GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Artificial intelligence.  (571)
  • 2025-2025
  • 2020-2024  (571)
Document type
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Wiesbaden :Springer Fachmedien Wiesbaden GmbH,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (56 pages)
    Edition: 1st ed.
    ISBN: 9783658317959
    Series Statement: Essentials Series
    DDC: 060
    Language: German
    Note: Intro -- Was Sie in diesem essential finden können -- Vorwort -- Inhaltsverzeichnis -- Über die Autoren -- 1 Einleitung -- 2 Ausgewählte Grundlagen zu Digitalisierung -- 2.1 Von den Anfängen der Digitalisierung bis zu Data Science -- 2.2 Vernetzung von Menschen und Dingen -- 2.2.1 Vernetzung von Menschen -- 2.2.2 Vernetzung von Dingen -- 2.3 Ausgewählte grundlegende Entwicklungen zu Künstlicher Intelligenz (KI) -- 3 Anwendungsmöglichkeiten Künstlicher Intelligenz -- 3.1 Ausgewählte Anwendungsfelder -- 3.1.1 Verbraucherorientierte Anwendung von KI -- 3.1.2 KI in Unternehmen und Organisationen -- 3.2 AI-Landscape -- 3.3 Herausforderungen beim Einsatz von KI -- 3.3.1 Der Arbeitsmarkt -- 3.3.2 Schleichender Qualifikationsverlust -- 3.3.3 Deep Fakes -- 3.3.4 Diskriminierung durch KI -- 3.3.5 Intransparenz -- 3.3.6 Datenqualität -- 3.3.7 Social Profiling -- 3.3.8 Autonome Waffensysteme -- 3.3.9 IT-Sicherheit -- 3.4 Kompetenzen für eine sinngebende Kooperation von Menschen und Maschinen -- 4 Zusammenfassung und Ausblick -- Was Sie aus diesem essential mitnehmen können -- Literatur.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Stuttgart :J. B. Metzler'sche Verlagsbuchhandlung & Carl Ernst Poeschel GmbH,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (102 pages)
    Edition: 1st ed.
    ISBN: 9783476051370
    Series Statement: #philosophieorientiert Series
    DDC: 006.3
    Language: German
    Note: Intro -- Inhalt -- Vorwort -- 1 Einleitung -- 2 Was KI ist, wie sie funktioniert und was sie kann -- Was ist KI ? -- Wie funktioniert KI ? -- Künstliche neuronale Netzwerke und lernende Maschinen -- Möglichkeiten und Grenzen der KI -- 3 Risiken und Chancen, Werte und Verzerrungen -- Autonome Waffen -- Überwachung, soziale Kontrolle und Diskriminierung -- Medizin und Wissenschaft -- Werte und Verzerrungen -- 4 Das Ende der Arbeit und die Folgen -- 5 Superintelligenz und Wertharmonie -- Von allgemeiner KI zu Superintelligenz -- Superintelligenz als existenzielle Bedrohung -- Das Problem der Wertharmonie -- 6 Die Digitalisierung des Geistes und die Zukunft der Menschheit -- Maschinenbewusstsein -- Die Digitalisierung des Geistes -- 7 Fazit -- 8 Ergebnisse und Lehren -- Glossar -- Literatur.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Milton :Taylor & Francis Group,
    Keywords: Artificial intelligence. ; Electronic books.
    Description / Table of Contents: The text discusses fundamentals and applications of artificial intelligence, and its applications in the fields of consumer electronics, robotics and manufacturing. It will be an ideal reference text for senior undergraduate and graduate students in different areas including electrical engineering, mechanical engineering, pharmacy and healthcare.
    Type of Medium: Online Resource
    Pages: 1 online resource (271 pages)
    Edition: 1st ed.
    ISBN: 9781000406481
    Language: English
    Note: Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Artificial Intelligence and Nanotechnology: A Super Convergence -- 1.1 Introduction -- 1.2 Utility of Artificial Intelligence -- 1.2.1 AI in Scanning Probe Microscopy -- 1.2.2 Nanosystem Design -- 1.2.3 Nanoscale Simulation -- 1.2.4 Nanocomputing -- 1.3 Food Science -- 1.4 Nanobots in Medicine -- 1.5 Summary -- References -- Chapter 2 Artificial Intelligence in E-Commerce: A Business Process Analysis -- 2.1 Introduction -- 2.2 Artificial Intelligence -- 2.2.1 AI Mimicking Human Intelligence -- 2.2.2 AI Exceeding Human Intelligence -- 2.3 E-Commerce Business Processes and Artificial Intelligence -- 2.3.1 Marketing -- 2.3.1.1 Market Research -- 2.3.1.2 Market Stimulation -- 2.3.2 Transaction Processing -- 2.3.2.1 Terms Negotiation -- 2.3.2.2 Order Selection and Priority -- 2.3.2.3 Order Receipt -- 2.3.2.4 Order Billing/Payment Management -- 2.3.3 Service and Support -- 2.3.3.1 Order Scheduling/Fulfillment Delivery -- 2.3.3.2 Customer Service and Support -- 2.4 Concluding Remarks -- References -- Chapter 3 ABC of Digital Era with Special Reference to Banking Sector -- 3.1 Introduction -- 3.2 Artificial Intelligence in Banking Sector -- 3.3 ABC of Digital Era in Banking Sector -- 3.3.1 A as Artificial Intelligence -- 3.3.2 B as Big Tech -- 3.3.3 C as Core Banking and Cloud -- 3.4 Opportunities and Challenges in Banking Sector Due to Digitalization -- 3.4.1 Opportunities -- 3.4.2 Challenges -- 3.5 Artificial Intelligence Used by Four BIG Banks of India -- 3.5.1 State Bank of India -- 3.5.2 HDFC Bank -- 3.5.3 ICICI Bank -- 3.5.4 AXIS Bank -- 3.6 Conclusion -- References -- Chapter 4 Artificial Intelligence in Predictive Analysis of Insurance and Banking -- 4.1 Introduction -- 4.2 Predictive Analysis and Its Applications. , 4.2.1 Predictive Analysis of Stock Prices Using DCC GARCH Model in R -- 4.3 Genetic Algorithms -- 4.3.1 Genetic Algorithms in Portfolio Optimization -- 4.3.2 Genetic Algorithms in Bank Profit Maximization -- 4.4 Anomaly Detection -- 4.4.1 Anomaly Detection to Identify Credit Card Frauds using Python -- 4.4.1.1 Python Libraries -- 4.4.1.2 Anomaly Detection in Credit Card Data set -- 4.4.2 A Demonstration of Anomaly Detection in Ethereum Prices Using R -- 4.4.2.1 Ethereum -- 4.4.2.2 Tidy verse -- 4.4.2.3 Anomaly Detection -- 4.5 Conclusion -- References -- Chapter 5 Artificial Intelligence in Robotics and Automation -- 5.1 Introduction -- 5.2 History -- 5.3 Automation and Application Bots -- 5.4 Robots vs. Chatbots vs. Bots -- 5.4.1 Types of Bots -- 5.5 Natural Language Processing (NLP) -- 5.5.1 Natural Language Understanding (NLU) -- 5.5.2 Natural Language Generation -- 5.6 Robotics Process Automation (RPA) -- 5.6.1 Challenges in Implementation of RPA -- 5.7 Financial Impact of AI and Automation -- 5.8 Features of Automated Bots -- 5.9 Effect of AI and Automation -- 5.9.1 Human Resource -- 5.9.2 Drones and Self-Driving Cars -- 5.9.3 Education -- 5.9.4 Cybersecurity -- 5.9.5 Defense Forces -- 5.9.6 Home -- 5.9.7 Health Care -- 5.10 Challenges in implementing Automation -- 5.10.1 Business Case Issues -- 5.10.2 Analysis of Process -- 5.10.3 Post-Implementation Adoption -- 5.10.4 Choosing Right Vendor -- 5.11 Myths of Automated Bots -- 5.11.1 Robots are Humanoid -- 5.11.2 Automation Will Replace the Human Workforce -- 5.11.3 Accuracy -- 5.11.4 Expensive -- 5.11.5 Internal Environment of Organization -- 5.11.6 Robots Can Be Left Unattended -- 5.12 Platform Used for Implementation -- 5.12.1 Python -- 5.12.2 Tensor Flow -- 5.12.3 R -- 5.12.4 Scikit-Learn -- 5.12.5 Automation Anywhere -- 5.12.6 UiPath -- 5.13 Conclusion -- References. , Chapter 6 Artificial Intelligence: An Emerging Approach in Healthcare -- 6.1 Introduction -- 6.2 Scope & -- Relevance of Various Types of AI in Healthcare -- 6.3 AI's Timeline in Healthcare -- 6.4 Implementation of AI Concepts in the Medical World -- 6.5 Current Researches that Contribute to the Advancement of AI -- 6.6 Key Issues & -- Challenges Ahead in AI -- 6.7 Conclusion -- References -- Chapter 7 Artificial Intelligence and Personalized Medicines: A Joint Narrative on Advancement in Medical Healthcare -- 7.1 Introduction -- 7.2 Need for Personalized Medicines -- 7.2.1 Contributors to Personalized Medicines -- 7.3 Application of AI in Healthcare for Development of Precision Medicines -- 7.4 In Intensive Care Unit (ICU) -- 7.4.1 In Intensive Care Unit (ICU)-To Predict the Fluid Requirement -- 7.4.2 To Solve Issues of