![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
The process of learning words and languages may seem like an instinctual trait, inherent to nearly all humans from a young age. However, a vast range of complex research and information exists in detailing the complexities of the process of word learning. Theoretical and Computational Models of Word Learning: Trends in Psychology and Artificial Intelligence strives to combine cross-disciplinary research into one comprehensive volume to help readers gain a fuller understanding of the developmental processes and influences that makeup the progression of word learning. Blending together developmental psychology and artificial intelligence, this publication is intended for researchers, practitioners, and educators who are interested in language learning and its development as well as computational models formed from these specific areas of research.
The book first explores the cybersecurity's landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law.
This volume discusses recent advances in Artificial Intelligence (AI) applications in smart, internet-connected societies, highlighting three key focus areas. The first focus is on intelligent sensing applications. This section details the integration of Wireless Sensing Networks (WSN) and the use of intelligent platforms for WSN applications in urban infrastructures, and discusses AI techniques on hardware and software systems such as machine learning, pattern recognition, expert systems, neural networks, genetic algorithms, and intelligent control in transportation and communications systems. The second focus is on AI-based Internet of Things (IoT) systems, which addresses applications in traffic management, medical health, smart homes and energy. Readers will also learn about how AI can extract useful information from Big Data in IoT systems. The third focus is on crowdsourcing (CS) and computing for smart cities. this section discusses how CS via GPS devices, GIS tools, traffic cameras, smart cards, smart phones and road deceleration devices enables citizens to collect and share data to make cities smart, and how these data can be applied to address urban issues including pollution, traffic congestion, public safety and increased energy consumption. This book will of interest to academics, researchers and students studying AI, cloud computing, IoT and crowdsourcing in urban applications.
This book introduces readers to an evolutionary learning approach, specifically genetic programming (GP), for production scheduling. The book is divided into six parts. In Part I, it provides an introduction to production scheduling, existing solution methods, and the GP approach to production scheduling. Characteristics of production environments, problem formulations, an abstract GP framework for production scheduling, and evaluation criteria are also presented. Part II shows various ways that GP can be employed to solve static production scheduling problems and their connections with conventional operation research methods. In turn, Part III shows how to design GP algorithms for dynamic production scheduling problems and describes advanced techniques for enhancing GP's performance, including feature selection, surrogate modeling, and specialized genetic operators. In Part IV, the book addresses how to use heuristics to deal with multiple, potentially conflicting objectives in production scheduling problems, and presents an advanced multi-objective approach with cooperative coevolution techniques or multi-tree representations. Part V demonstrates how to use multitask learning techniques in the hyper-heuristics space for production scheduling. It also shows how surrogate techniques and assisted task selection strategies can benefit multitask learning with GP for learning heuristics in the context of production scheduling. Part VI rounds out the text with an outlook on the future. Given its scope, the book benefits scientists, engineers, researchers, practitioners, postgraduates, and undergraduates in the areas of machine learning, artificial intelligence, evolutionary computation, operations research, and industrial engineering.
As today's world continues to advance, Artificial Intelligence (AI) is a field that has become a staple of technological development and led to the advancement of numerous professional industries. An application within AI that has gained attention is machine learning. Machine learning uses statistical techniques and algorithms to give computer systems the ability to understand and its popularity has circulated through many trades. Understanding this technology and its countless implementations is pivotal for scientists and researchers across the world. The Handbook of Research on Emerging Trends and Applications of Machine Learning provides a high-level understanding of various machine learning algorithms along with modern tools and techniques using Artificial Intelligence. In addition, this book explores the critical role that machine learning plays in a variety of professional fields including healthcare, business, and computer science. While highlighting topics including image processing, predictive analytics, and smart grid management, this book is ideally designed for developers, data scientists, business analysts, information architects, finance agents, healthcare professionals, researchers, retail traders, professors, and graduate students seeking current research on the benefits, implementations, and trends of machine learning.
The method of sparsity has been attracting a lot of attention in the fields related not only to signal processing, machine learning, and statistics, but also systems and control. The method is known as compressed sensing, compressive sampling, sparse representation, or sparse modeling. More recently, the sparsity method has been applied to systems and control to design resource-aware control systems. This book gives a comprehensive guide to sparsity methods for systems and control, from standard sparsity methods in finite-dimensional vector spaces (Part I) to optimal control methods in infinite-dimensional function spaces (Part II).The primary objective of this book is to show how to use sparsity methods for several engineering problems. For this, the author provides MATLAB programs by which the reader can try sparsity methods for themselves. Readers will obtain a deep understanding of sparsity methods by running these MATLAB programs. Sparsity Methods for Systems and Control is suitable for graduate level university courses, though it should also be comprehendible to undergraduate students who have a basic knowledge of linear algebra and elementary calculus. Also, especially part II of the book should appeal to professional researchers and engineers who are interested in applying sparsity methods to systems and control.
This book describes new theories and applications of artificial neural networks, with a special focus on answering questions in neuroscience, biology and biophysics and cognitive research. It covers a wide range of methods and technologies, including deep neural networks, large scale neural models, brain computer interface, signal processing methods, as well as models of perception, studies on emotion recognition, self-organization and many more. The book includes both selected and invited papers presented at the XXII International Conference on Neuroinformatics, held on October 12-16, 2020, Moscow, Russia.
This book describes active illumination techniques in computer vision. We can classify computer vision techniques into two classes: passive and active techniques. Passive techniques observe the scene statically and analyse it as is. Active techniques give the scene some actions and try to facilitate the analysis. In particular, active illumination techniques project specific light, for which the characteristics are known beforehand, to a target scene to enable stable and accurate analysis of the scene. Traditional passive techniques have a fundamental limitation. The external world surrounding us is three-dimensional; the image projected on a retina or an imaging device is two-dimensional. That is, reduction of one dimension has occurred. Active illumination techniques compensate for the dimensional reduction by actively controlling the illumination. The demand for reliable vision sensors is rapidly increasing in many application areas, such as robotics and medical image analysis. This book explains this new endeavour to explore the augmentation of reduced dimensions in computer vision. This book consists of three parts: basic concepts, techniques, and applications. The first part explains the basic concepts for understanding active illumination techniques. In particular, the basic concepts of optics are explained so that researchers and engineers outside the field can understand the later chapters. The second part explains currently available active illumination techniques, covering many techniques developed by the authors. The final part shows how such active illumination techniques can be applied to various domains, describing the issue to be overcome by active illumination techniques and the advantages of using these techniques. This book is primarily aimed at 4th year undergraduate and 1st year graduate students, and will also help engineers from fields beyond computer vision to use active illumination techniques. Additionally, the book is suitable as course material for technical seminars.
Our ability to generate and collect data has been increasing rapidly. Not only are all of our business, scientific, and government transactions now computerized, but the widespread use of digital cameras, publication tools, and bar codes also generate data. On the collection side, scanned text and image platforms, satellite remote sensing systems, and the World Wide Web have flooded us with a tremendous amount of data. This explosive growth has generated an even more urgent need for new techniques and automated tools that can help us transform this data into useful information and knowledge. Like the first edition, voted the most popular data mining book by KD Nuggets readers, this book explores concepts and techniques for the discovery of patterns hidden in large data sets, focusing on issues relating to their feasibility, usefulness, effectiveness, and scalability. However, since the publication of the first edition, great progress has been made in the development of new data mining methods, systems, and applications. This new edition substantially enhances the first edition, and new chapters have been added to address recent developments on mining complex types of data- including stream data, sequence data, graph structured data, social network data, and multi-relational data.
This book presents a variety of techniques designed to enhance and empower multi-disciplinary and multi-institutional machine learning research in healthcare informatics. It is intended to provide a unique compendium of current and emerging machine learning paradigms for healthcare informatics, reflecting the diversity, complexity, and depth and breadth of this multi-disciplinary area.
This book presents machine learning as a set of pre-requisites, co-requisites, and post-requisites, focusing on mathematical concepts and engineering applications in advanced welding and cutting processes. It describes a number of advanced welding and cutting processes and then assesses the parametrical interdependencies of two entities, namely the data analysis and data visualization techniques, which form the core of machine learning. Subsequently, it discusses supervised learning, highlighting Python libraries such as NumPy, Pandas and Scikit Learn programming. It also includes case studies that employ machine learning for manufacturing processes in the engineering domain. The book not only provides beginners with an introduction to machine learning for applied sciences, enabling them to address global competitiveness and work on real-time technical challenges, it is also a valuable resource for scholars with domain knowledge.
