標題: Titlebook: Artificial Intelligence and Evolutionary Computations in Engineering Systems; Proceedings of ICAIE Subhransu Sekhar Dash,Paruchuri Chandra [打印本頁] 作者: 投射技術(shù) 時間: 2025-3-21 19:30
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems影響因子(影響力)
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems影響因子(影響力)學(xué)科排名
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems網(wǎng)絡(luò)公開度
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems被引頻次
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems被引頻次學(xué)科排名
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems年度引用
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems年度引用學(xué)科排名
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems讀者反饋
書目名稱Artificial Intelligence and Evolutionary Computations in Engineering Systems讀者反饋學(xué)科排名
作者: 情節(jié)劇 時間: 2025-3-21 23:48
Unifying Concepts for Planar Motion,include the required faults to detect and locate the fault. Matlab was used to perform the experiments. Results show that MLP achieved high prediction accuracy for fault type detection of 98% and a prediction accuracy of 78% for fault location.作者: 改正 時間: 2025-3-22 02:53 作者: 蒼白 時間: 2025-3-22 04:38 作者: 業(yè)余愛好者 時間: 2025-3-22 11:20
Introduction to Site Investigation boundary value problem in the inner loop of the Leapfrog algorithm. It can be observed that with this modification there is an improvement in the convergence rate of the Leapfrog algorithm in general.作者: Antagonism 時間: 2025-3-22 15:46
https://doi.org/10.1007/978-3-662-68762-8re error. The description of scene is estimated with the above factors. The proposed work concentrates on enhancement of above factors with DWT maximum rule combining with DCT-FP fusion. The DWT maximum rule is considered for single image in this work.作者: NADIR 時間: 2025-3-22 17:08 作者: disparage 時間: 2025-3-23 00:57
End User Development for?Extended Reality it is intended to discover the neighbors in the proximity and coordinate data acquisition at the controller. In any network, reliability is an important issue which deals with stability under mobility, low delay, more lifetime, optimal route, and other optimizations.作者: 歸功于 時間: 2025-3-23 03:56 作者: 偽造者 時間: 2025-3-23 05:44 作者: 起草 時間: 2025-3-23 09:41 作者: 大雨 時間: 2025-3-23 14:06
Performance of MPPT in Photovoltaic Systems Using GA-ANN Optimization Scheme,aximizes the performance of GA-ANN scheme, and compared with ANN scheme, efficiency of PV module is shown as well as the saving power for both schemes. The results show that GA-ANN has performance about 45% over ANN scheme.作者: Arthr- 時間: 2025-3-23 18:49 作者: 容易懂得 時間: 2025-3-23 23:50 作者: VOC 時間: 2025-3-24 02:47 作者: 我悲傷 時間: 2025-3-24 07:41 作者: PIZZA 時間: 2025-3-24 12:15
,Lifetime Enhancement of a Node Using I—Leach Protocol in WSN,his paper proposes improved leach (I—leach) protocol which increases network lifetime, and it will improve the quality of QoS. The experimental results show that the proposed technique is giving better results in terms of energy consumption than existing techniques.作者: 地名詞典 時間: 2025-3-24 17:27
Optimal Active Node Selection, Neighborhood Discovery, and Reliability in Wireless Sensor Networks, it is intended to discover the neighbors in the proximity and coordinate data acquisition at the controller. In any network, reliability is an important issue which deals with stability under mobility, low delay, more lifetime, optimal route, and other optimizations.作者: Stricture 時間: 2025-3-24 19:21
Conference proceedings 2018tionary Computations in Engineering Systems (ICAIECES 2017). The book discusses wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry have presented their original work and ideas, information, techniques and application作者: 無底 時間: 2025-3-25 00:45 作者: Liability 時間: 2025-3-25 06:01
https://doi.org/10.1007/978-3-031-60920-6ue and as a PV series-connected system that uses ANFIS-MPPT technique. The proposed PV systems were tested under uniform and partial shading weather conditions. The results show that MPPT could be tracked accurately with the ANFIS-DMPPT for both cases of uniform irradiance and partial shaded irradiance conditions.作者: Slit-Lamp 時間: 2025-3-25 08:34 作者: ABOUT 時間: 2025-3-25 12:37 作者: conceal 時間: 2025-3-25 18:39
Vladimir Matveev,Violetta Shaninality to include preferences for different aspects of items using weighted trees and user ratings as well. This paper addresses the challenge of using recursive weighted tree similarity in hybrid recommendation system. We established theoretical and experimental evaluation among a few example trees using our proposed recommendation systems.作者: 追蹤 時間: 2025-3-25 23:29 作者: 連系 時間: 2025-3-26 03:56
