Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Artificial intelligence > General
This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons caches supporting road-side bomb attacks on your country's troops. Or imagine yourself as a public health expert trying to identify the location of contaminated water that is causing diarrheal diseases in a local population. Geospatial abduction is a new technique introduced by the authors that allows such problems to be solved. Geospatial Abduction provides the mathematics underlying geospatial abduction and the algorithms to solve them in practice; it has wide applicability and can be used by practitioners and researchers in many different fields. Real-world applications of geospatial abduction to military problems are included. Compelling examples drawn from other domains as diverse as criminology, epidemiology and archaeology are covered as well. This book also includes access to a dedicated website on geospatial abduction hosted by University of Maryland. Geospatial Abduction targets practitioners working in general AI, game theory, linear programming, data mining, machine learning, and more. Those working in the fields of computer science, mathematics, geoinformation, geological and biological science will also find this book valuable.
The book puts special stress on the contemporary techniques for reasoning-based image processing and analysis: learning based image representation and advanced video coding; intelligent image processing and analysis in medical vision systems; similarity learning models for image reconstruction; visual perception for mobile robot motion control, simulation of human brain activity in the analysis of video sequences; shape-based invariant features extraction; essential of paraconsistent neural networks, creativity and intelligent representation in computational systems. The book comprises 14 chapters. Each chapter is a small monograph, representing resent investigations of authors in the area. The topics of the chapters cover wide scientific and application areas and complement each-other very well. The chapters' content is based on fundamental theoretical presentations, followed by experimental results and comparison with similar techniques. The size of the chapters is well-ballanced which permits a thorough presentation of the investigated problems. The authors are from universities and R&D institutions all over the world; some of the chapters are prepared by international teams. The book will be of use for university and PhD students, researchers and software developers working in the area of digital image and video processing and analysis.
This book provides a complete picture of several decision support tools for predictive maintenance. These include embedding early anomaly/fault detection, diagnosis and reasoning, remaining useful life prediction (fault prognostics), quality prediction and self-reaction, as well as optimization, control and self-healing techniques. It shows recent applications of these techniques within various types of industrial (production/utilities/equipment/plants/smart devices, etc.) systems addressing several challenges in Industry 4.0 and different tasks dealing with Big Data Streams, Internet of Things, specific infrastructures and tools, high system dynamics and non-stationary environments . Applications discussed include production and manufacturing systems, renewable energy production and management, maritime systems, power plants and turbines, conditioning systems, compressor valves, induction motors, flight simulators, railway infrastructures, mobile robots, cyber security and Internet of Things. The contributors go beyond state of the art by placing a specific focus on dynamic systems, where it is of utmost importance to update system and maintenance models on the fly to maintain their predictive power.
The second unputdownable book in the acclaimed THE LOOP trilogy - perfect for fans of The Hunger Games and The Maze Runner ... 'A terrifying and sinister look into the future that will leave your jaw on the floor.' KASS MORGAN, New York Times bestselling author of THE 100 on book 1 'Your next YA obsession.' ENTERTAINMENT WEEKLY on book 1 'Fans of The Hunger Games and The Maze Runner should look no further ... Thrilling and terrifying in equal measure.' OBSERVER on book 1 Luka is in prison again - but this time it's worse. He's in the Block, a place where reality and simulation start to blur. But an audacious breakout reunites Luka and his friends at last. Hiding out in the heart of the destroyed city, Luka realises the scale of their mission to defeat all-powerful AI, Happy. How can they stay hidden, let alone win the war? Old friends and new - including annoyingly cheerful companion drone, Apple-Moth - hold the key to their slim chance of victory ... The second nail-biting instalment in The Loop trilogy: a must-read YA series for teens and adults alike Prison Break meets 1984 in this cutting-edge sci-fi thriller - perfect for fans of The Hunger Games and The Maze Runner Complete the trilogy with book 3, The Arc
The use of optimization algorithms has seen an emergence in various professional fields due to its ability to process data and information in an efficient and productive manner. Combining computational intelligence with these algorithms has created a trending subject of research on how much more beneficial intelligent-inspired algorithms can be within companies and organizations. As modern theories and applications are continually being developed in this area, professionals are in need of current research on how intelligent algorithms are advancing in the real world. The Handbook of Research on Advancements of Swarm Intelligence Algorithms for Solving Real-World Problems is a pivotal reference source that provides vital research on the development of swarm intelligence algorithms and their implementation into current issues. While highlighting topics such as multi-agent systems, bio-inspired computing, and evolutionary programming, this publication explores various concepts and theories of swarm intelligence and outlines future directions of development. This book is ideally designed for IT specialists, researchers, academicians, engineers, developers, practitioners, and students seeking current research on the real-world applications of intelligent algorithms.
This book introduces the novel concept of a fuzzy network whose nodes are rule bases and the connections between the nodes are the interactions between the rule bases in the form of outputs fed as inputs. The concept is presented as a systematic study for improving the feasibility and transparency of fuzzy models by means of modular rule bases whereby the model accuracy and efficiency can be optimised in a flexible way. The study uses an effective approach for fuzzy rule based modelling of complex systems that are characterised by attributes such as nonlinearity, uncertainty, dimensionality and structure.The approach is illustrated by formal models for fuzzy networks, basic and advanced operations on network nodes, properties of operations, feedforward and feedback fuzzy networks as well as evaluation of fuzzy networks. The results are demonstrated by numerous examples, two case studies and software programmes within the Matlab environment that implement some of the theoretical methods from the book. The book shows the novel concept of a fuzzy network with networked rule bases as a bridge between the existing concepts of a standard fuzzy system with a single rule base and a hierarchical fuzzy system with multiple rule bases.
This book is useful to understand and write alongside non-human agents, examine the impact of algorithms and AI on writing, and accommodate relationships with autonomous agents. This ground-breaking future-driven framework prepares scholars and practitioners to investigate and plan for the social, digital literacy, and civic implications arising from emerging technologies. This book prepares researchers, students, practitioners, and citizens to work with AI writers, virtual humans, and social robots. This book explores prompts to envision how fields and professions will change. The book's unique integration with Fabric of Digital Life, a database and structured content repository for conducting social and cultural analysis of emerging technologies, provides concrete examples throughout. Readers gain imperative direction for collaborative, algorithmic, and autonomous writing futures.
This book presents state-of-the-art solution methods and applications of stochastic optimal control. It is a collection of extended papers discussed at the traditional Liverpool workshop on controlled stochastic processes with participants from both the east and the west. New problems are formulated, and progresses of ongoing research are reported. Topics covered in this book include theoretical results and numerical methods for Markov and semi-Markov decision processes, optimal stopping of Markov processes, stochastic games, problems with partial information, optimal filtering, robust control, Q-learning, and self-organizing algorithms. Real-life case studies and applications, e.g., queueing systems, forest management, control of water resources, marketing science, and healthcare, are presented. Scientific researchers and postgraduate students interested in stochastic optimal control,- as well as practitioners will find this book appealing and a valuable reference.
This book employs a new eco-cognitive model of abduction to underline the distributed and embodied nature of scientific cognition. Its main focus is on the knowledge-enhancing virtues of abduction and on the productive role of scientific models. What are the distinctive features that define the kind of knowledge produced by science? To provide an answer to this question, the book first addresses the ideas of Aristotle, who stressed the essential inferential and distributed role of external cognitive tools and epistemic mediators in abductive cognition. This is analyzed in depth from both a naturalized logic and an ecology of cognition perspective. It is shown how the maximization of cognition, and of abducibility - two typical goals of science - are related to a number of fundamental aspects: the optimization of the eco-cognitive situatedness; the maximization of changeability for both the input and the output of the inferences involved; a high degree of information-sensitiveness; and the need to record the "past life" of abductive inferential practices. Lastly, the book explains how some impoverished epistemological niches - the result of a growing epistemic irresponsibility associated with the commodification and commercialization of science - are now seriously jeopardizing the flourishing development of human creative abduction.
The importance of accuracy verification methods was understood at the very beginning of the development of numerical analysis. Recent decades have seen a rapid growth of results related to adaptive numerical methods and a posteriori estimates. However, in this important area there often exists a noticeable gap between mathematicians creating the theory and researchers developing applied algorithms that could be used in engineering and scientific computations for guaranteed and efficient error control. The goals of the book are to (1) give a transparent explanation of the underlying mathematical theory in a style accessible not only to advanced numerical analysts but also to engineers and students; (2) present detailed step-by-step algorithms that follow from a theory; (3) discuss their advantages and drawbacks, areas of applicability, give recommendations and examples. "
The present book includes a set of selected best papers from the 3rd International Conference on Recent Developments in Science, Engineering and Technology (REDSET 2016), held in Gurgaon, India, from 21 to 22 October 2016. The conference focused on the experimental, theoretical and application aspects of innovations in computational intelligence and provided a platform for the academicians and scientists. This book provides an insight into ongoing research and future directions in this novel, continuously evolving field. Many decades have been devoted to creating and refining methods and tools for computational intelligence such as Artificial Neural Networks, Evolutionary Computation, Fuzzy Logic, Computational Swarm Intelligence and Artificial Immune Systems. However, their applications have not yet been broadly disseminated. Computational intelligence can be used to provide solutions to many real-life problems, which could be translated into binary languages, allowing computers to process them. These problems, which involve various fields such as robotics, bioinformatics, computational biology, gene expression, cancer classification, protein function prediction, etc., could potentially be solved using computational intelligence techniques.
The book describes a novel ideology and supporting information technology for integral management of both civil and defence-orientated large, distributed dynamic systems. The approach is based on a high-level Spatial Grasp Language, SGL, expressing solutions in physical, virtual, executive and combined environments in the form of active self-evolving and self-propagating patterns spatially matching the systems to be created, modified and controlled. The communicating interpreters of SGL can be installed in key system points, which may be in large numbers (up to millions and billions) and represent equipped humans, robots, laptops, smartphones, smart sensors, etc. Operating under gestalt-inspired scenarios in SGL initially injected from any points, these systems can be effectively converted into goal-driven spatial machines (rather than computers as dealing with physical matter too) capable of responding to numerous challenges caused by growing world dynamics in the 21st century. Including numerous practical examples, the book is a valuable resource for system managers and programmers.
Biological and other natural processes have always been a source of inspiration for computer science and information technology. Many emerging problem solving techniques integrate advanced evolution and cooperation strategies, encompassing a range of spatio-temporal scales for visionary conceptualization of evolutionary computation. The previous editions of NICSO were held in Granada, Spain (2006), Acireale, Italy (2007), Tenerife, Spain (2008), and again in Granada in 2010. NICSO evolved to be one of the most interesting and profiled workshops in nature inspired computing. NICSO 2011 has offered an inspiring environment for debating the state of the art ideas and techniques in nature inspired cooperative strategies and a comprehensive image on recent applications of these ideas and techniques. The topics covered by this volume include Swarm Intelligence (such as Ant and Bee Colony Optimization), Genetic Algorithms, Multiagent Systems, Coevolution and Cooperation strategies, Adversarial Models, Synergic Building Blocks, Complex Networks, Social Impact Models, Evolutionary Design, Self Organized Criticality, Evolving Systems, Cellular Automata, Hybrid Algorithms, and Membrane Computing (P-Systems).
Although recommendation systems have become a vital research area in the fields of cognitive science, approximation theory, information retrieval and management sciences, they still require improvements to make recommendation methods more effective and intelligent. Intelligent Techniques in Recommendation Systems: Contextual Advancements and New Methods is a comprehensive collection of research on the latest advancements of intelligence techniques and their application to recommendation systems and how this could improve this field of study.
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.
The main objective of this book is to provide the necessary background to work with big data by introducing some novel optimization algorithms and codes capable of working in the big data setting as well as introducing some applications in big data optimization for both academics and practitioners interested, and to benefit society, industry, academia, and government. Presenting applications in a variety of industries, this book will be useful for the researchers aiming to analyses large scale data. Several optimization algorithms for big data including convergent parallel algorithms, limited memory bundle algorithm, diagonal bundle method, convergent parallel algorithms, network analytics, and many more have been explored in this book.
Our everyday lives are practically unthinkable without optimization. We constantly try to minimize our effort and to maximize the reward or progress achieved. Many real-world and industrial problems arising in engineering, economics, medicine and other domains can be formulated as optimization tasks. This volume presents a comprehensive collection of extended contributions from the 2017 Workshop on Computational Optimization. Presenting recent advances in computational optimization, it addresses important concrete applications, e.g. the modeling of physical processes, wildfire modeling, modeling processes in chemical engineering, workforce planning, wireless access network topology, parameter settings for controlling various processes, berth allocation, identification of homogeneous domains, and quantum computing. The book shows how to develop algorithms for them based on new intelligent methods like evolutionary computations, ant colony optimization, constrain programming and others.
This collection of papers, published in honour of Hector J. Levesque on the occasion of his 60th birthday, addresses a number of core areas in the field of knowledge representation and reasoning. In a broad sense, the book is about knowledge and belief, tractable reasoning, and reasoning about action and change. More specifically, the book contains contributions to Description Logics, the expressiveness of knowledge representation languages, limited forms of inference, satisfiablity (SAT), the logical foundations of BDI architectures, only-knowing, belief revision, planning, causation, the situation calculus, the action language Golog, and cognitive robotics.
