Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Artificial intelligence
This book examines the methodological foundations of the Big Data-driven world, formulates its concept within the frameworks of modern control methods and theories, and approaches the peculiarities of Control Technologies as a specific sphere of the Big Data-driven world, distinguished in the modern Digital Economy. The book studies the genesis of mathematical and information methods' transition from data analysis & processing to knowledge discovery and predictive analytics in the 21st century. In addition, it analyzes the conditions of development and implementation of Big Data analysis approaches in investigative activities and determines the role and meaning of global networks as platforms for the establishment of legislation and regulations in the Big Data-driven world. The book examines that world through the prism of Legislation Issues, substantiate the scientific and methodological approaches to studying modern mechanisms of terrorism and extremism counteraction in the conditions of new challenges of dissemination and accessibility of socially dangerous information. Systematization of successful experience of the Big Data solutions implementation in the different countries and analyze causal connections of the Digital Economy formation from the positions of new technological challenges is performed. The book's target audience includes scientists, students, PhD and Master students who conduct scientific research on the topic of Big Data not only in the field of IT& data science, but also in connection with legislative regulation aspects of the modern information society. It also includes practitioners and experts, as well as state authorities and representatives of international organizations interested in creating mechanisms for implementing Digital Economy projects in the Big Data-driven world.
The proceedings present selected research papers from the CIAC2019, held in Jiangsu, China on September 20-22, 2019. It covers a wide range of topics including intelligent control, robotics, artificial intelligence, pattern recognition, unmanned systems, IoT and machine learning. It includes original research and the latest advances in the field of intelligent automation. Engineers and researchers from academia, industry, and government can gain valuable insights into solutions combining ideas from multiple disciplines in this field.
Taking inspiration from self-awareness in humans, this book introduces the new notion of computational self-awareness as a fundamental concept for designing and operating computing systems. The basic ability of such self-aware computing systems is to collect information about their state and progress, learning and maintaining models containing knowledge that enables them to reason about their behaviour. Self-aware computing systems will have the ability to utilise this knowledge to effectively and autonomously adapt and explain their behaviour, in changing conditions. This book addresses these fundamental concepts from an engineering perspective, aiming at developing primitives for building systems and applications. It will be of value to researchers, professionals and graduate students in computer science and engineering.
This book presents advanced control techniques that use neural networks to deal with grid disturbances in the context renewable energy sources, and to enhance low-voltage ride-through capacity, which is a vital in terms of ensuring that the integration of distributed energy resources into the electrical power network. It presents modern control algorithms based on neural identification for different renewable energy sources, such as wind power, which uses doubly-fed induction generators, solar power, and battery banks for storage. It then discusses the use of the proposed controllers to track doubly-fed induction generator dynamics references: DC voltage, grid power factor, and stator active and reactive power, and the use of simulations to validate their performance. Further, it addresses methods of testing low-voltage ride-through capacity enhancement in the presence of grid disturbances, as well as the experimental validation of the controllers under both normal and abnormal grid conditions. The book then describes how the proposed control schemes are extended to control a grid-connected microgrid, and the use of an IEEE 9-bus system to evaluate their performance and response in the presence of grid disturbances. Lastly, it examines the real-time simulation of the entire system under normal and abnormal conditions using an Opal-RT simulator.
This book presents the combined proceedings of the 7th International Conference on Computer Science and its Applications (CSA-15) and the International Conference on Ubiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of computer science covering topics including mobile computing, security and trust management, multimedia systems and devices, networks and communications, databases and data mining, and ubiquitous computing technologies such as ubiquitous communication and networking, ubiquitous software technology, ubiquitous systems and applications, security and privacy. These proceedings reflect the state-of-the-art in the development of computational methods, numerical simulations, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to computer science.
Business intelligence applications are of vital importance as they help organizations manage, develop, and communicate intangible assets such as information and knowledge. Organizations that have undertaken business intelligence initiatives have benefited from increases in revenue, as well as significant cost savings. Business Intelligence and Agile Methodologies for Knowledge-Based Organizations: Cross-Disciplinary Applications highlights the marriage between business intelligence and knowledge management through the use of agile methodologies. Through its fifteen chapters, this book offers perspectives on the integration between process modeling, agile methodologies, business intelligence, knowledge management, and strategic management.
This book is intended to present the state of the art in research on machine learning and big data analytics. The accepted chapters covered many themes including artificial intelligence and data mining applications, machine learning and applications, deep learning technology for big data analytics, and modeling, simulation, and security with big data. It is a valuable resource for researchers in the area of big data analytics and its applications.
This book shows cognitive scientists in training how mathematics, computer science and science can be usefully and seamlessly intertwined. It is a follow-up to the first two volumes on mathematics for cognitive scientists, and includes the mathematics and computational tools needed to understand how to compute the terms in the Fourier series expansions that solve the cable equation. The latter is derived from first principles by going back to cellular biology and the relevant biophysics. A detailed discussion of ion movement through cellular membranes, and an explanation of how the equations that govern such ion movement leading to the standard transient cable equation are included. There are also solutions for the cable model using separation of variables, as well an explanation of why Fourier series converge and a description of the implementation of MatLab tools to compute the solutions. Finally, the standard Hodgkin - Huxley model is developed for an excitable neuron and is solved using MatLab.
This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today's technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often referred to as Cyber Physical Systems (CPSs). The CPSs and IoT technologies are used in many industries critical to our daily lives. CPSs have the potential to reduce costs, enhance mobility and independence of patients, and reach the body using minimally invasive techniques. Although this interconnectivity of devices can pave the road for immense advancement in technology and automation, the integration of network components into any system increases its vulnerability to cyber threats. Using internet networks to connect devices together creates access points for adversaries. Considering the critical applications of some of these devices, adversaries have the potential of exploiting sensitive data and interrupting the functionality of critical infrastructure. Practitioners working in system security, cyber security & security and privacy will find this book valuable as a reference. Researchers and scientists concentrating on computer systems, large-scale complex systems, and artificial intelligence will also find this book useful as a reference.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.
This book presents new findings in industrial cyber-physical system design and control for various domains, as well as their social and economic impacts on society. Industry 4.0 requires new approaches in the context of secure connections, control, and maintenance of cyber-physical systems as well as enhancing their interaction with humans. The book focuses on open issues of cyber-physical system control and its usage, discussing implemented breakthrough systems, models, programs, and methods that could be used in industrial processes for the control, condition assessment, diagnostics, prognostication, and proactive maintenance of cyber-physical systems. Further, it addresses the topic of ensuring the cybersecurity of industrial cyber-physical systems and proposes new, reliable solutions. The authors also examine the impact of university courses on the performance of industrial complexes, and the organization of education for the development of cyber-physical systems. The book is intended for practitioners, enterprise representatives, scientists, students, and Ph.D. and master's students conducting research in the area of cyber-physical system development and implementation in various domains.
This book presents the proceedings of the International Science and Technology Conference "FarEastCon 2019," which took place on October 1-4, 2019, in Vladivostok, Russian Federation. The conference provided a platform for gathering expert opinions on projects and initiatives aimed at the implementation of far-sighted scientific research and development, and allowed current theoretical and practical advances to be shared with the broader research community. Featuring selected papers from the conference, this book will be of interest to experts in various fields whose work involves developing innovative solutions and increasing the efficiency of economic activities.
This book describes recent developments in a wide range of areas, including the modeling, analysis and control of dynamical systems, and explores related applications. The book provided a forum where researchers have shared their ideas, results on theory, and experiments in application problems. The current literature devoted to dynamical systems is quite large, and the authors' choice for the considered topics was motivated by the following considerations. Firstly, the mathematical jargon for systems theory remains quite complex and the authors feel strongly that they have to maintain connections between the people of this research field. Secondly, dynamical systems cover a wider range of applications, including engineering, life sciences and environment. The authors consider that the book is an important contribution to the state of the art in the fuzzy and dynamical systems areas.
