Applying computational intelligence: how to create value
The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully und...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines on creating value from the application of computational intelligence methods. In Part I, the author offers simple explanations of the key computational intelligence technologies: fuzzy logic, neural networks, support vector machines, evolutionary computation, swarm intelligence, and intelligent agents. In Part II, he defines the typical business environment and analyzes the competitive advantages these techniques offer. In Part III, he introduces a methodology for effective real-world application of computational intelligence while minimizing development cost, and he outlines the critical, underestimated technology marketing efforts required. The methodology can improve the existing capabilities of Six Sigma, one of the most popular work processes in industry. Finally, in Part IV the author looks to technologies still in the research domain, such as perception-based computing, artificial immune systems, and systems with evolved structure, and he examines the future for computational intelligence applications while taking into account projected industrial needs. The author adopts a light tone in the book, visualizes many of the techniques and ideas, and supports the text with notes from successful implementations. The book is ideal for engineers implementing these techniques in the real world, managers charged with creating value and reducing costs in the related industries, and scientists in computational intelligence looking towards the application of their research. |
Beschreibung: | Literaturangaben |
Beschreibung: | XXII, 459 S. Ill., graph. Darst. 235 mm x 155 mm |
ISBN: | 9783540699101 9783540699132 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV035277395 | ||
003 | DE-604 | ||
005 | 20110125 | ||
007 | t | ||
008 | 090129s2010 gw ad|| |||| 00||| eng d | ||
015 | |a 08,N26,0054 |2 dnb | ||
016 | 7 | |a 989060608 |2 DE-101 | |
020 | |a 9783540699101 |c Gb. : ca. EUR 58.80 (freier Pr.), ca. sfr 96.00 (freier Pr.) |9 978-3-540-69910-1 | ||
020 | |a 9783540699132 |9 978-3-540-69913-2 | ||
024 | 3 | |a 9783540699101 | |
028 | 5 | 2 | |a 11983774 |
035 | |a (OCoLC)262720634 | ||
035 | |a (DE-599)DNB989060608 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-703 |a DE-945 |a DE-1050 |a DE-573 | ||
050 | 0 | |a HF5548.2 | |
082 | 0 | |a 658.0563 |2 22 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
084 | |a ST 300 |0 (DE-625)143650: |2 rvk | ||
084 | |a ST 301 |0 (DE-625)143651: |2 rvk | ||
084 | |a ST 515 |0 (DE-625)143677: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Kordon, Arthur K. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Applying computational intelligence |b how to create value |c Arthur K. Kordon |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XXII, 459 S. |b Ill., graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
520 | 3 | |a The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines on creating value from the application of computational intelligence methods. In Part I, the author offers simple explanations of the key computational intelligence technologies: fuzzy logic, neural networks, support vector machines, evolutionary computation, swarm intelligence, and intelligent agents. In Part II, he defines the typical business environment and analyzes the competitive advantages these techniques offer. In Part III, he introduces a methodology for effective real-world application of computational intelligence while minimizing development cost, and he outlines the critical, underestimated technology marketing efforts required. The methodology can improve the existing capabilities of Six Sigma, one of the most popular work processes in industry. Finally, in Part IV the author looks to technologies still in the research domain, such as perception-based computing, artificial immune systems, and systems with evolved structure, and he examines the future for computational intelligence applications while taking into account projected industrial needs. The author adopts a light tone in the book, visualizes many of the techniques and ideas, and supports the text with notes from successful implementations. The book is ideal for engineers implementing these techniques in the real world, managers charged with creating value and reducing costs in the related industries, and scientists in computational intelligence looking towards the application of their research. | |
650 | 4 | |a Datenverarbeitung | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Business |x Data processing | |
650 | 4 | |a Computational intelligence | |
650 | 4 | |a Expert systems (Computer science) | |
650 | 0 | 7 | |a Soft Computing |0 (DE-588)4455833-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Entscheidungsunterstützung |0 (DE-588)4202171-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Unternehmen |0 (DE-588)4061963-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Soft Computing |0 (DE-588)4455833-8 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Unternehmen |0 (DE-588)4061963-1 |D s |
689 | 1 | 1 | |a Entscheidungsunterstützung |0 (DE-588)4202171-6 |D s |
689 | 1 | 2 | |a Soft Computing |0 (DE-588)4455833-8 |D s |
689 | 1 | |5 DE-604 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017082666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-017082666 |
Datensatz im Suchindex
_version_ | 1804138567991033856 |
---|---|
adam_text | CONTENTS PART I COMPUTATIONAL INTELLIGENCE IN A NUTSHELL 1. ARTIFICIAL
VS. COMPUTATIONAL INTELLIGENCE 3 1.1 ARTIFICIAL INTELLIGENCE: THE
PIONEER 4 1.2 COMPUTATIONAL INTELLIGENCE: THE SUCCESSOR 22 1.3 KEY
DIFFERENCES BETWEEN AI AND CI 27 1.4 SUMMARY 29 SUGGESTED READING 30 2.