Personalized Medicines -- 7.4.3 Revolutionizing Cloud of AI and Healthcare -- 7.5 Conclusion -- References -- Chapter 8 Nanotechnology and Artificial Intelligence for Precision Medicine in Oncology -- 8.1 Introduction -- 8.1.1 Fundamentals of Nanotechnology -- 8.2 Role of Nanotechnology in Medicine and Healthcare -- 8.2.1 Nanodrug Design by AI -- 8.2.2 Artificial Intelligence -- 8.2.2.1 AI in Medicine -- 8.2.3 Precision Medicine -- 8.2.3.1 Applications of Precision Medicine -- 8.2.4 Deep Learning -- 8.2.4.1 Application -- 8.2.4.2 Implementation of Deep Learning in Medicine -- 8.2.4.3 Convolutional Neural Networks -- 8.2.4.4 CNN in Precision Medicine -- 8.5 Conclusion -- References -- Chapter 9 Applications of Artificial Intelligence in Pharmaceutical and Drug Formulation -- 9.1 Introduction -- 9.2 Genetic Algorithm -- 9.3 Fuzzy Logic -- 9.4 Integrated Software -- 9.5 Applications of Artificial Intelligence in Pharmaceuticals -- 9.6 Recognition of Pattern and Modeling the Data of Analysis -- 9.7 Modeling the Response Surface. , 9.8 In Assessment of Controlled-Release and Immediate-Release Formulations -- 9.9 In Product Development -- 9.10 In Predictive Toxicology -- 9.11 Proteins' Function and Structure Prediction -- 9.12 Pharmacokinetics -- 9.13 Conclusion -- References -- Chapter 10 Role of Artificial Intelligence for Diagnosing Tuberculosis -- 10.1 Introduction -- 10.1.1 History of TB -- 10.1.2 Global Impact of TB -- 10.1.3 TB: India's Silent Epidemic -- 10.1.4 Classification of TB -- 10.2 Technological Interventions for Diagnosis of TB -- 10.2.1 Artificial Intelligence (AI) -- 10.2.2 AI Techniques -- 10.2.3 Role of AI in the Diagnosis of TB-Comparative Analysis -- 10.2.4 Limitations of Retrieved Literature -- 10.3 Conclusion -- References -- Chapter 11 Applications of Artificial Intelligence in Detection and Treatment of COVID-19 -- 11.1 Introduction -- 11.2 Inception of Artificial Intelligence in Healthcare -- 11.2.1 Applications of AI in Healthcare -- 11.3 Artificial Intelligence in the Management of COVID-19 -- 11.3.1 AI in Early Detection and Alert Systems -- 11.4 Role of AI in Tracking and Prediction of COVID-19 -- 11.4.1 Machine Learning -- 11.4.2 BlueDot Technology -- 11.4.3 Spatial Analysis -- 11.4.4 Enter Telco Analytics -- 11.4.5 Social Media -- 11.5 AI in COVID-19 Diagnosis -- 11.5.1 Real-Time Reverse Transcriptase Polymerase Chain Reaction (rRT-PCR -- 11.5.2 Antibody Detection Test -- 11.5.3 Isothermal Nucleic Acid Amplification -- 11.5.4 CT Imaging Analysis -- 11.5.5 Detection Using the Sensors of Smartphones -- 11.6 AI in the Treatment of COVID-19 -- 11.7 AI in Maintenance of the Affected Areas and Dashboard -- 11.7.1 Johns Hopkins University Centre for Systems Science and Engineering Dashboard (JHU CSSE) -- 11.7.2 The World Health Organization (WHO) Dashboard -- 11.8 AI in Social Safety/Surveillance/Prevention of COVID-19 -- 11.9 Conclusion -- References. , Chapter 12 Internet of Things-Powered Artificial Intelligence Using Microsoft Azure Platform -- 12.1 Introduction -- 12.2 Computing Requirements -- 12.3 Real-Time Data Analysis -- 12.4 AIoT: Integration of IoT & -- AI on Microsoft Azure Platform -- 12.5 Steps to Write a Program in Rpi Computer -- 12.5.1 Working with Microsoft Azure -- 12.6 Application Areas of AIoT -- 12.7 Conclusion -- References -- Chapter 13 Load Balancing in Wireless Heterogeneous Network with Artificial Intelligence -- 13.1 Introduction -- 13.2 Different Types of Artificial Intelligence -- 13.2.1 Reactive Machines AI -- 13.2.2 Limited Memory AI -- 13.2.3 Theory of Mind AI -- 13.2.4 Self-Knowledge AI -- 13.2.5 Artificial Narrow Intelligence (ANI) -- 13.2.6 Artificial General Intelligence (AGI) -- 13.2.7 Artificial Strong Intelligence (ASI) -- 13.3 Advantages of Artificial Intelligence -- 13.4 Disadvantages of Artificial Intelligence -- 13.5 Artificial Intelligence: Methods and Applications -- 13.6 AI in Wireless Heterogeneous Networks (WHN) -- 13.7 Importance of Load Balancing In AI -- 13.6.1 Machine Learning in a Wireless Heterogeneous Network -- 13.6.2 Neural Network in a Wireless Heterogeneous Network -- 13.6.3 Fuzzy Logic for a Wireless Network -- 13.6.4 Genetic Algorithm -- 13.6.5 Particle Swarm Optimization (PSO) -- 13.6.6 Artificial Bee Colony (ABC) -- 13.6.7 Markov Models and Bayesian-Based Games -- 13.8 Conclusion -- References -- Chapter 14 Applications of Artificial Intelligence Techniques in the Power Systems -- 14.1 Introduction -- 14.1.1 Need of Artificial Intelligence in Power System -- 14.2 Types and Classification of Artificial Intelligent Techniques -- 14.2.1 Artificial Neural Network -- 14.2.1.1 Classification of Artificial Neural Network -- 14.2.1.2 Advantages and Disadvantages of Artificial Neural Network -- 14.2.1.3 Applications of ANN in Power System. , 14.2.2 Fuzzy Logic.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Wiesbaden :Springer Vieweg. in Springer Fachmedien Wiesbaden GmbH,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (166 pages)
    Edition: 1st ed.
    ISBN: 9783658318635
    Series Statement: Die Blaue Stunde der Informatik Series
    DDC: 006.3
    Language: German
    Note: Intro -- Vorwort -- Danksagung -- Inhaltsverzeichnis -- 1: Wieviel und was für künstliche Intelligenz verträgt der Mensch? -- 2: „Weißt du, wie das ward"? - Die Geschichte der KI -- 2.1 Menschliche Schöpfungssehnsucht - Die Vorgeschichte der KI -- 2.2 Das Schöpfungsjahr 1956 - Eine neue Informatik-Disziplin ist geboren -- 2.3 „Denn wir wissen nicht, was sie tun" - Die KI verselbstständigt sich -- 3: Wie funktioniert KI? - Techniken der KI -- 3.1 Die Welt im „Ein"/„Aus"-Modus - Formale Logik -- 3.1.1 Algorithmen -- 3.1.2 Aussagelogik/Kausalität -- 3.1.3 Prädikatenlogik -- 3.1.4 Fuzzy-Logik -- 3.2 Der Mensch lenkt, die Maschine denkt - Maschinelles Lernen -- 3.2.1 Überwachtes Lernen (Supervised Learning) -- 3.2.2 Unüberwachtes Lernen (unsupervised learning) -- 3.2.3 Verstärkendes Lernen (reinforced learning) -- 3.2.4 Deep Learning -- 3.3 Die Masse macht's - Big Data -- 3.4 Yota-Bites und Qbits- Hardware für KI -- 3.5 Zuverlässige Assistenten - Bots/Roboter & -- Cyborgs -- 4: Wie realisiert sich KI? - KI bestimmt unser Leben -- 4.1 „Big Brother" ist nicht nur „watching" - Ubiquität der KI im Alltag -- 4.2 Der „virtuelle Mozart" klingt besser - KI in der Kunst -- 4.3 Die unbiblische Brotvermehrung - KI in der Landwirtschaft -- 4.4 Der arbeitslose Sensenmann - K in der Medizin -- 4.5 IQ für jedermann - KI im Bildungswesen -- 4.6 Wozu noch geschickte Hände - KI in Wirtschaft und Technik -- 5: Kaufst Du noch oder „influenzt" Du schon? - Handel 4.0 -- 5.1 Ohne Werbung ist der Marketing-Mix nix - KI im Marketing -- 5.2 Touch Points sind gut, Conversions sind besser - KI in Vertrieb und Service -- 5.3 Ökonometrie oder Glücksrad - KI im Finanzsektor -- 6: Wohin mit der „Sozialbrache"? - Industrie 4.0 -- 6.1 „eins zwei drei" und 4.0 ? - Ontologie der Industrie 4.0. , 6.2 „Panta rei" - Der Wertschöpfungsprozess in der Industrie 4.0 -- 6.3 YU-MI & -- Internet of Everything (IoET) - Industrie 4.0 vernetzt und sicher -- 7: Wie verändert sich unser Miteinander? - Gesellschaftliche Implikationen der KI -- 7.1 Wohin führt die geschliffene Einkommens-Schere? - Der moderne Sozialstaat -- 7.2 Vergilbt die Sprachfähigkeit? - Die asozialen ‚social media' -- 7.3 Werden wir eine wirkliche Weltgemeinschaft? - Die Ubiquität der „Heimat" -- 8: Paradiesische Zeiten oder das Ende der Welt? - Die Zukunft mit KI -- 8.1 Schuld und Sühne? - Rechtliche Aspekte der KI -- 8.2 Virtuell oder reell? - Neue Lebensformen -- 8.3 „Entkörperung" des Menschen? - Optimierung der menschlichen Funktionalität -- 8.4 Dinosaurier-Schicksal? - Die feindliche Übernahme der Singularität -- Literatur.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (301 pages)
    Edition: 1st ed.
    ISBN: 9789813361768
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1312
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Performance Analysis of Machine Learning Algorithms Over a Network Traffic -- 1 Introduction -- 2 Literature Survey -- 3 Problem Specifications -- 4 Implementation -- 4.1 The Dataset -- 4.2 The Supervised Learning -- 4.3 The Multilayer Perceptron (MLP) -- 4.4 The Random Forest Classifier -- 4.5 The Support Vector Machine (SVM) -- 5 The Performance Evaluation and Results -- 5.1 The Accuracy -- 6 Conclusion and Future Work -- References -- Binary PSO-Based Feature Selection and Neural Network for Parkinson's Disease Prediction -- 1 Introduction -- 2 Methodology -- 2.1 Neural Networks -- 3 Results and Discussions -- 4 Conclusion -- References -- An Evolutionary-Based Additive Tree for Enhanced Disease Prediction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Novel Defense Framework for Cross-layer Attacks in Cognitive Radio Networks -- 1 Introduction -- 1.1 AI for Cognitive Radio Networks -- 2 Related Works -- 3 Attack Models -- 3.1 PHY Layer Attack Model -- 3.2 Defense Scheme -- 3.3 MAC Layer Attack Model -- 3.4 Defense Scheme -- 3.5 Cross-Layer Attack -- 3.6 Cross-Layer Defense -- 4 Results -- 4.1 Simulation Setup -- 4.2 Results -- 5 Conclusion -- References -- Texture Based Image Retrieval Using GLCM and LBP -- 1 Introduction -- 2 Theoretical Background -- 2.1 Gray Level Co-occurrence Matrixes (GLCM) -- 2.2 Local Binary Patterns (LBP) -- 3 Experimental Results -- 3.1 Statistical Analysis -- 4 Conclusion -- Reference -- Design and Development of Bayesian Optimization Algorithms for Big Data Classification Based on MapReduce Framework -- 1 Introduction -- 2 Correlative Naive Bayes Classifier (CNB) -- 3 Cuckoo Grey Wolf Optimization with Correlative Naïve Bayes Classifier (CGCNB). , 4 Fuzzy Correlative Naive Bayes Classifier (FCNB) -- 5 Holoentropy Using Correlative Naïve Bayes Classifier for a Big Data Classification (HCNB) -- 6 Results and Discussion -- 6.1 Performance Evaluation -- 7 Conclusion -- References -- An IoT-Based BLYNK Server Application for Infant Monitoring Alert System to Detect Crying and Wetness of a Baby -- 1 Introduction -- 2 Related Work -- 3 The Proposed Architecture of Baby Monitoring System -- 3.1 Baby Cry Detection Algorithm -- 3.2 Wetness Detection Algorithm -- 4 Experimental Results -- 4.1 Noise Detection by the System -- 4.2 Playing Songs -- 4.3 Wetness Detection -- 4.4 Turning on the Fan -- 5 Conclusions and Future Work -- References -- Analysis of DEAP Dataset for Emotion Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Foundations -- 3 Procedure -- 4 Results -- 5 Conclusions and Discussions -- References -- A Machine Learning Approach for Air Pollution Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Analysis of Linearity and Correlation Between Gases Using Machine Learning -- 5 Conclusions -- References -- Facial Expression Detection Model of Seven Expression Types Using Hybrid Feature Selection and Deep CNN -- 1 Introduction -- 1.1 Edge Detection and CNN -- 2 Related Work -- 3 Proposed Model -- 3.1 About the Model -- 3.2 Data Flow of the Model -- 3.3 Proposed Algorithm and Model -- 3.4 FaceImgRecog Advanced -- 4 Experiment and Results -- 4.1 Dataset and Execution -- 4.2 Graphical Representation of Results -- 4.3 Comparison Table -- 5 Conclusion and Future Work -- References -- A Fuzzy Approach for Handling Relationship Between Security and Usability Requirements -- 1 Introduction -- 2 Relationship Between Usability and Security -- 2.1 Usability -- 2.2 Security -- 3 Fuzzy Approach to Develop Usable-Secure System -- 4 Implementation and Results -- 5 Conclusion -- References. , Naive Bayes Approach for Retrieval of Video Object Using Trajectories -- 1 Introduction -- 2 Motivations -- 2.1 Literature Review -- 2.2 Research Gaps -- 3 Proposed Method -- 3.1 Object Tracking Based on Hybrid NSA-NARX Model -- 3.2 Retrieval of Objects Using the Naive Bayes Classifier -- 4 Results and Discussion -- 4.1 Performance Metrics -- 4.2 Comparative Analysis -- 5 Conclusion -- References -- Mobility-Aware Clustering Routing (MACRON) Algorithm for Lifetime Improvement of Extensive Dynamic Wireless Sensor Network -- 1 Related Work -- 1.1 Need of Scheduling in Wireless Sensor Network -- 2 Proposed Work -- 2.1 Proposed Algorithm -- 3 Results -- 4 Conclusion -- References -- An Extensive Survey on IOT Protocols and Applications -- 1 Introduction -- 2 Related Work -- 3 Block Diagram of IOT -- 4 Applications of IOT -- 5 IOT Protocols at Different Layers -- 6 Conclusion -- References -- Review on Cardiac Arrhythmia Through Segmentation Approaches in Deep Learning -- 1 Introduction -- 2 Survey Over Various Heart Sound Detection Techniques -- 2.1 Heart Sound Detection Using Empirical Mode Decomposition -- 2.2 Heart Sound Detection Through Tunable Quality Wavelet Transform (TQWT) -- 2.3 Heart Sound Detection Using Feature Extraction -- 3 Comparative Analysis of Various Segmentation Approaches Used in HS Detection -- 3.1 Heart Sound Detection Based on S-Transform -- 3.2 Classification Techniques for Heart Sound Detection -- 4 Heart Sound Detection Using Deep Learning Approaches -- 5 Conclusion -- References -- Fast Medicinal Leaf Retrieval Using CapsNet -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pre-processing -- 2.2 CapsNet Design and Training Process -- 3 Experimental Setup and Results -- 3.1 Evaluation Parameters -- 4 Conclusion -- References -- Risk Analysis in Movie Recommendation System Based on Collaborative Filtering. , 1 Recommendation System -- 1.1 Types of Recommendation System -- 2 Implementation -- 2.1 Single Objective Using Java -- 2.2 Multiobjective Using Python -- 3 Conclusion -- References -- Difficult on Addressing Security: A Security Requirement Framework -- 1 Introduction of the Security -- 2 The Need of Software Security and Existing Research Approach -- 3 Framework for Software Security in Requirement Phase -- 4 The Proposed Security Requirement Framework (SRF) -- 5 The FrameWork -- 6 Validation of the Framework -- 7 Conclusion -- References -- Smart Eye Testing -- 1 Introduction -- 2 Literature Review -- 3 Implementation -- 4 Results -- 5 Conclusion -- References -- Ameliorated Shape Matrix Representation for Efficient Classification of Targets in ISAR Imagery -- 1 Introduction -- 2 Ameliorated Shape Matrix Representation -- 2.1 Finding the Axis-of-Reference -- 2.2 Finding Rmax and Rmin -- 2.3 Shape Matrix Generation -- 2.4 Classification -- 3 Experimental Results -- 4 Conclusion -- References -- Region-Specific Opinion Mining from Tweets in a Mixed Political Scenario -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Collection -- 3.2 Wrangling -- 3.3 Preprocessing -- 3.4 Sentiment Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- Denoising of Multispectral Images: An Adaptive Approach -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Experimental Results -- 5 Conclusions -- References -- Digital Watermarking to Protect Deep Learning Model -- 1 Introduction -- 2 Literature Survey -- 3 Convolution Neural Network Model -- 3.1 Image Pre-processing and Data Generation -- 3.2 Training the Fully Connected Neural Network -- 4 Proposed Methodology -- 4.1 Watermarking the Neural Network -- 4.2 Implementation -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References. , Sequential Nonlinear Programming Optimization for Circular Polarization in Jute Substrate-Based Monopole Antenna -- 1 Introduction -- 2 Proposed Antenna Design and Parametric Analysis -- 3 Optimization Using SNLP Optimizer -- 3.1 Optimizing the Variable S, UL, and UW -- 4 Conclusion -- References -- Genetic Algorithm-Based Optimization in the Improvement of Wideband Characteristics of MIMO Antenna -- 1 Introduction -- 2 Antenna Designing -- 3 Genetic Algorithm Optimizer Analysis -- 3.1 Optimizing the Parameter BP1, BP2, and LP1 -- 4 Conclusion -- References -- Design and Analysis of Optimized Dimensional MIMO Antenna Using Quasi-Newton Algorithm -- 1 Introduction -- 2 Antenna Designing -- 3 Quasi-Newton Optimizer Analysis -- 3.1 Optimizing the Parameter of RL and Rw -- 4 Conclusion -- References -- Preserving the Forest Natural Resources by Machine Learning Intelligence -- 1 Introduction -- 2 Discussion on Existing Algorithms -- 2.1 Polyphonic Detection Systems -- 2.2 Classification Techniques -- 2.3 Mel-Frequency Cepstral Coefficients (MFCC) -- 2.4 K-Nearest Neighbour Method -- 2.5 Deep Neural Networks (DNN) -- 3 Analysis on Sound Event in Forest Environment -- 4 Conclusion -- References -- Comprehensive Study on Different Types of Software Agents -- 1 Introduction -- 2 Related Work and Discussion -- 2.1 Collaborative Agents -- 2.2 Interface Agents -- 2.3 Mobile Agent -- 2.4 Information/Internet Agents -- 2.5 Reactive Agents -- 2.6 Hybrid Agents -- 2.7 Smart Agents -- 3 Implementation of Software Agent -- 3.1 Overview -- 3.2 Algorithm -- 4 Result -- 5 Conclusion -- References -- Hybrid Acknowledgment Scheme for Early Malicious Node Detection in Wireless Sensor Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Algorithm -- 5 Increased Network Lifetime -- 6 Enhanced Throughput -- 7 Conclusion -- References. , Prediction of Temperature and Humidity Using IoT and Machine Learning Algorithm.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (574 pages)
    Edition: 1st ed.
