ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Genetic and Evolutionary Computing: Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing, October 18-20, 2014, ... in Intelligent Systems and Computing)

دانلود کتاب محاسبات ژنتیکی و تکاملی: ادامه هشتمین کنفرانس بین المللی محاسبات ژنتیکی و تکاملی ، 18-20 اکتبر 2014 ، ... در سیستم های هوشمند و محاسبات)

Genetic and Evolutionary Computing: Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing, October 18-20, 2014, ... in Intelligent Systems and Computing)

مشخصات کتاب

Genetic and Evolutionary Computing: Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing, October 18-20, 2014, ... in Intelligent Systems and Computing)

دسته بندی: سایبرنتیک: هوش مصنوعی
ویرایش: 2015 
نویسندگان: , , , , ,   
سری: Advances in Intelligent Systems and Computing + 329 
ISBN (شابک) : 3319122851, 9783319122861 
ناشر: Springer 
سال نشر: 2014 
تعداد صفحات: 445 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 17 مگابایت 

قیمت کتاب (تومان) : 36,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 18


در صورت تبدیل فایل کتاب Genetic and Evolutionary Computing: Proceeding of the Eighth International Conference on Genetic and Evolutionary Computing, October 18-20, 2014, ... in Intelligent Systems and Computing) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب محاسبات ژنتیکی و تکاملی: ادامه هشتمین کنفرانس بین المللی محاسبات ژنتیکی و تکاملی ، 18-20 اکتبر 2014 ، ... در سیستم های هوشمند و محاسبات) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب محاسبات ژنتیکی و تکاملی: ادامه هشتمین کنفرانس بین المللی محاسبات ژنتیکی و تکاملی ، 18-20 اکتبر 2014 ، ... در سیستم های هوشمند و محاسبات)

تحقیقات اخیر در محاسبات ژنتیک و تکاملی را ارائه می دهد مجموعه مقالات هشتمین کنفرانس بین المللی محاسبات ژنتیکی و تکاملی ICGEC 2014 در نانچانگ چین، 18 تا 20 اکتبر 2014 برگزار شد. نوشته شده توسط متخصصان این حوزه این جلد از پیشرفت‌ها در سیستم‌های هوشمند و محاسبات شامل مقالات پذیرفته‌شده ارائه شده در ICGEC 2014، هشتمین کنفرانس بین‌المللی محاسبات ژنتیک و تکاملی است. کنفرانس امسال از نظر فنی توسط مؤسسه فناوری نانچانگ در چین، دانشگاه علمی کاربردی کائوسیونگ در تایوان و دانشگاه فنی VSB استراوا برگزار شد. ICGEC 2014 از 18 تا 20 اکتبر 2014 در نانچانگ چین برگزار می شود. نانچانگ یکی از مرکز استان جیانگشی در جنوب شرقی چین است که در شمال مرکزی استان واقع شده است. از آنجایی که از غرب به کوه های جیولینگ و از شرق به دریاچه پویانگ محدود شده است، به دلیل مناظر، تاریخ غنی و مکان های فرهنگی مشهور است. به دلیل موقعیت مرکزی آن نسبت به مناطق دلتای رودخانه یانگ تسه و مروارید، یک قطب اصلی راه آهن در جنوب چین است. این کنفرانس به عنوان یک انجمن بین المللی برای محققان و متخصصان در تمام زمینه های محاسبات ژنتیکی و تکاملی در نظر گرفته شده است. سطح محتوا » تحقیق کلمات کلیدی » هوش محاسباتی - محاسبات تکاملی - محاسبات ژنتیکی - ICGEC 2014 - سیستم های هوشمند موضوعات مرتبط » هوش مصنوعی - هوش محاسباتی و پیچیدگی


توضیحاتی درمورد کتاب به خارجی

Presents recent research in Genetic and Evolutionary Computing Proceedings of the 8th International Conference on Genetic and Evolutionary Computing ICGEC 2014 held in, Nanchang China, October 18-20, 2014 Written by experts in the field This volume of Advances in Intelligent Systems and Computing contains accepted papers presented at ICGEC 2014, the 8th International Conference on Genetic and Evolutionary Computing. The conference this year was technically co-sponsored by Nanchang Institute of Technology in China, Kaohsiung University of Applied Science in Taiwan, and VSB-Technical University of Ostrava. ICGEC 2014 is held from 18-20 October 2014 in Nanchang, China. Nanchang is one of is the capital of Jiangxi Province in southeastern China, located in the north-central portion of the province. As it is bounded on the west by the Jiuling Mountains, and on the east by Poyang Lake, it is famous for its scenery, rich history and cultural sites. Because of its central location relative to the Yangtze and Pearl River Delta regions, it is a major railroad hub in Southern China. The conference is intended as an international forum for the researchers and professionals in all areas of genetic and evolutionary computing. Content Level » Research Keywords » Computational Intelligence - Evolutionary Computing - Genetic Computing - ICGEC 2014 - Intelligent Systems Related subjects » Artificial Intelligence - Computational Intelligence and Complexity



