![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence
This book presents a number of approaches to Fine-Kinney-based multi-criteria occupational risk-assessment. For each proposed approach, it provides case studies demonstrating their applicability, as well as Python coding, which will enable readers to implement them into their own risk assessment process. The book begins by giving a review of Fine-Kinney occupational risk-assessment methods and their extension by fuzzy sets. It then progresses in a logical fashion, dedicating a chapter to each approach, including the fuzzy best and worst method, interval-valued Pythagorean fuzzy VIKOR and interval type-2 fuzzy QUALIFLEX. This book will be of interest to professionals and researchers working in the field of occupational risk management, as well as postgraduate and undergraduate students studying applications of fuzzy systems.
This book provides an emerging computational intelligence tool in the framework of collective intelligence for modeling and controlling distributed multi-agent systems referred to as Probability Collectives. In the modified Probability Collectives methodology a number of constraint handling techniques are incorporated, which also reduces the computational complexity and improved the convergence and efficiency. Numerous examples and real world problems are used for illustration, which may also allow the reader to gain further insight into the associated concepts.
This book proposes probabilistic machine learning models that represent the hardware properties of the device hosting them. These models can be used to evaluate the impact that a specific device configuration may have on resource consumption and performance of the machine learning task, with the overarching goal of balancing the two optimally. The book first motivates extreme-edge computing in the context of the Internet of Things (IoT) paradigm. Then, it briefly reviews the steps involved in the execution of a machine learning task and identifies the implications associated with implementing this type of workload in resource-constrained devices. The core of this book focuses on augmenting and exploiting the properties of Bayesian Networks and Probabilistic Circuits in order to endow them with hardware-awareness. The proposed models can encode the properties of various device sub-systems that are typically not considered by other resource-aware strategies, bringing about resource-saving opportunities that traditional approaches fail to uncover. The performance of the proposed models and strategies is empirically evaluated for several use cases. All of the considered examples show the potential of attaining significant resource-saving opportunities with minimal accuracy losses at application time. Overall, this book constitutes a novel approach to hardware-algorithm co-optimization that further bridges the fields of Machine Learning and Electrical Engineering.
This book initially reviews the major feature representation and extraction methods and effective learning and recognition approaches, which have broad applications in the context of intelligent image search and video retrieval. It subsequently presents novel methods, such as improved soft assignment coding, Inheritable Color Space (InCS) and the Generalized InCS framework, the sparse kernel manifold learner method, the efficient Support Vector Machine (eSVM), and the Scale-Invariant Feature Transform (SIFT) features in multiple color spaces. Lastly, the book presents clothing analysis for subject identification and retrieval, and performance evaluation methods of video analytics for traffic monitoring. Digital images and videos are proliferating at an amazing speed in the fields of science, engineering and technology, media and entertainment. With the huge accumulation of such data, keyword searches and manual annotation schemes may no longer be able to meet the practical demand for retrieving relevant content from images and videos, a challenge this book addresses.This book initially reviews the major feature representation and extraction methods and effective learning and recognition approaches, which have broad applications in the context of intelligent image search and video retrieval. It subsequently presents novel methods, such as improved soft assignment coding, Inheritable Color Space (InCS) and the Generalized InCS framework, the sparse kernel manifold learner method, the efficient Support Vector Machine (eSVM), and the Scale-Invariant Feature Transform (SIFT) features in multiple color spaces. Lastly, the book presents clothing analysis for subject identification and retrieval, and performance evaluation methods of video analytics for traffic monitoring. Digital images and videos are proliferating at an amazing speed in the fields of science, engineering and technology, media and entertainment. With the huge accumulation of such data, keyword searches and manual annotation schemes may no longer be able to meet the practical demand for retrieving relevant content from images and videos, a challenge this book addresses.
