![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
This book systematically introduces readers to the theory of deep learning and explores its practical applications based on the MindSpore AI computing framework. Divided into 14 chapters, the book covers deep learning, deep neural networks (DNNs), convolutional neural networks (CNNs), recurrent neural networks (RNNs), unsupervised learning, deep reinforcement learning, automated machine learning, device-cloud collaboration, deep learning visualization, and data preparation for deep learning. To help clarify the complex topics discussed, this book includes numerous examples and links to online resources.
This open access book introduces and explains machine learning (ML) algorithms and techniques developed for statistical inferences on a complex process or system and their applications to simulations of chemically reacting turbulent flows. These two fields, ML and turbulent combustion, have large body of work and knowledge on their own, and this book brings them together and explain the complexities and challenges involved in applying ML techniques to simulate and study reacting flows. This is important as to the world's total primary energy supply (TPES), since more than 90% of this supply is through combustion technologies and the non-negligible effects of combustion on environment. Although alternative technologies based on renewable energies are coming up, their shares for the TPES is are less than 5% currently and one needs a complete paradigm shift to replace combustion sources. Whether this is practical or not is entirely a different question, and an answer to this question depends on the respondent. However, a pragmatic analysis suggests that the combustion share to TPES is likely to be more than 70% even by 2070. Hence, it will be prudent to take advantage of ML techniques to improve combustion sciences and technologies so that efficient and "greener" combustion systems that are friendlier to the environment can be designed. The book covers the current state of the art in these two topics and outlines the challenges involved, merits and drawbacks of using ML for turbulent combustion simulations including avenues which can be explored to overcome the challenges. The required mathematical equations and backgrounds are discussed with ample references for readers to find further detail if they wish. This book is unique since there is not any book with similar coverage of topics, ranging from big data analysis and machine learning algorithm to their applications for combustion science and system design for energy generation.
Data is the indispensable fuel that drives the decision making of everything from governments, to major corporations, to sports teams. Its value is almost beyond measure. But what if that data is either unavailable or problematic to access? That's where synthetic data comes in. This book will show you how to generate synthetic data and use it to maximum effect. Synthetic Data for Deep Learning begins by tracing the need for and development of synthetic data before delving into the role it plays in machine learning and computer vision. You'll gain insight into how synthetic data can be used to study the benefits of autonomous driving systems and to make accurate predictions about real-world data. You'll work through practical examples of synthetic data generation using Python and R, placing its purpose and methods in a real-world context. Generative Adversarial Networks (GANs) are also covered in detail, explaining how they work and their potential applications. After completing this book, you'll have the knowledge necessary to generate and use synthetic data to enhance your corporate, scientific, or governmental decision making. What You Will Learn Create synthetic tabular data with R and Python Understand how synthetic data is important for artificial neural networks Master the benefits and challenges of synthetic data Understand concepts such as domain randomization and domain adaptation related to synthetic data generation Who This Book Is For Those who want to learn about synthetic data and its applications, especially professionals working in the field of machine learning and computer vision. This book will also be useful for graduate and doctoral students interested in this subject.
This edited book is a collection of selected research papers presented at the 2022 3rd International Conference on Artificial Intelligence in Education Technology (AIET 2022), held in Wuhan, China, on July 1-3, 2022. AIET establishes a platform for AI in education researchers to present research, exchange innovative ideas, propose new models, as well as demonstrate advanced methodologies and novel systems. The book is divided into five main sections - 1) AI in Education in the Post-COVID New Norm, 2) Emerging AI Technologies, Methods, Systems and Infrastructure, 3) Innovative Practices of Teaching and Assessment Driven by AI and Education Technologies, 4) Curriculum, Teacher Professional Development and Policy for AI in Education, and 5) Issues and Discussions on AI In Education and Future Development. Through these sections, the book provides a comprehensive picture of the current status, emerging trends, innovations, theory, applications, challenges and opportunities of current AI in education research. This timely publication is well aligned with UNESCO's Beijing Consensus on Artificial Intelligence (AI) and Education. It is committed to exploring how AI may play a role in bringing more innovative practices, transforming education in the post-pandemic new norm and triggering an exponential leap toward the achievement of the Education 2030 Agenda. Providing broad coverage of recent technology-driven advances and addressing a number of learning-centric themes, the book is an informative and useful resource for researchers, practitioners, education leaders and policy-makers who are involved or interested in AI and education.