Impact of Poor Data Quality in Remotely Sensed Data,lts suggest .-nearest neighbour as a superior approach to handling missing data, especially when regression imputation is used. Most classifiers achieve lower accuracy when listwise deletion is used. Nonetheless, RF is much less robust to missing data compared to other classifiers such as ANN and SVM.作者: 易于交談 時間: 2025-3-26 06:36
Self Regulating Power Saving System for Home Automation,om temperature with LM-35 sensor. By using ACS712 Current Sense Module, we control the current flow. And also we can control the appliances through mobile when the user is not at home. All the data can be stored in cloud for future reference.作者: insurrection 時間: 2025-3-26 08:35
Recommendation System Based on Generalized-Weighted Tree Similarity Algorithm,lity to include preferences for different aspects of items using weighted trees and user ratings as well. This paper addresses the challenge of using recursive weighted tree similarity in hybrid recommendation system. We established theoretical and experimental evaluation among a few example trees using our proposed recommendation systems.作者: FILLY 時間: 2025-3-26 12:53 作者: 大火 時間: 2025-3-26 20:39 作者: FATAL 時間: 2025-3-26 22:33
Distributive MPPT Approach Using ANFIS and Perturb&Observe Techniques Under Uniform and Partial Shas. This paper presents a reconfigurable interconnections approach that uses and compares between two powerful maximum power point tracking (MPPT) techniques of artificial neuro-fuzzy inference system [ANFIS front-end distributive MPPT (DMPPT)] technique and Perturb&Observe distributive MPPT techniqu作者: 摸索 時間: 2025-3-27 02:13 作者: 組裝 時間: 2025-3-27 09:21
The Use of Multilayer Perceptron to Classify and Locate Power Transmission Line Faults,twice in this paper to locate and to detect faults. The experiments were conducted on a 600-km-length, three-phase power transmission line data which include the required faults to detect and locate the fault. Matlab was used to perform the experiments. Results show that MLP achieved high prediction作者: ESO 時間: 2025-3-27 10:57
Generation of 3D Realistic Synthetic Image Datasets for Spot Detection Evaluation,tomated spot detection methods requires ground-truth data. Here, a simple framework is proposed for generating 3D fluorescence microscopy images with real background and synthetic spots, forming realistic, synthetic images with ground-truth information. Similarity between synthetic and real images w作者: Pert敏捷 時間: 2025-3-27 16:47
,Modified Newton’s Method in the Leapfrog Method for Mobile Robot Path Planning,is used to solve the ensuing system of equations derived from the first-order optimality conditions of the Pontryagin’s Minimum Principle. A comparison is made between a case in which the classical Newton Method and the Modified Newton Method are used in the shooting method for solving the two-point作者: bioavailability 時間: 2025-3-27 19:50 作者: 高貴領(lǐng)導(dǎo) 時間: 2025-3-27 23:22
Image Enrichment Using Single Discrete Wavelet Transform Multi-resolution and Frequency Partition,ne further which is useful for human and machine perception. The main problem in image fusion is that how to determine the best procedure to combine multiple images. There are so many classical techniques available to perform the above. The main factors of image fusion are entropy and root mean squa作者: definition 時間: 2025-3-28 03:30 作者: definition 時間: 2025-3-28 07:55
,Lifetime Enhancement of a Node Using I—Leach Protocol in WSN,works known as wireless sensor networks. The various demanding situations the maximum studied in WSN are the energy intake and the life of the nodes. An excellent node placement deploying is one of the issues which may be exploited to reap the maximum most effective layout for saving the strength. T作者: Instrumental 時間: 2025-3-28 13:42
Self Regulating Power Saving System for Home Automation,eads to power consumption. By using smart automatic controlling system, we can save some amount of power. In this paper, we are preventing the consumption of energy in an adequate and cost-effective manner. We proposed a system for automatic control of appliances as well as power reduction module. W作者: 客觀 時間: 2025-3-28 18:39
An Optimal Rule Set Generation Algorithm for Uncertain Data,athematical approach for dealing with uncertainties. This paper proposes an RST-based optimal rule set generation (ORSG) algorithm for generating the optimal set of rules from uncertain data. At first, the ORSG approach applies the concepts of RST for identifying inconsistencies and then from the pr作者: 燒瓶 時間: 2025-3-28 18:53 作者: 損壞 時間: 2025-3-29 02:23 作者: Collision 時間: 2025-3-29 05:34
