IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Computational Intelligence Applications in Business: A Cross-Section of the Field

Computational Intelligence Applications in Business: A Cross-Section of the Field
View Sample PDF
Author(s): Kevin E. Voges (University of Canterbury, New Zealand) and Nigel K. Ll. Pope (Griffith University, Australia)
Copyright: 2008
Pages: 15
Source title: Intelligent Information Technologies: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Vijayan Sugumaran (Oakland University, USA)
DOI: 10.4018/978-1-59904-941-0.ch104

Purchase

View Computational Intelligence Applications in Business: A Cross-Section of the Field on the publisher's website for pricing and purchasing information.

Abstract

We present an overview of the literature relating to computational intelligence (also commonly called artificial intelligence) and business applications, particularly the journal-based literature. The modern investigation into artificial intelligence started with Alan Turing who asked in 1948 if it would be possible for “machinery to show intelligent behaviour.” The computational intelligence discipline is primarily concerned with understanding the mechanisms underlying intelligent behavior, and consequently embodying these mechanisms in machines. The term “artificial intelligence” first appeared in print in 1955. As this overview shows, the 50 years of research since then have produced a wide range of techniques, many of which have important implications for many business functions, including finance, economics, production, operations, marketing, and management. However, gaining access to the literature can prove difficult for both the computational intelligence researcher andthe business practitioner, as the material is contained in numerous journals and discipline areas. The chapter provides access to the vast and scattered literature by citing reviews of the main computational intelligence techniques, including expert systems, artificial neural networks, fuzzy systems, rough sets, evolutionary algorithms, and multi-agent systems.

Related Content

Review on Intelligent Algorithms for Cyber Security
P. Subashini, M. Krishnaveni, T. T. Dhivyaprabha, R. Shanmugavalli. © 2020. 22 pages.
View Details View Details PDF Full Text View Sample PDF
A Review on Cyber Security Mechanisms Using Machine and Deep Learning Algorithms
Thiyagarajan P.. © 2020. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Review on Machine and Deep Learning Applications for Cyber Security
Thangavel M., Abiramie Shree T. G. R., Priyadharshini P., Saranya T.. © 2020. 22 pages.
View Details View Details PDF Full Text View Sample PDF
Applications of Machine Learning in Cyber Security Domain
Sailesh Suryanarayan Iyer, Sridaran Rajagopal. © 2020. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Applications of Machine Learning in Cyber Security
Charu Virmani, Tanu Choudhary, Anuradha Pillai, Manisha Rani. © 2020. 21 pages.
View Details View Details PDF Full Text View Sample PDF
Malware and Anomaly Detection Using Machine Learning and Deep Learning Methods
Valliammal Narayan, Barani Shaju. © 2020. 28 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Threats Detection and Mitigation Using Machine Learning
Vaishnavi Ambalavanan, Shanthi Bala P.. © 2020. 18 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom