![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > General
Recent advancements in the field of telecommunications, medical imaging and signal processing deal with signals that are inherently time varying, nonlinear and complex-valued. The time varying, nonlinear characteristics of these signals can be effectively analyzed using artificial neural networks. Furthermore, to efficiently preserve the physical characteristics of these complex-valued signals, it is important to develop complex-valued neural networks and derive their learning algorithms to represent these signals at every step of the learning process. This monograph comprises a collection of new supervised learning algorithms along with novel architectures for complex-valued neural networks. The concepts of meta-cognition equipped with a self-regulated learning have been known to be the best human learning strategy. In this monograph, the principles of meta-cognition have been introduced for complex-valued neural networks in both the batch and sequential learning modes. For applications where the computation time of the training process is critical, a fast learning complex-valued neural network called as a fully complex-valued relaxation network along with its learning algorithm has been presented. The presence of orthogonal decision boundaries helps complex-valued neural networks to outperform real-valued networks in performing classification tasks. This aspect has been highlighted. The performances of various complex-valued neural networks are evaluated on a set of benchmark and real-world function approximation and real-valued classification problems.
This book presents non-linear image enhancement approaches to mammograms as a robust computer-aided analysis solution for the early detection of breast cancer, and provides a compendium of non-linear mammogram enhancement approaches: from the fundamentals to research challenges, practical implementations, validation, and advances in applications. The book includes a comprehensive discussion on breast cancer, mammography, breast anomalies, and computer-aided analysis of mammograms. It also addresses fundamental concepts of mammogram enhancement and associated challenges, and features a detailed review of various state-of-the-art approaches to the enhancement of mammographic images and emerging research gaps. Given its scope, the book offers a valuable asset for radiologists and medical experts (oncologists), as mammogram visualization can enhance the precision of their diagnostic analyses; and for researchers and engineers, as the analysis of non-linear filters is one of the most challenging research domains in image processing.
This book describes five qualitative investment decision-making methods based on the hesitant fuzzy information. They are: (1) the investment decision-making method based on the asymmetric hesitant fuzzy sigmoid preference relations, (2) the investment decision-making method based on the hesitant fuzzy trade-off and portfolio selection, (3) the investment decision-making method based on the hesitant fuzzy preference envelopment analysis, (4) the investment decision-making method based on the hesitant fuzzy peer-evaluation and strategy fusion, and (5) the investment decision-making method based on the EHVaR measurement and tail analysis.
This volume contains a contemporary, integrated description of the processes of language. These range from fast scales (fractions of a second) to slow ones (over a million years). The contributors, all experts in their fields, address language in the brain, production of sentences and dialogues, language learning, transmission and evolutionary processes that happen over centuries or millenia, the relation between language and genes, the origins of language, self-organization, and language competition and death. The book as a whole will help to show how processes at different scales affect each other, thus presenting language as a dynamic, complex and profoundly human phenomenon.
Context-aware ranking is an important task with many applications. E.g. in recommender systems items (products, movies, ...) and for search engines webpages should be ranked. In all these applications, the ranking is not global (i.e. always the same) but depends on the context. Simple examples for context are the user for recommender systems and the query for search engines. More complicated context includes time, last actions, etc. The major problem is that typically the variable domains (e.g. customers, products) are categorical and huge, the observations are very sparse and only positive events are observed. In this book, a generic method for context-aware ranking as well as its application are presented. For modelling a new factorization based on pairwise interactions is proposed and compared to other tensor factorization approaches. For learning, the `Bayesian Context-aware Ranking' framework consisting of an optimization criterion and algorithm is developed. The second main part of the book applies this general theory to the three scenarios of item, tag and sequential-set recommendation. Furthermore extensions of time-variant factors and one-class problems are studied. This book generalizes and builds on work that has received the `WWW 2010 Best Paper Award', the `WSDM 2010 Best Student Paper Award' and the `ECML/PKDD 2009 Best Discovery Challenge Award'.
In Artificial Intelligence in Finance and Investing, authors Robert Trippi and Jae Lee explain this fascinating new technology in terms that portfolio managers, institutional investors, investment analysis, and information systems professionals can understand. Using real-life examples and a practical approach, this rare and readable volume discusses the entire field of artificial intelligence of relevance to investing, so that readers can realize the benefits and evaluate the features of existing or proposed systems, and ultimately construct their own systems. Topics include using Expert Systems for Asset Allocation, Timing Decisions, Pattern Recognition, and Risk Assessment; overview of Popular Knowledge-Based Systems; construction of Synergistic Rule Bases for Securities Selection; incorporating the Markowitz Portfolio Optimization Model into Knowledge-Based Systems; Bayesian Theory and Fuzzy Logic System Components; Machine Learning in Portfolio Selection and Investment Timing, including Pattern-Based Learning and Fenetic Algorithms; and Neural Network-Based Systems. To illustrate the concepts presented in the book, the authors conclude with a valuable practice session and analysis of a typical knowledge-based system for investment management, K-FOLIO. For those who want to stay on the cutting edge of the "application" revolution, Artificial Intelligence in Finance and Investing offers a pragmatic introduction to the use of knowledge-based systems in securities selection and portfolio management.
This monograph comprises work on network-based Intrusion Detection (ID) that is grounded in visualisation and hybrid Artificial Intelligence (AI). It has led to the design of MOVICAB-IDS (MObile VIsualisation Connectionist Agent-Based IDS), a novel Intrusion Detection System (IDS), which is comprehensively described in this book. This novel IDS combines different AI paradigms to visualise network traffic for ID at packet level. It is based on a dynamic Multiagent System (MAS), which integrates an unsupervised neural projection model and the Case-Based Reasoning (CBR) paradigm through the use of deliberative agents that are capable of learning and evolving with the environment. The proposed novel hybrid IDS provides security personnel with a synthetic, intuitive snapshot of network traffic and protocol interactions. This visualisation interface supports the straightforward detection of anomalous situations and their subsequent identification. The performance of MOVICAB-IDS was tested through a novel mutation-based testing method in different real domains which entailed several attacks and anomalous situations.
This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.
One of the most successful methodology that arose from the worldwide diffusion of Fuzzy Logic is Fuzzy Control. After the first attempts dated in the seventies, this methodology has been widely exploited for controlling many industrial components and systems. At the same time, and very independently from Fuzzy Logic or Fuzzy Control, the birth of the Web has impacted upon almost all aspects of computing discipline. Evolution of Web, Web2.0 and Web 3.0 has been making scenarios of ubiquitous computing much more feasible; consequently information technology has been thoroughly integrated into everyday objects and activities. What happens when Fuzzy Logic meets Web technology? Interesting results might come out, as you will discover in this book. Fuzzy Mark-up Language is a son of this synergistic view, where some technological issues of Web are re-interpreted taking into account the transparent notion of Fuzzy Control, as discussed here. The concept of a Fuzzy Control that is conceived and modeled in terms of a native web wisdom represents another step towards the last picture of Pervasive Web Intelligence.
Vast amounts of data are nowadays collected, stored and processed, in an effort to assist in making a variety of administrative and governmental decisions. These innovative steps considerably improve the speed, effectiveness and quality of decisions. Analyses are increasingly performed by data mining and profiling technologies that statistically and automatically determine patterns and trends. However, when such practices lead to unwanted or unjustified selections, they may result in unacceptable forms of discrimination. Processing vast amounts of data may lead to situations in which data controllers know many of the characteristics, behaviors and whereabouts of people. In some cases, analysts might know more about individuals than these individuals know about themselves. Judging people by their digital identities sheds a different light on our views of privacy and data protection. This book discusses discrimination and privacy issues related to data mining and profiling practices. It provides technological and regulatory solutions, to problems which arise in these innovative contexts. The book explains that common measures for mitigating privacy and discrimination, such as access controls and anonymity, fail to properly resolve privacy and discrimination concerns. Therefore, new solutions, focusing on technology design, transparency and accountability are called for and set forth.
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons caches supporting road-side bomb attacks on your country's troops. Or imagine yourself as a public health expert trying to identify the location of contaminated water that is causing diarrheal diseases in a local population. Geospatial abduction is a new technique introduced by the authors that allows such problems to be solved. Geospatial Abduction provides the mathematics underlying geospatial abduction and the algorithms to solve them in practice; it has wide applicability and can be used by practitioners and researchers in many different fields. Real-world applications of geospatial abduction to military problems are included. Compelling examples drawn from other domains as diverse as criminology, epidemiology and archaeology are covered as well. This book also includes access to a dedicated website on geospatial abduction hosted by University of Maryland. Geospatial Abduction targets practitioners working in general AI, game theory, linear programming, data mining, machine learning, and more. Those working in the fields of computer science, mathematics, geoinformation, geological and biological science will also find this book valuable.
The main objective of this book is to provide the necessary background to work with big data by introducing some novel optimization algorithms and codes capable of working in the big data setting as well as introducing some applications in big data optimization for both academics and practitioners interested, and to benefit society, industry, academia, and government. Presenting applications in a variety of industries, this book will be useful for the researchers aiming to analyses large scale data. Several optimization algorithms for big data including convergent parallel algorithms, limited memory bundle algorithm, diagonal bundle method, convergent parallel algorithms, network analytics, and many more have been explored in this book.
