Hybrid architecture for intelligent systems is a new field of artificial intelligence concerned with the development of the next generation of intelligent systems. This volume is the first book to delineate current research interests in hybrid architectures for intelligent systems. The book is divided into two parts. The first part is devoted to the theory, methodologies, and algorithms of intelligent hybrid systems. The second part examines current applications of intelligent hybrid systems in areas such as data analysis, pattern classification and recognition, intelligent robot control,...
Hybrid architecture for intelligent systems is a new field of artificial intelligence concerned with the development of the next generation of intelli...
This book presents a powerful hybrid intelligent system based on fuzzy logic, neural networks, genetic algorithms and other intelligent techniques. The new compensatory genetic fuzzy neural networks have been widely used in fuzzy control, nonlinear system modeling, compression of a fuzzy rule base, expansion of a sparse fuzzy rule base, fuzzy knowledge discovery, time series prediction, fuzzy games and pattern recognition. This effective soft computing system is able to perform both linguistic-word-level fuzzy reasoning and numerical-date-level information processing. The book also proposes...
This book presents a powerful hybrid intelligent system based on fuzzy logic, neural networks, genetic algorithms and other intelligent techniques. Th...
- The book completely introduces the intelligent Web techniques based on soft computing, granular computing, computational intelligence, and Web technology for different intelligent Web applications - The first book to introduce the novel intelligent Web theory (computational Web intelligence) with many potential intelligent Web applications - The book introduces CWI techniques for currently hot and important applications such as Web security, Internet security, bioinformatics, Web search engines, Web mining, e-commerce, intelligent Web agents, etc.
- The book completely introduces the intelligent Web techniques based on soft computing, granular computing, computational intelligence, and Web techn...
- Coverage of novel methods for software testing and software quality assurance - Introduction to state-of-the-art data mining models and techniques - Analyses of new and promising application domains of artificial intelligence and data mining in software quality engineering - Contributions from leading authors in the fields of software engineering and data mining.
- Coverage of novel methods for software testing and software quality assurance - Introduction to state-of-the-art data mining models and technique...
As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propaganda tool where they can safely communicate with their affiliates, coordinate action plans, raise funds, and introduce new supporters to their networks. This is evident from the large number of web sites run by different terrorist organizations, though the URLs and geographical locations of these web sites are frequently moved around the globe. The wide use of the Internet by terrorists makes some people think that the risk of a major cyber-attack...
As became apparent after the tragic events of September 11, 2001, terrorist groups are increasingly using the Internet as a communication and propagan...
A sharp increase in the computing power of modern computers has triggered the development of powerful algorithms that can analyze complex patterns in large amounts of data within a short time period. Consequently, it has become possible to apply pattern recognition techniques to new tasks. The main goal of this book is to cover some of the latest application domains of pattern recognition while presenting novel techniques that have been developed or customized in those domains.
A sharp increase in the computing power of modern computers has triggered the development of powerful algorithms that can analyze complex patterns ...
WEB MINING Link Analysis Search Engines User's Web Behavior HITS Algorithm Fuzzy Cognitive Map Radial Basis Function PageRank Algorithm Interior Point Method Fuzzy Bags Rgeression Models Rough Sets Information Theory Thisbookpresentsaspeci?cand uni?ed approach framework to three- jor components: Search Engines Performance, Link Analysis, and User's Web Behavior. TheexplosivegrowthandthewidespreadaccessibilityoftheWWW has led to a surge of research activity in the area of information retrieval on VI Preface the WWW. The three aspects of web mining follow the taxonomy of the above diagram: Link...
WEB MINING Link Analysis Search Engines User's Web Behavior HITS Algorithm Fuzzy Cognitive Map Radial Basis Function PageRank Algorithm Interior Point...
Today, in the middle of the ?rst decade of the 21st century, the Internet has become a major communication medium, where virtually any kind of content can be transferred instantly and reliably between individual users and entire - ganizations located in any part of the globe. The World Wide Web (WWW) has a tremendous e?ect on our daily activities at work and at home. Consequently, more e?ective and e?cient methods and technologies are needed to make the most of the Web's nearly unlimited potential. The new Web-related research directions include intelligent methods usually associated with the...
Today, in the middle of the ?rst decade of the 21st century, the Internet has become a major communication medium, where virtually any kind of content...
Graph theory has strong historical roots in mathematics, especially in topology. Its birth is usually associated with the "four-color problem" posed by Francis Guthrie 1 in 1852, but its real origin probably goes back to the Seven Bridges of Konigsber ] g 2 problem proved by Leonhard Euler in 1736. A computational solution to these two completely different problems could be found after each problem was abstracted to the level of a graph model while ignoring such irrelevant details as country shapes or cross-river distances. In general, a graph is a nonempty set of points (vertices) and the...
Graph theory has strong historical roots in mathematics, especially in topology. Its birth is usually associated with the "four-color problem" posed b...
An examination of state-of-the-art methodology for mining time series databases. The data mining methods presented include techniques for efficient segmentation, indexing, and classification of noisy and dynamic time series. A graph-based method for anomaly detection in time series is described.
An examination of state-of-the-art methodology for mining time series databases. The data mining methods presented include techniques for efficient se...