咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 1 册 图书

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 7 篇 计算机科学与技术...
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 生物医学工程(可授...
    • 1 篇 软件工程
  • 4 篇 理学
    • 4 篇 数学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 社会学

主题

  • 2 篇 algorithms
  • 1 篇 quantum computin...
  • 1 篇 graph algorithms
  • 1 篇 computational co...
  • 1 篇 forest fire simu...
  • 1 篇 cellular automat...
  • 1 篇 undecidability
  • 1 篇 pseudo
  • 1 篇 computer communi...
  • 1 篇 discrete event s...
  • 1 篇 discrete geometr...
  • 1 篇 computational me...
  • 1 篇 uncertainty prin...
  • 1 篇 epilepsy
  • 1 篇 computer graphic...
  • 1 篇 media
  • 1 篇 aircraft
  • 1 篇 image coding
  • 1 篇 predictive model...
  • 1 篇 discrete mathema...

机构

  • 1 篇 univ bonn dept c...
  • 1 篇 school of inform...
  • 1 篇 zhejiang normal ...
  • 1 篇 fujian provincia...
  • 1 篇 carleton univ sc...
  • 1 篇 institute of nat...
  • 1 篇 faculty of compu...
  • 1 篇 department of ch...
  • 1 篇 ocean univ china...
  • 1 篇 department of co...
  • 1 篇 pimpri chinchwad...
  • 1 篇 department of in...
  • 1 篇 beijing inst tec...
  • 1 篇 chin acdey of lu...
  • 1 篇 department of ma...
  • 1 篇 college of mathe...
  • 1 篇 department of ma...
  • 1 篇 yanan univ coll ...
  • 1 篇 department of co...
  • 1 篇 department of co...

作者

  • 1 篇 xu saijuan
  • 1 篇 zhuang zhen
  • 1 篇 majid forghani
  • 1 篇 tian yunna
  • 1 篇 tong liu
  • 1 篇 sack joerg-ruedi...
  • 1 篇 xiaodi wang
  • 1 篇 changmao qin
  • 1 篇 ding-zhu du
  • 1 篇 abu bakar zainab
  • 1 篇 schwarzwald barb...
  • 1 篇 thakare anuradha
  • 1 篇 ismail suryani
  • 1 篇 abbas darbani
  • 1 篇 gore sonal
  • 1 篇 cheng t.m.
  • 1 篇 liu genggeng
  • 1 篇 abdul jalil masi...
  • 1 篇 haotian zhou
  • 1 篇 wang xiaodong

