| 000 | 07728cam a2200613 i 4500 | ||
|---|---|---|---|
| 001 | on1374320779 | ||
| 003 | OCoLC | ||
| 005 | 20241121073115.0 | ||
| 006 | m d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 230112s2023 nyu ob 001 0 eng | ||
| 010 | _a 2023000615 | ||
| 040 |
_aDLC _beng _erda _cDLC _dEBLCP _dYDX _dN$T _dOCLCF _dYDX _dOCLCQ _dOCLCO _dOCLCQ _dOCLCO _dOCLCQ _dOCLCO _dOCLCQ |
||
| 019 |
_a1369597354 _a1369597480 _a1369647255 _a1369672444 |
||
| 020 |
_a9798886975857 _qelectronic book |
||
| 020 |
_z9798886975475 _qhardcover |
||
| 035 |
_a3528784 _b(N$T) |
||
| 035 |
_a(OCoLC)1374320779 _z(OCoLC)1369597354 _z(OCoLC)1369597480 _z(OCoLC)1369647255 _z(OCoLC)1369672444 |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQ342 _b.N68 2023 |
| 082 | 0 | 0 |
_a006.3 _223/eng20230330 |
| 049 | _aMAIN | ||
| 245 | 0 | 0 |
_aNovel developments in computational intelligence systems and their applications in multidisciplinary areas / _cManoj Sahni (editor), Jos�e Ram�on M. Merig�o (editor), Ernesto Leon Castro (editor), Ritu Sahni (editor). |
| 264 | 1 |
_aNew York : _bNova Science Publishers, _c[2023] |
|
| 300 | _a1 online resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 490 | 1 | _aComputer Science, Technology and Applications | |
| 504 | _aIncludes bibliographical references and index. | ||
| 520 |
_a"We have access to a variety of cutting-edge technologies, thanks to the digital world, which has made life simpler and more intelligent. As a result, in the advancement of the Internet, no one is unreachable and we can now easily share ideas for new innovations and collaborate with people across great distances. The amount of data on the internet is exploding as a result of the extensive research being conducted to advance new technologies. Due to this massive data collection, there is also an increase in the risk of sensitive information being leaked. Therefore, it is necessary to look for methods and equipment to collect, manage, analyse, and store data in a secure manner. Cloud computing, deep learning, machine learning, and big data analysis are the topics of computational intelligence that offer methods for dealing with large amounts of unstructured data, while cyber security and cryptography are the topics, we study to find ways to secure data. In practical situations the data we collect are vague and ambiguous as it depends upon human reasoning. Fuzzy logic-based systems play an important role in making decisions in uncertain environments because their reasoning is similar to human reasoning. This book covers the novel researches based on various computational intelligence topics including deep learning, artificial intelligence, machine learning, neural network, healthcare, solutions of various problems using fuzzy systems and their applications in cryptography, assignment problems, transportation problems, cloud computing, etc. The goal of writing the book is to promote advances in the field of computational intelligence systems and to aid in the dissemination of results concerning recent applications in the areas of computational intelligence system-based applications, its allied branches like artificial intelligence, deep learning, cloud computing, fuzzy system, etc. among working professionals, researchers, and educators. The book will be useful for Data Scientists, web developers, cryptographers, medical researchers, engineers, researchers, and graduate level students in computer science, data science, operations research, and mathematics. It provides novel applications as well as new theoretical developments required to understand current computational intelligence topics such as deep learning, machine learning, fuzzy based systems, and various other relevant fields. Graduate and postgraduate Computer Science, Engineering, Information Technology and Mathematics students, as well as teachers, can use it as a reference book because they can find applications that can be used to clarify specific concepts"-- _cProvided by publisher. |
||
| 505 | 0 | _aIntro -- Contents -- Preface -- Chapter 1 -- Automatic Text Summarization -- Abstract -- Introduction -- Background -- Deep Learning -- Sequence-to-Sequence Model -- Encoder -- Decoder -- Interference Phase -- Intuition behind Attention Mechanism -- Implementation Details -- Dataset -- Process for Text Summarization -- Observations -- Conclusion -- Disclaimer -- References -- Chapter 2 -- A Survey and Taxonomy on Energy Efficient Software Techniques in Cloud Environments -- Abstract -- Introduction -- Focus of This Survey -- Energy Saving Strategies through Resource Management Technique | |
| 505 | 8 | _aEnergy-Aware Resource Consolidation Technique -- Energy-Aware Resource Scheduling -- Energy Saving Strategies through Data Management Technique -- Energy Saving Data Classification Technique -- Energy Saving Data Replication -- Observation of the Energy Efficient Techniques in Cloud Environment -- New Challenges -- Conclusion -- References -- Chapter 3 -- Epidemic Analysis and Prediction of Future Reachability of COVID-19 Using Machine Learning -- Abstract -- 1. Introduction -- 2. Literature Review -- 3. Research Gaps -- 4. Methodology -- 4.1. Dataset Description -- 4.2. Dataset Pre-Processing | |
| 505 | 8 | _a4.3. Training and Testing -- 4.4. Classification Method -- 5. Experimental Setup and Implementation -- 6. Results and Discussion -- 6.1. Performance Metrics Evaluation -- 6.1.1. Mean Absolute Error -- 6.1.2. Mean Squared Error -- 6.1.3. Root Mean Squared Error -- 7. Discussion and Future Scope -- References -- Chapter 4 -- Prediction of Indirect Evaporative Cooling System Using Artificial Neural Networks -- Abstract -- Introduction -- Artificial Neural Network -- Performance Prediction of Indirect Evaporative Cooling Using Artificial Neural Network -- Result and Discussion -- Conclusion | |
| 505 | 8 | _aSteganography Scheme Using Principal Component Analysis -- Result of Simulation Experiment Using Principal Component Analysis -- Comparison Chart -- Conclusion and Future Work -- Disclaimer -- References -- Chapter 6 -- Can Vaccinations Reduce the Rapid Spread of COVID-19? -- Abstract -- Introduction -- Methods -- Results -- The US -- The UK -- Germany -- Russia -- India -- Oman -- The UAE -- Conclusion -- Disclaimer -- References -- Chapter 7 -- A Comparative Study between Incident Edge Path Algorithm and Dijkstra Algorithm for Finding the Shortest Path for Networks -- Abstract -- Introduction | |
| 588 | _aDescription based on online resource; title from digital title page (viewed on April 27, 2023). | ||
| 590 | _aAdded to collection customer.56279.3 | ||
| 650 | 0 | _aComputational intelligence. | |
| 650 | 6 |
_aIntelligence informatique. _922476 |
|
| 650 | 7 |
_aComputational intelligence _2fast |
|
| 655 | 0 |
_aElectronic books. _93907 |
|
| 700 | 1 |
_aSahni, Manoj, _eeditor. _922477 |
|
| 700 | 1 |
_aMerig�o, Jos�e M., _eeditor. _922478 |
|
| 700 | 1 |
_aLe�on-Castro, Ernesto, _eeditor. _922479 |
|
| 700 | 1 |
_aSahni, Ritu, _eeditor. _922480 |
|
| 776 | 0 | 8 |
_iPrint version: _tNovel developments in computational intelligence systems and their applications in multidisciplinary areas _dNew York : Nova Science Publishers, [2023] _z9798886975475 _w(DLC) 2023000614 |
| 830 | 0 |
_aComputer science, technology and applications. _919240 |
|
| 856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3528784 |
| 938 |
_aProQuest Ebook Central _bEBLB _nEBL30333803 |
||
| 938 |
_aAskews and Holts Library Services _bASKH _nAH41229418 |
||
| 938 |
_aYBP Library Services _bYANK _n304615906 |
||
| 938 |
_aEBSCOhost _bEBSC _n3528784 |
||
| 994 |
_a92 _bN$T |
||
| 999 |
_c8684 _d8684 |
||