A ROADMAP THROUGH THE COMPUTATIONAL INTELLIGENCE MAZE 31 2.1 STRENGTHS
AND WEAKNESSES OF CI APPROACHES 31 2.2 KEY SCIENTIFIC PRINCIPLES OF
COMPUTATIONAL INTELLIGENCE 42 2.3 KEY APPLICATION AREAS OF COMPUTATIONAL
INTELLIGENCE 45 2.4 SUMMARY 50 SUGGESTED READING 50 3. LET S GET FUZZY
51 3.1 FUZZY SYSTEMS IN A NUTSHELL 51 3.2 BENEFITS OF FUZZY SYSTEMS 60
3.3 FUZZY SYSTEMS ISSUES 62 3.4 HOW TO APPLY FUZZY SYSTEMS 63 3.5
TYPICAL APPLICATIONS OF FUZZY SYSTEMS 65 3.6 FUZZY SYSTEMS MARKETING 68
3.7 AVAILABLE RESOURCES FOR FUZZY SYSTEMS 70 3.8 SUMMARY 71 SUGGESTED
READING 72 4. MACHINE LEARNING: THE GHOST IN THE LEARNING MACHINE 73 4.
1 NEURAL NETWORKS IN A NUTSHELL 76 4.2 SUPPORT VECTOR MACHINES IN A
NUTSHELL 84 4.3 BENEFITS OF MACHINE LEARNING 91 BIBLIOGRAFISCHE
INFORMATIONEN HTTP://D-NB.INFO/989060608 DIGITALISIERT DURCH ** CONTENTS
4.4 MACHINE LEARNING ISSUES 96 4.5 HOW TO APPLY MACHINE LEARNING SYSTEMS
97 4.6 TYPICAL MACHINE LEARNING APPLICATIONS 105 4.7 MACHINE LEARNING
MARKETING 108 4.8 AVAILABLE RESOURCES FOR MACHINE LEARNING ILL 4.9
SUMMARY 112 SUGGESTED READING 113 5. EVOLUTIONARY COMPUTATION: THE
PROFITABLE GENE 115 5.1 EVOLUTIONARY COMPUTATION IN A NUTSHELL 116 5.2
BENEFITS OF EVOLUTIONARY COMPUTATION 128 5.3 EVOLUTIONARY COMPUTATION
ISSUES 130 5.4 HOW TO APPLY EVOLUTIONARY COMPUTATION 130 5.5 TYPICAL
APPLICATIONS OF EVOLUTIONARY COMPUTATION 136 5.6 EVOLUTIONARY
COMPUTATION MARKETING 141 5.7 AVAILABLE RESOURCES FOR EVOLUTIONARY
COMPUTATION 142 5.8 SUMMARY 143 SUGGESTED READING 144 6. SWARM
INTELLIGENCE: THE BENEFITS OF SWARMS 145 6.1 SWARM INTELLIGENCE IN A
NUTSHELL 146 6.2 BENEFITS OF SWARM INTELLIGENCE 157 6.3 SWARM
INTELLIGENCE ISSUES 159 6.4 HOW TO APPLY SWARM INTELLIGENCE 160 6.5
TYPICAL SWARM INTELLIGENCE APPLICATIONS 166 6.6 SWARM INTELLIGENCE
MARKETING 171 6.7 AVAILABLE RESOURCES FOR SWARM INTELLIGENCE 173 6.8
SUMMARY 173 SUGGESTED READING 174 7. INTELLIGENT AGENTS: THE COMPUTER
INTELLIGENCE AGENCY (CIA) 175 7.1 INTELLIGENT AGENTS IN A NUTSHELL 176
7.2 BENEFITS OF INTELLIGENT AGENTS 186 7.3 INTELLIGENT AGENTS ISSUES 189