This book-presents new methods and tools for the integration and simulation of smart devices. The design approach described in this book explicitly accounts for integration of Smart Systems components and subsystems as a specific constraint. It includes methodologies and EDA tools to enable multi-disciplinary and multi-scale modeling and design, simulation of multi-domain systems, subsystems and components at all levels of abstraction, system integration and exploration for optimization of functional and non-functional metrics. By covering theoretical and practical aspects of smart device design, this book targets people who are working and studying on hardware/software modelling, component integration and simulation under different positions (system integrators, designers, developers, researchers, teachers, students etc.). In particular, it is a good introduction to people who have interest in managing heterogeneous components in an efficient and effective way on different domains and different abstraction levels. People active in smart device development can understand both the current status of practice and future research directions. * Provides a comprehensive overview of smart systems design, focusing on design challenges and cutting-edge solutions; * Enables development of a co-simulation and co-design environment that accounts for the peculiarities of the basic subsystems and components to be integrated; * Describes development of modeling and design techniques, methods and tools that enable multi-domain simulation and optimization at various levels of abstraction and across different technological domains.
This book constitutes the refereed proceedings of the Tenth International KES Conference on Intelligent Interactive Multimedia Systems and Services: IIMSS-17. It includes 57 full papers organized into topical sections, ranging from visual data processing to big data analytics, and from multimedia to intelligent and cognitive systems. The conference took place as part of the Smart Digital Futures 2017 multi-theme conference, held in Vilamoura, Algarve, Portugal on 21-23 June 2017, which brings together AMSTA, IDT, InHorizons, InMed, SEEL and IIMSS in one venue. It provided an international forum for researchers and scientists to share their work and experiences in the field of multimedia and intelligent interactive systems and services.
This book introduces the fundamentals of computer vision (CV), with a focus on extracting useful information from digital images and videos. Including a wealth of methods used in detecting and classifying image objects and their shapes, it is the first book to apply a trio of tools (computational geometry, topology and algorithms) in solving CV problems, shape tracking in image object recognition and detecting the repetition of shapes in single images and video frames. Computational geometry provides a visualization of topological structures such as neighborhoods of points embedded in images, while image topology supplies us with structures useful in the analysis and classification of image regions. Algorithms provide a practical, step-by-step means of viewing image structures. The implementations of CV methods in Matlab and Mathematica, classification of chapter problems with the symbols (easily solved) and (challenging) and its extensive glossary of key words, examples and connections with the fabric of CV make the book an invaluable resource for advanced undergraduate and first year graduate students in Engineering, Computer Science or Applied Mathematics. It offers insights into the design of CV experiments, inclusion of image processing methods in CV projects, as well as the reconstruction and interpretation of recorded natural scenes.
This book presents the latest findings on the subject of combustion optimization based on computational intelligence. It covers a broad range of topics, including the modeling of coal combustion characteristics based on artificial neural networks and support vector machines. It also describes the optimization of combustion parameters using genetic algorithms or ant colony algorithms, an online coal optimization system, etc. Accordingly, the book offers a unique guide for researchers in the areas of combustion optimization, NOx emission control, energy and power engineering, and chemical engineering.
The work presented in this book is a combination of theoretical advancements of big data analysis, cloud computing, and their potential applications in scientific computing. The theoretical advancements are supported with illustrative examples and its applications in handling real life problems. The applications are mostly undertaken from real life situations. The book discusses major issues pertaining to big data analysis using computational intelligence techniques and some issues of cloud computing. An elaborate bibliography is provided at the end of each chapter. The material in this book includes concepts, figures, graphs, and tables to guide researchers in the area of big data analysis and cloud computing.
Intelligent agent technology is emerging as one of the most important and rapidly advancing areas. Researchers are developing a number of agent-based applications and multiagent systems in a variety of fields, such as: electronic commerce, supply chain management, resource allocation, intelligent manufacturing, mass customization, industrial control, information retrieval and filtering, collaborative work, mobile commerce, decision support, and computer games. ""Application of Agents and Intelligent Information Technologies"" presents an outstanding collection of the latest research associated with intelligent agents and information technologies. ""Application of Agents and Intelligent Information Technologies"" provides a comprehensive analysis of issues related to agent design, implementation, integration, deployment, evaluation, and business value. This book presents research results and application of agents and other intelligent information technologies in various domains. ""Application of Agents and Intelligent Information Technologies"" offers the intelligent information technologies that will potentially revolutionize the work environment as well as social computing.
Intended for researchers and practitioners alike, this book covers carefully selected yet broad topics in optimization, machine learning, and metaheuristics. Written by world-leading academic researchers who are extremely experienced in industrial applications, this self-contained book is the first of its kind that provides comprehensive background knowledge, particularly practical guidelines, and state-of-the-art techniques. New algorithms are carefully explained, further elaborated with pseudocode or flowcharts, and full working source code is made freely available. This is followed by a presentation of a variety of data-driven single- and multi-objective optimization algorithms that seamlessly integrate modern machine learning such as deep learning and transfer learning with evolutionary and swarm optimization algorithms. Applications of data-driven optimization ranging from aerodynamic design, optimization of industrial processes, to deep neural architecture search are included.
This book includes best selected, high-quality research papers presented at the International Conference on Intelligent Manufacturing and Energy Sustainability (ICIMES 2020) held at the Department of Mechanical Engineering, Malla Reddy College of Engineering & Technology (MRCET), Maisammaguda, Hyderabad, India, during August 21-22, 2020. It covers topics in the areas of automation, manufacturing technology and energy sustainability and also includes original works in the intelligent systems, manufacturing, mechanical, electrical, aeronautical, materials, automobile, bioenergy and energy sustainability.
This book explores the psychological impact of advanced forms of artificial intelligence. How will it be to live with a superior intelligence? How will the exposure to highly developed artificial intelligence (AI) systems change human well-being? With a review of recent advancements in brain-computer interfaces, military AI, Explainable AI (XAI) and digital clones as a foundation, the experience of living with a hyperintelligence is discussed from the viewpoint of a clinical psychologist. The theory of universal solicitation is introduced, i.e. the demand character of a technology that wants to be used in all aspects of life. With a focus on human experience, and to a lesser extent on technology, the book is written for a general readership with an interest in psychology, technology and the future of our human condition. With its unique focus on psychological topics, the book offers contributions to a discussion on the future of human life beyond purely technological considerations.
The discovery in 2012 of the Higgs boson at the Large Hadron Collider (LHC) represents a milestone for the Standard Model (SM) of particle physics. Most of the SM Higgs production and decay rates have been measured at the LHC with increased precision. However, despite its experimental success, the SM is known to be only an effective manifestation of a more fundamental description of nature. The scientific research at the LHC is strongly focused on extending the SM by searching, directly or indirectly, for indications of New Physics. The extensive physics program requires increasingly advanced computational and algorithmic techniques. In the last decades, Machine Learning (ML) methods have made a prominent appearance in the field of particle physics, and promise to address many challenges faced by the LHC. This thesis presents the analysis that led to the observation of the SM Higgs boson decay into pairs of bottom quarks. The analysis exploits the production of a Higgs boson associated with a vector boson whose signatures enable efficient triggering and powerful background reduction. The main strategy to maximise the signal sensitivity is based on a multivariate approach. The analysis is performed on a dataset corresponding to a luminosity of 79.8/fb collected by the ATLAS experiment during Run-2 at a centre-of-mass energy of 13 TeV. An excess of events over the expected background is found with an observed (expected) significance of 4.9 (4.3) standard deviation. A combination with results from other \Hbb searches provides an observed (expected) significance of 5.4 (5.5). The corresponding ratio between the signal yield and the SM expectation is 1.01 +- 0.12 (stat.)+ 0.16-0.15(syst.). The 'observation' analysis was further extended to provide a finer interpretation of the V H(H bb) signal measurement. The cross sections for the VH production times the H bb branching ratio have been measured in exclusive regions of phase space. These measurements are used to search for possible deviations from the SM with an effective field theory approach, based on anomalous couplings of the Higgs boson. The results of the cross-section measurements, as well as the constraining of the operators that affect the couplings of the Higgs boson to the vector boson and the bottom quarks, have been documented and discussed in this thesis. This thesis also describes a novel technique for the fast simulation of the forward calorimeter response, based on similarity search methods. Such techniques constitute a branch of ML and include clustering and indexing methods that enable quick and efficient searches for vectors similar to each other. The new simulation approach provides optimal results in terms of detector resolution response and reduces the computational requirements of a standard particles simulation.
