Advances in computer science and information technology : AST/UCMA/ISA/ACN 2010 conferences, Miyazaki, Japan, June 23-25, 2010 : joint proceedings / / Tai-hoon Kim, Hojjat Adeli (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, : Springer, 2010 |
Descrizione fisica | 1 online resource (XIII, 604 p. 261 illus.) |
Disciplina | 004 |
Altri autori (Persone) |
KimTai-hoon
AdeliHojjat <1950-> |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 3, information systems and application, incl. Internet/Web and HCI |
Soggetto topico |
Computer science
Information technology |
ISBN |
1-280-38711-4
9786613565037 3-642-13577-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Security and Assurance -- Fuzzy Based Threat Analysis in Total Hospital Information System -- An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model -- A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition -- Information Systems Security Criticality and Assurance Evaluation -- Security Analysis of ‘Two–Factor User Authentication in Wireless Sensor Networks’ -- Directed Graph Pattern Synthesis in LSB Technique on Video Steganography -- Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning -- Post-quantum Cryptography: Code-Based Signatures -- Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol -- A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems -- An Active Intrusion Detection System for LAN Specific Attacks -- Analysis on the Improved SVD-Based Watermarking Scheme -- Advanced Communication and Networking -- Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes -- Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks -- Grammar Encoding in DNA-Like Secret Sharing Infrastructure -- HATS: High Accuracy Timestamping System Based on NetFPGA -- A Roadside Unit Placement Scheme for Vehicular Telematics Networks -- Concurrent Covert Communication Channels -- Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks -- High Performance MAC Architecture for 3GPP Modem -- Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T -- A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network -- A Model for Interference on Links in Inter-working Multi-hop Wireless Networks -- An Optimum ICA Based Multiuser Data Separation for Short Message Service -- Advanced Computer Science and Information Technology -- Multiple Asynchronous Requests on a Client-Based Mashup Page -- Using an Integrated Ontology Database to Categorize Web Pages -- Topic Detection by Topic Model Induced Distance Using Biased Initiation -- Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm -- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition -- Agent Based Approach to Regression Testing -- A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem -- Development of a Digital Textbook Standard Format Based on XML -- A Pattern-Based Representation Approach for Online Discourses -- A Fault Tolerant Architecture for Transportation Information Services of E-Government -- Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS -- Extract Semantic Information from WordNet to Improve Text Classification Performance -- Managing Ubiquitous Scientific Knowledge on Semantic Web -- A Semantic Pattern Approach to Managing Scientific Publications -- A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults -- Markov Chain Monte Carlo Random Testing -- An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics -- Ubiquitous Computing and Multimedia Applications -- An Effective Video Steganography Method for Biometric Identification -- A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction -- Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis -- Video Copy Detection: Sequence Matching Using Hypothesis Test -- An XML-Based Digital Textbook and Its Educational Effectiveness -- SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition -- Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network -- A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming -- Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech -- CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture -- A Power Control Scheme for an Energy-Efficient MAC Protocol -- Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks. |
