The Onlooker


Book Description




Advances in Computational Intelligence


Book Description

This two-volume set LNCS 7902 and 7903 constitutes the refereed proceedings of the 12th International Work-Conference on Artificial Neural Networks, IWANN 2013, held in Puerto de la Cruz, Tenerife, Spain, in June 2013. The 116 revised papers were carefully reviewed and selected from numerous submissions for presentation in two volumes. The papers explore sections on mathematical and theoretical methods in computational intelligence, neurocomputational formulations, learning and adaptation emulation of cognitive functions, bio-inspired systems and neuro-engineering, advanced topics in computational intelligence and applications.




Applications of Cuckoo Search Algorithm and its Variants


Book Description

This book highlights the basic concepts of the CS algorithm and its variants, and their use in solving diverse optimization problems in medical and engineering applications. Evolutionary-based meta-heuristic approaches are increasingly being applied to solve complicated optimization problems in several real-world applications. One of the most successful optimization algorithms is the Cuckoo search (CS), which has become an active research area to solve N-dimensional and linear/nonlinear optimization problems using simple mathematical processes. CS has attracted the attention of various researchers, resulting in the emergence of numerous variants of the basic CS with enhanced performance since 2019.




The Universal Church of the Kingdom of God in South Africa


Book Description

This book shows how the UCKG utilizes rituals that are locally meaningful and are informed by local ideas about human bodies, agency and ontological balance.




Artificial Intelligence and Computational Intelligence


Book Description

This three-volume proceedings contains revised selected papers from the Second International Conference on Artificial Intelligence and Computational Intelligence, AICI 2011, held in Taiyuan, China, in September 2011. The total of 265 high-quality papers presented were carefully reviewed and selected from 1073 submissions. The topics of Part II covered are: heuristic searching methods; immune computation; information security; information theory; intelligent control; intelligent image processing; intelligent information fusion; intelligent information retrieval; intelligent signal processing; knowledge representation; and machine learning.




Disaster Handbook


Book Description




Bully-proof


Book Description

Every day, thousands of South African children go to school filled with terror because they know they’re going to be bullied. Children who are targeted by bullies are at enormous risk, yet many parents don’t know why it is happening to their child, or what to do about it. Bully-proof looks at every aspect of bullying, from name-calling, taunting and rumour-mongering to physical assault, and examines why and how bullies behave the way they do, and what can be done to help them and their victims. The more we understand bullying behaviour, the better we can address the underlying causes and put effective controls in place. Studies have shown that the ‘whole school’ approach, involving pupils, teachers and parents, is by far the most effective method of reducing incidents of bullying, as well as limiting the potential for future incidents. Implementing an effective anti-bullying campaign is not just about changing the behaviour of a few maladjusted children; it is about changing the philosophy of the entire school. Using a step-by-step approach, this book provides educators, parents, counsellors and children with the tools they need to develop a successful anti-bullying programme.