派博傳思國際中心

標(biāo)題: Titlebook: Cybernetics Perspectives in Systems; Proceedings of 11th Radek Silhavy Conference proceedings 2022 The Editor(s) (if applicable) and The A [打印本頁]

作者: Entangle    時(shí)間: 2025-3-21 16:04
書目名稱Cybernetics Perspectives in Systems影響因子(影響力)




書目名稱Cybernetics Perspectives in Systems影響因子(影響力)學(xué)科排名




書目名稱Cybernetics Perspectives in Systems網(wǎng)絡(luò)公開度




書目名稱Cybernetics Perspectives in Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cybernetics Perspectives in Systems被引頻次




書目名稱Cybernetics Perspectives in Systems被引頻次學(xué)科排名




書目名稱Cybernetics Perspectives in Systems年度引用




書目名稱Cybernetics Perspectives in Systems年度引用學(xué)科排名




書目名稱Cybernetics Perspectives in Systems讀者反饋




書目名稱Cybernetics Perspectives in Systems讀者反饋學(xué)科排名





作者: Excitotoxin    時(shí)間: 2025-3-21 21:48

作者: 改變    時(shí)間: 2025-3-22 02:34
Modeling the Spread of a Message in a Population with Differential Receptivity,ng that the population is composed of three groups with different values of receptivity and a model containing a simplifying assumption for a population with the same parameters. It was found that the simplifying assumption that receptivity is the same for all individuals distorts the description of
作者: 言外之意    時(shí)間: 2025-3-22 07:39

作者: 恃強(qiáng)凌弱    時(shí)間: 2025-3-22 09:02

作者: grudging    時(shí)間: 2025-3-22 15:10

作者: grudging    時(shí)間: 2025-3-22 21:07

作者: Wallow    時(shí)間: 2025-3-22 21:49

作者: 不愛防注射    時(shí)間: 2025-3-23 02:25

作者: 安裝    時(shí)間: 2025-3-23 08:13
Ranking Requirements Using MoSCoW Methodology in Practice, has been applied to identification of four requirement groups, whose impact on the results principally differ within the scope of the identified problems. The obtained list of prioritized requirements should be used on next project stages since it will be exploited by the managers during their plan
作者: ingrate    時(shí)間: 2025-3-23 09:42

作者: degradation    時(shí)間: 2025-3-23 16:55
Yasmin E. Younis,Sahar Fawzi,Mustafa Elattare and red shift. The same is observed when the radiator overtakes a moving receiver or, conversely, the receiver overtakes a moving radiator. It is concluded that the mathematical models of the detected physical effects are a manifestation of the physical properties of the medium in which electromag
作者: Hiatal-Hernia    時(shí)間: 2025-3-23 21:28
Yasmin E. Younis,Sahar Fawzi,Mustafa Elattarng that the population is composed of three groups with different values of receptivity and a model containing a simplifying assumption for a population with the same parameters. It was found that the simplifying assumption that receptivity is the same for all individuals distorts the description of
作者: MOAN    時(shí)間: 2025-3-24 01:52
Fahem Zerrouki,Samir Ouchani,Hafida Bouarfaon and processing of satellite big data is described. The characteristics are described – turnover, variety, accuracy. The main task of remote sensing data processing is determined. An example of processing photos or images with the necessary radio-metric and geometric characteristics is given. The
作者: Osteoarthritis    時(shí)間: 2025-3-24 05:26
https://doi.org/10.1007/978-3-030-87657-9ary to work out an automated clinical decision support system. The given system can support clinical decisions, and also it provides longitudinal monitoring, stores patients’ data and PCOS diagnostics. #CSOC1120.
作者: 矛盾    時(shí)間: 2025-3-24 09:02

