GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Electronic books.  (23)
  • Software engineering.  (2)
  • Computer vision.  (1)
  • Multimedia systems -- Congresses.  (1)
  • 1
    Schlagwort(e): Machine learning. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (237 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030767945
    Serie: Learning and Analytics in Intelligent Systems Series ; v.23
    DDC: 006.31
    Sprache: Englisch
    Anmerkung: Intro -- Foreword -- Further Reading -- Preface -- Contents -- 1 Introduction to Advances in Machine Learning/Deep Learning-Based Technologies -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Machine Learning/Deep Learning in Socializing and Entertainment -- 2 Semi-supervised Feature Selection Method for Fuzzy Clustering of Emotional States from Social Streams Messages -- 2.1 Introduction -- 2.2 The FS-EFCM Algorithm -- 2.2.1 EFCM Execution: Main Steps -- 2.2.2 Initial Parameter Setting -- 2.3 Experimental Results -- 2.3.1 Dataset -- 2.3.2 Feature Selection -- 2.3.3 FS-EFCM at Work -- 2.4 Conclusion -- References -- 3 AI in (and for) Games -- 3.1 Introduction -- 3.2 Game Content and Databases -- 3.3 Intelligent Game Content Generation and Selection -- 3.3.1 Generating Content for a Language Education Game -- 3.4 Conclusions -- References -- Part II Machine Learning/Deep Learning in Education -- 4 Computer-Human Mutual Training in a Virtual Laboratory Environment -- 4.1 Introduction -- 4.1.1 Purpose and Development of the Virtual Lab -- 4.1.2 Different Playing Modes -- 4.1.3 Evaluation -- 4.2 Background and Related Work -- 4.3 Architecture of the Virtual Laboratory -- 4.3.1 Conceptual Design -- 4.3.2 State-Transition Diagrams -- 4.3.3 High Level Design -- 4.3.4 State Machine -- 4.3.5 Individual Scores -- 4.3.6 Quantization -- 4.3.7 Normalization -- 4.3.8 Composite Evaluation -- 4.3.9 Success Rate -- 4.3.10 Weighted Average -- 4.3.11 Artificial Neural Network -- 4.3.12 Penalty Points -- 4.3.13 Aggregate Score -- 4.4 Machine Learning Algorithms -- 4.4.1 Genetic Algorithm for the Weighted Average -- 4.4.2 Training the Artificial Neural Network with Back-Propagation -- 4.5 Implementation -- 4.5.1 Instruction Mode -- 4.5.2 Evaluation Mode -- 4.5.3 Computer Training Mode -- 4.5.4 Training Data Collection Sub-mode. , 4.5.5 Machine Learning Sub-mode -- 4.6 Training-Testing Process and Results -- 4.6.1 Training Data -- 4.6.2 Training and Testing on Various Data Set Groups -- 4.6.3 Genetic Algorithm Results -- 4.6.4 Artificial Neural Network Training Results -- 4.7 Conclusions -- References -- 5 Exploiting Semi-supervised Learning in the Education Field: A Critical Survey -- 5.1 Introduction -- 5.2 Semi-supervised Learning -- 5.3 Literature Review -- 5.3.1 Performance Prediction -- 5.3.2 Dropout Prediction -- 5.3.3 Grade Level Prediction -- 5.3.4 Grade Point Value Prediction -- 5.3.5 Other Studies -- 5.3.6 Discussion -- 5.4 The Potential of SSL in the Education Field -- 5.5 Conclusions -- References -- Part III Machine Learning/Deep Learning in Security -- 6 Survey of Machine Learning Approaches in Radiation Data Analytics Pertained to Nuclear Security -- 6.1 Introduction -- 6.2 Machine Learning Methodologies in Nuclear Security -- 6.2.1 Nuclear Signature Identification -- 6.2.2 Background Radiation Estimation -- 6.2.3 Radiation Sensor Placement -- 6.2.4 Source Localization -- 6.2.5 Anomaly Detection -- 6.3 Conclusion -- References -- 7 AI for Cybersecurity: ML-Based Techniques for Intrusion Detection Systems -- 7.1 Introduction -- 7.1.1 Why Does AI Pose Great Importance for Cybersecurity? -- 7.1.2 Contribution -- 7.2 ML-Based Models for Cybersecurity -- 7.2.1 K-Means -- 7.2.2 Autoencoder (AE) -- 7.2.3 Generative Adversarial Network (GAN) -- 7.2.4 Self Organizing Map -- 7.2.5 K-Nearest Neighbors (k-NN) -- 7.2.6 Bayesian Network -- 7.2.7 Decision Tree -- 7.2.8 Fuzzy Logic (Fuzzy Set Theory) -- 7.2.9 Multilayer Perceptron (MLP) -- 7.2.10 Support Vector Machine (SVM) -- 7.2.11 Ensemble Methods -- 7.2.12 Evolutionary Algorithms -- 7.2.13 Convolutional Neural Networks (CNN) -- 7.2.14 Recurrent Neural Network (RNN) -- 7.2.15 Long Short Term Memory (LSTM). , 7.2.16 Restricted Boltzmann Machine (RBM) -- 7.2.17 Deep Belief Network (DBN) -- 7.2.18 Reinforcement Learning (RL) -- 7.3 Open Topics and Potential Directions -- 7.3.1 Novel Feature Representations -- 7.3.2 Unsupervised Learning Based Detection Systems -- References -- Part IV Machine Learning/Deep Learning in Time Series Forecasting -- 8 A Comparison of Contemporary Methods on Univariate Time Series Forecasting -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Theoretical Background -- 8.3.1 ARIMA -- 8.3.2 Prophet -- 8.3.3 The Holt-Winters Seasonal Models -- 8.3.4 N-BEATS: Neural Basis Expansion Analysis -- 8.3.5 DeepAR -- 8.3.6 Trigonometric BATS -- 8.4 Experiments and Results -- 8.4.1 Datasets -- 8.4.2 Algorithms -- 8.4.3 Evaluation -- 8.4.4 Results -- 8.5 Conclusions -- References -- 9 Application of Deep Learning in Recurrence Plots for Multivariate Nonlinear Time Series Forecasting -- 9.1 Introduction -- 9.2 Related Work -- 9.2.1 Background on Recurrence Plots -- 9.2.2 Time Series Imaging and Convolutional Neural Networks -- 9.3 Time Series Nonlinearity -- 9.4 Time Series Imaging -- 9.4.1 Dimensionality Reduction -- 9.4.2 Optimal Parameters -- 9.5 Convolutional Neural Networks -- 9.6 Model Pipeline and Architecture -- 9.6.1 Architecture -- 9.7 Experimental Setup -- 9.8 Results -- 9.9 Conclusion -- References -- Part V Machine Learning in Video Coding and Information Extraction -- 10 A Formal and Statistical AI Tool for Complex Human Activity Recognition -- 10.1 Introduction -- 10.2 The Hybrid Framework-Formal Languages -- 10.3 Formal Tool and Statistical Pipeline Architecture -- 10.4 DATA Pipeline -- 10.5 Tools for Implementation -- 10.6 Experimentation with Datasets to Identify the Ideal Model -- 10.6.1 KINISIS-Single Human Activity Recognition Modeling -- 10.6.2 DRASIS-Change of Human Activity Recognition Modeling -- 10.7 Conclusions. , References -- 11 A CU Depth Prediction Model Based on Pre-trained Convolutional Neural Network for HEVC Intra Encoding Complexity Reduction -- 11.1 Introduction -- 11.2 H.265 High Efficiency Video Coding -- 11.2.1 Coding Tree Unit Partition -- 11.2.2 Rate Distortion Optimization -- 11.2.3 CU Partition and Image Texture Features -- 11.3 Proposed Methodology -- 11.3.1 The Hierarchical Classifier -- 11.3.2 The Methodology of Transfer Learning -- 11.3.3 Structure of Convolutional Neural Network -- 11.3.4 Dataset Construction -- 11.4 Experiments and Results -- 11.5 Conclusion -- References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Schlagwort(e): Computer security. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (335 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811910579
    Serie: Smart Innovation, Systems and Technologies Series ; v.277
    DDC: 005.8
    Sprache: Englisch
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing AG,
    Schlagwort(e): Artificial intelligence. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (363 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030930523
    Serie: Learning and Analytics in Intelligent Systems Series ; v.24
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Advances in Selected Artificial Intelligence Areas -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Advances in Artificial Intelligence Paradigms -- 2 Feature Selection: From the Past to the Future -- 2.1 Introduction -- 2.2 The Need for Feature Selection -- 2.3 History of Feature Selection -- 2.4 Feature Selection Techniques -- 2.4.1 Filter Methods -- 2.4.2 Embedded Methods -- 2.4.3 Wrapper Methods -- 2.5 What Next in Feature Selection? -- 2.5.1 Scalability -- 2.5.2 Distributed Feature Selection -- 2.5.3 Ensembles for Feature Selection -- 2.5.4 Visualization and Interpretability -- 2.5.5 Instance-Based Feature Selection -- 2.5.6 Reduced-Precision Feature Selection -- References -- 3 Application of Rough Set-Based Characterisation of Attributes in Feature Selection and Reduction -- 3.1 Introduction -- 3.2 Background and Related Works -- 3.2.1 Estimation of Feature Importance and Feature Selection -- 3.2.2 Rough Sets and Decision Reducts -- 3.2.3 Reduct-Based Feature Characterisation -- 3.2.4 Stylometry as an Application Domain -- 3.2.5 Continuous Versus Nominal Character of Input Features -- 3.3 Setup of Experiments -- 3.3.1 Preparation of Input Data and Datasets -- 3.3.2 Decision Reducts Inferred -- 3.3.3 Rankings of Attributes Based on Reducts -- 3.3.4 Classification Systems Employed -- 3.4 Obtained Results of Feature Reduction -- 3.5 Conclusions -- References -- 4 Advances in Fuzzy Clustering Used in Indicator for Individuality -- 4.1 Introduction -- 4.2 Fuzzy Clustering -- 4.3 Convex Clustering -- 4.4 Indicator of Individuality -- 4.5 Numerical Examples -- 4.6 Conclusions and Future Work -- References -- 5 Pushing the Limits Against the No Free Lunch Theorem: Towards Building General-Purpose (GenP) Classification Systems -- 5.1 Introduction. , 5.2 Multiclassifier/Ensemble Methods -- 5.2.1 Canonical Model of Single Classifier Learning -- 5.2.2 Methods for Building Multiclassifiers -- 5.3 Matrix Representation of the Feature Vector -- 5.4 GenP Systems Based on Deep Learners -- 5.4.1 Deep Learned Features -- 5.4.2 Transfer Learning -- 5.4.3 Multiclassifier System Composed of Different CNN Architectures -- 5.5 Data Augmentation -- 5.6 Dissimilarity Spaces -- 5.7 Conclusion -- References -- 6 Bayesian Networks: Theory and Philosophy -- 6.1 Introduction -- 6.2 Bayesian Networks -- 6.2.1 Bayesian Networks Background -- 6.2.2 Bayesian Networks Defined -- 6.3 Maximizing Entropy for Missing Information -- 6.3.1 Maximum Entropy Formalism -- 6.3.2 Maximum Entropy Method -- 6.3.3 Solving for the Lagrange Multipliers -- 6.3.4 Independence -- 6.3.5 Overview -- 6.4 Philosophical Considerations -- 6.4.1 Thomas Bayes and the Principle of Insufficient Reason -- 6.4.2 Objective Bayesianism -- 6.4.3 Bayesian Networks Versus Artificial Neural Networks -- 6.5 Bayesian Networks in Practice -- References -- Part II Advances in Artificial Intelligence Applications -- 7 Artificial Intelligence in Biometrics: Uncovering Intricacies of Human Body and Mind -- 7.1 Introduction -- 7.2 Background and Literature Review -- 7.2.1 Biometric Systems Overview -- 7.2.2 Classification and Properties of Biometric Traits -- 7.2.3 Unimodal and Multi-modal Biometric Systems -- 7.2.4 Social Behavioral Biometrics and Privacy -- 7.2.5 Deep Learning in Biometrics -- 7.3 Deep Learning in Social Behavioral Biometrics -- 7.3.1 Research Domain Overview of Social Behavioral Biometrics -- 7.3.2 Social Behavioral Biometric Features -- 7.3.3 General Architecture of Social Behavioral Biometrics System -- 7.3.4 Comparison of Rank and Score Level Fusion -- 7.3.5 Deep Learning in Social Behavioral Biometrics -- 7.3.6 Summary and Applications. , 7.4 Deep Learning in Cancelable Biometrics -- 7.4.1 Biometric Privacy and Template Protection -- 7.4.2 Unimodal and Multi-modal Cancelable Biometrics -- 7.4.3 Deep Learning Architectures for Cancelable Multi-modal Biometrics -- 7.4.4 Performance of Cancelable Biometric System -- 7.4.5 Summary and Applications -- 7.5 Applications and Open Problems -- 7.5.1 User Authentication and Anomaly Detection -- 7.5.2 Access Control -- 7.5.3 Robotics -- 7.5.4 Assisted Living -- 7.5.5 Mental Health -- 7.5.6 Education -- 7.6 Summary -- References -- 8 Early Smoke Detection in Outdoor Space: State-of-the-Art, Challenges and Methods -- 8.1 Introduction -- 8.2 Problem Statement and Challenges -- 8.3 Conventional Machine Learning Methods -- 8.4 Deep Learning Methods -- 8.5 Proposed Deep Architecture for Smoke Detection -- 8.6 Datasets -- 8.7 Comparative Experimental Results -- 8.8 Conclusions -- References -- 9 Machine Learning for Identifying Abusive Content in Text Data -- 9.1 Introduction -- 9.2 Abusive Content on Social Media and Their Identification -- 9.3 Identification of Abusive Content with Classic Machine Learning Methods -- 9.3.1 Use of Word Embedding in Data Representation -- 9.3.2 Ensemble Model -- 9.4 Identification of Abusive Content with Deep Learning Models -- 9.4.1 Taxonomy of Deep Learning Models -- 9.4.2 Natural Language Processing with Advanced Deep Learning Models -- 9.5 Applications -- 9.6 Future Direction -- 9.7 Conclusion -- References -- 10 Toward Artifical Intelligence Tools for Solving the Real World Problems: Effective Hybrid Genetic Algorithms Proposal -- 10.1 Introduction -- 10.2 University Course Timetabling UCT -- 10.2.1 Problem Statement and Preliminary Definitions -- 10.2.2 Related Works -- 10.2.3 Problem Modelization and Mathematical Formulation -- 10.2.4 An Interactive Decision Support System (IDSS) for the UCT Problem. , 10.2.5 Empirical Testing -- 10.2.6 Evaluation and Results -- 10.3 Solid Waste Management Problem -- 10.3.1 Related Works -- 10.3.2 The Mathematical Formulation Model -- 10.3.3 A Genetic Algorithm Proposal for the SWM -- 10.3.4 Experimental Study and Results -- 10.4 Conclusion -- References -- 11 Artificial Neural Networks for Precision Medicine in Cancer Detection -- 11.1 Introduction -- 11.2 The fLogSLFN Model -- 11.3 Parallel Versus Cascaded LogSLFN -- 11.4 Adaptive SLFN -- 11.5 Statistical Assessment -- 11.6 Conclusions -- References -- Part III Recent Trends in Artificial Intelligence Areas and Applications -- 12 Towards the Joint Use of Symbolic and Connectionist Approaches for Explainable Artificial Intelligence -- 12.1 Introduction -- 12.2 Literature Review -- 12.2.1 The Explainable Interface -- 12.2.2 The Explainable Model -- 12.3 New Approaches to Explainability -- 12.3.1 Towards a Formal Definition of Explainability -- 12.3.2 Using Ontologies to Design the Deep Architecture -- 12.3.3 Coupling DNN and Learning Classifier Systems -- 12.4 Conclusions -- References -- 13 Linguistic Intelligence As a Root for Computing Reasoning -- 13.1 Introduction -- 13.2 Language as a Tool for Communication -- 13.2.1 MLW -- 13.2.2 Sounds and Utterances Behavior -- 13.2.3 Semantics and Self-expansion -- 13.2.4 Semantic Drifted Off from Verbal Behavior -- 13.2.5 Semantics and Augmented Reality -- 13.3 Language in the Learning Process -- 13.3.1 Modeling Learning Profiles -- 13.3.2 Looking for Additional Teaching Tools in Academy -- 13.3.3 LEARNITRON for Learning Profiles -- 13.3.4 Profiling the Learning Process: Tracking Mouse and Keyboard -- 13.3.5 Profiling the Learning Process: Tracking Eyes -- 13.3.6 STEAM Metrics -- 13.4 Language of Consciousness to Understand Environments -- 13.4.1 COFRAM Framework -- 13.4.2 Bacteria Infecting the Consciousness. , 13.5 Harmonics Systems: A Mimic of Acoustic Language -- 13.5.1 HS for Traffic's Risk Predictions -- 13.5.2 HS Application to Precision Farming -- 13.6 Conclusions and Future Work -- References -- 14 Collaboration in the Machine Age: Trustworthy Human-AI Collaboration -- 14.1 Introduction -- 14.2 Artificial Intelligence: An Overview -- 14.2.1 The Role of AI-Definitions and a Short Historic Overview -- 14.2.2 AI and Agents -- 14.2.3 Beyond Modern AI -- 14.3 The Role of AI for Collaboration -- 14.3.1 Human-Computer Collaboration Where AI is Embedded -- 14.3.2 Human-AI Collaboration (Or Conversational AI) -- 14.3.3 Human-Human Collaboration Where AI Can Intervene -- 14.3.4 Challenges of Using AI: Toward a Trustworthy AI -- 14.4 Conclusion -- References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Schlagwort(e): Cooperating objects (Computer systems). ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (209 pages)
    Ausgabe: 1st ed.
