TEST - Catálogo BURRF
   

Artificial intelligence and evolutionary algorithms in engineering systems : (Registro nro. 324089)

Detalles MARC
000 -CABECERA
campo de control de longitud fija 09477nam a22003615i 4500
001 - NÚMERO DE CONTROL
campo de control 324089
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL
campo de control MX-SnUAN
005 - FECHA Y HORA DE LA ÚLTIMA TRANSACCIÓN
campo de control 20160429161700.0
007 - CAMPO FIJO DE DESCRIPCIÓN FÍSICA--INFORMACIÓN GENERAL
campo de control de longitud fija cr nn 008mamaa
008 - DATOS DE LONGITUD FIJA--INFORMACIÓN GENERAL
campo de control de longitud fija 160111s2015 ii | s |||| 0|eng d
020 ## - NÚMERO INTERNACIONAL ESTÁNDAR DEL LIBRO
Número Internacional Estándar del Libro 9788132221265
-- 978-81-322-2126-5
035 ## - NÚMERO DE CONTROL DEL SISTEMA
Número de control de sistema vtls000425332
039 #9 - NIVEL DE CONTROL BIBLIOGRÁFICO Y DETALLES DE CODIFICACIÓN [OBSOLETO]
-- 201601111128
-- staff
050 #4 - CLASIFICACIÓN DE LA BIBLIOTECA DEL CONGRESO
Número de clasificación Q342
245 10 - MENCIÓN DE TÍTULO
Título Artificial intelligence and evolutionary algorithms in engineering systems :
Resto del título proceedings of icaees 2014, volume 1 /
Mención de responsabilidad, etc. edited by L. Padma Suresh, Subhransu Sekhar Dash, Bijaya Ketan Panigrahi.
264 #1 - PRODUCCIÓN, PUBLICACIÓN, DISTRIBUCIÓN, FABRICACIÓN Y COPYRIGHT
Producción, publicación, distribución, fabricación y copyright New Delhi :
Nombre del de productor, editor, distribuidor, fabricante Springer India :
-- Springer,
Fecha de producción, publicación, distribución, fabricación o copyright 2015.
300 ## - DESCRIPCIÓN FÍSICA
Extensión xvii, 862 páginas :
Otras características físicas 376 ilustraciones
336 ## - TIPO DE CONTENIDO
Término de tipo de contenido texto
Código de tipo de contenido txt
Fuente rdacontent
337 ## - TIPO DE MEDIO
Nombre/término del tipo de medio computadora
Código del tipo de medio c
Fuente rdamedia
338 ## - TIPO DE SOPORTE
Nombre/término del tipo de soporte recurso en línea
Código del tipo de soporte cr
Fuente rdacarrier
347 ## - CARACTERÍSTICAS DEL ARCHIVO DIGITAL
Tipo de archivo archivo de texto
Formato de codificación PDF
Fuente rda
490 0# - MENCIÓN DE SERIE
Mención de serie Advances in Intelligent Systems and Computing,
Número Internacional Normalizado para Publicaciones Seriadas 2194-5357 ;
Designación de volumen o secuencia 324
500 ## - NOTA GENERAL
Nota general Springer eBooks
505 0# - NOTA DE CONTENIDO CON FORMATO
Nota de contenido con formato 1. Improvement in Hungarian Algorithm for Assignment Problem -- 2. Vertex Cover Problem - Revised Approximation Algorithm -- 3. A Simple Control Strategy Technique for a Single Phase Bridgeless Active Rectifier with High Power Factor and Voltage Stabilization Using Partial Digital Implementation -- 4. Ensemble Neural Network Algorithm for Detecting Cardiac Arrhythmia -- 5. An Efficient Invasive Weed Optimization Algorithm for Distribution Feeder Reconfiguration and Loss Minimization -- 6. Implementation of Generative Crossover Operator in Genetic Algorithm to Solve Traveling Salesman Problem -- 7. A 4-bit 9KS/s Distortionless Successive Approximation ADC in 180nm CMOS Technology -- 8. EEG Based Automatic Detection of Drowsy State -- 9. WIDS-Real Time Intrusion Detection System Using Entrophical Approach -- 10. Optical Character Recognition for Alphanumerical Character Verification in video Frames -- 11. Modified-AODV Routing Protocol for Multi-Hop Cognitive Radio Ad Hoc Networks -- 12. Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network -- 13. PCA Based Feature Selection for MRI Image Retrieval System Using Texture Features -- 14. A Survey of Location Prediction Using Trajectory Mining -- 15. Survey on Router Policies providing Fairness and Service Differentiation favoring Real Time Data Transfers in Internet -- 16. Exploration of the Effect of Demographic and Clinical Confounding Variables on Results of Voxel-Based Morphometric Analysis in Schizophrenia -- 17. A Novel Method for Secure Image Steganography -- 18. Techniques for Enhancing the Performance of TCP in Wireless Networks -- 19. Analysis of Classification Models Using Image Statistics and Data Miner for Grade Prediction of Astrocytoma -- 20. Object Detection in Cluttered Environment Using 3D Map -- 21. Smart Energy Meter with Instant Billing and Payment -- 22. GA Based Compiler Parameter Set Tuning -- 23. An Intelligent Intrusion Detection System Using Average Manhattan Distance Based Decision Tree -- 24. Intelligent Medical Diagnosis System Using Weighted Genetic and New Weighted Fuzzy C-Means Clustering Algorithm -- 25. Security Analysis in Cloud Environment -- 26. A Bi-Level Clustering Analysis for Studying About The Sources of Vehicular Pollution In Chennai -- 27. Investigation of Fault Detection Techniques for an Industrial Pneumatic Actuator Using Neural Network-DAMADICS Case Study -- 28. Design of Portable Security System Using Face Recognition with Back-Propagation Algorithm and MATLAB -- 29. Model Based Control for Moisture in Paper Making Process -- 30. Elimination of Harmonics in Seven Level Cascaded Multilevel Inverter Using Particle Swarm Optimization Technique -- 31. Optimization and Quality of Service Protocols in VANETs : A Review -- 32. Object Detection Using Robust Image Features -- 33. Service Adaptive Fuzzy-Multi Criteria Based Intelligent Vertical Handover Decision Algorithm for Heterogeneous Wireless Networks -- 34. Automatic Traffic Classification Using Machine Learning Algorithm for Policy Based Routing in UMTS-WLAN Interworking -- 35. Sequential Decision Making Using Q Learning Algorithm for Diabetic Patients -- 36. Design of Quantum Cost and Delay Optimised Reversible Wallace Tree Multiplier Using Compressors -- 37. A Novel Authentication Framework for Hadoop -- 38. Fuzzy ART Based User Behavior Trust in Cloud Computing -- 39. Semi-supervised Learning Algorithm for Online Electricity Data Streams -- 40. An Efficient Continuous Speech recognition System for Dravidian Languages Using Support Vector Machine -- 41. Video Surveillance Tracking System Using LabVIEW and Matlab -- 42. Stroke Detection in Brain Using CT Images -- 43. Preemptive Appliances Scheduling in Smart Home Using Genetic Algorithm -- 44. Credible Secure Data Aggregation in Wireless Sensor Networks -- 45. Zumkeller Labeling Algorithms for Complete Bipartite Graphs and Wheel Graphs -- 46. An Unidentified Location-Based Efficient Routing Protocol in VANET -- 47. A Secure and Efficient Binding Update Scheme with Decentralized Design for Next Generation IP Mobility -- 48. Stego with Color Cue -- 49. Analysis Secure Seed Based Sturdy OTP via Convenient Carry-On Device -- 50. A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme -- 51. Small World Particle Swarm Optimizer for Real World Optimization Problems -- 52. A Comparative Study of Feature Ranking Methods in Recognition of Handwritten Numerals -- 53. Performance Evaluation of Pet Image Reconstruction Using Radial Basis Function Networks -- 54. Clustering for Knowledgeable Web Mining -- 55. Effective Path Discovery Among Clusters for secure transmission of Data’s in MANET -- 56. Quality of Service Analysis of AOMDV and AOMDV-MIMC Routing Protocols for Mobile Ad Hoc Networks -- 57. Particle Swarm Optimisation Based SONAR Image Enhancement for Underwater Target Detection -- 58. Intelligent Modeling and Optimization of ECM Process Parameters -- 59. An Effective Automation Testing Framework for OATS Tool -- 60. Multimodal Biometric Authentication System Based on Score Level Fusion of Palmprint and Finger Vein -- 61. Synergistic Clinical Trials with CAD Systems for the Early Detection of Lung Cancer -- 62. A Unified Framework for Network Bandwidth and Link Latency Detector Based on Cloud Computing -- 63. Development of Concatenative Syllable-Based Text to Speech Synthesis