This book presents the latest advances in computational intelligence and data analytics for sustainable future smart cities. It focuses on computational intelligence and data analytics to bring together the smart city and sustainable city endeavors. It also discusses new models, practical solutions and technological advances related to the development and the transformation of cities through machine intelligence and big data models and techniques. This book is helpful for students and researchers as well as practitioners.
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.
This book offers a timely snapshot and extensive practical and theoretical insights into the topic of learning from data. Based on the tutorials presented at the INNS Big Data and Deep Learning Conference, INNSBDDL2019, held on April 16-18, 2019, in Sestri Levante, Italy, the respective chapters cover advanced neural networks, deep architectures, and supervised and reinforcement machine learning models. They describe important theoretical concepts, presenting in detail all the necessary mathematical formalizations, and offer essential guidance on their use in current big data research.
The unification of symbolist and connectionist models is a major trend in AI. The key is to keep the symbolic semantics unchanged. Unfortunately, present embedding approaches cannot. The approach in this book makes the unification possible. It is indeed a new and promising approach in AI. -Bo Zhang, Director of AI Institute, Tsinghua It is indeed wonderful to see the reviving of the important theme Nural Symbolic Model. Given the popularity and prevalence of deep learning, symbolic processing is often neglected or downplayed. This book confronts this old issue head on, with a historical look, incorporating recent advances and new perspectives, thus leading to promising new methods and approaches. -Ron Sun (RPI), on Governing Board of Cognitive Science Society Both for language and humor, approaches like those described in this book are the way to snickerdoodle wombats. -Christian F. Hempelmann (Texas A&M-Commerce) on Executive Board of International Society for Humor Studies
This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.
This handbook covers a wide range of topics related to the collection, processing, analysis, and use of geospatial data in their various forms. This handbook provides an overview of how spatial computing technologies for big data can be organized and implemented to solve real-world problems. Diverse subdomains ranging from indoor mapping and navigation over trajectory computing to earth observation from space, are also present in this handbook. It combines fundamental contributions focusing on spatio-textual analysis, uncertain databases, and spatial statistics with application examples such as road network detection or colocation detection using GPUs. In summary, this handbook gives an essential introduction and overview of the rich field of spatial information science and big geospatial data. It introduces three different perspectives, which together define the field of big geospatial data: a societal, governmental, and governance perspective. It discusses questions of how the acquisition, distribution and exploitation of big geospatial data must be organized both on the scale of companies and countries. A second perspective is a theory-oriented set of contributions on arbitrary spatial data with contributions introducing into the exciting field of spatial statistics or into uncertain databases. A third perspective is taking a very practical perspective to big geospatial data, ranging from chapters that describe how big geospatial data infrastructures can be implemented and how specific applications can be implemented on top of big geospatial data. This would include for example, research in historic map data, road network extraction, damage estimation from remote sensing imagery, or the analysis of spatio-textual collections and social media. This multi-disciplinary approach makes the book unique. This handbook can be used as a reference for undergraduate students, graduate students and researchers focused on big geospatial data. Professionals can use this book, as well as practitioners facing big collections of geospatial data.
The book introduces some challenging methods and solutions to solve the human activity recognition challenge. This book highlights the challenge that will lead the researchers in academia and industry to move further related to human activity recognition and behavior analysis, concentrating on cooking challenge. Current activity recognition systems focus on recognizing either the complex label (macro-activity) or the small steps (micro-activities) but their combined recognition is critical for analysis like the challenge proposed in this book. It has 10 chapters from 13 institutes and 8 countries (Japan, USA, Switzerland, France, Slovenia, China, Bangladesh, and Columbia).
This book is a collection of essays exploring adaptive systems from
many perspectives, ranging from computational applications to
models of adaptation in living and social systems. The essays on
computation discuss history, theory, applications, and possible
threats of adaptive and evolving computations systems. The modeling
chapters cover topics such as evolution in microbial populations,
the evolution of cooperation, and how ideas about evolution relate
to economics.
