Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
Machine Learning a branch of Artificial Intelligence is influencing the society, industry and academia at large. The adaptability of Python programming language to Machine Learning has increased its popularity further. Another technology on the horizon is Internet of Things (IoT). The present book tries to address IoT, Python and Machine Learning along with a small introduction to Image Processing. If you are a novice programmer or have just started exploring IoT or Machine Learning with Python, then this book is for you. Features: Raspberry Pi as IoT is described along with the procedure for installation and configuration. A simple introduction to Python Programming Language along with its popular library packages like NumPy, Pandas, SciPy and Matplotlib are dealt in an exhaustive manner along with relevant examples. Machine Learning along with Python Scikit-Learn library is explained to audience with an emphasis on supervised learning and classification. Image processing on IoT is introduced to the audience who love to apply Machine Learning algorithms to Images The book follows hands-on approach and provide a huge collection of Python programs.
This book provides an introduction to next generation smart screening technology for medical image analysis that combines artificial intelligence (AI) techniques with digital screening to develop innovative methods for detecting breast cancer. The authors begin with a discussion of breast cancer, its characteristics and symptoms, and the importance of early screening.They then provide insight on the role of artificial intelligence in global healthcare, screening methods for breast cancer using mammogram, ultrasound, and thermogram images, and the potential benefits of using AI-based systems for clinical screening to more accurately detect, diagnose, and treat breast cancer. Discusses various existing screening methods for breast cancer Presents deep information on artificial intelligence-based screening methods Discusses cancer treatment based on geographical differences and cultural characteristics
The book first explores the cybersecurity's landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law.
Integrate MLOps principles into existing or future projects using MLFlow, operationalize your models, and deploy them in AWS SageMaker, Google Cloud, and Microsoft Azure. This book guides you through the process of data analysis, model construction, and training. The authors begin by introducing you to basic data analysis on a credit card data set and teach you how to analyze the features and their relationships to the target variable. You will learn how to build logistic regression models in scikit-learn and PySpark, and you will go through the process of hyperparameter tuning with a validation data set. You will explore three different deployment setups of machine learning models with varying levels of automation to help you better understand MLOps. MLFlow is covered and you will explore how to integrate MLOps into your existing code, allowing you to easily track metrics, parameters, graphs, and models. You will be guided through the process of deploying and querying your models with AWS SageMaker, Google Cloud, and Microsoft Azure. And you will learn how to integrate your MLOps setups using Databricks. What You Will Learn Perform basic data analysis and construct models in scikit-learn and PySpark Train, test, and validate your models (hyperparameter tuning) Know what MLOps is and what an ideal MLOps setup looks like Easily integrate MLFlow into your existing or future projects Deploy your models and perform predictions with them on the cloud Who This Book Is For Data scientists and machine learning engineers who want to learn MLOps and know how to operationalize their models
This book discusses one of the major applications of artificial intelligence: the use of machine learning to extract useful information from multimodal data. It discusses the optimization methods that help minimize the error in developing patterns and classifications, which further helps improve prediction and decision-making. The book also presents formulations of real-world machine learning problems, and discusses AI solution methodologies as standalone or hybrid approaches. Lastly, it proposes novel metaheuristic methods to solve complex machine learning problems. Featuring valuable insights, the book helps readers explore new avenues leading toward multidisciplinary research discussions.
Dive into hyperparameter tuning of machine learning models and focus on what hyperparameters are and how they work. This book discusses different techniques of hyperparameters tuning, from the basics to advanced methods. This is a step-by-step guide to hyperparameter optimization, starting with what hyperparameters are and how they affect different aspects of machine learning models. It then goes through some basic (brute force) algorithms of hyperparameter optimization. Further, the author addresses the problem of time and memory constraints, using distributed optimization methods. Next you'll discuss Bayesian optimization for hyperparameter search, which learns from its previous history. The book discusses different frameworks, such as Hyperopt and Optuna, which implements sequential model-based global optimization (SMBO) algorithms. During these discussions, you'll focus on different aspects such as creation of search spaces and distributed optimization of these libraries. Hyperparameter Optimization in Machine Learning creates an understanding of how these algorithms work and how you can use them in real-life data science problems. The final chapter summaries the role of hyperparameter optimization in automated machine learning and ends with a tutorial to create your own AutoML script. Hyperparameter optimization is tedious task, so sit back and let these algorithms do your work. What You Will Learn Discover how changes in hyperparameters affect the model's performance. Apply different hyperparameter tuning algorithms to data science problems Work with Bayesian optimization methods to create efficient machine learning and deep learning models Distribute hyperparameter optimization using a cluster of machines Approach automated machine learning using hyperparameter optimization Who This Book Is For Professionals and students working with machine learning.
This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies. This is a great book on network security, which has lucid and well-planned chapters. All the latest security technologies are thoroughly explained with upcoming research issues. Details on Internet architecture, security needs, encryption, cryptography along with the usages of machine learning and artificial intelligence for network security are presented in a single cover. The broad-ranging text/reference comprehensively surveys network security concepts, methods, and practices and covers network security policies and goals in an integrated manner. It is an essential security resource for practitioners in networks and professionals who develop and maintain secure computer networks.
The book introduces some challenging methods and solutions to solve the human activity recognition challenge. This book highlights the challenge that will lead the researchers in academia and industry to move further related to human activity recognition and behavior analysis, concentrating on cooking challenge. Current activity recognition systems focus on recognizing either the complex label (macro-activity) or the small steps (micro-activities) but their combined recognition is critical for analysis like the challenge proposed in this book. It has 10 chapters from 13 institutes and 8 countries (Japan, USA, Switzerland, France, Slovenia, China, Bangladesh, and Columbia).
Successfully build, tune, deploy, and productionize any machine learning model, and know how to automate the process from data processing to deployment. This book is divided into three parts. Part I introduces basic cloud concepts and terminologies related to AWS services such as S3, EC2, Identity Access Management, Roles, Load Balancer, and Cloud Formation. It also covers cloud security topics such as AWS Compliance and artifacts, and the AWS Shield and CloudWatch monitoring service built for developers and DevOps engineers. Part II covers machine learning in AWS using SageMaker, which gives developers and data scientists the ability to build, train, and deploy machine learning models. Part III explores other AWS services such as Amazon Comprehend (a natural language processing service that uses machine learning to find insights and relationships in text), Amazon Forecast (helps you deliver accurate forecasts), and Amazon Textract. By the end of the book, you will understand the machine learning pipeline and how to execute any machine learning model using AWS. The book will also help you prepare for the AWS Certified Machine Learning-Specialty certification exam. What You Will Learn Be familiar with the different machine learning services offered by AWS Understand S3, EC2, Identity Access Management, and Cloud Formation Understand SageMaker, Amazon Comprehend, and Amazon Forecast Execute live projects: from the pre-processing phase to deployment on AWS Who This Book Is For Machine learning engineers who want to learn AWS machine learning services, and acquire an AWS machine learning specialty certification
This book assists readers with understanding the key aspects, problems and solutions related to the design of proper Multiple Access Schemes for MTC (Machine-Type Communications) and IoT applications in 5G-and-beyond wireless networks. An overview of MTC applications and their traffic features are also provided. In addition, it presents a comprehensive review of MTC access schemes including orthogonal multiple access schemes (OMA), non-orthogonal multiple access schemes (NOMA), massive MIMO-based schemes and fast uplink grant approaches. It also proposes efficient and reconfigurable access schemes deploying machine learning and optimization techniques to address the main requirements of MTC networks. This book discusses potential research directions to further enhance the performance of MTC access schemes. Machine-type communications are expected to account for the dominant share of the traffic in future wireless networks. While in traditional wireless networks, designed for human-type communications, the focus is on support of large packet sizes in downlink, machine-type communication systems deal with heavy uplink traffic. This is due to the nature of the tasks performed by machine-type communication devices, which is mainly reporting measured data or a detected event. Furthermore, in these networks, using the virtualization framework, the network infrastructure can be shared between different applications for which providing isolation is of high importance. To support these unique characteristics of machine-type communications, proper access schemes need to be developed, which is the focus of this book. This book benefits advanced-level students studying computer science and electrical engineering as a secondary textbook and researchers working in this field. Engineers and practitioners interested in the challenges and practical solutions of integrating MTC in the cloud radio access network of 5G-and-beyond cellular systems will want to purchase this book as well.
This book covers different aspects of real-world applications of optimization algorithms. It provides insights from the Sixth International Conference on Harmony Search, Soft Computing and Applications held at Istanbul University, Turkey, in July 2020. Harmony Search (HS) is one of the most popular metaheuristic algorithms, developed in 2001 by Prof. Joong Hoon Kim and Prof. Zong Woo Geem, that mimics the improvisation process of jazz musicians to seek the best harmony. The book consists of research articles on novel and newly proposed optimization algorithms; the theoretical study of nature-inspired optimization algorithms; numerically established results of nature-inspired optimization algorithms; and real-world applications of optimization algorithms and synthetic benchmarking of optimization algorithms.
The two-volume set CCIS 1332 and 1333 constitutes thoroughly refereed contributions presented at the 27th International Conference on Neural Information Processing, ICONIP 2020, held in Bangkok, Thailand, in November 2020.*For ICONIP 2020 a total of 378 papers was carefully reviewed and selected for publication out of 618 submissions. The 191 papers included in this volume set were organized in topical sections as follows: data mining; healthcare analytics-improving healthcare outcomes using big data analytics; human activity recognition; image processing and computer vision; natural language processing; recommender systems; the 13th international workshop on artificial intelligence and cybersecurity; computational intelligence; machine learning; neural network models; robotics and control; and time series analysis. * The conference was held virtually due to the COVID-19 pandemic.
Build machine learning web applications without having to learn a new language. This book will help you develop basic knowledge of machine learning concepts and applications. You'll learn not only theory, but also dive into code samples and example projects with TensorFlow.js. Using these skills and your knowledge as a web developer, you'll add a whole new field of development to your tool set. This will give you a more concrete understanding of the possibilities offered by machine learning. Discover how ML will impact the future of not just programming in general, but web development specifically. Machine learning is currently one of the most exciting technology fields with the potential to impact industries from health to home automation to retail, and even art. Google has now introduced TensorFlow.js-an iteration of TensorFlow aimed directly at web developers. Practical Machine Learning in JavaScript will help you stay relevant in the tech industry with new tools, trends, and best practices. What You'll Learn Use the JavaScript framework for ML Build machine learning applications for the web Develop dynamic and intelligent web content Who This Book Is For Web developers and who want a hands-on introduction to machine learning in JavaScript. A working knowledge of the JavaScript language is recommended.
This book presents a summary of artificial intelligence and machine learning techniques in its first two chapters. The remaining chapters of the book provide everything one must know about the basic artificial intelligence to modern machine intelligence techniques including the hybrid computational intelligence technique, using the concepts of several real-life solved examples, design of projects and research ideas. The solved examples with more than 200 illustrations presented in the book are a great help to instructors, students, non-AI professionals, and researchers. Each example is discussed in detail with encoding, normalization, architecture, detailed design, process flow, and sample input/output. Summary of the fundamental concepts with solved examples is a unique combination and highlight of this book.
The two-volume set CCIS 1332 and 1333 constitutes thoroughly refereed contributions presented at the 27th International Conference on Neural Information Processing, ICONIP 2020, held in Bangkok, Thailand, in November 2020.*For ICONIP 2020 a total of 378 papers was carefully reviewed and selected for publication out of 618 submissions. The 191 papers included in this volume set were organized in topical sections as follows: data mining; healthcare analytics-improving healthcare outcomes using big data analytics; human activity recognition; image processing and computer vision; natural language processing; recommender systems; the 13th international workshop on artificial intelligence and cybersecurity; computational intelligence; machine learning; neural network models; robotics and control; and time series analysis. * The conference was held virtually due to the COVID-19 pandemic.
This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020. Due to the COVID-19 outbreak problem, SPIoT-2020 conference was held online by Tencent Meeting. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.
With the intriguing development of technologies in several industries, along with the advent of ubiquitous computational resources, there are now ample opportunities to develop innovative computational technologies in order to solve a wide range of issues concerning uncertainty, imprecision, and vagueness in various real-life problems. The challenge of blending modern computational techniques with traditional computing methods has inspired researchers and academics alike to focus on developing innovative computational techniques. In the near future, computational techniques may provide vital solutions by effectively using evolving technologies such as computer vision, natural language processing, deep learning, machine learning, scientific computing, and computational vision. A vast number of intelligent computational algorithms are emerging, along with increasing computational power, which has significantly expanded the potential for developing intelligent applications. These proceedings of the International Conference on Inventive Computation Technologies [ICICT 2019] cover innovative computing applications in the areas of data mining, big data processing, information management, and security.
