Browse Results

Showing 21,026 through 21,050 of 61,748 results

Everything is Miscellaneous: The Power of the New Digital Disorder

by David Weinberger

In Everything Is Miscellaneous, David Weinberger charts the new principles of digital order that are remaking business, education, politics, science, and culture. In his rollicking tour of the rise of the miscellaneous, he examines why the Dewey decimal system is stretched to the breaking point, how Rand McNally decides what information not to include in a physical map (and why Google Earth is winning that battle), how Staples stores emulate online shopping to increase sales, why your children's teachers will stop having them memorize facts, and how the shift to digital music stands as the model for the future in virtually every industry. Finally, he shows how by "going miscellaneous," anyone can reap rewards from the deluge of information in modern work and life.

Everything you want to know about Agile

by Jamie Lynn Cooke

Deliver exceptional results from your IT department using Agile approaches. Agile methodologies and practices have been proven over the past two decades to increase the relevance, quality, flexibility and business value of software solutions. The IT departments of many large and successful organizations (including Google, Microsoft, Yahoo! and BT) have all delivered productivity gains through the adoption of Agile approaches. It worked for them, but will it work for you? Everything you want to know about Agile is written specifically to address the challenges of implementing Agile within the unique structures, constraints and culture of your organization. It provides you with the information you need to assess whether Agile is right for your department, to select the Agile methodologies and practices that are best suited to your work, to successfully implement these approaches, and to measure the outcomes. Most importantly, this book gives you strategies for aligning Agile work within the reporting, budgeting, staffing and governance constraints of your organization, which is arguably the biggest challenge. Written for executives, IT department managers and other senior decision makers, this book is equally valuable for IT project managers, team leaders and management consultants who want to deliver successful Agile results. Jamie Lynn Cooke has 21 years' experience as a senior business analyst and solutions consultant, and has worked with over 125 public and private sector organizations throughout Australia, Canada and the US. Jamie has been working with Agile methodologies since 2003, and has written several other books on Agile, including Agile Productivity Unleashed and Agile: An Executive Guide: Real results from IT budgets. An essential read for anyone wanting to make Agile work in their organization!

Everywhere

by Larry Weber

Put digital business strategy at the center of your business Welcome to the social media age. Although its impact was first felt in the marketing department, the social web is spreading across all business functions, impacting the way they communicate, operate, organize, and create value. A comprehensive digital strategy is essential for businesses hoping to build this new form of competitive advantage. Everywhere explains how to put your digital strategy at the center of how your organization communicates, operates, organizes itself, and creates value. Develop a comprehensive digital strategy for your organization Put your online business strategy at the center of your customer's experience, and at the heart of everything you do Larry Weber's W2 Group is helping companies like Sony, IBM, Harvard Pilgrim Health Care, and the government of Rwanda, craft new online business strategies The Web is not just another marketing channel. Put social media, email, Web, and other digital interactions Everywhere in your business, and make digital business strategy the heart of your thriving enterprise.

Evidence-Based Cybersecurity: Foundations, Research, and Practice (Security, Audit and Leadership Series)

by David Maimon Pierre-Luc Pomerleau

The prevalence of cyber-dependent crimes and illegal activities that can only be performed using a computer, computer networks, or other forms of information communication technology has significantly increased during the last two decades in the USA and worldwide. As a result, cybersecurity scholars and practitioners have developed various tools and policies to reduce individuals' and organizations' risk of experiencing cyber-dependent crimes. However, although cybersecurity research and tools production efforts have increased substantially, very little attention has been devoted to identifying potential comprehensive interventions that consider both human and technical aspects of the local ecology within which these crimes emerge and persist. Moreover, it appears that rigorous scientific assessments of these technologies and policies "in the wild" have been dismissed in the process of encouraging innovation and marketing. Consequently, governmental organizations, public, and private companies allocate a considerable portion of their operations budgets to protecting their computer and internet infrastructures without understanding the effectiveness of various tools and policies in reducing the myriad of risks they face. Unfortunately, this practice may complicate organizational workflows and increase costs for government entities, businesses, and consumers. The success of the evidence-based approach in improving performance in a wide range of professions (for example, medicine, policing, and education) leads us to believe that an evidence-based cybersecurity approach is critical for improving cybersecurity efforts. This book seeks to explain the foundation of the evidence-based cybersecurity approach, review its relevance in the context of existing security tools and policies, and provide concrete examples of how adopting this approach could improve cybersecurity operations and guide policymakers' decision-making process. The evidence-based cybersecurity approach explained aims to support security professionals', policymakers', and individual computer users' decision-making regarding the deployment of security policies and tools by calling for rigorous scientific investigations of the effectiveness of these policies and mechanisms in achieving their goals to protect critical assets. This book illustrates how this approach provides an ideal framework for conceptualizing an interdisciplinary problem like cybersecurity because it stresses moving beyond decision-makers' political, financial, social, and personal experience backgrounds when adopting cybersecurity tools and policies. This approach is also a model in which policy decisions are made based on scientific research findings.

