You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Hybrid Computational Intelligence: Challenges and Utilities is a comprehensive resource that begins with the basics and main components of computational intelligence. It brings together many different aspects of the current research on HCI technologies, such as neural networks, support vector machines, fuzzy logic and evolutionary computation, while also covering a wide range of applications and implementation issues, from pattern recognition and system modeling, to intelligent control problems and biomedical applications. The book also explores the most widely used applications of hybrid computation as well as the history of their development. Each individual methodology provides hybrid systems with complementary reasoning and searching methods which allow the use of domain knowledge and empirical data to solve complex problems.
This book addresses extensible and adaptable computing, a broad range of methods and techniques used to systematically tackle the future growth of systems and respond proactively and seamlessly to change. The book is divided into five main sections: Agile Software Development, Data Management, Web Intelligence, Machine Learning and Computing in Education. These sub-domains of computing work together in mutually complementary ways to build systems and applications that scale well, and which can successfully meet the demands of changing times and contexts. The topics under each track have been carefully selected to highlight certain qualitative aspects of applications and systems, such as scal...
Foundations of Computational Intelligence Volume 4: Bio-Inspired Data Mining Theoretical Foundations and Applications Recent advances in the computing and electronics technology, particularly in sensor devices, databases and distributed systems, are leading to an exponential growth in the amount of data stored in databases. It has been estimated that this amount doubles every 20 years. For some applications, this increase is even steeper. Databases storing DNA sequence, for example, are doubling their size every 10 months. This growth is occurring in several applications areas besides bioinformatics, like financial transactions, government data, environmental mo- toring, satellite and medica...
This book constitutes the refereed proceedings of the Second Asian Applied Computing Conference, AACC 2004, held in Kathmandu, Nepal in October 2004. The 42 revised full papers presented were carefully reviewed and selected from 184 submissions. The papers are organized in topical sections on machine learning and soft computing; scheduling, optimization, and constraint solving; neural networks and support vector machines; natural language processing and information retrieval; speech and signal processing; networks and mobile computing; parallel, grid, and high performance computing; innovative applicationsfor the developing world; and cryptography and security.
Nature-Inspired Algorithms have been gaining much popularity in recent years due to the fact that many real-world optimisation problems have become increasingly large, complex and dynamic. The size and complexity of the problems nowadays require the development of methods and solutions whose efficiency is measured by their ability to find acceptable results within a reasonable amount of time, rather than an ability to guarantee the optimal solution. This volume 'Nature-Inspired Algorithms for Optimisation' is a collection of the latest state-of-the-art algorithms and important studies for tackling various kinds of optimisation problems. It comprises 18 chapters, including two introductory chapters which address the fundamental issues that have made optimisation problems difficult to solve and explain the rationale for seeking inspiration from nature. The contributions stand out through their novelty and clarity of the algorithmic descriptions and analyses, and lead the way to interesting and varied new applications.
IDT (Intelligent Decision Technologies) seeks an interchange of research on intelligent systems and intelligent technologies which enhance or improve decision making in industry, government and academia. The focus is interdisciplinary in nature, and includes research on all aspects of intelligent decision technologies, from fundamental development to the applied system. It constitutes a great honor and pleasure for us to publish the works and new research results of scholars from the First KES International Symposium on Intelligent Decision Technologies (KES IDT’09), hosted and organized by University of Hyogo in conjunction with KES International (Himeji, Japan, April, 2009). The symposiu...
This book constitutes the proceedings of the 11th International Conference on Big Data and Artificial Intelligence, BDA 2023, held in Delhi, India, during December 7–9, 2023. The17 full papers presented in this volume were carefully reviewed and selected from 67 submissions. The papers are organized in the following topical sections: Keynote Lectures, Artificial Intelligence in Healthcare, Large Language Models, Data Analytics for Low Resource Domains, Artificial Intelligence for Innovative Applications and Potpourri.
This book constitutes the refereed proceedings of the First International Conference on Digital Image Processing and Pattern Recognition, DPPR 2011, held in Tirunelveli, India, in September 2011. The 48 revised full papers were carefully reviewed and selected from about 400 submissions. The conference brought together leading researchers, engineers and scientists in the domain of Digital Image Processing and Pattern Recognition. The papers cover all theoretical and practical aspects of the field and present new advances and current research results in two tracks, namely: digital image processing and pattern recognition, and computer science, engineering and information technology.
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference on Wireless and Mobile Networks (WiMoN 2010), and the Second International Conference on Web and Semantic Technology (WeST 2010) were held in Chennai, India, during July 23–25, 2010. They attracted many local and int- national delegates, presenting a balanced mixture of intellects from the East and from the West. The goal of these conferences is to bring together researchers and practitioners from academia and industry to focus on understanding computer networks, wireless networks, mobile networks and the Web, semantic technologies and to establish new collaborations in thes...