![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
This two-volume set of LNCS 13393 and LNCS 13394 constitutes - in conjunction with the volume LNAI 13395 - the refereed proceedings of the 18th International Conference on Intelligent Computing, ICIC 2022, held in Xi'an, China, in August 2022. The 209 full papers of the three proceedings volumes were carefully reviewed and selected from 449 submissions.This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology.
This two-volume set LNCS 13398 and LNCS 13399 constitutes the refereed proceedings of the 17th International Conference on Parallel Problem Solving from Nature, PPSN 2022, held in Dortmund, Germany, in September 2022.The 87 revised full papers were carefully reviewed and selected from numerous submissions. The conference presents a study of computing methods derived from natural models. Amorphous Computing, Artificial Life, Artificial Ant Systems, Artificial Immune Systems, Artificial Neural Networks, Cellular Automata, Evolutionary Computation, Swarm Computing, Self-Organizing Systems, Chemical Computation, Molecular Computation, Quantum Computation, Machine Learning, and Artificial Intelligence approaches using Natural Computing methods are just some of the topics covered in this field.
This book provides a concise but comprehensive guide to representation, which forms the core of Machine Learning (ML). State-of-the-art practical applications involve a number of challenges for the analysis of high-dimensional data. Unfortunately, many popular ML algorithms fail to perform, in both theory and practice, when they are confronted with the huge size of the underlying data. Solutions to this problem are aptly covered in the book. In addition, the book covers a wide range of representation techniques that are important for academics and ML practitioners alike, such as Locality Sensitive Hashing (LSH), Distance Metrics and Fractional Norms, Principal Components (PCs), Random Projections and Autoencoders. Several experimental results are provided in the book to demonstrate the discussed techniques' effectiveness.
This book provides a first course on deep learning in computational mechanics. The book starts with a short introduction to machine learning's fundamental concepts before neural networks are explained thoroughly. It then provides an overview of current topics in physics and engineering, setting the stage for the book's main topics: physics-informed neural networks and the deep energy method. The idea of the book is to provide the basic concepts in a mathematically sound manner and yet to stay as simple as possible. To achieve this goal, mostly one-dimensional examples are investigated, such as approximating functions by neural networks or the simulation of the temperature's evolution in a one-dimensional bar. Each chapter contains examples and exercises which are either solved analytically or in PyTorch, an open-source machine learning framework for python.
As the 4th Industrial Revolution is restructuring human societal organization into, so-called, "Society 5.0", the field of Machine Learning (and its sub-field of Deep Learning) and related technologies is growing continuously and rapidly, developing in both itself and towards applications in many other disciplines. Researchers worldwide aim at incorporating cognitive abilities into machines, such as learning and problem solving. When machines and software systems have been enhanced with Machine Learning/Deep Learning components, they become better and more efficient at performing specific tasks. Consequently, Machine Learning/Deep Learning stands out as a research discipline due to its worldwide pace of growth in both theoretical advances and areas of application, while achieving very high rates of success and promising major impact in science, technology and society. The book at hand aims at exposing its readers to some of the most significant Advances in Machine Learning/Deep Learning-based Technologies. The book consists of an editorial note and an additional ten (10) chapters, all invited from authors who work on the corresponding chapter theme and are recognized for their significant research contributions. In more detail, the chapters in the book are organized into five parts, namely (i) Machine Learning/Deep Learning in Socializing and Entertainment, (ii) Machine Learning/Deep Learning in Education, (iii) Machine Learning/Deep Learning in Security, (iv) Machine Learning/Deep Learning in Time Series Forecasting, and (v) Machine Learning in Video Coding and Information Extraction. This research book is directed towards professors, researchers, scientists, engineers and students in Machine Learning/Deep Learning-related disciplines. It is also directed towards readers who come from other disciplines and are interested in becoming versed in some of the most recent Machine Learning/Deep Learning-based technologies. An extensive list of bibliographic references at the end of each chapter guides the readers to probe further into the application areas of interest to them.
