GLORIA

GEOMAR Library Ocean Research Information Access

You have 0 saved results.
Mark results and click the "Add To Watchlist" link in order to add them to this list.
feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Software engineering. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (342 pages)
    Edition: 1st ed.
    ISBN: 9783031082023
    Series Statement: Artificial Intelligence-Enhanced Software and Systems Engineering Series ; v.2
    DDC: 005.1
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Handbook on Artificial Intelligence-Empowered Applied Software Engineering-VOL.1: Novel Methodologies to Engineering Smart Software Systems -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- Bibliography for Further Reading -- Part I Survey of Recent Relevant Literature -- 2 Synergies Between Artificial Intelligence and Software Engineering: Evolution and Trends -- 2.1 Introduction -- 2.2 Methodology -- 2.3 The Evolution of AI in Software Engineering -- 2.4 Top Authors and Topics -- 2.5 Trends in AI Applications to Software Engineering -- 2.5.1 Machine Learning and Data Mining -- 2.5.2 Knowledge Representation and Reasoning -- 2.5.3 Search and Optimisation -- 2.5.4 Communication and Perception -- 2.5.5 Cross-Disciplinary Topics -- 2.6 AI-Based Tools -- 2.7 Conclusion -- References -- Part II Artificial Intelligence-Assisted Software Development -- 3 Towards Software Co-Engineering by AI and Developers -- 3.1 Introduction -- 3.2 Software Development Support and Automation Level by Machine Learning -- 3.2.1 Project Planning: Team Composition -- 3.2.2 Requirements Engineering: Data-Driven Persona -- 3.2.3 Design: Detection of Design Patterns -- 3.2.4 Categorization of Initiative and Level of Automation -- 3.3 Quality of AI Application Systems and Software -- 3.3.1 Metamorphic Testing -- 3.3.2 Improving Explainability -- 3.3.3 Systems and Software Architecture -- 3.3.4 Integration of Goals, Strategies, and Data -- 3.4 Towards Software Co-Engineering by AI and Developers -- 3.5 Conclusion -- References -- 4 Generalizing Software Defect Estimation Using Size and Two Interaction Variables -- 4.1 Introduction -- 4.2 Background -- 4.3 A Proposed Approach -- 4.3.1 Selection of Sample Projects -- 4.3.2 Data Collection -- 4.3.3 The Scope and Decision to Go with 'Interaction' Variables. , 4.3.4 Data Analysis and Results Discussion -- 4.3.5 The Turning Point -- 4.3.6 Models Performance-Outside Sample -- 4.4 Conclusion and Limitations -- 4.5 Future Research Directions -- 4.6 Annexure-Model Work/Details -- References -- 5 Building of an Application Reviews Classifier by BERT and Its Evaluation -- 5.1 Background -- 5.2 The Process of Building a Machine Learning Model -- 5.3 Dataset -- 5.4 Preprocessing -- 5.5 Feature Engineering -- 5.5.1 Bag of Words (BoW) [4] -- 5.5.2 FastText [5, 6] -- 5.5.3 Bidirectional Encoder Representations from Transformers (BERT) Embedding [7] -- 5.6 Machine-Learning Algorithms -- 5.6.1 Naive Bayes -- 5.6.2 Logistic Regression -- 5.6.3 BERT -- 5.7 Training and Evaluation Methods -- 5.8 Results -- 5.9 Discussion -- 5.9.1 Comparison of Classifier Performances -- 5.9.2 Performance of the Naive Bayes Classifiers -- 5.9.3 Performance of the Logistic Regression Classifiers -- 5.9.4 Visualization of Classifier Attention Using the BERT -- 5.10 Threats to Validity -- 5.10.1 Labeling Dataset -- 5.10.2 Parameter Tuning -- 5.11 Summary -- References -- 6 Harmony Search-Enhanced Software Architecture Reconstruction -- 6.1 Introduction -- 6.2 Related Work -- 6.3 HS Enhanced SAR -- 6.3.1 SAR Problem -- 6.3.2 HS Algorithm -- 6.3.3 Proposed Approach -- 6.4 Experimentation -- 6.4.1 Test Problems -- 6.4.2 Competitor approaches -- 6.5 Results and Discussion -- 6.6 Conclusion and Future Work -- References -- 7 Enterprise Architecture-Based Project Model for AI Service System Development -- 7.1 Introduction -- 7.2 Related Work -- 7.3 AI Servie System and Enterprise Architecture -- 7.3.1 AI Service System -- 7.3.2 Enterprise Architecture and AI Service System -- 7.4 Modeling Business IT Alignment for AI Service System -- 7.4.1 Generic Business-AI Alignment Model -- 7.4.2 Comparison with Project Canvas Model. , 7.5 Business Analysis Method for Constructing Domain Specific Business-AI Alignment Model -- 7.5.1 Business Analysis Tables -- 7.5.2 Model Construction Method -- 7.6 Practice -- 7.6.1 Subject Project -- 7.6.2 Result -- 7.7 Discussion -- 7.8 Conclusion -- References -- Part III Software Engineering Tools to Develop Artificial Intelligence Applications -- 8 Requirements Engineering Processes for Multi-agent Systems -- 8.1 Introduction -- 8.2 Background -- 8.2.1 Agents, Multiagent Systems, and the BDI Model -- 8.2.2 Requirements Engineering -- 8.3 Techniques and Process of Requirements Engineering for Multiagent Systems -- 8.3.1 Elicitation Requirements Techniques for Multiagent Systems -- 8.3.2 Requirements Engineering Processes for Multiagent Systems -- 8.3.3 Requirements Validation -- 8.4 Conclusion -- References -- 9 Specific UML-Derived Languages for Modeling Multi-agent Systems -- 9.1 Introduction -- 9.2 Backgroud -- 9.2.1 UML -- 9.2.2 Agents, Multiagent Systems, and the BDI Model -- 9.2.3 BDI Models -- 9.3 AUML-Agent UML -- 9.4 AORML-Agent-Object-Relationship Modeling Language -- 9.4.1 Considerations About AORML -- 9.5 AML-Agent Modeling Language -- 9.5.1 Considerations About AML -- 9.6 MAS-ML-Multiagent System Modeling Language -- 9.6.1 Considerations About MAS-ML -- 9.7 SEA-ML-Semantic Web Enabled Agent Modeling Language -- 9.7.1 Considerations -- 9.8 MASRML-A Domain-Specific Modeling Language for Multi-agent Systems Requirements -- 9.8.1 Considerations -- References -- 10 Methods for Ensuring the Overall Safety of Machine Learning Systems -- 10.1 Introduction -- 10.2 Related Work -- 10.2.1 Safety of Machine Learning Systems -- 10.2.2 Conventional Safety Model -- 10.2.3 STAMP and Its Related Methods -- 10.2.4 Standards for Software Lifecycle Processes and System Lifecycle Processes -- 10.2.5 Social Technology Systems and Software Engineering. , 10.2.6 Software Layer Architecture -- 10.2.7 Assurance Case -- 10.2.8 Autonomous Driving -- 10.3 Safety Issues in Machine Learning Systems -- 10.3.1 Eleven Reasons Why We Cannot Release Autonomous Driving Cars -- 10.3.2 Elicitation Method -- 10.3.3 Eleven Problems on Safety Assessment for Autonomous Driving Car Products -- 10.3.4 Validity to Threats -- 10.3.5 Safety Issues of Automatic Operation -- 10.3.6 Task Classification -- 10.3.7 Unclear Assurance Scope -- 10.3.8 Safety Assurance of the Entire System -- 10.3.9 Machine Learning and Systems -- 10.4 STAMP S& -- S Method -- 10.4.1 Significance of Layered Modeling of Complex Systems -- 10.4.2 STAMP S& -- S and Five Layers -- 10.4.3 Scenario -- 10.4.4 Specification and Standard -- 10.5 CC-Case -- 10.5.1 Definition of CC-Case -- 10.5.2 Technical Elements of CC-Case -- 10.6 Measures for Autonomous Driving -- 10.6.1 Relationship Between Issues and Measures Shown in This Section -- 10.6.2 Measure 1: Analyze Various Quality Attributes in Control Action Units -- 10.6.3 Measure 2: Modeling the Entire System -- 10.6.4 Measure 3: Scenario Analysis and Specification -- 10.6.5 Measure 4: Socio-Technical System -- 10.7 Considerations in Level 3 Autonomous Driving -- 10.7.1 Example of Autonomous Driving with the 5-layered Model of STAMP S& -- S -- 10.8 Conclusion -- References -- 11 MEAU: A Method for the Evaluation of the Artificial Unintelligence -- 11.1 Introduction -- 11.2 Machine Learning and Online Unintelligence: Improvisation or Programming? -- 11.3 The New Paradigm of Information from Digital Media and Social Networks -- 11.4 Numbers, Images and Texts: Sources of Errors, Misinformation and Unintelligence -- 11.5 MEAU: A Method for the Evaluation of the Artificial Unintelligence -- 11.6 Results -- 11.7 Lessons Learned -- 11.8 Conclusions -- Appendix 1 -- Appendix 2 -- Appendix 3 -- Appendix 4. , References -- 12 Quantum Computing Meets Artificial Intelligence: Innovations and Challenges -- 12.1 Introduction -- 12.1.1 Benefits of Quantum Computing for AI -- 12.2 Quantum Computing Motivations -- 12.2.1 What Does ``Quantum'' Mean? -- 12.2.2 The Wave-Particle Duality -- 12.2.3 Qubit Definition -- 12.2.4 The Schrödinger Equation -- 12.2.5 Superposition -- 12.2.6 Interference -- 12.2.7 Entanglement -- 12.2.8 Gate-Based Quantum Computing -- 12.3 Quantum Machine Learning -- 12.3.1 Variational Quantum Algorithms -- 12.3.2 Data Encoding -- 12.3.3 Quantum Neural Networks -- 12.3.4 Quantum Support Vector Machine -- 12.3.5 Variational Quantum Generator -- 12.4 Quantum Computing Limitations and Challenges -- 12.4.1 Scalability and Connectivity -- 12.4.2 Decoherence -- 12.4.3 Error Correction -- 12.4.4 Qubit Control -- 12.5 Quantum AI Software Engineering -- 12.5.1 Hybrid Quantum-Classical Frameworks -- 12.5.2 Friction-Less Development Environment -- 12.5.3 Quantum AI Software Life Cycle -- 12.6 A new Problem Solving Approach -- 12.6.1 Use Case 1: Automation and Transportation Sector -- 12.6.2 Use Case 2: Food for the Future World -- 12.6.3 Use Case 3: Cheaper Reliable Batteries -- 12.6.4 Use Case 4: Cleaner Air to Breathe -- 12.6.5 Use Case 5: AI-Driven Financial Solutions -- 12.7 Summary and Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Digital communications. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (438 pages)
    Edition: 1st ed.
