![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence
This book presents a comprehensive report on the evolution of Fuzzy Logic since its formulation in Lotfi Zadeh's seminal paper on "fuzzy sets," published in 1965. In addition, it features a stimulating sampling from the broad field of research and development inspired by Zadeh's paper. The chapters, written by pioneers and prominent scholars in the field, show how fuzzy sets have been successfully applied to artificial intelligence, control theory, inference, and reasoning. The book also reports on theoretical issues; features recent applications of Fuzzy Logic in the fields of neural networks, clustering, data mining and software testing; and highlights an important paradigm shift caused by Fuzzy Logic in the area of uncertainty management. Conceived by the editors as an academic celebration of the fifty years' anniversary of the 1965 paper, this work is a must-have for students and researchers willing to get an inspiring picture of the potentialities, limitations, achievements and accomplishments of Fuzzy Logic-based systems.
This book introduces Industrial AI in multiple dimensions. Industrial AI is a systematic discipline which focuses on developing, validating and deploying various machine learning algorithms for industrial applications with sustainable performance. Combined with the state-of-the-art sensing, communication and big data analytics platforms, a systematic Industrial AI methodology will allow integration of physical systems with computational models. The concept of Industrial AI is in infancy stage and may encompass the collective use of technologies such as Internet of Things, Cyber-Physical Systems and Big Data Analytics under the Industry 4.0 initiative where embedded computing devices, smart objects and the physical environment interact with each other to reach intended goals. A broad range of Industries including automotive, aerospace, healthcare, semiconductors, energy, transportation, mining, construction, and industrial automation could harness the power of Industrial AI to gain insights into the invisible relationship of the operation conditions and further use that insight to optimize their uptime, productivity and efficiency of their operations. In terms of predictive maintenance, Industrial AI can detect incipient changes in the system and predict the remains useful life and further to optimize maintenance tasks to avoid disruption to operations.
This volume is the first of the new series Advances in Dynamics and Delays. It offers the latest advances in the research of analyzing and controlling dynamical systems with delays, which arise in many real-world problems. The contributions in this series are a collection across various disciplines, encompassing engineering, physics, biology, and economics, and some are extensions of those presented at the IFAC (International Federation of Automatic Control) conferences since 2011. The series is categorized in five parts covering the main themes of the contributions: * Stability Analysis and Control Design * Networks and Graphs * Time Delay and Sampled-Data Systems * Computational and Software Tools * Applications This volume will become a good reference point for researchers and PhD students in the field of delay systems, and for those willing to learn more about the field, and it will also be a resource for control engineers, who will find innovative control methodologies for relevant applications, from both theory and numerical analysis perspectives.
This book describes the common ground between electricity markets (EMs) and software agents (or artificial intelligence generally). It presents an up-to-date introduction to EMs and intelligent agents, and offers a comprehensive description of the research advances and key achievements related to existing and emerging market designs to reliably and efficiently manage the potential challenges of variable generation (VG). Most EMs are unique in their complex relationships between economics and the physics of energy, but were created without the notion that large penetrations of variable generation (VG) would be part of the supply mix. An advanced multi-agent approach simulates the behavior of power markets over time, particularly markets with large-scale penetrations of renewable resources. It is intended as a reference book for researchers, academics and industry practitioners, but given the scope of the chapters and the highly accessible style, the book also provides a coherent foundation for several different graduate courses.
This book presents a unified framework, based on specialized evolutionary algorithms, for the global induction of various types of classification and regression trees from data. The resulting univariate or oblique trees are significantly smaller than those produced by standard top-down methods, an aspect that is critical for the interpretation of mined patterns by domain analysts. The approach presented here is extremely flexible and can easily be adapted to specific data mining applications, e.g. cost-sensitive model trees for financial data or multi-test trees for gene expression data. The global induction can be efficiently applied to large-scale data without the need for extraordinary resources. With a simple GPU-based acceleration, datasets composed of millions of instances can be mined in minutes. In the event that the size of the datasets makes the fastest memory computing impossible, the Spark-based implementation on computer clusters, which offers impressive fault tolerance and scalability potential, can be applied.
This book presents a novel framework, known as Active Robust Optimization, which provides the tools for evaluating, comparing and optimizing changeable products. Since any product that can change its configuration during normal operation may be considered a "changeable product," the framework is widely applicable. Further, the methodology enables designers to use adaptability to deal with uncertainties and so avoid over-conservative designs. Offering a comprehensive overview of the framework, including its unique features, such as its ability to optimally respond to uncertain situations, the book also defines a new class of optimization problem and examines the effects of changes in various parameters on their solution. Lastly, it discusses innovative approaches for solving the problem and demonstrates these with two examples from different fields in engineering design: optimization of an optical table and optimization of a gearbox.
