دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: سایبرنتیک: هوش مصنوعی ویرایش: 2015 نویسندگان: Hui Sun, Ching-Yu Yang, Chun-Wei Lin, Jeng-Shyang Pan, Vaclav Snasel, Ajith Abraham سری: Advances in Intelligent Systems and Computing + 329 ISBN (شابک) : 3319122851, 9783319122861 ناشر: Springer سال نشر: 2014 تعداد صفحات: 445 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 17 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Genetic and Evolutionary Computing: Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing, October 18-20, 2014, ... in Intelligent Systems and Computing) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب محاسبات ژنتیکی و تکاملی: ادامه هشتمین کنفرانس بین المللی محاسبات ژنتیکی و تکاملی ، 18-20 اکتبر 2014 ، ... در سیستم های هوشمند و محاسبات) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
تحقیقات اخیر در محاسبات ژنتیک و تکاملی را ارائه می دهد مجموعه مقالات هشتمین کنفرانس بین المللی محاسبات ژنتیکی و تکاملی ICGEC 2014 در نانچانگ چین، 18 تا 20 اکتبر 2014 برگزار شد. نوشته شده توسط متخصصان این حوزه این جلد از پیشرفتها در سیستمهای هوشمند و محاسبات شامل مقالات پذیرفتهشده ارائه شده در ICGEC 2014، هشتمین کنفرانس بینالمللی محاسبات ژنتیک و تکاملی است. کنفرانس امسال از نظر فنی توسط مؤسسه فناوری نانچانگ در چین، دانشگاه علمی کاربردی کائوسیونگ در تایوان و دانشگاه فنی VSB استراوا برگزار شد. ICGEC 2014 از 18 تا 20 اکتبر 2014 در نانچانگ چین برگزار می شود. نانچانگ یکی از مرکز استان جیانگشی در جنوب شرقی چین است که در شمال مرکزی استان واقع شده است. از آنجایی که از غرب به کوه های جیولینگ و از شرق به دریاچه پویانگ محدود شده است، به دلیل مناظر، تاریخ غنی و مکان های فرهنگی مشهور است. به دلیل موقعیت مرکزی آن نسبت به مناطق دلتای رودخانه یانگ تسه و مروارید، یک قطب اصلی راه آهن در جنوب چین است. این کنفرانس به عنوان یک انجمن بین المللی برای محققان و متخصصان در تمام زمینه های محاسبات ژنتیکی و تکاملی در نظر گرفته شده است. سطح محتوا » تحقیق کلمات کلیدی » هوش محاسباتی - محاسبات تکاملی - محاسبات ژنتیکی - ICGEC 2014 - سیستم های هوشمند موضوعات مرتبط » هوش مصنوعی - هوش محاسباتی و پیچیدگی
Presents recent research in Genetic and Evolutionary Computing Proceedings of the 8th International Conference on Genetic and Evolutionary Computing ICGEC 2014 held in, Nanchang China, October 18-20, 2014 Written by experts in the field This volume of Advances in Intelligent Systems and Computing contains accepted papers presented at ICGEC 2014, the 8th International Conference on Genetic and Evolutionary Computing. The conference this year was technically co-sponsored by Nanchang Institute of Technology in China, Kaohsiung University of Applied Science in Taiwan, and VSB-Technical University of Ostrava. ICGEC 2014 is held from 18-20 October 2014 in Nanchang, China. Nanchang is one of is the capital of Jiangxi Province in southeastern China, located in the north-central portion of the province. As it is bounded on the west by the Jiuling Mountains, and on the east by Poyang Lake, it is famous for its scenery, rich history and cultural sites. Because of its central location relative to the Yangtze and Pearl River Delta regions, it is a major railroad hub in Southern China. The conference is intended as an international forum for the researchers and professionals in all areas of genetic and evolutionary computing. Content Level » Research Keywords » Computational Intelligence - Evolutionary Computing - Genetic Computing - ICGEC 2014 - Intelligent Systems Related subjects » Artificial Intelligence - Computational Intelligence and Complexity