    ISBN: 9783031232336
    Series Statement: Communications in Computer and Information Science Series ; v.1737
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organization -- Keynote Address -- Industry 4.0 Meets Data Science: The Pathway for Society 5.0 -- Continual Learning for Intelligent Systems in Changing Environments -- Where is the Research on Evolutionary Multi-objective Optimization Heading to? -- Designing a Software Framework Based on an Object Detection Model and a Fuzzy Logic System for Weed Detection and Pasture Assessment -- An Overview of Machine Learning Based Intelligent Computing and Applications -- Semisupervised Learning with Spatial Information and Granular Neural Networks -- IoT Based General Purpose Sensing Application for Smart Home Environment -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Contents -- Intelligent Computing -- Ensemble Learning Model for EEG Based Emotion Classification -- 1 Introduction -- 2 Related Works -- 3 System Model and Methodology -- 3.1 Feature Extraction -- 3.2 Deep Learning Model Implementation -- 4 Dataset Description -- 5 Experimental Setup and Results -- 6 Conclusion -- References -- Foundation for the Future of Higher Education or 'Misplaced Optimism'? Being Human in the Age of Artificial Intelligence -- 1 Introduction -- 2 Education Using Artificial Intelligence (AIEd) -- 3 Methods -- 3.1 Search Strategy -- 3.2 Reliability of Agreement Amongst Raters -- 3.3 Collection, Codification, and Analysis of Data -- 3.4 Limitations -- 4 Results -- 4.1 Forecasting and Characterising -- 4.2 Curriculum Technology that Uses Artificial Intelligence -- 4.3 Constant Re-Evaluation -- 4.4 A System that May Change to Fit the USER'S Needs -- 5 Conclusion and Way Forward -- References -- AI Enabled Internet of Medical Things Framework for Smart Healthcare -- 1 Introduction -- 2 AI Based IoMT Health Domains. , 3 AI Enabled IoMT Architectures for Smart Healthcare Systems -- 4 Research Challenges of AI Enabled Smart Healthcare Systems -- 4.1 Data Accuracy -- 4.2 Data Security -- 4.3 System Efficiency -- 4.4 Quality of Service -- 5 Conclusion -- References -- Metaverse and Posthuman Animated Avatars for Teaching-Learning Process: Interperception in Virtual Universe for Educational Transformation -- 1 Introduction -- 2 Objectives of the Research and Knowledge Gap -- 3 Methods and Methodology -- 4 Results and Discussion -- 4.1 Educational Metaverse: A Categorical Analysis -- 4.2 A Wide Variety of Virtual Worlds for Use in Education -- 4.3 Situations for Learning, Tiers of Education, and VR Learning Environments -- 4.4 Students' Avatars (Digital Personas) in the Metaverse -- 4.5 Alterations in Educational Multiverse -- 5 Conclusion and Way Forward -- References -- Tuning Functional Link Artificial Neural Network for Software Development Effort Estimation -- 1 Introduction -- 2 Functional Link ANN-based SDEE -- 2.1 Justification of the Use of Chebyshev Polynomial as the Orthogonal Basis Function -- 3 Swarm Intelligence-Based Learning Algorithms for the CFLANN -- 3.1 Classical PSO -- 3.2 Improved PSO Technique -- 3.3 Adaptive PSO -- 3.4 GA -- 3.5 BP -- 4 Performance Evaluation Metrics -- 5 Description of the Dataset -- 6 Experiments and Results -- 7 Conclusion and Future Work -- References -- METBAG - A Web Based Business Application -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps and Solutions -- 2.2 Deep Neural Networks (DNN) and LSTM -- 3 Architecture of the System -- 3.1 Architecture of the User Side of the System -- 3.2 Architecture of the Admin Side of the System -- 4 Workflow Diagrams -- 5 Procedures -- 5.1 Procedure: Price Prediction -- 5.2 Procedure: Password Security -- 5.3 Procedure: Dashboard -- 6 Result Analysis -- 6.1 Price Prediction. , 6.2 Password Security -- 7 Conclusions and Future Work -- References -- Designing Smart Voice Command Interface for Geographic Information System -- 1 Introduction -- 1.1 Review of Literature on Voice Command Interface -- 2 Design and Implementation -- 2.1 Review of Literature on Voice Command Interface -- 2.2 Modules Used -- 2.3 Methodology -- 2.4 Implementation -- 3 Results and Discussion -- 3.1 Testing Model by Creating a War Zone like Environment -- 3.2 Spectrogram and Waveform Samples for Spoken Voice -- 3.3 Comparative Analysis Based on Word Error Rate -- 4 Conclusion -- References -- Smart Garbage Classification -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps in Literature -- 3 System Details -- 3.1 Waste Scanning Through Camera -- 3.2 Waste is Segregated and the Lid Opens -- 3.3 Moving of Hands and Trash Being Put into Respective Compartment -- 4 Component Modules and Description -- 5 Algorithmic Steps -- 6 Result and Analysis -- 7 Conclusions -- References -- Optical Sensor Based on MicroSphere Coated with Agarose for Heavy Metal Ion Detection -- 1 Introduction -- 2 Sensing Principle -- 3 Sensor Design -- 4 Results and Discussions -- 5 Conclusion -- References -- Influential Factor Finding for Engineering Student Motivation -- 1 Introduction -- 2 Related Studies -- 3 Experiment -- 3.1 Logistic Regression -- 4 Discussion -- 5 Conclusion -- References -- Prediction of Software Reliability Using Particle Swarm Optimization -- 1 Introduction -- 2 Related Work -- 3 Reliability Prediction Algorithm Using PSO -- 4 Experimental Result and Comparison -- 5 Conclusions -- References -- An Effective Optimization of EMG Based Artificial Prosthetic Limbs -- 1 Introduction -- 2 Literature Review -- 3 Design and Manufacturing -- 3.1 Cad Model -- 3.2 Manufacturing and Assembly -- 4 Electrical Components and Design -- 4.1 Electromyography Sensing. , 5 Artificial Intelligence -- 5.1 Gesture Recognition -- 5.2 Grasping Capacity (According to Size) -- 5.3 Analysis of EMG Signals -- 6 Conclusion -- References -- Communications -- Performance Analysis of Fading Channels in a Wireless Communication -- 1 Introduction -- 2 Fading Channels -- 2.1 Performance Analysis of Rayleigh Fading -- 2.2 Description of the Performance of Rician Fading Channel -- 2.3 Performance Analysis of NAKAGAMI-M Fading Channel. -- 3 Experimentation and Result Analysis -- 3.1 Simulation and Discussion of Rayleigh Fading Channel -- 3.2 Simulation Results of Rician Fading Channel -- 3.3 Simulation Results of Nakagami-M Fading Channel -- 4 Conclusion -- References -- Power Conscious Clustering Algorithm Using Fuzzy Logic in Wireless Sensor Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 4 Simulation Setup and Evaluation -- 5 Conclusions -- References -- Cryptanalysis on ``An Improved RFID-based Authentication Protocol for Rail Transit'' -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Organization of the Paper -- 2 Preliminary -- 2.1 Secure Requirements -- 2.2 Threat Model -- 3 Review of Zhu et al.'s Protocol -- 3.1 Set up Phase -- 3.2 Authentication Phase -- 4 Weakness of Zhu et al.'s Protocol -- 4.1 Known Session-Specific Temporary Information Attack -- 4.2 Lack of Scalability -- 5 Conclusion -- References -- A Novel Approach to Detect Rank Attack in IoT Ecosystem -- 1 Introduction -- 2 Background -- 2.1 Generic IoT Network Architecture -- 2.2 RPL Protocol -- 2.3 Rank Attack in IoT -- 2.4 IDS for IoT Ecosystem -- 3 Related Work -- 4 Proposed Security Approach -- 4.1 Proposed Approach Assumption -- 4.2 Security Model -- 4.3 Proposed Rank Attack Detection Solution -- 5 Experiments and Results Analysis -- 5.1 Setup and Execution of Experiments. , 5.2 After Proposed Security Solution Implementation Performance Analysis -- 5.3 Comparison of the Suggested Security Solution to Similar Works -- 6 Conclusion -- References -- Energy Efficient Adaptive Mobile Wireless Sensor Network in Smart Monitoring Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Mobile Sensor Node Architecture -- 4 Simulation and Result Analysis -- 4.1 Simulation Set Up -- 4.2 Experimental Analysis -- 5 Conclusion -- References -- Orthogonal Chirp Division Multiplexing: An Emerging Multi Carrier Modulation Scheme -- 1 Introduction -- 2 Compatibility with OFDM -- 3 Computational Complexity -- 3.1 Computational Complexity of OCDM -- 3.2 Computational Complexity of OFDM -- 4 Applications of OCDM -- 4.1 OCDM for Wireless Communication -- 4.2 OCDM for Optical Fiber Communication -- 4.3 OCDM for IM/DD Based Short Reach Systems -- 4.4 OCDM for Underwater Acoustic Communication -- 4.5 OCDM for Baseband Data Communication -- 4.6 OCDM for MIMO Communication -- 5 Simulation Results -- 6 Conclusion -- References -- Machine Learning and Data Analytics -- COVID-19 Outbreak Estimation Approach Using Hybrid Time Series Modelling -- 1 Introduction -- 2 Background -- 2.1 LSTM Network for Modelling Time Series -- 2.2 ARIMA Model -- 2.3 Seasonal ARIMA Model -- 3 Proposed Model -- 4 Implementation and Results Discussion -- 4.1 Prediction Using LSTM Model -- 4.2 Prediction Using ARIMA Model -- 4.3 Prediction Using Hybrid Model -- 5 Conclusion -- References -- Analysis of Depression, Anxiety, and Stress Chaos Among Children and Adolescents Using Machine Learning Algorithms -- 1 Introduction -- 1.1 Background -- 1.2 Motivation and Objective of the Work -- 2 Literature Review -- 3 Methodology -- 3.1 Data Set Description -- 3.2 Implementation -- 4 Results and Discussion -- 4.1 Classification Results for Depression. , 4.2 Classification Results for Anxiety.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Machine learning. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (204 pages)
    Edition: 1st ed.
    ISBN: 9783031223716
    Series Statement: Intelligent Systems Reference Library ; v.236
    DDC: 006.31
    Language: English
    Note: Intro -- Foreword -- References -- Preface -- Contents -- 1 Introduction to Fusion of Machine Learning Paradigms -- 1.1 Editorial -- References -- Part I Recent Application Areas of Fusion of Machine Learning Paradigms -- 2 Artificial Intelligence as Dual-Use Technology -- 2.1 Introduction -- 2.2 What Is DUT -- 2.3 AI: Concepts, Models and Technology -- 2.4 Agent-Based AI and Autonomous System -- 2.4.1 Basic Model of Agent-Based AI -- 2.4.2 Conceptual Model of Autonomous Weapon System -- 2.5 Dual-Use Technology and DARPA -- 2.5.1 Historical View and Role of DARPA -- 2.5.2 DARPA's Contribution to DUT R& -- D on AI -- 2.6 DARPA-Like Organizations in Major Countries -- 2.7 Dual-Use Dilemma -- 2.8 Concluding Remarks -- References -- 3 Diabetic Retinopathy Detection Using Transfer and Reinforcement Learning with Effective Image Preprocessing and Data Augmentation Techniques -- 3.1 Introduction -- 3.2 Background -- 3.2.1 Deep Learning for Diabetic Retinopathy -- 3.2.2 Image Preprocessing Techniques -- 3.2.3 Reinforcement Learning and Deep Learning -- 3.3 Data Augmentation Techniques -- 3.3.1 Traditional Data Augmentation -- 3.3.2 SMOTE-Based Data Augmentation -- 3.3.3 Data Augmentation Using Generative Adversarial Networks -- 3.4 Datasets of Eye Fundus Images -- 3.5 Transfer Learning Experiments -- 3.5.1 Dataset -- 3.5.2 Image Preprocessing -- 3.5.3 Image Augmentation -- 3.5.4 Deep Learning Experiments -- 3.5.5 Reinforcement Learning Experiments -- 3.6 Conclusion and Future Work -- References -- 4 A Novel Approach for Non-linear Deep Fuzzy Rule-Based Model and Its Applications in Biomedical Analyses -- 4.1 Introduction -- 4.2 Method -- 4.2.1 Preliminaries -- 4.2.2 Hierarchical Fuzzy Structure -- 4.2.3 Stacked Deep Fuzzy Rule-Based System (SD-FRBS) -- 4.2.4 Adaptation of the First-Order TSK Structure in SD-FRBS. , 4.2.5 Concatenated Deep Fuzzy Rule-Based System (CD-FRBS) -- 4.3 Data Description and Results -- 4.3.1 MIMIC-III Dataset -- 4.3.2 SD-FRBS as a Multivariate Regressor for Granger Causality Estimation-In EEG Connectivity Index Extraction -- 4.3.3 CD-FRBS in Staging Depression Severity -- 4.4 Discussion and Conclusion -- 4.4.1 Suggested Future Works -- References -- 5 Harmony Search-Based Approaches for Fine-Tuning Deep Belief Networks -- 5.1 Introduction -- 5.2 Theoretical Background -- 5.2.1 Deep Belief Networks -- 5.2.2 Harmony Search -- 5.3 Methodology -- 5.3.1 Datasets -- 5.3.2 Experimental Setup -- 5.4 Experimental Results -- 5.5 Conclusions -- References -- 6 Toward Smart Energy Systems: The Case of Relevance Vector Regression Models in Hourly Solar Power Forecasting -- 6.1 Introduction -- 6.2 Relevance Vector Regression -- 6.3 RVR Based Day Ahead Forecasting -- 6.4 Results -- 6.5 Conclusion -- References -- 7 Domain-Integrated Machine Learning for IC Image Analysis -- 7.1 Introduction -- 7.2 Hierarchical Multi-classifier System -- 7.2.1 Architecture of Hierarchical Multi-classifier System -- 7.2.2 Result and Discussion on Case Study -- 7.3 Deep Learning with Pseudo Labels -- 7.3.1 Methodology -- 7.3.2 Application to IC Image Analysis -- 7.4 Conclusions and Future Works -- References -- Part II Applications that Can Clearly Benefit from Fusion of Machine Learning Paradigms -- 8 Fleshing Out Learning Analytics and Educational Data Mining with Data and ML Pipelines -- 8.1 Introduction -- 8.2 Data and ML Pipelines -- 8.3 Related Work -- 8.4 An Automated EDM and LA Methodology -- 8.4.1 A Data Pipeline Scenario -- 8.4.2 An ML Pipeline Scenario -- 8.5 Experiments and Results -- 8.6 Conclusions and Future Work -- References -- 9 Neural Networks Based Throughput Estimation of Short Production Lines Without Intermediate Buffers -- 9.1 Introduction. , 9.2 Data Sets of i-Stage Production Line Problems -- 9.3 Deep Learning and Multilayer Perceptron -- 9.4 Experimental Process of Deep Learning Approach -- 9.5 Results of Deep Learning Approach -- 9.6 Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (406 pages)
    Edition: 1st ed.
    ISBN: 9783031054914
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.314
    DDC: 006.3
    Language: English
    Note: Intro -- Organization -- Preface -- Contents -- About the Editors -- Multimedia -- Reversible Data Hiding in Encrypted Image Based on MSB Inversion -- 1 Introduction -- 2 Related Works -- 2.1 Secret Embedding Procedure -- 2.2 Message Extracting and Image Recovery -- 3 The Proposed Method -- 3.1 Image Encryption and Secret Embedding -- 3.2 Message Extracting and Image Recovery -- 4 Experimental Result -- 5 Conclusion -- References -- Comments on the Visual Binary QR Code -- 1 Introduction -- 2 Schemes of Visual Binary QR Code -- 2.1 Unitag -- 2.2 QArt -- 2.3 Halftone QR Code -- 3 Comparisons -- 4 Conclusions -- References -- NLP-Based Hardware Solution for Censoring Audio on Over-the-Top (OTT) Media Services -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Hardware Architecture -- 3.2 Software Architecture -- 4 Experiments & -- Results -- 4.1 Application Components & -- Input Dataset -- 4.2 Accommodations for Lag -- 4.3 Results -- 5 Conclusion and Future Work -- References -- Efficient Steganographic Method Based on Modulo Cube -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Preliminary Phase -- 3.2 Embedding Phase -- 3.3 Extraction phase -- 4 Experimental Results -- 5 Conclusions -- References -- A High Capacity Reversible Data Hiding in Encrypted Images Using Multi-MSB Prediction and Huffman Coding -- 1 Introduction -- 2 Proposed Method -- 2.1 Apply the Huffman Tree Building Algorithm -- 2.2 Reduce Reference Bytes -- 2.3 Remove the Redundant Length Column -- 3 Experimental Results -- 3.1 Commonly Used Test Images -- 4 Conclusion -- References -- Reversible Data Hiding Based on Bidirectional Generalized Integer Transform -- 1 Introduction -- 2 Qiu et al. Scheme -- 3 Proposed Scheme -- 4 Experimental Results -- 5 Conclusions -- References -- Network and System Security (I). , A Prototype Design on Privacy-Preserving Outsourced Bayesian Network -- 1 Introduction -- 2 Preliminaries -- 3 System Model -- 4 Construction -- 4.1 Building Blocks -- 4.2 Round Trick -- 4.3 Main Protocol -- 5 Analysis and Discussions -- 6 Conclusions -- References -- The Security Challenge of Consumers' Mobile Payment -- 1 Introduction -- 2 Consumers' Mobile Payment Use Intention -- 3 Consumers' Mobile Payment Security -- 4 Research Methodology -- 4.1 Sample and Data Sources -- 4.2 Variables and Measures -- 4.3 Reliability Analysis -- 4.4 Validity Analysis -- 5 Results -- 5.1 The Structural Equation Modeling (SEM) Results for Mobile Payment Security-Mobile Payment Use Intention -- 5.2 The Impact of Consumers' Mobile Payment Security on Consumers' Mobile Payment Use Intention -- 6 Conclusions -- References -- Research on the Analysis of Key Attack Modes in a Wireless Environment -- 1 Introduction -- 2 The Proposed Scheme -- 2.1 Method Architecture -- 2.2 Test Flow Chart -- 2.3 Introduction to WPA2 Four-Way Handshakes Process -- 3 Analysis of Key Attack Modes -- 3.1 Dictionary Cracking Mode -- 3.2 Script Cracking Mode -- 3.3 Discussion and Comparison -- 4 Conclusion -- References -- Default Risk Prediction Using Random Forest and XGBoosting Classifier -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data -- 3.2 Data Cleaning -- 3.3 Exploratory Data Analysis -- 3.4 Feature Selection Method -- 3.5 Data Split & -- Sampling -- 3.6 Classification Models -- 4 Experiments -- 4.1 XGBoosting Classifier -- 4.2 Random Forest (RF) -- 5 Conclusion -- References -- An RFID Ownership Transfer Based on Multiple Owners with Different Weights -- 1 Introduction -- 2 The Proposed Method -- 2.1 The Initial Phase -- 2.2 The Ownership Transfer Request Phase -- 2.3 The Ownership Agreement Phase -- 2.4 The Ownership Transfer Phase. , 2.5 Mutual Authentication Between the TTP and the Tag -- 2.6 Tag Verification -- 3 Conclusion -- References -- Network and System Security (II) -- Comments on a Scalable Healthcare Authentication Protocol with Attack-Resilience and Anonymous Key-Agreement -- 1 Introduction -- 2 Review of Hajian et al.'s Scheme -- 2.1 System Setup Phase -- 2.2 Registration Phase -- 2.3 Authentication Phase -- 2.4 Password Change Phase -- 2.5 User Identity Change Phase -- 3 Security Analysis -- 3.1 Gateway Authentication Failure -- 3.2 Vulnerability to Denial-of-Service Attack -- 3.3 Failed Password Change and User Identity Change -- 3.4 Compromised User Anonymity and Untraceability -- 4 Conclusions -- References -- A LWE-Based Receiver-Deniable Encryption Scheme -- 1 Introduction -- 2 Related Works -- 2.1 Deniable Encryption -- 2.2 LWE-Based Encryption -- 3 Receiver-Deniable LWE-Based Encryption -- 3.1 Concept -- 3.2 Construction -- 4 Evaluation -- 4.1 Correctness -- 4.2 Deniability -- 5 Conclusion and Future Works -- References -- Privacy-Preserved Hierarchical Authentication and Key Agreement for AI-Enabled Telemedicine Systems -- 1 Introduction -- 2 Related Works -- 2.1 AI Systems -- 2.2 Telemedicine Systems -- 2.3 Chebyshev Chaotic Maps -- 3 Proposed Scheme -- 4 Security Analysis -- 4.1 Security of Secret Key -- 4.2 Session Key Confirmation and Security of Session Key -- 4.3 Mutual Authentication -- 4.4 Unforgeability -- 4.5 Without Assistance of Registration Center (RC) -- 5 Conclusion -- References -- Fuzzy C-Means Based Feature Selection Mechanism for Wireless Intrusion Detection -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Research Design -- 3.2 Difference of FCM Center Distances -- 3.3 Auto Encoder -- 3.4 Deep Neural Network -- 3.5 Data Preprocessing -- 4 Experimental Results -- 5 Conclusion -- References. , An Active User-Side Detector for Evil Twins -- 1 Introduction -- 2 System Principle -- 2.1 Monitor Mode -- 2.2 Retransmission and Forwarding -- 2.3 Principle -- 3 Evaluation -- 3.1 Time Efficiency -- 3.2 Limitations -- 3.3 Discussion -- 4 Conclusion -- References -- AI ad Big Data Analysis (I) -- Evaluation of Recurrent Neural Network Model Training for Health Care Suggestions -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 LSTM-Based Total Care Prediction System -- 3.2 Feature Selection -- 3.3 Feature Encoding -- 4 System Evaluation -- 4.1 Study Population -- 4.2 The Performance Comparison of Different RNNs -- 5 Conclusion -- References -- E-learning Behavior Analytics in the Curriculum of Big Data Visualization Application -- 1 Introduction -- 2 Teaching Materials Design and Research Methods -- 2.1 Participants and Teaching Environment -- 2.2 E-leaning Variables and Analyzing Methods -- 3 Results -- 3.1 Hotspots of Online Teaching Materials -- 3.2 E-learning Behavior Analysis -- 3.3 Data Mining and Modeling -- 4 Discussion and Conclusion -- 4.1 Hotspots -- 4.2 E-learning Behavior Analysis -- 4.3 Model Prediction -- References -- Malware Detection Based on Image Conversion -- 1 Introduction -- 2 Related Work -- 2.1 Review the Image Texture Analysis Method [1] -- 2.2 Review the Classification of Convolutional Neural Network (CNN) Method [12] -- 3 Proposed Method -- 3.1 System Architecture Diagram -- 3.2 Generative Adversarial Network -- 3.3 Discrete Cosine Transform -- 3.4 Discrete Wavelet Transform -- 3.5 Convolutional Neural Network -- 4 Experiments and Results -- 5 Conclusion -- References -- Automobile Theft Detection by Driving Behavior Identification Using Deep Autoencoder -- 1 Introduction -- 2 Proposed Methods -- 2.1 Model Autoencoder -- 2.2 Deep Autoencoder for Anomaly Detection -- 2.3 Important Features -- 2.4 Dataset. , 2.5 Performance Measurement -- 3 Experimental Results -- 3.1 Performance of Anomaly Detection -- 3.2 Analysis of Important Features -- 4 Conclusions and Future Directions -- References -- Combining a Bi-LSTM-Based Siamese Network with Word2Vec Algorithm for Classifying High-Dimensional Dataset -- 1 Introduction -- 2 Related Work -- 2.1 Natural Language Processing -- 2.2 Recurrent Neural Network -- 2.3 Text Classification -- 2.4 Dimensionality Reduction -- 2.5 Siamese Network -- 3 Proposed Methods -- 3.1 Problem Definition -- 3.2 Proposed Method -- 4 Experiments -- 4.1 Proposed Method Experiment Data Source -- 4.2 Experiment 1: News Category Dataset Classification Precision After Dimensionality Reduction -- 4.3 Experiment 2: Classification Precision After IMDb Dimensionality Reduction -- 5 Conclusion -- References -- Real Time Drowsiness Detection Based on Facial Dynamic Features -- 1 Introduction -- 2 Literature Review -- 3 The Proposed Method -- 4 Experimental Results -- 5 Conclusions -- References -- AI ad Big Data Analysis (II) -- Gradient Deep Learning Boosting and Its Application on the Imbalanced Datasets Containing Noises in Manufacturing -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Materials -- 3.2 Methods -- 4 Materials and Methods -- 4.1 Experiments -- 4.2 Results -- 5 Discussions and Conclusions -- References -- Fabric Defect Detection by Applying Structural Similarity Index to the Combination of Variational Autoencode and Generative Adversarial Network -- 1 Introduction -- 2 The Proposed Scheme -- 2.1 The Architecture of Proposed Model -- 2.2 Loss Function -- 3 Experimental Results -- 3.1 Introduction to Environment Configuration and Data Set -- 3.2 Evaluation Index -- 3.3 Performance Evaluation After Training the Model with Fabric -- 4 Conclusions -- References. , A Novel Defense Mechanism Against Label-Flipping Attacks for Support Vector Machines.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Data mining. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (372 pages)
    Edition: 1st ed.
