![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
This book constitutes the refereed proceedings of the 10th International Conference on Communication Systems and Networks, COMSNETS 2018, held in Banaglore, India, in January 2018.The 12 revised full papers presented in this book were carefully reviewed and selected from 134 submissions. They cover various topics in networking and communications systems.
This book provides an overview of crowdsourced data management. Covering all aspects including the workflow, algorithms and research potential, it particularly focuses on the latest techniques and recent advances. The authors identify three key aspects in determining the performance of crowdsourced data management: quality control, cost control and latency control. By surveying and synthesizing a wide spectrum of studies on crowdsourced data management, the book outlines important factors that need to be considered to improve crowdsourced data management. It also introduces a practical crowdsourced-database-system design and presents a number of crowdsourced operators. Self-contained and covering theory, algorithms, techniques and applications, it is a valuable reference resource for researchers and students new to crowdsourced data management with a basic knowledge of data structures and databases.
This unique book succinctly summarizes the need to measure how ontologies (one of the building blocks of the Semantic Web) are currently being utilized, providing insights for various stakeholders. Where possible it improves and reuses terms in existing vocabularies/ontologies, as recommended by the Linked Data community. Recent advances in the Semantic Web have led to a proliferation of Resource Description Framework (RDF) data, which employ ontologies to semantically describe the information on the Web making it equally understandable for both humans and machines. However, to create a network effect, it is important that selective ontologies are used by more data publishers to improve the value of that ontology. For this to happen, it is vital to discover what is being used from an ontology to semantically annotate the information on the Web specific to a given domain. Answers to such basic but crucial questions can only be achieved by ascertaining how ontologies in the current semantic web are being utilized and adopted. The proposed frameworks to obtain such insights are explained with real-world examples to provide a clear and detailed description of ontology usage analysis. Both theoretical and practical, the book is of value to academics and professionals working in industry. Specifically, it is of primary interest to researchers, graduate students and practitioners in the area of the Semantic Web and its various real-world applications.
This book constitutes extended selected papers from the 16th Conference on Advanced Information Technologies for Management, AITM 2018, and the 13th Conference on Information Systems Management, ISM 2018, held as part of the Federated Conference on Computer Science and Information Systems, FedCSIS, which took place in Poznan, Poland, in September 2018. The total of 9 full and 3 short papers presented in this volume were carefully reviewed and selected from a total of 43 submissions. The papers selected to be included in this book contribute to the understanding of relevant trends of current research on information technology for management in business and public organizations. They were organized in topical sections named: information technology and systems for knowledge management, and information technology and systems for business transformation.
This book constitutes the refereed proceedings of the 30th Australasian Database Conference, ADC 2019, held in Sydney, NSW, Australia, in January/February 2019. The 9 full papers presented together with one demo paper were carefully reviewed and selected from 19 submissions. The Australasian Database Conference is an annual international forum for sharing the latest research progresses and novel applications of database systems, data management, data mining and data analytics for researchers and practitioners in these areas from Australia, New Zealand and in the world
The three volume proceedings LNAI 11051 - 11053 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, held in Dublin, Ireland, in September 2018. The total of 131 regular papers presented in part I and part II was carefully reviewed and selected from 535 submissions; there are 52 papers in the applied data science, nectar and demo track. The contributions were organized in topical sections named as follows: Part I: adversarial learning; anomaly and outlier detection; applications; classification; clustering and unsupervised learning; deep learningensemble methods; and evaluation. Part II: graphs; kernel methods; learning paradigms; matrix and tensor analysis; online and active learning; pattern and sequence mining; probabilistic models and statistical methods; recommender systems; and transfer learning. Part III: ADS data science applications; ADS e-commerce; ADS engineering and design; ADS financial and security; ADS health; ADS sensing and positioning; nectar track; and demo track.
