Computational Intelligence: Research Frontiers

Computational Intelligence: Research Frontiers
Title Computational Intelligence: Research Frontiers PDF eBook
Author Gary G. Yen
Publisher Springer Science & Business Media
Pages 402
Release 2008-05-13
Genre Computers
ISBN 3540688587

Download Computational Intelligence: Research Frontiers Book in PDF, Epub and Kindle

This state-of-the-art survey offers a renewed and refreshing focus on the progress in nature-inspired and linguistically motivated computation. The book presents the expertise and experiences of leading researchers spanning a diverse spectrum of computational intelligence in the areas of neurocomputing, fuzzy systems, evolutionary computation, and adjacent areas. The result is a balanced contribution to the field of computational intelligence that should serve the community not only as a survey and a reference, but also as an inspiration for the future advancement of the state of the art of the field. The 18 selected chapters originate from lectures and presentations given at the 5th IEEE World Congress on Computational Intelligence, WCCI 2008, held in Hong Kong, China, in June 2008. After an introduction to the field and an overview of the volume, the chapters are divided into four topical sections on machine learning and brain computer interface, fuzzy modeling and control, computational evolution, and applications.

Artificial Intelligence Research and Development

Artificial Intelligence Research and Development
Title Artificial Intelligence Research and Development PDF eBook
Author Beatriz López
Publisher IOS Press
Pages 452
Release 2005
Genre Computers
ISBN 1586035606

Download Artificial Intelligence Research and Development Book in PDF, Epub and Kindle

The field covered by Artificial Intelligence (AI) is multiform and gathers subjects as various as the engineering of knowledge, the automatic treatment of the language, the training and the systems multiagents, and more. This book focuses on subjects including Machine Learning, Reasoning, Neural Networks, Computer Vision, and Multiagent Systems.

Applications of Computational Intelligence in Multi-Disciplinary Research

Applications of Computational Intelligence in Multi-Disciplinary Research
Title Applications of Computational Intelligence in Multi-Disciplinary Research PDF eBook
Author Ahmed A. Elngar
Publisher Academic Press
Pages 222
Release 2022-02-14
Genre Science
ISBN 0128241764

Download Applications of Computational Intelligence in Multi-Disciplinary Research Book in PDF, Epub and Kindle

Applications of Computational Intelligence in Multi-Disciplinary Research provides the readers with a comprehensive handbook for applying the powerful principles, concepts, and algorithms of computational intelligence to a wide spectrum of research cases. The book covers the main approaches used in computational intelligence, including fuzzy logic, neural networks, evolutionary computation, learning theory, and probabilistic methods, all of which can be collectively viewed as soft computing. Other key approaches included are swarm intelligence and artificial immune systems. These approaches provide researchers with powerful tools for analysis and problem-solving when data is incomplete and when the problem under consideration is too complex for standard mathematics and the crisp logic approach of Boolean computing. - Provides an overview of the key methods of computational intelligence, including fuzzy logic, neural networks, evolutionary computation, learning theory, and probabilistic methods - Includes case studies and real-world examples of computational intelligence applied in a variety of research topics, including bioinformatics, biomedical engineering, big data analytics, information security, signal processing, machine learning, nanotechnology, and optimization techniques - Presents a thorough technical explanation on how computational intelligence is applied that is suitable for a wide range of multidisciplinary and interdisciplinary research

Artificial Intelligence Frontiers in Statistics

Artificial Intelligence Frontiers in Statistics
Title Artificial Intelligence Frontiers in Statistics PDF eBook
Author David J. Hand
Publisher CRC Press
Pages 431
Release 2020-11-26
Genre Business & Economics
ISBN 100015291X

Download Artificial Intelligence Frontiers in Statistics Book in PDF, Epub and Kindle

This book presents a summary of recent work on the interface between artificial intelligence and statistics. It does this through a series of papers by different authors working in different areas of this interface. These papers are a selected and referenced subset of papers presented at the 3rd Interntional Workshop on Artificial Intelligence and Statistics, Florida, January 1991.

Machine Learning for Sustainable Development

Machine Learning for Sustainable Development
Title Machine Learning for Sustainable Development PDF eBook
Author Kamal Kant Hiran
Publisher Walter de Gruyter GmbH & Co KG
Pages 214
Release 2021-07-19
Genre Computers
ISBN 3110702517

Download Machine Learning for Sustainable Development Book in PDF, Epub and Kindle

The book will focus on the applications of machine learning for sustainable development. Machine learning (ML) is an emerging technique whose diffusion and adoption in various sectors (such as energy, agriculture, internet of things, infrastructure) will be of enormous benefit. The state of the art of machine learning models is most useful for forecasting and prediction of various sectors for sustainable development.

Computational Intelligence and Feature Selection

Computational Intelligence and Feature Selection
Title Computational Intelligence and Feature Selection PDF eBook
Author Richard Jensen
Publisher John Wiley & Sons
Pages 357
Release 2008-10-03
Genre Computers
ISBN 0470377917

Download Computational Intelligence and Feature Selection Book in PDF, Epub and Kindle

The rough and fuzzy set approaches presented here open up many new frontiers for continued research and development Computational Intelligence and Feature Selection provides readers with the background and fundamental ideas behind Feature Selection (FS), with an emphasis on techniques based on rough and fuzzy sets. For readers who are less familiar with the subject, the book begins with an introduction to fuzzy set theory and fuzzy-rough set theory. Building on this foundation, the book provides: A critical review of FS methods, with particular emphasis on their current limitations Program files implementing major algorithms, together with the necessary instructions and datasets, available on a related Web site Coverage of the background and fundamental ideas behind FS A systematic presentation of the leading methods reviewed in a consistent algorithmic framework Real-world applications with worked examples that illustrate the power and efficacy of the FS approaches covered An investigation of the associated areas of FS, including rule induction and clustering methods using hybridizations of fuzzy and rough set theories Computational Intelligence and Feature Selection is an ideal resource for advanced undergraduates, postgraduates, researchers, and professional engineers. However, its straightforward presentation of the underlying concepts makes the book meaningful to specialists and nonspecialists alike.

Cyber Crime and Forensic Computing

Cyber Crime and Forensic Computing
Title Cyber Crime and Forensic Computing PDF eBook
Author Gulshan Shrivastava
Publisher Walter de Gruyter GmbH & Co KG
Pages 266
Release 2021-09-07
Genre Computers
ISBN 3110677547

Download Cyber Crime and Forensic Computing Book in PDF, Epub and Kindle

This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today’s organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders’ abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.