    ISBN: 9789813340695
    Series Statement: Lecture Notes in Electrical Engineering Series ; v.724
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Keynote Speakers -- Contents -- Building a Knowledge Graph of Vietnam Tourism from Text -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Definition -- 3.2 Extract Triples of Knowledge Graph from Text -- 3.3 Introduction to ClausIE and MinIE -- 3.4 Co-reference Resolution and NeuralCoref -- 3.5 Store Knowledge Graph in Neo4j Graph Database -- 3.6 The Pipeline of Proposed System -- 3.7 The Structure of the Knowledge Graph -- 4 System Implementation -- 5 Experiment and Discussion -- 5.1 Results from the Co-Reference Resolution -- 5.2 Results from Triples Extraction and Translation -- 5.3 Results from the ``Type Recommendation'' Service -- 5.4 Discussions -- 6 Conclusion and Future Work -- References -- Technology Adoption Models: Users' Online Social Media Behavior Towards Visual Information -- 1 Introduction -- 2 Materials and Methods -- 2.1 Visual Information -- 2.2 Social Media -- 2.3 Social Media Behavior -- 2.4 Technology Adoption Models -- 3 Result and Discussion -- 4 Conclusion -- 5 Future Works -- Appendix -- References -- A Pedagogical Framework with Integration of TPACK for Mobile Interactive System in Teaching Mathematics -- 1 Introduction -- 1.1 Engagement Between Teachers and Students -- 1.2 Technological Pedagogical Content Knowledge Theoretical Framework -- 1.3 Mobile Interactive System -- 2 Literature Review -- 2.1 Mobile Interactive System -- 2.2 On-Screen Writing Pad with Screen Sharing -- 3 Methodology -- 3.1 Systematic Literature Review -- 4 Expected Outcome -- 4.1 Proposed TPACK Framework -- 5 Conclusion -- References -- Towards Palm Bunch Ripeness Classification Using Colour and Canny Edge Detection -- 1 Introduction -- 2 Literature Review -- 3 Data -- 3.1 Dataset -- 4 Methodology -- 4.1 Data Pre-processing -- 4.2 Feature Extraction -- 4.3 Modeling -- 5 Evaluation: Results and Discussion. , 6 Conclusion -- References -- Attention Models for Sentiment Analysis Using Objectivity and Subjectivity Word Vectors -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Datasets -- 3.2 Data Preparation -- 3.3 Model Selection -- 3.4 Design of Experiments -- 4 Results and Discussions -- 4.1 Quality of Embeddings -- 4.2 Sentiment Analysis -- 5 Conclusions -- References -- A Question-Answering System that Can Count -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 3.1 Fine-Tune Language Model (ftLM) -- 3.2 Question Type Classifier (C1) -- 3.3 Answer Type Classifier (C2) -- 3.4 Counting Method (M1) -- 4 Discussion and Future Work -- 5 Conclusion -- References -- Contactless Patient Authentication for Registration Using Face Recognition Technology -- 1 Introduction -- 2 Patient Registration System Using Face Recognition -- 3 Application of Patient Registration System -- 4 System Performance Analysis Test and Discussion -- 5 Conclusion and Future Scope -- References -- Drawing and Recognising Simple Shapes with Real-Time Feedback Using Pattern Recognition -- 1 Introduction -- 2 Background -- 3 System Development -- 3.1 User Interface -- 3.2 Real-Time Feedback Engine -- 4 Conclusion -- References -- Information Technology Students' Preferences on Blended Learning -- 1 Introduction -- 2 Methodology -- 2.1 Sample -- 2.2 Instrument -- 2.3 Procedure -- 3 Findings and Discussions -- 4 Conclusion -- References -- Improved Facial Recognition Algorithms Based on Dragonfly and Grasshopper Optimization -- 1 Introduction -- 2 Optimization Algorithms -- 2.1 Binary Dragonfly Algorithm -- 2.2 Grasshopper Optimization Algorithm -- 2.3 Comparison of Optimization Algorithms -- 3 Proposed Method -- 3.1 Preprocessing -- 3.2 Feature Extraction -- 3.3 Feature Selection and Classification -- 4 Results and Discussion -- 5 Conclusion -- References. , Optimization on the Financial Management of Banks with Two-Stage Goal Programming Model -- 1 Introduction -- 2 Literature Review -- 3 Data and Methodology -- 3.1 Data -- 3.2 Proposed Two-Stage Goal Programming Model -- 4 Results -- 5 Conclusion -- References -- Evaluating the Performance of Selected Mortality Forecasting Models: A Malaysia Case Study -- 1 Introduction -- 2 Methodology -- 2.1 Data -- 2.2 The Lee-Carter Model -- 2.3 The CBD Model -- 2.4 The M8 Model -- 2.5 Evaluations of Mortality Forecasting Models -- 3 Results and Discussions -- 3.1 Estimation of Models' Parameters -- 3.2 The Performance of Mortality Models -- 4 Conclusions -- References -- Assessing Python Programming Through Personalised Learning Styles Model -- 1 Introduction -- 2 Background Study -- 3 Methodology -- 4 Results and Discussions -- 4.1 Completion Time for Stage 1, Stage 2 and Stage 3 -- 4.2 Comprehension -- 4.3 Significance Among the Three Documentation Groups -- 5 Conclusion -- References -- The Programming Learning Assessment Model for Measuring Student Performance -- 1 Introduction -- 2 Motivation -- 3 Programming Learning Approach -- 4 Methodology -- 4.1 Experiment Design for PLA Model -- 4.2 Data Preprocessing for LEAP Model in Fluent English Language Proficiency -- 4.3 Results and Analysis -- 5 Justification -- References -- Design and Functionality of a University Academic Advisor Chatbot as an Early Intervention to Improve Students' Academic Performance -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Feature Selection and Machine Learning Algorithms -- 3.3 Preliminary Data Analysis -- 3.4 Design and Functionality of the University Academic Advisor Chatbot -- 4 Conclusion -- References -- Multiprocessing Implementation for Building a DNA q-gram Index Hash Table -- 1 Introduction -- 2 Index-Based Hash Table. , 2.1 Direct Addressing q-gram Index Hash Table -- 2.2 Open Addressing q-gram Index Hash Table -- 2.3 Minimizer-Based q-gram Index Hash Table -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Predicting Chart Difficulty in Rhythm Games Through Classification Using Chart Pattern Derived Attributes -- 1 Introduction -- 1.1 Overview of the Current State of Technology -- 1.2 Problem and Limitations of Existing Studies -- 1.3 Scope and Limitations of the Study -- 2 Review of Related Literature -- 2.1 Chart Structure and Step Patterns -- 2.2 Groove Radar and Groove Radar Values -- 3 Preliminary Data Analysis -- 3.1 Description of the Dataset -- 3.2 Correlation of Groove Radar Attributes to the Level -- 3.3 Classification Using Groove Radar Values -- 4 Pattern Derived Attributes -- 5 Results from Classifications with Pattern Derived Attributes -- 6 Conclusion and Future Work -- References -- Nasheed Song Classification by Fuzzy Soft-Set Approach -- 1 Introduction -- 2 Related Works -- 2.1 Nasheed Song -- 2.2 Non-western Genre Classification -- 2.3 Uncertainties Management -- 3 Overview of the Fuzzy-Soft Set Theory -- 4 Modelling Process -- 4.1 The Algorithm -- 4.2 The Data -- 4.3 Evaluation and Validation -- 5 Result and Discussion -- 6 Conclusion -- References -- Hybrid SDN Deployment Using Machine Learning -- 1 Introduction -- 2 Related Works -- 3 Generic Workflow for Machine Learning in Networking -- 4 Machine Learning for hSDN Deployment -- 5 Conclusion -- References -- LED Lighting Assessment for High-Performance Stadium Illuminance -- 1 Introduction -- 2 Methodology -- 2.1 Modeling LED -- 2.2 Luminaire -- 2.3 Evaluation Area -- 2.4 Horizontal Illuminance -- 3 Performance Indicator -- 4 Result and Discussion -- 4.1 Light Output -- 4.2 Horizontal Illuminance -- 4.3 Uniformity -- 5 Conclusion -- References. , Split Balancing (sBal)-A Data Preprocessing Sampling Technique for Ensemble Methods for Binary Classification in Imbalanced Datasets -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experimental Design -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Experiments Design -- 5 Results and Discussions -- 5.1 Statistical Results and Analysis -- 6 Conclusion and Future Works -- References -- DyslexiAR: Augmented Reality Game Based Learning on Reading, Spelling and Numbers for Dyslexia User's -- 1 Introduction -- 2 Methodology -- 3 System Overview -- 3.1 Game Structure -- 3.2 Gameplay -- 4 Result and Discussion -- 4.1 Playtesting -- 5 Conclusion and Future Scope -- References -- Applying Transfer Learning in Stock Prediction Based on Financial News -- 1 Introduction -- 2 Our Approach -- 2.1 System Design -- 3 Processing Data -- 3.1 Crawling Data -- 3.2 Preprocess and Labeling Articles -- 3.3 Dataset Splitting -- 4 Word Embedding -- 5 Deep Neural Network -- 5.1 Model -- 5.2 Optimization -- 6 Experiment Result -- 6.1 Practical Experiment -- 7 Conclusion -- References -- Solving Time-Fractional Parabolic Equations with the Four Point-HSEGKSOR Iteration -- 1 Introduction -- 2 Half-Sweep Approximation Equation -- 3 Derivation of the Iterative Method -- 4 Numerical Experiment -- 5 Conclusion -- References -- Fake News Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Lemmatization -- 3.2 Stop Words and Punctuation Removal -- 3.3 Term Frequency-Inverted Document Frequency (TF-IDF) -- 3.4 Cosine Similarity -- 3.5 Dataset -- 3.6 Evaluation -- 4 Results and Discussion -- 5 Prototype -- 6 Conclusion -- References -- A Literature Review on Text Classification and Sentiment Analysis Approaches -- 1 Introduction -- 2 Literature Search -- 2.1 Database Selection -- 3 Comparative Study -- 3.1 Papers. , 3.2 Text Classification and Sentiment Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Oxford :Oxford University Press, Incorporated,
    Keywords: Artificial intelligence. ; Cognitive science. ; Electronic books.
    Description / Table of Contents: This book, authored by an array of internationally recognised researchers, is of direct relevance to all those involved in Academia and Industry wanting to obtain insights into the topics at the forefront of the revolution in Artificial Intelligence and Cognitive Science.
    Type of Medium: Online Resource
    Pages: 1 online resource (533 pages)
    Edition: 1st ed.
    ISBN: 9780192607461
    DDC: 006.3
    Language: English
    Note: Cover -- Human-Like Machine Intelligence -- Copyright -- Preface -- Acknowledgements -- Contents -- Part 1: Human-like Machine Intelligence -- 1: Human-Compatible Artificial Intelligence -- 1.1 Introduction -- 1.2 Artificial Intelligence -- 1.3 1001 Reasons to Pay No Attention -- 1.4 Solutions -- 1.4.1 Assistance games -- 1.4.2 The off-switch game -- 1.4.3 Acting with unknown preferences -- 1.5 Reasons for Optimism -- 1.6 Obstacles -- 1.7 Looking Further Ahead -- 1.8 Conclusion -- References -- 2: Alan Turing and Human-Like Intelligence -- 2.1 The Background to Turing's 1936 Paper -- 2.2 Introducing Turing Machines -- 2.3 The Fundamental Ideas of Turing's 1936 Paper -- 2.4 Justifying the Turing Machine -- 2.5 Was the Turing Machine Inspired by Human Computation? -- 2.6 From 1936 to 1950 -- 2.7 Introducing the Imitation Game -- 2.8 Understanding the Turing Test -- 2.9 Does Turing's "Intelligence" have to be Human-Like? -- 2.10 Reconsidering Standard Objections to the Turing Test -- References -- 3: Spontaneous Communicative Conventions through Virtual Bargaining -- 3.1 The Spontaneous Creation of Conventions -- 3.2 Communication through Virtual Bargaining -- 3.3 The Richness and Flexibility of Signal-Meaning Mappings -- 3.4 The Role of Cooperation in Communication -- 3.5 The Nature of the Communicative Act -- 3.6 Conclusions and Future Directions -- Acknowledgements -- References -- 4: Modelling Virtual Bargaining using Logical Representation Change -- 4.1 Introduction-Virtual Bargaining -- 4.2 What's in the Box? -- 4.3 Datalog Theories -- 4.3.1 Clausal form -- 4.3.2 Datalog properties -- 4.3.3 Application 1: Game rules as a logic theory -- 4.3.4 Application 2: Signalling convention as a logic theory -- 4.4 SL Resolution -- 4.4.1 SL refutation -- 4.4.2 Executing the strategy -- 4.5 Repairing Datalog Theories -- 4.5.1 Fault diagnosis and repair. , 4.5.2 Example: The black swan -- 4.6 Adapting the Signalling Convention -- 4.6.1 'Avoid' condition -- 4.6.2 Extended vocabulary -- 4.6.3 Private knowledge -- 4.7 Conclusion -- Acknowledgements -- References -- Part 2: Human-like Social Cooperation -- 5: Mining Property-driven Graphical Explanations for Data-centric AI from Argumentation Frameworks -- 5.1 Introduction -- 5.2 Preliminaries -- 5.2.1 Background: argumentation frameworks -- 5.2.2 Application domain -- 5.3 Explanations -- 5.4 Reasoning and Explaining with BFs Mined from Text -- 5.4.1 Mining BFs from text -- 5.4.2 Reasoning -- 5.4.3 Explaining -- 5.5 Reasoning and Explaining with AFs Mined from Labelled Examples -- 5.5.1 Mining AFs from examples -- 5.5.2 Reasoning -- 5.5.3 Explaining -- 5.6 Reasoning and Explaining with QBFs Mined from Recommender Systems -- 5.6.1 Mining QBFs from recommender systems -- 5.6.2 Explaining -- 5.7 Conclusions -- Acknowledgements -- References -- 6: Explanation in AI systems -- 6.1 Machine-generated Explanation -- 6.1.1 Bayesian belief networks: a brief introduction -- 6.1.2 Bayesian belief networks: explaining evidence -- 6.1.3 Bayesian belief networks: explaining reasoning processes -- 6.2 Good Explanation -- 6.2.1 A brief overview of models of explanation -- 6.2.2 Explanatory virtues -- 6.2.3 Implications -- 6.2.4 A brief case study on human-generated explanation -- 6.3 Bringing in the user: bi-directional relationships -- 6.3.1 Explanations are communicative acts -- 6.3.2 Explanations and trust -- 6.3.3 Trust and fidelity -- 6.3.4 Further research avenues -- 6.4 Conclusions -- Acknowledgements -- References -- 7: Human-like Communication -- 7.1 Introduction -- 7.2 Face-to-face Conversation -- 7.2.1 Facial expressions -- 7.2.2 Gesture -- 7.2.3 Voice -- 7.3 Coordinating Understanding -- 7.3.1 Standard average understanding -- 7.3.2 Misunderstandings. , 7.4 Real-time Adaptive Communication -- 7.5 Conclusion -- References -- 8: Too Many cooks: Bayesian inference for coordinating Multi-agent Collaboration -- 8.1 Introduction -- 8.2 Multi-Agent MDPs with Sub-Tasks -- 8.2.1 Coordination Test Suite -- 8.3 Bayesian Delegation -- 8.4 Results -- 8.4.1 Self-play -- 8.4.2 Ad-hoc -- 8.5 Discussion -- Acknowledgements -- References -- 9: Teaching and Explanation: Aligning Priors between Machines and Humans -- 9.1 Introduction -- 9.2 Teaching Size: Learner and Teacher Algorithms -- 9.2.1 Uniform-prior teaching size -- 9.2.2 Simplicity-prior teaching size -- 9.3 Teaching and Explanations -- 9.3.1 Interpretability -- 9.3.2 Exemplar-based explanation -- 9.3.3 Machine teaching for explanations -- 9.4 Teaching with Exceptions -- 9.5 Universal Case -- 9.5.1 Example 1: Non-iterative concept -- 9.5.2 Example 2: Iterative concept -- 9.6 Feature-value Case -- 9.6.1 Example 1: Concept with nominal attributes only -- 9.6.2 Example 2: Concept with numeric attributes -- 9.7 Discussion -- Acknowledgements -- References -- Part 3: Human-like Perception and Language -- 10: Human-like Computer Vision -- 10.1 Introduction -- 10.2 Related Work -- 10.3 Logical Vision -- 10.3.1 Learning geometric concepts from synthetic images -- 10.3.2 One-shot learning from real images -- 10.4 Learning Low-level Perception through Logical Abduction -- 10.5 Conclusion and Future Work -- References -- 11: Apperception -- 11.1 Introduction -- 11.2 Method -- 11.2.1 Making sense of unambiguous symbolic input -- 11.2.2 The Apperception Engine -- 11.2.3 Making sense of disjunctive symbolic input -- 11.2.4 Making sense of raw input -- 11.2.5 Applying the Apperception Engine to raw input -- 11.3 Experiment: Sokoban -- 11.3.1 The data -- 11.3.2 The model -- 11.3.3 Understanding the interpretations -- 11.3.4 The baseline -- 11.4 Related Work. , 11.5 Discussion -- 11.6 Conclusion -- References -- 12: Human-Machine Perception of Complex Signal Data -- 12.1 Introduction -- 12.1.1 Interpreting the QT interval on an ECG -- 12.1.2 Human-machine perception -- 12.2 Human-Machine Perception of ECG Data -- 12.2.1 Using pseudo-colour to support human interpretation -- Pseudo-colouring method -- 12.2.2 Automated human-like QT-prolongation detection -- 12.3 Human-Machine Perception: Differences, Benefits, and Opportunities -- 12.3.1 Future work -- References -- 13: The Shared-Workspace Framework for Dialogue and Other Cooperative Joint Activities -- 13.1 Introduction -- 13.2 The Shared Workspace Framework -- 13.3 Applying the Framework to Dialogue -- 13.4 Bringing Together Cooperative Joint Activity and Communication -- 13.5 Relevance to Human-like Machine Intelligence -- 13.5.1 Communication via an augmented workspace -- 13.5.2 Making an intelligent artificial interlocutor -- 13.6 Conclusion -- References -- 14: Beyond Robotic Speech: Mutual Benefits to Cognitive Psychology and Artificial Intelligence from the Study of Multimodal Communic -- 14.1 Introduction -- 14.2 The Use of Multimodal Cues in Human Face-to-face Communication -- 14.3 How Humans React to Embodied Agents that Use Multimodal Cues -- 14.4 Can Embodied Agents Recognize Multimodal Cues Produced by Humans? -- 14.5 Can Embodied Agents Produce Multimodal Cues? -- 14.6 Summary and Way Forward: Mutual Benefits from Studies on Multimodal Communication -- 14.6.1 Development and coding of shared corpora -- 14.6.2 Toward a mechanistic understanding of multimodal communication -- 14.6.3 Studying human communication with embodied agents -- Acknowledgements -- References -- Part 4: Human-like Representation and Learning -- 15: Human-Machine Scientific Discovery -- 15.1 Introduction. , 15.2 Scientific Problem and Dataset: Farm Scale Evaluations (FSEs) of GMHT Crops -- 15.3 The Knowledge Gap for Modelling Agro-ecosystems: Ecological Networks -- 15.4 Automated Discovery of Ecological Networks from FSE Data and Ecological Background Knowledge -- 15.5 Evaluation of the Results and Subsequent Discoveries -- 15.6 Conclusions -- References -- 16: Fast and Slow Learning in Human-Like Intelligence -- 16.1 Do Humans Learn Quickly and Is This Uniquely Human? -- 16.1.1 Evidence of rapid learning in infants, children, and adults -- 16.1.2 Does fast learning require a specific mechanism? -- 16.1.3 Slow learning in infants, children, and adults -- 16.1.4 Beyond word and concept learning -- 16.1.5 Evidence of rapid learning in non-human animals -- 16.2 What Makes for Rapid Learning? -- 16.3 Reward Prediction Error as the Gateway to Fast and Slow Learning -- 16.4 Conclusion -- Acknowledgements -- References -- 17: Interactive Learning with Mutual Explanations in Relational Domains -- 17.1 Introduction -- 17.2 The Case for Interpretable and Interactive Learning -- 17.3 Types of Explanations-There is No One-Size Fits All -- 17.4 Interactive Learning with ILP -- 17.5 Learning to Delete with Mutual Explanations -- 17.6 Conclusions and Future Work -- Acknowledgements -- References -- 18: Endowing machines with the expert human ability to select representations: why and how -- 18.1 Introduction -- 18.2 Example of selecting a representation -- 18.3 Benefits of switching representations -- 18.3.1 Epistemic benefits of switching representations -- 18.3.2 Cognitive benefits of switching representations -- 18.4 Why selecting a good representation is hard -- 18.4.1 Representational and cognitive complexity -- 18.4.2 Cognitive framework -- 18.5 Describing representations: rep2rep -- 18.5.1 A description language for representations -- 18.5.2 Importance. , 18.5.3 Correspondences.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (430 pages)
    Edition: 1st ed.
    ISBN: 9783030649494
    Series Statement: Studies in Computational Intelligence Series ; v.937
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- Explainable Artificial Intelligence for Process Mining: A General Overview and Application of a Novel Local Explanation Approach for Predictive Process Monitoring -- 1 Introduction -- 2 Background and Related Work -- 2.1 Process Mining -- 2.2 Predictive Business Process Management -- 2.3 Deep Learning for Predictive BPM and XAI -- 3 A Framework for Explainable Process Predictions -- 4 A Novel Local Post-Hoc Explanation Method -- 4.1 Binary Classification with Deep Learning -- 4.2 Local Region Identification by Using Neural Codes -- 4.3 Local Surrogate Model -- 5 Experiment Setting -- 5.1 Use Case: Incident Management -- 5.2 Evaluation Measures -- 5.3 Results -- 6 Discussion -- 7 Conclusion -- References -- Use of Visual Analytics (VA) in Explainable Artificial Intelligence (XAI): A Framework of Information Granules -- 1 Introduction -- 2 Explainability Strategies -- 2.1 Feature Selection -- 2.2 Performance Analysis -- 2.3 Model Explanations -- 3 Global and Local Interpretability -- 3.1 Information Scalability -- 3.2 Visual Scalability -- 4 Stability of Explanation -- 5 Visual Analytics for Granular Computing -- 6 Summary -- References -- Visualizing the Behavior of Convolutional Neural Networks for Time Series Forecasting -- 1 Introduction -- 2 Introduction to Neural Networks and Forecasting -- 2.1 Power Time Series Forecasting -- 2.2 Neural Networks -- 3 Relevant Literature -- 4 Training the cnn ae -- 4.1 Experiment -- 4.2 Data and Code -- 4.3 Setup -- 5 Visualization and Patterns -- 5.1 How to Interpret the Visualizations -- 5.2 Input Visualization -- 5.3 Kernel Visualization -- 5.4 Forecast Visualization -- 5.5 Activation Maps -- 5.6 How to Use the Individual Visualizations -- 6 Conclusion -- References -- Beyond Deep Event Prediction: Deep Event Understanding Based on Explainable Artificial Intelligence. , 1 Introduction -- 2 Why Current Machine Learning is Differentiated from Human Learning -- 3 Beyond Deep Event Prediction -- 4 Big Data, AI, and Critical Condition -- 5 DUE Architecture -- 6 Properties of DUE -- 7 The Concept of DUE -- 7.1 Human Critical Thinking -- 7.2 Contextual Understanding -- 8 Learning Model for DUE -- 8.1 Fundamental Computing for DUE -- 8.2 Computing Using CBNs-Based XAI -- 9 DUE Trends and Future Outlooks -- 9.1 Disasters -- 9.2 Economic Consequences -- 9.3 Safety and Security -- 10 Conclusions -- References -- Interpretation of SVM to Build an Explainable AI via Granular Computing -- 1 Introduction -- 1.1 The Era of Explainable AI with Granular Computing -- 2 The Problem with a Gap in Explainability -- 3 Related Work -- 4 Background -- 4.1 SVM Algorithm -- 4.2 Granular Computing -- 4.3 Syllogisms -- 4.4 Explainable Artificial Intelligence -- 5 Research Methodologies -- 5.1 A Constructive Approach in Developing XAI -- 5.2 A Human-Centric Approach at Early Development Stage -- 6 Implementation: A Syllogistic Approach to Interpret SVM's Classification from Information Granules -- 6.1 Data Selection -- 6.2 Identifying the Information Granules from These Data Sets -- 6.3 Analyzing and Interpretation of Syllogisms from SVM -- 6.4 The General Framework for Modelling Syllogistic Rules -- 6.5 Validating the Interpreted Syllogistic Rules with Physicians and CPGs -- 6.6 XAI Knowledge Base for CAD -- 6.7 XAI with Inference Engine -- 6.8 User Interface in Mobile Application -- 6.9 Preliminary Results -- 6.10 Iterative Retuning and Validation of XAI Mobile App with Physicians in the Loop -- 7 Final XAI Mobile App -- 7.1 XAI Mobile App -- 8 Testing Results from XAI Mobile App -- 8.1 Testing Phase I -- 8.2 Testing Phase II -- 8.3 Testing Phase III -- 8.4 Results from Testing -- 9 Conclusion and Discussion -- 10 Future Work -- References. , Factual and Counterfactual Explanation of Fuzzy Information Granules -- 1 Introduction -- 2 Background -- 3 Proposal -- 4 Illustrative Use Case -- 5 Experiments -- 5.1 Experimental Settings -- 5.2 Experiment 1: Relevance of Expert Knowledge-Based Counterfactual Explanations -- 5.3 Experiment 2: An Impact of Posterior Linguistic Approximation -- 6 Discussion -- 7 Conclusion and Future Work -- References -- Transparency and Granularity in the SP Theory of Intelligence and Its Realisation in the SP Computer Model -- 1 Introduction -- 2 Introduction to Transparency -- 3 Introduction to Granularity -- 4 The SP System in Brief -- 4.1 Information Compression -- 4.2 Abstract View of the SP System -- 4.3 Basic Structures in the SP System for Representing Knowledge -- 4.4 The Concept of SP-Multiple-Alignment -- 4.5 Unsupervised Learning -- 4.6 Existing and Potential Strengths of the SP System -- 4.7 SP-Neural -- 4.8 Future Developments -- 5 Information Compression and the Representation and Processing of Knowledge in the SP System -- 5.1 Information Compression via the Matching and Unification of Patterns -- 5.2 Discontinuous Patterns -- 5.3 Seven Variants of ICMUP -- 5.4 The DONSVIC Principle -- 5.5 Ideas Related to the Concept of a Granule -- 5.6 Tying Things Together? -- 6 Transparency via Audit Trails -- 7 Transparency via Granularity and Familiarity -- 7.1 Granularity, Familiarity, and Basic ICMUP -- 7.2 Granularity, Familiarity, and Chunking-With-Codes -- 7.3 Granularity, Familiarity, and Schema-Plus-Correction -- 7.4 Granularity, Familiarity, and Run-Length Encoding -- 7.5 Granularity, Familiarity, and Part-Whole Hierarchies -- 7.6 Granularity, Familiarity, and Class-Inclusion Hierarchies -- 7.7 Granularity, Familiarity, and SP-multiple-alignments -- 8 Interpretability and Explainability -- 9 Conclusion -- References. , Survey of Explainable Machine Learning with Visual and Granular Methods Beyond Quasi-Explanations -- 1 Introduction -- 1.1 What Are Explainable and Explained? -- 1.2 Types of Machine Learning Models -- 1.3 Informal Definitions -- 1.4 Formal Operational Definitions -- 1.5 Interpretability and Granularity -- 2 Foundations of Interpretability -- 2.1 How Interpretable Are the Current Interpretable Models? -- 2.2 Domain Specificity of Interpretations -- 2.3 User Centricity of Interpretations -- 2.4 Types of Interpretable Models -- 2.5 Using Black-Box Models to Explain Black Box Models -- 3 Overview of Visual Interpretability -- 3.1 What is Visual Interpretability? -- 3.2 Visual Versus Non-Visual Methods for Interpretability and Why Visual Thinking -- 3.3 Visual Interpretation Pre-Dates Formal Interpretation -- 4 Visual Discovery of ML Models -- 4.1 Lossy and Lossless Approaches to Visual Discovery in n-D Data -- 4.2 Theoretical Limitations -- 4.3 Examples of Lossy Versus Lossless Approaches for Visual Model Discovery -- 5 General Line Coordinates (GLC) -- 5.1 General Line Coordinates to Convert n-D Points to Graphs -- 5.2 Case Studies -- 6 Visual Methods for Traditional Machine Learning -- 6.1 Visualizing Association Rules: Matrix and Parallel Sets Visualization for Association Rules -- 6.2 Dataflow Tracing in ML Models: Decision Trees -- 6.3 IForest: Interpreting Random Forests via Visual Analytics -- 6.4 TreeExplainer for Tree Based Models -- 7 Traditional Visual Methods for Model Understanding: PCA, t-SNE and Related Point-to-Point Methods -- 8 Interpreting Deep Learning -- 8.1 Understanding Deep Learning via Generalization Analysis -- 8.2 Visual Explanations for DNN -- 8.3 Rule-Based Methods for Deep Learning -- 8.4 Human in the Loop Explanations -- 8.5 Understanding Generative Adversarial Networks (GANs) via Explanations. , 9 Open Problems and Current Research Frontiers -- 9.1 Evaluation and Development of New Visual Methods -- 9.2 Cross Domain Pollination: Physics & -- Domain Based Methods -- 9.3 Cross-Domain Pollination: Heatmap for Non-Image Data -- 9.4 Future Directions -- 10 Conclusion -- References -- MiBeX: Malware-Inserted Benign Datasets for Explainable Machine Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Malware Analysis Overview -- 2.2 Granularity in Malware Analysis -- 2.3 Feature Visualization -- 2.4 Malware as Video -- 2.5 MetaSploit -- 2.6 Bash Commands -- 3 Dataset Generation -- 3.1 Gathering Benign Files -- 3.2 Trojan Insertion -- 3.3 Malware Verification -- 3.4 Dataset Generation Results -- 4 Malware Classification -- 4.1 Pre-processing -- 4.2 Network Specifications -- 4.3 Classification Results -- 5 Saliency Mapping -- 6 Conclusion and Future Work -- References -- Designing Explainable Text Classification Pipelines: Insights from IT Ticket Complexity Prediction Case Study -- 1 Introduction -- 2 Related Work -- 2.1 Explainability and Granularity -- 2.2 Text Representation -- 2.3 Text Classification -- 2.4 Ticket Classification Research -- 2.5 Summary -- 3 Methods -- 3.1 Feature Extraction -- 3.2 Machine Learning Classifiers -- 4 Experimental Evaluation -- 4.1 Case Study and Datasets -- 4.2 Experimental Settings -- 4.3 Comparison of SUCCESS and QuickSUCCESS -- 4.4 Results -- 5 Discussion -- 5.1 Explainability and Granularity Implications -- 5.2 Methodological Contributions -- 5.3 Managerial and Practical Contributions -- 6 Conclusion and Future Works -- Appendix I: Taxonomy of Decision-Making Logic Levels -- Appendix II: Business Sentiment Lexicon with Assigned Valences -- References -- A Granular Computing Approach to Provide Transparency of Intelligent Systems for Criminal Investigations -- 1 Introduction. , 2 Supporting Intelligence Analysts with Intelligent Systems.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (619 pages)
    Edition: 1st ed.