This book describes a novel machine-learning based approach to answer some traditional archaeological problems, relating to archaeological site detection and site locational preferences. Institutional data collected from six Swiss regions (Zurich, Aargau, Grisons, Vaud, Geneva and Fribourg) have been analyzed with an original conceptual framework based on the Random Forest algorithm. It is shown how the algorithm can assist in the modelling process in connection with heterogeneous, incomplete archaeological datasets and related cultural heritage information. Moreover, an in-depth review of past and more recent works of quantitative methods for archaeological predictive modelling is provided. The book guides the readers to set up their own protocol for: i) dealing with uncertain data, ii) predicting archaeological site location, iii) establishing environmental features importance, iv) and suggest a model validation procedure. It addresses both academics and professionals in archaeology and cultural heritage management, and offers a source of inspiration for future research directions in the field of digital humanities and computational archaeology.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2022, held in Paris, France, during September 21-23, 2022. The 25 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections as follows: Privacy models; tabular data; disclosure risk assessment and record linkage; privacy-preserving protocols; unstructured and mobility data; synthetic data; machine learning and privacy; and case studies.
This book is a compilation of peer reviewed papers presented at International Conference on Machine Intelligence and Data Science Applications (MIDAS 2021), held in Comilla University, Cumilla, Bangladesh during 26 - 27 December 2021. The book covers applications in various fields like image processing, natural language processing, computer vision, sentiment analysis, speech and gesture analysis, etc. It also includes interdisciplinary applications like legal, healthcare, smart society, cyber physical system and smart agriculture, etc. The book is a good reference for computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.
This two volume set (CCIS 1628 and 1629) constitutes the refereed proceedings of the 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022 held in Chengdu, China, in August, 2022. The 65 full papers and 26 short papers presented in these two volumes were carefully reviewed and selected from 261 submissions. The papers are organized in topical sections on: Big Data Mining and Knowledge Management; Machine Learning for Data Science; Multimedia Data Management and Analysis.
This open access book constitutes the proceedings of the 18th International Conference on Intelligent Data Analysis, IDA 2020, held in Konstanz, Germany, in April 2020. The 45 full papers presented in this volume were carefully reviewed and selected from 114 submissions. Advancing Intelligent Data Analysis requires novel, potentially game-changing ideas. IDA's mission is to promote ideas over performance: a solid motivation can be as convincing as exhaustive empirical evaluation.
The book presents a collection of peer-reviewed articles from the International Conference on Advances and Applications of Artificial Intelligence and Machine Learning - ICAAAIML 2020. The book covers research in artificial intelligence, machine learning, and deep learning applications in healthcare, agriculture, business, and security. This volume contains research papers from academicians, researchers as well as students. There are also papers on core concepts of computer networks, intelligent system design and deployment, real-time systems, wireless sensor networks, sensors and sensor nodes, software engineering, and image processing. This book will be a valuable resource for students, academics, and practitioners in the industry working on AI applications.
With the development of Big Data platforms for managing massive amount of data and wide availability of tools for processing these data, the biggest limitation is the lack of trained experts who are qualified to process and interpret the results. This textbook is intended for graduate students and experts using methods of cluster analysis and applications in various fields. Suitable for an introductory course on cluster analysis or data mining, with an in-depth mathematical treatment that includes discussions on different measures, primitives (points, lines, etc.) and optimization-based clustering methods, Cluster Analysis and Applications also includes coverage of deep learning based clustering methods. With clear explanations of ideas and precise definitions of concepts, accompanied by numerous examples and exercises together with Mathematica programs and modules, Cluster Analysis and Applications may be used by students and researchers in various disciplines, working in data analysis or data science.
This book covers different machine learning techniques such as artificial neural network, support vector machine, rough set theory and deep learning. It points out the difference between the techniques and their suitability for specific applications. This book also describes different applications of machine learning techniques for industrial problems. The book includes several case studies, helping researchers in academia and industries aspiring to use machine learning for solving practical industrial problems.
This two-volume set (CCIS 1567-1568) constitutes the refereed proceedings of the 6h International Conference on Computer Vision and Image Processing, CVIP 2021, held in Rupnagar, India, in December 2021. The 70 full papers and 20 short papers were carefully reviewed and selected from the 260 submissions. The papers present recent research on such topics as biometrics, forensics, content protection, image enhancement/super-resolution/restoration, motion and tracking, image or video retrieval, image, image/video processing for autonomous vehicles, video scene understanding, human-computer interaction, document image analysis, face, iris, emotion, sign language and gesture recognition, 3D image/video processing, action and event detection/recognition, medical image and video analysis, vision-based human GAIT analysis, remote sensing, and more.