فهرست مطالب

Part I: Nature Inspired Constrained Optimization
     Artificial Bee Colony Using Opposition-Based Learning
          1 Introduction
          2 ABC Algorithm
          3 Artificial Bee Colony Using Opposition-Based Learning
          4 Experimental Verifications
          5 Conclusions
          References
     Theorem of Existence and Uniqueness of Fixed Points of Monotone Operators
          1 Introduction and Definition
          2 Main Conclusions
          References
     Adaptive Sampling Detection Based Immune Optimization Approach and Its Application to Chance Constrained Programming
          1 Introduction
          2 Problem Statement and Preliminaries
          3 Adaptive Sampling Detection for Chance Constraints
          4 Algorithm Formulation and Design
          5 Numerical Experiments
          6 Conclusions
          References
     Characteristic Analysis and Management of Human Resource in EPC Project
          1 Introduction
          2 The Characteristics of Human Resource in EPC Mode
          3 Management towards Different Characteristics in HR
          4 Conclusion
          References
     Hybrid Particle Swarm Optimization with Bat Algorithm
          1 Introduction
          2 Related Work
          3 The Proposed Hybrid PSO with BA
          4 Experimental Results
          5 Conclusion
          References
     Interaction Artificial Bee Colony Based Load Balance Method in Cloud Computing
          1 Introduction
          2 Related Work
          3 Our Proposed Method
          4 Experimental Results and Analysis
          5 Conclusion
          References
     Command Center Operation Miss Root Cause Analysis
          1 Introduction
          2 Root Cause Analysis
          3 Consider Alternative Solutions While Building Consensus
          4 Develop Consensus and Test Ideas for Effectiveness
          5 Conclusion
          References
Part II: Recent Advances on Evolutionary OptimizationTechnologies
     A New Cat Swarm Optimization with Adaptive Parameter Control
          1 Introduction
          2 Cat Swarm Optimization
          3 Parameter Analysis of
          4 Proposed Approach
          5 Simulation Results
          6 Conclusion
          References
     Multi-objective Nondominated Sorting Invasive Weed Optimization Algorithm for the Permanent Magnet Brushless Direct Current Motor Design
          1 Introduction
          2 Multi-objective Nondominated Sorting Invasive Weed Optimization
          3 PMBLDC Motor Design Using NSIWO
          4 Results
          5 Conclusions
          References
     An Evolutionary Approach to Tower of Hanoi Problem
          1 Introduction
          2 Proposed Method
          3 Evolutionary Algorithm
          4 Experimental Results
          5 Conclusion
          References
     Multipopulational Metaheuristic Approaches to Real-Parameter Optimization
          1 Introduction
          2 Parallel Metaheuristics
          3 Metaheuristic Algorithms for Real-Parameter Optimization
          4 Experiments
          5 Conclusions
          References
     Evolved Bat Algorithm for Solving the Economic Load Dispatch Problem
          1 Introduction
          2 Economic Load Dispatch Problem
          3 Meta-heuristic Evolved Bat-Inspired Algorithm
          4 Proposed EBA for Solving the Economic Dispatch Problem
          5 Experimental Results
          6 Conclusion
          References
     A Simple and Accurate Global Optimizer for Continuous Spaces Optimization
          1 Introduction
          2 The Ebb-Tide-Fish Algorithm
          3 Benchmark Function for Optimization
          4 Simulation Results of the Proposed Algorithm
          5 Conclusion and Future Work
          References
     Spatial Evolutionary Algorithm for Large-Scale Groundwater Management
          1 Introduction
          2 Spatial Evolutionary Algorithm (SEA)
          3 Illustration Example
          4 Discussion and Conclusions
          References
Part III:Wearable Computing and Intelligent Data Hiding
     Block-Based Colour Image Steganography Using Smart Pixel-Adjustment
          1 Introduction
          2 The Proposed Method
          3 Experimental Results
          4 Conclusion
          References
     A Sport Recognition Method with Utilizing Less Motion Sensors
          1 Introduction
          2 System Architecture
          3 Proposed Methods
          4 Experimental Results
          5 Conclusions
          References
     Information Hiding Based on Binary Encoding Methods and Linear Transformation Scrambling Techniques
          1 Introduction
          2 Linear Transformation Scrambling Techniques for Encoding Images
          3 Binary Encoding Methods for Hiding Linear- Transformation-Scrambled Matrices
          4 Simulations
          5 Discussions
          6 Conclusions
          References
     Dispersed Data Hiding Using Hamming Code with Recovery Capability
          1 Introduction
          2 Dispersed Data Hiding Using Hamming Code
          3 Experimental Result
          4 Conclusion
          References
     16-Bit DICOM Medical Images Lossless Hiding Scheme Based on Edge Sensing Prediction Mechanism
          1 Introduction
          2 Related Works
          3 Proposed Method
          4 Experimental Results
          5 Conclusion
          References
     A Quality Improving Scheme for VQ Decompressed Image Based on DCT
          1 Introduction
          2 Related Works
          3 ProposedMethod
          4 Experiment Results
          5 Conclusion
          References
     Research of Image Enhancement Algorithm Based on Multi-scale Retinex
          1 Introduction
          2 Algorithm Research
          2.2
          3 Experiment and Discussion
          4 Conclusion
