![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > General
The field of Soft Computing in Humanities and Social Sciences is at a turning point. The strong distinction between "science" and "humanities" has been criticized from many fronts and, at the same time, an increasing cooperation between the so-called "hard sciences" and "soft sciences" is taking place in a wide range of scientific projects dealing with very complex and interdisciplinary topics. In the last fifteen years the area of Soft Computing has also experienced a gradual rapprochement to disciplines in the Humanities and Social Sciences, and also in the field of Medicine, Biology and even the Arts, a phenomenon that did not occur much in the previous years. The collection of this book presents a generous sampling of the new and burgeoning field of Soft Computing in Humanities and Social Sciences, bringing together a wide array of authors and subject matters from different disciplines. Some of the contributors of the book belong to the scientific and technical areas of Soft Computing while others come from various fields in the humanities and social sciences such as Philosophy, History, Sociology or Economics. Rudolf Seising received a Ph.D. degree in philosophy of science and a postdoctoral lecture qualification (PD) in history of science from the Ludwig Maximilians University of Munich. He is an Adjoint Researcher at the European Centre for Soft Computing in Mieres (Asturias), Spain. Veronica Sanz earned a Ph.D. in Philosophy at the University Complutense of Madrid (Spain). At the moment she is a Postdoctoral Researcher at the Science, Technology and Society Center in the University of California at Berkeley. Veronica Sanz earned a Ph.D. in Philosophy at the University Complutense of Madrid (Spain). At the moment she is a Postdoctoral Researcher at the Science, Technology and Society Center in the University of California at Berkeley.
This volume draws mostly on papers presented at the TRENTO 2009 international workshop on Preferences and Decisions, jointly organized by the University of Trento and the University of Sannio at Benevento (Italy). Since its first edition in 1997, the renowned international workshop series TRENTO aims at providing an informal but effective opportunity for sharing and discussing the recent research developments in the field of preference modeling and decision theory, bringing together some of the world's leading experts in this active interdisciplinary area of research. In particular, the scope of the international workshop TRENTO 2009 covered a wide range of topics, such as preference representation and rationality, machine intelligence and automation in decision making, uncertainty modeling, probabilistic and possibilistic decision models, cooperative game theory and coalition formation, aggregation functions and multicriteria decision making, fuzzy set theory and fuzzy logic for decision making, algebraic structures, quantum dynamics, complex network models and negotiation, interactive dynamics and consensus reaching in multiagent decisions, optimization and operational research for decision making. The contributes have been proposed by authors that are among the most recognized scientists in the respective research domains. This volume also provides an opportunity, to colleagues and friends of Mario Fedrizzi, Benedetto Matarazzo, and Aldo Ventre, for celebrating and thanking them for their continuing and stimulating scientific work.
This book presents a study of the use of optimization algorithms in complex image processing problems. The problems selected explore areas ranging from the theory of image segmentation to the detection of complex objects in medical images. Furthermore, the concepts of machine learning and optimization are analyzed to provide an overview of the application of these tools in image processing. The material has been compiled from a teaching perspective. Accordingly, the book is primarily intended for undergraduate and postgraduate students of Science, Engineering, and Computational Mathematics, and can be used for courses on Artificial Intelligence, Advanced Image Processing, Computational Intelligence, etc. Likewise, the material can be useful for research from the evolutionary computation, artificial intelligence and image processing communities.
Biological and natural processes have been a continuous source of inspiration for the sciences and engineering. For instance, the work of Wiener in cybernetics was influenced by feedback control processes observable in biological systems; McCulloch and Pitts description of the artificial neuron was instigated by biological observations of neural mechanisms; the idea of survival of the fittest inspired the field of evolutionary algorithms and similarly, artificial immune systems, ant colony optimisation, automated self-assembling programming, membrane computing, etc. also have their roots in natural phenomena. The second International Workshop on Nature Inspired Cooperative Strategies for Optimization (NICSO), was held in Acireale, Italy, during November 8-10, 2007. The aim for NICSO 2007 was to provide a forum were the latest ideas and state of the art research related to cooperative strategies for problem solving arising from Nature could be discussed. The contributions collected in this book were strictly peer reviewed by at least three members of the international programme committee, to whom we are indebted for their support and assistance. The topics covered by the contributions include several well established nature inspired techniques like Genetic Algorithms, Ant Colonies, Artificial Immune Systems, Evolutionary Robotics, Evolvable Systems, Membrane Computing, Quantum Computing, Software Self Assembly, Swarm Intelligence, etc.
In this book, a generic model in as far as possible mathematical closed-formis developed that predicts the behavior of large self-organizing robot groups (robot swarms) based on their control algorithm. In addition, an extensive subsumption of the relatively young and distinctive interdisciplinary research field of swarm robotics is emphasized. The connection to many related fields is highlighted and the concepts and methods borrowed from these fields are described shortly.
Evolutionary Computation (EC) includes a number of techniques such as Genetic Algorithms which have been used in a diverse range of highly successful applications. This book brings together some of these EC applications in fields including electronics, telecommunications, health, bioinformatics, supply chain and other engineering domains, to give the audience, including both EC researchers and practitioners, a glimpse of this exciting and rapidly-evolving field.
This book presents different methods for analyzing the body language (movement, position, use of personal space, silences, pauses and tone, the eyes, pupil dilation or constriction, smiles, body temperature and the like) for better understanding people's needs and actions, including biometric data gathering and reading. Different studies described in this book indicate that sufficiently much data, information and knowledge can be gained by utilizing biometric technologies. This is the first, wide-ranging book that is devoted completely to the area of intelligent decision support systems, biometrics technologies and their integrations. This book is designated for scholars, practitioners and doctoral and master's degree students in various areas and those who are interested in the latest biometric and intelligent decision making support problems and means for their resolutions, biometric and intelligent decision making support systems and the theory and practice of their integration and the opportunities for the practical use of biometric and intelligent decision making support.
This book is about the formulations, theoretical investigations, and practical applications of new stochastic models for fundamental concepts and operations of the discipline of risk management. It also examines how these models can be useful in the descriptions, measurements, evaluations, and treatments of risks threatening various modern organizations. Moreover, the book makes clear that such stochastic models constitute very strong analytical tools which substantially facilitate strategic thinking and strategic decision making in many significant areas of risk management. In particular the incorporation of fundamental probabilistic concepts such as the sum, minimum, and maximum of a random number of continuous, positive, independent, and identically distributed random variables in the mathematical structure of stochastic models significantly supports the suitability of these models in the developments, investigations, selections, and implementations of proactive and reactive risk management operations. The book makes extensive use of integral and differential equations of characteristic functions, mainly corresponding to important classes of mixtures of probability distributions, as powerful analytical tools for investigating the behavior of new stochastic models suitable for the descriptions and implementations of fundamental risk control and risk financing operations. These risk treatment operations very often arise in a wide variety of scientific disciplines of extreme practical importance.
In this book, the following three approaches to data analysis are presented: - Test Theory, founded by Sergei V. Yablonskii (1924-1998); the first publications appeared in 1955 and 1958, - Rough Sets, founded by Zdzis aw I. Pawlak (1926-2006); the first publications appeared in 1981 and 1982, - Logical Analysis of Data, founded by Peter L. Hammer (1936-2006); the first publications appeared in 1986 and 1988. These three approaches have much in common, but researchers active in one of these areas often have a limited knowledge about the results and methods developed in the other two. On the other hand, each of the approaches shows some originality and we believe that the exchange of knowledge can stimulate further development of each of them. This can lead to new theoretical results and real-life applications and, in particular, new results based on combination of these three data analysis approaches can be expected. - Logical Analysis of Data, founded by Peter L. Hammer (1936-2006); the first publications appeared in 1986 and 1988. These three approaches have much in common, but researchers active in one of these areas often have a limited knowledge about the results and methods developed in the other two. On the other hand, each of the approaches shows some originality and we believe that the exchange of knowledge can stimulate further development of each of them. This can lead to new theoretical results and real-life applications and, in particular, new results based on combination of these three data analysis approaches can be expected. These three approaches have much in common, but researchers active in one of these areas often have a limited knowledge about the results and methods developed in the other two. On the other hand, each of the approaches shows some originality and we believe that the exchange of knowledge can stimulate further development of each of them. This can lead to new theoretical results and real-life applications and, in particular, new results based on combination of these three data analysis approaches can be expected."