This book describes how the principle of self-sufficiency can be applied to a reconfigurable modular robotic organism. It shows the design considerations for a novel REPLICATOR robotic platform, both hardware and software, featuring the behavioral characteristics of social insect colonies. Following a comprehensive overview of some of the bio-inspired techniques already available, and of the state-of-the-art in re-configurable modular robotic systems, the book presents a novel power management system with fault-tolerant energy sharing, as well as its implementation in the REPLICATOR robotic modules. In addition, the book discusses, for the first time, the concept of "artificial energy homeostasis" in the context of a modular robotic organism, and shows its verification on a custom-designed simulation framework in different dynamic power distribution and fault tolerance scenarios. This book offers an ideal reference guide for both hardware engineers and software developers involved in the design and implementation of autonomous robotic systems.
This book highlights both theoretical and applied advances in cellular learning automata (CLA), a type of hybrid computational model that has been successfully employed in various areas to solve complex problems and to model, learn, or simulate complicated patterns of behavior. Owing to CLA's parallel and learning abilities, it has proven to be quite effective in uncertain, time-varying, decentralized, and distributed environments. The book begins with a brief introduction to various CLA models, before focusing on recently developed CLA variants. In turn, the research areas related to CLA are addressed as bibliometric network analysis perspectives. The next part of the book presents CLA-based solutions to several computer science problems in e.g. static optimization, dynamic optimization, wireless networks, mesh networks, and cloud computing. Given its scope, the book is well suited for all researchers in the fields of artificial intelligence and reinforcement learning.
This book delivers a definite and compact knowledge on how hybridization can help improving the quality of computer classification systems. In order to make readers clearly realize the knowledge of hybridization, this book primarily focuses on introducing the different levels of hybridization and illuminating what problems we will face with as dealing with such projects. In the first instance the data and knowledge incorporated in hybridization were the action points, and then a still growing up area of classifier systems known as combined classifiers was considered. This book comprises the aforementioned state-of-the-art topics and the latest research results of the author and his team from Department of Systems and Computer Networks, Wroclaw University of Technology, including as classifier based on feature space splitting, one-class classification, imbalance data, and data stream classification.
This book presents recent research on the evolution of artificial neural development, and searches for learning genes. It is fascinating to see how all biological cells share virtually the same traits, but humans have a decided edge over other species when it comes to intelligence. Although DNA decides the form each particular species takes, does it also account for intelligent behaviour in living beings? The authors explore the factors that are perceived as intelligent behaviour in living beings and the incorporation of these factors in machines using genetic programming, which ultimately provides a platform for exploring the possibility of machines that can learn by themselves, i.e. that can "learn how to learn". The book will be of interest not only to the specialized scientific community pursuing machine intelligence, but also general readers who would like to know more about the incorporation of intelligent behaviour in machines, inspired by the human brain.
The research and exploitation of optoelectronic properties in the industrial branch of electronics is becoming more popular each day due to the important role they play in the development of a large variety of sensors, devices, and systems for identifying, measuring, and constructing. While optoelectronics study the applications of electronic devices that source, detect, and transform light, machine vision generates and detects light in order to provide imaging-based automatic inspections and analysis for such applications as automatic object and environmental inspection, process control, and robot/mobile machine guidance in industry. Machine vision is less efficient without optoelectronics, and thus, it is important to investigate the theoretical approaches to different optoelectronic devices available for machine vision as well as current scanning technologies. Examining Optoelectronics in Machine Vision and Applications in Industry 4.0 focuses on the examination of emerging technologies for the design, fabrication, and implementation of optoelectronic sensors, devices, and systems in a machine vision approach to support industrial, commercial, and scientific applications. The book covers topics such as the design, fabrication, and implementation of sensors and devices as well as the development viewpoint of optoelectronic systems and artificial vision techniques using optoelectronic devices. The interaction and informational communication between all these mentioned devices in the complex solution of the same task is the subject of modern challenges in Industry 4.0. Thus, this book supports engineers, technology developers, academicians, researchers, and students who seek machine vision techniques for detection, measurement, and 3D reconstruction.
The Soft Computing techniques, which are based on the information processing of biological systems are now massively used in the area of pattern recognition, making prediction & planning, as well as acting on the environment. Ideally speaking, soft computing is not a subject of homogeneous concepts and techniques; rather, it is an amalgamation of distinct methods that confirms to its guiding principle. At present, the main aim of soft computing is to exploit the tolerance for imprecision and uncertainty to achieve tractability, robustness and low solutions cost. The principal constituents of soft computing techniques are probabilistic reasoning, fuzzy logic, neuro-computing, genetic algorithms, belief networks, chaotic systems, as well as learning theory. This book covers contributions from various authors to demonstrate the use of soft computing techniques in various applications of engineering.
The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users' information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients' medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts' panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.
This book presents a unified framework, based on specialized evolutionary algorithms, for the global induction of various types of classification and regression trees from data. The resulting univariate or oblique trees are significantly smaller than those produced by standard top-down methods, an aspect that is critical for the interpretation of mined patterns by domain analysts. The approach presented here is extremely flexible and can easily be adapted to specific data mining applications, e.g. cost-sensitive model trees for financial data or multi-test trees for gene expression data. The global induction can be efficiently applied to large-scale data without the need for extraordinary resources. With a simple GPU-based acceleration, datasets composed of millions of instances can be mined in minutes. In the event that the size of the datasets makes the fastest memory computing impossible, the Spark-based implementation on computer clusters, which offers impressive fault tolerance and scalability potential, can be applied.
This textbook provides a step-by-step approach to numerical methods in engineering modelling. The authors provide a consistent treatment of the topic, from the ground up, to reinforce for students that numerical methods are a set of mathematical modelling tools which allow engineers to represent real-world systems and compute features of these systems with a predictable error rate. Each method presented addresses a specific type of problem, namely root-finding, optimization, integral, derivative, initial value problem, or boundary value problem, and each one encompasses a set of algorithms to solve the problem given some information and to a known error bound. The authors demonstrate that after developing a proper model and understanding of the engineering situation they are working on, engineers can break down a model into a set of specific mathematical problems, and then implement the appropriate numerical methods to solve these problems.
This book presents a novel framework, known as Active Robust Optimization, which provides the tools for evaluating, comparing and optimizing changeable products. Since any product that can change its configuration during normal operation may be considered a "changeable product," the framework is widely applicable. Further, the methodology enables designers to use adaptability to deal with uncertainties and so avoid over-conservative designs. Offering a comprehensive overview of the framework, including its unique features, such as its ability to optimally respond to uncertain situations, the book also defines a new class of optimization problem and examines the effects of changes in various parameters on their solution. Lastly, it discusses innovative approaches for solving the problem and demonstrates these with two examples from different fields in engineering design: optimization of an optical table and optimization of a gearbox.
This book describes an effective framework for setting the right process parameters and new mold design to reduce the current plastic defects in injection molding. It presents a new approach for the optimization of injection molding process via (i) a new mold runner design which leads to 20 percent reduction in scrap rate, 2.5 percent reduction in manufacturing time, and easier ejection of injected part, (ii) a new mold gate design which leads to less plastic defects; and (iii) the introduction of a number of promising alternatives with high moldability indices. Besides presenting important developments of relevance academic research, the book also includes useful information for people working in the injection molding industry, especially in the green manufacturing field. |
You may like...
Stochastic Processes and Their…
Christo Ananth, N. Anbazhagan, …
Hardcover
R7,041
Discovery Miles 70 410
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
Managing AI Wisely - From Development to…
Lauren Waardenburg, Marleen Huysman, …
Hardcover
R2,267
Discovery Miles 22 670
Advanced Introduction to Artificial…
Tom Davenport, John Glaser, …
Paperback
R573
Discovery Miles 5 730
|