The present book addresses the fundamental role played by the three milestones- Benchmarking, Standardization, and Certification that are part of the developmental loop of all products in developed economies...
ISBN:
(数字)9783031558177
ISBN:
(纸本)9783031558160;9783031558191
The present book addresses the fundamental role played by the three milestones- Benchmarking, Standardization, and Certification that are part of the developmental loop of all products in developed economies. The essential role played by these milestones and the importance of defining accurate general and specific metrics is addressed in this book with particular case studies in the domains of Robotics and AI-
The IEEE International Conference on intelligence and Security Informatics (ISI) and Pacific Asia Workshop on intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn...
详细信息
ISBN:
(数字)9783540692096
ISBN:
(纸本)9783540692072;9783642088704
The IEEE International Conference on intelligence and Security Informatics (ISI) and Pacific Asia Workshop on intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn significant attention in the recent years. intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response.
This book focuses on the study of possible adaptive sampling mechanisms for haptic data compression aimed at applications like tele-operations and tele-surgery. Demonstrating that the selection of the perceptual dead ...
ISBN:
(数字)9789811066924
ISBN:
(纸本)9789811066917;9789811349317
This book focuses on the study of possible adaptive sampling mechanisms for haptic data compression aimed at applications like tele-operations and tele-surgery. Demonstrating that the selection of the perceptual dead zones is a non-trivial problem, it presents an exposition of various issues that researchers must consider while designing compression algorithms based on just noticeable difference (JND). The book begins by identifying perceptually adaptive sampling strategies for 1-D haptic signals, and goes on to extend the findings on multidimensional signals to study directional sensitivity, if any. The book also discusses the effect of the rate of change of kinesthetic stimuli on the JND, temporal resolution for the perceivability of kinesthetic force stimuli, dependence of kinesthetic perception on the task being performed, the sequential effect on kinesthetic perception, and, correspondingly, on the perceptual dead zone. Offering a valuable resource for researchers, professionals,and graduate students working on haptics and machine perception studies, the book can also support interdisciplinary work focused on automation in surgery.
This book gathers revised and extended versions of the best papers presented at the 8th International Joint Conference on computationalintelligence (IJCCI 2016), which was held in Porto, Portugal from 9 to 11 Novembe...
详细信息
ISBN:
(数字)9783319992839
ISBN:
(纸本)9783319992822;9783030075859
This book gathers revised and extended versions of the best papers presented at the 8th International Joint Conference on computationalintelligence (IJCCI 2016), which was held in Porto, Portugal from 9 to 11 November 2016. The papers address three main fields of computationalintelligence, namely: Evolutionary Computation, Fuzzy Computation, and Neural Computation. In addition to highlighting recent advances in these areas, the book offers veteran researchers new and innovative solutions, while also providing a source of information and inspiration for newcomers to the field.
Dynamic programming has long been applied to numerous areas in mat- matics, science, engineering, business, medicine, information systems, b- mathematics, arti?cial intelligence, among others. Applications of dynamic ...
详细信息
ISBN:
(数字)9783540370147
ISBN:
(纸本)9783540370130;9783642072000
Dynamic programming has long been applied to numerous areas in mat- matics, science, engineering, business, medicine, information systems, b- mathematics, arti?cial intelligence, among others. Applications of dynamic programming have increased as recent advances have been made in areas such as neural networks, data mining, soft computing, and other areas of com- tational intelligence. The value of dynamic programming formulations and means to obtain their computational solutions has never been greater. This book describes the use of dynamic programming as a computational tool to solve discrete optimization problems. (1) We ?rst formulate large classes of discrete optimization problems in dynamic programming terms, speci?cally by deriving the dynamic progr- ming functional equations (DPFEs) that solve these problems. A text-based language, gDPS, for expressing these DPFEs is introduced. gDPS may be regarded as a high-level speci?cation language, not a conventional procedural computer programming language, but which can be used to obtain numerical solutions. (2)Wethende?neandexaminepropertiesofBellmannets,aclassofPetri nets that serves both as a formal theoretical model of dynamic programming problems, and as an internal computer data structure representation of the DPFEs that solve these problems. (3)Wealsodescribethedesign,implementation,anduseofasoftwaretool, calledDP2PN2Solver, for solving DPFEs. DP2PN2Solver may be regarded as a program generator, whose input is a DPFE, expressed in the input spec- cation language gDPS and internally represented as a Bellman net, and whose output is its numerical solution that is produced indirectly by the generation of “solver” code, which when executed yields the desired solution.
This book describes what we can call modern artificial intelligence that includes the theoretical developments and applications of soft computing techniques. Soft computing includes fuzzy logic, neural networks and me...
详细信息
ISBN:
(数字)9783031882791
ISBN:
(纸本)9783031882784;9783031882814
This book describes what we can call modern artificial intelligence that includes the theoretical developments and applications of soft computing techniques. Soft computing includes fuzzy logic, neural networks and meta-heuristic algorithms, as well as their hybrid combinations. There are papers with the main topics from type-1 to type-3 fuzzy logic, which basically consists of a group of papers that propose new concepts and algorithms based on type-1, type-2 and type-3 fuzzy logic and their applications. There are also papers that present theory and practice of meta-heuristics in diverse application areas. There are interesting papers on different applications of fuzzy logic, neural networks and hybrid intelligent systems in medical problems. In addition, we can find papers describing applications of fuzzy logic, neural networks and meta-heuristics in robotics problems.
暂无评论