![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
This book is a compilation of peer reviewed papers presented at International Conference on Machine Intelligence and Data Science Applications (MIDAS 2021), held in Comilla University, Cumilla, Bangladesh during 26 - 27 December 2021. The book covers applications in various fields like image processing, natural language processing, computer vision, sentiment analysis, speech and gesture analysis, etc. It also includes interdisciplinary applications like legal, healthcare, smart society, cyber physical system and smart agriculture, etc. The book is a good reference for computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.
This two volume set (CCIS 1628 and 1629) constitutes the refereed proceedings of the 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022 held in Chengdu, China, in August, 2022. The 65 full papers and 26 short papers presented in these two volumes were carefully reviewed and selected from 261 submissions. The papers are organized in topical sections on: Big Data Mining and Knowledge Management; Machine Learning for Data Science; Multimedia Data Management and Analysis.
This open access book constitutes the proceedings of the 18th International Conference on Intelligent Data Analysis, IDA 2020, held in Konstanz, Germany, in April 2020. The 45 full papers presented in this volume were carefully reviewed and selected from 114 submissions. Advancing Intelligent Data Analysis requires novel, potentially game-changing ideas. IDA's mission is to promote ideas over performance: a solid motivation can be as convincing as exhaustive empirical evaluation.
The book presents a collection of peer-reviewed articles from the International Conference on Advances and Applications of Artificial Intelligence and Machine Learning - ICAAAIML 2020. The book covers research in artificial intelligence, machine learning, and deep learning applications in healthcare, agriculture, business, and security. This volume contains research papers from academicians, researchers as well as students. There are also papers on core concepts of computer networks, intelligent system design and deployment, real-time systems, wireless sensor networks, sensors and sensor nodes, software engineering, and image processing. This book will be a valuable resource for students, academics, and practitioners in the industry working on AI applications.
With the development of Big Data platforms for managing massive amount of data and wide availability of tools for processing these data, the biggest limitation is the lack of trained experts who are qualified to process and interpret the results. This textbook is intended for graduate students and experts using methods of cluster analysis and applications in various fields. Suitable for an introductory course on cluster analysis or data mining, with an in-depth mathematical treatment that includes discussions on different measures, primitives (points, lines, etc.) and optimization-based clustering methods, Cluster Analysis and Applications also includes coverage of deep learning based clustering methods. With clear explanations of ideas and precise definitions of concepts, accompanied by numerous examples and exercises together with Mathematica programs and modules, Cluster Analysis and Applications may be used by students and researchers in various disciplines, working in data analysis or data science.
This book covers different machine learning techniques such as artificial neural network, support vector machine, rough set theory and deep learning. It points out the difference between the techniques and their suitability for specific applications. This book also describes different applications of machine learning techniques for industrial problems. The book includes several case studies, helping researchers in academia and industries aspiring to use machine learning for solving practical industrial problems.
This two-volume set (CCIS 1567-1568) constitutes the refereed proceedings of the 6h International Conference on Computer Vision and Image Processing, CVIP 2021, held in Rupnagar, India, in December 2021. The 70 full papers and 20 short papers were carefully reviewed and selected from the 260 submissions. The papers present recent research on such topics as biometrics, forensics, content protection, image enhancement/super-resolution/restoration, motion and tracking, image or video retrieval, image, image/video processing for autonomous vehicles, video scene understanding, human-computer interaction, document image analysis, face, iris, emotion, sign language and gesture recognition, 3D image/video processing, action and event detection/recognition, medical image and video analysis, vision-based human GAIT analysis, remote sensing, and more.
The two-volume proceedings CCIS 1613 + 1614 constitute revised selected papers from the 6th International Conference on Advances in Computing and Data Sciences, ICACDS 2022, which was held in Kurnool, India in April 2022. The total of 69 full papers presented in the proceedings was carefully reviewed and selected from 411 submissions. The papers focus on advances of next generation computing technologies in the areas of advanced computing and data sciences
The two-volume proceedings CCIS 1613 + 1614 constitute revised selected papers from the 6th International Conference on Advances in Computing and Data Sciences, ICACDS 2022, which was held in Kurnool, India in April 2022.The total of 69 full papers presented in the proceedings was carefully reviewed and selected from 411 submissions. The papers focus on advances of next generation computing technologies in the areas of advanced computing and data sciences.