Evidence-Based Software Engineering and Systematic Reviews (Chapman & Hall/CRC Innovations in Software Engineering and Software Development Series)

by Barbara Ann Kitchenham David Budgen Pearl Brereton

In the decade since the idea of adapting the evidence-based paradigm for software engineering was first proposed, it has become a major tool of empirical software engineering. Evidence-Based Software Engineering and Systematic Reviews provides a clear introduction to the use of an evidence-based model for software engineering research and practice.

Evil Media

by Matthew Fuller Andrew Goffey

Evil Media develops a philosophy of media power that extends the concept of media beyond its tried and trusted use in the games of meaning, symbolism, and truth. It addresses the gray zones in which media exist as corporate work systems, algorithms and data structures, twenty-first century self-improvement manuals, and pharmaceutical techniques. Evil Media invites the reader to explore and understand the abstract infrastructure of the present day. From search engines to flirting strategies, from the value of institutional stupidity to the malicious minutiae of databases, this book shows how the devil is in the details. The title takes the imperative "Don't be evil" and asks, what would be done any differently in contemporary computational and networked media were that maxim reversed. Media here are about much more and much less than symbols, stories, information, or communication: media do things. They incite and provoke, twist and bend, leak and manage. In a series of provocative stratagems designed to be used, Evil Media sets its reader an ethical challenge: either remain a transparent intermediary in the networks and chains of communicative power or become oneself an active, transformative medium.

Evil by Design

by Chris Nodder

How to make customers feel good about doing what you wantLearn how companies make us feel good about doing what they want. Approaching persuasive design from the dark side, this book melds psychology, marketing, and design concepts to show why we're susceptible to certain persuasive techniques. Packed with examples from every nook and cranny of the web, it provides easily digestible and applicable patterns for putting these design techniques to work. Organized by the seven deadly sins, it includes:Pride -- use social proof to position your product in line with your visitors' valuesSloth -- build a path of least resistance that leads users where you want them to goGluttony -- escalate customers' commitment and use loss aversion to keep them thereAnger -- understand the power of metaphysical arguments and anonymityEnvy -- create a culture of status around your product and feed aspirational desiresLust -- turn desire into commitment by using emotion to defeat rational behaviorGreed -- keep customers engaged by reinforcing the behaviors you desireNow you too can leverage human fallibility to create powerful persuasive interfaces that people will love to use -- but will you use your new knowledge for good or evil? Learn more on the companion website, evilbydesign.info.

Evolution and Advances in Computing Technologies for Industry 6.0: Technology, Practices, and Challenges

by Surbhi Bhatia Khan Srinath Doss Abdulmajeed Alqhatani Reddy, C. Kishor Kumar

This book provides a comprehensive exploration of Industry 6.0, which marks the convergence of intelligent systems, machine learning (ML), deep learning, and human–robot collaboration (HRC) in various sectors. It focuses on how these technologies enable businesses to harness insights from vast datasets, optimize operations, forecast maintenance requirements, and mitigate outages. In this comprehensive book, the authors cover the major aspects of Industry 6.0, including the latest advances in technology, new applications, and the many challenges that accompany the process that is changing it. This book acts as a compass, guiding readers through the labyrinth of Industry 6.0, revealing the complex interactions between technologies, new applications, innovations, and business ecosystems. From a multidisciplinary perspective, the book explores the far‑reaching impact of Industry 6.0 on the business world, revealing its potential to increase productivity, improve decision‑making, and open new opportunities for development. Discusses the transformative impact of Industry 6.0 driven by the convergence of artificial intelligence (AI), ML, and the industrial internet of things (IIoT) in manufacturing Explores the transformative potential of HRC in modern manufacturing, emphasizing the ability of HRC to boost productivity, flexibility, and safety Compares several service models in cloud computing, with a focus on private, public, and community cloud deployment methods Presents information about autism spectrum disorder (ASD) in children and the advanced technology of convolutional neural networks used to detect autism in children Describes the accurate diagnosis of Alzheimer’s disease through integrating state‑of‑the‑art technologies, especially deep learning Focuses on digital adaptation in India’s agricultural sector, especially Uttar Pradesh, highlighting challenges and prospects Presents a visionary leap into Agriculture 6.0, where technology and tradition converge for sustainable farming solutions Provides the mitigation strategies for climate change over multiple locations Explores the transformative impact of recent computational intelligence advancements in vehicle surveillance and recognition, particularly through CCTV analysis Focuses on the exploration and development of a supply chain network design (SCND) model of milk products This book will be of interest to researchers, academics, practitioners, technology providers, undergraduate and postgraduate students, scholars, consultants, advisors, and doctors. It can be used by undergraduate and postgraduate students pursuing Industry 6.0 programs in computer science and engineering across the globe.

Evolution and Applications of Quantum Computing

by Sachi Nandan Mohanty Rajanikanth Aluvalu Sarita Mohanty

EVOLUTION and APPLICATIONS of QUANTUM COMPUTING The book is about the Quantum Model replacing traditional computing’s classical model and gives a state-of-the-art technical overview of the current efforts to develop quantum computing and applications for Industry 4.0. A holistic approach to the revolutionary world of quantum computing is presented in this book, which reveals valuable insights into this rapidly emerging technology. The book reflects the dependence of quantum computing on the physical phenomenon of superposition, entanglement, teleportation, and interference to simplify difficult mathematical problems which would have otherwise taken years to derive a definite solution for. An amalgamation of the information provided in the multiple chapters will elucidate the revolutionary and riveting research being carried out in the brand-new domain encompassing quantum computation, quantum information and quantum mechanics. Each chapter gives a concise introduction to the topic. The book comprises 18 chapters and describes the pioneering work on the interaction between artificial intelligence, machine learning, and quantum computing along with their applications and potential role in the world of big data. Subjects include: Combinational circuits called the quantum multiplexer with secured quantum gate (CSWAP); Detecting malicious emails and URLs by using quantum text mining algorithms to distinguish between phishing and benign sites; Quantum data traffic analysis for intrusion detection systems; Applications of quantum computation in banking, netnomy and vehicular ad-hoc networks, virtual reality in the education of autistic children, identifying bacterial diseases and accelerating drug discovery; The critical domain of traditional classical cryptography and quantum cryptography. Audience The book will be very useful for researchers in computer science, artificial intelligence and quantum physics as well as students who want to understand the history of quantum computing along with its applications and have a technical state-of-the-art overview.

Evolution in Computational Intelligence: Frontiers in Intelligent Computing: Theory and Applications (FICTA 2020), Volume 1 (Advances in Intelligent Systems and Computing #1176)

by Suresh Chandra Satapathy Vikrant Bhateja Sheng-Lung Peng Yu-Dong Zhang

This book presents the proceedings of 8th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2020), which aims to bring together researchers, scientists, engineers and practitioners to share new ideas and experiences in the domain of intelligent computing theories with prospective applications to various engineering disciplines. The book is divided into two volumes: Evolution in Computational Intelligence (Volume 1) and Intelligent Data Engineering and Analytics (Volume 2).Covering a broad range of topics in computational intelligence, the book features papers on theoretical as well as practical aspects of areas such as ANN and genetic algorithms, computer interaction, intelligent control optimization, evolutionary computing, intelligent e-learning systems, machine learning, mobile computing, and multi-agent systems. As such, it is a valuable reference resource for postgraduate students in various engineering disciplines.

Evolution in Computational Intelligence: Proceedings of the 10th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2022) (Smart Innovation, Systems and Technologies #326)

by Xin-She Yang Vikrant Bhateja Jerry Chun-Wei Lin Ranjita Das

The book presents the proceedings of the 10th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2022), held at NIT Mizoram, Aizawl, Mizoram, India during 18 – 19 June 2022. Researchers, scientists, engineers, and practitioners exchange new ideas and experiences in the domain of intelligent computing theories with prospective applications in various engineering disciplines in the book. These proceedings are divided into two volumes. It covers broad areas of information and decision sciences, with papers exploring both the theoretical and practical aspects of data-intensive computing, data mining, evolutionary computation, knowledge management and networks, sensor networks, signal processing, wireless networks, protocols and architectures. This volume is a valuable resource for postgraduate students in various engineering disciplines.

Evolution in Computational Intelligence: Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023) (Smart Innovation, Systems and Technologies #370)

by Xin-She Yang Vikrant Bhateja Carlos M. Travieso-Gonzalez Marta Campos Ferreira Sandeep Singh Sengar

The book presents the proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023), held at Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, Wales, UK, during April 11–12, 2023. Researchers, scientists, engineers, and practitioners exchange new ideas and experiences in the domain of intelligent computing theories with prospective applications in various engineering disciplines in the book. This book is divided into two volumes. It covers broad areas of information and decision sciences, with papers exploring both the theoretical and practical aspects of data-intensive computing, data mining, evolutionary computation, knowledge management and networks, sensor networks, signal processing, wireless networks, protocols, and architectures. This book is a valuable resource for postgraduate students in various engineering disciplines.

Evolution in Computational Intelligence: Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2021) (Smart Innovation, Systems and Technologies #267)

by Suresh Chandra Satapathy Vikrant Bhateja Peter Peer Jinshan Tang Ranjita Das

This book presents the proceedings of the 9th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2021), held at NIT Mizoram, Aizwal, Mizoram, India, during June 25 – 26, 2021. FICTA conference aims to bring together researchers, scientists, engineers, and practitioners to exchange their new ideas and experiences in the domain of intelligent computing theories with prospective applications to various engineering disciplines. This volume covers broad areas of Evolution in Computational Intelligence. The conference papers included herein presents both theoretical as well as practical aspects of different areas like ANN and genetic algorithms, human-computer interaction, intelligent control optimization, evolutionary computing, intelligent e-learning systems, machine learning, mobile computing, multi-agent systems, etc. The volume will also serve as a knowledge centre for students of post-graduate level in various engineering disciplines.

Evolution in Signal Processing and Telecommunication Networks: Proceedings of 8th International Conference on Microelectronics Electromagnetics and Telecommunications (ICMEET 2023) (Lecture Notes in Electrical Engineering #1155)

by Vikrant Bhateja P. Satish Rama Chowdary Shabana Urooj Wendy Flores-Fuentes Rudra Sankar Dhar

The book discusses the latest developments and outlines future trends in the fields of microelectronics, electromagnetics, and telecommunication. It contains original research works presented at the International Conference on Microelectronics, Electromagnetics and Telecommunication (ICMEET 2023), organized by Department of Electronics and Communication Engineering, National Institute of Technology Mizoram, India during October 6–7, 2023. The book is divided into two volumes, and it covers papers written by scientists, research scholars, and practitioners from leading universities, engineering colleges, and R&D institutes from all over the world and share the latest breakthroughs in and promising solutions to the most important issues facing today’s society.

Evolution in Signal Processing and Telecommunication Networks: Proceedings of Sixth International Conference on Microelectronics, Electromagnetics and Telecommunications (ICMEET 2021), Volume 2 (Lecture Notes in Electrical Engineering #839)

by Suresh Chandra Satapathy Vikrant Bhateja P. Satish Rama Chowdary Jaume Anguera

This book discusses the latest developments and outlines future trends in the fields of microelectronics, electromagnetics and telecommunication. It contains original research works presented at the International Conference on Microelectronics, Electromagnetics and Telecommunication (ICMEET 2021), held in Bhubaneswar, Odisha, India during 27–28 August, 2021. The papers were written by scientists, research scholars and practitioners from leading universities, engineering colleges and R&D institutes from all over the world and share the latest breakthroughs in and promising solutions to the most important issues facing today’s society.