The two-volume proceedings CCIS 1613 + 1614 constitute revised selected papers from the 6th International Conference on Advances in Computing and Data Sciences, ICACDS 2022, which was held in Kurnool, India in April 2022. The total of 69 full papers presented in the proceedings was carefully reviewed and selected from 411 submissions. The papers focus on advances of next generation computing technologies in the areas of advanced computing and data sciences
The two-volume proceedings CCIS 1613 + 1614 constitute revised selected papers from the 6th International Conference on Advances in Computing and Data Sciences, ICACDS 2022, which was held in Kurnool, India in April 2022.The total of 69 full papers presented in the proceedings was carefully reviewed and selected from 411 submissions. The papers focus on advances of next generation computing technologies in the areas of advanced computing and data sciences.
This book presents the outcome of two-day 2nd International e-Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2020) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, from December 18-19, 2020. The book extensively covers recent research in artificial intelligence (AI) that knit together nature-inspired algorithms, evolutionary computing, fuzzy systems, computational intelligence, machine learning, deep learning, etc., which is very useful while dealing with real problems due to their model-free structure, learning ability, and flexible approach. These techniques mimic human thinking and decision-making abilities to produce systems that are intelligent, efficient, cost-effective, and fast. The book provides a friendly and informative treatment of the topics which makes this book an ideal reference for both beginners and experienced researchers.
This two-volume set, LNCS 13426 and 13427, constitutes the thoroughly refereed proceedings of the 33rd International Conference on Database and Expert Systems Applications, DEXA 2022, held in Vienna in August 2022.The 43 full papers presented together with 20 short papers in these volumes were carefully reviewed and selected from a total of 120 submissions. The papers are organized around the following topics: Big Data Management and Analytics, Consistency, Integrity, Quality of Data, Constraint Modelling and Processing, Database Federation and Integration, Interoperability, Multi-Databases, Data and Information Semantics, Data Integration, Metadata Management, and Interoperability, Data Structures and much more.
This volume contains the proceedings of the European Conference on
Machine Learning 1994, which continues the tradition of earlier
meetings and which is a major forum for the presentation of the
latest and most significant results in machine learning.
This comprehensive overview of IoT systems architecture includes in-depth treatment of all key components: edge, communications, cloud, data processing, security, management, and uses. Internet of Things: Concepts and System Design provides a reference and foundation for students and practitioners that they can build upon to design IoT systems and to understand how the specific parts they are working on fit into and interact with the rest of the system. This is especially important since IoT is a multidisciplinary area that requires diverse skills and knowledge including: sensors, embedded systems, real-time systems, control systems, communications, protocols, Internet, cloud computing, large-scale distributed processing and storage systems, AI and ML, (preferably) coupled with domain experience in the area where it is to be applied, such as building or manufacturing automation. Written in a reader-minded approach that starts by describing the problem (why should I care?), placing it in context (what does this do and where/how does it fit in the great scheme of things?) and then describing salient features of solutions (how does it work?), this book covers the existing body of knowledge and design practices, but also offers the author's insights and articulation of common attributes and salient features of solutions such as IoT information modeling and platform characteristics.
This book is a collection of the most recent approaches that combine metaheuristics and machine learning. Some of the methods considered in this book are evolutionary, swarm, machine learning, and deep learning. The chapters were classified based on the content; then, the sections are thematic. Different applications and implementations are included; in this sense, the book provides theory and practical content with novel machine learning and metaheuristic algorithms. The chapters were compiled using a scientific perspective. Accordingly, the book is primarily intended for undergraduate and postgraduate students of Science, Engineering, and Computational Mathematics and is useful in courses on Artificial Intelligence, Advanced Machine Learning, among others. Likewise, the book is useful for research from the evolutionary computation, artificial intelligence, and image processing communities.
