Search Results - "\"\\"((\\\"hess computer\\\") OR ((\\\"less OR \\\"loss) computer\\\"))\\"\""
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 49
- Computational intelligence 49
- Telecommunication 38
- Artificial Intelligence 31
- Artificial intelligence 31
- Communications Engineering, Networks 31
- Control engineering 28
- Mechanics, Applied 22
- Signal processing 21
- Signal, Speech and Image Processing 21
- Control and Systems Theory 20
- Electric power production 19
- Electrical Power Engineering 19
- Electronic Circuits and Systems 16
- Electronic circuits 16
- Electronics 16
- Electronics and Microelectronics, Instrumentation 16
- Materials 16
- Analysis 13
- Engineering Design 13
- Engineering design 13
- Machines, Tools, Processes 13
- Manufactures 13
- Characterization and Analytical Technique 12
- Microwaves, RF Engineering and Optical Communications 12
- Solid Mechanics 12
- Solids 12
- System theory 12
- Applied Dynamical Systems 11
- Dynamics 11
-
1
-
2
Information Loss in Deterministic Signal Processing Systems
Published 2018Full-text access
View in OPAC
e-Book -
3
-
4
-
5
-
6
Music and death : interdisciplinary readings and perspectives /
Published 2019Full-text access
View in OPAC
e-Book -
7
-
8
-
9
Emergent Computation A Festschrift for Selim G. Akl /
Published 2017Table of Contents: “…-Vehicular Clouds: Ubiquitous Computing on Wheels.- Computational Approaches to Epigenetic Drug Discovery.…”
Full-text access
View in OPAC
e-Book -
10
Soft Computing Applications
Published 2018Table of Contents: “…A Brain like Computer Made of Time crystal: Could a Metric of Prime alone Replace a User and Alleviate Programming Forever? …”
Full-text access
View in OPAC
e-Book -
11
-
12
-
13
-
14
Soft Computing: Theories and Applications Proceedings of SoCTA 2016, Volume 1 /
Published 2018Table of Contents: “…Modified Critical-Path and Top-Level attributes (MCPTL) based Task Scheduling Algorithm in Parallel Computing -- Critical Path Problem for Scheduling using Genetic Algorithm -- A Robust Digital Image Watermarking Algorithm Using DWT and SVD -- A Novel and Secure Authentication Secret Key Generation Scheme Using Bilinear Self- Pairing Map Based on Elliptic Curve Cryptography -- Study and Comparatively Analysis of various Vulnerabilities occur in Google Chrome -- Secure Framework for Data Security in Cloud Computing -- An Improved Spider Monkey Optimization Algorithm -- Neural Network Based prediction of Productivity parameters -- Rigorous Data Analysis and Performance Evaluation of Indian Classical Raga Using RapidMiner -- EPQ Model with Product Stewardship Approach -- Loss and Cost Minimization with Enhancement of Voltage Profile of Distribution Systems Using a Modified Differential Evolution Technique -- Integration of GIS, Spatial Data Mining and Fuzzy Logic for Agricultural Intelligence -- Patient-specific Modeling for Pattern Identification in Clinical Events Using Data Mining Models and Evolutionary Computing -- Teaching Learning Based Optimization on Hadoop -- Analysis and Parameter Estimation of Micro Strip Circular Patch Antennas Using Artificial Neural Networks -- Vibrational Frequencies of Parallelogram Plate with Circular Variations in Thickness -- Study and Comparative Analysis of Various Image Spamming Techniques -- On Comparing Performance of Conventional Fuzzy System with Recurrent Fuzzy System -- Application of PSO Clustering for Selection of Chemical Interface Materials for Sensor Array Electronic Nose -- Panorama Generation using Feature based Mosaicing and Modified Graph-cut Blending -- Application of fuzzy multi-criteria approach to assess the water quality of river Ganges -- Efficient multiprocessor scheduling Using Water Cycle Algorithm.…”
Full-text access
View in OPAC
e-Book -
15
-
16
-
17
-
18
-
19
-
20