    ISBN: 9783030659653
    Series Statement: Communications in Computer and Information Science Series ; v.1323
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organization -- Contents -- Fifth Workshop on Data Science for Social Good (SoGood 2020) -- Workshop on Data Science for Social Good (SoGood 2020) -- SoGood 2020 Workshop Organization -- Workshop Co-chairs -- Program Committee -- Additional Reviewers -- SoGood 2020 Keynote Talks -- Data for Good by Design: Concrete Examples -- Dealing with Bias and Fairness in Data Science Social Good Projects -- On Modeling Labor Markets for Fine-Grained Insights -- 1 Introduction -- 2 Related Works -- 3 Labor Market Modeling -- 3.1 Probabilistic Labor Market (PLM) Model -- 3.2 Model Learning -- 4 Experiments -- 4.1 Datasets -- 4.2 Application Prediction Task -- 4.3 Application Prediction Results -- 5 Labor Market Analysis Using PLM -- 5.1 Market Analysis and Comparison -- 5.2 Topic-Specific Labor Segments -- 5.3 Labor Segment Level User Analysis -- 5.4 User Analysis by Gender and Age -- 6 Conclusion -- References -- Reasoning About Neural Network Activations: An Application in Spatial Animal Behaviour from Camera Trap Classifications -- 1 Introduction -- 2 Methodology -- 2.1 Camera Trap Data -- 2.2 Experiments -- 3 Results -- 4 Conclusions -- References -- Practical Lessons from Generating Synthetic Healthcare Data with Bayesian Networks -- 1 Introduction -- 2 Methods and Results -- 2.1 Datasets -- 2.2 Modelling MIMIC Data with Bayesian Networks -- 2.3 Modelling Time -- 2.4 Risks of Matching Real Patients to Synthetic Data -- 3 Conclusions -- References -- Building Trajectories Over Topology with TDA-PTS: An Application in Modelling Temporal Phenotypes of Disease -- 1 Introduction -- 2 Method -- 2.1 TDA-PTS -- 2.2 Datasets -- 2.3 Experiments -- 3 Results -- 4 Conclusions -- References -- Data Decomposition Based Learning for Load Time-Series Forecasting -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Input Dataset. , 3.2 Data Preprocessing -- 3.3 Load Characterization -- 3.4 Decomposition Based Learning -- 4 Results and Discussion -- 5 Conclusion -- References -- Mitigating Bias in Online Microfinance Platforms: A Case Study on Kiva.org -- 1 Introduction -- 2 Data and Modeling Issues -- 3 Preliminary Analysis of Potential Disparities -- 4 Causal Inference -- 4.1 Treatment Effects Indicators -- 4.2 Estimating Treatment Effects -- 4.3 Learning Outcome Models -- 5 Experiments and Results -- 6 Controlling the Disparities from Sectors -- 7 Related Work and Conclusions -- References -- A Left Realist Critique of the Political Value of Adopting Machine Learning Systems in Criminal Justice -- 1 Introduction -- 2 Machine Learning Systems -- 3 Approaches to Crime -- 4 Left Realist Critique of Machine Learning Systems for Criminal Justice -- 4.1 Focus on Effects and Correlations -- 4.2 Focus on Specific Crimes -- 4.3 Sensitivity to Data Interpretation -- 4.4 Tool for Military Policing -- 4.5 Issues of Accountability -- 4.6 Analogy with CCTV -- 5 Discussion -- 6 Conclusions -- References -- Workshop on Parallel, Distributed and Federated Learning (PDFL 2020) -- En -- Parallel, Distributed, and Federated Learning -- PDFL'20 Chairs -- Program Committee -- Knowledge Discovery on Blockchains: Challenges and Opportunities for Distributed Event Detection Under Constraints -- 1 Introduction -- 2 Related Work -- 3 Blockchain Fundamentals -- 4 Consensus Methods -- 4.1 Proof-of-Work -- 4.2 Proof-of-Stake -- 4.3 Distributed Proof-of-Work -- 4.4 Practical Proof-of-Kernel-Work -- 5 Experiments -- 6 Conclusion and Future Works -- References -- Resource-Constrained On-Device Learning by Dynamic Averaging -- 1 Introduction -- 2 Resource-Constrained Exponential Family Models -- 2.1 Undirected Graphical Models -- 2.2 From Regular to Resource-Constrained Models. , 3 Distributed Learning of Integer Exponential Families -- 4 Experiments -- 4.1 Model Quality and Communication -- 4.2 Energy Savings -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Second Workshop on Machine Learning for Cybersecurity (MLCS 2020) -- En -- Machine Learning for Cybersecurity -- MLCS'20 Chairs -- Program Committee -- MitM Attack Detection in BLE Networks Using Reconstruction and Classification Machine Learning Techniques -- 1 Introduction -- 2 BLE Overview -- 2.1 BLE Advertising and Connection -- 2.2 Data Exchange -- 2.3 BLE Security -- 3 Experimental Set-Up -- 3.1 Experimental Methodology -- 3.2 Datasets Building -- 4 Detection Approach -- 4.1 Features Extraction and Analysis -- 4.2 LSTM Based Model Reconstruction -- 4.3 TCN Based Model Reconstruction -- 4.4 Classification of BLE Packets -- 5 Conclusion and Future Work -- References -- Advocating for Multiple Defense Strategies Against Adversarial Examples -- 1 Introduction -- 2 Preliminaries on Adversarial Attacks and Defenses -- 2.1 Adversarial Attacks -- 2.2 Defense Mechanisms -- 3 No Free Lunch for Adversarial Defenses -- 3.1 Theoretical Analysis -- 3.2 No Free Lunch in Practice -- 4 Reviewing Defenses Against Multiple Attacks -- 4.1 Experimental Setting -- 4.2 MAT - Mixed Adversarial Training -- 4.3 RAT - Randomized Adversarial Training -- 5 Conclusion and Perspective -- References -- Hybrid Connection and Host Clustering for Community Detection in Spatial-Temporal Network Data -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Connection Features -- 3.2 Host Features -- 3.3 Stochastic Block Model -- 3.4 Experimental Setup -- 3.5 Replication Sample -- 4 Results -- 4.1 Stratosphere Data -- 4.2 ISOT Data -- 5 Discussion -- 6 Conclusion -- 7 Supplementary Material -- 7.1 Host Clustering CTU-91 Dataset -- References. , Collaborative Learning Based Effective Malware Detection System -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Federated Learning -- 3.2 Auxiliary Classifier GAN (AC-GAN) -- 4 Proposed Framework -- 4.1 Data Collection -- 4.2 Data Preprocessing -- 4.3 Feature Extraction -- 4.4 Model Configuration -- 5 Experimental Setup and Evaluation -- 5.1 Setup -- 5.2 Collaborative Training and Evaluation -- 5.3 Result -- 6 Conclusion -- References -- Ninth International Workshop on New Frontiers in Mining Complex Patterns (NFMCP 2020) -- New Frontiers in Mining Complex Patterns (NFMCP 2020) -- Organization -- Program Chairs -- Program Committee -- Process Mining Based on Declarative Process Models: Goals and Challenges (Invited Talk) -- A Hybrid Recommendation System Based on Bidirectional Encoder Representations -- 1 Introduction -- 2 Literature Review -- 3 Bidirectional Encoder Representations of Item Descriptions -- 4 Results -- 4.1 Dataset -- 4.2 Evaluation -- 4.3 Test Results -- 5 Conclusion -- References -- Leveraging Multi-target Regression for Predicting the Next Parallel Activities in Event Logs -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Data Representation -- 3.2 Problem Statement -- 4 Proposed Method -- 4.1 Model Learning -- 4.2 Model Testing -- 5 Experiments -- 5.1 The Most Accurate Next Activity Prediction Approach -- 5.2 The Most Efficient Next Activity Prediction Approach -- 6 Conclusions -- References -- A Multi-view Ensemble of Deep Models for the Detection of Deviant Process Instances -- 1 Introduction -- 2 Background, Problem and Solution Strategy -- 3 The Proposed Deep Ensemble Model: Architecture and Training -- 3.1 Base DDMs' Architecture -- 3.2 Combiner Sub-net: Two Alternative Instantiations -- 4 Experimental Evaluation -- 4.1 Datasets, Parameters and Measures. , 4.2 Comparison with a Single-View Deep-Learning Baseline -- 4.3 Comparison with State-of-the-art Competitors -- 5 Conclusion and Future Work -- References -- Exploiting Temporal Convolution for Activity Prediction in Process Analytics -- 1 Introduction -- 2 Related Work -- 3 Background and Problem Statement -- 4 DNN Model -- 5 Experiments -- 5.1 Competitors -- 5.2 Datasets -- 5.3 Evaluation Procedure and Parameters' Setting -- 5.4 Test Results -- 6 Conclusion and Future Work -- References -- Workshop on Data Integration and Applications (DINA 2020) -- En -- Workshop Co-chairs -- Program Committee -- Hyper-Parameter Optimization for Privacy-Preserving Record Linkage -- 1 Introduction -- 2 Linkage Model -- 3 Hyper-Parameter Optimization -- 3.1 Heuristic Loss as Alternative Metrics -- 3.2 Information Leakage with the Iterative Approach -- 4 Experimental Evaluation -- 5 Discussion and Recommendation -- 6 Conclusion -- References -- Group-Specific Training Data -- 1 Introduction -- 2 Data -- 2.1 US Decennial Census -- 2.2 Training Data -- 2.3 German Americans -- 3 Machine Learning Model -- 4 Performance -- 5 Conclusion -- References -- Scalable Blocking for Very Large Databases -- 1 Introduction -- 2 LSH and Block Building -- 2.1 LSH Block Building -- 2.2 Prior Work on Block Building -- 3 Hashed Dynamic Blocking -- 3.1 Algorithm Detailed Description -- 4 Prior Work -- 4.1 Prior Work on Dynamic Blocking -- 4.2 Meta-Blocking Based Approaches -- 5 Experimental Results -- 5.1 Datasets -- 5.2 Metrics -- 5.3 Comparing Hashed Dynamic Blocking to Other Methods -- 5.4 Comparing LSH Configurations -- 6 Conclusions -- References -- Address Validation in Transportation and Logistics: A Machine Learning Based Entity Matching Approach -- 1 Introduction -- 2 Entity Matching Problem -- 2.1 TL Entity Definition -- 2.2 Entity Matching Definition. , 2.3 French TL Entity Matching Issues.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Alphen aan den Rijn :Kluwer Law International,
    Keywords: Artificial intelligence. ; Data protection-European Union countries. ; Data protection. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (225 pages)
    Edition: 1st ed.
