標(biāo)題: Titlebook: Genetic and Evolutionary Computing; Proceedings of the N Thi Thi Zin,Jerry Chun-Wei Lin,Mitsuhiro Yokota Conference proceedings 2016 Spring [打印本頁] 作者: 女孩 時間: 2025-3-21 16:11
書目名稱Genetic and Evolutionary Computing影響因子(影響力)
書目名稱Genetic and Evolutionary Computing影響因子(影響力)學(xué)科排名
書目名稱Genetic and Evolutionary Computing網(wǎng)絡(luò)公開度
書目名稱Genetic and Evolutionary Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Genetic and Evolutionary Computing被引頻次
書目名稱Genetic and Evolutionary Computing被引頻次學(xué)科排名
書目名稱Genetic and Evolutionary Computing年度引用
書目名稱Genetic and Evolutionary Computing年度引用學(xué)科排名
書目名稱Genetic and Evolutionary Computing讀者反饋
書目名稱Genetic and Evolutionary Computing讀者反饋學(xué)科排名
作者: Seizure 時間: 2025-3-21 21:56 作者: glacial 時間: 2025-3-22 03:51
user can impersonate the user and enjoy the service (eg., on-line shopping) from the server on behalf of the original user without the card on-hand. We conduct a detailed analysis of flaws in their scheme in the hope that no similar mistakes are made in the future. An improved scheme is left as a fu作者: Mercantile 時間: 2025-3-22 04:34
What about Post-War Consociationalism?,ts further show that the output timing of terminals should be adjusted to the terminal which has the slowest output timing to maintain the fairness when the difference in network delay between the terminals is large. In this way, the comprehensive quality at each terminal can also be maintained as h作者: Seminar 時間: 2025-3-22 09:46 作者: breadth 時間: 2025-3-22 15:13 作者: breadth 時間: 2025-3-22 19:37
Quaternion Principal Component Analysis for Multi-modal Fusionequal error rate (EER) while fusing more kinds of features. Our experiments that fuses three kinds of modalities and four different features with two kinds of modalities respectively show a observably improvement on recognition rate with the proposed algorithm.作者: inculpate 時間: 2025-3-22 23:08
A Novel Load Balance Algorithm for Cloud Computings compared with some other classical algorithms. The result shows that the proposed algorithm could meet users’ requirement and get resource utilization higher. The algorithm is better for network of a large area which is simulated by CloudSim.作者: Horizon 時間: 2025-3-23 01:39 作者: 在前面 時間: 2025-3-23 09:12 作者: 讓空氣進(jìn)入 時間: 2025-3-23 13:21
The Precariousness of Prebendalismg GOP, the image quality is good owing to high coding efficiency, while the viewpoint change response is slow because the new viewpoint cannot be shown until receiving the next I picture. We employ two contents and assess QoE multidimensionally by a subjective experiment.作者: Painstaking 時間: 2025-3-23 14:34 作者: 突襲 時間: 2025-3-23 21:09 作者: Fallibility 時間: 2025-3-24 00:58
The Effect of Spatiotemporal Tradeoff of Picture Patterns on QoE in Multi-View Video and Audio IP Trg GOP, the image quality is good owing to high coding efficiency, while the viewpoint change response is slow because the new viewpoint cannot be shown until receiving the next I picture. We employ two contents and assess QoE multidimensionally by a subjective experiment.作者: ear-canal 時間: 2025-3-24 04:31
Challenge or Crisis of Democracy,alysis is demonstrated that our scheme is secure against outside adversary and malicious user. Finally, we make comparisons between recently proposed two TBHKA schemes and our scheme. It will show the advantages of our scheme.作者: 袖章 時間: 2025-3-24 10:31
spectrum code, using single frequency interference to simulate narrow-band interference, and contrast on its power spectrum and bit error rate, we can illustrate that mW composite sequence can significantly improve the function of communication system.作者: 頌揚國家 時間: 2025-3-24 13:14 作者: 泥土謙卑 時間: 2025-3-24 16:52 作者: thwart 時間: 2025-3-24 20:26 作者: 絕緣 時間: 2025-3-25 01:05 作者: AIL 時間: 2025-3-25 05:36 作者: AUGUR 時間: 2025-3-25 10:26 作者: Orgasm 時間: 2025-3-25 13:57
Anomalous Behavior Detection in Mobile Networkdetail records with grouped mobile phone call patterns to examine the input mobile phone call detail record is normal or not. If the system detects the anomalous mobile phone behavior, the system warns the user that the suspicious mobile phone call is detected and asks the user which action will be taken.作者: 大猩猩 時間: 2025-3-25 16:59 作者: 爭吵 時間: 2025-3-25 20:07
2194-5357 ng neural networks.Describes new specific methods for the cr.This volume of Advances in Intelligent Systems and Computing contains accepted papers presented at ICGEC 2015, the 9th International Conference on Genetic and Evolutionary Computing. The conference this year was technically co-sponsored by作者: Latency 時間: 2025-3-26 03:44
https://doi.org/10.1057/9781137326041equal error rate (EER) while fusing more kinds of features. Our experiments that fuses three kinds of modalities and four different features with two kinds of modalities respectively show a observably improvement on recognition rate with the proposed algorithm.作者: 小丑 時間: 2025-3-26 05:31 作者: Longitude 時間: 2025-3-26 10:08
Conference proceedings 2016netic and Evolutionary Computing. The conference this year was technically co-sponsored by Ministry of Science and Technology, Myanmar, University of Computer Studies, Yangon, University of Miyazaki in Japan, Kaohsiung University of Applied Science in Taiwan, Fujian University of Technology in China作者: FLAIL 時間: 2025-3-26 14:38
