標(biāo)題: Titlebook: Surrogate-Based Modeling and Optimization; Applications in Engi Slawomir Koziel,Leifur Leifsson Book 2013 Springer Science+Business Media N [打印本頁(yè)] 作者: 涌出 時(shí)間: 2025-3-21 19:13
書目名稱Surrogate-Based Modeling and Optimization影響因子(影響力)
書目名稱Surrogate-Based Modeling and Optimization影響因子(影響力)學(xué)科排名
書目名稱Surrogate-Based Modeling and Optimization網(wǎng)絡(luò)公開度
書目名稱Surrogate-Based Modeling and Optimization網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Surrogate-Based Modeling and Optimization被引頻次
書目名稱Surrogate-Based Modeling and Optimization被引頻次學(xué)科排名
書目名稱Surrogate-Based Modeling and Optimization年度引用
書目名稱Surrogate-Based Modeling and Optimization年度引用學(xué)科排名
書目名稱Surrogate-Based Modeling and Optimization讀者反饋
書目名稱Surrogate-Based Modeling and Optimization讀者反饋學(xué)科排名
作者: 無(wú)能的人 時(shí)間: 2025-3-21 21:27
http://image.papertrans.cn/t/image/882644.jpg作者: Magnitude 時(shí)間: 2025-3-22 01:31 作者: Dedication 時(shí)間: 2025-3-22 07:33 作者: 明智的人 時(shí)間: 2025-3-22 10:31
Aerodynamic Shape Optimization by Space Mapping,en applied in aerospace engineering. This chapter describes recent advances in aerodynamic design and optimization using SM. In particular, a detailed formulation of the optimization methodology is provided, as well as several applications involving the design of transonic airfoils and wings.作者: FOVEA 時(shí)間: 2025-3-22 15:27
based modeling and optimization paradigm and then?discusses relevant modeling techniques, optimization algorithms and design procedures, as well as state-of-the-art developments. The chapters are self-contained978-1-4939-5472-8978-1-4614-7551-4作者: 慷慨援助 時(shí)間: 2025-3-22 20:44 作者: 威脅你 時(shí)間: 2025-3-22 22:29 作者: 膽大 時(shí)間: 2025-3-23 04:25
Abdel-Karim S. O. Hassan,Ahmed S. A. Mohamed their identity certificates must be delivered through a trusted channel during authentication. If these certificates are considered evidence, their deniability will be broken. To address these problems, we propose a solution that leverages ephemeral keys to hide the identity keys for enhancing anon作者: Cerumen 時(shí)間: 2025-3-23 09:27 作者: Intercept 時(shí)間: 2025-3-23 12:48
Ana Rodríguez,Jordi Selga,Ferran Martín,Vicente E. Boriancluding ., and select three common alert aggregation algorithms to perform a comparative test in a simulated real-time situation. The experiment shows that our approach achieves more than 98% aggregation rate, reduces data complexity by more than 82%, and has stronger robustness.作者: fleeting 時(shí)間: 2025-3-23 17:00 作者: Inordinate 時(shí)間: 2025-3-23 21:06 作者: Debate 時(shí)間: 2025-3-23 23:17
José Ernesto Rayas-Sánchezard BFT consensus mainly consists of a two-phase consensus mechanism after performing network sharding. In the first phase, Raft consensus is first adopted within each shard, in which a leader is elected. In the second phase, those leaders from all shards form a committee and perform a committee-wis作者: 支形吊燈 時(shí)間: 2025-3-24 04:47 作者: braggadocio 時(shí)間: 2025-3-24 10:28
Sara Grundel,Nils Hornung,Bernhard Klaassen,Peter Benner,Tanja Cleesage mainly analyzes five kinds of DNS tunnel behaviors and classifies them with machine learning methods. Finally, more than 50 millions normal DNS sessions traffic is collected from the real network environment, and tunnel traffic is produced by DNS covert tunnel tools. Through experiments, using t作者: BLAND 時(shí)間: 2025-3-24 12:25 作者: 顯示 時(shí)間: 2025-3-24 18:33