Evolution of Air Interface Towards 5G

by Suvra Sekhar Das

Over the past few decades, wireless access networks have evolved extensively to support the tremendous growth of consumer traffic. This superlative growth of data consumption has come about due to several reasons, such as evolution of the consumer devices, the types of telephone and smartphone being used, convergence of services, digitisation of economic transactions, tele-education, telemedicine, m-commerce, virtual reality office, social media, e-governance, e-security, to name but a few.Not only has the society transformed to a digital world, but also the expectations from the services provided have increased many folds. The last mile/meters of delivery of all e-services is now required to be wireless. It has always been known that wireless links are the bottleneck to providing high data rates and high quality of service. Several wireless signalling and performance analysis techniques to overcome the hurdles of wireless channels have been developed over the last decade, and these are fuelling the evolution of 4G towards 5G. Evolution of Air Interface Towards 5G attempts to bring out some of the important developments that are contributing towards such growth.

Evolution of Cyber Technologies and Operations to 2035

by Misty Blowers

This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades. It provides a review of future disruptive technologies and innovations in cyber security. It also serves as a resource for wargame planning and provides a strategic vision of the future direction of cyber operations. It informs military strategist about the future of cyber warfare. Written by leading experts in the field, chapters explore how future technical innovations vastly increase the interconnectivity of our physical and social systems and the growing need for resiliency in this vast and dynamic cyber infrastructure. The future of social media, autonomy, stateless finance, quantum information systems, the internet of things, the dark web, space satellite operations, and global network connectivity is explored along with the transformation of the legal and ethical considerations which surround them. The international challenges of cyber alliances, capabilities, and interoperability is challenged with the growing need for new laws, international oversight, and regulation which informs cybersecurity studies. The authors have a multi-disciplinary scope arranged in a big-picture framework, allowing both deep exploration of important topics and high level understanding of the topic. Evolution of Cyber Technologies and Operations to 2035 is as an excellent reference for professionals and researchers working in the security field, or as government and military workers, economics, law and more. Students will also find this book useful as a reference guide or secondary text book.

Evolution of Digitized Societies Through Advanced Technologies (Advanced Technologies and Societal Change)

by Arindam Biswas T. P. Singh Amitava Choudhury Mrinal Anand

This book provides an understanding of the evolution of digitization in our day to day life and how it has become a part of our social system. The obvious challenges faced during this process and how these challenges were overcome have been discussed. The discussions revolve around the solutions to these challenges by leveraging the use of various advanced technologies. The book mainly covers the use of these technologies in variety of areas such as smart cities, healthcare informatics, transportation automation, digital transformation of education. The book intends to be treated as a source to provide the systematic discussion to the bouquet of areas that are essential part of digitized societies. In light of this, the book accommodates theoretical, methodological, well-established, and validated empirical work dealing with various related topics.

Evolution of STEM-Driven Computer Science Education: The Perspective of Big Concepts

by Vytautas Štuikys Renata Burbaitė

The book discusses the evolution of STEM-driven Computer Science (CS) Education based on three categories of Big Concepts, Smart Education (Pedagogy), Technology (tools and adequate processes) and Content that relates to IoT, Data Science and AI. For developing, designing, testing, delivering and assessing learning outcomes for K-12 students (9-12 classes), the multi-dimensional modelling methodology is at the centre. The methodology covers conceptual and feature-based modelling, prototyping, and virtual and physical modelling at the implementation and usage level. Chapters contain case studies to assist understanding and learning. The book contains multiple methodological and scientific innovations including models, frameworks and approaches to drive STEM-driven CS education evolution.Educational strategists, educators, and researchers will find valuable material in this book to help them improve STEM-driven CS education strategies, curriculum development, and new ideas for research.