7.4 HOW TO APPLY INTELLIGENT AGENTS 190 7.5 TYPICAL APPLICATIONS OF
INTELLIGENT AGENTS 193 7. CONTENTS XXI 8.2 ACCELERATE INNOVATIONS 207
8.3 PRODUCE EFFICIENTLY 210 8.4 DISTRIBUTE EFFECTIVELY 212 8.5 IMPRESS
CUSTOMERS 215 8.6 ENHANCE CREATIVITY 217 8.7 ATTRACT INVESTORS 220 8.8
IMPROVE NATIONAL DEFENSE 222 8.9 PROTECT HEALTH 225 8.10 HAVE FUN 228
8.11 SUMMARY 231 SUGGESTED READING 231 9. COMPETITIVE ADVANTAGES OF
COMPUTATIONAL INTELLIGENCE 233 9.1 COMPETITIVE ADVANTAGE OF A RESEARCH
APPROACH 233 9.2 KEY COMPETITIVE APPROACHES TO COMPUTATIONAL
INTELLIGENCE 237 9.3 HOW COMPUTATIONAL INTELLIGENCE BEATS THE
COMPETITION 247 9.4 SUMMARY 255 SUGGESTED READING 256 10. ISSUES IN
APPLYING COMPUTATIONAL INTELLIGENCE 257 10.1 TECHNOLOGY RISKS 257 10.2
MODELING FATIGUE 261 10.3 LOOKS TOO ACADEMIC 263 10.4 PERCEPTION OF HIGH
COST 265 10.5 MISSING INFRASTRUCTURE 267 10.6 NOMARKETING 269 10.7 WRONG
EXPECTATIONS 271 10.8 NO APPLICATION METHODOLOGY 274 10.9 SUMMARY 275
SUGGESTED READING 276 PART IN COMPUTATIONAL INTELLIGENCE APPLICATION
STRATEGY 11. INTEGRATE AND CONQUER 279 11.1 THE NASTY REALITY OF
REAL-WORLD APPLICATIONS 280 11.2 REQUIREMENTS FOR SUCCESSFUL REAL-WORLD
APPLICATIONS 282 11.3 WHY INTEGRATION IS CRITICAL FOR REAL-WORLD
APPLICATIONS 284 11.4 INTEGRATION OPPORTUNITIES 287 11.5 INTEGRATED
METHODOLOGY FOR ROBUST EMPIRICAL MODELING 294 11.6 INTEGRATED
METHODOLOGY IN ACTION 301 11. INDEX 447 XXII CONTENTS 12.2 OBSTACLES IN
APPLYING COMPUTATIONAL INTELLIGENCE 313 12.3 METHODOLOGY FOR APPLYING CI
IN A BUSINESS 316 12.4 COMPUTATIONAL INTELLIGENCE PROJECT MANAGEMENT 322
12.5 CI FOR SIX SIGMA AND DESIGN FOR SIX SIGMA 331 12.6 SUMMARY 340
SUGGESTED READING 341 13. COMPUTATIONAL INTELLIGENCE MARKETING 343 13.1
RESEARCH MARKETING PRINCIPLES 343 13.2 TECHNIQUES - DELIVERY,
VISUALIZATION, HUMOR 348 13.3 INTERACTIONS BETWEEN ACADEMIA AND INDUSTRY
359 13.4 MARKETING CI TO A TECHNICAL AUDIENCE 363 13.5 MARKETING TO A
NONTECHNICAL AUDIENCE 369 13.6 SUMMARY 372 SUGGESTED READING 373 14.
