Shopping cart
Your cart empty!
Terms of use dolor sit amet consectetur, adipisicing elit. Recusandae provident ullam aperiam quo ad non corrupti sit vel quam repellat ipsa quod sed, repellendus adipisci, ducimus ea modi odio assumenda.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Dolor sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Sit amet consectetur adipisicing elit. Sequi, cum esse possimus officiis amet ea voluptatibus libero! Dolorum assumenda esse, deserunt ipsum ad iusto! Praesentium error nobis tenetur at, quis nostrum facere excepturi architecto totam.
Lorem ipsum dolor sit amet consectetur adipisicing elit. Inventore, soluta alias eaque modi ipsum sint iusto fugiat vero velit rerum.
Do you agree to our terms? Sign up
This book presents an authoritative collection of contributions reporting on computational intelligence, fuzzy systems as well as artificial intelligence techniques for modeling, optimization, control and decision-making together with applications and case studies in engineering, management and economic sciences.
Dedicated to the Academician of the Polish Academy of Sciences, Professor Janusz Kacprzyk in recognition of his pioneering work, the book reports on theories, methods and new challenges in artificial intelligence, thus offering not only a timely reference guide but also a source of new ideas and inspirations for graduate students and researchers alike.
The book consists of the 18 chapters, presented by distinguished and experienced authors from 16 different countries (Australia, Brazil, Canada, Chile, Germany, Hungary, Israel, Italy, China, R.N.Macedonia, Saudi Arabia, Spain, Turkey, United States, Ukraine, and Vietnam). All chapters are grouped into three parts: Computational Intelligence and Fuzzy Systems, Artificial Intelligence Techniques in Modelling and Optimization, and Computational Intelligence in Control and Decision Support Processes.
The book reflects recent developments and new directions in artificial intelligence, including computation method of the interval hull to solutions of interval and fuzzy interval linear systems, fuzzy-Petri-networks in supervisory control of Markov processes in robotic systems, fuzzy approaches for linguistic data summaries, first-approximation analysis for choosing fuzzy or neural systems and type-1 or type-2 fuzzy sets, matrix resolving functions in game dynamic problems, evolving stacking neuro-fuzzy probabilistic networks and their combined learning in online pattern recognition tasks, structural optimization of fuzzy control and decision-making systems, neural and granular fuzzy adaptive modeling, state and action abstraction for search and reinforcement learning algorithms.
Among the most successful and perspective implementations in practical areas of human activity are tentative algorithms for neurological disorders, human-centric question-answering system, OWA operators in pensions, evaluation of the perception of public safety through fuzzy and multi-criteria approach, a multicriteria hierarchical approach to investment location choice, intelligent traffic signal control and generative adversarial networks in cybersecurity.
Comments