Sciweavers

Share
PREMI
2015
Springer
3 years 6 months ago
Inverted Fuzzy Implications in Backward Reasoning
One of the most popular methods of knowledge representation are the fuzzy rules. One of the ways of representation of fuzzy rules is the functional representation. From over eight ...
Zbigniew Suraj, Agnieszka Lasek
MCS
2016
Springer
3 years 6 months ago
A Lyapunov functional for a neutral system with a distributed time delay
In this paper a Lyapunov functional determination method for a linear neutral system with both lumped and distributed time delay is formulated and solved. A form of a Lyapunov fun...
Józef Duda
MCS
2016
Springer
3 years 6 months ago
Comparison study of the conservative Allen-Cahn and the Cahn-Hilliard equations
In this paper, a comparison study of conservative Allen–Cahn and Cahn–Hilliard equations is presented. We consider two massconservative Allen–Cahn equations and two Cahn–H...
Dongsun Lee, Junseok Kim
MCS
2016
Springer
3 years 6 months ago
A fully adaptive rational global Arnoldi method for the model-order reduction of second-order MIMO systems with proportional dam
The model order reduction of second-order dynamical multi-input and multi-output (MIMO) systems with proportional damping arising in the numerical simulation of mechanical structu...
Thomas Bonin, Heike Faßbender, Andreas Soppa...
MCS
2016
Springer
3 years 6 months ago
A discontinuous Galerkin method for two-layer shallow water equations
In this paper, we study a discontinuous Galerkin method to approximate solutions of the two-layer shallow water equations on non-flat topography. The layers can be formed in the ...
Nouh Izem, Mohammed Seaïd, Mohamed Wakrim
MCS
2016
Springer
3 years 6 months ago
Limit cycles bifurcating from a degenerate center
We study the maximum number of limit cycles that can bifurcate from a degenerate center of a cubic homogeneous polynomial differential system. Using the averaging method of secon...
Jaume Llibre, Chara Pantazi
CIARP
2013
Springer
5 years 5 months ago
Pattern Recognition Systems under Attack
Pattern recognition systems have been increasingly used in security applications, although it is known that carefully crafted attacks can compromise their security. We advocate tha...
Fabio Roli, Battista Biggio, Giorgio Fumera

10
posts
with
2192
views
369profile views Browse  My Posts »
lambertoballanPostdoctoral
University of Florence, Italy
lambertoballan

7
posts
with
2745
views
681profile views Browse  My Posts »
amitakResearch Scientist, Manager
Siemens
amitak

1
posts
with
547
views
539profile views Browse  My Posts »
Zhiwu HuangStudent, PhD
ICT,CAS
Zhiwu Huang
Born in PuTian+ PhD candidate, Visual Information Processing and Learning (VIPL) group, Insititue of Computing Technology (ICT), Chinese Academy of Sciences (CAS).
books