![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
This book describes a novel machine-learning based approach to answer some traditional archaeological problems, relating to archaeological site detection and site locational preferences. Institutional data collected from six Swiss regions (Zurich, Aargau, Grisons, Vaud, Geneva and Fribourg) have been analyzed with an original conceptual framework based on the Random Forest algorithm. It is shown how the algorithm can assist in the modelling process in connection with heterogeneous, incomplete archaeological datasets and related cultural heritage information. Moreover, an in-depth review of past and more recent works of quantitative methods for archaeological predictive modelling is provided. The book guides the readers to set up their own protocol for: i) dealing with uncertain data, ii) predicting archaeological site location, iii) establishing environmental features importance, iv) and suggest a model validation procedure. It addresses both academics and professionals in archaeology and cultural heritage management, and offers a source of inspiration for future research directions in the field of digital humanities and computational archaeology.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2022, held in Paris, France, during September 21-23, 2022. The 25 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections as follows: Privacy models; tabular data; disclosure risk assessment and record linkage; privacy-preserving protocols; unstructured and mobility data; synthetic data; machine learning and privacy; and case studies.
This book is a compilation of peer reviewed papers presented at International Conference on Machine Intelligence and Data Science Applications (MIDAS 2021), held in Comilla University, Cumilla, Bangladesh during 26 - 27 December 2021. The book covers applications in various fields like image processing, natural language processing, computer vision, sentiment analysis, speech and gesture analysis, etc. It also includes interdisciplinary applications like legal, healthcare, smart society, cyber physical system and smart agriculture, etc. The book is a good reference for computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.
This two volume set (CCIS 1628 and 1629) constitutes the refereed proceedings of the 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022 held in Chengdu, China, in August, 2022. The 65 full papers and 26 short papers presented in these two volumes were carefully reviewed and selected from 261 submissions. The papers are organized in topical sections on: Big Data Mining and Knowledge Management; Machine Learning for Data Science; Multimedia Data Management and Analysis.
This open access book constitutes the proceedings of the 18th International Conference on Intelligent Data Analysis, IDA 2020, held in Konstanz, Germany, in April 2020. The 45 full papers presented in this volume were carefully reviewed and selected from 114 submissions. Advancing Intelligent Data Analysis requires novel, potentially game-changing ideas. IDA's mission is to promote ideas over performance: a solid motivation can be as convincing as exhaustive empirical evaluation.
The book presents a collection of peer-reviewed articles from the International Conference on Advances and Applications of Artificial Intelligence and Machine Learning - ICAAAIML 2020. The book covers research in artificial intelligence, machine learning, and deep learning applications in healthcare, agriculture, business, and security. This volume contains research papers from academicians, researchers as well as students. There are also papers on core concepts of computer networks, intelligent system design and deployment, real-time systems, wireless sensor networks, sensors and sensor nodes, software engineering, and image processing. This book will be a valuable resource for students, academics, and practitioners in the industry working on AI applications.
With the development of Big Data platforms for managing massive amount of data and wide availability of tools for processing these data, the biggest limitation is the lack of trained experts who are qualified to process and interpret the results. This textbook is intended for graduate students and experts using methods of cluster analysis and applications in various fields. Suitable for an introductory course on cluster analysis or data mining, with an in-depth mathematical treatment that includes discussions on different measures, primitives (points, lines, etc.) and optimization-based clustering methods, Cluster Analysis and Applications also includes coverage of deep learning based clustering methods. With clear explanations of ideas and precise definitions of concepts, accompanied by numerous examples and exercises together with Mathematica programs and modules, Cluster Analysis and Applications may be used by students and researchers in various disciplines, working in data analysis or data science.
This book covers different machine learning techniques such as artificial neural network, support vector machine, rough set theory and deep learning. It points out the difference between the techniques and their suitability for specific applications. This book also describes different applications of machine learning techniques for industrial problems. The book includes several case studies, helping researchers in academia and industries aspiring to use machine learning for solving practical industrial problems.
