標題: Titlebook: Electrical Engineering and Intelligent Systems; Sio-Iong Ao,Len Gelman Book 2013 Springer Science+Business Media, LLC 2013 Computational I [打印本頁] 作者: 偏差 時間: 2025-3-21 18:33
書目名稱Electrical Engineering and Intelligent Systems影響因子(影響力)
書目名稱Electrical Engineering and Intelligent Systems影響因子(影響力)學科排名
書目名稱Electrical Engineering and Intelligent Systems網(wǎng)絡公開度
書目名稱Electrical Engineering and Intelligent Systems網(wǎng)絡公開度學科排名
書目名稱Electrical Engineering and Intelligent Systems被引頻次
書目名稱Electrical Engineering and Intelligent Systems被引頻次學科排名
書目名稱Electrical Engineering and Intelligent Systems年度引用
書目名稱Electrical Engineering and Intelligent Systems年度引用學科排名
書目名稱Electrical Engineering and Intelligent Systems讀者反饋
書目名稱Electrical Engineering and Intelligent Systems讀者反饋學科排名
作者: 貝雷帽 時間: 2025-3-21 23:33
Electrical Engineering and Intelligent Systems978-1-4614-2317-1Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: 孵卵器 時間: 2025-3-22 03:04 作者: bourgeois 時間: 2025-3-22 04:54
https://doi.org/10.1007/978-3-662-46732-9From emergency location systems based on mobile networks, such as E911 (Enhanced 911), to the latest concept of applications that are adapted for the end-user and are dynamically delivery based on the user’s location [2], all the Location Based Services (LBS) depend on the correct estimation of the users’ location.作者: COST 時間: 2025-3-22 12:41 作者: Scintillations 時間: 2025-3-22 15:16 作者: Scintillations 時間: 2025-3-22 17:13
,Dampfmaschine und K?ltemaschinen,ystems—usually called complex stochastic Boolean systems (CSBSs)—is the intrinsic order graph. This is a directed graph on 2. vertices, corresponding to the 2. binary .-tuples .of 0s and 1s. In this paper, different duality properties of the intrinsic order graph are rigorously analyzed in detail. T作者: NOT 時間: 2025-3-22 23:03 作者: 真實的你 時間: 2025-3-23 02:10 作者: 符合國情 時間: 2025-3-23 07:51
Besteuerung der Unternehmensmittel, series by searching for the best configuration of the IT2FLS. Simulated annealing is used to learn the parameters of the antecedent and the consequent parts of the rules for a Mamdani model. Simulated annealing is combined with a method to reduce the computations associated with it using adaptive s作者: gout109 時間: 2025-3-24 02:47 作者: Glucose 時間: 2025-3-24 06:51 作者: TRUST 時間: 2025-3-24 11:40 作者: 松緊帶 時間: 2025-3-24 15:33
Ausnutzung von Bohrer und Bohrmaschinet communications. Security is equally very important. Laboratory measurements are made about several performance aspects of Wi-Fi (IEEE 802.11b, g) WPA2 point-to-point links. A contribution is given to performance evaluation of this technology under WPA2 encryption, using available equipments (WRT54作者: expansive 時間: 2025-3-24 20:46 作者: 灌溉 時間: 2025-3-24 23:40 作者: 模范 時間: 2025-3-25 04:28 作者: 無聊點好 時間: 2025-3-25 07:58 作者: CLIFF 時間: 2025-3-25 15:30
https://doi.org/10.1007/978-3-642-91853-7rature in order to estimate the OHR, among others, constant parameter and time-varying approaches. One relevant question in this regard that has not been examined, to the best knowledge, is whether the OHR has an asymmetric structure or not. This issue is addressed in the current paper by mathematic作者: Forsake 時間: 2025-3-25 16:13 作者: 出沒 時間: 2025-3-25 20:09
https://doi.org/10.1007/978-3-322-83664-9of feature extraction, ROI is divided into a suitable number of nonoverlapping windows of different sizes. Three types of features, viz. Sigmoid, energy, and entropy features, are extracted. These three sets of features are used for the authentication of users using Euclidean distance and support vector machine (SVM) as the classifiers.作者: conscribe 時間: 2025-3-26 01:02
Partial Exploration of State Spaces and Hypothesis Test for Unsuccessful Search,ble of generating the result of a random sampling for the case when a metric in each state is assumed to be normally distributed. It is designed for the case of unsuccessful search, for using a hypothesis test and providing completeness in the analysis.作者: PUT 時間: 2025-3-26 07:50 作者: effrontery 時間: 2025-3-26 10:52
Sio-Iong Ao,Len GelmanCovers recent advances in robot navigation and task allocation in robot teams.Discusses detector for color images and using pattern substitution.Presents research on fuzzy nets, fuzzy optimization, an作者: Arb853 時間: 2025-3-26 12:50
Lecture Notes in Electrical Engineeringhttp://image.papertrans.cn/e/image/305726.jpg作者: cauda-equina 時間: 2025-3-26 17:22
Duality in Complex Stochastic Boolean Systems,to the 2. binary .-tuples .of 0s and 1s. In this paper, different duality properties of the intrinsic order graph are rigorously analyzed in detail. The results can be applied to many CSBSs arising from any scientific, technical, or social area.作者: 全神貫注于 時間: 2025-3-26 21:56
Learning of Type-2 Fuzzy Logic Systems by Simulated Annealing with Adaptive Step Size,t parts of the rules for a Mamdani model. Simulated annealing is combined with a method to reduce the computations associated with it using adaptive step sizes. The results of the proposed methods are compared to results of a type-1 fuzzy logic system (T1FLS).作者: Medicaid 時間: 2025-3-27 02:50 作者: Vital-Signs 時間: 2025-3-27 07:48
Besteuerung der Unternehmensleistungen, being reasoned by the meta-interpreter, which provides a query answering mechanism to infer information. A comparative study of related works has revealed a merit of the meta-logical representation approach that separates the meta level knowledge from the object level one.作者: mortuary 時間: 2025-3-27 12:59 作者: 取回 時間: 2025-3-27 17:22 作者: 免除責任 時間: 2025-3-27 19:35 作者: 糾纏 時間: 2025-3-27 23:12 作者: 恫嚇 時間: 2025-3-28 05:20
Digitaler Wandel von Unternehmen,. The main advantage of using GrRFMN is its capability to learn online in a single pass through data and property to deal with granular data which help to segment a video sequence in an interactive mode. Results of the proposed method on standard images and video sequences are also presented.作者: LINES 時間: 2025-3-28 09:06 作者: Leisureliness 時間: 2025-3-28 12:51 作者: choleretic 時間: 2025-3-28 15:09 作者: guardianship 時間: 2025-3-28 21:33
An Interactive Colour Video Segmentation: A Granular Computing Approach,. The main advantage of using GrRFMN is its capability to learn online in a single pass through data and property to deal with granular data which help to segment a video sequence in an interactive mode. Results of the proposed method on standard images and video sequences are also presented.作者: 搏斗 時間: 2025-3-28 23:25 作者: Commonwealth 時間: 2025-3-29 05:16
Decision Under Uncertainties of Online Phishing,s treatments among 120 subjects. The experimental results indicate that consumer willingness to pay to avoid risks and their intention to purchase online vary systematically under different uncertainty levels of knowledge of phishing risks.作者: tariff 時間: 2025-3-29 10:56
1876-1100 tion.Presents research on fuzzy nets, fuzzy optimization, an.The revised and extended papers collected in this volume represent the cutting-edge of research at the nexus of electrical engineering and intelligent systems. They were selected from well over 1000 papers submitted to the high-profile int作者: 野蠻 時間: 2025-3-29 12:18
,Dampfmaschine und K?ltemaschinen,to the 2. binary .-tuples .of 0s and 1s. In this paper, different duality properties of the intrinsic order graph are rigorously analyzed in detail. The results can be applied to many CSBSs arising from any scientific, technical, or social area.作者: PIZZA 時間: 2025-3-29 15:48 作者: Orgasm 時間: 2025-3-29 21:59 作者: 串通 時間: 2025-3-30 03:32 作者: AUGUR 時間: 2025-3-30 06:11