This book is devoted to the state-of-the-art in all aspects of fireworks algorithm (FWA), with particular emphasis on the efficient improved versions of FWA. It describes the most substantial theoretical analysis including basic principle and implementation of FWA and modeling and theoretical analysis of FWA. It covers exhaustively the key recent significant research into the improvements of FWA so far. In addition, the book describes a few advanced topics in the research of FWA, including multi-objective optimization (MOO), discrete FWA (DFWA) for combinatorial optimization, and GPU-based FWA for parallel implementation. In sequels, several successful applications of FWA on non-negative matrix factorization (NMF), text clustering, pattern recognition, and seismic inversion problem, and swarm robotics, are illustrated in details, which might shed new light on more real-world applications in future. Addressing a multidisciplinary topic, it will appeal to researchers and professionals in the areas of metahuristics, swarm intelligence, evolutionary computation, complex optimization solving, etc.
Knowledge existing in modern information systems usually comes from many sources and is mapped in many ways. There is a real need for representing "knowledge pieces" as rather universal objects that should fit to multi-purpose a- ing systems. According to great number of information system's tasks, knowledge representation is more or less detailed (e.g. some level of its granularity is - sumed). The main goal of this paper is to present chosen aspects of expressing granularity of knowledge implemented in intelligent systems. One of the main r- sons of granularity phenomena is diversification of knowledge sources, therefore the next section is devoted to this issue. 2. Heterogeneous Knowledge as a Source for Intelligent Systems Knowledge, the main element of so-called intelligent applications and systems, is very often heterogeneous. This heterogeneity concerns the origin of knowledge, its sources as well as its final forms of presentation. In this section the selected c- teria of knowledge differentiation will be presented, in the context of potential sources of knowledge acquisition. In Fig. 1 an environment of intelligent systems is shown, divided into different knowledge sources for the system. Fig. 1. Potential knowledge sources for intelligent information/reasoning system. Source: own elaboration based on (Mach, 2007) p. 24.
Many problems in decision making, monitoring, fault detection, and control require the knowledge of state variables and time-varying parameters that are not directly measured by sensors. In such situations, observers, or estimators, can be employed that use the measured input and output signals along with a dynamic model of the system in order to estimate the unknown states or parameters. An essential requirement in designing an observer is to guarantee the convergence of the estimates to the true values or at least to a small neighborhood around the true values. However, for nonlinear, large-scale, or time-varying systems, the design and tuning of an observer is generally complicated and involves large computational costs. This book provides a range of methods and tools to design observers for nonlinear systems represented by a special type of a dynamic nonlinear model -- the Takagi--Sugeno (TS) fuzzy model. The TS model is a convex combination of affine linear models, which facilitates its stability analysis and observer design by using effective algorithms based on Lyapunov functions and linear matrix inequalities. Takagi--Sugeno models are known to be universal approximators and, in addition, a broad class of nonlinear systems can be exactly represented as a TS system. Three particular structures of large-scale TS models are considered: cascaded systems, distributed systems, and systems affected by unknown disturbances. The reader will find in-depth theoretic analysis accompanied by illustrative examples and simulations of real-world systems. Stability analysis of TS fuzzy systems is addressed in detail. The intended audience are graduate students and researchers both from academia and industry. For newcomers to the field, the book provides a concise introduction dynamic TS fuzzy models along with two methods to construct TS models for a given nonlinear system
Psychophysics and Experimental Phenomenology of Pattern Cognition examines the cognitive transformations that underly this cognitive system and the specialized subsystems for processing these transformations. Sections cover symmetry cognition, contour perception and geometric illusion. Weight sensation is also discussed, as are repetitive and dot patterns. By incorporating elements of both psychophysics and experimental phenomenology, pattern cognition is examined from both the physical and mental sensory perspective, thus providing a comprehensive view of this cognitive system.