Counting belongs to the most elementary and frequent mental activities of human beings. Its results are a basis for coming to a decision in a lot of situations and dimensions of our life. This book presents a novel approach to the advanced and sophisticated case, called intelligent counting, in which the objects of counting are imprecisely, fuzzily specified. Formally, this collapses to counting in fuzzy sets, interval-valued fuzzy sets or I-fuzzy sets (Atanassov's intuitionistic fuzzy sets). The monograph is the first one showing and emphasizing that the presented methods of intelligent counting are human-consistent: are reflections and formalizations of real, human counting procedures performed under imprecision and, possibly, incompleteness of information. Other applications of intelligent counting in various areas of intelligent systems and decision support will be discussed, too. The whole presentation is self-contained, systematic, and equipped with many examples, figures and tables. Computer and information scientists, researchers, engineers and practitioners, applied mathematicians, and postgraduate students interested in information imprecision are the target readers.
This book provides an insight on the importance that Internet of Vehicles (IoV) solutions can have in taking care of vehicular safety through internetworking and automation. Key features of the book are the inclusion and elaboration of recent and emerging developments in various specializations of intelligent transportation systems and their solutions by incorporating IoT (Internet of Things) and IoV. This book presents to its readers useful IoV applications and architectures that cater to their improved driving requirements and lead towards autonomous driving. The application domains have a large range in which vehicular networking, communication technology, sensor devices, computing materials and devices, IoT communication, vehicular and on-road safety, data security and other topics are included.
This book focuses on open issues of new intelligent control paradigms and their usage. Industry 4.0 requires new approaches in the context of secure connection, control, and maintenance of robotic systems, as well as enhancing their interaction with humans. The book presents recent advances in industrial robotics, and robotic design and modeling for various domains, and discusses the methodological foundations of the collaborative robotics concept as a breakthrough in modern industrial technologies. It also describes the implementation of multi-agent models, programs and methods that could be used in future processes for control, condition assessment, diagnostics, prognostication, and proactive maintenance. Further, the book addresses the issue of ensuring the space robotics systems and proposes reliable novel solutions. The authors also illustrate the integration of deep-learning methods and mathematical modeling based on examples of successful robotic systems in various countries, and analyze the connections between robotic modeling and design from the positions of new industrial challenges. The book is intended for practitioners and enterprise representatives, as well as scientists and Ph.D. and Master's students pursuing research in the area of cyber-physical system development and implementation in various domains.
This volume includes papers presented at IIH-MSP 2017, the 13th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, held from 12 to 15 August 2017 in Matsue, Shimane, Japan. The conference addresses topics ranging from information hiding and security, and multimedia signal processing and networking, to bio-inspired multimedia technologies and systems. This volume of Smart Innovation, Systems and Technologies focuses on subjects related to massive image/video compression and transmission for emerging networks, advances in speech and language processing, information hiding and signal processing for audio and speech signals, intelligent distribution systems and applications, recent advances in security and privacy for multimodal network environments, multimedia signal processing, and machine learning. Updated with the latest research outcomes and findings, the papers presented appeal to researchers and students who are interested in the corresponding fields.
This book focuses on sustainability issues post COVID-19 outbreak, discusses ways to restrict global spread of the pandemic, and also how to survive holistically in the environment. It also discusses the economic impacts on the world due to the coronavirus outbreak. There is a strong need for monitoring and analysis of pandemics for sustainability like epidemic risk analysis by using pattern recognition or the mental health challenges during an outbreak. This book presents ways to find solutions and gives insights to explore innovative methods and predictive modeling techniques, such that masses are prevented from pandemics.
This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.
This book presents powerful techniques for solving global optimization problems on manifolds by means of evolutionary algorithms, and shows in practice how these techniques can be applied to solve real-world problems. It describes recent findings and well-known key facts in general and differential topology, revisiting them all in the context of application to current optimization problems. Special emphasis is put on game theory problems. Here, these problems are reformulated as constrained global optimization tasks and solved with the help of Fuzzy ASA. In addition, more abstract examples, including minimizations of well-known functions, are also included. Although the Fuzzy ASA approach has been chosen as the main optimizing paradigm, the book suggests that other metaheuristic methods could be used as well. Some of them are introduced, together with their advantages and disadvantages. Readers should possess some knowledge of linear algebra, and of basic concepts of numerical analysis and probability theory. Many necessary definitions and fundamental results are provided, with the formal mathematical requirements limited to a minimum, while the focus is kept firmly on continuous problems. The book offers a valuable resource for students, researchers and practitioners. It is suitable for university courses on optimization and for self-study.
