You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the International Joint Conference on Rough Sets, IJCRS 2022, held in Suzhou, China, in November 2022. The 28 full papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: Invited papers, IRSS President Forum; rough set theory and applications; granular computing and applications; classification and deep learning; conceptual knowledge discovery and machine learning based on three-way decisions and granular computing; uncertainty in three-way decisions; granular computing, and data science.
This book constitutes the refereed proceedings of the International Joint Conference on Rough Sets, IJCRS 2023, held in Krakow, Poland, during October 5–8, 2023. The 43 full papers included in this book were carefully reviewed and selected from 83 submissions. They were organized in topical sections as follows: Rough Set Models, Foundations, Three-way Decisions, Granular Models, Distances and Similarities, Hybrid Approaches, Applications, Cybersecurity and IoT.
Evolutionary algorithms and metaheuristics are widely used to provide efficient and effective approximate solutions to computationally hard optimization problems. With the widespread use of intelligent systems in recent years, evolutionary algorithms have been applied, beyond classical optimization problems, to AI system parameter optimization and the design of artificial neural networks and feature selection in machine learning systems. This volume will present recent results of applications of the most successful metaheuristics, from differential evolution and particle swarm optimization to artificial neural networks, loT allocation, and multi-objective optimization problems. It will also provide a broad view of the role and the potential of evolutionary algorithms as service components in Al systems.
This book constitutes the thoroughly refereed joint post-workshop proceedings of three international workshops held in conjunction with the 10th Asia-Pacific Web Conference, APWeb 2008, in Shenyang, China, in April 2008 (see LNCS 4976). The 15 revised full papers presented together with 4 invited papers and 4 keynote lectures were carefully reviewed and selected from numerous submissions. Topics addressed by the workshops are business intelligence and data mining (BIDM 2008), health data management (IWHDM 2008), and data engineering and Web technology research (DeWeb 2008). The papers focus on issues such as Web searching, Web services, database, data mining, bioinformatics, and business intelligence.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart...
This book consists of the papers accepted after a careful review process at an international scientific meeting where the latest developments on intelligent and fuzzy systems are presented and discussed. The latest developments in both the theoretical and practical fields of the new fuzzy set extensions have been prepared by expert researchers. Contributed by participants from more than 40 different countries, this book is also a useful resource in terms of showing the levels that fuzzy and intelligent systems have reached in various countries of the world. The intended readers are intelligent and fuzzy systems researchers, lecturers, M.Sc., and Ph.D. students studying fuzzy sets and artificial intelligence. The book covers fuzzy logic theory and applications, heuristics, and metaheuristics from optimization to machine learning, from quality management to risk management, making the book an excellent source for researchers.
Textile-based compression therapy is used in a range of applications, such as for athlete and sport recovery, enhanced proprioception, compression spacesuits, and in the management of chronic diseases. This book provides an overview of compression devices and products, testing methods to measure the properties of materials used in compression devices, and design considerations based on dynamic body measurements. It also includes a model for predicting pressure and details the challenges in applying compression for various applications. Chapters in this book: Discuss the science behind compression therapy Delve into the materials used in compression devices and products and assesses their performance based on their properties and structure Cover theoretical modeling to predict the pressure exerted by compression devices on the human body Consider compression textile design based on dynamic body measurements This book is aimed at professionals and researchers in textile engineering, materials engineering, biotechnology, and the development of textile-based compression devices and products, and at such medical practitioners as phlebologists.
Proceedings of the International Conference on Cybernetics and Informatics (ICCI 2012) covers the hybridization in control, computer, information, communications and applications. ICCI 2012 held on September 21-23, 2012, in Chongqing, China, is organized by Chongqing Normal University, Chongqing University, Nanyang Technological University, Shanghai Jiao Tong University, Hunan Institute of Engineering, Beijing University, and sponsored by National Natural Science Foundation of China (NSFC). This two volume publication includes selected papers from the ICCI 2012. Covering the latest research advances in the area of computer, informatics, cybernetics and applications, which mainly includes the computer, information, control, communications technologies and applications.
Surface engineering can be defined as an enabling technology used in a wide range of industrial activities. Surface engineering was founded by detecting surface features which destroy most of pieces, e.g. abrasion, corrosion, fatigue, and disruption; then it was recognized, more than ever, that most technological advancements are constrained with surface requirements. In a wide range of industry (such as gas and oil exploitation, mining, and manufacturing), the surfaces generate an important problem in technological advancement. Passing time shows us new interesting methods in surface engineering. These methods usually apply to enhance the surface properties, e.g. wear rate, fatigue, abrasion, and corrosion resistance. This book collects some of new methods in surface engineering.