This two-volume set of LNCS 13393 and LNCS 13394 constitutes - in conjunction with the volume LNAI 13395 - the refereed proceedings of the 18th International Conference on Intelligent Computing, ICIC 2022, held in Xi'an, China, in August 2022. The 209 full papers of the three proceedings volumes were carefully reviewed and selected from 449 submissions.This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology.
This book constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2022, held in Paris, France, during September 21-23, 2022. The 25 papers presented in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections as follows: Privacy models; tabular data; disclosure risk assessment and record linkage; privacy-preserving protocols; unstructured and mobility data; synthetic data; machine learning and privacy; and case studies.
Multilayer neural networks based on multi-valued neurons (MLMVNs) have been proposed to combine the advantages of complex-valued neural networks with a plain derivative-free learning algorithm. In addition, multi-valued neurons (MVNs) offer a multi-valued threshold logic resulting in the ability to replace multiple conventional output neurons in classification tasks. Therefore, several classes can be assigned to one output neuron. This book introduces a novel approach to assign multiple classes to numerous MVNs in the output layer. It was found that classes that possess similarities should be allocated to the same neuron and arranged adjacent to each other on the unit circle. Since MLMVNs require input data located on the unit circle, two employed transformations are reevaluated. The min-max scaler utilizing the exponential function, and the 2D discrete Fourier transform restricting to the phase information for image recognition. The evaluation was performed on the Sensorless Drive Diagnosis dataset and the Fashion MNIST dataset.
The two-volume set LNCS 13373 and 13374 constitutes the papers of several workshops which were held in conjunction with the 21st International Conference on Image Analysis and Processing, ICIAP 2022, held in Lecce, Italy, in May 2022. The 96 revised full papers presented in the proceedings set were carefully reviewed and selected from 157 submissions. ICIAP 2022 presents the following Sixteen workshops: Volume I: GoodBrother workshop on visual intelligence for active and assisted livingParts can worth like the Whole - PART 2022Workshop on Fine Art Pattern Extraction and Recognition - FAPERWorkshop on Intelligent Systems in Human and Artificial Perception - ISHAPE 2022Artificial Intelligence and Radiomics in Computer-Aided Diagnosis - AIRCADDeep-Learning and High Performance Computing to Boost Biomedical Applications - DeepHealth Volume II: Human Behaviour Analysis for Smart City Environment Safety - HBAxSCESBinary is the new Black (and White): Recent Advances on Binary Image ProcessingArtificial Intelligence for preterm infants' healthCare - AI-careTowards a Complete Analysis of People: From Face and Body to Clothes - T-CAPArtificial Intelligence for Digital Humanities - AI4DHMedical Transformers - MEDXFLearning in Precision Livestock Farming - LPLFWorkshop on Small-Drone Surveillance, Detection and Counteraction Techniques - WOSDETCMedical Imaging Analysis For Covid-19 - MIACOVID 2022Novel Benchmarks and Approaches for Real-World Continual Learning - CL4REAL
This book presents recent advances in the field of scalable distributed computing including state-of-the-art research in the field of Cloud Computing, the Internet of Things (IoT), and Blockchain in distributed environments along with applications and findings in broad areas including Data Analytics, AI, and Machine Learning to address complex real-world problems. It features selected high-quality research papers from the 2nd International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2021), organized by the Department of Computer Science and Information Technology, Institute of Technical Education and Research(ITER), Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India.
This open access book provides a wealth of hands-on examples that illustrate how hyperparameter tuning can be applied in practice and gives deep insights into the working mechanisms of machine learning (ML) and deep learning (DL) methods. The aim of the book is to equip readers with the ability to achieve better results with significantly less time, costs, effort and resources using the methods described here. The case studies presented in this book can be run on a regular desktop or notebook computer. No high-performance computing facilities are required. The idea for the book originated in a study conducted by Bartz & Bartz GmbH for the Federal Statistical Office of Germany (Destatis). Building on that study, the book is addressed to practitioners in industry as well as researchers, teachers and students in academia. The content focuses on the hyperparameter tuning of ML and DL algorithms, and is divided into two main parts: theory (Part I) and application (Part II). Essential topics covered include: a survey of important model parameters; four parameter tuning studies and one extensive global parameter tuning study; statistical analysis of the performance of ML and DL methods based on severity; and a new, consensus-ranking-based way to aggregate and analyze results from multiple algorithms. The book presents analyses of more than 30 hyperparameters from six relevant ML and DL methods, and provides source code so that users can reproduce the results. Accordingly, it serves as a handbook and textbook alike.
This two-volume set, LNCS 13426 and 13427, constitutes the thoroughly refereed proceedings of the 33rd International Conference on Database and Expert Systems Applications, DEXA 2022, held in Vienna in August 2022.The 43 full papers presented together with 20 short papers in these volumes were carefully reviewed and selected from a total of 120 submissions. The papers are organized around the following topics: Big Data Management and Analytics, Consistency, Integrity, Quality of Data, Constraint Modelling and Processing, Database Federation and Integration, Interoperability, Multi-Databases, Data and Information Semantics, Data Integration, Metadata Management, and Interoperability, Data Structures and much more.
This book is a compilation of peer reviewed papers presented at International Conference on Machine Intelligence and Data Science Applications (MIDAS 2021), held in Comilla University, Cumilla, Bangladesh during 26 - 27 December 2021. The book covers applications in various fields like image processing, natural language processing, computer vision, sentiment analysis, speech and gesture analysis, etc. It also includes interdisciplinary applications like legal, healthcare, smart society, cyber physical system and smart agriculture, etc. The book is a good reference for computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.
This two volume set (CCIS 1628 and 1629) constitutes the refereed proceedings of the 8th International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2022 held in Chengdu, China, in August, 2022. The 65 full papers and 26 short papers presented in these two volumes were carefully reviewed and selected from 261 submissions. The papers are organized in topical sections on: Big Data Mining and Knowledge Management; Machine Learning for Data Science; Multimedia Data Management and Analysis.
This book introduces the point cloud; its applications in industry, and the most frequently used datasets. It mainly focuses on three computer vision tasks -- point cloud classification, segmentation, and registration -- which are fundamental to any point cloud-based system. An overview of traditional point cloud processing methods helps readers build background knowledge quickly, while the deep learning on point clouds methods include comprehensive analysis of the breakthroughs from the past few years. Brand-new explainable machine learning methods for point cloud learning, which are lightweight and easy to train, are then thoroughly introduced. Quantitative and qualitative performance evaluations are provided. The comparison and analysis between the three types of methods are given to help readers have a deeper understanding. With the rich deep learning literature in 2D vision, a natural inclination for 3D vision researchers is to develop deep learning methods for point cloud processing. Deep learning on point clouds has gained popularity since 2017, and the number of conference papers in this area continue to increase. Unlike 2D images, point clouds do not have a specific order, which makes point cloud processing by deep learning quite challenging. In addition, due to the geometric nature of point clouds, traditional methods are still widely used in industry. Therefore, this book aims to make readers familiar with this area by providing comprehensive overview of the traditional methods and the state-of-the-art deep learning methods. A major portion of this book focuses on explainable machine learning as a different approach to deep learning. The explainable machine learning methods offer a series of advantages over traditional methods and deep learning methods. This is a main highlight and novelty of the book. By tackling three research tasks -- 3D object recognition, segmentation, and registration using our methodology -- readers will have a sense of how to solve problems in a different way and can apply the frameworks to other 3D computer vision tasks, thus give them inspiration for their own future research. Numerous experiments, analysis and comparisons on three 3D computer vision tasks (object recognition, segmentation, detection and registration) are provided so that readers can learn how to solve difficult Computer Vision problems.
This book constitutes the refereed post-conference proceedings of the Fourth IFIP TC 12 International Conference on Computational Intelligence in Data Science, ICCIDS 2021, held in Chennai, India, in March 2021. The 20 revised full papers presented were carefully reviewed and selected from 75 submissions. The papers cover topics such as computational intelligence for text analysis; computational intelligence for image and video analysis; blockchain and data science.
This book constitutes the proceedings of the 13th International Workshop on Machine Learning in Medical Imaging, MLMI 2022, held in conjunction with MICCAI 2022, in Singapore, in September 2022. The 48 full papers presented in this volume were carefully reviewed and selected from 64 submissions. They focus on major trends and challenges in the above-mentioned area, aiming to identify new-cutting-edge techniques and their uses in medical imaging. Topics dealt with are: deep learning, generative adversarial learning, ensemble learning, sparse learning, multi-task learning, multi-view learning, manifold learning, and reinforcement learning, with their applications to medical image analysis, computer-aided detection and diagnosis, multi-modality fusion, image reconstruction, image retrieval, cellular image analysis, molecular imaging, digital pathology, etc.
This book is open access, which means that you have free and unlimited access. This book presents the Proceedings of the 9th Machine Intelligence and Digital Interaction Conference. Significant progress in the development of artificial intelligence (AI) and its wider use in many interactive products are quickly transforming further areas of our life, which results in the emergence of various new social phenomena. Many countries have been making efforts to understand these phenomena and find answers on how to put the development of artificial intelligence on the right track to support the common good of people and societies. These attempts require interdisciplinary actions, covering not only science disciplines involved in the development of artificial intelligence and human-computer interaction but also close cooperation between researchers and practitioners. For this reason, the main goal of the MIDI conference held on 9-10.12.2021 as a virtual event is to integrate two, until recently, independent fields of research in computer science: broadly understood artificial intelligence and human-technology interaction.
This handbook discusses challenges and limitations in existing solutions, and presents state-of-the-art advances from both academia and industry, in big data analytics and digital forensics. The second chapter comprehensively reviews IoT security, privacy, and forensics literature, focusing on IoT and unmanned aerial vehicles (UAVs). The authors propose a deep learning-based approach to process cloud's log data and mitigate enumeration attacks in the third chapter. The fourth chapter proposes a robust fuzzy learning model to protect IT-based infrastructure against advanced persistent threat (APT) campaigns. Advanced and fair clustering approach for industrial data, which is capable of training with huge volume of data in a close to linear time is introduced in the fifth chapter, as well as offering an adaptive deep learning model to detect cyberattacks targeting cyber physical systems (CPS) covered in the sixth chapter. The authors evaluate the performance of unsupervised machine learning for detecting cyberattacks against industrial control systems (ICS) in chapter 7, and the next chapter presents a robust fuzzy Bayesian approach for ICS's cyber threat hunting. This handbook also evaluates the performance of supervised machine learning methods in identifying cyberattacks against CPS. The performance of a scalable clustering algorithm for CPS's cyber threat hunting and the usefulness of machine learning algorithms for MacOS malware detection are respectively evaluated. This handbook continues with evaluating the performance of various machine learning techniques to detect the Internet of Things malware. The authors demonstrate how MacOSX cyberattacks can be detected using state-of-the-art machine learning models. In order to identify credit card frauds, the fifteenth chapter introduces a hybrid model. In the sixteenth chapter, the editors propose a model that leverages natural language processing techniques for generating a mapping between APT-related reports and cyber kill chain. A deep learning-based approach to detect ransomware is introduced, as well as a proposed clustering approach to detect IoT malware in the last two chapters. This handbook primarily targets professionals and scientists working in Big Data, Digital Forensics, Machine Learning, Cyber Security Cyber Threat Analytics and Cyber Threat Hunting as a reference book. Advanced level-students and researchers studying and working in Computer systems, Computer networks and Artificial intelligence will also find this reference useful.
This book proposes tools for analysis of multidimensional and metric data, by establishing a state-of-the-art of the existing solutions and developing new ones. It mainly focuses on visual exploration of these data by a human analyst, relying on a 2D or 3D scatter plot display obtained through Dimensionality Reduction. Performing diagnosis of an energy system requires identifying relations between observed monitoring variables and the associated internal state of the system. Dimensionality reduction, which allows to represent visually a multidimensional dataset, constitutes a promising tool to help domain experts to analyse these relations. This book reviews existing techniques for visual data exploration and dimensionality reduction such as tSNE and Isomap, and proposes new solutions to challenges in that field. In particular, it presents the new unsupervised technique ASKI and the supervised methods ClassNeRV and ClassJSE. Moreover, MING, a new approach for local map quality evaluation is also introduced. These methods are then applied to the representation of expert-designed fault indicators for smart-buildings, I-V curves for photovoltaic systems and acoustic signals for Li-ion batteries.
Recently machine learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using machine learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, federated learning (FL) is one of most important distributed learning algorithm, allowing devices to train a shared machine learning model while keeping data locally. However, applying FL in wireless networks and optimizing the performance involves a range of research topics. For example, in FL, training machine learning models require communication between wireless devices and edge servers via wireless links. Therefore, wireless impairments such as uncertainties among wireless channel states, interference, and noise significantly affect the performance of FL. On the other hand, federated-reinforcement learning leverages distributed computation power and data to solve complex optimization problems that arise in various use cases, such as interference alignment, resource management, clustering, and network control. Traditionally, FL makes the assumption that edge devices will unconditionally participate in the tasks when invited, which is not practical in reality due to the cost of model training. As such, building incentive mechanisms is indispensable for FL networks. This book provides a comprehensive overview of FL for wireless networks. It is divided into three main parts: The first part briefly discusses the fundamentals of FL for wireless networks, while the second part comprehensively examines the design and analysis of wireless FL, covering resource optimization, incentive mechanism, security and privacy. It also presents several solutions based on optimization theory, graph theory, and game theory to optimize the performance of federated learning in wireless networks. Lastly, the third part describes several applications of FL in wireless networks.
