|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-00560-7 |
003 |
DE-He213 |
005 |
20220112170821.0 |
007 |
cr nn 008mamaa |
008 |
130426s2013 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319005607
|9 978-3-319-00560-7
|
024 |
7 |
|
|a 10.1007/978-3-319-00560-7
|2 doi
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a TEC009000
|2 bisacsh
|
072 |
|
7 |
|a UYQ
|2 thema
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Modeling Approaches and Algorithms for Advanced Computer Applications
|h [electronic resource] /
|c edited by Abdelmalek Amine, Ait Mohamed Otmane, Ladjel Bellatreche.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XV, 440 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Computational Intelligence,
|x 1860-9503 ;
|v 488
|
505 |
0 |
|
|a Invited Talks -- Computational Intelligence (CI) -- Security Network Technologies (SNT) -- Information Technology (IT) -- Computer Systems and Applications (CSA).
|
520 |
|
|
|a "During the last decades Computational Intelligence has emerged and showed its contributions in various broad research communities (computer science, engineering, finance, economic, decision making, etc.). This was done by proposing approaches and algorithms based either on turnkey techniques belonging to the large panoply of solutions offered by computational intelligence such as data mining, genetic algorithms, bio-inspired methods, Bayesian networks, machine learning, fuzzy logic, artificial neural networks, etc. or inspired by computational intelligence techniques to develop new ad-hoc algorithms for the problem under consideration. This volume is a comprehensive collection of extended contributions from the 4th International Conference on Computer Science and Its Applications (CIIA'2013) organized into four main tracks: Track 1: Computational Intelligence, Track 2: Security & Network Technologies, Track 3: Information Technology and Track 4: Computer Systems and Applications. This book presents recent advances in the use and exploitation of computational intelligence in several real world hard problems covering these tracks such as image processing, Arab text processing, sensor and mobile networks, physical design of advanced databases, model matching, etc. that require advanced approaches and algorithms borrowed from computational intelligence for solving them.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Computational Intelligence.
|
650 |
2 |
4 |
|a Artificial Intelligence.
|
700 |
1 |
|
|a Amine, Abdelmalek.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Otmane, Ait Mohamed.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Bellatreche, Ladjel.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319005614
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319033044
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319005591
|
830 |
|
0 |
|a Studies in Computational Intelligence,
|x 1860-9503 ;
|v 488
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-00560-7
|z Texto Completo
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-SXE
|
950 |
|
|
|a Engineering (SpringerNature-11647)
|
950 |
|
|
|a Engineering (R0) (SpringerNature-43712)
|