Bio-Inspired Computing: Theories and Applications
By: Material type:
TextLanguage: English Publication details: Springer; Springer; 2021ISBN: - 9789811613548
eBooks
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
eBooks
|
Central Library | Central Library | Available | CL1765429 |
There are no comments on this title.
Log in to your account to post a comment.
-
25501
Second-Class Daughters
by Hordge-Freeman -
25502
Second-Generation Liberation Wars
by Voller -
25503
Secondary Agriculture
by F. A. Bahar, M. Anwar Bhat, Syed Sheraz Mahdi -
25504
Secondary Cities
by Pendras/Williams -
25505
Secondary Metabolites and Volatiles of PGPR in Plant-Growth Promotion
by R. Z. Sayyed, Virgilio Gavicho Uarrota -
25506
Secondary Rules of Primary Importance in International Law
by Kajtár et al (eds) -
25507
Secret Documents of Intelligence Branch on Father of The Nation, Bangladesh: Bangabandhu Sheikh Mujibur Rahman
by Sheikh Hasina -
25508
Secret Documents of Intelligence Branch on Father of The Nation, Bangladesh: Bangabandhu Sheikh Mujibur Rahman
by Sheikh Hasina -
25509
Secret Documents of Intelligence Branch on Father of The Nation, Bangladesh: Bangabandhu Sheikh Mujibur Rahman
by Sheikh Hasina -
25510
Secret Documents of Intelligence Branch on Father of The Nation, Bangladesh: Bangabandhu Sheikh Mujibur Rahman
by Sheikh Hasina -
25511
Secret Documents of Intelligence Branch on Father of The Nation, Bangladesh: Bangabandhu Sheikh Mujibur Rahman
by Sheikh Hasina -
25512
Secret Documents of Intelligence Branch on Father of The Nation, Bangladesh: Bangabandhu Sheikh Mujibur Rahman
by Sheikh Hasina -
25513
The Secret in Medieval Literature Alternative Worlds in the Middle Ages
by Albrecht Classen -
25514
Secret life of anothe Indian nationalism: transitions from the pax britannica to the pax Americana
by Mayaram Shail Au. -
25515
The Secret Life of Another Indian Nationalism
by Mayaram -
25516
Secret life of another Indian nationalism : Transitions from the pax britannica to the pax Americana
by Mayaram Shail -
25517
The Secret Police and the Religious Underground in Communist and Post-Communist Eastern Europe
by James A. Kapal¢; Kinga Poved k -
25518
Secret power
by Maurizi Stefania -
25519
The Secret Sauce for Leading Transformational Change
by Ian Ziskin -
25520
The secret to love health and monmey
by Byrne, R -
25521
The Secrets of Soviet Cosmonauts
by Maria Rosa Menzio -
25522
Secrets of the Animator
by Julia Peguet -
25523
Secrets of the Moon:Understanding and Analysing the Lunar Surface
by Gilbert Fielder -
25524
Secular Byzantine Women
by Sophia Germanidou -
25525
The Secular Imaginary
by Nath, Sushmita -
25526
The Secular Imaginary
by Nath -
25527
Secular imaginary : Gandhi, Nehru and the idea(S) of India
by Nath Sushmita -
25528
Secular imaginary: Gandhi, nehru and the idea(s) of India
by Nath Sushmita Au. -
25529
Secular Meditation-Based Ethics of Responsibility(MBER) Program - Wise Intentions, Consciousnessand Reflexivities
by Helene Hagge -
25530
Secularism Confronts Islamism
by Mohammad Affan -
25531
Secularism: The Basics
by Jacques Berlinerblau -
25532
Secure and Digitalized Future Mobility
by Yue Cao; Omprakash Kaiwartya; Tiancheng Li -
25533
Secure and Trusted Cyber Physical Systems
by Shantanu Pal, Zahra Jadidi, Ernest Foo -
25534
Secure Data Science
by Bhavani Thuraisingham; Murat Kantarcioglu; Latifur Khan -
25535
Secure IT Systems
by Hans P. Reiser, Marcel Kyas -
25536
Secure Knowledge Management In The Artificial Intelligence Era
by Ram Krishnan, H. Raghav Rao, Sanjay K. Sahay, Sagar Samtani, Ziming Zhao -
25537
Secure Multi-Party E-Commerce Protocols
by C?t?lin V. Bîrjoveanu, Mirela Bîrjoveanu -
25538
Secure Web Application Development
by Matthew Baker -
25539
Securing an Urban Renaissance
by Atkinson/Helms -
25540
Securing Borders, Securing Power
by Slaven, Mike -
25541
Securing Delay-Tolerant Networks with BPSec
by Edward J. Birrane -
25542
Securing India in the Cyber Era
by Sameer Patil -
25543
Securing IRIS biometric system against replay and database attacks using conventional and deep learning approaches
by Gupta Richa Au. -
25544
Securing Respect
by Millie -
25545
Securing the Nation’s Critical Infrastructures
by Drew Spaniel -
25546
Securing the Private Sector
by Tromblay, Darren E. -
25547
Securitisation as Hegemonic Discourse Formation
by Hannah Broecker -
25548
Security
by Welch -
25549
Security Analytics
by Mehak Khurana; Shilpa Mahajan -
25550
Security and Artificial Intelligence
by Lejla Batina, Thomas Bäck, Ileana Buhan, Stjepan Picek
Bio-Inspired Computing: Theories and Applications
APA
Linqiang Pan S. P. T. S. F. G., .Bio-Inspired Computing: Theories and Applications. : Springer.
Chicago
Linqiang Pan Shangchen Pang Tao Song Faming Gong, .Bio-Inspired Computing: Theories and Applications. : Springer.
Harvard
Linqiang Pan S. P. T. S. F. G., .Bio-Inspired Computing: Theories and Applications. : Springer.
MLA
Linqiang Pan Shangchen Pang Tao Song Faming Gong, .: Springer. .
