![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
This book presents a variety of techniques designed to enhance and empower multi-disciplinary and multi-institutional machine learning research in healthcare informatics. It is intended to provide a unique compendium of current and emerging machine learning paradigms for healthcare informatics, reflecting the diversity, complexity, and depth and breadth of this multi-disciplinary area.
This book presents machine learning as a set of pre-requisites, co-requisites, and post-requisites, focusing on mathematical concepts and engineering applications in advanced welding and cutting processes. It describes a number of advanced welding and cutting processes and then assesses the parametrical interdependencies of two entities, namely the data analysis and data visualization techniques, which form the core of machine learning. Subsequently, it discusses supervised learning, highlighting Python libraries such as NumPy, Pandas and Scikit Learn programming. It also includes case studies that employ machine learning for manufacturing processes in the engineering domain. The book not only provides beginners with an introduction to machine learning for applied sciences, enabling them to address global competitiveness and work on real-time technical challenges, it is also a valuable resource for scholars with domain knowledge.
This book presents the latest advances in computational intelligence and data analytics for sustainable future smart cities. It focuses on computational intelligence and data analytics to bring together the smart city and sustainable city endeavors. It also discusses new models, practical solutions and technological advances related to the development and the transformation of cities through machine intelligence and big data models and techniques. This book is helpful for students and researchers as well as practitioners.
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.
This book offers a timely snapshot and extensive practical and theoretical insights into the topic of learning from data. Based on the tutorials presented at the INNS Big Data and Deep Learning Conference, INNSBDDL2019, held on April 16-18, 2019, in Sestri Levante, Italy, the respective chapters cover advanced neural networks, deep architectures, and supervised and reinforcement machine learning models. They describe important theoretical concepts, presenting in detail all the necessary mathematical formalizations, and offer essential guidance on their use in current big data research.
The unification of symbolist and connectionist models is a major trend in AI. The key is to keep the symbolic semantics unchanged. Unfortunately, present embedding approaches cannot. The approach in this book makes the unification possible. It is indeed a new and promising approach in AI. -Bo Zhang, Director of AI Institute, Tsinghua It is indeed wonderful to see the reviving of the important theme Nural Symbolic Model. Given the popularity and prevalence of deep learning, symbolic processing is often neglected or downplayed. This book confronts this old issue head on, with a historical look, incorporating recent advances and new perspectives, thus leading to promising new methods and approaches. -Ron Sun (RPI), on Governing Board of Cognitive Science Society Both for language and humor, approaches like those described in this book are the way to snickerdoodle wombats. -Christian F. Hempelmann (Texas A&M-Commerce) on Executive Board of International Society for Humor Studies
This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.
This handbook covers a wide range of topics related to the collection, processing, analysis, and use of geospatial data in their various forms. This handbook provides an overview of how spatial computing technologies for big data can be organized and implemented to solve real-world problems. Diverse subdomains ranging from indoor mapping and navigation over trajectory computing to earth observation from space, are also present in this handbook. It combines fundamental contributions focusing on spatio-textual analysis, uncertain databases, and spatial statistics with application examples such as road network detection or colocation detection using GPUs. In summary, this handbook gives an essential introduction and overview of the rich field of spatial information science and big geospatial data. It introduces three different perspectives, which together define the field of big geospatial data: a societal, governmental, and governance perspective. It discusses questions of how the acquisition, distribution and exploitation of big geospatial data must be organized both on the scale of companies and countries. A second perspective is a theory-oriented set of contributions on arbitrary spatial data with contributions introducing into the exciting field of spatial statistics or into uncertain databases. A third perspective is taking a very practical perspective to big geospatial data, ranging from chapters that describe how big geospatial data infrastructures can be implemented and how specific applications can be implemented on top of big geospatial data. This would include for example, research in historic map data, road network extraction, damage estimation from remote sensing imagery, or the analysis of spatio-textual collections and social media. This multi-disciplinary approach makes the book unique. This handbook can be used as a reference for undergraduate students, graduate students and researchers focused on big geospatial data. Professionals can use this book, as well as practitioners facing big collections of geospatial data.
The book introduces some challenging methods and solutions to solve the human activity recognition challenge. This book highlights the challenge that will lead the researchers in academia and industry to move further related to human activity recognition and behavior analysis, concentrating on cooking challenge. Current activity recognition systems focus on recognizing either the complex label (macro-activity) or the small steps (micro-activities) but their combined recognition is critical for analysis like the challenge proposed in this book. It has 10 chapters from 13 institutes and 8 countries (Japan, USA, Switzerland, France, Slovenia, China, Bangladesh, and Columbia).
This book is a collection of essays exploring adaptive systems from
many perspectives, ranging from computational applications to
models of adaptation in living and social systems. The essays on
computation discuss history, theory, applications, and possible
threats of adaptive and evolving computations systems. The modeling
chapters cover topics such as evolution in microbial populations,
the evolution of cooperation, and how ideas about evolution relate
to economics.
[FIRST EDITION] This accessible textbook presents an introduction to computer vision algorithms for industrially-relevant applications of X-ray testing. Features: introduces the mathematical background for monocular and multiple view geometry; describes the main techniques for image processing used in X-ray testing; presents a range of different representations for X-ray images, explaining how these enable new features to be extracted from the original image; examines a range of known X-ray image classifiers and classification strategies; discusses some basic concepts for the simulation of X-ray images and presents simple geometric and imaging models that can be used in the simulation; reviews a variety of applications for X-ray testing, from industrial inspection and baggage screening to the quality control of natural products; provides supporting material at an associated website, including a database of X-ray images and a Matlab toolbox for use with the book's many examples.
This book addresses the principles and applications of metaheuristic approaches in engineering and related fields. The first part covers metaheuristics tools and techniques such as ant colony optimization and Tabu search, and their applications to several classes of optimization problems. In turn, the book's second part focuses on a wide variety of metaheuristics applications in engineering and/or the applied sciences, e.g. in smart grids and renewable energy. In addition, the simulation codes for the problems discussed are included in an appendix for ready reference. Intended for researchers aspiring to learn and apply metaheuristic techniques, and gathering contributions by prominent experts in the field, the book offers readers an essential introduction to metaheuristics, its theoretical aspects and applications.
This book covers advances in system, control and computing. This book gathers selected high-quality research papers presented at the International Conference on Advances in Systems, Control and Computing (AISCC 2020), held at MNIT Jaipur during February 27-28, 2020. The first part is advances in systems and it is dedicated to applications of the artificial neural networks, evolutionary computation, swarm intelligence, artificial immune systems, fuzzy system, autonomous and multi-agent systems, machine learning, other intelligent systems and related areas. In the second part, machine learning and other intelligent algorithms for design of control/control analysis are covered. The last part covers advancements, modifications, improvements and applications of intelligent algorithms.
This book highlights cutting-edge applications of machine learning techniques for disaster management by monitoring, analyzing, and forecasting hydro-meteorological variables. Predictive modelling is a consolidated discipline used to forewarn the possibility of natural hazards. In this book, experts from numerical weather forecast, meteorology, hydrology, engineering, agriculture, economics, and disaster policy-making contribute towards an interdisciplinary framework to construct potent models for hazard risk mitigation. The book will help advance the state of knowledge of artificial intelligence in decision systems to aid disaster management and policy-making. This book can be a useful reference for graduate student, academics, practicing scientists and professionals of disaster management, artificial intelligence, and environmental sciences.
This book gathers the latest quality research work of Ph.D. students working on the current areas presented in the Doctoral Symposium on Computational Intelligence (DoSCI 2020). The book includes works in the areas of artificial intelligence, deep learning, evolutionary algorithms, swarm intelligence, fuzzy sets and vague sets, rough set theoretic approaches, quantum-inspired computational intelligence, hybrid computational intelligence, machine learning, computer vision, soft computing, distributed computing, parallel and grid computing, cloud computing, high-performance computing, biomedical computing, decision support and decision making. The book is useful for researchers, students, engineers, practitioners and academicians in their advance studies.
Order affects the results you get: Different orders of presenting material can lead to qualitatively and quantitatively different learning outcomes. These differences occur in both natural and artificial learning systems. In Order to Learn shows how order effects are crucial in human learning, instructional design, machine learning, and both symbolic and connectionist cognitive models. Each chapter explains a different aspect of how the order in which material is presented can strongly influence what is learned by humans and theoretical models of learning in a variety of domains. In addition to data, models are provided that predict and describe order effects and analyze how and when they will occur. The introductory and concluding chapters compile suggestions for improving learning through better sequences of learning materials, including how to take advantage of order effects that encourage learning and how to avoid order effects that discourage learning. Each chapter also highlights questions that may inspire further research. Taken together, these chapters show how order effects in different areas can and do inform each other. In Order to Learn will be of interest to researchers and students in cognitive science, education, machine learning.
This book provides foundations for the understanding and design of computation-efficient algorithms and protocols for those interactions with environment, i.e., wireless communication systems. The book provides a systematic treatment of the theoretical foundation and algorithmic tools necessarily in the design of computation-efficient algorithms and protocols in stochastic scheduling. The problems addressed in the book are of both fundamental and practical importance. Target readers of the book are researchers and advanced-level engineering students interested in acquiring in-depth knowledge on the topic and on stochastic scheduling and their applications, both from theoretical and engineering perspective.
This book presents practical as well as conceptual insights into the latest trends, tools, techniques and methodologies of blockchains for the Internet of Things. The decentralised Internet of Things (IoT) not only reduces infrastructure costs, but also provides a standardised peer-to-peer communication model for billions of transactions. However, there are significant security challenges associated with peer-to-peer communication. The decentralised concept of blockchain technology ensures transparent interactions between different parties, which are more secure and reliable thanks to distributed ledger and proof-of-work consensus algorithms. Blockchains allow trustless, peer-to-peer communication and have already proven their worth in the world of financial services. The blockchain can be implanted in IoT systems to deal with the issues of scale, trustworthiness and decentralisation, allowing billions of devices to share the same network without the need for additional resources. This book discusses the latest tools and methodology and concepts in the decentralised Internet of Things. Each chapter presents an in-depth investigation of the potential of blockchains in the Internet of Things, addressing the state-of-the-art in and future perspectives of the decentralised Internet of Things. Further, industry experts, researchers and academicians share their ideas and experiences relating to frontier technologies, breakthrough and innovative solutions and applications.
This book presents the latest advances in photometric 3D reconstruction. It provides the reader with an overview of the state of the art in the field, and of the latest research into both the theoretical foundations of photometric 3D reconstruction and its practical application in several fields (including security, medicine, cultural heritage and archiving, and engineering). These techniques play a crucial role within such emerging technologies as 3D printing, since they permit the direct conversion of an image into a solid object. The book covers both theoretical analysis and real-world applications, highlighting the importance of deepening interdisciplinary skills, and as such will be of interest to both academic researchers and practitioners from the computer vision and mathematical 3D modeling communities, as well as engineers involved in 3D printing. No prior background is required beyond a general knowledge of classical computer vision models, numerical methods for optimization, and partial differential equations.
The recent developments in wireless communications, networking, and embedded systems have driven various innovative Internet of Things (IoT) applications, e.g., smart cities, mobile healthcare, autonomous driving and drones. A common feature of these applications is the stringent requirements for low-latency communications. Considering the typical small payload size of IoT applications, it is of critical importance to reduce the size of the overhead message, e.g., identification information, pilot symbols for channel estimation, and control data. Such low-overhead communications also help to improve the energy efficiency of IoT devices. Recently, structured signal processing techniques have been introduced and developed to reduce the overheads for key design problems in IoT networks, such as channel estimation, device identification, and message decoding. By utilizing underlying system structures, including sparsity and low rank, these methods can achieve significant performance gains. This book provides an overview of four general structured signal processing models: a sparse linear model, a blind demixing model, a sparse blind demixing model, and a shuffled linear model, and discusses their applications in enabling low-overhead communications in IoT networks. Further, it presents practical algorithms based on both convex and nonconvex optimization approaches, as well as theoretical analyses that use various mathematical tools.
This book presents high-quality, original contributions (both theoretical and experimental) on Information Security, Machine Learning, Data Mining and Internet of Things (IoT). It gathers papers presented at ICETIT 2019, the 1st International Conference on Emerging Trends in Information Technology, which was held in Delhi, India, in June 2019. This conference series represents a targeted response to the growing need for research that reports on and assesses the practical implications of IoT and network technologies, AI and machine learning, data analytics and cloud computing, security and privacy, and next generation computing technologies.
Adequate health and health care is no longer possible without proper data supervision from modern machine learning methodologies like cluster models, neural networks, and other data mining methodologies. The current book is the first publication of a complete overview of machine learning methodologies for the medical and health sector, and it was written as a training companion, and as a must-read, not only for physicians and students, but also for any one involved in the process and progress of health and health care. In this second edition the authors have removed the textual errors from the first edition. Also, the improved tables from the first edition, have been replaced with the original tables from the software programs as applied. This is, because, unlike the former, the latter were without error, and readers were better familiar with them. The main purpose of the first edition was, to provide stepwise analyses of the novel methods from data examples, but background information and clinical relevance information may have been somewhat lacking. Therefore, each chapter now contains a section entitled "Background Information". Machine learning may be more informative, and may provide better sensitivity of testing than traditional analytic methods may do. In the second edition a place has been given for the use of machine learning not only to the analysis of observational clinical data, but also to that of controlled clinical trials. Unlike the first edition, the second edition has drawings in full color providing a helpful extra dimension to the data analysis. Several machine learning methodologies not yet covered in the first edition, but increasingly important today, have been included in this updated edition, for example, negative binomial and Poisson regressions, sparse canonical analysis, Firth's bias adjusted logistic analysis, omics research, eigenvalues and eigenvectors.
This book presents the Statistical Learning Theory in a detailed and easy to understand way, by using practical examples, algorithms and source codes. It can be used as a textbook in graduation or undergraduation courses, for self-learners, or as reference with respect to the main theoretical concepts of Machine Learning. Fundamental concepts of Linear Algebra and Optimization applied to Machine Learning are provided, as well as source codes in R, making the book as self-contained as possible. It starts with an introduction to Machine Learning concepts and algorithms such as the Perceptron, Multilayer Perceptron and the Distance-Weighted Nearest Neighbors with examples, in order to provide the necessary foundation so the reader is able to understand the Bias-Variance Dilemma, which is the central point of the Statistical Learning Theory. Afterwards, we introduce all assumptions and formalize the Statistical Learning Theory, allowing the practical study of different classification algorithms. Then, we proceed with concentration inequalities until arriving to the Generalization and the Large-Margin bounds, providing the main motivations for the Support Vector Machines. From that, we introduce all necessary optimization concepts related to the implementation of Support Vector Machines. To provide a next stage of development, the book finishes with a discussion on SVM kernels as a way and motivation to study data spaces and improve classification results.
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book. |
![]() ![]() You may like...
Father, Son & Co. - My Life at IBM and…
Thomas J. Watson, Peter Petre
Paperback
R658
Discovery Miles 6 580
System Center Configuration Manager…
Kerrie Meyler, Gerry Hampson, …
Paperback
![]()
CFD Techniques and Energy Applications
Zied Driss, Brahim Necib, …
Hardcover
R2,879
Discovery Miles 28 790
Evolutionary Computation and Complex…
Jing Liu, Hussein A. Abbass, …
Hardcover
R2,873
Discovery Miles 28 730
|