Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Artificial intelligence
This book provides an introduction to the field of periodic pattern mining, reviews state-of-the-art techniques, discusses recent advances, and reviews open-source software. Periodic pattern mining is a popular and emerging research area in the field of data mining. It involves discovering all regularly occurring patterns in temporal databases. One of the major applications of periodic pattern mining is the analysis of customer transaction databases to discover sets of items that have been regularly purchased by customers. Discovering such patterns has several implications for understanding the behavior of customers. Since the first work on periodic pattern mining, numerous studies have been published and great advances have been made in this field. The book consists of three main parts: introduction, algorithms, and applications. The first chapter is an introduction to pattern mining and periodic pattern mining. The concepts of periodicity, periodic support, search space exploration techniques, and pruning strategies are discussed. The main types of algorithms are also presented such as periodic-frequent pattern growth, partial periodic pattern-growth, and periodic high-utility itemset mining algorithm. Challenges and research opportunities are reviewed. The chapters that follow present state-of-the-art techniques for discovering periodic patterns in (1) transactional databases, (2) temporal databases, (3) quantitative temporal databases, and (4) big data. Then, the theory on concise representations of periodic patterns is presented, as well as hiding sensitive information using privacy-preserving data mining techniques. The book concludes with several applications of periodic pattern mining, including applications in air pollution data analytics, accident data analytics, and traffic congestion analytics.
This book is focused on the use of deep learning (DL) and artificial intelligence (AI) as tools to advance the fields of malware detection and analysis. The individual chapters of the book deal with a wide variety of state-of-the-art AI and DL techniques, which are applied to a number of challenging malware-related problems. DL and AI based approaches to malware detection and analysis are largely data driven and hence minimal expert domain knowledge of malware is needed. This book fills a gap between the emerging fields of DL/AI and malware analysis. It covers a broad range of modern and practical DL and AI techniques, including frameworks and development tools enabling the audience to innovate with cutting-edge research advancements in a multitude of malware (and closely related) use cases.
Two significant areas of study that are continually impacting various dimensions in computer science are computer vision and imaging. These technologies are rapidly enhancing how information and data is being exchanged and opening numerous avenues of advancement within areas such as multimedia and intelligent systems. The high level of applicability in computer vision and image processing requires significant research on the specific utilizations of these technologies. Advancements in Computer Vision Applications in Intelligent Systems and Multimedia Technologies is an essential reference source that discusses innovative developments in computational imaging for solving real-life issues and problems and addresses their execution in various disciplines. Featuring research on topics such as image modeling, remote sensing, and support vector machines, this book is ideally designed for IT specialists, scientists, researchers, engineers, developers, practitioners, industry professionals, academicians, and students seeking coverage on the latest developments and innovations in computer vision applications within the realm of multimedia systems.
This book contains the proceedings of the 12th KES International Conference on Sustainability and Energy in Buildings 2020 (SEB20) held in Split, Croatia, during 24-26 June 2020 organized by KES International. SEB20 invited contributions on a range of topics related to sustainable buildings and explored innovative themes regarding sustainable energy systems. The aim of the conference is to bring together researchers, and government and industry professionals to discuss the future of energy in buildings, neighbourhoods and cities from a theoretical, practical, implementation and simulation perspective. The conference formed an exciting chance to present, interact and learn about the latest research and practical developments on the subject. The conference attracted submissions from around the world. Submissions for the Full-Paper Track were subjected to a blind peer-review process. Only the best of these were selected for presentation at the conference and publication in these proceedings. It is intended that this book provides a useful and informative snapshot of recent research developments in the important and vibrant area of sustainability in energy and buildings.
The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these technologies for efficiency purposes. However, the allure of such networks and resultant storage of high volumes of data leads to increased security risks, including threats to information privacy. Artificial Intelligence and Security Challenges in Emerging Networks is an essential reference source that discusses applications of artificial intelligence, machine learning, and data mining, as well as other tools and strategies to protect networks against security threats and solve security and privacy problems. Featuring research on topics such as encryption, neural networks, and system verification, this book is ideally designed for ITC procurement managers, IT consultants, systems and network integrators, infrastructure service providers, computer and software engineers, startup companies, academicians, researchers, managers, and students.
This book offers in-depth insights into the rapidly growing topic of technologies and approaches to modeling fuzzy spatiotemporal data with XML. The topics covered include representation of fuzzy spatiotemporal XML data, topological relationship determination for fuzzy spatiotemporal XML data, mapping between the fuzzy spatiotemporal relational database model and fuzzy spatiotemporal XML data model, and consistencies in fuzzy spatiotemporal XML data updating. Offering a comprehensive guide to the latest research on fuzzy spatiotemporal XML data management, the book is intended to provide state-of-the-art information for researchers, practitioners, and graduate students of Web intelligence, as well as data and knowledge engineering professionals confronted with non-traditional applications that make the use of conventional approaches difficult or impossible.
This book gathers together novel essays on the state-of-the-art research into the logic and practice of abduction. In many ways, abduction has become established and essential to several fields, such as logic, cognitive science, artificial intelligence, philosophy of science, and methodology. In recent years this interest in abduction's many aspects and functions has accelerated. There are evidently several different interpretations and uses for abduction. Many fundamental questions on abduction remain open. How is abduction manifested in human cognition and intelligence? What kinds or types of abduction can be discerned? What is the role for abduction in inquiry and mathematical discovery? The chapters aim at providing answer to these and other current questions. Their contributors have been at the forefront of discussions on abduction, and offer here their updated approaches to the issues that they consider central to abduction's contemporary relevance. The book is an essential reading for any scholar or professional keeping up with disciplines impacted by the study of abductive reasoning, and its novel development and applications in various fields.
This book describes the application of vision-sensing technologies in welding processes, one of the key technologies in intelligent welding manufacturing. Gas tungsten arc welding (GTAW) is one of the main welding techniques and has a wide range of applications in the manufacturing industry. As such, the book also explores the application of AI technologies, such as vision sensing and machine learning, in GTAW process sensing and feature extraction and monitoring, and presents the state-of-the-art in computer vision, image processing and machine learning to detect welding defects using non-destructive methods in order to improve welding productivity. Featuring the latest research from ORNL (Oak Ridge National Laboratory) using digital image correlation technology, this book will appeal to researchers, scientists and engineers in the field of advanced manufacturing.
This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.
This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, models and applications, cyber threats and intrusions analysis and detection, and many other applications for smart cyber ecosystems. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on artificial intelligence and blockchain for future cybersecurity applications.
This book constitutes the full research papers and short monographs developed on the base of the refereed proceedings of the International Conference: Information and Communication Technologies for Research and Industry (ICIT 2020). The book brings accepted research papers which present mathematical modelling, innovative approaches and methods of solving problems in the sphere of control engineering and decision making for the various fields of studies: industry and research, energy efficiency and sustainability, ontology-based data simulation, theory and use of digital signal processing, cognitive systems, robotics, cybernetics, automation control theory, image and sound processing, image recognition, technologies, and computer vision. The book contains also several analytical reviews on using smart city technologies in Russia. The central audience of the book are researchers, industrial practitioners and students from the following areas: Adaptive Systems, Human-Robot Interaction, Artificial Intelligence, Smart City and Internet of Things, Information Systems, Mathematical Modelling, and the Information Sciences.
We describe in this book, recent developments on fuzzy logic, neural networks and optimization algorithms, as well as their hybrid combinations, and their application in areas such as, intelligent control and robotics, pattern recognition, medical diagnosis, time series prediction and optimization of complex problems. The book contains a collection of papers focused on hybrid intelligent systems based on soft computing. There are some papers with the main theme of type-1 and type-2 fuzzy logic, which basically consists of papers that propose new concepts and algorithms based on type-1 and type-2 fuzzy logic and their applications. There also some papers that presents theory and practice of meta-heuristics in different areas of application. Another group of papers describe diverse applications of fuzzy logic, neural networks and hybrid intelligent systems in medical applications. There are also some papers that present theory and practice of neural networks in different areas of application. In addition, there are papers that present theory and practice of optimization and evolutionary algorithms in different areas of application. Finally, there are some papers describing applications of fuzzy logic, neural networks and meta-heuristics in pattern recognition problems.