This two-volume set (CCIS 1567-1568) constitutes the refereed proceedings of the 6h International Conference on Computer Vision and Image Processing, CVIP 2021, held in Rupnagar, India, in December 2021. The 70 full papers and 20 short papers were carefully reviewed and selected from the 260 submissions. The papers present recent research on such topics as biometrics, forensics, content protection, image enhancement/super-resolution/restoration, motion and tracking, image or video retrieval, image, image/video processing for autonomous vehicles, video scene understanding, human-computer interaction, document image analysis, face, iris, emotion, sign language and gesture recognition, 3D image/video processing, action and event detection/recognition, medical image and video analysis, vision-based human GAIT analysis, remote sensing, and more.
The two-volume proceedings CCIS 1613 + 1614 constitute revised selected papers from the 6th International Conference on Advances in Computing and Data Sciences, ICACDS 2022, which was held in Kurnool, India in April 2022. The total of 69 full papers presented in the proceedings was carefully reviewed and selected from 411 submissions. The papers focus on advances of next generation computing technologies in the areas of advanced computing and data sciences
The two-volume proceedings CCIS 1613 + 1614 constitute revised selected papers from the 6th International Conference on Advances in Computing and Data Sciences, ICACDS 2022, which was held in Kurnool, India in April 2022.The total of 69 full papers presented in the proceedings was carefully reviewed and selected from 411 submissions. The papers focus on advances of next generation computing technologies in the areas of advanced computing and data sciences.
This book presents the outcome of two-day 2nd International e-Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2020) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, from December 18-19, 2020. The book extensively covers recent research in artificial intelligence (AI) that knit together nature-inspired algorithms, evolutionary computing, fuzzy systems, computational intelligence, machine learning, deep learning, etc., which is very useful while dealing with real problems due to their model-free structure, learning ability, and flexible approach. These techniques mimic human thinking and decision-making abilities to produce systems that are intelligent, efficient, cost-effective, and fast. The book provides a friendly and informative treatment of the topics which makes this book an ideal reference for both beginners and experienced researchers.
This two-volume set, LNCS 13426 and 13427, constitutes the thoroughly refereed proceedings of the 33rd International Conference on Database and Expert Systems Applications, DEXA 2022, held in Vienna in August 2022.The 43 full papers presented together with 20 short papers in these volumes were carefully reviewed and selected from a total of 120 submissions. The papers are organized around the following topics: Big Data Management and Analytics, Consistency, Integrity, Quality of Data, Constraint Modelling and Processing, Database Federation and Integration, Interoperability, Multi-Databases, Data and Information Semantics, Data Integration, Metadata Management, and Interoperability, Data Structures and much more.
This volume contains the proceedings of the European Conference on
Machine Learning 1994, which continues the tradition of earlier
meetings and which is a major forum for the presentation of the
latest and most significant results in machine learning.
Learn to understand and implement the latest machine learning innovations to improve your investment performance Machine learning (ML) is changing virtually every aspect of our lives. Today, ML algorithms accomplish tasks that - until recently - only expert humans could perform. And finance is ripe for disruptive innovations that will transform how the following generations understand money and invest. In the book, readers will learn how to: Structure big data in a way that is amenable to ML algorithms Conduct research with ML algorithms on big data Use supercomputing methods and back test their discoveries while avoiding false positives Advances in Financial Machine Learning addresses real life problems faced by practitioners every day, and explains scientifically sound solutions using math, supported by code and examples. Readers become active users who can test the proposed solutions in their individual setting. Written by a recognized expert and portfolio manager, this book will equip investment professionals with the groundbreaking tools needed to succeed in modern finance.
