Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 13 of 13 matches in All Departments
This book offers a timely overview of fuzzy and rough set theories and methods. Based on selected contributions presented at the International Symposium on Fuzzy and Rough Sets, ISFUROS 2017, held in Varadero, Cuba, on October 24-26, 2017, the book also covers related approaches, such as hybrid rough-fuzzy sets and hybrid fuzzy-rough sets and granular computing, as well as a number of applications, from big data analytics, to business intelligence, security, robotics, logistics, wireless sensor networks and many more. It is intended as a source of inspiration for PhD students and researchers in the field, fostering not only new ideas but also collaboration between young researchers and institutions and established ones.
This volume is an initiative undertaken by the IEEE Computational Intelligence Society's Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.
This volume is a compilation of the best papers presented at the First International Symposium on Fuzzy and Rough Sets (ISFUROS 2006) held in Santa Clara, Cuba. They contain valuable contributions both in the theoretical field and in several application domains such as intelligent control, data analysis, decision making and machine learning, just to name a few. Together, they capture the huge potential of the aforementioned methodologies.
This book emphasizes the increasingly important role that Computational Intelligence (CI) methods are playing in solving a myriad of entangled Wireless Sensor Networks (WSN) related problems. The book serves as a guide for surveying several state-of-the-art WSN scenarios in which CI approaches have been employed. The reader finds in this book how CI has contributed to solve a wide range of challenging problems, ranging from balancing the cost and accuracy of heterogeneous sensor deployments to recovering from real-time sensor failures to detecting attacks launched by malicious sensor nodes and enacting CI-based security schemes. Network managers, industry experts, academicians and practitioners alike (mostly in computer engineering, computer science or applied mathematics) benefit from th e spectrum of successful applications reported in this book. Senior undergraduate or graduate students may discover in this book some problems well suited for their own research endeavors.
Along the years, rough set theory has earned a well-deserved reputation as a sound methodology for dealing with imperfect knowledge in a simple though mathematically sound way. This edited volume aims at continue stressing the benefits of applying rough sets in many real-life situations while still keeping an eye on topological aspects of the theory as well as strengthening its linkage with other soft computing paradigms. The volume comprises 11 chapters and is organized into three parts. Part 1 deals with theoretical contributions while Parts 2 and 3 focus on several real world data mining applications. Chapters authored by pioneers were selected on the basis of fundamental ideas/concepts rather than the thoroughness of techniques deployed. Academics, scientists as well as engineers working in the rough set, computational intelligence, soft computing and data mining research area will find the comprehensive coverage of this book invaluable.
The daily routines, habits, beliefs, and values of the Hispanic culture that create unique human interactions in this society are revealed in this book. The book consists of 26 chapters relating to different themes that collectively provide an understanding of cultural responses. An anecdote is placed at the beginning of each chapter to assist the reader in understanding the more pedagogical information that follows. Reflected in this book is the reality that the Hispanic world covers a vast geographical area, and as such, is a mosaic of ethnic, religious, and historical backgrounds. Examples of diversity--the salsa, the taste of this culture--that makes this culture so unique are illustrated throughout the text. This book has been written with a wide range of readers in mind and will be of use to students on the secondary as well as undergraduate levels, teachers, social workers, and travelers.
This book emphasizes the increasingly important role that Computational Intelligence (CI) methods are playing in solving a myriad of entangled Wireless Sensor Networks (WSN) related problems. The book serves as a guide for surveying several state-of-the-art WSN scenarios in which CI approaches have been employed. The reader finds in this book how CI has contributed to solve a wide range of challenging problems, ranging from balancing the cost and accuracy of heterogeneous sensor deployments to recovering from real-time sensor failures to detecting attacks launched by malicious sensor nodes and enacting CI-based security schemes. Network managers, industry experts, academicians and practitioners alike (mostly in computer engineering, computer science or applied mathematics) benefit from th e spectrum of successful applications reported in this book. Senior undergraduate or graduate students may discover in this book some problems well suited for their own research endeavors.
This volume is an initiative undertaken by the IEEE Computational Intelligence Society's Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.
This volume is a compilation of the best papers presented at the First International Symposium on Fuzzy and Rough Sets (ISFUROS 2006) held in Santa Clara, Cuba. They contain valuable contributions both in the theoretical field and in several application domains such as intelligent control, data analysis, decision making and machine learning, just to name a few. Together, they capture the huge potential of the aforementioned methodologies.
Along the years, rough set theory has earned a well-deserved reputation as a sound methodology for dealing with imperfect knowledge in a simple though mathematically sound way. This edited volume aims at continue stressing the benefits of applying rough sets in many real-life situations while still keeping an eye on topological aspects of the theory as well as strengthening its linkage with other soft computing paradigms. The volume comprises 11 chapters and is organized into three parts. Part 1 deals with theoretical contributions while Parts 2 and 3 focus on several real world data mining applications. Chapters authored by pioneers were selected on the basis of fundamental ideas/concepts rather than the thoroughness of techniques deployed. Academics, scientists as well as engineers working in the rough set, computational intelligence, soft computing and data mining research area will find the comprehensive coverage of this book invaluable.
|
You may like...
|