INDUSTRIAL APPLICATIONS OF COMPUTATIONAL INTELLIGENCE 375 14.1
APPLICATIONS IN MANUFACTURING 375 14.2 APPLICATIONS IN NEW PRODUCT
DEVELOPMENT 390 14.3 UNSUCCESSFUL COMPUTATIONAL INTELLIGENCE
APPLICATIONS 401 14.4 ACKNOWLEDGEMENTS 403 14.5 SUMMARY 403 SUGGESTED
READING 403 PART IV THE FUTURE OF COMPUTATIONAL INTELLIGENCE 15. FUTURE
DIRECTIONS OF APPLIED COMPUTATIONAL INTELLIGENCE 407 15.1
SUPPLY-DEMAND-DRIVEN APPLIED RESEARCH 407 15.2 NEXT-GENERATION APPLIED
COMPUTATIONAL INTELLIGENCE 413 15.3 PROJECTED INDUSTRIAL NEEDS 425 15.4
SUSTAINABILITY OF APPLIED COMPUTATIONAL INTELLIGENCE 431 15.5 SUMMARY
433 SUGGESTED READING 434 GLOSSARY 435
|
any_adam_object | 1 |
author | Kordon, Arthur K. |
author_facet | Kordon, Arthur K. |
author_role | aut |
author_sort | Kordon, Arthur K. |
author_variant | a k k ak akk |
building | Verbundindex |
bvnumber | BV035277395 |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.2 |
callnumber-search | HF5548.2 |
callnumber-sort | HF 45548.2 |
callnumber-subject | HF - Commerce |
classification_rvk | QP 345 ST 300 ST 301 ST 515 |
ctrlnum | (OCoLC)262720634 (DE-599)DNB989060608 |
dewey-full | 658.0563 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.0563 |
dewey-search | 658.0563 |
dewey-sort | 3658.0563 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04110nam a2200613 c 4500</leader><controlfield tag="001">BV035277395</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110125 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">090129s2010 gw ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N26,0054</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">989060608</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540699101</subfield><subfield code="c">Gb. : ca. EUR 58.80 (freier Pr.), ca. sfr 96.00 (freier Pr.)</subfield><subfield code="9">978-3-540-69910-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540699132</subfield><subfield code="9">978-3-540-69913-2</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540699101</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11983774</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)262720634</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB989060608</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-945</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HF5548.2</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.0563</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="0">(DE-625)143650:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 301</subfield><subfield code="0">(DE-625)143651:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 515</subfield><subfield code="0">(DE-625)143677:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kordon, Arthur K.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applying computational intelligence</subfield><subfield code="b">how to create value</subfield><subfield code="c">Arthur K. Kordon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 459 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines on creating value from the application of computational intelligence methods. In Part I, the author offers simple explanations of the key computational intelligence technologies: fuzzy logic, neural networks, support vector machines, evolutionary computation, swarm intelligence, and intelligent agents. In Part II, he defines the typical business environment and analyzes the competitive advantages these techniques offer. In Part III, he introduces a methodology for effective real-world application of computational intelligence while minimizing development cost, and he outlines the critical, underestimated technology marketing efforts required. The methodology can improve the existing capabilities of Six Sigma, one of the most popular work processes in industry. Finally, in Part IV the author looks to technologies still in the research domain, such as perception-based computing, artificial immune systems, and systems with evolved structure, and he examines the future for computational intelligence applications while taking into account projected industrial needs. The author adopts a light tone in the book, visualizes many of the techniques and ideas, and supports the text with notes from successful implementations. The book is ideal for engineers implementing these techniques in the real world, managers charged with creating value and reducing costs in the related industries, and scientists in computational intelligence looking towards the application of their research.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datenverarbeitung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Expert systems (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Entscheidungsunterstützung</subfield><subfield code="0">(DE-588)4202171-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Unternehmen</subfield><subfield code="0">(DE-588)4061963-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Entscheidungsunterstützung</subfield><subfield code="0">(DE-588)4202171-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Soft Computing</subfield><subfield code="0">(DE-588)4455833-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017082666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017082666</subfield></datafield></record></collection> |
