GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Machine learning. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (237 pages)
    Edition: 1st ed.
    ISBN: 9783030767945
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.23
    DDC: 006.31
    Language: English
    Note: Intro -- Foreword -- Further Reading -- Preface -- Contents -- 1 Introduction to Advances in Machine Learning/Deep Learning-Based Technologies -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Machine Learning/Deep Learning in Socializing and Entertainment -- 2 Semi-supervised Feature Selection Method for Fuzzy Clustering of Emotional States from Social Streams Messages -- 2.1 Introduction -- 2.2 The FS-EFCM Algorithm -- 2.2.1 EFCM Execution: Main Steps -- 2.2.2 Initial Parameter Setting -- 2.3 Experimental Results -- 2.3.1 Dataset -- 2.3.2 Feature Selection -- 2.3.3 FS-EFCM at Work -- 2.4 Conclusion -- References -- 3 AI in (and for) Games -- 3.1 Introduction -- 3.2 Game Content and Databases -- 3.3 Intelligent Game Content Generation and Selection -- 3.3.1 Generating Content for a Language Education Game -- 3.4 Conclusions -- References -- Part II Machine Learning/Deep Learning in Education -- 4 Computer-Human Mutual Training in a Virtual Laboratory Environment -- 4.1 Introduction -- 4.1.1 Purpose and Development of the Virtual Lab -- 4.1.2 Different Playing Modes -- 4.1.3 Evaluation -- 4.2 Background and Related Work -- 4.3 Architecture of the Virtual Laboratory -- 4.3.1 Conceptual Design -- 4.3.2 State-Transition Diagrams -- 4.3.3 High Level Design -- 4.3.4 State Machine -- 4.3.5 Individual Scores -- 4.3.6 Quantization -- 4.3.7 Normalization -- 4.3.8 Composite Evaluation -- 4.3.9 Success Rate -- 4.3.10 Weighted Average -- 4.3.11 Artificial Neural Network -- 4.3.12 Penalty Points -- 4.3.13 Aggregate Score -- 4.4 Machine Learning Algorithms -- 4.4.1 Genetic Algorithm for the Weighted Average -- 4.4.2 Training the Artificial Neural Network with Back-Propagation -- 4.5 Implementation -- 4.5.1 Instruction Mode -- 4.5.2 Evaluation Mode -- 4.5.3 Computer Training Mode -- 4.5.4 Training Data Collection Sub-mode. , 4.5.5 Machine Learning Sub-mode -- 4.6 Training-Testing Process and Results -- 4.6.1 Training Data -- 4.6.2 Training and Testing on Various Data Set Groups -- 4.6.3 Genetic Algorithm Results -- 4.6.4 Artificial Neural Network Training Results -- 4.7 Conclusions -- References -- 5 Exploiting Semi-supervised Learning in the Education Field: A Critical Survey -- 5.1 Introduction -- 5.2 Semi-supervised Learning -- 5.3 Literature Review -- 5.3.1 Performance Prediction -- 5.3.2 Dropout Prediction -- 5.3.3 Grade Level Prediction -- 5.3.4 Grade Point Value Prediction -- 5.3.5 Other Studies -- 5.3.6 Discussion -- 5.4 The Potential of SSL in the Education Field -- 5.5 Conclusions -- References -- Part III Machine Learning/Deep Learning in Security -- 6 Survey of Machine Learning Approaches in Radiation Data Analytics Pertained to Nuclear Security -- 6.1 Introduction -- 6.2 Machine Learning Methodologies in Nuclear Security -- 6.2.1 Nuclear Signature Identification -- 6.2.2 Background Radiation Estimation -- 6.2.3 Radiation Sensor Placement -- 6.2.4 Source Localization -- 6.2.5 Anomaly Detection -- 6.3 Conclusion -- References -- 7 AI for Cybersecurity: ML-Based Techniques for Intrusion Detection Systems -- 7.1 Introduction -- 7.1.1 Why Does AI Pose Great Importance for Cybersecurity? -- 7.1.2 Contribution -- 7.2 ML-Based Models for Cybersecurity -- 7.2.1 K-Means -- 7.2.2 Autoencoder (AE) -- 7.2.3 Generative Adversarial Network (GAN) -- 7.2.4 Self Organizing Map -- 7.2.5 K-Nearest Neighbors (k-NN) -- 7.2.6 Bayesian Network -- 7.2.7 Decision Tree -- 7.2.8 Fuzzy Logic (Fuzzy Set Theory) -- 7.2.9 Multilayer Perceptron (MLP) -- 7.2.10 Support Vector Machine (SVM) -- 7.2.11 Ensemble Methods -- 7.2.12 Evolutionary Algorithms -- 7.2.13 Convolutional Neural Networks (CNN) -- 7.2.14 Recurrent Neural Network (RNN) -- 7.2.15 Long Short Term Memory (LSTM). , 7.2.16 Restricted Boltzmann Machine (RBM) -- 7.2.17 Deep Belief Network (DBN) -- 7.2.18 Reinforcement Learning (RL) -- 7.3 Open Topics and Potential Directions -- 7.3.1 Novel Feature Representations -- 7.3.2 Unsupervised Learning Based Detection Systems -- References -- Part IV Machine Learning/Deep Learning in Time Series Forecasting -- 8 A Comparison of Contemporary Methods on Univariate Time Series Forecasting -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Theoretical Background -- 8.3.1 ARIMA -- 8.3.2 Prophet -- 8.3.3 The Holt-Winters Seasonal Models -- 8.3.4 N-BEATS: Neural Basis Expansion Analysis -- 8.3.5 DeepAR -- 8.3.6 Trigonometric BATS -- 8.4 Experiments and Results -- 8.4.1 Datasets -- 8.4.2 Algorithms -- 8.4.3 Evaluation -- 8.4.4 Results -- 8.5 Conclusions -- References -- 9 Application of Deep Learning in Recurrence Plots for Multivariate Nonlinear Time Series Forecasting -- 9.1 Introduction -- 9.2 Related Work -- 9.2.1 Background on Recurrence Plots -- 9.2.2 Time Series Imaging and Convolutional Neural Networks -- 9.3 Time Series Nonlinearity -- 9.4 Time Series Imaging -- 9.4.1 Dimensionality Reduction -- 9.4.2 Optimal Parameters -- 9.5 Convolutional Neural Networks -- 9.6 Model Pipeline and Architecture -- 9.6.1 Architecture -- 9.7 Experimental Setup -- 9.8 Results -- 9.9 Conclusion -- References -- Part V Machine Learning in Video Coding and Information Extraction -- 10 A Formal and Statistical AI Tool for Complex Human Activity Recognition -- 10.1 Introduction -- 10.2 The Hybrid Framework-Formal Languages -- 10.3 Formal Tool and Statistical Pipeline Architecture -- 10.4 DATA Pipeline -- 10.5 Tools for Implementation -- 10.6 Experimentation with Datasets to Identify the Ideal Model -- 10.6.1 KINISIS-Single Human Activity Recognition Modeling -- 10.6.2 DRASIS-Change of Human Activity Recognition Modeling -- 10.7 Conclusions. , References -- 11 A CU Depth Prediction Model Based on Pre-trained Convolutional Neural Network for HEVC Intra Encoding Complexity Reduction -- 11.1 Introduction -- 11.2 H.265 High Efficiency Video Coding -- 11.2.1 Coding Tree Unit Partition -- 11.2.2 Rate Distortion Optimization -- 11.2.3 CU Partition and Image Texture Features -- 11.3 Proposed Methodology -- 11.3.1 The Hierarchical Classifier -- 11.3.2 The Methodology of Transfer Learning -- 11.3.3 Structure of Convolutional Neural Network -- 11.3.4 Dataset Construction -- 11.4 Experiments and Results -- 11.5 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer security. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (335 pages)
    Edition: 1st ed.
    ISBN: 9789811910579
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.277
    DDC: 005.8
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (363 pages)
    Edition: 1st ed.
    ISBN: 9783030930523
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.24
    DDC: 006.3
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Advances in Selected Artificial Intelligence Areas -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Advances in Artificial Intelligence Paradigms -- 2 Feature Selection: From the Past to the Future -- 2.1 Introduction -- 2.2 The Need for Feature Selection -- 2.3 History of Feature Selection -- 2.4 Feature Selection Techniques -- 2.4.1 Filter Methods -- 2.4.2 Embedded Methods -- 2.4.3 Wrapper Methods -- 2.5 What Next in Feature Selection? -- 2.5.1 Scalability -- 2.5.2 Distributed Feature Selection -- 2.5.3 Ensembles for Feature Selection -- 2.5.4 Visualization and Interpretability -- 2.5.5 Instance-Based Feature Selection -- 2.5.6 Reduced-Precision Feature Selection -- References -- 3 Application of Rough Set-Based Characterisation of Attributes in Feature Selection and Reduction -- 3.1 Introduction -- 3.2 Background and Related Works -- 3.2.1 Estimation of Feature Importance and Feature Selection -- 3.2.2 Rough Sets and Decision Reducts -- 3.2.3 Reduct-Based Feature Characterisation -- 3.2.4 Stylometry as an Application Domain -- 3.2.5 Continuous Versus Nominal Character of Input Features -- 3.3 Setup of Experiments -- 3.3.1 Preparation of Input Data and Datasets -- 3.3.2 Decision Reducts Inferred -- 3.3.3 Rankings of Attributes Based on Reducts -- 3.3.4 Classification Systems Employed -- 3.4 Obtained Results of Feature Reduction -- 3.5 Conclusions -- References -- 4 Advances in Fuzzy Clustering Used in Indicator for Individuality -- 4.1 Introduction -- 4.2 Fuzzy Clustering -- 4.3 Convex Clustering -- 4.4 Indicator of Individuality -- 4.5 Numerical Examples -- 4.6 Conclusions and Future Work -- References -- 5 Pushing the Limits Against the No Free Lunch Theorem: Towards Building General-Purpose (GenP) Classification Systems -- 5.1 Introduction. , 5.2 Multiclassifier/Ensemble Methods -- 5.2.1 Canonical Model of Single Classifier Learning -- 5.2.2 Methods for Building Multiclassifiers -- 5.3 Matrix Representation of the Feature Vector -- 5.4 GenP Systems Based on Deep Learners -- 5.4.1 Deep Learned Features -- 5.4.2 Transfer Learning -- 5.4.3 Multiclassifier System Composed of Different CNN Architectures -- 5.5 Data Augmentation -- 5.6 Dissimilarity Spaces -- 5.7 Conclusion -- References -- 6 Bayesian Networks: Theory and Philosophy -- 6.1 Introduction -- 6.2 Bayesian Networks -- 6.2.1 Bayesian Networks Background -- 6.2.2 Bayesian Networks Defined -- 6.3 Maximizing Entropy for Missing Information -- 6.3.1 Maximum Entropy Formalism -- 6.3.2 Maximum Entropy Method -- 6.3.3 Solving for the Lagrange Multipliers -- 6.3.4 Independence -- 6.3.5 Overview -- 6.4 Philosophical Considerations -- 6.4.1 Thomas Bayes and the Principle of Insufficient Reason -- 6.4.2 Objective Bayesianism -- 6.4.3 Bayesian Networks Versus Artificial Neural Networks -- 6.5 Bayesian Networks in Practice -- References -- Part II Advances in Artificial Intelligence Applications -- 7 Artificial Intelligence in Biometrics: Uncovering Intricacies of Human Body and Mind -- 7.1 Introduction -- 7.2 Background and Literature Review -- 7.2.1 Biometric Systems Overview -- 7.2.2 Classification and Properties of Biometric Traits -- 7.2.3 Unimodal and Multi-modal Biometric Systems -- 7.2.4 Social Behavioral Biometrics and Privacy -- 7.2.5 Deep Learning in Biometrics -- 7.3 Deep Learning in Social Behavioral Biometrics -- 7.3.1 Research Domain Overview of Social Behavioral Biometrics -- 7.3.2 Social Behavioral Biometric Features -- 7.3.3 General Architecture of Social Behavioral Biometrics System -- 7.3.4 Comparison of Rank and Score Level Fusion -- 7.3.5 Deep Learning in Social Behavioral Biometrics -- 7.3.6 Summary and Applications. , 7.4 Deep Learning in Cancelable Biometrics -- 7.4.1 Biometric Privacy and Template Protection -- 7.4.2 Unimodal and Multi-modal Cancelable Biometrics -- 7.4.3 Deep Learning Architectures for Cancelable Multi-modal Biometrics -- 7.4.4 Performance of Cancelable Biometric System -- 7.4.5 Summary and Applications -- 7.5 Applications and Open Problems -- 7.5.1 User Authentication and Anomaly Detection -- 7.5.2 Access Control -- 7.5.3 Robotics -- 7.5.4 Assisted Living -- 7.5.5 Mental Health -- 7.5.6 Education -- 7.6 Summary -- References -- 8 Early Smoke Detection in Outdoor Space: State-of-the-Art, Challenges and Methods -- 8.1 Introduction -- 8.2 Problem Statement and Challenges -- 8.3 Conventional Machine Learning Methods -- 8.4 Deep Learning Methods -- 8.5 Proposed Deep Architecture for Smoke Detection -- 8.6 Datasets -- 8.7 Comparative Experimental Results -- 8.8 Conclusions -- References -- 9 Machine Learning for Identifying Abusive Content in Text Data -- 9.1 Introduction -- 9.2 Abusive Content on Social Media and Their Identification -- 9.3 Identification of Abusive Content with Classic Machine Learning Methods -- 9.3.1 Use of Word Embedding in Data Representation -- 9.3.2 Ensemble Model -- 9.4 Identification of Abusive Content with Deep Learning Models -- 9.4.1 Taxonomy of Deep Learning Models -- 9.4.2 Natural Language Processing with Advanced Deep Learning Models -- 9.5 Applications -- 9.6 Future Direction -- 9.7 Conclusion -- References -- 10 Toward Artifical Intelligence Tools for Solving the Real World Problems: Effective Hybrid Genetic Algorithms Proposal -- 10.1 Introduction -- 10.2 University Course Timetabling UCT -- 10.2.1 Problem Statement and Preliminary Definitions -- 10.2.2 Related Works -- 10.2.3 Problem Modelization and Mathematical Formulation -- 10.2.4 An Interactive Decision Support System (IDSS) for the UCT Problem. , 10.2.5 Empirical Testing -- 10.2.6 Evaluation and Results -- 10.3 Solid Waste Management Problem -- 10.3.1 Related Works -- 10.3.2 The Mathematical Formulation Model -- 10.3.3 A Genetic Algorithm Proposal for the SWM -- 10.3.4 Experimental Study and Results -- 10.4 Conclusion -- References -- 11 Artificial Neural Networks for Precision Medicine in Cancer Detection -- 11.1 Introduction -- 11.2 The fLogSLFN Model -- 11.3 Parallel Versus Cascaded LogSLFN -- 11.4 Adaptive SLFN -- 11.5 Statistical Assessment -- 11.6 Conclusions -- References -- Part III Recent Trends in Artificial Intelligence Areas and Applications -- 12 Towards the Joint Use of Symbolic and Connectionist Approaches for Explainable Artificial Intelligence -- 12.1 Introduction -- 12.2 Literature Review -- 12.2.1 The Explainable Interface -- 12.2.2 The Explainable Model -- 12.3 New Approaches to Explainability -- 12.3.1 Towards a Formal Definition of Explainability -- 12.3.2 Using Ontologies to Design the Deep Architecture -- 12.3.3 Coupling DNN and Learning Classifier Systems -- 12.4 Conclusions -- References -- 13 Linguistic Intelligence As a Root for Computing Reasoning -- 13.1 Introduction -- 13.2 Language as a Tool for Communication -- 13.2.1 MLW -- 13.2.2 Sounds and Utterances Behavior -- 13.2.3 Semantics and Self-expansion -- 13.2.4 Semantic Drifted Off from Verbal Behavior -- 13.2.5 Semantics and Augmented Reality -- 13.3 Language in the Learning Process -- 13.3.1 Modeling Learning Profiles -- 13.3.2 Looking for Additional Teaching Tools in Academy -- 13.3.3 LEARNITRON for Learning Profiles -- 13.3.4 Profiling the Learning Process: Tracking Mouse and Keyboard -- 13.3.5 Profiling the Learning Process: Tracking Eyes -- 13.3.6 STEAM Metrics -- 13.4 Language of Consciousness to Understand Environments -- 13.4.1 COFRAM Framework -- 13.4.2 Bacteria Infecting the Consciousness. , 13.5 Harmonics Systems: A Mimic of Acoustic Language -- 13.5.1 HS for Traffic's Risk Predictions -- 13.5.2 HS Application to Precision Farming -- 13.6 Conclusions and Future Work -- References -- 14 Collaboration in the Machine Age: Trustworthy Human-AI Collaboration -- 14.1 Introduction -- 14.2 Artificial Intelligence: An Overview -- 14.2.1 The Role of AI-Definitions and a Short Historic Overview -- 14.2.2 AI and Agents -- 14.2.3 Beyond Modern AI -- 14.3 The Role of AI for Collaboration -- 14.3.1 Human-Computer Collaboration Where AI is Embedded -- 14.3.2 Human-AI Collaboration (Or Conversational AI) -- 14.3.3 Human-Human Collaboration Where AI Can Intervene -- 14.3.4 Challenges of Using AI: Toward a Trustworthy AI -- 14.4 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Cooperating objects (Computer systems). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (209 pages)
    Edition: 1st ed.
    ISBN: 9783031076503
    Series Statement: Artificial Intelligence-Enhanced Software and Systems Engineering Series ; v.3
    DDC: 006.22
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Handbook on Artificial Intelligence-Empowered Applied Software Engineering-Vol. 2: Smart Software Applications in Cyber-Physical Systems -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- Bibliography for Further Reading -- Part I Smart Software Applications in Scientific Document Processing -- 2 Detection, Extraction and SPN Representation of Pseudo-Algorithms in Scientific Documents -- 2.1 Introduction -- 2.2 Visual Detection of Pseudo-Codes in Documents -- 2.2.1 Extraction of Different Text Blocks in Documents -- 2.2.2 Pyramidal Image Representation -- 2.2.3 Decomposition and Classification of the Pseudo Code Sections -- 2.3 Learning -- 2.3.1 The Dataset -- 2.3.2 Evaluation of Learning Process -- 2.4 Translation of Algorithms to Graphs and SPNs -- 2.4.1 Generation of a Graph -- 2.4.2 Stochastic Petri Net Representation -- 2.5 Conclusion and Future Work -- References -- 3 A Recommender Engine for Scientific Paper Peer-Reviewing System -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Dataset and Feature -- 3.4 Methodology -- 3.4.1 Create Training Dataset -- 3.4.2 The Architecture of Recommender Engine -- 3.4.3 Final Recommendation Section -- 3.5 Result and Analysis -- 3.6 Conclusion(s) -- References -- Part II Smart Software Applications in Enterprise Modeling -- 4 Visualization of Digital-Enhanced Enterprise Modeling -- 4.1 Introduction -- 4.2 A Meta Model for Describing Value of Digital Service -- 4.3 Visualization Patterns -- 4.3.1 Service Definition Pattern -- 4.3.2 Value Proposition Pattern -- 4.3.3 Use Process Refinement pattern -- 4.4 Application Example -- 4.4.1 Healthcare Example -- 4.4.2 Application of Visualization Patterns -- 4.5 Discussions -- 4.5.1 Effectiveness -- 4.5.2 Novelty -- 4.5.3 Mapping to BMC -- 4.5.4 Limitation -- 4.6 Related Work -- 4.7 Conclusion. , References -- 5 Know-linking: When Machine Learning Meets Organizational Tools Analysis to Generate Shared Knowledge in Large Companies -- 5.1 Introduction -- 5.2 State of the Art -- 5.2.1 Profiling -- 5.2.2 Organizational Tools Analysis -- 5.2.3 Indexing -- 5.3 Related Works -- 5.4 Know-linking Approach -- 5.4.1 Presentation -- 5.5 Environment Study -- 5.6 Know-linking in Aerospace Manufacturer -- 5.6.1 Technical Audit -- 5.6.2 Extracting Profiles -- 5.6.3 Generating Semantic Models for Each Profile -- 5.6.4 Hidden Semantic Links Between Profiles -- 5.6.5 Indexing Based Profiles -- 5.7 Conclusion and Future Work -- References -- 6 Changes in Human Resources Management with Artificial Intelligence -- 6.1 Introduction -- 6.2 The Effect of AI in Human Resources Management -- 6.2.1 Recruitment Process with AI -- 6.2.2 Training Process with AI -- 6.2.3 Performance Assessment Process with AI -- 6.2.4 Talent Management Process with AI -- 6.2.5 Salary Management Process with AI -- 6.3 Conclusion -- References -- Part III Smart Software Applications in Education -- 7 Promoting Reading Among Teens: Analyzing the Emotional Preferences of Teenage Readers -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Our Emotion Trait Analysis Approach -- 7.3.1 Processing a Book Description -- 7.3.2 Calculating an Emotion Vector -- 7.3.3 Emotion Trait -- 7.3.4 Partitioning Books by Average Ratings -- 7.3.5 Reducing Objective Values by Comparing Synonyms -- 7.3.6 Implementation -- 7.4 Conclusions and Future Works -- References -- 8 A Multi-institutional Analysis of CS1 Students' Common Misconceptions of Key Programming Concepts -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Study Design -- 8.3.1 Research Objective -- 8.3.2 Research Questions -- 8.3.3 Data Collection -- 8.3.4 Reliability of Pre-post-test Instrument -- 8.3.5 Study Procedure -- 8.4 Experimental Results. , 8.5 Discussion of Results -- 8.6 Conclusion -- References -- Part IV Smart Software Applications in Healthcare and Medicine -- 9 Clustering-Based Scaling for Healthcare Data -- 9.1 Introduction -- 9.2 Fuzzy Clustering -- 9.3 Fuzzy Clustering for 3-Way Data -- 9.4 Fuzzy Cluster-Scaled Regression Analysis -- 9.5 Numerical Examples -- 9.6 Conclusions -- References -- 10 Normative and Fuzzy Components of Medical AI Applications -- 10.1 Preliminaries -- 10.2 Normative Issues -- 10.3 Fuzziness and Norms -- 10.4 Conclusions -- References -- Part V Smart Software Applications in Infrastructure Monitoring -- 11 Adaptive Structural Learning of Deep Belief Network and Its Application to Real Time Crack Detection of Concrete Structure Using Drone -- 11.1 Introduction -- 11.2 Adaptive Learning Method of Deep Belief Network -- 11.2.1 Restricted Boltzmann Machine and Deep Belief Network -- 11.2.2 Neuron Generation and Annihilation Algorithm of RBM -- 11.2.3 Layer Generation Algorithm of DBN -- 11.3 SDNET 2018 -- 11.3.1 Data Description -- 11.3.2 The Classification Results -- 11.4 Crack Detection for Japanese Concrete Structure -- 11.4.1 Data Collection -- 11.4.2 Detection Results -- 11.5 Real-Time Detection and Visualization System Using Drone -- 11.5.1 Embedded System -- 11.5.2 Demonstration Experiment -- 11.6 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Software engineering. ; Electronic books.
    Description / Table of Contents: Multimedia Services in Intelligent Environments explores the developmental challenges involved with integrating multimedia services in intelligent environments, and meets those challenges with state-of-art solutions.
    Type of Medium: Online Resource
    Pages: 1 online resource (194 pages)
    Edition: 1st ed.
    ISBN: 9783642133558
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.2
    DDC: 006.7
    Language: English
    Note: Title -- Foreword -- Editors -- Preface -- Table of Contents -- Advances in Multimedia Services in Intelligent Environments - Software Development Challenges and Solutions -- Introduction -- Conclusions -- References and Further Reading -- Evaluating the Generality of a Life-Cycle Framework for Incorporating Clustering Algorithms in Adaptive Systems -- Introduction -- The Software Life Cycle -- Inception -- Defining Requirements for the Prototype System and Analysis and Design of the Prototype Adaptive Recommender System -- Building and Evaluating the Prototype Adaptive Recommender System -- Elaboration -- Computing the Resemblance Coefficients for the Data Set and Developing the Clustering Algorithm -- Execute the Clustering Method for the Prototype and Evaluating the Results of the Clustering Algorithm used in the Prototype -- Construction -- The Most Efficient Algorithm and Designing Stereotypes Based on This Algorithm -- Building the User Modeling Component Based on the Stereotypes and Incorporating Them into the System -- Transition-Dynamically Improving System Performance while Used by Real Users -- Conclusion about the Life Cycle Process -- References -- A Distributed Multimedia Data Management over the Grid -- Introduction -- Related Work -- Overall Framework -- Replicated Multidimensional Index Structure -- Distributed Query Processing -- Automatic Load Balancing -- Empirical Study -- Conclusion and Future Works -- References -- A View of Monitoring and Tracing Techniques and Their Application to Service-Based Environments -- Introduction -- Execution Monitoring and Tracing -- Categories of Execution Monitoring -- What Can Be Traced? -- Monitoring Techniques -- Comparison -- Monitoring Challenges for Multimedia Services -- Behavioral Change -- Information Access -- Timing -- Synchronization of Event Traces -- Distributed Monitoring. , Trace Transmission -- Conclusion -- References -- An Ontological SW Architecture SupportingContribution and Retrieval of Service and Process Models -- Introduction -- An Application in the Healthcare Domain -- Ontological SW Architecture -- Three Tier with Ontologies -- Encoding Procedures through Ontologies -- Enabling Direct Contribution through Ontologies -- Enabling Semantic Queries -- Enabling Adapted Presentation through Ontologies -- Conclusions -- References -- Model-Driven Quality Engineering of Service-Based Systems -- Introduction -- Related Work -- QoS-Enabled WSDL (Q-WSDL) -- QoS Characteristics of Web Services -- Q-WSDL Metamodel -- Composite Web Services -- QoS Prediction of Composite Web Services -- Model-Driven Reliability Prediction -- Example Application -- Conclusions -- References -- Application of Logic Models for Pervasive Computing Environments and Context-Aware Services Support -- Introduction -- Contextual Models Requirements for Pervasive Computing -- The LogiPerSe First Order Logic Model -- Partial Validation and Ambiguity -- Scalability -- Composability -- Pervasive Service Scenario -- Logic-Based System Architecture -- Logic Model - Object-Oriented Model - Ontology Integration -- Conclusions -- References -- Intelligent Host Discovery from Malicious Software -- Introduction -- Instant Message Clients -- Search Engines -- Social Networks -- Torrent Trackers -- Conclusions -- References -- Swarm Intelligence: The Ant Paradigm -- Introduction -- Swarm Intelligence -- Principles of Natural Swarms -- The Biological Origins of Ant Algorithms -- Ant Algorithms of the Ant Colony Optimization Framework -- Ant System -- MAX MIN Ant System -- Ant Colony System -- Conclusion -- References -- Formulating Discrete Geometric Random Sums for Facilitating Intelligent Behaviour of a Complex System under a Major Risk -- Introduction. , Formulation of a Discrete Geometric Random Sum -- Stochastic Derivation of a Discrete Geometric Random Sum -- Risk and Crisis Management Applications and Computational Intelligence Interpretation of a Discrete Geometric Random Sum -- Conclusions -- References -- Incorporating a Discrete Renewal Random Sum in Computational Intelligence and Cindynics -- Introduction -- Formulation of a Discrete Renewal Random Sum -- Stochastic Derivation of a Discrete Renewal Random Sum -- Application in Cindynics and Interpretation in Computational Intelligence of a Discrete Renewal Random Sum -- Conclusions -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Digital communications. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (438 pages)
    Edition: 1st ed.
    ISBN: 9783031232336
    Series Statement: Communications in Computer and Information Science Series ; v.1737
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organization -- Keynote Address -- Industry 4.0 Meets Data Science: The Pathway for Society 5.0 -- Continual Learning for Intelligent Systems in Changing Environments -- Where is the Research on Evolutionary Multi-objective Optimization Heading to? -- Designing a Software Framework Based on an Object Detection Model and a Fuzzy Logic System for Weed Detection and Pasture Assessment -- An Overview of Machine Learning Based Intelligent Computing and Applications -- Semisupervised Learning with Spatial Information and Granular Neural Networks -- IoT Based General Purpose Sensing Application for Smart Home Environment -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Contents -- Intelligent Computing -- Ensemble Learning Model for EEG Based Emotion Classification -- 1 Introduction -- 2 Related Works -- 3 System Model and Methodology -- 3.1 Feature Extraction -- 3.2 Deep Learning Model Implementation -- 4 Dataset Description -- 5 Experimental Setup and Results -- 6 Conclusion -- References -- Foundation for the Future of Higher Education or 'Misplaced Optimism'? Being Human in the Age of Artificial Intelligence -- 1 Introduction -- 2 Education Using Artificial Intelligence (AIEd) -- 3 Methods -- 3.1 Search Strategy -- 3.2 Reliability of Agreement Amongst Raters -- 3.3 Collection, Codification, and Analysis of Data -- 3.4 Limitations -- 4 Results -- 4.1 Forecasting and Characterising -- 4.2 Curriculum Technology that Uses Artificial Intelligence -- 4.3 Constant Re-Evaluation -- 4.4 A System that May Change to Fit the USER'S Needs -- 5 Conclusion and Way Forward -- References -- AI Enabled Internet of Medical Things Framework for Smart Healthcare -- 1 Introduction -- 2 AI Based IoMT Health Domains. , 3 AI Enabled IoMT Architectures for Smart Healthcare Systems -- 4 Research Challenges of AI Enabled Smart Healthcare Systems -- 4.1 Data Accuracy -- 4.2 Data Security -- 4.3 System Efficiency -- 4.4 Quality of Service -- 5 Conclusion -- References -- Metaverse and Posthuman Animated Avatars for Teaching-Learning Process: Interperception in Virtual Universe for Educational Transformation -- 1 Introduction -- 2 Objectives of the Research and Knowledge Gap -- 3 Methods and Methodology -- 4 Results and Discussion -- 4.1 Educational Metaverse: A Categorical Analysis -- 4.2 A Wide Variety of Virtual Worlds for Use in Education -- 4.3 Situations for Learning, Tiers of Education, and VR Learning Environments -- 4.4 Students' Avatars (Digital Personas) in the Metaverse -- 4.5 Alterations in Educational Multiverse -- 5 Conclusion and Way Forward -- References -- Tuning Functional Link Artificial Neural Network for Software Development Effort Estimation -- 1 Introduction -- 2 Functional Link ANN-based SDEE -- 2.1 Justification of the Use of Chebyshev Polynomial as the Orthogonal Basis Function -- 3 Swarm Intelligence-Based Learning Algorithms for the CFLANN -- 3.1 Classical PSO -- 3.2 Improved PSO Technique -- 3.3 Adaptive PSO -- 3.4 GA -- 3.5 BP -- 4 Performance Evaluation Metrics -- 5 Description of the Dataset -- 6 Experiments and Results -- 7 Conclusion and Future Work -- References -- METBAG - A Web Based Business Application -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps and Solutions -- 2.2 Deep Neural Networks (DNN) and LSTM -- 3 Architecture of the System -- 3.1 Architecture of the User Side of the System -- 3.2 Architecture of the Admin Side of the System -- 4 Workflow Diagrams -- 5 Procedures -- 5.1 Procedure: Price Prediction -- 5.2 Procedure: Password Security -- 5.3 Procedure: Dashboard -- 6 Result Analysis -- 6.1 Price Prediction. , 6.2 Password Security -- 7 Conclusions and Future Work -- References -- Designing Smart Voice Command Interface for Geographic Information System -- 1 Introduction -- 1.1 Review of Literature on Voice Command Interface -- 2 Design and Implementation -- 2.1 Review of Literature on Voice Command Interface -- 2.2 Modules Used -- 2.3 Methodology -- 2.4 Implementation -- 3 Results and Discussion -- 3.1 Testing Model by Creating a War Zone like Environment -- 3.2 Spectrogram and Waveform Samples for Spoken Voice -- 3.3 Comparative Analysis Based on Word Error Rate -- 4 Conclusion -- References -- Smart Garbage Classification -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps in Literature -- 3 System Details -- 3.1 Waste Scanning Through Camera -- 3.2 Waste is Segregated and the Lid Opens -- 3.3 Moving of Hands and Trash Being Put into Respective Compartment -- 4 Component Modules and Description -- 5 Algorithmic Steps -- 6 Result and Analysis -- 7 Conclusions -- References -- Optical Sensor Based on MicroSphere Coated with Agarose for Heavy Metal Ion Detection -- 1 Introduction -- 2 Sensing Principle -- 3 Sensor Design -- 4 Results and Discussions -- 5 Conclusion -- References -- Influential Factor Finding for Engineering Student Motivation -- 1 Introduction -- 2 Related Studies -- 3 Experiment -- 3.1 Logistic Regression -- 4 Discussion -- 5 Conclusion -- References -- Prediction of Software Reliability Using Particle Swarm Optimization -- 1 Introduction -- 2 Related Work -- 3 Reliability Prediction Algorithm Using PSO -- 4 Experimental Result and Comparison -- 5 Conclusions -- References -- An Effective Optimization of EMG Based Artificial Prosthetic Limbs -- 1 Introduction -- 2 Literature Review -- 3 Design and Manufacturing -- 3.1 Cad Model -- 3.2 Manufacturing and Assembly -- 4 Electrical Components and Design -- 4.1 Electromyography Sensing. , 5 Artificial Intelligence -- 5.1 Gesture Recognition -- 5.2 Grasping Capacity (According to Size) -- 5.3 Analysis of EMG Signals -- 6 Conclusion -- References -- Communications -- Performance Analysis of Fading Channels in a Wireless Communication -- 1 Introduction -- 2 Fading Channels -- 2.1 Performance Analysis of Rayleigh Fading -- 2.2 Description of the Performance of Rician Fading Channel -- 2.3 Performance Analysis of NAKAGAMI-M Fading Channel. -- 3 Experimentation and Result Analysis -- 3.1 Simulation and Discussion of Rayleigh Fading Channel -- 3.2 Simulation Results of Rician Fading Channel -- 3.3 Simulation Results of Nakagami-M Fading Channel -- 4 Conclusion -- References -- Power Conscious Clustering Algorithm Using Fuzzy Logic in Wireless Sensor Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 4 Simulation Setup and Evaluation -- 5 Conclusions -- References -- Cryptanalysis on ``An Improved RFID-based Authentication Protocol for Rail Transit'' -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Organization of the Paper -- 2 Preliminary -- 2.1 Secure Requirements -- 2.2 Threat Model -- 3 Review of Zhu et al.'s Protocol -- 3.1 Set up Phase -- 3.2 Authentication Phase -- 4 Weakness of Zhu et al.'s Protocol -- 4.1 Known Session-Specific Temporary Information Attack -- 4.2 Lack of Scalability -- 5 Conclusion -- References -- A Novel Approach to Detect Rank Attack in IoT Ecosystem -- 1 Introduction -- 2 Background -- 2.1 Generic IoT Network Architecture -- 2.2 RPL Protocol -- 2.3 Rank Attack in IoT -- 2.4 IDS for IoT Ecosystem -- 3 Related Work -- 4 Proposed Security Approach -- 4.1 Proposed Approach Assumption -- 4.2 Security Model -- 4.3 Proposed Rank Attack Detection Solution -- 5 Experiments and Results Analysis -- 5.1 Setup and Execution of Experiments. , 5.2 After Proposed Security Solution Implementation Performance Analysis -- 5.3 Comparison of the Suggested Security Solution to Similar Works -- 6 Conclusion -- References -- Energy Efficient Adaptive Mobile Wireless Sensor Network in Smart Monitoring Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Mobile Sensor Node Architecture -- 4 Simulation and Result Analysis -- 4.1 Simulation Set Up -- 4.2 Experimental Analysis -- 5 Conclusion -- References -- Orthogonal Chirp Division Multiplexing: An Emerging Multi Carrier Modulation Scheme -- 1 Introduction -- 2 Compatibility with OFDM -- 3 Computational Complexity -- 3.1 Computational Complexity of OCDM -- 3.2 Computational Complexity of OFDM -- 4 Applications of OCDM -- 4.1 OCDM for Wireless Communication -- 4.2 OCDM for Optical Fiber Communication -- 4.3 OCDM for IM/DD Based Short Reach Systems -- 4.4 OCDM for Underwater Acoustic Communication -- 4.5 OCDM for Baseband Data Communication -- 4.6 OCDM for MIMO Communication -- 5 Simulation Results -- 6 Conclusion -- References -- Machine Learning and Data Analytics -- COVID-19 Outbreak Estimation Approach Using Hybrid Time Series Modelling -- 1 Introduction -- 2 Background -- 2.1 LSTM Network for Modelling Time Series -- 2.2 ARIMA Model -- 2.3 Seasonal ARIMA Model -- 3 Proposed Model -- 4 Implementation and Results Discussion -- 4.1 Prediction Using LSTM Model -- 4.2 Prediction Using ARIMA Model -- 4.3 Prediction Using Hybrid Model -- 5 Conclusion -- References -- Analysis of Depression, Anxiety, and Stress Chaos Among Children and Adolescents Using Machine Learning Algorithms -- 1 Introduction -- 1.1 Background -- 1.2 Motivation and Objective of the Work -- 2 Literature Review -- 3 Methodology -- 3.1 Data Set Description -- 3.2 Implementation -- 4 Results and Discussion -- 4.1 Classification Results for Depression. , 4.2 Classification Results for Anxiety.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Multimedia systems. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (130 pages)
    Edition: 1st ed.
    ISBN: 9783319177441
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.36
    DDC: 006.7
    Language: English
    Note: Intro -- Preface -- Contents -- 1 Intelligent Interactive Multimedia Systems in Practice: An Introduction -- Abstract -- 1.1 Introduction -- 1.2 Chapters Included in the Book -- 1.3 Conclusion -- References -- 2 On the Use of Multi-attribute Decision Making for Combining Audio-Lingual and Visual-Facial Modalities in Emotion Recognition -- Abstract -- 2.1 Introduction -- 2.2 Related Work -- 2.2.1 Multi-attribute Decision Making -- 2.3 Aims and Settings of the Empirical Studies -- 2.3.1 Elicitation of Emotions and Creation of Databases -- 2.3.2 Creation of Databases of Known Expressions of Emotions -- 2.3.3 Analysis of Recognisability of Emotions by Human Observers -- 2.4 Empirical Study for Audio-Lingual Emotion Recognition -- 2.4.1 The Experimental Educational Application for Elicitation of Emotions -- 2.4.2 Audio-Lingual Modality Analysis -- 2.5 Empirical Study for Visual-Facial Emotion Recognition -- 2.5.1 Visual-Facial Empirical Study on Subjects -- 2.5.2 Visual-Facial Empirical Study by Human Observers -- 2.6 Discussion and Comparison of the Results from the Empirical Studies -- 2.7 Combining the Results from the Empirical Studies Through MADM -- 2.8 Discussion and Conclusions -- References -- 3 Cooperative Learning Assisted by Automatic Classification Within Social Networking Services -- Abstract -- 3.1 Introduction -- 3.2 Related Work -- 3.2.1 Social Networking Services -- 3.2.2 Intelligent Computer-Assisted Language Learning -- 3.3 Algorithm of the System Functioning -- 3.3.1 Description of Automatic Classification -- 3.3.2 Optimization Objective and Its Definition -- 3.3.3 Initialization of Centroids -- 3.3.4 Incorporation of Automatic Classification -- 3.4 General Overview of the System -- 3.5 Evaluation of the System -- 3.6 Conclusions and Future Work -- References. , 4 Improving Peer-to-Peer Communication in e-Learning by Development of an Advanced Messaging System -- Abstract -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Data Analysis System Design -- 4.4 Experimental Results -- 4.5 Conclusions and Future Work -- References -- 5 Fuzzy-Based Digital Video Stabilization in Static Scenes -- Abstract -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Method of Frame Deblurring -- 5.4 Fuzzy-Based Video Stabilization Method -- 5.4.1 Estimation of Local Motion Vectors -- 5.4.2 Smoothness of GMVs Building -- 5.4.3 Static Scene Alignment -- 5.5 Experimental Results -- 5.6 Conclusion -- References -- 6 Development of Architecture, Information Archive and Multimedia Formats for Digital e-Libraries -- Abstract -- 6.1 Introduction -- 6.2 Related Work -- 6.3 Overview of Standards and Document Formats -- 6.4 Requirements and Objectives -- 6.5 Proposed Architecture of Digital e-Library Warehouse -- 6.6 Proposed EPUB Format Extensions -- 6.7 Client Software Design and Researches of Vulnerability -- 6.8 Conclusion -- References -- 7 Layered Ontological Image for Intelligent Interaction to Extend User Capabilities on Multimedia Systems in a Folksonomy Driven Environment -- Abstract -- 7.1 Introduction -- 7.2 Human Based Computation -- 7.2.1 Motivation of Human Contribution -- 7.3 Background of Related Work -- 7.3.1 Object Tracking -- 7.4 Dynamic Learning Ontology Structure -- 7.4.1 Richer Semantics of Attributes -- 7.4.2 Object on Layered Representation -- 7.4.3 Semantic Attributes -- 7.4.4 Attribute Bounding Box Position -- 7.4.5 Attributes Extraction and Sentiment Analysis -- 7.4.6 Folksodriven Bounding Box Notation -- 7.5 Image Analysis and Feature Selection -- 7.5.1 Object Position Detection -- 7.6 Previsions on Ontology Structure -- 7.7 A Case Study: In-Video Advertisement -- 7.7.1 In-Video Advertisement Functionality. , 7.7.2 Web GRP -- 7.7.3 Folksodriven Ontology Prediction for Advertisement -- 7.7.4 In-Video Advertisement Validation -- 7.8 Relevant Resources -- 7.9 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Machine learning. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (552 pages)
    Edition: 1st ed.
