Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Artificial intelligence > General
This book is a comprehensive collection of extended contributions from the Workshops on Computational Optimization 2019.Our everyday life is unthinkable without optimization. We try to minimize our effort and to maximize the achieved profit. Many real-world and industrial problems arising in engineering, economics, medicine and other domains can be formulated as optimization tasks. This book presents recent advances in computational optimization. The book includes important real problems like modeling of physical processes, wildfire and flood risk modeling, workforce planning, parameter settings for controlling different processes, optimal electrical vehicle modeling, bioreactor modeling and design of VLSI. It shows how to develop algorithms for them based on new intelligent methods like evolutionary computations, ant colony optimization, constrain programming and others. This research demonstrates how some real-world problems arising in engineering, economics and other domains can be formulated as optimization problems.
This book contains the proceedings of the 12th KES International Conference on Sustainability and Energy in Buildings 2020 (SEB20) held in Split, Croatia, during 24-26 June 2020 organized by KES International. SEB20 invited contributions on a range of topics related to sustainable buildings and explored innovative themes regarding sustainable energy systems. The aim of the conference is to bring together researchers, and government and industry professionals to discuss the future of energy in buildings, neighbourhoods and cities from a theoretical, practical, implementation and simulation perspective. The conference formed an exciting chance to present, interact and learn about the latest research and practical developments on the subject. The conference attracted submissions from around the world. Submissions for the Full-Paper Track were subjected to a blind peer-review process. Only the best of these were selected for presentation at the conference and publication in these proceedings. It is intended that this book provides a useful and informative snapshot of recent research developments in the important and vibrant area of sustainability in energy and buildings.
The recent rise of emerging networking technologies such as social networks, content centric networks, Internet of Things networks, etc, have attracted significant attention from academia as well as industry professionals looking to utilize these technologies for efficiency purposes. However, the allure of such networks and resultant storage of high volumes of data leads to increased security risks, including threats to information privacy. Artificial Intelligence and Security Challenges in Emerging Networks is an essential reference source that discusses applications of artificial intelligence, machine learning, and data mining, as well as other tools and strategies to protect networks against security threats and solve security and privacy problems. Featuring research on topics such as encryption, neural networks, and system verification, this book is ideally designed for ITC procurement managers, IT consultants, systems and network integrators, infrastructure service providers, computer and software engineers, startup companies, academicians, researchers, managers, and students.
This book offers in-depth insights into the rapidly growing topic of technologies and approaches to modeling fuzzy spatiotemporal data with XML. The topics covered include representation of fuzzy spatiotemporal XML data, topological relationship determination for fuzzy spatiotemporal XML data, mapping between the fuzzy spatiotemporal relational database model and fuzzy spatiotemporal XML data model, and consistencies in fuzzy spatiotemporal XML data updating. Offering a comprehensive guide to the latest research on fuzzy spatiotemporal XML data management, the book is intended to provide state-of-the-art information for researchers, practitioners, and graduate students of Web intelligence, as well as data and knowledge engineering professionals confronted with non-traditional applications that make the use of conventional approaches difficult or impossible.
This book gathers together novel essays on the state-of-the-art research into the logic and practice of abduction. In many ways, abduction has become established and essential to several fields, such as logic, cognitive science, artificial intelligence, philosophy of science, and methodology. In recent years this interest in abduction's many aspects and functions has accelerated. There are evidently several different interpretations and uses for abduction. Many fundamental questions on abduction remain open. How is abduction manifested in human cognition and intelligence? What kinds or types of abduction can be discerned? What is the role for abduction in inquiry and mathematical discovery? The chapters aim at providing answer to these and other current questions. Their contributors have been at the forefront of discussions on abduction, and offer here their updated approaches to the issues that they consider central to abduction's contemporary relevance. The book is an essential reading for any scholar or professional keeping up with disciplines impacted by the study of abductive reasoning, and its novel development and applications in various fields.
This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.
This book presents state-of-the-art research on artificial intelligence and blockchain for future cybersecurity applications. The accepted book chapters covered many themes, including artificial intelligence and blockchain challenges, models and applications, cyber threats and intrusions analysis and detection, and many other applications for smart cyber ecosystems. It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on artificial intelligence and blockchain for future cybersecurity applications.