    ISBN: 9783319940304
    Series Statement: Intelligent Systems Reference Library ; v.149
    DDC: 006.312
    Language: English
    Note: Intro -- Foreword -- References -- Preface -- Contents -- 1 Machine Learning Paradigms: Advances in Data Analytics -- Bibliography -- Data Analytics in the Medical, Biological and Signal Sciences -- 2 A Recommender System of Medical Reports Leveraging Cognitive Computing and Frame Semantics -- 2.1 Introduction -- 2.2 State of the Art -- 2.2.1 Biomedical Information Retrieval -- 2.2.2 Biomedical Classification -- 2.2.3 Biomedical Clustering -- 2.2.4 Biomedical Recommendation -- 2.2.5 Cognitive Computing and IBM Watson -- 2.2.6 Frame Semantics and Framester -- 2.3 Architecture of Our System -- 2.3.1 Content Analyzer Module -- 2.3.2 Machine Learning Module -- 2.3.3 Recommendation Module -- 2.4 Experiments -- 2.4.1 The Test Dataset -- 2.4.2 Experiment Setup -- 2.4.3 Recommendation Module Setup -- 2.4.4 Results -- 2.5 Conclusion and Future Trends -- References -- 3 Classification Methods in Image Analysis with a Special Focus on Medical Analytics -- 3.1 Introduction -- 3.2 Background -- 3.3 Feature Representation for Image Classification -- 3.3.1 Global Features -- 3.3.2 Local Features -- 3.3.3 Bag of Visual Words -- 3.3.4 Pixel-Level Features -- 3.4 Security and Biometrics -- 3.4.1 Supervised Classification -- 3.5 Aerospace and Satellite Monitoring -- 3.5.1 Supervised Classification -- 3.5.2 Unsupervised Classification -- 3.6 Document Analysis and Language Understanding -- 3.6.1 Supervised Classification -- 3.6.2 Unsupervised Classification -- 3.7 Information Retrieval -- 3.7.1 Supervised Classification -- 3.7.2 Unsupervised Classification -- 3.8 Classification in Image-Based Medical Analytics -- 3.8.1 Diagnostic Inspective Acquisition Imaging -- 3.8.2 Nuclear Medicine Imaging -- 3.8.3 Clinical Radiology Imaging -- 3.8.4 Horizon of the Research and Future Challenges -- 3.9 Conclusions -- 3.10 Further Readings -- References. , 4 Medical Data Mining for Heart Diseases and the Future of Sequential Mining in Medical Field -- 4.1 Introduction -- 4.2 Classical Data Mining Technics and Heart Diseases -- 4.2.1 Popular Data Mining Algorithms -- 4.2.2 Data Mining and Heart Diseases -- 4.3 Sequential Mining in Medical Domain -- 4.4 Sequential Mining -- 4.4.1 Important Terms and Notations -- 4.4.2 Sequential Patterns Mining -- 4.4.3 General and Specific Techniques Used by SPM Algorithms -- 4.4.4 Extensions of Sequential Pattern Mining Algorithms -- 4.5 Discussion -- 4.6 Conclusion -- References -- 5 Machine Learning Methods for the Protein Fold Recognition Problem -- 5.1 Introduction -- 5.2 Supervised Learning -- 5.3 Deep Learning Methods in Pattern Recognition -- 5.4 Features of the Amino Acid Sequence -- 5.5 Protein Fold Machine Learning-Based Classification Methods -- 5.5.1 Datasets Used in the Described Experiments -- 5.5.2 Methods -- 5.6 Discussion, Conclusions and Future Work -- References -- 6 Speech Analytics Based on Machine Learning -- 6.1 Introduction -- 6.2 Speech Phoneme Signal Analysis -- 6.3 Speech Signal Pre-processing -- 6.4 Speech Information Retrieval Scheme -- 6.5 Feature Extraction -- 6.5.1 Time Domain Features -- 6.5.2 Frequency Domain Features -- 6.5.3 Mel-Frequency Cepstral Coefficients -- 6.6 Data Preparation for Deep Learning -- 6.7 Experiment Results -- 6.7.1 Feature Vector Applied to Vowel Classification -- 6.7.2 Feature Vector Applied to Allophone Classification -- 6.7.3 Convolutional Neural Networks Applied to Allophone Classification -- 6.7.4 Convolutional Neural Networks Applied to Vowel Classification -- 6.8 Conclusions -- References -- Data Analytics in Social Studies and Social Interactions -- 7 Trends on Sentiment Analysis over Social Networks: Pre-processing Ramifications, Stand-Alone Classifiers and Ensemble Averaging -- 7.1 Introduction. , 7.2 Research Methodology -- 7.3 Twitter Datasets -- 7.4 Evaluation of Data Preprocessing Techniques -- 7.5 Evaluation of Stand-Alone Classifiers -- 7.6 Evaluation of Ensemble Classifiers -- 7.7 The Case of Sentiment Analysis in Social e-Learning -- 7.8 Conclusions and Future Work -- References -- 8 Finding a Healthy Equilibrium of Geo-demographic Segments for a Telecom Business: Who Are Malicious Hot-Spotters? -- 8.1 Introduction -- 8.2 Geospatial and Geo-demographic Data -- 8.3 The Combinatorial Optimization Module -- 8.4 Infrastructure-Friendly and Stressing Clients -- 8.5 Experiments -- 8.6 Conclusions -- References -- Data Analytics in Traffic, Computer and Power Networks -- 9 Advanced Parametric Methods for Short-Term Traffic Forecasting in the Era of Big Data -- 9.1 Introduction -- 9.2 Traffic Data -- 9.2.1 Traffic Network -- 9.2.2 Traffic Descriptors -- 9.2.3 Traffic Data Sources -- 9.3 Traffic Data Preprocessing -- 9.3.1 Time Series Formulation -- 9.3.2 Outlier Detection -- 9.3.3 Missing Data Imputation -- 9.3.4 Map-Matching -- 9.4 Parametric Short-Term Traffic Forecasting -- 9.4.1 Autoregressive Moving Average (ARMA) -- 9.4.2 Autoregressive Integrated Moving Average (ARIMA) -- 9.4.3 Space-Time ARIMA (STARIMA) -- 9.4.4 Lag-STARIMA -- 9.4.5 Graph-Based Lag-STARIMA (GBLS) -- References -- 10 Network Traffic Analytics for Internet Service Providers-Application in Early Prediction of DDoS Attacks -- 10.1 Introduction -- 10.2 The Procedure Adopted -- 10.2.1 Related Work -- 10.3 The Proposed Approach -- 10.3.1 Mathematical Formulation -- 10.3.2 State Space Model-Autoregressive Model-Discrete-Time Kalman Filter -- 10.4 Structure and Parameters of the MRSP Algorithm -- 10.5 Results and Performance of the MRSP Algorithm -- 10.6 Detecting Anomalies -- 10.6.1 DETECTING a DDoS ATTACK -- 10.6.2 Detecting an Anomaly -- 10.6.3 Final Remarks. , 10.7 Conclusions -- References -- 11 Intelligent Data Analysis in Electric Power Engineering Applications -- 11.1 Introduction -- 11.2 Intelligent Techniques in Ground Resistance Estimation -- 11.2.1 Grounding Systems -- 11.2.2 Application of ANN Methodologies for the Estimation of Ground Resistance -- 11.2.3 Wavelet Networks Modeling for the Estimation of Ground Resistance -- 11.2.4 Inductive Machine Learning -- 11.2.5 Genetic and Gene Expression Programming Versus Linear Regression Models -- 11.3 Estimation of Critical Flashover Voltage of Insulators -- 11.3.1 Problem Description -- 11.3.2 Genetic Algorithms -- 11.3.3 Application of ANNs -- 11.3.4 Multilayer Perceptron ANNs -- 11.3.5 Genetic Programming -- 11.3.6 Gravitational Search Algorithm Technique -- 11.4 Other Applications of Electric Power Systems -- 11.4.1 Load Forecasting -- 11.4.2 Lightning Performance Evaluation in Transmission Lines -- 11.5 Conclusions and Further Research -- References -- Data Analytics for Digital Forensics -- 12 Combining Genetic Algorithms and Neural Networks for File Forgery Detection -- 12.1 Introduction -- 12.1.1 McKemmish Predominant Model -- 12.1.2 Kent Predominant Model -- 12.1.3 Digital Evidences -- 12.1.4 File Type Identification -- 12.2 Methodology of the Proposed Method -- 12.3 Experimental Setup and Results -- 12.4 Conclusions -- References -- Theoretical Advances and Tools for Data Analytics -- 13 Deep Learning Analytics -- 13.1 Introduction -- 13.2 Preliminaries and Notation -- 13.3 Unsupervised Learning -- 13.3.1 Deep Autoencoders -- 13.3.2 Autoencoder Variants -- 13.4 Supervised Learning -- 13.4.1 Multilayer Perceptrons -- 13.4.2 Convolutional Neural Networks -- 13.4.3 Recurrent Neural Networks -- 13.5 Deep Learning Frameworks -- 13.6 Concluding Remarks -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Interactive multimedia. ; Computational intelligence. ; Multimedia systems. ; Computer software -- Development. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (178 pages)
    Edition: 1st ed.