          References
     The HRV Analysis on e-Book Reading
          1 Introduction
          2 Experimental Design
          3 Data Analysis
          4 Discussion
          5 Conclusion
          References
Part IV: Image Processing and Intelligent Applications
     Modified Choice Function Heuristic Selection for the Multidimensional Knapsack Problem
          1 Introduction
          2 Selection Hyper-Heuristics and
          Heuristic Selection
          3 The Multidimensional Knapsack Problem
          4 Experimental Framework and Parameters
          5 Computational Results
          6 Conclusions
          References
     A Distributed Computational Model of State of Consciousness
          1 Introduction
          2 Related Work
          3 Model of Consciousness and State Dynamics
          4 Experimental Evaluation
          5 Conclusion
          References
     Rotation Invariant Texture Classification Using Principal Direction Estimation
          1 Introduction
          2 Backgrounds
          3 The Proposed Patch_Orientation Method
          4 Experimental Results
          5 Conclusion
          References
     An Improved Spatial Histogram and Particle Filter Face Tracking
          1 Introduction
          2 Similarity Measure Method of a Non-uniform Spatial Histogram
          3 Particle Filter
          4 Face Tracking Method Based on Improved Spatial Histogram and Particle Filter
          5 Experimental Analysis
          6 Conclusions
          References
     Joint Encoding of Multi-scale LBP for Infrared Face Recognition
          1 Introduction
          2 Local Binary Patterns Representation
          3 Joint Encoding of Multi-scale LBP Representation
          4 Infrared Face Recognition Method
          5 Experimental Results
          6 Conclusions
          References
     Driving Behavior Analysis of Multiple Information Fusion Based on AdaBoost
          1 Introduction
          2 AdaBoost Basic Principle
          3 Driving Behavior Analysis System
          4 Experimental Results and Analysis
          5 Conclusion
          References
     The Study and Application of IT Projects Management and Control Model for Enterprise Group
          1 Introduction
          2 The Circumstance of Application of CMMI
          3 PRINCE2 Project Management Methodology
          4 PRINCE2 & CMMI ‘s Projects of Group Control Model
          5 Conclusion
          References
Part V: Intelligent Multimedia Tools and Applications
     A Data Hiding Method for Image Retargeting
          1 Introduction
          2 Background Knowledge
          3 Proposed Method
          4 Experimental Results
          5 Conclusion and Remark
          References
     Rendering 3D Solid Model
          1 Introduction
          2 The Proposed Method
          3 Experimental Results
     Greedy Active Contour Detection for Median Nerve on Strain Sonographic Images
          1 Introduction
          2 The Proposed Contour Detection Model
          3 Experiment Result
          4 Discussion and Conclusion
          References
     One Decomposition Method of Concept Lattice
          1 Introduction
          2 Preliminary
          3 The Decomposition Method of Concept Lattice
          4 Example
          5 Conclusion
          References
     The Evaluation Method for Enterprise Group Information Planning and Implementation Based on PDCA Cycle
          1 Introduction
          2 The Current Evaluation Method
          3 Introduction of EIP Model
          4 Comprehensive Evaluation Indicators
          5 Experimental Results
          6 Summary
          References
     A New Look into Web Page Ranking Systems
          1 Introduction
          2 Briefly about Web Page Ranking System
          3 Analogies between Web Page Rank Queueing Theory and Water Storage Systems
          4 Some Simulated Results
          5 Conclusions
          References
     Seismic Qualification of Telecommunication System in Nuclear Power Plant
          1 Introduction
          2 Test Specimen
          3 Test Method
          4 Acceptance Criteria
          5 Conclusion
          References
Part VI: Technologies for Next-Generation NetworkEnvironments
     A Virtual Network Guard System Based on Cloud Computing Environments
          1 Introduction
          2 Background
          3 Attack Model
          4 Design Architecture
          5 Performance Analysis
          6 Conclusion
          References
     Towards SQL Injection Attacks Detection Mechanism Using Parse Tree
          1 Introduction
          2 The Proposed Mechanism
          3 Experimental Results
          4 Conclusion
          References
     No-Reference Image Quality Assessment in Spatial Domain
          1 Introduction
          2 The Proposed Method
          3 Experiments
          4 Conclusion
          References
     MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things
          1 Introduction
          2 Related Work
          3 Cyber Physical Adaptive Security Framework for IoT
          4 Simulation and Analysis
          5 Conclusion
          References
     Accurate Recommendation Based on Opinion Mining
          1 Introduction
          2 Related Works
          3 Methodology
          4 Conclusions and Future Work
          References
     Reliability Analysis on Parallel System with N Element Obeying Exponential Distribution
          1 Introduction
          2 Model Analysis
          3 Conclussion
          References
     The Research of Private Network Secure Interconnection Scheme in Large-Scaled Enterprises
          1 Introduction
          2 Example for Private Network
          3 General Scheme Design
          4 Conclusion
          References
Author Index




نظرات کاربران