![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
MACHINE LEARNING TECHNIQUES AND ANALYTICS FOR CLOUD SECURITY This book covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud security solutions The aim of Machine Learning Techniques and Analytics for Cloud Security is to integrate machine learning approaches to meet various analytical issues in cloud security. Cloud security with ML has long-standing challenges that require methodological and theoretical handling. The conventional cryptography approach is less applied in resource-constrained devices. To solve these issues, the machine learning approach may be effectively used in providing security to the vast growing cloud environment. Machine learning algorithms can also be used to meet various cloud security issues, such as effective intrusion detection systems, zero-knowledge authentication systems, measures for passive attacks, protocols design, privacy system designs, applications, and many more. The book also contains case studies/projects outlining how to implement various security features using machine learning algorithms and analytics on existing cloud-based products in public, private and hybrid cloud respectively. Audience Research scholars and industry engineers in computer sciences, electrical and electronics engineering, machine learning, computer security, information technology, and cryptography.
This SpringerBrief presents novel methods of approaching challenging problems in the reconstruction of accurate 3D models and serves as an introduction for further 3D reconstruction methods. It develops a 3D reconstruction system that produces accurate results by cascading multiple novel loop detection, sifting, and optimization methods. The authors offer a fast point cloud registration method that utilizes optimized randomness in random sample consensus for surface loop detection. The text also proposes two methods for surface-loop sifting. One is supported by a sparse-feature-based optimization graph. This graph is more robust to different scan patterns than earlier methods and can cope with tracking failure and recovery. The other is an offline algorithm that can sift loop detections based on their impact on loop optimization results and which is enabled by a dense map posterior metric for 3D reconstruction and mapping performance evaluation works without any costly ground-truth data. The methods presented in Towards Optimal Point Cloud Processing for 3D Reconstruction will be of assistance to researchers developing 3D modelling methods and to workers in the wide variety of fields that exploit such technology including metrology, geological animation and mass customization in smart manufacturing.
The proceedings set LNCS 13231, 13232, and 13233 constitutes the refereed proceedings of the 21st International Conference on Image Analysis and Processing, ICIAP 2022, which was held during May 23-27, 2022, in Lecce, Italy,The 168 papers included in the proceedings were carefully reviewed and selected from 307 submissions. They deal with video analysis and understanding; pattern recognition and machine learning; deep learning; multi-view geometry and 3D computer vision; image analysis, detection and recognition; multimedia; biomedical and assistive technology; digital forensics and biometrics; image processing for cultural heritage; robot vision; etc.
Master the essential skills needed to recognize and solve complex problems with machine learning and deep learning. Using real-world examples that leverage the popular Python machine learning ecosystem, this book is your perfect companion for learning the art and science of machine learning to become a successful practitioner. The concepts, techniques, tools, frameworks, and methodologies used in this book will teach you how to think, design, build, and execute machine learning systems and projects successfully. Practical Machine Learning with Python follows a structured and comprehensive three-tiered approach packed with hands-on examples and code. Part 1 focuses on understanding machine learning concepts and tools. This includes machine learning basics with a broad overview of algorithms, techniques, concepts and applications, followed by a tour of the entire Python machine learning ecosystem. Brief guides for useful machine learning tools, libraries and frameworks are also covered. Part 2 details standard machine learning pipelines, with an emphasis on data processing analysis, feature engineering, and modeling. You will learn how to process, wrangle, summarize and visualize data in its various forms. Feature engineering and selection methodologies will be covered in detail with real-world datasets followed by model building, tuning, interpretation and deployment. Part 3 explores multiple real-world case studies spanning diverse domains and industries like retail, transportation, movies, music, marketing, computer vision and finance. For each case study, you will learn the application of various machine learning techniques and methods. The hands-on examples will help you become familiar with state-of-the-art machine learning tools and techniques and understand what algorithms are best suited for any problem. Practical Machine Learning with Python will empower you to start solving your own problems with machine learning today! What You'll Learn Execute end-to-end machine learning projects and systems Implement hands-on examples with industry standard, open source, robust machine learning tools and frameworks Review case studies depicting applications of machine learning and deep learning on diverse domains and industries Apply a wide range of machine learning models including regression, classification, and clustering. Understand and apply the latest models and methodologies from deep learning including CNNs, RNNs, LSTMs and transfer learning. Who This Book Is For IT professionals, analysts, developers, data scientists, engineers, graduate students
This book constitutes the proceedings of the 7th International Conference on Business Intelligence, CBI 2022, which took place in Khouribga, Morocco, during May 26-28, 2022. The 23 full papers included in this book were carefully reviewed and selected from a total of 68 submissions. They were organized in topical sections as follows: decision support and artificial intelligence; business intelligence and database; and optimization and dynamic programming.
This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.
Discover best practices for data analysis and software development in R and start on the path to becoming a fully-fledged data scientist. Updated for the R 4.0 release, this book teaches you techniques for both data manipulation and visualization and shows you the best way for developing new software packages for R. Beginning Data Science in R 4, Second Edition details how data science is a combination of statistics, computational science, and machine learning. You'll see how to efficiently structure and mine data to extract useful patterns and build mathematical models. This requires computational methods and programming, and R is an ideal programming language for this. Modern data analysis requires computational skills and usually a minimum of programming. After reading and using this book, you'll have what you need to get started with R programming with data science applications. Source code will be available to support your next projects as well. Source code is available at github.com/Apress/beg-data-science-r4. What You Will Learn Perform data science and analytics using statistics and the R programming language Visualize and explore data, including working with large data sets found in big data Build an R package Test and check your code Practice version control Profile and optimize your code Who This Book Is For Those with some data science or analytics background, but not necessarily experience with the R programming language.
This book is as an extension of previous book "Computer Vision and Machine Learning in Agriculture" for academicians, researchers, and professionals interested in solving the problems of agricultural plants and products for boosting production by rendering the advanced machine learning including deep learning tools and techniques to computer vision algorithms. The book contains 15 chapters. The first three chapters are devoted to crops harvesting, weed, and multi-class crops detection with the help of robots and UAVs through machine learning and deep learning algorithms for smart agriculture. Next, two chapters describe agricultural data retrievals and data collections. Chapters 6, 7, 8 and 9 focuses on yield estimation, crop maturity detection, agri-food product quality assessment, and medicinal plant recognition, respectively. The remaining six chapters concentrates on optimized disease recognition through computer vision-based machine and deep learning strategies.
This book includes the proceedings of the third workshop on recommender systems in fashion and retail (2021), and it aims to present a state-of-the-art view of the advancements within the field of recommendation systems with focused application to e-commerce, retail, and fashion by presenting readers with chapters covering contributions from academic as well as industrial researchers active within this emerging new field. Recommender systems are often used to solve different complex problems in this scenario, such as product recommendations, size and fit recommendations, and social media-influenced recommendations (outfits worn by influencers).
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. This book will be an invaluable resource to understand the importance of machine learning and data mining in establishing computer and cyber security. It emphasizes important security aspects associated with computer and cyber security along with the analysis of machine learning and data mining based solutions. The book also highlights the future research domains in which these solutions can be applied. Furthermore, it caters to the needs of IT professionals, researchers, faculty members, scientists, graduate students, research scholars and software developers who seek to carry out research and develop combating solutions in the area of cyber security using machine learning based approaches. It is an extensive source of information for the readers belonging to the field of Computer Science and Engineering, and Cyber Security professionals. Key Features: This book contains examples and illustrations to demonstrate the principles, algorithms, challenges and applications of machine learning and data mining for computer and cyber security. It showcases important security aspects and current trends in the field. It provides an insight of the future research directions in the field. Contents of this book help to prepare the students for exercising better defense in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation using machine learning based approaches in better manner.
This Open Access proceedings presents a good overview of the current research landscape of assembly, handling and industrial robotics. The objective of MHI Colloquium is the successful networking at both academic and management level. Thereby, the colloquium focuses an academic exchange at a high level in order to distribute the obtained research results, to determine synergy effects and trends, to connect the actors in person and in conclusion, to strengthen the research field as well as the MHI community. In addition, there is the possibility to become acquatined with the organizing institute. Primary audience is formed by members of the scientific society for assembly, handling and industrial robotics (WGMHI).
This book presents an integrated collection of representative approaches for scaling up machine learning and data mining methods on parallel and distributed computing platforms. Demand for parallelizing learning algorithms is highly task-specific: in some settings it is driven by the enormous dataset sizes, in others by model complexity or by real-time performance requirements. Making task-appropriate algorithm and platform choices for large-scale machine learning requires understanding the benefits, trade-offs and constraints of the available options. Solutions presented in the book cover a range of parallelization platforms from FPGAs and GPUs to multi-core systems and commodity clusters, concurrent programming frameworks including CUDA, MPI, MapReduce and DryadLINQ, and learning settings (supervised, unsupervised, semi-supervised and online learning). Extensive coverage of parallelization of boosted trees, SVMs, spectral clustering, belief propagation and other popular learning algorithms, and deep dives into several applications, make the book equally useful for researchers, students and practitioners.
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning paradigm, i.e., trial-and-error. Combined with the deep neural networks, deep RL become so powerful that many complicated systems can be automatically managed by AI agents at a superhuman level. On the other hand, CPSs are envisioned to revolutionize our society in the near future. Such examples include the emerging smart buildings, intelligent transportation, and electric grids. However, the conventional hand-programming controller in CPSs could neither handle the increasing complexity of the system, nor automatically adapt itself to new situations that it has never encountered before. The problem of how to apply the existing deep RL algorithms, or develop new RL algorithms to enable the real-time adaptive CPSs, remains open. This book aims to establish a linkage between the two domains by systematically introducing RL foundations and algorithms, each supported by one or a few state-of-the-art CPS examples to help readers understand the intuition and usefulness of RL techniques. Features Introduces reinforcement learning, including advanced topics in RL Applies reinforcement learning to cyber-physical systems and cybersecurity Contains state-of-the-art examples and exercises in each chapter Provides two cybersecurity case studies Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies is an ideal text for graduate students or junior/senior undergraduates in the fields of science, engineering, computer science, or applied mathematics. It would also prove useful to researchers and engineers interested in cybersecurity, RL, and CPS. The only background knowledge required to appreciate the book is a basic knowledge of calculus and probability theory.
This book gathers selected high-quality research papers presented at International Conference on Renewable Technologies in Engineering (ICRTE 2021) organized by Manav Rachna International Institute of Research & Studies, Faridabad, Haryana, India, during 15-16 April 2021. The book includes conference papers on the theme "Computational Techniques for Renewable Energy Optimization", which aims to bring together leading academic scientists, researchers and research scholars to exchange and share their experiences and research results on all aspects of renewable energy integration, planning, control and optimization. It also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends and concerns as well as practical challenges encountered and solutions adopted in the fields of renewable energy and resources.
This book presents a step by step design approach to develop and implement an IoT system starting from sensor, interfacing to embedded processor, wireless communication, uploading measured data to cloud including data visualization along with machine learnings and artificial intelligence. The book will be extremely useful towards a hands-on approach of designing and fabricating an IoT system especially for upper undergraduate, master and PhD students, researchers, engineers and practitioners.
This two volume set (CCIS 1451 and 1452) constitutes the refereed proceedings of the 7th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2021 held in Taiyuan, China, in September 2021.The 81 papers presented in these two volumes were carefully reviewed and selected from 256 submissions. The papers are organized in topical sections on big data management and applications; social media and recommendation systems; infrastructure for data science; basic theory and techniques for data science; machine learning for data science; multimedia data management and analysis; social media and recommendation systems; data security and privacy; applications of data science; education research, methods and materials for data science and engineering; research demo.
This four-volume set of LNCS 12821, LNCS 12822, LNCS 12823 and LNCS 12824, constitutes the refereed proceedings of the 16th International Conference on Document Analysis and Recognition, ICDAR 2021, held in Lausanne, Switzerland in September 2021. The 182 full papers were carefully reviewed and selected from 340 submissions, and are presented with 13 competition reports. The papers are organized into the following topical sections: extracting document semantics, text and symbol recognition, document analysis systems, office automation, signature verification, document forensics and provenance analysis, pen-based document analysis, human document interaction, document synthesis, and graphs recognition.
This four-volume set of LNCS 12821, LNCS 12822, LNCS 12823 and LNCS 12824, constitutes the refereed proceedings of the 16th International Conference on Document Analysis and Recognition, ICDAR 2021, held in Lausanne, Switzerland in September 2021. The 182 full papers were carefully reviewed and selected from 340 submissions, and are presented with 13 competition reports. The papers are organized into the following topical sections: scene text detection and recognition, document classification, gold-standard benchmarks and data sets, historical document analysis, and handwriting recognition. In addition, the volume contains results of 13 scientific competitions held during ICDAR 2021.
This book provides a tutorial introduction to modern techniques for representing and reasoning about qualitative preferences with respect to a set of alternatives. The syntax and semantics of several languages for representing preference languages, including CP-nets, TCP-nets, CI-nets, and CP-theories, are reviewed. Some key problems in reasoning about preferences are introduced, including determining whether one alternative is preferred to another, or whether they are equivalent, with respect to a given set of preferences. These tasks can be reduced to model checking in temporal logic. Specifically, an induced preference graph that represents a given set of preferences can be efficiently encoded using a Kripke Structure for Computational Tree Logic (CTL). One can translate preference queries with respect to a set of preferences into an equivalent set of formulae in CTL, such that the CTL formula is satisfied whenever the preference query holds. This allows us to use a model checker to reason about preferences, i.e., answer preference queries, and to obtain a justification as to why a preference query is satisfied (or not) with respect to a set of preferences. This book defines the notions of the equivalence of two sets of preferences, including what it means for one set of preferences to subsume another, and shows how to answer preferential equivalence and subsumption queries using model checking. Furthermore, this book demontrates how to generate alternatives ordered by preference, along with providing ways to deal with inconsistent preference specifications. A description of CRISNER-an open source software implementation of the model checking approach to qualitative preference reasoning in CP-nets, TCP-nets, and CP-theories is included, as well as examples illustrating its use.
