Listing 1 - 10 of 16 | << page >> |
Sort by
|
Choose an application
Fiction --- Thematology --- Spanish-American literature --- Puerto Rico
Choose an application
Choose an application
This book emphasizes the increasingly important role that Computational Intelligence (CI) methods are playing in solving a myriad of entangled Wireless Sensor Networks (WSN) related problems. The book serves as a guide for surveying several state-of-the-art WSN scenarios in which CI approaches have been employed. The reader finds in this book how CI has contributed to solve a wide range of challenging problems, ranging from balancing the cost and accuracy of heterogeneous sensor deployments to recovering from real-time sensor failures to detecting attacks launched by malicious sensor nodes and enacting CI-based security schemes. Network managers, industry experts, academicians and practitioners alike (mostly in computer engineering, computer science or applied mathematics) benefit from the spectrum of successful applications reported in this book. Senior undergraduate or graduate students may discover in this book some problems well suited for their own research endeavors. USP: Presents recent advances and future challenges of computational intelligence (CI) in wireless sensor networks Surveys the state of the art in CI applied to challenging real-world problems in the wireless sensor networks realm Is useful for researchers, network managers, industry experts, academicians, and practitioners who all benefit from the wide spectrum of successful application domains.
Engineering. --- Artificial intelligence. --- Computational intelligence. --- Electrical engineering. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Communications Engineering, Networks. --- Electric engineering --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Construction --- Intelligence, Computational --- Engineering --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Industrial arts --- Technology --- Artificial intelligence --- Soft computing --- Telecommunication. --- Artificial Intelligence. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting
Choose an application
This book offers a timely overview of fuzzy and rough set theories and methods. Based on selected contributions presented at the International Symposium on Fuzzy and Rough Sets, ISFUROS 2017, held in Varadero, Cuba, on October 24-26, 2017, the book also covers related approaches, such as hybrid rough-fuzzy sets and hybrid fuzzy-rough sets and granular computing, as well as a number of applications, from big data analytics, to business intelligence, security, robotics, logistics, wireless sensor networks and many more. It is intended as a source of inspiration for PhD students and researchers in the field, fostering not only new ideas but also collaboration between young researchers and institutions and established ones.
Engineering. --- Operations research. --- Computer simulation. --- Computational Intelligence. --- Operations Research/Decision Theory. --- Simulation and Modeling. --- Control and Systems Theory. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Operational analysis --- Operational research --- Industrial engineering --- Management science --- Research --- System theory --- Construction --- Industrial arts --- Technology --- Fuzzy sets. --- Sets, Fuzzy --- Fuzzy mathematics --- Set theory --- Computational intelligence. --- Decision making. --- Control engineering. --- Control engineering --- Control equipment --- Control theory --- Engineering instruments --- Automation --- Programmable controllers --- Deciding --- Decision (Psychology) --- Decision analysis --- Decision processes --- Making decisions --- Management --- Management decisions --- Choice (Psychology) --- Problem solving --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Decision making
Choose an application
This book emphasizes the increasingly important role that Computational Intelligence (CI) methods are playing in solving a myriad of entangled Wireless Sensor Networks (WSN) related problems. The book serves as a guide for surveying several state-of-the-art WSN scenarios in which CI approaches have been employed. The reader finds in this book how CI has contributed to solve a wide range of challenging problems, ranging from balancing the cost and accuracy of heterogeneous sensor deployments to recovering from real-time sensor failures to detecting attacks launched by malicious sensor nodes and enacting CI-based security schemes. Network managers, industry experts, academicians and practitioners alike (mostly in computer engineering, computer science or applied mathematics) benefit from the spectrum of successful applications reported in this book. Senior undergraduate or graduate students may discover in this book some problems well suited for their own research endeavors. USP: Presents recent advances and future challenges of computational intelligence (CI) in wireless sensor networks Surveys the state of the art in CI applied to challenging real-world problems in the wireless sensor networks realm Is useful for researchers, network managers, industry experts, academicians, and practitioners who all benefit from the wide spectrum of successful application domains.
Telecommunication technology --- Applied physical engineering --- Mass communications --- Artificial intelligence. Robotics. Simulation. Graphics --- neuronale netwerken --- fuzzy logic --- cybernetica --- draadloze computernetwerken --- tekstverwerking --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- communicatietechnologie
Choose an application
Choose an application
This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.
Computer Science --- Engineering & Applied Sciences --- Engineering. --- Artificial intelligence. --- System safety. --- Computational intelligence. --- Computational Intelligence. --- Artificial Intelligence (incl. Robotics). --- Security Science and Technology. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Construction --- Industrial arts --- Technology --- Prevention --- Artificial Intelligence.
Choose an application
Along the years, rough set theory has earned a well-deserved reputation as a sound methodology for dealing with imperfect knowledge in a simple though mathematically sound way. This edited volume aims at continue stressing the benefits of applying rough sets in many real-life situations while still keeping an eye on topological aspects of the theory as well as strengthening its linkage with other soft computing paradigms. The volume comprises 11 chapters and is organized into three parts. Part 1 deals with theoretical contributions while Parts 2 and 3 focus on several real world data mining applications. Chapters authored by pioneers were selected on the basis of fundamental ideas/concepts rather than the thoroughness of techniques deployed. Academics, scientists as well as engineers working in the rough set, computational intelligence, soft computing and data mining research area will find the comprehensive coverage of this book invaluable.
Choose an application
Choose an application
Listing 1 - 10 of 16 | << page >> |
Sort by
|