000 07728cam a2200613 i 4500
001 on1374320779
003 OCoLC
005 20241121073115.0
006 m d
007 cr cnu---unuuu
008 230112s2023 nyu ob 001 0 eng
010 _a 2023000615
040 _aDLC
_beng
_erda
_cDLC
_dEBLCP
_dYDX
_dN$T
_dOCLCF
_dYDX
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCQ
019 _a1369597354
_a1369597480
_a1369647255
_a1369672444
020 _a9798886975857
_qelectronic book
020 _z9798886975475
_qhardcover
035 _a3528784
_b(N$T)
035 _a(OCoLC)1374320779
_z(OCoLC)1369597354
_z(OCoLC)1369597480
_z(OCoLC)1369647255
_z(OCoLC)1369672444
042 _apcc
050 0 0 _aQ342
_b.N68 2023
082 0 0 _a006.3
_223/eng20230330
049 _aMAIN
245 0 0 _aNovel developments in computational intelligence systems and their applications in multidisciplinary areas /
_cManoj Sahni (editor), Jos�e Ram�on M. Merig�o (editor), Ernesto Leon Castro (editor), Ritu Sahni (editor).
264 1 _aNew York :
_bNova Science Publishers,
_c[2023]
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aComputer Science, Technology and Applications
504 _aIncludes bibliographical references and index.
520 _a"We have access to a variety of cutting-edge technologies, thanks to the digital world, which has made life simpler and more intelligent. As a result, in the advancement of the Internet, no one is unreachable and we can now easily share ideas for new innovations and collaborate with people across great distances. The amount of data on the internet is exploding as a result of the extensive research being conducted to advance new technologies. Due to this massive data collection, there is also an increase in the risk of sensitive information being leaked. Therefore, it is necessary to look for methods and equipment to collect, manage, analyse, and store data in a secure manner. Cloud computing, deep learning, machine learning, and big data analysis are the topics of computational intelligence that offer methods for dealing with large amounts of unstructured data, while cyber security and cryptography are the topics, we study to find ways to secure data. In practical situations the data we collect are vague and ambiguous as it depends upon human reasoning. Fuzzy logic-based systems play an important role in making decisions in uncertain environments because their reasoning is similar to human reasoning. This book covers the novel researches based on various computational intelligence topics including deep learning, artificial intelligence, machine learning, neural network, healthcare, solutions of various problems using fuzzy systems and their applications in cryptography, assignment problems, transportation problems, cloud computing, etc. The goal of writing the book is to promote advances in the field of computational intelligence systems and to aid in the dissemination of results concerning recent applications in the areas of computational intelligence system-based applications, its allied branches like artificial intelligence, deep learning, cloud computing, fuzzy system, etc. among working professionals, researchers, and educators. The book will be useful for Data Scientists, web developers, cryptographers, medical researchers, engineers, researchers, and graduate level students in computer science, data science, operations research, and mathematics. It provides novel applications as well as new theoretical developments required to understand current computational intelligence topics such as deep learning, machine learning, fuzzy based systems, and various other relevant fields. Graduate and postgraduate Computer Science, Engineering, Information Technology and Mathematics students, as well as teachers, can use it as a reference book because they can find applications that can be used to clarify specific concepts"--
_cProvided by publisher.
505 0 _aIntro -- Contents -- Preface -- Chapter 1 -- Automatic Text Summarization -- Abstract -- Introduction -- Background -- Deep Learning -- Sequence-to-Sequence Model -- Encoder -- Decoder -- Interference Phase -- Intuition behind Attention Mechanism -- Implementation Details -- Dataset -- Process for Text Summarization -- Observations -- Conclusion -- Disclaimer -- References -- Chapter 2 -- A Survey and Taxonomy on Energy Efficient Software Techniques in Cloud Environments -- Abstract -- Introduction -- Focus of This Survey -- Energy Saving Strategies through Resource Management Technique
505 8 _aEnergy-Aware Resource Consolidation Technique -- Energy-Aware Resource Scheduling -- Energy Saving Strategies through Data Management Technique -- Energy Saving Data Classification Technique -- Energy Saving Data Replication -- Observation of the Energy Efficient Techniques in Cloud Environment -- New Challenges -- Conclusion -- References -- Chapter 3 -- Epidemic Analysis and Prediction of Future Reachability of COVID-19 Using Machine Learning -- Abstract -- 1. Introduction -- 2. Literature Review -- 3. Research Gaps -- 4. Methodology -- 4.1. Dataset Description -- 4.2. Dataset Pre-Processing
505 8 _a4.3. Training and Testing -- 4.4. Classification Method -- 5. Experimental Setup and Implementation -- 6. Results and Discussion -- 6.1. Performance Metrics Evaluation -- 6.1.1. Mean Absolute Error -- 6.1.2. Mean Squared Error -- 6.1.3. Root Mean Squared Error -- 7. Discussion and Future Scope -- References -- Chapter 4 -- Prediction of Indirect Evaporative Cooling System Using Artificial Neural Networks -- Abstract -- Introduction -- Artificial Neural Network -- Performance Prediction of Indirect Evaporative Cooling Using Artificial Neural Network -- Result and Discussion -- Conclusion
505 8 _aSteganography Scheme Using Principal Component Analysis -- Result of Simulation Experiment Using Principal Component Analysis -- Comparison Chart -- Conclusion and Future Work -- Disclaimer -- References -- Chapter 6 -- Can Vaccinations Reduce the Rapid Spread of COVID-19? -- Abstract -- Introduction -- Methods -- Results -- The US -- The UK -- Germany -- Russia -- India -- Oman -- The UAE -- Conclusion -- Disclaimer -- References -- Chapter 7 -- A Comparative Study between Incident Edge Path Algorithm and Dijkstra Algorithm for Finding the Shortest Path for Networks -- Abstract -- Introduction
588 _aDescription based on online resource; title from digital title page (viewed on April 27, 2023).
590 _aAdded to collection customer.56279.3
650 0 _aComputational intelligence.
650 6 _aIntelligence informatique.
_922476
650 7 _aComputational intelligence
_2fast
655 0 _aElectronic books.
_93907
700 1 _aSahni, Manoj,
_eeditor.
_922477
700 1 _aMerig�o, Jos�e M.,
_eeditor.
_922478
700 1 _aLe�on-Castro, Ernesto,
_eeditor.
_922479
700 1 _aSahni, Ritu,
_eeditor.
_922480
776 0 8 _iPrint version:
_tNovel developments in computational intelligence systems and their applications in multidisciplinary areas
_dNew York : Nova Science Publishers, [2023]
_z9798886975475
_w(DLC) 2023000614
830 0 _aComputer science, technology and applications.
_919240
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3528784
938 _aProQuest Ebook Central
_bEBLB
_nEBL30333803
938 _aAskews and Holts Library Services
_bASKH
_nAH41229418
938 _aYBP Library Services
_bYANK
_n304615906
938 _aEBSCOhost
_bEBSC
_n3528784
994 _a92
_bN$T
999 _c8684
_d8684