    ISBN: 9783031076503
    Serie: Artificial Intelligence-Enhanced Software and Systems Engineering Series ; v.3
    DDC: 006.22
    Sprache: Englisch
    Anmerkung: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Handbook on Artificial Intelligence-Empowered Applied Software Engineering-Vol. 2: Smart Software Applications in Cyber-Physical Systems -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- Bibliography for Further Reading -- Part I Smart Software Applications in Scientific Document Processing -- 2 Detection, Extraction and SPN Representation of Pseudo-Algorithms in Scientific Documents -- 2.1 Introduction -- 2.2 Visual Detection of Pseudo-Codes in Documents -- 2.2.1 Extraction of Different Text Blocks in Documents -- 2.2.2 Pyramidal Image Representation -- 2.2.3 Decomposition and Classification of the Pseudo Code Sections -- 2.3 Learning -- 2.3.1 The Dataset -- 2.3.2 Evaluation of Learning Process -- 2.4 Translation of Algorithms to Graphs and SPNs -- 2.4.1 Generation of a Graph -- 2.4.2 Stochastic Petri Net Representation -- 2.5 Conclusion and Future Work -- References -- 3 A Recommender Engine for Scientific Paper Peer-Reviewing System -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Dataset and Feature -- 3.4 Methodology -- 3.4.1 Create Training Dataset -- 3.4.2 The Architecture of Recommender Engine -- 3.4.3 Final Recommendation Section -- 3.5 Result and Analysis -- 3.6 Conclusion(s) -- References -- Part II Smart Software Applications in Enterprise Modeling -- 4 Visualization of Digital-Enhanced Enterprise Modeling -- 4.1 Introduction -- 4.2 A Meta Model for Describing Value of Digital Service -- 4.3 Visualization Patterns -- 4.3.1 Service Definition Pattern -- 4.3.2 Value Proposition Pattern -- 4.3.3 Use Process Refinement pattern -- 4.4 Application Example -- 4.4.1 Healthcare Example -- 4.4.2 Application of Visualization Patterns -- 4.5 Discussions -- 4.5.1 Effectiveness -- 4.5.2 Novelty -- 4.5.3 Mapping to BMC -- 4.5.4 Limitation -- 4.6 Related Work -- 4.7 Conclusion. , References -- 5 Know-linking: When Machine Learning Meets Organizational Tools Analysis to Generate Shared Knowledge in Large Companies -- 5.1 Introduction -- 5.2 State of the Art -- 5.2.1 Profiling -- 5.2.2 Organizational Tools Analysis -- 5.2.3 Indexing -- 5.3 Related Works -- 5.4 Know-linking Approach -- 5.4.1 Presentation -- 5.5 Environment Study -- 5.6 Know-linking in Aerospace Manufacturer -- 5.6.1 Technical Audit -- 5.6.2 Extracting Profiles -- 5.6.3 Generating Semantic Models for Each Profile -- 5.6.4 Hidden Semantic Links Between Profiles -- 5.6.5 Indexing Based Profiles -- 5.7 Conclusion and Future Work -- References -- 6 Changes in Human Resources Management with Artificial Intelligence -- 6.1 Introduction -- 6.2 The Effect of AI in Human Resources Management -- 6.2.1 Recruitment Process with AI -- 6.2.2 Training Process with AI -- 6.2.3 Performance Assessment Process with AI -- 6.2.4 Talent Management Process with AI -- 6.2.5 Salary Management Process with AI -- 6.3 Conclusion -- References -- Part III Smart Software Applications in Education -- 7 Promoting Reading Among Teens: Analyzing the Emotional Preferences of Teenage Readers -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Our Emotion Trait Analysis Approach -- 7.3.1 Processing a Book Description -- 7.3.2 Calculating an Emotion Vector -- 7.3.3 Emotion Trait -- 7.3.4 Partitioning Books by Average Ratings -- 7.3.5 Reducing Objective Values by Comparing Synonyms -- 7.3.6 Implementation -- 7.4 Conclusions and Future Works -- References -- 8 A Multi-institutional Analysis of CS1 Students' Common Misconceptions of Key Programming Concepts -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Study Design -- 8.3.1 Research Objective -- 8.3.2 Research Questions -- 8.3.3 Data Collection -- 8.3.4 Reliability of Pre-post-test Instrument -- 8.3.5 Study Procedure -- 8.4 Experimental Results. , 8.5 Discussion of Results -- 8.6 Conclusion -- References -- Part IV Smart Software Applications in Healthcare and Medicine -- 9 Clustering-Based Scaling for Healthcare Data -- 9.1 Introduction -- 9.2 Fuzzy Clustering -- 9.3 Fuzzy Clustering for 3-Way Data -- 9.4 Fuzzy Cluster-Scaled Regression Analysis -- 9.5 Numerical Examples -- 9.6 Conclusions -- References -- 10 Normative and Fuzzy Components of Medical AI Applications -- 10.1 Preliminaries -- 10.2 Normative Issues -- 10.3 Fuzziness and Norms -- 10.4 Conclusions -- References -- Part V Smart Software Applications in Infrastructure Monitoring -- 11 Adaptive Structural Learning of Deep Belief Network and Its Application to Real Time Crack Detection of Concrete Structure Using Drone -- 11.1 Introduction -- 11.2 Adaptive Learning Method of Deep Belief Network -- 11.2.1 Restricted Boltzmann Machine and Deep Belief Network -- 11.2.2 Neuron Generation and Annihilation Algorithm of RBM -- 11.2.3 Layer Generation Algorithm of DBN -- 11.3 SDNET 2018 -- 11.3.1 Data Description -- 11.3.2 The Classification Results -- 11.4 Crack Detection for Japanese Concrete Structure -- 11.4.1 Data Collection -- 11.4.2 Detection Results -- 11.5 Real-Time Detection and Visualization System Using Drone -- 11.5.1 Embedded System -- 11.5.2 Demonstration Experiment -- 11.6 Conclusion -- References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Schlagwort(e): Software engineering. ; Electronic books.
    Beschreibung / Inhaltsverzeichnis: Multimedia Services in Intelligent Environments explores the developmental challenges involved with integrating multimedia services in intelligent environments, and meets those challenges with state-of-art solutions.
    Materialart: Online-Ressource
    Seiten: 1 online resource (194 pages)
    Ausgabe: 1st ed.
    ISBN: 9783642133558
    Serie: Smart Innovation, Systems and Technologies Series ; v.2
    DDC: 006.7
    Sprache: Englisch
    Anmerkung: Title -- Foreword -- Editors -- Preface -- Table of Contents -- Advances in Multimedia Services in Intelligent Environments - Software Development Challenges and Solutions -- Introduction -- Conclusions -- References and Further Reading -- Evaluating the Generality of a Life-Cycle Framework for Incorporating Clustering Algorithms in Adaptive Systems -- Introduction -- The Software Life Cycle -- Inception -- Defining Requirements for the Prototype System and Analysis and Design of the Prototype Adaptive Recommender System -- Building and Evaluating the Prototype Adaptive Recommender System -- Elaboration -- Computing the Resemblance Coefficients for the Data Set and Developing the Clustering Algorithm -- Execute the Clustering Method for the Prototype and Evaluating the Results of the Clustering Algorithm used in the Prototype -- Construction -- The Most Efficient Algorithm and Designing Stereotypes Based on This Algorithm -- Building the User Modeling Component Based on the Stereotypes and Incorporating Them into the System -- Transition-Dynamically Improving System Performance while Used by Real Users -- Conclusion about the Life Cycle Process -- References -- A Distributed Multimedia Data Management over the Grid -- Introduction -- Related Work -- Overall Framework -- Replicated Multidimensional Index Structure -- Distributed Query Processing -- Automatic Load Balancing -- Empirical Study -- Conclusion and Future Works -- References -- A View of Monitoring and Tracing Techniques and Their Application to Service-Based Environments -- Introduction -- Execution Monitoring and Tracing -- Categories of Execution Monitoring -- What Can Be Traced? -- Monitoring Techniques -- Comparison -- Monitoring Challenges for Multimedia Services -- Behavioral Change -- Information Access -- Timing -- Synchronization of Event Traces -- Distributed Monitoring. , Trace Transmission -- Conclusion -- References -- An Ontological SW Architecture SupportingContribution and Retrieval of Service and Process Models -- Introduction -- An Application in the Healthcare Domain -- Ontological SW Architecture -- Three Tier with Ontologies -- Encoding Procedures through Ontologies -- Enabling Direct Contribution through Ontologies -- Enabling Semantic Queries -- Enabling Adapted Presentation through Ontologies -- Conclusions -- References -- Model-Driven Quality Engineering of Service-Based Systems -- Introduction -- Related Work -- QoS-Enabled WSDL (Q-WSDL) -- QoS Characteristics of Web Services -- Q-WSDL Metamodel -- Composite Web Services -- QoS Prediction of Composite Web Services -- Model-Driven Reliability Prediction -- Example Application -- Conclusions -- References -- Application of Logic Models for Pervasive Computing Environments and Context-Aware Services Support -- Introduction -- Contextual Models Requirements for Pervasive Computing -- The LogiPerSe First Order Logic Model -- Partial Validation and Ambiguity -- Scalability -- Composability -- Pervasive Service Scenario -- Logic-Based System Architecture -- Logic Model - Object-Oriented Model - Ontology Integration -- Conclusions -- References -- Intelligent Host Discovery from Malicious Software -- Introduction -- Instant Message Clients -- Search Engines -- Social Networks -- Torrent Trackers -- Conclusions -- References -- Swarm Intelligence: The Ant Paradigm -- Introduction -- Swarm Intelligence -- Principles of Natural Swarms -- The Biological Origins of Ant Algorithms -- Ant Algorithms of the Ant Colony Optimization Framework -- Ant System -- MAX MIN Ant System -- Ant Colony System -- Conclusion -- References -- Formulating Discrete Geometric Random Sums for Facilitating Intelligent Behaviour of a Complex System under a Major Risk -- Introduction. , Formulation of a Discrete Geometric Random Sum -- Stochastic Derivation of a Discrete Geometric Random Sum -- Risk and Crisis Management Applications and Computational Intelligence Interpretation of a Discrete Geometric Random Sum -- Conclusions -- References -- Incorporating a Discrete Renewal Random Sum in Computational Intelligence and Cindynics -- Introduction -- Formulation of a Discrete Renewal Random Sum -- Stochastic Derivation of a Discrete Renewal Random Sum -- Application in Cindynics and Interpretation in Computational Intelligence of a Discrete Renewal Random Sum -- Conclusions -- References -- Author Index.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Schlagwort(e): Digital communications. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (438 pages)
    Ausgabe: 1st ed.
    ISBN: 9783031232336
    Serie: Communications in Computer and Information Science Series ; v.1737
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Organization -- Keynote Address -- Industry 4.0 Meets Data Science: The Pathway for Society 5.0 -- Continual Learning for Intelligent Systems in Changing Environments -- Where is the Research on Evolutionary Multi-objective Optimization Heading to? -- Designing a Software Framework Based on an Object Detection Model and a Fuzzy Logic System for Weed Detection and Pasture Assessment -- An Overview of Machine Learning Based Intelligent Computing and Applications -- Semisupervised Learning with Spatial Information and Granular Neural Networks -- IoT Based General Purpose Sensing Application for Smart Home Environment -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Contents -- Intelligent Computing -- Ensemble Learning Model for EEG Based Emotion Classification -- 1 Introduction -- 2 Related Works -- 3 System Model and Methodology -- 3.1 Feature Extraction -- 3.2 Deep Learning Model Implementation -- 4 Dataset Description -- 5 Experimental Setup and Results -- 6 Conclusion -- References -- Foundation for the Future of Higher Education or 'Misplaced Optimism'? Being Human in the Age of Artificial Intelligence -- 1 Introduction -- 2 Education Using Artificial Intelligence (AIEd) -- 3 Methods -- 3.1 Search Strategy -- 3.2 Reliability of Agreement Amongst Raters -- 3.3 Collection, Codification, and Analysis of Data -- 3.4 Limitations -- 4 Results -- 4.1 Forecasting and Characterising -- 4.2 Curriculum Technology that Uses Artificial Intelligence -- 4.3 Constant Re-Evaluation -- 4.4 A System that May Change to Fit the USER'S Needs -- 5 Conclusion and Way Forward -- References -- AI Enabled Internet of Medical Things Framework for Smart Healthcare -- 1 Introduction -- 2 AI Based IoMT Health Domains. , 3 AI Enabled IoMT Architectures for Smart Healthcare Systems -- 4 Research Challenges of AI Enabled Smart Healthcare Systems -- 4.1 Data Accuracy -- 4.2 Data Security -- 4.3 System Efficiency -- 4.4 Quality of Service -- 5 Conclusion -- References -- Metaverse and Posthuman Animated Avatars for Teaching-Learning Process: Interperception in Virtual Universe for Educational Transformation -- 1 Introduction -- 2 Objectives of the Research and Knowledge Gap -- 3 Methods and Methodology -- 4 Results and Discussion -- 4.1 Educational Metaverse: A Categorical Analysis -- 4.2 A Wide Variety of Virtual Worlds for Use in Education -- 4.3 Situations for Learning, Tiers of Education, and VR Learning Environments -- 4.4 Students' Avatars (Digital Personas) in the Metaverse -- 4.5 Alterations in Educational Multiverse -- 5 Conclusion and Way Forward -- References -- Tuning Functional Link Artificial Neural Network for Software Development Effort Estimation -- 1 Introduction -- 2 Functional Link ANN-based SDEE -- 2.1 Justification of the Use of Chebyshev Polynomial as the Orthogonal Basis Function -- 3 Swarm Intelligence-Based Learning Algorithms for the CFLANN -- 3.1 Classical PSO -- 3.2 Improved PSO Technique -- 3.3 Adaptive PSO -- 3.4 GA -- 3.5 BP -- 4 Performance Evaluation Metrics -- 5 Description of the Dataset -- 6 Experiments and Results -- 7 Conclusion and Future Work -- References -- METBAG - A Web Based Business Application -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps and Solutions -- 2.2 Deep Neural Networks (DNN) and LSTM -- 3 Architecture of the System -- 3.1 Architecture of the User Side of the System -- 3.2 Architecture of the Admin Side of the System -- 4 Workflow Diagrams -- 5 Procedures -- 5.1 Procedure: Price Prediction -- 5.2 Procedure: Password Security -- 5.3 Procedure: Dashboard -- 6 Result Analysis -- 6.1 Price Prediction. , 6.2 Password Security -- 7 Conclusions and Future Work -- References -- Designing Smart Voice Command Interface for Geographic Information System -- 1 Introduction -- 1.1 Review of Literature on Voice Command Interface -- 2 Design and Implementation -- 2.1 Review of Literature on Voice Command Interface -- 2.2 Modules Used -- 2.3 Methodology -- 2.4 Implementation -- 3 Results and Discussion -- 3.1 Testing Model by Creating a War Zone like Environment -- 3.2 Spectrogram and Waveform Samples for Spoken Voice -- 3.3 Comparative Analysis Based on Word Error Rate -- 4 Conclusion -- References -- Smart Garbage Classification -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps in Literature -- 3 System Details -- 3.1 Waste Scanning Through Camera -- 3.2 Waste is Segregated and the Lid Opens -- 3.3 Moving of Hands and Trash Being Put into Respective Compartment -- 4 Component Modules and Description -- 5 Algorithmic Steps -- 6 Result and Analysis -- 7 Conclusions -- References -- Optical Sensor Based on MicroSphere Coated with Agarose for Heavy Metal Ion Detection -- 1 Introduction -- 2 Sensing Principle -- 3 Sensor Design -- 4 Results and Discussions -- 5 Conclusion -- References -- Influential Factor Finding for Engineering Student Motivation -- 1 Introduction -- 2 Related Studies -- 3 Experiment -- 3.1 Logistic Regression -- 4 Discussion -- 5 Conclusion -- References -- Prediction of Software Reliability Using Particle Swarm Optimization -- 1 Introduction -- 2 Related Work -- 3 Reliability Prediction Algorithm Using PSO -- 4 Experimental Result and Comparison -- 5 Conclusions -- References -- An Effective Optimization of EMG Based Artificial Prosthetic Limbs -- 1 Introduction -- 2 Literature Review -- 3 Design and Manufacturing -- 3.1 Cad Model -- 3.2 Manufacturing and Assembly -- 4 Electrical Components and Design -- 4.1 Electromyography Sensing. , 5 Artificial Intelligence -- 5.1 Gesture Recognition -- 5.2 Grasping Capacity (According to Size) -- 5.3 Analysis of EMG Signals -- 6 Conclusion -- References -- Communications -- Performance Analysis of Fading Channels in a Wireless Communication -- 1 Introduction -- 2 Fading Channels -- 2.1 Performance Analysis of Rayleigh Fading -- 2.2 Description of the Performance of Rician Fading Channel -- 2.3 Performance Analysis of NAKAGAMI-M Fading Channel. -- 3 Experimentation and Result Analysis -- 3.1 Simulation and Discussion of Rayleigh Fading Channel -- 3.2 Simulation Results of Rician Fading Channel -- 3.3 Simulation Results of Nakagami-M Fading Channel -- 4 Conclusion -- References -- Power Conscious Clustering Algorithm Using Fuzzy Logic in Wireless Sensor Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 4 Simulation Setup and Evaluation -- 5 Conclusions -- References -- Cryptanalysis on ``An Improved RFID-based Authentication Protocol for Rail Transit'' -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Organization of the Paper -- 2 Preliminary -- 2.1 Secure Requirements -- 2.2 Threat Model -- 3 Review of Zhu et al.'s Protocol -- 3.1 Set up Phase -- 3.2 Authentication Phase -- 4 Weakness of Zhu et al.'s Protocol -- 4.1 Known Session-Specific Temporary Information Attack -- 4.2 Lack of Scalability -- 5 Conclusion -- References -- A Novel Approach to Detect Rank Attack in IoT Ecosystem -- 1 Introduction -- 2 Background -- 2.1 Generic IoT Network Architecture -- 2.2 RPL Protocol -- 2.3 Rank Attack in IoT -- 2.4 IDS for IoT Ecosystem -- 3 Related Work -- 4 Proposed Security Approach -- 4.1 Proposed Approach Assumption -- 4.2 Security Model -- 4.3 Proposed Rank Attack Detection Solution -- 5 Experiments and Results Analysis -- 5.1 Setup and Execution of Experiments. , 5.2 After Proposed Security Solution Implementation Performance Analysis -- 5.3 Comparison of the Suggested Security Solution to Similar Works -- 6 Conclusion -- References -- Energy Efficient Adaptive Mobile Wireless Sensor Network in Smart Monitoring Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Mobile Sensor Node Architecture -- 4 Simulation and Result Analysis -- 4.1 Simulation Set Up -- 4.2 Experimental Analysis -- 5 Conclusion -- References -- Orthogonal Chirp Division Multiplexing: An Emerging Multi Carrier Modulation Scheme -- 1 Introduction -- 2 Compatibility with OFDM -- 3 Computational Complexity -- 3.1 Computational Complexity of OCDM -- 3.2 Computational Complexity of OFDM -- 4 Applications of OCDM -- 4.1 OCDM for Wireless Communication -- 4.2 OCDM for Optical Fiber Communication -- 4.3 OCDM for IM/DD Based Short Reach Systems -- 4.4 OCDM for Underwater Acoustic Communication -- 4.5 OCDM for Baseband Data Communication -- 4.6 OCDM for MIMO Communication -- 5 Simulation Results -- 6 Conclusion -- References -- Machine Learning and Data Analytics -- COVID-19 Outbreak Estimation Approach Using Hybrid Time Series Modelling -- 1 Introduction -- 2 Background -- 2.1 LSTM Network for Modelling Time Series -- 2.2 ARIMA Model -- 2.3 Seasonal ARIMA Model -- 3 Proposed Model -- 4 Implementation and Results Discussion -- 4.1 Prediction Using LSTM Model -- 4.2 Prediction Using ARIMA Model -- 4.3 Prediction Using Hybrid Model -- 5 Conclusion -- References -- Analysis of Depression, Anxiety, and Stress Chaos Among Children and Adolescents Using Machine Learning Algorithms -- 1 Introduction -- 1.1 Background -- 1.2 Motivation and Objective of the Work -- 2 Literature Review -- 3 Methodology -- 3.1 Data Set Description -- 3.2 Implementation -- 4 Results and Discussion -- 4.1 Classification Results for Depression. , 4.2 Classification Results for Anxiety.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing AG,
    Schlagwort(e): Multimedia systems. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (130 pages)
    Ausgabe: 1st ed.
    ISBN: 9783319177441
    Serie: Smart Innovation, Systems and Technologies Series ; v.36
    DDC: 006.7
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- 1 Intelligent Interactive Multimedia Systems in Practice: An Introduction -- Abstract -- 1.1 Introduction -- 1.2 Chapters Included in the Book -- 1.3 Conclusion -- References -- 2 On the Use of Multi-attribute Decision Making for Combining Audio-Lingual and Visual-Facial Modalities in Emotion Recognition -- Abstract -- 2.1 Introduction -- 2.2 Related Work -- 2.2.1 Multi-attribute Decision Making -- 2.3 Aims and Settings of the Empirical Studies -- 2.3.1 Elicitation of Emotions and Creation of Databases -- 2.3.2 Creation of Databases of Known Expressions of Emotions -- 2.3.3 Analysis of Recognisability of Emotions by Human Observers -- 2.4 Empirical Study for Audio-Lingual Emotion Recognition -- 2.4.1 The Experimental Educational Application for Elicitation of Emotions -- 2.4.2 Audio-Lingual Modality Analysis -- 2.5 Empirical Study for Visual-Facial Emotion Recognition -- 2.5.1 Visual-Facial Empirical Study on Subjects -- 2.5.2 Visual-Facial Empirical Study by Human Observers -- 2.6 Discussion and Comparison of the Results from the Empirical Studies -- 2.7 Combining the Results from the Empirical Studies Through MADM -- 2.8 Discussion and Conclusions -- References -- 3 Cooperative Learning Assisted by Automatic Classification Within Social Networking Services -- Abstract -- 3.1 Introduction -- 3.2 Related Work -- 3.2.1 Social Networking Services -- 3.2.2 Intelligent Computer-Assisted Language Learning -- 3.3 Algorithm of the System Functioning -- 3.3.1 Description of Automatic Classification -- 3.3.2 Optimization Objective and Its Definition -- 3.3.3 Initialization of Centroids -- 3.3.4 Incorporation of Automatic Classification -- 3.4 General Overview of the System -- 3.5 Evaluation of the System -- 3.6 Conclusions and Future Work -- References. , 4 Improving Peer-to-Peer Communication in e-Learning by Development of an Advanced Messaging System -- Abstract -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Data Analysis System Design -- 4.4 Experimental Results -- 4.5 Conclusions and Future Work -- References -- 5 Fuzzy-Based Digital Video Stabilization in Static Scenes -- Abstract -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Method of Frame Deblurring -- 5.4 Fuzzy-Based Video Stabilization Method -- 5.4.1 Estimation of Local Motion Vectors -- 5.4.2 Smoothness of GMVs Building -- 5.4.3 Static Scene Alignment -- 5.5 Experimental Results -- 5.6 Conclusion -- References -- 6 Development of Architecture, Information Archive and Multimedia Formats for Digital e-Libraries -- Abstract -- 6.1 Introduction -- 6.2 Related Work -- 6.3 Overview of Standards and Document Formats -- 6.4 Requirements and Objectives -- 6.5 Proposed Architecture of Digital e-Library Warehouse -- 6.6 Proposed EPUB Format Extensions -- 6.7 Client Software Design and Researches of Vulnerability -- 6.8 Conclusion -- References -- 7 Layered Ontological Image for Intelligent Interaction to Extend User Capabilities on Multimedia Systems in a Folksonomy Driven Environment -- Abstract -- 7.1 Introduction -- 7.2 Human Based Computation -- 7.2.1 Motivation of Human Contribution -- 7.3 Background of Related Work -- 7.3.1 Object Tracking -- 7.4 Dynamic Learning Ontology Structure -- 7.4.1 Richer Semantics of Attributes -- 7.4.2 Object on Layered Representation -- 7.4.3 Semantic Attributes -- 7.4.4 Attribute Bounding Box Position -- 7.4.5 Attributes Extraction and Sentiment Analysis -- 7.4.6 Folksodriven Bounding Box Notation -- 7.5 Image Analysis and Feature Selection -- 7.5.1 Object Position Detection -- 7.6 Previsions on Ontology Structure -- 7.7 A Case Study: In-Video Advertisement -- 7.7.1 In-Video Advertisement Functionality. , 7.7.2 Web GRP -- 7.7.3 Folksodriven Ontology Prediction for Advertisement -- 7.7.4 In-Video Advertisement Validation -- 7.8 Relevant Resources -- 7.9 Conclusion -- References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing AG,
    Schlagwort(e): Machine learning. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (552 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030156282
    Serie: Learning and Analytics in Intelligent Systems Series ; v.1
    DDC: 006.31
    Sprache: Englisch
    Anmerkung: Intro -- Foreword -- Preface -- Contents -- 1 Applications of Learning and Analytics in Intelligent Systems -- References -- Learning and Analytics in Intelligent Medical Systems -- 2 A Comparison of Machine Learning Techniques to Predict the Risk of Heart Failure -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Data and Methods -- 2.3.1 Dataset -- 2.3.2 Evaluation Process -- 2.3.3 Weka -- 2.4 Overview of Proposed Systems -- 2.4.1 Logistic Regression -- 2.4.2 Decision Tree -- 2.4.3 Random Forest -- 2.4.4 K-Nearest Neighbor -- 2.4.5 Artificial Neuronal Network -- 2.4.6 SVM -- 2.4.7 Naïve Bayes -- 2.4.8 OneR -- 2.4.9 ZeroR -- 2.4.10 Hybrid -- 2.5 Comparison Results -- 2.6 Conclusions -- References -- 3 Differential Gene Expression Analysis of RNA-seq Data Using Machine Learning for Cancer Research -- 3.1 Introduction -- 3.2 Materials and Methods -- 3.2.1 RNAseq -- 3.2.2 Classical Approach -- 3.2.3 Machine Learning -- 3.2.4 Comparative Workflow -- 3.3 Code and Results of an Analysis with Real Data -- 3.3.1 Loading Packages -- 3.3.2 Loading and Searching the Data from TCGA -- 3.3.3 Patient Selection -- 3.3.4 Dependent Variable Definition -- 3.3.5 Biological Gene Filter -- 3.3.6 Graphics -- 3.3.7 Classical Statistical Analysis -- 3.3.8 Machine Learning Analysis -- 3.4 Conclusions -- References -- 4 Machine Learning Approaches for Pap-Smear Diagnosis: An Overview -- 4.1 Introduction -- 4.2 Cervical Cancer and Pap-Test -- 4.3 The Pap-Smear Databases -- 4.3.1 A Basic Data Analysis of New Data -- 4.4 The Used Methodologies -- 4.4.1 Adaptive Network-Based Fuzzy Inference System (ANFIS) -- 4.4.2 Artificial Neural Networks -- 4.4.3 Heuristic Classification -- 4.4.4 Minimum Distance Classification -- 4.4.5 Hard C-Means Clustering -- 4.4.6 Fuzzy C-Means Clustering -- 4.4.7 Gustafson and Kessel Clustering -- 4.4.8 k-Nearest Neighborhood Classification. , 4.4.9 Weighted k-Nearest Neighborhood Classification -- 4.4.10 Tabu Search -- 4.4.11 Genetic Programming -- 4.4.12 Ant Colony -- 4.5 The Pap-Smear Classification Problem -- 4.5.1 Classification with ANFIS -- 4.5.2 Heuristic Classification Based on GP -- 4.5.3 Classification Using Defuzzification Methods -- 4.5.4 Direct and Hierarchical Classification -- 4.5.5 Classification Using Feed-Forward Neural Network -- 4.5.6 Nearest Neighborhood Classification Based on GP Feature Selection -- 4.5.7 Nearest Neighborhood Classification Using Tabu Search for Feature Selection -- 4.5.8 Nearest Neighborhood Classification Using ACO for Feature Selection -- 4.5.9 Minimum Distance Classifier -- 4.6 Conclusion and Future Work -- References -- Learning and Analytics in Intelligent Power Systems -- 5 Multi-kernel Analysis Paradigm Implementing the Learning from Loads Approach for Smart Power Systems -- 5.1 Introduction -- 5.2 Background -- 5.2.1 Kernel Machines -- 5.2.2 Gaussian Processes -- 5.3 Multi-kernel Paradigm for Load Analysis -- 5.3.1 Problem Statement -- 5.3.2 Multi-kernel Paradigm -- 5.4 Results -- 5.4.1 Problem Statement -- 5.4.2 Further Results -- 5.5 Conclusion and Future Work -- References -- 6 Conceptualizing and Measuring Energy Security: Geopolitical Dimensions, Data Availability, Quantitative and Qualitative Methods -- 6.1 Preamble -- 6.1.1 Structure of Chapter -- 6.2 Review of Energy Security Literature -- 6.2.1 Brief History of Energy Security -- 6.2.2 Defining Security and Energy Security -- 6.2.3 Energy Security Since the 20th Century -- 6.2.4 Energy Security and Geopolitics -- 6.2.5 Dimensions of Energy Security -- 6.3 Methodology -- 6.3.1 Research Questions -- 6.4 Analyses and Results -- 6.4.1 Milestone Time Periods -- 6.4.2 Data -- 6.4.3 Measuring Energy Security -- 6.4.4 Creating a Geopolitical Energy Security Index. , 6.4.5 Using Cluster Analysis -- 6.4.6 Looking at Case Studies of Key Countries -- 6.4.7 Carrying Out Interviews of Energy Experts -- 6.4.8 Forecasting Energy Security -- 6.5 Closing Comments -- References -- Learning and Analytics in Performance Assessment -- 7 Automated Stock Price Motion Prediction Using Technical Analysis Datasets and Machine Learning -- 7.1 Introduction -- 7.2 Technical Analysis Synopsis -- 7.3 Machine Learning Component -- 7.3.1 SVM Algorithm -- 7.3.2 Adaptive Boost Algorithm -- 7.4 System Implementation -- 7.4.1 System Structure -- 7.4.2 Training Data Set -- 7.4.3 Selection of Machine Learning Algorithm and Implementation -- 7.4.4 Android Client Application -- 7.5 System Evaluation -- 7.6 Conclusions and Future Work -- References -- 8 Airport Data Analysis Using Common Statistical Methods and Knowledge-Based Techniques -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Airport Data Analysis -- 8.3.1 Data Collection and Cleansing -- 8.3.2 Case Study Description and Scope of Current Analysis -- 8.3.3 Demand Seasonality -- 8.3.4 International Passenger Connectivity Matrix -- 8.3.5 Weekly and Daily Airport Operating Patterns -- 8.3.6 Airplane Types and Associated Runway Length Requirements -- 8.4 Conclusions -- References -- 9 A Taxonomy and Review of the Network Data Envelopment Analysis Literature -- 9.1 Introduction -- 9.2 DMU's Internal Network Structures and Assessment Paradigms -- 9.3 Assessment Paradigms -- 9.3.1 Independent Assessments -- 9.3.2 Joint Assessments -- 9.4 Classification of Network DEA Studies -- 9.5 Conclusion -- References -- Learning and Analytics in Intelligent Safety and Emergency Response Systems -- 10 Applying Advanced Data Analytics and Machine Learning to Enhance the Safety Control of Dams -- 10.1 Introduction -- 10.2 The Data Lifecycle in the Safety Control of Concrete Dams. , 10.2.1 Raw Data Collection -- 10.2.2 Processing and Data Storage -- 10.2.3 Data Quality Assessment and Outlier Detection -- 10.2.4 Data Analysis and Dam Safety Assessment Based on Quantitative Interpretation Models -- 10.2.5 Data Analysis and Dam Safety Assessment Based on Machine Learning Models -- 10.3 Data Analysis and Data Prediction Using Deep Learning Models-An Overview -- 10.4 Adopted Problem Solving Process-The Design Science Research Methodology -- 10.5 Proposed Methodology-Adding Value to the Interpretation of the Monitored Dam Behaviour Through the Use of Deep Learning Models -- 10.6 Demonstration and Evaluation-Assessment and Interpretation of the Monitored Structural Behaviour of a Concrete Dam During Its Operation Phase -- 10.6.1 The Case Study-The Alto Lindoso Dam -- 10.6.2 The Dataset-Horizontal Displacements Measured by the Pendulum Method -- 10.6.3 Main Results and Discussion -- 10.7 Final Remarks -- References -- 11 Analytics and Evolving Landscape of Machine Learning for Emergency Response -- 11.1 Introduction -- 11.1.1 Emergency Management -- 11.1.2 Machine Learning -- 11.1.3 Scope and Organizations -- 11.2 Applications of Machine Learning in Emergency Response -- 11.2.1 Machine Learning Techniques for Emergency Management Cycles -- 11.2.2 Event Prediction -- 11.2.3 Warning Systems -- 11.2.4 Event Detection and Tracking -- 11.2.5 Situational Awareness -- 11.2.6 Emergency Evaluation -- 11.2.7 Crowdsourcing -- 11.3 Analysis of Emergency Data -- 11.3.1 Big Data in Emergency Management -- 11.3.2 Data Collection -- 11.3.3 Information Extraction and Filtering -- 11.3.4 Data Integration -- 11.3.5 Applications for Data Analysis in Emergency -- 11.4 Challenges and Opportunities of Machine Learning in Response -- 11.4.1 Data Collection -- 11.4.2 Information Extraction -- 11.4.3 Data Filtering -- 11.4.4 Data Integration. , 11.5 Crowdsourcing in Emergency Management -- 11.5.1 Crowdsourcing with Machine Learning for Emergency Management -- 11.5.2 Example: Crowdsourcing and Machine Learning for Tracking Emergency -- 11.6 Conclusions -- References -- Learning and Analytics in Intelligent Social Media -- 12 Social Media Analytics, Types and Methodology -- 12.1 Social Networks and Analytics -- 12.1.1 Descriptive Analytics -- 12.1.2 Diagnostic Analytics -- 12.1.3 Predictive Analytics -- 12.1.4 Prescriptive Analytics -- 12.2 Introduction to Social Network Mining -- 12.3 Data Structure -- 12.3.1 Structured Data -- 12.3.2 Semi-structured Data -- 12.3.3 Unstructured Data -- 12.4 Data Quality -- 12.4.1 Noise -- 12.4.2 Outliers -- 12.4.3 Missing Values -- 12.4.4 Duplicate Data -- 12.5 Data Preprocessing -- 12.5.1 Aggregation -- 12.5.2 Discretization -- 12.5.3 Feature Selection -- 12.5.4 Feature Extraction -- 12.5.5 Sampling -- 12.6 Network Modeling -- 12.6.1 Real World Networks -- 12.6.2 Random Graphs -- 12.6.3 Small World Model -- 12.6.4 Preferential Attachment Model -- 12.7 Network Schemas -- 12.7.1 Multi-relational Network with Single Typed Objects -- 12.7.2 Bipartite Network -- 12.7.3 Star-Schema Network -- 12.7.4 Multiple-hub Network -- 12.8 Task Categorization -- 12.9 Machine Learning -- 12.9.1 Supervised Learning -- 12.9.2 Unsupervised Learning -- 12.10 Conclusions -- References -- 13 Machine Learning Methods for Opinion Mining In text: The Past and the Future -- 13.1 Introduction -- 13.2 Terminology -- 13.3 Early Projects -- 13.4 The Fascinating Opportunities that Sentiment Analysis Raises -- 13.5 Natural Language Processing for Sentiment Analysis -- 13.5.1 Affective Information for Sentiment Analysis -- 13.5.2 Corpora Annotated for Sentiment Analysis Tasks -- 13.5.3 Distributional Semantics and Sentiment Analysis. , 13.6 Traditional Models Based on Lexica and Feature Engineering.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing AG,
    Schlagwort(e): Self-help devices for people with disabilities. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (317 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030871321
    Serie: Learning and Analytics in Intelligent Systems Series ; v.28
    DDC: 681.761
    Sprache: Englisch
    Anmerkung: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Advances in Assistive Technologies -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Advances in Assistive Technologies in Healthcare -- 2 Applications of AI in Healthcare and Assistive Technologies -- 2.1 Introduction -- 2.2 Healthcare and Biomedical Research -- 2.2.1 Controlled Monitoring Environment -- 2.2.2 Evolving Healthcare Techniques -- 2.2.3 Diagnosis -- 2.3 Assistive Technologies -- 2.3.1 Smart Homes and Cities -- 2.3.2 Assistive Robotics -- 2.4 Analysis and Forecasting -- 2.5 Conclusions -- References -- 3 A Research Agenda for Dementia Care: Prevention, Risk Mitigation and Personalized Interventions -- 3.1 Introduction -- 3.2 Mild Behavioral Impairments (MBI) and Dementia -- 3.3 Biometric Data -- 3.4 Caring for Caregivers -- 3.5 Tests -- 3.6 Conclusions -- References -- 4 Machine Learning and Finite Element Methods in Modeling of COVID-19 Spread -- 4.1 Introduction -- 4.1.1 Physiology of Human Respiratory System -- 4.1.2 Spreading of SARS-CoV-2 Virus Infection -- 4.1.3 Machine Learning for SARS-CoV-2 -- 4.2 Methods -- 4.2.1 Finite Element Method for Airways and Lobes -- 4.2.2 Machine Learning Method -- 4.3 Results -- 4.3.1 Simulation of Virus Spreading by Finite Element Analysis -- 4.3.2 Machine Learning Results -- 4.4 Conclusions -- References -- Part II Advances in Assistive Technologies in Medical Diagnosis -- 5 Towards Personalized Nutrition Applications with Nutritional Biomarkers and Machine Learning -- 5.1 Introduction -- 5.1.1 Summary -- 5.1.2 Chapter Synopsis -- 5.1.3 Goals and Perspective -- 5.2 Basic Concepts -- 5.2.1 Personalized Medicine -- 5.2.2 Next Generation Sequencing -- 5.2.3 Obesity -- 5.2.4 Nutritional Biomarkers -- 5.3 Neural Networks, Pattern Recognition and Datasets -- 5.3.1 Neural Network. , 5.3.2 Implementation Environment -- 5.3.3 Proposed System -- 5.4 Implementation and Evaluation of the Proposed System -- 5.4.1 Deep Back Propagation Neural Network -- 5.4.2 Standard Biochemistry Profile Neural Network (SBPNN) -- 5.4.3 Neural Network Dietary Profile -- 5.5 Conclusions and Future Research -- 5.5.1 Prevention -- 5.5.2 Modelling -- 5.5.3 Automation -- 5.5.4 Perspective -- 5.5.5 Discussion on Feature Research -- 5.6 Appendix -- References -- 6 Inductive Machine Learning and Feature Selection for Knowledge Extraction from Medical Data: Detection of Breast Lesions in MRI -- 6.1 Introduction -- 6.2 Detailed Literature Review -- 6.3 Presentation of the Data -- 6.3.1 Data Collection -- 6.3.2 Description of Variables -- 6.3.3 Dataset Preprocessing -- 6.4 Methodology -- 6.4.1 Modeling Methodology -- 6.4.2 Feature Selection Process -- 6.4.3 Classification Method -- 6.4.4 Validation Process -- 6.5 Modeling Approaches -- 6.5.1 Experimental Process -- 6.5.2 Experimental Results -- 6.6 Conclusions and Further Search -- Annex 6.1-Abbreviations -- Annex 6.2-Variables Frequency Charts (Original Dataset) -- Annex 6.3-Variables' Values Range -- Annex 6.4-Classification Tree (Benign or Malignant) -- References -- 7 Learning Paradigms for Neural Networks for Automated Medical Diagnosis -- 7.1 Introduction -- 7.2 Classical Artificial Neural Networks -- 7.3 Learning Paradigms -- 7.3.1 Evolutionary Computation Learning Paradigm -- 7.3.2 Bayesian Learning Paradigm -- 7.3.3 Markovian Stimulus-Sampling Learning Paradigm -- 7.3.4 Logistic Regression Paradigm -- 7.3.5 Ant Colony Optimization Learning Paradigm -- 7.4 Conclusions and Future Outlook -- References -- Part III Advances in Assistive Technologies in Mobility and Navigation -- 8 Smart Shoes for Assisting People: A Short Survey -- 8.1 Smart Shoes for People in Need. , 8.1.1 Smart Shoes for Visually Impaired People [6] -- 8.1.2 Smart Shoes for Blind Individuals [13] -- 8.1.3 IoT Based Wireless Smart Shoes and Energy Harvesting System [7] -- 8.1.4 Smart Shoes for Sensing Force [8] -- 8.1.5 Smart Shoes for Temperature and Pressure [9] -- 8.1.6 Smart Shoes in IoT [10] -- 8.1.7 Smart Shoes for People with Walking Disorders [23] -- 8.2 Special Purpose Smart Shoes -- 8.2.1 Smart Shoes with Triboelectric Nanogenerator [11] -- 8.2.2 Smart Shoes Gait Analysis [12] -- 8.2.3 Smart Shoes for Biomechanical Energy Harvesting [14] -- 8.2.4 Smart Shoes with Embedded Piezoelectric Energy Harvesting [15] -- 8.2.5 Pedestrian Navigation Using Smart Shoes with Markers [16] -- 8.2.6 Smart Shoes with 3D Tracking Capabilities [17] -- 8.2.7 Pedestrian's Safety with Smart Shoes Sensing [18] -- 8.2.8 Smart Shoes Insole Tech for Injury Prevention [19] -- 8.3 Maturity Evaluation of the Smart Shoes -- 8.4 Conclusion -- References -- 9 Re-Examining the Optimal Routing Problem from the Perspective of Mobility Impaired Individuals -- 9.1 Introduction -- 9.2 Literature Review -- 9.2.1 Mobility Aspects for People with Special Needs -- 9.3 Related Work -- 9.3.1 Miller-Tucker-Zemlin Formulation of the Traveling Salesman Problem -- 9.3.2 Dantzig-Fulkerson-Johnson Formulation of the Traveling Salesman Problem -- 9.4 The Optimal Routing Problem from the Perspective of Mobility Impaired Individuals -- 9.4.1 Measuring Route Scores Based on the Degree of Accessibility -- 9.4.2 Problem Statement: The Optimal Routing Problem from the Perspective of Mobility Impaired Individuals -- 9.4.3 The Proposed Solution Approach -- 9.5 The Experimental Results and Discussion -- 9.6 Conclusions -- References -- 10 Human Fall Detection in Depth-Videos Using Temporal Templates and Convolutional Neural Networks -- 10.1 Introduction -- 10.2 Proposed Method. , 10.3 Experiments, Results and Discussion -- 10.3.1 SDU Fall Dataset -- 10.3.2 UP-Fall Detection Dataset -- 10.3.3 UR Fall Detection Dataset -- 10.3.4 MIVIA Action Dataset -- 10.4 Conclusions and Future Work -- 10.5 Compliance with Ethical Standards -- References -- 11 Challenges in Assistive Living Based on Tech Synergies: The Cooperation of a Wheelchair and A Wearable Device -- 11.1 Overall Description of the Challenges -- 11.2 Background and Significance -- 11.3 The Associated Research Challenges -- 11.3.1 Main Innovative Tasks -- 11.4 Discussion -- References -- 12 Human-Machine Requirements' Convergence for the Design of Assistive Navigation Software: Τhe Case of Blind or Visually Impaired People -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Methodology -- 12.3.1 Interviews with BVI People and Requirements Classification -- 12.3.2 Description of the Participants -- 12.3.3 Requirements Classification -- 12.4 Analysis of the Elicited Requirements -- 12.4.1 Elicited Requirements of the BVI -- 12.5 Discussion -- 12.6 Conclusion -- Appendix A -- References -- Part IV Advances in Privacy and Explainability in Assistive Technologies -- 13 Privacy-Preserving Mechanisms with Explainability in Assistive AI Technologies -- 13.1 Introduction -- 13.1.1 Data Ethics -- 13.1.2 Data Privacy -- 13.1.3 Data Security -- 13.2 AI Applications in Assistive Technologies -- 13.2.1 Explainable AI (XAI) -- 13.3 Data Privacy and Ethical Challenges for Assistive Technologies -- 13.3.1 Data Collection and Data Sharing -- 13.3.2 Secure and Responsible Data Sharing Framework -- 13.4 AI Assistive Technologies with Privacy Enhancing -- 13.4.1 Privacy-Preserving Mechanisms for AI Assistive Technologies -- 13.5 Discussions -- References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing AG,
    Schlagwort(e): Computer vision. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (135 pages)
    Ausgabe: 1st ed.
    ISBN: 9783319191355
    Serie: Intelligent Systems Reference Library ; v.92
    DDC: 620
    Sprache: Englisch
    Anmerkung: Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- 1 Introduction -- 1.1 Introduction to Recommender Systems -- 1.2 Formulation of the Recommendation Problem -- 1.2.1 The Input to a Recommender System -- 1.2.2 The Output of a Recommender System -- 1.3 Methods of Collecting Knowledge About User Preferences -- 1.3.1 The Implicit Approach -- 1.3.2 The Explicit Approach -- 1.3.3 The Mixing Approach -- 1.4 Motivation of the Book -- 1.5 Contribution of the Book -- 1.6 Outline of the Book -- References -- 2 Review of Previous Work Related to Recommender Systems -- 2.1 Content-Based Methods -- 2.2 Collaborative Methods -- 2.2.1 User-Based Collaborative Filtering Systems -- 2.2.2 Item-Based Collaborative Filtering Systems -- 2.2.3 Personality Diagnosis -- 2.3 Hybrid Methods -- 2.3.1 Adding Content-Based Characteristics to Collaborative Models -- 2.3.2 Adding Collaborative Characteristics to Content-Based Models -- 2.3.3 A Single Unifying Recommendation Model -- 2.3.4 Other Types of Recommender Systems -- 2.4 Fundamental Problems of Recommender Systems -- References -- 3 The Learning Problem -- 3.1 Introduction -- 3.2 Types of Learning -- 3.3 Statistical Learning -- 3.3.1 Classical Parametric Paradigm -- 3.3.2 General Nonparametric---Predictive Paradigm -- 3.3.3 Transductive Inference Paradigm -- 3.4 Formulation of the Learning Problem -- 3.5 The Problem of Classification -- 3.5.1 Empirical Risk Minimization -- 3.5.2 Structural Risk Minimization -- 3.6 Support Vector Machines -- 3.6.1 Basics of Support Vector Machines -- 3.6.2 Multi-class Classification Based on SVM -- 3.7 One-Class Classification -- 3.7.1 One-Class SVM Classification -- 3.7.2 Recommendation as a One-Class Classification Problem -- References -- 4 Content Description of Multimedia Data -- 4.1 Introduction -- 4.2 MPEG-7 -- 4.2.1 Visual Content Descriptors. , 4.2.2 Audio Content Descriptors -- 4.3 MARSYAS: Audio Content Features -- 4.3.1 Music Surface Features -- 4.3.2 Rhythm Features and Tempo -- 4.3.3 Pitch Features -- References -- 5 Similarity Measures for Recommendations Based on Objective Feature Subset Selection -- 5.1 Introduction -- 5.2 Objective Feature-Based Similarity Measures -- 5.3 Architecture of MUSIPER -- 5.4 Incremental Learning -- 5.5 Realization of MUSIPER -- 5.5.1 Computational Realization of Incremental Learning -- 5.6 MUSIPER Operation Demonstration -- 5.7 MUSIPER Evaluation Process -- 5.8 System Evaluation Results -- References -- 6 Cascade Recommendation Methods -- 6.1 Introduction -- 6.2 Cascade Content-Based Recommendation -- 6.3 Cascade Hybrid Recommendation -- 6.4 Measuring the Efficiency of the Cascade Classification Scheme -- References -- 7 Evaluation of Cascade Recommendation Methods -- 7.1 Introduction -- 7.2 Comparative Study of Recommendation Methods -- 7.3 One-Class SVM---Fraction: Analysis -- 8 Conclusions and Future Work -- 8.1 Summary and Conclusions -- 8.2 Current and Future Work.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...