This book constitutes the full research papers and short monographs developed on the base of the refereed proceedings of the International Conference: Information and Communication Technologies for Research and Industry (ICIT 2020). The book brings accepted research papers which present mathematical modelling, innovative approaches and methods of solving problems in the sphere of control engineering and decision making for the various fields of studies: industry and research, energy efficiency and sustainability, ontology-based data simulation, theory and use of digital signal processing, cognitive systems, robotics, cybernetics, automation control theory, image and sound processing, image recognition, technologies, and computer vision. The book contains also several analytical reviews on using smart city technologies in Russia. The central audience of the book are researchers, industrial practitioners and students from the following areas: Adaptive Systems, Human-Robot Interaction, Artificial Intelligence, Smart City and Internet of Things, Information Systems, Mathematical Modelling, and the Information Sciences.
We describe in this book, recent developments on fuzzy logic, neural networks and optimization algorithms, as well as their hybrid combinations, and their application in areas such as, intelligent control and robotics, pattern recognition, medical diagnosis, time series prediction and optimization of complex problems. The book contains a collection of papers focused on hybrid intelligent systems based on soft computing. There are some papers with the main theme of type-1 and type-2 fuzzy logic, which basically consists of papers that propose new concepts and algorithms based on type-1 and type-2 fuzzy logic and their applications. There also some papers that presents theory and practice of meta-heuristics in different areas of application. Another group of papers describe diverse applications of fuzzy logic, neural networks and hybrid intelligent systems in medical applications. There are also some papers that present theory and practice of neural networks in different areas of application. In addition, there are papers that present theory and practice of optimization and evolutionary algorithms in different areas of application. Finally, there are some papers describing applications of fuzzy logic, neural networks and meta-heuristics in pattern recognition problems.
An edge-of-your-seat psychological thriller from the acclaimed author of Every Line of You - A Good Girl's Guide to Murder meets virtual reality ... 'A pacy, intelligent novel that will have readers racing to get to the final page.' THE BOOKSELLER 'A pixelated whirlwind of a ride through the darkest secrets of the human mind, explored through the lens of virtual reality gaming!' LEE NEWBERY, AUTHOR OF THE LAST FIREFOX Lola's been selected to play a new virtual reality game - Better Than Life. In her game, she's loved. Is beautiful. Can do whatever she wants. But she quickly breaks the one rule: not to recreate people or places from real life. She recreates her house and a boy she fancies. Soon she's skipping school to play. But Lola has secrets - dark ones that begin to surface inside her game - and the more she tries to fix her problems, the more she overlooks a much bigger threat ... An original, high-concept psychological thriller - Holly Jackson meets VR horror Set in an exclusive boarding school, this rollercoaster ride of a story involves an unreliable narrator,immersive gaming, a dark secret and a huge twist Perfect for fans of Cynthia Murphy and Kathryn Foxfield PRAISE FOR EVERY LINE OF YOU: 'What a debut. So tense - and it didn't lead where I thought it was going.' SUE WALLMAN, author of YOUR TURN TO DIE 'Frankenstein meets Heathers. Bonnie and Clyde for the digital age, Every Line of You is a gripping thriller about the power of AI and a fresh twist on the intensity of first love.' AMY MCCAW, author of MINA AND THE UNDEAD
This book presents the theory and methods of flexible and generalized uncertainty optimization. Particularly, it describes the theory of generalized uncertainty in the context of optimization modeling. The book starts with an overview of flexible and generalized uncertainty optimization. It covers uncertainties that are both associated with lack of information and are more general than stochastic theory, where well-defined distributions are assumed. Starting from families of distributions that are enclosed by upper and lower functions, the book presents construction methods for obtaining flexible and generalized uncertainty input data that can be used in a flexible and generalized uncertainty optimization model. It then describes the development of the associated optimization model in detail. Written for graduate students and professionals in the broad field of optimization and operations research, this second edition has been revised and extended to include more worked examples and a section on interval multi-objective mini-max regret theory along with its solution method.
This book gathers selected papers presented at the International Conference on Innovations in Information and Communication Technologies (ICI2CT 2020), held at National University of Singapore, Singapore, during 18-19 December 2020. It presents the works on the intersection of the Computer Science and Communication Engineering. Topics covered in the book include communications engineering, Internet and web technology, computer and information science, artificial intelligence, data science and management, and ICT applications.
