GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Schlagwort(e): Computational intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (676 pages)
    Ausgabe: 1st ed.
    ISBN: 9783031180507
    Serie: Lecture Notes in Networks and Systems Series ; v.531
    DDC: 929.605
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Organization -- General Chair -- International Advisory Committee -- Program Committee Chairs -- Program Committee -- Special Sessions -- Machine Learning and Computer Vision in Industry 4.0 -- Program Committee -- Time Series Forecasting in Industrial and Environmental Applications -- Program Committee -- Optimization, Modeling, and Control by Soft Computing Techniques -- Program Committee -- Soft Computing Applied to Renewable Energy Systems -- Program Committee -- Preprocessing Big Data in Machine Learning -- Program Committee -- Tackling Real-World Problems with Artificial Intelligence -- Program Committee -- SOCO 2022 Organizing Committee Chairs -- SOCO 2022 Organizing Committee -- Contents -- Decision Support and Deep Learning -- Anomaly Detection of Security Threats to Cyber-Physical Systems: A Study -- 1 Introduction -- 2 Statistical Analysis -- 3 Literature Analysis -- 3.1 CPS Security Design -- 3.2 Anomaly Detection/Threat Detection in CPS -- 4 Outstanding Challenges -- 5 Conclusions -- References -- Predictive Maintenance for Maintenance-Effective Manufacturing Using Machine Learning Approaches -- 1 Introduction -- 2 State-of-the-Art -- 3 Training/Testing Dataset -- 4 Proposed Methodology -- 4.1 Gradient Boosting Training -- 4.2 Support Vector Machine Training -- 5 Results and Discussion -- 6 Conclusions -- References -- Estimation of Lamb Weight Using Transfer Learning and Regression -- 1 Introduction -- 2 Image Acquisition and Data Preparation -- 3 Proposed Architecture -- 4 Experimental Results -- 5 Conclusions -- References -- UAV Simulation for Object Detection and 3D Reconstruction Fusing 2D LiDAR and Camera -- 1 Introduction -- 2 Related Works -- 3 Simulation Framework -- 4 Proposed Process -- 5 Demonstration and Evaluation -- 6 Conclusions and Perspectives -- References. , A SO2 Pollution Concentrations Prediction Approach Using Autoencoders -- 1 Introduction -- 2 Database -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- CPU Computation Influence on Energy Consumption Forecasting Activities of a Building -- 1 Introduction -- 2 Methodology -- 3 Case Study and Results -- 3.1 Case Study -- 3.2 Results -- 4 Conclusions -- References -- Python-Based Ecosystem for Agent Communities Simulation -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution -- 3.1 PEAK Multi-agent System Platform -- 3.2 Management -- 4 Case Study -- 5 Conclusion -- References -- Deep Learning Approach for the Prediction of the Concentration of Chlorophyll ɑ in Seawater. A Case Study in El Mar Menor (Spain) -- 1 Introduction -- 2 Area Description and Datasets -- 3 Methods -- 3.1 Artificial Neural Networks -- 3.2 Bayesian Regularized Neural Networks -- 3.3 Long Short-Term Memory Neural Networks -- 3.4 Mutual Information -- 3.5 Minimum-Redundancy-Maximum-Relevance (mRMR) -- 4 Experimental Procedure -- 4.1 Creation of the Lagged Datasets -- 4.2 Forecasting Models -- 5 Results and Discussion -- 6 Conclusions -- References -- Evolutionary Computing -- A Hybrid Discrete Symbiotic Organisms Search Algorithm and List-Based Simulated Annealing Algorithm for Traveling Salesman Problem -- 1 Introduction -- 2 A Discrete Symbiotic Organisms Search Algorithm for TSP -- 2.1 Mutualism Phase -- 2.2 Commensalism Phase -- 2.3 Parasitism Phase -- 3 A List-Based Simulated Annealing Algorithm for TSP -- 4 A Hybrid DSOS-LBSA Algorithm for TSP -- 5 Computational Results and Discussion -- 5.1 Parameter Settings -- 5.2 Computational Results and Analysis -- 6 Conclusion and Future Work -- References -- Estimation of Distribution Algorithms Applied to the Next Release Problem -- 1 Introduction -- 2 Next Release Problem -- 2.1 Related Work. , 2.2 Multi-objective Next Release Problem -- 3 Proposal: Univariate EDAs for the MONRP -- 3.1 MONRP-UMDA -- 3.2 MONRP-PBIL -- 4 Experimental Evaluation -- 4.1 Algorithms -- 4.2 Datasets -- 4.3 Methodology -- 5 Results and Analysis -- 5.1 Best Configurations -- 5.2 Pareto Front Results -- 5.3 Metrics Results -- 6 Conclusions and Future Works -- References -- An Extremal Optimization Approach to the Pairwise Connectivity Critical Node Detection Problem -- 1 Introduction -- 2 Related Work and Problem Formulation -- 3 Extremal Optimization -- 4 Numerical Experiments -- 5 Conclusions -- References -- Neural Networks and Data Mining -- Dimensional Reduction Applied to an Intelligent Model for Boost Converter Switching Operation -- 1 Introduction -- 2 Case Study -- 3 Model Approach -- 3.1 Dataset -- 3.2 Methods -- 3.3 Classification Model -- 3.4 Experiments Description -- 4 Results -- 5 Conclusions and Future Works -- References -- Intuitionistic Fuzzy Sets in J-CO-QL+? -- 1 Introduction -- 2 Background -- 2.1 Classical Fuzzy Sets -- 2.2 Intuitionistic Fuzzy Sets and Relations -- 2.3 Example: Representing Medical Knowledge -- 3 Intuitionistic Fuzzy Sets and J-CO-QL+ -- 3.1 J-CO-QL+ Data Model and Execution Model -- 3.2 J-CO-QL+ Script -- 4 Learned Lessons and Conclusions -- References -- Assessing the Efficient Market Hypothesis for Cryptocurrencies with High-Frequency Data Using Time Series Classification -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 4 Experiments and Results -- 4.1 Datasets Used -- 4.2 Experimental Settings and Performance Measures -- 4.3 Results -- 5 Conclusions -- References -- Blockchain for Supply Chain Traceability with Data Validation -- 1 Introduction -- 2 Related Work -- 3 Blockchain-Based GSC Traceability -- 4 Smart Contract for GSC Traceability -- 5 Smart Contract Implementation and Performance Evaluation. , 6 Conclusions and Future Work -- References -- Compression of Clustered Ship Trajectories for Context Learning and Anomaly Detection -- 1 Introduction -- 2 Background Information -- 2.1 Data Pre-processing and Data Imbalance -- 2.2 Trajectory Clustering -- 2.3 Trajectory Compression -- 3 Proposed Architecture -- 3.1 Data Preparation and Cluster Generation -- 3.2 Compression of Trajectories -- 3.3 Representative Points Extraction -- 4 Results Analysis -- 5 Conclusions and Perspectives -- References -- DR Participants' Actual Response Prediction Using Artificial Neural Networks -- 1 Introduction -- 2 Proposed Methodology -- 3 Case Study -- 4 Results and Discussion -- 5 Conclusion -- References -- Non-linear Neural Models to Predict HRC Steel Price in Spain -- 1 Introduction and Previous Work -- 2 Materials and Methods -- 2.1 Dataset -- 2.2 Non-lineal Neural Models -- 3 Experiments and Results -- 4 Conclusions and Future Work -- References -- Soft Computing Applications -- First Steps Predicting Execution of Civil Works from Georeferenced Infrastructure Data -- 1 Introduction -- 1.1 State of the Art -- 1.2 Research Proposal -- 2 Methodology -- 2.1 Preprocess -- 2.2 Data Analysis -- 2.3 Dataset Generation -- 2.4 Supervised Classification -- 2.5 Evaluation -- 2.6 Results -- 3 Conclusion -- References -- Virtual Sensor to Estimate Air Pollution Heavy Metals Using Bioindicators -- 1 Introduction -- 2 Database -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- Regression Techniques to Predict the Growth of Potato Tubers -- 1 Introduction -- 2 Previous Work -- 3 Regression Techniques -- 3.1 Multiple Linear Regression -- 3.2 Multilayer Perceptron -- 3.3 Radial-Basis Function Network -- 3.4 Support Vector Machine -- 4 Materials and Methods -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References. , Reliability-Sensitive Optimization for Provision of Ancillary Services by Tempo-Spatial Correlated Distributed Energy Resources -- 1 Introduction -- 2 Multivariate Correlation Modeling -- 2.1 Pair-Copula Construction -- 2.2 D-Vine Copula Structure -- 3 Reliability-Sensitive Optimization -- 3.1 Multivariate Correlation Modeling -- 3.2 Joint Reliability Evaluation Methodology -- 4 Simulation Study -- 5 Conclusion -- References -- Special Session on Machine Learning and Computer Vision in Industry 4.0 -- Predictive Maintenance of ATM Machines by Modelling Remaining Useful Life with Machine Learning Techniques -- 1 Introduction -- 2 Materials -- 3 Methods -- 3.1 Task Definition -- 3.2 Feature Extraction and Selection -- 3.3 Pre-processing -- 3.4 Machine Learning Model -- 3.5 Experimental Procedure -- 4 Results -- 5 PdM Decision Support System for SIMPLE Project -- 6 Conclusions -- References -- The Impact of Content Deletion on Tabular Data Similarity Using Contextual Word Embeddings -- 1 Introduction -- 2 Related Work -- 3 Research Method -- 4 Experiments -- 4.1 Models -- 4.2 Datasets -- 4.3 Results -- 5 Conclusions and Future Work -- References -- Deep Learning-Based Dementia Prediction Using Multimodal Data -- 1 Introduction -- 2 DementiaBank Dataset -- 3 Approach -- 3.1 Audio -- 3.2 Text -- 3.3 Multimodal -- 3.4 Other Approaches -- 4 Evaluation -- 5 Conclusion -- References -- Lightweight Models in Face Attribute Recognition: Performance Under Oclussions -- 1 Introduction -- 2 Related Work -- 3 Description of the System -- 3.1 Models -- 3.2 Datasets -- 4 Experimental Setup -- 4.1 Training -- 4.2 Evaluation -- 5 Evaluation with Masked Faces -- 6 Conclusions and Future Work -- References -- Small Vessel Detection in Changing Seaborne Environments Using Anchor-Free Detectors on Aerial Images -- 1 Introduction -- 2 Related Work -- 2.1 Vessel Detection. , 2.2 Datasets.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Schlagwort(e): Computer security-Congresses. ; Computational intelligence. ; Educational technology-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (279 pages)
    Ausgabe: 1st ed.
    ISBN: 9783031184093
    Serie: Lecture Notes in Networks and Systems Series ; v.532
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Organization -- CISIS 2021 -- General Chair -- Program Committee Chair -- Program Committee -- CISIS 2022: Special Sessions -- Cybersecurity in Future Connected Societies -- Program Committee -- Cybersecurity and Trusted Supply Chains of ICT -- Program Committee -- Intelligent Solutions for Cybersecurity -- Program Committee -- CISIS 2022 Organizing Committee Chairs -- CISIS 2022 Organizing Committee -- ICEUTE 2022 -- Organization -- General Chair -- Program Committee Chair -- Program Committee -- ICEUTE 2022 Organizing Committee Chairs -- ICEUTE 2022 Organizing Committee -- Contents -- CISIS Applications -- Analysis of Long-Range Forecast Strategies for IoT on Urban Water Consumption Prediction Task -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Experiment Design -- 3.3 Machine Learning Algorithms -- 4 Experimental Results -- 5 Conclusion -- References -- Genetic Algorithm Based Aggregation for Federated Learning in Industrial Cyber Physical Systems -- 1 Introduction -- 2 Related Work -- 3 FedGA-ICPS Framework -- 3.1 Industrial CPS -- 3.2 Learning -- 3.3 Election -- 3.4 Aggregation -- 3.5 Broadcasting -- 4 Experimental Results -- 5 Conclusion -- References -- Hand SOS Gesture Detection by Computer Vision -- 1 Introduction -- 2 Problem Description -- 3 Model Architecture -- 4 Model Evaluation -- 5 Conclusions -- References -- Prediction of Smart Energy Meter Network Traffic Features for Anomaly Detection -- 1 Introduction -- 2 Security Risks in Smart Metering Networks -- 3 The Methodology for the SMCN Anomaly/Attack Detection -- 3.1 Detection and Elimination of Outliers, Based on the Isolation Forest Algorithm -- 3.2 Calculation of Multi-step Prediction for Anomaly Detection with 1D CNN -- 4 Experimental Results -- 5 Conclusions -- References. , An Anomaly Detection Approach for Realtime Identification Systems Based on Centroids -- 1 Introduction -- 2 Case of Study -- 2.1 Level Control Plant -- 2.2 System Integration and Its Control Implementation -- 2.3 Dataset -- 3 Methodological Approach -- 3.1 On-Line Identification Stage. Recursive Least Square -- 3.2 Fault Detection Stage -- 4 Experiments and Results -- 5 Conclusions and Future Work -- References -- Powerful Biogeography-Based Optimization Algorithm with Local Search Mechanism for Job Shop Scheduling Problem with Additional Constraints -- 1 Introduction -- 2 Job Shop Scheduling Problem with Time Lags and Single Transport Robot: JSPTL-STR -- 3 Powerful Biogeography-Based Optimization with Local Search Mechanism for Job Shop Scheduling Problem with Time Lags and Single Transport Robot -- 3.1 Habitat Representation -- 3.2 Initialization of Population -- 3.3 Migration Operator -- 3.4 Mutation Operator -- 4 Experimental Results -- 5 Conclusion -- References -- Dimensionality-Reduction Methods for the Analysis of Web Traffic -- 1 Introduction and Previous Work -- 2 Applied Methods -- 2.1 Laplacian Eigenmaps -- 2.2 Isomap -- 2.3 t-Distributed Stochastic Neighbor Embedding -- 2.4 Beta Hebbian Learning -- 3 Dataset -- 4 Results -- 4.1 Dataset 1 -- 4.2 Dataset 2 -- 5 Conclusions and Future Work -- References -- Special Session on Cybersecurity in Future Connected Societies -- About the Fujisaki-Okamoto Transformation in the Code-Based Algorithms of the NIST Post-quantum Call -- 1 Introduction -- 2 Theoretical Background -- 2.1 Security Definitions -- 2.2 Code-Based Encryption -- 3 Modern FO-Like Transformations -- 3.1 Encrypt-with-Hash -- 3.2 Implicit/Explicit Rejection -- 3.3 Definition of the Shared Secret -- 3.4 Additional Hash -- 4 FO Transformation Application in Code-Based Algorithms -- 4.1 Classic McEliece -- 4.2 BIKE -- 4.3 HQC. , 5 Conclusions -- References -- Analysis of Secret Key Agreement Protocol for Massive MIMO Systems -- 1 Introduction -- 2 System Model -- 3 Proposed SKA -- 3.1 Precoding Design -- 3.2 Protocol Design -- 4 Simulation Results -- 4.1 Secrecy Capacity -- 4.2 SKA Complexity -- 5 Conclusion -- References -- Efficient Implementation of Stream Cipher SNOW 3G for Resource-Constrained Devices -- 1 Introduction -- 2 SNOW 3G Description -- 3 Equivalent Binary Model of LFSR in GF(2n) -- 4 Efficient Implementation -- 5 Performance Evaluation -- 6 Conclusions -- References -- State of the Art of Cybersecurity in Cooperative, Connected and Automated Mobility -- 1 Introduction -- 2 CCAM Ecosystem -- 3 Challenges in CCAM Solutions -- 4 CCAM Cybersecurity -- 4.1 Threats and Attack Analysis -- 4.2 Cyberattack Target Examples -- 4.3 Cybersecurity Methodologies in the CCAM Development Process -- 5 Cryptography -- 5.1 Post-quantum Cryptography -- 5.2 Lightweight Cryptography -- 6 Conclusions -- References -- Cryptographic Protocols in Advanced Metering Infrastructures in Smart Grids -- 1 Introduction -- 2 Smart Grids and Advanced Metering Infrastructures -- 3 Security in Advanced Metering Infrastructures -- 4 Cryptographic Protocols to Secure Advanced Metering Infrastructures -- 5 Conclusions -- References -- Special Session on Cybersecurity and Trusted Supply Chains of ICT -- Orchestrator Architecture and Communication Methodology for Flexible Event Driven Message Based Communication -- 1 Introduction -- 2 Related Work -- 3 Communication Principles in Microservices-Based Architectures -- 3.1 Communication Between Microservices -- 3.2 Security -- 3.3 Communication Stages -- 4 Asynchronous Service State Handling -- 5 Orchestrator Architecture -- 5.1 Microservices Lifecycle in BIECO -- 6 Advantages and Disadvantages of This Approach -- 7 Conclusions -- References. , A Comparative Study of Machine Learning Algorithms for the Detection of Vulnerable Python Libraries -- 1 Introduction -- 2 Approach -- 2.1 Data Collection -- 2.2 Feature Extraction -- 2.3 Modelling -- 3 Implementation and Evaluation -- 3.1 Evaluation -- 4 Conclusions -- References -- Evaluation of the Reliability Index of IP Addresses in Reputation Lists -- 1 Introduction -- 2 Materials and Methods -- 2.1 Reputation Lists -- 2.2 IDS - Intrusion Detection System -- 2.3 Implementation -- 2.4 Metrics -- 3 Results -- 4 Conclusions and Further Work -- References -- Forecasting the Number of Bugs and Vulnerabilities in Software Components Using Neural Network Models -- 1 Introduction -- 2 Literature Review -- 3 Neural Network Models -- 4 Data Collection -- 5 Experimental Results -- 6 Conclusions -- References -- Special Session on Intelligent Solutions for Cybersecurity Systems -- Reinforcement Learning Model Free with GLIE Monte-Carlo on Policy Update for Network Topology Discovery -- 1 Introduction -- 2 Markov Decision Process -- 2.1 Preliminaries -- 2.2 MDP for Finding Information in Complex Networks -- 3 Performance Evaluation -- 3.1 Case Study Description -- 3.2 Results -- 4 Conclusion -- References -- Obfuscating LLVM Intermediate Representation Source Code with NSGA-II -- 1 Introduction -- 2 Background -- 3 Problem Definition -- 4 Evolutionary Multi-objective Optimization -- 5 Experimental Setup -- 6 Validation and Experimental Results -- 7 Conclusions and Future Work -- References -- A Deep Learning-Based Approach for Mimicking Network Topologies: The Neris Botnet as a Case of Study -- 1 Introduction -- 2 Background -- 3 Network Topology Generation with Deep Learning -- 3.1 UGR'16 Dataset: The Neris Botnet -- 3.2 Proposed Methodology -- 4 Experimental Design -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References -- ICEUTE. , Evaluating Classifiers' Performance to Detect Attacks in Website Traffic -- 1 Introduction and Previous Work -- 2 Applied Methods -- 2.1 Information Gain -- 2.2 The LASSO -- 2.3 Support Vector Machines -- 2.4 k-Nearest Neighbour -- 3 Dataset on Web Attacks -- 4 Results -- 5 Conclusions and Future Work -- References -- Evaluation of an Interactive Guide for Robotics Self-learning -- 1 Introduction -- 2 Interactive Guide for Robotics Self-learning -- 2.1 Didactic Objectives -- 2.2 Sections -- 3 Results -- 4 Conclusions and Future Works -- References -- Gamifying the Classroom for the Acquisition of Skills Associated with Machine Learning: A Two-Year Case Study -- 1 Introduction -- 2 Gamification in Data Science and Machine Learning -- 3 Development of the Innovation Experience -- 3.1 Objectives -- 3.2 Materials and Methods -- 4 Results -- 4.1 Assessment Questionnaires -- 4.2 Results of the Teaching Innovation Experience -- 5 Conclusions -- References -- Hackathon in Teaching: Applying Machine Learning to Life Sciences Tasks -- 1 Introduction -- 2 Development of the Innovation Experience -- 2.1 Objectives -- 2.2 Materials and Methods -- 3 Results -- 3.1 Knowledge Assessment Questionnaires -- 3.2 Self-assessment -- 3.3 Qualitative Analysis -- 3.4 Results of the Teaching Innovation Experience -- 3.5 Strengths and Weaknesses of the Project -- 4 Conclusions -- References -- Digital Platforms for Education. The Case of e4you -- 1 Introduction -- 2 Materials and Methods -- 2.1 The e4you Platform -- 3 Teacher-Student Interaction. The Environment -- 3.1 Teacher-Platform Interaction -- 3.2 Learner-Platform Interaction -- 4 Main Results of Educacional Interacion -- 5 Conclusions -- References -- 3D Virtual Laboratory for Control Engineering Using Blended Learning Methodology -- 1 Introduction -- 2 Materials and Methods -- 2.1 Background. , 2.2 Virtual Plant with Factory I/O.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Schlagwort(e): Artificial intelligence. ; Artificial intelligence-Congresses. ; Data mining. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (523 pages)
    Ausgabe: 1st ed.
    ISBN: 9783031154713
    Serie: Lecture Notes in Computer Science Series ; v.13469
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Organization -- Contents -- Bioinformatics -- A Comparison of Machine Learning Techniques for the Detection of Type-4 PhotoParoxysmal Responses in Electroencephalographic Signals -- 1 Introduction -- 2 Preliminaries and Related Work -- 3 Type-4 PPR Detection Using ML -- 3.1 Dimensional Reduction -- 3.2 Clustering and Classification -- 4 Materials and Methods -- 4.1 Data Set Description -- 4.2 Experimentation Design -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References -- Smartwatch Sleep-Tracking Services Precision Evaluation Using Supervised Domain Adaptation -- 1 Introduction -- 2 The Proposal -- 2.1 Step1: RAW Signals Preprocessing -- 2.2 Step2: Features Computing -- 2.3 Steps 3 and 4: Models Training and Domain Adaptation -- 3 Numerical Results -- 3.1 Materials and Methods -- 3.2 Experimentation Set up -- 3.3 Numerical Results -- 4 Conclusions and Future Work -- References -- Tracking and Classification of Features in the Bio-Inspired Layered Networks -- 1 Introduction -- 2 Bio-Inspired Neural Networks -- 2.1 Background of Asymmetric Neural Networks Based on the Bio-Inspired Network -- 2.2 Model of Asymmetric Networks -- 2.3 Tracking in the Asymmetric Networks -- 2.4 Orthogonality in the Asymmetric Layered Networks -- 3 Sparse Coding for Classification in the Extended Asymmetric Networks -- 3.1 Independence and Sparse Coding on the Orthogonal Subnetworks -- 3.2 Generation of Independent Basis Set via Sparse Coding Realization -- 4 Application to Data Classification via Sparse Coding Realization in the Asymmetric Networks -- 5 Conclusion -- References -- Frailty Related Survival Risks at Short and Middle Term of Older Adults Admitted to Hospital -- 1 Introduction -- 2 Materials and Methods -- 2.1 Study Design and Subjects -- 2.2 Statistical Methods -- 3 Results -- 4 Discussion. , 5 Conclusions and Future Work -- References -- On the Analysis of a Real Dataset of COVID-19 Patients in Alava -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Study Design -- 3.2 Ethical Approval and Patient Consent -- 3.3 Data Collection and Description -- 3.4 Attribute Analysis -- 3.5 Principal Component Analysis -- 3.6 Logistic Regression Feature Importance -- 4 Discussion -- 5 Conclusion -- References -- Indoor Access Control System Through Symptomatic Examination Using IoT Technology, Fog Computing and Cloud Computing -- 1 Introduction -- 2 Related Works -- 3 Operation of the Control System -- 3.1 Facial Recognition Module -- 3.2 Steps of the Detection System -- 3.3 Medical Sensors -- 3.4 Fog Computing -- 3.5 Statistics Management and User Registration Module -- 3.6 Accessibility Improvements -- 4 Conclusions and Future Work Lines -- References -- Data Mining and Decision Support Systems -- Measuring the Quality Information of Sources of Cybersecurity by Multi-Criteria Decision Making Techniques -- 1 Introduction -- 2 Background -- 2.1 Related Work -- 2.2 DQ Model -- 3 Ranking of Sources by MCDM -- 3.1 Weighted Sum Model (WSM) -- 3.2 Analytic Hierarchy Process (AHP) -- 3.3 Concordance Between Rankings -- 4 Experimental Section -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References -- A Case of Study with the Clustering R Library to Measure the Quality of Cluster Algorithms -- 1 Introduction -- 2 The Clustering Package -- 3 A Case Study Using the Clustering Library on the Dataset of Deaths -- 4 Graphical Distribution of Results -- 5 Conclusions -- References -- Comparing Clustering Techniques on Brazilian Legal Document Datasets -- 1 Introduction -- 2 Related Work -- 3 Theoretical Basis -- 3.1 Clustering Algorithms -- 3.2 Natural Language Processing Techniques -- 4 Methodology -- 4.1 Models Description. , 4.2 Databases, Preprocessing and Embedding -- 4.3 Clustering Evaluation Framework -- 4.4 Clustering Human Evaluation -- 5 Results and Discussion -- 6 Conclusion -- 7 Future Work -- References -- Improving Short Query Representation in LDA Based Information Retrieval Systems -- 1 Introduction -- 2 Material and Methods -- 2.1 Information Retrieval Systems -- 2.2 Latent Dirichlet Allocation -- 2.3 Relevance Estimation -- 3 Proposed Query Representation Method: LDAW -- 3.1 LDAW Calculation Method -- 3.2 Relevance of the Word in Each LDA Topic -- 3.3 Relevance of the Word in the Corpus Vocabulary -- 3.4 Relevance of the Word in the Query -- 3.5 Word Vector Calculation -- 4 Evaluation -- 4.1 Data Sets -- 4.2 Evaluation Measures -- 4.3 Text Pre-processing -- 4.4 Experiments Description -- 5 Results and Discussion -- 6 Conclusions -- References -- A New Game Theoretic Based Random Forest for Binary Classification -- 1 Introduction -- 2 Decision Trees and Random Forests -- 2.1 FROG -- 2.2 RF-FROG -- 3 Numerical Experiments -- 4 Conclusions -- References -- Concept Drift Detection to Improve Time Series Forecasting of Wind Energy Generation -- 1 Introduction -- 2 Materials and Method -- 2.1 Dataset -- 2.2 Concept Drifts Detection Techniques -- 2.3 Comparison Procedure -- 3 Results -- 4 Conclusions -- References -- A Decision Support Tool for the Static Allocation of Emergency Vehicles to Stations -- 1 Introduction -- 2 Background -- 3 Architecture -- 4 Static Ambulance Allocation Model -- 4.1 Problem Description -- 4.2 Mathematical Model -- 5 Evaluation -- 5.1 Computational Evaluation -- 5.2 Model Evaluation -- 6 Conclusions -- References -- Adapting K-Means Algorithm for Pair-Wise Constrained Clustering of Imbalanced Data Streams -- 1 Introduction -- 2 Algorithm -- 3 Experiments -- 3.1 Research Protocol -- 3.2 Experimental Setup -- 3.3 Results. , 4 Conclusions -- References -- Small Wind Turbine Power Forecasting Using Long Short-Term Memory Networks for Energy Management Systems -- 1 Introduction -- 2 Case Study -- 2.1 Sotavento Galicia Building -- 2.2 Dataset Description -- 3 Energy Management System -- 4 Experiments and Results -- 4.1 Experiments Setup -- 4.2 Results -- 5 Conclusions and Future Work -- References -- CORE-BCD-mAI: A Composite Framework for Representing, Querying, and Analyzing Big Clinical Data by Means of Multidimensional AI Tools -- 1 Introduction -- 2 Motivations: Combining Multidimensional AI Tools and Big Clinical Data -- 3 CORE-BCD-mAI: Methodologies and Anatomy -- 4 CORE-BCD-mAI: Research Challenges -- 5 Conclusions and Future Work -- References -- Generalized Fisher Kernel with Bregman Divergence -- 1 Introduction -- 2 Statement of the Problem -- 2.1 Non-parametric Approach -- 3 Non Parametric General Solutions -- 4 Examples -- 5 Conclusion -- References -- A HAIS Approach to Predict the Energy Produced by a Solar Panel -- 1 Introduction -- 2 Case of Study -- 2.1 Sotavento Bioclimatic House -- 2.2 Bioclimatic House Facilities -- 2.3 Solar Thermal System -- 3 Techniques Applied -- 3.1 Statistical Regression Techniques -- 3.2 Artificial Neural Networks -- 3.3 Clustering Technique -- 4 Results and Discussion -- 5 Conclusions and Future Work -- References -- Deep Learning -- Companion Losses for Ordinal Regression -- 1 Introduction -- 2 OR Overview -- 3 Companion Losses for OR -- 4 Experimental Results -- 4.1 Companion Loss Models -- 4.2 Comparison with Classical or Models -- 5 Discussion and Conclusions -- References -- Convex Multi-Task Learning with Neural Networks -- 1 Introduction -- 2 Multi-Task Learning Approaches -- 2.1 Multi-Task Learning with a Feature-Learning Approach -- 2.2 Multi-Task Learning with a Regularization-Based Approach. , 2.3 Multi-Task Learning with a Combination Approach -- 3 Convex MTL Neural Networks -- 3.1 Definition -- 3.2 Training Procedure -- 3.3 Implementation Details -- 4 Experimental Results -- 4.1 Problems Description -- 4.2 Experimental Procedure -- 4.3 Analysis of the Results -- 5 Conclusions and Further Work -- References -- Smash: A Compression Benchmark with AI Datasets from Remote GPU Virtualization Systems -- 1 Introduction -- 2 Related Work -- 2.1 Remote GPU Virtualization -- 2.2 Compression Libraries -- 2.3 Datasets Used with Compression Libraries -- 3 The Smash Compression Benchmark for AI -- 3.1 A New Dataset for AI Applications -- 3.2 The Smash Compression Benchmark -- 4 Experiments -- 5 Conclusion -- References -- Time Series Forecasting Using Artificial Neural Networks -- 1 Introduction -- 2 Background -- 3 Materials and Methods -- 4 ANN Architectures -- 4.1 Multi-layer Neural Network -- 4.2 Recurrent Neural Networks -- 5 Results and Discussion -- 5.1 Recurrent Neural Network Performance -- 5.2 Results Comparison -- 6 Conclusions -- References -- A Fine-Grained Study of Interpretability of Convolutional Neural Networks for Text Classification -- 1 Introduction -- 2 Related Work -- 2.1 Network Interpretability -- 3 Methodology -- 4 Evaluation -- 4.1 Corpora -- 4.2 Model Studied -- 4.3 Experimental Phase -- 4.4 Study of the Interpretability of the Convolutional Layers -- 5 Conclusions and Future Work -- References -- Olive Phenology Forecasting Using Information Fusion-Based Imbalanced Preprocessing and Automated Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Imbalanced Techniques -- 3.3 Automated Deep Learning Proposal -- 3.4 Benchmark Algorithms -- 4 Experimentation and Results -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Experimental Settings -- 4.4 Results and Discussion. , 5 Conclusions.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...