GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (676 pages)
    Edition: 1st ed.
    ISBN: 9783031180507
    Series Statement: Lecture Notes in Networks and Systems Series ; v.531
    DDC: 929.605
    Language: English
    Note: Intro -- Preface -- Organization -- General Chair -- International Advisory Committee -- Program Committee Chairs -- Program Committee -- Special Sessions -- Machine Learning and Computer Vision in Industry 4.0 -- Program Committee -- Time Series Forecasting in Industrial and Environmental Applications -- Program Committee -- Optimization, Modeling, and Control by Soft Computing Techniques -- Program Committee -- Soft Computing Applied to Renewable Energy Systems -- Program Committee -- Preprocessing Big Data in Machine Learning -- Program Committee -- Tackling Real-World Problems with Artificial Intelligence -- Program Committee -- SOCO 2022 Organizing Committee Chairs -- SOCO 2022 Organizing Committee -- Contents -- Decision Support and Deep Learning -- Anomaly Detection of Security Threats to Cyber-Physical Systems: A Study -- 1 Introduction -- 2 Statistical Analysis -- 3 Literature Analysis -- 3.1 CPS Security Design -- 3.2 Anomaly Detection/Threat Detection in CPS -- 4 Outstanding Challenges -- 5 Conclusions -- References -- Predictive Maintenance for Maintenance-Effective Manufacturing Using Machine Learning Approaches -- 1 Introduction -- 2 State-of-the-Art -- 3 Training/Testing Dataset -- 4 Proposed Methodology -- 4.1 Gradient Boosting Training -- 4.2 Support Vector Machine Training -- 5 Results and Discussion -- 6 Conclusions -- References -- Estimation of Lamb Weight Using Transfer Learning and Regression -- 1 Introduction -- 2 Image Acquisition and Data Preparation -- 3 Proposed Architecture -- 4 Experimental Results -- 5 Conclusions -- References -- UAV Simulation for Object Detection and 3D Reconstruction Fusing 2D LiDAR and Camera -- 1 Introduction -- 2 Related Works -- 3 Simulation Framework -- 4 Proposed Process -- 5 Demonstration and Evaluation -- 6 Conclusions and Perspectives -- References. , A SO2 Pollution Concentrations Prediction Approach Using Autoencoders -- 1 Introduction -- 2 Database -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- CPU Computation Influence on Energy Consumption Forecasting Activities of a Building -- 1 Introduction -- 2 Methodology -- 3 Case Study and Results -- 3.1 Case Study -- 3.2 Results -- 4 Conclusions -- References -- Python-Based Ecosystem for Agent Communities Simulation -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution -- 3.1 PEAK Multi-agent System Platform -- 3.2 Management -- 4 Case Study -- 5 Conclusion -- References -- Deep Learning Approach for the Prediction of the Concentration of Chlorophyll ɑ in Seawater. A Case Study in El Mar Menor (Spain) -- 1 Introduction -- 2 Area Description and Datasets -- 3 Methods -- 3.1 Artificial Neural Networks -- 3.2 Bayesian Regularized Neural Networks -- 3.3 Long Short-Term Memory Neural Networks -- 3.4 Mutual Information -- 3.5 Minimum-Redundancy-Maximum-Relevance (mRMR) -- 4 Experimental Procedure -- 4.1 Creation of the Lagged Datasets -- 4.2 Forecasting Models -- 5 Results and Discussion -- 6 Conclusions -- References -- Evolutionary Computing -- A Hybrid Discrete Symbiotic Organisms Search Algorithm and List-Based Simulated Annealing Algorithm for Traveling Salesman Problem -- 1 Introduction -- 2 A Discrete Symbiotic Organisms Search Algorithm for TSP -- 2.1 Mutualism Phase -- 2.2 Commensalism Phase -- 2.3 Parasitism Phase -- 3 A List-Based Simulated Annealing Algorithm for TSP -- 4 A Hybrid DSOS-LBSA Algorithm for TSP -- 5 Computational Results and Discussion -- 5.1 Parameter Settings -- 5.2 Computational Results and Analysis -- 6 Conclusion and Future Work -- References -- Estimation of Distribution Algorithms Applied to the Next Release Problem -- 1 Introduction -- 2 Next Release Problem -- 2.1 Related Work. , 2.2 Multi-objective Next Release Problem -- 3 Proposal: Univariate EDAs for the MONRP -- 3.1 MONRP-UMDA -- 3.2 MONRP-PBIL -- 4 Experimental Evaluation -- 4.1 Algorithms -- 4.2 Datasets -- 4.3 Methodology -- 5 Results and Analysis -- 5.1 Best Configurations -- 5.2 Pareto Front Results -- 5.3 Metrics Results -- 6 Conclusions and Future Works -- References -- An Extremal Optimization Approach to the Pairwise Connectivity Critical Node Detection Problem -- 1 Introduction -- 2 Related Work and Problem Formulation -- 3 Extremal Optimization -- 4 Numerical Experiments -- 5 Conclusions -- References -- Neural Networks and Data Mining -- Dimensional Reduction Applied to an Intelligent Model for Boost Converter Switching Operation -- 1 Introduction -- 2 Case Study -- 3 Model Approach -- 3.1 Dataset -- 3.2 Methods -- 3.3 Classification Model -- 3.4 Experiments Description -- 4 Results -- 5 Conclusions and Future Works -- References -- Intuitionistic Fuzzy Sets in J-CO-QL+? -- 1 Introduction -- 2 Background -- 2.1 Classical Fuzzy Sets -- 2.2 Intuitionistic Fuzzy Sets and Relations -- 2.3 Example: Representing Medical Knowledge -- 3 Intuitionistic Fuzzy Sets and J-CO-QL+ -- 3.1 J-CO-QL+ Data Model and Execution Model -- 3.2 J-CO-QL+ Script -- 4 Learned Lessons and Conclusions -- References -- Assessing the Efficient Market Hypothesis for Cryptocurrencies with High-Frequency Data Using Time Series Classification -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 4 Experiments and Results -- 4.1 Datasets Used -- 4.2 Experimental Settings and Performance Measures -- 4.3 Results -- 5 Conclusions -- References -- Blockchain for Supply Chain Traceability with Data Validation -- 1 Introduction -- 2 Related Work -- 3 Blockchain-Based GSC Traceability -- 4 Smart Contract for GSC Traceability -- 5 Smart Contract Implementation and Performance Evaluation. , 6 Conclusions and Future Work -- References -- Compression of Clustered Ship Trajectories for Context Learning and Anomaly Detection -- 1 Introduction -- 2 Background Information -- 2.1 Data Pre-processing and Data Imbalance -- 2.2 Trajectory Clustering -- 2.3 Trajectory Compression -- 3 Proposed Architecture -- 3.1 Data Preparation and Cluster Generation -- 3.2 Compression of Trajectories -- 3.3 Representative Points Extraction -- 4 Results Analysis -- 5 Conclusions and Perspectives -- References -- DR Participants' Actual Response Prediction Using Artificial Neural Networks -- 1 Introduction -- 2 Proposed Methodology -- 3 Case Study -- 4 Results and Discussion -- 5 Conclusion -- References -- Non-linear Neural Models to Predict HRC Steel Price in Spain -- 1 Introduction and Previous Work -- 2 Materials and Methods -- 2.1 Dataset -- 2.2 Non-lineal Neural Models -- 3 Experiments and Results -- 4 Conclusions and Future Work -- References -- Soft Computing Applications -- First Steps Predicting Execution of Civil Works from Georeferenced Infrastructure Data -- 1 Introduction -- 1.1 State of the Art -- 1.2 Research Proposal -- 2 Methodology -- 2.1 Preprocess -- 2.2 Data Analysis -- 2.3 Dataset Generation -- 2.4 Supervised Classification -- 2.5 Evaluation -- 2.6 Results -- 3 Conclusion -- References -- Virtual Sensor to Estimate Air Pollution Heavy Metals Using Bioindicators -- 1 Introduction -- 2 Database -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- Regression Techniques to Predict the Growth of Potato Tubers -- 1 Introduction -- 2 Previous Work -- 3 Regression Techniques -- 3.1 Multiple Linear Regression -- 3.2 Multilayer Perceptron -- 3.3 Radial-Basis Function Network -- 3.4 Support Vector Machine -- 4 Materials and Methods -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References. , Reliability-Sensitive Optimization for Provision of Ancillary Services by Tempo-Spatial Correlated Distributed Energy Resources -- 1 Introduction -- 2 Multivariate Correlation Modeling -- 2.1 Pair-Copula Construction -- 2.2 D-Vine Copula Structure -- 3 Reliability-Sensitive Optimization -- 3.1 Multivariate Correlation Modeling -- 3.2 Joint Reliability Evaluation Methodology -- 4 Simulation Study -- 5 Conclusion -- References -- Special Session on Machine Learning and Computer Vision in Industry 4.0 -- Predictive Maintenance of ATM Machines by Modelling Remaining Useful Life with Machine Learning Techniques -- 1 Introduction -- 2 Materials -- 3 Methods -- 3.1 Task Definition -- 3.2 Feature Extraction and Selection -- 3.3 Pre-processing -- 3.4 Machine Learning Model -- 3.5 Experimental Procedure -- 4 Results -- 5 PdM Decision Support System for SIMPLE Project -- 6 Conclusions -- References -- The Impact of Content Deletion on Tabular Data Similarity Using Contextual Word Embeddings -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Experiments -- 4.1 Models -- 4.2 Datasets -- 4.3 Results -- 5 Conclusions and Future Work -- References -- Deep Learning-Based Dementia Prediction Using Multimodal Data -- 1 Introduction -- 2 DementiaBank Dataset -- 3 Approach -- 3.1 Audio -- 3.2 Text -- 3.3 Multimodal -- 3.4 Other Approaches -- 4 Evaluation -- 5 Conclusion -- References -- Lightweight Models in Face Attribute Recognition: Performance Under Oclussions -- 1 Introduction -- 2 Related Work -- 3 Description of the System -- 3.1 Models -- 3.2 Datasets -- 4 Experimental Setup -- 4.1 Training -- 4.2 Evaluation -- 5 Evaluation with Masked Faces -- 6 Conclusions and Future Work -- References -- Small Vessel Detection in Changing Seaborne Environments Using Anchor-Free Detectors on Aerial Images -- 1 Introduction -- 2 Related Work -- 2.1 Vessel Detection. , 2.2 Datasets.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer security-Congresses. ; Computational intelligence. ; Educational technology-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (279 pages)
    Edition: 1st ed.
    ISBN: 9783031184093
    Series Statement: Lecture Notes in Networks and Systems Series ; v.532
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organization -- CISIS 2021 -- General Chair -- Program Committee Chair -- Program Committee -- CISIS 2022: Special Sessions -- Cybersecurity in Future Connected Societies -- Program Committee -- Cybersecurity and Trusted Supply Chains of ICT -- Program Committee -- Intelligent Solutions for Cybersecurity -- Program Committee -- CISIS 2022 Organizing Committee Chairs -- CISIS 2022 Organizing Committee -- ICEUTE 2022 -- Organization -- General Chair -- Program Committee Chair -- Program Committee -- ICEUTE 2022 Organizing Committee Chairs -- ICEUTE 2022 Organizing Committee -- Contents -- CISIS Applications -- Analysis of Long-Range Forecast Strategies for IoT on Urban Water Consumption Prediction Task -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Experiment Design -- 3.3 Machine Learning Algorithms -- 4 Experimental Results -- 5 Conclusion -- References -- Genetic Algorithm Based Aggregation for Federated Learning in Industrial Cyber Physical Systems -- 1 Introduction -- 2 Related Work -- 3 FedGA-ICPS Framework -- 3.1 Industrial CPS -- 3.2 Learning -- 3.3 Election -- 3.4 Aggregation -- 3.5 Broadcasting -- 4 Experimental Results -- 5 Conclusion -- References -- Hand SOS Gesture Detection by Computer Vision -- 1 Introduction -- 2 Problem Description -- 3 Model Architecture -- 4 Model Evaluation -- 5 Conclusions -- References -- Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detection -- 1 Introduction -- 2 Security Risks in Smart Metering Networks -- 3 The Methodology for the SMCN Anomaly/Attack Detection -- 3.1 Detection and Elimination of Outliers, Based on the Isolation Forest Algorithm -- 3.2 Calculation of Multi-step Prediction for Anomaly Detection with 1D CNN -- 4 Experimental Results -- 5 Conclusions -- References. , An Anomaly Detection Approach for Realtime Identification Systems Based on Centroids -- 1 Introduction -- 2 Case of Study -- 2.1 Level Control Plant -- 2.2 System Integration and Its Control Implementation -- 2.3 Dataset -- 3 Methodological Approach -- 3.1 On-Line Identification Stage. Recursive Least Square -- 3.2 Fault Detection Stage -- 4 Experiments and Results -- 5 Conclusions and Future Work -- References -- Powerful Biogeography-Based Optimization Algorithm with Local Search Mechanism for Job Shop Scheduling Problem with Additional Constraints -- 1 Introduction -- 2 Job Shop Scheduling Problem with Time Lags and Single Transport Robot: JSPTL-STR -- 3 Powerful Biogeography-Based Optimization with Local Search Mechanism for Job Shop Scheduling Problem with Time Lags and Single Transport Robot -- 3.1 Habitat Representation -- 3.2 Initialization of Population -- 3.3 Migration Operator -- 3.4 Mutation Operator -- 4 Experimental Results -- 5 Conclusion -- References -- Dimensionality-Reduction Methods for the Analysis of Web Traffic -- 1 Introduction and Previous Work -- 2 Applied Methods -- 2.1 Laplacian Eigenmaps -- 2.2 Isomap -- 2.3 t-Distributed Stochastic Neighbor Embedding -- 2.4 Beta Hebbian Learning -- 3 Dataset -- 4 Results -- 4.1 Dataset 1 -- 4.2 Dataset 2 -- 5 Conclusions and Future Work -- References -- Special Session on Cybersecurity in Future Connected Societies -- About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call -- 1 Introduction -- 2 Theoretical Background -- 2.1 Security Definitions -- 2.2 Code-Based Encryption -- 3 Modern FO-Like Transformations -- 3.1 Encrypt-with-Hash -- 3.2 Implicit/Explicit Rejection -- 3.3 Definition of the Shared Secret -- 3.4 Additional Hash -- 4 FO Transformation Application in Code-Based Algorithms -- 4.1 Classic McEliece -- 4.2 BIKE -- 4.3 HQC. , 5 Conclusions -- References -- Analysis of Secret Key Agreement Protocol for Massive MIMO Systems -- 1 Introduction -- 2 System Model -- 3 Proposed SKA -- 3.1 Precoding Design -- 3.2 Protocol Design -- 4 Simulation Results -- 4.1 Secrecy Capacity -- 4.2 SKA Complexity -- 5 Conclusion -- References -- Efficient Implementation of Stream Cipher SNOW 3G for Resource-Constrained Devices -- 1 Introduction -- 2 SNOW 3G Description -- 3 Equivalent Binary Model of LFSR in GF(2n) -- 4 Efficient Implementation -- 5 Performance Evaluation -- 6 Conclusions -- References -- State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility -- 1 Introduction -- 2 CCAM Ecosystem -- 3 Challenges in CCAM Solutions -- 4 CCAM Cybersecurity -- 4.1 Threats and Attack Analysis -- 4.2 Cyberattack Target Examples -- 4.3 Cybersecurity Methodologies in the CCAM Development Process -- 5 Cryptography -- 5.1 Post-quantum Cryptography -- 5.2 Lightweight Cryptography -- 6 Conclusions -- References -- Cryptographic Protocols in Advanced Metering Infrastructures in Smart Grids -- 1 Introduction -- 2 Smart Grids and Advanced Metering Infrastructures -- 3 Security in Advanced Metering Infrastructures -- 4 Cryptographic Protocols to Secure Advanced Metering Infrastructures -- 5 Conclusions -- References -- Special Session on Cybersecurity and Trusted Supply Chains of ICT -- Orchestrator Architecture and Communication Methodology for Flexible Event Driven Message Based Communication -- 1 Introduction -- 2 Related Work -- 3 Communication Principles in Microservices-Based Architectures -- 3.1 Communication Between Microservices -- 3.2 Security -- 3.3 Communication Stages -- 4 Asynchronous Service State Handling -- 5 Orchestrator Architecture -- 5.1 Microservices Lifecycle in BIECO -- 6 Advantages and Disadvantages of This Approach -- 7 Conclusions -- References. , A Comparative Study of Machine Learning Algorithms for the Detection of Vulnerable Python Libraries -- 1 Introduction -- 2 Approach -- 2.1 Data Collection -- 2.2 Feature Extraction -- 2.3 Modelling -- 3 Implementation and Evaluation -- 3.1 Evaluation -- 4 Conclusions -- References -- Evaluation of the Reliability Index of IP Addresses in Reputation Lists -- 1 Introduction -- 2 Materials and Methods -- 2.1 Reputation Lists -- 2.2 IDS - Intrusion Detection System -- 2.3 Implementation -- 2.4 Metrics -- 3 Results -- 4 Conclusions and Further Work -- References -- Forecasting the Number of Bugs and Vulnerabilities in Software Components Using Neural Network Models -- 1 Introduction -- 2 Literature Review -- 3 Neural Network Models -- 4 Data Collection -- 5 Experimental Results -- 6 Conclusions -- References -- Special Session on Intelligent Solutions for Cybersecurity Systems -- Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery -- 1 Introduction -- 2 Markov Decision Process -- 2.1 Preliminaries -- 2.2 MDP for Finding Information in Complex Networks -- 3 Performance Evaluation -- 3.1 Case Study Description -- 3.2 Results -- 4 Conclusion -- References -- Obfuscating LLVM Intermediate Representation Source Code with NSGA-II -- 1 Introduction -- 2 Background -- 3 Problem Definition -- 4 Evolutionary Multi-objective Optimization -- 5 Experimental Setup -- 6 Validation and Experimental Results -- 7 Conclusions and Future Work -- References -- A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study -- 1 Introduction -- 2 Background -- 3 Network Topology Generation with Deep Learning -- 3.1 UGR'16 Dataset: The Neris Botnet -- 3.2 Proposed Methodology -- 4 Experimental Design -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References -- ICEUTE. , Evaluating Classifiers' Performance to Detect Attacks in Website Traffic -- 1 Introduction and Previous Work -- 2 Applied Methods -- 2.1 Information Gain -- 2.2 The LASSO -- 2.3 Support Vector