At the centre of the methodology used in this book is STEM learning variability space that includes STEM pedagogical variability, learners' social variability, technological variability, CS content variability and interaction variability. To design smart components, firstly, the STEM learning variability space is defined for each component separately, and then model-driven approaches are applied. The theoretical basis includes feature-based modelling and model transformations at the top specification level and heterogeneous meta-programming techniques at the implementation level. Practice includes multiple case studies oriented for solving the task prototypes, taken from the real world, by educational robots. These case studies illustrate the process of gaining interdisciplinary knowledge pieces identified as S-knowledge, T-knowledge, E-knowledge, M-knowledge or integrated STEM knowledge and evaluate smart components from the pedagogical and technological perspectives based on data gathered from one real teaching setting. Smart STEM-Driven Computer Science Education: Theory, Methodology and Robot-based Practices outlines the overall capabilities of the proposed approach and also points out the drawbacks from the viewpoint of different actors, i.e. researchers, designers, teachers and learners.
The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users' information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients' medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts' panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.
The three volume proceedings LNAI 11051 - 11053 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2018, held in Dublin, Ireland, in September 2018. The total of 131 regular papers presented in part I and part II was carefully reviewed and selected from 535 submissions; there are 52 papers in the applied data science, nectar and demo track. The contributions were organized in topical sections named as follows: Part I: adversarial learning; anomaly and outlier detection; applications; classification; clustering and unsupervised learning; deep learning; ensemble methods; and evaluation. Part II: graphs; kernel methods; learning paradigms; matrix and tensor analysis; online and active learning; pattern and sequence mining; probabilistic models and statistical methods; recommender systems; and transfer learning. Part III: ADS data science applications; ADS e-commerce; ADS engineering and design; ADS financial and security; ADS health; ADS sensing and positioning; nectar track; and demo track.
With this book, Christopher Kormanyos delivers a highly practical guide to programming real-time embedded microcontroller systems in C++. It is divided into three parts plus several appendices. Part I provides a foundation for real-time C++ by covering language technologies, including object-oriented methods, template programming and optimization. Next, part II presents detailed descriptions of a variety of C++ components that are widely used in microcontroller programming. It details some of C++'s most powerful language elements, such as class types, templates and the STL, to develop components for microcontroller register access, low-level drivers, custom memory management, embedded containers, multitasking, etc. Finally, part III describes mathematical methods and generic utilities that can be employed to solve recurring problems in real-time C++. The appendices include a brief C++ language tutorial, information on the real-time C++ development environment and instructions for building GNU GCC cross-compilers and a microcontroller circuit. For this third edition, the most recent specification of C++17 in ISO/IEC 14882:2017 is used throughout the text. Several sections on new C++17 functionality have been added, and various others reworked to reflect changes in the standard. Also several new sample projects are introduced and existing ones extended, and various user suggestions have been incorporated. To facilitate portability, no libraries other than those specified in the language standard itself are used. Efficiency is always in focus and numerous examples are backed up with real-time performance measurements and size analyses that quantify the true costs of the code down to the very last byte and microsecond. The target audience of this book mainly consists of students and professionals interested in real-time C++. Readers should be familiar with C or another programming language and will benefit most if they have had some previous experience with microcontroller electronics and the performance and size issues prevalent in embedded systems programming.
This book proposes a general methodology to introduce Global Navigation Satellite System (GNSS) integrity, starting from a rigorous mathematical description of the problem. It highlights the major issues that designers need to resolve during the development of GNSS-based systems requiring a certain level of confidence on the position estimates. Although it follows a general approach, the final chapters focus on the application of GNSS integrity to rail transportation, as an example. By describing the main requirements in the context of train position function, one of which is the safe function of any train control system, it shows the critical issues associated with the concept of safe position integrity. In particular, one case study clarifies the key differences between the avionic domain and the railway domain related to the application of GNSS technologies, and identifies a number of railway-signaling hazards linked with the use of such technology. Furthermore, it describes various railway-signaling techniques to mitigate such hazards to prepare readers for the future evolution of train control systems, also based on the GNSS technology. This unique book offers a valuable reference guide for engineers and researchers in the fields of satellite navigation and rail transportation.
Building Information Modeling (BIM) refers to the consistent and continuous use of digital information throughout the entire lifecycle of a built facility, including its design, construction and operation. In order to exploit BIM methods to their full potential, a fundamental grasp of their key principles and applications is essential. Accordingly, this book combines discussions of theoretical foundations with reports from the industry on currently applied best practices. The book's content is divided into six parts: Part I discusses the technological basics of BIM and addresses computational methods for the geometric and semantic modeling of buildings, as well as methods for process modeling. Next, Part II covers the important aspect of the interoperability of BIM software products and describes in detail the standardized data format Industry Foundation Classes. It presents the different classification systems, discusses the data format CityGML for describing 3D city models and COBie for handing over data to clients, and also provides an overview of BIM programming tools and interfaces. Part III is dedicated to the philosophy, organization and technical implementation of BIM-based collaboration, and discusses the impact on legal issues including construction contracts. In turn, Part IV covers a wide range of BIM use cases in the different lifecycle phases of a built facility, including the use of BIM for design coordination, structural analysis, energy analysis, code compliance checking, quantity take-off, prefabrication, progress monitoring and operation. In Part V, a number of design and construction companies report on the current state of BIM adoption in connection with actual BIM projects, and discuss the approach pursued for the shift toward BIM, including the hurdles taken. Lastly, Part VI summarizes the book's content and provides an outlook on future developments. The book was written both for professionals using or programming such tools, and for students in Architecture and Construction Engineering programs.
This volume constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Verified Software: Theories, Tools, and Experiments, VSTTE 2018, held in Oxford, UK, in July 2018. The 19 full papers presented were carefully revised and selected from 24 submissions. The papers describe large-scale verification efforts that involve collaboration, theory unification, tool integration, and formalized domain knowledge as well as novel experiments and case studies evaluating verification techniques and technologies.
The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018.The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: clean energy; electric vehicles; energy saving; energy storages; power system analysis.
This book constitutes the refereed conference proceedings of the First International Conference on Emerging Technologies in Computing, iCEtiC 2018, held in London, UK, in August 2018. The 26 revised full papers were reviewed and selected from more than 59 submissions and are organized in topical sections covering Cloud, IoT and distributed computing, software engineering, communications engineering and vehicular technology, AI, expert systems and big data analytics, Web information systems and applications, security, database system, economics and business engineering, mLearning and eLearning.
This book constitutes the proceedings of the 20th International Workshop on Computer Algebra in Scientific Computing, CASC 2018, held in Lille, France, in September 2018. The 24 full papers of this volume presented with an abstract of an invited talk and one paper corresponding to another invited talk were carefully reviewed and selected from 29 submissions. They deal with cutting-edge research in all major disciplines of computer algebra in sciences such as physics, chemistry, life sciences, and engineering. Chapter "Positive Solutions of Systems of Signed Parametric Polynomial Inequalities" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This two-volume set (LNAI 11055 and LNAI 11056) constitutes the refereed proceedings of the 10th International Conference on Collective Intelligence, ICCCI 2018, held in Bristol, UK, in September 2018 The 98 full papers presented were carefully reviewed and selected from 240 submissions. The conference focuses on knowledge engineering and semantic web, social network analysis, recommendation methods and recommender systems, agents and multi-agent systems, text processing and information retrieval, data mining methods and applications, decision support and control systems, sensor networks and internet of things, as well as computer vision techniques.
This book includes the post-conference proceedings of the 21st RoboCup International Symposium, held in Nagoya, Japan, in September 2017. The 33 full revised papers and 9 papers from the winning teams presented were carefully reviewed and selected from 58 submissions. The papers are orginazed on topical sections on Robotics, Artificial intelligence, Environment perception, State estimation and much more.
This book constitutes the proceedings of the 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, held in Como, Italy, in September 2018. The 47 full papers presented in this volume were carefully reviewed and selected from 64 submissions.This volume contains invited contributions and accepted papers from the main track and from the three organized workshops. The volume is organized in the following topics: biological systems modeling; simulation and other applications of CA; multi-agent systems; pedestrian and traffic dynamics; synchronization and control; theory and cryptography; asynchronous cellular automata; and crowds, traffic and cellular automata.