Organizational Efficiency through Intelligent Information Technologies explores various aspects of design and development of intelligent technologies by bringing together the latest in research in the fields of information systems, intelligent agents, collaborative works, and much more. This reference source also highlights insights on agent-based problem solving as well as economic issues and organizational impact.
The proceedings includes cutting-edge research articles from the Fourth International Conference on Signal and Image Processing (ICSIP), which is organised by Dr. N.G.P. Institute of Technology, Kalapatti, Coimbatore. The Conference provides academia and industry to discuss and present the latest technological advances and research results in the fields of theoretical, experimental, and application of signal, image and video processing. The book provides latest and most informative content from engineers and scientists in signal, image and video processing from around the world, which will benefit the future research community to work in a more cohesive and collaborative way.
This volume provides the audience with an updated, in-depth and highly coherent material on the conceptually appealing and practically sound information technology of Computational Intelligence applied to the analysis, synthesis and evaluation of social networks. The volume involves studies devoted to key issues of social networks including community structure detection in networks, online social networks, knowledge growth and evaluation, and diversity of collaboration mechanisms. The book engages a wealth of methods of Computational Intelligence along with well-known techniques of linear programming, Formal Concept Analysis, machine learning, and agent modeling. Human-centricity is of paramount relevance and this facet manifests in many ways including personalized semantics, trust metric, and personal knowledge management; just to highlight a few of these aspects. The contributors to this volume report on various essential applications including cyber attacks detection, building enterprise social networks, business intelligence and forming collaboration schemes. Given the subject area, this book is aimed at a broad audience of researchers and practitioners. Owing to the nature of the material being covered and a way it is organized, the volume will appeal to the well-established communities including those active in various disciplines in which social networks, their analysis and optimization are of genuine relevance. Those involved in operations research, management, various branches of engineering, and economics will benefit from the exposure to the subject matter.
This book presents a comprehensive overview of security issues in Cyber Physical Systems (CPSs), by analyzing the issues and vulnerabilities in CPSs and examining state of the art security measures. Furthermore, this book proposes various defense strategies including intelligent attack and anomaly detection algorithms. Today's technology is continually evolving towards interconnectivity among devices. This interconnectivity phenomenon is often referred to as Internet of Things (IoT). IoT technology is used to enhance the performance of systems in many applications. This integration of physical and cyber components within a system is associated with many benefits; these systems are often referred to as Cyber Physical Systems (CPSs). The CPSs and IoT technologies are used in many industries critical to our daily lives. CPSs have the potential to reduce costs, enhance mobility and independence of patients, and reach the body using minimally invasive techniques. Although this interconnectivity of devices can pave the road for immense advancement in technology and automation, the integration of network components into any system increases its vulnerability to cyber threats. Using internet networks to connect devices together creates access points for adversaries. Considering the critical applications of some of these devices, adversaries have the potential of exploiting sensitive data and interrupting the functionality of critical infrastructure. Practitioners working in system security, cyber security & security and privacy will find this book valuable as a reference. Researchers and scientists concentrating on computer systems, large-scale complex systems, and artificial intelligence will also find this book useful as a reference.
This book highlights both theoretical and applied advances in cellular learning automata (CLA), a type of hybrid computational model that has been successfully employed in various areas to solve complex problems and to model, learn, or simulate complicated patterns of behavior. Owing to CLA's parallel and learning abilities, it has proven to be quite effective in uncertain, time-varying, decentralized, and distributed environments. The book begins with a brief introduction to various CLA models, before focusing on recently developed CLA variants. In turn, the research areas related to CLA are addressed as bibliometric network analysis perspectives. The next part of the book presents CLA-based solutions to several computer science problems in e.g. static optimization, dynamic optimization, wireless networks, mesh networks, and cloud computing. Given its scope, the book is well suited for all researchers in the fields of artificial intelligence and reinforcement learning.
This book explores and evaluates accounts and models of autistic reasoning and cognition from a computational standpoint. The author investigates the limitations and peculiarities of autistic reasoning and sets out a remediation strategy to be used by a wide range of psychologists and rehabilitation personnel and will also be appreciated by computer scientists who are interested in the practical implementation of reasoning. The author subjects the Theory of Mind (ToM) model to a formal analysis to investigate the limitations of autistic reasoning and proposes a formal model regarding mental attitudes and proposes a method to help those with autism navigate everyday living. Based on the concept of playing with computer based mental simulators, the NL_MAMS, is examined to see whether it is capable of modeling mental and emotional states of the real world to aid the emotional development of autistic children. Multiple autistic theories and strategies are also examined for possible computational cross-overs, providing researchers with a wide range of examples, tools and detailed case studies to work from. Computational Autism will be an essential read to behavioral specialists, researcher's, developers and designers who are interested in understanding and tackling the increasing prevalence of autism within modern society today.
