Modeling Approaches and Algorithms for Advanced Computer Applications (Record no. 57734)

000 -LEADER
fixed length control field 03299nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-3-319-00560-7
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421112227.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 130426s2013 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783319005607
-- 978-3-319-00560-7
082 04 - CLASSIFICATION NUMBER
Call Number 006.3
245 10 - TITLE STATEMENT
Title Modeling Approaches and Algorithms for Advanced Computer Applications
300 ## - PHYSICAL DESCRIPTION
Number of Pages XV, 440 p.
490 1# - SERIES STATEMENT
Series statement Studies in Computational Intelligence,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Invited Talks -- Computational Intelligence (CI) -- Security Network Technologies (SNT) -- Information Technology (IT) -- Computer Systems and Applications (CSA).
520 ## - SUMMARY, ETC.
Summary, etc     "During the last decades Computational Intelligence has emerged and showed its contributions in various broad research communities (computer science, engineering, finance, economic, decision making, etc.). This was done by proposing approaches and algorithms based either on turnkey techniques belonging to the large panoply of solutions offered by computational intelligence such as data mining, genetic algorithms, bio-inspired methods, Bayesian networks, machine learning, fuzzy logic, artificial neural networks, etc. or inspired by computational intelligence techniques to develop new ad-hoc algorithms for the problem under consideration.    This volume is a comprehensive collection of extended contributions from the 4th International Conference on Computer Science and Its Applications (CIIA'2013) organized into four main tracks: Track 1: Computational Intelligence, Track  2: Security & Network Technologies, Track  3: Information Technology and Track 4: Computer Systems and Applications. This book presents recent advances in the use and exploitation of computational intelligence in several real world hard problems covering these tracks such as image processing, Arab text processing, sensor and mobile networks, physical design of advanced databases, model matching, etc. that require advanced approaches and algorithms borrowed from computational intelligence for solving them.
700 1# - AUTHOR 2
Author 2 Amine, Abdelmalek.
700 1# - AUTHOR 2
Author 2 Otmane, Ait Mohamed.
700 1# - AUTHOR 2
Author 2 Bellatreche, Ladjel.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-319-00560-7
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2013.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational intelligence.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Engineering.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Artificial Intelligence (incl. Robotics).
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1860-949X ;
912 ## -
-- ZDB-2-ENG

No items available.