![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence
Recently, there has been a rapid increase in interest regarding social network analysis in the data mining community. Cognitive radios are expected to play a major role in meeting this exploding traffic demand on social networks due to their ability to sense the environment, analyze outdoor parameters, and then make decisions for dynamic time, frequency, space, resource allocation, and management to improve the utilization of mining the social data. Cognitive Social Mining Applications in Data Analytics and Forensics is an essential reference source that reviews cognitive radio concepts and examines their applications to social mining using a machine learning approach so that an adaptive and intelligent mining is achieved. Featuring research on topics such as data mining, real-time ubiquitous social mining services, and cognitive computing, this book is ideally designed for social network analysts, researchers, academicians, and industry professionals.
Research in Natural Language Processing (NLP) has rapidly advanced in recent years, resulting in exciting algorithms for sophisticated processing of text and speech in various languages. Much of this work focuses on English; in this book we address another group of interesting and challenging languages for NLP research: the Semitic languages. The Semitic group of languages includes Arabic (206 million native speakers), Amharic (27 million), Hebrew (7 million), Tigrinya (6.7 million), Syriac (1 million) and Maltese (419 thousand). Semitic languages exhibit unique morphological processes, challenging syntactic constructions and various other phenomena that are less prevalent in other natural languages. These challenges call for unique solutions, many of which are described in this book. The 13 chapters presented in this book bring together leading scientists from several universities and research institutes worldwide. While this book devotes some attention to cutting-edge algorithms and techniques, its primary purpose is a thorough explication of best practices in the field. Furthermore, every chapter describes how the techniques discussed apply to Semitic languages. The book covers both statistical approaches to NLP, which are dominant across various applications nowadays and the more traditional, rule-based approaches, that were proven useful for several other application domains. We hope that this book will provide a "one-stop-shop'' for all the requisite background and practical advice when building NLP applications for Semitic languages.
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and
algorithms which are the basis for applications of artificial
intelligence environments.
The growth in the amount of data collected and generated has exploded in recent times with the widespread automation of various day-to-day activities, advances in high-level scienti?c and engineering research and the development of e?cient data collection tools. This has given rise to the need for automa- callyanalyzingthedatainordertoextractknowledgefromit, therebymaking the data potentially more useful. Knowledge discovery and data mining (KDD) is the process of identifying valid, novel, potentially useful and ultimately understandable patterns from massive data repositories. It is a multi-disciplinary topic, drawing from s- eral ?elds including expert systems, machine learning, intelligent databases, knowledge acquisition, case-based reasoning, pattern recognition and stat- tics. Many data mining systems have typically evolved around well-organized database systems (e.g., relational databases) containing relevant information. But, more and more, one ?nds relevant information hidden in unstructured text and in other complex forms. Mining in the domains of the world-wide web, bioinformatics, geoscienti?c data, and spatial and temporal applications comprise some illustrative examples in this regard. Discovery of knowledge, or potentially useful patterns, from such complex data often requires the - plication of advanced techniques that are better able to exploit the nature and representation of the data. Such advanced methods include, among o- ers, graph-based and tree-based approaches to relational learning, sequence mining, link-based classi?cation, Bayesian networks, hidden Markov models, neural networks, kernel-based methods, evolutionary algorithms, rough sets and fuzzy logic, and hybrid systems. Many of these methods are developed in the following chapters
Robotized Transcranial Magnetic Stimulation describes the methods needed to develop a robotic system that is clinically applicable for the application of transcranial magnetic stimulation (TMS). Chapter 1 introduces the basic principles of TMS and discusses current developments towards robotized TMS. Part I (Chapters 2 and 3) systematically analyzes and clinically evaluates robotized TMS. More specifically, it presents the impact of head motion on the induced electric field. In Part II (Chapters 3 to 8), a new method for a robust robot/camera calibration, a sophisticated force-torque control with hand-assisted positioning, a novel FTA-sensor for system safety, and techniques for direct head tracking, are described and evaluated. Part III discusses these developments in the context of safety and clinical applicability of robotized TMS and presents future prospects of robotized TMS. Robotized Transcranial Magnetic Stimulation is intended for researchers as a guide for developing effective robotized TMS solutions. Professionals and practitioners may also find the book valuable.
Stochastic local search (SLS) algorithms are among the most
prominent and successful techniques for solving computationally
difficult problems in many areas of computer science and operations
research, including propositional satisfiability, constraint
satisfaction, routing, and scheduling. SLS algorithms have also
become increasingly popular for solving challenging combinatorial
problems in many application areas, such as e-commerce and
bioinformatics.
"Industrial applications of evolutionary algorithms" is intended as a resource for both experienced users of evolutionary algorithms and researchers that are beginning to approach these fascinating optimization techniques. Experienced users will find interesting details of real-world problems, advice on solving issues related to fitness computation or modeling, and suggestions on how to set the appropriate parameters to reach optimal solutions. Beginners will find a thorough introduction to evolutionary computation, and a complete presentation of several classes of evolutionary algorithms exploited to solve different problems. Inside, scholars will find useful examples on how to fill the gap between purely theoretical examples and industrial problems. The collection of case studies presented is also extremely appealing for anyone interested in Evolutionary Computation, but without direct access to extensive technical literature on the subject. After the introduction, each chapter in the book presents a test case, and is organized so that it can be read independently from the rest: all the information needed to understand the problem and the approach is reported in each part. Chapters are grouped by three themes of particular interest for real-world applications, namely prototype-based validation, reliability and test generation. The authors hope that this volume will help to expose the flexibility and efficiency of evolutionary techniques, encouraging more companies to adopt them; and that, most of all, you will enjoy your reading.
Evolutionary algorithms are successful biologically inspired meta-heuristics. Their success depends on adequate parameter settings. The question arises: how can evolutionary algorithms learn parameters automatically during the optimization? Evolution strategies gave an answer decades ago: self-adaptation. Their self-adaptive mutation control turned out to be exceptionally successful. But nevertheless self-adaptation has not achieved the attention it deserves. This book introduces various types of self-adaptive parameters for evolutionary computation. Biased mutation for evolution strategies is useful for constrained search spaces. Self-adaptive inversion mutation accelerates the search on combinatorial TSP-like problems. After the analysis of self-adaptive crossover operators the book concentrates on premature convergence of self-adaptive mutation control at the constraint boundary. Besides extensive experiments, statistical tests and some theoretical investigations enrich the analysis of the proposed concepts.
This book is both a reference for engineers and scientists and a teaching resource, featuring tutorial chapters and research papers on feature extraction. Its CD-ROM includes the data of the NIPS 2003 Feature Selection Challenge and sample Matlab code. Until now there has been insufficient consideration of feature selection algorithms, no unified presentation of leading methods, and no systematic comparisons.
This book discusses innovative methods for mining information from images of plants, especially leaves, and highlights the diagnostic features that can be implemented in fully automatic systems for identifying plant species. Adopting a multidisciplinary approach, it explores the problem of plant species identification, covering both the concepts of taxonomy and morphology. It then provides an overview of morphometrics, including the historical background and the main steps in the morphometric analysis of leaves together with a number of applications. The core of the book focuses on novel diagnostic methods for plant species identification developed from a computer scientist's perspective. It then concludes with a chapter on the characterization of botanists' visions, which highlights important cognitive aspects that can be implemented in a computer system to more accurately replicate the human expert's fixation process. The book not only represents an authoritative guide to advanced computational tools for plant identification, but provides experts in botany, computer science and pattern recognition with new ideas and challenges. As such it is expected to foster both closer collaborations and further technological developments in the emerging field of automatic plant identification.
This book presents techniques that enable mobile manipulation robots to autonomously adapt to new situations. Covers kinematic modeling and learning; self-calibration; tactile sensing and object recognition; imitation learning and programming by demonstration.
The rapidly growing amount of data, available from di?erent technologies in the ?eld of bio-sciences, high-energy physics, economy, climate analysis, and in several other scienti?c disciplines, requires a new generation of machine learning and statistical methods to deal with their complexity and hete- geneity. As data collections becomes easier, data analysis is required to be more sophisticated in order to extract useful information from the available data. Even if data can be represented in several ways, according to their structural characteristics, ranging from strings, lists, trees to graphs and other more complex data structures, in most applications they are typically represented as a matrix whose rows correspond to measurable characteristics called f- tures, attributes, variables, depending on the considered discipline and whose columns correspond to examples (cases, samples, patterns). In order to avoid confusion,we will talk about features and examples.In real-worldtasks,there canbe manymorefeatures than examples(cancer classi?cationbasedongene expressionlevels in bioinformatics) or there can be many more examples than features(intrusion detection in computer/networksecurity). In addition, each example can be either labeled or not. Attaching labels allows to distinguish members of the same class or group from members of other classes or groups. Hence, one can talk about supervised and unsupervised tasks that can be solved by machine learning methods. Since it is widely accepted that no single classi?er or clustering algorithm canbesuperiortotheothers,ensemblesofsupervisedandunsupervisedme- ods are gaining popularity. A typical ensemble includes a number of clas- ?ers/clustererswhosepredictionsarecombinedtogetheraccordingtoacertain rule, e.g. majority vote.
Automatic Quantum Computer Programming provides an introduction to quantum computing for non-physicists, as well as an introduction to genetic programming for non-computer-scientists. The book explores several ways in which genetic programming can support automatic quantum computer programming and presents detailed descriptions of specific techniques, along with several examples of their human-competitive performance on specific problems. Source code for the author 's QGAME quantum computer simulator is included as an appendix, and pointers to additional online resources furnish the reader with an array of tools for automatic quantum computer programming.
This book celebrates the work of Yorick Wilks in the form of a selection of his papers which are intended to reflect the range and depth of his work. The volume accompanies a Festschrift which celebrates his contribution to the fields of Computational Linguistics and Artificial Intelligence. The selected papers reflect Yorick 's contribution to both practical and theoretical aspects of automatic language processing.
Machine learning is the study of building computer programs that improve their performance through experience. To meet the challenge of developing and maintaining larger and complex software systems in a dynamic and changing environment, machine learning methods have been playing an increasingly important role in many software development and maintenance tasks. Advances in Machine Learning Applications in Software Engineering provides analysis, characterization and refinement of software engineering data in terms of machine learning methods. This book depicts applications of several machine learning approaches in software systems development and deployment, and the use of machine learning methods to establish predictive models for software quality. Advances in Machine Learning Applications in Software Engineering offers readers suggestions by proposing future work and areas in this emerging research field.
The book focuses on different variants of decision tree induction but also describes the meta-learning approach in general which is applicable to other types of machine learning algorithms. The book discusses different variants of decision tree induction and represents a useful source of information to readers wishing to review some of the techniques used in decision tree learning, as well as different ensemble methods that involve decision trees. It is shown that the knowledge of different components used within decision tree learning needs to be systematized to enable the system to generate and evaluate different variants of machine learning algorithms with the aim of identifying the top-most performers or potentially the best one. A unified view of decision tree learning enables to emulate different decision tree algorithms simply by setting certain parameters. As meta-learning requires running many different processes with the aim of obtaining performance results, a detailed description of the experimental methodology and evaluation framework is provided. Meta-learning is discussed in great detail in the second half of the book. The exposition starts by presenting a comprehensive review of many meta-learning approaches explored in the past described in literature, including for instance approaches that provide a ranking of algorithms. The approach described can be related to other work that exploits planning whose aim is to construct data mining workflows. The book stimulates interchange of ideas between different, albeit related, approaches.