During the past decades scheduling has been among the most studied op- mization problemsanditisstillanactiveareaofresearch!Schedulingappears in many areas of science, engineering and industry and takes di?erent forms depending on the restrictions and optimization criteria of the operating en- ronments [8]. For instance, in optimization and computer science, scheduling has been de?ned as "the allocation of tasks to resources over time in order to achieve optimality in one or more objective criteria in an e?cient way" and in production as "production schedule, i. e. , the planning of the production or the sequence of operations according to which jobs pass through machines and is optimal with respect to certain optimization criteria. " Although there is a standardized form of stating any scheduling problem, namely "e?cient allocation ofn jobs onm machines -which can process no more than one activity at a time- with the objective to optimize some - jective function of the job completion times", scheduling is in fact a family of problems. Indeed, several parameters intervene in the problem de?nition: (a) job characteristics (preemptive or not, precedence constraints, release dates, etc. ); (b) resource environment (single vs. parallel machines, un- lated machines, identical or uniform machines, etc. ); (c) optimization criteria (minimize total tardiness, the number of late jobs, makespan, ?owtime, etc. ; maximize resource utilization, etc. ); and, (d) scheduling environment (static vs. dynamic,intheformerthenumberofjobstobeconsideredandtheirready times are available while in the later the number of jobs and their charact- istics change over time).
Humans and machines are very di?erent in their approaches to game pl- ing. Humans use intuition, perception mechanisms, selective search, creat- ity, abstraction, heuristic abilities and other cognitive skills to compensate their (comparably) slow information processing speed, relatively low m- ory capacity, and limited search abilities. Machines, on the other hand, are extremely fast and infallible in calculations, capable of e?ective brute-for- type search, use "unlimited" memory resources, but at the same time are poor at using reasoning-based approaches and abstraction-based methods. The above major discrepancies in the human and machine problem solving methods underlined the development of traditional machine game playing as being focused mainly on engineering advances rather than cognitive or psychological developments. In other words, as described by Winkler and F] urnkranz 347, 348] with respect to chess, human and machine axes of game playing development are perpendicular, but the most interesting, most promising, and probably also most di?cult research area lies on the junction between human-compatible knowledge and machine compatible processing.I undoubtedly share this point of view and strongly believe that the future of machine game playing lies in implementation of human-type abilities (- straction, intuition, creativity, selectiveattention, andother)whilestilltaking advantage of intrinsic machine skills. Thebookisfocusedonthedevelopmentsandprospectivechallengingpr- lems in the area of mind gameplaying (i.e. playinggames that require mental skills) using Computational Intelligence (CI) methods, mainly neural n- works, genetic/evolutionary programming and reinforcement learning."
"This book presents the result of a joint effort from different
European Institutions within the framework of the EU funded project
called SPARK II, devoted to device an insect brain computational
model, useful to be embedded into autonomous robotic agents.
"Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates.After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda. "Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is the first book that demonstrates how to use modern computational analysis techniques including methods for "big data" analysis. This book presents how to quantify both the environment in which LeT operate, and the actions it took over a 20-year period, and represent it as a relational database table. This table is then mined using sophisticated data mining algorithms in order to gain detailed, mathematical, computational and statistical insights into LeT and its operations.This book also provides a detailed history of Lashkar-e-Taiba based on extensive analysis conducted by using open source information and public statements. Each chapter includes a case study, as well as a slide describing the key results which are available on the authors' web sites. "Computational Analysis of Terrorist Groups: Lashkar-e-Taiba "is designed for a professional market composed of government or military workers, researchers and computer scientists working in the web intelligence field. Advanced-level students in computer science will also find this valuable as a reference book."