Build and deploy intelligent applications for natural language processing with Python by using industry standard tools and recently popular methods in deep learning Key Features A no-math, code-driven programmer's guide to text processing and NLP Get state of the art results with modern tooling across linguistics, text vectors and machine learning Fundamentals of NLP methods from spaCy, gensim, scikit-learn and PyTorch Book DescriptionNLP in Python is among the most sought after skills among data scientists. With code and relevant case studies, this book will show how you can use industry-grade tools to implement NLP programs capable of learning from relevant data. We will explore many modern methods ranging from spaCy to word vectors that have reinvented NLP. The book takes you from the basics of NLP to building text processing applications. We start with an introduction to the basic vocabulary along with a workflow for building NLP applications. We use industry-grade NLP tools for cleaning and pre-processing text, automatic question and answer generation using linguistics, text embedding, text classifier, and building a chatbot. With each project, you will learn a new concept of NLP. You will learn about entity recognition, part of speech tagging and dependency parsing for Q and A. We use text embedding for both clustering documents and making chatbots, and then build classifiers using scikit-learn. We conclude by deploying these models as REST APIs with Flask. By the end, you will be confident building NLP applications, and know exactly what to look for when approaching new challenges. What you will learn Understand classical linguistics in using English grammar for automatically generating questions and answers from a free text corpus Work with text embedding models for dense number representations of words, subwords and characters in the English language for exploring document clustering Deep Learning in NLP using PyTorch with a code-driven introduction to PyTorch Using an NLP project management Framework for estimating timelines and organizing your project into stages Hack and build a simple chatbot application in 30 minutes Deploy an NLP or machine learning application using Flask as RESTFUL APIs Who this book is forProgrammers who wish to build systems that can interpret language. Exposure to Python programming is required. Familiarity with NLP or machine learning vocabulary will be helpful, but not mandatory.
An edge-of-your-seat psychological thriller from the acclaimed author of Every Line of You - A Good Girl's Guide to Murder meets virtual reality ... 'A pacy, intelligent novel that will have readers racing to get to the final page.' THE BOOKSELLER 'A pixelated whirlwind of a ride through the darkest secrets of the human mind, explored through the lens of virtual reality gaming!' LEE NEWBERY, AUTHOR OF THE LAST FIREFOX Lola's been selected to play a new virtual reality game - Better Than Life. In her game, she's loved. Is beautiful. Can do whatever she wants. But she quickly breaks the one rule: not to recreate people or places from real life. She recreates her house and a boy she fancies. Soon she's skipping school to play. But Lola has secrets - dark ones that begin to surface inside her game - and the more she tries to fix her problems, the more she overlooks a much bigger threat ... An original, high-concept psychological thriller - Holly Jackson meets VR horror Set in an exclusive boarding school, this rollercoaster ride of a story involves an unreliable narrator,immersive gaming, a dark secret and a huge twist Perfect for fans of Cynthia Murphy and Kathryn Foxfield PRAISE FOR EVERY LINE OF YOU: 'What a debut. So tense - and it didn't lead where I thought it was going.' SUE WALLMAN, author of YOUR TURN TO DIE 'Frankenstein meets Heathers. Bonnie and Clyde for the digital age, Every Line of You is a gripping thriller about the power of AI and a fresh twist on the intensity of first love.' AMY MCCAW, author of MINA AND THE UNDEAD
Since its inception, fuzzy logic has attracted an incredible amount of interest, and this interest continues to grow at an exponential rate. As such, scientists, researchers, educators and practitioners of fuzzy logic continue to expand on the applicability of what and how fuzzy can be utilised in the real-world. In this book, the authors present key application areas where fuzzy has had significant success. The chapters cover a plethora of application domains, proving credence to the versatility and robustness of a fuzzy approach. A better understanding of fuzzy will ultimately allow for a better appreciation of fuzzy. This book provides the reader with a varied range of examples to illustrate what fuzzy logic can be capable of and how it can be applied. The text will be ideal for individuals new to the notion of fuzzy, as well as for early career academics who wish to further expand on their knowledge of fuzzy applications. The book is also suitable as a supporting text for advanced undergraduate and graduate-level modules on fuzzy logic, soft computing, and applications of AI.
This book presents the theory and methods of flexible and generalized uncertainty optimization. Particularly, it describes the theory of generalized uncertainty in the context of optimization modeling. The book starts with an overview of flexible and generalized uncertainty optimization. It covers uncertainties that are both associated with lack of information and are more general than stochastic theory, where well-defined distributions are assumed. Starting from families of distributions that are enclosed by upper and lower functions, the book presents construction methods for obtaining flexible and generalized uncertainty input data that can be used in a flexible and generalized uncertainty optimization model. It then describes the development of the associated optimization model in detail. Written for graduate students and professionals in the broad field of optimization and operations research, this second edition has been revised and extended to include more worked examples and a section on interval multi-objective mini-max regret theory along with its solution method.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of things (IoT), and information security.