    ISBN: 9783319003726
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.24
    DDC: 006.7
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Multimedia Services in Intelligent Environments: Advances in Recommender Systems -- Abstract -- 1…Introduction -- 2…Recommender Systems -- 3…Conclusions -- References -- 2 A Survey of Approaches to Designing Recommender Systems -- Abstract -- 1…Introduction to Recommender Systems -- 1.1 Formulation of the Recommendation Problem -- 1.1.1 The Input to a Recommender System -- 1.1.2 The Output of a Recommender System -- 1.2 Methods of Collecting Knowledge About User Preferences -- 1.2.1 The Implicit Approach -- 1.2.2 The Explicit Approach -- 1.2.3 The Mixing Approach -- 2…Summarization of Approaches to Recommendation -- 2.1 Content-Based Methods -- 2.2 Collaborative Methods -- 2.2.1 User-Based Collaborative Filtering Systems -- 2.2.2 Item-Based Collaborative Filtering Systems -- 2.2.3 Personality Diagnosis -- 2.3 Hybrid Methods -- 2.3.1 Adding Content-Based Characteristics to Collaborative Models -- 2.3.2 Adding Collaborative Characteristics to Content-Based Models -- 2.3.3 A Single Unifying Recommendation Model -- 2.3.4 Other Types of Recommender Systems -- 2.4 Fundamental Problems of Recommender Systems -- References -- 3 Hybrid User Model for Capturing a User's Information Seeking Intent -- Abstract -- 1…Introduction -- 2…Related Work -- 2.1 Methodologies for Building a User Model for Information Retrieval -- 2.2 Decision Theory for Information Retrieval -- 3…Capturing a User's Intent in an Information Seeking Task -- 3.1 Overview -- 3.2 Interest Set -- 3.3 Context Network -- 3.4 Preference Network -- 4…Hybrid User Model -- 4.1 Overview -- 4.2 Sub-Value Function Over Query -- 4.3 Sub-Value Function for Threshold -- 4.4 Complexity of Hybrid User Model -- 4.4.1 Implementation -- 5…Evaluation -- 5.1 Objectives -- 5.2 Testbeds -- 5.3 Vector Space Model and Ide dec-hi -- 5.4 Procedures. , 5.5 Traditional Procedure -- 5.6 Procedure to Assess Long-Term Effect -- 6…Results and Discussion -- 6.1 Results of Traditional Procedure -- 6.2 Results of New Procedure to Assess Long-Term Effect -- 7…Discussion -- 8…Application of Hybrid User Model -- 9…Conclusions and Future Work -- References -- 4 Recommender Systems: Network Approaches -- Abstract -- 1…Introduction -- 2…Recommender Systems Review -- 3…Background: Graphs and NoSQL -- 3.1 Current NoSQL Implementations -- 3.2 The Algebraic Connectivity Metric -- 3.3 Recommendation Comparison and Propagation -- 4…The Effect of Algebraic Connectivity on Recommendations -- 4.1 Application to Improve Recommendations -- 5…Recommendations Experiment and Results -- 6…Conclusion -- References -- Resource List -- 5 Toward the Next Generation of Recommender Systems: Applications and Research Challenges -- Abstract -- 1…Introduction -- 2…Recommender Systems in Software Engineering -- 3…Recommender Systems in Data and Knowledge Engineering -- 4…Recommender Systems for Configurable Items -- 5…Recommender Systems for Persuasive Technologies -- 6…Further Applications -- 7…Issues for Future Research -- 8…Conclusions -- References -- 6 Content-Based Recommendation for Stacked-Graph Navigation -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Stacked Graphs -- 3.1 Views and View Properties -- 4…Content-Based Recommendation -- 4.1 View Data Set -- 4.2 User Profile -- 4.2.1 Inferring Preferences for Seen Views -- 4.2.2 Inferring Preferences for Attributes of Seen Views -- 4.3 Content-Based Recommendation -- 4.4 Usage Scenario -- 5…User Study -- 6…Results and Discussions -- 7…Conclusion and Future Work -- References -- 7 Pattern Extraction from Graphs and Beyond -- Abstract -- 1…Introduction -- 2…Foundations -- 2.1 Graphs -- 2.2 Graph Representations -- 2.3 Basic Notions of Graph Components -- 3…Explicit Models. , 3.1 Tree -- 3.2 Cohesive Subgraphs -- 3.3 Cliques -- 4…Implicit Models -- 4.1 Modularity and Its Approximation -- 4.2 Network Flow -- 5…Beyond Static Patterns -- 5.1 Sequential Pattern Mining in Data Stream -- 5.2 Explicit Approaches for Tracing Communities -- 5.3 Implicit Approaches for Tracing Communities -- 6…Conclusion -- References -- Source List -- 8 Dominant AHP as Measuring Method of Service Values -- Abstract -- 1…Introduction -- 2…Necessity of Measuring Service Values -- 2.1 Significance of Service Science -- 2.2 Scientific Approach to Service Science -- 3…AHP as a Measuring Method of Service Values -- 3.1 Saaty's AHP -- 3.2 Dominant AHP -- 4…AHP and Dominant AHP from a Perspective of Utility Function -- 4.1 Expressive form of Multi-Attribute Utility Function -- 4.2 Saaty's AHP from a perspective of utility function -- 4.3 Dominant AHP from a viewpoint of utility function -- 5…Conclusion -- 9 Applications of a Stochastic Model in Supporting Intelligent Multimedia Systems and Educational Processes -- Abstract -- 1…Introduction -- 2…Formulating a Minimum of a Random Number of Nonnegative Random Variables -- 3…Distribution Function of the Formulated Minimum -- 4…Applications in Systems and Processes -- 5…Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Machine learning. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (237 pages)
    Edition: 1st ed.
    ISBN: 9783030767945
    Series Statement: Learning and Analytics in Intelligent Systems Series ; v.23
    DDC: 006.31
    Language: English
    Note: Intro -- Foreword -- Further Reading -- Preface -- Contents -- 1 Introduction to Advances in Machine Learning/Deep Learning-Based Technologies -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- References -- Part I Machine Learning/Deep Learning in Socializing and Entertainment -- 2 Semi-supervised Feature Selection Method for Fuzzy Clustering of Emotional States from Social Streams Messages -- 2.1 Introduction -- 2.2 The FS-EFCM Algorithm -- 2.2.1 EFCM Execution: Main Steps -- 2.2.2 Initial Parameter Setting -- 2.3 Experimental Results -- 2.3.1 Dataset -- 2.3.2 Feature Selection -- 2.3.3 FS-EFCM at Work -- 2.4 Conclusion -- References -- 3 AI in (and for) Games -- 3.1 Introduction -- 3.2 Game Content and Databases -- 3.3 Intelligent Game Content Generation and Selection -- 3.3.1 Generating Content for a Language Education Game -- 3.4 Conclusions -- References -- Part II Machine Learning/Deep Learning in Education -- 4 Computer-Human Mutual Training in a Virtual Laboratory Environment -- 4.1 Introduction -- 4.1.1 Purpose and Development of the Virtual Lab -- 4.1.2 Different Playing Modes -- 4.1.3 Evaluation -- 4.2 Background and Related Work -- 4.3 Architecture of the Virtual Laboratory -- 4.3.1 Conceptual Design -- 4.3.2 State-Transition Diagrams -- 4.3.3 High Level Design -- 4.3.4 State Machine -- 4.3.5 Individual Scores -- 4.3.6 Quantization -- 4.3.7 Normalization -- 4.3.8 Composite Evaluation -- 4.3.9 Success Rate -- 4.3.10 Weighted Average -- 4.3.11 Artificial Neural Network -- 4.3.12 Penalty Points -- 4.3.13 Aggregate Score -- 4.4 Machine Learning Algorithms -- 4.4.1 Genetic Algorithm for the Weighted Average -- 4.4.2 Training the Artificial Neural Network with Back-Propagation -- 4.5 Implementation -- 4.5.1 Instruction Mode -- 4.5.2 Evaluation Mode -- 4.5.3 Computer Training Mode -- 4.5.4 Training Data Collection Sub-mode. , 4.5.5 Machine Learning Sub-mode -- 4.6 Training-Testing Process and Results -- 4.6.1 Training Data -- 4.6.2 Training and Testing on Various Data Set Groups -- 4.6.3 Genetic Algorithm Results -- 4.6.4 Artificial Neural Network Training Results -- 4.7 Conclusions -- References -- 5 Exploiting Semi-supervised Learning in the Education Field: A Critical Survey -- 5.1 Introduction -- 5.2 Semi-supervised Learning -- 5.3 Literature Review -- 5.3.1 Performance Prediction -- 5.3.2 Dropout Prediction -- 5.3.3 Grade Level Prediction -- 5.3.4 Grade Point Value Prediction -- 5.3.5 Other Studies -- 5.3.6 Discussion -- 5.4 The Potential of SSL in