![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing
Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gerard Govaert is Professor at the University of Technology of Compiegne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabilistic approaches are established. A combination of algorithms are proposed and evaluated on simulated and real data. Chapter 5 considers a co-clustering or bi-clustering as the search for coherent co-clusters in biological terms or the extraction of co-clusters under conditions. Classical algorithms will be described and evaluated on simulated and real data. Different indices to evaluate the quality of coclusters are noted and used in numerical experiments.
This book provides an essential overview of the broad range of functional brain imaging techniques, as well as neuroscientific methods suitable for various scientific tasks in fundamental and clinical neuroscience. It also shares information on novel methods in computational neuroscience, mathematical algorithms, image processing, and applications to neuroscience. The mammalian brain is a huge and complex network that consists of billions of neural and glial cells. Decoding how information is represented and processed by this neural network requires the ability to monitor the dynamics of large numbers of neurons at high temporal and spatial resolution over a large part of the brain. Functional brain optical imaging has seen more than thirty years of intensive development. Current light-using methods provide good sensitivity to functional changes through intrinsic contrast and are rapidly exploiting the growing availability of exogenous fluorescence probes. In addition, various types of functional brain optical imaging are now being used to reveal the brain's microanatomy and physiology.
This book is intended for entry-level digital SLR users. It is a comprehensive step-by-step guide that includes a pullout quick reference card. UK author Jon Sparks provides practical tips on how to get the best from this versatile camera. The D3300 is Nikon's latest entry-level DSLR. It is designed to marry the versatility and image quality of an SLR with the simplicity and ease of handling of the best digital compacts. Nikon has always valued continuity as well as innovation; e.g, it has retained its tried and tested F lens-mount (originally introduced in 1959). This means it's possible to use many classic Nikon lenses with the D3300. At first glance, the D3300 may look like a modest upgrade to the D3200, but there are some significant changes under the surface. The camera is almost exactly the same size as its predecessor, but significantly lighter. It has a 24-megapixel sensor; the pixel count may be the same as the D3200, but there's a major difference as the D3300 has dispensed with an 'anti-aliasing' filter in front of its sensor to make images even sharper.
This book aims to present a survey of a large class of nonlinear dynamical systems exhibiting mixed-mode oscillations (MMOs). It is a sort of a guide to systems related to MMOs that features material from original research papers, including the author's own studies. The material is presented in seven chapters divided into sections. Usually, the first sections are of an introductory nature, explain phenomena, and exhibit numerical results. More advanced investigations are presented in the subsequent sections. Coverage includes * Dynamic behavior of nonlinear systems, * Fundamentals of processes exhibiting MMOs,* Mechanism and function of an structure of MMOs patterns, * Analysis of MMOs in electric circuits and systems, * MMOs in chemistry, biology, and medicine, * MMOs in mechanics and transport vehicles, * MMOs in fractional order systems. This is the first extensive description of these topics and the interpretation of analytical results and those obtained from computer simulations with the MATLAB environment. The book provides the readers with better understanding of the nature of MMOs, richness of their behaviors, and interesting applications.
A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include The Beginings of Cryptography From the Middle Ages Onwards Signals, Signs, And Secret Languages Commercial Codes Military Codes and Ciphers Types of Codes and Ciphers Methods of Deciphering Bibliography
As today's world continues to advance, Artificial Intelligence (AI) is a field that has become a staple of technological development and led to the advancement of numerous professional industries. An application within AI that has gained attention is machine learning. Machine learning uses statistical techniques and algorithms to give computer systems the ability to understand and its popularity has circulated through many trades. Understanding this technology and its countless implementations is pivotal for scientists and researchers across the world. The Handbook of Research on Emerging Trends and Applications of Machine Learning provides a high-level understanding of various machine learning algorithms along with modern tools and techniques using Artificial Intelligence. In addition, this book explores the critical role that machine learning plays in a variety of professional fields including healthcare, business, and computer science. While highlighting topics including image processing, predictive analytics, and smart grid management, this book is ideally designed for developers, data scientists, business analysts, information architects, finance agents, healthcare professionals, researchers, retail traders, professors, and graduate students seeking current research on the benefits, implementations, and trends of machine learning.
This book presents the latest achievements of Russian scientists in the field of theory and practice of decision-making in SEMS, taking into account the information received from the sensors of its central nervous system (CNS). Recently, in the field of theory and practice of intelligent robotics systems management, the solution to the problem of SEMS type urgent task of making decisions about their expedient behavior is based on the integration of the processes of obtaining, processing and storing information, computing, control and monitoring. This enables the efficiency, reliability and safety of operation of SEMS in real time. Decision-making methods are described, both in the autonomous behavior of SEMS and in their group interaction, based on the principles of bionics, adaptability, intelligence and parallelism in information processing and computation. This book is intended for students, scientists and engineers specializing in the field of smart electromechanical systems and robotics.
This book assesses potential developments of terrorism and ways to prevent it-the growing threats as new technologies become available - and how the same new technologies may help trap those with potential mal-intent. The drumbeat of terror resonates from everywhere; how can we stop it? What are the tripping points along the road and how can we avoid them? Increasingly more people have access to increasingly more information and increasingly more destructive technologies. In the meantime, increasingly advanced technologies help us create an increasingly safer and more harmonious world. Advantages and disadvantages are accelerating each other. While hybrid threats are intensifying, so are the opportunities to address them. But what are the compromises and how can we mitigate them? This book also looks at the unexpected and often random success and failure of policies to counter the evolving terror threat. The various aspects of the terrorism phenomena are presented in a unique way using scenario vignettes, which give the reader a realistic perception of the threat. The combination of positive and negative implications of emerging technologies is describing what might well be one of the most important dimensions of our common future.
The emergence of artificial intelligence has created a vast amount of advancements within various professional sectors and has transformed the way organizations conduct themselves. The implementation of intelligent systems has assisted with developing traditional processes including decision making, risk management, and security. An area that requires significant attention and research is how these companies are becoming accustomed to computer intelligence and applying this technology to their everyday practices. Transdisciplinary Perspectives on Risk Management and Cyber Intelligence is a pivotal reference source that provides vital research on the application of intelligent systems within various professional sectors as well as the exploration of theories and empirical findings. While highlighting topics such as decision making, cognitive science, and knowledge management, this publication explores the management of risk and uncertainty using training exercises, as well as the development of managerial intelligence competency. This book is ideally designed for practitioners, educators, researchers, policymakers, managers, developers, analysts, politicians, and students seeking current research on modern approaches to the analysis and performance of cyber intelligence.
Businesses in today's world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.
Discussing the extraordinary importance of Internet technologies, this volume is a single source for information on the worlds greatest network. It provides a wealth of information for the average Internet consumer, as well as an expert in the field of networking and Internet technologies.
Design Science Research is a powerful paradigm enabling researchers to make important contributions to society and industry. Simply stated, the goal of DSR is to generate knowledge on how to find innovative solutions to important problems in the form of models, methods, constructs and instantiations. Over the past 20 years, the design science research (DSR) paradigm has developed into an established paradigm in Information Systems Research and it is of strong uptake in many other disciplines, including Management Science and Computer Science. This book provides a collection of twelve DSR cases, presented by experienced researchers in the field. It offers readers access to real-world DSR studies, together with the authors' reflections on their research processes. These cases will support researchers who want to engage in DSR, and represent a valuable addition to existing introductions to DSR methods and processes. Readers will learn from the hands-on experiences of respected experts who have conducted extensive DSR in a range of application contexts.
This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The main contributions are based on the results of the FP7 European Projects ROMEO, which focus on new methods for the compression and delivery of 3D multi-view video and spatial audio, as well as the optimization of networking and compression jointly across the Future Internet (www.ict-romeo.eu). The delivery of 3D media to individual users remains a highly challenging problem due to the large amount of data involved, diverse network characteristics and user terminal requirements, as well as the user s context such as their preferences and location. As the number of visual views increases, current systems will struggle to meet the demanding requirements in terms of delivery of constant video quality to both fixed and mobile users. ROMEO will design and develop hybrid-networking solutions that combine the DVB-T2 and DVB-NGH broadcast access network technologies together with a QoE aware Peer-to-Peer (P2P) distribution system that operates over wired and wireless links. Live streaming 3D media needs to be received by collaborating users at the same time or with imperceptible delay to enable them to watch together while exchanging comments as if they were all in the same location. The volume provides state-of-the-art information on 3D multi-view video, spatial audio networking protocols for 3D media, P2P 3D media streaming, and 3D Media delivery across heterogeneous wireless networks among other topics. Graduate students and professionals in electrical engineering and computer science with an interest in 3D Future Internet Media will find this volume to be essential reading."
