000 | 04106nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-030-75657-4 | ||
003 | DE-He213 | ||
005 | 20240423125505.0 | ||
007 | cr nn 008mamaa | ||
008 | 211105s2021 sz | s |||| 0|eng d | ||
020 |
_a9783030756574 _9978-3-030-75657-4 |
||
024 | 7 |
_a10.1007/978-3-030-75657-4 _2doi |
|
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aAdvanced Soft Computing Techniques in Data Science, IoT and Cloud Computing _h[electronic resource] / _cedited by Sujata Dash, Subhendu Kumar Pani, Ajith Abraham, Yulan Liang. |
250 | _a1st ed. 2021. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2021. |
|
300 |
_aXXV, 434 p. 258 illus., 192 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Big Data, _x2197-6511 ; _v89 |
|
505 | 0 | _aA Wearable Assistive Device for Safe Travel using Transfer Learning and IoT for Visually Impaired People -- Soft Computing Techniques for Physical Layer Security of IoT Devices -- Linear Congruence and Chaos based Encryption Key Generation for Medical Data Security in IoT based Health care System -- Content Based Video Retrieval - Methods, Techniques and Applications. | |
520 | _aThis book plays a significant role in improvising human life to a great extent. The new applications of soft computing can be regarded as an emerging field in computer science, automatic control engineering, medicine, biology application, natural environmental engineering, and pattern recognition. Now, the exemplar model for soft computing is human brain. The use of various techniques of soft computing is nowadays successfully implemented in many domestic, commercial, and industrial applications due to the low-cost and very high-performance digital processors and also the decline price of the memory chips. This is the main reason behind the wider expansion of soft computing techniques and its application areas. These computing methods also play a significant role in the design and optimization in diverse engineering disciplines. With the influence and the development of the Internet of things (IoT) concept, the need for using soft computing techniques has become more significant than ever. In general, soft computing methods are closely similar to biological processes than traditional techniques, which are mostly based on formal logical systems, such as sentential logic and predicate logic, or rely heavily on computer-aided numerical analysis. Soft computing techniques are anticipated to complement each other. The aim of these techniques is to accept imprecision, uncertainties, and approximations to get a rapid solution. | ||
650 | 0 | _aComputational intelligence. | |
650 | 0 |
_aEngineering _xData processing. |
|
650 | 0 | _aCooperating objects (Computer systems). | |
650 | 0 | _aBig data. | |
650 | 1 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aData Engineering. |
650 | 2 | 4 | _aCyber-Physical Systems. |
650 | 2 | 4 | _aBig Data. |
700 | 1 |
_aDash, Sujata. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPani, Subhendu Kumar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAbraham, Ajith. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aLiang, Yulan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030756567 |
776 | 0 | 8 |
_iPrinted edition: _z9783030756581 |
776 | 0 | 8 |
_iPrinted edition: _z9783030756598 |
830 | 0 |
_aStudies in Big Data, _x2197-6511 ; _v89 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-75657-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c178511 _d178511 |