the Education Field -- 5.5 Conclusions -- References -- Part III Machine Learning/Deep Learning in Security -- 6 Survey of Machine Learning Approaches in Radiation Data Analytics Pertained to Nuclear Security -- 6.1 Introduction -- 6.2 Machine Learning Methodologies in Nuclear Security -- 6.2.1 Nuclear Signature Identification -- 6.2.2 Background Radiation Estimation -- 6.2.3 Radiation Sensor Placement -- 6.2.4 Source Localization -- 6.2.5 Anomaly Detection -- 6.3 Conclusion -- References -- 7 AI for Cybersecurity: ML-Based Techniques for Intrusion Detection Systems -- 7.1 Introduction -- 7.1.1 Why Does AI Pose Great Importance for Cybersecurity? -- 7.1.2 Contribution -- 7.2 ML-Based Models for Cybersecurity -- 7.2.1 K-Means -- 7.2.2 Autoencoder (AE) -- 7.2.3 Generative Adversarial Network (GAN) -- 7.2.4 Self Organizing Map -- 7.2.5 K-Nearest Neighbors (k-NN) -- 7.2.6 Bayesian Network -- 7.2.7 Decision Tree -- 7.2.8 Fuzzy Logic (Fuzzy Set Theory) -- 7.2.9 Multilayer Perceptron (MLP) -- 7.2.10 Support Vector Machine (SVM) -- 7.2.11 Ensemble Methods -- 7.2.12 Evolutionary Algorithms -- 7.2.13 Convolutional Neural Networks (CNN) -- 7.2.14 Recurrent Neural Network (RNN) -- 7.2.15 Long Short Term Memory (LSTM). , 7.2.16 Restricted Boltzmann Machine (RBM) -- 7.2.17 Deep Belief Network (DBN) -- 7.2.18 Reinforcement Learning (RL) -- 7.3 Open Topics and Potential Directions -- 7.3.1 Novel Feature Representations -- 7.3.2 Unsupervised Learning Based Detection Systems -- References -- Part IV Machine Learning/Deep Learning in Time Series Forecasting -- 8 A Comparison of Contemporary Methods on Univariate Time Series Forecasting -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Theoretical Background -- 8.3.1 ARIMA -- 8.3.2 Prophet -- 8.3.3 The Holt-Winters Seasonal Models -- 8.3.4 N-BEATS: Neural Basis Expansion Analysis -- 8.3.5 DeepAR -- 8.3.6 Trigonometric BATS -- 8.4 Experiments and Results -- 8.4.1 Datasets -- 8.4.2 Algorithms -- 8.4.3 Evaluation -- 8.4.4 Results -- 8.5 Conclusions -- References -- 9 Application of Deep Learning in Recurrence Plots for Multivariate Nonlinear Time Series Forecasting -- 9.1 Introduction -- 9.2 Related Work -- 9.2.1 Background on Recurrence Plots -- 9.2.2 Time Series Imaging and Convolutional Neural Networks -- 9.3 Time Series Nonlinearity -- 9.4 Time Series Imaging -- 9.4.1 Dimensionality Reduction -- 9.4.2 Optimal Parameters -- 9.5 Convolutional Neural Networks -- 9.6 Model Pipeline and Architecture -- 9.6.1 Architecture -- 9.7 Experimental Setup -- 9.8 Results -- 9.9 Conclusion -- References -- Part V Machine Learning in Video Coding and Information Extraction -- 10 A Formal and Statistical AI Tool for Complex Human Activity Recognition -- 10.1 Introduction -- 10.2 The Hybrid Framework-Formal Languages -- 10.3 Formal Tool and Statistical Pipeline Architecture -- 10.4 DATA Pipeline -- 10.5 Tools for Implementation -- 10.6 Experimentation with Datasets to Identify the Ideal Model -- 10.6.1 KINISIS-Single Human Activity Recognition Modeling -- 10.6.2 DRASIS-Change of Human Activity Recognition Modeling -- 10.7 Conclusions. , References -- 11 A CU Depth Prediction Model Based on Pre-trained Convolutional Neural Network for HEVC Intra Encoding Complexity Reduction -- 11.1 Introduction -- 11.2 H.265 High Efficiency Video Coding -- 11.2.1 Coding Tree Unit Partition -- 11.2.2 Rate Distortion Optimization -- 11.2.3 CU Partition and Image Texture Features -- 11.3 Proposed Methodology -- 11.3.1 The Hierarchical Classifier -- 11.3.2 The Methodology of Transfer Learning -- 11.3.3 Structure of Convolutional Neural Network -- 11.3.4 Dataset Construction -- 11.4 Experiments and Results -- 11.5 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Multimedia systems. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (130 pages)
    Edition: 1st ed.
    ISBN: 9783319177441
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.36
    DDC: 006.7
    Language: English
    Note: Intro -- Preface -- Contents -- 1 Intelligent Interactive Multimedia Systems in Practice: An Introduction -- Abstract -- 1.1 Introduction -- 1.2 Chapters Included in the Book -- 1.3 Conclusion -- References -- 2 On the Use of Multi-attribute Decision Making for Combining Audio-Lingual and Visual-Facial Modalities in Emotion Recognition -- Abstract -- 2.1 Introduction -- 2.2 Related Work -- 2.2.1 Multi-attribute Decision Making -- 2.3 Aims and Settings of the Empirical Studies -- 2.3.1 Elicitation of Emotions and Creation of Databases -- 2.3.2 Creation of Databases of Known Expressions of Emotions -- 2.3.3 Analysis of Recognisability of Emotions by Human Observers -- 2.4 Empirical Study for Audio-Lingual Emotion Recognition -- 2.4.1 The Experimental Educational Application for Elicitation of Emotions -- 2.4.2 Audio-Lingual Modality Analysis -- 2.5 Empirical Study for Visual-Facial Emotion Recognition -- 2.5.1 Visual-Facial Empirical Study on Subjects -- 2.5.2 Visual-Facial Empirical Study by Human Observers -- 2.6 Discussion and Comparison of the Results from the Empirical Studies -- 2.7 Combining the Results from the Empirical Studies Through MADM -- 2.8 Discussion and Conclusions -- References -- 3 Cooperative Learning Assisted by Automatic Classification Within Social Networking Services -- Abstract -- 3.1 Introduction -- 3.2 Related Work -- 3.2.1 Social Networking Services -- 3.2.2 Intelligent Computer-Assisted Language Learning -- 3.3 Algorithm of the System Functioning -- 3.3.1 Description of Automatic Classification -- 3.3.2 Optimization Objective and Its Definition -- 3.3.3 Initialization of Centroids -- 3.3.4 Incorporation of Automatic Classification -- 3.4 General Overview of the System -- 3.5 Evaluation of the System -- 3.6 Conclusions and Future Work -- References. , 4 Improving Peer-to-Peer Communication in e-Learning by Development of an Advanced Messaging System -- Abstract -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Data Analysis System Design -- 4.4 Experimental Results -- 4.5 Conclusions and Future Work -- References -- 5 Fuzzy-Based Digital Video Stabilization in Static Scenes -- Abstract -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Method of Frame Deblurring -- 5.4 Fuzzy-Based Video Stabilization Method -- 5.4.1 Estimation of Local Motion Vectors -- 5.4.2 Smoothness of GMVs Building -- 5.4.3 Static Scene Alignment -- 5.5 Experimental Results -- 5.6 Conclusion -- References -- 6 Development of Architecture, Information Archive and Multimedia Formats for Digital e-Libraries -- Abstract -- 6.1 Introduction -- 6.2 Related Work -- 6.3 Overview of Standards and Document Formats -- 6.4 Requirements and Objectives -- 6.5 Proposed Architecture of Digital e-Library Warehouse -- 6.6 Proposed EPUB Format Extensions -- 6.7 Client Software Design and Researches of Vulnerability -- 6.8 Conclusion -- References -- 7 Layered Ontological Image for Intelligent Interaction to Extend User Capabilities on Multimedia Systems in a Folksonomy Driven Environment -- Abstract -- 7.1 Introduction -- 7.2 Human Based Computation -- 7.2.1 Motivation of Human Contribution -- 7.3 Background of Related Work -- 7.3.1 Object Tracking -- 7.4 Dynamic Learning Ontology Structure -- 7.4.1 Richer Semantics of Attributes -- 7.4.2 Object on Layered Representation -- 7.4.3 Semantic Attributes -- 7.4.4 Attribute Bounding Box Position -- 7.4.5 Attributes Extraction and Sentiment Analysis -- 7.4.6 Folksodriven Bounding Box Notation -- 7.5 Image Analysis and Feature Selection -- 7.5.1 Object Position Detection -- 7.6 Previsions on Ontology Structure -- 7.7 A Case Study: In-Video Advertisement -- 7.7.1 In-Video Advertisement Functionality. , 7.7.2 Web GRP -- 7.7.3 Folksodriven Ontology Prediction for Advertisement -- 7.7.4 In-Video Advertisement Validation -- 7.8 Relevant Resources -- 7.9 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (336 pages)
    Edition: 1st ed.
    ISBN: 9783319471945
    Series Statement: Intelligent Systems Reference Library ; v.118
    Language: English
    Note: Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- Part I Machine Learning Fundamentals -- 1 Introduction -- References -- 2 Machine Learning -- 2.1 Introduction -- 2.2 Machine Learning Categorization According to the Type of Inference -- 2.2.1 Model Identification -- 2.2.2 Shortcoming of the Model Identification Approach -- 2.2.3 Model Prediction -- 2.3 Machine Learning Categorization According to the Amount of Inference -- 2.3.1 Rote Learning -- 2.3.2 Learning from Instruction -- 2.3.3 Learning by Analogy -- 2.4 Learning from Examples -- 2.4.1 The Problem of Minimizing the Risk Functional from Empirical Data -- 2.4.2 Induction Principles for Minimizing the Risk Functional on Empirical Data -- 2.4.3 Supervised Learning -- 2.4.4 Unsupervised Learning -- 2.4.5 Reinforcement Learning -- 2.5 Theoretical Justifications of Statistical Learning Theory -- 2.5.1 Generalization and Consistency -- 2.5.2 Bias-Variance and Estimation-Approximation Trade-Off -- 2.5.3 Consistency of Empirical Minimization Process -- 2.5.4 Uniform Convergence -- 2.5.5 Capacity Concepts and Generalization Bounds -- 2.5.6 Generalization Bounds -- References -- 3 The Class Imbalance Problem -- 3.1 Nature of the Class Imbalance Problem -- 3.2 The Effect of Class Imbalance on Standard Classifiers -- 3.2.1 Cost Insensitive Bayes Classifier -- 3.2.2 Bayes Classifier Versus Majority Classifier -- 3.2.3 Cost Sensitive Bayes Classifier -- 3.2.4 Nearest Neighbor Classifier -- 3.2.5 Decision Trees -- 3.2.6 Neural Networks -- 3.2.7 Support Vector Machines -- References -- 4 Addressing the Class Imbalance Problem -- 4.1 Resampling Techniques -- 4.1.1 Natural Resampling -- 4.1.2 Random Over-Sampling and Random Under-Sampling -- 4.1.3 Under-Sampling Methods -- 4.1.4 Over-Sampling Methods -- 4.1.5 Combination Methods -- 4.2 Cost Sensitive Learning -- 4.2.1 The MetaCost Algorithm. , 4.3 One Class Learning -- 4.3.1 One Class Classifiers -- 4.3.2 Density Models -- 4.3.3 Boundary Methods -- 4.3.4 Reconstruction Methods -- 4.3.5 Principal Components Analysis -- 4.3.6 Auto-Encoders and Diabolo Networks -- References -- 5 Machine Learning Paradigms -- 5.1 Support Vector Machines -- 5.1.1 Hard Margin Support Vector Machines -- 5.1.2 Soft Margin Support Vector Machines -- 5.2 One-Class Support Vector Machines -- 5.2.1 Spherical Data Description -- 5.2.2 Flexible Descriptors -- 5.2.3 v - SVC -- References -- Part II Artificial Immune Systems -- 6 Immune System Fundamentals -- 6.1 Introduction -- 6.2 Brief History and Perspectives on Immunology -- 6.3 Fundamentals and Main Components -- 6.4 Adaptive Immune System -- 6.5 Computational Aspects of Adaptive Immune System -- 6.5.1 Pattern Recognition -- 6.5.2 Immune Network Theory -- 6.5.3 The Clonal Selection Principle -- 6.5.4 Immune Learning and Memory -- 6.5.5 Immunological Memory as a Sparse Distributed Memory -- 6.5.6 Affinity Maturation -- 6.5.7 Self/Non-self Discrimination -- References -- 7 Artificial Immune Systems -- 7.1 Definitions -- 7.2 Scope of AIS -- 7.3 A Framework for Engineering AIS -- 7.3.1 Shape-Spaces -- 7.3.2 Affinity Measures -- 7.3.3 Immune Algorithms -- 7.4 Theoretical Justification of the Machine Learning -- 7.5 AIS-Based Clustering -- 7.5.1 Background Immunological Concepts -- 7.5.2 The Artificial Immune Network (AIN) Learning Algorithm -- 7.5.3 AiNet Characterization and Complexity Analysis -- 7.6 AIS-Based Classification -- 7.6.1 Background Immunological Concepts -- 7.6.2 The Artificial Immune Recognition System (AIRS) Learning Algorithm -- 7.6.3 Source Power of AIRS Learning Algorithm and Complexity Analysis -- 7.7 AIS-Based Negative Selection -- 7.7.1 Background Immunological Concepts -- 7.7.2 Theoretical Justification of the Negative Selection Algorithm. , 7.7.3 Real-Valued Negative Selection with Variable-Sized Detectors -- 7.7.4 AIS-Based One-Class Classification -- 7.7.5 V-Detector Algorithm -- References -- 8 Experimental Evaluation of Artificial Immune System-Based Learning Algorithms -- 8.1 Experimentation -- 8.1.1 The Test Data Set -- 8.1.2 Artificial Immune System-Based Music Piece Clustering and Database Organization -- 8.1.3 Artificial Immune System-Based Customer Data Clustering in an e-Shopping Application -- 8.1.4 AIS-Based Music Genre Classification -- 8.1.5 Music Recommendation Based on Artificial Immune Systems -- References -- 9 Conclusions and Future Work.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Cooperating objects (Computer systems). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (209 pages)
    Edition: 1st ed.
    ISBN: 9783031076503
    Series Statement: Artificial Intelligence-Enhanced Software and Systems Engineering Series ; v.3
    DDC: 006.22
    Language: English
    Note: Intro -- Foreword -- Preface -- Contents -- 1 Introduction to Handbook on Artificial Intelligence-Empowered Applied Software Engineering-Vol. 2: Smart Software Applications in Cyber-Physical Systems -- 1.1 Editorial Note -- 1.2 Book Summary and Future Volumes -- Bibliography for Further Reading -- Part I Smart Software Applications in Scientific Document Processing -- 2 Detection, Extraction and SPN Representation of Pseudo-Algorithms in Scientific Documents -- 2.1 Introduction -- 2.2 Visual Detection of Pseudo-Codes in Documents -- 2.2.1 Extraction of Different Text Blocks in Documents -- 2.2.2 Pyramidal Image Representation -- 2.2.3 Decomposition and Classification of the Pseudo Code Sections -- 2.3 Learning -- 2.3.1 The Dataset -- 2.3.2 Evaluation of Learning Process -- 2.4 Translation of Algorithms to Graphs and SPNs -- 2.4.1 Generation of a Graph -- 2.4.2 Stochastic Petri Net Representation -- 2.5 Conclusion and Future Work -- References -- 3 A Recommender Engine for Scientific Paper Peer-Reviewing System -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Dataset and Feature -- 3.4 Methodology -- 3.4.1 Create Training Dataset -- 3.4.2 The Architecture of Recommender Engine -- 3.4.3 Final Recommendation Section -- 3.5 Result and Analysis -- 3.6 Conclusion(s) -- References -- Part II Smart Software Applications in Enterprise Modeling -- 4 Visualization of Digital-Enhanced Enterprise Modeling -- 4.1 Introduction -- 4.2 A Meta Model for Describing Value of Digital Service -- 4.3 Visualization Patterns -- 4.3.1 Service Definition Pattern -- 4.3.2 Value Proposition Pattern -- 4.3.3 Use Process Refinement pattern -- 4.4 Application Example -- 4.4.1 Healthcare Example -- 4.4.2 Application of Visualization Patterns -- 4.5 Discussions -- 4.5.1 Effectiveness -- 4.5.2 Novelty -- 4.5.3 Mapping to BMC -- 4.5.4 Limitation -- 4.6 Related Work -- 4.7 Conclusion. , References -- 5 Know-linking: When Machine Learning Meets Organizational Tools Analysis to Generate Shared Knowledge in Large Companies -- 5.1 Introduction -- 5.2 State of the Art -- 5.2.1 Profiling -- 5.2.2 Organizational Tools Analysis -- 5.2.3 Indexing -- 5.3 Related Works -- 5.4 Know-linking Approach -- 5.4.1 Presentation -- 5.5 Environment Study -- 5.6 Know-linking in Aerospace Manufacturer -- 5.6.1 Technical Audit -- 5.6.2 Extracting Profiles -- 5.6.3 Generating Semantic Models for Each Profile -- 5.6.4 Hidden Semantic Links Between Profiles -- 5.6.5 Indexing Based Profiles -- 5.7 Conclusion and Future Work -- References -- 6 Changes in Human Resources Management with Artificial Intelligence -- 6.1 Introduction -- 6.2 The Effect of AI in Human Resources Management -- 6.2.1 Recruitment Process with AI -- 6.2.2 Training Process with AI -- 6.2.3 Performance Assessment Process with AI -- 6.2.4 Talent Management Process with AI -- 6.2.5 Salary Management Process with AI -- 6.3 Conclusion -- References -- Part III Smart Software Applications in Education -- 7 Promoting Reading Among Teens: Analyzing the Emotional Preferences of Teenage Readers -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Our Emotion Trait Analysis Approach -- 7.3.1 Processing a Book Description -- 7.3.2 Calculating an Emotion Vector -- 7.3.3 Emotion Trait -- 7.3.4 Partitioning Books by Average Ratings -- 7.3.5 Reducing Objective Values by Comparing Synonyms -- 7.3.6 Implementation -- 7.4 Conclusions and Future Works -- References -- 8 A Multi-institutional Analysis of CS1 Students' Common Misconceptions of Key Programming Concepts -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Study Design -- 8.3.1 Research Objective -- 8.3.2 Research Questions -- 8.3.3 Data Collection -- 8.3.4 Reliability of Pre-post-test Instrument -- 8.3.5 Study Procedure -- 8.4 Experimental Results. , 8.5 Discussion of Results -- 8.6 Conclusion -- References -- Part IV Smart Software Applications in Healthcare and Medicine -- 9 Clustering-Based Scaling for Healthcare Data -- 9.1 Introduction -- 9.2 Fuzzy Clustering -- 9.3 Fuzzy Clustering for 3-Way Data -- 9.4 Fuzzy Cluster-Scaled Regression Analysis -- 9.5 Numerical Examples -- 9.6 Conclusions -- References -- 10 Normative and Fuzzy Components of Medical AI Applications -- 10.1 Preliminaries -- 10.2 Normative Issues -- 10.3 Fuzziness and Norms -- 10.4 Conclusions -- References -- Part V Smart Software Applications in Infrastructure Monitoring -- 11 Adaptive Structural Learning of Deep Belief Network and Its Application to Real Time Crack Detection of Concrete Structure Using Drone -- 11.1 Introduction -- 11.2 Adaptive Learning Method of Deep Belief Network -- 11.2.1 Restricted Boltzmann Machine and Deep Belief Network -- 11.2.2 Neuron Generation and Annihilation Algorithm of RBM -- 11.2.3 Layer Generation Algorithm of DBN -- 11.3 SDNET 2018 -- 11.3.1 Data Description -- 11.3.2 The Classification Results -- 11.4 Crack Detection for Japanese Concrete Structure -- 11.4.1 Data Collection -- 11.4.2 Detection Results -- 11.5 Real-Time Detection and Visualization System Using Drone -- 11.5.1 Embedded System -- 11.5.2 Demonstration Experiment -- 11.6 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...