![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing
This unique volume reviews the latest advances in domain adaptation in the training of machine learning algorithms for visual understanding, offering valuable insights from an international selection of experts in the field. The text presents a diverse selection of novel techniques, covering applications of object recognition, face recognition, and action and event recognition. Topics and features: reviews the domain adaptation-based machine learning algorithms available for visual understanding, and provides a deep metric learning approach; introduces a novel unsupervised method for image-to-image translation, and a video segment retrieval model that utilizes ensemble learning; proposes a unique way to determine which dataset is most useful in the base training, in order to improve the transferability of deep neural networks; describes a quantitative method for estimating the discrepancy between the source and target data to enhance image classification performance; presents a technique for multi-modal fusion that enhances facial action recognition, and a framework for intuition learning in domain adaptation; examines an original interpolation-based approach to address the issue of tracking model degradation in correlation filter-based methods. This authoritative work will serve as an invaluable reference for researchers and practitioners interested in machine learning-based visual recognition and understanding.
This textbook provides an introduction to the growing interdisciplinary field of computational science. It combines a foundational development of numerical methods with a variety of illustrative applications spread across numerous areas of science and engineering. The intended audience is the undergraduate who has completed introductory coursework in mathematics and computer science. Students gain computational acuity by authoring their own numerical routines and by practicing with numerical methods as they solve computational models. This education encourages students to learn the importance of answering: How expensive is a calculation, how trustworthy is a calculation, and how might we model a problem to apply a desired numerical method? The text is written in two parts. Part I provides a succinct, one-term inauguration into the primary routines on which a further study of computational science rests. The material is organized so that the transition to computational science from coursework in calculus, differential equations, and linear algebra is natural. Beyond the mathematical and computational content of Part I, students gain proficiency with elemental programming constructs and visualization, which are presented in MATLAB syntax. The focus of Part II is modeling, wherein students build computational models, compute solutions, and report their findings. The models purposely intersect numerous areas of science and engineering to demonstrate the pervasive role played by computational science.
This book presents a collection of papers on recent advances in problems concerning dynamics, optimal control and optimization. In many chapters, computational techniques play a central role. Set-oriented techniques feature prominently throughout the book, yielding state-of-the-art algorithms for computing general invariant sets, constructing globally optimal controllers and solving multi-objective optimization problems.
This book collects high-quality research papers presented at the International Conference on Computing Applications in Electrical & Electronics Engineering, held at Rajkiya Engineering College, Sonbhadra, India, on August 30-31, 2019. It provides novel contributions in computational intelligence, together with valuable reference material for future research. The topics covered include: big data analytics, IoT and smart infrastructures, machine learning, artificial intelligence and deep learning, crowd sourcing and social intelligence, natural language processing, business intelligence, high-performance computing, wireless, mobile and green communications, ad-hoc, sensor and mesh networks, SDN and network virtualization, cognitive systems, swarm intelligence, human-computer interaction, network and information security, intelligent control, soft computing, networked control systems, renewable energy sources and technologies, biomedical signal processing, pattern recognition and object tracking, and sensor devices and applications.
Data science has taken the world by storm. Every field of study and area of business has been affected as people increasingly realize the value of the incredible quantities of data being generated. But to extract value from those data, one needs to be trained in the proper data science skills. The R programming language has become the de facto programming language for data science. Its flexibility, power, sophistication, and expressiveness have made it an invaluable tool for data scientists around the world. This book is about the fundamentals of R programming. You will get started with the basics of the language, learn how to manipulate datasets, how to write functions, and how to debug and optimize code. With the fundamentals provided in this book, you will have a solid foundation on which to build your data science toolbox.
Recently, educators have begun to consider what is required in literacy curricula and best teaching practices given the demands placed on the educator sector and on literacy in general. ""Multiliteracies and Technology Enhanced Education: Social Practice and the Global Classroom"" features theoretical reflections and approaches on the use of multiliteracies and technologies in the improvement of education and social practices. Assisting educators at different teaching levels and fostering professional development and progress in this growing field, this innovative publication supports practitioners concerned with teaching at both a local and global level.
This book is a collection of conference proceedings mainly concerned with the problem class of nonlinear transport/diffusion/reaction systems, chief amongst these being the Navier-Stokes equations, porous-media flow problems and semiconductor-device equations. Of particular interest are unsolved problems which challenge open questions from applications and assess the various numerous methods used to treat them. A fundamental aim is to raise the overall awareness of a broad range of topical issues in scientific computing and numerical analysis, including multispecies/multiphysics problems, discretisation methods for nonlinear systems, mesh generation, adaptivity, linear algebraic solvers and preconditioners, and portable parallelisation.
Cyber-physical systems (CPSs) combine cyber capabilities, such as computation or communication, with physical capabilities, such as motion or other physical processes. Cars, aircraft, and robots are prime examples, because they move physically in space in a way that is determined by discrete computerized control algorithms. Designing these algorithms is challenging due to their tight coupling with physical behavior, while it is vital that these algorithms be correct because we rely on them for safety-critical tasks. This textbook teaches undergraduate students the core principles behind CPSs. It shows them how to develop models and controls; identify safety specifications and critical properties; reason rigorously about CPS models; leverage multi-dynamical systems compositionality to tame CPS complexity; identify required control constraints; verify CPS models of appropriate scale in logic; and develop an intuition for operational effects. The book is supported with homework exercises, lecture videos, and slides.
Significant research and development advancement has been achieved in enterprise computing, integration, and management. The results of this advancement stimulate the creation of a new class of mission-critical infrastructures, a new category of integration methods and software tools, and a new group of business platforms for cost-effectively exploiting, integrating, and managing business operations across enterprises. ""Enterprise Service Computing: From Concept To Deployment"" presents the emerging service computing, or service-enabled computing, technologies currently preferably used in integrating enterprise-wide and cross-enterprise applications. The topics covered range from concept development, system design, modeling, and development technologies, to the final deployment, providing both theoretical research results and practical applications.
This book analyzes the fundamental issues faced when blockchain technology is applied to real-life applications. These concerns, not only in the realm of computer science, are caused by the nature of technological design. Blockchain is considered the foundation of a wide range of flexible ecosystems; its technology is an excellent mixture of mathematics, cryptography, incentive mechanisms, economics, and pertinent regulations. The book provides an essential understanding of why such fundamental issues arise, by revising the underlying theories. Blockchain theory is thus presented in an easy-to-understand, useful manner. Also explained is the reason why blockchain is hard to adopt for real-life problems but is valuable as a foundation for flexible ecosystems. Included are directions for solving those problems and finding suitable areas for blockchain applications in the future. The authors of this work are experts from a wide range of backgrounds such as cryptography, distributed computing, computer science, trust, identity, regulation, and standardization. Their contributions collected here will appeal to all who are interested in blockchain and the elements surrounding it.
Mapping and localization are two essential tasks in autonomous mobile robotics. Due to the unavoidable noise that sensors present, mapping algorithms usually rely on loop closure detection techniques, which entail the correct identification of previously seen places to reduce the uncertainty of the resulting maps. This book deals with the problem of generating topological maps of the environment using efficient appearance-based loop closure detection techniques. Since the quality of a visual loop closure detection algorithm is related to the image description method and its ability to index previously seen images, several methods for loop closure detection adopting different approaches are developed and assessed. Then, these methods are used in three novel topological mapping algorithms. The results obtained indicate that the solutions proposed attain a better performance than several state-of-the-art approaches. To conclude, given that loop closure detection is also a key component in other research areas, a multi-threaded image mosaicing algorithm is proposed. This approach makes use of one of the loop closure detection techniques previously introduced in order to find overlapping pairs between images and finally obtain seamless mosaics of different environments in a reasonable amount of time.
This book provides detailed descriptions of big data solutions for activity detection and forecasting of very large numbers of moving entities spread across large geographical areas. It presents state-of-the-art methods for processing, managing, detecting and predicting trajectories and important events related to moving entities, together with advanced visual analytics methods, over multiple heterogeneous, voluminous, fluctuating and noisy data streams from moving entities, correlating them with data from archived data sources expressing e.g. entities' characteristics, geographical information, mobility patterns, mobility regulations and intentional data. The book is divided into six parts: Part I discusses the motivation and background of mobility forecasting supported by trajectory-oriented analytics, and includes specific problems and challenges in the aviation (air-traffic management) and the maritime domains. Part II focuses on big data quality assessment and processing, and presents novel technologies suitable for mobility analytics components. Next, Part III describes solutions toward processing and managing big spatio-temporal data, particularly enriching data streams and integrating streamed and archival data to provide coherent views of mobility, and storing of integrated mobility data in large distributed knowledge graphs for efficient query-answering. Part IV focuses on mobility analytics methods exploiting (online) processed, synopsized and enriched data streams as well as (offline) integrated, archived mobility data, and highlights future location and trajectory prediction methods, distinguishing between short-term and more challenging long-term predictions. Part V examines how methods addressing data management, data processing and mobility analytics are integrated in big data architectures with distinctive characteristics compared to other known big data paradigmatic architectures. Lastly, Part VI covers important ethical issues that research on mobility analytics should address. Providing novel approaches and methodologies related to mobility detection and forecasting needs based on big data exploration, processing, storage, and analysis, this book will appeal to computer scientists and stakeholders in various application domains.
This book addresses reliability, maintenance, risk, and safety issues of industrial systems with applications of the latest decision-making techniques. Thus, this book presents chapters that apply advanced tools, techniques, and computing models for optimizing the performance of industrial and manufacturing systems, along with other complex engineering equipment. Computing techniques like data analytics, failure mode and effects analysis, fuzzy set theory, petri-net, multi-criteria decision-making (MCDM), and soft computing are used for solving problems of reliability, risk, and safety related issues.
In this thesis, "Human behavior on the Internet," the human anxiety is conceptualized. The following questions have guided the writing of the thesis: How humans behave with the Internet technology? What goes in their mind? What kinds of behaviors are shown while using the Internet? What is the role of the content on the Internet and especially what are the types of anxiety behavior on the Internet? By conceptualization this thesis aims to provide a model for studying whether humans show signs of less or exacerbated anxiety while using the Internet.
The third edition of this handbook is designed to provide a broad coverage of the concepts, implementations, and applications in metaheuristics. The book's chapters serve as stand-alone presentations giving both the necessary underpinnings as well as practical guides for implementation. The nature of metaheuristics invites an analyst to modify basic methods in response to problem characteristics, past experiences, and personal preferences, and the chapters in this handbook are designed to facilitate this process as well. This new edition has been fully revised and features new chapters on swarm intelligence and automated design of metaheuristics from flexible algorithm frameworks. The authors who have contributed to this volume represent leading figures from the metaheuristic community and are responsible for pioneering contributions to the fields they write about. Their collective work has significantly enriched the field of optimization in general and combinatorial optimization in particular.Metaheuristics are solution methods that orchestrate an interaction between local improvement procedures and higher level strategies to create a process capable of escaping from local optima and performing a robust search of a solution space. In addition, many new and exciting developments and extensions have been observed in the last few years. Hybrids of metaheuristics with other optimization techniques, like branch-and-bound, mathematical programming or constraint programming are also increasingly popular. On the front of applications, metaheuristics are now used to find high-quality solutions to an ever-growing number of complex, ill-defined real-world problems, in particular combinatorial ones. This handbook should continue to be a great reference for researchers, graduate students, as well as practitioners interested in metaheuristics.
This book focuses on the design, implementation and applications of embedded systems and advanced industrial controls with microcontrollers. It combines classical and modern control theories as well as practical control programming codes to help readers learn control techniques easily and effectively. The book covers both linear and nonlinear control techniques to help readers understand modern control strategies. The author provides a detailed description of the practical considerations and applications in linear and nonlinear control systems. They concentrate on the ARM (R) Cortex (R)-M4 MCU system built by Texas Instruments (TM) called TM4C123GXL, in which two ARM (R) Cortex (R)-M4 MCUs, TM4C123GH6PM, are utilized. In order to help the reader develop and build application control software for a specified microcontroller unit. Readers can quickly develop and build their applications by using sample project codes provided in the book to access specified peripherals. The book enables readers to transfer from one interfacing protocol to another, even if they only have basic and fundamental understanding and basic knowledge of one interfacing function. Classical and Modern Controls with Microcontrollers is a powerful source of information for control and systems engineers looking to expand their programming knowledge of C, and of applications of embedded systems with microcontrollers. The book is a textbook for college students majored in CE, EE and ISE to learn and study classical and modern control technologies. The book can also be adopted as a reference book for professional programmers working in modern control fields or related to intelligent controls and embedded computing and applications. Advances in Industrial Control reports and encourages the transfer of technology in control engineering. The rapid development of control technology has an impact on all areas of the control discipline. The series offers an opportunity for researchers to present an extended exposition of new work in all aspects of industrial control.
This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don't wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution.
Advances in Computers, Volume 108, the latest volume in a series published since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. This book provides contributors with a medium in which they can explore subjects in greater depth and breadth than similar topics in journal articles allow.
Algorithms are now widely employed to make decisions that have increasingly far-reaching impacts on individuals and society as a whole ("algorithmic governance"), which could potentially lead to manipulation, biases, censorship, social discrimination, violations of privacy, property rights, and more. This has sparked a global debate on how to regulate AI and robotics ("governance of algorithms"). This book discusses both of these key aspects: the impact of algorithms, and the possibilities for future regulation.
This book provides a comprehensive introduction to the application of artificial intelligence in social computing, from fundamental data processing to advanced social network computing. To broaden readers' understanding of the topics addressed, it includes extensive data and a large number of charts and references, covering theories, techniques and applications. It particularly focuses on data collection, data mining, artificial intelligence algorithms in social computing, and several key applications of social computing application, and also discusses network propagation mechanisms and dynamic analysis, which provide useful insights into how information is disseminated in online social networks. This book is intended for readers with a basic knowledge of advanced mathematics and computer science.
The modeling of healthcare components and systems in order to develop a complete understanding of component interactions is one of the more challenging simulation and modeling problems for software agent systems. ""Multi-Agent Systems for Healthcare Simulation and Modeling: Applications for System Improvement"" provides relevant theoretical frameworks and the latest empirical research findings used by medical professionals in the implementation of multi-agent systems. This ""Premier Reference Source"" disseminates understanding on the strategic role of systems modeling in healthcare, a valuable resource to academicians, researchers, and field practitioners.
This book discusses the formalization of mathematical theories centering on complex analysis and matrix theory, covering topics such as algebraic systems, complex numbers, gauge integration, the Fourier transformation and its discrete counterpart, matrices and their transformation, inner product spaces, and function matrices. The formalization is performed using the interactive theorem prover HOL4, chiefly developed at the University of Cambridge. Many of the developments presented are now integral parts of the library of this prover. As mathematical developments continue to gain in complexity, sometimes demanding proofs of enormous sizes, formalization has proven to be invaluable in terms of obtaining real confidence in their correctness. This book provides a basis for the computer-aided verification of engineering systems constructed using the principles of complex analysis and matrix theory, as well as building blocks for the formalization of more involved mathematical theories. |
![]() ![]() You may like...
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
Fundamentals of Spatial Information…
Robert Laurini, Derek Thompson
Hardcover
R1,490
Discovery Miles 14 900
Dynamic Web Application Development…
David Parsons, Simon Stobart
Paperback
|