![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Machine learning
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more. The book explains how advancements in the world of the web have been achieved and how the experiences of users can be analyzed. It looks at data gathering by the various electronic means and explores techniques for analysis and management, how to manage voluminous data, user responses, and more. This volume provides an abundance of valuable information for professionals and researchers working in the field of business analytics, big data, social network data, computer science, analytical engineering, and forensic analysis. Moreover, the book provides insights and support from both practitioners and academia in order to highlight the most debated aspects in the field.
Discusses deep learning, IOT, machine learning, and biomedical data analysis with broad coverage of basic scientific applications Presents deep learning and the tremendous improvement in accuracy, robustness, and cross-language generalizability it has over conventional approaches Discusses various techniques of IOT systems for healthcare data analytics Provides state-of-the-art methods of deep learning, machine learning and IoT in biomedical and health informatics Focuses more on the application of algorithms in various real life biomedical and engineering problems
Fully focused on addressing the missing connection between signal processing and ML. Provides one-stop guide reference for the readers. Oriented towards the material and flow with regard to general introduction, technical aspects. Comprehensively elaborates on the material with examples and.
The book presents the confluence of wearable and wireless inertial sensor systems, such as a smartphone, for deep brain stimulation for treating movement disorders, such as essential tremor, and machine learning. The machine learning distinguishes between distinct deep brain stimulation settings, such as 'On' and 'Off' status. This achievement demonstrates preliminary insight with respect to the concept of Network Centric Therapy, which essentially represents the Internet of Things for healthcare and the biomedical industry, inclusive of wearable and wireless inertial sensor systems, machine learning, and access to Cloud computing resources.Imperative to the realization of these objectives is the organization of the software development process. Requirements and pseudo code are derived, and software automation using Python for post-processing the inertial sensor signal data to a feature set for machine learning is progressively developed. A perspective of machine learning in terms of a conceptual basis and operational overview is provided. Subsequently, an assortment of machine learning algorithms is evaluated based on quantification of a reach and grasp task for essential tremor using a smartphone as a wearable and wireless accelerometer system.Furthermore, these skills regarding the software development process and machine learning applications with wearable and wireless inertial sensor systems enable new and novel biomedical research only bounded by the reader's creativity.
Behavior Analysis with Machine Learning Using R introduces machine learning and deep learning concepts and algorithms applied to a diverse set of behavior analysis problems. It focuses on the practical aspects of solving such problems based on data collected from sensors or stored in electronic records. The included examples demonstrate how to perform common data analysis tasks such as: data exploration, visualization, preprocessing, data representation, model training and evaluation. All of this, using the R programming language and real-life behavioral data. Even though the examples focus on behavior analysis tasks, the covered underlying concepts and methods can be applied in any other domain. No prior knowledge in machine learning is assumed. Basic experience with R and basic knowledge in statistics and high school level mathematics are beneficial. Features: Build supervised machine learning models to predict indoor locations based on WiFi signals, recognize physical activities from smartphone sensors and 3D skeleton data, detect hand gestures from accelerometer signals, and so on. Program your own ensemble learning methods and use Multi-View Stacking to fuse signals from heterogeneous data sources. Use unsupervised learning algorithms to discover criminal behavioral patterns. Build deep learning neural networks with TensorFlow and Keras to classify muscle activity from electromyography signals and Convolutional Neural Networks to detect smiles in images. Evaluate the performance of your models in traditional and multi-user settings. Build anomaly detection models such as Isolation Forests and autoencoders to detect abnormal fish behaviors. This book is intended for undergraduate/graduate students and researchers from ubiquitous computing, behavioral ecology, psychology, e-health, and other disciplines who want to learn the basics of machine learning and deep learning and for the more experienced individuals who want to apply machine learning to analyze behavioral data.
is the first book to set out a range of machine learning methods for efficient resource management in a large distributed network of clouds. predictive analytics is an integral part of efficient cloud resource management, and this book gives a future research direction to researchers in this domain. it is written by leading international researchers.
is the first book to set out a range of machine learning methods for efficient resource management in a large distributed network of clouds. predictive analytics is an integral part of efficient cloud resource management, and this book gives a future research direction to researchers in this domain. it is written by leading international researchers.
This volume contains select papers presented during the 2nd National Conference on Multidisciplinary Analysis and Optimization. It discusses new developments at the core of optimization methods and its application in multiple applications. The papers showcase fundamental problems and applications which include domains such as aerospace, automotive and industrial sectors. The variety of topics and diversity of insights presented in the general field of optimization and its use in design for different applications will be of interest to researchers in academia or industry.
This unique compendium gives an updated presentation of clustering, one of the most challenging tasks in machine learning. The book provides a unitary presentation of classical and contemporary algorithms ranging from partitional and hierarchical clustering up to density-based clustering, clustering of categorical data, and spectral clustering.Most of the mathematical background is provided in appendices, highlighting algebraic and complexity theory, in order to make this volume as self-contained as possible. A substantial number of exercises and supplements makes this a useful reference textbook for researchers and students.
In the past few years, with the evolution of advanced persistent threats and mutation techniques, sensitive and damaging information from a variety of sources have been exposed to possible corruption and hacking. Machine learning, artificial intelligence, predictive analytics, and similar disciplines of cognitive science applications have been found to have significant applications in the domain of cyber security. Machine Learning and Cognitive Science Applications in Cyber Security examines different applications of cognition that can be used to detect threats and analyze data to capture malware. Highlighting such topics as anomaly detection, intelligent platforms, and triangle scheme, this publication is designed for IT specialists, computer engineers, researchers, academicians, and industry professionals interested in the impact of machine learning in cyber security and the methodologies that can help improve the performance and reliability of machine learning applications.
Deep learning algorithms have brought a revolution to the computer vision community by introducing non-traditional and efficient solutions to several image-related problems that had long remained unsolved or partially addressed. This book presents a collection of eleven chapters where each individual chapter explains the deep learning principles of a specific topic, introduces reviews of up-to-date techniques, and presents research findings to the computer vision community. The book covers a broad scope of topics in deep learning concepts and applications such as accelerating the convolutional neural network inference on field-programmable gate arrays, fire detection in surveillance applications, face recognition, action and activity recognition, semantic segmentation for autonomous driving, aerial imagery registration, robot vision, tumor detection, and skin lesion segmentation as well as skin melanoma classification. The content of this book has been organized such that each chapter can be read independently from the others. The book is a valuable companion for researchers, for postgraduate and possibly senior undergraduate students who are taking an advanced course in related topics, and for those who are interested in deep learning with applications in computer vision, image processing, and pattern recognition.
This book is open access. Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share of the data traveling on the net and the preferred communications means for most users, it has also become integral part of most innovative applications in the digital information ecosystem that serves various sectors of society, from the entertainment, to journalism, to politics. Undoubtedly, the advances in deep learning and computational imaging contributed significantly to this outcome. The underlying technologies that drive this trend, however, also pose a profound challenge in establishing trust in what we see, hear, and read, and make media content the preferred target of malicious attacks. In this new threat landscape powered by innovative imaging technologies and sophisticated tools, based on autoencoders and generative adversarial networks, this book fills an important gap. It presents a comprehensive review of state-of-the-art forensics capabilities that relate to media attribution, integrity and authenticity verification, and counter forensics. Its content is developed to provide practitioners, researchers, photo and video enthusiasts, and students a holistic view of the field.
The book discusses various aspects of biophysics. It starts from the popular article on neurobiology to quantum biology and ends up with the consciousness of a human being and in the universe. The authors have covered eight nine different aspects of natural intelligence, starting from time crystal found in the chemical biology to the vibrations and the resonance of proteins. They have covered a wide spectrum of hierarchical communication among different biological systems. Most importantly, authors have taken an utmost care that even school-level students fall in love with biophysics; it is simple and more of a textbook and definitely bring the readers to a world of biology and physics like never before. Most authors are experienced academicians, and they have used lucid and simple language to make the content interesting for the readers.