Evolution of Semantic Systems

by Bernd-Olaf Küppers Stefan Artmann Udo Hahn

Complex systems in nature and society make use of information for the development of their internal organization and the control of their functional mechanisms. Alongside technical aspects of storing, transmitting and processing information, the various semantic aspects of information, such as meaning, sense, reference and function, play a decisive part in the analysis of such systems. With the aim of fostering a better understanding of semantic systems from an evolutionary and multidisciplinary perspective, this volume collects contributions by philosophers and natural scientists, linguists, information and computer scientists. They do not follow a single research paradigm; rather they shed, in a complementary way, new light upon some of the most important aspects of the evolution of semantic systems. Evolution of Semantic Systems is intended for researchers in philosophy, computer science, and the natural sciences who work on the analysis or development of semantic systems, ontologies, or similar complex information structures. In the eleven chapters, they will find a broad discussion of topics ranging from underlying universal principles to representation and processing aspects to paradigmatic examples.

Evolution of Smart Sensing Ecosystems with Tamper Evident Security

by Pawel Sniatala S.S. Iyengar Sanjeev Kaushik Ramani

This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition towards the modern tamper evident systems. The goal is also to aid business organizations that are dependent on the analysis of the large volumes of generated data in securing and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity and provenance of data. The book also provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others.

Evolution, Complexity and Artificial Life

by Stefano Cagnoni Marco Mirolli Marco Villani

Evolution and complexity characterize both biological and artificial life - by direct modeling of biological processes and the creation of populations of interacting entities from which complex behaviors can emerge and evolve. This edited book includes invited chapters from leading scientists in the fields of artificial life, complex systems, and evolutionary computing. The contributions identify both fundamental theoretical issues and state-of-the-art real-world applications. The book is intended for researchers and graduate students in the related domains.

Evolutionary Algorithms

by Alain Petrowski Sana Ben-Hamida

Evolutionary algorithms are bio-inspired algorithms based on Darwin’s theory of evolution. They are expected to provide non-optimal but good quality solutions to problems whose resolution is impracticable by exact methods. In six chapters, this book presents the essential knowledge required to efficiently implement evolutionary algorithms. Chapter 1 describes a generic evolutionary algorithm as well as the basic operators that compose it. Chapter 2 is devoted to the solving of continuous optimization problems, without constraint. Three leading approaches are described and compared on a set of test functions. Chapter 3 considers continuous optimization problems with constraints. Various approaches suitable for evolutionary methods are presented. Chapter 4 is related to combinatorial optimization. It provides a catalog of variation operators to deal with order-based problems. Chapter 5 introduces the basic notions required to understand the issue of multi-objective optimization and a variety of approaches for its application. Finally, Chapter 6 describes different approaches of genetic programming able to evolve computer programs in the context of machine learning.

Evolutionary Algorithms and Metaheuristics in Civil Engineering and Construction Management

by Jorge Magalhães-Mendes David Greiner

This book focuses on civil and structural engineering and construction management applications. The contributions constitute modified, extended and improved versions of research presented at the minisymposium organized by the editors at the ECCOMAS conference on this topic in Barcelona 2014.

Evolutionary Algorithms and Neural Networks: Theory and Applications (Studies in Computational Intelligence #780)

by Seyedali Mirjalili

This book introduces readers to the fundamentals of artificial neural networks, with a special emphasis on evolutionary algorithms. At first, the book offers a literature review of several well-regarded evolutionary algorithms, including particle swarm and ant colony optimization, genetic algorithms and biogeography-based optimization. It then proposes evolutionary version of several types of neural networks such as feed forward neural networks, radial basis function networks, as well as recurrent neural networks and multi-later perceptron. Most of the challenges that have to be addressed when training artificial neural networks using evolutionary algorithms are discussed in detail. The book also demonstrates the application of the proposed algorithms for several purposes such as classification, clustering, approximation, and prediction problems. It provides a tutorial on how to design, adapt, and evaluate artificial neural networks as well, and includes source codes for most of the proposed techniques as supplementary materials.

Refine Search

Showing 21,026 through 21,050 of 61,748 results