This book gathers selected papers presented at the International Conference on Innovations in Information and Communication Technologies (ICI2CT 2020), held at National University of Singapore, Singapore, during 18-19 December 2020. It presents the works on the intersection of the Computer Science and Communication Engineering. Topics covered in the book include communications engineering, Internet and web technology, computer and information science, artificial intelligence, data science and management, and ICT applications.
These proceedings presents the state-of-the-art in spoken dialog systems with applications in robotics, knowledge access and communication. It addresses specifically: 1. Dialog for interacting with smartphones; 2. Dialog for Open Domain knowledge access; 3. Dialog for robot interaction; 4. Mediated dialog (including crosslingual dialog involving Speech Translation); and,5. Dialog quality evaluation. These articles were presented at the IWSDS 2012 workshop.
Affective Computing and Interaction: Psychological, Cognitive and Neuroscientific Perspectives examines the current state and the future prospects of affect in computing within the context of interactions. Uniting several aspects of affective interactions and topics in affective computing, this reference reviews basic foundations of emotions, furthers an understanding of the contribution of affect to our lives and concludes by revealing current trends and promising technologies for reducing the emotional gap between humans and machines, all within the context of interactions.
This book presents a wide and comprehensive range of issues and problems in various fields of science and engineering, from both theoretical and applied perspectives. The desire to develop more effective and efficient tools and techniques for dealing with complex processes and systems has been a natural inspiration for the emergence of numerous fields of science and technology, in particular control and automation and, more recently, robotics. The contributions gathered here concern the development of methods and algorithms to determine best practices regarding broadly perceived decisions or controls. From an engineering standpoint, many of them focus on how to automate a specific process or complex system. From a tools-based perspective, several contributions address the development of analytic and algorithmic methods and techniques, devices and systems that make it possible to develop and subsequently implement the automation and robotization of crucial areas of human activity. All topics discussed are illustrated with sample applications.
This book is a collection of papers presented at the International Workshop on New Approaches for Multidimensional Signal Processing (NAMSP 2020), held at Technical University of Sofia, Sofia, Bulgaria, during 09-11 July 2020. The book covers research papers in the field of N-dimensional multicomponent image processing, multidimensional image representation and super-resolution, 3D image processing and reconstruction, MD computer vision systems, multidimensional multimedia systems, neural networks for MD image processing, data-based MD image retrieval and knowledge data mining, watermarking, hiding and encryption of MD images, MD image processing in robot systems, tensor-based data processing, 3D and multi-view visualization, forensic analysis systems for MD images and many more.
From theory to application, this book presents research on biologically and brain-inspired networking and machine learning based on Yuragi, which is the Japanese term describing the noise or fluctuations that are inherently used to control the dynamics of a system. The Yuragi mechanism can be found in various biological contexts, such as in gene expression dynamics, molecular motors in muscles, or the visual recognition process in the brain. Unlike conventional network protocols that are usually designed to operate under controlled conditions with a predefined set of rules, the probabilistic behavior of Yuragi-based control permits the system to adapt to unknown situations in a distributed and self-organized manner leading to a higher scalability and robustness.The book consists of two parts. Part 1 provides in four chapters an introduction to the biological background of the Yuragi concept as well as how these are applied to networking problems. Part 2 provides additional contributions that extend the original Yuragi concept to a Bayesian attractor model from human perceptual decision making. In the six chapters of the second part, applications to various fields in information network control and artificial intelligence are presented, ranging from virtual network reconfigurations, a software-defined Internet of Things, and low-power wide-area networks. This book will benefit those working in the fields of information networks, distributed systems, and machine learning who seek new design mechanisms for controlling large-scale dynamically changing systems. |
You may like...
The Handbook on Socially Interactive…
Birgit Lugrin, Catherine Pelachaud, …
Paperback
R1,907
Discovery Miles 19 070
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
AI, IoT, and Blockchain Breakthroughs in…
Kavita Saini, N.S. Gowri Ganesh, …
Hardcover
R6,259
Discovery Miles 62 590
Managing AI Wisely - From Development to…
Lauren Waardenburg, Marleen Huysman, …
Hardcover
R2,267
Discovery Miles 22 670
|