標(biāo)題: Titlebook: Bio-inspired Computing: Theories and Applications; 9th International Co Linqiang Pan,Gheorghe P?un,Tao Song Conference proceedings 2014 Spr [打印本頁] 作者: 乳缽 時(shí)間: 2025-3-21 19:41
書目名稱Bio-inspired Computing: Theories and Applications影響因子(影響力)
書目名稱Bio-inspired Computing: Theories and Applications影響因子(影響力)學(xué)科排名
書目名稱Bio-inspired Computing: Theories and Applications網(wǎng)絡(luò)公開度
書目名稱Bio-inspired Computing: Theories and Applications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Bio-inspired Computing: Theories and Applications被引頻次
書目名稱Bio-inspired Computing: Theories and Applications被引頻次學(xué)科排名
書目名稱Bio-inspired Computing: Theories and Applications年度引用
書目名稱Bio-inspired Computing: Theories and Applications年度引用學(xué)科排名
書目名稱Bio-inspired Computing: Theories and Applications讀者反饋
書目名稱Bio-inspired Computing: Theories and Applications讀者反饋學(xué)科排名
作者: 廣告 時(shí)間: 2025-3-21 20:14
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/186337.jpg作者: circumvent 時(shí)間: 2025-3-22 01:05
Bio-inspired Computing: Theories and Applications978-3-662-45049-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 明確 時(shí)間: 2025-3-22 07:02 作者: 發(fā)酵劑 時(shí)間: 2025-3-22 10:02
https://doi.org/10.1007/978-3-476-02857-0gital encoding, complementary rules and biotechnological methods in this scheme. The experimental result showed that the scheme is feasible and the security analysis indicated that the scheme has a strong confidentiality.作者: violate 時(shí)間: 2025-3-22 16:01
Jahrbuch der Jean- Paul- Gesellschaftthe convergence under . of L-M method. We will show that if ?∥?.(..)?∥ provides a local error bound, which is weaker than the condition of nonsingularity for the system of nonlinear equations, the sequence generated by the L-M method converges to the point of the solution set quadratically. As well, numerical experiments are reported.作者: cortisol 時(shí)間: 2025-3-22 17:31
Die narrative Instanz des Humoristen in ,In this paper, the nonlinear matrix equation . = . is discussed. We propose the Newton iteration method for obtaining the Hermite positive definite solution of this equation. And a numerical example is given to identify the efficiency of the results obtained.作者: refine 時(shí)間: 2025-3-22 22:42 作者: 馬具 時(shí)間: 2025-3-23 04:00
https://doi.org/10.1007/978-3-662-45049-9DNA computing; evolutionary computing; genetic algorithm; membrane algorithms; molecular computing; molec作者: 好開玩笑 時(shí)間: 2025-3-23 06:01 作者: 伸展 時(shí)間: 2025-3-23 13:14 作者: 原諒 時(shí)間: 2025-3-23 17:38
Die Tiefwasserhafenregion Wilhelmshaven,tems to build a PLC control system model is proposed and implemented through the PLC programming application of a typical water level control system. Example shows that PLC programming process has been simplified and readability of the program has been enhanced after the introduction of SN P systems作者: Calculus 時(shí)間: 2025-3-23 19:18
Die Tiefwasserhafenregion Wilhelmshaven,, as well as some necessary conditions for nonsingular .??matrix, have been obtained. Inspired by these results, we partition the row and column index set of square matrix, construct a positive diagonal matrix according to the elements and row sum, column sum of the matrix as well, then obtain a set作者: watertight, 時(shí)間: 2025-3-24 01:26 作者: Deadpan 時(shí)間: 2025-3-24 05:32 作者: syncope 時(shí)間: 2025-3-24 09:57 作者: 商業(yè)上 時(shí)間: 2025-3-24 10:45 作者: 一加就噴出 時(shí)間: 2025-3-24 17:21
,Die Industrialisierung der Seeh?fen,on Based Service (LBS) applications, and LBS have little processing on the direction information. In this paper, a travel system based on GIS is presented, which has a relationship with the direction and attitude angle information, for more convenient communication in the crowd of the tourists. Peop作者: 異端邪說2 時(shí)間: 2025-3-24 21:45 作者: 初學(xué)者 時(shí)間: 2025-3-25 03:03
https://doi.org/10.1007/978-3-642-46194-1rs which can be used to identify depressive disorder with and without anxiety disorders. The aim of this study was to examine the diagnostic value of structural MRI to distinguish depressive patients with and without ss using support vector machine. In this paper, we applied voxel-based morphometry 作者: Ceremony 時(shí)間: 2025-3-25 04:57 作者: 暫時(shí)休息 時(shí)間: 2025-3-25 07:52 作者: 忘川河 時(shí)間: 2025-3-25 11:56