This book presents the outcome of two-day 2nd International e-Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2020) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, from December 18-19, 2020. The book extensively covers recent research in artificial intelligence (AI) that knit together nature-inspired algorithms, evolutionary computing, fuzzy systems, computational intelligence, machine learning, deep learning, etc., which is very useful while dealing with real problems due to their model-free structure, learning ability, and flexible approach. These techniques mimic human thinking and decision-making abilities to produce systems that are intelligent, efficient, cost-effective, and fast. The book provides a friendly and informative treatment of the topics which makes this book an ideal reference for both beginners and experienced researchers.
This two-volume set, LNCS 13426 and 13427, constitutes the thoroughly refereed proceedings of the 33rd International Conference on Database and Expert Systems Applications, DEXA 2022, held in Vienna in August 2022.The 43 full papers presented together with 20 short papers in these volumes were carefully reviewed and selected from a total of 120 submissions. The papers are organized around the following topics: Big Data Management and Analytics, Consistency, Integrity, Quality of Data, Constraint Modelling and Processing, Database Federation and Integration, Interoperability, Multi-Databases, Data and Information Semantics, Data Integration, Metadata Management, and Interoperability, Data Structures and much more.
This volume contains the proceedings of the European Conference on
Machine Learning 1994, which continues the tradition of earlier
meetings and which is a major forum for the presentation of the
latest and most significant results in machine learning.
This comprehensive overview of IoT systems architecture includes in-depth treatment of all key components: edge, communications, cloud, data processing, security, management, and uses. Internet of Things: Concepts and System Design provides a reference and foundation for students and practitioners that they can build upon to design IoT systems and to understand how the specific parts they are working on fit into and interact with the rest of the system. This is especially important since IoT is a multidisciplinary area that requires diverse skills and knowledge including: sensors, embedded systems, real-time systems, control systems, communications, protocols, Internet, cloud computing, large-scale distributed processing and storage systems, AI and ML, (preferably) coupled with domain experience in the area where it is to be applied, such as building or manufacturing automation. Written in a reader-minded approach that starts by describing the problem (why should I care?), placing it in context (what does this do and where/how does it fit in the great scheme of things?) and then describing salient features of solutions (how does it work?), this book covers the existing body of knowledge and design practices, but also offers the author's insights and articulation of common attributes and salient features of solutions such as IoT information modeling and platform characteristics.
This book is a collection of the most recent approaches that combine metaheuristics and machine learning. Some of the methods considered in this book are evolutionary, swarm, machine learning, and deep learning. The chapters were classified based on the content; then, the sections are thematic. Different applications and implementations are included; in this sense, the book provides theory and practical content with novel machine learning and metaheuristic algorithms. The chapters were compiled using a scientific perspective. Accordingly, the book is primarily intended for undergraduate and postgraduate students of Science, Engineering, and Computational Mathematics and is useful in courses on Artificial Intelligence, Advanced Machine Learning, among others. Likewise, the book is useful for research from the evolutionary computation, artificial intelligence, and image processing communities.
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
This volume offers a wealth of interdisciplinary approaches to artificial intelligence, machine learning and optimization tools, which contribute to the optimization of urban features towards forming smart, sustainable, and livable future cities. Special features include: New research on the design of city elements and smart systems with respect to new technologies and scientific thinking Discussions on the theoretical background that lead to smart cities for the future New technologies and principles of research that can promote ideas of artificial intelligence and machine learning in optimized urban environments The book engages students and researchers in the subjects of artificial intelligence, machine learning, and optimization tools in smart sustainable cities as eminent international experts contribute their research results and thinking in its chapters. Overall, its audience can benefit from a variety of disciplines including, architecture, engineering, physics, mathematics, computer science, and related fields.