This book at hand is an appropriate addition to the field of fractional calculus applied to control systems. If an engineer or a researcher wishes to delve into fractional-order systems, then this book has many collections of such systems to work upon, and this book also tells the reader about how one can convert an integer-order system into an appropriate fractional-order one through an efficient and simple algorithm. If the reader further wants to explore the controller design for the fractional-order systems, then for them, this book provides a variety of controller design strategies. The use of fractional-order derivatives and integrals in control theory leads to better results than integer-order approaches and hence provides solid motivation for further development of control theory. Fractional-order models are more useful than the integer-order models when accuracy is of paramount importance. Real-time experimental validation of controller design strategies for the fractional-order plants is available. This book is beneficial to the academic institutes for postgraduate and advanced research-level that need a specific textbook on fractional control and its applications in srobotic manipulators. The book is also a valuable teaching and learning resource for undergraduate and postgraduate students.
This book provides a systematic and focused study of the various aspects of twin support vector machines (TWSVM) and related developments for classification and regression. In addition to presenting most of the basic models of TWSVM and twin support vector regression (TWSVR) available in the literature, it also discusses the important and challenging applications of this new machine learning methodology. A chapter on "Additional Topics" has been included to discuss kernel optimization and support tensor machine topics, which are comparatively new but have great potential in applications. It is primarily written for graduate students and researchers in the area of machine learning and related topics in computer science, mathematics, electrical engineering, management science and finance.
This book shows how common operation management methods and algorithms can be extended to deal with vague or imprecise information in decision-making problems. It describes how to combine decision trees, clustering, multi-attribute decision-making algorithms and Monte Carlo Simulation with the mathematical description of imprecise or vague information, and how to visualize such information. Moreover, it discusses a broad spectrum of real-life management problems including forecasting the apparent consumption of steel products, planning and scheduling of production processes, project portfolio selection and economic-risk estimation. It is a concise, yet comprehensive, reference source for researchers in decision-making and decision-makers in business organizations alike.
The present book includes a set of selected extended papers from the sixth International Joint Conference on Computational Intelligence (IJCCI 2014), held in Rome, Italy, from 22 to 24 October 2014. The conference was composed by three co-located conferences: The International Conference on Evolutionary Computation Theory and Applications (ECTA), the International Conference on Fuzzy Computation Theory and Applications (FCTA), and the International Conference on Neural Computation Theory and Applications (NCTA). Recent progresses in scientific developments and applications in these three areas are reported in this book. IJCCI received 210 submissions, from 51 countries, in all continents. After a double blind paper review performed by the Program Committee, 15% were accepted as full papers and thus selected for oral presentation. Additional papers were accepted as short papers and posters. A further selection was made after the Conference, based also on the assessment of presentation quality and audience interest, so that this book includes the extended and revised versions of the very best papers of IJCCI 2014. Commitment to high quality standards is a major concern of IJCCI that will be maintained in the next editions, considering not only the stringent paper acceptance ratios but also the quality of the program committee, keynote lectures, participation level and logistics.
