Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    almahu_9949502366802882
    Umfang: 1 online resource (various pagings) : , illustrations (some color).
    ISBN: 9780750348010 , 9780750348003
    Serie: [IOP release $release]
    Inhalt: Human-assisted computation, also called humanized or human-based computing, harnesses human intelligence to solve computational problems that are beyond the scope of existing artificial intelligence (AI) algorithms by outsourcing certain steps to humans. This approach exploits differences in abilities between humans and computer agents, creating a symbiotic human-computer interaction, and can be helpful in solving many AI-complete problems. This edited book focuses on well-known and new methodologies of optimization techniques in human-assisted computing that are used to resolve some of the very complicated and hard problems we face today. Excitingly, techniques originally developed for solutions in engineering, science and technology are being applied to areas of economics, finance and, especially the social sciences. The book reviews present and developing deep model-based methods of mathematics and the less model-based, also called smart or intelligent algorithms, with their roots in engineering, computer science or informatics and how combining the strengths of humans and computers can create powerful solutions. Bridging several scientific disciplines, this book will be essential reading for scientists, engineers and applied mathematicians alike. Part of IOP Series in Next Generation Computing.
    Anmerkung: "Version: 20230401"--Title page verso. , 1. Machine learning algorithms to improve crop evapotranspiration prediction covering a broad range of environmental gradients in agriculture 4.0 : a review / Parijata Majumdar, Diptendu Bhattacharya, Sanjoy Mitra and Mukhdeep Singh Manshahia -- 2. Iris-based biometric cryptosystem / Ivan A. Matveev and Igor S. Litvinchev -- 3. Bio-inspired approaches for a combined economic emission dispatch problem / Pandian Vasant, Anirban Banik, J. Joshua Thomas, Jose Antonio Marmolejo-Saucedo, Ugo Fiore and Gerhard-Wilhelm Weber -- 4. Eigenvalue clustering for spectrum sensing : throughput and energy evaluation for cognitive radio-Internet of Things network / Manish Kumar Giri and Saikat Majumder -- 5. Modeling the evolution of complex networks arising in applications / Felix Sadyrbaev -- 6. Computing the intelligent privacy-engineered organization : a metamodel of effective information transparency enhancing tools/technologies / Ljerka Luic and Marta Alic -- 7. A model of cells' regeneration towards smart healthcare / Hiroshi Yoshida -- 8. Anomaly detection in location-based services / Jane Rubel Angelina Jeyaraj, Subhashini Sottallu Janakiram, Gayathri Narayana Yegnanarayanan and Yegnanarayanan Venkataraman -- 9. Optimized packing soft ellipses / T. Romanova, Yu Stoyan, A. Pankratov, I. Litvinchev, O. Kravchenko, Z. Duryagina, O. Melashenko and A. Chugai -- 10. Analysis of phishing attacks / Ladislav Burita, Kamil Halouzka and Pavel Kozak -- 11. Human-assisted intelligent computing and ecological modeling (drought early warning system) / Asmae Zbiri and Azeddine Hachmi -- 12. Attention mechanisms in machine vision : a survey of the state of the art / Abdul Mueed Hafiz -- 13. Sparse 2D packing in thermal deburring with shock waves acting effects / Sergiy Plankovskyy, Tatiana Romanova, Alexander Pankratov, Igor S. Litvinchev, Yevgen Tsegelnyk, Olga Shypul and Pandian Vasant -- 14. Implementation of smart manufacturing in small and medium-sized enterprises / Udai C. Jhaa and Abhijeet A. Shahadeb -- 15. Performance analysis of fractal image compression methods for medical images : a review / Parijata Majumdar, Sanjoy Mitra, Sayan Kumar Das and Pallavi Majumdar -- 16. Mobile edge computing for efficient energy management systems / Padmanayaki Selvarajan, Betty Elezebeth Samuel, Krishnamoorthy Ranganathan, Arvind Kumar Shukla, M. Amina Begum and Sundaram Arun -- 17. Modeling 3D nanocomposites with multi-spherical inclusions by optimized packing / E. Strelnikova, T. Romanova, A. Pankratov, I. Litvinchev and K. Degtyariov -- 18. Sentiment analysis for web series using