標(biāo)題: Titlebook: Computational Intelligence Applications in Modeling and Control; Ahmad Taher Azar,Sundarapandian Vaidyanathan Book 2015 Springer Internati [打印本頁] 作者: Anagram 時間: 2025-3-21 17:24
書目名稱Computational Intelligence Applications in Modeling and Control影響因子(影響力)
書目名稱Computational Intelligence Applications in Modeling and Control影響因子(影響力)學(xué)科排名
書目名稱Computational Intelligence Applications in Modeling and Control網(wǎng)絡(luò)公開度
書目名稱Computational Intelligence Applications in Modeling and Control網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computational Intelligence Applications in Modeling and Control被引頻次
書目名稱Computational Intelligence Applications in Modeling and Control被引頻次學(xué)科排名
書目名稱Computational Intelligence Applications in Modeling and Control年度引用
書目名稱Computational Intelligence Applications in Modeling and Control年度引用學(xué)科排名
書目名稱Computational Intelligence Applications in Modeling and Control讀者反饋
書目名稱Computational Intelligence Applications in Modeling and Control讀者反饋學(xué)科排名
作者: ERUPT 時間: 2025-3-21 21:16 作者: 兩種語言 時間: 2025-3-22 01:30
Application of Genetic Algorithms for the Estimation of Ultrasonic Parameters,s. Comparative results of that experiment are presented on different evolution operators for less estimation errors and complexity. The results prove the effectiveness of GA in estimating parameters for US propagation.作者: Regurgitation 時間: 2025-3-22 08:23 作者: 側(cè)面左右 時間: 2025-3-22 10:22
Black Hole Algorithm and Its Applications,rent research fields like data clustering problem, image processing, data mining, computer vision, science and engineering. This chapter provides with the stepping stone for future researches to unveil how metaheuristic and bio-inspired commutating algorithms can improve the solutions of hard or com作者: THE 時間: 2025-3-22 16:15 作者: THE 時間: 2025-3-22 18:51
Box and Jenkins Nonlinear System Modelling Using RBF Neural Networks Designed by NSGAII,ed by NSGAII: the number of neurons in the hidden layer of the radial basis function neural network, and the error which is the difference between desired input and the output of the radial basis function neural network. This method is applied to modeling Box and Jenkins system. The obtained results作者: cardiovascular 時間: 2025-3-23 00:49
Back-Propagation Neural Network for Gender Determination in Forensic Anthropology,ht, anterior length, anterior superior breadth, mid-ventral breadth, anterior posterior diameter of the base, and max-transverse diameter of the base. The objective of this paper is to examine and compare the degree of accuracy between previous research (DFA) and BPNN. There are two architectures of作者: 無效 時間: 2025-3-23 02:01 作者: 翅膀拍動 時間: 2025-3-23 09:01
A New Approach for Flexible Queries Using Fuzzy Ontologies,epresented, then, as a set of fuzzy rules as an efficient answers to flexible queries. We show that this approach is optimum because the evaluation of the query is not done on the set of starting data which is huge but rather by using the generated fuzzy ontology.作者: cushion 時間: 2025-3-23 13:46
An Efficient Multi Level Thresholding Method for Image Segmentation Based on the Hybridization of Meshold for a given image. The proposed method takes advantage of the characteristics of the particle swarm optimization and improves the objective function value to updating the velocity and the position of particles. This method is compared to the basic PSO method, also, it is compared with other k作者: 憤慨一下 時間: 2025-3-23 15:41 作者: hemophilia 時間: 2025-3-23 21:22
,Computer Aided Intelligent Breast Cancer Detection: Second Opinion for Radiologists—A Prospective Sion for whom yearly screening mammography is recommended. It seems obvious that this difficult task could likely be made less error prone with the help of computer algorithms. Computer-aided detection (CAD) systems have been shown to be capable of reducing false-negative rates in the detection of br作者: chuckle 時間: 2025-3-24 00:22
1860-949X special chapters have been brought out in the broad areas of Control Systems, Power Electronics, Computer Science, Information Technology, modeling and engineering applications. Special importance was given to 978-3-319-35470-5978-3-319-11017-2Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 情愛 時間: 2025-3-24 05:11