id | DE-604.BV035277395 |
illustrated | Illustrated |
indexdate | 2024-07-09T21:30:15Z |
institution | BVB |
isbn | 9783540699101 9783540699132 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017082666 |
oclc_num | 262720634 |
open_access_boolean | |
owner | DE-703 DE-945 DE-1050 DE-573 |
owner_facet | DE-703 DE-945 DE-1050 DE-573 |
physical | XXII, 459 S. Ill., graph. Darst. 235 mm x 155 mm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
spelling | Kordon, Arthur K. Verfasser aut Applying computational intelligence how to create value Arthur K. Kordon Berlin [u.a.] Springer 2010 XXII, 459 S. Ill., graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Literaturangaben The flow of academic ideas in the area of computational intelligence is impacting industrial practice at considerable speed. Practitioners face the challenge of tracking, understanding and applying the latest techniques, which often prove their value even before the underlying theories are fully understood. This book offers realistic guidelines on creating value from the application of computational intelligence methods. In Part I, the author offers simple explanations of the key computational intelligence technologies: fuzzy logic, neural networks, support vector machines, evolutionary computation, swarm intelligence, and intelligent agents. In Part II, he defines the typical business environment and analyzes the competitive advantages these techniques offer. In Part III, he introduces a methodology for effective real-world application of computational intelligence while minimizing development cost, and he outlines the critical, underestimated technology marketing efforts required. The methodology can improve the existing capabilities of Six Sigma, one of the most popular work processes in industry. Finally, in Part IV the author looks to technologies still in the research domain, such as perception-based computing, artificial immune systems, and systems with evolved structure, and he examines the future for computational intelligence applications while taking into account projected industrial needs. The author adopts a light tone in the book, visualizes many of the techniques and ideas, and supports the text with notes from successful implementations. The book is ideal for engineers implementing these techniques in the real world, managers charged with creating value and reducing costs in the related industries, and scientists in computational intelligence looking towards the application of their research. Datenverarbeitung Wirtschaft Business Data processing Computational intelligence Expert systems (Computer science) Soft Computing (DE-588)4455833-8 gnd rswk-swf Entscheidungsunterstützung (DE-588)4202171-6 gnd rswk-swf Unternehmen (DE-588)4061963-1 gnd rswk-swf Soft Computing (DE-588)4455833-8 s DE-604 Unternehmen (DE-588)4061963-1 s Entscheidungsunterstützung (DE-588)4202171-6 s DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017082666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Kordon, Arthur K. Applying computational intelligence how to create value Datenverarbeitung Wirtschaft Business Data processing Computational intelligence Expert systems (Computer science) Soft Computing (DE-588)4455833-8 gnd Entscheidungsunterstützung (DE-588)4202171-6 gnd Unternehmen (DE-588)4061963-1 gnd |
subject_GND | (DE-588)4455833-8 (DE-588)4202171-6 (DE-588)4061963-1 |
title | Applying computational intelligence how to create value |
title_auth | Applying computational intelligence how to create value |
title_exact_search | Applying computational intelligence how to create value |
title_full | Applying computational intelligence how to create value Arthur K. Kordon |
title_fullStr | Applying computational intelligence how to create value Arthur K. Kordon |
title_full_unstemmed | Applying computational intelligence how to create value Arthur K. Kordon |
title_short | Applying computational intelligence |
title_sort | applying computational intelligence how to create value |
title_sub | how to create value |
topic | Datenverarbeitung Wirtschaft Business Data processing Computational intelligence Expert systems (Computer science) Soft Computing (DE-588)4455833-8 gnd Entscheidungsunterstützung (DE-588)4202171-6 gnd Unternehmen (DE-588)4061963-1 gnd |
topic_facet | Datenverarbeitung Wirtschaft Business Data processing Computational intelligence Expert systems (Computer science) Soft Computing Entscheidungsunterstützung Unternehmen |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017082666&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kordonarthurk applyingcomputationalintelligencehowtocreatevalue |