• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Intelligent systems in cybernetics and automation control theory /

پدید آورنده
Radek Silhavy, Petr Silhavy, Zdenka Prokopova, editors.

موضوع
Artificial intelligence, Congresses.,Control theory, Congresses.,Internet of things, Congresses.,Artificial intelligence.,Artificial intelligence.,Automatic control engineering.,COMPUTERS-- General.,Control theory.,Internet of things.

رده
Q334

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3030001849
(Number (ISBN
9783030001841
Erroneous ISBN
3030001830
Erroneous ISBN
9783030001834

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Intelligent systems in cybernetics and automation control theory /
General Material Designation
[Book]
First Statement of Responsibility
Radek Silhavy, Petr Silhavy, Zdenka Prokopova, editors.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Cham, Switzerland :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
[2019]

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource

SERIES

Series Title
Advances in intelligent systems and computing,
Volume Designation
volume 860
ISSN of Series
2194-5357 ;

GENERAL NOTES

Text of Note
Includes author index.

CONTENTS NOTE

Text of Note
Intro; Preface; Organization; Program Committee; Program Committee Chairs; International Program Committee Members; Organizing Committee Chair; Conference Organizer (Production); Conference Website, Call for Papers; Contents; Efficient Framework to Secure Communication in IoT Using Novel Finite Field Encryption; Abstract; 1 Introduction; 2 Related Work; 3 Problem Description; 4 Proposed Methodology; 5 Algorithm Implementation; 5.1 Encryption Algorithm for IoT Devices; 5.2 Algorithm for Identifying Malicious Code; 6 Results Discussion; 7 Conclusion; References
Text of Note
4 Numerical Illustrations: Application to Target Beni Mellal-Khenifra RegionReferences; Masking Operator Based Genetic Algorithm Optimization for Edge Detection in Images; Abstract; 1 Introduction; 2 Methodology; 3 Results and Discussion; 4 Conclusion; References; A Novel Design and Implementation of Imaging Chip Using AXI Protocol for MPSOC on FPGA; Abstract; 1 Introduction; 2 Background; 3 Existing Researches; 4 Problem Statement; 5 Proposed System; 5.1 Brightness Control; 5.2 Contrast Stretching; 5.3 Negative Image Transformation; 5.4 Gamma Correction or Power Law Transformation
Text of Note
5.5 Image Histogram5.6 Mean Filter; 5.7 Median Filtering; 5.8 Edge Detection Techniques; 5.9 Sobel Operator; 5.10 Prewitt Operator and Other Techniques; 5.11 Image Thresholding; 6 Results and Analysis; 7 Conclusion; References; Simple Modeling of Mobile Foreground Detection Using Probabilistic Linear Estimation Approach; Abstract; 1 Introduction; 2 Related Work; 3 Problem Description; 4 Proposed Methodology; 5 Algorithm Implementation; 6 Results Discussion; 7 Conclusion; References
Text of Note
A Novel Template -- Based Data Structurization Scheme for Normalizing and Analyzing Medical DataAbstract; 1 Introduction; 2 Related Work; 3 Problem Description; 4 Proposed Methodology; 5 Algorithm Implementation; 6 Results Discussion; 7 Conclusion; References; Indirect Optimal Approach Applied to H1N1 Spread Through Moroccan Regions; 1 Introduction; 2 Modeling H1N1 Spread Through Moroccan Regions; 3 Indirect Optimal Approach Under Restricted Control; 3.1 Indirect Optimal Control Approach; 3.2 Characterization of the optimal control
Text of Note
Significant Simulation Parameters for RESTART/LRE Method in Teletraffic Systems of Ultra Broadband Convergence NetworksAbstract; 1 Introduction; 2 Trends of Ultra Broadband Convergence Networks; 3 Teletraffic Models for Ultra Broadband Convergence Networks; 4 Simulation Results of Teletraffic Models for Ultra Broadband Convergence Networks; 5 Conclusion; Acknowledgment; References; The Implementation of an SPC Chart to Improve the Forecasting Accuracy of the ARIMA Models; Abstract; 1 Introduction; 2 Review; 3 Proposed Methods; 4 Empirical Results; 4.1 Case 1: Black Pepper Futures (SMPEPPER)
0
8
8
8
8

SUMMARY OR ABSTRACT

Text of Note
This book presents real-world problems and pioneering research that reflect novel approaches to cybernetics, algorithms and software engineering in the context of intelligent systems. It gathers the peer-reviewed proceedings of the 2nd Computational Methods in Systems and Software 2018 (CoMeSySo 2018), a conference that broke down traditional barriers by being held online. The goal of the event was to provide an international forum for discussing the latest high-quality research results.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783030001841

OTHER EDITION IN ANOTHER MEDIUM

Title
Intelligent systems in cybernetics and automation control theory.
International Standard Book Number
9783030001834

TOPICAL NAME USED AS SUBJECT

Artificial intelligence, Congresses.
Control theory, Congresses.
Internet of things, Congresses.
Artificial intelligence.
Artificial intelligence.
Automatic control engineering.
COMPUTERS-- General.
Control theory.
Internet of things.

(SUBJECT CATEGORY (Provisional

COM-- 000000

DEWEY DECIMAL CLASSIFICATION

Number
006
.
3
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
Q334

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Prokopova, Zdenka
Silhavy, Petr
Silhavy, Radek

CORPORATE BODY NAME - PRIMARY RESPONSIBILITY

CoMeSySo (Conference)(2nd :2018 :, Online)

ORIGINATING SOURCE

Date of Transaction
20200823071459.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival