Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
International Journal of Applied Mathematics and Computer Science
Tome 24 (2014)
no. 1
Précédent
Suivant
Volume 24 (2014) no. 1
Sommaire
An analytical iterative statistical algorithm for image reconstruction from projections
Cierniak, R.
p. 7-17
Nuclei segmentation for computer-aided diagnosis of breast cancer
Kowal, M.
;
Filipczuk, P.
p. 19-31
Recognition of atherosclerotic plaques and their extended dimensioning with computerized tomography angiography imaging
Markiewicz, T.
;
Dziekiewicz, M.
;
Maruszyński, M.
;
Bogusławska-Walecka, R.
;
Kozłowski, W.
p. 33-47
From the slit-island method to the Ising model: Analysis of irregular grayscale objects
Mazurek, P.
;
Oszutowska-Mazurek, D.
p. 49-63
Discretization of singular systems and error estimation
Karampetakis, N. P.
;
Karamichalis, R.
p. 65-73
On attaining the prescribed quality of a controlled fourth order system
Kapustyan, V.
;
Maksimov, V.
p. 75-85
An optimal sliding mode congestion controller for connection-oriented communication networks with lossy links
Bartoszewicz, A.
;
Leśniewski, P.
p. 87-97
Approximation of a linear dynamic process model using the frequency approach and a non-quadratic measure of the model error
Janiszowski, K. B.
p. 99-109
A differential evolution approach to dimensionality reduction for classification needs
Martinović, G.
;
Bajer, D.
;
Zorić, B.
p. 111-122
An efficient eigenspace updating scheme for high-dimensional systems
Gangl, S.
;
Mongus, D.
;
Žalik, B.
p. 123-131
An algorithm for reducing the dimension and size of a sample for data exploration procedures
Kulczycki, P.
;
Łukasik, S.
p. 133-149
Center-based l
1
-clustering method
Sabo, K.
p. 151-163
Approximation of phenol concentration using novel hybrid computational intelligence methods
Pławiak, P.
;
Tadeusiewicz, R.
p. 165-181
Cross-task code reuse in genetic programming applied to visual learning
Jaśkowski, W.
;
Krawiec, K.
;
Wieloch, B.
p. 183-197
Survival analysis on data streams: Analyzing temporal events in dynamically changing environments
Shaker, A.
;
Hüllermeier, E.
p. 199-212
A new lightweight method for security risk assessment based on fuzzy cognitive maps
Szwed, P.
;
Skrzyński, P.
p. 213-225