作者: 生來    時(shí)間: 2025-3-24 12:51

作者: 惹人反感    時(shí)間: 2025-3-24 18:05
Akram Idani,Rim Djedidi,German Vegaiple cameras. This model outperforms the conventional approaches in terms of the detection of suspicious locations with an average F1-score of 0.9666, a false positive rate of 0.0922, and an accuracy of 94.49%. The deployment of this new model can help to augment the work of police information syste
作者: overwrought    時(shí)間: 2025-3-24 21:50

作者: Synthesize    時(shí)間: 2025-3-25 03:09
https://doi.org/10.1007/978-3-319-09900-2 has been applied to identification of four requirement groups, whose impact on the results principally differ within the scope of the identified problems. The obtained list of prioritized requirements should be used on next project stages since it will be exploited by the managers during their plan
作者: 虛構(gòu)的東西    時(shí)間: 2025-3-25 05:10
Sahar Ben Bechir,Asma Mekki,Mariem Ellouzes surface under conditions of prior uncertainty of the signal and jamming situation, based on the developed algorithms of statistical processing and adaptive estimation of multispectral image data. We propose a model of observation and multichannel processing of spectrozonal data based on a statisti
作者: SHOCK    時(shí)間: 2025-3-25 10:35
Yasmin E. Younis,Sahar Fawzi,Mustafa Elattar deep space and studying the physical properties of void. A flat one-dimensional field of electromagnetic waves described by Maxwell’s equations is considered. In the framework of solving Cauchy problems of hyperbolic equations, the period of harmonic waves at the receiver is investigated for differ
作者: 新娘    時(shí)間: 2025-3-25 13:34

作者: Retrieval    時(shí)間: 2025-3-25 17:50

作者: Mingle    時(shí)間: 2025-3-25 21:15

作者: transient-pain    時(shí)間: 2025-3-26 03:29

作者: 故意    時(shí)間: 2025-3-26 05:42

作者: 臆斷    時(shí)間: 2025-3-26 10:08
Nassira Chekkai,Hamamache Kheddoucie process of harvesting crops. Other technological advances found their purpose in agriculture, such as Internet of Things. Therefore, it is very important to build Internet of Things in the agriculture. In this work we will show the steps of making a device based on Internet of things by using sens
作者: barium-study    時(shí)間: 2025-3-26 13:34
Christian Attiogbé,Jér?me Rocheteaution life cycle through the development of digital infrastructure. Such technical capabilities make it possible to use the latest advances in artificial intelligence for the development of effective systems of monitoring, equipment diagnostics, technical failures predicting and complex objects contr
作者: Celiac-Plexus    時(shí)間: 2025-3-26 17:27
Akram Idani,Rim Djedidi,German VegaThe paper is the research a continuation conducted by the author since the pandemic beginning, reflecting the learners’ attitudes dynamics towards learning different aspects and distance learning in general. The study objects were a technical university different training areas students, have got le
作者: CRATE    時(shí)間: 2025-3-27 00:39

作者: 松雞    時(shí)間: 2025-3-27 03:36
Akram Idani,Rim Djedidi,German Vegaies captured from different cameras, which often leads to fatigue and failure to identify the suspicious activities. This is an area of considerable interest for security agents like police carrying out surveillance operations. Besides the current literature effort, this research investigates how su
作者: 很像弓]    時(shí)間: 2025-3-27 08:51

作者: 絕緣    時(shí)間: 2025-3-27 09:38
Target-Controlled Infusion in Childrenopment of the theoretical and scientific and methodological aspects of the valuation of these assets. In this regard, this article aims to identify or disclose identification of methodological problems in the valuation of digital financial assets. The purpose of the article is to formulate methodolo
作者: cardiac-arrest    時(shí)間: 2025-3-27 13:53

作者: DECRY    時(shí)間: 2025-3-27 18:46
Marije Reekers,Fred Boer,Jaap Vuykon. Their implementation is therefore necessary in all regions of the world. So we are interested in the improvement of exchanges between Internet Service Provider (ISP) ASes through IXPs interconnection via ISPs customers ASes. For such a study we have chosen 11 African Internet exchange points fro
作者: 來就得意    時(shí)間: 2025-3-28 01:44

作者: affinity    時(shí)間: 2025-3-28 03:33

作者: arcane    時(shí)間: 2025-3-28 10:12
Sahar Ben Bechir,Asma Mekki,Mariem EllouzeThis study addresses problems of the incompleteness and ambiguity of the conceptual and terminological framework in the area of critical asset security. Main terms and concepts are specified and explained. The most general theoretical problem statements in the field of providing security for critical assets are conceived. #CSOC1120.
作者: flaunt    時(shí)間: 2025-3-28 14:23
Providing Security for Critical Assets. Challenges and Prospects,This study addresses problems of the incompleteness and ambiguity of the conceptual and terminological framework in the area of critical asset security. Main terms and concepts are specified and explained. The most general theoretical problem statements in the field of providing security for critical assets are conceived. #CSOC1120.
作者: 使無效    時(shí)間: 2025-3-28 15:46

作者: leniency    時(shí)間: 2025-3-28 20:37

作者: GLEAN    時(shí)間: 2025-3-28 23:45
Cybernetics Perspectives in Systems978-3-031-09073-8Series ISSN 2367-3370 Series E-ISSN 2367-3389
作者: Indolent    時(shí)間: 2025-3-29 06:29

作者: nominal    時(shí)間: 2025-3-29 10:20

作者: 諂媚于性    時(shí)間: 2025-3-29 11:42
Conference proceedings 2022CSOC 2022), which was held in April 2022 online. Papers on modern cybernetics and informatics in the context of networks and systems are an important component of current research issues. This volume contains an overview of recent method, algorithms and designs. .
作者: RENIN    時(shí)間: 2025-3-29 17:03
Method of Statistical Processing and Adaptive Estimation of Multispectral Aerospace Monitoring Datas surface under conditions of prior uncertainty of the signal and jamming situation, based on the developed algorithms of statistical processing and adaptive estimation of multispectral image data. We propose a model of observation and multichannel processing of spectrozonal data based on a statisti
作者: moratorium    時(shí)間: 2025-3-29 22:55
Electromagnetic Communication in Deep Space Between Mutually Moving Apparatus, deep space and studying the physical properties of void. A flat one-dimensional field of electromagnetic waves described by Maxwell’s equations is considered. In the framework of solving Cauchy problems of hyperbolic equations, the period of harmonic waves at the receiver is investigated for differ
作者: 慢慢沖刷    時(shí)間: 2025-3-30 01:27

作者: Ablation    時(shí)間: 2025-3-30 06:17
Comparative Analysis of Big Data Acquisition Technology from Landsat 8 and Sentinel-2 Satellites, a system analysis of the data is carried out. A step-by-step instruction of the BIG DTA collection technology has been developed and described. The review of ISO Geographic information standards is carried out. The technology of obtaining remote sensing data of the earth is described. An example of
作者: SPURN    時(shí)間: 2025-3-30 10:06

作者: 條街道往前推    時(shí)間: 2025-3-30 15:07

作者: 案發(fā)地點(diǎn)    時(shí)間: 2025-3-30 17:58
Utilization of RTOS Solutions in IoT Modules Based on RISC Microcontrollers,ons that use low-power but sufficient microcontrollers with ARM architecture. A significant part of the market is made up of STM32 microcontrollers, from Cortex M0 to M4 cores. Several RTOS solutions are available on the market, i.e., solutions that provide, when writing code for a microcontroller,
作者: arrhythmic    時(shí)間: 2025-3-30 20:43

