標(biāo)題: Titlebook: Innovations in Bio-Inspired Computing and Applications; Proceedings of the 6 Václav Sná?el,Ajit Abraham,Azah Kamilah Muda Conference procee [打印本頁(yè)] 作者: T-Lymphocyte 時(shí)間: 2025-3-21 19:52
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications影響因子(影響力)
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications影響因子(影響力)學(xué)科排名
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications被引頻次
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications被引頻次學(xué)科排名
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications年度引用
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications年度引用學(xué)科排名
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications讀者反饋
書(shū)目名稱Innovations in Bio-Inspired Computing and Applications讀者反饋學(xué)科排名
作者: 夸張 時(shí)間: 2025-3-21 21:11
D. Manoj Ray,Philip Samuelll find innovative control methodologies for relevant applications, from both theory and numerical analysis perspectives..978-3-319-34685-4978-3-319-01695-5Series ISSN 2197-117X Series E-ISSN 2197-1161 作者: 兩種語(yǔ)言 時(shí)間: 2025-3-22 01:51
M. A. Jabbar,B. L. Deekshatulu,Priti Chandrall find innovative control methodologies for relevant applications, from both theory and numerical analysis perspectives..978-3-319-34685-4978-3-319-01695-5Series ISSN 2197-117X Series E-ISSN 2197-1161 作者: 相符 時(shí)間: 2025-3-22 05:27
Murali Mohanan,Philip Samuelll find innovative control methodologies for relevant applications, from both theory and numerical analysis perspectives..978-3-319-34685-4978-3-319-01695-5Series ISSN 2197-117X Series E-ISSN 2197-1161 作者: SPURN 時(shí)間: 2025-3-22 12:19 作者: arousal 時(shí)間: 2025-3-22 13:28
P. Helen Chandra,S. M. Saroja Theerdus Kalavathy,A. Mary Imelda Jayaseeli,J. Philomenal Karoline作者: 夜晚 時(shí)間: 2025-3-22 19:06 作者: GRAIN 時(shí)間: 2025-3-22 23:56 作者: 全神貫注于 時(shí)間: 2025-3-23 04:44
Vojtěch Uher,Petr Gajdo?,Tomá? Je?owicz,Václav Sná?el作者: 獨(dú)輪車(chē) 時(shí)間: 2025-3-23 07:33
2194-5357 inuously demonstrating exceptional strength in solving complex real lifeproblems. The Volume will be a valuable reference to researchers, students andpractitioners in the computational intelligence field...978-3-319-28030-1978-3-319-28031-8Series ISSN 2194-5357 Series E-ISSN 2194-5365 作者: MUT 時(shí)間: 2025-3-23 10:33
N. Sandhya,Philip Samuelfuture behavior. Thirty mathematicians attended the conference coming from Germany, West- and Eastern Europe and the United States- more than twenty of them presented a research talk. The lectures about Delay Equations were mainly oriented on the following subjects: single-step, multi-step and splin作者: Meager 時(shí)間: 2025-3-23 16:37
S. Sreelakshmi,K. G. Preethaddition to expounding such a great deal of information, they have delivered it with utmost clarity. To further the reader‘s understanding many key concepts are illustrated by simple examples. The basic ideas of delay testing have reached a level of maturity that makes them suitable for practice. In 作者: 得意人 時(shí)間: 2025-3-23 21:18 作者: 安慰 時(shí)間: 2025-3-24 01:29 作者: 新手 時(shí)間: 2025-3-24 03:06 作者: 誘惑 時(shí)間: 2025-3-24 09:03 作者: 令人作嘔 時(shí)間: 2025-3-24 12:35 作者: 輪流 時(shí)間: 2025-3-24 16:01 作者: Crumple 時(shí)間: 2025-3-24 22:51
A Novel Approach for Malicious Node Detection in MANET,ion and Broadcast phase. The detection mode finds out the malicious nodes in the network and determines the truthfulness of the misbehaviour report generated and the broadcast mode distributes the information about malicious nodes throughout the network.作者: malapropism 時(shí)間: 2025-3-25 00:31
Locality Aware MapReduce,al data when a free slot is available. Non-local data is always given a second preference. Since the scheduling is done based on locality it is called Locality Aware Scheduling. Each of these methods, when executed separately and combined showed a better performance than the one without any modifica作者: rectocele 時(shí)間: 2025-3-25 06:34
Innovations in Bio-Inspired Computing and ApplicationsProceedings of the 6作者: 拋媚眼 時(shí)間: 2025-3-25 07:45
Multiset Genetic Algorithm Approach to Grid Resource Allocation,of each grid user job is met. A proposal of resource selection method that is based on the concept of Genetic Algorithm, using populations based on Multisets is presented. For the proposed resource allocation method, an additional mechanism (populations based on multiset) is introduced into the gene作者: Osmosis 時(shí)間: 2025-3-25 13:24 作者: 自然環(huán)境 時(shí)間: 2025-3-25 17:17
HAWK EYE: Intelligent Analysis of Socio Inspired Cohorts for Plagiarism,ecause of growing development of internet especially socio media and thereby increasing opportunity among students to copy and paste the electronic content. Students in today’s digital era follow the trend of exchange and copying of information in order to maintain their socio integrity among their 作者: Orthodontics 時(shí)間: 2025-3-25 20:05
Mechanism of Fuzzy , on Chemical Reaction,mechanism of Artificial Cell System with hierarchically structurable membrane on chemical reaction is developed with fuzzy multiset evolution rules and fuzzy data. Significance of a parameter on the Fuzzy Artificial Cell System which describes the behaviour of the membrane structure is studied.作者: 鎮(zhèn)壓 時(shí)間: 2025-3-26 02:14
The Power of Hybridity and Context Free in , System,ribed teams and context-free puzzle grammar rules in generating characters. Various non-context free sets of arrays that can be generated in a simple way by hybrid context-free puzzle grammar system with prescribed teams working in different modes are presented in [.]. We show the power of the mecha作者: apiary 時(shí)間: 2025-3-26 05:44
Enhanced Bee Colony Algorithm for Efficient Load Balancing and Scheduling in Cloud,alancing are major challenges in adopting cloud computation. Efficient load balancing methods avoids under loaded and heavy loaded conditions in datacenters. When some VMs are overloaded with several number of tasks, these tasks are migrated to the under loaded VMs of the same datacenter in order to作者: Accord 時(shí)間: 2025-3-26 12:22
Robust Optimized Artificial Neural Network Based PEM Fuelcell Voltage Tracking, controller design and a Neural Network (NN) feed forward controller with an optimization technique called Harmony Search algorithm is considered to control the output voltage. This paper compares the results of the proposed controller with the NN feed forward controller. The comparison shows the pr作者: ESPY 時(shí)間: 2025-3-26 12:57
Gravitational Search Algorithm to Solve Open Vehicle Routing Problem,roposed approach in OVRP is decreasing the vehicle numbers time and path traveled by vehicles. Therefore, in the present paper, a new optimization algorithm based on Gravity law and mass interactions is introduced to solve the problem. This algorithm being proposed based on random search concepts ut作者: eucalyptus 時(shí)間: 2025-3-26 18:43 作者: Stress-Fracture 時(shí)間: 2025-3-26 22:02 作者: 賭博 時(shí)間: 2025-3-27 03:45
Data Centric Text Processing Using MapReduce,del is a parallel data processing approach for execution on computer clusters. This model provides an abstraction to design scalable computing algorithm for big data processing. For batch processing types of data processing, MapReduce model provides faster computation. The key/value pair generation 作者: 拉開(kāi)這車(chē)床 時(shí)間: 2025-3-27 06:34 作者: 吊胃口 時(shí)間: 2025-3-27 13:12
Ensemble of Flexible Neural Trees for Predicting Risk in Grid Computing Environment,mains. Therefore, by assessing risk in grid computing, we can analyze possible risks for the growing consumption of computational resources of an organization and thus we can improve the organization’s computation effectiveness. In this paper, we used a function approximation tool, namely, flexible 作者: Indent 時(shí)間: 2025-3-27 16:19
A Novel Approach for Malicious Node Detection in MANET,ET has limited battery power, memory, bandwidth, etc. In order to save these resources some nodes stop cooperating in the routing function. These nodes, known as malicious nodes refuse to forward data packets or drop them, thereby degrading the performance of the network. To detect such nodes, an In作者: THROB 時(shí)間: 2025-3-27 19:43
Improving the Productivity in Global Software Development, various challenges in distributing the project. As a consequence of the dispersed nature of global software development projects, communication, coordination, and control become more difficult which adversely influence effort estimation of the software development. The major ingredients that impact作者: BET 時(shí)間: 2025-3-27 21:55
Prediction of Heart Disease Using Random Forest and Feature Subset Selection,f disease is the challenging task. Data mining can be can be used to automatically infer diagnostic rules and help specialists to make diagnosis process more reliable. Several data mining techniques are used by researchers to help health care professionals to predict the heart disease. Random forest作者: JAUNT 時(shí)間: 2025-3-28 03:13 作者: 過(guò)時(shí) 時(shí)間: 2025-3-28 08:45 作者: delta-waves 時(shí)間: 2025-3-28 10:40
Locality Aware MapReduce,and MapReduce are the two core components of Apache Hadoop. The overall performance can be increased by improving the performance of MapReduce. A Locality Aware MapReduce idea is introduced here. It includes an input splitting strategy and also a MapReduce scheduling algorithm. Both of them are base作者: 權(quán)宜之計(jì) 時(shí)間: 2025-3-28 16:51