This book provides insights into smart ways of computer log data analysis, with the goal of spotting adversarial actions. It is organized into 3 major parts with a total of 8 chapters that include a detailed view on existing solutions, as well as novel techniques that go far beyond state of the art. The first part of this book motivates the entire topic and highlights major challenges, trends and design criteria for log data analysis approaches, and further surveys and compares the state of the art. The second part of this book introduces concepts that apply character-based, rather than token-based, approaches and thus work on a more fine-grained level. Furthermore, these solutions were designed for "online use", not only forensic analysis, but also process new log lines as they arrive in an efficient single pass manner. An advanced method for time series analysis aims at detecting changes in the overall behavior profile of an observed system and spotting trends and periodicities through log analysis. The third part of this book introduces the design of the AMiner, which is an advanced open source component for log data anomaly mining. The AMiner comes with several detectors to spot new events, new parameters, new correlations, new values and unknown value combinations and can run as stand-alone solution or as sensor with connection to a SIEM solution. More advanced detectors help to determines the characteristics of variable parts of log lines, specifically the properties of numerical and categorical fields. Detailed examples throughout this book allow the reader to better understand and apply the introduced techniques with open source software. Step-by-step instructions help to get familiar with the concepts and to better comprehend their inner mechanisms. A log test data set is available as free download and enables the reader to get the system up and running in no time. This book is designed for researchers working in the field of cyber security, and specifically system monitoring, anomaly detection and intrusion detection. The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems. Forward-thinking practitioners, who would benefit from becoming familiar with the advanced anomaly detection methods, will also be interested in this book.
This volume offers a wealth of interdisciplinary approaches to artificial intelligence, machine learning and optimization tools, which contribute to the optimization of urban features towards forming smart, sustainable, and livable future cities. Special features include: New research on the design of city elements and smart systems with respect to new technologies and scientific thinking Discussions on the theoretical background that lead to smart cities for the future New technologies and principles of research that can promote ideas of artificial intelligence and machine learning in optimized urban environments The book engages students and researchers in the subjects of artificial intelligence, machine learning, and optimization tools in smart sustainable cities as eminent international experts contribute their research results and thinking in its chapters. Overall, its audience can benefit from a variety of disciplines including, architecture, engineering, physics, mathematics, computer science, and related fields.
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
Get a hands-on introduction to Transformer architecture using the Hugging Face library. This book explains how Transformers are changing the AI domain, particularly in the area of natural language processing. This book covers Transformer architecture and its relevance in natural language processing (NLP). It starts with an introduction to NLP and a progression of language models from n-grams to a Transformer-based architecture. Next, it offers some basic Transformers examples using the Google colab engine. Then, it introduces the Hugging Face ecosystem and the different libraries and models provided by it. Moving forward, it explains language models such as Google BERT with some examples before providing a deep dive into Hugging Face API using different language models to address tasks such as sentence classification, sentiment analysis, summarization, and text generation. After completing Introduction to Transformers for NLP, you will understand Transformer concepts and be able to solve problems using the Hugging Face library. What You Will Learn Understand language models and their importance in NLP and NLU (Natural Language Understanding) Master Transformer architecture through practical examples Use the Hugging Face library in Transformer-based language models Create a simple code generator in Python based on Transformer architecture Who This Book Is ForData Scientists and software developers interested in developing their skills in NLP and NLU (Natural Language Understanding) |
You may like...
Cognitive Big Data Intelligence with a…
Sushruta Mishra, Hrudaya Kumar Tripathy, …
Paperback
R2,829
Discovery Miles 28 290
Statistical Modeling in Machine Learning…
Tilottama Goswami, G. R. Sinha
Paperback
R3,925
Discovery Miles 39 250
Cyber-Physical System Solutions for…
Vanamoorthy Muthumanikandan, Anbalagan Bhuvaneswari, …
Hardcover
R6,641
Discovery Miles 66 410
Optimum-Path Forest - Theory…
Alexandre Xavier Falcao, Joao Paulo Papa
Paperback
R3,037
Discovery Miles 30 370
Machine Learning for Planetary Science
Joern Helbert, Mario D'Amore, …
Paperback
R3,380
Discovery Miles 33 800
Cyber-Physical Systems - AI and COVID-19
Ramesh Poonia, Basant Agarwal, …
Paperback
R2,817
Discovery Miles 28 170
Machine Learning for Biometrics…
Partha Pratim Sarangi, Madhumita Panda, …
Paperback
R2,570
Discovery Miles 25 700
|