Record Nr. | UNINA-9910484604103321 |
Berlin, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computational intelligence [[electronic resource] ] : synergies of fuzzy logic, neural networks and evolutionary computing / / Nazmul Siddique, Hojjat Adeli |
Autore | Siddique N. H |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester [England], : John Wiley & Sons Inc., 2013 |
Descrizione fisica | 1 online resource (534 p.) |
Disciplina | 006.3 |
Altri autori (Persone) | AdeliHojjat <1950-> |
Soggetto topico | Computational intelligence |
ISBN |
1-118-53482-4
1-118-53481-6 1-299-40270-4 1-118-53480-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
COMPUTATIONAL INTELLIGENCE: SYNERGIES OF FUZZY LOGIC, NEURAL NETWORKS AND EVOLUTIONARY COMPUTING; Contents; Foreword; Preface; Acknowledgements; 1 Introduction to Computational Intelligence; 1.1 Computational Intelligence; 1.2 Paradigms of Computational Intelligence; 1.3 Approaches to Computational Intelligence; 1.3.1 Fuzzy Logic; 1.3.2 Neural Networks; 1.3.3 Evolutionary Computing; 1.3.4 Learning Theory; 1.3.5 Probabilistic Methods; 1.3.6 Swarm Intelligence; 1.4 Synergies of Computational Intelligence Techniques; 1.5 Applications of Computational Intelligence
1.6 Grand Challenges of Computational Intelligence1.7 Overview of the Book; 1.8 MATLAB® Basics; References; 2 Introduction to Fuzzy Logic; 2.1 Introduction; 2.2 Fuzzy Logic; 2.3 Fuzzy Sets; 2.4 Membership Functions; 2.4.1 Triangular MF; 2.4.2 Trapezoidal MF; 2.4.3 Gaussian MF; 2.4.4 Bell-shaped MF; 2.4.5 Sigmoidal MF; 2.5 Features of MFs; 2.5.1 Support; 2.5.2 Core; 2.5.3 Fuzzy Singleton; 2.5.4 Crossover Point; 2.6 Operations on Fuzzy Sets; 2.7 Linguistic Variables; 2.7.1 Features of Linguistic Variables; 2.8 Linguistic Hedges; 2.9 Fuzzy Relations; 2.9.1 Compositional Rule of Inference 2.10 Fuzzy If-Then Rules2.10.1 Rule Forms; 2.10.2 Compound Rules; 2.10.3 Aggregation of Rules; 2.11 Fuzzification; 2.12 Defuzzification; 2.13 Inference Mechanism; 2.13.1 Mamdani Fuzzy Inference; 2.13.2 Sugeno Fuzzy Inference; 2.13.3 Tsukamoto Fuzzy Inference; 2.14 Worked Examples; 2.15 MATLAB® Programs; References; 3 Fuzzy Systems and Applications; 3.1 Introduction; 3.2 Fuzzy System; 3.3 Fuzzy Modelling; 3.3.1 Structure Identification; 3.3.2 Parameter Identification; 3.3.3 Construction of Parameterized Membership Functions; 3.4 Fuzzy Control; 3.4.1 Fuzzification; 3.4.2 Inference Mechanism 3.4.3 Rule Base3.4.4 Defuzzification; 3.5 Design of Fuzzy Controller; 3.5.1 Input/Output Selection; 3.5.2 Choice of Membership Functions; 3.5.3 Creation of Rule Base; 3.5.4 Types of Fuzzy Controller; 3.6 Modular Fuzzy Controller; 3.7 MATLAB® Programs; References; 4 Neural Networks; 4.1 Introduction; 4.2 Artificial Neuron Model; 4.3 Activation Functions; 4.4 Network Architecture; 4.4.1 Feedforward Networks; 4.5 Learning in Neural Networks; 4.5.1 Supervised Learning; 4.5.2 Unsupervised Learning; 4.6 Recurrent Neural Networks; 4.6.1 Elman Networks; 4.6.2 Jordan Networks; 4.6.3 Hopfield Networks 4.7 MATLAB® ProgramsReferences; 5 Neural Systems and Applications; 5.1 Introduction; 5.2 System Identification and Control; 5.2.1 System Description; 5.2.2 System Identification; 5.2.3 System Control; 5.3 Neural Networks for Control; 5.3.1 System Identification for Control Design; 5.3.2 Neural Networks for Control Design; 5.4 MATLAB® Programs; References; 6 Evolutionary Computing; 6.1 Introduction; 6.2 Evolutionary Computing; 6.3 Terminologies of Evolutionary Computing; 6.3.1 Chromosome Representation; 6.3.2 Encoding Schemes; 6.3.3 Population; 6.3.4 Evaluation (or Fitness) Functions 6.3.5 Fitness Scaling |