Affective Computing and Interaction: Psychological, Cognitive and Neuroscientific Perspectives examines the current state and the future prospects of affect in computing within the context of interactions. Uniting several aspects of affective interactions and topics in affective computing, this reference reviews basic foundations of emotions, furthers an understanding of the contribution of affect to our lives and concludes by revealing current trends and promising technologies for reducing the emotional gap between humans and machines, all within the context of interactions.
This book presents a wide and comprehensive range of issues and problems in various fields of science and engineering, from both theoretical and applied perspectives. The desire to develop more effective and efficient tools and techniques for dealing with complex processes and systems has been a natural inspiration for the emergence of numerous fields of science and technology, in particular control and automation and, more recently, robotics. The contributions gathered here concern the development of methods and algorithms to determine best practices regarding broadly perceived decisions or controls. From an engineering standpoint, many of them focus on how to automate a specific process or complex system. From a tools-based perspective, several contributions address the development of analytic and algorithmic methods and techniques, devices and systems that make it possible to develop and subsequently implement the automation and robotization of crucial areas of human activity. All topics discussed are illustrated with sample applications.
This book is a collection of papers presented at the International Workshop on New Approaches for Multidimensional Signal Processing (NAMSP 2020), held at Technical University of Sofia, Sofia, Bulgaria, during 09-11 July 2020. The book covers research papers in the field of N-dimensional multicomponent image processing, multidimensional image representation and super-resolution, 3D image processing and reconstruction, MD computer vision systems, multidimensional multimedia systems, neural networks for MD image processing, data-based MD image retrieval and knowledge data mining, watermarking, hiding and encryption of MD images, MD image processing in robot systems, tensor-based data processing, 3D and multi-view visualization, forensic analysis systems for MD images and many more.
From theory to application, this book presents research on biologically and brain-inspired networking and machine learning based on Yuragi, which is the Japanese term describing the noise or fluctuations that are inherently used to control the dynamics of a system. The Yuragi mechanism can be found in various biological contexts, such as in gene expression dynamics, molecular motors in muscles, or the visual recognition process in the brain. Unlike conventional network protocols that are usually designed to operate under controlled conditions with a predefined set of rules, the probabilistic behavior of Yuragi-based control permits the system to adapt to unknown situations in a distributed and self-organized manner leading to a higher scalability and robustness.The book consists of two parts. Part 1 provides in four chapters an introduction to the biological background of the Yuragi concept as well as how these are applied to networking problems. Part 2 provides additional contributions that extend the original Yuragi concept to a Bayesian attractor model from human perceptual decision making. In the six chapters of the second part, applications to various fields in information network control and artificial intelligence are presented, ranging from virtual network reconfigurations, a software-defined Internet of Things, and low-power wide-area networks. This book will benefit those working in the fields of information networks, distributed systems, and machine learning who seek new design mechanisms for controlling large-scale dynamically changing systems.
Nature provides inspiration and guidance in the creation of techniques, applications and new technologies in the fields of Artificial Intelligence and Soft Computing. Soft Computing Methods for Practical Environment Solutions: Techniques and Studies presents various practical applications of Soft Computing techniques in real-world situations and problems, aiming to show the enormous potential of such techniques in solving all kinds of problems, and thus, providing the latest advances in these techniques in an extensive state-of-the-art and a vast theoretical study. Ideal for students studying AI and researchers familiarizing themselves with such techniques, so to offer recent and novel applications, helping expand and explore new areas of research.
In this era of healthcare applications predominantly occupy both individuals as well as the healthcare industries, so the need for analytical reports becomes an essential component for success. Especially, the IoT applications employed for healthcare which generate a huge amount of data that needs to be analyzed to produce the expected reports. To accomplish this task, a cloud-based analytical solution will be the right choice by which the reports can be generated faster compared to the traditional ways. In this book, the different analytical methods coupled with AI to analyze the IoT data on the cloud are discussed. This book applies AI in edge analytics for healthcare applications, analyzes the impact of tools and techniques in edge analytics for healthcare, and provides security solutions for edge analytics in healthcare IoT. Each chapter provides in-depth details on how to apply different analytical methods and tools for analytics of healthcare applications devised using IoT. As the IoT devices are generating huge amounts of data, it is highly essential to do the analytics on the cloud and this book showcases the mechanisms that are going to be applied for it. Hence, this book provides a holistic idea on how to do edge analytics for healthcare IoT using AI.