This book consists of 20 chapters in which the authors deal with different theoretical and practical aspects of new trends in Collective Computational Intelligence techniques. Computational Collective Intelligence methods and algorithms are one the current trending research topics from areas related to Artificial Intelligence, Soft Computing or Data Mining among others. Computational Collective Intelligence is a rapidly growing field that is most often understood as an AI sub-field dealing with soft computing methods which enable making group decisions and processing knowledge among autonomous units acting in distributed environments. Web-based Systems, Social Networks, and Multi-Agent Systems very often need these tools for working out consistent knowledge states, resolving conflicts and making decisions. The chapters included in this volume cover a selection of topics and new trends in several domains related to Collective Computational Intelligence: Language and Knowledge Processing, Data Mining Methods and Applications, Computer Vision, and Intelligent Computational Methods. This book will be useful for graduate and PhD students in computer science as well as for mature academics, researchers and practitioners interested in the methods and applications of collective computational intelligence in order to create new intelligent systems.
This carefully edited volume aims at providing readers with the most recent progress on intelligent autonomous systems, with its particular emphasis on intelligent autonomous ground, aerial and underwater vehicles as well as service robots for home and healthcare under the context of the aforementioned convergence. "Frontiers of Intelligent Autonomous Systems" includes thoroughly revised and extended papers selected from the 12th International Conference on Intelligent Autonomous Systems (IAS-12), held in Jeju, Korea, June 26-29, 2012. The editors chose 35 papers out of the 202 papers presented at IAS-12 which are organized into three chapters: Chapter 1 is dedicated to autonomous navigation and mobile manipulation, Chapter 2 to unmanned aerial and underwater vehicles and Chapter 3 to service robots for home and healthcare. To help the readers to easily access this volume, each chapter starts with a chapter summary introduced by one of the editors: Chapter 1 by Sukhan Lee, Chapter 2 by Kwang Joon Yoon and Chapter 3 by Jangmyung Lee.
The present book includes a set of selected best papers from the 3rd International Conference on Recent Developments in Science, Engineering and Technology (REDSET 2016), held in Gurgaon, India, from 21 to 22 October 2016. The conference focused on the experimental, theoretical and application aspects of innovations in computational intelligence and provided a platform for the academicians and scientists. This book provides an insight into ongoing research and future directions in this novel, continuously evolving field. Many decades have been devoted to creating and refining methods and tools for computational intelligence such as Artificial Neural Networks, Evolutionary Computation, Fuzzy Logic, Computational Swarm Intelligence and Artificial Immune Systems. However, their applications have not yet been broadly disseminated. Computational intelligence can be used to provide solutions to many real-life problems, which could be translated into binary languages, allowing computers to process them. These problems, which involve various fields such as robotics, bioinformatics, computational biology, gene expression, cancer classification, protein function prediction, etc., could potentially be solved using computational intelligence techniques.
Science used to be experiments and theory, now it is experiments, theory and computations. The computational approach to understanding nature and technology is currently flowering in many fields such as physics, geophysics, astrophysics, chemistry, biology, and most engineering disciplines. This book is a gentle introduction to such computational methods where the techniques are explained through examples. It is our goal to teach principles and ideas that carry over from field to field. You will learn basic methods and how to implement them. In order to gain the most from this text, you will need prior knowledge of calculus, basic linear algebra and elementary programming.
As technology continues to develop, certain innovations are beginning to cover a wide range of applications, specifically mobile robotic systems. The boundaries between the various automation methods and their implementations are not strictly defined, with overlaps occurring. Specificity is required regarding the research and development of android systems and how they pertain to modern science. Control and Signal Processing Applications for Mobile and Aerial Robotic Systems is a pivotal reference source that provides vital research on the current state of control and signal processing of portable robotic designs. While highlighting topics such as digital systems, control theory, and mathematical methods, this publication explores original inquiry contributions and the instrumentation of mechanical systems in the industrial and scientific fields. This book is ideally designed for technicians, engineers, industry specialists, researchers, academicians, and students seeking current research on today's execution of mobile robotic schemes. |
You may like...
Financial Mathematics - A Computational…
K. Pereira, N. Modhien, …
Paperback
R326
Discovery Miles 3 260
Magmas Under Pressure - Advances in…
Yoshio Kono, Chrystele Sanloup
Paperback
R3,247
Discovery Miles 32 470
Schumann Resonance for Tyros…
Alexander Nickolaenko, Masashi Hayakawa
Hardcover
R3,682
Discovery Miles 36 820
Chrysotile-asbestos [microform] - Its…
Fritz 1863-1914 Cirkel
Hardcover
R1,075
Discovery Miles 10 750
|