This book constitutes the proceedings of the 14th International Conference on Bioinformatics Research and Applications, ISBRA 2018, held in Beijing, China, in June 2018.The 24 full and 10 short papers presented in this volume were carefully reviewed and selected from a total of 138 submissions. They were organized in topical sections named: network analysis and modelling; genomic data analysis; cancer data analysis; structure and interaction; HPC and CryoEM; machine and deep learning; data analysis and methodology; analysis and visualization tools; and RNA-Seq data analysis.
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software systems, and the Internet of Things has become a crucial aspect of the performance of computer systems. The papers deal with these issues, with a specific focus on societally critical systems such as health informatics systems, the Internet of Things, energy systems, digital cities, digital economy, mobile networks, and the underlying physical and network infrastructures.
This book constitutes the proceedings of the 17th International Conference on Web-Based Learning, ICWL 2018, held in Chiang Mai, Thailand, in August 2018.The 11 revised full papers presented together with 4 short papers were carefully reviewed and selected from 37 submissions. The papers are organized in topical sections on learning assessment and behavior; case studies; augmented reality and collaborative learning; game-based learning; and learning content management and experience sharing.
The three-volume set LNCS 10918, 10919, and 10290 constitutes the proceedings of the 7th International Conference on Design, User Experience, and Usability, DUXU 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The total of 1171 papers presented at the HCII 2018 conferences were carefully reviewed and selected from 4346 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The total of 165 contributions included in the DUXU proceedings were carefully reviewed and selected for inclusion in this three-volume set. The 60 papers included in this volume are organized in topical sections on emotion, motivation, and persuasion design, DUXU and children, DUXU in automotive and transport, and DUXU in culture and art.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This book provides a comprehensive introduction into the SPES XT modeling framework. Moreover, it shows the applicability of the framework for the development of embedded systems in different industry domains and reports on the lessons learned. It also describes how the SPES XT modeling framework can be tailored to meet domain and project-specific needs. The book is structured into four parts: Part I "Starting Situation" discusses the status quo of the development of embedded systems with specific focus on model-based engineering and summarizes key challenges emerging from industrial practice. Part II "Modeling Theory" introduces the SPES XT modeling framework and explains the core underlying principles. Part III "Application of the SPES XT Framework" describes the application of the SPES XT modeling framework and how it addresses major industrial challenges. Part IV "Evaluation and Technology Transfer" assess the impact of the SPES XT modeling framework and includes various exemplary applications from automation, automotive, and avionics. Overall, the SPES XT modeling framework offers a seamless model-based engineering approach. It addresses core challenges faced during the engineering of embedded systems. Among others, it offers aligned and integrated techniques for the early validation of engineering artefacts (including requirements and functional and technical designs), the management of product variants and their variability, modular safety assurance and deployment of embedded software. |
You may like...
Research Anthology on Artificial Neural…
Information R Management Association
Hardcover
R12,932
Discovery Miles 129 320
Machine Learning, Big Data, and IoT for…
Pardeep Kumar, Yugal Kumar, …
Paperback
R2,657
Discovery Miles 26 570
Artificial Intelligence and Data Science…
Mohsen Asadnia, Amir Razmjou, …
Paperback
R2,578
Discovery Miles 25 780
Activity-Based Intelligence: Principles…
Patrick Biltgen, Stephen Ryan
Hardcover
R4,269
Discovery Miles 42 690
Exploring Future Opportunities of…
Madhulika Bhatia, Tanupriya Choudhury, …
Hardcover
R6,683
Discovery Miles 66 830
Information Technology Trends for a…
Francisco J. Garcia Penalvo
Hardcover
R5,333
Discovery Miles 53 330
Blockchain Technology for Emerging…
S. K. Hafizul Islam, Arup Kumar Pal, …
Paperback
R2,941
Discovery Miles 29 410
|