N. Sandhya,Philip Samueleory of Delay Eauations and Approximation Theory with the emphasis on constructive methods and applications. Although the separate character of both domains is reflected by their historical development, the latest research shows that the numerical treatment of Delay Equations leads to various appro-作者: 水汽 時(shí)間: 2025-3-28 19:59
S. Sreelakshmi,K. G. Preethaciently, the circuit would function correctly. With improvements in the semiconductor process technology, our expectations on speed have soared. A frequently asked question in the last decade has been how fast can the clock run. This puts significant demands on timing analysis and delay testing. Fue作者: 松果 時(shí)間: 2025-3-29 00:09
Sara Abdelwahab,Varun Kumar Ojha,Ajith Abrahamin designs in which performance specifications can be violated by very small defects. Studies show that high stuck-at fault coverage is not sufficient to guarantee detection of these timing failures. The use of traditional fault models and testing strategies becomes even more inadequate as the curre作者: insurrection 時(shí)間: 2025-3-29 03:32
K. P. Anjana,K. G. Preetha Research in Delay Systems.Written by experts in the field.This volume is the first of the new series .Advances in Dynamics and Delays.. It offers the latest advances in the research of analyzing and controlling dynamical systems with delays, which arise in many real-world problems. The contribution作者: MIME 時(shí)間: 2025-3-29 10:38 作者: Vertical 時(shí)間: 2025-3-29 14:37 作者: 混合,攙雜 時(shí)間: 2025-3-29 16:58 作者: folliculitis 時(shí)間: 2025-3-29 23:13
Reema Rhine,Nikhila T. Bhuvanapproach is made accessible to non-specialists by comparing mathematical predictions and experimental observations. For example, the observation that a longer pole is easier to balance on a fingertip than a shorter one demonstrates the essential role played by a time delay in the balance control mec作者: 根除 時(shí)間: 2025-3-30 03:47
Gravitational Search Algorithm to Solve Open Vehicle Routing Problem,ilizes two of the four major parameters in physics including speed and Gravity and its researcher agents are a set of masses which are in connection with each other based on Newton’s Gravity and motion laws. The proposed approach is compared with various algorithms and results approve its high effectiveness in solving the above problem.作者: 滴注 時(shí)間: 2025-3-30 05:31
Request Reply Detection Mechanism for Malicious MANETs,delay, etc. and packet transmission adversely. This paper presents an acknowledgement based routing scheme that detects selfish nodes. The observations shows that the system behaves well when compared with the most commonly used routing protocol AODV in terms of packet drops, throughput, PDR and normalized routing overhead.作者: Melodrama 時(shí)間: 2025-3-30 10:11 作者: LUDE 時(shí)間: 2025-3-30 13:21 作者: 護(hù)航艦 時(shí)間: 2025-3-30 17:32
Conference proceedings 2016which washeld in Kochi, India during December 16-18, 2015. The 51 papers presented inthis Volume were carefully reviewed and selected. The 6th InternationalConference IBICA 2015 has been organized to discuss the state-of-the-art aswell as to address various issues in the growing research field of Bi作者: Osteons 時(shí)間: 2025-3-30 23:06
The Power of Hybridity and Context Free in , System,way by hybrid context-free puzzle grammar system with prescribed teams working in different modes are presented in [.]. We show the power of the mechanism of hybridity for picture description on P system.作者: SENT 時(shí)間: 2025-3-31 02:16 作者: Antecedent 時(shí)間: 2025-3-31 05:54 作者: Genome 時(shí)間: 2025-3-31 09:58 作者: COM 時(shí)間: 2025-3-31 14:26 作者: farewell 時(shí)間: 2025-3-31 20:01
PIRIDS: A Model on Intrusion Response System Based on Biologically Inspired Response Mechanism in Ped from the functioning of defense and response mechanism in plants such Systemic Acquired Resistance (SAR). The proposed model is the first attempt of its kind with the objective to develop an efficient response mechanism in a network subsequent to the failure of IDS, adopting plants as a source of inspiration.作者: 極端的正確性 時(shí)間: 2025-3-31 21:49
Ensemble of Flexible Neural Trees for Predicting Risk in Grid Computing Environment,ture was evolved like a tree. Our comprehensive experiment finds score for each risk factor in grid computing together with a general tree-based model for predicting risk. We used an ensemble of prediction models to achieve generalization.作者: Buttress 時(shí)間: 2025-4-1 02:53 作者: 領(lǐng)先 時(shí)間: 2025-4-1 09:45
Software Requirement Elicitation Using Natural Language Processing,ification of object oriented elements like classes, objects, attributes, relationships etc. After obtaining the required and relative information, Semantic Business Vocabulary and Rules (SBVR) are applied to identify and to extract the object oriented elements from the requirement specification.