This open access book introduces Vector semantics, which links the formal theory of word vectors to the cognitive theory of linguistics. The computational linguists and deep learning researchers who developed word vectors have relied primarily on the ever-increasing availability of large corpora and of computers with highly parallel GPU and TPU compute engines, and their focus is with endowing computers with natural language capabilities for practical applications such as machine translation or question answering. Cognitive linguists investigate natural language from the perspective of human cognition, the relation between language and thought, and questions about conceptual universals, relying primarily on in-depth investigation of language in use. In spite of the fact that these two schools both have 'linguistics' in their name, so far there has been very limited communication between them, as their historical origins, data collection methods, and conceptual apparatuses are quite different. Vector semantics bridges the gap by presenting a formal theory, cast in terms of linear polytopes, that generalizes both word vectors and conceptual structures, by treating each dictionary definition as an equation, and the entire lexicon as a set of equations mutually constraining all meanings.
This book presents the outcome of two-day 2nd International e-Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2020) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, from December 18-19, 2020. The book extensively covers recent research in artificial intelligence (AI) that knit together nature-inspired algorithms, evolutionary computing, fuzzy systems, computational intelligence, machine learning, deep learning, etc., which is very useful while dealing with real problems due to their model-free structure, learning ability, and flexible approach. These techniques mimic human thinking and decision-making abilities to produce systems that are intelligent, efficient, cost-effective, and fast. The book provides a friendly and informative treatment of the topics which makes this book an ideal reference for both beginners and experienced researchers.
This book constitutes the refereed proceedings of the 13th International Conference of the CLEF Association, CLEF 2022, held in Bologna, Italy in September 2022.The conference has a clear focus on experimental information retrieval with special attention to the challenges of multimodality, multilinguality, and interactive search ranging from unstructured to semi structures and structured data. The 7 full papers presented together with 3 short papers in this volume were carefully reviewed and selected from 14 submissions. This year, the contributions addressed the following challenges: authorship attribution, fake news detection and news tracking, noise-detection in automatically transferred relevance judgments, impact of online education on children's conversational search behavior, analysis of multi-modal social media content, knowledge graphs for sensitivity identification, a fusion of deep learning and logic rules for sentiment analysis, medical concept normalization and domain-specific information extraction. In addition to this, the volume presents 7 "best of the labs" papers which were reviewed as full paper submissions with the same review criteria. 14 lab overview papers were accepted and represent scientific challenges based on new datasets and real world problems in multimodal and multilingual information access.
This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients' lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics. Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master's degree students as well as undergraduates at their final years of studies in the stated fields.
This book constitutes revised selected papers from the 17th International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics, CIBB 2021, which was held virtually during November 15-17, 2021. The 19 papers included in these proceedings were carefully reviewed and selected from 26 submissions, and they focus on bioinformatics, computational biology, health informatics, cheminformatics, biotechnology, biostatistics, and biomedical imaging. |
![]() ![]() You may like...
Research Anthology on Machine Learning…
Information R Management Association
Hardcover
R17,460
Discovery Miles 174 600
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R8,638
Discovery Miles 86 380
Deep Learning Applications
Pier Luigi Mazzeo, Paolo Spagnolo
Hardcover
R3,347
Discovery Miles 33 470
Cognitive Data Models for Sustainable…
Siddhartha Bhattacharyya, Naba Kumar Mondal, …
Paperback
R2,941
Discovery Miles 29 410
Data Analytics on Graphs
Ljubisa Stankovic, Danilo P. Mandic, …
Hardcover
R3,426
Discovery Miles 34 260
Advances in Domain Adaptation Theory
Ievgen Redko, Emilie Morvant, …
Hardcover
Foundation Models for Natural Language…
Gerhard PaaĆ, Sven Giesselbach
Hardcover
Hardware Accelerator Systems for…
Shiho Kim, Ganesh Chandra Deka
Hardcover
|