This book presents a set of theoretical and experimental results that describe the features of the wide family of -stable distributions (the normal distribution also belongs to this class) and their various applications in the mutation operator of evolutionary algorithms based on real-number representation of the individuals, and, above all, equip these algorithms with features that enrich their effectiveness in solving multi-modal, multi-dimensional global optimization problems. The overall conclusion of the research presented is that the appropriate choice of probabilistic model of the mutation operator for an optimization problem is crucial. Mutation is one of the most important operations in stochastic global optimization algorithms in the n-dimensional real space. It determines the method of search space exploration and exploitation. Most applications of these algorithms employ the normal mutation as a mutation operator. This choice is justified by the central limit theorem but is associated with a set of important limitations. Application of -stable distributions allows more flexible evolutionary models to be obtained than those with the normal distribution. The book presents theoretical analysis and simulation experiments, which were selected and constructed to expose the most important features of the examined mutation techniques based on -stable distributions. It allows readers to develop a deeper understanding of evolutionary processes with stable mutations and encourages them to apply these techniques to real-world engineering problems.
This volume presents a collection of papers presented at the 15th International Symposium of Robotic Research (ISRR). ISRR is the biennial meeting of the International Foundation of Robotic Research (IFRR) and its 15th edition took place in Flagstaff, Arizona on December 9 to December 12, 2011. As for the previous symposia, ISRR 2011 followed up on the successful concept of a mixture of invited contributions and open submissions. Therefore approximately half of the 37 contributions were invited contributions from outstanding researchers selected by the IFRR officers and the program committee, and the other half were chosen among the open submissions after peer review. This selection process resulted in a truly excellent technical program which featured some of the very best of robotic research. The program was organized around oral presentation in a single-track format and included for the first time a small number of interactive presentations. The symposium contributions contained in this volume report on a variety of new robotics research results covering a broad spectrum including perception, manipulation, grasping, vehicles and design, navigation, control and integration, estimation and SLAM.
Science used to be experiments and theory, now it is experiments, theory and computations. The computational approach to understanding nature and technology is currently flowering in many fields such as physics, geophysics, astrophysics, chemistry, biology, and most engineering disciplines. This book is a gentle introduction to such computational methods where the techniques are explained through examples. It is our goal to teach principles and ideas that carry over from field to field. You will learn basic methods and how to implement them. In order to gain the most from this text, you will need prior knowledge of calculus, basic linear algebra and elementary programming.
This book covers diverse aspects of advanced computer and communication engineering, focusing specifically on industrial and manufacturing theory and applications of electronics, communications, computing and information technology. Experts in research, industry, and academia present the latest developments in technology, describe applications involving cutting-edge communication and computer systems and explore likely future directions. In addition, access is offered to numerous new algorithms that assist in solving computer and communication engineering problems. The book is based on presentations delivered at ICOCOE 2014, the 1st International Conference on Communication and Computer Engineering. It will appeal to a wide range of professionals in the field, including telecommunication engineers, computer engineers and scientists, researchers, academics and students.
An autonomous sailboat robot is a boat that only uses the wind on its sail as the propelling force, without remote control or human assistance to achieve its mission. Robotic sailing offers the potential of long range and long term autonomous wind propelled, solar or wave-powered carbon neutral devices. Robotic sailing devices could contribute to monitoring of environmental, ecological, meteorological, hydrographic and oceanographic data. These devices can also be used in traffic monitoring, border surveillance, security, assistance and rescue. The dependency on changing winds and sea conditions presents a considerable challenge for short and long term route and stability planning, collision avoidance and boat control. Building a robust and seaworthy sailing robot presents a truly complex and multi-disciplinary challenge for boat designers, naval architects, systems/electrical engineers and computer scientists. Over the last decade, several events such as Sailbot, World Robotic Sailing Championship and the International Robotic Sailing Conference (WRSC/IRSC) and Microtransat have sparked an explosion in the number of groups working on autonomous sailing robots. Many of the challenges in building truly autonomous sailing robots still remain unsolved. These proceedings present the work of researchers on current and future challenges in autonomous sailboat development, presented at the WRSC/IRSC 2014 in Galway, Ireland, 8th - 12th September 2014. |
You may like...
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Hardcover
R2,576
Discovery Miles 25 760
Advanced Machine Learning Algorithms for…
Mohammad Irfan, Mohamed Elhoseny, …
Hardcover
R7,042
Discovery Miles 70 420
Advanced Introduction to Artificial…
Tom Davenport, John Glaser, …
Paperback
R573
Discovery Miles 5 730
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
Advanced Introduction to Law and…
Woodrow Barfield, Ugo Pagallo
Paperback
R639
Discovery Miles 6 390
|