|
|
|
|
LEADER |
03258nam a22004815i 4500 |
001 |
978-3-642-29148-7 |
003 |
DE-He213 |
005 |
20151029221431.0 |
007 |
cr nn 008mamaa |
008 |
120629s2012 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642291487
|9 978-3-642-29148-7
|
024 |
7 |
|
|a 10.1007/978-3-642-29148-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Soft Computing in Information Communication Technology
|h [electronic resource] :
|b Volume 1 /
|c edited by Jia Luo.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg :
|b Imprint: Springer,
|c 2012.
|
300 |
|
|
|a XII, 528 p. 154 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Intelligent and Soft Computing,
|x 1867-5662 ;
|v 158
|
505 |
0 |
|
|a From the content: Gaussian-Heimite in the Atom Population Solution -- The Study of Financial Management Information for Business Process Reengineering under the Low-carbon Economy -- Measures of Building Tax Information -- A New Type of Using Morphology Methods to Detect Blood Cancer Cells -- An Automatic Image Segmentation Algorithm based on Weighting Fuzzy C-Means Clustering -- Secure DV-Hop Localization against Wormhole Attacks in Wireless Sensor Networks -- An Analysis on the Application and Development Trend of CAD Technology of our Country -- Na+ Distribution and Secretion Characters From Tamarix Hispida Under Salt Stress.
|
520 |
|
|
|a This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Multimedia information systems.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Computational Intelligence.
|
650 |
2 |
4 |
|a Communications Engineering, Networks.
|
650 |
2 |
4 |
|a Multimedia Information Systems.
|
700 |
1 |
|
|a Luo, Jia.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642291470
|
830 |
|
0 |
|a Advances in Intelligent and Soft Computing,
|x 1867-5662 ;
|v 158
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-29148-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|