This book is intended to present the state of the art in research on machine learning and big data analytics. The accepted chapters covered many themes including artificial intelligence and data mining applications, machine learning and applications, deep learning technology for big data analytics, and modeling, simulation, and security with big data. It is a valuable resource for researchers in the area of big data analytics and its applications.
This volume contains nineteen research papers belonging to the areas of computational statistics, data mining, and their applications. Those papers, all written specifically for this volume, are their authors' contributions to honour and celebrate Professor Jacek Koronacki on the occcasion of his 70th birthday. The book's related and often interconnected topics, represent Jacek Koronacki's research interests and their evolution. They also clearly indicate how close the areas of computational statistics and data mining are.
This book discusses various machine learning & cognitive science approaches, presenting high-throughput research by experts in this area. Bringing together machine learning, cognitive science and other aspects of artificial intelligence to help provide a roadmap for future research on intelligent systems, the book is a valuable reference resource for students, researchers and industry practitioners wanting to keep abreast of recent developments in this dynamic, exciting and profitable research field. It is intended for postgraduate students, researchers, scholars and developers who are interested in machine learning and cognitive research, and is also suitable for senior undergraduate courses in related topics. Further, it is useful for practitioners dealing with advanced data processing, applied mathematicians, developers of software for agent-oriented systems and developers of embedded and real-time systems.
This book describes the latest advances in fuzzy logic, neural networks, and optimization algorithms, as well as their hybrid intelligent combinations, and their applications in the areas such as intelligent control, robotics, pattern recognition, medical diagnosis, time series prediction, and optimization. The topic is highly relevant as most current intelligent systems and devices use some form of intelligent feature to enhance their performance. The book also presents new and advanced models and algorithms of type-2 fuzzy logic and intuitionistic fuzzy systems, which are of great interest to researchers in these areas. Further, it proposes novel, nature-inspired optimization algorithms and innovative neural models. Featuring contributions on theoretical aspects as well as applications, the book appeals to a wide audience.
What are the limitations of computer models and why do we still not have working models of people that are recognizably human? This is the principle puzzle explored in this book where ideas behind systems that behave intelligently are described and different philosophical issues are touched upon. The key to human behavior is taken to be intelligence and the ability to reason about the world. A strong scientific approach is taken, but first it was required to understand what a scientific approach could mean in the context of both natural and artificial systems. A theory of intelligence is proposed that can be tested and developed in the light of experimental results. The book illustrates that intelligence is much more than just behavior confined to a unique person or a single computer program within a fixed time frame. Some answers are unraveled and some puzzles emerge from these investigations and experiments. Natural and Artificial Reasoning provides a few steps of an exciting journey that began many centuries ago with the word 'why?'
This book emerged out of a project initiated and funded by the Defense Advanced Research Projects Agency (DARPA) that sought to build on efforts to transform agent-based models into platforms for predicting and evaluating policy responses to real world challenges around the world. It began with the observation that social science theories of human behavior are often used to estimate the consequences of alternative policy responses to important issues and challenges. However, alternative theories that remain subject to contradictory claims are ill suited to inform policy. The vision behind the DARPA project was to mine the social sciences literature for alternative theories of human behavior, and then formalize, instantiate, and integrate them within the context of an agent-based modeling system. The research team developed an experimental platform to evaluate the conditions under which alternative theories and groups of theories applied. The end result was a proof of concept developed from the ground up of social knowledge that could be used as an informative guide for policy analysis. This book describes in detail the process of designing and implementing a pilot system that helped DARPA assess the feasibility of a computational social science project on a large scale.
This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.
This book explores the inputs with regard to individuals and companies who have developed technologies and innovative solutions, bioinformatics, datasets, apps for diagnosis, etc., that can be leveraged for strengthening the fight against coronavirus. It focuses on technology solutions to stop Covid-19 outbreak and mitigate the risk. The book contains innovative ideas from active researchers who are presently working to find solutions, and they give insights to other researchers to explore the innovative methods and predictive modeling techniques. The novel applications and techniques of established technologies like artificial intelligence (AI), Internet of things (IoT), big data, computer vision and machine learning are discussed to fight the spread of this disease, Covid-19. This pandemic has triggered an unprecedented demand for digital health technology solutions and unleashing information technology to win over this pandemic.