Machines -- 2.4 k-Nearest Neighbour -- 3 Dataset on Web Attacks -- 4 Results -- 5 Conclusions and Future Work -- References -- Evaluation of an Interactive Guide for Robotics Self-learning -- 1 Introduction -- 2 Interactive Guide for Robotics Self-learning -- 2.1 Didactic Objectives -- 2.2 Sections -- 3 Results -- 4 Conclusions and Future Works -- References -- Gamifying the Classroom for the Acquisition of Skills Associated with Machine Learning: A Two-Year Case Study -- 1 Introduction -- 2 Gamification in Data Science and Machine Learning -- 3 Development of the Innovation Experience -- 3.1 Objectives -- 3.2 Materials and Methods -- 4 Results -- 4.1 Assessment Questionnaires -- 4.2 Results of the Teaching Innovation Experience -- 5 Conclusions -- References -- Hackathon in Teaching: Applying Machine Learning to Life Sciences Tasks -- 1 Introduction -- 2 Development of the Innovation Experience -- 2.1 Objectives -- 2.2 Materials and Methods -- 3 Results -- 3.1 Knowledge Assessment Questionnaires -- 3.2 Self-assessment -- 3.3 Qualitative Analysis -- 3.4 Results of the Teaching Innovation Experience -- 3.5 Strengths and Weaknesses of the Project -- 4 Conclusions -- References -- Digital Platforms for Education. The Case of e4you -- 1 Introduction -- 2 Materials and Methods -- 2.1 The e4you Platform -- 3 Teacher-Student Interaction. The Environment -- 3.1 Teacher-Platform Interaction -- 3.2 Learner-Platform Interaction -- 4 Main Results of Educacional Interacion -- 5 Conclusions -- References -- 3D Virtual Laboratory for Control Engineering Using Blended Learning Methodology -- 1 Introduction -- 2 Materials and Methods -- 2.1 Background. , 2.2 Virtual Plant with Factory I/O.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Artificial intelligence. ; Artificial intelligence-Congresses. ; Data mining. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (523 pages)
    Edition: 1st ed.
    ISBN: 9783031154713
    Series Statement: Lecture Notes in Computer Science Series ; v.13469
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organization -- Contents -- Bioinformatics -- A Comparison of Machine Learning Techniques for the Detection of Type-4 PhotoParoxysmal Responses in Electroencephalographic Signals -- 1 Introduction -- 2 Preliminaries and Related Work -- 3 Type-4 PPR Detection Using ML -- 3.1 Dimensional Reduction -- 3.2 Clustering and Classification -- 4 Materials and Methods -- 4.1 Data Set Description -- 4.2 Experimentation Design -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References -- Smartwatch Sleep-Tracking Services Precision Evaluation Using Supervised Domain Adaptation -- 1 Introduction -- 2 The Proposal -- 2.1 Step1: RAW Signals Preprocessing -- 2.2 Step2: Features Computing -- 2.3 Steps 3 and 4: Models Training and Domain Adaptation -- 3 Numerical Results -- 3.1 Materials and Methods -- 3.2 Experimentation Set up -- 3.3 Numerical Results -- 4 Conclusions and Future Work -- References -- Tracking and Classification of Features in the Bio-Inspired Layered Networks -- 1 Introduction -- 2 Bio-Inspired Neural Networks -- 2.1 Background of Asymmetric Neural Networks Based on the Bio-Inspired Network -- 2.2 Model of Asymmetric Networks -- 2.3 Tracking in the Asymmetric Networks -- 2.4 Orthogonality in the Asymmetric Layered Networks -- 3 Sparse Coding for Classification in the Extended Asymmetric Networks -- 3.1 Independence and Sparse Coding on the Orthogonal Subnetworks -- 3.2 Generation of Independent Basis Set via Sparse Coding Realization -- 4 Application to Data Classification via Sparse Coding Realization in the Asymmetric Networks -- 5 Conclusion -- References -- Frailty Related Survival Risks at Short and Middle Term of Older Adults Admitted to Hospital -- 1 Introduction -- 2 Materials