《Computational Intelligence and Its Applications》是2009年6月中國科學技術大學出版社出版的圖書,作者是姚新、李學龍、陶大程。
基本介紹
- 書名:Computational Intelligence and Its Applications
- 作者:姚新、李學龍、陶大程
- ISBN:9787312022180
- 定價:68.00元
- 出版社:中國科學技術大學出版社
- 出版時間:2009年6月
- 裝幀:軟精裝
- 開本:16開
內容簡介,目錄,
內容簡介
本書闡述計算智慧型的理論和相關的套用。重點介紹了如下三個方面的內容:計算智慧型的前沿技術,可以用計算智慧型的方法來解決的前沿問題,計算智慧型的最新技術在相關領域的套用。本書可作為信息科學技術領域高年級本科生和研究生的針對計算智慧型的入門教材,也可以供從事科研和技術開發的人員參考。IEEE計算智慧型協會是該領域重要學術組織,並為本書編寫提供很大幫助。
目錄
Preface to the USTC Alumni's Series
Preface
1 Adaptive Particle Filters
1.1 Bayesian Filtering for Dynamic State Estimation
1.1.1 State and Observation Models
1.1.2 Bayesian Filtering Method
1.2 Fundamentals of Particle Filters
1.2.1 Sequential Monte Carlo Method
1.2.2 Basic Particle Filtering Algorithms
1.3 Challenging Issues in Particle Filtering
1.3.1 Unknown or Varying State Model
1.3.2 Construction of Proposal Density
1.3.3 Determination of Sample Size
1.3.4 Curse of Dimensionality
1.4 Adaptive Particle Filtering Algorithms
1.4.1 Algorithms with Adaptive Sample Size.
1.4.2 Algorithms with Adaptive Proposal:Density
1.4.3 Other Related Algorithms
1.5 Summary
References
Brief Introduction of Authors
2 Feature Localization and Shape Indexing for Content Based Image Retrieval
2.1 Introduction
2.2 Locales for Feature Localization
2.3 Search by Object Model
2.4 Shape Indexing and Recognition
2.5 Experimental Results
2.5.1 Search Using Locale-based Models
2.5.2 Video Locales
2.5.3 Shape Indexing and Recognition
2.6 Conclusion
References
Brief Introduction of Authors
3 BlueGene/L Failure Analysis and Prediction Models
3.1 Introduction
3.2 BlueGene/L Architecture, RAS Event Logs, and Job Logs
3.2.1 BlueGene/L Architecture
3.2.2 RAS Event Logs
3.2.3 Job Logs
3.3 Impact of Failures on Job Executions
3.4 Failure Prediction Based on Failure Characteristics
3.4.1 Temporal Characteristics
3.4.2 Spatial Characteristics
3.5 Predicting Failures Using the Occurrence of Non-Fatal Events
3.6 Related Work
3.7 Concluding Remarks and Future Directions
References
Brief Introduction of Authors
4 A Neuro-Fuzzy Approach towards Adaptive Intrusion Tolerant Database Systems
4.1 Overview
4.2 ITDB architecture
4.3 The Need for Adaptivity
4.4 Intelligent Techniques Solutions in Adaptive ITDB
4.5 Intelligent Techniques Solutions in Adaptive ITDB
4.6 The Design of Reconfiguration Components
4.7 Performance Metrics for Adaptive ITDB
4.8 Adaptation Criteria
4.9 The Rule-Based Adaptive Controller
4.10 The Neuro-Fuzzy Adaptive Controller
4.11 The collection of training data
4.12 Evaluation Methodology
4.12.1 Transaction Simulation
4.12.2 Evaluation Criteria
4.13 Evaluation of NFAC and RBAC Performance
4.14 Conclusion
……
Preface
1 Adaptive Particle Filters
1.1 Bayesian Filtering for Dynamic State Estimation
1.1.1 State and Observation Models
1.1.2 Bayesian Filtering Method
1.2 Fundamentals of Particle Filters
1.2.1 Sequential Monte Carlo Method
1.2.2 Basic Particle Filtering Algorithms
1.3 Challenging Issues in Particle Filtering
1.3.1 Unknown or Varying State Model
1.3.2 Construction of Proposal Density
1.3.3 Determination of Sample Size
1.3.4 Curse of Dimensionality
1.4 Adaptive Particle Filtering Algorithms
1.4.1 Algorithms with Adaptive Sample Size.
1.4.2 Algorithms with Adaptive Proposal:Density
1.4.3 Other Related Algorithms
1.5 Summary
References
Brief Introduction of Authors
2 Feature Localization and Shape Indexing for Content Based Image Retrieval
2.1 Introduction
2.2 Locales for Feature Localization
2.3 Search by Object Model
2.4 Shape Indexing and Recognition
2.5 Experimental Results
2.5.1 Search Using Locale-based Models
2.5.2 Video Locales
2.5.3 Shape Indexing and Recognition
2.6 Conclusion
References
Brief Introduction of Authors
3 BlueGene/L Failure Analysis and Prediction Models
3.1 Introduction
3.2 BlueGene/L Architecture, RAS Event Logs, and Job Logs
3.2.1 BlueGene/L Architecture
3.2.2 RAS Event Logs
3.2.3 Job Logs
3.3 Impact of Failures on Job Executions
3.4 Failure Prediction Based on Failure Characteristics
3.4.1 Temporal Characteristics
3.4.2 Spatial Characteristics
3.5 Predicting Failures Using the Occurrence of Non-Fatal Events
3.6 Related Work
3.7 Concluding Remarks and Future Directions
References
Brief Introduction of Authors
4 A Neuro-Fuzzy Approach towards Adaptive Intrusion Tolerant Database Systems
4.1 Overview
4.2 ITDB architecture
4.3 The Need for Adaptivity
4.4 Intelligent Techniques Solutions in Adaptive ITDB
4.5 Intelligent Techniques Solutions in Adaptive ITDB
4.6 The Design of Reconfiguration Components
4.7 Performance Metrics for Adaptive ITDB
4.8 Adaptation Criteria
4.9 The Rule-Based Adaptive Controller
4.10 The Neuro-Fuzzy Adaptive Controller
4.11 The collection of training data
4.12 Evaluation Methodology
4.12.1 Transaction Simulation
4.12.2 Evaluation Criteria
4.13 Evaluation of NFAC and RBAC Performance
4.14 Conclusion
……