Assessment of desertification vulnerability using soft computing methods.
Salvatore RamponeAlessio ValentePublished in: J. Ambient Intell. Humaniz. Comput. (2019)
Keyphrases
- soft computing methods
- soft computing
- risk assessment
- fault diagnosis
- fuzzy logic
- intelligent systems
- evolutionary computation
- computational intelligence
- artificial neural networks
- information systems
- machine learning
- real time
- intrusion detection
- case study
- computer vision
- network security
- artificial intelligence
- assessment process
- security vulnerabilities