deep learning techniques in the times of COVID-19 / Muskan Dixit and Saravjeet Singh -- 19. Generalized receiver : signal processing in DS-CDMA wireless communication systems over fading channels / Vyacheslav Tuzlukov -- 20. Critical success factors for successfully implementation of smart manufacturing in the context of Industry 4.0 / U.C. Jha -- 21. An efficient heart disease diagnosis prediction model using decision tree classifiers : Streamlit / D. Doreen Hephzibah Miriam, C.R. Rene Robin, Rachel Nallathamby and B. Yamini -- 22. Mathematical and informational support of decision-making in risk management of cross-border high technology projects / Marina Batova, Irina Baranova, Vyacheslav Baranov, Sergey Mayorov, Oleg Korobchenko and Kai Zhao -- 23. Artificial intelligence (AI) in the era of precision medicine / Fathinul Fikri Ahmad Saad, Shazreen Shaharudin, Mohd Nawawi Abdullah, Rabiatul Adawiyah, Amirul Tajuddin, Ahmad Danial Ahmad Shahrir, Khairul Alif Khairumman and Syed Ejaz Shamim Syed Reyaz Uddin Ahmed -- 24. Optimal choice for convenience store chain in Vietnam / Nguyen Thi Ngan and Bui Huy Khoi -- 25. Study of groundwater using hydrodynamic models / Irina Polshkova -- 26. Long-term fatigue assessment of offshore monopile structure under corrosive environmental condition / Chana Sinsabvarodom, Wonsiri Punurai, Pornpong Asavadorndeja and Jin Wang -- 27. Estimation of crop water use in agricultural systems / R. Deepa and Mukhdeep Singh Manshahia -- 28. IOT based healthcare monitoring system for smart city applications / S.C. Dharmadhikari, Afshan Kausar, Mahendra Deore, Nilofer Shrenik Kittad, V.S. Bhagavan and R. Krishnamoorthy -- 29. Smart healthcare : the new digital revolution in medical management / Parameswaran Radhika Ravi and Ravi Ramaswamy -- 30. Adequate implementation of simulation tools for enhancement performance on existing network infrastructure devices (OPNET) / Yakubu Ajiji Makeri -- 31. Artificial intelligence based garbage monitoring system (GMS) for garbage management using integrated sensors / C. Gomathi, A. Adaikalam and T. Kavitha -- 32. Use of Internet of Things technology in the medical field during the pandemic era / Ashish Verma and Sherry N Siddiqui -- 33. Performance comparison of data security algorithms / M. Sumathi, R. Narmadha and G.D. Anbarasi Jebaselvi. , Also available in print. , System requirements: Adobe Acrobat Reader, EPUB reader, or Kindle reader. , Mode of access: World Wide Web.
    Weitere Ausg.: Print version: ISBN 9780750347990
    Weitere Ausg.: ISBN 9780750348027
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9949767408602882
    Umfang: 1 online resource (726 pages)
    Ausgabe: 1st ed.
    ISBN: 9780750348034
    Serie: IOP Ebooks Series
    Inhalt: This edited book focuses on well-known and new methodologies of optimization techniques in human-assisted computing that are used to resolve some of the very complicated and hard problems we face today.
    Anmerkung: Intro -- Preface -- Foreword -- References -- Acknowledgments -- Editor biographies -- Mukhdeep Singh Manshahia -- Igor S Litvinchev -- Gerhard-Wilhelm Weber -- J Joshua Thomas -- Pandian Vasant -- List of contributors -- Chapter 1 Machine learning algorithms to improve crop evapotranspiration prediction covering a broad range of environmental gradients in agriculture 4.0: a review -- 1.1 Introduction -- 1.2 Relevant literature -- 1.3 Some standard methods to calculate evapotranspiration -- 1.4 Results and discussions on major findings -- 1.5 Conclusion and future work -- References -- Chapter 2 Iris-based biometric cryptosystem -- 2.1 Introduction -- 2.2 Eye segmentation framework -- 2.3 Eye segmentation methods -- 2.3.1 Center detection -- 2.3.2 Base radii detection -- 2.3.3 Pupil border refinement -- 2.4 Selecting the cryptokey embedding method -- 2.5 Determining the threshold probability -- 2.6 Description of methods -- 2.6.1 Decorrelation by pseudorandom shuffling -- 2.6.2 Bit-majority coding -- 2.6.3 Hadamard block coding -- 2.6.4 Reed-Solomon message coding -- 2.6.5 Additional error of code recovery -- 2.7 Selection of coding scheme parameters -- 2.8 Conclusion -- References -- Chapter 3 Bio-inspired approaches