This new textbook examines the motivations and the different algorithms for automatic document summarization (ADS). We performed a recent state of the art. The book shows the main problems of ADS, difficulties and the solutions provided by the community. It presents recent advances in ADS, as well as current applications and trends. The approaches are statistical, linguistic and symbolic. Several exemples are included in order to clarify the theoretical concepts. The books currently available in the area of Automatic Document Summarization are not recent. Powerful algorithms have been developed in recent years that include several applications of ADS. The development of recent technology has impacted on the development of algorithms and their applications. The massive use of social networks and the new forms of the technology requires the adaptation of the classical methods of text summarizers. This is a new textbook on Automatic Text Summarization, based on teaching materials used in two or one-semester courses. It presents a extensive state-of-art and describes the new systems on the subject. Previous automatic summarization books have been either collections of specialized papers, or else authored books with only a chapter or two devoted to the field as a whole. In other hand, the classic books on the subject are not recent.
The scientific theme of the book concerns "Manufacturing as a Service (MaaS)" which is developed in a layered cloud networked manufacturing perspective, from the shop floor resource sharing model to the virtual enterprise collaborative model, by distributing the cost of the manufacturing infrastructure - equipment, software, maintenance, networking - across all customers. MaaS is approached in terms of new models of service-oriented, knowledge-based manufacturing systems optimized and reality-aware, that deliver value to customer and manufacturer via Big data analytics, Internet of Things communications, Machine learning and Digital twins embedded in Cyber-Physical System frameworks. From product design to after-sales services, MaaS relies on the servitization of manufacturing operations such as: Design as a Service, Predict as a Service or Maintain as a service. The general scope of the book is to foster innovation in smart and sustainable manufacturing and logistics systems and in this context to promote concepts, methods and solutions for the digital transformation of manufacturing through service orientation in holonic and agent-based control with distributed intelligence. The book's readership is comprised by researchers and engineers working in the manufacturing value chain area who develop and use digital control solutions in the 'Industry of the Future' vision. The book also addresses to master and Ph.D. students enrolled in Engineering Sciences programs.
Information security is moving much higher up the agenda of corporate concerns. The pitfalls lying in wait of corporate information are legion. If information is our most important asset, then we must fortify ourselves for the task of protecting it properly. This book is a compilation of contributed chapters by researches and practitioners addressing issues, trends and challenges facing the management of information security in this new millennium. Information Security Management: Global Challenges in the New Millennium focuses on aspects of information security planning, evaluation, design and implementation.
The book discusses machine learning-based decision-making models, and presents intelligent, hybrid and adaptive methods and tools for solving complex learning and decision-making problems under conditions of uncertainty. Featuring contributions from data scientists, practitioners and educators, the book covers a range of topics relating to intelligent systems for decision science, and examines recent innovations, trends, and practical challenges in the field. The book is a valuable resource for academics, students, researchers and professionals wanting to gain insights into decision-making.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.* The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language. *The conference was held virtually due to the COVID-19 pandemic.
The primary aim of this volume is to provide researchers and engineers from both academic and industry with up-to-date coverage of new results in the field of robotic welding, intelligent systems and automation. The book is mainly based on papers selected from the 2019 International Workshop on Intelligentized Welding Manufacturing (IWIWM'2019) in USA. The articles show that the intelligentized welding manufacturing (IWM) is becoming an inevitable trend with the intelligentized robotic welding as the key technology. The volume is divided into four logical parts: Intelligent Techniques for Robotic Welding, Sensing of Arc Welding Processing, Modeling and Intelligent Control of Welding Processing, as well as Intelligent Control and its Applications in Engineering.
As organizations, businesses, and other institutions work to move forward during a new era of ubiquitous modern technology, new computing and technology implementation strategies are necessary to harness the shared knowledge of individuals to advance their organizations as a whole. Intelligent and Knowledge-Based Computing for Business and Organizational Advancements examines the emerging computing paradigm of Collective Intelligence (CI). The global contributions contained in this publication will prove to be essential to both researchers and practitioners in the computer and information science communities as these populations move toward a new period of fully technology-integrated business.
|
![]() ![]() You may like...
The Use of Tools by Human and Non-human…
A. Berthelet, J. Chavaillon
Hardcover
R4,870
Discovery Miles 48 700
Remembering Belsen - Eyewitnesses Record…
Ben Flanagan, Joanne Reilly, …
Paperback
R673
Discovery Miles 6 730
|