派博傳思國際中心

標(biāo)題: Titlebook: Computational Intelligence Applications in Modeling and Control; Ahmad Taher Azar,Sundarapandian Vaidyanathan Book 2015 Springer Internati [打印本頁]

作者: Anagram    時間: 2025-3-21 17:24
書目名稱Computational Intelligence Applications in Modeling and Control影響因子(影響力)




書目名稱Computational Intelligence Applications in Modeling and Control影響因子(影響力)學(xué)科排名




書目名稱Computational Intelligence Applications in Modeling and Control網(wǎng)絡(luò)公開度




書目名稱Computational Intelligence Applications in Modeling and Control網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computational Intelligence Applications in Modeling and Control被引頻次




書目名稱Computational Intelligence Applications in Modeling and Control被引頻次學(xué)科排名




書目名稱Computational Intelligence Applications in Modeling and Control年度引用




書目名稱Computational Intelligence Applications in Modeling and Control年度引用學(xué)科排名




書目名稱Computational Intelligence Applications in Modeling and Control讀者反饋




書目名稱Computational Intelligence Applications in Modeling and Control讀者反饋學(xué)科排名





作者: ERUPT    時間: 2025-3-21 21:16

作者: 兩種語言    時間: 2025-3-22 01:30
Application of Genetic Algorithms for the Estimation of Ultrasonic Parameters,s. Comparative results of that experiment are presented on different evolution operators for less estimation errors and complexity. The results prove the effectiveness of GA in estimating parameters for US propagation.
作者: Regurgitation    時間: 2025-3-22 08:23

作者: 側(cè)面左右    時間: 2025-3-22 10:22
Black Hole Algorithm and Its Applications,rent research fields like data clustering problem, image processing, data mining, computer vision, science and engineering. This chapter provides with the stepping stone for future researches to unveil how metaheuristic and bio-inspired commutating algorithms can improve the solutions of hard or com
作者: THE    時間: 2025-3-22 16:15

作者: THE    時間: 2025-3-22 18:51
Box and Jenkins Nonlinear System Modelling Using RBF Neural Networks Designed by NSGAII,ed by NSGAII: the number of neurons in the hidden layer of the radial basis function neural network, and the error which is the difference between desired input and the output of the radial basis function neural network. This method is applied to modeling Box and Jenkins system. The obtained results
作者: cardiovascular    時間: 2025-3-23 00:49
Back-Propagation Neural Network for Gender Determination in Forensic Anthropology,ht, anterior length, anterior superior breadth, mid-ventral breadth, anterior posterior diameter of the base, and max-transverse diameter of the base. The objective of this paper is to examine and compare the degree of accuracy between previous research (DFA) and BPNN. There are two architectures of
作者: 無效    時間: 2025-3-23 02:01

作者: 翅膀拍動    時間: 2025-3-23 09:01
A New Approach for Flexible Queries Using Fuzzy Ontologies,epresented, then, as a set of fuzzy rules as an efficient answers to flexible queries. We show that this approach is optimum because the evaluation of the query is not done on the set of starting data which is huge but rather by using the generated fuzzy ontology.
作者: cushion    時間: 2025-3-23 13:46
An Efficient Multi Level Thresholding Method for Image Segmentation Based on the Hybridization of Meshold for a given image. The proposed method takes advantage of the characteristics of the particle swarm optimization and improves the objective function value to updating the velocity and the position of particles. This method is compared to the basic PSO method, also, it is compared with other k
作者: 憤慨一下    時間: 2025-3-23 15:41

作者: hemophilia    時間: 2025-3-23 21:22
,Computer Aided Intelligent Breast Cancer Detection: Second Opinion for Radiologists—A Prospective Sion for whom yearly screening mammography is recommended. It seems obvious that this difficult task could likely be made less error prone with the help of computer algorithms. Computer-aided detection (CAD) systems have been shown to be capable of reducing false-negative rates in the detection of br
作者: chuckle    時間: 2025-3-24 00:22
1860-949X special chapters have been brought out in the broad areas of Control Systems, Power Electronics, Computer Science, Information Technology, modeling and engineering applications. Special importance was given to 978-3-319-35470-5978-3-319-11017-2Series ISSN 1860-949X Series E-ISSN 1860-9503
作者: 情愛    時間: 2025-3-24 05:11
Computational Intelligence Applications in Modeling and Control
作者: 圖畫文字    時間: 2025-3-24 07:21

作者: 1分開    時間: 2025-3-24 13:22
https://doi.org/10.1007/3-540-49541-Xof distributed computing that controls the whole distributed system requires communications that must be based on a completely consistent system. The model of the ideal system to be adopted in building an intelligent distributed computing structure is the human body system, specifically the body’s c
作者: 笨重    時間: 2025-3-24 18:04

作者: 污穢    時間: 2025-3-24 19:38

作者: Phonophobia    時間: 2025-3-25 02:54
Application of “Strange” to Energy Studiesrent research fields like data clustering problem, image processing, data mining, computer vision, science and engineering. This chapter provides with the stepping stone for future researches to unveil how metaheuristic and bio-inspired commutating algorithms can improve the solutions of hard or com
作者: 說笑    時間: 2025-3-25 03:47

作者: Bronchial-Tubes    時間: 2025-3-25 10:41
https://doi.org/10.1007/978-94-009-2111-5ed by NSGAII: the number of neurons in the hidden layer of the radial basis function neural network, and the error which is the difference between desired input and the output of the radial basis function neural network. This method is applied to modeling Box and Jenkins system. The obtained results
作者: Colonoscopy    時間: 2025-3-25 14:33
M. Delgado,J. L. Verdegay,M. A. Vilaht, anterior length, anterior superior breadth, mid-ventral breadth, anterior posterior diameter of the base, and max-transverse diameter of the base. The objective of this paper is to examine and compare the degree of accuracy between previous research (DFA) and BPNN. There are two architectures of
作者: 先兆    時間: 2025-3-25 18:06
Stochastic Visibility in Random Fields the fundamental components of pre-fault and post-fault sequence samples of three phase currents and zero sequence current. For fault location, four ANNs networks are used in order to estimate the exact fault location in transmission line. Magnitudes of pre-fault and post-fault of three phase curren
作者: follicular-unit    時間: 2025-3-25 22:07
Stochastic Visibility in Random Fieldsepresented, then, as a set of fuzzy rules as an efficient answers to flexible queries. We show that this approach is optimum because the evaluation of the query is not done on the set of starting data which is huge but rather by using the generated fuzzy ontology.
作者: 突變    時間: 2025-3-26 03:59
https://doi.org/10.1007/978-981-99-0935-3eshold for a given image. The proposed method takes advantage of the characteristics of the particle swarm optimization and improves the objective function value to updating the velocity and the position of particles. This method is compared to the basic PSO method, also, it is compared with other k
作者: 表主動    時間: 2025-3-26 04:59
https://doi.org/10.1007/978-1-4615-4533-0 established as the distance between the obtained forward positions and the desired one, it is subject to minimization. In this paper IK-FA is tested over a 3 links articulated planar system, the evaluation is based on statistical analysis of the convergence and the solution quality for 100 tests. T
作者: Neuralgia    時間: 2025-3-26 08:38

作者: Irascible    時間: 2025-3-26 12:40
Book 2015 by subject experts who are specialized in the various topics addressed in this book. The special chapters have been brought out in the broad areas of Control Systems, Power Electronics, Computer Science, Information Technology, modeling and engineering applications. Special importance was given to
作者: dapper    時間: 2025-3-26 17:20

作者: Resign    時間: 2025-3-27 00:49
Towards Intelligent Distributed Computing: Cell-Oriented Computing,re vital to banking applications, communication of electronic systems, air traffic control, manufacturing automation, biomedical operation works, space monitoring systems and robotics information systems. As the nature of computing comes to be increasingly directed towards intelligence and autonomy,
作者: 縱欲    時間: 2025-3-27 02:54
Application of Genetic Algorithms for the Estimation of Ultrasonic Parameters,, then, surveyed showing an ever-spread of employing GA in different applications of US. A GA is, specifically, used to estimate the propagation parameters of US waves in polycrystalline?and composite materials for different applications. The objective function of the estimation is the minimization
作者: 潔凈    時間: 2025-3-27 06:29
A Hybridized Approach for Prioritizing Software Requirements Based on K-Means and Evolutionary Algo a mismatch between ranked requirements and stakeholder’s linguistic ratings. This problem has led many software developers in building systems that eventually?fall short of user’s requirements. In this chapter, we propose a new approach for prioritizing software requirements that reflect high corre
作者: otic-capsule    時間: 2025-3-27 12:53

作者: 賭博    時間: 2025-3-27 14:52

作者: Ejaculate    時間: 2025-3-27 18:56

作者: violate    時間: 2025-3-28 01:24

作者: Psa617    時間: 2025-3-28 02:19
A Monitoring-Maintenance Approach Based on Fuzzy Petri Nets in Manufacturing Systems with Time Cons productivity and quality. This paper proposes a monitoring-maintenance approach based on fuzzy Petri Nets (PN’s) for manufacturing job-shops with time constraints. In such systems, operation times are included between a minimum and a maximum value. In this context, we propose a new fuzzy Petri net
作者: 割公牛膨脹    時間: 2025-3-28 09:04
Box and Jenkins Nonlinear System Modelling Using RBF Neural Networks Designed by NSGAII,often to find a better structure. The choice of the architecture of artificial neural network for a given problem has long been a problem. Developments show that it is often possible to find architecture of artificial neural network that greatly improves the results obtained with conventional method
作者: Nebulous    時間: 2025-3-28 11:53
Back-Propagation Neural Network for Gender Determination in Forensic Anthropology,l remains. Gender determination is the classification of an individual into one of two groups, male or female. The classification technique most used by anthropologists or researchers is traditional gender determination with applied linear approach, such as Discriminant Function Analysis (DFA). This
作者: EVICT    時間: 2025-3-28 15:33

作者: Bmd955    時間: 2025-3-28 21:22

作者: 運氣    時間: 2025-3-29 02:17
An Efficient Multi Level Thresholding Method for Image Segmentation Based on the Hybridization of Mn widely used in many application fields such as medical image analysis to characterize and detect anatomical structures, robotics features extraction for mobile robot localization and detection and map procession for lines and legends finding. Many techniques have been developed in the field of ima
作者: Heart-Rate    時間: 2025-3-29 05:06
IK-FA, a New Heuristic Inverse Kinematics Solver Using Firefly Algorithm,ed, IK-FA. Solving inverse kinematics, IK, consists in finding a set of joint-positions allowing a specific point of the system to achieve a target position. In IK-FA, the Fireflies positions are assumed to be a possible solution for joints elementary motions. For a robotic system with a known forwa
作者: 無底    時間: 2025-3-29 09:52

作者: 手段    時間: 2025-3-29 13:33
1860-949X al Conference On Control, Engineering & Information Technolo.The development of computational intelligence (CI) systems was inspired by observable and imitable aspects of intelligent activity of human being and nature. The essence of the systems based on computational intelligence is to process and
作者: Patrimony    時間: 2025-3-29 19:19

作者: thalamus    時間: 2025-3-29 23:15
M. K. Luhandjula,Masatoshi Sakawarence weights of requirements obtained from the stakeholder’s linguistic ratings. Our approach was validated with a dataset known as RALIC which comprises of requirements with relative weights?of stakeholders.
作者: Expediency    時間: 2025-3-30 03:41
A Hybridized Approach for Prioritizing Software Requirements Based on K-Means and Evolutionary Algorence weights of requirements obtained from the stakeholder’s linguistic ratings. Our approach was validated with a dataset known as RALIC which comprises of requirements with relative weights?of stakeholders.
作者: 按時間順序    時間: 2025-3-30 06:13

作者: 青少年    時間: 2025-3-30 10:43
https://doi.org/10.1007/978-94-009-2111-5 behaviour of the system by temporal spectrum of the marking. The second model corresponds to diagnosis activities. Finally, to illustrate the effectiveness and accuracy of proposed maintenance approach, two industrial examples are depicted.
作者: Throttle    時間: 2025-3-30 15:09

作者: GENUS    時間: 2025-3-30 20:20

作者: AER    時間: 2025-3-30 20:45
https://doi.org/10.1007/978-3-319-11017-2Artificial Neural Networks; CEIT 14; CEIT’14; Computational Intelligence; Evolutionary Computing; Fuzzy L
作者: 多骨    時間: 2025-3-31 00:52





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
澄迈县| 上林县| 韩城市| 方城县| 毕节市| 衡阳县| 永康市| 荣成市| 上饶县| 土默特左旗| 佳木斯市| 太湖县| 方正县| 大名县| 册亨县| 南皮县| 黔江区| 大庆市| 高雄县| 咸丰县| 曲沃县| 开江县| 孝义市| 庆云县| 梁平县| 西乌珠穆沁旗| 双桥区| 朝阳县| 德昌县| 芜湖县| 乌鲁木齐市| 景泰县| 神农架林区| 武冈市| 临沧市| 五原县| 乐安县| 建始县| 长子县| 微山县| 泰和县|