This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2012 and ICEUTE 2012, both conferences held in the beautiful and historic city of Ostrava (Czech Republic), in September 2012. CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation...
This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2012 and ICEUTE 2012, both conferences held in t...
The success of the World Wide Web depends on the ability of users to store, p- cess and retrieve digital information regardless of distance boundaries, languages and domains of knowledge. The universality and ?exibility of the World Wide Web have also enabled the rapid growth of a variety of new services and applications based on human-machine interaction. The semantics of exchanged information and services should be useful not only for human to human communications, but also in that machines would be able to understand and automatically process web content. Semanticsgive well-de?nedmeaningto...
The success of the World Wide Web depends on the ability of users to store, p- cess and retrieve digital information regardless of distance boundaries...
This volume examines the application of swarm intelligence in data mining, addressing the issues of swarm intelligence and data mining using novel intelligent approaches. The book comprises 11 chapters including an introduction reviewing fundamental definitions and important research challenges. Important features include a detailed overview of swarm intelligence and data mining paradigms, focused coverage of timely, advanced data mining topics, state-of-the-art theoretical research and application developments and contributions by pioneers in the field.
This volume examines the application of swarm intelligence in data mining, addressing the issues of swarm intelligence and data mining using novel ...
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Symposium on Intelligent Informatics (ISI 2013) held in Mysore, India during August 23-24, 2013. The 47 revised papers presented were carefully reviewed and selected from 126 initial submissions. The papers are organized in topical sections on pattern recognition, signal and image processing; data mining, clustering and intelligent information systems; multi agent systems; and computer networks and distributed systems. The book is directed to the researchers and scientists engaged in various...
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Symposium on Intelligent Informatics (ISI 2013) ...
This volume of Advances in Intelligent Systems and Computing contains accepted papers presented at IBICA2013, the 4th International Conference on Innovations in Bio-inspired Computing and Applications. The aim of IBICA 2013 was to provide a platform for world research leaders and practitioners, to discuss the full spectrum of current theoretical developments, emerging technologies, and innovative applications of Bio-inspired Computing. Bio-inspired Computing is currently one of the most exciting research areas, and it is continuously demonstrating exceptional strength in solving complex real...
This volume of Advances in Intelligent Systems and Computing contains accepted papers presented at IBICA2013, the 4th International Conference on Inno...
We often come across computational optimization virtually in all branches of engineering and industry.Many engineering problems involve heuristic search and optimization, and, once discretized, may become combinatorial in nature, which gives rise to certain difficulties in terms of solution procedure. Some of these problems have enormous search spaces, are NP-hard and hence require heuristic solution techniques. Another difficulty is the lack of ability of classical solution techniques to determine appropriate optima of non-convex problems. Under these conditions, recent advances in...
We often come across computational optimization virtually in all branches of engineering and industry.Many engineering problems involve heuristic s...
Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study of pattern analysis that answer the question of interest in security, medical, legal, genetic studies and etc. However, forensic analysis is usually performed through experiments in lab which is expensive both in cost and time. Therefore, this book seeks to explore the progress and advancement of computational intelligence technique in different focus areas of forensic studies. This aims to build stronger connection between computer scientists...
Computational Intelligence techniques have been widely explored in various domains including forensics. Analysis in forensic encompasses the study ...
This book is the first of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on practical tools, applications, and open avenues for further research (the other two volumes review issues of Security and Privacy, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage by applying these ideas in real-world scenarios;...
This book is the first of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contribut...
This volume contains accepted papers presented at AECIA2014, the First International Afro-European Conference for Industrial Advancement. The aim of AECIA was to bring together the foremost experts as well as excellent young researchers from Africa, Europe, and the rest of the world to disseminate latest results from various fields of engineering, information, and communication technologies. The first edition of AECIA was organized jointly by Addis Ababa Institute of Technology, Addis Ababa University, and VSB - Technical University of Ostrava, Czech Republic and took place in Ethiopia's...
This volume contains accepted papers presented at AECIA2014, the First International Afro-European Conference for Industrial Advancement. The aim o...
Medical Informatics (MI) is an emerging interdisciplinary science that deals with clinical health-related information, its structure, acquisition and use. MI is grounded in the principles of computer science, computational intelligence, as well as the clinical and basic sciences. This book deals with the application of computational intelligence in medical informatics. Addressing the various issues of medical informatics using different computational intelligence approaches is the novelty of this edited volume. This volume comprises of 15 chapters including an introductory chapter giving...
Medical Informatics (MI) is an emerging interdisciplinary science that deals with clinical health-related information, its structure, acquisition a...