This book highlights recent research advances in unsupervised learning using natural computing techniques such as artificial neural networks, evolutionary algorithms, swarm intelligence, artificial immune systems, artificial life, quantum computing, DNA computing, and others. The book also includes information on the use of natural computing techniques for unsupervised learning tasks. It features several trending topics, such as big data scalability, wireless network analysis, engineering optimization, social media, and complex network analytics. It shows how these applications have triggered a number of new natural computing techniques to improve the performance of unsupervised learning methods. With this book, the readers can easily capture new advances in this area with systematic understanding of the scope in depth. Readers can rapidly explore new methods and new applications at the junction between natural computing and unsupervised learning. Includes advances on unsupervised learning using natural computing techniques Reports on topics in emerging areas such as evolutionary multi-objective unsupervised learning Features natural computing techniques such as evolutionary multi-objective algorithms and many-objective swarm intelligence algorithms
This book opens with an introduction to the main purpose and tasks of the GIANA challenge, as well as a summary and an analysis of the results and performance obtained by the 20 participating teams. The early and accurate diagnosis of gastrointestinal diseases is critical for increasing the chances of patient survival, and efficient screening is vital for locating precursor lesions. Video colonoscopy and wireless capsule endoscopy (WCE) are the gold-standard tools for colon and intestinal tract screening, respectively. Yet these tools still present some drawbacks, such as lesion miss rate, lack of in vivo diagnosis capabilities, and perforation risk. To mitigate these, computer-aided detection/diagnosis systems can play a key role in assisting clinicians in the different stages of the exploration. This book presents the latest, state-of-the-art approaches in this field, and also tackles the clinical considerations required to efficiently deploy these systems in the exploration room. The coverage draws upon results from the Gastrointestinal Image Analysis (GIANA) Challenge, part of the EndoVis satellite events of the conferences MICCAI 2017 and 2018. Each method proposed to address the different subtasks of the challenges is detailed in a separate chapter, offering a deep insight into this topic of interest for public health. This book appeals to researchers, practitioners, and lecturers spanning both the computer vision and gastroenterology communities.
Chapters "Turing and Free Will: A New Take on an Old Debate" and "Turing and the History of Computer Music" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book brings together the expertise of two authors involved in initiating the development of Online Family Dispute Resolution (OFDR), while also examining the unique Australian system. The family arena generally comprises property or child-related disputes arising between parents, whether married or not, and whether the parties have lived together or not. A special feature of Australia's OFDR system is that it deals with children's issues rather than focusing on property distribution. The book first discusses how technological innovations have transformed dispute resolution services to families. It explores the need for OFDR and how such systems can potentially be implemented. In turn, the coverage shifts to screening tools used prior to a Family Dispute Resolution session to ensure that online systems are appropriate for the case under dispute and the people involved. Readers will then learn about the necessary training required - for administrators, practitioners and clients alike - for OFDR to be successful. In addition, the book offers a comprehensive evaluation of the system and reflects on the lessons learned to date. In closing, it suggests ways in which OFDR could be further developed and applied to family disputes around the world.
This book focuses on the advanced soft computational and probabilistic methods that the authors have published over the past few years. It describes theoretical results and applications, and discusses how various uncertainty measures - probability, plausibility and belief measures - can be treated in a unified way. It also examines approximations of four notable probability distributions (Weibull, exponential, logistic and normal) using a unified probability distribution function, and presents a fuzzy arithmetic-based time series model that provides an easy-to-use forecasting technique. Lastly, it proposes flexible fuzzy numbers for Likert scale-based evaluations. Featuring methods that can be successfully applied in a variety of areas, including engineering, economics, biology and the medical sciences, the book offers useful guidelines for practitioners and researchers.
This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TAMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatornics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Obuda University and the National University of Public Service. |
![]() ![]() You may like...
Cognitive Psychology - EMEA Edition
E. Bruce Goldstein, Johanna C. van Hooff
Paperback
Invasive Computing for Mapping Parallel…
Andreas Weichslgartner, Stefan Wildermann, …
Hardcover
R2,885
Discovery Miles 28 850
Energy-Efficient Fault-Tolerant Systems
Jimson Mathew, Rishad A. Shafik, …
Hardcover
R5,095
Discovery Miles 50 950
Mobile Forensics - The File Format…
Christian Hummert, Dirk Pawlaszczyk
Hardcover
R1,670
Discovery Miles 16 700
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
|