LEADER 03495nam 2200601 450 001 9910437898403321 005 20210305101132.0 010 $a3-319-00560-X 024 7 $a10.1007/978-3-319-00560-7 035 $a(CKB)3390000000037156 035 $a(DE-He213)978-3-319-00560-7 035 $a(SSID)ssj0001008680 035 $a(PQKBManifestationID)11545887 035 $a(PQKBTitleCode)TC0001008680 035 $a(PQKBWorkID)10967943 035 $a(PQKB)10140674 035 $a(MiAaPQ)EBC3091900 035 $a(MiAaPQ)EBC6367915 035 $a(Au-PeEL)EBL3091900 035 $a(CaPaEBR)ebr10962444 035 $a(OCoLC)842130452 035 $a(PPN)169137597 035 $a(EXLCZ)993390000000037156 100 $a20210305d2013 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aModeling approaches and algorithms for advanced computer applications /$fAbdelmalek Amine, Otmane Ait Mohamed, Ladjel Bellatreche, editors 205 $a1st ed. 2013. 210 1$aCham, Switzerland :$cSpringer,$d[2013] 210 4$d©2013 215 $a1 online resource (XII, 428 p. 204 illus.) 225 1 $aStudies in Computational Intelligence,$x1860-949X ;$v488 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-00559-6 327 $aInvited Talks -- Computational Intelligence (CI) -- Security Network Technologies (SNT) -- Information Technology (IT) -- Computer Systems and Applications (CSA). 330 $a    "During the last decades Computational Intelligence has emerged and showed its contributions in various broad research communities (computer science, engineering, finance, economic, decision making, etc.). This was done by proposing approaches and algorithms based either on turnkey techniques belonging to the large panoply of solutions offered by computational intelligence such as data mining, genetic algorithms, bio-inspired methods, Bayesian networks, machine learning, fuzzy logic, artificial neural networks, etc. or inspired by computational intelligence techniques to develop new ad-hoc algorithms for the problem under consideration.    This volume is a comprehensive collection of extended contributions from the 4th International Conference on Computer Science and Its Applications (CIIA?2013) organized into four main tracks: Track 1: Computational Intelligence, Track  2: Security & Network Technologies, Track  3: Information Technology and Track 4: Computer Systems and Applications. This book presents recent advances in the use and exploitation of computational intelligence in several real world hard problems covering these tracks such as image processing, Arab text processing, sensor and mobile networks, physical design of advanced databases, model matching, etc. that require advanced approaches and algorithms borrowed from computational intelligence for solving them. 410 0$aStudies in Computational Intelligence,$x1860-949X ;$v488 606 $aComputer science$vCongresses 615 0$aComputer science 676 $a004 702 $aAmine$b Abdelmalek 702 $aAit Mohamed$b Otmane 702 $aBellatreche$b Ladjel$f1968- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910437898403321 996 $aModeling approaches and algorithms for advanced computer applications$92512330 997 $aUNINA