    ISBN: 9789403509822
    DDC: 343.09944
    Language: English
    Note: Intro -- Half-Title Page -- Title Page -- Copyright Page -- Editors -- Contributors -- Summary of Contents -- Table of Contents -- Preface -- List of Abbreviations -- Acknowledgements -- Chapter 1 Fundamentals of Artificial Intelligence -- 1.01 A BRIEF HISTORY OF AI -- 1.02 WHAT IS ARTIFICIAL INTELLIGENCE? -- 1.03 AI METHODS AND TECHNIQUES -- [A] Multi-agent Systems (MAS) -- [B] Knowledge Management -- [C] Machine Learning -- [D] Other Approaches -- 1.04 CONCLUSIONS -- Chapter 2 AI and the Law: Regulating Artificial Intelligence -- 2.01 INTRODUCTION -- 2.02 NATIONAL REGULATORY FRAMEWORKS FOR AI -- [A] Europe -- [B] USA -- [C] Japan -- [D] China -- 2.03 CONCLUDING REMARKS -- Chapter 3 Ethical and Social Issues in Artificial Intelligence -- 3.01 INTRODUCTION: RESPONSIBLE AI: WHAT IS IT AND WHY CARE -- 3.02 THE INTERPLAY BETWEEN AI AND ETHICS -- [A] Ethics in Design -- [B] Ethics by Design -- [C] Ethics for Design(ers) -- 3.03 IMPACT: MORE THAN LEGAL -- 3.04 ROADMAP AND CONCLUSIONS -- Chapter 4 AI and Labour and Employment -- 4.01 INTRODUCTION -- 4.02 IMPACT ON EMPLOYMENT AND THE LABOUR MARKET -- [A] Introduction -- [B] Impact of AI on the Job Market: Destruction or Not? -- [C] A Polarization of the Work Market Will Come with the 4IR Opportunities and Challenges -- 4.03 AI IMPACT ON THE EMPLOYEE'S LIFE: WORK RELATIONSHIPS, PEOPLE MANAGEMENT -- [A] Are We Heading to an 'Augmented' Human Resources Department? -- [B] What Should Be the Role of the Human Resources Departments (HRD)? -- 4.04 THE IMPACT OF AI IN LABOUR LAW AND PRACTICE -- [A] Recruitment -- [B] Employment Execution -- [C] Employment Termination -- [D] AI Impact on Labour Law Advice -- 4.05 CHALLENGES FOR THE WELFARE SYSTEM AND SOCIAL PARTNERS -- [A] The Impact on Social Security Systems. , [1] Sustainability of the Funding of the Social Security System and Social Protection of the New Workers -- [2] AI Applications Used by Social Security Systems -- [B] Role of the Labour Unions as AI Emerges -- 4.06 CONCLUSION -- Chapter 5 AI and Taxation -- 5.01 INTRODUCTION -- 5.02 AI AS A SUPPORT TOOL FOR TAX ADVISERS -- 5.03 AI AS A SUPPORT TOOL FOR TAX CONTROL -- 5.04 A CASE IN POINT: AVIVA, THE SPANISH NATIONAL TAX AGENCY'S VAT CHATBOT -- 5.05 TAXATION CHALLENGES REGARDING ROBOTIZATION -- 5.06 CONCLUSIONS -- Chapter 6 AI and Competition -- 6.01 INTRODUCTION -- 6.02 AI AND MULTILATERAL ANTICOMPETITIVE CONDUCT -- 6.03 AI AND UNILATERAL CONDUCTS -- 6.04 ANTITRUST BY DESIGN AND AWARENESS -- Chapter 7 AI and Intellectual Property -- 7.01 INTRODUCTION -- 7.02 PROTECTING AI: IS THE EXISTING SYSTEM ADEQUATE AND EFFECTIVE? -- [A] Patents or Copyright & -- Software -- [B] Copyright and Algorithms (or Trade Secret Protection) -- [C] Copyright and Databases -- [D] Trademarks and Industrial Design -- [E] Conclusion -- 7.03 AI CREATIONS AND INVENTIONS: CHALLENGING COPYRIGHT AND PATENT -- [A] Introduction -- [B] AI-Created Works and Copyright -- [C] The Protection of AI Works: The Patent -- 7.04 CONCLUSIONS -- Chapter 8 Legal Responsibility of Intelligent Systems -- 8.01 INTRODUCTION -- 8.02 DISTINCTIVE FEATURES OF AI-BASED COMPUTER SYSTEMS -- 8.03 LEGALLY CHALLENGING APPLICATIONS OF INTELLIGENT SYSTEMS -- 8.04 DESIGN OF INTELLIGENT SYSTEMS AND ITS ROLE IN THE LEGAL ANALYSIS -- 8.05 LEGAL-PHILOSOPHICAL OUTLOOK ON THE PROBLEM OF LIABILITY REGULATION DESIGN OF INTELLIGENT SYSTEMS -- 8.06 AI AND THE TYPES OF LEGAL LIABILITY -- 8.07 THE IMPACT OF EXPLAINABILITY -- 8.08 CONCLUSIONS -- Chapter 9 AI and Cybersecurity -- 9.01 INTRODUCTION -- 9.02 CYBERSECURITY PRIMER -- [A] Threat Actors -- [B] Common Threats. , [1] Social Engineering Attacks -- [2] Malware (malicious software) and Malware Distribution Networks -- [3] Vulnerability Exploits -- [C] Targeted Attacks -- 9.03 DEFENSIVE STRATEGIES -- [A] Common Security Solutions -- [B] Security Operation Centres -- 9.04 APPLICATIONS OF AI IN CYBERSECURITY -- [A] Threat Detection -- [1] Malware: File Analysis -- [2] The Malicious Domain or URL Detection Problem -- [3] Behavioural Analytics -- [B] Improving the Efficiency of Cybersecurity Professionals -- [C] Offensive AI -- 9.05 CONCLUSIONS -- Chapter 10 AI and Data Protection -- 10.01 INTRODUCTION -- 10.02 DATA-DRIVEN AI -- [A] Data Related to Individuals -- [B] Right for Protection -- [C] Data Legitimation -- [D] Profiling and Automated Decisions -- [E] Other Data Challenges -- 10.03 ROADMAP AND CONCLUSIONS -- Chapter 11 Artificial Intelligence in the Judicial -- 11.01 THE APPLICATION OF AI IN THE JUDICIAL FIELD -- 11.02 THE MAIN ISSUES REGARDING AI USE IN JUDICIAL SYSTEMS -- 11.03 ROBOT, JUDGES AND ROBOT JUDGES -- 11.04 THE IMPACT OF OPEN DATA REGARDING JUDICIAL DECISIONS IN AI DEVELOPMENT -- 11.05 THE FRENCH CASE: A VETO TO PREDICTING CASE LAW TOOLS TO PROTECT JUDGES' FREEDOM OF DECISION -- 11.06 THE PSA: AI ASSISTING JUDGES IN THEIR PRETRIAL DECISIONS -- 11.07 ETHICS APPLIED TO AI IN JUDICIAL SYSTEMS -- 11.08 THE LOOMIS CASE: AI'S BLACK-BOX AND ITS EFFECTS IN JUDICIAL APPLICATION -- 11.09 CONCLUSIONS -- Chapter 12 Final Conclusions -- An Interview With -- Selected Bibliography -- Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...