This book is a new contribution aiming to give some last research findings in the field of optimization and computing. This work is in the same field target than our two previous books published: "Recent Developments in Metaheuristics" and "Metaheuristics for Production Systems", books in Springer Series in Operations Research/Computer Science Interfaces. The challenge with this work is to gather the main contribution in three fields, optimization technique for production decision, general development for optimization and computing method and wider spread applications. The number of researches dealing with decision maker tool and optimization method grows very quickly these last years and in a large number of fields. We may be able to read nice and worthy works from research developed in chemical, mechanical, computing, automotive and many other fields.
This book identifies Artificial Intelligence (AI) as a growing field that is being incorporated into many aspects of human life, including healthcare practice and delivery. The precision, automation, and potential of AI brings multiple benefits to the way disease is diagnosed, investigated and treated. Currently, there is a lack of any appreciable understanding of AI and this book provides detailed understandings, which include; foundational concepts, current applications, future challenges amongst most healthcare practitioners. The book is divided into four sections: basic concepts, current applications, limitations and future directions. Each section is comprised of chapters written by expert academics, researchers and practitioners at the intersection between AI and medicine. The purpose of the book is to promote AI literacy as an important component of modern medical practice. This book is suited for all readers as it requires no previous knowledge, it walks non-technical clinicians through the complex ideas and concepts in an easy to understand manner.
1. This book will attempt to provide a wide range of research and development work under the umbrella of Intelligent Computing. Aim of this book is to motivate research and applications of advanced Intelligent Computing. This book will try to gather original contributions from prospective authors specially solicited on topics covered under broad areas such as Linguistic Computing, Statistical Computing, Data Computing and Ambient Applications. Some of the topics will cover industrial issues/applications and academic research into intelligent computing. 2. Deep Learning architectures are being increasingly used in day to day applications where traditional machine learning and deep learning algorithms were used. Their improved accuracy, effectiveness in handling large data as well as reduced redundancy have major impact on growing application in the relevant field creating a demand for such a book in the market 3. This is an edited book that covers a very wide are of AI applications, so it will be difficult to specify principle competitive books. This book could be unique in terms of the subject are that the book trying to cover
Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial intelligence technologies, and the privacy of the data used in the training and testing periods is also causing increasing concern among users. This book reviews the latest research in the area, including effective applications of machine learning methods in cybersecurity solutions and the urgent security risks related to the machine learning models. The book is divided into three parts: Cyber Security Based on Machine Learning; Security in Machine Learning Methods and Systems; and Security and Privacy in Outsourced Machine Learning. Addressing hot topics in cybersecurity and written by leading researchers in the field, the book features self-contained chapters to allow readers to select topics that are relevant to their needs. It is a valuable resource for all those interested in cybersecurity and robust machine learning, including graduate students and academic and industrial researchers, wanting to gain insights into cutting-edge research topics, as well as related tools and inspiring innovations.
This book is devoted to the emerging field of integrated visual knowledge discovery that combines advances in artificial intelligence/machine learning and visualization/visual analytic. A long-standing challenge of artificial intelligence (AI) and machine learning (ML) is explaining models to humans, especially for live-critical applications like health care. A model explanation is fundamentally human activity, not only an algorithmic one. As current deep learning studies demonstrate, it makes the paradigm based on the visual methods critically important to address this challenge. In general, visual approaches are critical for discovering explainable high-dimensional patterns in all types in high-dimensional data offering "n-D glasses," where preserving high-dimensional data properties and relations in visualizations is a major challenge. The current progress opens a fantastic opportunity in this domain. This book is a collection of 25 extended works of over 70 scholars presented at AI and visual analytics related symposia at the recent International Information Visualization Conferences with the goal of moving this integration to the next level. The sections of this book cover integrated systems, supervised learning, unsupervised learning, optimization, and evaluation of visualizations. The intended audience for this collection includes those developing and using emerging AI/machine learning and visualization methods. Scientists, practitioners, and students can find multiple examples of the current integration of AI/machine learning and visualization for visual knowledge discovery. The book provides a vision of future directions in this domain. New researchers will find here an inspiration to join the profession and to be involved for further development. Instructors in AI/ML and visualization classes can use it as a supplementary source in their undergraduate and graduate classes.
