Applied Computing
Editat de Suresh Manandhar, Jim Austin, Uday Desai, Yoshio Oyanagi, Asoke Talukderen Limba Engleză Paperback – 22 oct 2004
Preț: 323.83 lei
Preț vechi: 404.79 lei
-20% Nou
Puncte Express: 486
Preț estimativ în valută:
57.30€ • 67.19$ • 50.32£
57.30€ • 67.19$ • 50.32£
Carte tipărită la comandă
Livrare economică 06-20 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540236597
ISBN-10: 3540236597
Pagini: 352
Ilustrații: XII, 340 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.53 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540236597
Pagini: 352
Ilustrații: XII, 340 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.53 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Machine Learning and Soft Computing.- Effective Evolutionary Multimodal Optimization by Multiobjective Reformulation Without Explicit Niching/Sharing.- Development of Genetic Algorithm Embedded KNN for Fingerprint Recognition.- Genetic IMM_NN Based Tracking of Multiple Point Targets in Infrared Image Sequence.- Finding the Natural Groupings in a Data Set Using Genetic Algorithms.- Volumetric Measurement of Heart Using PA and Lateral View of Chest Radiograph.- On the Optimization of Fuzzy Relation Equations with Continuous t-Norm and with Linear Objective Function.- Progressive Boosting for Classifier Committee Learning.- Scheduling, Optimisation and Constraint Solving.- Parallel SAT Solving with Microcontrollers.- Flow Shop Scheduling with Late Work Criterion – Choosing the Best Solution Strategy.- GA-Based Multiple Route Selection for Car Navigation.- Genetic Algorithm for Airline Crew Scheduling Problem Using Cost-Based Uniform Crossover.- Neural Networks and SVMs.- Neural Network and Wavelets in Arrhythmia Classification.- ECG Arrhythmia Analysis by Multicategory Support Vector Machine.- Approximation of Multi-pattern to Single-Pattern Functions by Combining FeedForward Neural Networks and Support Vector Machines.- Comparison of Numerical Integration Algorithms in Raster CNN Simulation.- Natural Language Processing and Information Retrieval.- Morphological Analyzer for Manipuri: Design and Implementation.- Using Selectional Restrictions for Real Word Error Correction.- Mining Top – k Ranked Webpages Using Simulated Annealing and Genetic Algorithms.- Using Document Dimensions for Enhanced Information Retrieval.- Speech and Signal Processing.- Effect of Phonetic Modeling on Manipuri Digit Recognition Systems Using CDHMMs.- Building Language Models for Tamil SpeechRecognition System.- Implementation of Tamil Speech Recognition System Using Neural Networks.- Introducing Pitch Modification in Residual Excited LPC Based Tamil Text-to-Speech Synthesis.- Separation Performance of ICA Algorithms on FECG and MECG Signals Contaminated by Noise.- Networks and Mobile Computing.- Evaluation of BER/PER Performance of a FLAMINGO Network.- Fault Tolerance Studies for Wormhole Routing in Multiconnected Double-Loop Networks.- Applications and Parallel Implementations of Metaheuristics in Network Design and Routing.- Comparison of Integrated Micro and Macro Mobility Protocols.- Genetic Algorithm Based Optimization for Location Update and Paging in Mobile Networks.- Parallel, Grid and High Performance Computing.- Global Backfilling Scheduling in Multiclusters.- Computation of Ternary Covering Arrays Using a Grid.- Impact of Algorithm Design in Implementing Real-Time Active Control Systems.- An Efficient Technique for Dynamic Slicing of Concurrent Java Programs.- A Simple Delay Testable Synthesis of Symmetric Functions.- Innovative Applications for the DevelopingWorld.- VOBA – A Voice Based Newsgroup.- An ICT Based Framework for Improving Rural Credit Delivery.- An Approach Towards a Decentralised Disaster Management Information Network.- A Web-Based Examination System in the Context of Bangladesh.- Cryptography and Security.- Trust and Security Realization for Mobile Users in GSM Cellular Networks.- A Software Agent Based Approach for Fraud Detection in Network Crimes.- An Ontology for Network Security Attacks.- Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions.
Caracteristici
Includes supplementary material: sn.pub/extras