    ISBN: 9783030156282
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.1
    DDC: 006.31
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Applications of Learning and Analytics in Intelligent Systems -- References -- Learning and Analytics in Intelligent Medical Systems -- 2 A Comparison of Machine Learning Techniques to Predict the Risk of Heart Failure -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Data and Methods -- 2.3.1 Dataset -- 2.3.2 Evaluation Process -- 2.3.3 Weka -- 2.4 Overview of Proposed Systems -- 2.4.1 Logistic Regression -- 2.4.2 Decision Tree -- 2.4.3 Random Forest -- 2.4.4 K-Nearest Neighbor -- 2.4.5 Artificial Neuronal Network -- 2.4.6 SVM -- 2.4.7 Naïve Bayes -- 2.4.8 OneR -- 2.4.9 ZeroR -- 2.4.10 Hybrid -- 2.5 Comparison Results -- 2.6 Conclusions -- References -- 3 Differential Gene Expression Analysis of RNA-seq Data Using Machine Learning for Cancer Research -- 3.1 Introduction -- 3.2 Materials and Methods -- 3.2.1 RNAseq -- 3.2.2 Classical Approach -- 3.2.3 Machine Learning -- 3.2.4 Comparative Workflow -- 3.3 Code and Results of an Analysis with Real Data -- 3.3.1 Loading Packages -- 3.3.2 Loading and Searching the Data from TCGA -- 3.3.3 Patient Selection -- 3.3.4 Dependent Variable Definition -- 3.3.5 Biological Gene Filter -- 3.3.6 Graphics -- 3.3.7 Classical Statistical Analysis -- 3.3.8 Machine Learning Analysis -- 3.4 Conclusions -- References -- 4 Machine Learning Approaches for Pap-Smear Diagnosis: An Overview -- 4.1 Introduction -- 4.2 Cervical Cancer and Pap-Test -- 4.3 The Pap-Smear Databases -- 4.3.1 A Basic Data Analysis of New Data -- 4.4 The Used Methodologies -- 4.4.1 Adaptive Network-Based Fuzzy Inference System (ANFIS) -- 4.4.2 Artificial Neural Networks -- 4.4.3 Heuristic Classification -- 4.4.4 Minimum Distance Classification -- 4.4.5 Hard C-Means Clustering -- 4.4.6 Fuzzy C-Means Clustering -- 4.4.7 Gustafson and Kessel Clustering -- 4.4.8 k-Nearest Neighborhood Classification. , 4.4.9 Weighted k-Nearest Neighborhood Classification -- 4.4.10 Tabu Search -- 4.4.11 Genetic Programming -- 4.4.12 Ant Colony -- 4.5 The Pap-Smear Classification Problem -- 4.5.1 Classification with ANFIS -- 4.5.2 Heuristic Classification Based on GP -- 4.5.3 Classification Using Defuzzification Methods -- 4.5.4 Direct and Hierarchical Classification -- 4.5.5 Classification Using Feed-Forward Neural Network -- 4.5.6 Nearest Neighborhood Classification Based on GP Feature Selection -- 4.5.7 Nearest Neighborhood Classification Using Tabu Search for Feature Selection -- 4.5.8 Nearest Neighborhood Classification Using ACO for Feature Selection -- 4.5.9 Minimum Distance Classifier -- 4.6 Conclusion and Future Work -- References -- Learning and Analytics in Intelligent Power Systems -- 5 Multi-kernel Analysis Paradigm Implementing the Learning from Loads Approach for Smart Power Systems -- 5.1 Introduction -- 5.2 Background -- 5.2.1 Kernel Machines -- 5.2.2 Gaussian Processes -- 5.3 Multi-kernel Paradigm for Load Analysis -- 5.3.1 Problem Statement -- 5.3.2 Multi-kernel Paradigm -- 5.4 Results -- 5.4.1 Problem Statement -- 5.4.2 Further Results -- 5.5 Conclusion and Future Work -- References -- 6 Conceptualizing and Measuring Energy Security: Geopolitical Dimensions, Data Availability, Quantitative and Qualitative Methods -- 6.1 Preamble -- 6.1.1 Structure of Chapter -- 6.2 Review of Energy Security Literature -- 6.2.1 Brief History of Energy Security -- 6.2.2 Defining Security and Energy Security -- 6.2.3 Energy Security Since the 20th Century -- 6.2.4 Energy Security and Geopolitics -- 6.2.5 Dimensions of Energy Security -- 6.3 Methodology -- 6.3.1 Research Questions -- 6.4 Analyses and Results -- 6.4.1 Milestone Time Periods -- 6.4.2 Data -- 6.4.3 Measuring Energy Security -- 6.4.4 Creating a Geopolitical Energy Security Index. , 6.4.5 Using Cluster Analysis -- 6.4.6 Looking at Case Studies of Key Countries -- 6.4.7 Carrying Out Interviews of Energy Experts -- 6.4.8 Forecasting Energy Security -- 6.5 Closing Comments -- References -- Learning and Analytics in Performance Assessment -- 7 Automated Stock Price Motion Prediction Using Technical Analysis Datasets and Machine Learning -- 7.1 Introduction -- 7.2 Technical Analysis Synopsis -- 7.3 Machine Learning Component -- 7.3.1 SVM Algorithm -- 7.3.2 Adaptive Boost Algorithm -- 7.4 System Implementation -- 7.4.1 System Structure -- 7.4.2 Training Data Set -- 7.4.3 Selection of Machine Learning Algorithm and Implementation -- 7.4.4 Android Client Application -- 7.5 System Evaluation -- 7.6 Conclusions and Future Work -- References -- 8 Airport Data Analysis Using Common Statistical Methods and Knowledge-Based Techniques -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Airport Data Analysis -- 8.3.1 Data Collection and Cleansing -- 8.3.2 Case Study Description and Scope of Current Analysis -- 8.3.3 Demand Seasonality -- 8.3.4 International Passenger Connectivity Matrix -- 8.3.5 Weekly and Daily Airport Operating Patterns -- 8.3.6 Airplane Types and Associated Runway Length Requirements -- 8.4 Conclusions -- References -- 9 A Taxonomy and Review of the Network Data Envelopment Analysis Literature -- 9.1 Introduction -- 9.2 DMU's Internal Network Structures and Assessment Paradigms -- 9.3 Assessment Paradigms -- 9.3.1 Independent Assessments -- 9.3.2 Joint Assessments -- 9.4 Classification of Network DEA Studies -- 9.5 Conclusion -- References -- Learning and Analytics in Intelligent Safety and Emergency Response Systems -- 10 Applying Advanced Data Analytics and Machine Learning to Enhance the Safety Control of Dams -- 10.1 Introduction -- 10.2 The Data Lifecycle in the Safety Control of Concrete Dams. , 10.2.1 Raw Data Collection -- 10.2.2 Processing and Data Storage -- 10.2.3 Data Quality Assessment and Outlier Detection -- 10.2.4 Data Analysis and Dam Safety Assessment Based on Quantitative Interpretation Models -- 10.2.5 Data Analysis and Dam Safety Assessment Based on Machine Learning Models -- 10.3 Data Analysis and Data Prediction Using Deep Learning Models-An Overview -- 10.4 Adopted Problem Solving Process-The Design Science Research Methodology -- 10.5 Proposed Methodology-Adding Value to the Interpretation of the Monitored Dam Behaviour Through the Use of Deep Learning Models -- 10.6 Demonstration and Evaluation-Assessment and Interpretation of the Monitored Structural Behaviour of a Concrete Dam During Its Operation Phase -- 10.6.1 The Case Study-The Alto Lindoso Dam -- 10.6.2 The Dataset-Horizontal Displacements Measured by the Pendulum Method -- 10.6.3 Main Results and Discussion -- 10.7 Final Remarks -- References -- 11 Analytics and Evolving Landscape of Machine Learning for Emergency Response -- 11.1 Introduction -- 11.1.1 Emergency Management -- 11.1.2 Machine Learning -- 11.1.3 Scope and Organizations -- 11.2 Applications of Machine Learning in Emergency Response -- 11.2.1 Machine Learning Techniques for Emergency Management Cycles -- 11.2.2 Event Prediction -- 11.2.3 Warning Systems -- 11.2.4 Event Detection and Tracking -- 11.2.5 Situational Awareness -- 11.2.6 Emergency Evaluation -- 11.2.7 Crowdsourcing -- 11.3 Analysis of Emergency Data -- 11.3.1 Big Data in Emergency Management -- 11.3.2 Data Collection -- 11.3.3 Information Extraction and Filtering -- 11.3.4 Data Integration -- 11.3.5 Applications for Data Analysis in Emergency -- 11.4 Challenges and Opportunities of Machine Learning in Response -- 11.4.1 Data Collection -- 11.4.2 Information Extraction -- 11.4.3 Data Filtering -- 11.4.4 Data Integration. , 11.5 Crowdsourcing in Emergency Management -- 11.5.1 Crowdsourcing with Machine Learning for Emergency Management -- 11.5.2 Example: Crowdsourcing and Machine Learning for Tracking Emergency -- 11.6 Conclusions -- References -- Learning and Analytics in Intelligent Social Media -- 12 Social Media Analytics, Types and Methodology -- 12.1 Social Networks and Analytics -- 12.1.1 Descriptive Analytics -- 12.1.2 Diagnostic Analytics -- 12.1.3 Predictive Analytics -- 12.1.4 Prescriptive Analytics -- 12.2 Introduction to Social Network Mining -- 12.3 Data Structure -- 12.3.1 Structured Data -- 12.3.2 Semi-structured Data -- 12.3.3 Unstructured Data -- 12.4 Data Quality -- 12.4.1 Noise -- 12.4.2 Outliers -- 12.4.3 Missing Values -- 12.4.4 Duplicate Data -- 12.5 Data Preprocessing -- 12.5.1 Aggregation -- 12.5.2 Discretization -- 12.5.3 Feature Selection -- 12.5.4 Feature Extraction -- 12.5.5 Sampling -- 12.6 Network Modeling -- 12.6.1 Real World Networks -- 12.6.2 Random Graphs -- 12.6.3 Small World Model -- 12.6.4 Preferential Attachment Model -- 12.7 Network Schemas -- 12.7.1 Multi-relational Network with Single Typed Objects -- 12.7.2 Bipartite Network -- 12.7.3 Star-Schema Network -- 12.7.4 Multiple-hub Network -- 12.8 Task Categorization -- 12.9 Machine Learning -- 12.9.1 Supervised Learning -- 12.9.2 Unsupervised Learning -- 12.10 Conclusions -- References -- 13 Machine Learning Methods for Opinion Mining In text: The Past and the Future -- 13.1 Introduction -- 13.2 Terminology -- 13.3 Early Projects -- 13.4 The Fascinating Opportunities that Sentiment Analysis Raises -- 13.5 Natural Language Processing for Sentiment Analysis -- 13.5.1 Affective Information for Sentiment Analysis -- 13.5.2 Corpora Annotated for Sentiment Analysis Tasks -- 13.5.3 Distributional Semantics and Sentiment Analysis. , 13.6 Traditional Models Based on Lexica and Feature Engineering.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Self-help devices for people with disabilities. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (317 pages)
    Edition: 1st ed.
    ISBN: 9783030871321
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.28
    DDC: 681.761
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Advances in Assistive Technologies -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Advances in Assistive Technologies in Healthcare -- 2 Applications of AI in Healthcare and Assistive Technologies -- 2.1 Introduction -- 2.2 Healthcare and Biomedical Research -- 2.2.1 Controlled Monitoring Environment -- 2.2.2 Evolving Healthcare Techniques -- 2.2.3 Diagnosis -- 2.3 Assistive Technologies -- 2.3.1 Smart Homes and Cities -- 2.3.2 Assistive Robotics -- 2.4 Analysis and Forecasting -- 2.5 Conclusions -- References -- 3 A Research Agenda for Dementia Care: Prevention, Risk Mitigation and Personalized Interventions -- 3.1 Introduction -- 3.2 Mild Behavioral Impairments (MBI) and Dementia -- 3.3 Biometric Data -- 3.4 Caring for Caregivers -- 3.5 Tests -- 3.6 Conclusions -- References -- 4 Machine Learning and Finite Element Methods in Modeling of COVID-19 Spread -- 4.1 Introduction -- 4.1.1 Physiology of Human Respiratory System -- 4.1.2 Spreading of SARS-CoV-2 Virus Infection -- 4.1.3 Machine Learning for SARS-CoV-2 -- 4.2 Methods -- 4.2.1 Finite Element Method for Airways and Lobes -- 4.2.2 Machine Learning Method -- 4.3 Results -- 4.3.1 Simulation of Virus Spreading by Finite Element Analysis -- 4.3.2 Machine Learning Results -- 4.4 Conclusions -- References -- Part II Advances in Assistive Technologies in Medical Diagnosis -- 5 Towards Personalized Nutrition Applications with Nutritional Biomarkers and Machine Learning -- 5.1 Introduction -- 5.1.1 Summary -- 5.1.2 Chapter Synopsis -- 5.1.3 Goals and Perspective -- 5.2 Basic Concepts -- 5.2.1 Personalized Medicine -- 5.2.2 Next Generation Sequencing -- 5.2.3 Obesity -- 5.2.4 Nutritional Biomarkers -- 5.3 Neural Networks, Pattern Recognition and Datasets -- 5.3.1 Neural Network. , 5.3.2 Implementation Environment -- 5.3.3 Proposed System -- 5.4 Implementation and Evaluation of the Proposed System -- 5.4.1 Deep Back Propagation Neural Network -- 5.4.2 Standard Biochemistry Profile Neural Network (SBPNN) -- 5.4.3 Neural Network Dietary Profile -- 5.5 Conclusions and Future Research -- 5.5.1 Prevention -- 5.5.2 Modelling -- 5.5.3 Automation -- 5.5.4 Perspective -- 5.5.5 Discussion on Feature Research -- 5.6 Appendix -- References -- 6 Inductive Machine Learning and Feature Selection for Knowledge Extraction from Medical Data: Detection of Breast Lesions in MRI -- 6.1 Introduction -- 6.2 Detailed Literature Review -- 6.3 Presentation of the Data -- 6.3.1 Data Collection -- 6.3.2 Description of Variables -- 6.3.3 Dataset Preprocessing -- 6.4 Methodology -- 6.4.1 Modeling Methodology -- 6.4.2 Feature Selection Process -- 6.4.3 Classification Method -- 6.4.4 Validation Process -- 6.5 Modeling Approaches -- 6.5.1 Experimental Process -- 6.5.2 Experimental Results -- 6.6 Conclusions and Further Search -- Annex 6.1-Abbreviations -- Annex 6.2-Variables Frequency Charts (Original Dataset) -- Annex 6.3-Variables' Values Range -- Annex 6.4-Classification Tree (Benign or Malignant) -- References -- 7 Learning Paradigms for Neural Networks for Automated Medical Diagnosis -- 7.1 Introduction -- 7.2 Classical Artificial Neural Networks -- 7.3 Learning Paradigms -- 7.3.1 Evolutionary Computation Learning Paradigm -- 7.3.2 Bayesian Learning Paradigm -- 7.3.3 Markovian Stimulus-Sampling Learning Paradigm -- 7.3.4 Logistic Regression Paradigm -- 7.3.5 Ant Colony Optimization Learning Paradigm -- 7.4 Conclusions and Future Outlook -- References -- Part III Advances in Assistive Technologies in Mobility and Navigation -- 8 Smart Shoes for Assisting People: A Short Survey -- 8.1 Smart Shoes for People in Need. , 8.1.1 Smart Shoes for Visually Impaired People [6] -- 8.1.2 Smart Shoes for Blind Individuals [13] -- 8.1.3 IoT Based Wireless Smart Shoes and Energy Harvesting System [7] -- 8.1.4 Smart Shoes for Sensing Force [8] -- 8.1.5 Smart Shoes for Temperature and Pressure [9] -- 8.1.6 Smart Shoes in IoT [10] -- 8.1.7 Smart Shoes for People with Walking Disorders [23] -- 8.2 Special Purpose Smart Shoes -- 8.2.1 Smart Shoes with Triboelectric Nanogenerator [11] -- 8.2.2 Smart Shoes Gait Analysis [12] -- 8.2.3 Smart Shoes for Biomechanical Energy Harvesting [14] -- 8.2.4 Smart Shoes with Embedded Piezoelectric Energy Harvesting [15] -- 8.2.5 Pedestrian Navigation Using Smart Shoes with Markers [16] -- 8.2.6 Smart Shoes with 3D Tracking Capabilities [17] -- 8.2.7 Pedestrian's Safety with Smart Shoes Sensing [18] -- 8.2.8 Smart Shoes Insole Tech for Injury Prevention [19] -- 8.3 Maturity Evaluation of the Smart Shoes -- 8.4 Conclusion -- References -- 9 Re-Examining the Optimal Routing Problem from the Perspective of Mobility Impaired Individuals -- 9.1 Introduction -- 9.2 Literature Review -- 9.2.1 Mobility Aspects for People with Special Needs -- 9.3 Related Work -- 9.3.1 Miller-Tucker-Zemlin Formulation of the Traveling Salesman Problem -- 9.3.2 Dantzig-Fulkerson-Johnson Formulation of the Traveling Salesman Problem -- 9.4 The Optimal Routing Problem from the Perspective of Mobility Impaired Individuals -- 9.4.1 Measuring Route Scores Based on the Degree of Accessibility -- 9.4.2 Problem Statement: The Optimal Routing Problem from the Perspective of Mobility Impaired Individuals -- 9.4.3 The Proposed Solution Approach -- 9.5 The Experimental Results and Discussion -- 9.6 Conclusions -- References -- 10 Human Fall Detection in Depth-Videos Using Temporal Templates and Convolutional Neural Networks -- 10.1 Introduction -- 10.2 Proposed Method. , 10.3 Experiments, Results and Discussion -- 10.3.1 SDU Fall Dataset -- 10.3.2 UP-Fall Detection Dataset -- 10.3.3 UR Fall Detection Dataset -- 10.3.4 MIVIA Action Dataset -- 10.4 Conclusions and Future Work -- 10.5 Compliance with Ethical Standards -- References -- 11 Challenges in Assistive Living Based on Tech Synergies: The Cooperation of a Wheelchair and A Wearable Device -- 11.1 Overall Description of the Challenges -- 11.2 Background and Significance -- 11.3 The Associated Research Challenges -- 11.3.1 Main Innovative Tasks -- 11.4 Discussion -- References -- 12 Human-Machine Requirements' Convergence for the Design of Assistive Navigation Software: Τhe Case of Blind or Visually Impaired People -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Methodology -- 12.3.1 Interviews with BVI People and Requirements Classification -- 12.3.2 Description of the Participants -- 12.3.3 Requirements Classification -- 12.4 Analysis of the Elicited Requirements -- 12.4.1 Elicited Requirements of the BVI -- 12.5 Discussion -- 12.6 Conclusion -- Appendix A -- References -- Part IV Advances in Privacy and Explainability in Assistive Technologies -- 13 Privacy-Preserving Mechanisms with Explainability in Assistive AI Technologies -- 13.1 Introduction -- 13.1.1 Data Ethics -- 13.1.2 Data Privacy -- 13.1.3 Data Security -- 13.2 AI Applications in Assistive Technologies -- 13.2.1 Explainable AI (XAI) -- 13.3 Data Privacy and Ethical Challenges for Assistive Technologies -- 13.3.1 Data Collection and Data Sharing -- 13.3.2 Secure and Responsible Data Sharing Framework -- 13.4 AI Assistive Technologies with Privacy Enhancing -- 13.4.1 Privacy-Preserving Mechanisms for AI Assistive Technologies -- 13.5 Discussions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Computer vision. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (135 pages)
    Edition: 1st ed.
    ISBN: 9783319191355
    Series Statement: Intelligent Systems Reference Library ; v.92
    DDC: 620
    Language: English
    Note: Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- 1 Introduction -- 1.1 Introduction to Recommender Systems -- 1.2 Formulation of the Recommendation Problem -- 1.2.1 The Input to a Recommender System -- 1.2.2 The Output of a Recommender System -- 1.3 Methods of Collecting Knowledge About User Preferences -- 1.3.1 The Implicit Approach -- 1.3.2 The Explicit Approach -- 1.3.3 The Mixing Approach -- 1.4 Motivation of the Book -- 1.5 Contribution of the Book -- 1.6 Outline of the Book -- References -- 2 Review of Previous Work Related to Recommender Systems -- 2.1 Content-Based Methods -- 2.2 Collaborative Methods -- 2.2.1 User-Based Collaborative Filtering Systems -- 2.2.2 Item-Based Collaborative Filtering Systems -- 2.2.3 Personality Diagnosis -- 2.3 Hybrid Methods -- 2.3.1 Adding Content-Based Characteristics to Collaborative Models -- 2.3.2 Adding Collaborative Characteristics to Content-Based Models -- 2.3.3 A Single Unifying Recommendation Model -- 2.3.4 Other Types of Recommender Systems -- 2.4 Fundamental Problems of Recommender Systems -- References -- 3 The Learning Problem -- 3.1 Introduction -- 3.2 Types of Learning -- 3.3 Statistical Learning -- 3.3.1 Classical Parametric Paradigm -- 3.3.2 General Nonparametric---Predictive Paradigm -- 3.3.3 Transductive Inference Paradigm -- 3.4 Formulation of the Learning Problem -- 3.5 The Problem of Classification -- 3.5.1 Empirical Risk Minimization -- 3.5.2 Structural Risk Minimization -- 3.6 Support Vector Machines -- 3.6.1 Basics of Support Vector Machines -- 3.6.2 Multi-class Classification Based on SVM -- 3.7 One-Class Classification -- 3.7.1 One-Class SVM Classification -- 3.7.2 Recommendation as a One-Class Classification Problem -- References -- 4 Content Description of Multimedia Data -- 4.1 Introduction -- 4.2 MPEG-7 -- 4.2.1 Visual Content Descriptors. , 4.2.2 Audio Content Descriptors -- 4.3 MARSYAS: Audio Content Features -- 4.3.1 Music Surface Features -- 4.3.2 Rhythm Features and Tempo -- 4.3.3 Pitch Features -- References -- 5 Similarity Measures for Recommendations Based on Objective Feature Subset Selection -- 5.1 Introduction -- 5.2 Objective Feature-Based Similarity Measures -- 5.3 Architecture of MUSIPER -- 5.4 Incremental Learning -- 5.5 Realization of MUSIPER -- 5.5.1 Computational Realization of Incremental Learning -- 5.6 MUSIPER Operation Demonstration -- 5.7 MUSIPER Evaluation Process -- 5.8 System Evaluation Results -- References -- 6 Cascade Recommendation Methods -- 6.1 Introduction -- 6.2 Cascade Content-Based Recommendation -- 6.3 Cascade Hybrid Recommendation -- 6.4 Measuring the Efficiency of the Cascade Classification Scheme -- References -- 7 Evaluation of Cascade Recommendation Methods -- 7.1 Introduction -- 7.2 Comparative Study of Recommendation Methods -- 7.3 One-Class SVM---Fraction: Analysis -- 8 Conclusions and Future Work -- 8.1 Summary and Conclusions -- 8.2 Current and Future Work.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...