Product Recommendation System Using Priority Ranking,en made to enhance proposal precision. Recommender frameworks are fundamentally utilized as a part of e-business frameworks. In any case, it has been progressively noticed that it is not adequate to have exactness as the sole criteria in measuring suggestion quality and consider other vital measurem作者: 充氣球 時間: 2025-3-29 10:54
Managing and Control of Data Transmission in a High Mobility-based Wireless Networks,n is an art in such networks. A new protocol for data transmission in high mobility context deals with formulating a new dynamic topology and reconstructing a data path from source node to the destination node without packet loss. The new packets are redirected through the discovered topology which 作者: 郊外 時間: 2025-3-29 12:16
,Optimization Technique for Flowshop?Scheduling Problem,tilization with the help of optimization techniques. Flowshop is used for allocation of resources among the tasks to complete their scheduling process with optimization technique to get a feasible solution. This paper illustrates a proposed method with example and compared with traditional algorithm作者: mucous-membrane 時間: 2025-3-29 17:58
Optimal Active Node Selection, Neighborhood Discovery, and Reliability in Wireless Sensor Networks,mly and in a widespread manner. These sensors transmit data to the controller at periodic intervals. The number and nature of sensors vary randomly and it is intended to detect the active sensor node selection, which neglects the idle nodes from active nodes. In WSN which is a random widespread one,作者: 四目在模仿 時間: 2025-3-29 21:08 作者: Comprise 時間: 2025-3-30 00:41
Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/b/image/162203.jpg作者: JIBE 時間: 2025-3-30 05:04
,Optimization Technique for Flowshop?Scheduling Problem,tilization with the help of optimization techniques. Flowshop is used for allocation of resources among the tasks to complete their scheduling process with optimization technique to get a feasible solution. This paper illustrates a proposed method with example and compared with traditional algorithms.作者: correspondent 時間: 2025-3-30 09:44 作者: Reservation 時間: 2025-3-30 14:13 作者: Pelvic-Floor 時間: 2025-3-30 16:58
Hussain Otudi,Shelly Gupta,Zoran Obradovic. SDN uses OpenFlow protocol in the control plane to achieve a more flexible operation, monitoring and networking management system. Although SDN offers various advantages over a traditional network, one of the challenges facing the use of this technology is the limited amount of knowledge on implem作者: narcissism 時間: 2025-3-30 23:06 作者: 壓迫 時間: 2025-3-31 02:01
https://doi.org/10.1007/978-3-031-60920-6s. This paper presents a reconfigurable interconnections approach that uses and compares between two powerful maximum power point tracking (MPPT) techniques of artificial neuro-fuzzy inference system [ANFIS front-end distributive MPPT (DMPPT)] technique and Perturb&Observe distributive MPPT techniqu作者: 文件夾 時間: 2025-3-31 07:50
https://doi.org/10.1007/978-3-031-56376-8environmental problems, such as dynamic weather conditions. The control of maximum power point tracking (MPPT) meteorological conditions is an essential portion of improving solar power systems. In this paper, we introduce an elastic controller depend on artificial neural network for regulating the 作者: Commonplace 時間: 2025-3-31 12:46 作者: 向下五度才偏 時間: 2025-3-31 16:51
https://doi.org/10.1007/978-3-031-56844-2tomated spot detection methods requires ground-truth data. Here, a simple framework is proposed for generating 3D fluorescence microscopy images with real background and synthetic spots, forming realistic, synthetic images with ground-truth information. Similarity between synthetic and real images w作者: glowing 時間: 2025-3-31 19:50
Introduction to Site Investigationis used to solve the ensuing system of equations derived from the first-order optimality conditions of the Pontryagin’s Minimum Principle. A comparison is made between a case in which the classical Newton Method and the Modified Newton Method are used in the shooting method for solving the two-point作者: bonnet 時間: 2025-3-31 23:54 作者: Exonerate 時間: 2025-4-1 05:20
https://doi.org/10.1007/978-3-662-68762-8ne further which is useful for human and machine perception. The main problem in image fusion is that how to determine the best procedure to combine multiple images. There are so many classical techniques available to perform the above. The main factors of image fusion are entropy and root mean squa作者: 否決 時間: 2025-4-1 09:38
Introduction to Site Investigationces in order to deny that services to potential users. The attack situation is to flood the packets hugely to the target system. If the attack is from a single source, then the attack is called as denial of service (DoS) and if attack is from divergent servers, then it is called as DDoS. Over a deca作者: Intellectual 時間: 2025-4-1 14:13