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
Get a hands-on introduction to Transformer architecture using the Hugging Face library. This book explains how Transformers are changing the AI domain, particularly in the area of natural language processing. This book covers Transformer architecture and its relevance in natural language processing (NLP). It starts with an introduction to NLP and a progression of language models from n-grams to a Transformer-based architecture. Next, it offers some basic Transformers examples using the Google colab engine. Then, it introduces the Hugging Face ecosystem and the different libraries and models provided by it. Moving forward, it explains language models such as Google BERT with some examples before providing a deep dive into Hugging Face API using different language models to address tasks such as sentence classification, sentiment analysis, summarization, and text generation. After completing Introduction to Transformers for NLP, you will understand Transformer concepts and be able to solve problems using the Hugging Face library. What You Will Learn Understand language models and their importance in NLP and NLU (Natural Language Understanding) Master Transformer architecture through practical examples Use the Hugging Face library in Transformer-based language models Create a simple code generator in Python based on Transformer architecture Who This Book Is ForData Scientists and software developers interested in developing their skills in NLP and NLU (Natural Language Understanding)
Hawkes processes are studied and used in a wide range of disciplines: mathematics, social sciences, and earthquake modelling, to name a few. This book presents a selective coverage of the core and recent topics in the broad field of Hawkes processes. It consists of three parts. Parts I and II summarise and provide an overview of core theory (including key simulation methods) and inference methods, complemented by a selection of recent research developments and applications. Part III is devoted to case studies in seismology and finance that connect the core theory and inference methods to practical scenarios. This book is designed primarily for applied probabilists, statisticians, and machine learners. However, the mathematical prerequisites have been kept to a minimum so that the content will also be of interest to undergraduates in advanced mathematics and statistics, as well as machine learning practitioners. Knowledge of matrix theory with basics of probability theory, including Poisson processes, is considered a prerequisite. Colour-blind-friendly illustrations are included.
This is the first book on synthetic data for deep learning, and its breadth of coverage may render this book as the default reference on synthetic data for years to come. The book can also serve as an introduction to several other important subfields of machine learning that are seldom touched upon in other books. Machine learning as a discipline would not be possible without the inner workings of optimization at hand. The book includes the necessary sinews of optimization though the crux of the discussion centers on the increasingly popular tool for training deep learning models, namely synthetic data. It is expected that the field of synthetic data will undergo exponential growth in the near future. This book serves as a comprehensive survey of the field. In the simplest case, synthetic data refers to computer-generated graphics used to train computer vision models. There are many more facets of synthetic data to consider. In the section on basic computer vision, the book discusses fundamental computer vision problems, both low-level (e.g., optical flow estimation) and high-level (e.g., object detection and semantic segmentation), synthetic environments and datasets for outdoor and urban scenes (autonomous driving), indoor scenes (indoor navigation), aerial navigation, and simulation environments for robotics. Additionally, it touches upon applications of synthetic data outside computer vision (in neural programming, bioinformatics, NLP, and more). It also surveys the work on improving synthetic data development and alternative ways to produce it such as GANs. The book introduces and reviews several different approaches to synthetic data in various domains of machine learning, most notably the following fields: domain adaptation for making synthetic data more realistic and/or adapting the models to be trained on synthetic data and differential privacy for generating synthetic data with privacy guarantees. This discussion is accompanied by an introduction into generative adversarial networks (GAN) and an introduction to differential privacy.
This two-volume set LNCS 13344 and 13345 constitutes the proceedings of the 13th International Conference on Advances in Swarm Intelligence, ICSI 2022, which took place in Xi'an, China, in July 2022. The theme of this year's conference was "Serving Life with Swarm Intelligence". The 85 full papers presented were carefully reviewed and selected from 171 submissions. The papers of the second part cover topics such as: Swarm Robotics and Multi-agent System; Deep Neural Networks; Machine Learning; Data Mining; Other Optimization Applications; ICSI-OC'2022: Competition on Single Objective Bounded Optimization Problems; Swarm Intelligence and Nature-Inspired Computing; Swarm-based Computing Algorithms for Optimization; Particle Swarm Optimization; Ant Colony Optimization; Genetic Algorithm and Evolutionary Computation; Fireworks Algorithms; Brain Storm Optimization Algorithm; Swarm Intelligence Approach-based Applications; Multi-Objective Optimization.
