IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Computational Intelligence Techniques

Computational Intelligence Techniques
View Sample PDF
Author(s): Bharat Sundaram (The University of Melbourne, Australia), Marimuthu Palaniswani (The University of Melbourne, Australia), Alistair Shilton (The University of Melbourne, Australia) and Rezaul Begg (Victoria University, Australia)
Copyright: 2008
Pages: 28
Source title: Intelligent Information Technologies: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Vijayan Sugumaran (Oakland University, USA)
DOI: 10.4018/978-1-59904-941-0.ch020

Purchase

View Computational Intelligence Techniques on the publisher's website for pricing and purchasing information.

Abstract

Computational intelligence (CI) encompasses approaches primarily based on artificial neural networks, fuzzy logic rules, evolutionary algorithms, support vector machines and also approaches that combine two or more techniques (hybrid). These methods have been applied to solve many complex and diverse problems. Recent years have seen many new developments in CI techniques and, consequently, this has led to many applications in a variety of areas including engineering, finance, social and biomedical. In particular, CI techniques are increasingly being used in biomedical and human movement areas because of the complexity of the biological systems. The main objective of this chapter is to provide a brief description of the major computational intelligence techniques for pattern recognition and modelling tasks that often appear in biomedical, health and human movement research.

Related Content

Review on Intelligent Algorithms for Cyber Security
P. Subashini, M. Krishnaveni, T. T. Dhivyaprabha, R. Shanmugavalli. © 2020. 22 pages.
View Details View Details PDF Full Text View Sample PDF
A Review on Cyber Security Mechanisms Using Machine and Deep Learning Algorithms
Thiyagarajan P.. © 2020. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Review on Machine and Deep Learning Applications for Cyber Security
Thangavel M., Abiramie Shree T. G. R., Priyadharshini P., Saranya T.. © 2020. 22 pages.
View Details View Details PDF Full Text View Sample PDF
Applications of Machine Learning in Cyber Security Domain
Sailesh Suryanarayan Iyer, Sridaran Rajagopal. © 2020. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Applications of Machine Learning in Cyber Security
Charu Virmani, Tanu Choudhary, Anuradha Pillai, Manisha Rani. © 2020. 21 pages.
View Details View Details PDF Full Text View Sample PDF
Malware and Anomaly Detection Using Machine Learning and Deep Learning Methods
Valliammal Narayan, Barani Shaju. © 2020. 28 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Threats Detection and Mitigation Using Machine Learning
Vaishnavi Ambalavanan, Shanthi Bala P.. © 2020. 18 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom