![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
Evolutionary Algorithms (EAs) have grown into a mature field of research in optimization, and have proven to be effective and robust problem solvers for a broad range of static real-world optimization problems. Yet, since they are based on the principles of natural evolution, and since natural evolution is a dynamic process in a changing environment, EAs are also well suited to dynamic optimization problems. Evolutionary Optimization in Dynamic Environments is the first comprehensive work on the application of EAs to dynamic optimization problems. It provides an extensive survey on research in the area and shows how EAs can be successfully used to continuously and efficiently adapt a solution to a changing environment, find a good trade-off between solution quality and adaptation cost, find robust solutions whose quality is insensitive to changes in the environment, find flexible solutions which are not only good but that can be easily adapted when necessary. All four aspects are treated in this book, providing a holistic view on the challenges and opportunities when applying EAs to dynamic optimization problems. The comprehensive and up-to-date coverage of the subject, together with details of latest original research, makes Evolutionary Optimization in Dynamic Environments an invaluable resource for researchers and professionals who are dealing with dynamic and stochastic optimization problems, and who are interested in applying local search heuristics, such as evolutionary algorithms.
Computers that program themselves' has long been an aim of computer scientists. Recently genetic programming (GP) has started to show its promise by automatically evolving programs. Indeed in a small number of problems GP has evolved programs whose performance is similar to or even slightly better than that of programs written by people. The main thrust of GP has been to automatically create functions. While these can be of great use they contain no memory and relatively little work has addressed automatic creation of program code including stored data. This issue is the main focus of Genetic Programming, and Data Structures: Genetic Programming + Data Structures = Automatic Programming!. This book is motivated by the observation from software engineering that data abstraction (e.g., via abstract data types) is essential in programs created by human programmers. This book shows that abstract data types can be similarly beneficial to the automatic production of programs using GP. Genetic Programming and Data Structures: Genetic Programming + Data Structures = Automatic Programming! shows how abstract data types (stacks, queues and lists) can be evolved using genetic programming, demonstrates how GP can evolve general programs which solve the nested brackets problem, recognises a Dyck context free language, and implements a simple four function calculator. In these cases, an appropriate data structure is beneficial compared to simple indexed memory. This book also includes a survey of GP, with a critical review of experiments with evolving memory, and reports investigations of real world electrical network maintenance scheduling problems that demonstrate that Genetic Algorithms can findlow cost viable solutions to such problems. Genetic Programming and Data Structures: Genetic Programming + Data Structures = Automatic Programming! should be of direct interest to computer scientists doing research on genetic programming, genetic algorithms, data structures, and artificial intelligence. In addition, this book will be of interest to practitioners working in all of these areas and to those interested in automatic programming.
This book provides a hands-on introduction to Machine Learning (ML) from a multidisciplinary perspective that does not require a background in data science or computer science. It explains ML using simple language and a straightforward approach guided by real-world examples in areas such as health informatics, information technology, and business analytics. The book will help readers understand the various key algorithms, major software tools, and their applications. Moreover, through examples from the healthcare and business analytics fields, it demonstrates how and when ML can help them make better decisions in their disciplines. The book is chiefly intended for undergraduate and graduate students who are taking an introductory course in machine learning. It will also benefit data analysts and anyone interested in learning ML approaches.
Anticipatory Learning Classifier Systems describes the state of the art of anticipatory learning classifier systems-adaptive rule learning systems that autonomously build anticipatory environmental models. An anticipatory model specifies all possible action-effects in an environment with respect to given situations. It can be used to simulate anticipatory adaptive behavior. Anticipatory Learning Classifier Systems highlights how anticipations influence cognitive systems and illustrates the use of anticipations for (1) faster reactivity, (2) adaptive behavior beyond reinforcement learning, (3) attentional mechanisms, (4) simulation of other agents and (5) the implementation of a motivational module. The book focuses on a particular evolutionary model learning mechanism, a combination of a directed specializing mechanism and a genetic generalizing mechanism. Experiments show that anticipatory adaptive behavior can be simulated by exploiting the evolving anticipatory model for even faster model learning, planning applications, and adaptive behavior beyond reinforcement learning. Anticipatory Learning Classifier Systems gives a detailed algorithmic description as well as a program documentation of a C++ implementation of the system. It is an excellent reference for researchers interested in adaptive behavior and machine learning from a cognitive science perspective as well as those who are interested in combining evolutionary learning mechanisms for learning and optimization tasks.
This book gathers papers addressing state-of-the-art research in the areas of machine learning and predictive analysis, presented virtually at the Fourth International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2020), India. It covers topics such as intelligent agent and multi-agent systems in various domains, machine learning, intelligent information retrieval and business intelligence, intelligent information system development using design science principles, intelligent web mining and knowledge discovery systems.
This book describes the practical application of artificial intelligence (AI) methods using time series data in system control. This book consistently discusses the application of machine learning to the analysis and modelling of time series data of physical quantities to be controlled in the field of system control. Since dynamic systems are not stable steady states but changing transient states, the changing transient states depend on the state history before the change. In other words, it is essential to predict the change from the present to the future based on the time history of each variable in the target system, and to manipulate the system to achieve the desired change. In short, time series is the key to the application of AI machine learning to system control. This is the philosophy of this book: "time series data" + "AI machine learning" = "new practical control methods". This book can give my helps to undergradate or graduate students, institute researchers and senior engineers whose scientific background are engineering, mathematics, physics and other natural sciences.
This book presents the first "How To" guide to the use of radial basis functions (RBF). It provides a clear vision of their potential, an overview of ready-for-use computational tools and precise guidelines to implement new engineering applications of RBF. Radial basis functions (RBF) are a mathematical tool mature enough for useful engineering applications. Their mathematical foundation is well established and the tool has proven to be effective in many fields, as the mathematical framework can be adapted in several ways. A candidate application can be faced considering the features of RBF: multidimensional space (including 2D and 3D), numerous radial functions available, global and compact support, interpolation/regression. This great flexibility makes RBF attractive - and their great potential has only been partially discovered. This is because of the difficulty in taking a first step toward RBF as they are not commonly part of engineers' cultural background, but also due to the numerical complexity of RBF problems that scales up very quickly with the number of RBF centers. Fast RBF algorithms are available to alleviate this and high-performance computing (HPC) can provide further aid. Nevertheless, a consolidated tradition in using RBF in engineering applications is still missing and the beginner can be confused by the literature, which in many cases is presented with language and symbolisms familiar to mathematicians but which can be cryptic for engineers. The book is divided in two main sections. The first covers the foundations of RBF, the tools available for their quick implementation and guidelines for facing new challenges; the second part is a collection of practical RBF applications in engineering, covering several topics, including response surface interpolation in n-dimensional spaces, mapping of magnetic loads, mapping of pressure loads, up-scaling of flow fields, stress/strain analysis by experimental displacement fields, implicit surfaces, mesh to cad deformation, mesh morphing for crack propagation in 3D, ice and snow accretion using computational fluid dynamics (CFD) data, shape optimization for external aerodynamics, and use of adjoint data for surface sculpting. For each application, the complete path is clearly and consistently exposed using the systematic approach defined in the first section.
The new edition of this popular professional book on artificial intelligence (ML) and machine learning (ML) has been revised for classroom or training use. The new edition provides comprehensive coverage of combined AI and ML theory and applications. Rather than looking at the field from only a theoretical or only a practical perspective, this book unifies both perspectives to give holistic understanding. The first part introduces the concepts of AI and ML and their origin and current state. The second and third parts delve into conceptual and theoretic aspects of static and dynamic ML techniques. The fourth part describes the practical applications where presented techniques can be applied. The fifth part introduces the user to some of the implementation strategies for solving real life ML problems. Each chapter is accompanied with a set of exercises that will help the reader / student to apply the learnings from the chapter to a real-life problem. Completion of these exercises will help the reader / student to solidify the concepts learned. The book is appropriate for students in graduate and upper undergraduate courses in addition to researchers and professionals. It makes minimal use of mathematics to make the topics more intuitive and accessible. The book covers a large gamut of topics in the area of AI and ML and a professor can tailor a course on AI / ML based on the book by selecting and re-organizing the sequence of chapters to suit the needs.
This Springer book provides a perfect platform to submit chapters that discuss the prospective developments and innovative ideas in artificial intelligence and machine learning techniques in the diagnosis of COVID-19. COVID-19 is a huge challenge to humanity and the medical sciences. So far as of today, we have been unable to find a medical solution (Vaccine). However, globally, we are still managing the use of technology for our work, communications, analytics, and predictions with the use of advancement in data science, communication technologies (5G & Internet), and AI. Therefore, we might be able to continue and live safely with the use of research in advancements in data science, AI, machine learning, mobile apps, etc., until we can find a medical solution such as a vaccine. We have selected eleven chapters after the vigorous review process. Each chapter has demonstrated the research contributions and research novelty. Each group of authors must fulfill strict requirements.
Federated Learning: A Comprehensive Overview of Methods and Applications presents an in-depth discussion of the most important issues and approaches to federated learning for researchers and practitioners. Federated Learning (FL) is an approach to machine learning in which the training data are not managed centrally. Data are retained by data parties that participate in the FL process and are not shared with any other entity. This makes FL an increasingly popular solution for machine learning tasks for which bringing data together in a centralized repository is problematic, either for privacy, regulatory or practical reasons. This book explains recent progress in research and the state-of-the-art development of Federated Learning (FL), from the initial conception of the field to first applications and commercial use. To obtain this broad and deep overview, leading researchers address the different perspectives of federated learning: the core machine learning perspective, privacy and security, distributed systems, and specific application domains. Readers learn about the challenges faced in each of these areas, how they are interconnected, and how they are solved by state-of-the-art methods. Following an overview on federated learning basics in the introduction, over the following 24 chapters, the reader will dive deeply into various topics. A first part addresses algorithmic questions of solving different machine learning tasks in a federated way, how to train efficiently, at scale, and fairly. Another part focuses on providing clarity on how to select privacy and security solutions in a way that can be tailored to specific use cases, while yet another considers the pragmatics of the systems where the federated learning process will run. The book also covers other important use cases for federated learning such as split learning and vertical federated learning. Finally, the book includes some chapters focusing on applying FL in real-world enterprise settings.
Analogy and Structure provides the necessary foundation for understanding the nature of analogical and structuralist (or rule-based) approaches to describing behavior. In the first part of this book, the mathematical properties of rule approaches are developed; in the second part, the analogical alternative to rules is developed. This book serves as the mathematical basis for Analogical Modeling of Language (Kluwer, 1989). Features include: A Natural Measure of Uncertainty: The disagreement between randomly chosen occurences avids the difficulties of using entropy as the measure of uncertainty. Optimal Descriptions: The implicit assumption of structuralist descriptions (namely, that descriptions of behavior should be corrected and minimal) can be derived from more fundamental statements about the uncertainty of rule systems. Problems with Rule Approaches: The correct description of nondeterministic behavior leads to an atomistic, analog alternative to structuralist (or rule-based) descriptions. Natural Statistics: Traditional statistical tests are eliminated in favor of statistically equivalent decision rules that involve little or no mathematical calculation. Psycholinguistic Factors: Analogical models, unlike, neural networks, directly account for probabilistic learning as well as reaction times in world-recognition experiments.
This textbook presents methods and techniques for time series analysis and forecasting and shows how to use Python to implement them and solve data science problems. It covers not only common statistical approaches and time series models, including ARMA, SARIMA, VAR, GARCH and state space and Markov switching models for (non)stationary, multivariate and financial time series, but also modern machine learning procedures and challenges for time series forecasting. Providing an organic combination of the principles of time series analysis and Python programming, it enables the reader to study methods and techniques and practice writing and running Python code at the same time. Its data-driven approach to analyzing and modeling time series data helps new learners to visualize and interpret both the raw data and its computed results. Primarily intended for students of statistics, economics and data science with an undergraduate knowledge of probability and statistics, the book will equally appeal to industry professionals in the fields of artificial intelligence and data science, and anyone interested in using Python to solve time series problems.
A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantification of the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning.
This book introduces the approach of Machine Learning (ML) based predictive models in the design of composite materials to achieve the required properties for certain applications. ML can learn from existing experimental data obtained from very limited number of experiments and subsequently can be trained to find solutions of the complex non-linear, multi-dimensional functional relationships without any prior assumptions about their nature. In this case the ML models can learn from existing experimental data obtained from (1) composite design based on various properties of the matrix material and fillers/reinforcements (2) material processing during fabrication (3) property relationships. Modelling of these relationships using ML methods significantly reduce the experimental work involved in designing new composites, and therefore offer a new avenue for material design and properties. The book caters to students, academics and researchers who are interested in the field of material composite modelling and design.
* Essay-based format weaves together technical details and case studies to cut through complexity * Provides a strong background in business situations that companies face, to ensure that data analytics efforts are productively directed and organized * Appropriate for both business and engineering students who need to understand the data analytics lifecycle
Line intensity mapping (LIM) is an observational technique that probes the large-scale structure of the Universe by collecting light from a wide field of the sky. This book demonstrates a novel analysis method for LIM using machine learning (ML) technologies. The author develops a conditional generative adversarial network that separates designated emission signals from sources at different epochs. It thus provides, for the first time, an efficient way to extract signals from LIM data with foreground noise. The method is complementary to conventional statistical methods such as cross-correlation analysis. When applied to three-dimensional LIM data with wavelength information, high reproducibility is achieved under realistic conditions. The book further investigates how the trained machine extracts the signals, and discusses the limitation of the ML methods. Lastly an application of the LIM data to a study of cosmic reionization is presented. This book benefits students and researchers who are interested in using machine learning to multi-dimensional data not only in astronomy but also in general applications.
Reinforcement learning is the learning of a mapping from situations to actions so as to maximize a scalar reward or reinforcement signal. The learner is not told which action to take, as in most forms of machine learning, but instead must discover which actions yield the highest reward by trying them. In the most interesting and challenging cases, actions may affect not only the immediate reward, but also the next situation, and through that all subsequent rewards. These two characteristics -- trial-and-error search and delayed reward -- are the most important distinguishing features of reinforcement learning. Reinforcement learning is both a new and a very old topic in AI. The term appears to have been coined by Minsk (1961), and independently in control theory by Walz and Fu (1965). The earliest machine learning research now viewed as directly relevant was Samuel's (1959) checker player, which used temporal-difference learning to manage delayed reward much as it is used today. Of course learning and reinforcement have been studied in psychology for almost a century, and that work has had a very strong impact on the AI/engineering work. One could in fact consider all of reinforcement learning to be simply the reverse engineering of certain psychological learning processes (e.g. operant conditioning and secondary reinforcement). Reinforcement Learning is an edited volume of original research, comprising seven invited contributions by leading researchers.
This book aims at the tiny machine learning (TinyML) software and hardware synergy for edge intelligence applications. This book presents on-device learning techniques covering model-level neural network design, algorithm-level training optimization and hardware-level instruction acceleration. Analyzing the limitations of conventional in-cloud computing would reveal that on-device learning is a promising research direction to meet the requirements of edge intelligence applications. As to the cutting-edge research of TinyML, implementing a high-efficiency learning framework and enabling system-level acceleration is one of the most fundamental issues. This book presents a comprehensive discussion of the latest research progress and provides system-level insights on designing TinyML frameworks, including neural network design, training algorithm optimization and domain-specific hardware acceleration. It identifies the main challenges when deploying TinyML tasks in the real world and guides the researchers to deploy a reliable learning system. This book will be of interest to students and scholars in the field of edge intelligence, especially to those with sufficient professional Edge AI skills. It will also be an excellent guide for researchers to implement high-performance TinyML systems.
This textbook describes the hands-on application of data science techniques to solve problems in manufacturing and the Industrial Internet of Things (IIoT). Monitoring and managing operational performance is a crucial activity for industrial and business organisations. The emergence of low-cost, accessible computing and storage, through Industrial Digital Technologies (IDT) and Industry 4.0, has generated considerable interest in innovative approaches to doing more with data. Data science, predictive analytics, machine learning, artificial intelligence and general approaches to modelling, simulating and visualising industrial systems have often been considered topics only for research labs and academic departments. This textbook debunks the mystique around applied data science and shows readers, using tutorial-style explanations and real-life case studies, how practitioners can develop their own understanding of performance to achieve tangible business improvements. All exercises can be completed with commonly available tools, many of which are free to install and use. Readers will learn how to use tools to investigate, diagnose, propose and implement analytics solutions that will provide explainable results to deliver digital transformation.
This book presents the proceedings of the 9th Asian South Pacific Association of Sport Psychology International Congress (ASPASP) 2022, Kuching, Malaysia, which entails the different sporting innovation themes, namely, Applied Sport and Social Psychology, Health and Exercise, Motor Control and Learning, Counselling and Clinical Psychology, Biomechanics, Data Mining and Machine Learning in Sports amongst others. It presents the state-of-the-art technological advancements towards the aforesaid themes and provides a platform to shape the future direction of sport science, specifically in the field sports and exercise psychology. ​
Frontiers of Evolutionary Computation brings together eleven
contributions by international leading researchers discussing what
significant issues still remain unresolved in the field of
Evolutionary Computation (EC). They explore such topics as the role
of building blocks, the balancing of exploration with exploitation,
the modeling of EC algorithms, the connection with optimization
theory and the role of EC as a meta-heuristic method, to name a
few. The articles feature a mixture of informal discussion
interspersed with formal statements, thus providing the reader an
opportunity to observe a wide range of EC problems from the
investigative perspective of world-renowned researchers. These
prominent researchers include: Frontiers of Evolutionary Computation is ideal for researchers and students who want to follow the process of EC problem-solving and for those who want to consider what frontiers still await their exploration.
This is the first technical book that considers tests as public tools and examines how to engineer and process test data, extract the structure within the data to be visualized, and thereby make test results useful for students, teachers, and the society. The author does not differentiate test data analysis from data engineering and information visualization. This monograph introduces the following methods of engineering or processing test data, including the latest machine learning techniques: classical test theory (CTT), item response theory (IRT), latent class analysis (LCA), latent rank analysis (LRA), biclustering (co-clustering), and Bayesian network model (BNM). CTT and IRT are methods for analyzing test data and evaluating students' abilities on a continuous scale. LCA and LRA assess examinees by classifying them into nominal and ordinal clusters, respectively, where the adequate number of clusters is estimated from the data. Biclustering classifies examinees into groups (latent clusters) while classifying items into fields (factors). Particularly, the infinite relational model discussed in this book is a biclustering method feasible under the condition that neither the number of groups nor the number of fields is known beforehand. Additionally, the local dependence LRA, local dependence biclustering, and bicluster network model are methods that search and visualize inter-item (or inter-field) network structure using the mechanism of BNM. As this book offers a new perspective on test data analysis methods, it is certain to widen readers' perspective on test data analysis.
This book offers a practical introduction to the use of artificial intelligence (AI) techniques to improve and optimise the various phases of the software development process, from the initial project planning to the latest deployment. All chapters were written by leading experts in the field and include practical and reproducible examples. Following the introductory chapter, Chapters 2-9 respectively apply AI techniques to the classic phases of the software development process: project management, requirement engineering, analysis and design, coding, cloud deployment, unit and system testing, and maintenance. Subsequently, Chapters 10 and 11 provide foundational tutorials on the AI techniques used in the preceding chapters: metaheuristics and machine learning. Given its scope and focus, the book represents a valuable resource for researchers, practitioners and students with a basic grasp of software engineering.
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.
This book covers the research area from multiple viewpoints including bibliometric analysis, reviews, empirical analysis, platforms, and future applications. The centralized training of deep learning and machine learning models not only incurs a high communication cost of data transfer into the cloud systems but also raises the privacy protection concerns of data providers. This book aims at targeting researchers and practitioners to delve deep into core issues in federated learning research to transform next-generation artificial intelligence applications. Federated learning enables the distribution of the learning models across the devices and systems which perform initial training and report the updated model attributes to the centralized cloud servers for secure and privacy-preserving attribute aggregation and global model development. Federated learning benefits in terms of privacy, communication efficiency, data security, and contributors' control of their critical data. |
![]() ![]() You may like...
Data Analytics on Graphs
Ljubisa Stankovic, Danilo P. Mandic, …
Hardcover
R3,602
Discovery Miles 36 020
Deep Learning Applications
Pier Luigi Mazzeo, Paolo Spagnolo
Hardcover
R3,519
Discovery Miles 35 190
Cyber-Physical System Solutions for…
Vanamoorthy Muthumanikandan, Anbalagan Bhuvaneswari, …
Hardcover
R7,578
Discovery Miles 75 780
Deep Learning Applications: In Computer…
Qi Xuan, Yun Xiang, …
Hardcover
R2,985
Discovery Miles 29 850
Deep Learning Techniques and…
J. Joshua Thomas, Pinar Karagoz, …
Hardcover
R7,702
Discovery Miles 77 020
Event Mining for Explanatory Modeling
Laleh Jalali, Ramesh Jain
Hardcover
R1,476
Discovery Miles 14 760
Demystifying Federated Learning for…
Sandeep Kautish, Gaurav Dhiman
Hardcover
R7,586
Discovery Miles 75 860
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain
Hardcover
R9,088
Discovery Miles 90 880
|