

作者: craven    時(shí)間: 2025-4-1 05:53
0302-9743 Overview: Includes supplementary material: 978-3-540-24476-9978-3-540-30583-5Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 圣歌    時(shí)間: 2025-4-1 07:35
https://doi.org/10.1007/b105609AI planning; agent-based modeling; animation; artificial intelligence; autonomous systems; business model
作者: 變異    時(shí)間: 2025-4-1 12:32
978-3-540-24476-9Springer-Verlag Berlin Heidelberg 2005




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
当雄县| 湟源县| 湖南省| 寻乌县| 大厂| 蒙自县| 伊金霍洛旗| 昌都县| 开封市| 郴州市| 文安县| 通山县| 高安市| 宣化县| 三都| 奈曼旗| 新乐市| 乾安县| 华宁县| 清徐县| 三台县| 安义县| 沈阳市| 常德市| 贵阳市| 阿坝县| 黔西县| 田林县| 互助| 鹤岗市| 中西区| 博湖县| 巨野县| 应城市| 宁强县| 天柱县| 靖西县| 肇东市| 廉江市| 上林县| 灵丘县|