This comprehensive overview of IoT systems architecture includes in-depth treatment of all key components: edge, communications, cloud, data processing, security, management, and uses. Internet of Things: Concepts and System Design provides a reference and foundation for students and practitioners that they can build upon to design IoT systems and to understand how the specific parts they are working on fit into and interact with the rest of the system. This is especially important since IoT is a multidisciplinary area that requires diverse skills and knowledge including: sensors, embedded systems, real-time systems, control systems, communications, protocols, Internet, cloud computing, large-scale distributed processing and storage systems, AI and ML, (preferably) coupled with domain experience in the area where it is to be applied, such as building or manufacturing automation. Written in a reader-minded approach that starts by describing the problem (why should I care?), placing it in context (what does this do and where/how does it fit in the great scheme of things?) and then describing salient features of solutions (how does it work?), this book covers the existing body of knowledge and design practices, but also offers the author's insights and articulation of common attributes and salient features of solutions such as IoT information modeling and platform characteristics.
This book is a collection of the most recent approaches that combine metaheuristics and machine learning. Some of the methods considered in this book are evolutionary, swarm, machine learning, and deep learning. The chapters were classified based on the content; then, the sections are thematic. Different applications and implementations are included; in this sense, the book provides theory and practical content with novel machine learning and metaheuristic algorithms. The chapters were compiled using a scientific perspective. Accordingly, the book is primarily intended for undergraduate and postgraduate students of Science, Engineering, and Computational Mathematics and is useful in courses on Artificial Intelligence, Advanced Machine Learning, among others. Likewise, the book is useful for research from the evolutionary computation, artificial intelligence, and image processing communities.
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
This volume offers a wealth of interdisciplinary approaches to artificial intelligence, machine learning and optimization tools, which contribute to the optimization of urban features towards forming smart, sustainable, and livable future cities. Special features include: New research on the design of city elements and smart systems with respect to new technologies and scientific thinking Discussions on the theoretical background that lead to smart cities for the future New technologies and principles of research that can promote ideas of artificial intelligence and machine learning in optimized urban environments The book engages students and researchers in the subjects of artificial intelligence, machine learning, and optimization tools in smart sustainable cities as eminent international experts contribute their research results and thinking in its chapters. Overall, its audience can benefit from a variety of disciplines including, architecture, engineering, physics, mathematics, computer science, and related fields.
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
Get a hands-on introduction to Transformer architecture using the Hugging Face library. This book explains how Transformers are changing the AI domain, particularly in the area of natural language processing. This book covers Transformer architecture and its relevance in natural language processing (NLP). It starts with an introduction to NLP and a progression of language models from n-grams to a Transformer-based architecture. Next, it offers some basic Transformers examples using the Google colab engine. Then, it introduces the Hugging Face ecosystem and the different libraries and models provided by it. Moving forward, it explains language models such as Google BERT with some examples before providing a deep dive into Hugging Face API using different language models to address tasks such as sentence classification, sentiment analysis, summarization, and text generation. After completing Introduction to Transformers for NLP, you will understand Transformer concepts and be able to solve problems using the Hugging Face library. What You Will Learn Understand language models and their importance in NLP and NLU (Natural Language Understanding) Master Transformer architecture through practical examples Use the Hugging Face library in Transformer-based language models Create a simple code generator in Python based on Transformer architecture Who This Book Is ForData Scientists and software developers interested in developing their skills in NLP and NLU (Natural Language Understanding)
Hawkes processes are studied and used in a wide range of disciplines: mathematics, social sciences, and earthquake modelling, to name a few. This book presents a selective coverage of the core and recent topics in the broad field of Hawkes processes. It consists of three parts. Parts I and II summarise and provide an overview of core theory (including key simulation methods) and inference methods, complemented by a selection of recent research developments and applications. Part III is devoted to case studies in seismology and finance that connect the core theory and inference methods to practical scenarios. This book is designed primarily for applied probabilists, statisticians, and machine learners. However, the mathematical prerequisites have been kept to a minimum so that the content will also be of interest to undergraduates in advanced mathematics and statistics, as well as machine learning practitioners. Knowledge of matrix theory with basics of probability theory, including Poisson processes, is considered a prerequisite. Colour-blind-friendly illustrations are included.