Part I: Nature Inspired Constrained Optimization Artificial Bee Colony Using Opposition-Based Learning 1 Introduction 2 ABC Algorithm 3 Artificial Bee Colony Using Opposition-Based Learning 4 Experimental Verifications 5 Conclusions References Theorem of Existence and Uniqueness of Fixed Points of Monotone Operators 1 Introduction and Definition 2 Main Conclusions References Adaptive Sampling Detection Based Immune Optimization Approach and Its Application to Chance Constrained Programming 1 Introduction 2 Problem Statement and Preliminaries 3 Adaptive Sampling Detection for Chance Constraints 4 Algorithm Formulation and Design 5 Numerical Experiments 6 Conclusions References Characteristic Analysis and Management of Human Resource in EPC Project 1 Introduction 2 The Characteristics of Human Resource in EPC Mode 3 Management towards Different Characteristics in HR 4 Conclusion References Hybrid Particle Swarm Optimization with Bat Algorithm 1 Introduction 2 Related Work 3 The Proposed Hybrid PSO with BA 4 Experimental Results 5 Conclusion References Interaction Artificial Bee Colony Based Load Balance Method in Cloud Computing 1 Introduction 2 Related Work 3 Our Proposed Method 4 Experimental Results and Analysis 5 Conclusion References Command Center Operation Miss Root Cause Analysis 1 Introduction 2 Root Cause Analysis 3 Consider Alternative Solutions While Building Consensus 4 Develop Consensus and Test Ideas for Effectiveness 5 Conclusion References Part II: Recent Advances on Evolutionary OptimizationTechnologies A New Cat Swarm Optimization with Adaptive Parameter Control 1 Introduction 2 Cat Swarm Optimization 3 Parameter Analysis of 4 Proposed Approach 5 Simulation Results 6 Conclusion References Multi-objective Nondominated Sorting Invasive Weed Optimization Algorithm for the Permanent Magnet Brushless Direct Current Motor Design 1 Introduction 2 Multi-objective Nondominated Sorting Invasive Weed Optimization 3 PMBLDC Motor Design Using NSIWO 4 Results 5 Conclusions References An Evolutionary Approach to Tower of Hanoi Problem 1 Introduction 2 Proposed Method 3 Evolutionary Algorithm 4 Experimental Results 5 Conclusion References Multipopulational Metaheuristic Approaches to Real-Parameter Optimization 1 Introduction 2 Parallel Metaheuristics 3 Metaheuristic Algorithms for Real-Parameter Optimization 4 Experiments 5 Conclusions References Evolved Bat Algorithm for Solving the Economic Load Dispatch Problem 1 Introduction 2 Economic Load Dispatch Problem 3 Meta-heuristic Evolved Bat-Inspired Algorithm 4 Proposed EBA for Solving the Economic Dispatch Problem 5 Experimental Results 6 Conclusion References A Simple and Accurate Global Optimizer for Continuous Spaces Optimization 1 Introduction 2 The Ebb-Tide-Fish Algorithm 3 Benchmark Function for Optimization 4 Simulation Results of the Proposed Algorithm 5 Conclusion and Future Work References Spatial Evolutionary Algorithm for Large-Scale Groundwater Management 1 Introduction 2 Spatial Evolutionary Algorithm (SEA) 3 Illustration Example 4 Discussion and Conclusions References Part III:Wearable Computing and Intelligent Data Hiding Block-Based Colour Image Steganography Using Smart Pixel-Adjustment 1 Introduction 2 The Proposed Method 3 Experimental Results 4 Conclusion References A Sport Recognition Method with Utilizing Less Motion Sensors 1 Introduction 2 System Architecture 3 Proposed Methods 4 Experimental Results 5 Conclusions References Information Hiding Based on Binary Encoding Methods and Linear Transformation Scrambling Techniques 1 Introduction 2 Linear Transformation Scrambling Techniques for Encoding Images 3 Binary Encoding Methods for Hiding Linear- Transformation-Scrambled Matrices 4 Simulations 5 Discussions 6 Conclusions References Dispersed Data Hiding Using Hamming Code with Recovery Capability 1 Introduction 2 Dispersed Data Hiding Using Hamming Code 3 Experimental Result 4 Conclusion References 16-Bit DICOM Medical Images Lossless Hiding Scheme Based on Edge Sensing Prediction Mechanism 1 Introduction 2 Related Works 3 Proposed Method 4 Experimental Results 5 Conclusion References A Quality Improving Scheme for VQ Decompressed Image Based on DCT 1 Introduction 2 Related Works 3 ProposedMethod 4 Experiment Results 5 Conclusion References Research of Image Enhancement Algorithm Based on Multi-scale Retinex 1 Introduction 2 Algorithm Research 2.2 3 Experiment and Discussion 4 Conclusion References The HRV Analysis on e-Book Reading 1 Introduction 2 Experimental Design 3 Data Analysis 4 Discussion 5 Conclusion References Part IV: Image Processing and Intelligent Applications Modified Choice Function Heuristic Selection for the Multidimensional