Atjaunināt sīkdatņu piekrišanu

E-grāmata: Neural Computing for Advanced Applications: Third International Conference, NCAA 2022, Jinan, China, July 8-10, 2022, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 106,47 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The two-volume Proceedings set CCIS 1637 and 1638 constitutes the refereed proceedings of the Third International Conference on Neural Computing for Advanced Applications, NCAA 2022, held in Jinan, China, during July 8–10, 2022. 

The 77 papers included in these proceedings were carefully reviewed and selected from 205 submissions. These papers were categorized into 10 technical tracks, i.e., neural network theory, and cognitive sciences, machine learning, data mining, data security & privacy protection, and data-driven applications, computational intelligence, nature-inspired optimizers, and their engineering applications, cloud/edge/fog computing, the Internet of Things/Vehicles (IoT/IoV), and their system optimization, control systems, network synchronization, system integration, and industrial artificial intelligence, fuzzy logic, neuro-fuzzy systems, decision making, and their applications in management sciences, computer vision, image processing, and their industrial applications, natural language processing, machine translation, knowledge graphs, and their applications, Neural computing-based fault diagnosis, fault forecasting, prognostic management, and system modeling, and Spreading dynamics, forecasting, and other intelligent techniques against coronavirus disease (COVID-19).
TE-BiLSTM: Improved Transformer and BiLSTM on Fraudulent Phone Text Recognition.- Cross elitist learning multifactorial evolutionary algorithm.- Heterogeneous Adaptive Denoising Networks for Recommendation.- Formation Control Optimization via Leader Selection for Rotor Unmanned Aerial Vehicles.- Dynamic Monitoring Method Based on Compara-tive Study of Power and Environmental Protection Indicators.- Combustion State Recognition Method in Municipal Solid Waste Incineration Process Based on Improved Deep Forest.- RPCA-induced Graph Tensor Learning for Incomplete Multi-view Inferring and Clustering.- TRUST-TECH Assisted GA-SVM Ensembles and its Applications.