Computational Intelligence Applications in Modeling and Control作者: 圖畫文字 時間: 2025-3-24 07:21 作者: 1分開 時間: 2025-3-24 13:22
https://doi.org/10.1007/3-540-49541-Xof distributed computing that controls the whole distributed system requires communications that must be based on a completely consistent system. The model of the ideal system to be adopted in building an intelligent distributed computing structure is the human body system, specifically the body’s c作者: 笨重 時間: 2025-3-24 18:04 作者: 污穢 時間: 2025-3-24 19:38 作者: Phonophobia 時間: 2025-3-25 02:54
Application of “Strange” to Energy Studiesrent research fields like data clustering problem, image processing, data mining, computer vision, science and engineering. This chapter provides with the stepping stone for future researches to unveil how metaheuristic and bio-inspired commutating algorithms can improve the solutions of hard or com作者: 說笑 時間: 2025-3-25 03:47 作者: Bronchial-Tubes 時間: 2025-3-25 10:41
https://doi.org/10.1007/978-94-009-2111-5ed by NSGAII: the number of neurons in the hidden layer of the radial basis function neural network, and the error which is the difference between desired input and the output of the radial basis function neural network. This method is applied to modeling Box and Jenkins system. The obtained results作者: Colonoscopy 時間: 2025-3-25 14:33
M. Delgado,J. L. Verdegay,M. A. Vilaht, anterior length, anterior superior breadth, mid-ventral breadth, anterior posterior diameter of the base, and max-transverse diameter of the base. The objective of this paper is to examine and compare the degree of accuracy between previous research (DFA) and BPNN. There are two architectures of作者: 先兆 時間: 2025-3-25 18:06
Stochastic Visibility in Random Fields the fundamental components of pre-fault and post-fault sequence samples of three phase currents and zero sequence current. For fault location, four ANNs networks are used in order to estimate the exact fault location in transmission line. Magnitudes of pre-fault and post-fault of three phase curren作者: follicular-unit 時間: 2025-3-25 22:07
Stochastic Visibility in Random Fieldsepresented, then, as a set of fuzzy rules as an efficient answers to flexible queries. We show that this approach is optimum because the evaluation of the query is not done on the set of starting data which is huge but rather by using the generated fuzzy ontology.作者: 突變 時間: 2025-3-26 03:59
https://doi.org/10.1007/978-981-99-0935-3eshold for a given image. The proposed method takes advantage of the characteristics of the particle swarm optimization and improves the objective function value to updating the velocity and the position of particles. This method is compared to the basic PSO method, also, it is compared with other k作者: 表主動 時間: 2025-3-26 04:59
https://doi.org/10.1007/978-1-4615-4533-0 established as the distance between the obtained forward positions and the desired one, it is subject to minimization. In this paper IK-FA is tested over a 3 links articulated planar system, the evaluation is based on statistical analysis of the convergence and the solution quality for 100 tests. T作者: Neuralgia 時間: 2025-3-26 08:38 作者: Irascible 時間: 2025-3-26 12:40
Book 2015 by subject experts who are specialized in the various topics addressed in this book. The special chapters have been brought out in the broad areas of Control Systems, Power Electronics, Computer Science, Information Technology, modeling and engineering applications. Special importance was given to 作者: dapper 時間: 2025-3-26 17:20 作者: Resign 時間: 2025-3-27 00:49
Towards Intelligent Distributed Computing: Cell-Oriented Computing,re vital to banking applications, communication of electronic systems, air traffic control, manufacturing automation, biomedical operation works, space monitoring systems and robotics information systems. As the nature of computing comes to be increasingly directed towards intelligence and autonomy,作者: 縱欲 時間: 2025-3-27 02:54
Application of Genetic Algorithms for the Estimation of Ultrasonic Parameters,, then, surveyed showing an ever-spread of employing GA in different applications of US. A GA is, specifically, used to estimate the propagation parameters of US waves in polycrystalline?and composite materials for different applications. The objective function of the estimation is the minimization 作者: 潔凈 時間: 2025-3-27 06:29
A Hybridized Approach for Prioritizing Software Requirements Based on K-Means and Evolutionary Algo a mismatch between ranked requirements and stakeholder’s linguistic ratings. This problem has led many software developers in building systems that eventually?fall short of user’s requirements. In this chapter, we propose a new approach for prioritizing software requirements that reflect high corre作者: otic-capsule 時間: 2025-3-27 12:53 作者: 賭博 時間: 2025-3-27 14:52 作者: Ejaculate 時間: 2025-3-27 18:56 作者: violate 時間: 2025-3-28 01:24 作者: Psa617 時間: 2025-3-28 02:19
A Monitoring-Maintenance Approach Based on Fuzzy Petri Nets in Manufacturing Systems with Time Cons productivity and quality. This paper proposes a monitoring-maintenance approach based on fuzzy Petri Nets (PN’s) for manufacturing job-shops with time constraints. In such systems, operation times are included between a minimum and a maximum value. In this context, we propose a new fuzzy Petri net 作者: 割公牛膨脹 時間: 2025-3-28 09:04
Box and Jenkins Nonlinear System Modelling Using RBF Neural Networks Designed by NSGAII,often to find a better structure. The choice of the architecture of artificial neural network for a given problem has long been a problem. Developments show that it is often possible to find architecture of artificial neural network that greatly improves the results obtained with conventional method作者: Nebulous 時間: 2025-3-28 11:53
Back-Propagation Neural Network for Gender Determination in Forensic Anthropology,l remains. Gender determination is the classification of an individual into one of two groups, male or female. The classification technique most used by anthropologists or researchers is traditional gender determination with applied linear approach, such as Discriminant Function Analysis (DFA). This作者: EVICT 時間: 2025-3-28 15:33 作者: Bmd955 時間: 2025-3-28 21:22 作者: 運氣 時間: 2025-3-29 02:17
An Efficient Multi Level Thresholding Method for Image Segmentation Based on the Hybridization of Mn widely used in many application fields such as medical image analysis to characterize and detect anatomical structures, robotics features extraction for mobile robot localization and detection and map procession for lines and legends finding. Many techniques have been developed in the field of ima作者: Heart-Rate 時間: 2025-3-29 05:06
IK-FA, a New Heuristic Inverse Kinematics Solver Using Firefly Algorithm,ed, IK-FA. Solving inverse kinematics, IK, consists in finding a set of joint-positions allowing a specific point of the system to achieve a target position. In IK-FA, the Fireflies positions are assumed to be a possible solution for joints elementary motions. For a robotic system with a known forwa作者: 無底 時間: 2025-3-29 09:52 作者: 手段 時間: 2025-3-29 13:33
1860-949X al Conference On Control, Engineering & Information Technolo.The development of computational intelligence (CI) systems was inspired by observable and imitable aspects of intelligent activity of human being and nature. The essence of the systems based on computational intelligence is to process and 作者: Patrimony 時間: 2025-3-29 19:19 作者: thalamus 時間: 2025-3-29 23:15
M. K. Luhandjula,Masatoshi Sakawarence weights of requirements obtained from the stakeholder’s linguistic ratings. Our approach was validated with a dataset known as RALIC which comprises of requirements with relative weights?of stakeholders.作者: Expediency 時間: 2025-3-30 03:41
A Hybridized Approach for Prioritizing Software Requirements Based on K-Means and Evolutionary Algorence weights of requirements obtained from the stakeholder’s linguistic ratings. Our approach was validated with a dataset known as RALIC which comprises of requirements with relative weights?of stakeholders.作者: 按時間順序 時間: 2025-3-30 06:13 作者: 青少年 時間: 2025-3-30 10:43
https://doi.org/10.1007/978-94-009-2111-5 behaviour of the system by temporal spectrum of the marking. The second model corresponds to diagnosis activities. Finally, to illustrate the effectiveness and accuracy of proposed maintenance approach, two industrial examples are depicted.作者: Throttle 時間: 2025-3-30 15:09 作者: GENUS 時間: 2025-3-30 20:20 作者: AER 時間: 2025-3-30 20:45
https://doi.org/10.1007/978-3-319-11017-2Artificial Neural Networks; CEIT 14; CEIT’14; Computational Intelligence; Evolutionary Computing; Fuzzy L作者: 多骨 時間: 2025-3-31 00:52