This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy (SPIoT-2020), held in Shanghai, China, on November 6, 2020. Due to the COVID-19 outbreak problem, SPIoT-2020 conference was held online by Tencent Meeting. It provides comprehensive coverage of the latest advances and trends in information technology, science and engineering, addressing a number of broad themes, including novel machine learning and big data analytics methods for IoT security, data mining and statistical modelling for the secure IoT and machine learning-based security detecting protocols, which inspire the development of IoT security and privacy technologies. The contributions cover a wide range of topics: analytics and machine learning applications to IoT security; data-based metrics and risk assessment approaches for IoT; data confidentiality and privacy in IoT; and authentication and access control for data usage in IoT. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals and provides a useful reference guide for newcomers to the IoT security and privacy field.
This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on December 20, 2019. Including contributions on system and network design that can support existing and future applications and services, it covers topics such as cloud computing system and network design, optimization for cloud computing, networking, and applications, green cloud system design, cloud storage design and networking, storage security, cloud system models, big data storage, intra-cloud computing, mobile cloud system design, real-time resource reporting and monitoring for cloud management, machine learning, data mining for cloud computing, data-driven methodology and architecture, and networking for machine learning systems.
This book gathers papers addressing state-of-the-art research in the areas of machine learning and predictive analysis, presented virtually at the Fourth International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2020), India. It covers topics such as intelligent agent and multi-agent systems in various domains, machine learning, intelligent information retrieval and business intelligence, intelligent information system development using design science principles, intelligent web mining and knowledge discovery systems.
This book gathers the latest quality research work of Ph.D. students working on the current areas presented in the Doctoral Symposium on Computational Intelligence (DoSCI 2020). The book includes works in the areas of artificial intelligence, deep learning, evolutionary algorithms, swarm intelligence, fuzzy sets and vague sets, rough set theoretic approaches, quantum-inspired computational intelligence, hybrid computational intelligence, machine learning, computer vision, soft computing, distributed computing, parallel and grid computing, cloud computing, high-performance computing, biomedical computing, decision support and decision making. The book is useful for researchers, students, engineers, practitioners and academicians in their advance studies.
Algorithms are now widely employed to make decisions that have increasingly far-reaching impacts on individuals and society as a whole ("algorithmic governance"), which could potentially lead to manipulation, biases, censorship, social discrimination, violations of privacy, property rights, and more. This has sparked a global debate on how to regulate AI and robotics ("governance of algorithms"). This book discusses both of these key aspects: the impact of algorithms, and the possibilities for future regulation.
This book addresses the principles and applications of metaheuristic approaches in engineering and related fields. The first part covers metaheuristics tools and techniques such as ant colony optimization and Tabu search, and their applications to several classes of optimization problems. In turn, the book's second part focuses on a wide variety of metaheuristics applications in engineering and/or the applied sciences, e.g. in smart grids and renewable energy. In addition, the simulation codes for the problems discussed are included in an appendix for ready reference. Intended for researchers aspiring to learn and apply metaheuristic techniques, and gathering contributions by prominent experts in the field, the book offers readers an essential introduction to metaheuristics, its theoretical aspects and applications.
The book presents research that contributes to the development of intelligent dialog systems to simplify diverse aspects of everyday life, such as medical diagnosis and entertainment. Covering major thematic areas: machine learning and artificial neural networks; algorithms and models; and social and biometric data for applications in human-computer interfaces, it discusses processing of audio-visual signals for the detection of user-perceived states, the latest scientific discoveries in processing verbal (lexicon, syntax, and pragmatics), auditory (voice, intonation, vocal expressions) and visual signals (gestures, body language, facial expressions), as well as algorithms for detecting communication disorders, remote health-status monitoring, sentiment and affect analysis, social behaviors and engagement. Further, it examines neural and machine learning algorithms for the implementation of advanced telecommunication systems, communication with people with special needs, emotion modulation by computer contents, advanced sensors for tracking changes in real-life and automatic systems, as well as the development of advanced human-computer interfaces. The book does not focus on solving a particular problem, but instead describes the results of research that has positive effects in different fields and applications.
This book describes new theories and applications of artificial neural networks, with a special focus on answering questions in neuroscience, biology and biophysics and cognitive research. It covers a wide range of methods and technologies, including deep neural networks, large scale neural models, brain computer interface, signal processing methods, as well as models of perception, studies on emotion recognition, self-organization and many more. The book includes both selected and invited papers presented at the XXII International Conference on Neuroinformatics, held on October 12-16, 2020, Moscow, Russia. |
You may like...
Optimization of Sustainable Enzymes…
J Satya Eswari, Nisha Suryawanshi
Hardcover
R2,746
Discovery Miles 27 460
Artificial Intelligence and Smart…
Utku Kose, M Mondal, …
Hardcover
|