You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The present book includes a set of selected extended papers from the second International Joint Conference on Computational Intelligence (IJCCI 2010), held in Valencia, Spain, from 24 to 26 October 2010. The conference was composed by three co-located conferences: The International Conference on Fuzzy Computation (ICFC), the International Conference on Evolutionary Computation (ICEC), and the International Conference on Neural Computation (ICNC). Recent progresses in scientific developments and applications in these three areas are reported in this book. IJCCI received 236 submissions, from 49 countries, in all continents. After a double blind paper review performed by the Program Committee,...
The present book includes a set of selected papers from the fourth “International Conference on Informatics in Control Automation and Robotics” (ICINCO 2007), held at the University of Angers, France, from 9 to 12 May 2007. The conference was organized in three simultaneous tracks: “Intelligent Control Systems and Optimization”, “Robotics and Automation” and “Systems Modeling, Signal Processing and Control”. The book is based on the same structure. ICINCO 2007 received 435 paper submissions, from more than 50 different countries in all continents. From these, after a blind review process, only 52 where accepted as full papers, of which 22 were selected for inclusion in this b...
Decision trees and decision rule systems are widely used in different applications as algorithms for problem solving, as predictors, and as a way for knowledge representation. Reducts play key role in the problem of attribute (feature) selection. The aims of this book are (i) the consideration of the sets of decision trees, rules and reducts; (ii) study of relationships among these objects; (iii) design of algorithms for construction of trees, rules and reducts; and (iv) obtaining bounds on their complexity. Applications for supervised machine learning, discrete optimization, analysis of acyclic programs, fault diagnosis, and pattern recognition are considered also. This is a mixture of research monograph and lecture notes. It contains many unpublished results. However, proofs are carefully selected to be understandable for students. The results considered in this book can be useful for researchers in machine learning, data mining and knowledge discovery, especially for those who are working in rough set theory, test theory and logical analysis of data. The book can be used in the creation of courses for graduate students.
The experience developed by Ian McHarg represents the first attempt to base environmental planning on more objective methods. In particular, he supposed that the real world can be considered as a layer cake and each layer represents a sectoral analysis. This metaphor represents the fundamental of overlay mapping. At the beginning, these principles have been applied only by hand, just considering the degree of darkness, produced by layer transparency, as a negative impact. In the following years, this craftmade approach, has been adopted for data organization in Geographical Information Systems producing analyses with a high level of quality and rigour. Nowadays, great part of studies in envi...
Contemporary design in engineering and industry relies heavily on computer simulation and efficient algorithms to reduce the cost and to maximize the performance and sustainability as well as profits and energy efficiency. Solving an optimization problem correctly and efficiently requires not only the right choice of optimization algorithms and simulation methods, but also the proper implementation and insight into the problem of interest. This book consists of ten self-contained, detailed case studies of real-world optimization problems, selected from a wide range of applications and contributed from worldwide experts who are working in these exciting areas. Optimization topics and applicat...
With the rapid expansion of the Internet over the last 20 years, event-based distributed systems are playing an increasingly important role in a broad range of application domains, including enterprise management, environmental monitoring, information dissemination, finance, pervasive systems, autonomic computing, collaborative working and learning, and geo-spatial systems. Many different architectures, languages and technologies are being used for implementing event-based distributed systems, and much of the development has been undertaken independently by different communities. However, a common factor is an ever-increasing complexity. Users and developers expect that such systems are able...
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
This volume constitutes the refereed proceedings of the following 9 international workshops: OTM Academy, OTM Industry Case Studies Program, Cloud and Trusted Computing, C&TC, Enterprise Integration, Interoperability, and Networking, EI2N, Industrial and Business Applications of Semantic Web Technologies, INBAST, Information Systems, om Distributed Environment, ISDE, Methods, Evaluation, Tools and Applications for the Creation and Consumption of Structured Data for the e-Society, META4eS, Mobile and Social Computing for collaborative interactions, MSC, and Ontology Content, OnToContent 2014. These workshops were held as associated events at OTM 2014, the federated conferences "On The Move To...
This book focuses on next generation data technologies in support of collective and computational intelligence. The book brings various next generation data technologies together to capture, integrate, analyze, mine, annotate and visualize distributed data – made available from various community users – in a meaningful and collaborative for the organization manner. A unique perspective on collective computational intelligence is offered by embracing both theory and strategies fundamentals such as data clustering, graph partitioning, collaborative decision making, self-adaptive ant colony, swarm and evolutionary agents. It also covers emerging and next generation technologies in support o...
One of the most challenging issues for the intelligent decision systems is to effectively manage the large-scale complex distributed environments such as computational clouds, grids, ad hoc and P2P networks, under the different types of users, their relations, and real-world uncertainties. In this context the IT resources and services usually belong to different owners (institutions, enterprises, or individuals) and are managed by different administrators. These administrators conform to different sets of rules and configuration directives, and can impose different usage policies on the system users. Additionally, uncertainties are presented in various types of information that are incomplet...