Computational Intelligence in Biomedical Imaging is a comprehensive overview of the state-of-the-art computational intelligence research and technologies in biomedical images with emphasis on biomedical decision making. Biomedical imaging offers useful information on patients' medical conditions and clues to causes of their symptoms and diseases. Biomedical images, however, provide a large number of images which physicians must interpret. Therefore, computer aids are demanded and become indispensable in physicians' decision making. This book discusses major technical advancements and research findings in the field of computational intelligence in biomedical imaging, for example, computational intelligence in computer-aided diagnosis for breast cancer, prostate cancer, and brain disease, in lung function analysis, and in radiation therapy. The book examines technologies and studies that have reached the practical level, and those technologies that are becoming available in clinical practices in hospitals rapidly such as computational intelligence in computer-aided diagnosis, biological image analysis, and computer-aided surgery and therapy.
This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.
This book presents innovative research works to demonstrate the potential and the advancements of computing approaches to utilize healthcare centric and medical datasets in solving complex healthcare problems. Computing technique is one of the key technologies that are being currently used to perform medical diagnostics in the healthcare domain, thanks to the abundance of medical data being generated and collected. Nowadays, medical data is available in many different forms like MRI images, CT scan images, EHR data, test reports, histopathological data and doctor patient conversation data. This opens up huge opportunities for the application of computing techniques, to derive data-driven models that can be of very high utility, in terms of providing effective treatment to patients. Moreover, machine learning algorithms can uncover hidden patterns and relationships present in medical datasets, which are too complex to uncover, if a data-driven approach is not taken. With the help of computing systems, today, it is possible for researchers to predict an accurate medical diagnosis for new patients, using models built from previous patient data. Apart from automatic diagnostic tasks, computing techniques have also been applied in the process of drug discovery, by which a lot of time and money can be saved. Utilization of genomic data using various computing techniques is another emerging area, which may in fact be the key to fulfilling the dream of personalized medications. Medical prognostics is another area in which machine learning has shown great promise recently, where automatic prognostic models are being built that can predict the progress of the disease, as well as can suggest the potential treatment paths to get ahead of the disease progression.
The ever-growing popularity of Google over the recent decade has required a specific method of man-machine communication: human query should be short, whereas the machine answer may take a form of a wide range of documents. This type of communication has triggered a rapid development in the domain of Information Extraction, aimed at providing the asker with a more precise information. The recent success of intelligent personal assistants supporting users in searching or even extracting information and answers from large collections of electronic documents signals the onset of a new era in man-machine communication - we shall soon explain to our small devices what we need to know and expect valuable answers quickly and automatically delivered. The progress of man-machine communication is accompanied by growth in the significance of applied Computational Linguistics - we need machines to understand much more from the language we speak naturally than it is the case of up-to-date search systems. Moreover, we need machine support in crossing language barriers that is necessary more and more often when facing the global character of the Web. This books reports on the latest developments in the field. It
contains 15 chapters written by researchers who aim at making
linguistic theories work - for the better understanding between the
man and the machine.
The research and exploitation of optoelectronic properties in the industrial branch of electronics is becoming more popular each day due to the important role they play in the development of a large variety of sensors, devices, and systems for identifying, measuring, and constructing. While optoelectronics study the applications of electronic devices that source, detect, and transform light, machine vision generates and detects light in order to provide imaging-based automatic inspections and analysis for such applications as automatic object and environmental inspection, process control, and robot/mobile machine guidance in industry. Machine vision is less efficient without optoelectronics, and thus, it is important to investigate the theoretical approaches to different optoelectronic devices available for machine vision as well as current scanning technologies. Examining Optoelectronics in Machine Vision and Applications in Industry 4.0 focuses on the examination of emerging technologies for the design, fabrication, and implementation of optoelectronic sensors, devices, and systems in a machine vision approach to support industrial, commercial, and scientific applications. The book covers topics such as the design, fabrication, and implementation of sensors and devices as well as the development viewpoint of optoelectronic systems and artificial vision techniques using optoelectronic devices. The interaction and informational communication between all these mentioned devices in the complex solution of the same task is the subject of modern challenges in Industry 4.0. Thus, this book supports engineers, technology developers, academicians, researchers, and students who seek machine vision techniques for detection, measurement, and 3D reconstruction. |
![]() ![]() You may like...
On intelligence - How a New…
Jeff Hawkins, Sandra Blakeslee
Hardcover
Assembling Tomorrow - A Guide To…
Scott Doorley, Carissa Carter
Hardcover
Advanced Machine Learning Algorithms for…
Mohammad Irfan, Mohamed Elhoseny, …
Hardcover
R7,390
Discovery Miles 73 900
Technology, Users and Uses - Ethics and…
Joan Casas-Roma
Hardcover
|