<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>01458nam a2200205Ia 4500</leader>
  <controlfield tag="001">CTU_236272</controlfield>
  <controlfield tag="008">210402s9999    xx            000 0 und d</controlfield>
  <datafield tag="082" ind1=" " ind2=" ">
   <subfield code="a">006.33</subfield>
  </datafield>
  <datafield tag="082" ind1=" " ind2=" ">
   <subfield code="b">A285</subfield>
  </datafield>
  <datafield tag="100" ind1=" " ind2=" ">
   <subfield code="a">Ahamed, Syed V.</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="a">Evolution of knowledge science :</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="b">Myth to medicine: intelligent internet-based humanist machines</subfield>
  </datafield>
  <datafield tag="245" ind1=" " ind2="0">
   <subfield code="c">Syed V. Ahamed</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Amsterdam</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="b">Elsevier/Morgan Kaufmann</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="c">2017</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Evolution of Knowledge Science: Myth to Medicine: Intelligent Internet-Based Humanist Machines explains how to design and build the next generation of intelligent machines that solve social and environmental problems in a systematic, coherent, and optimal fashion. The book brings together principles from computer and communication sciences, electrical engineering, mathematics, physics, social sciences, and more to describe computer systems that deal with knowledge, its representation, and how to deal with knowledge centric objects. Readers will learn new tools and techniques to measure, enhance, and optimize artificial intelligence strategies for efficiently searching through vast knowledge bases, as well as how to ensure the security of information in open, easily accessible, and fast digital networks.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2=" ">
   <subfield code="a">Hệ chuyên gia (khoa học máy tính),Expert systems (Computer science)</subfield>
  </datafield>
  <datafield tag="910" ind1=" " ind2=" ">
   <subfield code="b">dqhieu</subfield>
  </datafield>
  <datafield tag="980" ind1=" " ind2=" ">
   <subfield code="a">Trung tâm Học liệu Trường Đại học Cần Thơ</subfield>
  </datafield>
 </record>
</collection>
