Torrent details for "Elngar A. Applications of Computational Intelligence...2022 [andryold1]"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
15.41 MB
Info Hash:
cf1680623a974f2150b291a7948455d0f4db7163
Added By:
Added:  
16-09-2022 13:55
Views:
66
Health:
Seeds:
0
Leechers:
0
Completed:
140
wide




Description
wide
Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format

Applications of Computational Intelligence in Multi-Disciplinary Research provides the readers with a comprehensive handbook for applying the powerful principles, concepts, and algorithms of Computational Intelligence (CI) to a wide spectrum of research cases. The book covers the main approaches used in Computational Intelligence, including fuzzy logic, neural networks, evolutionary computation, learning theory, and probabilistic methods, all of which can be collectively viewed as soft computing. Other key approaches included are swarm intelligence and artificial immune systems. These approaches provide researchers with powerful tools for analysis and problem-solving when data is incomplete and when the problem under consideration is too complex for standard mathematics and the crisp logic approach of Boolean computing.
Computational intelligence (CI) is a paradigm of natural environment-inspirited computational methodologies, which provides solutions to strenuous real-life problems where mathematical and traditional modeling are rendered useless. It may be impossible to translate several real-life problems into the binary (0 or 1) format due to their stochastic nature or the uncertainties associated with them. It is in these scenarios where CI comes as a rescue to researchers. CI is the extensive umbrella under which three core technologies are present, namely Machine Learning (ML), genetic algorithms (GAs), and neural networks (NNs), among several others. These technologies either individually or in combination can be effectively utilized to fix crucial real-life issues. One essential dilemma in our daily lives is protecting and ensuring the confidentiality, integrity, and authenticity of the information both in transit and storage from intrusions by unauthorized adversaries. CI has the potential to prove to be one of the obvious choices to contribute extensively to the field of cryptography. These contributions of CI in the field of cryptography have been studied elaborately in the Chapter 2

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes