Listing 1 - 10 of 34 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 41st National Conference on Theoretical Computer Science, NCTCS 2023, held in Guangzhou, China, during July 21–23, 2023. The 16 full papers included in this book were carefully reviewed and selected from 70 submissions. They were organized in topical sections as follows: theoretical computer science, algorithm complexity, artificial intelligence, algorithm design, machine learning theory, computational model, formal methods, network security, software and application security.
Choose an application
This book draws on a range of intelligent computing methodologies to effectively detect and classify various carcinogenic diseases. These methodologies, which have been developed on a sound foundation of gene-level, cell-level and tissue-level carcinogenic datasets, are discussed in Chapters 1 and 2. Chapters 3, 4 and 5 elaborate on several intelligent gene selection methodologies such as filter methodologies and wrapper methodologies. In addition, various gene selection philosophies for identifying relevant carcinogenic genes are described in detail. In turn, Chapters 6 and 7 tackle the issues of using cell-level and tissue-level datasets to effectively detect carcinogenic diseases. The performance of different intelligent feature selection techniques is evaluated on cell-level and tissue-level datasets to validate their effectiveness in the context of carcinogenic disease detection. In closing, the book presents illustrative case studies that demonstrate the value of intelligent computing strategies.
Gene Expression Profiling. --- Datasets as Topic. --- Artificial Intelligence. --- Carcinogens. --- Neoplasms. --- Artificial intelligence --- Computer science. --- Engineering --- Data Science. --- Theory and Algorithms for Application Domains. --- Data Engineering. --- Data processing.
Choose an application
Computational intelligence comprises concepts, paradigms, algorithms, and implementations of systems that are intended to exhibit intelligent behavior in complex environments. It relies heavily on (at least) nature-inspired methods, which have the advantage that they tolerate incomplete, imprecise and uncertain knowledge and thus also facilitate finding solutions that are approximative, manageable and robust at the same time. Fully updated, this new edition of the authoritative textbook provides a clear and logical introduction to Computational Intelligence, covering the fundamental concepts, algorithms and practical implementations behind efforts to develop systems that exhibit intelligent behavior in complex environments. Rather than aim for completeness, the goal is to give a methodical introduction, supporting fundamental concepts and their implementations with explanation of the theoretical background of proposed problem solutions. Topics and features: Offers new material on deep learning, scalarization, large-scale optimization algorithms, and collective decision-making algorithms Contains numerous classroom-tested examples and definitions Discusses in detail the classical areas of artificial neural networks, fuzzy systems, evolutionary algorithms, and Bayes and Markov networks Reviews the latest developments, including such topics as ant colony optimization and probabilistic graphical models Provides supplementary material, including module descriptions, lecture slides, exercises with solutions, and software tools This seminal textbook is primarily meant as a companion book for lectures on the covered topics in the area of computational intelligence. However, it is also eminently suitable as a guidebook for self-study by students and practitioners from industry and commerce. Dr. Rudolf Kruse is the former leader of the Computational Intelligence Research Group and now Emeritus Professor of the Department of Computer Science at the University of Magdeburg, Germany. Dr. Sanaz Mostaghim is a full Professor of Computer Science and Dr. Christian Braune is a Senior Lecturer at the same institution. Dr. Christian Borgelt is a Professor of Data Science at the Paris Lodron University of Salzburg, Austria. Dr. Matthias Steinbrecher is a Development Architect at SAP SE, Potsdam, Germany.
Artificial intelligence. --- Engineering mathematics. --- Engineering --- Computational intelligence. --- Computer science. --- Artificial Intelligence. --- Mathematical and Computational Engineering Applications. --- Computational Intelligence. --- Theory and Algorithms for Application Domains. --- Data processing. --- Intel·ligència computacional
Choose an application
One of the main benefits of this book is that it presents a comprehensive and innovative eHealth framework that leverages deep learning and IoT wearable devices for the evaluation of Parkinson's disease patients. This framework offers a new way to assess and monitor patients' motor deficits in a personalized and automated way, improving the efficiency and accuracy of diagnosis and treatment. Compared to other books on eHealth and Parkinson's disease, this book offers a unique perspective and solution to the challenges facing patients and healthcare providers. It combines state-of-the-art technology, such as wearable devices and deep learning algorithms, with clinical expertise to develop a personalized and efficient evaluation framework for Parkinson's disease patients. This book provides a roadmap for the integration of cutting-edge technology into clinical practice, paving the way for more effective and patient-centered healthcare. To understand this book, readers should have a basic knowledge of eHealth, IoT, deep learning, and Parkinson's disease. However, the book provides clear explanations and examples to make the content accessible to a wider audience, including researchers, practitioners, and students interested in the intersection of technology and healthcare.
Machine learning. --- Medical informatics. --- Cloud Computing. --- Computer science. --- Image processing --- Computer vision. --- Machine Learning. --- Health Informatics. --- Theory and Algorithms for Application Domains. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Digital techniques. --- Cloud computing.
Choose an application
The nine-volume set constitutes the refereed proceedings of the 30th International Conference on Neural Information Processing, ICONIP 2023, held in Changsha, China, in November 2023. The 1274 papers presented in the proceedings set were carefully reviewed and selected from 652 submissions. The ICONIP conference aims to provide a leading international forum for researchers, scientists, and industry professionals who are working in neuroscience, neural networks, deep learning, and related fields to share their new ideas, progress, and achievements.
Pattern recognition systems. --- Computer science. --- Data mining. --- Data structures (Computer science). --- Information theory. --- Automated Pattern Recognition. --- Theory and Algorithms for Application Domains. --- Data Mining and Knowledge Discovery. --- Data Structures and Information Theory. --- Data structures (Computer science)
Choose an application
The nine-volume set constitutes the refereed proceedings of the 30th International Conference on Neural Information Processing, ICONIP 2023, held in Changsha, China, in November 2023. The 1274 papers presented in the proceedings set were carefully reviewed and selected from 652 submissions. The ICONIP conference aims to provide a leading international forum for researchers, scientists, and industry professionals who are working in neuroscience, neural networks, deep learning, and related fields to share their new ideas, progress, and achievements.
Neural computers --- Pattern recognition systems. --- Computer science. --- Data mining. --- Data structures (Computer science). --- Information theory. --- Automated Pattern Recognition. --- Theory and Algorithms for Application Domains. --- Data Mining and Knowledge Discovery. --- Data Structures and Information Theory. --- Data structures (Computer science)
Choose an application
This book presents a modified spherical harmonic expansion method in which the electromagnetic fields and their sources are expanded with the same set of spherical vector basis functions in a similar procedure. Explicit expressions for the electromagnetic fields, potentials, energies, and the related Green’s functions are derived for the spherical modes in both frequency domain and time domain. Based on the formulation, the relationships between the electromagnetic sources, the electromagnetic far fields, and the electromagnetic near fields are clearly revealed. In particular, a nonuniform transmission line model is developed for intuitively characterizing the total radiation process. The introduction of the cutoff radius and the cutoff mode degree provides a simple reference for determining the numbers of degrees of freedom of the fields associated with sources in a bounded region. Based on the theory, an efficient hybrid method for synthesizing antenna arrays with complex footprints is proposed and demonstrated with several numerical examples. Effective algorithms are also developed for reconstructing the radiating part of the current sources. This book is intended for researchers, engineers, and graduate students who are interested in studying the energy transfer in electromagnetic radiation, synthesis and measurement of antenna arrays, and applications of inverse electromagnetic source problems. .
Telecommunication. --- Electrical engineering. --- Mathematical physics. --- Computer simulation. --- Computer science. --- Microwaves, RF Engineering and Optical Communications. --- Electrical and Electronic Engineering. --- Computational Physics and Simulations. --- Theory and Algorithms for Application Domains.
Choose an application
Digital signal processing deals with extraction of useful information from signals. Signal processing algorithms help observe, analyse and transform signals. The objective of this book is to develop signal processing algorithms using Python. Python is an interpreted, object-oriented high-level programming language widely used in various software development fields such as data science, machine learning, web development and more. Digital Signal Laboratory is playing an important role in realizing signal processing algorithms, utilizing different software solutions. The intention of this textbook is to implement signal processing algorithms using Python. Since Python is an open-source language, students, researchers, and faculty can install and work with it without spending money, reducing the financial burden on institutions. Each chapter in this book begins with prelab questions, a set of Python examples to illustrate the concepts, exercises to strengthen the understanding of the concepts, and objective questions to help students prepare for competitive examinations. This book serves as an undergraduate textbook, it can be used for individual study, and it can also be used as the textbook for related courses.
Choose an application
This open access book presents the mathematical methods for huge data and network analysis. The automotive industry has made steady progress in technological innovations under the names of Connected Autonomous-Shared-Electric (CASE) and Mobility as a Service (MaaS). Needless to say, mathematics and informatics are important to support such innovations. As the concept of cars and movement itself is diversifying, they are indispensable for grasping the essence of the future mobility society and building the foundation for the next generation. Based on this idea, Research unit named "Advanced Mathematical Science for Mobility Society" was established at Kyoto University as a base for envisioning a future mobility society in collaboration with researchers led by Toyota Motor Corporation and Kyoto University. This book contains three main contents. 1. Mathematical models of flow 2. Mathematical methods for huge data and network analysis 3. Algorithm for mobility society The first one discusses mathematical models of pedestrian and traffic flow, as they are important for preventing accidents and achieving efficient transportation. The authors mainly focus on global dynamics caused by the interaction of particles. The authors discuss many-body particle systems in terms of geometry and box-ball systems. The second one consists of four chapters and deals with mathematical technologies for handling huge data related to mobility from the viewpoints of machine learning, numerical analysis, and statistical physics, which also includes blockchain techniques. Finally, the authors discuss algorithmic issues on mobility society. By making use of car-sharing service as an example of mobility systems, the authors consider how to construct and analyze algorithms for mobility system from viewpoints of control, optimization, and AI.
Computer science. --- Mathematical models. --- Quantitative research. --- Transportation engineering. --- Traffic engineering. --- Theory and Algorithms for Application Domains. --- Mathematical Modeling and Industrial Mathematics. --- Data Analysis and Big Data. --- Transportation Technology and Traffic Engineering.
Choose an application
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. Topics and features: Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest Helps develop a comprehensive understanding of modern applied cryptography Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum Supplies up-to-date security parameters for all cryptographic algorithms Incorporates chapter reviews and discussion on such topics as historical and societal context This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers. The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, from whichthey have drawn important lessons for their teaching.
Cryptography. --- Data encryption (Computer science). --- Data protection. --- Quantum communication. --- Computer science. --- Cryptology. --- Data and Information Security. --- Quantum Communications and Cryptography. --- Theory and Algorithms for Application Domains. --- Data encryption (Computer science)
Listing 1 - 10 of 34 | << page >> |
Sort by
|