You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A cursory glance at the table of contents of EANN 2009 reveals the am- ing range of neural network and related applications. A random but revealing sample includes: reducing urban concentration, entropy topography in epil- tic electroencephalography, phytoplanktonic species recognition, revealing the structure of childhood abdominal pain data, robot control, discriminating angry and happy facial expressions, ?ood forecasting, and assessing credit worthiness. The diverse nature of applications demonstrates the vitality of neural comp- ing and related soft computing approaches, and their relevance to many key contemporary technological challenges. It also illustrates the value of EANN in bring...
In today’s society, where technology is ubiquitous, protecting ourselves with firewalls is as important as defending ourselves with firepower. New technology is providing criminals with a world of opportunity, while law enforcement agencies all over the world are struggling to cope. E-security is an issue of global importance. In many ways, cybercrime is no different to more traditional types of crime – both involve identifying targets, using surveillance and psychological profiling of potential victims. The major difference is that the perpetrators of cybercrime are increasingly remote to the scene of their crime and that in some cases their victims may not even realize that a crime is taking place. Knowledge of the techniques being used by criminals and the technology and tra- ing available to combat them is essential in fighting cybercrime. Establishing dialogue between crime-fighting agencies, the security industry, researchers and experts can provide a platform from which e-security can be examined from several global p- spectives.
This three volume set LNCS 6352, LNCS 6353, and LNCS 6354 constitutes the refereed proceedings of the 20th International Conference on Artificial Neural Networks, ICANN 2010, held in Thessaloniki, Greece, in September 2010. The 102 revised full papers, 68 short papers and 29 posters presented were carefully reviewed and selected from 241 submissions. The second volume is divided in topical sections on Kernel algorithms – support vector machines, knowledge engineering and decision making, recurrent ANN, reinforcement learning, robotics, self organizing ANN, adaptive algorithms – systems, and optimization.
Agility has become very important for the industries today as the lifetimes of the products are continuously shrinking. This book provides an excellent opportunity for updating understanding of agile methods from the design, manufacturing and business process perspectives, whether one is an industrial practitioner, academic researcher engineer or business graduate student. This volume is a compilation of various important aspects of agility consisting of systemic considerations in manufacturing, agile software systems, agile business systems, agile operations research, flexible manufacturing systems, advanced manufacturing systems with improved materials and mechanical behavior of products, agile aspects of design, clean and green manufacturing systems, environment, agile defence systems.
This book constitutes the refereed proceedings of the 9th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2013, held in Paphos, Cyprus, in September/October 2013. The 26 revised full papers presented together with a keynote speech at the main event and 44 papers of 8 collocated workshops were carefully reviewed and selected for inclusion in the volume. The papers of the main event are organized in topical sections on data mining, medical informatics and biomedical engineering, problem solving and scheduling, modeling and decision support systems, robotics, and intelligent signal and image processing.
The two volumes set, CCIS 383 and 384, constitutes the refereed proceedings of the 14th International Conference on Engineering Applications of Neural Networks, EANN 2013, held on Halkidiki, Greece, in September 2013. The 91 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of artificial neural networks and other soft computing approaches to various fields such as pattern recognition-predictors, soft computing applications, medical applications of AI, fuzzy inference, evolutionary algorithms, classification, learning and data mining, control techniques-aspects of AI evolution, image and video analysis, classification, pattern recognition, social media and community based governance, medical applications of AI-bioinformatics and learning.
The ever expanding abundance of information and computing power enables - searchers and users to tackle highly interesting issues, such as applications prov- ing personalized access and interactivity to multimodal information based on user preferences and semantic concepts or human-machine interface systems utilizing information on the affective state of the user. The general focus of the AIAI conf- ence is to provide insights on how AI can be implemented in real world applications. This volume contains papers selected for presentation at the 5th IFIP Conf- ence on Artificial Intelligence Applications & Innovations (AIAI 2009) being held from 23rd till 25th of April, in Thessaloniki, Greece....
This handbook presents some of the most recent topics in neural information processing, covering both theoretical concepts and practical applications. The contributions include: Deep architectures Recurrent, recursive, and graph neural networks Cellular neural networks Bayesian networks Approximation capabilities of neural networks Semi-supervised learning Statistical relational learning Kernel methods for structured data Multiple classifier systems Self organisation and modal learning Applications to content-based image retrieval, text mining in large document collections, and bioinformatics This book is thought particularly for graduate students, researchers and practitioners, willing to deepen their knowledge on more advanced connectionist models and related learning paradigms.
This book constitutes the thoroughly refereed post-proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2006, held in Guangzhou, China in November 2006. The 116 revised papers presented were carefully reviewed and selected from a total of 2078 initial submissions during two rounds of revision and improvement. The papers are organized in topical sections on bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, as well as pattern recognition.
This second and revised edition contains a detailed introduction to the key classes of intelligent data analysis methods. The twelve coherently written chapters by leading experts provide complete coverage of the core issues. The first half of the book is devoted to the discussion of classical statistical issues. The following chapters concentrate on machine learning and artificial intelligence, rule induction methods, neural networks, fuzzy logic, and stochastic search methods. The book concludes with a chapter on visualization and an advanced overview of IDA processes.