for a combined economic emission dispatch problem -- 3.1 Introduction -- 3.1.1 Literature review -- 3.1.2 Objective of the study -- 3.2 Problem formulation -- 3.2.1 Combined economic emission dispatch -- 3.2.2 Particle swarm optimization -- 3.2.3 Quantum particle swarm optimization -- 3.2.4 Qunatum inspired Bat algorithm -- 3.3 Results and discussions -- 3.3.1 Single objective emission dispatch problem -- 3.3.2 Quantum inspired Bat algorithm -- 3.3.3 Summary of QBA and PSO -- 3.3.4 Single objective economic load dispatch problem -- 3.3.5 Quantum inspired particle Swarm optimization -- 3.3.6 Summary. , 3.3.7 Multi objective CEED problem -- 3.3.8 Quantum inspired particle Swarm optimization -- 3.3.9 Quantum inspired Bat algorithm -- 3.3.10 Summary -- 3.4 Conclusions and future research direction -- Acknowledgement -- Conflicts of interest -- References -- Chapter 4 Eigenvalue clustering for spectrum sensing: throughput and energy evaluation for cognitive radio-Internet of Things network -- Symbols -- 4.1 Introduction -- 4.2 Background and motivation -- 4.3 Adopted CR-IoT scenario -- 4.3.1 System model -- 4.3.2 Conventional CSS techniques -- 4.4 Proposed method for CSS based on eigenvalue clustering -- 4.4.1 Maximum-second maximum-minimum eigenvalue clustering -- 4.5 Energy and throughput analysis -- 4.5.1 Energy analysis -- 4.5.2 Throughput analysis -- 4.5.3 Complexity analysis -- 4.6 Simulation results -- 4.6.1 Comparison of ROC performance -- 4.6.2 Comparison of throughput performance -- 4.6.3 Comparison of energy consumption performance -- 4.6.4 Comparison of expected lifetime performance -- 4.7 Discussion -- 4.7.1 Major findings of research -- 4.7.2 Limitations of research -- 4.8 Conclusion -- References -- Chapter 5 Modeling the evolution of complex networks arising in applications -- 5.1 Introduction -- 5.2 GRN networks -- 5.3 Hierarchy of systems -- 5.3.1 General -- 5.3.2 2D systems -- 5.4 3D systems -- 5.5 High-dimensional systems -- 5.5.1 4D system -- 5.5.2 Examples of 6D systems -- 5.6 Elements of reverse engineering -- 5.6.1 Location of a critical point -- 5.6.2 Creating a critical point of the desired type -- 5.7 Miscellaneous -- 5.8 Conclusions -- References -- Chapter 6 Computing the intelligent privacy-engineered organization: a metamodel of effective information transparency enhancing tools/technologies -- 6.1 Introduction -- 6.2 Transparency enhancing tools/technologies -- 6.2.1 Right to privacy and information transparency. , 6.2.2 Data privacy governance frameworks overview -- 6.3 Modelling effective transparency enhancing tools/technologies -- 6.3.1 Aligning privacy frameworks in transparency -- 6.3.2 Transparency requirements mining -- 6.3.3 Transparency requirements metamodel -- 6.3.4 Transparency requirements classification -- 6.4 Leveraging privacy principles -- 6.5 Research findings and limitations within the scope of the goal-based requirements analysis method -- 6.5.1 Major research findings and contributions -- 6.5.2 Limitations of research -- 6.6 Conclusion -- References -- Chapter 7 A model of cells' regeneration towards smart healthcare -- 7.1 Introduction -- 7.2 Model -- 7.3 Result and discussion -- 7.4 Conclusion and highlight -- 7.5 Future scope and literature review -- Acknowledgements -- References -- Chapter 8 Anomaly detection in location-based services -- 8.1 Introduction -- 8.2 Maps and navigation services -- 8.2.1 Navigation system -- 8.2.2 Mapping services -- 8.3 Location-based tracking services -- 8.3.1 Vehicle tracking services -- 8.3.2 Traffic tracking services -- 8.4 Anomaly detection in LBS -- 8.4.1 Route anomaly detection -- 8.4.2 User behavior anomaly detection -- 8.4.3 Fake check-in anomaly detection -- 8.5 Limitations -- 8.6 Conclusion and future enhancement -- References -- Chapter 9 Optimized packing soft ellipses -- 9.1 Introduction -- 9.2 The main problem -- 9.3 Geometric tools -- 9.3.1 Formulation of containment conditions -- 9.3.2 Formulation of non-overlapping constraints -- 9.4 Mathematical model -- 9.5 Solution strategy -- 9.5.1 Finding a feasible starting point -- 9.5.2 Compression algorithm -- 9.6 Computational results -- 9.7 Conclusions -- Acknowledgements -- Appendix A -- References -- Chapter 10 Analysis of phishing attacks -- 10.1 Introduction -- 10.2 Literature review -- 10.3 Methodology and used tools. , 10.3.1 The text analytical SW Tovek -- 10.4 Statistical analysis of phishing emails -- 10.5 Classification of phishing emails -- 10.5.1 Segment business -- 10.5.2 Segment fund -- 10.5.3 Segment charity -- 10.5.4 Segment transfer -- 10.5.5 Segment other -- 10.6 Content analysis of phishing emails -- 10.6.1 Person entity -- 10.6.2 Phone number entity -- 10.6.3 City and country entity -- 10.6.4 Email and website entity -- 10.7 Research results, their limits, and further research orientation -- 10.8 Discussion and conclusion -- References -- Chapter 11 Human-assisted intelligent computing and ecological modeling (drought early warning system) -- Abbreviaitons -- 11.l Introduction -- 11.1.1 Rangelands -- 11.1.2 Ecological modeling and early warning (theory) -- 11.1.3 Ecological modeling and early warning (applications) -- 11.2 Contribution of ecological modeling -- 11.2.1 Efficiency and algorithm theoretical to calibration of remote sensing data -- 11.2.2 Spatial and temporal analysis and polynomial regression -- 11.2.3 Spatial disaggregation and anomalies -- 11.3 Conclusion -- Appendix A: Prospects -- Appendix B: Ecological modeling -- Appendix C: Questions for the governing bodies -- Funding -- Acknowledgments -- References -- Chapter 12 Attention mechanisms in machine vision: a survey of the state of the art -- 12.1 Introduction -- 12.1.1 Self-attention -- 12.1.2 Masked self-attention -- 12.1.3 Multi-head attention -- 12.2 Attention-based deep learning architectures -- 12.2.1 Single-channel model -- 12.2.2 Multi-channel model -- 12.2.3 Skip-layer model -- 12.2.4 Bottom-up or top-down model -- 12.2.5 Skip-layer model with multi-scale saliency network -- 12.3 Attention and deep learning in machine vision: broad categories -- 12.3.1 Attention-based CNNs -- 12.3.2 CNN transformer pipelines -- 12.3.3 Hybrid transformers. , 12.4 Major research algorithms, trends, and limitations -- 12.5 Conclusion -- Conflict of interest -- Funding acknowledgement -- References -- Chapter 13 Sparse 2D packing in thermal deburring with shock waves acting effects -- 13.1 Introduction -- 13.2 Sparse packing -- 13.2.1 The main problem and mathematical model -- 13.2.2 Solution approach and computational results -- 13.3 Thermal problem formulation -- 13.4 The balanced layout of 2D objects with shock waves action -- 13.5 Conclusions and future research -- Acknowledgments -- References -- Chapter 14 Implementation of smart manufacturing in small and medium-sized enterprises -- 14.1 Introduction -- 14.1.1 Need for smart manufacturing -- 14.1.2 Electronic hardware with machine and software interface -- 14.1.3 Management information system -- 14.2 Literature review -- 14.3 Levels of data for intelligent SME -- 14.3.1 Resources for SME -- 14.3.2 Inputs for SMEs -- 14.3.3 Outputs for SMEs -- 14.3.4 Flow diagram -- 14.3.5 Data collection -- 14.3.6 Applications for analysis and decision making -- 14.4 Proposed architectural framework for intelligent SMEs -- 14.5 Case study -- 14.6 Conclusions and future scope -- References -- Chapter 15 Performance analysis of fractal image compression methods for medical images: a review -- 15.1 Introduction -- 15.1.1 Self-similarity in fractals -- 15.2 Motivation of the survey -- 15.3 Relevant literature -- 15.4 Comparative survey results and discussion -- 15.5 Improvements on existing algorithms -- 15.6 Conclusion and future work -- References -- Chapter 16 Mobile edge computing for efficient energy management systems -- 16.1 Introduction -- 16.2 Paradigm of edge computing -- 16.3 Role of factors in energy consumption -- 16.4 Energy efficient systems -- 16.5 Research findings and limitations -- 16.6 Future research challenges -- 16.6.1 The healthcare domain. , 16.6.2 Big data management.
    Weitere Ausg.: Print version: Manshahia, Mukhdeep Singh Human-Assisted Intelligent Computing Bristol : Institute of Physics Publishing,c2023 ISBN 9780750348027
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9780750318327?
Meinten Sie 9780750322027?
Meinten Sie 9780750340267?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz