Listing 1 - 6 of 6 |
Sort by
|
Choose an application
A cursory glance at the table of contents of EANN 2009 reveals the am- ing range of neural network and related applications. A random but revealing sample includes: reducing urban concentration, entropy topography in epil- tic electroencephalography, phytoplanktonic species recognition, revealing the structure of childhood abdominal pain data, robot control, discriminating angry and happy facial expressions, ?ood forecasting, and assessing credit worthiness. The diverse nature of applications demonstrates the vitality of neural comp- ing and related soft computing approaches, and their relevance to many key contemporary technological challenges. It also illustrates the value of EANN in bringing together a broad spectrum of delegates from across the world to learn from each other’s related methods. Variations and extensions of many methods are well represented in the proceedings, ranging from support vector machines, fuzzy reasoning, and Bayesian methods to snap-drift and spiking neurons. This year EANN accepted approximately 40% of submitted papers for fu- length presentation at the conference. All members of the Program Committee were asked to participate in the reviewing process. The standard of submissions was high, according to the reviewers, who did an excellent job. The Program and Organizing Committees thank them. Approximately 20% of submitted - pers will be chosen, the best according to the reviews, to be extended and - viewedagainfor inclusionin a specialissueofthe journalNeural Computing and Applications. We hope that these proceedings will help to stimulate further research and development of new applications and modes of neural computing.
Neural networks (Computer science) --Congresses. --- Systems engineering --Congresses. --- Neural networks (Computer science) --- Systems engineering --- Computer Science --- Engineering & Applied Sciences --- Biologically-inspired computing --- Bio-inspired computing --- Natural computing --- Computer science. --- Computers. --- Artificial intelligence. --- Computer simulation. --- Pattern recognition. --- Biometrics (Biology). --- Engineering. --- Computer Science. --- Computation by Abstract Devices. --- Artificial Intelligence (incl. Robotics). --- Engineering, general. --- Pattern Recognition. --- Simulation and Modeling. --- Biometrics. --- Bionics --- Electronic data processing --- Optical pattern recognition. --- Artificial Intelligence. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination --- Construction --- Industrial arts --- Technology --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Fifth generation computers --- Neural computers --- Informatics --- Science --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Statistical methods --- Pattern recognition systems. --- Biometric identification. --- Theory of Computation. --- Technology and Engineering. --- Automated Pattern Recognition. --- Computer Modelling. --- Biometric person authentication --- Biometrics (Identification) --- Anthropometry --- Identification --- Pattern classification systems --- Pattern recognition computers --- Computer vision
Choose an application
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- informatica --- maatschappij --- informatiesystemen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held in London, UK, in June 2008. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on cybercrime and digital forensics investigation, voice and video over internet protocols security, computer security, security architecture and authorisations, and IT governance.
Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- DES (data encryption standard) --- informatica --- maatschappij --- informatiesystemen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
Mathematical statistics --- Biomathematics. Biometry. Biostatistics --- Computer science --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- patroonherkenning --- neuronale netwerken --- factoranalyse --- biomathematica --- vormgeving --- biostatistiek --- informatica --- simulaties --- biometrie --- KI (kunstmatige intelligentie) --- robots --- AI (artificiële intelligentie)
Choose an application
This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held in London, UK, in June 2008. The 36 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on cybercrime and digital forensics investigation, voice and video over internet protocols security, computer security, security architecture and authorisations, and IT governance.
Computer networks. --- Computer science. --- Data encryption (Computer science) --- Data protection. --- Information Technology --- Computer Science (Hardware & Networks) --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Encryption. --- Computers and Society. --- Management of Computing and Information Systems. --- Information Systems Applications (incl. Internet). --- Informatics --- Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Information Systems. --- Cryptology. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Communication systems --- Electronic data interchange --- Computer networks --- Business data interchange, Electronic --- EDI (Electronic data interchange) --- Electronic business data interchange --- Business --- Electronic commerce --- Data processing
Choose an application
A cursory glance at the table of contents of EANN 2009 reveals the am- ing range of neural network and related applications. A random but revealing sample includes: reducing urban concentration, entropy topography in epil- tic electroencephalography, phytoplanktonic species recognition, revealing the structure of childhood abdominal pain data, robot control, discriminating angry and happy facial expressions, ?ood forecasting, and assessing credit worthiness. The diverse nature of applications demonstrates the vitality of neural comp- ing and related soft computing approaches, and their relevance to many key contemporary technological challenges. It also illustrates the value of EANN in bringing together a broad spectrum of delegates from across the world to learn from each other's related methods. Variations and extensions of many methods are well represented in the proceedings, ranging from support vector machines, fuzzy reasoning, and Bayesian methods to snap-drift and spiking neurons. This year EANN accepted approximately 40% of submitted papers for fu- length presentation at the conference. All members of the Program Committee were asked to participate in the reviewing process. The standard of submissions was high, according to the reviewers, who did an excellent job. The Program and Organizing Committees thank them. Approximately 20% of submitted - pers will be chosen, the best according to the reviews, to be extended and - viewedagainfor inclusionin a specialissueofthe journalNeural Computing and Applications. We hope that these proceedings will help to stimulate further research and development of new applications and modes of neural computing.
Mathematical statistics --- Biomathematics. Biometry. Biostatistics --- Computer science --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- patroonherkenning --- neuronale netwerken --- factoranalyse --- biomathematica --- vormgeving --- biostatistiek --- informatica --- simulaties --- biometrie --- KI (kunstmatige intelligentie) --- robots
Listing 1 - 6 of 6 |
Sort by
|