Bonavita Blank — Der fr?nkische Arcimboldo hiding and encryption can be realized based on DNA digital encoding and microdots steganographic techniques. Here we present a more secure encryption scheme utilizing DNA microdots. It is noteworthy that the scheme achieves double concealing, which combines the properties of traditional cryptograph作者: aesthetic 時(shí)間: 2025-3-25 18:59
Jahrbuch der Jean Paul Gesellschaft 2004], [3]. At present, research on algorithm of SAT has made significant progress [4], [5]. Among these algorithms, some are non polynomial even though they can obtain exact solution of SAT; and heuristic algorithm cannot obtain exact solution of SAT, even though it is polynomial. Therefore, it is esse作者: AWL 時(shí)間: 2025-3-25 22:21
Jean Paul unter dem Himmel der Astronomencategory information of the samples embedded into the low dimensional [1,2]. In this paper, we introduce a local linear maximum dispersion matrix algorithm (FSLLE), which integrated the sample category information. On this basis, the algorithm of locally linear embedding was improved and reexamined 作者: palliative-care 時(shí)間: 2025-3-26 01:03
Bonavita Blank — Der fr?nkische Arcimboldoaches generate non admissible rules. In this paper, we propose an efficient strategy called delete and decomposition strategy permits to avoid non admissible rules. If an item is appeared in the antecedent and the consequent parts of a given rule, this rule is composed on two admissible rules. Then,作者: 噴油井 時(shí)間: 2025-3-26 08:02 作者: CLAIM 時(shí)間: 2025-3-26 12:09
Jahrbuch der Jean- Paul- Gesellschaftthe convergence under . of L-M method. We will show that if ?∥?.(..)?∥ provides a local error bound, which is weaker than the condition of nonsingularity for the system of nonlinear equations, the sequence generated by the L-M method converges to the point of the solution set quadratically. As well,作者: Nuance 時(shí)間: 2025-3-26 15:58 作者: 陶瓷 時(shí)間: 2025-3-26 18:27 作者: 滑稽 時(shí)間: 2025-3-26 21:41
On the Convergence of Levenberg-Marquardt Method for Solving Nonlinear Systems,the convergence under . of L-M method. We will show that if ?∥?.(..)?∥ provides a local error bound, which is weaker than the condition of nonsingularity for the system of nonlinear equations, the sequence generated by the L-M method converges to the point of the solution set quadratically. As well, numerical experiments are reported.作者: Airtight 時(shí)間: 2025-3-27 03:03 作者: blister 時(shí)間: 2025-3-27 06:36
Using Support Vector Machine to Identify Imaging Biomarkers of Major Depressive Disorder and Anxiouof gray matter volume (GMV), then choose discriminative features to classify different group using linear support vector machine (SVM) classifier. The experimental results showed that specific structural brain regions may be a potential biomarkers for disease diagnosis.作者: choleretic 時(shí)間: 2025-3-27 13:11 作者: 防銹 時(shí)間: 2025-3-27 17:08 作者: VERT 時(shí)間: 2025-3-27 20:36
1865-0929 ented were carefully reviewed and selected from 204 submissions. The papers focus on four main topics, namely evolutionary computing, neural computing, DNA computing, and membrane computing.978-3-662-45048-2978-3-662-45049-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 粗鄙的人 時(shí)間: 2025-3-27 23:52 作者: cancer 時(shí)間: 2025-3-28 05:22 作者: 獸群 時(shí)間: 2025-3-28 08:44
Kreuzungsbauwerke in Wasserstra?enementations. The results show that the presented approach performs statistically better than generation of random tests belonging to certain classes. Moreover, a class of tests that are especially hard for one of the algorithms was discovered by the genetic algorithm.作者: 束以馬具 時(shí)間: 2025-3-28 14:04 作者: 陪審團(tuán) 時(shí)間: 2025-3-28 16:12 作者: 青少年 時(shí)間: 2025-3-28 21:21 作者: Intruder 時(shí)間: 2025-3-28 23:53 作者: Antioxidant 時(shí)間: 2025-3-29 03:37 作者: Carcinoma 時(shí)間: 2025-3-29 09:18 作者: 確認(rèn) 時(shí)間: 2025-3-29 13:20 作者: Nebulizer 時(shí)間: 2025-3-29 18:24
Research on Improved Locally Linear Embedding Algorithm,ng (OFSLLE) is proposed, with the application of elimination of redundant information among base vectors. Our algorithm was verified using the face library, showing that the base vector using uncorrelated constraints can effectively improve the performance of the algorithm and improve the recognition rate.作者: 官僚統(tǒng)治 時(shí)間: 2025-3-29 20:01
