You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book covers the techniques of data mining, knowledge discovery, genetic algorithms, neural networks, bootstrapping, machine learning, and Monte Carlo simulation. Computational finance, an exciting new cross-disciplinary research area, draws extensively on the tools and techniques of computer science, statistics, information systems, and financial economics. This book covers the techniques of data mining, knowledge discovery, genetic algorithms, neural networks, bootstrapping, machine learning, and Monte Carlo simulation. These methods are applied to a wide range of problems in finance, including risk management, asset allocation, style analysis, dynamic trading and hedging, forecasting, and option pricing. The book is based on the sixth annual international conference Computational Finance 1999, held at New York University's Stern School of Business.
Annotation. This is volume I of the proceedings of the Second International Conference on Natural Computation, ICNC 2006. After a demanding review process 168 carefully revised full papers and 86 revised short papers were selected from 1915 submissions for presentation in two volumes. This first volume includes 130 papers related to artificial neural networks, natural neural systems and cognitive science, neural network applications, as well as evolutionary computation: theory and algorithms.
In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It c...
This book constitutes the refereed proceedings of the 8th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2007, held in Birmingham, UK, in December 2007. The papers include topical sections on learning and information processing, data mining and information management, bioinformatics and neuroinformatics, agents and distributed systems, financial engineering and modeling, and agent-based approach to service sciences.
This book constitutes the refereed proceedings of the 6th International Conference on Independent Component Analysis and Blind Source Separation, ICA 2006, held in Charleston, SC, USA, in March 2006. The 120 revised papers presented were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on algorithms and architectures, applications, medical applications, speech and signal processing, theory, and visual and sensory processing.
This two-volume set (CCIS 873 and CCIS 874) constitutes the thoroughly refereed proceedings of the 9th International Symposium, ISICA 2017, held in Guangzhou, China, in November 2017.The 101 full papers presented in both volumes were carefully reviewed and selected from 181 submissions. This first volume is organized in topical sections on neural networks and statistical learning: neural architecture search, transfer of knowledge; evolutionary multi-objective and dynamic optimization: optimal control and design, hybrid methods; data mining: association rule learning, data management platforms; Cloud computing and multiagent systems: service models, Cloud engineering; everywhere connectivity: IoT solutions, wireless sensor networks.
This book constitutes the refereed proceedings of the 12th International Symposium, ISICA 2021, held in Guangzhou, China, during November 19–21, 2021. The 48 full papers included in this book were carefully reviewed and selected from 99 submissions. They were organized in topical sections as follows: new frontier of multi-objective evolutionary algorithms; intelligent multi-media; data modeling and application of artificial intelligence; exploration of novel intelligent optimization algorithm; and intelligent application of industrial production.
The present book includes a set of selected papers from the Fifth International Conf- ence on Informatics in Control Automation and Robotics (ICINCO 2008), held in Funchal, Madeira - Portugal, from 11 to 15 May 2008. The conference was organized in three simultaneous tracks: Intelligent Control Systems and Optimization, Robotics and Automation, and Systems Modeling, Signal Processing and Control. The book is based on the same structure. ICINCO 2008 received 392 paper submissions, from more than 50 different co- tries in all continents. From these, after a blind review process, only 33 where - cepted as full papers, of which 18 were selected for inclusion in this book, based on the classifications provided by the Program Committee. The selected papers reflect the interdisciplinary nature of the conference. The diversity of topics is an important feature of this conference, enabling an overall perception of several important sci- tific and technological trends. These high quality standards will be maintained and reinforced at ICINCO 2009, to be held in Milan, Italy, and in future editions of this conference.
The two volume set LNCS 3173/3174 constitutes the refereed proceedings of the International Symposium on Neural Networks, ISNN 2004, held in Dalian, China in August 2004. The 329 papers presented were carefully reviewed and selected from more than 800 submissions. The papers span the entire scope of neural computing and its applications; they are organized in 11 major topical parts on theoretical analysis; learning and optimization; support vector machines; blind source separation, independent component analysis, and principal component analysis; clustering and classification; robotics and control; telecommunications; signal image, and time series analysis; biomedical applications; detection, diagnosis, and computer security; and other applications.