Yi Zhang,Serhat Hosderintroduce three new measures based on the effective spreading rate to evaluate the robustness. Then, we further study the relation between network topology and the three measures. Our results are helpful in designing robust communication networks according to the new robustness measures.作者: Indelible 時(shí)間: 2025-3-24 20:37 作者: 變化 時(shí)間: 2025-3-25 00:46 作者: 易于出錯(cuò) 時(shí)間: 2025-3-25 06:46 作者: Debrief 時(shí)間: 2025-3-25 11:03 作者: assail 時(shí)間: 2025-3-25 12:04 作者: 虛度 時(shí)間: 2025-3-25 18:33 作者: 下船 時(shí)間: 2025-3-25 21:34 作者: GNAT 時(shí)間: 2025-3-26 02:06 作者: hazard 時(shí)間: 2025-3-26 07:19 作者: 材料等 時(shí)間: 2025-3-26 08:46 作者: 過(guò)份 時(shí)間: 2025-3-26 13:33 作者: Intervention 時(shí)間: 2025-3-26 17:45 作者: cutlery 時(shí)間: 2025-3-26 20:57 作者: 我怕被刺穿 時(shí)間: 2025-3-27 05:06
Book 2013gn problems. It begins by?presenting?the basic concepts and formulations of the surrogate-based modeling and optimization paradigm and then?discusses relevant modeling techniques, optimization algorithms and design procedures, as well as state-of-the-art developments. The chapters are self-contained作者: 和諧 時(shí)間: 2025-3-27 08:12 作者: periodontitis 時(shí)間: 2025-3-27 09:54 作者: Range-Of-Motion 時(shí)間: 2025-3-27 14:57 作者: Infelicity 時(shí)間: 2025-3-27 20:23
Slawomir Koziel,Stanislav Ogurtsov,Leifur Leifssonrom the latest steganalyzers using convolutional neural networks such as SRNet and Zhu-Net. To address this issue, this paper proposes a novel method for enhancing the security of image steganography using multiple adversarial networks and channel attention modules. The proposed method employs gener作者: 英寸 時(shí)間: 2025-3-27 22:26
Ana Rodríguez,Jordi Selga,Ferran Martín,Vicente E. Boria, IPS, firewalls, probes, and third-party systems in real-time. It is urgent to aggregate these multi-source, massive, real-time, heterogeneous, dynamic, strong timeliness alerts to help analysts find valuable clues as quickly as possible. In this paper, we propose a novel real-time alert aggregatio作者: 袖章 時(shí)間: 2025-3-28 04:07
Murat Simsek,Neslihan Serap Sengoridders can buy the goods at the .st bidding price. In previous research, a trusted manager is commonly used to decide the .st bidding price from these sealed ones and the top . bidders. In addition, there’s an upper bound to the bidding price. We construct a scheme that removes all trusted parties s作者: 職業(yè)拳擊手 時(shí)間: 2025-3-28 08:51 作者: 附錄 時(shí)間: 2025-3-28 10:33
José Ernesto Rayas-Sánchezl Byzantine Fault Tolerance (PBFT) has been widely believed as a good candidate consensus due to its many advantages. However, PBFT is not particularly designed for a consortium blockchain. Thus, there is still a large improvement space to implement the PBFT algorithm in a sharded blockchain. Based 作者: 發(fā)現(xiàn) 時(shí)間: 2025-3-28 16:51
Ting Zhu,Mustafa Berke Yelten,Michael B. Steer,Paul D. Franzonotocol, and a large number of malwares use DNS protocol as the covert tunnel for remote control. Therefore, it is very important to enhance the detection of DNS covert tunnel. At present, the researches always select closed data set to detect different tunnel tools and can not distinguish the specif作者: Humble 時(shí)間: 2025-3-28 20:50 作者: 聯(lián)想記憶 時(shí)間: 2025-3-29 01:57