Multiple Depots Incomplete Open Vehicle Routing Problem Based on Carbon Tax,mputed results of the case show the transportation & distribution companies’ number of vehicles, fuel consumption and vehicle’ carbon emissions are still greater declines even though the carbon tax, and the benefit’s growth and low carbon logistics are realized at the same time.作者: Temporal-Lobe 時(shí)間: 2025-3-30 01:33 作者: 尖叫 時(shí)間: 2025-3-30 06:12 作者: 極微小 時(shí)間: 2025-3-30 08:41 作者: diathermy 時(shí)間: 2025-3-30 13:37
Die Tiefwasserhafenregion Wilhelmshaven,Example shows that PLC programming process has been simplified and readability of the program has been enhanced after the introduction of SN P systems. Therefore, the upgraded and maintenance of PLC program can be effectively improved.作者: discord 時(shí)間: 2025-3-30 17:32
Die Tiefwasserhafenregion Wilhelmshaven, set of square matrix, construct a positive diagonal matrix according to the elements and row sum, column sum of the matrix as well, then obtain a set of criteria for the nonsingular .??matrix, and extend the criteria of nonsingular .??matrix. Finally, a few numerical examples are given to illustrate relative merits of the proposed criteria.作者: meditation 時(shí)間: 2025-3-30 20:47 作者: 取回 時(shí)間: 2025-3-31 03:29 作者: Coronary-Spasm 時(shí)間: 2025-3-31 06:12
Die Sicherung des Nord-Ostsee-Kanals,elf-assembling systems for computing modular inversion in .(.) apply to elliptic curve Diffie-Hellman key exchange algorithm. The self-assembled architectures provide the feasibility of cryptanalysis for this algorithm.作者: Glucose 時(shí)間: 2025-3-31 09:26
Bonavita Blank — Der fr?nkische Arcimboldo scheme utilizing DNA microdots. It is noteworthy that the scheme achieves double concealing, which combines the properties of traditional cryptography and DNA microdots. The security of the scheme is analyzed from several aspects as well. Finally, the simulation proved a strong confidentiality of the encryption scheme.作者: 倔強(qiáng)一點(diǎn) 時(shí)間: 2025-3-31 15:07 作者: callous 時(shí)間: 2025-3-31 19:21
The Application of Spiking Neural P Systems for PLC Programming,Example shows that PLC programming process has been simplified and readability of the program has been enhanced after the introduction of SN P systems. Therefore, the upgraded and maintenance of PLC program can be effectively improved.作者: 引起 時(shí)間: 2025-3-31 21:48
,Criteria for Nonsingular ,??Matrices, set of square matrix, construct a positive diagonal matrix according to the elements and row sum, column sum of the matrix as well, then obtain a set of criteria for the nonsingular .??matrix, and extend the criteria of nonsingular .??matrix. Finally, a few numerical examples are given to illustrate relative merits of the proposed criteria.作者: FUSE 時(shí)間: 2025-4-1 05:02
Real-Coded Genetic Algorithm with Oriented Search towards Promising Region for Parameter Optimizatimization literature is used to test the performance of the proposed real-coded genetic algorithms. Simulations show the proposed approach is a significant evolutionary computing to efficiently solve parameter optimization problems.作者: upstart 時(shí)間: 2025-4-1 08:09
A Population-P-Systems-Inspired Membrane Algorithm for Multi-objective Optimization, obtain well converged and distributed solution set. Moreover, differential evolution is employed as search operator in PPSMA. Twelve multi-objective benchmark problems are utilized to test algorithm performance. Experimental results show that PPSMA performs better than five compared algorithms.作者: 冷淡周邊 時(shí)間: 2025-4-1 12:56 作者: OVER 時(shí)間: 2025-4-1 18:10 作者: Abominate 時(shí)間: 2025-4-1 21:11 作者: ALLEY 時(shí)間: 2025-4-2 00:06
Worst-Case Execution Time Test Generation for Solutions of the Knapsack Problem Using a Genetic Algroblem, which is often called “the easiest NP-complete problem”. For randomly generated test data, the expected running time of some algorithms for this problem is linear. We present an approach for generation of tests against algorithms for the knapsack problem. This approach is based on genetic al作者: 委派 時(shí)間: 2025-4-2 06:22
The Application of Spiking Neural P Systems for PLC Programming,tems to build a PLC control system model is proposed and implemented through the PLC programming application of a typical water level control system. Example shows that PLC programming process has been simplified and readability of the program has been enhanced after the introduction of SN P systems