This book highlights artificial intelligence algorithms used in implementation of automated pricing. It presents the process for building automated pricing models from crawl data, preprocessed data to implement models, and their applications. The book also focuses on machine learning and deep learning methods for pricing, including from regression methods to hybrid and ensemble methods. The computational experiments are presented to illustrate the pricing processes and models.
This book discusses some of the innumerable ways in which computational methods can be used to facilitate research in biology and medicine - from storing enormous amounts of biological data to solving complex biological problems and enhancing treatment of various grave diseases.
MemComputing is a new computing paradigm that employs time non-locality (memory) to both process and store information. This book, written by the originator of this paradigm, explains the main ideas behind MemComputing, explores its theoretical foundations, and shows its applicability to a wide variety of combinatorial optimization problems, machine learning, and quantum mechanics. The book is ideal for graduate students in Physics, Computer Science, Electrical Engineering, and Mathematics, as well as researchers in both academia and industry interested in unconventional computing. The author relies on extensive margin notes, important remarks, and many illustrations to better explain the main concepts and clarify jargon, making the book as self-contained as possible. The reader will be guided from the basic notions to the more advanced ones with an always clear and engaging writing style. Along the way, the reader will appreciate the advantages of this computing paradigm and the major differences that set it apart from the prevailing Turing model of computation, and even quantum computing.
The book presents a collection of peer-reviewed articles from the International Conference on Advances and Applications of Artificial Intelligence and Machine Learning - ICAAAIML 2020. The book covers research in artificial intelligence, machine learning, and deep learning applications in healthcare, agriculture, business, and security. This volume contains research papers from academicians, researchers as well as students. There are also papers on core concepts of computer networks, intelligent system design and deployment, real-time systems, wireless sensor networks, sensors and sensor nodes, software engineering, and image processing. This book will be a valuable resource for students, academics, and practitioners in the industry working on AI applications.
This book presents the outcome of two-day 2nd International e-Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2020) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, from December 18-19, 2020. The book extensively covers recent research in artificial intelligence (AI) that knit together nature-inspired algorithms, evolutionary computing, fuzzy systems, computational intelligence, machine learning, deep learning, etc., which is very useful while dealing with real problems due to their model-free structure, learning ability, and flexible approach. These techniques mimic human thinking and decision-making abilities to produce systems that are intelligent, efficient, cost-effective, and fast. The book provides a friendly and informative treatment of the topics which makes this book an ideal reference for both beginners and experienced researchers.
This open access book covers the use of data science, including advanced machine learning, big data analytics, Semantic Web technologies, natural language processing, social media analysis, time series analysis, among others, for applications in economics and finance. In addition, it shows some successful applications of advanced data science solutions used to extract new knowledge from data in order to improve economic forecasting models. The book starts with an introduction on the use of data science technologies in economics and finance and is followed by thirteen chapters showing success stories of the application of specific data science methodologies, touching on particular topics related to novel big data sources and technologies for economic analysis (e.g. social media and news); big data models leveraging on supervised/unsupervised (deep) machine learning; natural language processing to build economic and financial indicators; and forecasting and nowcasting of economic variables through time series analysis. This book is relevant to all stakeholders involved in digital and data-intensive research in economics and finance, helping them to understand the main opportunities and challenges, become familiar with the latest methodological findings, and learn how to use and evaluate the performances of novel tools and frameworks. It primarily targets data scientists and business analysts exploiting data science technologies, and it will also be a useful resource to research students in disciplines and courses related to these topics. Overall, readers will learn modern and effective data science solutions to create tangible innovations for economic and financial applications. |
You may like...
Application of Machine Learning in…
Mohammad Ayoub Khan, Rijwan Khan, …
Paperback
R3,433
Discovery Miles 34 330
Hamiltonian Monte Carlo Methods in…
Tshilidzi Marwala, Rendani Mbuvha, …
Paperback
R3,518
Discovery Miles 35 180
Cognitive Data Models for Sustainable…
Siddhartha Bhattacharyya, Naba Kumar Mondal, …
Paperback
R2,770
Discovery Miles 27 700
Adversarial Robustness for Machine…
Pin-Yu Chen, Cho-Jui Hsieh
Paperback
R2,204
Discovery Miles 22 040
Artificial Intelligence, Machine…
Shikha Jain, Kavita Pandey, …
Paperback
R2,958
Discovery Miles 29 580
Deep Learning for Sustainable…
Ramesh Poonia, Vijander Singh, …
Paperback
R2,957
Discovery Miles 29 570
|