Record Nr. | UNINA-9910139049903321 |
Siddique N. H | ||
Chichester [England], : John Wiley & Sons Inc., 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computational intelligence : synergies of fuzzy logic, neural networks and evolutionary computing / / Nazmul Siddique, Hojjat Adeli |
Autore | Siddique N. H |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester [England], : John Wiley & Sons Inc., 2013 |
Descrizione fisica | 1 online resource (534 p.) |
Disciplina | 006.3 |
Altri autori (Persone) | AdeliHojjat <1950-> |
Soggetto topico | Computational intelligence |
ISBN |
9781118534823
1118534824 9781118534816 1118534816 9781299402706 1299402704 9781118534809 1118534808 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
COMPUTATIONAL INTELLIGENCE: SYNERGIES OF FUZZY LOGIC, NEURAL NETWORKS AND EVOLUTIONARY COMPUTING; Contents; Foreword; Preface; Acknowledgements; 1 Introduction to Computational Intelligence; 1.1 Computational Intelligence; 1.2 Paradigms of Computational Intelligence; 1.3 Approaches to Computational Intelligence; 1.3.1 Fuzzy Logic; 1.3.2 Neural Networks; 1.3.3 Evolutionary Computing; 1.3.4 Learning Theory; 1.3.5 Probabilistic Methods; 1.3.6 Swarm Intelligence; 1.4 Synergies of Computational Intelligence Techniques; 1.5 Applications of Computational Intelligence
1.6 Grand Challenges of Computational Intelligence1.7 Overview of the Book; 1.8 MATLAB® Basics; References; 2 Introduction to Fuzzy Logic; 2.1 Introduction; 2.2 Fuzzy Logic; 2.3 Fuzzy Sets; 2.4 Membership Functions; 2.4.1 Triangular MF; 2.4.2 Trapezoidal MF; 2.4.3 Gaussian MF; 2.4.4 Bell-shaped MF; 2.4.5 Sigmoidal MF; 2.5 Features of MFs; 2.5.1 Support; 2.5.2 Core; 2.5.3 Fuzzy Singleton; 2.5.4 Crossover Point; 2.6 Operations on Fuzzy Sets; 2.7 Linguistic Variables; 2.7.1 Features of Linguistic Variables; 2.8 Linguistic Hedges; 2.9 Fuzzy Relations; 2.9.1 Compositional Rule of Inference 2.10 Fuzzy If-Then Rules2.10.1 Rule Forms; 2.10.2 Compound Rules; 2.10.3 Aggregation of Rules; 2.11 Fuzzification; 2.12 Defuzzification; 2.13 Inference Mechanism; 2.13.1 Mamdani Fuzzy Inference; 2.13.2 Sugeno Fuzzy Inference; 2.13.3 Tsukamoto Fuzzy Inference; 2.14 Worked Examples; 2.15 MATLAB® Programs; References; 3 Fuzzy Systems and Applications; 3.1 Introduction; 3.2 Fuzzy System; 3.3 Fuzzy Modelling; 3.3.1 Structure Identification; 3.3.2 Parameter Identification; 3.3.3 Construction of Parameterized Membership Functions; 3.4 Fuzzy Control; 3.4.1 Fuzzification; 3.4.2 Inference Mechanism 3.4.3 Rule Base3.4.4 Defuzzification; 3.5 Design of Fuzzy Controller; 3.5.1 Input/Output Selection; 3.5.2 Choice of Membership Functions; 3.5.3 Creation of Rule Base; 3.5.4 Types of Fuzzy Controller; 3.6 Modular Fuzzy Controller; 3.7 MATLAB® Programs; References; 4 Neural Networks; 4.1 Introduction; 4.2 Artificial Neuron Model; 4.3 Activation Functions; 4.4 Network Architecture; 4.4.1 Feedforward Networks; 4.5 Learning in Neural Networks; 4.5.1 Supervised Learning; 4.5.2 Unsupervised Learning; 4.6 Recurrent Neural Networks; 4.6.1 Elman Networks; 4.6.2 Jordan Networks; 4.6.3 Hopfield Networks 4.7 MATLAB® ProgramsReferences; 5 Neural Systems and Applications; 5.1 Introduction; 5.2 System Identification and Control; 5.2.1 System Description; 5.2.2 System Identification; 5.2.3 System Control; 5.3 Neural Networks for Control; 5.3.1 System Identification for Control Design; 5.3.2 Neural Networks for Control Design; 5.4 MATLAB® Programs; References; 6 Evolutionary Computing; 6.1 Introduction; 6.2 Evolutionary Computing; 6.3 Terminologies of Evolutionary Computing; 6.3.1 Chromosome Representation; 6.3.2 Encoding Schemes; 6.3.3 Population; 6.3.4 Evaluation (or Fitness) Functions 6.3.5 Fitness Scaling |
Record Nr. | UNINA-9910828270703321 |
Siddique N. H | ||
Chichester [England], : John Wiley & Sons Inc., 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|