语言

  • 13 篇 英文
检索条件"任意字段=5th International Conference on Algorithms and Discrete Applied Mathematics, CALDAM 2019"
13 条 记 录,以下是1-10 订阅
排序:
5th international conference on algorithms and discrete applied mathematics, caldam 2019
5th International Conference on Algorithms and Discrete Appl...
收藏 引用
5th international conference on algorithms and discrete applied mathematics, caldam 2019
the proceedings contain 23 papers. the special focus in this conference is on algorithms and discrete applied mathematics. the topics include: On rectangle intersection graphs with stab number at most two;dominating i...
来源: 评论
11th international conference on algorithms and discrete applied mathematics, caldam 2025
11th International Conference on Algorithms and Discrete App...
收藏 引用
11th international conference on algorithms and discrete applied mathematics, caldam 2025
the proceedings contain 30 papers. the special focus in this conference is on algorithms and discrete applied mathematics. the topics include: Parameterized Complexity of Coupon Coloring of Graphs;spectra of...
来源: 评论
8th international conference on algorithms and discrete applied mathematics, caldam 2022
8th International Conference on Algorithms and Discrete Appl...
收藏 引用
8th international conference on algorithms and discrete applied mathematics, caldam 2022
the proceedings contain 24 papers. the special focus in this conference is on algorithms and discrete applied mathematics. the topics include: On cd-Coloring of { P5, K4} -free Chordal Graphs;an Output-Sensitive Algor...
来源: 评论
A New Model in Firefighting theory  6th
A New Model in Firefighting Theory
收藏 引用
6th international conference on algorithms and discrete applied mathematics
作者: Klein, Rolf Kubelb, David Langetepe, Elmar Sack, Joerg-Ruediger Schwarzwald, Barbara Univ Bonn Dept Comp Sci D-53115 Bonn Germany Carleton Univ Sch Comp Sci Ottawa ON K1S 5B6 Canada
Continuous and discrete models [1,5] for firefighting problems are well-studied in theoretical Computer Science. We introduce a new, discrete, and more general framework based on a hexagonal cell graph to study firefi... 详细信息
来源: 评论
X-Architecture Steiner Minimal Tree Construction Based on discrete Differential Evolution  15th
X-Architecture Steiner Minimal Tree Construction Based on Di...
收藏 引用
15th international conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2019, co-located with the 5th international conference on Harmony Search, Soft Computing and Applications, ICHSA 2019
作者: Wu, Hailin Xu, Saijuan Zhuang, Zhen Liu, Genggeng College of Mathematics and Computer Sciences Fuzhou University Fuzhou350116 China Department of Information Engineering Fujian Business University Fuzhou350012 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
As the best connection model for the multi-pin net of the non-Manhattan architecture global routing problem, the X-architecture Steiner Minimum Tree (XSMT) construction is a Non-deterministic Polynomial hard (NP-hard)... 详细信息
来源: 评论
A discrete Wolf Pack Algorithm for Job Shop Scheduling Problem  5
A Discrete Wolf Pack Algorithm for Job Shop Scheduling Probl...
收藏 引用
5th international conference on Control, Automation and Robotics (ICCAR)
作者: Wang, Feng Tian, Yunna Wang, Xiaodong Beijing Inst Technol Sch Comp Sci Beijing Peoples R China Yanan Univ Coll Math & Comp Sci Yanan Peoples R China Ocean Univ China Coll Informat Sci & Engn Qingdao Peoples R China
the job shop scheduling problem is demonstrated to be one of the NP-complete problems. Many meta-heuristics are proposed to solve this problem. In this paper, wolf pack algorithm is applied to this problem. this algor... 详细信息
来源: 评论
A Methodology for Classification of Seizure disorder using EEG Signals  5
A Methodology for Classification of Seizure disorder using E...
收藏 引用
5th international conference on Computing, Communication Control and Automation (ICCUBEA)
作者: Shinde, Rutuja thakare, Anuradha Gore, Sonal Pimpri Chinchwad Coll Engn Comp Engn Pune Maharashtra India
Epilepsy is a chronological disorder affects millions of people worldwide. the abnormal electrical activity of a group of brain cells is known as a seizure. Electroencephalography (EEG) is a non-invasive technique mos... 详细信息
来源: 评论
the Use of Hybrid Information Retrieve Technique and Bayesian Relevance Feedback Classification on Clinical Dataset  5th
The Use of Hybrid Information Retrieve Technique and Bayesia...
收藏 引用
5th international conference on Soft Computing in Data Science, SCDS 2019
作者: Mohd, Fatihah Abdul Jalil, Masita @ Masila Mohamad Noor, Noor Maizura Ismail, Suryani Abu Bakar, Zainab School of Informatics and Applied Mathematics Universiti Malaysia Terengganu Kuala TerengganuTerengganu21030 Malaysia Faculty of Computer and Information Technology Al-Madinah International University Shah AlamSelangor Malaysia
Retrieval of information related to a subset variable or feature has become the attention of many researchers in data mining fields. the objective of feature selection (FS) is to improve the performance of the predict... 详细信息
来源: 评论
Research on Demand Forecast of Aircraft Spare Parts Based on Fractional Order discrete Grey Model
Research on Demand Forecast of Aircraft Spare Parts Based on...
收藏 引用
IEEE international conference on Computer and Communications
作者: Qunhai Qiu ChangMao Qin Jiao Shi Haotian Zhou Chin Acdey of Lunch Vehice TechnoogyChin Acdey of Lunch Vehice TechnoogyChin Acdey of Lunch Vehice TechnoogyChin Acdey of Lunch Vehice Technoogy
Exact spare parts demand forecast is an important task of equipment maintenance support. In spare parts demand forecast of aircraft, there exists problems such as the lack of comparable existing equipments, less histo... 详细信息
来源: 评论
A New Steganography Method for Embedding Message in JPEG Images
A New Steganography Method for Embedding Message in JPEG Ima...
收藏 引用
international conference on Knowledge-Based Engineering and Innovation (KBEI)
作者: Abbas Darbani Mohammad M. AlyanNezhadi Majid Forghani Department of computer engineering Shahrood Non-profit and Non-government Higher Edu. Inst. Shahrood Iran Institute of natural sciences and mathematics Ural Federal University Yekaterinburg Russia
Steganography is widely applied by information security systems. the aim of steganography is to create a secret and secure channel between the sender and receiver. Steganography is basically performed in the different... 详细信息
来源: 评论