This book presents recent research on Advanced Computing in Industrial Mathematics, which is one of the most prominent interdisciplinary areas and combines mathematics, computer science, scientific computations, engineering, physics, chemistry, medicine, etc. Further, the book presents the tools of Industrial Mathematics, which are based on mathematical models, and the corresponding computer codes, which are used to perform virtual experiments to obtain new data or to better understand the existing experimental results. The book gathers the peer-reviewed papers presented during the 10th Annual Meeting of the Bulgarian Section of SIAM (BGSIAM) from December 21 to 22, 2015 in Sofia, Bulgaria.
The past decades have seen significant improvements in 3D imaging where the related techniques and technologies have advanced to a mature state. These exciting developments have sparked increasing interest in the challenges and opportunities afforded by 3D sensing. As a consequence, the emerging area of safety and security related imaging incorporates these important new technologies beyond the limitations of 2D image processing.This book presents the thoroughly revised versions of lectures given by leading researchers during the Workshop on Advanced 3D Imaging for Safety and Security in conjunction with the International Conference on Computer Vision and Pattern Recognition CVPR 2005, held in San Diego, CA, USA in June 2005.It covers the current state of the art in 3D imaging for safety and security.
This thesis presents a novel neuro-fuzzy modeling approach for grasp neuroprostheses. At first, it offers a detailed study of discomfort due to the application of Functional Electrical Stimulation to the upper limb. Then, it discusses briefly previous methods to model hand movements induced by FES with the purpose of introducing the new modeling approach based on intelligent systems. This approach is thoroughly described in the book, together with the proposed application to induce hand and finger movements by means of a surface FES system based on multi-field electrodes. The validation tests, carried out on both healthy and neurologically impaired subjects, demonstrate the efficacy of the proposed modeling method. All in all, the book proposes an innovative system based on fuzzy neural networks that is expected to improve the design and validation of advanced control systems for non-invasive grasp neuroprostheses.
This monograph has arisen from the multidisciplinary research extending over biology, robotics and hybrid systems theory. It is inspired by modeling reactive behavior of the immune system cell population, where each cell is considered an independent agent. The authors formulate the optimal control of maximizing the probability of robotic presence in a given region and discuss the application of the Minimum Principle for partial differential equations to this problem.
Parsing can be defined as the decomposition of complex structures
into their constituent parts, and parsing technology as the
methods, the tools and the software to parse automatically. Parsing
is a central area of research in the automatic processing of human
language. Parsers are being used in many application areas, for
example question answering, extraction of information from text,
speech recognition and understanding, and machine translation. New
developments in parsing technology are thus widely applicable.
Artificial intelligence is increasingly finding its way into industrial and manufacturing contexts. The prevalence of AI in industry from stock market trading to manufacturing makes it easy to forget how complex artificial intelligence has become. Engineering provides various current and prospective applications of these new and complex artificial intelligence technologies. Applications of Artificial Intelligence in Electrical Engineering is a critical research book that examines the advancing developments in artificial intelligence with a focus on theory and research and their implications. Highlighting a wide range of topics such as evolutionary computing, image processing, and swarm intelligence, this book is essential for engineers, manufacturers, technology developers, IT specialists, managers, academicians, researchers, computer scientists, and students. |
You may like...
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,539
Discovery Miles 15 390
Robotics for Cell Manipulation and…
Changsheng Dai, Guanqiao Shan, …
Paperback
R2,951
Discovery Miles 29 510
Hardware Accelerator Systems for…
Shiho Kim, Ganesh Chandra Deka
Hardcover
R3,950
Discovery Miles 39 500
Advanced Introduction to Artificial…
Tom Davenport, John Glaser, …
Paperback
R617
Discovery Miles 6 170
Artificial Intelligence for Neurological…
Ajith Abraham, Sujata Dash, …
Paperback
R3,925
Discovery Miles 39 250
|