You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-proceedings of the 4th International Conference on Machine Learning and Cybernetics, ICMLC 2005, held in Guangzhou, China in August 2005. The 114 revised full papers of this volume are organized in topical sections on agents and distributed artificial intelligence, control, data mining and knowledge discovery, fuzzy information processing, learning and reasoning, machine learning applications, neural networks and statistical learning methods, pattern recognition, vision and image processing.
This is Volume II of a three volume set constituting the refereed proceedings of the Third International Symposium on Neural Networks, ISNN 2006. 616 revised papers are organized in topical sections on neurobiological analysis, theoretical analysis, neurodynamic optimization, learning algorithms, model design, kernel methods, data preprocessing, pattern classification, computer vision, image and signal processing, system modeling, robotic systems, transportation systems, communication networks, information security, fault detection, financial analysis, bioinformatics, biomedical and industrial applications, and more.
This is a unique and conclusive reference work about the 6,000 individual men and women known to us from China’s formative first empires. Over decennia Michael Loewe (Cambridge, UK) has painstakingly collected all biographical information available. Not only those are dealt with who set the literary forms and intellectual background of traditional China, such as writers, scholars, historians and philosophers, but also those officials who administered the empire, and the military leaders who fought in civil warfare or with China’s neighbours. The work draws on primary historical sources as interpreted by Chinese, Japanese and Western scholars and as supplemented by archaeological finds and inscriptions. By devoting extensive entries to each of the emperors the author provides the reader with the necessary historical context and gives insight into the dynastic disputes and their far-reaching consequences. No comparable work exists for this important period of Chinese history. Without exaggeration a real must for historians of both China and other cultures.
None
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and def...
This book constitutes the refereed proceedings of the 5th European Workshop on Case-Based Reasonning, EWCBR 2000, held in Trento, Italy in September 2000. The 40 revised full papers presented together with two invited contributions were carefully reviewed and selected for inclusion in the book. All curves issues in case-based reasoning, ranging from foundational and theoretical aspects to advanced applications in various fields are addressed.
This book includes 70 selected papers from the Ninth International Conference on Fuzzy Information and Engineering (ICFIE) Satellite, which was held on December 26–30, 2018; and from the 9th International Conference on Fuzzy Information and Engineering (ICFIAE), which was held on February 13–15, 2019. The two conferences presented the latest research in the areas of fuzzy information and engineering, operational research and management, and their applications.
This volume details the latest state-of-the-art research on computational intelligence paradigms in healthcare in the intelligent agent environment. The book presents seven chapters selected from the rapidly growing application areas of computational intelligence to healthcare systems. These include intelligent synthetic characters, man-machine interface, menu generators, analysis of user acceptance, pictures archiving and communication systems.