Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Latest research on Soft Computing in Information Communication Technology
Results of the 2012 International Conference on Soft Computing in Information Communication Technology (SCICT 2012) Taipei, Taiwan, June 1-2, 2012
Written by leading experts in the field
This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees.
The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws.
Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.
Content Level »Research
Keywords »Information Communication Technology - Intelligent Computing - Soft Computing
From the content: Gaussian-Heimite in the Atom Population Solution.- The Study of Financial Management Information for Business Process Reengineering under the Low-carbon Economy.- Measures of Building Tax Information.- A New Type of Using Morphology Methods to Detect Blood Cancer Cells.- An Automatic Image Segmentation Algorithm based on Weighting Fuzzy C-Means Clustering.- Secure DV-Hop Localization against Wormhole Attacks in Wireless Sensor Networks.- An Analysis on the Application and Development Trend of CAD Technology of our Country.- Na+ Distribution and Secretion Characters From Tamarix Hispida Under Salt Stress.