This is the first book on synthetic data for deep learning, and its breadth of coverage may render this book as the default reference on synthetic data for years to come. The book can also serve as an introduction to several other important subfields of machine learning that are seldom touched upon in other books. Machine learning as a discipline would not be possible without the inner workings of optimization at hand. The book includes the necessary sinews of optimization though the crux of the discussion centers on the increasingly popular tool for training deep learning models, namely synthetic data. It is expected that the field of synthetic data will undergo exponential growth in the near future. This book serves as a comprehensive survey of the field. In the simplest case, synthetic data refers to computer-generated graphics used to train computer vision models. There are many more facets of synthetic data to consider. In the section on basic computer vision, the book discusses fundamental computer vision problems, both low-level (e.g., optical flow estimation) and high-level (e.g., object detection and semantic segmentation), synthetic environments and datasets for outdoor and urban scenes (autonomous driving), indoor scenes (indoor navigation), aerial navigation, and simulation environments for robotics. Additionally, it touches upon applications of synthetic data outside computer vision (in neural programming, bioinformatics, NLP, and more). It also surveys the work on improving synthetic data development and alternative ways to produce it such as GANs. The book introduces and reviews several different approaches to synthetic data in various domains of machine learning, most notably the following fields: domain adaptation for making synthetic data more realistic and/or adapting the models to be trained on synthetic data and differential privacy for generating synthetic data with privacy guarantees. This discussion is accompanied by an introduction into generative adversarial networks (GAN) and an introduction to differential privacy.
This two-volume set LNCS 13344 and 13345 constitutes the proceedings of the 13th International Conference on Advances in Swarm Intelligence, ICSI 2022, which took place in Xi'an, China, in July 2022. The theme of this year's conference was "Serving Life with Swarm Intelligence". The 85 full papers presented were carefully reviewed and selected from 171 submissions. The papers of the second part cover topics such as: Swarm Robotics and Multi-agent System; Deep Neural Networks; Machine Learning; Data Mining; Other Optimization Applications; ICSI-OC'2022: Competition on Single Objective Bounded Optimization Problems; Swarm Intelligence and Nature-Inspired Computing; Swarm-based Computing Algorithms for Optimization; Particle Swarm Optimization; Ant Colony Optimization; Genetic Algorithm and Evolutionary Computation; Fireworks Algorithms; Brain Storm Optimization Algorithm; Swarm Intelligence Approach-based Applications; Multi-Objective Optimization.
This book includes a collection of peer-reviewed best selected research papers presented at the Third International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2022), organized by Department of Computer Science and Engineering, National Institute of Technology, Warangal, Telangana, India, during 15-16 January 2022. This book presents recent innovations in the field of scalable distributed systems in addition to cutting edge research in the field of Internet of Things (IoT) and blockchain in distributed environments. |
You may like...
Statistical Modeling in Machine Learning…
Tilottama Goswami, G. R. Sinha
Paperback
R3,925
Discovery Miles 39 250
Machine Learning for Planetary Science
Joern Helbert, Mario D'Amore, …
Paperback
R3,380
Discovery Miles 33 800
Deep Learning for Chest Radiographs…
Yashvi Chandola, Jitendra Virmani, …
Paperback
R2,060
Discovery Miles 20 600
Cyber-Physical Systems - AI and COVID-19
Ramesh Poonia, Basant Agarwal, …
Paperback
R2,817
Discovery Miles 28 170
Adversarial Robustness for Machine…
Pin-Yu Chen, Cho-Jui Hsieh
Paperback
R2,204
Discovery Miles 22 040
Deep Learning for Sustainable…
Ramesh Poonia, Vijander Singh, …
Paperback
R2,957
Discovery Miles 29 570
Optimum-Path Forest - Theory…
Alexandre Xavier Falcao, Joao Paulo Papa
Paperback
R3,037
Discovery Miles 30 370
Advanced Data Mining Tools and Methods…
Sourav De, Sandip Dey, …
Paperback
R2,944
Discovery Miles 29 440
|