Leifur Leifsson,Slawomir Koziel,Eirikur Jonsson,Stanislav Ogurtsovoyability on ubiquitous applications requiring a high level of security such as driverless system, unmanned aerial vehicle and intrusion detection. In this paper, we propose latent encodings transferring attack (LET-attack) to generate target natural adversarial examples to fool well-trained classif作者: accomplishment 時(shí)間: 2025-3-29 06:11
Yi Zhang,Serhat Hosderuate the network robustness, many robustness measures have been presented depending on the type of attacks. These measures mainly concentrate on the relation between the robustness of the network and the number of deleted nodes, and seldom consider the robustness of the network in the scenarios that作者: 性行為放縱者 時(shí)間: 2025-3-29 08:05 作者: 背信 時(shí)間: 2025-3-29 11:53 作者: 館長(zhǎng) 時(shí)間: 2025-3-29 16:58 作者: 不可磨滅 時(shí)間: 2025-3-29 22:03 作者: 步兵 時(shí)間: 2025-3-30 03:33 作者: 言外之意 時(shí)間: 2025-3-30 06:54 作者: fiscal 時(shí)間: 2025-3-30 11:53
The Efficiency of Difference Mapping in Space Mapping-Based Optimization,o difference mapping techniques will be given, and the improvement provided by these techniques will be discussed. Furthermore, to expose the efficiency of using the difference in input and output, simulation results obtained for high-dimensional applications will be given.作者: 集合 時(shí)間: 2025-3-30 16:26 作者: 失誤 時(shí)間: 2025-3-30 19:00 作者: 死亡率 時(shí)間: 2025-3-30 23:32 作者: handle 時(shí)間: 2025-3-31 04:54 作者: 哭得清醒了 時(shí)間: 2025-3-31 07:08
Book 2013on but, even more importantly, to adjust parameters of the system to have it meet given performance requirements. Unfortunately, accurate simulations are often computationally very expensive with evaluation times as long as hours or even days per design, making design automation using conventional m作者: Overstate 時(shí)間: 2025-3-31 12:34 作者: Aesthete 時(shí)間: 2025-3-31 13:44 作者: 作嘔 時(shí)間: 2025-3-31 17:41
Simulation-Driven Antenna Design Using Surrogate-Based Optimization,antenna design strongly relies on these EM simulations. On the other hand, direct use of high-fidelity EM simulations in the design process, particularly for automated parameter optimization, often results in prohibitive computational costs. In this chapter, we illustrate how the designs of various 作者: dry-eye 時(shí)間: 2025-4-1 00:07
Practical Application of Space Mapping Techniques to the Synthesis of CSRR-Based Artificial Transmicess of this type of artificial line is typically a complex task, due to the number of design parameters involved and their mutual dependence. Space mapping techniques are revealed to be very useful for automating the synthesis procedure of these kinds of structures. In this chapter, a review of the作者: Daily-Value 時(shí)間: 2025-4-1 03:27
The Efficiency of Difference Mapping in Space Mapping-Based Optimization,l effort. In this work, techniques using the difference mapping concept will be introduced. These techniques are efficient in reducing the computational effort while improving convergence. Difference mapping is constructed similarly to the mechanism used in space mapping, but, unlike space mapping, 作者: 假裝是我 時(shí)間: 2025-4-1 06:24 作者: Serenity 時(shí)間: 2025-4-1 13:32
Artificial Neural Networks and Space Mapping for EM-Based Modeling and Design of Microwave CircuitsANNs) and space mapping (SM). A?brief introduction to ANNs is first presented, starting from elementary concepts associated to biological neurons. Electromagnetic (EM)-based modeling and design optimization of microwave circuits using ANNs is addressed. The conventional and most widely used neural n