Making Democracy Work for Innovation,CS dictionary are selected to represent the original data, and the STF format terrain environment data with SEDRIS standard is generated. The research of this paper can enhance the normative representation and conversion efficiency of terrain environment data, and realize the terrain data sharing and reuse.作者: 輪流 時間: 2025-3-26 17:05
https://doi.org/10.1057/9780230509863s paper, we improve the proposed method by adding wasted query reduction scheme which works while the usual flooding is executed, and reduce the network traffic without degradation of content acquisition rate. In addition, we discuss the availability of the newly proposed method with its evaluation results given by computer simulations.作者: 叢林 時間: 2025-3-26 23:21
https://doi.org/10.1057/9780230511668networks, i.e. the NGN architecture consisted of various control equipment. This paper has investigated the possibility to determine the reliability requirement of network element evolutionally by allocating the traffic demand and the loss caused by failure to the concerned element.作者: Amorous 時間: 2025-3-27 04:10 作者: geometrician 時間: 2025-3-27 09:01
A Modeling Method of Virtual Terrain EnvironmentCS dictionary are selected to represent the original data, and the STF format terrain environment data with SEDRIS standard is generated. The research of this paper can enhance the normative representation and conversion efficiency of terrain environment data, and realize the terrain data sharing and reuse.作者: 逃避責(zé)任 時間: 2025-3-27 13:24
An Efficient Content Searching Method Using Transmission Records with Wasted Queries Reduction Schems paper, we improve the proposed method by adding wasted query reduction scheme which works while the usual flooding is executed, and reduce the network traffic without degradation of content acquisition rate. In addition, we discuss the availability of the newly proposed method with its evaluation results given by computer simulations.作者: 寬大 時間: 2025-3-27 15:03 作者: 即席演說 時間: 2025-3-27 20:38 作者: vitreous-humor 時間: 2025-3-28 01:39 作者: tariff 時間: 2025-3-28 03:13 作者: 頑固 時間: 2025-3-28 06:29
Challenge or Crisis of Democracy,classes in a partially ordered hierarchy. Only the authorized user can compute the encryption key to access the subscribing class (including lower down class) according to the hierarchy. In 2005, Yeh firstly proposed a RSA-based TBHKA scheme supporting discrete time period. However, it had been prov作者: PANIC 時間: 2025-3-28 11:30
https://doi.org/10.1057/9781137326041r algorithm. We can fuse four different features into quaternion and complete the recognition process in quaternion field. This algorithm reduces the equal error rate (EER) while fusing more kinds of features. Our experiments that fuses three kinds of modalities and four different features with two 作者: hegemony 時間: 2025-3-28 18:37 作者: HEW 時間: 2025-3-28 20:03 作者: Entropion 時間: 2025-3-29 02:43
https://doi.org/10.1057/9780230379589s is Kelly criterion is optimal in theory rather than in practice. In this paper we show the results of using Kelly criterion in a gamble of bidding . steps. At the end of . steps, there are . times of winning and . times of losing. i.e. .. Consequently, the best strategy for these bidding steps is 作者: 粗魯性質(zhì) 時間: 2025-3-29 05:43 作者: 熱心助人 時間: 2025-3-29 11:07 作者: 隱藏 時間: 2025-3-29 14:48 作者: 慢慢沖刷 時間: 2025-3-29 18:45 作者: 酷熱 時間: 2025-3-29 22:07 作者: Living-Will 時間: 2025-3-30 01:04 作者: 木訥 時間: 2025-3-30 06:53 作者: 保留 時間: 2025-3-30 08:17 作者: 詳細(xì)目錄 時間: 2025-3-30 15:10
The Precariousness of Prebendalismt of the tradeoff relationship between improvement of image quality and degradation of viewpoint change response owing to the picture patterns. When the length of GOP (Group of Picture) is short, the viewpoint change response is quick, but the image quality is not good. On the other hand, in the lon作者: 寬度 時間: 2025-3-30 17:07
Marianne Beisheim,Christopher Kaanication, encryption alone are not sufficient to provide adequate security for a system. In this work, we propose User Group Partition Algorithm and Behavior Pattern Matching Algorithm to extract anomalous calls from mobile call detail records effectively. The system accepts the proper input of norma作者: 俗艷 時間: 2025-3-30 22:43 作者: abstemious 時間: 2025-3-31 04:33 作者: 過剩 時間: 2025-3-31 05:56
https://doi.org/10.1007/978-94-6300-106-9transport of real time haptic data. This paper presents the related work on haptic data transferring. A new network adaptive flow control algorithm is proposed. The new algorithm combines most of the known flow control algorithms while taking into account the network conditions οf the Internet and the significant haptic events.作者: 不斷的變動 時間: 2025-3-31 11:39 作者: 無法破譯 時間: 2025-3-31 15:59 作者: 腐蝕 時間: 2025-3-31 19:41
https://doi.org/10.1007/978-3-319-23207-2Computational Intelligence; Evolutionary Computing; Genetic Algorithms; Intelligent Computing; Swarm Opt作者: 駕駛 時間: 2025-3-31 22:14 作者: BAIL 時間: 2025-4-1 03:45 作者: Chameleon 時間: 2025-4-1 07:34
A Novel Load Balance Algorithm for Cloud Computingd on swarm intelligence is proposed which can enhance the production of the systems while schedule tasks to VMs properly. Here tasks completion time is compared with some other classical algorithms. The result shows that the proposed algorithm could meet users’ requirement and get resource utilizati作者: Extricate 時間: 2025-4-1 14:12