Intelligent systems are required to facilitate the use of information provided by the internet and other computer based technologies. This book describes the state-of-the-art in Intelligent Automation and Systems Engineering. Topics covered include Intelligent decision making, Automation, Robotics, Expert systems, Fuzzy systems, Knowledge-based systems, Knowledge extraction, Large database management, Data analysis tools, Computational biology, Optimization algorithms, Experimental designs, Complex system identification, Computational modeling, Systems simulation, Decision modeling, and industrial applications.
Computational intelligence techniques are becoming more and more important for automated problem solving nowadays. Due to the growing complexity of industrial applications and the increasingly tight time-to-market requirements, the time available for thorough problem analysis and development of tailored solution methods is decreasing. There is no doubt that this trend will continue in the foreseeable future. Hence, it is not surprising that robust and general automated problem solving methods with satisfactory performance are needed.
Incorporating intelligence in industrial systems can help to increase productivity, cut-off production costs, and to improve working conditions and safety in industrial environments. This need has resulted in the rapid development of modeling and control methods for industrial systems and robots, of fault detection and isolation methods for the prevention of critical situations in industrial work-cells and production plants, of optimization methods aiming at a more profitable functioning of industrial installations and robotic devices and of machine intelligence methods aiming at reducing human intervention in industrial systems operation. To this end, the book analyzes and extends some main directions of research in modeling and control for industrial systems. These are: (i) industrial robots, (ii) mobile robots and autonomous vehicles, (iii) adaptive and robust control of electromechanical systems, (iv) filtering and stochastic estimation for multisensor fusion and sensorless control of industrial systems (iv) fault detection and isolation in robotic and industrial systems, (v) optimization in industrial automation and robotic systems design, and (vi) machine intelligence for robots autonomy. The book will be a useful companion to engineers and researchers since it covers a wide spectrum of problems in the area of industrial systems. Moreover, the book is addressed to undergraduate and post-graduate students, as an upper-level course supplement of automatic control and robotics courses.
This book provides a thorough treatment of privacy and security issues for researchers in the fields of smart grids, engineering, and computer science. It presents comprehensive insight to understanding the big picture of privacy and security challenges in both physical and information aspects of smart grids. The authors utilize an advanced interdisciplinary approach to address the existing security and privacy issues and propose legitimate countermeasures for each of them in the standpoint of both computing and electrical engineering. The proposed methods are theoretically proofed by mathematical tools and illustrated by real-world examples.
This eighteen-chapter book presents the latest applications of lattice theory in Computational Intelligence (CI). The book focuses on neural computation, mathematical morphology, machine learning, and (fuzzy) inference/logic. The book comes out of a special session held during the World Council for Curriculum and Instruction World Conference (WCCI 2006). The articles presented here demonstrate how lattice theory may suggest viable alternatives in practical clustering, classification, pattern analysis, and regression applications. |
You may like...
Revolutionizing Business Practices…
Manisha Gupta, Deergha Sharma, …
Hardcover
R6,199
Discovery Miles 61 990
Creativity in Computing and DataFlow…
Suyel Namasudra, Veljko Milutinovic
Hardcover
R4,204
Discovery Miles 42 040
Role of 6g Wireless Networks in AI and…
Malaya Dutta Borah, Steven A. Wright, …
Hardcover
R6,206
Discovery Miles 62 060
Diagnostic Biomedical Signal and Image…
Kemal Polat, Saban Ozturk
Paperback
R2,952
Discovery Miles 29 520
Artificial Intelligence and Machine…
Vedik Basetti, Chandan Kumar Shiva, …
Paperback
R2,479
Discovery Miles 24 790
Technology, Users and Uses - Ethics and…
Joan Casas-Roma
Hardcover
|