Applying Computational Intelligence (Record no. 111201)

000 -LEADER
fixed length control field 04303nam a22004935i 4500
001 - CONTROL NUMBER
control field 978-3-540-69913-2
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220084519.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100301s2010 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540699132
-- 978-3-540-69913-2
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-540-69913-2
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number Q342
072 #7 - SUBJECT CATEGORY CODE
Subject category code UYQ
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM004000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.3
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kordon, Arthur.
Relator term author.
245 10 - TITLE STATEMENT
Title Applying Computational Intelligence
Medium [electronic resource] :
Remainder of title How to Create Value /
Statement of responsibility, etc by Arthur Kordon.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
300 ## - PHYSICAL DESCRIPTION
Extent XXII, 459p. 20 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Computational Intelligence in a Nutshell -- Artificial vs. Computational Intelligence -- A Roadmap Through the Computational Intelligence Maze -- Let's Get Fuzzy -- Machine Learning: The Ghost in the Learning Machine -- Evolutionary Computation: The Profitable Gene -- Swarm Intelligence: The Benefits of Swarms -- Intelligent Agents: The Computer Intelligence Agency (CIA) -- Computational Intelligence Creates Value -- Why We Need Intelligent Solutions -- Competitive Advantages of Computational Intelligence -- Issues in Applying Computational Intelligence -- Computational Intelligence Application Strategy -- Integrate and Conquer -- How to Apply Computational Intelligence -- Computational Intelligence Marketing -- Industrial Applications of Computational Intelligence -- The Future of Computational Intelligence -- Future Directions of Applied Computational Intelligence.
520 ## - SUMMARY, ETC.
Summary, etc The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines on creating value from the application of computational intelligence methods. In Part I, the author offers simple explanations of the key computational intelligence technologies: fuzzy logic, neural networks, support vector machines, evolutionary computation, swarm intelligence, and intelligent agents. In Part II, he defines the typical business environment and analyzes the competitive advantages these techniques offer. In Part III, he introduces a methodology for effective real-world application of computational intelligence while minimizing development cost, and he outlines the critical, underestimated technology marketing efforts required. The methodology can improve the existing capabilities of Six Sigma, one of the most popular work processes in industry. Finally, in Part IV the author looks to technologies still in the research domain, such as perception-based computing, artificial immune systems, and systems with evolved structure, and he examines the future for computational intelligence applications while taking into account projected industrial needs. The author adopts a light tone in the book, visualizes many of the techniques and ideas, and supports the text with notes from successful implementations. The book is ideal for engineers implementing these techniques in the real world, managers charged with creating value and reducing costs in the related industries, and scientists in computational intelligence looking towards the application of their research.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data mining.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering design.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Technology.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computational Intelligence.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Technology Management.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Mining and Knowledge Discovery.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial Intelligence (incl. Robotics).
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Engineering Design.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783540699101
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-540-69913-2
912 ## -
-- ZDB-2-ENG

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue