CORC

浏览/检索结果: 共9条,第1-9条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Research on the Evaluation Model of Engineering Quality Based on GA-BPNN 会议论文
5th International Conference on Intelligent Systems Design and Engineering Applications (ISDEA), Zhangjiajie, PEOPLES R CHINA, JUN 15-16, 2014
作者:  Xie, Zheng*
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/24
Research on Enterprise Financial Risks Evaluation Based on the Gray Relevance Theory 会议论文
7th International Conference Intelligent Computation Technology Automation (ICICTA), Changsha, PEOPLES R CHINA, OCT 25-26, 2014
作者:  Xie, Zheng*
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24
Attributes reduction algorithm based on incomplete decisions 会议论文
9th International Symposium on Linear Drives for Industry Applications, LDIA 2013, Hangzhou, China, July 7, 2013 - July 10, 2013
作者:  Liu, Hean;  Zhang, Cizhen
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/24
The Comprehensive Evaluation of Architectural Engineering Geology Based on IACO 会议论文
7th International Conference Intelligent Computation Technology Automation (ICICTA), Changsha, PEOPLES R CHINA, OCT 25-26, 2014
作者:  Mo, Lianguang*
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/24
A method of gene diagnosis based on Hopfield neural network 期刊论文
Journal of Chemical and Pharmaceutical Research, 2014, 卷号: 6, 期号: 2, 页码: 580-588
作者:  Tu, Li;  Xie, Chuan;  Zhang, Chi
收藏  |  浏览/下载:1/0  |  提交时间:2019/12/24
Research on hopfield neural network in associative memory storage 会议论文
2012 International Conference on Cybernetics and Informatics, ICCI 2012, Chongqing, China, September 21, 2012 - September 23, 2012
作者:  Tu, Li;  Zhang, Chi
收藏  |  浏览/下载:8/0  |  提交时间:2019/12/24
Binary image encryption algorithm based on chaotic sequence 会议论文
9th International Symposium on Linear Drives for Industry Applications, LDIA 2013, Hangzhou, China, July 7, 2013 - July 10, 2013
作者:  Zhou, Libo;  Liu, Hean;  Zhou, Minghui
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/24
Research on the detection and defense systems against DDoS attacks in ad hoc networks 期刊论文
WIT Transactions on Information and Communication Technologies, 2014, 卷号: 46, 页码: 1161-1168
作者:  Jing, Huang*;  Wen, Wushao
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/24
An image encryption algorithm based on josephus traversing and position disordering 会议论文
2012 International Conference on Cybernetics and Informatics, ICCI 2012, Chongqing, China, September 21, 2012 - September 23, 2012
作者:  Wu, Jianjun;  Tu, Li
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/24


©版权所有 ©2017 CSpace - Powered by CSpace