and Methods -- 2.1 Study Design and Subjects -- 2.2 Statistical Methods -- 3 Results -- 4 Discussion. , 5 Conclusions and Future Work -- References -- On the Analysis of a Real Dataset of COVID-19 Patients in Alava -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Study Design -- 3.2 Ethical Approval and Patient Consent -- 3.3 Data Collection and Description -- 3.4 Attribute Analysis -- 3.5 Principal Component Analysis -- 3.6 Logistic Regression Feature Importance -- 4 Discussion -- 5 Conclusion -- References -- Indoor Access Control System Through Symptomatic Examination Using IoT Technology, Fog Computing and Cloud Computing -- 1 Introduction -- 2 Related Works -- 3 Operation of the Control System -- 3.1 Facial Recognition Module -- 3.2 Steps of the Detection System -- 3.3 Medical Sensors -- 3.4 Fog Computing -- 3.5 Statistics Management and User Registration Module -- 3.6 Accessibility Improvements -- 4 Conclusions and Future Work Lines -- References -- Data Mining and Decision Support Systems -- Measuring the Quality Information of Sources of Cybersecurity by Multi-Criteria Decision Making Techniques -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 DQ Model -- 3 Ranking of Sources by MCDM -- 3.1 Weighted Sum Model (WSM) -- 3.2 Analytic Hierarchy Process (AHP) -- 3.3 Concordance Between Rankings -- 4 Experimental Section -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References -- A Case of Study with the Clustering R Library to Measure the Quality of Cluster Algorithms -- 1 Introduction -- 2 The Clustering Package -- 3 A Case Study Using the Clustering Library on the Dataset of Deaths -- 4 Graphical Distribution of Results -- 5 Conclusions -- References -- Comparing Clustering Techniques on Brazilian Legal Document Datasets -- 1 Introduction -- 2 Related Work -- 3 Theoretical Basis -- 3.1 Clustering Algorithms -- 3.2 Natural Language Processing Techniques -- 4 Methodology -- 4.1 Models Description. , 4.2 Databases, Preprocessing and Embedding -- 4.3 Clustering Evaluation Framework -- 4.4 Clustering Human Evaluation -- 5 Results and Discussion -- 6 Conclusion -- 7 Future Work -- References -- Improving Short Query Representation in LDA Based Information Retrieval Systems -- 1 Introduction -- 2 Material and Methods -- 2.1 Information Retrieval Systems -- 2.2 Latent Dirichlet Allocation -- 2.3 Relevance Estimation -- 3 Proposed Query Representation Method: LDAW -- 3.1 LDAW Calculation Method -- 3.2 Relevance of the Word in Each LDA Topic -- 3.3 Relevance of the Word in the Corpus Vocabulary -- 3.4 Relevance of the Word in the Query -- 3.5 Word Vector Calculation -- 4 Evaluation -- 4.1 Data Sets -- 4.2 Evaluation Measures -- 4.3 Text Pre-processing -- 4.4 Experiments Description -- 5 Results and Discussion -- 6 Conclusions -- References -- A New Game Theoretic Based Random Forest for Binary Classification -- 1 Introduction -- 2 Decision Trees and Random Forests -- 2.1 FROG -- 2.2 RF-FROG -- 3 Numerical Experiments -- 4 Conclusions -- References -- Concept Drift Detection to Improve Time Series Forecasting of Wind Energy Generation -- 1 Introduction -- 2 Materials and Method -- 2.1 Dataset -- 2.2 Concept Drifts Detection Techniques -- 2.3 Comparison Procedure -- 3 Results -- 4 Conclusions -- References -- A Decision Support Tool for the Static Allocation of Emergency Vehicles to Stations -- 1 Introduction -- 2 Background -- 3 Architecture -- 4 Static Ambulance Allocation Model -- 4.1 Problem Description -- 4.2 Mathematical Model -- 5 Evaluation -- 5.1 Computational Evaluation -- 5.2 Model Evaluation -- 6 Conclusions -- References -- Adapting K-Means Algorithm for Pair-Wise Constrained Clustering of Imbalanced Data Streams -- 1 Introduction -- 2 Algorithm -- 3 Experiments -- 3.1 Research Protocol -- 3.2 Experimental Setup -- 3.3 Results. , 4 Conclusions -- References -- Small Wind Turbine Power Forecasting Using Long Short-Term Memory Networks for Energy Management Systems -- 1 Introduction -- 2 Case Study -- 2.1 Sotavento Galicia Building -- 2.2 Dataset Description -- 3 Energy Management System -- 4 Experiments and Results -- 4.1 Experiments Setup -- 4.2 Results -- 5 Conclusions and Future Work -- References -- CORE-BCD-mAI: A Composite Framework for Representing, Querying, and Analyzing Big Clinical Data by Means of Multidimensional AI Tools -- 1 Introduction -- 2 Motivations: Combining Multidimensional AI Tools and Big Clinical Data -- 3 CORE-BCD-mAI: Methodologies and Anatomy -- 4 CORE-BCD-mAI: Research Challenges -- 5 Conclusions and Future Work -- References -- Generalized Fisher Kernel with Bregman Divergence -- 1 Introduction -- 2 Statement of the Problem -- 2.1 Non-parametric Approach -- 3 Non Parametric General Solutions -- 4 Examples -- 5 Conclusion -- References -- A HAIS Approach to Predict the Energy Produced by a Solar Panel -- 1 Introduction -- 2 Case of Study -- 2.1 Sotavento Bioclimatic House -- 2.2 Bioclimatic House Facilities -- 2.3 Solar Thermal System -- 3 Techniques Applied -- 3.1 Statistical Regression Techniques -- 3.2 Artificial Neural Networks -- 3.3 Clustering Technique -- 4 Results and Discussion -- 5 Conclusions and Future Work -- References -- Deep Learning -- Companion Losses for Ordinal Regression -- 1 Introduction -- 2 OR Overview -- 3 Companion Losses for OR -- 4 Experimental Results -- 4.1 Companion Loss Models -- 4.2 Comparison with Classical or Models -- 5 Discussion and Conclusions -- References -- Convex Multi-Task Learning with Neural Networks -- 1 Introduction -- 2 Multi-Task Learning Approaches -- 2.1 Multi-Task Learning with a Feature-Learning Approach -- 2.2 Multi-Task Learning with a Regularization-Based Approach. , 2.3 Multi-Task Learning with a Combination Approach -- 3 Convex MTL Neural Networks -- 3.1 Definition -- 3.2 Training Procedure -- 3.3 Implementation Details -- 4 Experimental Results -- 4.1 Problems Description -- 4.2 Experimental Procedure -- 4.3 Analysis of the Results -- 5 Conclusions and Further Work -- References -- Smash: A Compression Benchmark with AI Datasets from Remote GPU Virtualization Systems -- 1 Introduction -- 2 Related Work -- 2.1 Remote GPU Virtualization -- 2.2 Compression Libraries -- 2.3 Datasets Used with Compression Libraries -- 3 The Smash Compression Benchmark for AI -- 3.1 A New Dataset for AI Applications -- 3.2 The Smash Compression Benchmark -- 4 Experiments -- 5 Conclusion -- References -- Time Series Forecasting Using Artificial Neural Networks -- 1 Introduction -- 2 Background -- 3 Materials and Methods -- 4 ANN Architectures -- 4.1 Multi-layer Neural Network -- 4.2 Recurrent Neural Networks -- 5 Results and Discussion -- 5.1 Recurrent Neural Network Performance -- 5.2 Results Comparison -- 6 Conclusions -- References -- A Fine-Grained Study of Interpretability of Convolutional Neural Networks for Text Classification -- 1 Introduction -- 2 Related Work -- 2.1 Network Interpretability -- 3 Methodology -- 4 Evaluation -- 4.1 Corpora -- 4.2 Model Studied -- 4.3 Experimental Phase -- 4.4 Study of the Interpretability of the Convolutional Layers -- 5 Conclusions and Future Work -- References -- Olive Phenology Forecasting Using Information Fusion-Based Imbalanced Preprocessing and Automated Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Imbalanced Techniques -- 3.3 Automated Deep Learning Proposal -- 3.4 Benchmark Algorithms -- 4 Experimentation and Results -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Experimental Settings -- 4.4 Results and Discussion. , 5 Conclusions.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...