Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Soft Computing for Hybrid Intelligent Systems (Studies in Computational Intelligence)

Buy
We describe in this book, new methods and applications of hybrid intelligent systems using soft computing techniques. Soft Computing (SC) consists of several intelligent computing paradigms, including fuzzy logic, neural networks, and evolutionary algorithms, which can be used to produce powerful hybrid intelligent systems. The book is organized in five main parts, which contain a group of papers around a similar subject. The first part consists of papers with the main theme of intelligent control, which are basically papers that use hybrid systems to solve particular problems of control. The second part contains papers with the main theme of pattern recognition, which are basically papers using soft computing techniques for achieving pattern recognition in different applications. The third part contains papers with the themes of intelligent agents and social systems, which are papers that apply the ideas of agents and social behavior to solve real-world problems. The fourth part contains papers that deal with the hardware implementation of intelligent systems for solving particular problems. The fifth part contains papers that deal with modeling, simulation and optimization for real-world applications.
(HTML tags aren't allowed.)

Adenovirus Methods and Protocols, Vol. 2: Ad Proteins and RNA, Lifecycle and Host Interactions, and Phyologenetics (Methods in Molecular Medicine, Vol. 131)
Adenovirus Methods and Protocols, Vol. 2: Ad Proteins and RNA, Lifecycle and Host Interactions, and Phyologenetics (Methods in Molecular Medicine, Vol. 131)

Adenovirus Methods and Protocols, Second Edition, now in two volumes, is an essential resource for adenovirus (Ad) researchers beginning in the field, and an inspirational starting point for researchers looking to branch into new areas of Ad study. In addition to updating and expanding important chapters from the first edition, the authors...

The Design and Analysis of Parallel Algorithms
The Design and Analysis of Parallel Algorithms

This text for students and professionals in computer science provides a valuable overview of current knowledge concerning parallel algorithms. These computer operations have recently acquired increased importance due to their ability to enhance the power of computers by permitting multiple processors to work on different parts of a problem...

Sams Teach Yourself Networking in 24 Hours (3rd Edition)
Sams Teach Yourself Networking in 24 Hours (3rd Edition)
You can't go too far in technology these days without at least a casual understanding of data communications over local and wide-area networks (LANs and WANs). Sams Teach Yourself Networking in 24 Hours will clue you in on the seven-layer Open Systems Interconnect (OSI) networking abstraction and other key facts and concepts having to do...

PC QUICKSTEPS 2/E
PC QUICKSTEPS 2/E

Learn instantly from step-by-step graphics!

We know a picture is worth a thousand words--so we went heavy on pictures and light on words in this easy-to-use guide. Color screenshots and brief instructions show you how to manage, customize, and troubleshoot your desktop or laptop PC. Follow along and learn to install and configure...

Genetic Fuzzy Systems
Genetic Fuzzy Systems

In recent years, a great number of publications have explored the use of genetic algorithms as a tool for designing fuzzy systems. Genetic Fuzzy Systems explores and discusses this symbiosis of evolutionary computation and fuzzy logic. The book summarizes and analyzes the novel field of genetic fuzzy systems, paying special attention to...

The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy