Trends in Intelligent Systems and Computer EngineeringOscar Castillo, Li Xu Springer Science & Business Media, 25. tra 2008. - Broj stranica: 670 A large international conference, Intelligent Systems and Computer Engineering, was held in Hong Kong, March 21–23, 2007, under the International MultiConf- ence of Engineers and Computer Scientists (IMECS) 2007. The IMECS 2007 is organized by the International Association of Engineers (IAENG), a nonpro?t int- national association for engineers and computer scientists. The IMECS conferences serve as good platforms for the engineering community to meet with each other and to exchange ideas. The conferences also strike a balance between theoretical and - plication development. The conference committees have been formed with over two hundred committee members who are mainly research center heads, faculty deans, department heads, professors, and research scientists from over thirty countries. The conferences are truly international meetings with a high level of participation from many countries. The response that we have received for the multiconference is - cellent. There have been more than one thousand one hundred manuscript subm- sions for the IMECS 2007. All submitted papers have gone through the peer review process and the overall acceptance rate is 58. 46%. This volume contains revised and extended research articles on intelligent s- tems and computer engineering written by prominent researchers participating in the multiconference IMECS 2007. There is huge demand, not only for theories but also applications, for the intelligent systems and computer engineering inthe society to meet the needs of rapidly developing top-end high technologies and to improve the increasing high quality of life. |
Iz unutrašnjosti knjige
Rezultati 1 - 5 od 56.
Stranica viii
... Tree for Intrusion Detection Using Reduced Feature Spaces ................................ 273 Behrouz Minaei Bidgoli, Morteza Analoui, Mohammad Hossein Rezvani, and Hadi Shahriar Shahhoseini Novel and Efficient Hybrid Strategies for ...
... Tree for Intrusion Detection Using Reduced Feature Spaces ................................ 273 Behrouz Minaei Bidgoli, Morteza Analoui, Mohammad Hossein Rezvani, and Hadi Shahriar Shahhoseini Novel and Efficient Hybrid Strategies for ...
Stranica 14
... tree structural programs. Much research on extracting rules from databases by GP has been done in recent years. In the research [3–5], Oscar Castillo et al. (eds.), Trends in Intelligent Systems and Computer Engineering. 15 c Springer ...
... tree structural programs. Much research on extracting rules from databases by GP has been done in recent years. In the research [3–5], Oscar Castillo et al. (eds.), Trends in Intelligent Systems and Computer Engineering. 15 c Springer ...
Stranica 16
... tree structural programs increases in an individual. Therefore, search performance declines. In order to solve these problems, we have proposed an original evolutionary method, automatically defined groups. The method is an extension of ...
... tree structural programs increases in an individual. Therefore, search performance declines. In order to solve these problems, we have proposed an original evolutionary method, automatically defined groups. The method is an extension of ...
Stranica 17
... tree pairs. For example, a tree referred to by agent 1 in an individual breeds with a tree referred to by agent 1 in another individual. This breeding strategy is called restricted breeding [13–15]. In ADG, we also have to consider the ...
... tree pairs. For example, a tree referred to by agent 1 in an individual breeds with a tree referred to by agent 1 in another individual. This breeding strategy is called restricted breeding [13–15]. In ADG, we also have to consider the ...
Stranica 18
... tree. Figure 2.2 (type c) shows an example of this crossover. We expect that the search works efficiently and the adequate group structure is acquired by using this method. 2.2.2 Rule Extraction from Classified Data In some kinds of. 18 ...
... tree. Figure 2.2 (type c) shows an example of this crossover. We expect that the search works efficiently and the adequate group structure is acquired by using this method. 2.2.2 Rule Extraction from Classified Data In some kinds of. 18 ...
Sadržaj
1 | |
9 | |
33 | |
34 | |
A Dynamic GABased Rhythm Generator | 57 |
A Metaoptimization | 75 |
HumanRobot Interaction as a Cooperative Game | 91 |
Swarm and Entropic Modeling for Landmine Detection Robots 105 | 104 |
Detecting Similar Negotiation Strategies | 297 |
Prediction Method for Real Thai Stock Index Based on Neurofuzzy | 326 |
Innovative Technology Management System with Bibliometrics | 349 |
Mapping Cobweb to SQL 363 | 362 |
Partitioning Strategy for Embedded Multiprocessor FPGA Systems | 395 |
Interpretation of Sound Tomography Image for the Recognition | 409 |
A Secure Multiagent Intelligent Conceptual Framework | 427 |
On Generating Algebraic Equations for A5Type Key Stream | 442 |
The Effect of Background Knowledge in GraphBased Learning | 141 |
Clustering Dependencies with Support Vectors 155 | 154 |
A Comparative Study of Gender Assignment in a Standard Genetic | 167 |
PSO Algorithm for Primer Design | 175 |
Genetic Algorithms and Heuristic Rules for Solving the Nesting | 188 |
MCSACNN Algorithm for Image Noise Cancellation | 209 |
An Integrated Approach Providing Exact SNP IDs from Sequences | 221 |
PseudoReverse Approach in Genetic Evolution 233 | 232 |
Microarray Data Feature Selection Using Hybrid GAIBPSO | 243 |
DiscreteTime Model Representations for Biochemical Pathways | 255 |
Performance Evaluation of Decision Tree for Intrusion Detection | 272 |
Novel and Efficient Hybrid Strategies for Constraining the Search | 285 |
A New Solution for Protein Comparison 467 | 466 |
TopicSpecific Language Model Based on Graph Spectral Approach | 497 |
Automatic Construction of FSA Language Model for Speech | 515 |
Integrating Design by Contract Focusing Maximum Benefit | 541 |
Performance Engineering for Enterprise Applications 557 | 556 |
A Framework for UMLBased Software Component Testing | 575 |
Extending the Service Domain of an Interactive Bounded Queue | 599 |
A Hybrid Evolutionary Approach to Cluster Detection | 619 |
Transforming the Natural Language Text for Improving | 637 |
Index | 655 |
Ostala izdanja - Prikaži sve
Trends in Intelligent Systems and Computer Engineering Oscar Castillo,Li Xu Pregled nije dostupan - 2010 |
Trends in Intelligent Systems and Computer Engineering Oscar Castillo,Li Xu Pregled nije dostupan - 2008 |
Uobičajeni izrazi i fraze
according accuracy agents algorithm analysis applications approach associated attack cache chapter classification cluster communication compared Computer Conference considered corresponding database dataset decision defined described detection developed effect Engineering equations estimated evaluation example experiments expression Figure fitness follows function genes genetic algorithm given graph human hybrid IEEE increase indicators individual infection input Intelligent interaction International knowledge learning Link means measure memory messages method neural network node object obtained operations optimization output parameters particle partitioning pattern performance points population position predictive presented primer probability problem Proceedings proposed Real References represents respectively robot rules selection sequences shown shows similar simulation solution space step strategy structure swarm Table task tion tree values variables
Popularni odlomci
Stranica 285 - Given a set of transactions, where each transaction is a set of items, an association rule is an expression of the form X => Y, where X and Y are sets of items. The intuitive meaning of such a rule is that transactions in a database which contain X tend to contain Y as well.
Stranica xiii - Korea Advanced Institute of Science and Technology, 373-1 Guseong-Dong, Yuseong-Gu, Daejeon 305-701, Republic of Korea...
Stranica 277 - AA .. AB AC AD AE AF AG AH .. . AI AJ AK .. - ■AL AM .. AN .. AO .. AP...
Stranica 252 - Using mutual information for selecting features in supervised neural net learning.
Stranica 231 - Altschul SF, Gish W, Miller W, Myers EW, Lipman DJ. Basic local alignment search tool.
Stranica 539 - Garcia-Luna-Aceves. An Efficient Routing Protocol for Wireless Networks. ACM Mobile Networks and Applications Journal, Special Issue on Routing in Mobile Communication Networks, Oct.
Stranica 276 - User to root (U2Su) exploits are a class of attacks where an attacker starts out with access to a normal user account on the system and is able to exploit vulnerability to gain root access to the system.
Stranica 220 - Cellular Neural Networks: Theory," IEEE Transactions on Circuits and Systems. vol. 35, pp. 1257-1272, Oct. 1988. [4] LO Chua and L. Yang, "Cellular Neural Networks: Applications," IEEE Transactions on Circuits and Systems, vol.
Stranica 284 - Third International Conference on Industrial & Engineering Applications of Artificial Intelligence and Expert Systems, pages 923-93 1 . Association for Computing Machinery, 1990.