作者: chisel    時(shí)間: 2025-3-31 04:09

作者: arthroscopy    時(shí)間: 2025-3-31 08:41
Student or Human Operator? Objective Results and Subjective Perceptions of the Process and Results The paper is the research a continuation conducted by the author since the pandemic beginning, reflecting the learners’ attitudes dynamics towards learning different aspects and distance learning in general. The study objects were a technical university different training areas students, have got le
作者: obligation    時(shí)間: 2025-3-31 10:51
Implementation of Data Mining Using k-Nearest Neighbor Algorithm for Covid-19 Vaccine Sentiment Ana the social media platform Twitter that contained ‘Tweets’ with positive or negative sentiments. The research method was divided into data retrieval on Twitter related to the COVID-19 vaccine in Indonesia, gathering the preprocessing data, and followed by classification based on the K-Nearest Neighb
作者: PSA-velocity    時(shí)間: 2025-3-31 14:12
Towards Intelligent Vision Surveillance for Police Information Systems,ies captured from different cameras, which often leads to fatigue and failure to identify the suspicious activities. This is an area of considerable interest for security agents like police carrying out surveillance operations. Besides the current literature effort, this research investigates how su
作者: GUEER    時(shí)間: 2025-3-31 19:07
Artificial Intelligence Systems Based on Artificial Neural Networks in Ecology,ce systems further use becomes clear. The authors prove special opportunities for using artificial neural networks in artificial intelligence systems. By the industrial ecology problem example, the neural networks’ capabilities for finding order parameters (system synthesis) are revealed. Such probl
作者: 飛來飛去真休    時(shí)間: 2025-3-31 23:36

作者: 最后一個(gè)    時(shí)間: 2025-4-1 03:37
Capabilities of Artificial Neuron Networks for System Synthesis in Medicine,nique and stochastic approach becomes not useful. It is uncertainty of the second type. But there is uncertainty of the first type when samples are equal but biosystems demonstrate real distinguishes. For such case we propose the artificial neuron networks in special chaotic regimes such provide the
作者: osteocytes    時(shí)間: 2025-4-1 09:10
,Improving the?Linkage of?Internet Exchange Points Through Connected ISPs ASes,on. Their implementation is therefore necessary in all regions of the world. So we are interested in the improvement of exchanges between Internet Service Provider (ISP) ASes through IXPs interconnection via ISPs customers ASes. For such a study we have chosen 11 African Internet exchange points fro
作者: 赦免    時(shí)間: 2025-4-1 13:37
Ranking Requirements Using MoSCoW Methodology in Practice,ns that will fulfill stakeholder needs. During the analysis, the needs and informal concerns are transformed into formal solution requirements describing the behavior of solution components in details. The developed models can describe the current state of the organization and are used for validatin
作者: 團(tuán)結(jié)    時(shí)間: 2025-4-1 16:29
Novel Experimental Prototype for Determining Malicious Degree in Vulnerable Environment of Internet. Existing review of literature showcase that encryption-based techniques are on rise for device security; however, its loopholes are yet not addressed. Hence, this paper presents a discussion of computational framework which can carry out extraction of malicious behaviour of a node automatically on
作者: 詩集    時(shí)間: 2025-4-1 21:17
Capabilities of Artificial Neuron Networks for System Synthesis in Medicine,ual but biosystems demonstrate real distinguishes. For such case we propose the artificial neuron networks in special chaotic regimes such provide the identification of order parameters and solution of global system synthesis for solution of first type uncertainty. So artificial networks demonstrated new possibility for informatics. #CSOC1120.




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
平阳县| 马龙县| 长海县| 柞水县| 北海市| 山东省| 长沙市| 咸宁市| 汝城县| 靖边县| 慈利县| 滨海县| 涞源县| 盐津县| 化州市| 高要市| 宣城市| 连云港市| 高安市| 永德县| 响水县| 四平市| 拜城县| 永善县| 长寿区| 随州市| 盈江县| 丰县| 阿坝| 灵宝市| 桦南县| 安西县| 东至县| 桂阳县| 华蓥市| 亳州市| 噶尔县| 灯塔市| 苍梧县| 兴安县| 大同县|