This book is a collection of best selected research papers presented at 7th International Conference on Computing in Engineering and Technology (ICCET 2022), organized by Dr. Babasaheb Ambedkar Technological University, Lonere, India, during February 12 - 13, 2022. Focusing on frontier topics and next-generation technologies, it presents original and innovative research from academics, scientists, students, and engineers alike. The theme of the conference is Applied Information Processing System.
* A useful guide to financial product modeling and to minimizing business risk and uncertainty * Looks at wide range of financial assets and markets and correlates them with enterprises' profitability * Introduces advanced and novel machine learning techniques in finance such as Support Vector Machine, Neural Networks, Random Forest, K-Nearest Neighbors, Extreme Learning Machine, Deep Learning Approaches and applies them to analyze finance data sets * Real world applicable examples to further understanding
This book provides a survey of deep learning approaches to domain adaptation in computer vision. It gives the reader an overview of the state-of-the-art research in deep learning based domain adaptation. This book also discusses the various approaches to deep learning based domain adaptation in recent years. It outlines the importance of domain adaptation for the advancement of computer vision, consolidates the research in the area and provides the reader with promising directions for future research in domain adaptation. Divided into four parts, the first part of this book begins with an introduction to domain adaptation, which outlines the problem statement, the role of domain adaptation and the motivation for research in this area. It includes a chapter outlining pre-deep learning era domain adaptation techniques. The second part of this book highlights feature alignment based approaches to domain adaptation. The third part of this book outlines image alignment procedures for domain adaptation. The final section of this book presents novel directions for research in domain adaptation. This book targets researchers working in artificial intelligence, machine learning, deep learning and computer vision. Industry professionals and entrepreneurs seeking to adopt deep learning into their applications will also be interested in this book.
This is the first book to explain Ripple-Down Rules, an approach to building knowledge-based systems which is more similar to machine learning methods than other rule-based systems but which depends on using an expert rather than applying statistics to data The book provides detailed worked examples and uses publicly available software to demonstrate Ripple-Down Rules The examples enable users to build their own RDR tools
This is the first book to explain Ripple-Down Rules, an approach to building knowledge-based systems which is more similar to machine learning methods than other rule-based systems but which depends on using an expert rather than applying statistics to data The book provides detailed worked examples and uses publicly available software to demonstrate Ripple-Down Rules The examples enable users to build their own RDR tools
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes. Predicting health outcomes using data modeling approaches is an emerging field that can reveal important insights into disproportionate spending patterns. This book presents data driven methods, especially machine learning, for understanding and approaching the high utilizers problem, using the example of a large public insurance program. It describes important goals for data driven approaches from different aspects of the high utilizer problem, and identifies challenges uniquely posed by this problem. Key Features: Introduces basic elements of health care data, especially for administrative claims data, including disease code, procedure codes, and drug codes Provides tailored supervised and unsupervised machine learning approaches for understanding and predicting the high utilizers Presents descriptive data driven methods for the high utilizer population Identifies a best-fitting linear and tree-based regression model to account for patients' acute and chronic condition loads and demographic characteristics |
You may like...
Righteous Deception - German Officers…
David A. Johnson
Hardcover
Human Aspects in Ambient Intelligence…
Tibor Bosse, Diane J. Cook, …
Hardcover
|