Knapsack Problem 1 Introduction 2 Selection Hyper-Heuristics and Heuristic Selection 3 The Multidimensional Knapsack Problem 4 Experimental Framework and Parameters 5 Computational Results 6 Conclusions References A Distributed Computational Model of State of Consciousness 1 Introduction 2 Related Work 3 Model of Consciousness and State Dynamics 4 Experimental Evaluation 5 Conclusion References Rotation Invariant Texture Classification Using Principal Direction Estimation 1 Introduction 2 Backgrounds 3 The Proposed Patch_Orientation Method 4 Experimental Results 5 Conclusion References An Improved Spatial Histogram and Particle Filter Face Tracking 1 Introduction 2 Similarity Measure Method of a Non-uniform Spatial Histogram 3 Particle Filter 4 Face Tracking Method Based on Improved Spatial Histogram and Particle Filter 5 Experimental Analysis 6 Conclusions References Joint Encoding of Multi-scale LBP for Infrared Face Recognition 1 Introduction 2 Local Binary Patterns Representation 3 Joint Encoding of Multi-scale LBP Representation 4 Infrared Face Recognition Method 5 Experimental Results 6 Conclusions References Driving Behavior Analysis of Multiple Information Fusion Based on AdaBoost 1 Introduction 2 AdaBoost Basic Principle 3 Driving Behavior Analysis System 4 Experimental Results and Analysis 5 Conclusion References The Study and Application of IT Projects Management and Control Model for Enterprise Group 1 Introduction 2 The Circumstance of Application of CMMI 3 PRINCE2 Project Management Methodology 4 PRINCE2 & CMMI ‘s Projects of Group Control Model 5 Conclusion References Part V: Intelligent Multimedia Tools and Applications A Data Hiding Method for Image Retargeting 1 Introduction 2 Background Knowledge 3 Proposed Method 4 Experimental Results 5 Conclusion and Remark References Rendering 3D Solid Model 1 Introduction 2 The Proposed Method 3 Experimental Results Greedy Active Contour Detection for Median Nerve on Strain Sonographic Images 1 Introduction 2 The Proposed Contour Detection Model 3 Experiment Result 4 Discussion and Conclusion References One Decomposition Method of Concept Lattice 1 Introduction 2 Preliminary 3 The Decomposition Method of Concept Lattice 4 Example 5 Conclusion References The Evaluation Method for Enterprise Group Information Planning and Implementation Based on PDCA Cycle 1 Introduction 2 The Current Evaluation Method 3 Introduction of EIP Model 4 Comprehensive Evaluation Indicators 5 Experimental Results 6 Summary References A New Look into Web Page Ranking Systems 1 Introduction 2 Briefly about Web Page Ranking System 3 Analogies between Web Page Rank Queueing Theory and Water Storage Systems 4 Some Simulated Results 5 Conclusions References Seismic Qualification of Telecommunication System in Nuclear Power Plant 1 Introduction 2 Test Specimen 3 Test Method 4 Acceptance Criteria 5 Conclusion References Part VI: Technologies for Next-Generation NetworkEnvironments A Virtual Network Guard System Based on Cloud Computing Environments 1 Introduction 2 Background 3 Attack Model 4 Design Architecture 5 Performance Analysis 6 Conclusion References Towards SQL Injection Attacks Detection Mechanism Using Parse Tree 1 Introduction 2 The Proposed Mechanism 3 Experimental Results 4 Conclusion References No-Reference Image Quality Assessment in Spatial Domain 1 Introduction 2 The Proposed Method 3 Experiments 4 Conclusion References MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things 1 Introduction 2 Related Work 3 Cyber Physical Adaptive Security Framework for IoT 4 Simulation and Analysis 5 Conclusion References Accurate Recommendation Based on Opinion Mining 1 Introduction 2 Related Works 3 Methodology 4 Conclusions and Future Work References Reliability Analysis on Parallel System with N Element Obeying Exponential Distribution 1 Introduction 2 Model Analysis 3 Conclussion References The Research of Private Network Secure Interconnection Scheme in Large-Scaled Enterprises 1 Introduction 2 Example for Private Network 3 General Scheme Design 4 Conclusion References Author Index