System for Tamil -- 64. Design of Low Power Blink Detector for Minimally Invasive Implantable Stimulator (SOC) Using 180nm Technology -- 65. Energy and Trust Based AODV for Quality of Service Affirmation in MANETs -- 66. Classi?cation of Remote Sensing Image Based on Different Similarity Measures -- 67. A Start to Fail Frequency Technique for Detecting Hardware Trojan -- 68. A Novel Approach Based SUPM Method of Privacy Security Protocol in Near Field Communication Technology -- 69. Gabor Transform for the Time Frequency Localization of Impulse Faults in a Transformer -- 70. A Modified Priority Based Multi Scheduler (PBMS) for Optical Network -- 71. Comparative Analysis of Digital Watermarking in Discrete Wavelet Transform and Mojette Transform -- 72. A Three Factor Authentication System for Smartcard Using Biometric, Visual Cryptography and OTP -- 73. Identifying Sound of RPW in-situ from External Sources -- 74. VNS Based Heuristic for Identical Parallel Machine Scheduling Problem -- 75. Green Algorithm for Virtualized Cloud Systems to Optimize the Energy Consumption -- 76. S Transform for the Analysis of Impulse Faults in Transformer -- 77. Defensive Mechanism to Guard against Packet Droppers in Mobile Ad Hoc Network -- 78. Real Time Intrusion Prediction Using Hidden Markov Model with Genetic Algorithm -- 79. Detection of Power Quality Disturbances Based on Adaptive Neural Net and Shannon Entropy Method -- 80. Texture Feature Extraction Using MGRLBP Method for Medical Image Classification -- 81. A Novel Light Weight Protocol for Address Assignment in Ad Hoc Networks Based on Filters -- 82. Structural Refinement: An Effective OCL-Based Testing Approach -- 83. Dynamic Architecture and Performance Analysis of Secure and Efficient Key Management Scheme in Multicast Network -- 84. Mining Undemanding and Intricate Patterns with Periodicity in Time Series Databases -- 85. Group-Based Access Technique for Effective Resource Utilization and Access Control Mechanism in Cloud -- 86. Design of Fuzzy Logic Based pH Controller for High Pressure Rated Modified CSTR System -- 87. Level Control of Quadruple Tank Process with Finite Time Convergence Using Integral Terminal Sliding Mode Controller -- 88. An Enhanced Security Framework for a Cloud Application -- 89. Enhanced Role Based Access Control for Cloud Security -- 90. Model Predictive Controllers for Non-minimum Phase Quadruple Tank Process.
590 ## - NOTA LOCAL (RLIN)
Nota local Para consulta fuera de la UANL se requiere clave de acceso remoto.
700 1# - PUNTO DE ACCESO ADICIONAL--NOMBRE DE PERSONA
Nombre de persona Suresh, L. Padma,
Término indicativo de función/relación editor.
9 (RLIN) 369792
700 1# - PUNTO DE ACCESO ADICIONAL--NOMBRE DE PERSONA
Nombre de persona Dash, Subhransu Sekhar,
Término indicativo de función/relación editor.
9 (RLIN) 341862
700 1# - PUNTO DE ACCESO ADICIONAL--NOMBRE DE PERSONA
Nombre de persona Panigrahi, Bijaya Ketan,
Término indicativo de función/relación editor.
9 (RLIN) 327180
710 2# - PUNTO DE ACCESO ADICIONAL--NOMBRE DE ENTIDAD CORPORATIVA
Nombre de entidad corporativa o nombre de jurisdicción como elemento de entrada SpringerLink (Servicio en línea)
9 (RLIN) 299170
776 08 - ENTRADA/ENLACE A UN FORMATO FÍSICO ADICIONAL
Información de relación/Frase instructiva de referencia Edición impresa:
Número Internacional Estándar del Libro 9788132221258
856 40 - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS
Identificador Uniforme del Recurso <a href="http://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-81-322-2126-5">http://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-81-322-2126-5</a>
Nota pública Conectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 ## - ELEMENTOS DE PUNTO DE ACCESO ADICIONAL (KOHA)
Tipo de ítem Koha Recurso en línea

No hay ítems disponibles.

Universidad Autónoma de Nuevo León
Secretaría de Extensión y Cultura - Dirección de Bibliotecas @
Soportado en Koha