This book describes the networks, applications, services of 2030 and beyond, their management. Novel end-to-end network and services architectures using cloud, wired, wireless, and space technologies to support future applications and services are presented. The book ties key concepts together such as cloud, space networking, network slicing, AI/ML, edge computing, burst switching, and optical computing in achieving end-to-end automated future services. Expected future applications, services, and network and data center architectures to support these applications and services in the year 2030 and beyond, along with security, routing, QoS, and management architecture and capabilities are described. The book is written by recognized global experts in the field from both industry and academia.
This proceedings book presents state-of-the-art developments in theory, methodology, and applications of network analysis across sociology, computational science, education research, literature studies, political science, international relations, social media research, and urban studies. The papers comprising this collection were presented at the Fifth 'Networks in the Global World' conference organized by the Centre for German and European Studies of St. Petersburg University and Bielefeld University and held on July 7-9, 2020. This biannual conference series revolves around key interdisciplinary issues in the focus of network analysts, such as the multidimensional approach to social reality, translation of theories and methods across disciplines, and mixing of data and methods. The distinctive features of this book are the emphasis on in-depth linkages between theory, method, and applications, the blend of qualitative and quantitative methods, and the joint consideration of different network levels, types, and contexts. The topics covered by the papers include interrelation of social and cultural structures, constellations of power, and patterns of interaction in areas ranging from various types of communities (local, international, educational, political, and so on) to social media and literature. The book is useful for practicing researchers, graduate and postgraduate students, and educators interested in network analysis of social relations, politics, economy, and culture. Features that set the book apart from others in the field: * The book offers a unique cross-disciplinary blend of computational and ethnographic network analyses applied to a diverse spectrum of spheres, from literature and education to urban planning and policymaking. * Embracing conceptual, methodological, and empirical works, the book is among the few in network analysis to emphasize connections between theory, method, and applications. * The book brings together authors and empirical contexts from all over the globe, with a particular emphasis on European societies.
This book presents a theoretical critical appraisal of the Mechanistic Theory of Human Cognition (MTHC), which is one of the most popular major theories in the contemporary field of cognitive science. It analyses and evaluates whether MTHC provides a unifying account of human cognition and its explanation. The book presents a systematic investigation of the internal and external consistency of the theory, as well as a systematic comparison with other contemporary major theories in the field. In this sense, it provides a fresh look at more recent major theoretical debates in this area of scientific research and a rigorous analysis of one of its most central major theories. Rigorous theoretical work is integrated with objective consideration of relevant empirical evidence, making the discussions robust and clear. As a result, the book shows that MTHC provides a significant theoretical contribution for the field of cognitive science. The content is useful for those interested in theoretical and empirical issues concerning major theories in the contemporary field of cognitive science.
This book presents a new structural approach to the psychology of the person, inspired by Kenneth Colby's computer-generated simulation, PARRY. The simulation was of a paranoid psychological state, represented in forms of the person's logic and syntax, as these would be evidenced in personal communication. Harwood Fisher uses a Structural View to highlight similarities in the logical form of the linguistic representations of Donald Trump, his avid followers ("Trumpers"), and the paranoid-referred to as "The Trio." He demonstrates how the Structural View forms a series of logical and schematic patterns, similar to the way that content analysis can bring forth associations meanings, and concepts held in the text. Such comparisons, Fisher argues, can be used to shed light on contingencies for presenting, representing, and judging truth. Specifically, Fisher posits that the major syntactic and logical patterns that were used to produce the computer-generated "paranoid" responses in Colby's project can be used to analyze Donald Trump's rhetoric and his followers' reactions to it. Ultimately, Fisher offers a new kind of structural approach for the philosophy of psychology. This novel work will appeal to students and scholars of social and cognitive psychology, psychology of personality, psychiatric classification, psycholinguistics, rhetoric, and computer science. |
You may like...
Research Handbook on the Law of…
Woodrow Barfield, Ugo Pagallo
Paperback
R1,471
Discovery Miles 14 710
Advanced Introduction to Artificial…
Tom Davenport, John Glaser, …
Paperback
R573
Discovery Miles 5 730
Technology, Users and Uses - Ethics and…
Joan Casas-Roma
Hardcover
Managing AI Wisely - From Development to…
Lauren Waardenburg, Marleen Huysman, …
Hardcover
R2,267
Discovery Miles 22 670
Advanced Machine Learning Algorithms for…
Mohammad Irfan, Mohamed Elhoseny, …
Hardcover
R7,042
Discovery Miles 70 420
|