This book includes a collection of peer-reviewed best selected research papers presented at the Third International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2022), organized by Department of Computer Science and Engineering, National Institute of Technology, Warangal, Telangana, India, during 15-16 January 2022. This book presents recent innovations in the field of scalable distributed systems in addition to cutting edge research in the field of Internet of Things (IoT) and blockchain in distributed environments.
The two-volume set LNCS 13373 and 13374 constitutes the papers of several workshops which were held in conjunction with the 21st International Conference on Image Analysis and Processing, ICIAP 2022, held in Lecce, Italy, in May 2022. The 96 revised full papers presented in the proceedings set were carefully reviewed and selected from 157 submissions. ICIAP 2022 presents the following Sixteen workshops: Volume I: GoodBrother workshop on visual intelligence for active and assisted livingParts can worth like the Whole - PART 2022Workshop on Fine Art Pattern Extraction and Recognition - FAPERWorkshop on Intelligent Systems in Human and Artificial Perception - ISHAPE 2022Artificial Intelligence and Radiomics in Computer-Aided Diagnosis - AIRCADDeep-Learning and High Performance Computing to Boost Biomedical Applications - DeepHealth Volume II: Human Behaviour Analysis for Smart City Environment Safety - HBAxSCESBinary is the new Black (and White): Recent Advances on Binary Image ProcessingArtificial Intelligence for preterm infants' healthCare - AI-careTowards a Complete Analysis of People: From Face and Body to Clothes - T-CAPArtificial Intelligence for Digital Humanities - AI4DHMedical Transformers - MEDXFLearning in Precision Livestock Farming - LPLFWorkshop on Small-Drone Surveillance, Detection and Counteraction Techniques - WOSDETCMedical Imaging Analysis For Covid-19 - MIACOVID 2022Novel Benchmarks and Approaches for Real-World Continual Learning - CL4REAL
Agricultural systems are uniquely complex systems, given that agricultural systems are parts of natural and ecological systems. Those aspects bring in a substantial degree of uncertainty in system operation. Also, impact factors, such as weather factors, are critical in agricultural systems but these factors are uncontrollable in system management. Modern agriculture has been evolving through precision agriculture beginning in the late 1980s and biotechnological innovations in the early 2000s. Precision agriculture implements site-specific crop production management by integrating agricultural mechanization and information technology in geographic information system (GIS), global navigation satellite system (GNSS), and remote sensing. Now, precision agriculture is set to evolve into smart agriculture with advanced systematization, informatization, intelligence and automation. From precision agriculture to smart agriculture, there is a substantial amount of specific control and communication problems that have been investigated and will continue to be studied. In this book, the core ideas and methods from control problems in agricultural production systems are extracted, and a system view of agricultural production is formulated for the analysis and design of management strategies to control and optimize agricultural production systems while exploiting the intrinsic feedback information-exchanging mechanisms. On this basis, the theoretical framework of agricultural cybernetics is established to predict and control the behavior of agricultural production systems through control theory.
Quantum-enhanced machine learning refers to quantum algorithms that solve tasks in machine learning, thereby improving a classical machine learning method. Such algorithms typically require one to encode the given classical dataset into a quantum computer, so as to make it accessible for quantum information processing. After this, quantum information processing routines can be applied and the result of the quantum computation is read out by measuring the quantum system. While many proposals of quantum machine learning algorithms are still purely theoretical and require a full-scale universal quantum computer to be tested, others have been implemented on small-scale or special purpose quantum devices. |
You may like...
Digital Earth - Cyber Threats, Privacy…
It Governance Publishing
Paperback
R631
Discovery Miles 6 310
Malware Forensics - Investigating and…
Cameron H. Malin, Eoghan Casey, …
Paperback
R1,539
Discovery Miles 15 390
The Basics of Cyber Safety - Computer…
John Sammons, Michael Cross
Paperback
R759
Discovery Miles 7 590
|