Bayesian Approach to Robot Group Control,to observe other robots’ behavioral patterns to predict further steps and strategies. Bayesian Network based mechanisms can enable work without human intervention and help the system react in uncertain situations and scenarios.作者: vitrectomy 時間: 2025-3-30 09:40
A Novel Approach for Heart Murmurs Detection and Classification,hology associated to corresponding patient heart valve. Results obtained from a restricted database of adult patients show that this novel approach demonstrates a potential promising as an alternative diagnostic tool to the traditional stethoscope for heart murmurs detection and classification.作者: 帶來的感覺 時間: 2025-3-30 15:56 作者: 捏造 時間: 2025-3-30 17:14
Schnittgeschwindigkeit beim R?umen4 and 7, namely from TCP, UDP and FTP experiments: SNR, TCP throughput, jitter, percentage datagram loss and FTP transfer rate. Detailed comparisons are made and conclusions are drawn about the comparative performance of the links.作者: 沖擊力 時間: 2025-3-30 21:34
https://doi.org/10.1007/978-3-642-92628-0 domain ontologies. The mathematical aspects of matching and binding of . conceptual graphs with fitness are also discussed. Further with the help of transformations the matching process is improved to provide semantic matching.作者: 整潔漂亮 時間: 2025-3-31 02:45 作者: 可以任性 時間: 2025-3-31 06:18
Wi-Fi Point-to-Point Links,throughput, jitter, percentage datagram loss and FTP transfer rate. Comparisons are made to corresponding results obtained for open, WPA and WEP links. Conclusions are drawn about the comparative performance of the links.作者: 先驅 時間: 2025-3-31 11:40 作者: freight 時間: 2025-3-31 14:24
Using Conceptual Graph Matching Methods to Semantically Mediate Ontologies, domain ontologies. The mathematical aspects of matching and binding of . conceptual graphs with fitness are also discussed. Further with the help of transformations the matching process is improved to provide semantic matching.作者: LURE 時間: 2025-3-31 19:02 作者: minaret 時間: 2025-3-31 21:53 作者: 斜 時間: 2025-4-1 02:59
Besteuerung der Unternehmensleistungen,to improve robots’ bids, and hence enhance the overall team performance. Each robot in a team maintains its own track record as closed-loop feedback information to adjust its bid prices. After a robot has completed a task, it assesses its performance to reflect the discrepancy between the bid price 作者: 體貼 時間: 2025-4-1 09:02
Book 2013mmittees alone, the Congress features the best and brightest scientific minds from a multitude of disciplines related to engineering. These peer-reviewed papers demonstrate the huge strides currently being taken in this rapidly developing field and reflect the excitement of those at the frontiers of作者: 徹底檢查 時間: 2025-4-1 10:48
Efficient Implementation of Computationally Complex Algorithms: Custom Instruction Approach,he WUHPERM instruction is implemented in RISC architecture and eight times for stack-based architecture. The execution time is stupendously improved to approximately three times when Texpand instruction is implemented for RISC architecture.作者: Meager 時間: 2025-4-1 14:54
A Closed-Loop Bid Adjustment Method of Dynamic Task Allocation of Robots,to improve robots’ bids, and hence enhance the overall team performance. Each robot in a team maintains its own track record as closed-loop feedback information to adjust its bid prices. After a robot has completed a task, it assesses its performance to reflect the discrepancy between the bid price 作者: lymphedema 時間: 2025-4-1 22:03 作者: Dorsal 時間: 2025-4-2 00:06
Partial Exploration of State Spaces and Hypothesis Test for Unsuccessful Search,ble of generating the result of a random sampling for the case when a metric in each state is assumed to be normally distributed. It is designed for the case of unsuccessful search, for using a hypothesis test and providing completeness in the analysis.作者: 沙草紙 時間: 2025-4-2 04:07 作者: 痛恨 時間: 2025-4-2 08:12 作者: avenge 時間: 2025-4-2 11:37 作者: 陳列 時間: 2025-4-2 16:10