[FIRST EDITION] This accessible textbook presents an introduction to computer vision algorithms for industrially-relevant applications of X-ray testing. Features: introduces the mathematical background for monocular and multiple view geometry; describes the main techniques for image processing used in X-ray testing; presents a range of different representations for X-ray images, explaining how these enable new features to be extracted from the original image; examines a range of known X-ray image classifiers and classification strategies; discusses some basic concepts for the simulation of X-ray images and presents simple geometric and imaging models that can be used in the simulation; reviews a variety of applications for X-ray testing, from industrial inspection and baggage screening to the quality control of natural products; provides supporting material at an associated website, including a database of X-ray images and a Matlab toolbox for use with the book's many examples.
This book addresses the principles and applications of metaheuristic approaches in engineering and related fields. The first part covers metaheuristics tools and techniques such as ant colony optimization and Tabu search, and their applications to several classes of optimization problems. In turn, the book's second part focuses on a wide variety of metaheuristics applications in engineering and/or the applied sciences, e.g. in smart grids and renewable energy. In addition, the simulation codes for the problems discussed are included in an appendix for ready reference. Intended for researchers aspiring to learn and apply metaheuristic techniques, and gathering contributions by prominent experts in the field, the book offers readers an essential introduction to metaheuristics, its theoretical aspects and applications.
This book covers advances in system, control and computing. This book gathers selected high-quality research papers presented at the International Conference on Advances in Systems, Control and Computing (AISCC 2020), held at MNIT Jaipur during February 27-28, 2020. The first part is advances in systems and it is dedicated to applications of the artificial neural networks, evolutionary computation, swarm intelligence, artificial immune systems, fuzzy system, autonomous and multi-agent systems, machine learning, other intelligent systems and related areas. In the second part, machine learning and other intelligent algorithms for design of control/control analysis are covered. The last part covers advancements, modifications, improvements and applications of intelligent algorithms.
This book highlights cutting-edge applications of machine learning techniques for disaster management by monitoring, analyzing, and forecasting hydro-meteorological variables. Predictive modelling is a consolidated discipline used to forewarn the possibility of natural hazards. In this book, experts from numerical weather forecast, meteorology, hydrology, engineering, agriculture, economics, and disaster policy-making contribute towards an interdisciplinary framework to construct potent models for hazard risk mitigation. The book will help advance the state of knowledge of artificial intelligence in decision systems to aid disaster management and policy-making. This book can be a useful reference for graduate student, academics, practicing scientists and professionals of disaster management, artificial intelligence, and environmental sciences.
This book gathers the latest quality research work of Ph.D. students working on the current areas presented in the Doctoral Symposium on Computational Intelligence (DoSCI 2020). The book includes works in the areas of artificial intelligence, deep learning, evolutionary algorithms, swarm intelligence, fuzzy sets and vague sets, rough set theoretic approaches, quantum-inspired computational intelligence, hybrid computational intelligence, machine learning, computer vision, soft computing, distributed computing, parallel and grid computing, cloud computing, high-performance computing, biomedical computing, decision support and decision making. The book is useful for researchers, students, engineers, practitioners and academicians in their advance studies.
Order affects the results you get: Different orders of presenting material can lead to qualitatively and quantitatively different learning outcomes. These differences occur in both natural and artificial learning systems. In Order to Learn shows how order effects are crucial in human learning, instructional design, machine learning, and both symbolic and connectionist cognitive models. Each chapter explains a different aspect of how the order in which material is presented can strongly influence what is learned by humans and theoretical models of learning in a variety of domains. In addition to data, models are provided that predict and describe order effects and analyze how and when they will occur. The introductory and concluding chapters compile suggestions for improving learning through better sequences of learning materials, including how to take advantage of order effects that encourage learning and how to avoid order effects that discourage learning. Each chapter also highlights questions that may inspire further research. Taken together, these chapters show how order effects in different areas can and do inform each other. In Order to Learn will be of interest to researchers and students in cognitive science, education, machine learning. |
![]() ![]() You may like...
OS X Exploits and Defense - Own…
Paul Baccas, Kevin Finisterre, …
Paperback
R1,354
Discovery Miles 13 540
Advances in Acoustic Emission Technology…
Gongtian Shen, Junjiao Zhang, …
Hardcover
R6,339
Discovery Miles 63 390
|